On 10/3/18 10:40 PM, Thomas Monjalon wrote:
The enum names are *_params (plural form).
And the items are also using the plural form: *_PARAMS_*.
It looks more natural to use the singular form *_PARAM_* for items.
Signed-off-by: Thomas Monjalon
Reviewed-by: Andrew Rybchenko
On 10/3/18 10:40 PM, Thomas Monjalon wrote:
We could match devices by their PCI id (vendor id, device id, etc).
But for now, only matching by PCI address is implemented.
The devargs parameter "id" is renamed "addr" to reflect its real meaning.
Signed-off-by: Thomas Monjalon
Reviewed-by: Andre
On 10/9/18 7:48 PM, Ferruh Yigit wrote:
On 10/7/2018 1:57 PM, Ori Kam wrote:
This series implement the generic L2/L3 tunnel encapsulation actions
and is based on rfc [1] "add generic L2/L3 tunnel encapsulation actions"
Currenlty the encap/decap actions only support encapsulation
of VXLAN and NV
As ifcvf_init_hw is independent with ifcvf_vfio_setup, it's better to
invoke it directly in probe func.
Signed-off-by: Xiaolong Ye
---
drivers/net/ifc/ifcvf_vdpa.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/drivers/net/ifc/ifcvf_vdpa.c b/drivers/net/ifc/ifcvf_vdpa
> diff --git a/drivers/raw/ifpga_rawdev/base/ifpga_enumerate.c
> b/drivers/raw/ifpga_rawdev/base/ifpga_enumerate.c
> index f0939dc32..848e5183a 100644
> --- a/drivers/raw/ifpga_rawdev/base/ifpga_enumerate.c
> +++ b/drivers/raw/ifpga_rawdev/base/ifpga_enumerate.c
> @@ -104,14 +104,14 @@ static struc
Hi Jerin,
Following the guide to use the PMU counters(KO inserted and DPDK recompiled),
the numbers increased 10+ folds(bigger numbers here mean more precise?), is
this valid and expected?
No significant difference was seen.
gavin@net-arm-thunderx2:~/community/dpdk$ sudo ./test/test/test -l
On 10/10/18 1:17 AM, Thomas Monjalon wrote:
After closing a port, it cannot be restarted.
So there is no reason to not free all associated resources.
The last step was done with rte_eth_dev_detach() which is deprecated.
Instead of blindly removing the associated rte_device, the driver should
che
> .../raw/ifpga_rawdev/base/ifpga_enumerate.c | 8 ++--
> .../raw/ifpga_rawdev/base/ifpga_feature_dev.h | 8 ++--
> drivers/raw/ifpga_rawdev/base/ifpga_port.c| 6 +--
> .../raw/ifpga_rawdev/base/ifpga_port_error.c | 2 +-
For ifpga_rawdev part, it looks good for me.
Acked-by: Tianfei z
Tuesday, October 9, 2018 6:49 PM, Ferruh Yigit:
> Subject: Re: [dpdk-dev] [PATCH 0/7] net/mlx5: fixes for the new flow engine
>
> On 10/9/2018 9:58 AM, Shahaf Shuler wrote:
> > Monday, October 8, 2018 9:02 PM, Yongseok Koh:
> >> Subject: [PATCH 0/7] net/mlx5: fixes for the new flow engine
[...]
Hi Fiona,
We were following the QAT approach for defining the capabilities. OCTEON
TX crypto PMD has similar number of capabilities and QAT was the close
model that we could follow. I can see the advantages of the macro
approach, but that would give a checkpatch warning. Also, Thomas didn't
r
Wednesday, October 10, 2018 5:48 AM, Yongseok Koh:
> Subject: Re: [PATCH v2] net/mlx5: support multiple groups and jump action
> On Tue, Oct 09, 2018 at 05:50:30AM -0700, Shahaf Shuler wrote:
> > Hi Koh,
> > Few comments.
