> -Original Message-
> From: Xu, Ting
> Sent: Monday, April 18, 2022 2:59 PM
> To: dev@dpdk.org
> Cc: Guo, Junfeng ; Xu, Ting ;
> sta...@dpdk.org; Yang, Qiming ; Zhang, Qi Z
>
> Subject: [PATCH v3] net/ice: fix raw flow input pattern value change in FDIR
>
> When parsing raw flow patt
Hi Michal/DPDK-Experts,
I am facing one issue in net/ena driver while fetching extended stats
(xstats). The DPDK seems to segfault with below backtrace.
DPDK Version: 20.11.1
ENA version: 2.2.1
Using host libthread_db library "/lib64/libthread_db.so.1".
Core was generated by `/opt/dpfs/usr/loc
https://bugs.dpdk.org/show_bug.cgi?id=996
Bug ID: 996
Summary: PDK:20.11.1: net/ena crash while fetching xstats
Product: DPDK
Version: 20.11
Hardware: x86
OS: Linux
Status: UNCONFIRMED
Severity: major
In packets with ESP header, The Inner IP will be encrypted, and
its fields cannot be used for RSS hashing. So, ESP packets
can be hashed only by the outer IP layer.
So, when using RSS on ESP packets, hashing may not be efficient,
because the fields used by the hash functions are only the Outer IPs,
In packets with ESP header, The Inner IP will be encrypted, and
its fields cannot be used for RSS hashing. So, ESP packets
can be hashed only by the outer IP layer.
So, when using RSS on ESP packets, hashing may not be efficient,
because the fields used by the hash functions are only the Outer IPs,
In case of a probing failure caused by wrong devarg provided,
login isn't destroyed when exiting.
Destroy login on failure.
Fixes: ba707cdb6da2 ("crypto/mlx5: fix queue size configuration")
Signed-off-by: Raja Zidane
Acked-by: Matan Azrad
---
drivers/crypto/mlx5/mlx5_crypto.c | 1 +
1 file ch
Using crypto devs requires the user to log in and the supplied DEK to be
encrypted with a KEK (keys encryption key).
KEK is burned once on the nic, along with credentials for users,
and for a user to log in, he is needed to supply his creds wrapped with
the KEK.
A device comes out of the Mellanox f
Using crypto devs requires the user to log in and the supplied DEK to be
encrypted with a KEK (keys encryption key).
KEK is burned once on the nic, along with credentials for users,
and for a user to log in, he is needed to supply his creds wrapped with
the KEK.
A device comes out of the Mellanox f
Crypto capabilities struct contains info about crypto import method
(wrapped/plaintext DEK) for each of the supported algorithms.
Query crypto capabilities struct and save import methods.
Signed-off-by: Raja Zidane
---
drivers/common/mlx5/mlx5_devx_cmds.c | 13 +++--
drivers/common/mlx5
> -Original Message-
> From: Stephen Hemminger
> Sent: Friday, April 15, 2022 8:30 PM
> To: Ferruh Yigit
> Cc: Gagandeep Singh ; Harold Huang
> ; dev@dpdk.org
> Subject: Re: [PATCH] kni: update kernel API to receive packets
>
> On Fri, 15 Apr 2022 13:30:33 +0100
> Ferruh Yigit wrote:
Hello DPDK community,
We are looking into an issue where we pass an invalid command line argument to
a vdev, and we print out an error message but don't exit. This is an issue
with all of the command line options that we handle in dlb2_parse_params(). In
a nutshell, it looks like when we enco
I am currently in the process of trying to embed DPDK into a project
utilizing meson's subproject so have some interest in this patch now. To
Bruce's question, I believe default_library parameter that would be passed
when including the subproject would correctly handle flipping between
static and
+ Megha, Sharad and Eswar.
On Mon, Apr 18, 2022 at 2:03 PM Amiya Mohakud
wrote:
> Hi Michal/DPDK-Experts,
>
> I am facing one issue in net/ena driver while fetching extended stats
> (xstats). The DPDK seems to segfault with below backtrace.
>
> DPDK Version: 20.11.1
> ENA version: 2.2.1
>
>
> Us
For using event crypto metadata, event metadata need to be set
in session. For this session user data was used for symmetric
crypto sessions and no support was present for asymmetric and
security sessions.
The use of userdata to store event metadata (which is dereferenced
in PMD) is not correct as
From: Volodymyr Fialko
Currently, crypto session userdata is used to set event crypto
metadata from the application and the driver is dereferencing it
in driver which is not correct. User data is meant to be opaque
to the driver.
