From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50046.outbound.protection.outlook.com [40.107.5.46]) by dpdk.org (Postfix) with ESMTP id DD568548B for ; Tue, 9 Oct 2018 09:01:51 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=f92FIS3LWiRo6U5JgKqspf8E9VW/ZVqL8B/7v9vi+oY=; b=BbM/GHS9UVTYYbSKh5KIvUGE7p8UKV9TtAU7vyYN2xUGthqPZkwAaAJ/XTkNQVJ+vr1OMkoq5a+xRtKrt5+nWFYsnEE0UfrXMjiozcjHpViLudOmMQcQitJAILXIgYBxX5tnD3HpvtC0Gs0l1xpto0NxPaZ6IaLGVGAP/0sFIC4= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=akhil.goyal@nxp.com; Received: from [10.232.134.144] (14.143.30.134) by AM0PR04MB4882.eurprd04.prod.outlook.com (2603:10a6:208:c5::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1207.28; Tue, 9 Oct 2018 07:01:49 +0000 To: Fan Zhang , dev@dpdk.org Cc: Marko Kovacevic References: <20181004094015.46264-1-roy.fan.zhang@intel.com> <20181004131249.26726-1-roy.fan.zhang@intel.com> <20181004131249.26726-9-roy.fan.zhang@intel.com> From: Akhil Goyal Message-ID: Date: Tue, 9 Oct 2018 12:31:36 +0530 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20181004131249.26726-9-roy.fan.zhang@intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-Originating-IP: [14.143.30.134] X-ClientProxiedBy: BM1PR0101CA0010.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:18::20) To AM0PR04MB4882.eurprd04.prod.outlook.com (2603:10a6:208:c5::11) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: f1a712a0-eaaf-40cf-a310-08d62db51668 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(4534185)(7168020)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:AM0PR04MB4882; X-Microsoft-Exchange-Diagnostics: 1; AM0PR04MB4882; 3:Ehi8hQ1aBQEWbl4i/hlIyfiq8lmxG4y9x6kkG/m5vqxSwJRrRxDm9mFfoFT8nXkWi5vY9C4RMuBL1YsvSLefMWxxZ0UmiSo+smb/xJ87dQ7joknl2VQRjRZYnNsZqgRhkez9fuBgZBiO3zlFdslsrcRxuCU8GcocqWxVz+sRnBgEdzRdIdUWoTecYCAnaNie7SP3mTagc9anjUgSYSb37+CY9tazFh9hwe66jz2gE11wJM6NSf/8C276DfC4f1kd; 25:bL+nLbgujIMDiIiZxKj2RpXV04xm4z8II8WalVIfq/jwevg9IxPM2iAQffhhpr/Uq68WicTa23s2fNdo9/KdrHU3QYjYsmCPBJPjFEOQewN0dBemG2B5hFuc6o4wdPgBfHa5OaGaNJEANB3k6kB4zM5k668QPfg6qOvn9U+yKjctpImpVqJ/833ZC95CEzCd5hBCWefIWJejvdCMPvxZVle3XZPUt4wFqaAc0nEMq7MLYr/QxSoNactqlbGNYGMlK2MLJPXPXDQ8yX1hLdqvhogqD1YGIGwLYhe+m9y5BJEgVhIjQVOKS09Q4UTnzBzi1CaUnFb4vO4Y6LEGFiHZ9Q==; 31:V3ixeH0tEktXYw5zOVkJxGxdUn8NFUC4Q39qS+DVzK1UvppxLrQZG5eGKZygVVesWkFlKNJqaLVAbsomWo1CfLQ6rgL9rp99gAi92RFFpAVowj0VVVk89DuQ3Qw3G1sXE8nhsCmMh3GQuuHZjIAJj9Qs5x6HTgiFHeFCK2pZO12j0c0p1Xy0XGqfQdWRuKXdR5Uc/eajs49Ptgf8C2HfeB9GCzOekS1tRUPELPKanmA= X-MS-TrafficTypeDiagnostic: AM0PR04MB4882: X-Microsoft-Exchange-Diagnostics: 1; AM0PR04MB4882; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(228905959029699)(41656084186505)(131022147185803)(65766998875637)(5213294742642)(278428928389397); X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3231355)(944501410)(52105095)(3002001)(6055026)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123564045)(20161123558120)(20161123560045)(201708071742011)(7699051)(76991055); SRVR:AM0PR04MB4882; BCL:0; PCL:0; RULEID:; SRVR:AM0PR04MB4882; X-Microsoft-Exchange-Diagnostics: 