> -Original Message-
> From: Thomas Monjalon
> Sent: Tuesday, June 20, 2023 11:53 PM
> To: Zhang, Qi Z ; zhoumin ;
> Ruifeng Wang
>
> Cc: dev@dpdk.org; m...@smartsharesystems.com; konstantin.v.anan...@yandex.ru;
> Yang, Qiming
> ; Wu, Wenjun1 ;
> d...@linux.vnet.ibm.com;
> roret...@lin
The rte_smp_xx() APIs are deprecated. But it is not mentioned
in the function header.
Added notes in function header for clarification.
Signed-off-by: Ruifeng Wang
---
lib/eal/include/generic/rte_atomic.h | 15 +++
1 file changed, 15 insertions(+)
diff --git a/lib/eal/include/generi
On Tue, Jun 20, 2023 at 4:30 PM David Marchand
wrote:
>
> Added sources were not referenced in the makefile used when compiling
> this example externally.
>
> Fixes: 36128a67c27e ("examples/fips_validation: add asymmetric validation")
> Fixes: b455d261eb89 ("examples/fips_validation: validate ECDS
> -Original Message-
> From: Xu, HailinX
> Sent: Thursday, June 15, 2023 3:18 PM
> To: Thomas Monjalon ; annou...@dpdk.org;
> dev@dpdk.org
> Cc: Kovacevic, Marko ; Mcnamara, John
> ; Richardson, Bruce
> ; Ferruh Yigit
> Subject: RE: release candidate 23.07-rc1
>
> > -Original Message-
On Wed, Jun 21, 2023 at 10:17 AM Ashwin Sekhar T K wrote:
>
> Acked-by: Ashwin Sekhar T K
>
> > -Original Message-
> > From: Thierry Herbelot
> > Sent: Tuesday, June 20, 2023 3:14 PM
> > To: dev@dpdk.org
> > Cc: Thierry Herbelot ; Thomas Monjalon
> > ; Nithin Kumar Dabilpuram
> > ; Satha
Acked-by: Ashwin Sekhar T K
> -Original Message-
> From: Thierry Herbelot
> Sent: Tuesday, June 20, 2023 3:14 PM
> To: dev@dpdk.org
> Cc: Thierry Herbelot ; Thomas Monjalon
> ; Nithin Kumar Dabilpuram
> ; Satha Koteswara Rao Kottidi
> ; Jerin Jacob Kollanukkaran
>
> Subject: [EXT] [PATC
On Tue, Jun 20, 2023 at 4:32 PM wrote:
>
> From: Satheesh Paul
>
> When creating a flow rule directing traffic from PF
> to VF, current validation is incorrectly checking the
> RQ index in flow action with the PF's maximum
> configured RQs. This validation is applicable only
> when action target
在 2023/6/20 22:10, Ferruh Yigit 写道:
On 6/20/2023 2:15 PM, humin (Q) wrote:
Hi, Niklas, Ferruh,
在 2023/6/20 19:03, Niklas Söderlund 写道:
Hi Connor and Ferruh,
On 2023-06-19 09:57:17 +0100, Ferruh Yigit wrote:
On 6/16/2023 1:00 PM, humin (Q) wrote:
Hi,
在 2023/6/16 15:20, Chaoyong He 写道:
Fr
As the VLAN insertion is partially supported in vector path,
the behavior is different in scalar and vector path.
For a VLAN packet, if using scalar path, the new VLAN tag will
be inserted after the original VLAN tag. If using vector path,
the new VLAN tag is inserted before the original VLAN tag.
The SCTP tunnel packets cannot be forwarded in AVX2 mode.
As 2 features are developed in parallel, 5712bf9d6e14
("net/iavf: add Tx AVX2 offload path") doesn't consider
the impact of 4f8259df563a ("net/iavf: enable Tx outer
checksum offload on AVX512"). So, the wrong TX path is
selected.
