On 1/11/19 3:11 AM, Stephen Hemminger wrote:
On Thu, 10 Jan 2019 03:03:24 +0200
Rami Rosen wrote:
Hi, Morten,
And regarding avoiding code duplicity, I'm pursuing Olivier about merging
packet header validation into rte_net_get_ptype() instead of writing a
separate function.
This seems al
> On Jan 10, 2019, at 6:47 PM, Gavin Hu (Arm Technology China)
> wrote:
>
>
>> -Original Message-
>> From: dev On Behalf Of Yongseok Koh
>> Sent: Friday, January 11, 2019 2:39 AM
>> To: tho...@monjalon.net
>> Cc: dev@dpdk.org; shah...@mellanox.com; jer...@marvell.com
>> Subject: [dpd
Hi Vipin,
On 1/11/2019 8:19 AM, Varghese, Vipin wrote:
> Hi Konstantin,
>
> As per 19.02-rc1, documentation has to be updated along with the code base.
I and Pablo, thought about your comment, but the feature that is added
in this patchset is split across multiple patches (mainly 7/10 and 8/10)
On Fri, 11 Jan 2019 03:01:43 +
"Gavin Hu (Arm Technology China)" wrote:
> > -Original Message-
> > From: dev On Behalf Of Dumitrescu, Cristian
> > Sent: Friday, January 11, 2019 2:40 AM
> > To: Van Haaren, Harry ; dev@dpdk.org
> > Cc: Pattan, Reshma ; tho...@monjalon.net;
> > olivier
On Thu, 10 Jan 2019 15:01:17 -0600
Gage Eads wrote:
> For 64-bit architectures, doubling the head and tail index widths greatly
> increases the time it takes for them to wrap-around (with current CPU
> speeds, it won't happen within the author's lifetime). This is important in
> avoiding the ABA
> -Original Message-
> From: dev On Behalf Of Luca Boccassi
> Sent: Friday, January 11, 2019 1:28 AM
> To: dev@dpdk.org
> Cc: bruce.richard...@intel.com; christian.ehrha...@canonical.com; Luca
> Boccassi ; sta...@dpdk.org
> Subject: [dpdk-dev] [PATCH] build: mention -march in pkg-config
Hi Thomas
snipped
> > +#include
>
> Is the crypto include really required in this patch?
Function 'show_port' requires the include file. Removing the same results
In function 'show_port':
/home/saesrv02/Downloads/dpdksrc/procifno/dpdk/app/proc-info/main.c:733:33:
error: dereferencing pointer t
> -Original Message-
> From: dev On Behalf Of Dumitrescu, Cristian
> Sent: Friday, January 11, 2019 2:40 AM
> To: Van Haaren, Harry ; dev@dpdk.org
> Cc: Pattan, Reshma ; tho...@monjalon.net;
> olivier.m...@6wind.com
> Subject: Re: [dpdk-dev] [PATCH v2] mbuf: fix compile by removing stru
Hi Kevin,
A question, since the patch is fixing issue for 'i40e vf' should not the
sections for 'known limitations' or 'i40e PMD' be updated too?
Thanks
Vipin Varghese
> -Original Message-
> From: dev On Behalf Of Kevin Traynor
> Sent: Thursday, January 10, 2019 11:18 PM
> To: Wang, H
Hi Gage,
Humble suggestion from my end, as per DPDK 19.02-rc1 the documentation and code
change have to be in same patch. Can you please take a look into it.
> -Original Message-
> From: dev On Behalf Of Gage Eads
> Sent: Friday, January 11, 2019 2:31 AM
> To: dev@dpdk.org
> Cc: olivier
Hi Konstantin,
As per 19.02-rc1, documentation has to be updated along with the code base.
snipped
> --- a/doc/guides/rel_notes/release_19_02.rst
> +++ b/doc/guides/rel_notes/release_19_02.rst
> @@ -133,6 +133,20 @@ New Features
>
>See :doc:`../prog_guide/ipsec_lib` for more information.