> >
> > Monday, October 8, 2018 9:06 PM¸ Yongseok Koh:
> > > Subject: [PATCH
On 10/10/2018 10:40 AM, Akhil Goyal wrote:
On 10/9/2018 7:46 PM, Junxiao Shi wrote:
The documentation of rte_crypto_op_pool_create indicates that
specifying RTE_CRYPTO_OP_TYPE_UNDEFINED would create a pool that
supports all operation types. This change makes the code
consistent with documen
On 10/9/2018 7:46 PM, Junxiao Shi wrote:
The documentation of rte_crypto_op_pool_create indicates that
specifying RTE_CRYPTO_OP_TYPE_UNDEFINED would create a pool that
supports all operation types. This change makes the code
consistent with documentation.
Fixes: c0f87eb5252b ("cryptodev: chan
Apologies, removing the disclaimer at the bottom.
> -Original Message-
> From: dev On Behalf Of Honnappa Nagarahalli
> Sent: Tuesday, October 9, 2018 11:37 PM
> To: dev@dpdk.org
> Cc: Jacob, Jerin ; Gavin Hu (Arm
> Technology China) ; Hemant Agrawal
> ; debayang.qdt
> ; Thomas Monjalon
>
Hi,
This email was triggered by a request to change ARM to Arm in the dpdk.org
webpage. I went down the path of finding out the correct names to use. There
has not been consistency in using these names across all other projects. So,
the recommendation I have got is, 'choose something and use it
Acked-by: Ye Xiaolong
Thanks,
Xiaolong
On 09/25, Xiao Wang wrote:
>The address translation from user virtual address to guest physical
>address should not be named as qva_to_gpa.
>
>Fixes: a3f8150eac6d ("net/ifcvf: add ifcvf vDPA driver")
>
>Signed-off-by: Xiao Wang
>---
> drivers/net/ifc/ifcvf
Hi, Qiaobin,
Could you try to rebase on this patch set?
(http://patchwork.dpdk.org/cover/46106/)
I checked your patch and I think there won't be many functional issues merging
our patches. Let's coordinate to make sure the final merge is easier.
Other comments inlined:
>-Original Messag
rte_flow has 'group' attribute and 'jump' action in order to support
multiple groups. This feature is known as multi-table support ('chain' in
linux TC flower) in general because a group means a table of flows. Example
commands are:
flow create 0 transfer priority 1 ingress
pa
- track whether counter DMAs are active or not so they can be stopped if
needed before DMA memory is freed
- fix counter DMA shut-down by changing vnic_dev_counter_dma_cfg() to
take the number of counters to DMA instead of high counter index and
use num counters = 0 to shut off DMAs
- remove
'OCTEON TX' is the registered name. All other usages need to be fixed.
Signed-off-by: Anoob Joseph
---
MAINTAINERS | 8
doc/guides/compressdevs/features/octeontx.ini | 2 +-
doc/guides/compressdevs/octeontx.rst | 24
On Tue, Oct 09, 2018 at 05:50:30AM -0700, Shahaf Shuler wrote:
> Hi Koh,
> Few comments.
>
> Monday, October 8, 2018 9:06 PM¸ Yongseok Koh:
> > Subject: [PATCH v2] net/mlx5: support multiple groups and jump action
> >
> > rte_flow has 'group' attribute and 'jump' action in order to support
> >
As APIs in rte_vdpa.h are public, we need to add doxygen comments
to all APIs and structures.
Signed-off-by: Xiaolong Ye
---
doc/api/doxy-api-index.md | 1 +
lib/librte_vhost/rte_vdpa.h | 54 +
2 files changed, 50 insertions(+), 5 deletions(-)
diff --git a
Hi Qiaobin,
This patch: http://patchwork.dpdk.org/patch/46105/ covers the bug. Honnappa
suggested a fix that would work well for the lock free implementation as well.
>-Original Message-
>From: Qiaobin Fu [mailto:qiaob...@bu.edu]
>Sent: Tuesday, October 9, 2018 12:29 PM
>To: Richardson,
On Tue, Oct 09, 2018 at 10:25:37PM +0300, Dekel Peled wrote:
> This patch adds support for Direct Verbs decap operations, L2 and L3.
>
> Signed-off-by: Dekel Peled
> ---
Acked-by: Yongseok Koh
Thanks
> drivers/net/mlx5/mlx5_flow_dv.c | 215
>
> 1 fil
On Tue, Oct 09, 2018 at 10:25:36PM +0300, Dekel Peled wrote:
> This patch adds support for Direct Verbs encap operations, L2 and L3.