Fixes: 57
> -Original Message-
> From: Joyce Kong
> Sent: Monday, June 19, 2023 5:45 PM
> To: Zhang, Qi Z ; Vladimir Ratnikov
> ; Yang, Qiming ; Wu,
> Wenjun1
> Cc: dev@dpdk.org; Ruifeng Wang
> Subject: RE: [PATCH] ixgbe: Allow setting IVAR register for X550EM_a
>
> Hi All,
>
> It seems a fal
> -Original Message-
> From: Matthew Smith
> Sent: Tuesday, June 20, 2023 10:56 PM
> To: Guo, Junfeng ; Su, Simei
> Cc: dev@dpdk.org; Smith, Matthew
> Subject: [PATCH] net/igc: disable EEE by default on I225/226
>
> I226-V devices can hang when EEE is enabled. Explicitly disable EEE
Sketch creation seeded the global PRNG
using the supplied seed for hashing.
The use of this seed by SKETCH set summary was not documented.
SKETCH set summary does not require two independent hash seeds,
unlike other set summary types.
Seeding the global PRNG at sketch creation
does not make the ske
For the HW I have access to, I think so.
That is actually one of the major final goals of this patch, so we can
model this HW in P4, including all the hash functions it supports, through
the DPDK SWX pipeline.
Thanks,
Bili
On Sat, Jun 17, 2023 at 1:59 PM Stephen Hemminger <
step...@networkplumbe
An XOR32 hash is needed in the Software Switch (SWX) Pipeline for its
use case in P4. We implement it in this patch so it could be easily
registered in the pipeline later.
Signed-off-by: Bili Dong
---
v7:
* Simplified byte ordering conversion logic. (re Vladimir Medvedkin
)
* Added test cases wi
The following changes since commit 4645ed709d36bab64fbf2b8cff12054d39398af9:
examples/l3fwd-graph: introduce mcore dispatch worker model (2023-06-19
21:27:05 +0200)
are available in the Git repository at:
http://git.dpdk.org/next/dpdk-next-crypto
for you to fetch changes up to 4dc146d0e92
> AES-GCM provides both authenticated encryption and the ability to check
> the integrity and authentication of additional authenticated data (AAD)
> that is sent in the clear.
>
> The crypto operations are performed with crypto WQE. If the input
> buffers(AAD, mbuf, digest) are not contiguous and
On 6/14/2023 6:51 AM, Chaoyong He wrote:
> From: Qin Ke
>
> Performance is reduced because of adding redundant read configure
> operations in nfp_net_parse_ptype() called by nfp_net_recv_pkts(),
> which cause every received packet to spend more time.
>
> Fix the performance issue by deleting the
> -Original Message-
> From: jer...@marvell.com
> Sent: Tuesday, June 20, 2023 3:26 PM
> To: dev@dpdk.org; Nithin Kumar Dabilpuram ;
> Amit Prakash Shukla ; Sunil Kumar Kori
>
> Cc: Jerin Jacob Kollanukkaran
> Subject: [dpdk-dev] [PATCH v1] doc: fix ip6 node API doxygen generation
>
>
As discussed by DPDK technical board [1], our contributor guide should
include some details as to when to use logging vs tracing vs telemetry
to provide the end user with information about the running process and
the DPDK libraries it uses.
[1] https://mails.dpdk.org/archives/dev/2023-March/265204
While the section on dynamic logging in the contributors guide covered
the details of the logging naming scheme, it failed to cover exactly how
the component developer, i.e. the contributor, could actually use
dynamic logging in their component.
Fix this by splitting the details of the naming sche
Add details to our documentation on how to register logging for a
component. Also provide guidelines on when to use logs vs tracing
vs telemetry.
V2: extended second patch based on the feedback provided.
Hopefully, we can keep this section short and clear as the
revisions roll! :-)
Bruce
On 6/20/2023 11:07 AM, Jie Hai wrote:
> On 2023/6/9 19:10, Ferruh Yigit wrote:
>> On 6/9/2023 10:03 AM, Jie Hai wrote:
>>> Here's how the problem arises.
>>> step1: Start the app.
>>> dpdk-testpmd -a :35:00.0 -l 0-3 -- -i --rxq=10 --txq=10
>>>
>>> step2: Perform the following steps and sen
> -Original Message-
> From: David Marchand
> Sent: Tuesday, June 20, 2023 2:10 PM
> To: dev@dpdk.org
> Cc: NBU-Contact-Thomas Monjalon (EXTERNAL) ;
> i.maxim...@ovn.org; Ali Alnubani ; Aman Singh
> ; Yuying Zhang ;
> Matan Azrad ; Slava Ovsiienko
> ; Ori Kam ; Suanming Mou
> ; David Chris
On 6/19/2023 10:41 AM, Andrew Rybchenko wrote:
> On 6/14/23 19:44, Stephen Hemminger wrote:
>> On Wed, 14 Jun 2023 17:20:59 +0200
>> Thomas Monjalon wrote:
>>
>>> Two functions helping to check Rx/Tx queues validity
>>> were added in DPDK 23.07-rc1.