>
> -Original Message-
> From: dev On Behalf Of Yongseok Koh
> Sent: Friday, January 11, 2019 2:39 AM
> To: tho...@monjalon.net
> Cc: dev@dpdk.org; shah...@mellanox.com; jer...@marvell.com
> Subject: [dpdk-dev] [PATCH v3] config: add Mellanox BlueField ARMv8 SoC
>
> BlueField is Mellanox's
The patch series latest versions be tested by yanjie xu, which work for crypto
and inline ipsec cases.
-Original Message-
From: Ananyev, Konstantin
Sent: Wednesday, January 9, 2019 7:44 PM
To: dev@dpdk.org
Cc: akhil.go...@nxp.com; De Lara Guarch, Pablo
; Ananyev, Konstantin
Subjec
The patch series latest versions be tested by yanjie xu, which work for crypto
and inline ipsec cases.
-Original Message-
From: Ananyev, Konstantin
Sent: Friday, January 4, 2019 4:16 AM
To: dev@dpdk.org; dev@dpdk.org
Cc: akhil.go...@nxp.com; Ananyev, Konstantin
Subject: [PATCH v6 00/10
>
> > -Original Message-
> > From: Ananyev, Konstantin
> > Sent: Thursday, January 10, 2019 9:09 PM
> > To: dev@dpdk.org
> > Cc: akhil.go...@nxp.com; De Lara Guarch, Pablo
> > ; tho...@monjalon.net; Ananyev,
> > Konstantin
> > Subject: [PATCH v8 00/10] examples/ipsec-secgw: make app to
On Thu, 10 Jan 2019 03:03:24 +0200
Rami Rosen wrote:
> Hi, Morten,
>
> > And regarding avoiding code duplicity, I'm pursuing Olivier about merging
> packet header validation into rte_net_get_ptype() instead of writing a
> separate function.
> >
> This seems also a good alternative.
> +1
>
>
> -Original Message-
> From: Akhil Goyal [mailto:akhil.go...@nxp.com]
> Sent: Wednesday, January 9, 2019 3:13 PM
> To: dev@dpdk.org
> Cc: Hemant Agrawal ; De Lara Guarch, Pablo
>
> Subject: [PATCH] crypto/dpaa_sec: support PDCP offload
>
> From: Hemant Agrawal
>
> PDCP session config
> -Original Message-
> From: Akhil Goyal [mailto:akhil.go...@nxp.com]
> Sent: Wednesday, January 9, 2019 3:14 PM
> To: dev@dpdk.org
> Cc: Hemant Agrawal ; De Lara Guarch, Pablo
> ; Akhil Goyal
> Subject: [PATCH] crypto/dpaa_sec: support same session flows on multi
> cores
>
> In dpaa_s
> -Original Message-
> From: Akhil Goyal [mailto:akhil.go...@nxp.com]
> Sent: Wednesday, January 9, 2019 3:14 PM
> To: dev@dpdk.org
> Cc: Hemant Agrawal ; De Lara Guarch, Pablo
> ; Akhil Goyal
> Subject: [PATCH] crypto/dpaa2_sec: fix FLC address for physical mode
>
> Fixes: 547a4d40e7b
> -Original Message-
> From: Trahe, Fiona
> Sent: Friday, December 21, 2018 12:01 AM
> To: dev@dpdk.org
> Cc: De Lara Guarch, Pablo ; Trahe, Fiona
> ; Zhang, Roy Fan ;
> akhil.go...@nxp.com; sta...@dpdk.org
> Subject: [PATCH] test/crypto: fix misleading trace message
>
> Test was report
> -Original Message-
> From: dev [mailto:dev-boun...@dpdk.org] On Behalf Of Anoob Joseph
> Sent: Thursday, January 10, 2019 8:53 AM
> To: Akhil Goyal ; De Lara Guarch, Pablo
>
> Cc: Anoob Joseph ; Ankur Dwivedi
> ; Tejasree Kondoj ; Jerin
> Jacob Kollanukkaran ; Narayana Prasad Raju Ath
> -Original Message-
> From: Ananyev, Konstantin
> Sent: Thursday, January 10, 2019 9:09 PM
> To: dev@dpdk.org
> Cc: akhil.go...@nxp.com; De Lara Guarch, Pablo
> ; tho...@monjalon.net; Ananyev,
> Konstantin
> Subject: [PATCH v8 00/10] examples/ipsec-secgw: make app to use ipsec
> librar
> -Original Message-
> From: Ananyev, Konstantin
> Sent: Thursday, January 10, 2019 9:06 PM
> To: dev@dpdk.org
> Cc: akhil.go...@nxp.com; De Lara Guarch, Pablo
> ; tho...@monjalon.net; Ananyev,
> Konstantin
> Subject: [PATCH v8 0/9] ipsec: new library for IPsec data-path processing
>
>
On replenishing Rx buffers for vectorized Rx, mbuf->buf_addr isn't needed
to be accessed as it is static and easily calculated from the mbuf address.
