From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50040.outbound.protection.outlook.com [40.107.5.40]) by dpdk.org (Postfix) with ESMTP id 263E31B1EE for ; Wed, 14 Nov 2018 18:07:13 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Mellanox.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ctkg8iW+siT7uzN1Eta8s4oglAb7Xlm0KZr0opXaRiM=; b=pJ7VW3OxFYkDR2vs73/SYrvJDEXrdB5RNV/lzXFIuVm/xQOTRwIvAnagVUHp+mq5iHXVPB60SZa2MC2UCHM4CSGZJEEEQDm0XmUxK13JLjNjuQpm1ZKp0HTkPV1C2X1fcOeWoY1NVWOpACr1fgOWaIm+3A8et6Ia6ffJeC7QmsQ= Received: from VI1PR05MB4718.eurprd05.prod.outlook.com (20.176.4.15) by VI1PR05MB4544.eurprd05.prod.outlook.com (20.176.3.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1294.22; Wed, 14 Nov 2018 17:07:11 +0000 Received: from VI1PR05MB4718.eurprd05.prod.outlook.com ([fe80::c1dc:ca97:1a:7cc7]) by VI1PR05MB4718.eurprd05.prod.outlook.com ([fe80::c1dc:ca97:1a:7cc7%2]) with mapi id 15.20.1294.045; Wed, 14 Nov 2018 17:07:11 +0000 From: Boris Pismenny To: Akhil Goyal , "dev@dpdk.org" CC: Thomas Monjalon , "konstantin.ananyev@intel.com" , "jerin.jacob@caviumnetworks.com" , "anoob.joseph@caviumnetworks.com" , "radu.nicolau@intel.com" , "declan.doherty@intel.com" , Hemant Agrawal Thread-Topic: [PATCH] security: remove experimental tag Thread-Index: AQHUe0P7pW07ouSgyEm8Cur4KLVhCKVPgWag Date: Wed, 14 Nov 2018 17:07:10 +0000 Message-ID: References: <20181113112255.20050-1-akhil.goyal@nxp.com> In-Reply-To: <20181113112255.20050-1-akhil.goyal@nxp.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [66.183.246.196] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; VI1PR05MB4544; 6:PnoPvbvmpFKn+e5jTudFpPLeWmx2oxvwS7Dr+iPvBH3Zffmk04bnxUpAoBDPGENbo8/2LJ7LkOAF3GxJv0p7NzPOK7Fn90jFuC2iAZBmSfu5ZDik2O9C2j4eAmrS3OY5lKTJSmBLijpXbSJye3u+ohbEY1IVNDjAYsAEQSsC788AcVrgzji4qRLr0WolhT7J28HHSBCj+CNeS9T7jw+N/s/hnlZe8Sn2/RvL1Sr8HCJ8EJClOLDbNhr+U/11Z49sTNACb6xMh3Fp80J9lyDwQZ70b8MAHOWFhXaGAXx6C8xZud2BsFKqYJkFMXJjpA8p+8xGBnvnvkJIEG0CeEYrIOMhKVeW71jvErwtMGOXnybHpTLjIqVWH8uY4ypUdm6VX/E6fmzUaw4pMKbXTE63CFTQLxWvIAHf3mFUOZYnGAciwy8Sy382Wp43iS5R3hXT1igIZxD2hrhhILq8S37tvw==; 5:uWPOY4yvAXO9U1xh58FDoqjLU8zA0PkzQVHFvdaWeL1f/P5FmyfTGrkXMp3s0e2vI2bGCPtvLL8kewXJVDg9Xjt8fV4Vw9ZDxHAqlpt8P1YW0KAlFuZw7D78jWkbWO8dp0tpbEpLhgxDSz49ZnuZdww2lyHPfYfaI1h6eyO/ogE=; 7:z63IcqqvRnZOazo/yPmnzz4mpyZaL6b7TKbNcoIv5uyJPQ3zwMU5mf5oZqXF1J4GqKeBqsG1Z4LDRHD2p4Ib8VEwpv/xwb4XjtLGcIbQDrAgmvogBOVc058pAcJECPWhCZSbspAacV9BCa3+p9aAHg== x-ms-exchange-antispam-srfa-diagnostics: SOS; x-ms-office365-filtering-correlation-id: e92782f7-010c-43fb-86d5-08d64a539dd5 x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(5600074)(711020)(4618075)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060)(7193020); SRVR:VI1PR05MB4544; x-ms-traffictypediagnostic: VI1PR05MB4544: x-ld-processed: a652971c-7d2e-4d9b-a6a4-d149256f461b,ExtAddr x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(192374486261705)(228905959029699)(185117386973197); x-ms-exchange-senderadcheck: 1 x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231412)(944501410)(52105112)(10201501046)(3002001)(93006095)(93001095)(6055026)(148016)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123564045)(20161123562045)(20161123558120)(201708071742011)(7699051)(76991095); SRVR:VI1PR05MB4544; BCL:0; PCL:0; RULEID:; SRVR:VI1PR05MB4544; x-forefront-prvs: 085634EFF4 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(366004)(39860400002)(376002)(396003)(346002)(13464003)(199004)(189003)(14454004)(6246003)(68736007)(11346002)(76176011)(446003)(478600001)(4744004)(33656002)(25786009)(14444005)(256004)(5024004)(4326008)(99286004)(7696005)(97736004)(229853002)(15650500001)(55016002)(186003)(106356001)(71200400001)(71190400001)(6346003)(9686003)(2900100001)(2501003)(6506007)(3846002)(6116002)(74316002)(105586002)(5660300001)(81156014)(6436002)(81166006)(2906002)(8676002)(110136005)(476003)(8936002)(316002)(486006)(7736002)(53546011)(86362001)(54906003)(26005)(102836004)(305945005)(66066001)(53936002); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR05MB4544; H:VI1PR05MB4718.eurprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: mellanox.com does not designate permitted sender hosts) authentication-results: spf=none (sender IP is ) smtp.mailfrom=borisp@mellanox.com; x-microsoft-antispam-message-info: vzJrIxCmKGEE0kP14SqfOxDLH93jScDIMD6jzPuDglPUiuuHzkbX0HmRgB47vjJDpuo8rX+wEyRbNA4GsZKrzLVZwIgH6KLa22d8Qa6VIKEk5atH3N79Fd+n122PvSv23TenOMoS3OKScfKfR1KfMiyEEDZLqwsBu/Jq8o24mnB4/E7J7aBfDM/ST2QoVJMvU04/KDgvCJ2eCe0lL7KH/LmeWYJc8uRfMxZwLsgyX8ItDw9KqptjtKJYxc1GioVLy6xxBLSmzdZFkGTsbo1DIArcN+5isknLgwA4uKieep7/XF52GXeTw2Jnr4Z1N6fJu6ujv2yb9gkVD06YqWu+bm8ydZmAYW0sjTU8NY68g5c= spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: Mellanox.com X-MS-Exchange-CrossTenant-Network-Message-Id: e92782f7-010c-43fb-86d5-08d64a539dd5 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Nov 2018 17:07:10.8930 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: a652971c-7d2e-4d9b-a6a4-d149256f461b X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR05MB4544 Subject: Re: [dpdk-dev] [PATCH] security: remove experimental tag X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 14 Nov 2018 17:07:13 -0000 Acked-By: Boris Pismenny > -----Original Message----- > From: dev On Behalf Of Akhil Goyal > Sent: Tuesday, November 13, 2018 3:28 AM > To: dev@dpdk.org > Cc: Thomas Monjalon ; > konstantin.ananyev@intel.com; jerin.jacob@caviumnetworks.com; > anoob.joseph@caviumnetworks.com; radu.nicolau@intel.com; > declan.doherty@intel.com; Hemant Agrawal ; > Akhil Goyal > Subject: [dpdk-dev] [PATCH] security: remove experimental tag >=20 > rte_security has been experimental since DPDK 17.11 release. > Now the library has matured and expermental tag is removed in this patch. >=20 > Signed-off-by: Akhil Goyal > --- > MAINTAINERS | 2 +- > lib/librte_security/Makefile | 1 - > lib/librte_security/meson.build | 1 - > lib/librte_security/rte_security.c | 18 +++++++++--------- > lib/librte_security/rte_security.h | 27 +++++++++++++---------= ----- > lib/librte_security/rte_security_driver.h | 1 - > lib/librte_security/rte_security_version.map | 2 +- > 7 files changed, 24 insertions(+), 28 deletions(-) >=20 > diff --git a/MAINTAINERS b/MAINTAINERS > index 19353ac..bdd6747 100644 > --- a/MAINTAINERS > +++ b/MAINTAINERS > @@ -347,7 +347,7 @@ F: lib/librte_cryptodev/ > F: test/test/test_cryptodev* > F: examples/l2fwd-crypto/ >=20 > -Security API - EXPERIMENTAL > +Security API > M: Akhil Goyal > M: Declan Doherty > T: git://dpdk.org/next/dpdk-next-crypto > diff --git a/lib/librte_security/Makefile b/lib/librte_security/Makefile = index > 8daebea..bd92343 100644 > --- a/lib/librte_security/Makefile > +++ b/lib/librte_security/Makefile > @@ -10,7 +10,6 @@ LIB =3D librte_security.a LIBABIVER :=3D 1 >=20 > # build flags > -CFLAGS +=3D -DALLOW_EXPERIMENTAL_API > CFLAGS +=3D -O3 > CFLAGS +=3D $(WERROR_FLAGS) > LDLIBS +=3D -lrte_eal -lrte_mempool > diff --git a/lib/librte_security/meson.build b/lib/librte_security/meson.= build > index 4c85894..532953f 100644 > --- a/lib/librte_security/meson.build > +++ b/lib/librte_security/meson.build > @@ -1,7 +1,6 @@ > # SPDX-License-Identifier: BSD-3-Clause # Copyright(c) 2017 Intel > Corporation >=20 > -allow_experimental_apis =3D true > sources =3D files('rte_security.c') > headers =3D files('rte_security.h', 'rte_security_driver.h') deps +=3D = ['mempool', > 'cryptodev'] diff --git a/lib/librte_security/rte_security.c > b/lib/librte_security/rte_security.c > index c6355de..bc81ce1 100644 > --- a/lib/librte_security/rte_security.c > +++ b/lib/librte_security/rte_security.c > @@ -10,7 +10,7 @@ > #include "rte_security_driver.h" >=20 > struct rte_security_session * > -__rte_experimental rte_security_session_create(struct