From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id DC1284301E for ; Thu, 10 Aug 2023 01:50:54 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id D623240DD8; Thu, 10 Aug 2023 01:50:54 +0200 (CEST) Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2060.outbound.protection.outlook.com [40.107.244.60]) by mails.dpdk.org (Postfix) with ESMTP id 5A848406B6 for ; Thu, 10 Aug 2023 01:50:53 +0200 (CEST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CGNBnA1uhdPaVPxKpKwZdHaYTbdCLngKgxiHKXIAOCRjlWZOzy6sIZDRNXwZZGI1i3SzZWy9x5ux/JH0VKkg3Q5TliztzcHeithudFd5rCSAONbZ+pquKQHlK7ibSwfUPVyDwos87FRMBz6TeaPWzHV8Ga5nEAVJWnL0eLLB0YTIC0GuVpJViuHvA36B8ObgAvxuMIuXeSt3qrTUg22Kyhn7iZw8amjPsdWlDjVewZ4B68rHezG6Z7QFrNpEtkgrJirVbp3PAjAckBUgeAmHEXV2lyIwmfQxU0RFcRcL+Z45FbZnk0+r+qLHi3pMBXP839LDn5p1IndcufIcgOM5vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7xY1eEKouYJdfkDwzm3ij8N4p9pKRlIB51E8RGNFnQI=; b=mnPzygffpnS8KFeW0sBFdiChZVkFOtSomF9vnmgh6AUSScvKhj9HLIwJpRizgZeyVcZVBOfx3vwax9dxZxzk+B+vxiS0CyUlVNojSxMbmozdJl71vKWhaeCggsp/oipHZ6c2aq4WBBtF8Cjr3tVCd4k+CGUj7XHqrJ29JiM0/a/b3kL/Bwzyw81/qbtdWaKJn+6PS+MLWlXsloxFE9KwGOrppYVt4CmsecmaLqswsqisdYIh6x5IufpBnrvkdVlOtByB3X/hyVo9V2o9XnpbVQB8uFo1h/HKs4A5S2wS4yTQCD0Ce1Ubl6ZrzYTpF5WPC4HIa16OxDaxyJznTidZrw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=marvell.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7xY1eEKouYJdfkDwzm3ij8N4p9pKRlIB51E8RGNFnQI=; b=Jfrg0Pr+95+nwBb0xNdigMWqeYwMo9LM9NctotzYcV4Taty7oss4FYM+9JSgd6Ex5WUwGeq9NQ4DOa605rShzcbjz39r72RMnWJm5HUU3sXImxtk8SpSpvRyFiWMGMdbHG5DOpJE3SA81nUvfvShE8qscMSd8QsxwUOI1CQdL4TjKq7HT01YTxpg8/aSfX/tORiGdKPR87jWwov3ZHLsssgOFogtHK8Ky2NZ2I4v5lZLgpgV8gkMpasRywBoawZgigdvi8d0Kz7aTuJtMy5gWHqWlBscaBCcGLKJjSpDngBVlv/FcP26COPRZeQlKEHbcDjHgOcyLp+PJr0p99OL0Q== Received: from CYZPR02CA0023.namprd02.prod.outlook.com (2603:10b6:930:a1::21) by SN7PR12MB7909.namprd12.prod.outlook.com (2603:10b6:806:340::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6652.30; Wed, 9 Aug 2023 23:50:51 +0000 Received: from CY4PEPF0000E9DB.namprd05.prod.outlook.com (2603:10b6:930:a1:cafe::5d) by CYZPR02CA0023.outlook.office365.com (2603:10b6:930:a1::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6652.28 via Frontend Transport; Wed, 9 Aug 2023 23:50:51 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.160) by CY4PEPF0000E9DB.mail.protection.outlook.com (10.167.241.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6652.19 via Frontend Transport; Wed, 9 Aug 2023 23:50:50 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.5; Wed, 9 Aug 2023 16:50:41 -0700 Received: from nvidia.com (10.126.230.37) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.37; Wed, 9 Aug 2023 16:50:39 -0700 From: Xueming Li To: Rahul Bhansali CC: Akhil Goyal , dpdk stable Subject: patch 'test/security: fix event inline IPsec reassembly tests' has been queued to stable release 22.11.3 Date: Thu, 10 Aug 2023 07:47:32 +0800 Message-ID: <20230809234930.32424-11-xuemingl@nvidia.