Accessing the mbuf content causes unnecessary load stall and it is worsened
on ARM.
Fixes: 545b884b1da3 ("net/mlx5: fix buffer address posting in SS
This patch introduces two new functions - rte_mbuf_buf_addr() and
rte_mbuf_data_addr_default().
rte_mbuf_buf_addr() reutrns the default buffer address of given mbuf which
comes after mbuf structure and private data.
rte_mbuf_data_addr_default() returns the default address of mbuf data
taking the
On Thu, 10 Jan 2019 16:50:51 +
Harry van Haaren wrote:
> Although C compilation works with the struct rte_mbuf_sched
> declared inside the struct rte_mbuf namespace, C++ fails to
> compile. This fix moves the rte_mbuf_sched struct up to the
> global namespace, instead of declaring it inside t
In virtio_pq_send_command() we check for a used descriptor
and wait in an idle loop until it becomes used. We can't use
vq->used_wrap_counter here to check for the first descriptor
we made available because the ring could have wrapped. Let's use
the used_wrap_counter that matches the state of the h
Add support to virtio-user for control virtqueues.
Signed-off-by: Jens Freimann
---
.../net/virtio/virtio_user/virtio_user_dev.c | 104 --
.../net/virtio/virtio_user/virtio_user_dev.h | 15 ++-
drivers/net/virtio/virtio_user_ethdev.c | 56 +-
3 files changed, 15
Revert patch to error out when cq is used with packed vq and
in second patch add support for packed virtqueues in control
virtqueue code.
Patch 1 fixes a bug in virtio_pq_send_command(). When we wait for
a descriptor to be marked as used we need to consider that the ring
might have wrapped and use
> -Original Message-
> From: dev [mailto:dev-boun...@dpdk.org] On Behalf Of Fan Zhang
> Sent: Wednesday, December 19, 2018 11:39 PM
> To: dev@dpdk.org
> Cc: akhil.go...@nxp.com
> Subject: [dpdk-dev] [PATCH v2] examples/fips_validate: add power on self
> test
>
> This patch adds a sample po
The purpose of these scripts is to automate ipsec-secgw functional testing.
The scripts require two machines (SUT and DUT) connected through
at least 2 NICs and running linux (so far tested only on Ubuntu 18.04).
Introduced test-cases for the following scenarios:
- Transport/Tunnel modes
- AES-CBC
Changes to make ipsec-secgw data-path code to utilize librte_ipsec library.
Note that right now by default current (non-librte_ipsec) code-path will
be used. User has to run application with new command-line option ('-l')
to enable new codepath.
Signed-off-by: Mohammad Abdul Awal
Signed-off-by: B
Update ipsec-secgw guide and relelase notes to reflect latest changes.
Signed-off-by: Bernard Iremonger
Signed-off-by: Konstantin Ananyev
Acked-by: Akhil Goyal
---
doc/guides/rel_notes/release_19_02.rst | 14 +++
doc/guides/sample_app_ug/ipsec_secgw.rst | 105 ++-
2 file
Changes to make ipsec-secgw to utilize librte_ipsec library.
That patch provides:
- changes in the related data structures.
- changes in the initialization code.
- new command-line parameters to enable librte_ipsec codepath
and related features.
Note that right now by default current (non-li
In some cases crypto-ops could never be dequeued from the crypto-device.
The easiest way to reproduce:
start ipsec-secgw with crypto-dev and send to it less then 32 packets.
none packets will be forwarded.
