From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 63B984416A; Thu, 6 Jun 2024 15:37:51 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 4BFDD410E8; Thu, 6 Jun 2024 15:37:51 +0200 (CEST) Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.18]) by mails.dpdk.org (Postfix) with ESMTP id 5DB4B40EAB for ; Thu, 6 Jun 2024 15:37:49 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1717681069; x=1749217069; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=xAzL3EyzM+BNiGyNQVLpo5FEYW++ZounLJSSkR2ltjI=; b=h9oMelkATwGCgx/PWt3vZKO25YVVuS4gF6P4PiZcY0/fVMjz0IjtpY/z nLzcEBfQX4k5dErhFNgsEbYYyBcIcZnc5/UQ8+iNCtAf2javKJz6xfBrt Uw6FA2s1dXqw7d2ogSUQWtdQUVRZO6AqCYwsv99gn0ecdiRHtqViEq5Tp b31H6mnFlbL8Wk0Bm9x7siieF0ibyKkU+JPA5YfstzSRZUG3UU6qyHyfj JMvGHfH8PBw2/NDY+uacrgUO9SP2ksE3nFPhlcE3uuRI64UuEDJRO5YR1 xZBtz6vh5iLrA9GJ0r12ExDLklaLzgFfhfynXOXSqOWqwqWdntrLRylqc Q==; X-CSE-ConnectionGUID: RMrqPOQDToGtING/e0O6MQ== X-CSE-MsgGUID: 3TiOtgnkSMOJC+b7scximA== X-IronPort-AV: E=McAfee;i="6600,9927,11095"; a="14089814" X-IronPort-AV: E=Sophos;i="6.08,219,1712646000"; d="scan'208";a="14089814" Received: from fmviesa001.fm.intel.com ([10.60.135.141]) by fmvoesa112.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Jun 2024 06:37:48 -0700 X-CSE-ConnectionGUID: /jAZQWneShS+AySWgKJfpQ== X-CSE-MsgGUID: yES1wBGTStuXys3FCX3ANA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.08,219,1712646000"; d="scan'208";a="69127032" Received: from orsmsx602.amr.corp.intel.com ([10.22.229.15]) by fmviesa001.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 06 Jun 2024 06:37:48 -0700 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Thu, 6 Jun 2024 06:37:47 -0700 Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39 via Frontend Transport; Thu, 6 Jun 2024 06:37:47 -0700 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.169) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.39; Thu, 6 Jun 2024 06:37:47 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Q6fC7t5I8w2DA9kr1hRTlWnQHKtNiyo4FhA+SakL8AwanTHo0eSBgbNt+AaZv30YvrgKV/UpcEJleiXp4MGbd7xB8wHk3mD9uGghXM8soKBS0wLJ3z4MKsg3gn//WZgzQ6eXKyWU+/u/92rjVxEmLMfGY7SbFGDr4kHVYVpN+ZCuTij7uXgpp7wOAEf7ulZOprPyfaj9y253IAWjvz3kuBW139qjdNlDMHR4XCs/FSn4C4tp+7isFAZpmxTW0V6nBYG4tA64xe6TWMfAtW9J+ssiVj2a2dhIs2oXb2vHBgefXfm7dfJYezxyZdnXnJ+qd9+nIVVoIIz4HWRZWzN88w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=deJWgcpWFLE1ymKv4guu/w6cY5T6EttLiop2zxQKdEs=; b=n4n4ELfIdk2q92NturxIV+3qq5hC/qhgnAHnOvO/r0O+W6zxJXrw8wz7Dg7wkyWMqOdaABBQEuX0pEpjowakAPbiF89fO+rQ9xNuIIQTPd6pt8WhdeX8zCIWjojQcI5ssVEt4Wi2ZSWBt1ca3eF8tS0zXeI0IbpECpZPpwFtDdalU+4/6Z9EIjHUDngLaoQZDMG/Y9Via5wyhCLQ1wv6ltjKh2jsdD0rBSsakEnTgvsRUeelpa8FRX7yYkwofiC/tLJEjc4zWOXHut+ZeF6wJDR0dY/dK4maiTPyEyTs+ktVnfvlUBITetW8Whebcnf1Z2HftjprlP5HYGaD+DXDJQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW4PR11MB5911.namprd11.prod.outlook.com (2603:10b6:303:16b::16) by CO1PR11MB4916.namprd11.prod.outlook.com (2603:10b6:303:9c::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.34; Thu, 6 Jun 2024 13:37:45 +0000 Received: from MW4PR11MB5911.namprd11.prod.outlook.com ([fe80::1d00:286c:1800:c2f2]) by MW4PR11MB5911.namprd11.prod.outlook.com ([fe80::1d00:286c:1800:c2f2%3]) with mapi id 15.20.7633.018; Thu, 6 Jun 2024 13:37:45 +0000 From: "Kundapura, Ganapati" To: "Gujjar, Abhinandan S" , "dev@dpdk.org" , "jerinj@marvell.com" CC: "Jayatheerthan, Jay" , "Naga Harish K, S V" Subject: RE: [PATCH v3] eventdev/crypto: restore opaque field between dequeue and enqueue Thread-Topic: [PATCH v3] eventdev/crypto: restore opaque field between dequeue and enqueue Thread-Index: AQHauAdD6HXbPjctt0esnt26fSjOQbG6ptaAgAAL5BA= Date: Thu, 6 Jun 2024 13:37:45 +0000 Message-ID: References: <20240604161848.1575399-1-ganapati.kundapura@intel.com> <20240606114637.2022802-1-ganapati.kundapura@intel.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5911:EE_|CO1PR11MB4916:EE_ x-ms-office365-filtering-correlation-id: 30921743-0f6e-4a98-00a8-08dc862dd953 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; ARA:13230031|1800799015|376005|366007|38070700009; x-microsoft-antispam-message-info: =?us-ascii?Q?br6QMHOV7fZlwcbdXgfv7cij+FprbQTKwETfgKkpzl6oiros1r5KGVEEtuJg?= =?us-ascii?Q?3k4QIil1LijUtECLYPnq6HJVcPhw6hdlT6rMNLNuzJdK7l3X/99T6XTvSNEd?= =?us-ascii?Q?SXJAasyahi0RnnmoPOB4uA32kOjS/s9vM1+qVIgjIWVBI9WMKwEek+BtPAvN?= =?us-ascii?Q?D2vOtITIjOZ4fbdmtbGPnLMxXwVVb9kzh3pmFxTKDKR4nyvpVA8rOnogfFv8?= =?us-ascii?Q?C0ivl6hhoEtDnE5/GRBD7SrKO2eDYTbyhFfb+KuNw3l0zZEzB1gwuG1Y4JWG?= =?us-ascii?Q?VICF4tI3C3rKebIVCS3c+2SHlDXS8sW2yPuKyF0+RHDBu7IVa+atLMdiRvbM?= =?us-ascii?Q?SflMztiP77kWRhtORPAkkj/8h3cr9VBZDnLtjuJCpqeuYgTMVuj3e4HhsGuP?= =?us-ascii?Q?IgD0BcLcKAjfxbPp4mcFDXFtKgRL1LABhWiD9V+/Eln2WCj2j2VJ3V1C4oVv?= =?us-ascii?Q?9PDWGKTafKGtUccW6O7y2b7mrbLCWIAvZHP8lz4DmVehOt3vl4Jx01JCHiCG?= =?us-ascii?Q?g8Ikzrkh/txOYK3rdW+Eg60W8h1vDJ9zW+LkQ1J+owUPKz+0yyH5k2sOQ39u?= =?us-ascii?Q?HUD1CCNpsdFYsAV8vXcvLG+qgCbZd5UVL/hp804S1sIHMqWt48XFZy1D35EI?= =?us-ascii?Q?PxPWTuzEXWP6OMGHm0MLrbQeo/9lZhEJkucyQ0AsRYkASJ/M+54sl0Q+Lz42?= =?us-ascii?Q?qzjkJ+cGJJY1XoBirBp/qj0Bzl0iDqhDJCkb0idimFtaJYlfGqZnX34dF/57?= =?us-ascii?Q?e167Ij3V60f4uhbm4wxB6oKDVpt4jltMMQ7LtJMA8m+1kHtHSsYydEDItzNn?= =?us-ascii?Q?+tIzn0VvvsLvlN1CSkwGUExdlLIrqLlV/jI7XEiqfidxMXQ3ON1Z9+EzTZDz?= =?us-ascii?Q?7U0fCQl2f6QbqZ9Rdw2TY9M5vyYsCfXd+QJnnh3juYgvOtgZ2v+kT+9b9u56?= =?us-ascii?Q?8HU9V+ZhiP94R7hiMBVSAMBAXDzwaNO2d+uykvSrH0+o64AC3KTvAedo0cAm?= =?us-ascii?Q?diT6stNSDm0U+nuJdZF9ym2uNvIixu8VrXFx0IITcqWJLIBhPi8yjHVQkn7C?= =?us-ascii?Q?W6/MBGMfsuwD2ytwCQetF2zLR8oc0c0l43wsHdmfmdY5A/lzDbquDmvzW+qf?= =?us-ascii?Q?86K49+jSRvfAWgy0SO0RoWNTOzx10NVZaKynt2J7FaTWUwgxF2cGcQ7h9x4+?= =?us-ascii?Q?RWED5sMmUd7JIR4bHZ8nltWJ5kXkepsQhKiftpR83uMiBuUDloBUqcSr42vk?