* [dpdk-dev] [PATCH 0/3] Build fails when rte_security is disabled. @ 2017-10-26 10:22 Radu Nicolau 2017-10-26 10:22 ` [dpdk-dev] [PATCH 1/3] crypto/dpaa2_sec: fix build issue Radu Nicolau ` (4 more replies) 0 siblings, 5 replies; 25+ messages in thread From: Radu Nicolau @ 2017-10-26 10:22 UTC (permalink / raw) To: dev Cc: david.marchand, declan.doherty, pablo.de.lara.guarch, hemant.agrawal, borisp, aviadye, thomas, sandeep.malik, jerin.jacob, john.mcnamara, konstantin.ananyev, shahafs, olivier.matz, akhil.goyal, Radu Nicolau Disabling CONFIG_RTE_LIBRTE_SECURITY results in build failure for crypto/dpaa2_sec and net/ixgbe PMDs and IPsec sample app. This patchset makes CONFIG_RTE_LIBRTE_SECURITY mandatory for all of the above. Radu Nicolau (3): crypto/dpaa2_sec: fix build issue net/ixgbe: fix build issue examples/ipsec-secgw: fix build issue drivers/crypto/dpaa2_sec/Makefile | 6 ++++++ drivers/net/ixgbe/Makefile | 6 ++++++ examples/ipsec-secgw/Makefile | 6 ++++++ 3 files changed, 18 insertions(+) -- 2.7.5 ^ permalink raw reply [flat|nested] 25+ messages in thread
* [dpdk-dev] [PATCH 1/3] crypto/dpaa2_sec: fix build issue 2017-10-26 10:22 [dpdk-dev] [PATCH 0/3] Build fails when rte_security is disabled Radu Nicolau @ 2017-10-26 10:22 ` Radu Nicolau 2017-10-26 10:22 ` [dpdk-dev] [PATCH 2/3] net/ixgbe: " Radu Nicolau ` (3 subsequent siblings) 4 siblings, 0 replies; 25+ messages in thread From: Radu Nicolau @ 2017-10-26 10:22 UTC (permalink / raw) To: dev Cc: david.marchand, declan.doherty, pablo.de.lara.guarch, hemant.agrawal, borisp, aviadye, thomas, sandeep.malik, jerin.jacob, john.mcnamara, konstantin.ananyev, shahafs, olivier.matz, akhil.goyal, Radu Nicolau Build fails when rte_security is disabled; make rte_security mandatory Fixes: 0a23d4b6f4c2 ("crypto/dpaa2_sec: support protocol offload IPsec") Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> --- drivers/crypto/dpaa2_sec/Makefile | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/drivers/crypto/dpaa2_sec/Makefile b/drivers/crypto/dpaa2_sec/Makefile index 3f0eade..a08f271 100644 --- a/drivers/crypto/dpaa2_sec/Makefile +++ b/drivers/crypto/dpaa2_sec/Makefile @@ -31,6 +31,12 @@ include $(RTE_SDK)/mk/rte.vars.mk +ifneq ($(MAKECMDGOALS),clean) +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_PMD_DPAA2_SEC") +endif +endif + # # library name # -- 2.7.5 ^ permalink raw reply [flat|nested] 25+ messages in thread
* [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 10:22 [dpdk-dev] [PATCH 0/3] Build fails when rte_security is disabled Radu Nicolau 2017-10-26 10:22 ` [dpdk-dev] [PATCH 1/3] crypto/dpaa2_sec: fix build issue Radu Nicolau @ 2017-10-26 10:22 ` Radu Nicolau 2017-10-26 10:36 ` David Marchand 2017-10-26 10:22 ` [dpdk-dev] [PATCH 3/3] examples/ipsec-secgw: " Radu Nicolau ` (2 subsequent siblings) 4 siblings, 1 reply; 25+ messages in thread From: Radu Nicolau @ 2017-10-26 10:22 UTC (permalink / raw) To: dev Cc: david.marchand, declan.doherty, pablo.de.lara.guarch, hemant.agrawal, borisp, aviadye, thomas, sandeep.malik, jerin.jacob, john.mcnamara, konstantin.ananyev, shahafs, olivier.matz, akhil.goyal, Radu Nicolau Build fails when rte_security is disabled; make rte_security mandatory Fixes: 9a0752f498d2 ("net/ixgbe: enable inline IPsec") Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> --- drivers/net/ixgbe/Makefile | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/drivers/net/ixgbe/Makefile b/drivers/net/ixgbe/Makefile index f03c426..c879828 100644 --- a/drivers/net/ixgbe/Makefile +++ b/drivers/net/ixgbe/Makefile @@ -31,6 +31,12 @@ include $(RTE_SDK)/mk/rte.vars.mk +ifneq ($(MAKECMDGOALS),clean) +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") +endif +endif + # # library name # -- 2.7.5 ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 10:22 ` [dpdk-dev] [PATCH 2/3] net/ixgbe: " Radu Nicolau @ 2017-10-26 10:36 ` David Marchand 2017-10-26 11:01 ` Radu Nicolau 0 siblings, 1 reply; 25+ messages in thread From: David Marchand @ 2017-10-26 10:36 UTC (permalink / raw) To: Radu Nicolau Cc: dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, Thomas Monjalon, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz, Akhil Goyal On Thu, Oct 26, 2017 at 12:22 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: > Build fails when rte_security is disabled; make rte_security mandatory > Fixes: 9a0752f498d2 ("net/ixgbe: enable inline IPsec") > > Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> > --- > drivers/net/ixgbe/Makefile | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/drivers/net/ixgbe/Makefile b/drivers/net/ixgbe/Makefile > index f03c426..c879828 100644 > --- a/drivers/net/ixgbe/Makefile > +++ b/drivers/net/ixgbe/Makefile > @@ -31,6 +31,12 @@ > > include $(RTE_SDK)/mk/rte.vars.mk > > +ifneq ($(MAKECMDGOALS),clean) > +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) > +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") > +endif > +endif > + > # > # library name > # This is a no go for me unless you explain how it is impossible to disable it in the code. -- David Marchand ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 10:36 ` David Marchand @ 2017-10-26 11:01 ` Radu Nicolau 2017-10-26 11:27 ` David Marchand 2017-10-26 11:30 ` Ananyev, Konstantin 0 siblings, 2 replies; 25+ messages in thread From: Radu Nicolau @ 2017-10-26 11:01 UTC (permalink / raw) To: David Marchand Cc: dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, Thomas Monjalon, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz, Akhil Goyal On 10/26/2017 11:36 AM, David Marchand wrote: > On Thu, Oct 26, 2017 at 12:22 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: >> Build fails when rte_security is disabled; make rte_security mandatory >> Fixes: 9a0752f498d2 ("net/ixgbe: enable inline IPsec") >> >> Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> >> --- >> drivers/net/ixgbe/Makefile | 6 ++++++ >> 1 file changed, 6 insertions(+) >> >> diff --git a/drivers/net/ixgbe/Makefile b/drivers/net/ixgbe/Makefile >> index f03c426..c879828 100644 >> --- a/drivers/net/ixgbe/Makefile >> +++ b/drivers/net/ixgbe/Makefile >> @@ -31,6 +31,12 @@ >> >> include $(RTE_SDK)/mk/rte.vars.mk >> >> +ifneq ($(MAKECMDGOALS),clean) >> +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) >> +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") >> +endif >> +endif >> + >> # >> # library name >> # > This is a no go for me unless you explain how it is impossible to > disable it in the code. > > It can be disabled in the code, but as far as I know there is a general push back against having conditionally compiled code. I originally had the security sections in ixgbe PMD isolated, but the feedback was to have them always on. An alternative solution will be to remove the option altogether and always build rte_security library. ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 11:01 ` Radu Nicolau @ 2017-10-26 11:27 ` David Marchand 2017-10-26 11:39 ` Thomas Monjalon 2017-10-26 11:30 ` Ananyev, Konstantin 1 sibling, 1 reply; 25+ messages in thread From: David Marchand @ 2017-10-26 11:27 UTC (permalink / raw) To: Radu Nicolau Cc: dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, Thomas Monjalon, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz, Akhil Goyal On Thu, Oct 26, 2017 at 1:01 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: > On 10/26/2017 11:36 AM, David Marchand wrote: >> On Thu, Oct 26, 2017 at 12:22 PM, Radu Nicolau <radu.nicolau@intel.com> >> wrote: >>> >>> Build fails when rte_security is disabled; make rte_security mandatory >>> Fixes: 9a0752f498d2 ("net/ixgbe: enable inline IPsec") >>> >>> Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> >>> --- >>> drivers/net/ixgbe/Makefile | 6 ++++++ >>> 1 file changed, 6 insertions(+) >>> >>> diff --git a/drivers/net/ixgbe/Makefile b/drivers/net/ixgbe/Makefile >>> index f03c426..c879828 100644 >>> --- a/drivers/net/ixgbe/Makefile >>> +++ b/drivers/net/ixgbe/Makefile >>> @@ -31,6 +31,12 @@ >>> >>> include $(RTE_SDK)/mk/rte.vars.mk >>> >>> +ifneq ($(MAKECMDGOALS),clean) >>> +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) >>> +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") >>> +endif >>> +endif >>> + >>> # >>> # library name >>> # >> >> This is a no go for me unless you explain how it is impossible to >> disable it in the code. >> >> > It can be disabled in the code, but as far as I know there is a general push > back against having conditionally compiled code. I originally had the > security sections in ixgbe PMD isolated, but the feedback was to have them > always on. In my mind, this was to stop having features enabled per pmd (and stop the nightmare with 10 options in a pmd). Having features globally enabled for all or nothing is still acceptable, is it not ? > An alternative solution will be to remove the option altogether and always > build rte_security library. As a general rule, I prefer enabling only the things I use, but I am not against this ? Can you confirm the performance impact is negligible, always having this in the pmds ? Thanks. -- David Marchand ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 11:27 ` David Marchand @ 2017-10-26 11:39 ` Thomas Monjalon 2017-10-26 12:28 ` Radu Nicolau 0 siblings, 1 reply; 25+ messages in thread From: Thomas Monjalon @ 2017-10-26 11:39 UTC (permalink / raw) To: David Marchand, Radu Nicolau Cc: dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz, Akhil Goyal 26/10/2017 13:27, David Marchand: > On Thu, Oct 26, 2017 at 1:01 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: > > On 10/26/2017 11:36 AM, David Marchand wrote: > >> On Thu, Oct 26, 2017 at 12:22 PM, Radu Nicolau <radu.nicolau@intel.com> > >> wrote: > >>> --- a/drivers/net/ixgbe/Makefile > >>> +++ b/drivers/net/ixgbe/Makefile > >>> +ifneq ($(MAKECMDGOALS),clean) > >>> +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) > >>> +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") > >>> +endif > >>> +endif > >> > >> This is a no go for me unless you explain how it is impossible to > >> disable it in the code. > >> > >> > > It can be disabled in the code, but as far as I know there is a general push > > back against having conditionally compiled code. I originally had the > > security sections in ixgbe PMD isolated, but the feedback was to have them > > always on. > > In my mind, this was to stop having features enabled per pmd (and stop > the nightmare with 10 options in a pmd). > Having features globally enabled for all or nothing is still > acceptable, is it not ? Yes there is a config option for rte_security, and it is acceptable. The code depending on it must be ifdef'ed. ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 11:39 ` Thomas Monjalon @ 2017-10-26 12:28 ` Radu Nicolau 2017-10-26 12:33 ` Thomas Monjalon 0 siblings, 1 reply; 25+ messages in thread From: Radu Nicolau @ 2017-10-26 12:28 UTC (permalink / raw) To: Thomas Monjalon, David Marchand Cc: dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz, Akhil Goyal On 10/26/2017 12:39 PM, Thomas Monjalon wrote: > 26/10/2017 13:27, David Marchand: >> On Thu, Oct 26, 2017 at 1:01 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: >>> On 10/26/2017 11:36 AM, David Marchand wrote: >>>> On Thu, Oct 26, 2017 at 12:22 PM, Radu Nicolau <radu.nicolau@intel.com> >>>> wrote: >>>>> --- a/drivers/net/ixgbe/Makefile >>>>> +++ b/drivers/net/ixgbe/Makefile >>>>> +ifneq ($(MAKECMDGOALS),clean) >>>>> +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) >>>>> +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") >>>>> +endif >>>>> +endif >>>> This is a no go for me unless you explain how it is impossible to >>>> disable it in the code. >>>> >>>> >>> It can be disabled in the code, but as far as I know there is a general push >>> back against having conditionally compiled code. I originally had the >>> security sections in ixgbe PMD isolated, but the feedback was to have them >>> always on. >> In my mind, this was to stop having features enabled per pmd (and stop >> the nightmare with 10 options in a pmd). >> Having features globally enabled for all or nothing is still >> acceptable, is it not ? > Yes there is a config option for rte_security, > and it is acceptable. > The code depending on it must be ifdef'ed. Given that both ixgbe and dpaa2_sec are now security enabled PMDs, I would go with Konstantin's proposal, have rte_security listed as a dependency (instead of the explicit check). Any other PMD is not affected. For ipsec sample I would keep the explicit check. ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 12:28 ` Radu Nicolau @ 2017-10-26 12:33 ` Thomas Monjalon 2017-10-26 12:59 ` Akhil Goyal 0 siblings, 1 reply; 25+ messages in thread From: Thomas Monjalon @ 2017-10-26 12:33 UTC (permalink / raw) To: Radu Nicolau Cc: David Marchand, dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz, Akhil Goyal 26/10/2017 14:28, Radu Nicolau: > > On 10/26/2017 12:39 PM, Thomas Monjalon wrote: > > 26/10/2017 13:27, David Marchand: > >> On Thu, Oct 26, 2017 at 1:01 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: > >>> On 10/26/2017 11:36 AM, David Marchand wrote: > >>>> On Thu, Oct 26, 2017 at 12:22 PM, Radu Nicolau <radu.nicolau@intel.com> > >>>> wrote: > >>>>> --- a/drivers/net/ixgbe/Makefile > >>>>> +++ b/drivers/net/ixgbe/Makefile > >>>>> +ifneq ($(MAKECMDGOALS),clean) > >>>>> +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) > >>>>> +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") > >>>>> +endif > >>>>> +endif > >>>> This is a no go for me unless you explain how it is impossible to > >>>> disable it in the code. > >>>> > >>>> > >>> It can be disabled in the code, but as far as I know there is a general push > >>> back against having conditionally compiled code. I originally had the > >>> security sections in ixgbe PMD isolated, but the feedback was to have them > >>> always on. > >> In my mind, this was to stop having features enabled per pmd (and stop > >> the nightmare with 10 options in a pmd). > >> Having features globally enabled for all or nothing is still > >> acceptable, is it not ? > > Yes there is a config option for rte_security, > > and it is acceptable. > > The code depending on it must be ifdef'ed. > > Given that both ixgbe and dpaa2_sec are now security enabled PMDs, I > would go with Konstantin's proposal, have rte_security listed as a > dependency (instead of the explicit check). Please consider my request instead. Until now we are ifdef'ing code to allow disabling any lib. We are not going to change our mind during the last days of a release. Please just fix it for now. ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 12:33 ` Thomas Monjalon @ 2017-10-26 12:59 ` Akhil Goyal 2017-10-26 13:07 ` Thomas Monjalon 0 siblings, 1 reply; 25+ messages in thread From: Akhil Goyal @ 2017-10-26 12:59 UTC (permalink / raw) To: Thomas Monjalon, Radu Nicolau Cc: David Marchand, dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz Hi Thomas, On 10/26/2017 6:03 PM, Thomas Monjalon wrote: > 26/10/2017 14:28, Radu Nicolau: >> >> On 10/26/2017 12:39 PM, Thomas Monjalon wrote: >>> 26/10/2017 13:27, David Marchand: >>>> On Thu, Oct 26, 2017 at 1:01 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: >>>>> On 10/26/2017 11:36 AM, David Marchand wrote: >>>>>> On Thu, Oct 26, 2017 at 12:22 PM, Radu Nicolau <radu.nicolau@intel.com> >>>>>> wrote: >>>>>>> --- a/drivers/net/ixgbe/Makefile >>>>>>> +++ b/drivers/net/ixgbe/Makefile >>>>>>> +ifneq ($(MAKECMDGOALS),clean) >>>>>>> +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) >>>>>>> +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") >>>>>>> +endif >>>>>>> +endif >>>>>> This is a no go for me unless you explain how it is impossible to >>>>>> disable it in the code. >>>>>> >>>>>> >>>>> It can be disabled in the code, but as far as I know there is a general push >>>>> back against having conditionally compiled code. I originally had the >>>>> security sections in ixgbe PMD isolated, but the feedback was to have them >>>>> always on. >>>> In my mind, this was to stop having features enabled per pmd (and stop >>>> the nightmare with 10 options in a pmd). >>>> Having features globally enabled for all or nothing is still >>>> acceptable, is it not ? >>> Yes there is a config option for rte_security, >>> and it is acceptable. >>> The code depending on it must be ifdef'ed. >> >> Given that both ixgbe and dpaa2_sec are now security enabled PMDs, I >> would go with Konstantin's proposal, have rte_security listed as a >> dependency (instead of the explicit check). > > Please consider my request instead. > Until now we are ifdef'ing code to allow disabling any lib. > We are not going to change our mind during the last days of a release. > Please just fix it for now. > > For dpaa2_sec we do not want to make the driver run without rte_security. We do not see people using it without rte_security. Will take the Makefile changes that Radu has done in 1st patch of this series. -Akhil ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 12:59 ` Akhil Goyal @ 2017-10-26 13:07 ` Thomas Monjalon 2017-10-26 13:16 ` Akhil Goyal 0 siblings, 1 reply; 25+ messages in thread From: Thomas Monjalon @ 2017-10-26 13:07 UTC (permalink / raw) To: Akhil Goyal Cc: Radu Nicolau, David Marchand, dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz 26/10/2017 14:59, Akhil Goyal: > Hi Thomas, > > On 10/26/2017 6:03 PM, Thomas Monjalon wrote: > > 26/10/2017 14:28, Radu Nicolau: > >> > >> On 10/26/2017 12:39 PM, Thomas Monjalon wrote: > >>> 26/10/2017 13:27, David Marchand: > >>>> On Thu, Oct 26, 2017 at 1:01 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: > >>>>> On 10/26/2017 11:36 AM, David Marchand wrote: > >>>>>> On Thu, Oct 26, 2017 at 12:22 PM, Radu Nicolau <radu.nicolau@intel.com> > >>>>>> wrote: > >>>>>>> --- a/drivers/net/ixgbe/Makefile > >>>>>>> +++ b/drivers/net/ixgbe/Makefile > >>>>>>> +ifneq ($(MAKECMDGOALS),clean) > >>>>>>> +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) > >>>>>>> +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") > >>>>>>> +endif > >>>>>>> +endif > >>>>>> This is a no go for me unless you explain how it is impossible to > >>>>>> disable it in the code. > >>>>>> > >>>>>> > >>>>> It can be disabled in the code, but as far as I know there is a general push > >>>>> back against having conditionally compiled code. I originally had the > >>>>> security sections in ixgbe PMD isolated, but the feedback was to have them > >>>>> always on. > >>>> In my mind, this was to stop having features enabled per pmd (and stop > >>>> the nightmare with 10 options in a pmd). > >>>> Having features globally enabled for all or nothing is still > >>>> acceptable, is it not ? > >>> Yes there is a config option for rte_security, > >>> and it is acceptable. > >>> The code depending on it must be ifdef'ed. > >> > >> Given that both ixgbe and dpaa2_sec are now security enabled PMDs, I > >> would go with Konstantin's proposal, have rte_security listed as a > >> dependency (instead of the explicit check). > > > > Please consider my request instead. > > Until now we are ifdef'ing code to allow disabling any lib. > > We are not going to change our mind during the last days of a release. > > Please just fix it for now. > > For dpaa2_sec we do not want to make the driver run without > rte_security. We do not see people using it without rte_security. Why not? > Will take the Makefile changes that Radu has done in 1st patch of this > series. Is it really a lot to ifdef? It is going to break compilation of DPDK for those who disable rte_security. ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 13:07 ` Thomas Monjalon @ 2017-10-26 13:16 ` Akhil Goyal 2017-10-26 14:00 ` Thomas Monjalon 0 siblings, 1 reply; 25+ messages in thread From: Akhil Goyal @ 2017-10-26 13:16 UTC (permalink / raw) To: Thomas Monjalon Cc: Radu Nicolau, David Marchand, dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz On 10/26/2017 6:37 PM, Thomas Monjalon wrote: > 26/10/2017 14:59, Akhil Goyal: >> Hi Thomas, >> >> On 10/26/2017 6:03 PM, Thomas Monjalon wrote: >>> 26/10/2017 14:28, Radu Nicolau: >>>> >>>> On 10/26/2017 12:39 PM, Thomas Monjalon wrote: >>>>> 26/10/2017 13:27, David Marchand: >>>>>> On Thu, Oct 26, 2017 at 1:01 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: >>>>>>> On 10/26/2017 11:36 AM, David Marchand wrote: >>>>>>>> On Thu, Oct 26, 2017 at 12:22 PM, Radu Nicolau <radu.nicolau@intel.com> >>>>>>>> wrote: >>>>>>>>> --- a/drivers/net/ixgbe/Makefile >>>>>>>>> +++ b/drivers/net/ixgbe/Makefile >>>>>>>>> +ifneq ($(MAKECMDGOALS),clean) >>>>>>>>> +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) >>>>>>>>> +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") >>>>>>>>> +endif >>>>>>>>> +endif >>>>>>>> This is a no go for me unless you explain how it is impossible to >>>>>>>> disable it in the code. >>>>>>>> >>>>>>>> >>>>>>> It can be disabled in the code, but as far as I know there is a general push >>>>>>> back against having conditionally compiled code. I originally had the >>>>>>> security sections in ixgbe PMD isolated, but the feedback was to have them >>>>>>> always on. >>>>>> In my mind, this was to stop having features enabled per pmd (and stop >>>>>> the nightmare with 10 options in a pmd). >>>>>> Having features globally enabled for all or nothing is still >>>>>> acceptable, is it not ? >>>>> Yes there is a config option for rte_security, >>>>> and it is acceptable. >>>>> The code depending on it must be ifdef'ed. >>>> >>>> Given that both ixgbe and dpaa2_sec are now security enabled PMDs, I >>>> would go with Konstantin's proposal, have rte_security listed as a >>>> dependency (instead of the explicit check). >>> >>> Please consider my request instead. >>> Until now we are ifdef'ing code to allow disabling any lib. >>> We are not going to change our mind during the last days of a release. >>> Please just fix it for now. >> >> For dpaa2_sec we do not want to make the driver run without >> rte_security. We do not see people using it without rte_security. > > Why not? We see a lot of performance difference in the two cases. People may not like to see a lower performance for the same protocol processing. > >> Will take the