From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id C2296A0542; Tue, 4 Oct 2022 22:48:42 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 6A42940DFB; Tue, 4 Oct 2022 22:48:42 +0200 (CEST) Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com [67.231.156.173]) by mails.dpdk.org (Postfix) with ESMTP id 3E11040DDC for ; Tue, 4 Oct 2022 22:48:41 +0200 (CEST) Received: from pps.filterd (m0045851.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 294B1nUk004305; Tue, 4 Oct 2022 13:48:34 -0700 Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11lp2169.outbound.protection.outlook.com [104.47.58.169]) by mx0b-0016f401.pphosted.com (PPS) with ESMTPS id 3jxn2pu9ve-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 04 Oct 2022 13:48:34 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=W+5pjETzra5A9QxYpcTZqV3lJC6AYpA5guep1SMVf6JBp3gAKYYY3EH2OpI9jTF0abJuNUrn9prWk2qimdVNi8vD3xVAm0PG7Z7qXuTVw/JEc2d90CKTwjIQaYo2DIHi8go/WFowXRSDOYgbVLYvHY6bhm0O7NddexczXCPt1mSKSp5nBxxzp7QcVU75obRlTkscAD7UD3zwhm4nh33AyprzDObbhErkFfL5kVIU+kKycuqlIl4fgHbflMBvGI9ODluITubxMbZp+SEgtenlnaH4PYbChgFKRhgGZIK2u1+TqcsOvGRuwD3erv4ZDnFKSMyKvxANttg15wZcIoh1Vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=INWcOREAbB7HDeGrI450oS79XadHJK5HGsT+rRa/rOQ=; b=ThjzLfAaH6RXKy7DsiZw6YaLQVkyzFST/ESBS9KLGVf0gJj0jM/IxSde9Bed1S9i+QmtHh0G/+Jwl57tWc5Ll15hcoBmt2PNv3aMPyvt7K2n7LMhgABWHedVGNcKLgWHC2DNnXH30bm6jo2teNcv7rjFhb+yVv+n91iH9hyM5oZKOtjVmD/b1fAfFVmxgnjmpPG5MOCRdXDcsd+LV5xoBxfX25mqcncIDo2Ox8aGPCvt9N041d90XJqTenp9xPAj66Pg+vcsCUO/YJtAlz8bU/J9uKFBlct9ynB4a1Bshl289kkX6LM3f890MrCKGRwjbz2u5EGGpMJCU2x9i0FMSg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com; dkim=pass header.d=marvell.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.onmicrosoft.com; s=selector1-marvell-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=INWcOREAbB7HDeGrI450oS79XadHJK5HGsT+rRa/rOQ=; b=XEtfnfLnNcv5eVXUz/lLTvew9Q+B1GhV4V4hccAr2QoPwahChFaQ+9bxI+Zi0kGPY9R9TR0dVQwT7tSQz7hxmYC8TKr4xg1s1/79WnwlWXolYUdgMLvlDM6d0ziW0egiKdWsMOyh1wS0Yct+Szd83NHmtKdp/kAXmsSS7YLj774= Received: from CO6PR18MB4484.namprd18.prod.outlook.com (2603:10b6:5:359::9) by MW4PR18MB5244.namprd18.prod.outlook.com (2603:10b6:303:1e0::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5676.31; Tue, 4 Oct 2022 20:48:32 +0000 Received: from CO6PR18MB4484.namprd18.prod.outlook.com ([fe80::ee27:3b96:a580:ba9e]) by CO6PR18MB4484.namprd18.prod.outlook.com ([fe80::ee27:3b96:a580:ba9e%9]) with mapi id 15.20.5676.024; Tue, 4 Oct 2022 20:48:31 +0000 From: Akhil Goyal To: Akhil Goyal , "dev@dpdk.org" CC: "thomas@monjalon.net" , "david.marchand@redhat.com" , "hemant.agrawal@nxp.com" , Vamsi Krishna Attunuru , "ferruh.yigit@xilinx.com" , "andrew.rybchenko@oktetlabs.ru" , "konstantin.v.ananyev@yandex.ru" , "jiawenwu@trustnetic.com" , "yisen.zhuang@huawei.com" , Igor Russkikh , Jerin Jacob Kollanukkaran , Ankur Dwivedi , "maxime.coquelin@redhat.com" , "chandu@amd.com" , "ruifeng.wang@arm.com" , "ajit.khaparde@broadcom.com" , Anoob Joseph , "pablo.de.lara.guarch@intel.com" , "matan@nvidia.com" , "g.singh@nxp.com" , "qiming.yang@intel.com" , "wenjun1.wu@intel.com" , "jianwang@trustnetic.com" , "jingjing.wu@intel.com" , "beilei.xing@intel.com" , Nithin Kumar Dabilpuram , Liron Himi , "royzhang1980@gmail.com" , "sunilprakashrao.uttarwar@amd.com" , "kai.ji@intel.com" , Nagadheeraj Rottela , "jianjay.zhou@huawei.com" , "radu.nicolau@intel.com" , Fan Zhang Subject: RE: [PATCH v8 0/6] crypto/security session framework rework Thread-Topic: [PATCH v8 0/6] crypto/security session framework rework Thread-Index: AQHY2Bf3t7A2bPGJW0qiOgptTkVPyK3+tJ/A Date: Tue, 4 Oct 2022 20:48:31 +0000 Message-ID: References: <20221004111035.3264904-1-gakhil@marvell.com> <20221004173709.3482250-1-gakhil@marvell.com> In-Reply-To: <20221004173709.3482250-1-gakhil@marvell.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CO6PR18MB4484:EE_|MW4PR18MB5244:EE_ x-ms-office365-filtering-correlation-id: 65d282da-1306-432b-bec5-08daa649cc39 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: uDW9/1r+rQ/UgmT9OURDvAnsnKW+zzBDx/pfLZE66BpjRxoFrVc4HEbZ6R1QoJ9pm/fhU6gnFvuaTeIDTGMS+vU/d/q0/sMZ7b9QXm5aJ4Tpsr74ctsqSJ1ShRi4Xj8kGZ6YEAerx+ws2fF5nqFw4ddUM0XCpSSe8EwKX0ndBf8ElkqopReKhyW9eF694jmvRMv96X4KH+R9zLsbMoMf0dnElpANdRJmnIwbsQHQ/MEbMdQDkwxp7cvpRz5FlVjMQ4M1FI6oiGxhNOG1UmgorcrblKVm9W3dy6MCzr7X0MvPulRzETzyhf4mQItfR45n7+Wrfj0x008uaApGlcERpEz2t2MTeI3GGzMjujPzI6mY6eQu2p7F7JUXf1ztnHVDxreUWL1eb+tkSMjfsYuTVq2yssocsqBaHPSILJY4Q8SpDPzVs9UbaRHHD2OnZO1Ic6ozMznbofhOZIpd38SSK1C/XvEd3oG2imClNaK81XVZgfO468fbDxtB8KVE5o0lcv+yWykIEAiP+ednFtkUkWd7zYFVq/gNy+HeURyGkUrvxFkkyARxNh+nRdZ8i7N/sRjOkNFdbsDVa8dRbXckwb2pFZ6QEQGdObVoYiVy1/5+Mlw8515vTjRh4xCZjVRMcccKgnuIXC453WHKNotY5SPrQ3RGcfr8+3tyXh8NiLXmj0xMrgMXdyiZls0bn7VRluu3V+skCVOjysg8e+KuYlKBPXjtgA1kYRzIQrG5Aq6lTM3fCoFVJhA16m4O8/Bww/NwGYh3UA5L5VEQHBZzgdtwMIFqM/pzcWGLhcXXyPZDpF7OO1Eguyuk/0VYVjsWk353x0gAG/tSL0RM1GdjbA== x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO6PR18MB4484.namprd18.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(346002)(396003)(39860400002)(376002)(136003)(366004)(451199015)(2906002)(5660300002)(8936002)(52536014)(7416002)(316002)(110136005)(54906003)(122000001)(966005)(6506007)(7696005)(55236004)(4326008)(33656002)(76116006)(8676002)(478600001)(64756008)(66446008)(66476007)(66556008)(66946007)(71200400001)(86362001)(83380400001)(41300700001)(15650500001)(55016003)(38100700002)(9686003)(26005)(186003)(38070700005); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?5QtSbqTXRhR1zSSqJa+xlK4dtjSfdUtiIV170uAqXyM5FtaMgI+NI4+jAkAl?