Since some specific rss hash type need to combine with the protocol
hash type when configure a rss hash rule, so add the corresponding
input set to support these case for iavf hash.
Fixes: 7be10c3004be ("net/iavf: add RSS configuration for VF")
Signed-off-by: Jeff Guo
---
v2->v1:
use nonfrag for
Since some specific rss hash type need to combine with the protocol
hash type when configure a rss hash rule, so add the corresponding
input set to support these case for iavf hash.
Fixes: 7be10c3004be ("net/iavf: add RSS configuration for VF")
Signed-off-by: Jeff Guo
---
v2->v1:
use nonfrag for
> -Original Message-
> From: Guo, Jia
> Sent: Sunday, May 10, 2020 3:30 AM
> To: Xing, Beilei ; Zhang, Qi Z ;
> Wu, Jingjing
> Cc: Iremonger, Bernard ; Ye, Xiaolong
> ; dev@dpdk.org; Guo, Jia
> Subject: [dpdk-dev v2] net/iavf: fix input set for rss hash
>
> Since some specific rss ha
Hi, guinan
In this patch, you have add a new parameter of mac_ctrl_frame_fwd, it should
not be clear in ixgbe_dev_stop(),
Or it will be over write when do port reset, and also you should add
mac_ctrl_frame_fwd in ixgbe_flow_ctrl_get() for FC info get.
Although this patch has been merged, please
The function of rte_ipv4_cksum for calculating the checksum of IPv4 header is
incorrect. This function will return checksum value like 0x. This value,
however, is considered an illegal checksum on some switches(like Trident3).
RFC 1624 specifies the IPv4 checksum as follows:
https://tools.iet
When configure rss rule, the etherdev rss hash function type should be
mapped to the corresponding virtchnl rss algorithm type.
Fixes: 7be10c3004be ("net/iavf: add RSS configuration for VF")
Signed-off-by: Jeff Guo
---
drivers/net/iavf/iavf_hash.c | 20 +++-
1 file changed, 11 in
Hi ,zhaowei
> -Original Message-
> From: Zhao1, Wei
> Sent: Saturday, May 9, 2020 3:35 PM
> To: Sun, GuinanX ; dev@dpdk.org
> Cc: Lu, Wenzhuo ; Yang, Qiming
> ; Zhang, Qi Z ; Sun, GuinanX
> ; sta...@dpdk.org; Guo, Jia
> Subject: RE: [dpdk-dev] [PATCH v4] net/ixgbe: fix flow ctrl mode sett
Hi,guinan
More info for this problem:
If some user set mac_ctrl_frame_fwd to 1 from fc ops, then he do a port reset
process of
"
1. testpmd> start
2. testpmd> set flow_ctrl mac_ctrl_frame_fwd on 0
3. testpmd> stop
4. testpmd> port stop 0
5. testpmd> port start 0
6. testpmd> start
"
Then a
Hi, zhaowei
> -Original Message-
> From: Zhao1, Wei
> Sent: Saturday, May 9, 2020 5:30 PM
> To: Sun, GuinanX ; dev@dpdk.org
> Cc: Lu, Wenzhuo ; Yang, Qiming
> ; Zhang, Qi Z ;
> sta...@dpdk.org; Guo, Jia
> Subject: RE: [dpdk-dev] [PATCH v4] net/ixgbe: fix flow ctrl mode setting
>
> Hi,gui
Hi,guinan
More info for this problem:
If some user set mac_ctrl_frame_fwd to 1 from fc ops, then he do a port reset
process of
"
1. testpmd> start
2. testpmd> set flow_ctrl mac_ctrl_frame_fwd on 0
3. testpmd> stop
4. testpmd> port stop 0
5. testpmd> port start 0
6. testpmd> start
"
https://bugs.dpdk.org/show_bug.cgi?id=470
Bug ID: 470
Summary: vmxnet3 pmd cannot received icmp6 ns packet
Product: DPDK
Version: 16.04
Hardware: x86
OS: Linux
Status: UNCONFIRMED
Severity: normal
>
> Update QAT pmd to support AES-256 DOCSIS
>
> Signed-off-by: Mairtin o Loingsigh
> ---
> doc/guides/rel_notes/release_20_05.rst | 4
> 1 file changed, 4 insertions(+)
>
This patch does not add the DOCSIS support in QAT.