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230809234930.32424-1-xuemingl@nvidia.com> References: <20230625063544.11183-1-xuemingl@nvidia.com> <20230809234930.32424-1-xuemingl@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.126.230.37] X-ClientProxiedBy: rnnvmail202.nvidia.com (10.129.68.7) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CY4PEPF0000E9DB:EE_|SN7PR12MB7909:EE_ X-MS-Office365-Filtering-Correlation-Id: d8dad11d-8a2c-4d48-5436-08db9933764e X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230028)(4636009)(346002)(39860400002)(376002)(396003)(136003)(1800799006)(186006)(82310400008)(451199021)(40470700004)(46966006)(36840700001)(41300700001)(356005)(7636003)(82740400003)(8936002)(8676002)(316002)(86362001)(5660300002)(70206006)(70586007)(6916009)(4326008)(36860700001)(83380400001)(47076005)(40140700001)(54906003)(426003)(2616005)(15650500001)(478600001)(30864003)(336012)(1076003)(26005)(16526019)(6286002)(36756003)(2906002)(53546011)(6666004)(40460700003)(7696005)(966005)(55016003)(40480700001); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Aug 2023 23:50:50.9190 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: d8dad11d-8a2c-4d48-5436-08db9933764e X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: CY4PEPF0000E9DB.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR12MB7909 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 22.11.3 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 08/11/23. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://git.dpdk.org/dpdk-stable/log/?h=22.11-staging This queued commit can be viewed at: https://git.dpdk.org/dpdk-stable/commit/?h=22.11-staging&id=64839553ee6f610e96517cf6890a2a86bb06b568 Thanks. Xueming Li --- >From 64839553ee6f610e96517cf6890a2a86bb06b568 Mon Sep 17 00:00:00 2001 From: Rahul Bhansali Date: Tue, 6 Jun 2023 10:36:58 +0530 Subject: [PATCH] test/security: fix event inline IPsec reassembly tests Cc: Xueming Li [ upstream commit 2f97b9439dbbc415ee7f6f51c4474f0eef427e65 ] Event Inline IPsec test suite stuck for reassembly tests because corresponding Tx and Rx calls are not done and reassembly flags were not set during event dev initialization. Fixes: 108646569579 ("test/security: add event inline IPsec cases") Signed-off-by: Rahul Bhansali Acked-by: Akhil Goyal --- app/test/test_security_inline_proto.c | 238 +++++++++++++++++--------- 1 file changed, 154 insertions(+), 84 deletions(-) diff --git a/app/test/test_security_inline_proto.c b/app/test/test_security_inline_proto.c index 79858e559f..e411a3c21d 100644 --- a/app/test/test_security_inline_proto.c +++ b/app/test/test_security_inline_proto.c @@ -678,6 +678,8 @@ free_mbuf(struct rte_mbuf *mbuf) ip_reassembly_dynfield_offset, rte_eth_ip_reassembly_dynfield_t *); rte_pktmbuf_free(mbuf); + if (dynfield.nb_frags == 0) + break; mbuf = dynfield.next_frag; } } @@ -735,6 +737,53 @@ get_and_verify_incomplete_frags(struct rte_mbuf *mbuf, return ret; } +static int +event_tx_burst(struct rte_mbuf **tx_pkts, uint16_t nb_pkts) +{ + struct rte_event ev; + int i, nb_sent = 0; + + /* Convert packets to events */ + memset(&ev, 0, sizeof(ev)); + ev.sched_type = RTE_SCHED_TYPE_PARALLEL; + for (i = 0; i < nb_pkts; i++) { + ev.mbuf = tx_pkts[i]; + ev.mbuf->port = port_id; + nb_sent += rte_event_eth_tx_adapter_enqueue( + eventdev_id, port_id, &ev, 1, 