From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by dpdk.space (Postfix) with ESMTP id 16722A00E6 for ; Tue, 16 Apr 2019 16:38:57 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 0B3351B4D3; Tue, 16 Apr 2019 16:38:57 +0200 (CEST) Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by dpdk.org (Postfix) with ESMTP id 612C71B4EE for ; Tue, 16 Apr 2019 16:38:55 +0200 (CEST) Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id C3940307D986; Tue, 16 Apr 2019 14:38:54 +0000 (UTC) Received: from rh.redhat.com (ovpn-117-214.ams2.redhat.com [10.36.117.214]) by smtp.corp.redhat.com (Postfix) with ESMTP id 81F311001E92; Tue, 16 Apr 2019 14:38:53 +0000 (UTC) From: Kevin Traynor To: Bernard Iremonger Cc: Konstantin Ananyev , Akhil Goyal , dpdk stable Date: Tue, 16 Apr 2019 15:37:05 +0100 Message-Id: <20190416143719.21601-47-ktraynor@redhat.com> In-Reply-To: <20190416143719.21601-1-ktraynor@redhat.com> References: <20190416143719.21601-1-ktraynor@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.48]); Tue, 16 Apr 2019 14:38:54 +0000 (UTC) Subject: [dpdk-stable] patch 'examples/ipsec-secgw: fix debug logs' has been queued to LTS release 18.11.2 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Sender: "stable" Hi, FYI, your patch has been queued to LTS release 18.11.2 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 04/24/19. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Thanks. Kevin Traynor --- >From 12ae3d018d59eba793dfe6d1c0c3d8d4ab8f0f0a Mon Sep 17 00:00:00 2001 From: Bernard Iremonger Date: Thu, 7 Mar 2019 10:34:52 +0000 Subject: [PATCH] examples/ipsec-secgw: fix debug logs [ upstream commit da7a540e1dc64495785d4f0d6e6b20b27bf28580 ] Improve debug code in esp.c, sa.c and ipsec-secgw.c Fixes: f159e70b0922 ("examples/ipsec-secgw: support transport mode") Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload") Fixes: 0d547ed03717 ("examples/ipsec-secgw: support configuration file") Fixes: 906257e965b7 ("examples/ipsec-secgw: support IPv6") Signed-off-by: Bernard Iremonger Acked-by: Konstantin Ananyev Acked-by: Akhil Goyal --- examples/ipsec-secgw/esp.c | 5 +++-- examples/ipsec-secgw/ipsec-secgw.c | 6 ++++-- examples/ipsec-secgw/sa.c | 21 ++++++++++++++++++--- 3 files changed, 25 insertions(+), 7 deletions(-) diff --git a/examples/ipsec-secgw/esp.c b/examples/ipsec-secgw/esp.c index e33232c98..faa84ddd1 100644 --- a/examples/ipsec-secgw/esp.c +++ b/examples/ipsec-secgw/esp.c @@ -163,5 +163,5 @@ esp_inbound_post(struct rte_mbuf *m, struct ipsec_sa *sa, if (cop->status != RTE_CRYPTO_OP_STATUS_SUCCESS) { - RTE_LOG(ERR, IPSEC_ESP, "failed crypto op\n"); + RTE_LOG(ERR, IPSEC_ESP, "%s() failed crypto op\n", __func__); return -1; } @@ -456,5 +456,6 @@ esp_outbound_post(struct rte_mbuf *m, RTE_ASSERT(cop != NULL); if (cop->status != RTE_CRYPTO_OP_STATUS_SUCCESS) { - RTE_LOG(ERR, IPSEC_ESP, "Failed crypto op\n"); + RTE_LOG(ERR, IPSEC_ESP, "%s() failed crypto op\n", + __func__); return -1; } diff --git a/examples/ipsec-secgw/ipsec-secgw.c b/examples/ipsec-secgw/ipsec-secgw.c index f88fdb4c4..84fd4de12 100644 --- a/examples/ipsec-secgw/ipsec-secgw.c +++ b/examples/ipsec-secgw/ipsec-secgw.c @@ -256,5 +256,6 @@ prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t) } else { /* Unknown/Unsupported type, drop the packet */ - RTE_LOG(ERR, IPSEC, "Unsupported packet type\n"); + RTE_LOG(ERR, IPSEC, "Unsupported packet type 0x%x\n", + rte_be_to_cpu_16(eth->ether_type)); rte_pktmbuf_free(pkt); } @@ -933,5 +934,6 @@ main_loop(__attribute__((unused)) void *dummy) if (qconf->nb_rx_queue == 0) { - RTE_LOG(INFO, IPSEC, "lcore %u has nothing to do\n", lcore_id); + RTE_LOG(DEBUG, IPSEC, "lcore %u has nothing to do\n", + lcore_id); return 0; } diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c index 4ea016a6a..cd4f369f3 100644 --- a/examples/ipsec-secgw/sa.c +++ b/examples/ipsec-secgw/sa.c @@ -688,5 +688,20 @@ print_one_sa_rule(const struct ipsec_sa *sa, int inbound) break; case TRANSPORT: - printf("Transport"); + printf("Transport "); + break; + } + printf(" type:"); + switch (sa->type) { + case RTE_SECURITY_ACTION_TYPE_NONE: + printf("no-offload "); + break; + case RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO: + printf("inline-crypto-offload "); + break; + case RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL: + printf("inline-protocol-offload "); + break; + case RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL: + printf("lookaside-protocol-offload "); break; } @@ -715,6 +730,6 @@ sa_create(const char *name, int32_t socket_id) /* Create SA array table */ - printf("Creating SA context with %u maximum entries\n", - IPSEC_SA_MAX_ENTRIES); + printf("Creating SA context with %u maximum entries on socket %d\n", + IPSEC_SA_MAX_ENTRIES, socket_id); mz_size = sizeof(struct sa_ctx); -- 2.20.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2019-04-16 15:34:27.304387286 +0100 +++ 0047-examples-ipsec-secgw-fix-debug-logs.patch 2019-04-16 15:34:25.221179040 +0100 @@ -1,15 +1,16 @@ -From da7a540e1dc64495785d4f0d6e6b20b27bf28580 Mon Sep 17 00:00:00 2001 +From 12ae3d018d59eba793dfe6d1c0c3d8d4ab8f0f0a Mon Sep 17 00:00:00 2001 From: Bernard Iremonger Date: Thu, 7 Mar 2019 10:34:52 +0000 Subject: [PATCH] examples/ipsec-secgw: fix debug logs +[ upstream commit da7a540e1dc64495785d4f0d6e6b20b27bf28580 ] + Improve debug code in esp.c, sa.c and ipsec-secgw.c Fixes: f159e70b0922 ("examples/ipsec-secgw: support transport mode") Fixes: ec17993a145a ("examples/ipsec-secgw: support security offload") Fixes: 0d547ed03717 ("examples/ipsec-secgw: support configuration file") Fixes: 906257e965b7 ("examples/ipsec-secgw: support IPv6") -Cc: stable@dpdk.org Signed-off-by: Bernard Iremonger Acked-by: Konstantin Ananyev @@ -40,10 +41,10 @@ return -1; } diff --git a/examples/ipsec-secgw/ipsec-secgw.c b/examples/ipsec-secgw/ipsec-secgw.c -index 8e7cd1b73..b253eea2b 100644 +index f88fdb4c4..84fd4de12 100644 --- a/examples/ipsec-secgw/ipsec-secgw.c +++ b/examples/ipsec-secgw/ipsec-secgw.c -@@ -261,5 +261,6 @@ prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t) +@@ -256,5 +256,6 @@ prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t) } else { /* Unknown/Unsupported type, drop the packet */ - RTE_LOG(ERR, IPSEC, "Unsupported packet type\n"); @@ -51,7 +52,7 @@ + rte_be_to_cpu_16(eth->ether_type)); rte_pktmbuf_free(pkt); } -@@ -985,5 +986,6 @@ main_loop(__attribute__((unused)) void *dummy) +@@ -933,5 +934,6 @@ main_loop(__attribute__((unused)) void *dummy) if (qconf->nb_rx_queue == 0) { - RTE_LOG(INFO, IPSEC, "lcore %u has nothing to do\n", lcore_id); @@ -60,10 +61,10 @@ return 0; } diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c -index 93e3620bc..a7298a30c 100644 +index 4ea016a6a..cd4f369f3 100644 --- a/examples/ipsec-secgw/sa.c +++ b/examples/ipsec-secgw/sa.c -@@ -689,5 +689,20 @@ print_one_sa_rule(const struct ipsec_sa *sa, int inbound) +@@ -688,5 +688,20 @@ print_one_sa_rule(const struct ipsec_sa *sa, int inbound) break; case TRANSPORT: - printf("Transport"); @@ -85,7 +86,7 @@ + printf("lookaside-protocol-offload "); break; } -@@ -717,6 +732,6 @@ sa_create(const char *name, int32_t socket_id) +@@ -715,6 +730,6 @@ sa_create(const char *name, int32_t socket_id) /* Create SA array table */ - printf("Creating SA context with %u maximum entries\n",