Reason for that is that the application does dequeue() from crypto-queues
only when new packe
in sp4.c and sp6.c there are few globals that used only locally.
Define them as static ones.
Cc: sta...@dpdk.org
Signed-off-by: Konstantin Ananyev
Acked-by: Radu Nicolau
Acked-by: Akhil Goyal
---
examples/ipsec-secgw/sp4.c | 10 +-
examples/ipsec-secgw/sp6.c | 10 +-
2 files c
In the inbound_sa_check() make sure that sa pointer stored
inside mbuf private area is not NULL.
Fixes: d299106e8e31 ("examples/ipsec-secgw: add IPsec sample application")
Cc: sta...@dpdk.org
Signed-off-by: Bernard Iremonger
Acked-by: Radu Nicolau
Acked-by: Akhil Goyal
Signed-off-by: Konstanti
Right now ipsec-secgw always enables TX offloads
(DEV_TX_OFFLOAD_MULTI_SEGS, DEV_TX_OFFLOAD_SECURITY),
even when they are not requested by the config.
That causes many PMD to choose full-featured TX function,
which in many cases is much slower then one without offloads.
That patch adds ability for
Looking at process_pkts_outbound_nosp() there seems few issues:
- accessing mbuf after it was freed
- invoking ipsec_outbound() for ipv4 packets only
- copying number of packets, but not the mbuf pointers itself
that patch provides fixes for that issues.
Fixes: 906257e965b7 ("examples/ipsec-secgw
In some cases it is useful to allow user to specify destination
ether address for outgoing packets.
This patch adds such ability by introducing new 'neigh' config
file option.
Signed-off-by: Konstantin Ananyev
Acked-by: Radu Nicolau
Acked-by: Akhil Goyal
---
doc/guides/sample_app_ug/ipsec_secg
This patch series depends on the patch series:
ipsec: new library for IPsec data-path processing
to be applied first.
v7 -> v8
rebase on top of crypto-next
check-git-log nit-picks
v6 -> v7
Call drain_crypto_queue() for each processed port
(reported/suggested by Akhil)
Add ixgbe inline-
Add IPsec library guide and update release notes.
Signed-off-by: Bernard Iremonger
Signed-off-by: Konstantin Ananyev
Acked-by: Akhil Goyal
---
doc/guides/prog_guide/index.rst| 1 +
doc/guides/prog_guide/ipsec_lib.rst| 168 +
doc/guides/rel_notes/release_19
Create functional test for librte_ipsec.
Note that the test requires null crypto pmd to pass successfully.
Signed-off-by: Mohammad Abdul Awal
Signed-off-by: Bernard Iremonger
Signed-off-by: Konstantin Ananyev
Acked-by: Declan Doherty
Acked-by: Akhil Goyal
---
test/test/Makefile |3 +
Introduce helper functions to process completed crypto-ops
and group related packets by sessions they belong to.
Signed-off-by: Konstantin Ananyev
Acked-by: Declan Doherty
Acked-by: Akhil Goyal
---
lib/librte_ipsec/Makefile | 1 +
lib/librte_ipsec/meson.build | 2 +-
With these changes functions:
- rte_ipsec_pkt_crypto_prepare
- rte_ipsec_pkt_process
can be safely used in MT environment, as long as the user can guarantee
that they obey multiple readers/single writer model for SQN+replay_window
operations.
To be more specific:
for outbound SA there are
Introduce librte_ipsec library.
The library is supposed to utilize existing DPDK crypto-dev and
security API to provide application with transparent IPsec processing API.
That initial commit provides some base API to manage
IPsec Security Association (SA) object.
Signed-off-by: Mohammad Abdul Awal
Introduce Security Association (SA-level) data-path API
Operates at SA level, provides functions to:
- initialize/teardown SA object
- process inbound/outbound ESP/AH packets associated with the given SA
(decrypt/encrypt, authenticate, check integrity,
add/remove ESP/AH related
v7 -> v8
- update release notes with new version for librte_security
- rebase on top of crypto-next
v6 -> v7
- Changes to address Thomas comments:
bump ABI version
remove related deprecation notice
update release notes, ABI changes section
v5 -> v6
- Fix issues reported by Akhil:
Add 'uint64_t opaque_data' inside struct rte_security_session.