0); + } + + return nb_sent; +} + +static int +event_rx_burst(struct rte_mbuf **rx_pkts, uint16_t nb_pkts_to_rx) +{ + int nb_ev, nb_rx = 0, j = 0; + const int ms_per_pkt = 5; + struct rte_event ev; + + do { + nb_ev = rte_event_dequeue_burst(eventdev_id, port_id, + &ev, 1, 0); + + if (nb_ev == 0) { + rte_delay_ms(1); + continue; + } + + /* Get packet from event */ + if (ev.event_type != RTE_EVENT_TYPE_ETHDEV) { + printf("Unsupported event type: %i\n", + ev.event_type); + continue; + } + rx_pkts[nb_rx++] = ev.mbuf; + } while (j++ < (nb_pkts_to_rx * ms_per_pkt) && nb_rx < nb_pkts_to_rx); + + return nb_rx; +} + static int test_ipsec_with_reassembly(struct reassembly_vector *vector, const struct ipsec_test_flags *flags) @@ -761,26 +810,9 @@ test_ipsec_with_reassembly(struct reassembly_vector *vector, burst_sz = vector->burst ? ENCAP_DECAP_BURST_SZ : 1; nb_tx = vector->nb_frags * burst_sz; - rte_eth_dev_stop(port_id); - if (ret != 0) { - printf("rte_eth_dev_stop: err=%s, port=%u\n", - rte_strerror(-ret), port_id); - return ret; - } rte_eth_ip_reassembly_capability_get(port_id, &reass_capa); if (reass_capa.max_frags < vector->nb_frags) return TEST_SKIPPED; - if (reass_capa.timeout_ms > APP_REASS_TIMEOUT) { - reass_capa.timeout_ms = APP_REASS_TIMEOUT; - rte_eth_ip_reassembly_conf_set(port_id, &reass_capa); - } - - ret = rte_eth_dev_start(port_id); - if (ret < 0) { - printf("rte_eth_dev_start: err=%d, port=%d\n", - ret, port_id); - return ret; - } memset(tx_pkts_burst, 0, sizeof(tx_pkts_burst[0]) * nb_tx); memset(rx_pkts_burst, 0, sizeof(rx_pkts_burst[0]) * nb_tx); @@ -871,7 +903,10 @@ test_ipsec_with_reassembly(struct reassembly_vector *vector, if (ret) goto out; - nb_sent = rte_eth_tx_burst(port_id, 0, tx_pkts_burst, nb_tx); + if (event_mode_enabled) + nb_sent = event_tx_burst(tx_pkts_burst, nb_tx); + else + nb_sent = rte_eth_tx_burst(port_id, 0, tx_pkts_burst, nb_tx); if (nb_sent != nb_tx) { ret = -1; printf("\nFailed to tx %u pkts", nb_tx); @@ -883,14 +918,17 @@ test_ipsec_with_reassembly(struct reassembly_vector *vector, /* Retry few times before giving up */ nb_rx = 0; j = 0; - do { - nb_rx += rte_eth_rx_burst(port_id, 0, &rx_pkts_burst[nb_rx], - nb_tx - nb_rx); - j++; - if (nb_rx >= nb_tx) - break; - rte_delay_ms(1); - } while (j < 5 || !nb_rx); + if (event_mode_enabled) + nb_rx = event_rx_burst(rx_pkts_burst, nb_tx); + else + do { + nb_rx += rte_eth_rx_burst(port_id, 0, &rx_pkts_burst[nb_rx], + nb_tx - nb_rx); + j++; + if (nb_rx >= nb_tx) + break; + rte_delay_ms(1); + } while (j < 5 || !nb_rx); /* Check for minimum number of Rx packets expected */ if ((vector->nb_frags == 1 && nb_rx != nb_tx) || @@ -950,52 +988,6 @@ out: return ret; } -static int -event_tx_burst(struct rte_mbuf **tx_pkts, uint16_t nb_pkts) -{ - struct rte_event ev; - int i, nb_sent = 0; - - /* Convert packets to events */ - memset(&ev, 0, sizeof(ev)); - ev.sched_type = RTE_SCHED_TYPE_PARALLEL; - for (i = 0; i < nb_pkts; i++) { - ev.mbuf = tx_pkts[i]; - nb_sent += rte_event_eth_tx_adapter_enqueue( - eventdev_id, port_id, &ev, 1, 0); - } - - return nb_sent; -} - -static int -event_rx_burst(struct rte_mbuf **rx_pkts, uint16_t nb_pkts_to_rx) -{ - int