Re: [dpdk-dev] [PATCH] crypto/dpaa2_sec: reduce init log prints

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: dev [mailto:dev-boun...@dpdk.org] On Behalf Of Hemant Agrawal
> Sent: Monday, July 24, 2017 8:32 AM
> To: dev@dpdk.org
> Cc: Shreyansh Jain 
> Subject: [dpdk-dev] [PATCH] crypto/dpaa2_sec: reduce init log prints
> 
> From: Shreyansh Jain 
> 
> Signed-off-by: Shreyansh Jain 

Applied to dpdk-next-crypto.
Thanks,

Pablo


Re: [dpdk-dev] [PATCH] crypto/openssl: fix typo

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: De Lara Guarch, Pablo
> Sent: Tuesday, July 25, 2017 10:07 AM
> To: dev@dpdk.org
> Cc: De Lara Guarch, Pablo 
> Subject: [PATCH] crypto/openssl: fix typo
> 
> Fixes: b79e4c00af0e ("cryptodev: use AES-GCM/CCM as AEAD algorithms")
> 
> Signed-off-by: Pablo de Lara 

Applied to dpdk-next-crypto.

Pablo


Re: [dpdk-dev] [PATCH] doc: support new ZUC library version

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: De Lara Guarch, Pablo
> Sent: Tuesday, July 25, 2017 8:17 AM
> To: dev@dpdk.org
> Cc: De Lara Guarch, Pablo 
> Subject: [PATCH] doc: support new ZUC library version
> 
> A new version of the LibSSO ZUC library has been released.
> This version includes shared library support and bug fixes.
> 
> This commit extends the instructions to install and initialize the PMD with
> the new library, enabling also the PMD to be compiled as a shared library.
> 
> Signed-off-by: Pablo de Lara 

Applied to dpdk-next-crypto.

Pablo


[dpdk-dev] [PATCH] net/i40e: fix dereferencing null pointer

2017-07-27 Thread Kuba Kozak
Add check if o_vlan_mask and i_vlan_mask are
not a NULL pointer.

Coverity issue: 143448
Coverity issue: 143449
Fixes: d37705068ee8 ("net/i40e: parse QinQ pattern")
Cc: sta...@dpdk.org

Signed-off-by: Kuba Kozak 
---
 drivers/net/i40e/i40e_flow.c | 6 --
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/drivers/net/i40e/i40e_flow.c b/drivers/net/i40e/i40e_flow.c
index 95af701..b92719a 100644
--- a/drivers/net/i40e/i40e_flow.c
+++ b/drivers/net/i40e/i40e_flow.c
@@ -3719,8 +3719,10 @@ i40e_flow_parse_qinq_pattern(__rte_unused struct 
rte_eth_dev *dev,
}
 
/* Get filter specification */
-   if ((o_vlan_mask->tci == rte_cpu_to_be_16(I40E_TCI_MASK)) &&
-   (i_vlan_mask->tci == rte_cpu_to_be_16(I40E_TCI_MASK))) {
+   if ((o_vlan_mask != NULL) && (o_vlan_mask->tci ==
+   rte_cpu_to_be_16(I40E_TCI_MASK)) &&
+   (i_vlan_mask != NULL) &&
+   (i_vlan_mask->tci == rte_cpu_to_be_16(I40E_TCI_MASK))) {
filter->outer_vlan = rte_be_to_cpu_16(o_vlan_spec->tci)
& I40E_TCI_MASK;
filter->inner_vlan = rte_be_to_cpu_16(i_vlan_spec->tci)
-- 
2.7.4



Re: [dpdk-dev] [PATCH] crypto/dpaa2_sec: add check for gcc toolchain

2017-07-27 Thread De Lara Guarch, Pablo
HI Akhil,

> -Original Message-
> From: Akhil Goyal [mailto:akhil.go...@nxp.com]
> Sent: Wednesday, July 26, 2017 12:28 PM
> To: dev@dpdk.org
> Cc: De Lara Guarch, Pablo ;
> hemant.agra...@nxp.com; Akhil Goyal 
> Subject: [PATCH] crypto/dpaa2_sec: add check for gcc toolchain
> 
> Signed-off-by: Akhil Goyal 

I think you need to include a fixes line here, and CC stable, as this is a fix.

Thanks,
Pablo


Re: [dpdk-dev] [PATCH] cryptodev: fix crypto op bulk alloc Doxygen

2017-07-27 Thread Trahe, Fiona
Hi Pablo,

> -Original Message-
> From: dev [mailto:dev-boun...@dpdk.org] On Behalf Of Pablo de Lara
> Sent: Wednesday, July 26, 2017 5:27 AM
> To: Doherty, Declan 
> Cc: dev@dpdk.org; De Lara Guarch, Pablo ; 
> sta...@dpdk.org
> Subject: [dpdk-dev] [PATCH] cryptodev: fix crypto op bulk alloc Doxygen
> 
> When calling rte_crypto_op_bulk_alloc, the function may
> return either a 0, if not enough objects are available
> in the mempool or the number of operations requested,
> it there are enough available. However, the Doxygen comments
> were not matching these two cases.
> 
> Fixes: c0f87eb5252b ("cryptodev: change burst API to be crypto op oriented")
> Cc: sta...@dpdk.org
> 
> Signed-off-by: Pablo de Lara 
> ---
>  lib/librte_cryptodev/rte_crypto.h | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/lib/librte_cryptodev/rte_crypto.h 
> b/lib/librte_cryptodev/rte_crypto.h
> index 0908368..9f10818 100644
> --- a/lib/librte_cryptodev/rte_crypto.h
> +++ b/lib/librte_cryptodev/rte_crypto.h
> @@ -266,8 +266,8 @@ rte_crypto_op_alloc(struct rte_mempool *mempool, enum
> rte_crypto_op_type type)
>   * @paramnb_ops  Number of crypto operations to allocate
>   *
>   * @returns
> - * - On success returns a valid rte_crypto_op structure
> - * - On failure returns NULL
> + * - 0 if no operations could be allocated
> + * - nb_ops if the number of operations requested were allocated
>   */
> 
My first thought was what's returned if some ops could be allocated, but not 
the requested number?
Maybe instead:
- nb_ops if the number of operations requested were allocated.
- 0 if the requested number of ops are not available. None are allocated in 
this case.

>  static inline unsigned
> --
> 2.9.4



[dpdk-dev] [PATCH] doc: fix missing section underline

2017-07-27 Thread Pablo de Lara
Fixes: b59502a5e3d0 ("cryptodev: add AEAD parameters in crypto operation")

Signed-off-by: Pablo de Lara 
---
 doc/guides/prog_guide/cryptodev_lib.rst | 1 +
 1 file changed, 1 insertion(+)

diff --git a/doc/guides/prog_guide/cryptodev_lib.rst 
b/doc/guides/prog_guide/cryptodev_lib.rst
index 568b539..81a6b1f 100644
--- a/doc/guides/prog_guide/cryptodev_lib.rst
+++ b/doc/guides/prog_guide/cryptodev_lib.rst
@@ -424,6 +424,7 @@ operations, as well as also supporting AEAD operations.
 
 
 Session and Session Management
+~~
 
 Sessions are used in symmetric cryptographic processing to store the immutable
 data defined in a cryptographic transform which is used in the operation
-- 
2.9.4



Re: [dpdk-dev] [PATCH] crypto/qat: fix SHA384-HMAC block size

2017-07-27 Thread Trahe, Fiona


> -Original Message-
> From: De Lara Guarch, Pablo
> Sent: Tuesday, July 25, 2017 7:34 AM
> To: Trahe, Fiona ; Jain, Deepak K 
> ; Griffin, John
> 
> Cc: dev@dpdk.org; De Lara Guarch, Pablo ; 
> sta...@dpdk.org
> Subject: [PATCH] crypto/qat: fix SHA384-HMAC block size
> 
> Block size of SHA384-HMAC algorithm is 128 bytes,
> and not 64 bytes.
> 
> Fixes: d905ee32d0dc ("crypto/qat: add aes-sha384-hmac capability")
> Cc: sta...@dpdk.org
> 
> Signed-off-by: Pablo de Lara 
Acked-by: Fiona Trahe 



Re: [dpdk-dev] [PATCH 3/3] crypto/qat: fix HMAC supported key sizes

2017-07-27 Thread Trahe, Fiona

> -Original Message-
> From: De Lara Guarch, Pablo
> Sent: Tuesday, July 25, 2017 6:25 AM
> To: zbigniew.bo...@caviumnetworks.com; jerin.ja...@caviumnetworks.com; 
> akhil.go...@nxp.com;
> hemant.agra...@nxp.com; Trahe, Fiona ; Jain, Deepak K
> ; Griffin, John ; Doherty, 
> Declan
> 
> Cc: dev@dpdk.org; De Lara Guarch, Pablo ; 
> sta...@dpdk.org
> Subject: [PATCH 3/3] crypto/qat: fix HMAC supported key sizes
> 
> For HMAC algorithms (MD5-HMAC, SHAx-HMAC), the supported
> key sizes are not a fixed value, but a range between
> 1 and the block size.
> 
> Fixes: 26c2e4ad5ad4 ("cryptodev: add capabilities discovery")
> Cc: sta...@dpdk.org
> 
> Signed-off-by: Pablo de Lara 
Acked-by: Fiona Trahe 