To support this, new API is added to get and set event crypto
metad
From: Volodymyr Fialko
Added cryptodev operation for setting event crypto
metadata for all supported sessions - sym/asym/security.
Signed-off-by: Volodymyr Fialko
Signed-off-by: Akhil Goyal
---
drivers/crypto/cnxk/cn10k_cryptodev_ops.c | 144 +++---
drivers/crypto/cnxk/cn10k_i
For getting event crypto metadata from crypto_op,
the new API rte_cryptodev_get_session_event_mdata can be used
directly instead of getting userdata inside PMD.
Signed-off-by: Akhil Goyal
---
drivers/crypto/octeontx/otx_cryptodev_ops.c | 20 +---
1 file changed, 1 insertion(+), 1
Used the new API rte_cryptodev_set_session_event_mdata to set
event crypto metadata from the applications (app/test and
app/test-eventdev) instead of using session userdata.
Signed-off-by: Akhil Goyal
---
app/test-eventdev/test_perf_common.c | 8 ++--
app/test/test_event_crypto_adapter.c |
For getting event crypto metadata from crypto_op,
the new API rte_cryptodev_get_session_event_mdata is used
instead of getting userdata inside PMD.
Signed-off-by: Akhil Goyal
---
lib/eventdev/rte_event_crypto_adapter.c | 55 ++---
1 file changed, 12 insertions(+), 43 deletion
Test app is updated to add cases for asymmetric crypto
sessions for event crypto adapter.
Signed-off-by: Akhil Goyal
---
app/test/test_event_crypto_adapter.c | 491 ++-
1 file changed, 485 insertions(+), 6 deletions(-)
diff --git a/app/test/test_event_crypto_adapter.c
b
Test eventdev app is updated to add new option for asymmetric
crypto ops for event crypto adapter.
Signed-off-by: Akhil Goyal
---
app/test-eventdev/evt_common.h | 2 +
app/test-eventdev/evt_options.c | 17 ++
app/test-eventdev/evt_options.h | 4 +
app/test-eventdev/test_perf
Hi Abhinandan and others,
> We may need to stick to the approach introduced in this patch only.
> As if we propose, a new single API for all type of sessions, the driver would
> need
> to
> Get the event metadata from the session private data. This is not possible
> with
> Your use case which get
> -Original Message-
> From: Wang, Haiyue
> Sent: Thursday, April 14, 2022 8:11 AM
> To: Jeff Daly ; dev@dpdk.org
> Cc: sta...@dpdk.org
> Subject: RE: [PATCH v6 2/2] net/ixgbe: Fix SFP detection and linking on
> hotplug
>
> Caution: This is an external email. Please take care when clic
This series of patches add the following updates and bug fixes to
the cxgbe PMD.
Patch 1 fixes an issue with wrong port id being filled in mbufs
allocated in Rx path.
Patch 2 fixes an issue with Txq getting stuck when trying to coalesce
mbufs with chains.
Patch 3 reworks and simplifies the code
Fill the correct DPDK ethdev port_id, instead of local adapter
physical port_id in mbufs allocated for Rx.
Fixes: 78fc1a716ae8 ("cxgbe: improve Rx performance")
Cc: sta...@dpdk.org
Signed-off-by: Rahul Lakkireddy
---
drivers/net/cxgbe/sge.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
When trying to coalesce mbufs with chain on Tx side, it is possible
to get stuck during queue wrap around. When coalescing this mbuf
chain fails, the Tx path returns EBUSY and when the same packet
is retried again, it couldn't get coalesced again, and the loop
repeats. Fix by pushing the packet thr
Match the closest supported Rx payload buffer size with the mempool
data size and program it for the Rx queue. This removes unnecessary
need for handling additional padding, packing, and alignment, when
posting Rx buffers to hardware.
Signed-off-by: Rahul Lakkireddy
---
drivers/net/cxgbe/base/ad
Rx packets can get dropped at TP due to congestion and this info
will not get propagated to MPS. Track these Rx dropped packets
in imissed counter. Also add xstats for these counters.
Signed-off-by: Rahul Lakkireddy
---
drivers/net/cxgbe/base/common.h | 2 ++
drivers/net/cxgbe/base/t4_hw.c |
Add support to read firmware configuration file from
/lib/firmware/cxgb4/ path in the filesystem.