Makefile changes that Radu has done in 1st patch of this >> series. > > Is it really a lot to ifdef? As I see it would be around 12-13 checks in 2 files. > > It is going to break compilation of DPDK for those who disable rte_security. > Well I would say, if people do not need rte_security then they can disable dpaa2_sec_pmd also. -Akhil ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 13:16 ` Akhil Goyal @ 2017-10-26 14:00 ` Thomas Monjalon 0 siblings, 0 replies; 25+ messages in thread From: Thomas Monjalon @ 2017-10-26 14:00 UTC (permalink / raw) To: Akhil Goyal Cc: Radu Nicolau, David Marchand, dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz 26/10/2017 15:16, Akhil Goyal: > On 10/26/2017 6:37 PM, Thomas Monjalon wrote: > > 26/10/2017 14:59, Akhil Goyal: > >> Hi Thomas, > >> > >> On 10/26/2017 6:03 PM, Thomas Monjalon wrote: > >>> 26/10/2017 14:28, Radu Nicolau: > >>>> > >>>> On 10/26/2017 12:39 PM, Thomas Monjalon wrote: > >>>>> 26/10/2017 13:27, David Marchand: > >>>>>> On Thu, Oct 26, 2017 at 1:01 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: > >>>>>>> On 10/26/2017 11:36 AM, David Marchand wrote: > >>>>>>>> On Thu, Oct 26, 2017 at 12:22 PM, Radu Nicolau <radu.nicolau@intel.com> > >>>>>>>> wrote: > >>>>>>>>> --- a/drivers/net/ixgbe/Makefile > >>>>>>>>> +++ b/drivers/net/ixgbe/Makefile > >>>>>>>>> +ifneq ($(MAKECMDGOALS),clean) > >>>>>>>>> +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) > >>>>>>>>> +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") > >>>>>>>>> +endif > >>>>>>>>> +endif > >>>>>>>> This is a no go for me unless you explain how it is impossible to > >>>>>>>> disable it in the code. > >>>>>>>> > >>>>>>>> > >>>>>>> It can be disabled in the code, but as far as I know there is a general push > >>>>>>> back against having conditionally compiled code. I originally had the > >>>>>>> security sections in ixgbe PMD isolated, but the feedback was to have them > >>>>>>> always on. > >>>>>> In my mind, this was to stop having features enabled per pmd (and stop > >>>>>> the nightmare with 10 options in a pmd). > >>>>>> Having features globally enabled for all or nothing is still > >>>>>> acceptable, is it not ? > >>>>> Yes there is a config option for rte_security, > >>>>> and it is acceptable. > >>>>> The code depending on it must be ifdef'ed. > >>>> > >>>> Given that both ixgbe and dpaa2_sec are now security enabled PMDs, I > >>>> would go with Konstantin's proposal, have rte_security listed as a > >>>> dependency (instead of the explicit check). > >>> > >>> Please consider my request instead. > >>> Until now we are ifdef'ing code to allow disabling any lib. > >>> We are not going to change our mind during the last days of a release. > >>> Please just fix it for now. > >> > >> For dpaa2_sec we do not want to make the driver run without > >> rte_security. We do not see people using it without rte_security. > > > > Why not? > We see a lot of performance difference in the two cases. People may not > like to see a lower performance for the same protocol processing. > > > > >> Will take the Makefile changes that Radu has done in 1st patch of this > >> series. > > > > Is it really a lot to ifdef? > As I see it would be around 12-13 checks in 2 files. > > > > It is going to break compilation of DPDK for those who disable rte_security. > > > > Well I would say, if people do not need rte_security then they can > disable dpaa2_sec_pmd also. OK ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 11:01 ` Radu Nicolau 2017-10-26 11:27 ` David Marchand @ 2017-10-26 11:30 ` Ananyev, Konstantin 2017-10-26 11:39 ` David Marchand 1 sibling, 1 reply; 25+ messages in thread From: Ananyev, Konstantin @ 2017-10-26 11:30 UTC (permalink / raw) To: Nicolau, Radu, David Marchand Cc: dev, Doherty, Declan, De Lara Guarch, Pablo, Hemant Agrawal, borisp, aviadye, Thomas Monjalon, sandeep.malik, Jerin Jacob, Mcnamara, John, shahafs, Olivier Matz, Akhil Goyal > -----Original Message----- > From: Nicolau, Radu > Sent: Thursday, October 26, 2017 12:01 PM > To: David Marchand <david.marchand@6wind.com> > Cc: dev@dpdk.org; Doherty, Declan <declan.doherty@intel.com>; De Lara Guarch, Pablo <pablo.de.lara.guarch@intel.com>; Hemant > Agrawal <hemant.agrawal@nxp.com>; borisp@mellanox.com; aviadye@mellanox.com; Thomas Monjalon <thomas@monjalon.net>; > sandeep.malik@nxp.com; Jerin Jacob <jerin.jacob@caviumnetworks.com>; Mcnamara, John <john.mcnamara@intel.com>; Ananyev, > Konstantin <konstantin.ananyev@intel.com>; shahafs@mellanox.com; Olivier Matz <olivier.matz@6wind.com>; Akhil Goyal > <akhil.goyal@nxp.com> > Subject: Re: [PATCH 2/3] net/ixgbe: fix build issue > > > > On 10/26/2017 11:36 AM, David Marchand wrote: > > On Thu, Oct 26, 2017 at 12:22 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: > >> Build fails when rte_security is disabled; make rte_security mandatory > >> Fixes: 9a0752f498d2 ("net/ixgbe: enable inline IPsec") > >> > >> Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> > >> --- > >> drivers/net/ixgbe/Makefile | 6 ++++++ > >> 1 file changed, 6 insertions(+) > >> > >> diff --git a/drivers/net/ixgbe/Makefile b/drivers/net/ixgbe/Makefile > >> index f03c426..c879828 100644 > >> --- a/drivers/net/ixgbe/Makefile > >> +++ b/drivers/net/ixgbe/Makefile > >> @@ -31,6 +31,12 @@ > >> > >> include $(RTE_SDK)/mk/rte.vars.mk > >> > >> +ifneq ($(MAKECMDGOALS),clean) > >> +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) > >> +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_IXGBE_PMD") > >> +endif > >> +endif > >> + > >> # > >> # library name > >> # > > This is a no go for me unless you explain how it is impossible to > > disable it in the code. > > > > > It can be disabled in the code, but as far as I know there is a general > push back against having conditionally compiled code. I originally had > the security sections in ixgbe PMD isolated, but the feedback was to > have them always on. > An alternative solution will be to remove the option altogether and > always build rte_security library. My vote would be to have it a mandatory library for ixgbe. Add it into DEPDIRS-ixgbe inside drivers/net/Makefile or so. Konstantin ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 11:30 ` Ananyev, Konstantin @ 2017-10-26 11:39 ` David Marchand 2017-10-26 12:30 ` Radu Nicolau 2017-10-26 12:33 ` Ananyev, Konstantin 0 siblings, 2 replies; 25+ messages in thread From: David Marchand @ 2017-10-26 11:39 UTC (permalink / raw) To: Ananyev, Konstantin Cc: Nicolau, Radu, dev, Doherty, Declan, De Lara Guarch, Pablo, Hemant Agrawal, borisp, aviadye, Thomas Monjalon, sandeep.malik, Jerin Jacob, Mcnamara, John, shahafs, Olivier Matz, Akhil Goyal On Thu, Oct 26, 2017 at 1:30 PM, Ananyev, Konstantin <konstantin.ananyev@intel.com> wrote: >> -----Original Message----- >> From: Nicolau, Radu >> It can be disabled in the code, but as far as I know there is a general >> push back against having conditionally compiled code. I originally had >> the security sections in ixgbe PMD isolated, but the feedback was to >> have them always on. >> An alternative solution will be to remove the option altogether and >> always build rte_security library. > > My vote would be to have it a mandatory library for ixgbe. > Add it into DEPDIRS-ixgbe inside drivers/net/Makefile or so. And then librte_security needs librte_crypto (if I am not mistaken). So if we go this way, we must ensure the same is done