Re: [dpdk-dev] [PATCH v2] cryptodev: fix session init return value

2017-07-27 Thread Trahe, Fiona


> -Original Message-
> From: De Lara Guarch, Pablo
> Sent: Tuesday, July 25, 2017 7:17 AM
> To: zbigniew.bo...@caviumnetworks.com; jerin.ja...@caviumnetworks.com; 
> akhil.go...@nxp.com;
> hemant.agra...@nxp.com; Trahe, Fiona ; Jain, Deepak K
> ; Griffin, John ; Doherty, 
> Declan
> 
> Cc: dev@dpdk.org; De Lara Guarch, Pablo 
> Subject: [PATCH v2] cryptodev: fix session init return value
> 
> When calling rte_cryptodev_sym_session_init(),
> if there was an error, it returned -1, instead
> of returning the specific error code, which can
> be valuable for the application for error handling.
> 
> Fixes: b3bbd9e5f265 ("cryptodev: support device independent sessions")
> 
> Signed-off-by: Pablo de Lara 
> Acked-by: Akhil Goyal 
Acked-by: Fiona Trahe 


Re: [dpdk-dev] [dpdk-users] SR-IOV problem with dpdk drivers

2017-07-27 Thread SAKTHIVEL ANAND S
+dev-dpdk can help here..

I have removed SR-IOV and made those interfaces as PIC-passthrough and that
is working without any issues.
So, Yes! this could be problem with virtual function driver(i40evf).

Thanks


On Thu, Jul 27, 2017 at 8:30 AM, Raju-dev grishma 
wrote:

> Linux driver works, DPDK older version works but not dpdk 17.05.
> Then it seems the dpdk driver of 17.05 has some issues to work with vmware
> hypervisors.
>
>
>
> On Wed, Jul 26, 2017 at 6:38 PM, SAKTHIVEL ANAND S 
> wrote:
>
>> Thanks Raju..
>>
>> These SR-IOV interfaces are reachable with linux drivers and also i have
>> verified with dpdk 2.2.0, which is running without any issues.
>> But when i bring in dpdk17.05, it failed to come up with above mentioned
>> error messages.
>>
>> please help me if, is it known issue with new SR-IOV drivers? or did i
>> miss something?
>>
>> -Sakthivel S
>>
>> On Wed, Jul 26, 2017 at 6:02 PM, Raju-dev grishma 
>> wrote:
>>
>>> hello Sakthivel,
>>> Can you try if on this VM, the kernel can see the interfaces and ping
>>> works with those interfaces?
>>> Secondly did you try with older version of DPDK ?
>>>
>>> Tx
>>>
>>>
>>> On Wed, Jul 26, 2017 at 5:05 PM, SAKTHIVEL ANAND S >> > wrote:
>>>
 i just upgraded the Intel NIC firmware and still there is no improvement
 for this.. It is falling under same issue. Following are NIC firmware
 details.

 ethtool -i vmnic4

 driver: i40e

 version: 1.3.45

 firmware-version: 5.60 0x80002dab 1.1618.0

 bus-info: :05:00.0

 Can someone pls help me to fix this. is this known issue, or did i
 missed
 something?

 Thanks in Advance

 Sakthivel S OM

 On Thu, Jul 20, 2017 at 7:06 PM, Kyle Larose 
 wrote:

 > I’m not an expert, but my guess is that your PF is running a very
 > different version of the i40e driver, and because of this the two
 cannot
 > communicate. I personally have never seen this before. Perhaps google
 has?
 >
 >
 >
 > *From:* SAKTHIVEL ANAND S [mailto:anand.s...@gmail.com]
 > *Sent:* Thursday, July 20, 2017 6:57 PM
 > *To:* Kyle Larose
 > *Cc:* us...@dpdk.org
 > *Subject:* Re: [dpdk-users] SR-IOV problem with dpdk drivers
 >
 >
 >
 > Thanks Kyle , yes i loaded the .ko files and i am able to bind to DPDK
 > driver now. But when i am running testpmd, it shows the below error
 message.
 >
 > root@ubuntu:~/dpdk-stable-17.05.1/bin# ./testpmd -c7 -n1 -- -i
 > --nb-cores=2 --nb-ports=2 --total-num-mbufs=1024
 > EAL: Detected 8 lcore(s)
 > EAL: No free hugepages reported in hugepages-1048576kB
 > EAL: Probing VFIO support...
 >
 >
 >
 > *EAL: PCI device :03:00.0 on NUMA socket -1 EAL:   probe driver:
 > 8086:154c net_i40e_vf i40evf_init_vf(): init_adminq failed
 > i40evf_dev_init(): Init vf failed*
 > EAL: Requested device :03:00.0 cannot be used
 > EAL: PCI device :04:00.0 on NUMA socket -1
 > EAL:   probe driver: 15ad:7b0 net_vmxnet3
 >
 >
 >
 >
 > *EAL: PCI device :0b:00.0 on NUMA socket -1 EAL:   probe driver:
 > 8086:154c net_i40e_vf i40evf_check_api_version(): PF/VF API version
 > mismatch:(0.0)-(1.1) i40evf_init_vf(): check_api version failed
 > i40evf_dev_init(): Init vf failed*

 > EAL: Requested device :0b:00.0 cannot be used
 > EAL: PCI device :13:00.0 on NUMA socket -1
 > EAL:   probe driver: 15ad:7b0 net_vmxnet3
 > EAL: PCI device :1b:00.0 on NUMA socket -1
 > EAL:   probe driver: 15ad:7b0 net_vmxnet3
 > EAL: No probed ethernet devices
 > Interactive-mode selected
 > EAL: Error - exiting with code: 1
 >   Cause: Invalid port 2
 >
 > pls help me ti resolve this.
 >
 > Thanks
 >
 > Sakthivel S OM
 >
 >
 >
 > On Thu, Jul 20, 2017 at 4:01 PM, Kyle Larose 
 wrote:
 >
 > Hi
 >
 > > -Original Message-
 > > From: users [mailto:users-boun...@dpdk.org] On Behalf Of SAKTHIVEL
 > > ANAND S
 > > Sent: Thursday, July 20, 2017 3:05 PM
 > > To: us...@dpdk.org
 > > Subject: [dpdk-users] SR-IOV problem with dpdk drivers
 > >
 > > Hi
 > >
 > > I am facing problem when i tried to bring up my SR-IOV interfaces
 in to
 > dpdk
 > > compatible driver..
 > > could someone pls help where i have missed?
 > >
 > > ERROR:
 > >
 > > root@ubuntu:~# ./dpdk-devbind.py -b igb_uio 0b:00.0
 > > Error: bind failed for :0b:00.0 - Cannot open
 > > /sys/bus/pci/drivers/igb_uio/bind
 > >
 >
 >
 > Is the igb_uio kernel module loaded? lsmod should say. If not, run
 > 'modprobe igb_uio', then try again.
 >
 >
 > > DPDK: 17.05.1
 > > ubuntu:16.04.2
 > > Nic: Intel XL710/X710
 > > --
 > > Thanks
 > > Sakthivel S OM
 >
 >
 >
 >
 > --
 

Re: [dpdk-dev] [PATCH 2/3] crypto/openssl: fix HMAC supported key sizes

2017-07-27 Thread Declan Doherty

On 25/07/2017 6:24 AM, Pablo de Lara wrote:

For HMAC algorithms (MD5-HMAC, SHAx-HMAC), the supported
key sizes are not a fixed value, but a range between
1 and the block size.

Fixes: d61f70b4c918 ("crypto/libcrypto: add driver for OpenSSL library")
Cc: sta...@dpdk.org

Signed-off-by: Pablo de Lara 
---

...




Acked-by: Declan Doherty 


Re: [dpdk-dev] [PATCH 1/3] crypto/aesni_mb: fix HMAC supported key sizes

2017-07-27 Thread Declan Doherty

On 25/07/2017 6:24 AM, Pablo de Lara wrote:

For HMAC algorithms (MD5-HMAC, SHAx-HMAC), the supported
key sizes are not a fixed value, but a range between
1 and the block size.

Fixes: 26c2e4ad5ad4 ("cryptodev: add capabilities discovery")
Cc: sta...@dpdk.org

Signed-off-by: Pablo de Lara 
---

...





Acked-by: Declan Doherty 


Re: [dpdk-dev] [PATCH] cryptodev: deprecate rte_cryptodev_create_vdev()

2017-07-27 Thread Declan Doherty

On 12/07/2017 9:15 PM, Jan Blunck wrote:

This function is an alias for rte_vdev_init() which is scheduled to move
out of the rte_eal library. Lets deprecate this function to be able to
remove it from the cryptodev library in 17.11.