That allows upper layer to easily associate some user defined
data with the session.
Signed-off-by: Konstantin Ananyev
Acked-by: Mohammad Abdul Awal
Acked-by: Declan Doherty
Acked-by: Akhil Goyal
---
doc/guides/rel_notes/deprecati
define esp_tail structure.
Signed-off-by: Konstantin Ananyev
Acked-by: Mohammad Abdul Awal
Acked-by: Declan Doherty
Acked-by: Akhil Goyal
---
lib/librte_net/rte_esp.h | 10 +-
1 file changed, 9 insertions(+), 1 deletion(-)
diff --git a/lib/librte_net/rte_esp.h b/lib/librte_net/rte_es
Provide implementation for rte_ipsec_pkt_crypto_prepare() and
rte_ipsec_pkt_process().
Current implementation:
- supports ESP protocol tunnel mode.
- supports ESP protocol transport mode.
- supports ESN and replay window.
- supports algorithms: AES-CBC, AES-GCM, HMAC-SHA1, NULL.
- covers all c
ring_nb_autotest re-uses the ring_autotest code by wrapping its top-level
function with one that takes a 'flags' argument.
Signed-off-by: Gage Eads
---
test/test/test_ring.c | 57 ---
1 file changed, 36 insertions(+), 21 deletions(-)
diff --git a/
This comment makes users aware of the non-blocking ring option and its
caveats.
Signed-off-by: Gage Eads
---
doc/guides/prog_guide/env_abstraction_layer.rst | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/doc/guides/prog_guide/env_abstraction_layer.rst
b/doc/guides/prog_guid
These handlers allow an application to create a mempool based on the
non-blocking ring, with any combination of single/multi producer/consumer.
Signed-off-by: Gage Eads
---
drivers/mempool/ring/rte_mempool_ring.c | 58 +++--
1 file changed, 55 insertions(+), 3 deletio
For 64-bit architectures, doubling the head and tail index widths greatly
increases the time it takes for them to wrap-around (with current CPU
speeds, it won't happen within the author's lifetime). This is important in
avoiding the ABA problem -- in which a thread mistakes reading the same
tail in
For some users, the rte ring's "non-preemptive" constraint is not acceptable;
for example, if the application uses a mixture of pinned high-priority threads
and multiplexed low-priority threads that share a mempool.
This patchset introduces a non-blocking ring, on top of which a mempool can run.
C
nb_ring_perf_autotest re-uses the ring_perf_autotest code by wrapping its
top-level function with one that takes a 'flags' argument.
Signed-off-by: Gage Eads
---
test/test/test_ring_perf.c | 19 ---
1 file changed, 16 insertions(+), 3 deletions(-)
diff --git a/test/test/test_rin
This commit adds support for non-blocking circular ring enqueue and dequeue
functions. The ring uses a 128-bit compare-and-swap instruction, and thus
is limited to x86_64.
The algorithm is based on the original rte ring (derived from FreeBSD's
bufring.h) and inspired by Michael and Scott's non-blo
This comment makes users aware of the non-blocking stack option and its
caveats.
Signed-off-by: Gage Eads
---
doc/guides/prog_guide/env_abstraction_layer.rst | 5 +
1 file changed, 5 insertions(+)
diff --git a/doc/guides/prog_guide/env_abstraction_layer.rst
b/doc/guides/prog_guide/env_abst
This commit adds support for non-blocking (linked list based) stack mempool
handler. The stack uses a 128-bit compare-and-swap instruction, and thus is
limited to x86_64. The 128-bit CAS atomically updates the stack top pointer
and a modification counter, which protects against the ABA problem.
In
For some users, the rte ring's "non-preemptive" constraint is not acceptable;
for example, if the application uses a mixture of pinned high-priority threads
and multiplexed low-priority threads that share a mempool.
This patchset introduces a non-blocking stack mempool handler. Note that the
non-b
This operation can be used for non-blocking algorithms, such as a
non-blocking stack or ring.