in librte_security. -- David Marchand ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 11:39 ` David Marchand @ 2017-10-26 12:30 ` Radu Nicolau 2017-10-26 12:33 ` Ananyev, Konstantin 1 sibling, 0 replies; 25+ messages in thread From: Radu Nicolau @ 2017-10-26 12:30 UTC (permalink / raw) To: David Marchand, Ananyev, Konstantin Cc: dev, Doherty, Declan, De Lara Guarch, Pablo, Hemant Agrawal, borisp, aviadye, Thomas Monjalon, sandeep.malik, Jerin Jacob, Mcnamara, John, shahafs, Olivier Matz, Akhil Goyal On 10/26/2017 12:39 PM, David Marchand wrote: > On Thu, Oct 26, 2017 at 1:30 PM, Ananyev, Konstantin > <konstantin.ananyev@intel.com> wrote: >>> -----Original Message----- >>> From: Nicolau, Radu >>> It can be disabled in the code, but as far as I know there is a general >>> push back against having conditionally compiled code. I originally had >>> the security sections in ixgbe PMD isolated, but the feedback was to >>> have them always on. >>> An alternative solution will be to remove the option altogether and >>> always build rte_security library. >> My vote would be to have it a mandatory library for ixgbe. >> Add it into DEPDIRS-ixgbe inside drivers/net/Makefile or so. > And then librte_security needs librte_crypto (if I am not mistaken). > So if we go this way, we must ensure the same is done in librte_security. > > It is already there: DEPDIRS-librte_security += librte_cryptodev ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 2/3] net/ixgbe: fix build issue 2017-10-26 11:39 ` David Marchand 2017-10-26 12:30 ` Radu Nicolau @ 2017-10-26 12:33 ` Ananyev, Konstantin 1 sibling, 0 replies; 25+ messages in thread From: Ananyev, Konstantin @ 2017-10-26 12:33 UTC (permalink / raw) To: David Marchand Cc: Nicolau, Radu, dev, Doherty, Declan, De Lara Guarch, Pablo, Hemant Agrawal, borisp, aviadye, Thomas Monjalon, sandeep.malik, Jerin Jacob, Mcnamara, John, shahafs, Olivier Matz, Akhil Goyal > -----Original Message----- > From: David Marchand [mailto:david.marchand@6wind.com] > Sent: Thursday, October 26, 2017 12:39 PM > To: Ananyev, Konstantin <konstantin.ananyev@intel.com> > Cc: Nicolau, Radu <radu.nicolau@intel.com>; dev@dpdk.org; Doherty, Declan <declan.doherty@intel.com>; De Lara Guarch, Pablo > <pablo.de.lara.guarch@intel.com>; Hemant Agrawal <hemant.agrawal@nxp.com>; borisp@mellanox.com; aviadye@mellanox.com; > Thomas Monjalon <thomas@monjalon.net>; sandeep.malik@nxp.com; Jerin Jacob <jerin.jacob@caviumnetworks.com>; Mcnamara, > John <john.mcnamara@intel.com>; shahafs@mellanox.com; Olivier Matz <olivier.matz@6wind.com>; Akhil Goyal > <akhil.goyal@nxp.com> > Subject: Re: [PATCH 2/3] net/ixgbe: fix build issue > > On Thu, Oct 26, 2017 at 1:30 PM, Ananyev, Konstantin > <konstantin.ananyev@intel.com> wrote: > >> -----Original Message----- > >> From: Nicolau, Radu > >> It can be disabled in the code, but as far as I know there is a general > >> push back against having conditionally compiled code. I originally had > >> the security sections in ixgbe PMD isolated, but the feedback was to > >> have them always on. > >> An alternative solution will be to remove the option altogether and > >> always build rte_security library. > > > > My vote would be to have it a mandatory library for ixgbe. > > Add it into DEPDIRS-ixgbe inside drivers/net/Makefile or so. > > And then librte_security needs librte_crypto (if I am not mistaken). It seems like it does... Though from what I understand - it uses inly some struct definitions from it. Wonder could we move these definitions into rte_security instead and make rte_cryptodev depend on it instead? Konstantin > So if we go this way, we must ensure the same is done in librte_security. > > > -- > David Marchand ^ permalink raw reply [flat|nested] 25+ messages in thread
* [dpdk-dev] [PATCH 3/3] examples/ipsec-secgw: fix build issue 2017-10-26 10:22 [dpdk-dev] [PATCH 0/3] Build fails when rte_security is disabled Radu Nicolau 2017-10-26 10:22 ` [dpdk-dev] [PATCH 1/3] crypto/dpaa2_sec: fix build issue Radu Nicolau 2017-10-26 10:22 ` [dpdk-dev] [PATCH 2/3] net/ixgbe: " Radu Nicolau @ 2017-10-26 10:22 ` Radu Nicolau 2017-10-26 10:31 ` [dpdk-dev] [PATCH 0/3] Build fails when rte_security is disabled Akhil Goyal 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 " Radu Nicolau 4 siblings, 0 replies; 25+ messages in thread From: Radu Nicolau @ 2017-10-26 10:22 UTC (permalink / raw) To: dev Cc: david.marchand, declan.doherty, pablo.de.lara.guarch, hemant.agrawal, borisp, aviadye, thomas, sandeep.malik, jerin.jacob, john.mcnamara, konstantin.ananyev, shahafs, olivier.matz, akhil.goyal, Radu Nicolau Build fails when rte_security is disabled; make rte_security mandatory Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload") Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> --- examples/ipsec-secgw/Makefile | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/examples/ipsec-secgw/Makefile b/examples/ipsec-secgw/Makefile index 17e9155..9fd33cb 100644 --- a/examples/ipsec-secgw/Makefile +++ b/examples/ipsec-secgw/Makefile @@ -38,6 +38,12 @@ RTE_TARGET ?= x86_64-native-linuxapp-gcc include $(RTE_SDK)/mk/rte.vars.mk +ifneq ($(MAKECMDGOALS),clean) +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) +$(error "RTE_LIBRTE_SECURITY is required to build ipsec-secgw") +endif +endif + APP = ipsec-secgw CFLAGS += -O3 -gdwarf-2 -- 2.7.5 ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH 0/3] Build fails when rte_security is disabled. 2017-10-26 10:22 [dpdk-dev] [PATCH 0/3] Build fails when rte_security is disabled Radu Nicolau ` (2 preceding siblings ...) 2017-10-26 10:22 ` [dpdk-dev] [PATCH 3/3] examples/ipsec-secgw: " Radu Nicolau @ 2017-10-26 10:31 ` Akhil Goyal 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 " Radu Nicolau 4 siblings, 0 replies; 25+ messages in thread From: Akhil Goyal @ 2017-10-26 10:31 UTC (permalink / raw) To: Radu Nicolau, dev Cc: david.marchand, declan.doherty, pablo.de.lara.guarch, hemant.agrawal, borisp, aviadye, thomas, sandeep.malik, jerin.jacob, john.mcnamara, konstantin.ananyev, shahafs, olivier.matz On 10/26/2017 3:52 PM, Radu Nicolau wrote: > Disabling CONFIG_RTE_LIBRTE_SECURITY results in build failure for > crypto/dpaa2_sec and net/ixgbe PMDs and IPsec sample app. > This patchset makes CONFIG_RTE_LIBRTE_SECURITY mandatory for all > of the above. > > Radu Nicolau (3): > crypto/dpaa2_sec: fix build issue > net/ixgbe: fix build issue > examples/ipsec-secgw: fix build issue > > drivers/crypto/dpaa2_sec/Makefile | 6 ++++++ > drivers/net/ixgbe/Makefile | 6 ++++++ > examples/ipsec-secgw/Makefile | 6 ++++++ > 3 files changed, 18 insertions(+) > Series Acked-by: Akhil Goyal <akhil.goyal@nxp.com> ^ permalink raw reply [flat|nested] 25+ messages in thread