Signed-off-by: Jan Blunck 
---

...




Acked-by: Declan Doherty 


[dpdk-dev] [PATCH v2] net/mlx4: fix flow creation before start

2017-07-27 Thread Matan Azrad
The corrupted code causes segmentation fault when user creates
flow with drop action before device starting.

For example, failsafe PMD recreates all the flows before calling
dev_start in plug-in sequence and mlx4 allocated its flow drop
queue in dev_start.
Hence, when failsafe created flow with drop action after plug-in
event, mlx4 tried to dereference flow drop queue which was uninitialized.

The fix added check to the drop qp accesibale and conditioned the
ibv_create_flow calling on device starting.

Fixes: 642fe56a1ba5 ("net/mlx4: use a single drop queue for all drop flows")
Fixes: 46d5736a7049 ("net/mlx4: support basic flow items and actions")
Cc: sta...@dpdk.org

Signed-off-by: Matan Azrad 
Acked-by: Adrien Mazarguil 
---
 drivers/net/mlx4/mlx4_flow.c | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

v2 to fix the qp accesible by other way and fix the ibv_create_flow calling
before dev_start.  

diff --git a/drivers/net/mlx4/mlx4_flow.c b/drivers/net/mlx4/mlx4_flow.c
index 8ade106..925c89c 100644
--- a/drivers/net/mlx4/mlx4_flow.c
+++ b/drivers/net/mlx4/mlx4_flow.c
@@ -977,7 +977,7 @@ struct rte_flow_drop {
return NULL;
}
if (action->drop) {
-   qp = priv->flow_drop_queue->qp;
+   qp = priv->flow_drop_queue ? priv->flow_drop_queue->qp : NULL;
} else {
int ret;
unsigned int i;
@@ -1015,6 +1015,8 @@ struct rte_flow_drop {
rte_flow->qp = qp;
}
rte_flow->ibv_attr = ibv_attr;
+   if (!priv->started)
+   return rte_flow;
rte_flow->ibv_flow = ibv_create_flow(qp, rte_flow->ibv_attr);
if (!rte_flow->ibv_flow) {
rte_flow_error_set(error, ENOMEM, RTE_FLOW_ERROR_TYPE_HANDLE,
-- 
1.8.3.1



Re: [dpdk-dev] Question on mlx5 PMD txq memory registration

2017-07-27 Thread Sagi Grimberg



Well, this is a fair argument, but without a *complete* solution for all
of dpdk peripherals, it has very little merit (if at all). A badly
written code can just as easily crash a server by passing a mbuf to
a crypto device or another network device that co-exists with mlx5.

So, while I understand the argument, I think its value is not worth the
hassle that mlx5_pmd needs to take to achieve it. Did this come from a
real requirement (from a real implementation)?


Would using VFIO (and the IOMMU) not allow us to provide an equivalent
level of security to what is provided by the current scheme?


mlx5 does not take over the device with vfio, it simply asks the
kernel to setup resources for it and sets a mac steering rule to
direct traffic to its own rings. Also, I'm not aware of any way to
enforce iommu is enabled.


From what I
see on-list there are a few folks already looking into that area, and
taking advantage of the IOMMU should improve security of all devices in
DPDK.


I agree that this can be improved in dpdk, I was simply arguing that
mlx5 guarantees alone are not very valuable, especially considering
the work-arounds taken in mlx5 to achieve it.

mlx5 can be converted to take over the device with vfio and simply not
deal with memory registration aspects, but that is really up to mlx5
maintainers.





Re: [dpdk-dev] [PATCH 1/2] eventdev: add event adapter for ethernet Rx queues

2017-07-27 Thread Rao, Nikhil


Hi Jerin and all,

There are a few inconsistencies/complexities that I ran into with the 
implementation of the SW Rx event adapter, I have first summarized this 
email thread bringing together details scattered across various 
exchanges then I want to check if there are changes possible that would 
simplify the implementation of the SW Rx event adapter.



The Rx event adapter needs to support the following scenarios:

1) Ethdev HW is not capable of injecting the packets and SW eventdev
driver(All existing ethdev PMD + drivers/event/sw PMD combination)
2) Ethdev HW is not capable of injecting the packets and not compatible
HW eventdev driver(All existing ethdev PMD + driver/event/octeontx PMD
combination)
3) Ethdev HW is capable of injecting the packet to compatible
HW eventdev driver.

cases 1) and 2) above are not different. In both cases we need a SW 
thread that will inject packets from the ethdev PMD to an event dev PMD.


The APIs proposed are:

int rte_event_eth_rx_adapter_create(uint8_t dev_id,
uint8_t eth_port_id, uint8_t id /* adapter ID */);

An adapter created above has an ops struct, where the ops
struct provides implementations for the functions below.
The ops struct chosen for the adapter depends on the eth_port_id> combination.


struct rte_event_eth_rx_adap_info {
uint32_t cap;

/* adapter has inbuilt port, no need to create producer port */
#define RTE_EVENT_ETHDEV_CAP_INBUILT_PORT  (1ULL << 0)
/* adapter does not need service function */
#define RTE_EVENT_ETHDEV_CAP_NO_SERVICE_FUNC (1ULL << 1)

}
int rte_event_eth_rx_adapter_get_info(uint8_t dev_id, uint8_t id,
struct rte_event_eth_rx_adap_info *info);

struct rte_event_eth_rx_adapter_conf {
/* Application specified service function name */
char service_name[];
uint8_t rx_event_port_id;
 /**< Event port identifier, the adapter enqueues mbuf
   * events to this
   * port, Ignored when RTE_EVENT_ETHDEV_CAP_INBUILT_PORT
   */
 }
int rte_event_eth_rx_adapter_configure(uint8_t dev_id, uint8_t id
struct rte_event_eth_rx_adapter_conf *cfg);

 struct rte_event_eth_rx_adapter_queue_conf {
... event info ...
 uint16_t servicing_weight;
/**< Relative polling frequency of ethernet receive queue, if this
 * is set to zero, the Rx queue is interrupt driven (unless rx queue
 * interrupts are not enabled for the ethernet device)
 */
...
 }
int rte_event_eth_rx_adapter_queue_add(uint8_t dev_id,
uint8_t id, int32_t rx_queue_id,
const struct rte_eth_rx_event_adapter_queue_conf *config);

int rte_event_eth_rx_adapter_queue_del(uint8_t dev_id,
uint8_t id, int32_t rx_queue_id)



In the case of a SW thread we would like to use the servicing weight 
specified in the queue to do WRR across , in keeping 
with the adaper per  model, one way to do this is to 
use the same cfg.service_name in the 
rte_event_eth_rx_adapter_configure() call.


However this creates a few difficulties/inconsistencies:

1)Service has the notion of a socket id. Multiple event dev IDs can be 
included in the same service, each event dev has a socket ID -> this 
seems to be an inconsistency that shouldn’t be allowed by design.


2)Say, the Rx event adapter doesn’t drop packets (could be 
configurable), i.e,  if events cannot be enqueued into the event device, 
these remain in a buffer, when the buffer fills up packets aren’t 
dequeued from the eth device.


In the simplest case the Rx event adapter service has a single device, event port> across multiple eth ports, it dequeues from the 
wrr[] and buffers events, bulk enqueues BATCH_SIZE events into the 
.


With adapters having different  code can be 
optimized so that adapters that have a common  
can be made to refer to a common enqueue buffer { event dev, event port, 
buffer } structure but this adds more book keeping in the code.


3)Every adapter can be configured with max_nb_rx ( a max nb of packets 
that it can process in any invocation) – but the max_nb_rx seems like a 
service level parameter instead of it being a summation across adapters.


1 & 3 could be solved by restricting the adapters to the same (as in the 
first rte_event_eth_rx_adapter_configure() call) socket ID, and perhaps 
using the max value of max_nb_rx or using the same value of max_nb_rx 
across adapters. #2 is doable but has a bit of code complexity to handle 
the generic case.


Before we go there, I wanted to check if there is an alternative 
possible that would remove the difficulties above. Essentially allow 
multiple ports within an adapter but avoid the problem of the 
inconsistent  combinations when using multiple ports 
with a single eventdev.


Instead of
==
rte_event_eth_rx_adapter_create()
rte_event_eth_rx_adapter_get_info();
rte_event_eth_rx_adapter_configure();
rte_event_eth_rx_adapter_queue_add();
==

How about ?
==

rte_event_eth_rx_adapter_get_info(uint8_t dev_id, uint8_t eth_port_id,
s

Re: [dpdk-dev] [PATCH] net/mlx5: poll completion queue once per a call

2017-07-27 Thread Sagi Grimberg



Yes I realize that, but can't the device still complete in a burst (of
unsuppressed completions)? I mean its not guaranteed that for every
txq_complete a signaled completion is pending right? What happens if
the device has inconsistent completion pacing? Can't the sw grow a
batch of completions if txq_complete will process a single completion
unconditionally?