= =?us-ascii?Q?Pevd8xfDo4Q8temoibBZJOfz8tbwhGmy78HPrUXX9TchfJxF/naDPpXN3XJN?= =?us-ascii?Q?Mj1BKGb9cCBbwSk5dGRC85o6jkSGMhHYEFqWLT60u3ow92jiPEjnVxSt+B39?= =?us-ascii?Q?+FFyBiih9LX/UI717vppUajcSsNrjjupLu7rprhzO3VRHpzyOi4+TmnYkTj9?= =?us-ascii?Q?8d9K9aXUXS3r72yiBQRzQJGINMF4lqiEUvOkJv+5tSpNyXlQ9aO0EQEnrhPP?= =?us-ascii?Q?Dx9rBnJbTz+AptLq8J8ur64i7Nq1RQBcWupZ259H9AH/D0QccYfWlkkVURN8?= =?us-ascii?Q?ibP8q+lO5P8Eom6VyaxihXCTcaH6J/yzckc1q/GKJs4vgbG+7lPgSV7ew2KL?= =?us-ascii?Q?pF4nhwopiln2aVmrmEutNxVysglMqcyktEuy7/gfSn2Rs7bnYORZfMUcUWhR?= =?us-ascii?Q?UMv53WQ5/UCkEx/13x//tKbxybOSNudxmvFJFKmUhzycc3uwhi+LqpUCHIXE?= =?us-ascii?Q?P9dyRLUUd/QOuzPv/hwxePwsqq8ZquW1IpErtBL9c09/JUYGPe+OQNwzc6Dc?= =?us-ascii?Q?/DslhXz6Ks3sxx4OpcHtUHd6uQqQsCnudDO9j26FH21BGrXJfkx86870YtED?= =?us-ascii?Q?kpp56JI8vMY9xzoeXY69U27mD0SQ41vpwN5I14VYV/fOeiMoMMZWTvxrhWnp?= =?us-ascii?Q?8ht7EsROzVdkY1qgAHmZYmkk9G4VD3svOvSgTZDqcKU5o/wSmbrBUaG+4j0x?= =?us-ascii?Q?FhXSApXYDmSdSjHykt6+ygGdN+x1vU0WjNHE45jOttcqCgJYIIabwKVD5uAv?= =?us-ascii?Q?6/ccsHlg+NpFzklpJPl6/C/mnLX19zbL8fc1JVMbiWsKGKhj+thA+oHuEGqL?= =?us-ascii?Q?GcX9M2a0B1w8Tuv4FssrsvQ9BJwEDEuAzqf/ddm7ZA6GpTZnLvGmgGphG0dX?= =?us-ascii?Q?+BvVm9mYFjCLz5TZ1KLLVyZVDdBA9qrdkaJRZyALNYE8Ak68ZYPSOzr6zeI9?= =?us-ascii?Q?fg6bD9z9oHrOL5ye4mEdlay6Q08Re2luh4KpxkIQDql/N2MbHy/24DZ7fCrJ?= =?us-ascii?Q?yzcQxrYWtWN3aEEqYonNiCylO40vFEb0tT2kl1MJm5DsOxrHE+m5Eac+C+c+?= =?us-ascii?Q?eFctzUdBUjda5vraRZM+eBuui6BH4AKkDpr92GsPaqlmpK4fzMnMiAHJbyg3?= =?us-ascii?Q?P3gSUHDCXk55cyd6PtH5fS1Gp3NPDjv2nMd+qF7rGtHP8f+NwoRlJ39+z9yI?= =?us-ascii?Q?+PguwYUlMwXTJeSA/34R0or0Gq8ccvFs1lONGXR79+wY6kXJ5wdahSMUPZzF?= =?us-ascii?Q?kOv2+BSLgQMVlNYh+SyXyAy7hAP39JHPGHE4qkeE+DRQgIawJu6XSkhj24mf?= =?us-ascii?Q?dg88U8JN/UW9I/t0ydO6lEHPLkPloHMoLRO7JgSJpmsqW6Ac1r3SIv1kLRYa?= =?us-ascii?Q?qMrcoytxU0g8bDA0A/RLw+UcKeMrTbXYt8el8D6xAxQhiYgqlx11Mk206Bk3?= =?us-ascii?Q?3UQ8YD+7kmys/APX29BoGdgaiu4oJzFbo9QkgSqsv8o8QD63EkHV+uwX3k7B?= =?us-ascii?Q?10anvxBWCI8xHaQz7D4=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: marvell.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO6PR18MB4484.namprd18.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 65d282da-1306-432b-bec5-08daa649cc39 X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Oct 2022 20:48:31.5350 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 4hx7p8xiDX4wkBEljrL5sgtN5/YRL8SGQzxK/Izf3qoPIbxHeJ8qAaWYmz3ptIDZtIQXiHmQCvGLzvHDbP+oWA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR18MB5244 X-Proofpoint-ORIG-GUID: UG4CFrDA9HiiBg4a_HFfm7nsA6iRobMp X-Proofpoint-GUID: UG4CFrDA9HiiBg4a_HFfm7nsA6iRobMp X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.528,FMLib:17.11.122.1 