The release note update should be the part of the patch which i
> -Original Message-
> From: wangyunjian
> Sent: Sunday, April 26, 2020 6:31 PM
> To: dev@dpdk.org
> Cc: Gagandeep Singh ; Hemant Agrawal
> ; jerry.lili...@huawei.com;
> xudin...@huawei.com; Yunjian Wang ;
> sta...@dpdk.org
> Subject: [dpdk-dev] [PATCH] crypto/caam_jr: fix wrong check o
Hi Pablo,
> +#if IMB_VERSION_NUM >= IMB_VERSION(0, 53, 3)
> + processed_ops = process_zuc_hash_op_mb(qp, ops, sessions,
> + num_ops);
> +#else
> processed_ops = process_zuc_hash_op(qp, ops, sessions,
> num_ops);
>
Hi Ray/Arek,
I still see Incompatible cryptodev even after update in the abignore list.
I checked it with ./devtools/validate-abi.sh
NOTICE: ABI may be incompatible, check reports/logs for details.
NOTICE: Incompatible list: librte_cryptodev.so
Did I miss something?
>
> On 07/05/2020 11:57, A
>
> Fixes: 4935e1e9f76e ("bbdev: introduce wireless base band device lib")
Cc:sta...@dpdk.org
>
> Several doxygen markup were incorrect in header files.
>
> Signed-off-by: Nicolas Chautru
Acked-by: Akhil Goyal
Applied to dpdk-next-crypto
Thanks.
>
> Check if session is valid after getting operation
> out of the internal IPSec MB manager, in case the
> session has been freed while the operation was still
> inside the manager.
>
> Signed-off-by: Pablo de Lara
> ---
Applied to dpdk-next-crypto
Thanks.
> >
> > Add new test-case to measure performance of
> > ipsec data-path functions.
> >
> > Signed-off-by: Savinay Dharmappa
> > ---
>
> Tested-by: Konstantin Ananyev
> Acked-by: Konstantin Ananyev
>
Applied to dpdk-next-crypto
>
> After re-enabling checks for non-implemneted ops in non-debug mode
> in librte_security set_pkt_metadata and get_userdata functions,
> tests verifying proper work of tests can be enabled also.
>
> Signed-off-by: Lukasz Wojciechowski
> ---
Acked-by: Akhil Goyal
Applied to dpdk-next-crypto
> When adding support for DOCSIS AES-256,
> when setting the cipher parameters, all key sizes
> were accepted, but only 128-bit and 256-bit keys
> are supported.
>
> Fixes: 124d04b43743 ("crypto/aesni_mb: support DOCSIS AES-256")
>
> Signed-off-by: Pablo de Lara
> Acked-by: Mairtin o Loingsigh
> >
> > For SA outbound packets, rte_atomic64_add_return is used to generate
> > SQN atomically. Use c11 atomics with RELAXED ordering for outbound SQN
> > update instead of rte_atomic ops which enforce unnecessary barriers on
> > aarch64.
> >
> > Signed-off-by: Phil Yang
> > Reviewed-by: Ruifen
>
> Acked-by: Ravi Kumar
Applied to dpdk-next-crypto
Thanks.
> > This patch disables displaying sample test vector contents when
> > executing throughput and latency tests as the sample data is not
> > used in those tests (not copied to input mbuf in order to achieve
> > better performance).
> >
> > Fixes: f8be1786b1b8 ("app/crypto-perf: introduce performanc
> > Offset of cd pointer is too big by state1size + state2size, so few extra
> > unnecessary bytes will be copied into cd. Snow offset was improved as well.
