patches for DPDK stable branches
 help / color / mirror / Atom feed
From: luca.boccassi@gmail.com
To: Jack Bond-Preston <jack.bond-preston@foss.arm.com>
Cc: Kai Ji <kai.ji@intel.com>,
	Wathsala Vithanage <wathsala.vithanage@arm.com>,
	dpdk stable <stable@dpdk.org>
Subject: patch 'crypto/openssl: make per-QP cipher context clones' has been queued to stable release 22.11.6
Date: Mon, 15 Jul 2024 16:25:57 +0100	[thread overview]
Message-ID: <20240715152704.2229503-19-luca.boccassi@gmail.com> (raw)
In-Reply-To: <20240715152704.2229503-1-luca.boccassi@gmail.com>

Hi,

FYI, your patch has been queued to stable release 22.11.6

Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet.
It will be pushed if I get no objections before 07/17/24. So please
shout if anyone has objections.

Also note that after the patch there's a diff of the upstream commit vs the
patch applied to the branch. This will indicate if there was any rebasing
needed to apply to the stable branch. If there were code changes for rebasing
(ie: not only metadata diffs), please double check that the rebase was
correctly done.

Queued patches are on a temporary branch at:
https://github.com/bluca/dpdk-stable

This queued commit can be viewed at:
https://github.com/bluca/dpdk-stable/commit/26e1e90724f9ab34120d25bba9a3cc47c9234540

Thanks.

Luca Boccassi

---
From 26e1e90724f9ab34120d25bba9a3cc47c9234540 Mon Sep 17 00:00:00 2001
From: Jack Bond-Preston <jack.bond-preston@foss.arm.com>
Date: Wed, 3 Jul 2024 13:45:49 +0000
Subject: [PATCH] crypto/openssl: make per-QP cipher context clones

[ upstream commit b1d71126023521fe740ec473abfe5b295035b859 ]

Currently EVP_CIPHER_CTXs are allocated, copied to (from
openssl_session), and then freed for every cipher operation (ie. per
packet). This is very inefficient, and avoidable.

Make each openssl_session hold an array of pointers to per-queue-pair
cipher context copies. These are populated on first use by allocating a
new context and copying from the main context. These copies can then be
used in a thread-safe manner by different worker lcores simultaneously.
Consequently the cipher context allocation and copy only has to happen
once - the first time a given qp uses an openssl_session. This brings
about a large performance boost.

Throughput performance uplift measurements for AES-CBC-128 encrypt on
Ampere Altra Max platform:
1 worker lcore
|   buffer sz (B) |   prev (Gbps) |   optimised (Gbps) |   uplift |
|-----------------+---------------+--------------------+----------|
|              64 |          1.51 |               2.94 |    94.4% |
|             256 |          4.90 |               8.05 |    64.3% |
|            1024 |         11.07 |              14.21 |    28.3% |
|            2048 |         14.03 |              16.28 |    16.0% |
|            4096 |         16.20 |              17.59 |     8.6% |

8 worker lcores
|   buffer sz (B) |   prev (Gbps) |   optimised (Gbps) |   uplift |
|-----------------+---------------+--------------------+----------|
|              64 |          3.05 |              23.74 |   678.8% |
|             256 |         10.46 |              64.86 |   520.3% |
|            1024 |         40.97 |             113.80 |   177.7% |
|            2048 |         73.25 |             130.21 |    77.8% |
|            4096 |        103.89 |             140.62 |    35.4% |

Signed-off-by: Jack Bond-Preston <jack.bond-preston@foss.arm.com>
Acked-by: Kai Ji <kai.ji@intel.com>
Reviewed-by: Wathsala Vithanage <wathsala.vithanage@arm.com>
---
 drivers/crypto/openssl/openssl_pmd_private.h |  11 +-
 drivers/crypto/openssl/rte_openssl_pmd.c     | 105 ++++++++++++-------
 drivers/crypto/openssl/rte_openssl_pmd_ops.c |  34 +++++-
 3 files changed, 108 insertions(+), 42 deletions(-)

diff --git a/drivers/crypto/openssl/openssl_pmd_private.h b/drivers/crypto/openssl/openssl_pmd_private.h
index 4e224b040b..810b539f10 100644
--- a/drivers/crypto/openssl/openssl_pmd_private.h
+++ b/drivers/crypto/openssl/openssl_pmd_private.h
@@ -165,6 +165,14 @@ struct openssl_session {
 		/**< digest length */
 	} auth;
 
+	uint16_t ctx_copies_len;
+	/* < number of entries in ctx_copies */
+	EVP_CIPHER_CTX *qp_ctx[];
+	/**< Flexible array member of per-queue-pair pointers to copies of EVP
+	 * context structure. Cipher contexts are not safe to use from multiple
+	 * cores simultaneously, so maintaining these copies allows avoiding
+	 * per-buffer copying into a temporary context.
+	 */
 } __rte_cache_aligned;
 
 /** OPENSSL crypto private asymmetric session structure */
@@ -211,7 +219,8 @@ struct openssl_asym_session {
 /** Set and validate OPENSSL crypto session parameters */
 extern int
 openssl_set_session_parameters(struct openssl_session *sess,
-		const struct rte_crypto_sym_xform *xform);
+		const struct rte_crypto_sym_xform *xform,
+		uint16_t nb_queue_pairs);
 
 /** Reset OPENSSL crypto session parameters */
 extern void
diff --git a/drivers/crypto/openssl/rte_openssl_pmd.c b/drivers/crypto/openssl/rte_openssl_pmd.c
index bfdcda8841..62a179b6b6 100644
--- a/drivers/crypto/openssl/rte_openssl_pmd.c
+++ b/drivers/crypto/openssl/rte_openssl_pmd.c
@@ -466,13 +466,10 @@ openssl_set_sess_aead_dec_param(struct openssl_session *sess,
 	return 0;
 }
 