* [dpdk-dev] [PATCH v2 0/3] Build fails when rte_security is disabled 2017-10-26 10:22 [dpdk-dev] [PATCH 0/3] Build fails when rte_security is disabled Radu Nicolau ` (3 preceding siblings ...) 2017-10-26 10:31 ` [dpdk-dev] [PATCH 0/3] Build fails when rte_security is disabled Akhil Goyal @ 2017-10-26 14:15 ` Radu Nicolau 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 1/3] net/ixgbe: fix build issue Radu Nicolau ` (3 more replies) 4 siblings, 4 replies; 25+ messages in thread From: Radu Nicolau @ 2017-10-26 14:15 UTC (permalink / raw) To: dev Cc: david.marchand, declan.doherty, pablo.de.lara.guarch, hemant.agrawal, borisp, aviadye, thomas, sandeep.malik, jerin.jacob, john.mcnamara, konstantin.ananyev, shahafs, olivier.matz, akhil.goyal, Radu Nicolau v2: Added ifdefs in the ixgbe code, updated dependecies for ipsec_secgw, dpaa2_sec kept as in v1, with a dependency check Radu Nicolau (3): net/ixgbe: fix build issue examples/ipsec-secgw: fix build issue crypto/dpaa2_sec: fix build issue drivers/crypto/dpaa2_sec/Makefile | 6 ++++++ drivers/net/ixgbe/Makefile | 2 ++ drivers/net/ixgbe/ixgbe_ethdev.c | 8 +++++++ drivers/net/ixgbe/ixgbe_ethdev.h | 4 ++++ drivers/net/ixgbe/ixgbe_flow.c | 6 ++++++ drivers/net/ixgbe/ixgbe_rxtx.c | 39 +++++++++++++++++++++++++--------- drivers/net/ixgbe/ixgbe_rxtx.h | 8 +++++-- drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c | 6 ++++++ examples/Makefile | 2 +- examples/ipsec-secgw/Makefile | 6 ++++++ 10 files changed, 74 insertions(+), 13 deletions(-) -- 2.7.5 ^ permalink raw reply [flat|nested] 25+ messages in thread
* [dpdk-dev] [PATCH v2 1/3] net/ixgbe: fix build issue 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 " Radu Nicolau @ 2017-10-26 14:15 ` Radu Nicolau 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 2/3] examples/ipsec-secgw: " Radu Nicolau ` (2 subsequent siblings) 3 siblings, 0 replies; 25+ messages in thread From: Radu Nicolau @ 2017-10-26 14:15 UTC (permalink / raw) To: dev Cc: david.marchand, declan.doherty, pablo.de.lara.guarch, hemant.agrawal, borisp, aviadye, thomas, sandeep.malik, jerin.jacob, john.mcnamara, konstantin.ananyev, shahafs, olivier.matz, akhil.goyal, Radu Nicolau Fixes: 9a0752f498d2 ("net/ixgbe: enable inline IPsec") Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> --- drivers/net/ixgbe/Makefile | 2 ++ drivers/net/ixgbe/ixgbe_ethdev.c | 8 +++++++ drivers/net/ixgbe/ixgbe_ethdev.h | 4 ++++ drivers/net/ixgbe/ixgbe_flow.c | 6 ++++++ drivers/net/ixgbe/ixgbe_rxtx.c | 39 +++++++++++++++++++++++++--------- drivers/net/ixgbe/ixgbe_rxtx.h | 8 +++++-- drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c | 6 ++++++ 7 files changed, 61 insertions(+), 12 deletions(-) diff --git a/drivers/net/ixgbe/Makefile b/drivers/net/ixgbe/Makefile index f03c426..7f575f7 100644 --- a/drivers/net/ixgbe/Makefile +++ b/drivers/net/ixgbe/Makefile @@ -124,7 +124,9 @@ ifeq ($(CONFIG_RTE_LIBRTE_IXGBE_BYPASS),y) SRCS-$(CONFIG_RTE_LIBRTE_IXGBE_PMD) += ixgbe_bypass.c SRCS-$(CONFIG_RTE_LIBRTE_IXGBE_PMD) += ixgbe_82599_bypass.c endif +ifeq ($(CONFIG_RTE_LIBRTE_SECURITY),y) SRCS-$(CONFIG_RTE_LIBRTE_IXGBE_PMD) += ixgbe_ipsec.c +endif SRCS-$(CONFIG_RTE_LIBRTE_IXGBE_PMD) += rte_pmd_ixgbe.c SRCS-$(CONFIG_RTE_LIBRTE_IXGBE_PMD) += ixgbe_tm.c diff --git a/drivers/net/ixgbe/ixgbe_ethdev.c b/drivers/net/ixgbe/ixgbe_ethdev.c index 4339347..cc27065 100644 --- a/drivers/net/ixgbe/ixgbe_ethdev.c +++ b/drivers/net/ixgbe/ixgbe_ethdev.c @@ -61,7 +61,9 @@ #include <rte_random.h> #include <rte_dev.h> #include <rte_hash_crc.h> +#ifdef RTE_LIBRTE_SECURITY #include <rte_security_driver.h> +#endif #include "ixgbe_logs.h" #include "base/ixgbe_api.h" @@ -1168,10 +1170,12 @@ eth_ixgbe_dev_init(struct rte_eth_dev *eth_dev) return 0; } +#ifdef RTE_LIBRTE_SECURITY /* Initialize security_ctx only for primary process*/ eth_dev->security_ctx = ixgbe_ipsec_ctx_create(eth_dev); if (eth_dev->security_ctx == NULL) return -ENOMEM; +#endif rte_eth_copy_pci_info(eth_dev, pci_dev); @@ -1406,7 +1410,9 @@ eth_ixgbe_dev_uninit(struct rte_eth_dev *eth_dev) /* Remove all Traffic Manager configuration */ ixgbe_tm_conf_uninit(eth_dev); +#ifdef RTE_LIBRTE_SECURITY rte_free(eth_dev->security_ctx); +#endif return 0; } @@ -3707,8 +3713,10 @@ ixgbe_dev_info_get(struct rte_eth_dev *dev, struct rte_eth_dev_info *dev_info) hw->mac.type == ixgbe_mac_X550EM_a) dev_info->tx_offload_capa |= DEV_TX_OFFLOAD_OUTER_IPV4_CKSUM; +#ifdef RTE_LIBRTE_SECURITY dev_info->rx_offload_capa |= DEV_RX_OFFLOAD_SECURITY; dev_info->tx_offload_capa |= DEV_TX_OFFLOAD_SECURITY; +#endif dev_info->default_rxconf = (struct rte_eth_rxconf) { .rx_thresh = { diff --git a/drivers/net/ixgbe/ixgbe_ethdev.h b/drivers/net/ixgbe/ixgbe_ethdev.h index f5b52c4..9d336ef 100644 --- a/drivers/net/ixgbe/ixgbe_ethdev.h +++ b/drivers/net/ixgbe/ixgbe_ethdev.h @@ -38,7 +38,9 @@ #include "base/ixgbe_dcb_82599.h" #include "base/ixgbe_dcb_82598.h" #include "ixgbe_bypass.h" +#ifdef RTE_LIBRTE_SECURITY #include "ixgbe_ipsec.h" +#endif #include <rte_time.h> #include <rte_hash.h> #include <rte_pci.h> @@ -487,7 +489,9 @@ struct ixgbe_adapter { struct ixgbe_filter_info filter; struct ixgbe_l2_tn_info l2_tn; struct ixgbe_bw_conf bw_conf; +#ifdef RTE_LIBRTE_SECURITY struct ixgbe_ipsec ipsec; +#endif bool rx_bulk_alloc_allowed; bool rx_vec_allowed; struct rte_timecounter systime_tc; diff --git a/drivers/net/ixgbe/ixgbe_flow.c b/drivers/net/ixgbe/ixgbe_flow.c index 13c8243..82fc705 100644 --- a/drivers/net/ixgbe/ixgbe_flow.c +++ b/drivers/net/ixgbe/ixgbe_flow.c @@ -229,6 +229,7 @@ cons_parse_ntuple_filter(const struct rte_flow_attr *attr, return -rte_errno; } +#ifdef RTE_LIBRTE_SECURITY /** * Special case for flow action type RTE_FLOW_ACTION_TYPE_SECURITY */ @@ -263,6 +264,7 @@ cons_parse_ntuple_filter(const struct rte_flow_attr *attr, return ixgbe_crypto_add_ingress_sa_from_flow(conf, item->spec, item->type == RTE_FLOW_ITEM_TYPE_IPV6); } +#endif /* the first not void item can be MAC or IPv4 */ item = next_no_void_pattern(pattern, NULL); @@ -557,9 +559,11 @@ ixgbe_parse_ntuple_filter(struct rte_eth_dev *dev, if (ret) return ret; +#ifdef RTE_LIBRTE_SECURITY /* ESP flow not really a flow*/ if (filter->proto == IPPROTO_ESP) return 0; +#endif /* Ixgbe doesn't support tcp flags. */ if (filter->flags & RTE_NTUPLE_FLAGS_TCP_FLAG) { @@ -2801,9 +2805,11 @@ ixgbe_flow_create(struct rte_eth_dev *dev, ret = ixgbe_parse_ntuple_filter(dev, attr, pattern, actions, &ntuple_filter, error); +#ifdef RTE_LIBRTE_SECURITY /* ESP flow not really a flow*/ if (ntuple_filter.proto == IPPROTO_ESP) return flow; +#endif if (!ret) { ret = ixgbe_add_del_ntuple_filter(dev, &ntuple_filter, TRUE); diff --git a/drivers/net/ixgbe/ixgbe_rxtx.c b/drivers/net/ixgbe/ixgbe_rxtx.c index 9f66ebf..37bb57b 100644 --- a/drivers/net/ixgbe/ixgbe_rxtx.c +++ b/drivers/net/ixgbe/ixgbe_rxtx.c @@ -397,7 +397,7 @@ static inline void ixgbe_set_xmit_ctx(struct ixgbe_tx_queue *txq, volatile struct ixgbe_adv_tx_context_desc *ctx_txd, uint64_t ol_flags, union ixgbe_tx_offload tx_offload, - union ixgbe_crypto_tx_desc_md *mdata) + __rte_unused uint64_t *mdata) { uint32_t type_tucmd_mlhl; uint32_t mss_l4len_idx = 0; @@ -481,17 +481,21 @@ ixgbe_set_xmit_ctx(struct ixgbe_tx_queue *txq, seqnum_seed |= tx_offload.l2_len << IXGBE_ADVTXD_TUNNEL_LEN; } +#ifdef RTE_LIBRTE_SECURITY if (ol_flags & PKT_TX_SEC_OFFLOAD) { + union ixgbe_crypto_tx_desc_md *md = + (union ixgbe_crypto_tx_desc_md *)mdata; seqnum_seed |= - (IXGBE_ADVTXD_IPSEC_SA_INDEX_MASK & mdata->sa_idx); - type_tucmd_mlhl |= mdata->enc ? + (IXGBE_ADVTXD_IPSEC_SA_INDEX_MASK & md->sa_idx); + type_tucmd_mlhl |= md->enc ? (IXGBE_ADVTXD_TUCMD_IPSEC_TYPE_ESP | IXGBE_ADVTXD_TUCMD_IPSEC_ENCRYPT_EN) : 0; type_tucmd_mlhl |= - (mdata->pad_len & IXGBE_ADVTXD_IPSEC_ESP_LEN_MASK); + (md->pad_len & IXGBE_ADVTXD_IPSEC_ESP_LEN_MASK); tx_offload_mask.sa_idx |= ~0; tx_offload_mask.sec_pad_len |= ~0; } +#endif txq->ctx_cache[ctx_idx].flags = ol_flags; txq->ctx_cache[ctx_idx].tx_offload.data[0] = @@ -670,7 +674,9 @@ ixgbe_xmit_pkts(void *tx_queue, struct rte_mbuf **tx_pkts, uint32_t ctx = 0; uint32_t new_ctx; union ixgbe_tx_offload