>
> Signed-off-by: Dekel Peled
> ---
Acked-by: Yongseok Koh
Thanks
> drivers/net/mlx5/mlx5_flow_dv.c | 227
> +++-
> 1 fil
On Tue, Oct 09, 2018 at 10:25:35PM +0300, Dekel Peled wrote:
> This patch adds the required definitions for DV encap/decap actions.
> It also adds usage of the new actions definition in validation
> function of existing drop operation.
>
> Signed-off-by: Dekel Peled
> ---
I've acked it in v2. So
On Tue, Oct 09, 2018 at 10:25:34PM +0300, Dekel Peled wrote:
> This patch adds glue functions for operations:
> - Create packet reformat (encap/decap) flow action.
> - Destroy flow action.
>
> The new operations depend on HAVE_IBV_FLOW_ACTION_DV_SUPPORT.
>
> Signed-off-by: Dekel Peled
> ---
> d
On Tue, Oct 09, 2018 at 10:25:34PM +0300, Dekel Peled wrote:
> This patch adds glue functions for operations:
> - Create packet reformat (encap/decap) flow action.
> - Destroy flow action.
>
> The new operations depend on HAVE_IBV_FLOW_ACTION_DV_SUPPORT.
>
> Signed-off-by: Dekel Peled
> ---
> d
> On Oct 8, 2018, at 5:42 PM, Wiles, Keith wrote:
>
> Hi Everyone,
>
> I would like to request comments on DFS as I presented at the DPDK summit in
> Ireland.
Here is a repo you can look at and play with. The code is mostly ready for
upstream but still more work needs to be done.
https://
This patch fixes the 'flow list ' command which caused a
segfault when passing the action or item 'type' field instead
of the action or item struct pointer in the call to rte_flow_conv.
Fixes: 7d94dcedf7ce ("app/testpmd: rely on flow API conversion function")
Signed-off-by: John Daley
---
app/t
The provided example of doxygen header is about a deprecated function.
It is replaced by rte_spinlock_trylock() which is small and
good enough for the purpose.
Signed-off-by: Thomas Monjalon
Reviewed-by: Andrew Rybchenko
---
doc/guides/contributing/documentation.rst | 15 +--
1 file
The hotplug attach/detach features are implemented in EAL layer.
There is a new ethdev iterator to retrieve ports from ethdev layer.
As announced earlier, the (buggy) ethdev functions are now removed.
Signed-off-by: Thomas Monjalon
Reviewed-by: Andrew Rybchenko
---
app/test-pmd/testpmd.c
These hotplug functions were deprecated and have some new replacements.
As announced earlier, the oldest ones are now removed.
Signed-off-by: Thomas Monjalon
Reviewed-by: Andrew Rybchenko
---
doc/guides/rel_notes/deprecation.rst| 5 ---
doc/guides/rel_notes/release_18_11.rst | 6 +++
lib
The functions for EAL attach/detach had already some replacements,
so they are removed.
The functions for ethdev attach/detach are removed and replaced
thanks to a new ethdev iterator working with devargs.
rte_eth_dev_attach(devargs, &port_id)
is replaced by:
rte_dev_probe(devargs);
RT
If no rte_device is given in the iterator,
eth_dev_match() is looking at all ports without any restriction,
except the ethdev kvargs filter.
It allows to iterate with a devargs filter referencing only
some ethdev parameters. The format (from the new devargs syntax) is:
class=eth,paramY=Y
The iterator will return the ethdev port ids matching a devargs string.
It is recommended to use the macro RTE_ETH_FOREACH_MATCHING_DEV()
for usage convenience.
The class string is prefixed with '+' in order to skip the validation
of the parameter keys. It is tolerated for the compatibility with
t
A virtual device can be matched with following syntax:
bus=vdev,name=X
Signed-off-by: Thomas Monjalon
Reviewed-by: Andrew Rybchenko
---
drivers/bus/vdev/vdev_params.c | 19 +--
1 file changed, 17 insertions(+), 2 deletions(-)
diff --git a/drivers/bus/vdev/vdev_params.c
PATCH v3 is expected to accommodate more updates in hotplug series by Thomas.
Please do not merge this patch.