+#if (OPENSSL_VERSION_NUMBER >= 0x30000000L && OPENSSL_VERSION_NUMBER < 0x30200000L)
 static int openssl_aesni_ctx_clone(EVP_CIPHER_CTX **dest,
 		struct openssl_session *sess)
 {
-#if (OPENSSL_VERSION_NUMBER >= 0x30200000L)
-	*dest = EVP_CIPHER_CTX_dup(sess->ctx);
-	return 0;
-#elif (OPENSSL_VERSION_NUMBER >= 0x30000000L)
 	/* OpenSSL versions 3.0.0 <= V < 3.2.0 have no dupctx() implementation
 	 * for AES-GCM and AES-CCM. In this case, we have to create new empty
 	 * contexts and initialise, as we did the original context.
@@ -488,13 +485,8 @@ static int openssl_aesni_ctx_clone(EVP_CIPHER_CTX **dest,
 		return openssl_set_sess_aead_dec_param(sess, sess->aead_algo,
 				sess->auth.digest_length, sess->cipher.key.data,
 				dest);
-#else
-	*dest = EVP_CIPHER_CTX_new();
-	if (EVP_CIPHER_CTX_copy(*dest, sess->cipher.ctx) != 1)
-		return -EINVAL;
-	return 0;
-#endif
 }
+#endif
 
 /** Set session cipher parameters */
 static int
@@ -823,7 +815,8 @@ openssl_set_session_aead_parameters(struct openssl_session *sess,
 /** Parse crypto xform chain and set private session parameters */
 int
 openssl_set_session_parameters(struct openssl_session *sess,
-		const struct rte_crypto_sym_xform *xform)
+		const struct rte_crypto_sym_xform *xform,
+		uint16_t nb_queue_pairs)
 {
 	const struct rte_crypto_sym_xform *cipher_xform = NULL;
 	const struct rte_crypto_sym_xform *auth_xform = NULL;
@@ -885,6 +878,12 @@ openssl_set_session_parameters(struct openssl_session *sess,
 		}
 	}
 
+	/*
+	 * With only one queue pair, the array of copies is not needed.
+	 * Otherwise, one entry per queue pair is required.
+	 */
+	sess->ctx_copies_len = nb_queue_pairs > 1 ? nb_queue_pairs : 0;
+
 	return 0;
 }
 
@@ -892,6 +891,13 @@ openssl_set_session_parameters(struct openssl_session *sess,
 void
 openssl_reset_session(struct openssl_session *sess)
 {
+	for (uint16_t i = 0; i < sess->ctx_copies_len; i++) {
+		if (sess->qp_ctx[i] != NULL) {
+			EVP_CIPHER_CTX_free(sess->qp_ctx[i]);
+			sess->qp_ctx[i] = NULL;
+		}
+	}
+
 	EVP_CIPHER_CTX_free(sess->cipher.ctx);
 
 	if (sess->chain_order == OPENSSL_CHAIN_CIPHER_BPI)
@@ -958,7 +964,7 @@ get_session(struct openssl_qp *qp, struct rte_crypto_op *op)
 		sess = (struct openssl_session *)_sess->driver_priv_data;
 
 		if (unlikely(openssl_set_session_parameters(sess,
-				op->sym->xform) != 0)) {
+				op->sym->xform, 1) != 0)) {
 			rte_mempool_put(qp->sess_mp, _sess);
 			sess = NULL;
 		}
@@ -1606,11 +1612,45 @@ process_auth_err:
 # endif
 /*----------------------------------------------------------------------------*/
 
+static inline EVP_CIPHER_CTX *
+get_local_cipher_ctx(struct openssl_session *sess, struct openssl_qp *qp)
+{
+	/* If the array is not being used, just return the main context. */
+	if (sess->ctx_copies_len == 0)
+		return sess->cipher.ctx;
+
+	EVP_CIPHER_CTX **lctx = &sess->qp_ctx[qp->id];
+
+	if (unlikely(*lctx == NULL)) {
+#if OPENSSL_VERSION_NUMBER >= 0x30200000L
+		/* EVP_CIPHER_CTX_dup() added in OSSL 3.2 */
+		*lctx = EVP_CIPHER_CTX_dup(sess->cipher.ctx);
+		return *lctx;
+#elif OPENSSL_VERSION_NUMBER >= 0x30000000L
+		if (sess->chain_order == OPENSSL_CHAIN_COMBINED) {
+			/* AESNI special-cased to use openssl_aesni_ctx_clone()
+			 * to allow for working around lack of
+			 * EVP_CIPHER_CTX_copy support for 3.0.0 <= OSSL Version
+			 * < 3.2.0.
+			 */
+			if (openssl_aesni_ctx_clone(lctx, sess) != 0)
+				*lctx = NULL;
+			return *lctx;
+		}
+#endif
+
+		*lctx = EVP_CIPHER_CTX_new();
+		EVP_CIPHER_CTX_copy(*lctx, sess->cipher.ctx);
+	}
+
+	return *lctx;
+}
+
 /** Process auth/cipher combined operation */
 static void
-process_openssl_combined_op
-		(struct rte_crypto_op *op, struct openssl_session *sess,
-		struct rte_mbuf *mbuf_src, struct rte_mbuf *mbuf_dst)
+process_openssl_combined_op(struct openssl_qp *qp, struct rte_crypto_op *op,
+		struct openssl_session *sess, struct rte_mbuf *mbuf_src,
+		struct rte_mbuf *mbuf_dst)
 {
 	/* cipher */
 	uint8_t *dst = NULL, *iv, *tag, *aad;
@@ -1627,11 +1667,7 @@ process_openssl_combined_op
 		return;
 	}
 