rte_security_ctx > *instance, > +rte_security_session_create(struct rte_security_ctx *instance, > struct rte_security_session_conf *conf, > struct rte_mempool *mp) > { > @@ -33,7 +33,7 @@ __rte_experimental rte_security_session_create(struct > rte_security_ctx *instance > return sess; > } >=20 > -int __rte_experimental > +int > rte_security_session_update(struct rte_security_ctx *instance, > struct rte_security_session *sess, > struct rte_security_session_conf *conf) @@ -42,14 > +42,14 @@ rte_security_session_update(struct rte_security_ctx *instance, > return instance->ops->session_update(instance->device, sess, > conf); } >=20 > -unsigned int __rte_experimental > +unsigned int > rte_security_session_get_size(struct rte_security_ctx *instance) { > RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->session_get_size, 0); > return instance->ops->session_get_size(instance->device); > } >=20 > -int __rte_experimental > +int > rte_security_session_stats_get(struct rte_security_ctx *instance, > struct rte_security_session *sess, > struct rte_security_stats *stats) @@ -58,7 +58,7 > @@ rte_security_session_stats_get(struct rte_security_ctx *instance, > return instance->ops->session_stats_get(instance->device, sess, > stats); } >=20 > -int __rte_experimental > +int > rte_security_session_destroy(struct rte_security_ctx *instance, > struct rte_security_session *sess) { @@ -76,7 > +76,7 @@ rte_security_session_destroy(struct rte_security_ctx *instance, > return ret; > } >=20 > -int __rte_experimental > +int > rte_security_set_pkt_metadata(struct rte_security_ctx *instance, > struct rte_security_session *sess, > struct rte_mbuf *m, void *params) @@ -86,7 > +86,7 @@ rte_security_set_pkt_metadata(struct rte_security_ctx *instance, > sess, m, params); > } >=20 > -void * __rte_experimental > +void * > rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md= ) { > void *userdata =3D NULL; > @@ -98,14 +98,14 @@ rte_security_get_userdata(struct rte_security_ctx > *instance, uint64_t md) > return userdata; > } >=20 > -const struct rte_security_capability * __rte_experimental > +const struct rte_security_capability * > rte_security_capabilities_get(struct rte_security_ctx *instance) { > RTE_FUNC_PTR_OR_ERR_RET(*instance->ops->capabilities_get, > NULL); > return instance->ops->capabilities_get(instance->device); > } >=20 > -const struct rte_security_capability * __rte_experimental > +const struct rte_security_capability * > rte_security_capability_get(struct rte_security_ctx *instance, > struct rte_security_capability_idx *idx) { diff --git > a/lib/librte_security/rte_security.h b/lib/librte_security/rte_security.h > index 1431b4d..e07b132 100644 > --- a/lib/librte_security/rte_security.h > +++ b/lib/librte_security/rte_security.h > @@ -8,7 +8,6 @@ >=20 > /** > * @file rte_security.h > - * @b EXPERIMENTAL: this API may change without prior notice > * > * RTE Security Common Definitions > * > @@ -330,7 +329,7 @@ struct rte_security_session { > * - On success, pointer to session > * - On failure, NULL > */ > -struct rte_security_session * __rte_experimental > +struct rte_security_session * > rte_security_session_create(struct rte_security_ctx *instance, > struct rte_security_session_conf *conf, > struct rte_mempool *mp); > @@ -345,7 +344,7 @@ rte_security_session_create(struct rte_security_ctx > *instance, > * - On success returns 0 > * - On failure return errno > */ > -int __rte_experimental > +int > rte_security_session_update(struct rte_security_ctx *instance, > struct rte_security_session *sess, > struct rte_security_session_conf *conf); @@ - > 359,7 +358,7 @@ rte_security_session_update(struct rte_security_ctx > *instance, > * - Size of the private data, if successful > * - 0 if device is invalid or does not support the operation. > */ > -unsigned int __rte_experimental > +unsigned int > rte_security_session_get_size(struct