>>> As the release is not closed, it is still ti
13/06/2023 11:25, Ruifeng Wang:
> From: Thomas Monjalon
> > 12/06/2023 13:58, zhoumin:
> > > On Mon, June 12, 2023 at 6:26PM, Thomas Monjalon wrote:
> > > > 15/05/2023 04:10, Zhang, Qi Z:
> > > >> From: Ruifeng Wang
> > > >>> From: Min Zhou
> > > ---
> > > v3:
> > > - Use rte_smp_
On 6/14/2023 3:34 AM, Jiawen Wu wrote:
> Fix some bugs for txgbe and ngbe.
>
> Jiawen Wu (9):
> net/txgbe: fix Tx failure with fiber hotplug
> net/txgbe: fix interrupt enable mask
> net/txgbe: fix issues caused by MNG veto bit setting
> net/txgbe: fix to set autoneg for 1G speed
> net/tx
Can you fix the commit messages with signed-off and Fixes
Acked-by: Kai Ji mailto:kai...@intel.com>>
From: Stephen Hemminger
Sent: 31 May 2023 00:34
To: Fan Zhang
Cc: dev@dpdk.org
Subject: ring name length simplification in
ipsec_mb_qp_create_processed_ops_rin
On Tue, Jun 20, 2023 at 04:33:15PM +0200, Thomas Monjalon wrote:
> 20/06/2023 11:03, Bruce Richardson:
> > On Tue, Jun 20, 2023 at 10:48:50AM +0200, David Marchand wrote:
> > > On Tue, Jun 20, 2023 at 10:45 AM Bruce Richardson
> > > wrote:
> > > > > > > > I notice the change in behaviour for enabl
I226-V devices can hang when EEE is enabled. Explicitly disable
EEE during initialization of the device, as the Linux and FreeBSD
kernel drivers do.
Signed-off-by: Matthew Smith
---
drivers/net/igc/base/igc_i225.c | 4
1 file changed, 4 insertions(+)
diff --git a/drivers/net/igc/base/igc_i
16/06/2023 11:38, Akhil Goyal:
> > > > > >
> > > > > > For info, this does not compile with
> > > > > > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__git.gitlab.arm.com_arm-2Dreference-2Dsolutions_ipsec-
> > 2Dmb&d=DwIFAg&c=nKjWec2b6R0mOyPaz7xtfQ&r=DnL7Si2wl_PRwpZ9TWey3e
> > u68gBzn7DkP
On Tue, Jun 20, 2023 at 04:33:15PM +0200, Thomas Monjalon wrote:
> 20/06/2023 11:03, Bruce Richardson:
> > On Tue, Jun 20, 2023 at 10:48:50AM +0200, David Marchand wrote:
> > > On Tue, Jun 20, 2023 at 10:45 AM Bruce Richardson
> > > wrote:
> > > > > > > > I notice the change in behaviour for enabl
20/06/2023 10:14, Jie Hai:
> On 2023/2/20 20:55, David Marchand wrote:
> > On Fri, Feb 10, 2023 at 3:50 AM Jie Hai wrote:
> >>
> >> This patch supports dump of ring information by its name.
> >> An example using this command is shown below:
> >>
> >> --> /ring/info,MP_mb_pool_0
> >> {
> >>"/ri
20/06/2023 11:03, Bruce Richardson:
> On Tue, Jun 20, 2023 at 10:48:50AM +0200, David Marchand wrote:
> > On Tue, Jun 20, 2023 at 10:45 AM Bruce Richardson
> > wrote:
> > > > > > > I notice the change in behaviour for enabling the deprecated
> > > > > > > libs. Is there
> > > > > > > any other ch
David Marchand writes:
> In repositories where multiple branches run the ABI checks using
> different versions of libabigail (for example, a 22.11 branch using
> libabigail-1.8 and a main branch using libabigail-2.1), a collision
> happens on the libabigail binary cache entry.