-	EVP_CIPHER_CTX *ctx;
-	if (openssl_aesni_ctx_clone(&ctx, sess) != 0) {
-		op->status = RTE_CRYPTO_OP_STATUS_ERROR;
-		return;
-	}
+	EVP_CIPHER_CTX *ctx = get_local_cipher_ctx(sess, qp);
 
 	iv = rte_crypto_op_ctod_offset(op, uint8_t *,
 			sess->iv.offset);
@@ -1687,8 +1723,6 @@ process_openssl_combined_op
 					dst, tag, taglen, ctx);
 	}
 
-	EVP_CIPHER_CTX_free(ctx);
-
 	if (status != 0) {
 		if (status == (-EFAULT) &&
 				sess->auth.operation ==
@@ -1701,14 +1735,13 @@ process_openssl_combined_op
 
 /** Process cipher operation */
 static void
-process_openssl_cipher_op
-		(struct rte_crypto_op *op, struct openssl_session *sess,
-		struct rte_mbuf *mbuf_src, struct rte_mbuf *mbuf_dst)
+process_openssl_cipher_op(struct openssl_qp *qp, struct rte_crypto_op *op,
+		struct openssl_session *sess, struct rte_mbuf *mbuf_src,
+		struct rte_mbuf *mbuf_dst)
 {
 	uint8_t *dst, *iv;
 	int srclen, status;
 	uint8_t inplace = (mbuf_src == mbuf_dst) ? 1 : 0;
-	EVP_CIPHER_CTX *ctx_copy;
 
 	/*
 	 * Segmented OOP destination buffer is not supported for encryption/
@@ -1727,24 +1760,22 @@ process_openssl_cipher_op
 
 	iv = rte_crypto_op_ctod_offset(op, uint8_t *,
 			sess->iv.offset);
-	ctx_copy = EVP_CIPHER_CTX_new();
-	EVP_CIPHER_CTX_copy(ctx_copy, sess->cipher.ctx);
+
+	EVP_CIPHER_CTX *ctx = get_local_cipher_ctx(sess, qp);
 
 	if (sess->cipher.mode == OPENSSL_CIPHER_LIB)
 		if (sess->cipher.direction == RTE_CRYPTO_CIPHER_OP_ENCRYPT)
 			status = process_openssl_cipher_encrypt(mbuf_src, dst,
 					op->sym->cipher.data.offset, iv,
-					srclen, ctx_copy, inplace);
+					srclen, ctx, inplace);
 		else
 			status = process_openssl_cipher_decrypt(mbuf_src, dst,
 					op->sym->cipher.data.offset, iv,
-					srclen, ctx_copy, inplace);
+					srclen, ctx, inplace);
 	else
 		status = process_openssl_cipher_des3ctr(mbuf_src, dst,
-				op->sym->cipher.data.offset, iv, srclen,
-				ctx_copy);
+				op->sym->cipher.data.offset, iv, srclen, ctx);
 
-	EVP_CIPHER_CTX_free(ctx_copy);
 	if (status != 0)
 		op->status = RTE_CRYPTO_OP_STATUS_ERROR;
 }
@@ -2910,13 +2941,13 @@ process_op(struct openssl_qp *qp, struct rte_crypto_op *op,
 
 	switch (sess->chain_order) {
 	case OPENSSL_CHAIN_ONLY_CIPHER:
-		process_openssl_cipher_op(op, sess, msrc, mdst);
+		process_openssl_cipher_op(qp, op, sess, msrc, mdst);
 		break;
 	case OPENSSL_CHAIN_ONLY_AUTH:
 		process_openssl_auth_op(qp, op, sess, msrc, mdst);
 		break;
 	case OPENSSL_CHAIN_CIPHER_AUTH:
-		process_openssl_cipher_op(op, sess, msrc, mdst);
+		process_openssl_cipher_op(qp, op, sess, msrc, mdst);
 		/* OOP */
 		if (msrc != mdst)
 			copy_plaintext(msrc, mdst, op);
@@ -2924,10 +2955,10 @@ process_op(struct openssl_qp *qp, struct rte_crypto_op *op,
 		break;
 	case OPENSSL_CHAIN_AUTH_CIPHER:
 		process_openssl_auth_op(qp, op, sess, msrc, mdst);
-		process_openssl_cipher_op(op, sess, msrc, mdst);
+		process_openssl_cipher_op(qp, op, sess, msrc, mdst);
 		break;
 	case OPENSSL_CHAIN_COMBINED:
-		process_openssl_combined_op(op, sess, msrc, mdst);
+		process_openssl_combined_op(qp, op, sess, msrc, mdst);
 		break;
 	case OPENSSL_CHAIN_CIPHER_BPI:
 		process_openssl_docsis_bpi_op(op, sess, msrc, mdst);
diff --git a/drivers/crypto/openssl/rte_openssl_pmd_ops.c b/drivers/crypto/openssl/rte_openssl_pmd_ops.c
index 24d6d48262..a448279029 100644
--- a/drivers/crypto/openssl/rte_openssl_pmd_ops.c
+++ b/drivers/crypto/openssl/rte_openssl_pmd_ops.c
@@ -777,9 +777,34 @@ qp_setup_cleanup:
 