> >
> > Fixes: d9b7d5bbc845 ("crypto/qat: add ZUC EEA3/EIA3 capability")
> > Cc: sta...@dpdk.org
> >
> > Signed-off-by: Arek Kusztal
> Acked-
> > As more test cases are defined for execution, test scripts structure
> > needs to be reorganized, so fewer files are needed to describe the test.
> > To achieve that, new environment variables are incorporated into the
> > scripts.
> > Additionally, tests for mixed tunnel protocols are added.
>
> Tested-by: Zhao, Xinfeng
>
Applied to dpdk-next-crypto
Thanks.
Hi Lukasz,
Thanks for the detailed analysis.
Series
Acked-by: Akhil Goyal
Applied to dpdk-next-crypto
Thanks.
>
> This patch fixes management of memory for authentication
> and encryption keys.
> There were two issues with former state of implementation:
>
> 1) Invalid access to dpaa_sec_sess
> > >
> > > For null cipher the iv length should be set to zero.
> > >
> > > Signed-off-by: Ankur Dwivedi
> >
> > Acked-by: Anoob Joseph
> Acked-by: Fiona Trahe
Title should start from test/crypto:..
Applied to dpdk-next-crypto
Thanks.
> gcc 10 defaults to fno-common and it reports:
>
> crypto_kasumi_rte_kasumi_pmd_ops.c.o:(.data.rel+0x0):
> multiple definition of `rte_kasumi_pmd_ops';
> crypto_kasumi_rte_kasumi_pmd.c.o:(.bss+0x8): first defined here
>
> Fix by making rte_kasumi_pmd_ops extern in the header file.
>
> Fixes: 27
> > Function create_ipsec_esp_flow returns a negative number in case of any
> failure
> > and we are passing this to strerror to display the error message.
> > But strerror()'s argument cannot be negative.
> > In case of failure, displaying exact error message to console is handled in
> > create_ip
> > This patch fixes enqueued and dequeued count statistics that should
> > contain the numer of operations enqueued by the end user app
> > instead of the total number of QAT requests - bigger in case of
> > a multiple-request dynamic Huffman compression operation.
> >
> > Fixes: c13cecf60f12 ("co
> > This patch fixes Coverity issue #357770 by removing the non-essential
> > check for NULL pointer.
> >
> > Fixes: c13cecf60f12 ("compress/qat: support IM buffer too small operation")
> >
> > Signed-off-by: Adam Dybkowski
> Acked-by: Fiona Trahe
The title should showcase the actual issue fixed
> >
> > Few of the NIST TDES test files don't contain TDES string.
> > Added indicators to identify such files. These indicators are part of only
> > NIST
> > TDES test vector files.
> >
> > Fixes: 527cbf3d5ee3 ("examples/fips_validation: support TDES parsing")
> >
> > Signed-off-by: Archana Munig
> The session init routine rte_cryptodev_sym_session_init(),
> could return -ENOTSUP when the requested algo combination
> is not supported by the PMD. This should be treated as
> unsupported features. For other return values like -EINVAL
> or -ENOMEM the test can be treated as failure.
>
> Signed
The return values in cases of errors were not
specified properly. With this patch appropriate
error numbers are returned.
Signed-off-by: Akhil Goyal
---
Changes in v3: some return values were missed. It is now updated
drivers/crypto/dpaa2_sec/dpaa2_sec_dpseci.c | 120 +++-
1 fil
The return values in cases of errors were not
specified properly. With this patch appropriate
error numbers are returned.
Signed-off-by: Akhil Goyal
---
Changes in v3: some return values were missed. It is now updated
drivers/crypto/dpaa_sec/dpaa_sec.c | 46 --
1 fil
Some wireless algos like SNOW, ZUC may support input
data in bits which are not byte aligned. However, not
all PMDs can support this requirement. Hence added a
new feature flag RTE_CRYPTODEV_FF_NON_BYTE_ALIGNED_DATA
to identify which all PMDs can support non-byte aligned
data.
