automatic DPDK test reports
 help / color / mirror / Atom feed
* [dpdk-test-report] |WARNING| pw97014 [PATCH] test/crypto-perf: support lookaside IPsec
@ 2021-08-17 18:13 dpdklab
  0 siblings, 0 replies; only message in thread
From: dpdklab @ 2021-08-17 18:13 UTC (permalink / raw)
  To: test-report; +Cc: dpdk-test-reports

[-- Attachment #1: Type: text/plain, Size: 8095 bytes --]

Test-Label: iol-testing
Test-Status: WARNING
http://dpdk.org/patch/97014

_apply patch failure_

Submitter: Akhil Goyal <gakhil@marvell.com>
Date: Tuesday, August 17 2021 17:48:49 
Applied on: CommitID:a841afe93695cf38f7d2224761e32b13de478b8c
Apply patch set 97014 failed:

Checking patch app/test-crypto-perf/cperf_ops.c...
Hunk #1 succeeded at 35 (offset -27 lines).
Hunk #2 succeeded at 544 (offset -27 lines).
Hunk #3 succeeded at 746 (offset -52 lines).
error: while searching for:

	op_fns->sess_create = cperf_create_session;

	if (options->op_type == CPERF_ASYM_MODEX) {
		op_fns->populate_ops = cperf_set_ops_asym;
		return 0;
	}

	if (options->op_type == CPERF_AEAD) {
		op_fns->populate_ops = cperf_set_ops_aead;
		return 0;
	}

	if (options->op_type == CPERF_AUTH_THEN_CIPHER
			|| options->op_type == CPERF_CIPHER_THEN_AUTH) {
		op_fns->populate_ops = cperf_set_ops_cipher_auth;
		return 0;
	}
	if (options->op_type == CPERF_AUTH_ONLY) {
		if (options->auth_algo == RTE_CRYPTO_AUTH_NULL)
			op_fns->populate_ops = cperf_set_ops_null_auth;
		else
			op_fns->populate_ops = cperf_set_ops_auth;
		return 0;
	}
	if (options->op_type == CPERF_CIPHER_ONLY) {
		if (options->cipher_algo == RTE_CRYPTO_CIPHER_NULL)
			op_fns->populate_ops = cperf_set_ops_null_cipher;
		else
			op_fns->populate_ops = cperf_set_ops_cipher;
		return 0;
	}
#ifdef RTE_LIB_SECURITY
	if (options->op_type == CPERF_PDCP) {
		op_fns->populate_ops = cperf_set_ops_security;
		return 0;
	}
	if (options->op_type == CPERF_DOCSIS) {
		op_fns->populate_ops = cperf_set_ops_security;
		return 0;
	}
#endif
	return -1;
}

error: patch failed: app/test-crypto-perf/cperf_ops.c:872
Checking patch app/test-crypto-perf/cperf_options.h...
error: while searching for:
	CPERF_AEAD,
	CPERF_PDCP,
	CPERF_DOCSIS,
	CPERF_ASYM_MODEX
};


error: patch failed: app/test-crypto-perf/cperf_options.h:80
Checking patch app/test-crypto-perf/cperf_options_parsing.c...
error: while searching for:
			cperf_op_type_strs[CPERF_DOCSIS],
			CPERF_DOCSIS
		},
		{
			cperf_op_type_strs[CPERF_ASYM_MODEX],
			CPERF_ASYM_MODEX

error: patch failed: app/test-crypto-perf/cperf_options_parsing.c:458
Checking patch app/test-crypto-perf/cperf_test_throughput.c...
error: while searching for:
		}
#ifdef RTE_LIB_SECURITY
		else if (ctx->options->op_type == CPERF_PDCP ||
			 ctx->options->op_type == CPERF_DOCSIS) {
			struct rte_security_ctx *sec_ctx =
				(struct rte_security_ctx *)
					rte_cryptodev_get_sec_ctx(ctx->dev_id);

error: patch failed: app/test-crypto-perf/cperf_test_throughput.c:42
Checking patch app/test-crypto-perf/cperf_test_vectors.c...
error: while searching for:
		t_vec->modex.elen = sizeof(perf_mod_e);
	}

	if (options->op_type ==	CPERF_PDCP) {
		if (options->cipher_algo == RTE_CRYPTO_CIPHER_NULL) {
			t_vec->cipher_key.length = 0;
			t_vec->ciphertext.data = plaintext;

error: patch failed: app/test-crypto-perf/cperf_test_vectors.c:448
Hunk #2 succeeded at 543 (offset -37 lines).
Checking patch app/test-crypto-perf/main.c...
error: while searching for:
	[CPERF_AEAD] = "aead",
	[CPERF_PDCP] = "pdcp",
	[CPERF_DOCSIS] = "docsis",
	[CPERF_ASYM_MODEX] = "modex"
};