> As a single cache
20/06/2023 16:10, Ferruh Yigit:
> On 6/20/2023 2:15 PM, humin (Q) wrote:
> > Hi, Niklas, Ferruh,
> >
> > 在 2023/6/20 19:03, Niklas Söderlund 写道:
> >> Hi Connor and Ferruh,
> >>
> >> On 2023-06-19 09:57:17 +0100, Ferruh Yigit wrote:
> >>> On 6/16/2023 1:00 PM, humin (Q) wrote:
> Hi,
>
> >
This commit generates AES-GCM capability based on the NIC
attributes and enables AES-GCM algo.
An new devarg "algo" is added to identify if the crypto PMD will
be initialized as AES-GCM(algo=1) or AES-XTS(algo=0, default).
Signed-off-by: Suanming Mou
Acked-by: Matan Azrad
---
doc/guides/crypto
The crypto operations are performed with crypto WQE. If the input
buffers(AAD, mbuf, digest) are not contiguous and there is no enough
headroom/tailroom for copying AAD/digest, as the requirement from FW,
an UMR WQE is needed to generate contiguous address space for crypto
WQE. The UMR WQE and cryp
Crypto queue pair is for handling the encryption/decryption operations.
As AES-GCM AEAD API provides AAD, mbuf, digest separately, low-level FW
only accepts the data in a single contiguous memory region, two internal
QPs are created for AES-GCM queue pair. One for organizing the memory
to be conti
Nvidia HW provides a synchronous mechanism between QPs. When
creating the QPs, user can set one as primary and another as
follower. The follower QP's WQE execution can be controlled
by primary QP via SEND_EN WQE.
This commit introduces the SEND_EN WQE to improve the WQE
execution sync-up between p
Sessions are used in symmetric transformations in order to prepare
objects and data for packet processing stage.
The AES-GCM session includes IV, AAD, digest(tag), DEK, operation
mode information.
Signed-off-by: Suanming Mou
Acked-by: Matan Azrad
---
drivers/common/mlx5/mlx5_prm.h| 12
The crypto device requires the DEK(data encryption key) object for
data encryption/decryption operation.
This commit adds the AES-GCM DEK object management support.
Signed-off-by: Suanming Mou
Acked-by: Matan Azrad
---
drivers/crypto/mlx5/mlx5_crypto.h | 17 -
drivers/crypto/mlx5/mlx5
As there will be other crypto algo be supported. This commit splits
AES-XTS code to another *_xts.c file. The mlx5_crypto.c file will
just contain the common code.
Signed-off-by: Suanming Mou
Acked-by: Matan Azrad
---
drivers/crypto/mlx5/meson.build | 1 +
drivers/crypto/mlx5/mlx5_crypt
AES-GCM provides both authenticated encryption and the ability to check
the integrity and authentication of additional authenticated data (AAD)
that is sent in the clear.
This commit adds the AES-GCM attributes query and initialization function.
Signed-off-by: Suanming Mou
Acked-by: Matan Azrad
In case user provides the address without mempool. Export the
function to lookup the address without mempool is required.
Signed-off-by: Suanming Mou
Acked-by: Matan Azrad
---
drivers/common/mlx5/mlx5_common_mr.c | 2 +-
drivers/common/mlx5/mlx5_common_mr.h | 4
drivers/common/mlx5/version
AES-GCM provides both authenticated encryption and the ability to check
the integrity and authentication of additional authenticated data (AAD)
that is sent in the clear.
The crypto operations are performed with crypto WQE. If the input
buffers(AAD, mbuf, digest) are not contiguous and there is no
Added sources were not referenced in the makefile used when compiling
this example externally.
Fixes: 36128a67c27e ("examples/fips_validation: add asymmetric validation")
Fixes: b455d261eb89 ("examples/fips_validation: validate ECDSA")
Cc: sta...@dpdk.org
Signed-off-by: David Marchand
Acked-by:
As DPDK provides examples compiled with makefiles, we need some tests in
the CI. So far, a few maintainers have been testing them but a simple
issue has been missed for some time and there was no way to try to build
all examples that were built with meson.