> -Original Message-
> From: Yongseok Koh
> Sent: Friday, October 05, 2018 9:06 PM
> To: Ophir Munk
> Cc: dev@dpdk.org; Asaf Penso ; Shahaf Shuler
> ; Thomas Monjalon ;
> Olga She
After closing a port, it cannot be restarted.
So there is no reason to not free all associated resources.
The last step was done with rte_eth_dev_detach() which is deprecated.
Instead of blindly removing the associated rte_device, the driver should
check if no more port (ethdev, cryptodev, etc) is
28/09/2018 14:46, Ferruh Yigit:
> On 9/8/2018 12:39 AM, Thomas Monjalon wrote:
> > After closing a port, it cannot be restarted.
> > So there is no reason to not free all associated resources.
> >
> > The last step was done with rte_eth_dev_detach() which is deprecated.
> > Instead of removing the
Introduce a new postcopy-support parameter to Vhost PMD that
passes the RTE_VHOST_USER_POSTCOPY_SUPPORT flag at vhost
device register time.
Flag should only be set if application does not prefault guest
memory using, for example, mlockall() syscall.
Default value is 0, meaning that postcopy suppo
Signed-off-by: Dr. David Alan Gilbert
Signed-off-by: Maxime Coquelin
---
lib/librte_vhost/vhost_user.h | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/lib/librte_vhost/vhost_user.h b/lib/librte_vhost/vhost_user.h
index aa8374ee2..14dccdedf 100644
--- a/lib/librte_vhost/vhos
Postcopy live-migration feature requires the application to
not populate the guest memory. As the vhost library cannot
prevent the application to that (e.g. preventing the
application to call mlockall()), the feature is disabled by
default.
The application should only enable the feature if it does
Signed-off-by: Dr. David Alan Gilbert
Signed-off-by: Maxime Coquelin
---
lib/librte_vhost/vhost_user.c | 49 ---
1 file changed, 46 insertions(+), 3 deletions(-)
diff --git a/lib/librte_vhost/vhost_user.c b/lib/librte_vhost/vhost_user.c
index 96290fdb4..170d258c4
Signed-off-by: Dr. David Alan Gilbert
Signed-off-by: Maxime Coquelin
---
lib/librte_vhost/vhost_user.c | 26 ++
1 file changed, 26 insertions(+)
diff --git a/lib/librte_vhost/vhost_user.c b/lib/librte_vhost/vhost_user.c
index 35fb4a773..54c0210fb 100644
--- a/lib/librte_
The master sends this message before stopping handling
userfaults, so that the backend closes the userfaultfd.
The master waits for the slave to acknowledge the request
with an empty 64bits payload for synchronization purpose.
Signed-off-by: Dr. David Alan Gilbert
Signed-off-by: Maxime Coquelin
The VHOST_USER_SET_MEM_TABLE payload is copied when handled,
whereas it could directly be referenced.
This is not very important, but next, we'll need to update the
payload and send it back to Qemu.
Signed-off-by: Dr. David Alan Gilbert
Signed-off-by: Maxime Coquelin
Acked-by: Ilya Maximets
--
Signed-off-by: Dr. David Alan Gilbert
Signed-off-by: Maxime Coquelin
---
lib/librte_vhost/vhost.h | 1 +
lib/librte_vhost/vhost_user.c | 21 +
lib/librte_vhost/vhost_user.h | 3 ++-
3 files changed, 24 insertions(+), 1 deletion(-)
diff --git a/lib/librte_vhost/vhost.h
Passing userfault fds to Qemu will be required for postcopy
live-migration feature.
Signed-off-by: Dr. David Alan Gilbert
Signed-off-by: Maxime Coquelin
---
lib/librte_vhost/vhost_user.c | 27 +++
1 file changed, 15 insertions(+), 12 deletions(-)
diff --git a/lib/librte
This patch opens a userfaultfd and sends it back to Qemu's
VHOST_USER_POSTCOPY_ADVISE request.
Signed-off-by: Dr. David Alan Gilbert
Signed-off-by: Maxime Coquelin
---
lib/librte_vhost/vhost.h | 2 ++
lib/librte_vhost/vhost_user.c | 50 +++
lib/librte_vhost
Postcopy live-migration features relies on userfaultfd,
which was only introduced in kernel v4.3.