Speculation. First of all, device doesn't delay completion notifications for no
reason. ASIC is not a SW running on top of a OS.


I'm sorry but this statement is not correct. It might be correct in a
lab environment, but in practice, there are lots of things that can
affect the device timing.


If a completion comes up late,
this means device really can't keep up the rate of posting descriptors. If so,
tx_burst() should generate back-pressure by returning partial Tx, then app can
make a decision between drop or retry. Retry on Tx means back-pressuring Rx side
if app is forwarding packets.


Not arguing on that, I was simply suggesting that better heuristics
could be applied than "process one completion unconditionally".


More serious problem I expected was a case that the THRESH is smaller than
burst size. In that case, txq->elts[] will be short of slots all the time. But
fortunately, in MLX PMD, we request one completion per a burst at most, not
every THRESH of packets.

If there's some SW jitter on Tx processiong, the Tx CQ can grow for sure.
Question to myself was "when does it shrink?". It shrinks when Tx burst is light
(burst size is smaller than THRESH) because mlx5_tx_complete() is always called
every time tx_burst() is called. What if it keeps growing? Then, drop is
necessary and natural like I mentioned above.

It doesn't make sense for SW to absorb any possible SW jitters. Cost is high.
It is usually done by increasing queue depth. Keeping steady state is more
important.


Again, I agree jitters are bad, but with proper heuristics in place mlx5
can still keep a low jitter _and_ consume completions faster than
consecutive tx_burst invocations.


Rather, this patch is helpful for reducing jitters. When I run a profiler, the
most cycle-consuming part on Tx is still freeing buffers. If we allow loops on
checking valid CQE, many buffers could be freed in a single call of
mlx5_tx_complete() at some moment, then it would cause a long delay. This would
aggravate jitter.


I didn't argue the fact that this patch addresses an issue, but mlx5 is
a driver that is designed to run applications that can act differently
than your test case.


Of course. I appreciate your time for the review. And keep in mind that nothing
is impossible in an open source community. I always like to discuss about ideas
with anyone. But I was just asking to hear more details about your suggestion if
you wanted me to implement it, rather than giving me one-sentence question :-)


Good to know.


Does "budget" mean the
threshold? If so, calculation of stats for adaptive threshold can impact single
core performance. With multiple cores, adjusting threshold doesn't affect much.


If you look at mlx5e driver in the kernel, it maintains online stats on
its RX and TX queues. It maintain these stats mostly for adaptive
interrupt moderation control (but not only).

I was suggesting maintaining per TX queue stats on average completions
consumed for each TX burst call, and adjust the stopping condition
according to a calculated stat.

In case of interrupt mitigation, it could be beneficial because interrupt
handling cost is too costly. But, the beauty of DPDK is polling, isn't it?


If you read again my comment, I didn't suggest to apply stats for
interrupt moderation, I just gave an example of a use-case. I was
suggesting to maintain the online stats for adjusting a threshold of
how much completions to process in a tx burst call (instead of
processing one unconditionally).


And please remember to ack at the end of this discussion if you are okay so that
this patch can gets merged. One data point is, single core performance (fwd) of
vectorized PMD gets improved by more than 6% with this patch. 6% is never small.


Yea, I don't mind merging it in given that I don't have time to come
up with anything better (or worse :))

Reviewed-by: Sagi Grimberg 


Re: [dpdk-dev] [PATCH] crypto/dpaa2_sec: add check for gcc toolchain

2017-07-27 Thread Akhil Goyal

On 7/27/2017 2:22 PM, De Lara Guarch, Pablo wrote:

HI Akhil,


-Original Message-
From: Akhil Goyal [mailto:akhil.go...@nxp.com]
Sent: Wednesday, July 26, 2017 12:28 PM
To: dev@dpdk.org
Cc: De Lara Guarch, Pablo ;
hemant.agra...@nxp.com; Akhil Goyal 
Subject: [PATCH] crypto/dpaa2_sec: add check for gcc toolchain

Signed-off-by: Akhil Goyal 


I think you need to include a fixes line here, and CC stable, as this is a fix.



This is not valid for 17.05 stable release. This is recently added in 
below commit. Should I resend this patch with commit message updated?


 ed5ed6b344f2 ("crypto/dpaa2_sec: remove GCC 7.1 compilation error")

Thanks,
Akhil



[dpdk-dev] [PATCH] crypto/dpaa2_sec: fix HMAC supported key sizes

2017-07-27 Thread Akhil Goyal
For HMAC algorithms (MD5-HMAC, SHAx-HMAC), the supported
key sizes are not a fixed value, but a range between
1 and the block size.

Fixes: 623326dded3a ("crypto/dpaa2_sec: introduce poll mode driver")
Cc: sta...@dpdk.org

Signed-off-by: Akhil Goyal 
---
 drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h | 24 
 1 file changed, 12 insertions(+), 12 deletions(-)

diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h 
b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h
index e104f71..3849a05 100644
--- a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h
+++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h
@@ -200,9 +200,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_MD5_HMAC,
.block_size = 64,
.key_size = {
-   .min = 64,
+   .min = 1,
.max = 64,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 16,
@@ -221,9 +221,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_SHA1_HMAC,
.block_size = 64,
.key_size = {
-   .min = 64,
+   .min = 1,
.max = 64,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 20,
@@ -242,9 +242,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_SHA224_HMAC,
.block_size = 64,
.key_size = {
-   .min = 64,
+   .min = 1,
.max = 64,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 28,
@@ -263,9 +263,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_SHA256_HMAC,
.block_size = 64,
.key_size = {
-   .min = 64,
+   .min = 1,
.max = 64,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 32,
@@ -284,9 +284,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_SHA384_HMAC,
.block_size = 128,
.key_size = {
-   .min = 128,
+   .min = 1,
.max = 128,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 48,
@@ -305,9 +305,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_SHA512_HMAC,
.block_size = 128,
.key_size = {
-   .min = 128,
+   .min = 1,
.max = 128,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 64,
-- 
2.9.3



[dpdk-dev] [PATCH] bonding: fix wrong slaves capacity check

2017-07-27 Thread Tomasz Kulasek
For fortville NIC bond_ethdev_8023ad_flow_verify fails when action queue
index indicates unavailable queue before slaves configuration.

This fix verifies flow settings for queue 0, which is always available,
and checks if slaves max queue number capacity meets requirements.

Fixes: 112891cd27e5 ("net/bonding: add dedicated HW queues for LACP control")

Signed-off-by: Tomasz Kulasek 
---
 drivers/net/bonding/rte_eth_bond_pmd.c | 26 +++---
 1 file changed, 19 insertions(+), 7 deletions(-)

diff --git a/drivers/net/bonding/rte_eth_bond_pmd.c 
b/drivers/net/bonding/rte_eth_bond_pmd.c
index 8f9a860..ab5ebe0 100644
--- a/drivers/net/bonding/rte_eth_bond_pmd.c
+++ b/drivers/net/bonding/rte_eth_bond_pmd.c
@@ -175,12 +175,13 @@ const struct rte_flow_attr flow_attr_8023ad = {
 int
 bond_ethdev_8023ad_flow_verify(struct rte_eth_dev *bond_dev,
uint8_t slave_port) {
+   struct rte_eth_dev_info slave_info;
struct rte_flow_error error;
struct bond_dev_private *internals = (struct bond_dev_private *)
(bond_dev->data->dev_private);
 
-   struct rte_flow_action_queue lacp_queue_conf = {
-   .index = internals->mode4.dedicated_queues.rx_qid,
+   const struct rte_flow_action_queue lacp_queue_conf = {
+   .index = 0,
};
 
const struct rte_flow_action actions[] = {
@@ -195,8 +196,22 @@ bond_ethdev_8023ad_flow_verify(struct rte_eth_dev 
*bond_dev,
 
int ret = rte_flow_validate(slave_port, &flow_attr_8023ad,
flow_item_8023ad, actions, &error);
-   if (ret < 0)
+   if (ret < 0) {
+   RTE_BOND_LOG(ERR, "bond_ethdev_8023ad_flow_verify: %s "
+   "(slave_port=%d queue_id=%d)",
+   error.message, slave_port,
+   internals->mode4.dedicated_queues.rx_qid);
+   return -1;
+   }
+
+   rte_eth_dev_info_get(slave_port, &slave_info);
+   if ((slave_info.max_rx_queues < bond_dev->data->nb_rx_queues) ||
+   (slave_info.max_tx_queues < 
bond_dev->data->nb_tx_queues)) {
+   RTE_BOND_LOG(ERR, "bond_ethdev_8023ad_flow_verify: Slave %d"
+   " capabilities doesn't allow to allocate "
+   "additional queues", slave_port);
return -1;
+   }
 
return 0;
 }
@@ -206,7 +221,7 @@ bond_8023ad_slow_pkt_hw_filter_supported(uint8_t port_id) {
struct rte_eth_dev *bond_dev = &rte_eth_devices[port_id];
struct bond_dev_private *internals = (struct bond_dev_private *)
(bond_dev->data->dev_private);
-   struct rte_eth_dev_info bond_info, slave_info;
+   struct rte_eth_dev_info bond_info;
uint8_t idx;
 