tx_offload; +#ifdef RTE_LIBRTE_SECURITY uint8_t use_ipsec; +#endif tx_offload.data[0] = 0; tx_offload.data[1] = 0; @@ -698,7 +704,9 @@ ixgbe_xmit_pkts(void *tx_queue, struct rte_mbuf **tx_pkts, * are needed for offload functionality. */ ol_flags = tx_pkt->ol_flags; +#ifdef RTE_LIBRTE_SECURITY use_ipsec = txq->using_ipsec && (ol_flags & PKT_TX_SEC_OFFLOAD); +#endif /* If hardware offload required */ tx_ol_req = ol_flags & IXGBE_TX_OFFLOAD_MASK; @@ -710,6 +718,7 @@ ixgbe_xmit_pkts(void *tx_queue, struct rte_mbuf **tx_pkts, tx_offload.tso_segsz = tx_pkt->tso_segsz; tx_offload.outer_l2_len = tx_pkt->outer_l2_len; tx_offload.outer_l3_len = tx_pkt->outer_l3_len; +#ifdef RTE_LIBRTE_SECURITY if (use_ipsec) { union ixgbe_crypto_tx_desc_md *ipsec_mdata = (union ixgbe_crypto_tx_desc_md *) @@ -717,6 +726,7 @@ ixgbe_xmit_pkts(void *tx_queue, struct rte_mbuf **tx_pkts, tx_offload.sa_idx = ipsec_mdata->sa_idx; tx_offload.sec_pad_len = ipsec_mdata->pad_len; } +#endif /* If new context need be built or reuse the exist ctx. */ ctx = what_advctx_update(txq, tx_ol_req, @@ -877,9 +887,7 @@ ixgbe_xmit_pkts(void *tx_queue, struct rte_mbuf **tx_pkts, } ixgbe_set_xmit_ctx(txq, ctx_txd, tx_ol_req, - tx_offload, - (union ixgbe_crypto_tx_desc_md *) - &tx_pkt->udata64); + tx_offload, &tx_pkt->udata64); txe->last_id = tx_last; tx_id = txe->next_id; @@ -897,8 +905,10 @@ ixgbe_xmit_pkts(void *tx_queue, struct rte_mbuf **tx_pkts, } olinfo_status |= (pkt_len << IXGBE_ADVTXD_PAYLEN_SHIFT); +#ifdef RTE_LIBRTE_SECURITY if (use_ipsec) olinfo_status |= IXGBE_ADVTXD_POPTS_IPSEC; +#endif m_seg = tx_pkt; do { @@ -1473,11 +1483,13 @@ rx_desc_error_to_pkt_flags(uint32_t rx_status) pkt_flags |= PKT_RX_EIP_CKSUM_BAD; } +#ifdef RTE_LIBRTE_SECURITY if (rx_status & IXGBE_RXD_STAT_SECP) { pkt_flags |= PKT_RX_SEC_OFFLOAD; if (rx_status & IXGBE_RXDADV_LNKSEC_ERROR_BAD_SIG) pkt_flags |= PKT_RX_SEC_OFFLOAD_FAILED; } +#endif return pkt_flags; } @@ -2397,9 +2409,10 @@ ixgbe_set_tx_function(struct rte_eth_dev *dev, struct ixgbe_tx_queue *txq) { /* Use a simple Tx queue (no offloads, no multi segs) if possible */ if (((txq->txq_flags & IXGBE_SIMPLE_FLAGS) == IXGBE_SIMPLE_FLAGS) && - (txq->tx_rs_thresh >= RTE_PMD_IXGBE_TX_MAX_BURST) && - !(dev->data->dev_conf.txmode.offloads - & DEV_TX_OFFLOAD_SECURITY)) { +#ifdef RTE_LIBRTE_SECURITY + !(txq->using_ipsec) && +#endif + (txq->tx_rs_thresh >= RTE_PMD_IXGBE_TX_MAX_BURST)) { PMD_INIT_LOG(DEBUG, "Using simple tx code path"); dev->tx_pkt_prepare = NULL; #ifdef RTE_IXGBE_INC_VECTOR @@ -2569,8 +2582,10 @@ ixgbe_dev_tx_queue_setup(struct rte_eth_dev *dev, txq->txq_flags = tx_conf->txq_flags; txq->ops = &def_txq_ops; txq->tx_deferred_start = tx_conf->tx_deferred_start; +#ifdef RTE_LIBRTE_SECURITY txq->using_ipsec = !!(dev->data->dev_conf.txmode.offloads & DEV_TX_OFFLOAD_SECURITY); +#endif /* * Modification to set VFTDT for virtual function if vf is detected @@ -4555,8 +4570,10 @@ ixgbe_set_rx_function(struct rte_eth_dev *dev) struct ixgbe_rx_queue *rxq = dev->data->rx_queues[i]; rxq->rx_using_sse = rx_using_sse; +#ifdef RTE_LIBRTE_SECURITY rxq->using_ipsec = !!(dev->data->dev_conf.rxmode.offloads & DEV_RX_OFFLOAD_SECURITY); +#endif } } @@ -5044,6 +5061,7 @@ ixgbe_dev_rxtx_start(struct rte_eth_dev *dev) dev->data->dev_conf.lpbk_mode == IXGBE_LPBK_82599_TX_RX) ixgbe_setup_loopback_link_82599(hw); +#ifdef RTE_LIBRTE_SECURITY if ((dev->data->dev_conf.rxmode.offloads & DEV_RX_OFFLOAD_SECURITY) || (dev->data->dev_conf.txmode.offloads & @@ -5056,6 +5074,7 @@ ixgbe_dev_rxtx_start(struct rte_eth_dev *dev) return ret; } } +#endif return 0; } diff --git a/drivers/net/ixgbe/ixgbe_rxtx.h b/drivers/net/ixgbe/ixgbe_rxtx.h index 4017831..cc7c828 100644 --- a/drivers/net/ixgbe/ixgbe_rxtx.h +++ b/drivers/net/ixgbe/ixgbe_rxtx.h @@ -140,8 +140,10 @@ struct ixgbe_rx_queue { uint16_t rx_free_trigger; /**< triggers rx buffer allocation */ uint8_t rx_using_sse; /**< indicates that vector RX is in use */ +#ifdef RTE_LIBRTE_SECURITY uint8_t using_ipsec; /**< indicates that IPsec RX feature is in use */ +#endif #ifdef RTE_IXGBE_INC_VECTOR uint16_t rxrearm_nb; /**< number of remaining to be re-armed */ uint16_t rxrearm_start; /**< the idx we start the re-arming from */ @@ -185,10 +187,11 @@ union ixgbe_tx_offload { /* fields for TX offloading of tunnels */ uint64_t outer_l3_len:8; /**< Outer L3 (IP) Hdr Length. */ uint64_t outer_l2_len:8; /**< Outer L2 (MAC) Hdr Length. */ - +#ifdef RTE_LIBRTE_SECURITY /* inline ipsec related*/ uint64_t sa_idx:8; /**< TX SA database entry index */ uint64_t sec_pad_len:4; /**< padding length */ +#endif }; }; @@ -253,9 +256,10 @@ struct ixgbe_tx_queue { struct ixgbe_advctx_info ctx_cache[IXGBE_CTX_NUM]; const struct ixgbe_txq_ops *ops; /**< txq ops */ uint8_t tx_deferred_start; /**< not in global dev start. */ +#ifdef RTE_LIBRTE_SECURITY uint8_t using_ipsec; /**< indicates that IPsec TX feature is in use */ - +#endif }; struct ixgbe_txq_ops { diff --git a/drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c b/drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c index 6fe0d85..158ccd9 100644 --- a/drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c +++ b/drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c @@ -122,6 +122,7 @@ ixgbe_rxq_rearm(struct ixgbe_rx_queue *rxq) IXGBE_PCI_REG_WRITE(rxq->rdt_reg_addr, rx_id); } +#ifdef RTE_LIBRTE_SECURITY static inline void desc_to_olflags_v_ipsec(__m128i descs[4], struct rte_mbuf **rx_pkts) { @@ -174,6 +175,7 @@ desc_to_olflags_v_ipsec(__m128i descs[4], struct rte_mbuf **rx_pkts) _mm_store_si128((__m128i *)&rx_pkts[2]->rearm_data, rearm2); _mm_store_si128((__m128i *)&rx_pkts[3]->rearm_data, rearm3); } +#endif static inline void desc_to_olflags_v(__m128i descs[4], __m128i mbuf_init, uint8_t vlan_flags, @@ -363,7 +365,9 @@ _recv_raw_pkts_vec(struct ixgbe_rx_queue *rxq, struct rte_mbuf **rx_pkts, volatile union ixgbe_adv_rx_desc *rxdp; struct ixgbe_rx_entry *sw_ring; uint16_t nb_pkts_recd; +#ifdef RTE_LIBRTE_SECURITY uint8_t use_ipsec = rxq->using_ipsec; +#endif int pos; uint64_t var; __m128i shuf_msk; @@ -527,8 +531,10 @@ _recv_raw_pkts_vec(struct ixgbe_rx_queue *rxq, struct rte_mbuf **rx_pkts, /* set ol_flags with vlan packet type */ desc_to_olflags_v(descs, mbuf_init, vlan_flags, &rx_pkts[pos]); +#ifdef RTE_LIBRTE_SECURITY if (unlikely(use_ipsec)) desc_to_olflags_v_ipsec(descs, rx_pkts); +#endif /* D.2 pkt 3,4 set in_port/nb_seg and remove crc */ pkt_mb4 = _mm_add_epi16(pkt_mb4, crc_adjust); -- 2.7.5 ^ permalink raw reply [flat|nested] 25+ messages in thread