nb_ev, nb_rx = 0, j = 0; - const int ms_per_pkt = 3; - struct rte_event ev; - - do { - nb_ev = rte_event_dequeue_burst(eventdev_id, port_id, - &ev, 1, 0); - - if (nb_ev == 0) { - rte_delay_ms(1); - continue; - } - - /* Get packet from event */ - if (ev.event_type != RTE_EVENT_TYPE_ETHDEV) { - printf("Unsupported event type: %i\n", - ev.event_type); - continue; - } - rx_pkts[nb_rx++] = ev.mbuf; - } while (j++ < (nb_pkts_to_rx * ms_per_pkt) && nb_rx < nb_pkts_to_rx); - - return nb_rx; -} - static int test_ipsec_inline_sa_exp_event_callback(uint16_t port_id, enum rte_eth_event_type type, void *param, void *ret_param) @@ -1475,10 +1467,32 @@ out: } static int -ut_setup_inline_ipsec(void) +ut_setup_inline_ipsec_reassembly(void) { + struct rte_eth_ip_reassembly_params reass_capa = {0}; int ret; + rte_eth_ip_reassembly_capability_get(port_id, &reass_capa); + if (reass_capa.timeout_ms > APP_REASS_TIMEOUT) { + reass_capa.timeout_ms = APP_REASS_TIMEOUT; + rte_eth_ip_reassembly_conf_set(port_id, &reass_capa); + } + + /* Start event devices */ + if (event_mode_enabled) { + ret = rte_event_eth_rx_adapter_start(rx_adapter_id); + if (ret < 0) { + printf("Failed to start rx adapter %d\n", ret); + return ret; + } + + ret = rte_event_dev_start(eventdev_id); + if (ret < 0) { + printf("Failed to start event device %d\n", ret); + return ret; + } + } + /* Start device */ ret = rte_eth_dev_start(port_id); if (ret < 0) { @@ -1500,12 +1514,16 @@ ut_setup_inline_ipsec(void) } static void -ut_teardown_inline_ipsec(void) +ut_teardown_inline_ipsec_reassembly(void) { struct rte_eth_ip_reassembly_params reass_conf = {0}; uint16_t portid; int ret; + /* Stop event devices */ + if (event_mode_enabled) + rte_event_dev_stop(eventdev_id); + /* port tear down */ RTE_ETH_FOREACH_DEV(portid) { ret = rte_eth_dev_stop(portid); @@ -1517,6 +1535,58 @@ ut_teardown_inline_ipsec(void) rte_eth_ip_reassembly_conf_set(portid, &reass_conf); } } +static int +ut_setup_inline_ipsec(void) +{ + int ret; + + /* Start event devices */ + if (event_mode_enabled) { + ret = rte_event_dev_start(eventdev_id); + if (ret < 0) { + printf("Failed to start event device %d\n", ret); + return ret; + } + } + + /* Start device */ + ret = rte_eth_dev_start(port_id); + if (ret < 0) { + printf("rte_eth_dev_start: err=%d, port=%d\n", + ret, port_id); + return ret; + } + /* always enable promiscuous */ + ret = rte_eth_promiscuous_enable(port_id); + if (ret != 0) { + printf("rte_eth_promiscuous_enable: err=%s, port=%d\n", + rte_strerror(-ret), port_id); + return ret; + } + + check_all_ports_link_status(1, RTE_PORT_ALL); + + return 0; +} + +static void +ut_teardown_inline_ipsec(void) +{ + uint16_t portid; + int ret; + + /* Stop event devices */ + if (event_mode_enabled) + rte_event_dev_stop(eventdev_id); + + /* port tear down */ + RTE_ETH_FOREACH_DEV(portid) { + ret = rte_eth_dev_stop(portid); + if (ret != 0) + printf("rte_eth_dev_stop: err=%s, port=%u\n", + rte_strerror(-ret), portid); + } +} static int inline_ipsec_testsuite_setup(void) @@ -3048,43 +3118,43 @@ static struct unit_test_suite inline_ipsec_testsuite = { TEST_CASE_NAMED_WITH_DATA( "IPv4 Reassembly with 2 