/* Verify if all slaves in bonding supports flow director and */
@@ -217,9 +232,6 @@ bond_8023ad_slow_pkt_hw_filter_supported(uint8_t port_id) {
internals->mode4.dedicated_queues.tx_qid = 
bond_info.nb_tx_queues;
 
for (idx = 0; idx < internals->slave_count; idx++) {
-   rte_eth_dev_info_get(internals->slaves[idx].port_id,
-   &slave_info);
-
if (bond_ethdev_8023ad_flow_verify(bond_dev,
internals->slaves[idx].port_id) != 0)
return -1;
-- 
2.7.4



Re: [dpdk-dev] [PATCH] crypto/dpaa2_sec: add check for gcc toolchain

2017-07-27 Thread De Lara Guarch, Pablo
Hi,

> -Original Message-
> From: Akhil Goyal [mailto:akhil.go...@nxp.com]
> Sent: Thursday, July 27, 2017 12:43 PM
> To: De Lara Guarch, Pablo ;
> dev@dpdk.org
> Cc: hemant.agra...@nxp.com
> Subject: Re: [PATCH] crypto/dpaa2_sec: add check for gcc toolchain
> 
> On 7/27/2017 2:22 PM, De Lara Guarch, Pablo wrote:
> > HI Akhil,
> >
> >> -Original Message-
> >> From: Akhil Goyal [mailto:akhil.go...@nxp.com]
> >> Sent: Wednesday, July 26, 2017 12:28 PM
> >> To: dev@dpdk.org
> >> Cc: De Lara Guarch, Pablo ;
> >> hemant.agra...@nxp.com; Akhil Goyal 
> >> Subject: [PATCH] crypto/dpaa2_sec: add check for gcc toolchain
> >>
> >> Signed-off-by: Akhil Goyal 
> >
> > I think you need to include a fixes line here, and CC stable, as this is a 
> > fix.
> >
> 
> This is not valid for 17.05 stable release. This is recently added in below
> commit. Should I resend this patch with commit message updated?
> 
>   ed5ed6b344f2 ("crypto/dpaa2_sec: remove GCC 7.1 compilation error")

Oh, you are right. Well, I can add the line for you.

Thanks,
Pablo

> 
> Thanks,
> Akhil



Re: [dpdk-dev] [PATCH] crypto/dpaa2_sec: fix HMAC supported key sizes

2017-07-27 Thread Hemant Agrawal

On 7/27/2017 5:24 PM, Akhil Goyal wrote:

For HMAC algorithms (MD5-HMAC, SHAx-HMAC), the supported
key sizes are not a fixed value, but a range between
1 and the block size.

Fixes: 623326dded3a ("crypto/dpaa2_sec: introduce poll mode driver")
Cc: sta...@dpdk.org

Signed-off-by: Akhil Goyal 
---
 drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h | 24 
 1 file changed, 12 insertions(+), 12 deletions(-)

diff --git a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h 
b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h
index e104f71..3849a05 100644
--- a/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h
+++ b/drivers/crypto/dpaa2_sec/dpaa2_sec_priv.h
@@ -200,9 +200,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_MD5_HMAC,
.block_size = 64,
.key_size = {
-   .min = 64,
+   .min = 1,
.max = 64,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 16,
@@ -221,9 +221,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_SHA1_HMAC,
.block_size = 64,
.key_size = {
-   .min = 64,
+   .min = 1,
.max = 64,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 20,
@@ -242,9 +242,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_SHA224_HMAC,
.block_size = 64,
.key_size = {
-   .min = 64,
+   .min = 1,
.max = 64,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 28,
@@ -263,9 +263,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_SHA256_HMAC,
.block_size = 64,
.key_size = {
-   .min = 64,
+   .min = 1,
.max = 64,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 32,
@@ -284,9 +284,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_SHA384_HMAC,
.block_size = 128,
.key_size = {
-   .min = 128,
+   .min = 1,
.max = 128,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 48,
@@ -305,9 +305,9 @@ static const struct rte_cryptodev_capabilities 
dpaa2_sec_capabilities[] = {
.algo = RTE_CRYPTO_AUTH_SHA512_HMAC,
.block_size = 128,
.key_size = {
-   .min = 128,
+   .min = 1,
.max = 128,
-   .increment = 0
+   .increment = 1
},
.digest_size = {
.min = 64,


Acked-by: Hemant Agrawal 



Re: [dpdk-dev] [PATCH] crypto/dpaa2_sec: fix HMAC supported key sizes

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: Hemant Agrawal [mailto:hemant.agra...@nxp.com]
> Sent: Thursday, July 27, 2017 2:58 PM
> To: Akhil Goyal ; dev@dpdk.org
> Cc: De Lara Guarch, Pablo ;
> sta...@dpdk.org
> Subject: Re: [PATCH] crypto/dpaa2_sec: fix HMAC supported key sizes
> 
> On 7/27/2017 5:24 PM, Akhil Goyal wrote:
> > For HMAC algorithms (MD5-HMAC, SHAx-HMAC), the supported key sizes
> are
> > not a fixed value, but a range between
> > 1 and the block size.
> >
> > Fixes: 623326dded3a ("crypto/dpaa2_sec: introduce poll mode driver")
> > Cc: sta...@dpdk.org
> >
> > Signed-off-by: Akhil Goyal 
...
> >
> Acked-by: Hemant Agrawal 

Applied to dpdk-next-crypto.
Thanks,

Pablo



Re: [dpdk-dev] [PATCH] crypto/dpaa2_sec: add check for gcc toolchain

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: Akhil Goyal [mailto:akhil.go...@nxp.com]
> Sent: Thursday, July 27, 2017 12:43 PM
> To: De Lara Guarch, Pablo ;
> dev@dpdk.org
> Cc: hemant.agra...@nxp.com
> Subject: Re: [PATCH] crypto/dpaa2_sec: add check for gcc toolchain
> 
> On 7/27/2017 2:22 PM, De Lara Guarch, Pablo wrote:
> > HI Akhil,
> >
> >> -Original Message-
> >> From: Akhil Goyal [mailto:akhil.go...@nxp.com]
> >> Sent: Wednesday, July 26, 2017 12:28 PM
> >> To: dev@dpdk.org
> >> Cc: De Lara Guarch, Pablo ;
> >> hemant.agra...@nxp.com; Akhil Goyal 
> >> Subject: [PATCH] crypto/dpaa2_sec: add check for gcc toolchain
> >>
> >> Signed-off-by: Akhil Goyal 
> >
> > I think you need to include a fixes line here, and CC stable, as this is a 
> > fix.
> >
> 
> This is not valid for 17.05 stable release. This is recently added in below
> commit. Should I resend this patch with commit message updated?
> 
>   ed5ed6b344f2 ("crypto/dpaa2_sec: remove GCC 7.1 compilation error")
> 
> Thanks,
> Akhil

Added fixes line [Fixes: 6a95466d78de ("crypto/dpaa2_sec: fix build with gcc 
7.1")].
Remember to use the commit ID of the patch that was actually merged.

Applied to dpdk-next-crypto.
Thanks,

Pablo



Re: [dpdk-dev] [PATCH 0/3] HMAC supported key size fixes

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: De Lara Guarch, Pablo
> Sent: Tuesday, July 25, 2017 6:25 AM
> To: zbigniew.bo...@caviumnetworks.com;
> jerin.ja...@caviumnetworks.com; akhil.go...@nxp.com;
> hemant.agra...@nxp.com; Trahe, Fiona ; Jain,
> Deepak K ; Griffin, John
> ; Doherty, Declan 
> Cc: dev@dpdk.org; De Lara Guarch, Pablo
> 
> Subject: [PATCH 0/3] HMAC supported key size fixes
> 
> For HMAC algorithms (SHAx/MD5), the capabilities were not correct, as
> they were just a fixed value (block size).
> Instead, the authentication key size for these algorithms can go between 1
> and the block size.
> 
> Note that these patches are fixing AESNI-MB, OpenSSL and QAT PMDs, but
> DPAA2 and ARMv8 crypto PMDs might need these fixes too.
> 
> Pablo de Lara (3):
>   crypto/aesni_mb: fix HMAC supported key sizes
>   crypto/openssl: fix HMAC supported key sizes
>   crypto/qat: fix HMAC supported key sizes
> 
>  drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c | 24 --
> --
>  drivers/crypto/openssl/rte_openssl_pmd_ops.c   | 24 ---
> -
>  drivers/crypto/qat/qat_crypto_capabilities.h   | 24 ---
> -
>  3 files changed, 36 insertions(+), 36 deletions(-)
> 
> --
> 2.9.4

Applied to dpdk-next-crypto.