This patch introduces a new define to allow building vhost
library on kernels not supporting userfaultfd.
With legacy build system, user has to explicitly set
CONFIG_RTE_LIBRTE_VHOST_POSTCOPY to 'y'.
This is not used for now, but will be needed for the
special handling of VHOST_USER_SET_MEM_TABLE message
once postcopy will be supported.
Signed-off-by: Maxime Coquelin
---
lib/librte_vhost/vhost_user.c | 71 +++
1 file changed, 47 insertions(+), 24 deletions(-)
QEMU doesn't expect any payload for the reply of
VHOST_USER_SET_LOG_BASE request, so don't send any.
Note that the Vhost-user specification isn't clear about
it and would need to be fixed.
Fixes: 54f9e32305d4 ("vhost: handle dirty pages logging request")
Cc: sta...@dpdk.org
Reported-by: Ilya Maxi
As soons as some anciliarry datai (fds) are received, it is copied
without checking its length.
This patch adds adds the number of fds received to the message,
which is set in read_vhost_message().
This is preliminary work to support sending fds to Qemu.
Signed-off-by: Dr. David Alan Gilbert
Si
Signed-off-by: Dr. David Alan Gilbert
Signed-off-by: Maxime Coquelin
Acked-by: Ilya Maximets
Reviewed-by: Tiwei Bie
---
lib/librte_vhost/rte_vhost.h | 4
1 file changed, 4 insertions(+)
diff --git a/lib/librte_vhost/rte_vhost.h b/lib/librte_vhost/rte_vhost.h
index b02673d4a..9292c89c5 10
When the memory table gets updated, the rings addresses need
to be translated again. If it fails, we need to exit cleanly
by unmapping memory regions.
Fixes: d5022533c20a ("vhost: retranslate vring addr when memory table changes")
Cc: sta...@dpdk.org
Signed-off-by: Maxime Coquelin
Acked-by: Ilya
Return of message handling has now changed to an enum that can
take non-negative value that is not zero in case a reply is
needed. But the code checking the variable afterwards has not
been updated, leading to success messages handling being
treated as errors.
External post and pre callbacks retur
In this v5:
- Move VHOST_USER_PROTOCOL_F_PAGEFAULT disablement if zero copy
is requested to socket.c, and emit a warning if it happens (Ilya)
- Reset postcopy_ufd after it is closed in vhost_user_postcopy_advise
error path (Ilya)
- Rework pre/post message handler callback to return vh_result
For messages that require a reply, a second ack should not be
sent when reply-ack protocol feature is negotiated, even if
the corresponding flag is set in the message.
The code is compliant with the spec but it isn't clear it is,
so this patch adds a comment to make it explicit.
Suggested-by: Ily
VHOST_USER_GET_PROTOCOL_FEATURES, VHOST_USER_GET_VRING_BASE
and VHOST_USER_SET_LOG_BASE require replies, so their handlers
should return VH_RESULT_REPLY, not VH_RESULT_OK.
Fixes: 0bff510b5ea6 ("vhost: unify message handling function signature")
Signed-off-by: Maxime Coquelin
Acked-by: Ilya Maxim
Signed-off-by: Fan Zhang
---
doc/guides/cryptodevs/aesni_mb.rst | 1 +
doc/guides/rel_notes/release_18_11.rst | 4
2 files changed, 5 insertions(+)
diff --git a/doc/guides/cryptodevs/aesni_mb.rst
b/doc/guides/cryptodevs/aesni_mb.rst
index c29295002..63e060d75 100644
--- a/doc/guides/cr
This patchset adds the AES-GCM algorithm support to AESNI-MB Cryptodev
PMD and updates the unit test and documentations along.
v2:
- rebased on top of latest dpdk-next-crypto.
- removed incorrect __rte_unused macros.
Fan Zhang (3):
crypto/aesni_mb: add aes-gcm algorithm support
test/test_cryp
Signed-off-by: Fan Zhang
---
test/test/test_cryptodev.c | 114 +
1 file changed, 114 insertions(+)
diff --git a/test/test/test_cryptodev.c b/test/test/test_cryptodev.c
index e9f2c8f94..32600dea2 100644
--- a/test/test/test_cryptodev.c
+++ b/test/test/t
This patch adds AES-GCM algorithm support to AESNI-MB PMD.