Additionnally, this series can help in id
On 6/20/2023 2:15 PM, humin (Q) wrote:
> Hi, Niklas, Ferruh,
>
> 在 2023/6/20 19:03, Niklas Söderlund 写道:
>> Hi Connor and Ferruh,
>>
>> On 2023-06-19 09:57:17 +0100, Ferruh Yigit wrote:
>>> On 6/16/2023 1:00 PM, humin (Q) wrote:
Hi,
在 2023/6/16 15:20, Chaoyong He 写道:
> From: Zer
The server_node_efd example contains various binaries whose sources are
in sub directories that do not match their name.
Rename sub directories in this example and stop overriding the binaries
names in meson.build.
This makes a next change easier in the build scripts used by CI.
Signed-off-by: Da
So far, users of test-meson-builds.sh had to define their own set of
examples to build externally. This is not that great because users need
to maintain this list when examples are removed/added.
Rework the script so that the 'all' value triggers an automatic
discovery based on what was configured
Enhance our CI coverage by building examples against an installed DPDK.
Signed-off-by: David Marchand
Acked-by: Bruce Richardson
Acked-by: Aaron Conole
---
Changes since v2:
- dropped unneeded -e in sed cmdline,
Changes since v1:
- reworked built examples discovery,
- added comment for people
On 6/20/23 16:10, Artemii Morozov wrote:
On 6/20/23 15:50, Andrew Rybchenko wrote:
On 6/20/23 12:55, Artemii Morozov wrote:
On 6/19/23 14:28, Andrew Rybchenko wrote:
On 6/13/23 18:12, Artemii Morozov wrote:
To enable VLAN stripping, two conditions must be met:
the corresponding flag must be
From: Suanming Mou
> > -Original Message-
> > From: Akhil Goyal
> > Sent: Tuesday, June 20, 2023 5:59 PM
> > To: Suanming Mou
> > Cc: Raslan Darawsheh ; dev@dpdk.org
> > Subject: RE: [PATCH v2 0/9] crypto/mlx5: support AES-GCM
> >
> > Hi Suanming,
> > > Hi Akhil,
> > >
> > > Maybe due t
In repositories where multiple branches run the ABI checks using
different versions of libabigail (for example, a 22.11 branch using
libabigail-1.8 and a main branch using libabigail-2.1), a collision
happens on the libabigail binary cache entry.
As a single cache entry is used, the content of the
> > Remove side affect from test assertion, to avoid different behaviour in non-
> > debug build. Issues reported by coverity scan.
> >
> > Coverity issue: 385419, 385420
> > Fixes: 6f00462979ad ("test/pdcp: add timer expiry cases")
> >
> > Signed-off-by: Volodymyr Fialko
>
> Acked-by: Anoob Jose
> -Original Message-
> From: Rahul Bhansali
> Sent: Tuesday, June 6, 2023 10:37 AM
> To: dev@dpdk.org; Akhil Goyal ; Anoob Joseph
> ; Volodymyr Fialko
> Cc: Rahul Bhansali
> Subject: [PATCH] test/security: fix event inline IPsec reassembly tests
>
> Event Inline IPsec test suite stuc
Hi, Niklas, Ferruh,
在 2023/6/20 19:03, Niklas Söderlund 写道:
Hi Connor and Ferruh,
On 2023-06-19 09:57:17 +0100, Ferruh Yigit wrote:
On 6/16/2023 1:00 PM, humin (Q) wrote:
Hi,
在 2023/6/16 15:20, Chaoyong He 写道:
From: Zerun Fu
After the mainline Linux kernel commit
"fe205d984e7730f4d21f6f8e
On 6/20/23 15:50, Andrew Rybchenko wrote:
On 6/20/23 12:55, Artemii Morozov wrote:
On 6/19/23 14:28, Andrew Rybchenko wrote:
On 6/13/23 18:12, Artemii Morozov wrote:
To enable VLAN stripping, two conditions must be met:
the corresponding flag must be set and the appropriate
RX prefix should
> Updated SNOW3G and ZUC PMD documentation guides with information
> about the latest library version supported.
>
> Signed-off-by: Ruifeng Wang
Applied to dpdk-next-crypto
Thanks.