Pablo



Re: [dpdk-dev] [PATCH] crypto/qat: fix SHA384-HMAC block size

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: Trahe, Fiona
> Sent: Thursday, July 27, 2017 10:42 AM
> To: De Lara Guarch, Pablo ; Jain, Deepak K
> ; Griffin, John 
> Cc: dev@dpdk.org; sta...@dpdk.org
> Subject: RE: [PATCH] crypto/qat: fix SHA384-HMAC block size
> 
> 
> 
> > -Original Message-
> > From: De Lara Guarch, Pablo
> > Sent: Tuesday, July 25, 2017 7:34 AM
> > To: Trahe, Fiona ; Jain, Deepak K
> > ; Griffin, John 
> > Cc: dev@dpdk.org; De Lara Guarch, Pablo
> > ; sta...@dpdk.org
> > Subject: [PATCH] crypto/qat: fix SHA384-HMAC block size
> >
> > Block size of SHA384-HMAC algorithm is 128 bytes, and not 64 bytes.
> >
> > Fixes: d905ee32d0dc ("crypto/qat: add aes-sha384-hmac capability")
> > Cc: sta...@dpdk.org
> >
> > Signed-off-by: Pablo de Lara 
> Acked-by: Fiona Trahe 

Applied to dpdk-next-crypto.

Pablo


Re: [dpdk-dev] [PATCH v2] cryptodev: fix session init return value

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: Trahe, Fiona
> Sent: Thursday, July 27, 2017 11:12 AM
> To: De Lara Guarch, Pablo ;
> zbigniew.bo...@caviumnetworks.com; jerin.ja...@caviumnetworks.com;
> akhil.go...@nxp.com; hemant.agra...@nxp.com; Jain, Deepak K
> ; Griffin, John ; Doherty,
> Declan 
> Cc: dev@dpdk.org
> Subject: RE: [PATCH v2] cryptodev: fix session init return value
> 
> 
> 
> > -Original Message-
> > From: De Lara Guarch, Pablo
> > Sent: Tuesday, July 25, 2017 7:17 AM
> > To: zbigniew.bo...@caviumnetworks.com;
> jerin.ja...@caviumnetworks.com;
> > akhil.go...@nxp.com; hemant.agra...@nxp.com; Trahe, Fiona
> > ; Jain, Deepak K ;
> > Griffin, John ; Doherty, Declan
> > 
> > Cc: dev@dpdk.org; De Lara Guarch, Pablo
> > 
> > Subject: [PATCH v2] cryptodev: fix session init return value
> >
> > When calling rte_cryptodev_sym_session_init(), if there was an error,
> > it returned -1, instead of returning the specific error code, which
> > can be valuable for the application for error handling.
> >
> > Fixes: b3bbd9e5f265 ("cryptodev: support device independent sessions")
> >
> > Signed-off-by: Pablo de Lara 
> > Acked-by: Akhil Goyal 
> Acked-by: Fiona Trahe 

Applied to dpdk-next-crypto.

Pablo


Re: [dpdk-dev] [PATCH] doc: fix missing section underline

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: De Lara Guarch, Pablo
> Sent: Thursday, July 27, 2017 2:25 AM
> To: Mcnamara, John 
> Cc: dev@dpdk.org; De Lara Guarch, Pablo
> 
> Subject: [PATCH] doc: fix missing section underline
> 
> Fixes: b59502a5e3d0 ("cryptodev: add AEAD parameters in crypto
> operation")
> 
> Signed-off-by: Pablo de Lara 

Applied to dpdk-next-crypto.

Pablo


Re: [dpdk-dev] [PATCH] doc: fix l2fwd-crypto sample code

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: De Lara Guarch, Pablo
> Sent: Wednesday, July 26, 2017 12:33 AM
> To: Mcnamara, John ; Doherty, Declan
> 
> Cc: dev@dpdk.org; De Lara Guarch, Pablo
> 
> Subject: [PATCH] doc: fix l2fwd-crypto sample code
> 
> L2fwd-crypto app was modified with various changes in its code. The
> application user guide contains some code snippets that needed to be
> updated.
> 
> Fixes: 2661f4fbe93d ("examples/l2fwd-crypto: add AEAD parameters")
> 
> Signed-off-by: Pablo de Lara 

Applied to dpdk-next-crypto.

Pablo


Re: [dpdk-dev] [PATCH] cryptodev: fix crypto op bulk alloc Doxygen

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: Trahe, Fiona
> Sent: Thursday, July 27, 2017 10:03 AM
> To: De Lara Guarch, Pablo ; Doherty,
> Declan 
> Cc: dev@dpdk.org; De Lara Guarch, Pablo
> ; sta...@dpdk.org; Trahe, Fiona
> 
> Subject: RE: [dpdk-dev] [PATCH] cryptodev: fix crypto op bulk alloc Doxygen
> 
> Hi Pablo,
> 
> > -Original Message-
> > From: dev [mailto:dev-boun...@dpdk.org] On Behalf Of Pablo de Lara
> > Sent: Wednesday, July 26, 2017 5:27 AM
> > To: Doherty, Declan 
> > Cc: dev@dpdk.org; De Lara Guarch, Pablo
> > ; sta...@dpdk.org
> > Subject: [dpdk-dev] [PATCH] cryptodev: fix crypto op bulk alloc
> > Doxygen
> >
> > When calling rte_crypto_op_bulk_alloc, the function may return either
> > a 0, if not enough objects are available in the mempool or the number
> > of operations requested, it there are enough available. However, the
> > Doxygen comments were not matching these two cases.
> >
> > Fixes: c0f87eb5252b ("cryptodev: change burst API to be crypto op
> > oriented")
> > Cc: sta...@dpdk.org
> >
> > Signed-off-by: Pablo de Lara 
> > ---
> >  lib/librte_cryptodev/rte_crypto.h | 4 ++--
> >  1 file changed, 2 insertions(+), 2 deletions(-)
> >
> > diff --git a/lib/librte_cryptodev/rte_crypto.h
> > b/lib/librte_cryptodev/rte_crypto.h
> > index 0908368..9f10818 100644
> > --- a/lib/librte_cryptodev/rte_crypto.h
> > +++ b/lib/librte_cryptodev/rte_crypto.h
> > @@ -266,8 +266,8 @@ rte_crypto_op_alloc(struct rte_mempool
> *mempool,
> > enum rte_crypto_op_type type)
> >   * @param  nb_ops  Number of crypto operations to allocate
> >   *
> >   * @returns
> > - * - On success returns a valid rte_crypto_op structure
> > - * - On failure returns NULL
> > + * - 0 if no operations could be allocated
> > + * - nb_ops if the number of operations requested were allocated
> >   */
> >
> My first thought was what's returned if some ops could be allocated, but
> not the requested number?
> Maybe instead:
> - nb_ops if the number of operations requested were allocated.
> - 0 if the requested number of ops are not available. None are allocated in
> this case.

Good clarification. Will send a v2 shortly.

Thanks,
Pablo

> 
> >  static inline unsigned
> > --
> > 2.9.4



[dpdk-dev] [PATCH v2] cryptodev: fix crypto op bulk alloc Doxygen

2017-07-27 Thread Pablo de Lara
When calling rte_crypto_op_bulk_alloc, the function may
return either a 0, if not enough objects are available
in the mempool or the number of operations requested,
it there are enough available. However, the Doxygen comments
were not matching these two cases.

Fixes: c0f87eb5252b ("cryptodev: change burst API to be crypto op oriented")
Cc: sta...@dpdk.org

Signed-off-by: Pablo de Lara 
---

Changes in v2:

- Reworded Doxygen comment for more clarification.

 lib/librte_cryptodev/rte_crypto.h | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/lib/librte_cryptodev/rte_crypto.h 
b/lib/librte_cryptodev/rte_crypto.h
index 0908368..10fe080 100644
--- a/lib/librte_cryptodev/rte_crypto.h
+++ b/lib/librte_cryptodev/rte_crypto.h
@@ -266,8 +266,9 @@ rte_crypto_op_alloc(struct rte_mempool *mempool, enum 
rte_crypto_op_type type)
  * @param  nb_ops  Number of crypto operations to allocate
  *
  * @returns
- * - On success returns a valid rte_crypto_op structure
- * - On failure returns NULL
+ * - nb_ops if the number of operations requested were allocated.
+ * - 0 if the requested number of ops are not available.
+ *   None are allocated in this case.
  */
 
 static inline unsigned
-- 
2.9.4



Re: [dpdk-dev] [PATCH v2] cryptodev: fix crypto op bulk alloc Doxygen

2017-07-27 Thread Trahe, Fiona


> -Original Message-
> From: De Lara Guarch, Pablo
> Sent: Thursday, July 27, 2017 5:06 PM
> To: Trahe, Fiona ; Doherty, Declan 
> 
> Cc: dev@dpdk.org; De Lara Guarch, Pablo ; 
> sta...@dpdk.org
> Subject: [PATCH v2] cryptodev: fix crypto op bulk alloc Doxygen
> 
> When calling rte_crypto_op_bulk_alloc, the function may
> return either a 0, if not enough objects are available
> in the mempool or the number of operations requested,
> it there are enough available. However, the Doxygen comments
> were not matching these two cases.
> 
> Fixes: c0f87eb5252b ("cryptodev: change burst API to be crypto op oriented")
> Cc: sta...@dpdk.org
> 
> Signed-off-by: Pablo de Lara 
Acked-by: Fiona Trahe 