definitions=2022-10-04_09,2022-09-29_03,2022-06-22_01 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org > Subject: [PATCH v8 0/6] crypto/security session framework rework >=20 > This patchset reworks the symmetric crypto and security session > data structure to use a single virtual/physical contiguous buffer > for symmetric crypto/security session and driver private data. > In addition the session data structure is now private. > The session is represented as an opaque pointer in the application. >=20 > With the change the session is no longer supported to be accessed > by multiple device drivers. For the same reason > rte_cryptodev_sym_session_init/clear APIs are deprecated as > rte_cryptodev_sym_session_create/free will initialize and > clear the driver specific data field. >=20 > The change was also submitted last year during DPDK 21.11 > timeframe also[1], but was not applied due to lack of feedback from > community. Please help in getting this cleanup merged in this cycle. >=20 > Now the similar work was already done for asymmetric crypto. > This patchset is rebased over current tree and fixes all > the issues reported so far. >=20 > Changes in v8: > - fixed security autotest >=20 > Changes in v7: > - fixed build for ixgbe and txgbe >=20 > Changes in v6: > - rebased over TOT > Changes in v5: > - rebased over latest dpdk-next-crypto tree >=20 > Changes in v4: > - squashed armv8_crypto fixes. > http://patches.dpdk.org/project/dpdk/cover/20220926100120.3980185-1- > ruifeng.wang@arm.com/ >=20 > Changes in v3: > - Updated release notes > - fixed checkpatch issues > - renamed macro to get sess priv data to align with crypto macro > - added acked-by/tested-by >=20 > Changes in v2: > This patchset is a v2 for the patch that was sent by Fan Zhang(Intel) > with a few changes > - Added security session rework also. > - fixed issues in [2] reported on mailing list. > - few other fixes. >=20 > Please review and provide feedback as soon as possible > as this is intended to be merged in DPDK 22.11 RC1. >=20 > Currently the cnxk platform is tested with this change. > Request everyone to review and test on their platform. >=20 > Special note to ixgbe and txgbe maintainers. > There is a wrong implementation for flow creation. Please check. > A hack is added to bypass it. Please fix it separately. >=20 > [1] https://patches.dpdk.org/project/dpdk/cover/20211018213452.2734720-1- > gakhil@marvell.com/ > [2] https://patches.dpdk.org/project/dpdk/cover/20220829160645.378406-1- > roy.fan.zhang@intel.com/ >=20 >=20 >=20 > Akhil Goyal (5): > cryptodev: rework session framework > cryptodev: hide sym session structure > security: remove priv