On 20/06/2023 12:52, David Marchand wrote:
On Tue, Jun 20, 2023 at 12:32 PM Kevin Traynor wrote:
On 20/06/2023 07:56, David Marchand wrote:
On Tue, Jun 20, 2023 at 8:50 AM Jerin Jacob wrote:
On Tue, Jun 20, 2023 at 2:17 AM David Marchand
wrote:
We forgot to add graph unit tests to the C
> The documentation needs extra steps for customers to explicitly
> show how to install libcrypto, which is needed for QAT.
> It requires the commands to install libcrypto for
> Ubuntu and RHEL.
>
> Signed-off-by: Samina Arshad
Applied to dpdk-next-crypto
Thanks.
> Pre and post computations currently use the OpenSSL library by default.
> This patch changes the default option to Intel IPsec MB library version
> 1.4 for the required computations. If this version of IPsec is not met
> it will fallback to use OpenSSL. ARM will always default to using
> OpenSSL
Hi,
> -Original Message-
> From: Viacheslav Ovsiienko
> Sent: Tuesday, June 13, 2023 7:59 PM
> To: dev@dpdk.org
> Subject: [PATCH v2 0/5] net/mlx5: introduce Tx datapath tracing
>
> The mlx5 provides the send scheduling on specific moment of time,
> and for the related kind of applicatio
On Tue, Jun 20, 2023 at 12:32 PM Kevin Traynor wrote:
>
> On 20/06/2023 07:56, David Marchand wrote:
> > On Tue, Jun 20, 2023 at 8:50 AM Jerin Jacob wrote:
> >>
> >> On Tue, Jun 20, 2023 at 2:17 AM David Marchand
> >> wrote:
> >>>
> >>> We forgot to add graph unit tests to the CI testsuites.
> >
https://bugs.dpdk.org/show_bug.cgi?id=1256
Bug ID: 1256
Summary: drivers/common/mlx5: mlx5_malloc() called on invalid
socket ID when global MR cache is full and
rte_extmem_* API is used
Product: DPDK
Version: 21.1
On 6/20/23 12:55, Artemii Morozov wrote:
On 6/19/23 14:28, Andrew Rybchenko wrote:
On 6/13/23 18:12, Artemii Morozov wrote:
To enable VLAN stripping, two conditions must be met:
the corresponding flag must be set and the appropriate
RX prefix should be requested.
RX -> Rx
VLAN stripping is
On 6/15/2023 9:38 AM, Denis Pryazhennikov wrote:
> This patch series adds setting and querying of Forward error
> correction (FEC). AUTO, BASER and RS modes are supported
> by EF10/EF100 hardware. LLRS mode is not supported.
>
> Changes in v2:
> * Applied review notes in [2/3] and [3/3];
> * Added
On 6/20/23 14:25, Ferruh Yigit wrote:
On 6/2/2023 9:52 AM, Andrew Rybchenko wrote:
On 6/2/23 01:23, Denis Pryazhennikov wrote:
Separate the original link update function into
two functions: state retrieval and update.
This improves code clarity and maintainability.
Signed-off-by: Denis Pryazhe
On 6/15/2023 9:38 AM, Denis Pryazhennikov wrote:
> Added new macros to simplify working with FEC bits.
>
> Signed-off-by: Denis Pryazhennikov
> Reviewed-by: Andy Moreton
> Acked-by: Andrew Rybchenko
> ---
> drivers/common/sfc_efx/base/efx.h | 9 +
> 1 file changed, 9 insertions(+)
>
>
On 6/19/2023 10:39 AM, Andrew Rybchenko wrote:
> On 6/15/23 11:38, Denis Pryazhennikov wrote:
>> Support ethdev methods to query and set FEC information.
>> Limitations: ignoring rte_eth_fec_get_capability() results
>> can lead to NOFEC if the device is not strated.
>>
>> Signed-off-by: Denis Pryaz
On 6/2/2023 9:52 AM, Andrew Rybchenko wrote:
> On 6/2/23 01:23, Denis Pryazhennikov wrote:
>> Separate the original link update function into
>> two functions: state retrieval and update.
>> This improves code clarity and maintainability.
>>
>> Signed-off-by: Denis Pryazhennikov
>> Reviewed-by: Iv
On 6/20/2023 4:02 AM, humin (Q) wrote:
> 在 2023/6/8 10:59, Chaoyong He 写道:
>> From: Long Wu
>>
>> Bonding port in mode 4 enables dedicated queues, we
>> will create a flow for this feature. So we need to
>> destroy this flow when we remove the member port.