 /** Returns the size of the symmetric session structure */
 static unsigned
-openssl_pmd_sym_session_get_size(struct rte_cryptodev *dev __rte_unused)
+openssl_pmd_sym_session_get_size(struct rte_cryptodev *dev)
 {
-	return sizeof(struct openssl_session);
+	/*
+	 * For 0 qps, return the max size of the session - this is necessary if
+	 * the user calls into this function to create the session mempool,
+	 * without first configuring the number of qps for the cryptodev.
+	 */
+	if (dev->data->nb_queue_pairs == 0) {
+		unsigned int max_nb_qps = ((struct openssl_private *)
+				dev->data->dev_private)->max_nb_qpairs;
+		return sizeof(struct openssl_session) +
+				(sizeof(void *) * max_nb_qps);
+	}
+
+	/*
+	 * With only one queue pair, the thread safety of multiple context
+	 * copies is not necessary, so don't allocate extra memory for the
+	 * array.
+	 */
+	if (dev->data->nb_queue_pairs == 1)
+		return sizeof(struct openssl_session);
+
+	/*
+	 * Otherwise, the size of the flexible array member should be enough to
+	 * fit pointers to per-qp contexts.
+	 */
+	return sizeof(struct openssl_session) +
+		(sizeof(void *) * dev->data->nb_queue_pairs);
 }
 
 /** Returns the size of the asymmetric session structure */
@@ -791,7 +816,7 @@ openssl_pmd_asym_session_get_size(struct rte_cryptodev *dev __rte_unused)
 
 /** Configure the session from a crypto xform chain */
 static int
-openssl_pmd_sym_session_configure(struct rte_cryptodev *dev __rte_unused,
+openssl_pmd_sym_session_configure(struct rte_cryptodev *dev,
 		struct rte_crypto_sym_xform *xform,
 		struct rte_cryptodev_sym_session *sess)
 {
@@ -803,7 +828,8 @@ openssl_pmd_sym_session_configure(struct rte_cryptodev *dev __rte_unused,
 		return -EINVAL;
 	}
 
-	ret = openssl_set_session_parameters(sess_private_data, xform);
+	ret = openssl_set_session_parameters(sess_private_data, xform,
+			dev->data->nb_queue_pairs);
 	if (ret != 0) {
 		OPENSSL_LOG(ERR, "failed configure session parameters");
 
-- 
2.39.2

---
  Diff of the applied patch vs upstream commit (please double-check if non-empty:
---
--- -	2024-07-15 16:19:35.745313284 +0100
+++ 0019-crypto-openssl-make-per-QP-cipher-context-clones.patch	2024-07-15 16:19:34.488204755 +0100
@@ -1 +1 @@
-From b1d71126023521fe740ec473abfe5b295035b859 Mon Sep 17 00:00:00 2001
+From 26e1e90724f9ab34120d25bba9a3cc47c9234540 Mon Sep 17 00:00:00 2001
@@ -5,0 +6,2 @@
+[ upstream commit b1d71126023521fe740ec473abfe5b295035b859 ]
+
@@ -38,2 +39,0 @@
-Cc: stable@dpdk.org
-
@@ -50 +50 @@
-index 0f038b218c..bad7dcf2f5 100644
+index 4e224b040b..810b539f10 100644
@@ -53 +53 @@
-@@ -166,6 +166,14 @@ struct __rte_cache_aligned openssl_session {
+@@ -165,6 +165,14 @@ struct openssl_session {
@@ -65 +65 @@
- };
+ } __rte_cache_aligned;
@@ -68 +68 @@
-@@ -217,7 +225,8 @@ struct __rte_cache_aligned openssl_asym_session {
+@@ -211,7 +219,8 @@ struct openssl_asym_session {
@@ -79 +79 @@
-index bd09d58d88..df44cc097e 100644
+index bfdcda8841..62a179b6b6 100644
@@ -82 +82 @@
-@@ -467,13 +467,10 @@ openssl_set_sess_aead_dec_param(struct openssl_session *sess,
+@@ -466,13 +466,10 @@ openssl_set_sess_aead_dec_param(struct openssl_session *sess,
@@ -97 +97 @@
-@@ -489,13 +486,8 @@ static int openssl_aesni_ctx_clone(EVP_CIPHER_CTX **dest,
+@@ -488,13 +485,8 @@ static int openssl_aesni_ctx_clone(EVP_CIPHER_CTX **dest,
@@ -112 +112 @@
-@@ -824,7 +816,8 @@ openssl_set_session_aead_parameters(struct openssl_session *sess,
+@@ -823,7 +815,8 @@ openssl_set_session_aead_parameters(struct openssl_session *sess,
@@ -122 +122 @@
-@@ -886,6 +879,12 @@ openssl_set_session_parameters(struct openssl_session *sess,
+@@ -885,6 +878,12 @@ openssl_set_session_parameters(struct openssl_session *sess,
@@ -135 +135 @@
-@@ -893,6 +892,13 @@ openssl_set_session_parameters(struct openssl_session *sess,
+@@ -892,6 +891,13 @@ openssl_set_session_parameters(struct openssl_session *sess,
@@ -149 +149 @@
-@@ -959,7 +965,7 @@ get_session(struct openssl_qp *qp, struct rte_crypto_op *op)
+@@ -958,7 +964,7 @@ get_session(struct openssl_qp *qp, struct rte_crypto_op *op)
@@ -158 +158 @@
-@@ -1607,11 +1613,45 @@ process_auth_err:
+@@ -1606,11 +1612,45 @@ process_auth_err:
@@ -207 +207 @@
-@@ -1628,11 +1668,7 @@ process_openssl_combined_op
+@@ -1627,11 +1667,7 @@ process_openssl_combined_op
@@ -220 +220 @@
-@@ -1688,8 +1724,6 @@ process_openssl_combined_op
+@@ -1687,8 +1723,6 @@ process_openssl_combined_op
@@ -229 +229 @@
-@@ -1702,14 +1736,13 @@ process_openssl_combined_op
+@@ -1701,14 +1735,13 @@ process_openssl_combined_op
@@ -247 +247 @@
-@@ -1728,24 +1761,22 @@ process_openssl_cipher_op
+@@ -1727,24 +1760,22 @@ process_openssl_cipher_op
@@ -277 +277 @@
-@@ -3150,13 +3181,13 @@ process_op(struct openssl_qp *qp, struct rte_crypto_op *op,
+@@ -2910,13 +2941,13 @@ process_op(struct openssl_qp *qp, struct rte_crypto_op *op,
@@ -293 +293 @@
-@@ -3164,10 +3195,10 @@ process_op(struct openssl_qp *qp, struct rte_crypto_op *op,
+@@ -2924,10 +2955,10 @@ process_op(struct openssl_qp *qp, struct rte_crypto_op *op,
@@ -307 +307 @@
-index b16baaa08f..4209c6ab6f 100644
+index 24d6d48262..a448279029 100644
@@ -310 +310 @@
-@@ -794,9 +794,34 @@ qp_setup_cleanup:
+@@ -777,9 +777,34 @@ qp_setup_cleanup:
@@ -347 +347 @@
-@@ -808,7 +833,7 @@ openssl_pmd_asym_session_get_size(struct rte_cryptodev *dev __rte_unused)
+@@ -791,7 +816,7 @@ openssl_pmd_asym_session_get_size(struct rte_cryptodev *dev __rte_unused)
@@ -356 +356 @@
-@@ -820,7 +845,8 @@ openssl_pmd_sym_session_configure(struct rte_cryptodev *dev __rte_unused,
+@@ -803,7 +828,8 @@ openssl_pmd_sym_session_configure(struct rte_cryptodev *dev __rte_unused,