1; AM0PR04MB4882; 4:QxpzTpjjxSOUCXUK9nGnqd+BuHBZ7cvZKTccYcI0nN2WECv/dWtkVI/I57TARczSFsSbBCToAB/M1GT2H7dMr0NEBOlI6QnIR5jubH47OAysGxZqyHhXjmrRrmMy9L0AuKDcIMn+v9O8H8tIil1DaNJkcZ0oNHfd2n93NwFsQeLPXuAMTMMeMXfD+WiHLgOOnZ6axL+JFRa3vKf7v6fuIaK9h1plWw/+9hEv/Pjzh1byJM1Xvn5s9Xi5b3NI9+KOEO8LbFc+BxK2zvZnWc1tAX6TPs3SITuAgjISJtgqqg3peDh6MsEe1r6m/wsx4+NYamfDxjdsy7srgTGuLgrF6hSCboJQMekBqWocx/uTGpbnEZ91yya85PZSIGARpV1nPN1VfrAfqK70kigw/GvOZHZEd7fxgcQu38ycMl8K2HjucrJpHH10Bfktl8WgNhxay2BCYPizS3EAk+TPiD8jqWnOq+S2RfrIaq0lQsYCME8= X-Forefront-PRVS: 08200063E9 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(6049001)(39860400002)(376002)(346002)(136003)(366004)(396003)(199004)(189003)(305945005)(31686004)(64126003)(105586002)(106356001)(50466002)(229853002)(486006)(44832011)(6116002)(446003)(3260700006)(2616005)(956004)(476003)(25786009)(3846002)(11346002)(14444005)(6666003)(6246003)(6486002)(6306002)(65806001)(65956001)(47776003)(65826007)(66066001)(86362001)(4326008)(31696002)(5660300001)(7736002)(36756003)(67846002)(5009440100003)(68736007)(186003)(53546011)(52116002)(55236004)(386003)(76176011)(230700001)(478600001)(2486003)(26005)(16526019)(2906002)(23676004)(316002)(58126008)(81156014)(81166006)(52146003)(77096007)(8676002)(97736004)(8936002)(16576012)(53936002)(110426005); DIR:OUT; SFP:1101; SCL:1; SRVR:AM0PR04MB4882; H:[10.232.134.144]; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; Received-SPF: None (protection.outlook.com: nxp.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtBTTBQUjA0TUI0ODgyOzIzOndWVklpdTk5MjhEa25LYXpOcitWWGxjWE1n?= =?utf-8?B?UlBnMTVMdUVBNUxFS1owV2IzQjMxRjRYQ1o2OWtJTFJoZitwT2x3eGxZd1FG?= =?utf-8?B?eW05cmhHdERHMHNTSlRlYW5vekJYRkZ6MEtwQlZ1VU40T0dWQmVXMThZc2Zr?= =?utf-8?B?SWZ4cEpCME16S1BGTDEyR1l4ZmVCSFJKZ2tiK0JkSTNhT0JtdytGV3U4enZB?= =?utf-8?B?ZGZEOTFLWUdWTkczeHl4cHlZUjFBbVVtYytmTk16cmlLM2wwUE5meERvZ3Vt?= =?utf-8?B?anBRYjhLTk85VVRHeU5vRmcyeFJRejFwejZtQXNvN3JLR3lwbmJCZHdyOEQ0?= =?utf-8?B?UExSVHB0TGxTTXp6b1o2aUNHRXNkYkxqSUpvTW1yWVFGVytTbTZNblc4d3RI?= =?utf-8?B?MVh1bHQyMVVPcUtPN2h2N09EZ3c3Znk2clpYMEtKUEVzYVJJMER0eUZOSGVR?= =?utf-8?B?bmMzbGg1TWE4b3NCY2huK1k0L3l3YnVZYUVpTFdCVURlMWpiZ2hEZGljdjY5?= =?utf-8?B?azJRcVhVL1dMZGYwbXBMMThXZHBpZTBtZ1ZUbC92SXVxc2V4WDlSb2d2czE5?= =?utf-8?B?Nk9iank0T1p0WXljdnlXVEtjNEQySEFUODI0Q0JwREhwYUpyRWlGS1Bkd0o2?= =?utf-8?B?b1VmRS91SlRZMjBSTVVGcDMxaGZiWHloME5tWk5WR011M09wTTRvb3UxbHpP?= =?utf-8?B?azZXaExmT2p4ZVhZSWUvU05QMjNEL2RQVDltSStxK2Y3YyticzlkK3RVbEcr?= =?utf-8?B?c2pOVkRxbFVhS3k3ZGFoZWVCWDI2RW1meVpWYlp6WHZiUHBiNzQ2RHRxZS9r?= =?utf-8?B?a2o1WVJ1dDlKeVUzNXZqc08rYXVpaTF2MXpMdDF6NGtNeitPNGwxNDZtL3pM?= =?utf-8?B?cndOWU9veGw4TFZtNVJDMms4ZWVaV25VVWJ4NjNkY3BzL002VlpTOFZ6Q3Bk?= =?utf-8?B?SXFzVVZuTkZvc1NzMVpTNEhHa0lHWEw4YnhRTVlCYVppamVIOTlLVC9BM1c4?