rte_security_ctx *instance); >=20 > /** > @@ -374,7 +373,7 @@ rte_security_session_get_size(struct rte_security_ctx > *instance); > * - -EINVAL if session is NULL. > * - -EBUSY if not all device private data has been freed. > */ > -int __rte_experimental > +int > rte_security_session_destroy(struct rte_security_ctx *instance, > struct rte_security_session *sess); >=20 > @@ -391,7 +390,7 @@ rte_security_session_destroy(struct rte_security_ctx > *instance, > * - On success, zero. > * - On failure, a negative value. > */ > -int __rte_experimental > +int > rte_security_set_pkt_metadata(struct rte_security_ctx *instance, > struct rte_security_session *sess, > struct rte_mbuf *mb, void *params); @@ -413,7 > +412,7 @@ rte_security_set_pkt_metadata(struct rte_security_ctx > *instance, > * - On success, userdata > * - On failure, NULL > */ > -void * __rte_experimental > +void * > rte_security_get_userdata(struct rte_security_ctx *instance, uint64_t md= ); >=20 > /** > @@ -422,7 +421,7 @@ rte_security_get_userdata(struct rte_security_ctx > *instance, uint64_t md); > * @param sym_op crypto operation > * @param sess security session > */ > -static inline int __rte_experimental > +static inline int > __rte_security_attach_session(struct rte_crypto_sym_op *sym_op, > struct rte_security_session *sess) { @@ -431,13 > +430,13 @@ __rte_security_attach_session(struct rte_crypto_sym_op > *sym_op, > return 0; > } >=20 > -static inline void * __rte_experimental > +static inline void * > get_sec_session_private_data(const struct rte_security_session *sess) { > return sess->sess_private_data; > } >=20 > -static inline void __rte_experimental > +static inline void > set_sec_session_private_data(struct rte_security_session *sess, > void *private_data) > { > @@ -453,7 +452,7 @@ set_sec_session_private_data(struct > rte_security_session *sess, > * @param op crypto operation > * @param sess security session > */ > -static inline int __rte_experimental > +static inline int > rte_security_attach_session(struct rte_crypto_op *op, > struct rte_security_session *sess) { @@ -500,7 > +499,7 @@ struct rte_security_stats { > * - On success return 0 > * - On failure errno > */ > -int __rte_experimental > +int > rte_security_session_stats_get(struct rte_security_ctx *instance, > struct rte_security_session *sess, > struct rte_security_stats *stats); @@ -608,7 > +607,7 @@ struct rte_security_capability_idx { > * - Returns array of security capabilities. > * - Return NULL if no capabilities available. > */ > -const struct rte_security_capability * __rte_experimental > +const struct rte_security_capability * > rte_security_capabilities_get(struct rte_security_ctx *instance); >=20 > /** > @@ -622,7 +621,7 @@ rte_security_capabilities_get(struct rte_security_ctx > *instance); > * index criteria. > * - Return NULL if the capability not matched on security instance. > */ > -const struct rte_security_capability * __rte_experimental > +const struct rte_security_capability * > rte_security_capability_get(struct rte_security_ctx *instance, > struct rte_security_capability_idx *idx); >=20 > diff --git a/lib/librte_security/rte_security_driver.h > b/lib/librte_security/rte_security_driver.h > index 42f42ff..1b561f8 100644 > --- a/lib/librte_security/rte_security_driver.h > +++ b/lib/librte_security/rte_security_driver.h > @@ -8,7 +8,6 @@ >=20 > /** > * @file rte_security_driver.h > - * @b EXPERIMENTAL: this API may change without prior notice > * > * RTE Security Common Definitions > * > diff --git a/lib/librte_security/rte_security_version.map > b/lib/librte_security/rte_security_version.map > index 5a1c8ae..a77ca4b 100644 > --- a/lib/librte_security/rte_security_version.map > +++ b/lib/librte_security/rte_security_version.map > @@ -1,4 +1,4 @@ > -EXPERIMENTAL { > +DPDK_18.11 { > global: >=20 > rte_security_attach_session; > -- > 2.7.4