  parent reply	other threads:[~2024-07-15 15:28 UTC|newest]

Thread overview: 210+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-06-24 23:57 patch 'test: force IOVA mode on PPC64 without huge pages' " luca.boccassi
2024-06-24 23:57 ` patch 'bus/pci: fix build with musl 1.2.4 / Alpine 3.19' " luca.boccassi
2024-06-24 23:57 ` patch 'eal/unix: support ZSTD compression for firmware' " luca.boccassi
2024-06-24 23:57 ` patch 'pcapng: add memcpy check' " luca.boccassi
2024-06-24 23:57 ` patch 'net/virtio-user: " luca.boccassi
2024-06-24 23:57 ` patch 'eal/windows: install sched.h file' " luca.boccassi
2024-06-24 23:57 ` patch 'latencystats: fix literal float suffix' " luca.boccassi
2024-06-24 23:57 ` patch 'net/nfp: fix representor port queue release' " luca.boccassi
2024-06-24 23:57 ` patch 'net/bonding: fix failover time of LACP with mode 4' " luca.boccassi
2024-06-24 23:57 ` patch 'net/hns3: fix offload flag of IEEE 1588' " luca.boccassi
2024-06-24 23:57 ` patch 'net/hns3: fix Rx timestamp flag' " luca.boccassi
2024-06-24 23:57 ` patch 'net/hns3: fix double free for Rx/Tx queue' " luca.boccassi
2024-06-24 23:57 ` patch 'net/hns3: fix variable overflow' " luca.boccassi
2024-06-24 23:58 ` patch 'net/hns3: disable SCTP verification tag for RSS hash input' " luca.boccassi
2024-06-24 23:58 ` patch 'net/af_packet: align Rx/Tx structs to cache line' " luca.boccassi
2024-06-24 23:58 ` patch 'doc: fix testpmd ring size command' " luca.boccassi
2024-06-24 23:58 ` patch 'net/af_xdp: fix port ID in Rx mbuf' " luca.boccassi
2024-06-24 23:58 ` patch 'net/af_xdp: count mbuf allocation failures' " luca.boccassi
2024-06-24 23:58 ` patch 'net/af_xdp: fix stats reset' " luca.boccassi
2024-06-24 23:58 ` patch 'net/af_xdp: remove unused local statistic' " luca.boccassi
2024-06-24 23:58 ` patch 'net/tap: fix file descriptor check in isolated flow' " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: fix MDIO access for non-zero ports and CL45 PHYs' " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: reset link when link never comes back' " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: fix fluctuations for 1G Bel Fuse SFP' " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: update DMA coherency values' " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: disable interrupts during device removal' " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: disable RRC for yellow carp devices' " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: enable PLL control for fixed PHY modes only' " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: fix SFP codes check for DAC cables' " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: fix connection for SFP+ active " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: check only minimum speed for " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: fix Tx flow on 30H HW' " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: delay AN timeout during KR training' " luca.boccassi
2024-06-24 23:58 ` patch 'net/axgbe: fix linkup in PHY status' " luca.boccassi
2024-06-24 23:58 ` patch 'net/ice: fix check for outer UDP checksum offload' " luca.boccassi
2024-06-24 23:58 ` patch 'app/testpmd: fix outer IP " luca.boccassi
2024-06-24 23:58 ` patch 'net: fix outer UDP checksum in Intel prepare helper' " luca.boccassi
2024-06-24 23:58 ` patch 'net/i40e: fix outer UDP checksum offload for X710' " luca.boccassi
2024-06-24 23:58 ` patch 'net/iavf: remove outer UDP checksum offload for X710 VF' " luca.boccassi
2024-06-24 23:58 ` patch 'app/testpmd: fix lcore ID restriction' " luca.boccassi
2024-06-24 23:58 ` patch 'hash: fix return code description in Doxygen' " luca.boccassi
2024-06-24 23:58 ` patch 'hash: check name when creating a hash' " luca.boccassi
2024-06-24 23:58 ` patch 'mempool: replace GCC pragma with cast' " luca.boccassi
2024-06-24 23:58 ` patch 'vhost: fix build with GCC 13' " luca.boccassi
2024-06-24 23:58 ` patch 'vhost: cleanup resubmit info before inflight setup' " luca.boccassi
2024-06-24 23:58 ` patch 'net/virtio: fix MAC table update' " luca.boccassi
2024-06-24 23:58 ` patch 'baseband/acc: fix memory barrier' " luca.boccassi
2024-06-24 23:58 ` patch 'event/sw: fix warning from useless snprintf' " luca.boccassi
2024-06-24 23:58 ` patch 'eventdev/crypto: fix opaque field handling' " luca.boccassi
2024-06-24 23:58 ` patch 'eal: fix logs for '--lcores'' " luca.boccassi
2024-06-24 23:58 ` patch 'net/fm10k: fix cleanup during init failure' " luca.boccassi
2024-06-24 23:58 ` patch 'net/ixgbe: do not update link status in secondary process' " luca.boccassi
2024-06-24 23:58 ` patch 'net/ixgbe: do not create delayed interrupt handler twice' " luca.boccassi
2024-06-24 23:58 ` patch 'net/e1000/base: fix link power down' " luca.boccassi