Signed-off-by: Fan Zhang
---
drivers/crypto/aesni_mb/aesni_mb_ops.h | 28 +++-
drivers/crypto/aesni_mb/rte_aesni_mb_pmd.c | 160 +++--
drivers/crypto/aesni_mb/rte_aesni_mb_pmd_ops.c | 30
dr
Hi Akhil,
To obtain request files the applicant has to fill the validation request to
FIPS lab.
However to test the application the response files can be used.
The application will attach an extra line with computed results of the test
cases and it will be fairly easy to check :-).
Please be su
This patch adds the required definitions for DV encap/decap actions.
It also adds usage of the new actions definition in validation
function of existing drop operation.
Signed-off-by: Dekel Peled
---
drivers/net/mlx5/mlx5_flow.c | 8
drivers/net/mlx5/mlx5_flow.h | 6 ++
2 files chan
This patch adds support for Direct Verbs decap operations, L2 and L3.
Signed-off-by: Dekel Peled
---
drivers/net/mlx5/mlx5_flow_dv.c | 215
1 file changed, 215 insertions(+)
diff --git a/drivers/net/mlx5/mlx5_flow_dv.c b/drivers/net/mlx5/mlx5_flow_dv.c
i
This patch adds support for Direct Verbs encap operations, L2 and L3.
Signed-off-by: Dekel Peled
---
drivers/net/mlx5/mlx5_flow_dv.c | 227 +++-
1 file changed, 222 insertions(+), 5 deletions(-)
diff --git a/drivers/net/mlx5/mlx5_flow_dv.c b/drivers/net/mlx5/
This patch adds glue functions for operations:
- Create packet reformat (encap/decap) flow action.
- Destroy flow action.
The new operations depend on HAVE_IBV_FLOW_ACTION_DV_SUPPORT.
Signed-off-by: Dekel Peled
---
drivers/net/mlx5/Makefile| 5 +
drivers/net/mlx5/meson.build | 2 ++
d
This series adds support of encap and decap actions in DV format.
It is using the generic encapsulation framework from [1].
Note that encap action is relevant for egress only.
Hence this series should be merged on top of [2].
[1] "ethdev: add generic L2/L3 tunnel encapsulation actions"
http://
In current implementation of rte_hash_iterate(), it
tries to obtain the lock after the while loop. However,
this may lead to a bug. Notice the following racing condition:
1. The while loop above finishes because it finds
a not empty slot. But it does so without a lock.
2. Then we get the lock.
Function rte_hash_iterate_conflict_entries_with_hash() iterates
over the entries that conflict with an incoming entry.
Iterating over conflicting entries enables one to decide
if the incoming entry is more valuable than the entries already
in the hash table. This is particularly useful after
an in
Thanks, PSB.
> -Original Message-
> From: Yongseok Koh
> Sent: Monday, October 8, 2018 10:43 PM
> To: Dekel Peled
> Cc: Shahaf Shuler ; dev@dpdk.org; Ori Kam
>
> Subject: Re: [PATCH v2 1/4] net/mlx5: add flow action functions to glue
>
> On Sun, Oct 07, 2018 at 05:25:05PM +0300, Dekel P
On Tuesday, October 10/09/18, 2018 at 20:19:54 +0530, Ferruh Yigit wrote:
> On 9/24/2018 9:29 AM, Rahul Lakkireddy wrote:
> > This action is useful for offloading loopback mode, where the hardware
> > will swap source and destination MAC addresses in the outermost Ethernet
> > header before looping
Introduce librte_ipsec library.
The library is supposed to utilize existing DPDK crypto-dev and
security API to provide application with transparent IPsec processing API.
That initial commit provides some base API to manage
IPsec Security Association (SA) object.
Signed-off-by: Mohammad Abdul Awal
Introduce helper functions to process completed crypto-ops
and group related packets by sessions they belong to.
Signed-off-by: Konstantin Ananyev
---
lib/librte_ipsec/Makefile | 1 +
lib/librte_ipsec/meson.build | 2 +-
lib/librte_ipsec/rte_ipsec.h | 2 +
Hi Jerin,
> >
> > > static inline rte_ipsec_add_tunnel_hdr(struct rte_mbuf *mbuf);
> > > static inline rte_ipsec_update_sqn(struct rte_mbuf *mbuf, &seq_no);
> > > ...