= =?us-ascii?Q?0k49L/ePZzFYcBZjV9/AO/aESmttZRvdAiiRcUcRn69K0o5OVfSbkm4MvWJh?= =?us-ascii?Q?gZGet5deH24HYSyMdjOikfmvSX+Nt+rCym2ktWr7jHnHCxZZF1w78mjhLPAo?= =?us-ascii?Q?V3yYMfQ=3D?= x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW4PR11MB5911.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(1800799015)(376005)(366007)(38070700009); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?98dHtkQ0kX8DFPqGsN+pbp5YMJ/w4FaDpWOLfhrIkQk0f4WYQSlDdc5KDFf+?= =?us-ascii?Q?+6IILbnBFhGA4FxcET8yPnjm6RkrXCCCQzEm9BzKs1446R5HTWIr9phTXZXz?= =?us-ascii?Q?oqu9HpLH5ds8QI5q3ZJ16Ji69RSm9P4h3vZNoY+/qRnlaHXrRcOb/0p5RgxG?= =?us-ascii?Q?tNh/cFB21XYqJuJa/wHshmu5k4J+/gHojZYgMMssRPspyhZmk7Ocmlzdww2B?= =?us-ascii?Q?8EbGOyf4E/1QBBzLep/9vl3NTJE2lW3a3pB/aAu9CtwdTjKZszVnMhj8g7Sm?= =?us-ascii?Q?MgiXN4bNof1L0MxOCPU6f64mSWpoIknRHqcgkmHoBzkQKSAUCgc36uY2LzlR?= =?us-ascii?Q?N0fVg35b3/XCAurM+6yV4flFG0+7ch0M0yvaVhtsF3C6F33JGzeChMiAXgqf?= =?us-ascii?Q?yg9JUdfCaij9EAzXv3mzyBzLRwFU43jw6sAvncwAKz7YX0vUyZVZ3ooc8jxP?= =?us-ascii?Q?RV4paCFpJGpkaQ+LICSb1qYafuQf5T25Y9vA3f/+KklDa0gm8oEAPH3UyZhh?= =?us-ascii?Q?W9aGmlgdH+3gk3rGlie2gMNubgsVIfYHbvB+8BhJKSQuFbh3dJ6dTllbUu+7?= =?us-ascii?Q?4J8PzATdOxAqCRMNuv3scUtCkGCc3P8wPDqGsO/Q3tA2lvrA5C4Fgkm2g3AT?= =?us-ascii?Q?gQZiXlBH2gSPoM9JcGRjFVbjNQ/yN0FWDQAwvao+Ufzm5evMn+an0i0C8caa?= =?us-ascii?Q?967dNwfeWT6gOo2RqFb7rQd+ZLTmdSJLXqot1w86q6usnjnoE73eUiLPoFir?= =?us-ascii?Q?poUWV8+ZnhSiR3g4XqIcA5VmdMa6nK/LIU+LS8J6/6UXBuLIqdfRjLZ7fa9H?= =?us-ascii?Q?xpDphMRnQ6DlPik2Z9O8xnH8OQsh6M7/8O4YNlOgtb3l/+e5wFFyyVJFuU8U?= =?us-ascii?Q?cOf10poTSMY3ZWFJ+cB+M6pqG4XVYxvaFzmbkfCAdpxIBfGdF29BAIKj6Nud?= =?us-ascii?Q?Gpt0vArg/h6dg3X7jXKxZwwJ6d2WLT6YQAECZ5WMFLcWRuH0BsMOq00gJpzK?= =?us-ascii?Q?wtbCXtWs40ShMfCxp42YWHqH4P5arKe18EwSOVKijtdS/quYz2rgaKE1hifA?= =?us-ascii?Q?PX8o73SkpYbqeUq98CyCjnxppp4RGepQlGqiU1Ky7aELQL+Cid52YuZhEc77?= =?us-ascii?Q?BwDXpI5XPFLazPSZ8GyB1nhMWa7oHXK8JI1F6yXwO1vPBgTOEc02umh7KzdX?= =?us-ascii?Q?NZh/Lvn5PJAxwBrW1RrU3SI5m3P7ctotHxm6ZUlpnV33BGxthOmBHdpHa31x?= =?us-ascii?Q?s91vjk+VD1uFGg9sjBFNWgmOyYflGEu/RzgXp3IQmSvgCddPtMCnEdLQPBr4?= =?us-ascii?Q?C+FoLnecpKXCkbABACihSVjnqSjqZrUAhQ1+TmZSXc34qV8TBUvZxbaDn8cf?= =?us-ascii?Q?eIu5HCjuD/qph//SA3EXw4UhlwamA7AzIwNOf7zWMGOyN0rBYcTyyk/rzEDI?= =?us-ascii?Q?rJKVfEZGewWnwzibMjrnDAd07BichEg/rcgJEf6xoaUb/hMsHTE26UrHvv3R?= =?us-ascii?Q?8TMLcEAy6+7/7psScYhlHQadW0ufTgk8KMB+1mLHS1ROkUi7mIiSGs0b7CZL?= =?us-ascii?Q?NclLU/AgroRAPGQ6pOgoeC4AaR7q22K6xZk4lmZgUJlBduNo1WMT6lfV9Q6Q?= =?us-ascii?Q?AA=3D=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5911.