= =?utf-8?B?NVAzb2Z6aU5pZzl5WklZb0xkVnlEZlFCMlRRRytJNHRkZUJsczVzaXRNRGJq?= =?utf-8?B?K0dkWTFYWU1IR1dZU2NBWGNleVVUSEVZS0FKSUVySEJXVWdvK2dQc1pUTlJq?= =?utf-8?B?QXJXK0hqUXNxMUN6aUtUNEZ3VzNUTHU0Z1htc3VaM0FUT0ludkNDWCtvNWI1?= =?utf-8?B?V0laWHdOdnR5UktYWEY3akxLem9VNFp2VGVDeGpleHRwV1lrOW5VVlo2WjdB?= =?utf-8?B?S3VPS2tzdy9KZEJVeXlSV21nWkM5eFJoRFAwRFd4K3RXYkVWSmhaM1hMTFBu?= =?utf-8?B?RXNwVk5JaWZQeGh4VmxHSEFWb2REMU1PR3JNeXFUelN0NjZPUllJVk9IRXJ2?= =?utf-8?B?M2k5eTBFazRqWnFrMG1lOStJSmNjQ2hKSkdTQ1VRVnBCMzc1WmdRLzBNempB?= =?utf-8?B?TS9aaWI4N2VwMnY3VFV1ZkFDZzdaS0JTakg2MXFLN2tmMFROTXhZR053Tmlv?= =?utf-8?B?ejB4R25Nc3NGcS9KZmVXdnhUT2RnVkkzWlNiV1g5SEZvdEs1c09nZE5hNXZs?= =?utf-8?B?UW4ydGVPd3NaaXBFMzd1OXFkKzVyd3hIMUNoM1FaRks5cGM3dG5pSDFHcjJO?= =?utf-8?B?U0l1ZHB0b1NwQ01PWjdyZ2oyU1k3OFdrQnZ2dVJzY2NqcnRReVRVUGFNQmti?= =?utf-8?B?aURoclpQSzZHeWcrdGU4c1JPNkpxSXhvLzRpODI1TExaUkxpdXo5cU8zbU92?= =?utf-8?B?TVhiT1N6NkIvRWdXdU9peE1ZSVB5Z292K1BIdEl4TXV6VnZMNXNNSkJwRFRm?= =?utf-8?B?cUZyUVlWcUtqd0xDQzNmb0lUZE1nUXNTSUVTWnYwTC8yaGFyc3pta3kyQlZp?= =?utf-8?B?aEd4dTRIakNvTGsxa09RQ1RKL3BWZjYrTjNKcjF6NW1INEQwbEFCZnh3UDVY?= =?utf-8?B?bDVreFQwTzVhVnNDcHdFaHhCOEh4T3Zrbm1Db0RyRDdTNmh0TWZhUjVHQy9u?= =?utf-8?B?bXY1aDVhTEhDNHg4SjRFRVA0N01JdU1MTFdxVUhtb0t2cHcydm52UXc3cTgy?= =?utf-8?B?ZE9sYmhBN3d2aGs5bUIyeFNCUVZKeCs4YjBtR3BaNC82NW9iTEk3WmhOZ2JV?= =?utf-8?Q?qwtMkVdWHYlx4ZVwYFUZBlg=3D?= X-Microsoft-Antispam-Message-Info: au7PgP9Jrwl8PKocUozwxQ7pf5GmBKfea8chQeeuy580Y+GbrQznPxJBpBPTZkRQNQQELg1hHh/yJVsLk2Jpbceaonm5BseFpI4emjBIbL888ylnewdSZ8Ikomldkn2chprVeEe/xxUOVxtmXZvjvFV7fDUox05Cz60jrySaRo3c3i1w1U6LnsUwj84yB1r4RoAkTFlNOJavecJ8eJA8dULqm7+USWHadbAZRDgwqAbwmKCtWHh21+0V5oZ2s/bmeOz/Q+4h2xcqvGWtbFvHJFe1K5tHrNwNLbq3y01wjxS7iZWZZSe8lGE3vGS36zkXR/kwn3EOrafe5siBBZSb+QDOC6IDSXfEJPWf7fPqDlQ= X-Microsoft-Exchange-Diagnostics: 1; AM0PR04MB4882; 6:1PC/CTz7pvCYGcMX9Pai35DimrKlG31PQ8tg6g89kpwt7n5eWuJdkJoDIJltF02Jmz+YXs0kjXjwHDsYiurr8rJpQUbmIr1d0eQ/G6+1Kl2ELsqT7CRvsYmKsnUqR38FFTBlXruOB7JsJYFGjqt/QdMqtvw0JzRriN+rSQVXX64+ISp9jgsjbZ6Ha6fDFdWzH+cAt8DwPPuhN+CPNRe98nQjFs1g1An8gCupLlXZIMozATAkIlt8OIfAj1hCnWxXp7cuuZ6Z8PfURJJ4NelI8nj9t8jNAXuGtt+ScVSr9WWDNCStIdjTVL5XnJj91YQEi/YBCZSVfa0LPPnMPCc9dyhy+YKV6Dh4PgPN0elfSRe1dwJ0AXLE8Ab04wCk1ptWxA6eSlh1969arAk5M5FlprYnIKVcCKI9e0BffVNj8cHTnYjU/9rNLRZyTLW97GUom06DFmfk2Ys09l4Zwb7Cgg==; 5:+4Bl3p81WV8xVARO7vRmFiH0gdnxXxaSBcLqVb9OCGGE60zzef2Ct0pI8ErFLmZkOeZnL2FERZRJHzyUM1fJhWRPKBn0XgLZ49ocncD/KXpcIGWhhOYf5tY1BUzUHzgX8nj2B/zYN26QYufGFmvHjP83zJNsLtTg4ZVPlM4nl84=; 7:iuXWGTXUMoFLe3ACAZz9fhyayJYq5eomlUAeEl0lrvWVVulFM4mOqiiOd2FQ7LTOqMqkVBpUp4V17JBjkAUOQHzQlBorJUT6ActXJSV5V5TtVVjEC2/U3WBqI5ERtrqJFlkWYUtJ/Iyl8kN4m0jPEcmM45z6lLQn0yD0Sf8MjBHj2e68T0qD2fAoKhF+y3CB3qbMwM4dqyGw8Noo1PYKxF4p618A8b8arH2Z1c0cwK6LFw28ZAfRcdEbGppDfw1Y SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Oct 2018 07:01:49.9665 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f1a712a0-eaaf-40cf-a310-08d62db51668 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB4882 