2024-06-24 23:58 ` patch 'net/ixgbe/base: revert advertising for X550 2.5G/5G' " luca.boccassi
2024-06-24 23:58 ` patch 'net/ixgbe/base: fix 5G link speed reported on VF' " luca.boccassi
2024-06-24 23:58 ` patch 'net/ixgbe/base: fix PHY ID for X550' " luca.boccassi
2024-06-24 23:58 ` patch 'net/cnxk: fix RSS config' " luca.boccassi
2024-06-24 23:58 ` patch 'net/cnxk: fix outbound security with higher packet burst' " luca.boccassi
2024-06-24 23:58 ` patch 'net/cnxk: fix promiscuous state after MAC change' " luca.boccassi
2024-06-24 23:58 ` patch 'graph: fix ID collisions' " luca.boccassi
2024-06-24 23:58 ` patch 'bpf: disable on 32-bit x86' " luca.boccassi
2024-06-24 23:58 ` patch 'hash: fix RCU reclamation size' " luca.boccassi
2024-06-24 23:58 ` patch 'common/mlx5: fix unsigned/signed mismatch' " luca.boccassi
2024-06-24 23:58 ` patch 'net/mlx5/hws: decrease log level for creation failure' " luca.boccassi
2024-06-24 23:58 ` patch 'common/mlx5: fix PRM structs' " luca.boccassi
2024-06-24 23:58 ` patch 'net/mlx5/hws: fix function comment' " luca.boccassi
2024-06-24 23:58 ` patch 'net/mlx5/hws: fix spinlock release on context open' " luca.boccassi
2024-06-24 23:58 ` patch 'net/mlx5/hws: add template match none flag' " luca.boccassi
2024-06-24 23:58 ` patch 'net/mlx5/hws: fix action template dump' " luca.boccassi
2024-06-24 23:58 ` patch 'net/mlx5: fix indexed pool with invalid index' " luca.boccassi
2024-06-24 23:58 ` patch 'net/mlx5: fix hash Rx queue release in flow sample' " luca.boccassi
2024-06-24 23:58 ` patch 'net/mlx5: fix flow template indirect action failure' " luca.boccassi
2024-06-24 23:59 ` patch 'net/mlx5: break flow resource release loop' " luca.boccassi
2024-06-24 23:59 ` patch 'net/mlx5: fix access to flow template operations' " luca.boccassi
2024-06-24 23:59 ` patch 'net/mlx5: support jump in meter hierarchy' " luca.boccassi
2024-06-24 23:59 ` patch 'net/mlx5: fix crash on counter pool destroy' " luca.boccassi
2024-06-24 23:59 ` patch 'test/crypto: fix enqueue/dequeue callback case' " luca.boccassi
2024-06-24 23:59 ` patch 'telemetry: lower log level on socket error' " luca.boccassi
2024-06-24 23:59 ` patch 'bus/vdev: revert fix devargs in secondary process' " luca.boccassi
2024-06-24 23:59 ` patch 'doc: fix link to hugepage mapping from Linux guide' " luca.boccassi
2024-07-15 15:25   ` patch 'config: fix warning for cross build with meson >= 1.3.0' " luca.boccassi
2024-07-15 15:25     ` patch 'build: use builtin helper for python dependencies' " luca.boccassi
2024-07-15 15:25     ` patch 'app/bbdev: fix interrupt tests' " luca.boccassi
2024-07-15 15:25     ` patch 'dmadev: fix structure alignment' " luca.boccassi
2024-07-15 15:25     ` patch 'vdpa/sfc: remove dead code' " luca.boccassi
2024-07-15 15:25     ` patch 'mbuf: fix dynamic fields copy' " luca.boccassi
2024-07-15 15:25     ` patch 'bpf: fix MOV instruction evaluation' " luca.boccassi
2024-07-15 15:25     ` patch 'bpf: fix load hangs with six IPv6 addresses' " luca.boccassi
2024-07-15 15:25     ` patch 'telemetry: fix connection parameter parsing' " luca.boccassi
2024-07-15 15:25     ` patch 'baseband/la12xx: forbid secondary process' " luca.boccassi
2024-07-15 15:25     ` patch 'app/crypto-perf: remove redundant local variable' " luca.boccassi
2024-07-15 15:25     ` patch 'app/crypto-perf: fix result for asymmetric' " luca.boccassi
2024-07-15 15:25     ` patch 'crypto/cnxk: fix minimal input normalization' " luca.boccassi
2024-07-15 15:25     ` patch 'cryptodev: fix build without crypto callbacks' " luca.boccassi
2024-07-15 15:25     ` patch 'cryptodev: validate crypto callbacks from next node' " luca.boccassi
2024-07-15 15:25     ` patch 'examples/fips_validation: fix dereference and out-of-bound' " luca.boccassi
2024-07-15 15:25     ` patch 'crypto/openssl: fix GCM and CCM thread unsafe contexts' " luca.boccassi
2024-07-15 15:25     ` patch 'crypto/openssl: optimize 3DES-CTR context init' " luca.boccassi
2024-07-15 15:25     ` luca.boccassi [this message]
2024-07-15 15:25     ` patch 'crypto/openssl: make per-QP auth context clones' " luca.boccassi
2024-07-15 15:25     ` patch 'crypto/openssl: set cipher padding once' " luca.boccassi
2024-07-15 15:26     ` patch 'common/dpaax/caamflib: fix PDCP-SDAP watchdog error' " luca.boccassi
2024-07-15 15:26     ` patch 'common/dpaax/caamflib: fix PDCP AES-AES " luca.boccassi
2024-07-15 15:26     ` patch 'crypto/dpaa_sec: fix IPsec descriptor' " luca.boccassi
2024-07-15 15:26     ` patch 'crypto/dpaa2_sec: fix event queue user context' " luca.boccassi
2024-07-15 15:26     ` patch 'examples/ipsec-secgw: fix SA salt endianness' " luca.boccassi
2024-07-15 15:26     ` patch 'fbarray: fix incorrect lookahead behavior' " luca.boccassi