Signed-off-by: Akhil
Skipped the test cases for the PMDs which do not support
RTE_CRYPTODEV_FF_NON_BYTE_ALIGNED_DATA and subsequently
removed the PMD specific checks for running that case.
Signed-off-by: Apeksha Gupta
Signed-off-by: Akhil Goyal
---
app/test/test_cryptodev.c | 68 +---
Certain cases were put in PMD specific checks which
should be avoided. Appropriate capability/supported
feature flag should be checked before executing the
test case.
Added 1 missing feature flag for non-byte aligned data
Enabled it for SNOW/ZUC/KASUMI PMDs.
All the PMD owners are requested to veri
The session init routine rte_cryptodev_sym_session_init(),
could return -ENOTSUP when the requested algo combination
is not supported by the PMD. This should be treated as
unsupported feature.
Signed-off-by: Akhil Goyal
---
app/test/test_cryptodev.c | 2 ++
1 file changed, 2 insertions(+)
diff
There were some PMD specific checks to skip the case if
it is not supported. This patch checks the feature flag
RTE_CRYPTODEV_FF_SYM_SESSIONLESS if PMD supports it or not.
Signed-off-by: Apeksha Gupta
Signed-off-by: Akhil Goyal
---
app/test/test_cryptodev.c | 24 ++--
1 file
cryptodevs which support rte_security PDCP protocol,
can run all PDCP cases if it sets a feature flag
RTE_CRYPTODEV_FF_SECURITY. Previously, only dpaa2_sec
and dpaa_sec test suites were running these tests.
Now it is moved to generic test suite with a check
on the feature flag and the case will be
Checked the PMD feature flag list to identify if
inplace or OOP SGLs are supported or not. If not supported
the cases are skipped.
Signed-off-by: Apeksha Gupta
Signed-off-by: Akhil Goyal
---
app/test/test_cryptodev.c | 13 +
1 file changed, 13 insertions(+)
diff --git a/app/test/te
In test_queue_pair_descriptor_setup() and
test_device_configure_invalid_queue_pair_ids a QAT specific
check is there, however the test case can be run on any PMD.
Hence removed the unnecessary check.
test_queue_pair_descriptor_setup and
test_device_configure_invalid_queue_pair_ids execution
need t
dev info is set but not used in
test_queue_pair_descriptor_setup().
Signed-off-by: Akhil Goyal
---
app/test/test_cryptodev.c | 4
1 file changed, 4 deletions(-)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index aa9eda5e5..c624018ee 100644
--- a/app/test/test_cryptode
dpaa_sec and dpaa2_sec PMDs can run generic
cryptodev_testsuite. Hence removing the specific
test suites.
Signed-off-by: Apeksha Gupta
Signed-off-by: Akhil Goyal
---
app/test/test_cryptodev.c | 534 +-
1 file changed, 2 insertions(+), 532 deletions(-)
diff -
Hi Ruifeng,
>
> Tested on armv8 platform.
> armv8 PMD and null PMD are OK.
> cryptodev_openssl_autotest has a failure.
I have added a workaround to fix the openssl failure in v2. It is caused by the
8/9 patch
Of the patchset due to some dependency. I have altered the execution of two
tests
And
Hi Yunjian,
> -Original Message-
> From: Gagandeep Singh
> Sent: Saturday, May 9, 2020 11:14 PM
> To: wangyunjian ; dev@dpdk.org; Akhil Goyal
>
> Cc: Hemant Agrawal ; jerry.lili...@huawei.com;
> xudin...@huawei.com; sta...@dpdk.org
> Subject: RE: [dpdk-dev] [PATCH] crypto/caam_jr: fix wro
48 matches
Mail list logo