fragments", - ut_setup_inline_ipsec, ut_teardown_inline_ipsec, + ut_setup_inline_ipsec_reassembly, ut_teardown_inline_ipsec_reassembly, test_inline_ip_reassembly, &ipv4_2frag_vector), TEST_CASE_NAMED_WITH_DATA( "IPv6 Reassembly with 2 fragments", - ut_setup_inline_ipsec, ut_teardown_inline_ipsec, + ut_setup_inline_ipsec_reassembly, ut_teardown_inline_ipsec_reassembly, test_inline_ip_reassembly, &ipv6_2frag_vector), TEST_CASE_NAMED_WITH_DATA( "IPv4 Reassembly with 4 fragments", - ut_setup_inline_ipsec, ut_teardown_inline_ipsec, + ut_setup_inline_ipsec_reassembly, ut_teardown_inline_ipsec_reassembly, test_inline_ip_reassembly, &ipv4_4frag_vector), TEST_CASE_NAMED_WITH_DATA( "IPv6 Reassembly with 4 fragments", - ut_setup_inline_ipsec, ut_teardown_inline_ipsec, + ut_setup_inline_ipsec_reassembly, ut_teardown_inline_ipsec_reassembly, test_inline_ip_reassembly, &ipv6_4frag_vector), TEST_CASE_NAMED_WITH_DATA( "IPv4 Reassembly with 5 fragments", - ut_setup_inline_ipsec, ut_teardown_inline_ipsec, + ut_setup_inline_ipsec_reassembly, ut_teardown_inline_ipsec_reassembly, test_inline_ip_reassembly, &ipv4_5frag_vector), TEST_CASE_NAMED_WITH_DATA( "IPv6 Reassembly with 5 fragments", - ut_setup_inline_ipsec, ut_teardown_inline_ipsec, + ut_setup_inline_ipsec_reassembly, ut_teardown_inline_ipsec_reassembly, test_inline_ip_reassembly, &ipv6_5frag_vector), TEST_CASE_NAMED_WITH_DATA( "IPv4 Reassembly with incomplete fragments", - ut_setup_inline_ipsec, ut_teardown_inline_ipsec, + ut_setup_inline_ipsec_reassembly, ut_teardown_inline_ipsec_reassembly, test_inline_ip_reassembly, &ipv4_incomplete_vector), TEST_CASE_NAMED_WITH_DATA( "IPv4 Reassembly with overlapping fragments", - ut_setup_inline_ipsec, ut_teardown_inline_ipsec, + ut_setup_inline_ipsec_reassembly, ut_teardown_inline_ipsec_reassembly, test_inline_ip_reassembly, &ipv4_overlap_vector), TEST_CASE_NAMED_WITH_DATA( "IPv4 Reassembly with out of order fragments", - ut_setup_inline_ipsec, ut_teardown_inline_ipsec, + ut_setup_inline_ipsec_reassembly, ut_teardown_inline_ipsec_reassembly, test_inline_ip_reassembly, &ipv4_out_of_order_vector), TEST_CASE_NAMED_WITH_DATA( "IPv4 Reassembly with burst of 4 fragments", - ut_setup_inline_ipsec, ut_teardown_inline_ipsec, + ut_setup_inline_ipsec_reassembly, ut_teardown_inline_ipsec_reassembly, test_inline_ip_reassembly, &ipv4_4frag_burst_vector), TEST_CASES_END() /**< NULL terminate unit test array */ -- 2.25.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2023-08-09 21:51:18.558080000 +0800 +++ 0010-test-security-fix-event-inline-IPsec-reassembly-test.patch 2023-08-09 21:51:18.124352000 +0800 @@ -1 +1 @@ -From 2f97b9439dbbc415ee7f6f51c4474f0eef427e65 Mon Sep 17 00:00:00 2001 +From 64839553ee6f610e96517cf6890a2a86bb06b568 Mon Sep 17 00:00:00 2001 @@ -4,0 +5,3 @@ +Cc: Xueming Li + +[ upstream commit 2f97b9439dbbc415ee7f6f51c4474f0eef427e65 ] @@ -11 +13,0 @@ -Cc: stable@dpdk.org @@ -20 +22 @@ -index 7f6fa0ad8c..45aa742c6b 100644 +index 79858e559f..e411a3c21d 100644 @@ -315 +317 @@ -@@ -3057,43 +3127,43 @@ static struct unit_test_suite inline_ipsec_testsuite = { +@@ -3048,43 +3118,43 @@ static struct unit_test_suite inline_ipsec_testsuite = {