> > >
> > > For the regular use case, a fat
> > > rte_ipsec_(inbound/outbound)_(prepare/process) can be provided. The
> > > worker
Signed-off-by: Mohammad Abdul Awal
Signed-off-by: Bernard Iremonger
---
test/test/Makefile |3 +
test/test/meson.build |3 +
test/test/test_ipsec.c | 1329
3 files changed, 1335 insertions(+)
create mode 100644 test/test/test_ipsec.c
Provide implementation for rte_ipsec_crypto_prepare() and
rte_ipsec_process().
Current implementation:
- supports ESP protocol tunnel mode only.
- supports ESN and replay window.
- supports algorithms: AES-CBC, AES-GCM, HMAC-SHA1, NULL.
- covers all currently defined security session types:
Introduce Security Association (SA-level) data-path API
Operates at SA level, provides functions to:
- initialize/teardown SA object
- process inbound/outbound ESP/AH packets associated with the given SA
(decrypt/encrypt, authenticate, check integrity,
add/remove ESP/AH related
This RFC targets 19.02 release.
This RFC introduces a new library within DPDK: librte_ipsec.
The aim is to provide DPDK native high performance library for IPsec
data-path processing.
The library is supposed to utilize existing DPDK crypto-dev and
security API to provide application with transpare
With these changes functions:
- rte_ipsec_crypto_prepare
- rte_ipsec_process
can be safely used in MT environment, as long as the user can guarantee
that they obey multiple readers/single writer model for SQN+replay_window
operations.
To be more specific:
for outbound SA there are no restr
Signed-off-by: Konstantin Ananyev
---
lib/librte_net/rte_esp.h | 10 +-
1 file changed, 9 insertions(+), 1 deletion(-)
diff --git a/lib/librte_net/rte_esp.h b/lib/librte_net/rte_esp.h
index f77ec2eb2..8e1b3d2dd 100644
--- a/lib/librte_net/rte_esp.h
+++ b/lib/librte_net/rte_esp.h
@@ -11,7
Add 'uint64_t userdata' inside struct rte_security_session.
That allows upper layer to easily associate some user defined
data with the session.
Signed-off-by: Konstantin Ananyev
---
lib/librte_security/rte_security.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/lib/librte_security/rte_
Add 'uint64_t userdata' inside struct rte_cryptodev_sym_session.
That allows upper layer to easily associate some user defined
data with the session.
Signed-off-by: Konstantin Ananyev
---
lib/librte_cryptodev/rte_cryptodev.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/lib/librte_crypto
On Tue, Oct 09, 2018 at 01:53:46PM +0200, Thomas Monjalon wrote:
> 09/10/2018 13:43, Neil Horman:
> > On Tue, Oct 09, 2018 at 04:18:56AM +0200, Thomas Monjalon wrote:
> > > Next patch does not pass the experimental check
> > > because it has an (unrelated) experimental function in his context.
> >
On 10/09/2018 02:54 PM, Tiwei Bie wrote:
On Tue, Oct 09, 2018 at 02:20:47PM +0200, Maxime Coquelin wrote:
On 10/09/2018 10:03 AM, Tiwei Bie wrote:
On Mon, Oct 08, 2018 at 05:25:39PM +0200, Maxime Coquelin wrote:
Return of message handling has now changed to an enum that can
take non-negativ
09/10/2018 17:11, Stephen Hemminger:
> On Tue, 09 Oct 2018 16:31:24 +0200
> Thomas Monjalon wrote:
>
> > 09/10/2018 16:14, Gaëtan Rivet:
> > > Hi Thomas,
> > >
> > > On Tue, Oct 09, 2018 at 04:18:55AM +0200, Thomas Monjalon wrote:
> > > > If a value contains a comma, rte_kvargs_tokenize() will
09/10/2018 16:56, Bruce Richardson:
> On Tue, Oct 09, 2018 at 01:41:10PM +0200, Thomas Monjalon wrote:
> > I think it is not clean.
> > We should really split EAL in two parts:
> > - low level routines
> > - high level init.