>>
>> Furthermore if we don't destroy th
Hi
> -Original Message-
> From: Jerin Jacob
> Sent: Tuesday, June 20, 2023 8:07 AM
>
> On Tue, Jun 20, 2023 at 7:22 AM Zhang, Qi Z wrote:
> >
> >
> >
> > > -Original Message-
> > > From: Jerin Jacob
> > > Sent: Monday, June 19, 2023 5:52 PM
> > > To: Zhang, Qi Z
> > > Cc: Dumi
As reported by Ilya [1], unconditionally calling
rte_flow_get_restore_info() impacts an application performance for drivers
that do not provide this ops.
It could also impact processing of packets that require no call to
rte_flow_get_restore_info() at all.
Register a dynamic mbuf flag when an appl
https://bugs.dpdk.org/show_bug.cgi?id=1255
Bug ID: 1255
Summary: [asan] net/mlx5: memory leak on port cleanup
Product: DPDK
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Hi Connor and Ferruh,
On 2023-06-19 09:57:17 +0100, Ferruh Yigit wrote:
> On 6/16/2023 1:00 PM, humin (Q) wrote:
> > Hi,
> >
> > 在 2023/6/16 15:20, Chaoyong He 写道:
> >> From: Zerun Fu
> >>
> >> After the mainline Linux kernel commit
> >> "fe205d984e7730f4d21f6f8ebc60f0698404ac31" (ACPI: Remove s
From: Satheesh Paul
When creating a flow rule directing traffic from PF
to VF, current validation is incorrectly checking the
RQ index in flow action with the PF's maximum
configured RQs. This validation is applicable only
when action target is an RQ of the PF. The validation
has been modified ac
Applied to dpdk-next-crypto
Thanks.
Applied to dpdk-next-crypto
Thanks.
On 6/20/2023 11:07 AM, Jie Hai wrote:
> On 2023/6/9 19:10, Ferruh Yigit wrote:
>> On 6/9/2023 10:03 AM, Jie Hai wrote:
>>> Here's how the problem arises.
>>> step1: Start the app.
>>> dpdk-testpmd -a :35:00.0 -l 0-3 -- -i --rxq=10 --txq=10
>>>
>>> step2: Perform the following steps and sen
Pre and post computations currently use the OpenSSL library by default.
This patch changes the default option to Intel IPsec MB library version
1.4 for the required computations. If this version of IPsec is not met
it will fallback to use OpenSSL. ARM will always default to using
OpenSSL as ARM IPs
> Subject: [PATCH 1/3] examples/ipsec-secgw: avoid error pkt prints in fast path
>
> Avoid printing errors due to bad packets in fast path as it
> effects performance. Make them RTE_LOG_DP() instead.
> Also print the actual ptype that is used to classify the pkt.
>
> Signed-off-by: Nithin Dabilpu
Added RSA NONE padding test cases.
Signed-off-by: Arkadiusz Kusztal
---
app/test/test_cryptodev_asym.c | 205 +++
app/test/test_cryptodev_rsa_test_vectors.h | 220 +
2 files changed, 425 insertions(+)
diff --git a/app/test/test_cryptodev_asym.c b/
Added modular exponentiation and modular inverse
tests to the asymmetric crypto testsuite.
Signed-off-by: Arkadiusz Kusztal
---
app/test/test_cryptodev_asym.c | 152 +++--
app/test/test_cryptodev_mod_test_vectors.h | 123 +
2 files changed, 263 inserti
Removed function `one by one` as it was not enough
scalable and robust.
Signed-off-by: Arkadiusz Kusztal
---
app/test/test_cryptodev_asym.c | 418 --
app/test/test_cryptodev_mod_test_vectors.h | 925 -
app/test/test_cryptodev_rsa_test_vectors.h | 224 -
This patchset removes obsolete test cases for RSA, MOD EXP, MOD INV.
Doing that, new way of handling ut_setup and ut_teardown was proposed.
Now both behave like constructor/desctuctor in the unit tests.
It frees particular alghorithm functions from any kind of responsibility to
free resources for
> Subject: [PATCH] examples/ipsec-secgw: fix AES-CTR IV length
>
> Set AES-CTR IV length to 8 in SA config as it is
> used for per packet IV length and set it to 16
> in xform since the application populates 16B IV
> in the datapath. AES-CTR requires 16B IV
> constructed from nonce and counter.
