From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id CCD8E43B73 for ; Thu, 22 Feb 2024 11:25:37 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id C7C5F40281; Thu, 22 Feb 2024 11:25:37 +0100 (CET) Received: from mail.loongson.cn (mail.loongson.cn [114.242.206.163]) by mails.dpdk.org (Postfix) with ESMTP id A721E40267 for ; Thu, 22 Feb 2024 11:25:35 +0100 (CET) Received: from loongson.cn (unknown [192.168.100.1]) by gateway (Coremail) with SMTP id _____8Bx3+scIddlBCsQAA--.41583S3; Thu, 22 Feb 2024 18:25:32 +0800 (CST) Received: from localhost.localdomain (unknown [192.168.100.1]) by localhost.localdomain (Coremail) with SMTP id AQAAf8CxPs8RIddlVbY+AA--.32165S3; Thu, 22 Feb 2024 18:25:22 +0800 (CST) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by localhost.localdomain (8.15.2/8.15.2) with ESMTPS id 41MA0ZVr001003 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Thu, 22 Feb 2024 18:00:36 +0800 Received: (from root@localhost) by localhost.localdomain (8.15.2/8.15.2/Submit) id 41MA0XCL001002; Thu, 22 Feb 2024 18:00:33 +0800 Date: Thu, 22 Feb 2024 18:00:33 +0800 From: qemudev@loongson.cn Message-Id: <202402221000.41MA0XCL001002@localhost.localdomain> Content-Type: text/plain; charset="utf-8" Subject: |WARNING| pw136995-137008 [PATCH v3 01/14] common/cnxk: remove cn9k Inline IPsec FP opcode defines In-Reply-To: <20240222100530.2266013-1-ndabilpuram@marvell.com> References: <20240222100530.2266013-1-ndabilpuram@marvell.com> To: test-report@dpdk.org Cc: Nithin Dabilpuram , zhoumin@loongson.cn X-CM-TRANSID: AQAAf8CxPs8RIddlVbY+AA--.32165S3 Authentication-Results: localhost.localdomain; spf=neutral smtp.mail=q emudev@loongson.cn; X-CM-SenderInfo: pthp3vthy6z05rqj20fqof0/1tbiAQAOD2XVtGQBegAbsA X-Coremail-Antispam: 1Uk129KBj93XoW3Gry3KFy8WrykAw45Wr1kCrX_yoWxJr45pr 45uFZ8Jry3Gw4ruwn7GFs5ury5K3y3GrZIkFZIkas8ta98uFyFqr1UCryj9Fy5AF9xAa43 u3yIgwsxW3W7tFcCm3ZEXasCq-sJn29KB7ZKAUJUUUUU529EdanIXcx71UUUUU7KY7ZEXa sCq-sGcSsGvfJ3Ic02F40EFcxC0VAKzVAqx4xG6I80ebIjqfuFe4nvWSU5nxnvy29KBjDU 0xBIdaVrnRJUUUkYb4IE77IF4wAFF20E14v26r1j6r4UM7CY07I20VC2zVCF04k26cxKx2 IYs7xG6rWj6s0DM7CIcVAFz4kK6r106r15M28lY4IEw2IIxxk0rwA2F7IY1VAKz4vEj48v e4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_JFI_Gr1l84ACjcxK6xIIjxv20xvEc7CjxVAFwI 0_Jr0_Gr1l84ACjcxK6I8E87Iv67AKxVW8Jr0_Cr1UM28EF7xvwVC2z280aVCY1x0267AK xVW8Jr0_Cr1UM2AIxVAIcxkEcVAq07x20xvEncxIr21l57IF6xkI12xvs2x26I8E6xACxx 1l5I8CrVACY4xI64kE6c02F40Ex7xfMcIj6xIIjxv20xvE14v26r1Y6r17McIj6I8E87Iv 67AKxVW8JVWxJwAm72CE4IkC6x0Yz7v_Jr0_Gr1lw4CEc2x0rVAKj4xxMxAIw28IcxkI7V AKI48JMxC20s026xCaFVCjc4AY6r1j6r4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2IqxVCj r7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF67AKxVWUXVWUAwCIc40Y0x0EwIxGrwCI42IY6x IIjxv20xvE14v26r1j6r1xMIIF0xvE2Ix0cI8IcVCY1x0267AKxVWUJVW8JwCI42IY6xAI w20EY4v20xvaj40_Jr0_JF4lIxAIcVC2z280aVAFwI0_Gr0_Cr1lIxAIcVC2z280aVCY1x 