mempool usage > drivers/crypto: support security session get size op > security: hide session structure >=20 > Fan Zhang (1): > crypto/scheduler: use unified session >=20 > app/test-crypto-perf/cperf.h | 1 - > app/test-crypto-perf/cperf_ops.c | 64 ++-- > app/test-crypto-perf/cperf_ops.h | 6 +- > app/test-crypto-perf/cperf_test_latency.c | 11 +- > app/test-crypto-perf/cperf_test_latency.h | 1 - > .../cperf_test_pmd_cyclecount.c | 12 +- > .../cperf_test_pmd_cyclecount.h | 1 - > app/test-crypto-perf/cperf_test_throughput.c | 13 +- > app/test-crypto-perf/cperf_test_throughput.h | 1 - > app/test-crypto-perf/cperf_test_verify.c | 11 +- > app/test-crypto-perf/cperf_test_verify.h | 1 - > app/test-crypto-perf/main.c | 30 +- > app/test-eventdev/test_perf_common.c | 43 +-- > app/test-eventdev/test_perf_common.h | 1 - > app/test/test_cryptodev.c | 354 +++++------------- > app/test/test_cryptodev_blockcipher.c | 18 +- > app/test/test_cryptodev_security_ipsec.c | 2 +- > app/test/test_cryptodev_security_ipsec.h | 2 +- > app/test/test_event_crypto_adapter.c | 39 +- > app/test/test_ipsec.c | 49 +-- > app/test/test_ipsec_perf.c | 4 +- > app/test/test_security.c | 194 ++-------- > app/test/test_security_inline_proto.c | 26 +- > doc/guides/prog_guide/cryptodev_lib.rst | 16 +- > doc/guides/rel_notes/deprecation.rst | 9 - > doc/guides/rel_notes/release_22_11.rst | 14 + > drivers/crypto/armv8/armv8_pmd_private.h | 2 - > drivers/crypto/armv8/rte_armv8_pmd.c | 21 +- > drivers/crypto/armv8/rte_armv8_pmd_ops.c | 35 +- > drivers/crypto/bcmfs/bcmfs_sym_session.c | 39 +- > drivers/crypto/bcmfs/bcmfs_sym_session.h | 3 +- > drivers/crypto/caam_jr/caam_jr.c | 69 +--- > drivers/crypto/ccp/ccp_crypto.c | 56 +-- > drivers/crypto/ccp/ccp_pmd_ops.c | 32 +- > drivers/crypto/ccp/ccp_pmd_private.h | 2 - > drivers/crypto/ccp/rte_ccp_pmd.c | 29 +- > drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 41 +- > drivers/crypto/cnxk/cn10k_ipsec.c | 45 +-- > drivers/crypto/cnxk/cn9k_cryptodev_ops.c | 38 +- > drivers/crypto/cnxk/cn9k_ipsec.c | 50 +-- > drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 55 +-- > drivers/crypto/cnxk/cnxk_cryptodev_ops.h | 16 +- > drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 70 ++-- > drivers/crypto/dpaa2_sec/dpaa2_sec_raw_dp.c | 6 +- > drivers/crypto/dpaa_sec/dpaa_sec.c | 69 +--- > drivers/crypto/dpaa_sec/dpaa_sec_raw_dp.c | 7 +- > drivers/crypto/ipsec_mb/ipsec_mb_ops.c | 34 +- > drivers/crypto/ipsec_mb/ipsec_mb_private.h | 41 +- > drivers/crypto/ipsec_mb/pmd_aesni_gcm.c | 48 +-- > drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 69 +--- > drivers/crypto/ipsec_mb/pmd_chacha_poly.c | 4 - > drivers/crypto/ipsec_mb/pmd_kasumi.c | 10 +- > drivers/crypto/ipsec_mb/pmd_snow3g.c | 9 +- > drivers/crypto/ipsec_mb/pmd_zuc.c | 4 - > drivers/crypto/mlx5/mlx5_crypto.c | 25 +- > drivers/crypto/mvsam/rte_mrvl_pmd.c | 11 +- > drivers/crypto/mvsam/rte_mrvl_pmd_ops.c | 49 +-- > drivers/crypto/nitrox/nitrox_sym.c | 39 +- > drivers/crypto/null/null_crypto_pmd.c | 20 +- > drivers/crypto/null/null_crypto_pmd_ops.c | 33 +- > drivers/crypto/null/null_crypto_pmd_private.h | 2 - > .../crypto/octeontx/otx_cryptodev_hw_access.h | 1 - > drivers/crypto/octeontx/otx_cryptodev_ops.c | 67 +--- > drivers/crypto/openssl/openssl_pmd_private.h | 2 - > drivers/crypto/openssl/rte_openssl_pmd.c | 24 +- > drivers/crypto/openssl/rte_openssl_pmd_ops.c | 29 +- > drivers/crypto/qat/dev/qat_sym_pmd_gen1.c | 1 + > drivers/crypto/qat/qat_sym.c | 15 +- > drivers/crypto/qat/qat_sym.h | 16 +- > drivers/crypto/qat/qat_sym_session.c | 73 ++-- > drivers/crypto/qat/qat_sym_session.h | 10 +- > drivers/crypto/scheduler/scheduler_failover.c | 19 +- > .../crypto/scheduler/scheduler_multicore.c | 17 + > .../scheduler/scheduler_pkt_size_distr.c | 81 ++-- > drivers/crypto/scheduler/scheduler_pmd_ops.c | 93 ++++- > .../crypto/scheduler/scheduler_pmd_private.h | 120 +++++- > .../crypto/scheduler/scheduler_roundrobin.c | 11 +- > drivers/crypto/virtio/virtio_cryptodev.c | 40 +- > drivers/crypto/virtio/virtio_rxtx.c | 3 +- > drivers/net/cnxk/cn10k_ethdev_sec.c | 38 +- > drivers/net/cnxk/cn9k_ethdev_sec.c | 41 +- > drivers/net/iavf/iavf_ipsec_crypto.c | 23 +- > drivers/net/iavf/iavf_ipsec_crypto.h | 2 +- > drivers/net/ixgbe/ixgbe_ipsec.c | 31 +- > drivers/net/txgbe/txgbe_ipsec.c | 32 +- > examples/fips_validation/fips_dev_self_test.c | 40 +- > examples/fips_validation/main.c | 37 +- > examples/ipsec-secgw/ipsec-secgw.c | 44 +-- > examples/ipsec-secgw/ipsec.c | 16 +- > examples/ipsec-secgw/ipsec.h | 1 - > examples/ipsec-secgw/ipsec_worker.c | 2 +- > examples/l2fwd-crypto/main.c | 60 +-- > examples/vhost_crypto/main.c | 16 +- > lib/cryptodev/cryptodev_pmd.h | 60 +-- > lib/cryptodev/cryptodev_trace_points.c | 9 - > lib/cryptodev/rte_crypto.h | 3 +- > lib/cryptodev/rte_crypto_sym.h | 11 +- > lib/cryptodev/rte_cryptodev.c | 285 +++++--------- > lib/cryptodev/rte_cryptodev.h | 153 +++----- > lib/cryptodev/rte_cryptodev_trace.h | 42 +-- > lib/cryptodev/version.map | 7 - > lib/ipsec/rte_ipsec_group.h | 13 +- > lib/ipsec/ses.c | 5 +- > lib/pipeline/rte_table_action.c | 10 +- > lib/security/rte_security.c | 33 +- > lib/security/rte_security.h | 90 +++-- > lib/security/rte_security_driver.h | 31 +- > lib/vhost/rte_vhost_crypto.h | 3 - > lib/vhost/vhost_crypto.c | 28 +- > 109 files changed, 1301 insertions(+), 2493 deletions(-) >=20 Series applied to dpdk-next-crypto with a couple of minor fixes.