Signed-off-by: Rahul Lakkireddy
---
drivers/net/cxgbe/base/t4fw_interface.h | 1 +
drivers/net/cxgbe/cxgbe_main.c | 329
2 files changed, 217 insertions(+), 113 d
> -Original Message-
> From: Jeff Daly
> Sent: Tuesday, April 19, 2022 05:55
> To: Wang, Haiyue ; dev@dpdk.org
> Cc: sta...@dpdk.org
> Subject: RE: [PATCH v6 2/2] net/ixgbe: Fix SFP detection and linking on
> hotplug
>
>
>
> > -Original Message-
> > From: Wang, Haiyue
> > Sent
This patch set adds queue rate limit and quanta size configuration.
Quanta size can be changed by driver devarg quanta_size=xxx. Quanta
size should be set to the value between 256 and 4096 and be the product
of 64.
v2: Rework virtchnl.
v3: Add release note.
v4: Quanta size configuration will block
This patch adds new virtchnl opcodes and structures for rate limit
and quanta size configuration, which include:
1. VIRTCHNL_OP_CONFIG_QUEUE_BW, to configure max bandwidth for each
VF per queue.
2. VIRTCHNL_OP_CONFIG_QUANTA, to configure quanta size per queue.
Signed-off-by: Ting Xu
Signed-off-by
This patch adds queue rate limit configuration support.
Only max bandwidth is supported.
Signed-off-by: Ting Xu
Signed-off-by: Wenjun Wu
---
drivers/net/iavf/iavf.h | 13 +++
drivers/net/iavf/iavf_tm.c| 190 --
drivers/net/iavf/iavf_vchnl.c | 23
This patch adds quanta size configuration support.
Quanta size should between 256 and 4096, and be a product of 64.
Signed-off-by: Wenjun Wu
---
drivers/net/iavf/iavf.h| 3 +++
drivers/net/iavf/iavf_ethdev.c | 38 ++
drivers/net/iavf/iavf_vchnl.c | 31 ++
Add driver guide and update the release notes for
quanta size configuration.
Signed-off-by: Wenjun Wu
---
doc/guides/nics/intel_vf.rst | 4
doc/guides/rel_notes/release_22_07.rst | 4
2 files changed, 8 insertions(+)
diff --git a/doc/guides/nics/intel_vf.rst b/doc/guides/nic
> -Original Message-
> From: Wu, Wenjun1
> Sent: Tuesday, April 19, 2022 10:06 AM
> To: dev@dpdk.org; Wu, Jingjing ; Xing, Beilei
> ; Zhang, Qi Z
> Subject: [PATCH v5 0/4] Enable queue rate limit and quanta size configuration
>
> This patch set adds queue rate limit and quanta size co
https://bugs.dpdk.org/show_bug.cgi?id=997
Bug ID: 997
Summary: PANIC in rte_eal_init
Product: DPDK
Version: 21.11
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: major
Priority: Normal
From: Zhichao Zeng
Promote the MDIO APIs to be stable.
Signed-off-by: Zhichao Zeng
---
drivers/net/ixgbe/rte_pmd_ixgbe.h | 5 -
drivers/net/ixgbe/version.map | 10 +-
2 files changed, 5 insertions(+), 10 deletions(-)
diff --git a/drivers/net/ixgbe/rte_pmd_ixgbe.h
b/drivers/n
From: Xuan Ding
The presence of asynchronous path allows applications to offload memory
copies to DMA engine, so as to save CPU cycles and improve the copy
performance. This patch set implements vhost async dequeue data path
for split ring. The code is based on latest enqueue changes [1].
This p
From: Xuan Ding
This patch extracts the descriptors to buffers filling from
copy_desc_to_mbuf() into a dedicated function. Besides, enqueue
and dequeue path are refactored to use the same function
sync_fill_seg() for preparing batch elements, which simplifies
the code without performance degradat
From: Xuan Ding
This patch refactors vhost async enqueue path and dequeue path to use
the same function async_fill_seg() for preparing batch elements,
which simplifies the code without performance degradation.
Signed-off-by: Xuan Ding
---
lib/vhost/virtio_net.c | 23 +++
1
From: Xuan Ding
This patches refactors copy_desc_to_mbuf() used by the sync
path to support both sync and async descriptor to mbuf filling.
Signed-off-by: Xuan Ding
---
lib/vhost/vhost.h | 1 +
lib/vhost/virtio_net.c | 48 --
2 files changed, 38 in
From: Xuan Ding
This patch implements asynchronous dequeue data path for vhost split
ring, a new API rte_vhost_async_try_dequeue_burst() is introduced.