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 30921743-0f6e-4a98-00a8-08dc862dd953 X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jun 2024 13:37:45.6918 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: xSrozIWWEycvqm61QHYxWCdxf+8fA6f1tIP6/EAmFbbD73B7p8uCWU0/fJO25s3FMcefUXPxsFB0bcSR3eVZ0ehzYu3OcrObcldMXs4fATA= X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR11MB4916 X-OriginatorOrg: intel.com X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Hi Abhi, > -----Original Message----- > From: Gujjar, Abhinandan S > Sent: Thursday, June 6, 2024 5:47 PM > To: Kundapura, Ganapati ; dev@dpdk.org; > jerinj@marvell.com > Cc: Jayatheerthan, Jay ; Naga Harish K, S V > > Subject: RE: [PATCH v3] eventdev/crypto: restore opaque field between > dequeue and enqueue >=20 > Hi Ganapati, >=20 > Few comments inline. Please update in the next patch and add Acked-by: > Abhinandan Gujjar >=20 Added Acked-by in v4 >=20 > > -----Original Message----- > > From: Kundapura, Ganapati > > Sent: Thursday, June 6, 2024 5:17 PM > > To: dev@dpdk.org; jerinj@marvell.com; Gujjar, Abhinandan S > > > > Cc: Jayatheerthan, Jay ; Naga Harish K, S > > V > > Subject: [PATCH v3] eventdev/crypto: restore opaque field between > > dequeue and enqueue > > > > For session-less crypto operations, event info is contained in crypto > > op metadata for each event which is restored in event from the crypto > > op metadata response info. > > > > For session based crypto operations, crypto op contains per session > > based event info in crypto op metadata. If any PMD passes any > > implementation specific data in ev::impl_opaque on each event, it's not > getting restored. > > > > This patch stores ev::impl_opaque in mbuf's dynamic field before > > enqueueing to cryptodev and restores ev::impl_opaque from mbuf's > > dynamic field after dequeueing crypto op from cryptodev for session > > based crypto operations. > > > > Fixes: 7901eac3409a ("eventdev: add crypto adapter implementation") > > > > Signed-off-by: Ganapati Kundapura > > > > --- > > v3: > > * Added Fixes tag > > > > v2: > > * Fixed TYPO_SPELLING warning in commit header > > > > diff --git a/lib/eventdev/rte_event_crypto_adapter.c > > b/lib/eventdev/rte_event_crypto_adapter.c > > index db1c7f3..91a30ca 100644 > > --- a/lib/eventdev/rte_event_crypto_adapter.c > > +++ b/lib/eventdev/rte_event_crypto_adapter.c > > @@ -138,6 +138,27 @@ static struct event_crypto_adapter > > **event_crypto_adapter; > > } \ > > } while (0) > > > > +#define ECA_DYNFIELD_NAME "eca_ev_opaque_data" > > +/** Device-specific metadata field type */ typedef uint8_t > > +eca_dynfield_t; > > +/** Dynamic mbuf field for device-specific metadata */ int > Offset of dynamic field, right? > I see comment and statement are on the same line, please check. Updated in V4 >=20 > > +eca_dynfield_offset =3D -1; > > + > > +static int > > +eca_dynfield_register(void) > > +{ > > + static const struct rte_mbuf_dynfield eca_dynfield_desc =3D { > > + .name =3D ECA_DYNFIELD_NAME, > > + .size =3D sizeof(eca_dynfield_t), > > + .align =3D alignof(eca_dynfield_t), > > + .flags =3D 0, > > + }; > > + > > + eca_dynfield_offset =3D > > + rte_mbuf_dynfield_register(&eca_dynfield_desc); > > + return eca_dynfield_offset; > > +} > > + > > static inline int > > eca_valid_id(uint8_t id) > > { > > @@ -491,6 +512,24 @@ eca_enq_to_cryptodev(struct > event_crypto_adapter > > *adapter, struct rte_event *ev, > > crypto_op =3D ev[i].event_ptr; > > if (crypto_op =3D=3D NULL) > > continue; > > + > > + /** ev::impl_opaque field passed on from eventdev PMD > Replace ev::impl_opaque with "struct rte_event::impl_opaque " in commit > message and code >=20 Updated in v4 > > could > > + * have different value per event. > > + * For session-based crypto operations retain > > ev::impl_opaque > > + * into mbuf dynfield and restore it back after copying event > > + * information from session event metadata. > > + * For session-less, each crypto operation carries event > > + * metadata and retains ev::impl_opaque information to be > > + * passed back to eventdev PMD. > > + */ > > + if (crypto_op->sess_type =3D=3D > RTE_CRYPTO_OP_WITH_SESSION) > > { > > + struct rte_mbuf *mbuf =3D crypto_op->sym->m_src; > > + > > + *RTE_MBUF_DYNFIELD(mbuf, > > + eca_dynfield_offset, > > + eca_dynfield_t *) =3D > > ev[i].impl_opaque; > > + } > > + > > m_data =3D > > rte_cryptodev_session_event_mdata_get(crypto_op); > > if (m_data =3D=3D NULL) { > > rte_pktmbuf_free(crypto_op->sym->m_src); > > @@ -657,6 +696,21 @@ eca_ops_enqueue_burst(struct > event_crypto_adapter > > *adapter, > > > > rte_memcpy(ev, &m_data->response_info, sizeof(*ev)); > > ev->event_ptr =3D ops[i]; > > + > > + /** restore ev::impl_opaque from mbuf dyn field > Replace dynfield -> "dynamic field" in the comments Updated in v4 > > + * for session based crypto operation. > > + * For session-less, each crypto operations carries event > > + * metadata and retains ev::impl_opaque information to be > > + * passed back to eventdev PMD. > > + */ > > + if (ops[i]->sess_type =3D=3D RTE_CRYPTO_OP_WITH_SESSION) { > > + struct rte_mbuf *mbuf =3D ops[i]->sym->m_src; > > + > > + ev->impl_opaque =3D *RTE_MBUF_DYNFIELD(mbuf, > > + eca_dynfield_offset, > > + eca_dynfield_t *); > > + } > > + > > ev->event_type =3D RTE_EVENT_TYPE_CRYPTODEV; > > if (adapter->implicit_release_disabled) > > ev->op =3D RTE_EVENT_OP_FORWARD; > > @@ -895,6 +949,16 @@ eca_init_service(struct event_crypto_adapter > > *adapter, uint8_t id) > > } > > > > adapter->implicit_release_disabled =3D (uint8_t)impl_rel; > > + > > + /* Register for mbuf dyn field to store/restore ev::impl_opaque */ > > + eca_dynfield_offset =3D eca_dynfield_register(); > > + if (eca_dynfield_offset < 0) { > > + RTE_EDEV_LOG_ERR("Failed to register eca mbuf dyn field"); > > + eca_circular_buffer_free(&adapter->ebuf); > > + rte_free(adapter); > > + return -EINVAL; > > + } > > + > > adapter->service_inited =3D 1; > > > > return ret; > > -- > > 2.6.4