Re: [dpdk-dev] [PATCH v2] cryptodev: fix crypto op bulk alloc Doxygen

2017-07-27 Thread De Lara Guarch, Pablo


> -Original Message-
> From: Trahe, Fiona
> Sent: Thursday, July 27, 2017 5:17 PM
> To: De Lara Guarch, Pablo ; Doherty,
> Declan 
> Cc: dev@dpdk.org; sta...@dpdk.org
> Subject: RE: [PATCH v2] cryptodev: fix crypto op bulk alloc Doxygen
> 
> 
> 
> > -Original Message-
> > From: De Lara Guarch, Pablo
> > Sent: Thursday, July 27, 2017 5:06 PM
> > To: Trahe, Fiona ; Doherty, Declan
> > 
> > Cc: dev@dpdk.org; De Lara Guarch, Pablo
> > ; sta...@dpdk.org
> > Subject: [PATCH v2] cryptodev: fix crypto op bulk alloc Doxygen
> >
> > When calling rte_crypto_op_bulk_alloc, the function may return either
> > a 0, if not enough objects are available in the mempool or the number
> > of operations requested, it there are enough available. However, the
> > Doxygen comments were not matching these two cases.
> >
> > Fixes: c0f87eb5252b ("cryptodev: change burst API to be crypto op
> > oriented")
> > Cc: sta...@dpdk.org
> >
> > Signed-off-by: Pablo de Lara 
> Acked-by: Fiona Trahe 

Applied to dpdk-next-crypto.

Pablo



Re: [dpdk-dev] [PATCH v2 0/4] cryptodev vdev changes for -rc2

2017-07-27 Thread Jan Blunck
On Wed, Jul 19, 2017 at 9:31 AM, De Lara Guarch, Pablo
 wrote:
>
>
>
> > -Original Message-
> > From: Jan Blunck [mailto:jblu...@gmail.com] On Behalf Of Jan Blunck
> > Sent: Wednesday, July 12, 2017 8:59 PM
> > To: dev@dpdk.org
> > Cc: Doherty, Declan ; De Lara Guarch, Pablo
> > 
> > Subject: [PATCH v2 0/4] cryptodev vdev changes for -rc2
> >
> > This series is a preparation to move the vdev bus out of librte_eal. For 
> > that
> > the newly added cryptodev vdev functions need to change signature to not
> > require the rte_vdev.h header.
> >
> > Changes since v1:
> > - move params parsing into new header
> > - make rte_cryptodev_vdev_pmd_init() static inline
> >
> > Jan Blunck (4):
> >   cryptodev: remove obsolete include
> >   cryptodev: move initialization
> >   cryptodev: rework PMD init to not require rte_vdev.h
> >   cryptodev: move parameter parsing to its own header
> >
> >  lib/librte_cryptodev/Makefile|  1 +
> >  lib/librte_cryptodev/rte_cryptodev.c |  3 +
> >  lib/librte_cryptodev/rte_cryptodev.h |  1 -
> >  lib/librte_cryptodev/rte_cryptodev_pmd.c | 37 +-
> >  lib/librte_cryptodev/rte_cryptodev_vdev.h| 71 ---
> >  lib/librte_cryptodev/rte_cryptodev_vdev_params.h | 89
> > 
> >  lib/librte_cryptodev/rte_cryptodev_version.map   |  1 -
> >  7 files changed, 122 insertions(+), 81 deletions(-)  create mode 100644
> > lib/librte_cryptodev/rte_cryptodev_vdev_params.h
> >
> > --
> > 2.13.2
>
> Hi Jan,
>
> Since there are some issues in this patchset and knowing that these changes 
> are required
> for work to be done in 17.11 (vdev moving out of EAL), let's postpone this 
> for the next release,
> as also there is no API breakage in this (correct me if I am wrong).

Unexporting a function does require a soname change. So this is affecting ABI.


[dpdk-dev] [PATCH] Fix bash path in shebangs

2017-07-27 Thread asomers
From: Alan Somers 

"/bin/bash" is a Linuxism.  "/usr/bin/env bash" is portable.

Signed-off-by Alan Somers 
---
 examples/performance-thread/l3fwd-thread/test.sh | 2 +-
 usertools/dpdk-setup.sh  | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/examples/performance-thread/l3fwd-thread/test.sh 
b/examples/performance-thread/l3fwd-thread/test.sh
index b7718b622..eb1fe2dc2 100755
--- a/examples/performance-thread/l3fwd-thread/test.sh
+++ b/examples/performance-thread/l3fwd-thread/test.sh
@@ -1,4 +1,4 @@
-#!/bin/bash
+#!/usr/bin/env bash
 
 case "$1" in
 
diff --git a/usertools/dpdk-setup.sh b/usertools/dpdk-setup.sh
index c4fec5a63..ebf36f830 100755
--- a/usertools/dpdk-setup.sh
+++ b/usertools/dpdk-setup.sh
@@ -1,4 +1,4 @@
-#! /bin/bash
+#! /usr/bin/env bash
 
 #   BSD LICENSE
 #
-- 
2.13.3



[dpdk-dev] [PATCH] Fix bash path in shebangs

2017-07-27 Thread asomers
From: Alan Somers 

"/bin/bash" is a Linuxism.  "/usr/bin/env bash" is portable.

Signed-off-by: Alan Somers 
---
 examples/performance-thread/l3fwd-thread/test.sh | 2 +-
 usertools/dpdk-setup.sh  | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/examples/performance-thread/l3fwd-thread/test.sh 
b/examples/performance-thread/l3fwd-thread/test.sh
index b7718b622..eb1fe2dc2 100755
--- a/examples/performance-thread/l3fwd-thread/test.sh
+++ b/examples/performance-thread/l3fwd-thread/test.sh
@@ -1,4 +1,4 @@
-#!/bin/bash
+#!/usr/bin/env bash
 
 case "$1" in
 
diff --git a/usertools/dpdk-setup.sh b/usertools/dpdk-setup.sh
index c4fec5a63..ebf36f830 100755
--- a/usertools/dpdk-setup.sh
+++ b/usertools/dpdk-setup.sh
@@ -1,4 +1,4 @@
-#! /bin/bash
+#! /usr/bin/env bash
 
 #   BSD LICENSE
 #
-- 
2.13.3



Re: [dpdk-dev] [PATCH] net/mlx5: poll completion queue once per a call

2017-07-27 Thread Yongseok Koh

> On Jul 27, 2017, at 4:12 AM, Sagi Grimberg  wrote:
> 
> 
>>> Yes I realize that, but can't the device still complete in a burst (of
>>> unsuppressed completions)? I mean its not guaranteed that for every
>>> txq_complete a signaled completion is pending right? What happens if
>>> the device has inconsistent completion pacing? Can't the sw grow a
>>> batch of completions if txq_complete will process a single completion
>>> unconditionally?
>> Speculation. First of all, device doesn't delay completion notifications for 
>> no
>> reason. ASIC is not a SW running on top of a OS.
> 
> I'm sorry but this statement is not correct. It might be correct in a
> lab environment, but in practice, there are lots of things that can
> affect the device timing.
Disagree.

[...]
> Reviewed-by: Sagi Grimberg 
Thanks for ack!

Yongseok

Re: [dpdk-dev] [PATCH] doc: add testpmd bonding mode 4 aggregators mode

2017-07-27 Thread Wu, Jingjing


> -Original Message-
> From: dev [mailto:dev-boun...@dpdk.org] On Behalf Of Daniel Mrzyglod
> Sent: Thursday, July 27, 2017 2:41 PM
> To: Mcnamara, John ; Doherty, Declan
> 
> Cc: dev@dpdk.org; Mrzyglod, DanielX T 
> Subject: [dpdk-dev] [PATCH] doc: add testpmd bonding mode 4 aggregators mode
> 
> Add testpmd commands for setting aggregators mode in mode 4 (IEEE802.3AD).
> 
> Signed-off-by: Daniel Mrzyglod 
Acked-by: Jingjing Wu 