Signed-off-by: Gage Eads
---
.../common/include/arch/x86/rte_atomic_64.h| 22 ++
1 file changed, 22 insertions(+)
diff --git a/lib/librte_eal/common/include/arch/x86/rte_ato
Wednesday, January 9, 2019 5:50 PM, Michael S. Tsirkin:
> alejandro.luc...@netronome.com; Daniel Marcovitch
>
> Subject: Re: [dpdk-dev] [PATCH v2] net/virtio: add platform memory
> ordering feature support
>
> On Wed, Jan 09, 2019 at 05:34:38PM +0300, Ilya Maximets wrote:
> > virtio_mb() is reall
Thursday, January 10, 2019 8:35 PM, Yongseok Koh:
> Subject: [dpdk-dev] [PATCH v3 2/2] net/mlx5: fix instruction hotspot on
> replenishing Rx buffer
>
> On replenishing Rx buffers for vectorized Rx, mbuf->buf_addr isn't needed to
> be accessed as it is static and easily calculated from the mbuf ad
Hi Shally,
> -Original Message-
> From: dev [mailto:dev-boun...@dpdk.org] On Behalf Of Trahe, Fiona
> Sent: Wednesday, December 19, 2018 5:10 PM
> To: Verma, Shally ; Stephen Hemminger
>
> Cc: dev@dpdk.org; akhil.go...@nxp.com; Jozwiak, TomaszX
> ; Gupta, Ashish ;
> Daly, Lee ; Luse, Paul
> -Original Message-
> From: Van Haaren, Harry
> Sent: Thursday, January 10, 2019 6:07 PM
> To: dev@dpdk.org
> Cc: Van Haaren, Harry ; Pattan, Reshma
> ; Dumitrescu, Cristian
> ; tho...@monjalon.net;
> olivier.m...@6wind.com
> Subject: [PATCH v2] mbuf: fix compile by removing struct from
BlueField is Mellanox's new SoC based on ARMv8. BlueField integrates
Mellanox ConnectX-5 interconnect and Cortex-A72 cores into a single device.
http://www.mellanox.com/page/products_dyn?product_family=256&mtag=soc_overview
Signed-off-by: Yongseok Koh
---
v3:
* remove redundant mlx5 config item
On replenishing Rx buffers for vectorized Rx, mbuf->buf_addr isn't needed
to be accessed as it is static and easily calculated from the mbuf address.
Accessing the mbuf content causes unnecessary load stall and it is worsened
on ARM.
Fixes: 545b884b1da3 ("net/mlx5: fix buffer address posting in SS
This patch introduces two new functions - rte_mbuf_buf_addr() and
rte_mbuf_data_addr_default().
rte_mbuf_buf_addr() reutrns the default buffer address of given mbuf which
comes after mbuf structure and private data.
rte_mbuf_data_addr_default() returns the default address of mbuf data
taking the
On Jan 9, 2019, at 5:46 AM, David Marchand
mailto:david.march...@redhat.com>> wrote:
On Wed, Jan 9, 2019 at 2:19 PM Yongseok Koh
mailto:ys...@mellanox.com>> wrote:
This patch introduces two new functions - rte_mbuf_buf_addr_default() and
rte_mbuf_data_baddr_default().
rte_mbuf_buf_addr_defau
> On Jan 9, 2019, at 5:39 PM, Rami Rosen wrote:
>
> Hi, Yongseok,
>
> Maybe you should consider using the pool member of the mbuf, instead of
> passing it as a parameter for rte_mbuf_buf_addr_default().
> The pool member of mbuf indicates the pool from which it was allocated.
> See
> http://g
On 01/09/2019 11:37 AM, Dekel Peled wrote:
> This patch fixes a typo in SET_MAC_DST action description.
> It also adds restriction note for set MAC src/dst actions description.
>
> Fixes: 15dbcdaada77 ("ethdev: add generic MAC address rewrite actions")
Cc: sta...@dpdk.org
unless there's a reason
Although C compilation works with the struct rte_mbuf_sched
declared inside the struct rte_mbuf namespace, C++ fails to
compile.