Signed-off-by: Xuan Ding
Signed-off-by: Yuan Wang
---
doc/guides/prog_guide/vhost_lib.rst| 7 +
doc/guides/rel_notes/release_22_07.rst
From: Xuan Ding
This patch adds the use case for async dequeue API. Vswitch can
leverage DMA device to accelerate vhost async dequeue path.
Signed-off-by: Wenwu Ma
Signed-off-by: Yuan Wang
Signed-off-by: Xuan Ding
---
doc/guides/sample_app_ug/vhost.rst | 9 +-
examples/vhost/main.c
Minutes of Technical Board Meeting, 2022-April-06
Members Attending
-
-Aaron
-Bruce
-Ferruh
-Hemant
-Honnappa
-Jerin (Chair)
-Kevin
-Konstantin
-Maxime
-Olivier
-Stephen
-Thomas
NOTE: The technical board meetings are on every second Wednesday at
https://meet.jit.si/DPDK at 3 pm U
From: Subrahmanyam Nilla
Currently only base channel number is configured as default
channel for all the SDP send queues. Due to this, packets
sent on different SQ's are landing on the same output queue
on the host. Channel number in the send queue should be
configured according to the number of
From: Radha Mohan Chintakuntla
The SDP interfaces also need to be configured for NIX receive channel
backpressure for packet receive.
Signed-off-by: Radha Mohan Chintakuntla
---
drivers/common/cnxk/roc_nix_fc.c | 11 +--
drivers/net/cnxk/cnxk_ethdev.c | 3 +++
2 files changed, 8 ins
From: Vidya Sagar Velumuri
With Timestamp enabled, time stamp will be added to second pass packets
from CPT. NPC needs different configuration to parse second pass packets
with and without timestamp.
New pkind is defined for CPT when time stamp is enabled on NIX.
CPT should use this PKIND for sec
From: Satha Rao
Fix SQ flush sequence to issue NIX RX SW Sync after SMQ flush.
This sync ensures that all the packets that were inflight are
flushed out of memory.
This patch also fixes NULL return issues reported by
static analysis tool in Traffic Manager and sync's mbox
to that of Kernel versi
From: Rakesh Kudurumalla
SoC run platform file is not present in CN9k so probing
is done for CN10k devices
Signed-off-by: Rakesh Kudurumalla
---
drivers/common/cnxk/roc_model.c | 9 +
1 file changed, 9 insertions(+)
diff --git a/drivers/common/cnxk/roc_model.c b/drivers/common/cnxk/ro
From: Vidya Sagar Velumuri
Add new API to configure the SA table entries with new CPT PKIND
when timestamp is enabled.
Signed-off-by: Vidya Sagar Velumuri
---
drivers/common/cnxk/roc_nix_inl.c | 59 ++
drivers/common/cnxk/roc_nix_inl.h | 2 ++
drivers
Fix issues in mode where soft expiry is disabled in RoC.
When soft expiry support is not enabled in inline device,
memory is not allocated for the ring base array and should
not be accessed.
Fixes: bea5d990a93b ("net/cnxk: support outbound soft expiry notification")
Signed-off-by: Nithin Dabilpura
From: Akhil Goyal
Inbound SA SPI if not in min-max range specified in devargs,
was marked as a warning. But this is not converted to debug
print because if the entry is found to be duplicate in the mask,
it will give another error print. Hence, warning print is not needed
and is now converted to
Use aggregate level Round Robin Priority from mbox response instead of
fixing it to single macro. This is useful when kernel AF driver
changes the constant.
Signed-off-by: Nithin Dabilpuram
---
drivers/common/cnxk/roc_nix_priv.h | 5 +++--
drivers/common/cnxk/roc_nix_tm.c | 3 ++-
driv
Support internal loopback mode on AF VF's using RoC by setting
Tx channel same as Rx channel.
Signed-off-by: Nithin Dabilpuram
---
drivers/net/cnxk/cnxk_ethdev.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/drivers/net/cnxk/cnxk_ethdev.c b/drivers/net/cnxk/cnxk_ethdev.c
index bd31a
Update link info of LBK ethdev i.e AF's VF's as always up
and 100G. This is because there is no phy for the LBK interfaces
and we won't get a link update notification for the same.
Signed-off-by: Nithin Dabilpuram
---
drivers/net/cnxk/cnxk_link.c | 11 +++
1 file changed, 11 insertions(+
Add barrier after meta batch free in scalar routine when
lmt lines are exactly full to make sure that next LMT line user
in Tx only starts writing the lines only when previous stoerl's
are complete.