2024-07-15 15:26     ` patch 'fbarray: fix incorrect lookbehind " luca.boccassi
2024-07-15 15:26     ` patch 'fbarray: fix lookahead ignore mask handling' " luca.boccassi
2024-07-15 15:26     ` patch 'fbarray: fix lookbehind " luca.boccassi
2024-07-15 15:26     ` patch 'usertools/devbind: fix indentation' " luca.boccassi
2024-07-15 15:26     ` patch 'eal/linux: lower log level on allocation attempt failure' " luca.boccassi
2024-07-15 15:26     ` patch 'dma/idxd: fix setup with Ubuntu 24.04' " luca.boccassi
2024-07-15 15:26     ` patch 'app/testpmd: fix help string of BPF load command' " luca.boccassi
2024-07-15 15:26     ` patch 'bus/dpaa: fix bus scan for DMA devices' " luca.boccassi
2024-07-15 15:26     ` patch 'bus/dpaa: fix memory leak in bus scan' " luca.boccassi
2024-07-15 15:26     ` patch 'common/dpaax: fix IOVA table cleanup' " luca.boccassi
2024-07-15 15:26     ` patch 'common/dpaax: fix node array overrun' " luca.boccassi
2024-07-15 15:26     ` patch 'bus/dpaa: remove redundant file descriptor check' " luca.boccassi
2024-07-15 15:26     ` patch 'net/dpaa: forbid MTU configuration for shared interface' " luca.boccassi
2024-07-15 15:26     ` patch 'net/mlx5: fix start without duplicate flow patterns' " luca.boccassi
2024-07-15 15:26     ` patch 'fbarray: fix finding for unaligned length' " luca.boccassi
2024-07-15 15:26     ` patch 'buildtools: fix build with clang 17 and ASan' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice/base: fix pointer to variable outside scope' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice/base: fix memory leak in firmware version check' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice/base: fix sign extension' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice/base: fix size when allocating children arrays' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice/base: fix GCS descriptor field offsets' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice/base: fix return type of bitmap hamming weight' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice/base: fix check for existing switch rule' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice/base: fix potential TLV length overflow' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice/base: fix board type definition' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice/base: fix preparing PHY for timesync command' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice/base: fix masking when reading context' " luca.boccassi
2024-07-15 15:26     ` patch 'common/idpf: fix flex descriptor mask' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ice: fix sizing of filter hash table' " luca.boccassi
2024-07-15 15:26     ` patch 'app/testpmd: handle IEEE1588 init failure' " luca.boccassi
2024-07-15 15:26     ` patch 'doc: remove empty section from testpmd guide' " luca.boccassi
2024-07-15 15:26     ` patch 'app/testpmd: fix parsing for connection tracking item' " luca.boccassi
2024-07-15 15:26     ` patch 'net/txgbe: fix tunnel packet parsing' " luca.boccassi
2024-07-15 15:26     ` patch 'net/txgbe: fix flow filters in VT mode' " luca.boccassi
2024-07-15 15:26     ` patch 'net/txgbe: fix Tx hang on queue disable' " luca.boccassi
2024-07-15 15:26     ` patch 'net/txgbe: restrict configuration of VLAN strip offload' " luca.boccassi
2024-07-15 15:26     ` patch 'net/txgbe: reconfigure more MAC Rx registers' " luca.boccassi
2024-07-15 15:26     ` patch 'net/txgbe: fix VF promiscuous and allmulticast' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ngbe: add special config for YT8531SH-CA PHY' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ngbe: keep PHY power down while device probing' " luca.boccassi
2024-07-15 15:26     ` patch 'net/txgbe: fix hotplug remove' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ngbe: " luca.boccassi
2024-07-15 15:26     ` patch 'net/txgbe: fix MTU range' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ngbe: " luca.boccassi
2024-07-15 15:26     ` patch 'net/txgbe: fix memory leaks' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ngbe: " luca.boccassi
2024-07-15 15:26     ` patch 'net/txgbe: fix Rx interrupt' " luca.boccassi
2024-07-15 15:26     ` patch 'net/vmxnet3: fix init logs' " luca.boccassi
2024-07-15 15:26     ` patch 'net/nfp: fix IPv6 TTL and DSCP flow action' " luca.boccassi
2024-07-15 15:26     ` patch 'net/nfp: fix allocation of switch domain' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ionic: fix mbuf double-free when emptying array' " luca.boccassi
2024-07-15 15:26     ` patch 'net/nfp: disable ctrl VNIC queues on close' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ena: fix bad checksum handling' " luca.boccassi