> >
> > About telemetry, you can find any workaround, but it must
Thanks, PSB.
> -Original Message-
> From: Yongseok Koh
> Sent: Tuesday, October 9, 2018 12:19 AM
> To: Dekel Peled
> Cc: Shahaf Shuler ; dev@dpdk.org; Ori Kam
>
> Subject: Re: [PATCH v2 4/4] net/mlx5: add L2 and L3 decap to Direct Verbs
> flow
>
> On Sun, Oct 07, 2018 at 05:25:08PM +030
On 10/7/2018 3:41 PM, Ori Kam wrote:
> Currently testpmd have support only for encapsulation and decapsulation
> for L2 tunnels.
>
> This series adds commands for L3 tunnels types, L3 tunnel is a tunnel
> that the inner packet is missing the L2 part. The encapsulation uses
> the encap_l3 command i
On 10/7/2018 1:57 PM, Ori Kam wrote:
> This series implement the generic L2/L3 tunnel encapsulation actions
> and is based on rfc [1] "add generic L2/L3 tunnel encapsulation actions"
>
> Currenlty the encap/decap actions only support encapsulation
> of VXLAN and NVGRE L2 packets (L2 encapsulation
On 10/9/2018 3:18 PM, Jerin Jacob wrote:
> Introduced DEV_RX_OFFLOAD_OUTER_UDP_CKSUM Rx offload flag and
> PKT_RX_OUTER_L4_CKSUM_* mbuf ol_flags to detect outer UDP checksum
> status.
>
> - To use hardware Rx outer UDP checksum offload, the user needs to
> configure DEV_RX_OFFLOAD_OUTER_UDP_CKSUM
Syntax for log type string is "pmd..[.]"
Fixes: 3e92fd4e4ec0 ("net/bnxt: use dynamic log type")
Fixes: d7f4562ab10a ("net/bonding: convert to dynamic logging")
Fixes: 6086ab3bb3d2 ("net/vdev_netvsc: introduce Hyper-V platform driver")
Fixes: 7db274b9ada2 ("doc: describe dynamic logging format")
Fi
On 10/9/2018 4:07 PM, Stephen Hemminger wrote:
> On Tue, 9 Oct 2018 12:52:38 +0100
> Ferruh Yigit wrote:
>
>> Syntax for log type string is "pmd..[.]"
>>
>> Fixes: 3e92fd4e4ec0 ("net/bnxt: use dynamic log type")
>> Fixes: d7f4562ab10a ("net/bonding: convert to dynamic logging")
>> Fixes: 6086ab3
> -Original Message-
> From: Cel, TomaszX
> Sent: Tuesday, October 9, 2018 5:08 PM
> To: dev@dpdk.org
> Cc: sta...@dpdk.org; Trahe, Fiona ;
> akhil.go...@nxp.com; Kovacevic, Marko
> ; Kusztal, ArkadiuszX
> ;
> mattias.ronnb...@ericsson.com; Cel, TomaszX
> Subject: [PATCH v4 0/3] add A
This patch adds checksum support in the ISA-L PMD for both compression
and decompression.
CRC32 is supported as well as Adler32.
Signed-off-by: Lee Daly
---
drivers/compress/isal/isal_compress_pmd.c | 82 +++
drivers/compress/isal/isal_compress_pmd_ops.c | 4 +-
2 f
This patch adds a test which examines what type of checksum the PMD
supports, adler, crc32 or alder32_crc32
and tests that feature if the PMD supports it.
Signed-off-by: Lee Daly
---
test/test/test_compressdev.c | 205 ++-
1 file changed, 202 insertions(+)
This updates the ISA-L compression driver guide on how to enable and use
checksums.
This also updates the compression drivers features matrix.
Signed-off-by: Lee Daly
---
doc/guides/compressdevs/features/isal.ini | 2 ++
doc/guides/compressdevs/isal.rst | 32 ++
Enable tests for AES-CMAC authentication algorithm.
Signed-off-by: Tomasz Cel
---
test/test/test_cryptodev_hash_test_vectors.h | 12
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/test/test/test_cryptodev_hash_test_vectors.h
b/test/test/test_cryptodev_hash_test_vecto
1 - 100 of 296 matches
Mail list logo