Subject: Re: [dpdk-dev] [PATCH v3 8/8] doc: add guides for fips validation X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 09 Oct 2018 07:01:52 -0000 On 10/4/2018 6:42 PM, Fan Zhang wrote: > From: Marko Kovacevic > > Document explains how to run the fips sample app > and instructions users need to parser all the request > files and generate the response files. > > Signed-off-by: Marko Kovacevic > Signed-off-by: Fan Zhang > --- > doc/guides/rel_notes/release_18_11.rst | 6 ++ > doc/guides/sample_app_ug/fips_validation.rst | 97 ++++++++++++++++++++++++++++ > doc/guides/sample_app_ug/index.rst | 5 ++ > 3 files changed, 108 insertions(+) > create mode 100644 doc/guides/sample_app_ug/fips_validation.rst > > diff --git a/doc/guides/rel_notes/release_18_11.rst b/doc/guides/rel_notes/release_18_11.rst > index 2133a5b9b..db1579b6e 100644 > --- a/doc/guides/rel_notes/release_18_11.rst > +++ b/doc/guides/rel_notes/release_18_11.rst > @@ -104,6 +104,12 @@ New Features > the specified port. The port must be stopped before the command call in order > to reconfigure queues. > > +* **Added Cryptodev Fips Validation Example Application.** > + > + Added an example application to parse and perform symmetric cryptography > + computation to the NIST Cryptographic Algorithm Validation Program (CAVP) > + test vectors. > + > > API Changes > ----------- > diff --git a/doc/guides/sample_app_ug/fips_validation.rst b/doc/guides/sample_app_ug/fips_validation.rst > new file mode 100644 > index 000000000..0e06aab99 > --- /dev/null > +++ b/doc/guides/sample_app_ug/fips_validation.rst > @@ -0,0 +1,97 @@ > +.. SPDX-License-Identifier: BSD-3-Clause > + Copyright(c) 2018 Intel Corporation. > + > +Federal Information Processing Standards (FIPS) CryptoDev Validation > +==================================================================== > + > +Overview > +-------- > + > +Federal Information Processing Standards (FIPS) are publicly announced standards > +developed by the United States federal government for use in computer systems by > +non-military government agencies and government contractors. > + > +This application is used to parse and perform symmetric cryptography > +computation to the NIST Cryptographic Algorithm Validation Program (CAVP) test > +vectors. > + > +Limitations > +----------- > + > +* Only NIST CAVP request files are parsed by this application. > +* The version of request file supported is ``CAVS 21.0`` > +* The application does not supply the test vectors. The user is expected to > + obtain the test vector files from `NIST > + `_ I cannot find the .req files in the above link. It only has .rsp files which has both cipher text as well as plain text. > +* Supported test vectors > + * AES-CBC (128,192,256) - GFSbox, KeySbox, MCT, MMT > + * AES-GCM (128,192,256) - EncryptExtIV, Decrypt > + * AES-CCM (128) - VADT, VNT, VPT, VTT, DVPT > + * AES-CMAC (128) - Generate, Verify > + * HMAC (SHA1, SHA224, SHA256, SHA384, SHA512) > + * TDES (1 Key, 2 Keys, 3 Keys) - MMT, Monte, Permop, Subkey, Varkey, VarText > + > +Compiling the Application > +------------------------- > + > +* Compile Application > + > + .. code-block:: console > + > + make -C examples/cryptodev_fips_validate > + > +* Run ``dos2unix`` on the request files > + > + .. code-block:: console > + > + dos2unix AES/req/* > + dos2unix AES_GCM/req/* > + dos2unix CCM/req/* > + dos2unix CMAC/req/* > + dos2unix HMAC/req/* > + dos2unix TDES/req/* > + > +Running the Application > +----------------------- > + > +The application requires a number of command line options: > + > + .. code-block:: console > + > + ./cryptodev_fips_validate_app [EAL options] > + -- --req-file FILE_PATH/FOLDER_PATH > + --rsp-file FILE_PATH/FOLDER_PATH > + [--cryptodev DEVICE_NAME] [--cryptodev-id ID] [--path-is-folder] > + > +where, > + * req-file: The path of the request file or folder, separated by > + ``path-is-folder`` option. > + > + * rsp-file: The path that the response file or folder is stored. separated by > + ``path-is-folder`` option. > + > + * cryptodev: The name of the target DPDK Crypto device to be validated. > + > + * cryptodev-id: The id of the target DPDK Crypto device to be validated. > + > + * path-is-folder: If presented the application expects req-file and rsp-file > + are folder paths. > + > +To run the application in linuxapp environment to test one AES FIPS test data > +file for crypto_aesni_mb PMD, issue the command: > + > +.. code-block:: console > + > + $ ./cryptodev_fips_validate_app --vdev crypto_aesni_mb -- > + --req-file /PATH/TO/REQUEST/FILE.req --rsp-file ./PATH/TO/RESPONSE/FILE.rsp > + --cryptodev crypto_aesni_mb > + > +To run the application in linuxapp environment to test all AES-GCM FIPS test > +data files in one folder for crypto_aesni_gcm PMD, issue the command: > + > +.. code-block:: console > + > + $ ./cryptodev_fips_validate_app --vdev crypto_aesni_gcm0 -- > + --req-file /PATH/TO/REQUEST/FILE/FOLDER/ > + --rsp-file ./PATH/TO/RESPONSE/FILE/FOLDER/ > + --cryptodev-id 0 --path-is-folder > diff --git a/doc/guides/sample_app_ug/index.rst b/doc/guides/sample_app_ug/index.rst > index 5bedf4f6f..146296b7a 100644 > --- a/doc/guides/sample_app_ug/index.rst > +++ b/doc/guides/sample_app_ug/index.rst > @@ -56,6 +56,7 @@ Sample Applications User Guides > performance_thread > ipsec_secgw > bbdev_app > + fips_validation > > **Figures** > > @@ -83,6 +84,10 @@ Sample Applications User Guides > > :numref:`figure_client_svr_sym_multi_proc_app` :ref:`figure_client_svr_sym_multi_proc_app` > > +:numref:`figure_master_slave_proc` :ref:`figure_master_slave_proc` > + > +:numref:`figure_slave_proc_recov` :ref:`figure_slave_proc_recov` > + > :numref:`figure_qos_sched_app_arch` :ref:`figure_qos_sched_app_arch` > > :numref:`figure_pipeline_overview` :ref:`figure_pipeline_overview`