From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 26DAEA034F; Tue, 1 Mar 2022 10:17:44 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 18BA841C2E; Tue, 1 Mar 2022 10:17:44 +0100 (CET) Received: from inbox.dpdk.org (inbox.dpdk.org [95.142.172.178]) by mails.dpdk.org (Postfix) with ESMTP id 39597407FF for ; Tue, 1 Mar 2022 10:17:42 +0100 (CET) Received: by inbox.dpdk.org (Postfix, from userid 33) id 29F9DA0350; Tue, 1 Mar 2022 10:17:42 +0100 (CET) From: bugzilla@dpdk.org To: dev@dpdk.org Subject: [Bug 944] [dpdk 22.03-rc2] inline_ipsec/test_Ipsec_Encryption_Rss: run dpdk-ipsec-secgw with assigned parameter fail Date: Tue, 01 Mar 2022 09:17:41 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: DPDK X-Bugzilla-Component: examples X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: peng1x.zhang@intel.com X-Bugzilla-Status: UNCONFIRMED X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: dev@dpdk.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter target_milestone attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://bugs.dpdk.org/ Auto-Submitted: auto-generated X-Auto-Response-Suppress: All MIME-Version: 1.0 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org https://bugs.dpdk.org/show_bug.cgi?id=3D944 Bug ID: 944 Summary: [dpdk 22.03-rc2] inline_ipsec/test_Ipsec_Encryption_Rss: run dpdk-ipsec-secgw with assigned parameter fail Product: DPDK Version: unspecified Hardware: All OS: All Status: UNCONFIRMED Severity: normal Priority: Normal Component: examples Assignee: dev@dpdk.org Reporter: peng1x.zhang@intel.com Target Milestone: --- Created attachment 191 --> https://bugs.dpdk.org/attachment.cgi?id=3D191&action=3Dedit config file [Environment] DPDK version: Use make showversion or for a non-released version: git remot= e -v && git show-ref --heads v22.03-rc2 305769000c40a4fdf1ed0cf24c157b447b91ea7d Other software versions: N/A. OS: Linux Ubuntu 20.04.3 LTS/5.8.0-050800-generic=20 Compiler: gcc (Ubuntu 9.3.0-17ubuntu1~20.04) 9.3.0 Hardware platform: Intel(R) Xeon(R) CPU E5-2699 v3 @ 2.30GHz NIC hardware: Intel Corporation 82599ES 10-Gigabit SFI/SFP+ Network Connect= ion (rev 01). [Test Setup] Steps to reproduce List the steps to reproduce the issue. 1.usertools/dpdk-devbind.py --force --bind=3Dvfio-pci 0000:03:00.0 0000:03:= 00.1 2.sed -i -e 's/if (nb_rx > 0)/if (nb_rx > 0) {/g' -e '/\/\* dequeue and pro= cess completed crypto-ops \*\//i\\t\t\t}' -e '/process_pkts(qconf, pkts, nb_rx, portid);/i\\t\t\t\tprintf("[debug]receive %llu packet in rxqueueid=3D%llu\\n",(unsigned long long)nb_rx, (unsigned long long)queueid= );' examples/ipsec-secgw/ipsec-secgw.c 3.meson configure -Dexamples=3Dipsec-secgw x86_64-native-linuxapp-gcc 4.ninja -C x86_64-native-linuxapp-gcc 5.x86_64-native-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -n 4=20=20 --file-prefix=3Ddpdk_9407_20220302180511 --vdev 'crypto_null' --log-level= 8 --socket-mem 1024,1024 -- -p 0xf -P -u 0x2 --config=3D'(0,0,20),(0,1,20),(1,0,21),(1,1,21)' -f /root/dpdk/enc_rss.cfg [Actual Result] x86_64-native-linuxapp-gcc/examples/dpdk-ipsec-secgw -l 20,21 -n 4=20=20 --file-prefix=3Ddpdk_9407_20220302180511 --vdev 'crypto_null' --log-level= 8 --socket-mem 1024,1024 -- -p 0xf -P -u 0x2 --config=3D'(0,0,20),(0,1,20),(1,0,21),(1,1,21)' -f /root/dpdk/enc_rss.cfg EAL: Detected CPU lcores: 72 EAL: Detected NUMA nodes: 2 EAL: Detected static linkage of DPDK EAL: Multi-process socket /var/run/dpdk/dpdk_9407_20220302180511/mp_socket EAL: Selected IOVA mode 'VA' EAL: VFIO support initialized EAL: Using IOMMU type 1 (Type 1) EAL: Ignore mapping IO port bar(1) EAL: Ignore mapping IO port bar(2) EAL: Ignore mapping IO port bar(5) EAL: Probe PCI driver: net_ixgbe (8086:10fb) device: 0000:03:00.0 (socket 0) EAL: Ignore mapping IO port bar(1) EAL: Ignore mapping IO port bar(2) EAL: Ignore mapping IO port bar(5) EAL: Probe PCI driver: net_ixgbe (8086:10fb) device: 0000:03:00.1 (socket 0) CRYPTODEV: Creating cryptodev crypto_nullCRYPTODEV: Initialisation paramete= rs - name: crypto_null,socket id: 1, max queue pairs: 8 Promiscuous mode selected librte_ipsec usage: disabled replay window size: 0 ESN: disabled SA flags: 0 Frag TTL: 10000000000 ns EAL: Error - exiting with code: 1 Cause: Cannot use unprotected portmask without configured SA inbound [Expected Result] No eal error happen. Regression Is this issue a regression: (Y) Version the regression was introduced: Specify git id if known. First bad commit: commit a15f7b7d8aac9cca41d8bd022c3cf939a6a8d2e8 Author: Volodymyr Fialko Date: Wed Feb 9 12:52:13 2022 +0100 examples/ipsec-secgw: add check for unprotected port mask Usage of unprotected port mask without any configured SA inbound, will cause use of uninitialized SA context, so disallow such configuration. Signed-off-by: Volodymyr Fialko Acked-by: Anoob Joseph --=20 You are receiving this mail because: You are the assignee for the bug.=