Re: [dpdk-dev] [PATCH] net/i40e: fix dereferencing null pointer

2017-07-27 Thread Wu, Jingjing


> -Original Message-
> From: Kozak, KubaX
> Sent: Thursday, July 27, 2017 3:28 PM
> To: Wu, Jingjing 
> Cc: dev@dpdk.org; Jain, Deepak K ; Jastrzebski, 
> MichalX K
> ; Kozak, KubaX ;
> sta...@dpdk.org
> Subject: [PATCH] net/i40e: fix dereferencing null pointer
> 
> Add check if o_vlan_mask and i_vlan_mask are
> not a NULL pointer.
> 
> Coverity issue: 143448
> Coverity issue: 143449
> Fixes: d37705068ee8 ("net/i40e: parse QinQ pattern")
> Cc: sta...@dpdk.org
> 
> Signed-off-by: Kuba Kozak 
> ---
>  drivers/net/i40e/i40e_flow.c | 6 --
>  1 file changed, 4 insertions(+), 2 deletions(-)
> 
> diff --git a/drivers/net/i40e/i40e_flow.c b/drivers/net/i40e/i40e_flow.c
> index 95af701..b92719a 100644
> --- a/drivers/net/i40e/i40e_flow.c
> +++ b/drivers/net/i40e/i40e_flow.c
> @@ -3719,8 +3719,10 @@ i40e_flow_parse_qinq_pattern(__rte_unused struct
> rte_eth_dev *dev,
>   }
> 
>   /* Get filter specification */
> - if ((o_vlan_mask->tci == rte_cpu_to_be_16(I40E_TCI_MASK)) &&
> - (i_vlan_mask->tci == rte_cpu_to_be_16(I40E_TCI_MASK))) {
> + if ((o_vlan_mask != NULL) && (o_vlan_mask->tci ==
> + rte_cpu_to_be_16(I40E_TCI_MASK)) &&
> + (i_vlan_mask != NULL) &&
> + (i_vlan_mask->tci == rte_cpu_to_be_16(I40E_TCI_MASK))) {
>   filter->outer_vlan = rte_be_to_cpu_16(o_vlan_spec->tci)
>   & I40E_TCI_MASK;
>   filter->inner_vlan = rte_be_to_cpu_16(i_vlan_spec->tci)
> --
Acked-by: Jingjing Wu 

Thanks



[dpdk-dev] [PATCH v2] net/i40e: fix PF notify issue when VF not up

2017-07-27 Thread Xiaoyun Li
This patch modifies PF notify error to warning when not starting
up VF and modifies VF state to active when VF reset is completed.

Fixes: 4861cde46116 ("i40e: new poll mode driver")
Cc: sta...@dpdk.org

Signed-off-by: Xiaoyun Li 
---
v2 changes:
* add VF state modification when VF reset is done.
---
 drivers/net/i40e/i40e_pf.c | 33 +++--
 1 file changed, 19 insertions(+), 14 deletions(-)

diff --git a/drivers/net/i40e/i40e_pf.c b/drivers/net/i40e/i40e_pf.c
index b4cf57f..5d5d24a 100644
--- a/drivers/net/i40e/i40e_pf.c
+++ b/drivers/net/i40e/i40e_pf.c
@@ -152,22 +152,23 @@ i40e_pf_host_vf_reset(struct i40e_pf_vf *vf, bool 
do_hw_reset)
val |= I40E_VPGEN_VFRTRIG_VFSWR_MASK;
I40E_WRITE_REG(hw, I40E_VPGEN_VFRTRIG(vf_id), val);
I40E_WRITE_FLUSH(hw);
-   }
 
 #define VFRESET_MAX_WAIT_CNT 100
-   /* Wait until VF reset is done */
-   for (i = 0; i < VFRESET_MAX_WAIT_CNT; i++) {
-   rte_delay_us(10);
-   val = I40E_READ_REG(hw, I40E_VPGEN_VFRSTAT(vf_id));
-   if (val & I40E_VPGEN_VFRSTAT_VFRD_MASK)
-   break;
-   }
+   /* Wait until VF reset is done */
+   for (i = 0; i < VFRESET_MAX_WAIT_CNT; i++) {
+   rte_delay_us(10);
+   val = I40E_READ_REG(hw, I40E_VPGEN_VFRSTAT(vf_id));
+   if (val & I40E_VPGEN_VFRSTAT_VFRD_MASK) {
+   vf->state = I40E_VF_ACTIVE;
+   break;
+   }
+   }
 
-   if (i >= VFRESET_MAX_WAIT_CNT) {
-   PMD_DRV_LOG(ERR, "VF reset timeout");
-   return -ETIMEDOUT;
+   if (i >= VFRESET_MAX_WAIT_CNT) {
+   PMD_DRV_LOG(ERR, "VF reset timeout");
+   return -ETIMEDOUT;
+   }
}
-
/* This is not first time to do reset, do cleanup job first */
if (vf->vsi) {
/* Disable queues */
@@ -267,8 +268,12 @@ i40e_pf_host_send_msg_to_vf(struct i40e_pf_vf *vf,
ret = i40e_aq_send_msg_to_vf(hw, abs_vf_id, opcode, retval,
msg, msglen, NULL);
if (ret) {
-   PMD_INIT_LOG(ERR, "Fail to send message to VF, err %u",
-hw->aq.asq_last_status);
+   if (vf->state == I40E_VF_INACTIVE)
+   PMD_DRV_LOG(WARNING, "Warning! VF %u is inactive now!",
+   abs_vf_id);
+   else
+   PMD_INIT_LOG(ERR, "Fail to send message to VF, err %u",
+   hw->aq.asq_last_status);
}
 
return ret;
-- 
2.7.4



Re: [dpdk-dev] [PATCH v2] net/i40e: fix PF notify issue when VF not up

2017-07-27 Thread Wu, Jingjing


> -Original Message-
> From: Li, Xiaoyun
> Sent: Friday, July 28, 2017 7:40 PM
> To: Wu, Jingjing 
> Cc: dev@dpdk.org; Li, Xiaoyun ; sta...@dpdk.org
> Subject: [PATCH v2] net/i40e: fix PF notify issue when VF not up
> 
> This patch modifies PF notify error to warning when not starting
> up VF and modifies VF state to active when VF reset is completed.
> 
> Fixes: 4861cde46116 ("i40e: new poll mode driver")
> Cc: sta...@dpdk.org
> 
> Signed-off-by: Xiaoyun Li 
> ---
> v2 changes:
> * add VF state modification when VF reset is done.
> ---
>  drivers/net/i40e/i40e_pf.c | 33 +++--
>  1 file changed, 19 insertions(+), 14 deletions(-)
> 
> diff --git a/drivers/net/i40e/i40e_pf.c b/drivers/net/i40e/i40e_pf.c
> index b4cf57f..5d5d24a 100644
> --- a/drivers/net/i40e/i40e_pf.c
> +++ b/drivers/net/i40e/i40e_pf.c
> @@ -152,22 +152,23 @@ i40e_pf_host_vf_reset(struct i40e_pf_vf *vf, bool 
> do_hw_reset)
>   val |= I40E_VPGEN_VFRTRIG_VFSWR_MASK;
>   I40E_WRITE_REG(hw, I40E_VPGEN_VFRTRIG(vf_id), val);
>   I40E_WRITE_FLUSH(hw);
> - }
> 
>  #define VFRESET_MAX_WAIT_CNT 100
> - /* Wait until VF reset is done */
> - for (i = 0; i < VFRESET_MAX_WAIT_CNT; i++) {
> - rte_delay_us(10);
> - val = I40E_READ_REG(hw, I40E_VPGEN_VFRSTAT(vf_id));
> - if (val & I40E_VPGEN_VFRSTAT_VFRD_MASK)
> - break;
> - }
> + /* Wait until VF reset is done */
> + for (i = 0; i < VFRESET_MAX_WAIT_CNT; i++) {
> + rte_delay_us(10);
> + val = I40E_READ_REG(hw, I40E_VPGEN_VFRSTAT(vf_id));
> + if (val & I40E_VPGEN_VFRSTAT_VFRD_MASK) {
> + vf->state = I40E_VF_ACTIVE;
> + break;
> + }
> + }
> 
> - if (i >= VFRESET_MAX_WAIT_CNT) {
> - PMD_DRV_LOG(ERR, "VF reset timeout");
> - return -ETIMEDOUT;
> + if (i >= VFRESET_MAX_WAIT_CNT) {
> + PMD_DRV_LOG(ERR, "VF reset timeout");
> + return -ETIMEDOUT;
> + }
It's much clearer to add "vf->state = I40E_VF_ACTIVE;" here but not above.
>   }
> -
>   /* This is not first time to do reset, do cleanup job first */
>   if (vf->vsi) {
>   /* Disable queues */
> @@ -267,8 +268,12 @@ i40e_pf_host_send_msg_to_vf(struct i40e_pf_vf *vf,
>   ret = i40e_aq_send_msg_to_vf(hw, abs_vf_id, opcode, retval,
>   msg, msglen, NULL);
>   if (ret) {
> - PMD_INIT_LOG(ERR, "Fail to send message to VF, err %u",
> -  hw->aq.asq_last_status);
> + if (vf->state == I40E_VF_INACTIVE)
> + PMD_DRV_LOG(WARNING, "Warning! VF %u is inactive now!",
> + abs_vf_id);
How about just don't send msg to inactive VF but not print warning?

> + else
> + PMD_INIT_LOG(ERR, "Fail to send message to VF, err %u",
> + hw->aq.asq_last_status);
>   }
> 
>   return ret;
> --
> 2.7.4