* [dpdk-dev] [PATCH v2 2/3] examples/ipsec-secgw: fix build issue 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 " Radu Nicolau 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 1/3] net/ixgbe: fix build issue Radu Nicolau @ 2017-10-26 14:15 ` Radu Nicolau 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 3/3] crypto/dpaa2_sec: " Radu Nicolau 2017-10-26 15:27 ` [dpdk-dev] [PATCH v2 0/3] Build fails when rte_security is disabled David Marchand 3 siblings, 0 replies; 25+ messages in thread From: Radu Nicolau @ 2017-10-26 14:15 UTC (permalink / raw) To: dev Cc: david.marchand, declan.doherty, pablo.de.lara.guarch, hemant.agrawal, borisp, aviadye, thomas, sandeep.malik, jerin.jacob, john.mcnamara, konstantin.ananyev, shahafs, olivier.matz, akhil.goyal, Radu Nicolau Build fails when rte_security is disabled; make rte_security mandatory Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload") Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> --- examples/Makefile | 2 +- examples/ipsec-secgw/Makefile | 6 ++++++ 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/examples/Makefile b/examples/Makefile index 418383a..d31c9fd 100644 --- a/examples/Makefile +++ b/examples/Makefile @@ -50,7 +50,7 @@ ifeq ($(CONFIG_RTE_LIBRTE_LPM),y) DIRS-$(CONFIG_RTE_IP_FRAG) += ip_reassembly DIRS-$(CONFIG_RTE_IP_FRAG) += ip_fragmentation endif -ifeq ($(CONFIG_RTE_LIBRTE_ACL)$(CONFIG_RTE_LIBRTE_HASH)$(CONFIG_RTE_LIBRTE_LPM),yyy) +ifeq ($(CONFIG_RTE_LIBRTE_ACL)$(CONFIG_RTE_LIBRTE_HASH)$(CONFIG_RTE_LIBRTE_LPM)$(CONFIG_RTE_LIBRTE_SECURITY),yyyy) DIRS-$(CONFIG_RTE_LIBRTE_CRYPTODEV) += ipsec-secgw endif DIRS-$(CONFIG_RTE_LIBRTE_HASH) += ipv4_multicast diff --git a/examples/ipsec-secgw/Makefile b/examples/ipsec-secgw/Makefile index 17e9155..9fd33cb 100644 --- a/examples/ipsec-secgw/Makefile +++ b/examples/ipsec-secgw/Makefile @@ -38,6 +38,12 @@ RTE_TARGET ?= x86_64-native-linuxapp-gcc include $(RTE_SDK)/mk/rte.vars.mk +ifneq ($(MAKECMDGOALS),clean) +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) +$(error "RTE_LIBRTE_SECURITY is required to build ipsec-secgw") +endif +endif + APP = ipsec-secgw CFLAGS += -O3 -gdwarf-2 -- 2.7.5 ^ permalink raw reply [flat|nested] 25+ messages in thread
* [dpdk-dev] [PATCH v2 3/3] crypto/dpaa2_sec: fix build issue 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 " Radu Nicolau 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 1/3] net/ixgbe: fix build issue Radu Nicolau 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 2/3] examples/ipsec-secgw: " Radu Nicolau @ 2017-10-26 14:15 ` Radu Nicolau 2017-10-26 15:27 ` [dpdk-dev] [PATCH v2 0/3] Build fails when rte_security is disabled David Marchand 3 siblings, 0 replies; 25+ messages in thread From: Radu Nicolau @ 2017-10-26 14:15 UTC (permalink / raw) To: dev Cc: david.marchand, declan.doherty, pablo.de.lara.guarch, hemant.agrawal, borisp, aviadye, thomas, sandeep.malik, jerin.jacob, john.mcnamara, konstantin.ananyev, shahafs, olivier.matz, akhil.goyal, Radu Nicolau Build fails when rte_security is disabled; make rte_security mandatory Fixes: 0a23d4b6f4c2 ("crypto/dpaa2_sec: support protocol offload IPsec") Signed-off-by: Radu Nicolau <radu.nicolau@intel.com> --- drivers/crypto/dpaa2_sec/Makefile | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/drivers/crypto/dpaa2_sec/Makefile b/drivers/crypto/dpaa2_sec/Makefile index 3f0eade..a08f271 100644 --- a/drivers/crypto/dpaa2_sec/Makefile +++ b/drivers/crypto/dpaa2_sec/Makefile @@ -31,6 +31,12 @@ include $(RTE_SDK)/mk/rte.vars.mk +ifneq ($(MAKECMDGOALS),clean) +ifneq ($(CONFIG_RTE_LIBRTE_SECURITY),y) +$(error "RTE_LIBRTE_SECURITY is required to build RTE_LIBRTE_PMD_DPAA2_SEC") +endif +endif + # # library name # -- 2.7.5 ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH v2 0/3] Build fails when rte_security is disabled 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 " Radu Nicolau ` (2 preceding siblings ...) 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 3/3] crypto/dpaa2_sec: " Radu Nicolau @ 2017-10-26 15:27 ` David Marchand 2017-10-26 20:36 ` Thomas Monjalon 3 siblings, 1 reply; 25+ messages in thread From: David Marchand @ 2017-10-26 15:27 UTC (permalink / raw) To: Radu Nicolau Cc: dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, Thomas Monjalon, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz, Akhil Goyal On Thu, Oct 26, 2017 at 4:15 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: > v2: Added ifdefs in the ixgbe code, updated dependecies for ipsec_secgw, > dpaa2_sec kept as in v1, with a dependency check > > Radu Nicolau (3): > net/ixgbe: fix build issue > examples/ipsec-secgw: fix build issue > crypto/dpaa2_sec: fix build issue > > drivers/crypto/dpaa2_sec/Makefile | 6 ++++++ > drivers/net/ixgbe/Makefile | 2 ++ > drivers/net/ixgbe/ixgbe_ethdev.c | 8 +++++++ > drivers/net/ixgbe/ixgbe_ethdev.h | 4 ++++ > drivers/net/ixgbe/ixgbe_flow.c | 6 ++++++ > drivers/net/ixgbe/ixgbe_rxtx.c | 39 +++++++++++++++++++++++++--------- > drivers/net/ixgbe/ixgbe_rxtx.h | 8 +++++-- > drivers/net/ixgbe/ixgbe_rxtx_vec_sse.c | 6 ++++++ > examples/Makefile | 2 +- > examples/ipsec-secgw/Makefile | 6 ++++++ > 10 files changed, 74 insertions(+), 13 deletions(-) Tested build + examples build. Used this patchset on top of current master, on x86_64 / ubuntu-16.04, default "native" config, with and without rte_security enabled. Tested-by: David Marchand <david.marchand@6wind.com> Thanks. -- David Marchand ^ permalink raw reply [flat|nested] 25+ messages in thread
* Re: [dpdk-dev] [PATCH v2 0/3] Build fails when rte_security is disabled 2017-10-26 15:27 ` [dpdk-dev] [PATCH v2 0/3] Build fails when rte_security is disabled David Marchand @ 2017-10-26 20:36 ` Thomas Monjalon 0 siblings, 0 replies; 25+ messages in thread From: Thomas Monjalon @ 2017-10-26 20:36 UTC (permalink / raw) To: David Marchand, Radu Nicolau, Akhil Goyal Cc: dev, Declan Doherty, Pablo de Lara, Hemant Agrawal, borisp, aviadye, sandeep.malik, Jerin Jacob, Mcnamara, John, Ananyev, Konstantin, shahafs, Olivier Matz 26/10/2017 17:27, David Marchand: > On Thu, Oct 26, 2017 at 4:15 PM, Radu Nicolau <radu.nicolau@intel.com> wrote: > > v2: Added ifdefs in the ixgbe code, updated dependecies for ipsec_secgw, > > dpaa2_sec kept as in v1, with a dependency check > > > > Radu Nicolau (3): > > net/ixgbe: fix build issue > > examples/ipsec-secgw: fix build issue > > crypto/dpaa2_sec: fix build issue > > Tested build + examples build. > Used this patchset on top of current master, on x86_64 / ubuntu-16.04, > default "native" config, with and without rte_security enabled. > > Tested-by: David Marchand <david.marchand@6wind.com> Applied, thanks everybody for catching and fixing ^ permalink raw reply [flat|nested] 25+ messages in thread
end of thread, other threads:[~2017-10-26 20:36 UTC | newest] Thread overview: 25+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2017-10-26 10:22 [dpdk-dev] [PATCH 0/3] Build fails when rte_security is disabled Radu Nicolau 2017-10-26 10:22 ` [dpdk-dev] [PATCH 1/3] crypto/dpaa2_sec: fix build issue Radu Nicolau 2017-10-26 10:22 ` [dpdk-dev] [PATCH 2/3] net/ixgbe: " Radu Nicolau 2017-10-26 10:36 ` David Marchand 2017-10-26 11:01 ` Radu Nicolau 2017-10-26 11:27 ` David Marchand 2017-10-26 11:39 ` Thomas Monjalon 2017-10-26 12:28 ` Radu Nicolau 2017-10-26 12:33 ` Thomas Monjalon 2017-10-26 12:59 ` Akhil Goyal 2017-10-26 13:07 ` Thomas Monjalon 2017-10-26 13:16 ` Akhil Goyal 2017-10-26 14:00 ` Thomas Monjalon 2017-10-26 11:30 ` Ananyev, Konstantin 2017-10-26 11:39 ` David Marchand 2017-10-26 12:30 ` Radu Nicolau 2017-10-26 12:33 ` Ananyev, Konstantin 2017-10-26 10:22 ` [dpdk-dev] [PATCH 3/3] examples/ipsec-secgw: " Radu Nicolau 2017-10-26 10:31 ` [dpdk-dev] [PATCH 0/3] Build fails when rte_security is disabled Akhil Goyal 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 " Radu Nicolau 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 1/3] net/ixgbe: fix build issue Radu Nicolau 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 2/3] examples/ipsec-secgw: " Radu Nicolau 2017-10-26 14:15 ` [dpdk-dev] [PATCH v2 3/3] crypto/dpaa2_sec: " Radu Nicolau 2017-10-26 15:27 ` [dpdk-dev] [PATCH v2 0/3] Build fails when rte_security is disabled David Marchand 2017-10-26 20:36 ` Thomas Monjalon
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).