0267AKxVW8JVW8JrUvcSsGvfC2KfnxnUUI43ZEXa7IU8miiDUUUUU== X-BeenThere: test-report@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: automatic DPDK test reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: test-report-bounces@dpdk.org Test-Label: loongarch-compilation Test-Status: WARNING http://dpdk.org/patch/136995 _apply patch failure_ Submitter: Nithin Dabilpuram Date: Thu, 22 Feb 2024 15:35:17 +0530 DPDK git baseline: Repo:dpdk-next-net-mrvl Branch: for-next-net CommitID: 92c0ad70caf3ed6f4b93de6ddaf7bc369737c049 Apply patch set 136995-137008 failed: Checking patch drivers/common/cnxk/cnxk_security.c... error: while searching for: return !!sa->w2.s.valid; } static inline int ipsec_xfrm_verify(struct rte_security_ipsec_xform *ipsec_xfrm, struct rte_crypto_sym_xform *crypto_xfrm) { if (crypto_xfrm->next == NULL) return -EINVAL; if (ipsec_xfrm->direction == RTE_SECURITY_IPSEC_SA_DIR_INGRESS) { if (crypto_xfrm->type != RTE_CRYPTO_SYM_XFORM_AUTH || crypto_xfrm->next->type != RTE_CRYPTO_SYM_XFORM_CIPHER) return -EINVAL; } else { if (crypto_xfrm->type != RTE_CRYPTO_SYM_XFORM_CIPHER || crypto_xfrm->next->type != RTE_CRYPTO_SYM_XFORM_AUTH) return -EINVAL; } return 0; } static int onf_ipsec_sa_common_param_fill(struct roc_ie_onf_sa_ctl *ctl, uint8_t *salt, uint8_t *cipher_key, uint8_t *hmac_opad_ipad, struct rte_security_ipsec_xform *ipsec_xfrm, struct rte_crypto_sym_xform *crypto_xfrm) { struct rte_crypto_sym_xform *auth_xfrm, *cipher_xfrm; int rc, length, auth_key_len; const uint8_t *key = NULL; uint8_t ccm_flag = 0; /* Set direction */ switch (ipsec_xfrm->direction) { case RTE_SECURITY_IPSEC_SA_DIR_INGRESS: ctl->direction = ROC_IE_SA_DIR_INBOUND; auth_xfrm = crypto_xfrm; cipher_xfrm = crypto_xfrm->next; break; case RTE_SECURITY_IPSEC_SA_DIR_EGRESS: ctl->direction = ROC_IE_SA_DIR_OUTBOUND; cipher_xfrm = crypto_xfrm; auth_xfrm = crypto_xfrm->next; break; default: return -EINVAL; } /* Set protocol - ESP vs AH */ switch (ipsec_xfrm->proto) { case RTE_SECURITY_IPSEC_SA_PROTO_ESP: ctl->ipsec_proto = ROC_IE_SA_PROTOCOL_ESP; break; case RTE_SECURITY_IPSEC_SA_PROTO_AH: return -ENOTSUP; default: return -EINVAL; } /* Set mode - transport vs tunnel */ switch (ipsec_xfrm->mode) { case RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT: ctl->ipsec_mode = ROC_IE_SA_MODE_TRANSPORT; break; case RTE_SECURITY_IPSEC_SA_MODE_TUNNEL: ctl->ipsec_mode = ROC_IE_SA_MODE_TUNNEL; break; default: return -EINVAL; } /* Set encryption algorithm */ if (crypto_xfrm->type == RTE_CRYPTO_SYM_XFORM_AEAD) { length = crypto_xfrm->aead.key.length; switch (crypto_xfrm->aead.algo) { case RTE_CRYPTO_AEAD_AES_GCM: ctl->enc_type = ROC_IE_ON_SA_ENC_AES_GCM; ctl->auth_type = ROC_IE_ON_SA_AUTH_NULL; memcpy(salt, &ipsec_xfrm->salt, 4); key = crypto_xfrm->aead.key.data; break; case RTE_CRYPTO_AEAD_AES_CCM: ctl->enc_type = ROC_IE_ON_SA_ENC_AES_CCM; ctl->auth_type = ROC_IE_ON_SA_AUTH_NULL; ccm_flag = 0x07 & ~ROC_CPT_AES_CCM_CTR_LEN; *salt = ccm_flag; memcpy(PLT_PTR_ADD(salt, 1), &ipsec_xfrm->salt, 3); key = crypto_xfrm->aead.key.data; break; default: return -ENOTSUP; } } else { rc = ipsec_xfrm_verify(ipsec_xfrm, crypto_xfrm); if (rc) return rc; switch (cipher_xfrm->cipher.algo) { case RTE_CRYPTO_CIPHER_AES_CBC: ctl->enc_type = ROC_IE_ON_SA_ENC_AES_CBC; break; case RTE_CRYPTO_CIPHER_AES_CTR: ctl->enc_type = ROC_IE_ON_SA_ENC_AES_CTR; break; default: return -ENOTSUP; } switch (auth_xfrm->auth.algo) { case RTE_CRYPTO_AUTH_SHA1_HMAC: ctl->auth_type = ROC_IE_ON_SA_AUTH_SHA1; break; default: return -ENOTSUP; } auth_key_len = auth_xfrm->auth.key.length; if (auth_key_len < 20 || auth_key_len > 64) return -ENOTSUP; key = cipher_xfrm->cipher.key.data; length = cipher_xfrm->cipher.key.length; ipsec_hmac_opad_ipad_gen(auth_xfrm, hmac_opad_ipad); } switch (length) { case ROC_CPT_AES128_KEY_LEN: ctl->aes_key_len = ROC_IE_SA_AES_KEY_LEN_128; break; case ROC_CPT_AES192_KEY_LEN: ctl->aes_key_len = ROC_IE_SA_AES_KEY_LEN_192; break; case ROC_CPT_AES256_KEY_LEN: ctl->aes_key_len = ROC_IE_SA_AES_KEY_LEN_256; break; default: return -EINVAL; } memcpy(cipher_key, key, length); if (ipsec_xfrm->options.esn) ctl->esn_en = 1; ctl->spi = rte_cpu_to_be_32(ipsec_xfrm->spi); return 0; } int cnxk_onf_ipsec_inb_sa_fill(struct roc_onf_ipsec_inb_sa *sa, struct rte_security_ipsec_xform *ipsec_xfrm, struct rte_crypto_sym_xform *crypto_xfrm) { struct roc_ie_onf_sa_ctl *ctl = &sa->ctl; int rc; rc = onf_ipsec_sa_common_param_fill(ctl, sa- error: patch failed: drivers/common/cnxk/cnxk_security.c:618 error: drivers/common/cnxk/cnxk_security.c: patch does not apply Checking patch drivers/common/cnxk/cnxk_security.h... error: while searching for: bool __roc_api cnxk_ot_ipsec_inb_sa_valid(struct roc_ot_ipsec_inb_sa *sa); bool __roc_api cnxk_ot_ipsec_outb_sa_valid(struct roc_ot_ipsec_outb_sa *sa); /* [CN9K, CN10K) */ int __roc_api cnxk_onf_ipsec_inb_sa_fill(struct roc_onf_ipsec_inb_sa *sa, struct rte_security_ipsec_xform *ipsec_xfrm, struct rte_crypto_sym_xform *crypto_xfrm); int __roc_api cnxk_onf_ipsec_outb_sa_fill(struct roc_onf_ipsec_outb_sa *sa, struct rte_security_ipsec_xform *ipsec_xfrm, struct rte_crypto_sym_xform *crypto_xfrm); bool __roc_api cnxk_onf_ipsec_inb_sa_valid(struct roc_onf_ipsec_inb_sa *sa); bool __roc_api cnxk_onf_ipsec_outb_sa_valid(struct roc_onf_ipsec_outb_sa *sa); /* [CN9K] */ int __roc_api cnxk_on_ipsec_inb_sa_create(struct rte_security_ipsec_xform *ipsec, error: patch failed: drivers/common/cnxk/cnxk_security.h:48 error: drivers/common/cnxk/cnxk_security.h: patch does not apply Checking patch drivers/common/cnxk/roc_ie_on.h... Checking patch drivers/common/cnxk/roc_nix_inl.h... Checking patch drivers/common/cnxk/version.map... Checking patch drivers/net/cnxk/cnxk_ethdev_devargs.c...