2024-07-15 15:26     ` patch 'net/ena: fix return value check' " luca.boccassi
2024-07-15 15:27     ` patch 'net/ena: fix checksum handling' " luca.boccassi
2024-07-15 15:27     ` patch 'net/nfp: forbid offload flow rules with empty action list' " luca.boccassi
2024-07-15 15:27     ` patch 'net/nfp: remove redundant function call' " luca.boccassi
2024-07-15 15:27     ` patch 'net/nfp: adapt reverse sequence card' " luca.boccassi
2024-07-15 15:27     ` patch 'net/nfp: fix disabling 32-bit build' " luca.boccassi
2024-07-24 11:32       ` patch 'crypto/qat: fix GEN4 write' " luca.boccassi
2024-07-24 11:32         ` patch 'crypto/ipsec_mb: fix function comment' " luca.boccassi
2024-07-24 11:32         ` patch 'test/crypto: fix allocation " luca.boccassi
2024-07-24 11:32         ` patch 'crypto/qat: fix log message typo' " luca.boccassi
2024-07-24 11:32         ` patch 'doc: fix typo in l2fwd-crypto guide' " luca.boccassi
2024-07-24 11:32         ` patch 'test/crypto: remove unused stats in setup' " luca.boccassi
2024-07-24 11:32         ` patch 'test/crypto: fix asymmetric capability test' " luca.boccassi
2024-07-24 11:32         ` patch 'crypto/qat: fix placement of OOP offset' " luca.boccassi
2024-07-24 11:32         ` patch 'net/ice: fix memory leaks in raw pattern parsing' " luca.boccassi
2024-07-24 11:32         ` patch 'net/ice: fix return value for " luca.boccassi
2024-07-24 11:32         ` patch 'net/mlx5: fix Arm build with GCC 9.1' " luca.boccassi
2024-07-24 11:32         ` patch 'net/mlx5: fix MTU configuration' " luca.boccassi
2024-07-24 11:32         ` patch 'net/mlx5/hws: fix deletion of action vport' " luca.boccassi
2024-07-24 11:32         ` patch 'net/mlx5/hws: fix port ID on root item convert' " luca.boccassi
2024-07-24 11:32         ` patch 'net/mlx5/hws: remove unused variable' " luca.boccassi
2024-07-24 11:32         ` patch 'net/mlx5: fix end condition of reading xstats' " luca.boccassi
2024-07-24 11:32         ` patch 'net/mlx5: fix uplink port probing in bonding mode' " luca.boccassi
2024-07-24 11:32         ` patch 'common/mlx5: remove unneeded field when modify RQ table' " luca.boccassi
2024-07-24 11:32         ` patch 'net/mlx5: fix disabling E-Switch default flow rules' " luca.boccassi
2024-07-24 11:32         ` patch 'net/hns3: check Rx DMA address alignmnent' " luca.boccassi
2024-07-24 11:32         ` patch 'net/ark: fix index arithmetic' " luca.boccassi
2024-07-24 11:33         ` patch 'ethdev: fix GENEVE option item conversion' " luca.boccassi
2024-07-24 11:33         ` patch 'app/testpmd: add postpone option to async flow destroy' " luca.boccassi
2024-07-24 11:33         ` patch 'ethdev: fix device init without socket-local memory' " luca.boccassi
2024-07-24 11:33         ` patch 'app/testpmd: fix build on signed comparison' " luca.boccassi
2024-07-24 11:33         ` patch 'bus/pci: fix UIO resource mapping in secondary process' " luca.boccassi
2024-07-24 11:33         ` patch 'bus/pci: fix FD " luca.boccassi
2024-07-24 11:33         ` patch 'dma/hisilicon: remove support for HIP09 platform' " luca.boccassi
2024-07-24 11:33         ` patch 'app/dumpcap: handle SIGTERM and SIGHUP' " luca.boccassi
2024-07-24 11:33         ` patch 'app/pdump: " luca.boccassi
2024-07-24 11:33         ` patch 'malloc: fix multi-process wait condition handling' " luca.boccassi
2024-07-24 11:33         ` patch 'bus/vdev: fix device reinitialization' " luca.boccassi
2024-07-24 11:33         ` patch 'examples/l3fwd: fix crash in ACL mode for mixed traffic' " luca.boccassi
2024-07-24 11:33         ` patch 'examples/l3fwd: fix crash on multiple sockets' " luca.boccassi
2024-07-24 11:33         ` patch 'net/hns3: fix uninitialized variable in FEC query' " luca.boccassi
2024-07-24 11:33         ` patch 'net/ice/base: fix temporary failures reading NVM' " luca.boccassi
2024-07-24 11:33         ` patch 'examples: fix queue ID restriction' " luca.boccassi
2024-07-24 11:33         ` patch 'examples: fix lcore " luca.boccassi
2024-07-24 11:33         ` patch 'examples: fix port " luca.boccassi
2024-07-24 11:33         ` patch 'doc: remove reference to mbuf pkt field' " luca.boccassi
2024-07-29 23:33           ` patch 'examples/ipsec-secgw: revert SA salt endianness' " luca.boccassi
2024-07-29 23:33             ` patch 'doc: fix mbuf flags' " luca.boccassi
2024-07-29 23:33             ` patch 'doc: add baseline mode in l3fwd-power guide' " luca.boccassi

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240715152704.2229503-19-luca.boccassi@gmail.com \
    --to=luca.boccassi@gmail.com \
    --cc=jack.bond-preston@foss.arm.com \
    --cc=kai.ji@intel.com \
    --cc=stable@dpdk.org \
    --cc=wathsala.vithanage@arm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).