Fixes: 4382a7ccf781 ("net/cnxk: support Rx security offload on cn10k")
Cc: sta...@dpdk.org
Signed-
Disable default inner L3/L4 checksum generation for outbound inline
path and enable based on SA options or RTE_MBUF flags as per
the spec. Though the checksum generation is not impacting much
performance, it is overwriting zero checksum for UDP packets
which is not always good.
Signed-off-by: Nith
For transport mode, roundup needs to be based on L4 data
and shouldn't include L3 length.
By including l3 length, rlen that is calculated and put in
send hdr would cross the final length of the packet in some
scenarios where padding is necessary.
Also when outer and inner checksum offload flags are
From: Rakesh Kudurumalla
inline pf func is updated in ethdev_tel_handle_info
when inline device is attached to any dpdk process
Signed-off-by: Rakesh Kudurumalla
---
drivers/net/cnxk/cnxk_ethdev_telemetry.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/drivers/net/cnxk/cnxk_ethdev_tel
From: Akhil Goyal
Changed environment variable name for specifying
debug IV for unit testing of inline IPsec offload
with known test vectors.
Signed-off-by: Akhil Goyal
---
drivers/net/cnxk/cn10k_ethdev_sec.c | 9 +
1 file changed, 5 insertions(+), 4 deletions(-)
diff --git a/drivers/
From: Akhil Goyal
The rx offload flag need to be reset if IP reassembly flag
is not set while calling reassembly_conf_set.
Signed-off-by: Akhil Goyal
---
drivers/net/cnxk/cn10k_ethdev.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/drivers/net/cnxk/cn10k_ethdev.c b/drivers/net/cnxk
From: Akhil Goyal
Added support for decrementing TTL(IPv4)/hoplimit(IPv6)
while doing inline IPsec processing if the security session
sa options is enabled with dec_ttl.
Signed-off-by: Akhil Goyal
---
drivers/net/cnxk/cn10k_ethdev.h | 3 ++-
drivers/net/cnxk/cn10k_ethdev_sec.c | 1 +
drive
Optimize Rx fast path for security pkts by preprocessing
most of the operations such as sa pointer compute,
inner wqe pointer fetch and ucode completion translation
before the pkt is characterized as inbound inline pkt.
Preprocessed info will be discarded if pkt is not
found to be security pkt. Als
From: Akhil Goyal
When the packet is processed with inline IPsec offload,
the ol_flags were updated only with RTE_MBUF_F_RX_SEC_OFFLOAD.
But the hardware can also update the L3/L4 csum offload flags.
Hence, ol_flags are updated with RTE_MBUF_F_RX_IP_CKSUM_GOOD,
RTE_MBUF_F_RX_L4_CKSUM_GOOD, etc ba
From: Akhil Goyal
Added supported crypto algorithms for inline IPsec
offload.
Signed-off-by: Akhil Goyal
---
drivers/net/cnxk/cn10k_ethdev_sec.c | 166
1 file changed, 166 insertions(+)
diff --git a/drivers/net/cnxk/cn10k_ethdev_sec.c
b/drivers/net/cnxk/c
From: Akhil Goyal
Added supported capabilities for various IPsec SA options.
Signed-off-by: Akhil Goyal
Signed-off-by: Vamsi Attunuru
---
drivers/net/cnxk/cn10k_ethdev_sec.c | 57 ++---
1 file changed, 53 insertions(+), 4 deletions(-)
diff --git a/drivers/net/
From: Akhil Goyal
Enabled rte_security stats operation based on the configuration
of SA options set while creating session.
Signed-off-by: Vamsi Attunuru
Signed-off-by: Akhil Goyal
---
drivers/net/cnxk/cn10k_ethdev_sec.c | 56 ++---
1 file changed, 52 insertion
Add support for flow control in outbound inline path using
fc updates from CPT.
Signed-off-by: Nithin Dabilpuram
---
drivers/net/cnxk/cn10k_ethdev.c | 3 +++
drivers/net/cnxk/cn10k_ethdev.h | 1 +
drivers/net/cnxk/cn10k_tx.h | 37 -
drivers/net/cnxk/cnxk
From: Satheesh Paul
Set the error message with rte_flow_error_set() api
when flow parsing fails.
Fixes: 8c009b4505e ("net/cnxk: support flow API")
Cc: sta...@dpdk.org
Signed-off-by: Satheesh Paul
Reviewed-by: Kiran Kumar Kokkilagadda
---
drivers/net/cnxk/cnxk_flow.c | 9 -
1 file cha
70 matches
Mail list logo