>
On 20/06/2023 07:56, David Marchand wrote:
On Tue, Jun 20, 2023 at 8:50 AM Jerin Jacob wrote:
On Tue, Jun 20, 2023 at 2:17 AM David Marchand
wrote:
We forgot to add graph unit tests to the CI testsuites.
Signed-off-by: David Marchand
Could we add Fixes: ?
Either way,
Acked-by: Jerin Jac
> This commit adds SM3 HMAC to Intel QuickAssist Technology PMD
> generation 3 and 4 devices.
>
> Signed-off-by: Arkadiusz Kusztal
> Acked-by: Ciara Power
Fix your .gitconfig to have uniform author name and signoff names.
Applied to dpdk-next-crypto
Thanks.
> Subject: [PATCH v3 0/8] fixes and improvements to CNXK crypto PMD
>
> This series adds SM4, raw cryptodev API support and
> fixes to CNXK crypto PMD.
>
> v3:
> * Updated feature file for cn10k
Series applied to dpdk-next-crypto
Had just applied your v2 with the doc changes and few title update
From: Gowrishankar Muthukrishnan
Fix order of ECFPM parameters.
Fixes: 76618fc4bef ("crypto/cnxk: fix order of ECFPM parameters")
Signed-off-by: Gowrishankar Muthukrishnan
---
drivers/crypto/cnxk/cnxk_ae.h | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/drivers/crypto/cn
From: Vidya Sagar Velumuri
Add support for SM4 cipher
Support for modes: SM4_CBC, SM4_ECB, SM4_CTR, SM4_OFB, SM4_CFB
Signed-off-by: Vidya Sagar Velumuri
---
doc/guides/cryptodevs/cnxk.rst| 1 +
doc/guides/cryptodevs/features/cn10k.ini | 5 +
doc/guides/rel_notes/releas
From: Anoob Joseph
Enable raw crypto tests with crypto_cn10k.
Signed-off-by: Anoob Joseph
---
app/test/test_cryptodev.c | 8
1 file changed, 8 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index fb2af40b99..2ba37ed4bd 100644
--- a/app/test/test_cryp
From: Anoob Joseph
Add crypto RAW API support in cnxk PMD
Enable the flag to allow execution of raw test suite.
Signed-off-by: Vidya Sagar Velumuri
Signed-off-by: Anoob Joseph
---
doc/guides/cryptodevs/features/cn10k.ini | 1 +
doc/guides/rel_notes/release_23_07.rst| 1 +
drivers/cry
Enabling context cache for SE instructions on 106B0
and 103XX.
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 6 +++---
drivers/crypto/cnxk/cnxk_cryptodev_ops.h | 8
2 files changed, 11 insertions(+), 3 deletions(-)
diff --git a/drivers/crypto/cnxk/cnxk_c
From: Aakash Sasidharan
Use passthrough instruction for NULL cipher with NULL
auth combination.
Signed-off-by: Aakash Sasidharan
---
drivers/crypto/cnxk/cnxk_cryptodev_ops.c | 20
drivers/crypto/cnxk/cnxk_se.h| 59
2 files changed, 50 insertions(+)
From: Anoob Joseph
When performing crypto offload, the packet length of the input/output
buffer does not matter. The length that matters is the
cipher/authentication range specified in crypto_op. Since application
can request for ciphering of a small portion of the buffer, the extra
comparison of
Checking for NULL pointer dereference.
Signed-off-by: Tejasree Kondoj
---
drivers/crypto/cnxk/cnxk_se.h | 14 --
1 file changed, 8 insertions(+), 6 deletions(-)
diff --git a/drivers/crypto/cnxk/cnxk_se.h b/drivers/crypto/cnxk/cnxk_se.h
index c66ab80749..a85e4c5170 100644
--- a/drive
This series adds SM4, raw cryptodev API support and
fixes to CNXK crypto PMD.
v3:
* Updated feature file for cn10k
v2:
* Fixed documentation build failure
* Updated release notes
Aakash Sasidharan (1):
crypto/cnxk: use pt inst for null cipher with null auth
Anoob Joseph (3):
crypto/cnxk: re
1 - 100 of 154 matches
Mail list logo