This fix removes the temporary struct rte_mbuf_sched, instead
reading from the mbuf directly for each struct member. As the
struct is now not used directly, the C++ comp
> -Original Message-
> From: Thomas Monjalon [mailto:tho...@monjalon.net]
> Sent: Thursday, January 10, 2019 5:35 PM
> To: Van Haaren, Harry
> Cc: dev@dpdk.org; Pattan, Reshma ; Dumitrescu,
> Cristian ; olivier.m...@6wind.com
> Subject: Re: [PATCH] mbuf: fix compile by making sched struct
On 01/10/2019 12:07 PM, Haiyue Wang wrote:
> Do the VF message basic validation such as OPCODE message length check,
> some special OPCODE message format check, to protect the i40e PMD from
> malicious VF message attack.
>
> Fixes: 4861cde46116 ("i40e: new poll mode driver")
>
Missing Cc: sta...
10/01/2019 22:36, Vipin Varghese:
> Function show_port is used for displaying the port PMD information under
> primary process. The information shows basic, per queue and security.
> Also helper MACRO 'MAX_STRING_LEN, STATS_BDR_FMT and STATS_BDR_STR' and
> meson build file is updated for new functi
10/01/2019 17:50, Harry van Haaren:
> Although C compilation works with the struct rte_mbuf_sched
> declared inside the struct rte_mbuf namespace, C++ fails to
> compile. This fix moves the rte_mbuf_sched struct up to the
> global namespace, instead of declaring it inside the struct
> mbuf namespac
Applications need to at least match DPDK's -march option to build
successfully due to some static inline functions in the public headers.
This might cause problems, especially in distributions, so add a note
in the pkg-config description.
Fixes: a25a650be5f0 ("build: add infrastructure for meson
> -Original Message-
> From: dev [mailto:dev-boun...@dpdk.org] On Behalf Of Fan Zhang
> Sent: Thursday, January 10, 2019 2:50 PM
> To: dev@dpdk.org
> Cc: akhil.go...@nxp.com; De Lara Guarch, Pablo
> ; Trahe, Fiona
> Subject: [dpdk-dev] [PATCH v5 00/12] cryptodev: change qp conf and sym
Although C compilation works with the struct rte_mbuf_sched
declared inside the struct rte_mbuf namespace, C++ fails to
compile. This fix moves the rte_mbuf_sched struct up to the
global namespace, instead of declaring it inside the struct
mbuf namespace.
The struct rte_mbuf_sched is being used on
HI Thomas
snipped
> > >
> > > +Compliation of patches has to be tested using meson::
> > > +
> > > +./devtools/test-meson-builds.sh
> > > +
> > > +This will test for shared and static builds. If gcc arm cross
> > > +compiler is installed, cross build is tested too.
> > >
> > > Sending Patches
RED queue weight is currently specified as a negated log of 2.
Add support for RED queue weight to be specified in double precision
and TM capability flags for double precision and negated log2
RED queue weight support.
Update the softnic PMD and testpmd for the new tm capability flags and
the st
Callbacks are only registered in the primary, so do not attempt to
unregister callbacks in secondary processes.
Fixes: 43e463137154 ("vfio: support memory event callbacks")
Cc: sta...@dpdk.org
Signed-off-by: Anatoly Burakov
---
Notes:
v2:
- Skip secondaries instead of primaries
lib/li
Callbacks are only registered in the primary, so do not attempt to
unregister callbacks in secondary processes.
Fixes: 43e463137154 ("vfio: support memory event callbacks")
Cc: sta...@dpdk.org
Signed-off-by: Anatoly Burakov
---
lib/librte_eal/linuxapp/eal/eal_vfio.c | 3 ++-
1 file changed, 2 i
Not sent packets are copied to the beginning of array to be reused in next
iteration. But as in some cases more than half of mbuf could not be sent,
source and destination locations would overlap. In such case rte_memcpy
cannot be used.
One of side effects is double sending the same mbuf and as a c
Expose number of missed Rx packets from DPDK NIC statistics to Lua API.
Signed-off-by: Rafal Kozik
---
app/lpktgenlib.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/app/lpktgenlib.c b/app/lpktgenlib.c
index 9a6307c..e9c7241 100644
--- a/app/lpktgenlib.c
+++ b/app/lpktgenlib.c
@@ -2888,6 +
Instead of magic number and DPDK constants use, constants defined
in PKTGEN. It allows to easily adjust packets size for users needs.
For example jumbo packets could be supported by just increasing
DEFAULT_MBUF_SIZE and MAX_PKT_SIZE.
Signed-off-by: Rafal Kozik
---
app/pktgen-pcap.c | 22
In some test scenario it is necessary to configure different flow per each
Tx queue. This patch adds possibility to provide list of PCAPs files.
If number of files is smaller than number of queues, first PCAP file
is used for the queues which number is above the number of files.
To achieve uniform
Hello Keith,
This patch set contain two fixes for issues that were noticed when running
DPDK in debug configuration. There are also three minor features that
may be useful. Those patches are independent from each other.
I am kindly asking, if those changes are appropriate
to be merged to Pktgen?
Flag SENDING_PACKETS must be set last.
When it is set before SEND_FOREVER flag, Tx lcores start to call
pktgen_send_pkts. But as current_tx_count is 0 and SEND_FOREVER
is not yet set, SENDING_PACKETS will be cleared.
This causes in some cases that start command will no take effect.
Fixes: f5f901fd
Function iter_mempool is used for iterating slected mempool elements
and display the contents of elements for a max of 256 bytes. In case
of invalid or no name for mempool, no information is displayed.
Signed-off-by: Vipin Varghese
Acked-by: Reshma Pattan
Acked-by: John McNamara
---
app/proc-
Function show_mempool is used for displaying valid MEMPOOL.
In case of invalid or no name, whole list is dump.
Signed-off-by: Vipin Varghese
Acked-by: Reshma Pattan
Acked-by: John McNamara
---
app/proc-info/main.c | 65 +-
doc/guides/tools/proc_info.r
Function show_ring is used for displaying information of RING instance
of the primary process.
Signed-off-by: Vipin Varghese
Acked-by: Reshma Pattan
Acked-by: John McNamara
---
app/proc-info/main.c | 52 +-
doc/guides/tools/proc_info.rst | 8 +-
Function show_crypto is used for displaying the crypto PMD under primary
process.
Signed-off-by: Vipin Varghese
Acked-by: Reshma Pattan
Acked-by: John McNamara
---
app/proc-info/main.c | 94 +-
doc/guides/tools/proc_info.rst | 6 ++-
2 files changed,
Function show_tm is used for displaying the tm PMD under the primary
process. This covers basic and per node|level details with statistics.
Signed-off-by: Vipin Varghese
Acked-by: Reshma Pattan
Acked-by: John McNamara
---
app/proc-info/main.c | 290 -
Function show_port is used for displaying the port PMD information under
primary process. The information shows basic, per queue and security.
Also helper MACRO 'MAX_STRING_LEN, STATS_BDR_FMT and STATS_BDR_STR' and
meson build file is updated for new functionality.
Signed-off-by: Vipin Varghese
A
This patch adds new debug functions to existing proc-info tool.
Motivation
==
DPDK proc-info tool is been widely used as secondary process to collect
stats for any primary process. But these are limited to DPDK NIC ports and
basic memory usage.
The patch series tries to address the missi
On 1/9/2019 5:14 PM, Konstantin Ananyev wrote:
> This patch series depends on the patch series:
>
> ipsec: new library for IPsec data-path processing
> http://patches.dpdk.org/patch/49410/
> http://patches.dpdk.org/patch/49411/
> http://patches.dpdk.org/patch/49412/
> http://patches.dpdk.org/patc
On 1/9/19 3:55 PM, Michael S. Tsirkin wrote:
On Wed, Jan 09, 2019 at 05:50:12PM +0300, Ilya Maximets wrote:
Version 3:
* Added 2 patches with fixes for current virtio driver.
Not directly connected with the new feature.
New version shouldn't be reply-to old one really :).
But the pa
On 1/9/19 3:57 PM, Rami Rosen wrote:
This cleanup patch removes a method and a constant which are now
unnecessary in the VHOST sample applicaiopn, namely the
validate_num_devices() method and the MAX_DEVICES constant.
Fixes: 56fe86f8dcaf ("examples/vhost: embed statistics into device structu
1 - 100 of 213 matches
Mail list logo