error: patch failed: app/test-crypto-perf/main.c:41
error: while searching for:
			/* Fall through */
		case CPERF_PDCP:
		case CPERF_DOCSIS:
			/* Fall through */
		default:

			conf.ff_disable |= RTE_CRYPTODEV_FF_ASYMMETRIC_CRYPTO;
		}


error: patch failed: app/test-crypto-perf/main.c:278
Applying patch app/test-crypto-perf/cperf_ops.c with 1 reject...
Hunk #1 applied cleanly.
Hunk #2 applied cleanly.
Hunk #3 applied cleanly.
Rejected hunk #4.
Applying patch app/test-crypto-perf/cperf_options.h with 1 reject...
Rejected hunk #1.
Applying patch app/test-crypto-perf/cperf_options_parsing.c with 1 reject...
Rejected hunk #1.
Applying patch app/test-crypto-perf/cperf_test_throughput.c with 1 reject...
Rejected hunk #1.
Applying patch app/test-crypto-perf/cperf_test_vectors.c with 1 reject...
Rejected hunk #1.
Hunk #2 applied cleanly.
Applying patch app/test-crypto-perf/main.c with 2 rejects...
Rejected hunk #1.
Rejected hunk #2.
diff a/app/test-crypto-perf/cperf_ops.c b/app/test-crypto-perf/cperf_ops.c	(rejected hunks)
@@ -872,44 +1001,40 @@ cperf_get_op_functions(const struct cperf_options *options,
 
 	op_fns->sess_create = cperf_create_session;
 
-	if (options->op_type == CPERF_ASYM_MODEX) {
-		op_fns->populate_ops = cperf_set_ops_asym;
-		return 0;
-	}
-
-	if (options->op_type == CPERF_AEAD) {
+	switch (options->op_type) {
+	case CPERF_AEAD:
 		op_fns->populate_ops = cperf_set_ops_aead;
-		return 0;
-	}
+		break;
 
-	if (options->op_type == CPERF_AUTH_THEN_CIPHER
-			|| options->op_type == CPERF_CIPHER_THEN_AUTH) {
+	case CPERF_AUTH_THEN_CIPHER:
+	case CPERF_CIPHER_THEN_AUTH:
 		op_fns->populate_ops = cperf_set_ops_cipher_auth;
-		return 0;
-	}
-	if (options->op_type == CPERF_AUTH_ONLY) {
+		break;
+	case CPERF_AUTH_ONLY:
 		if (options->auth_algo == RTE_CRYPTO_AUTH_NULL)
 			op_fns->populate_ops = cperf_set_ops_null_auth;
 		else
 			op_fns->populate_ops = cperf_set_ops_auth;
-		return 0;
-	}
-	if (options->op_type == CPERF_CIPHER_ONLY) {
+		break;
+	case CPERF_CIPHER_ONLY:
 		if (options->cipher_algo == RTE_CRYPTO_CIPHER_NULL)
 			op_fns->populate_ops = cperf_set_ops_null_cipher;
 		else
 			op_fns->populate_ops = cperf_set_ops_cipher;
-		return 0;
-	}
+		break;
+	case CPERF_ASYM_MODEX:
+		op_fns->populate_ops = cperf_set_ops_asym;
+		break;
 #ifdef RTE_LIB_SECURITY
-	if (options->op_type == CPERF_PDCP) {
+	case CPERF_PDCP:
+	case CPERF_IPSEC:
+	case CPERF_DOCSIS:
 		op_fns->populate_ops = cperf_set_ops_security;
-		return 0;
-	}
-	if (options->op_type == CPERF_DOCSIS) {
-		op_fns->populate_ops = cperf_set_ops_security;
-		return 0;
-	}
+		break;
 #endif
-	return -1;
+	default:
+		return -1;
+	}
+
+	return 0;
 }
diff a/app/test-crypto-perf/cperf_options.h b/app/test-crypto-perf/cperf_options.h	(rejected hunks)
@@ -80,6 +80,7 @@ enum cperf_op_type {
 	CPERF_AEAD,
 	CPERF_PDCP,
 	CPERF_DOCSIS,
+	CPERF_IPSEC,
 	CPERF_ASYM_MODEX
 };
 
diff a/app/test-crypto-perf/cperf_options_parsing.c b/app/test-crypto-perf/cperf_options_parsing.c	(rejected hunks)
@@ -458,6 +458,10 @@ parse_op_type(struct cperf_options *opts, const char *arg)
 			cperf_op_type_strs[CPERF_DOCSIS],
 			CPERF_DOCSIS
 		},
+		{
+			cperf_op_type_strs[CPERF_IPSEC],
+			CPERF_IPSEC
+		},
 		{
 			cperf_op_type_strs[CPERF_ASYM_MODEX],
 			CPERF_ASYM_MODEX
diff a/app/test-crypto-perf/cperf_test_throughput.c b/app/test-crypto-perf/cperf_test_throughput.c	(rejected hunks)
@@ -42,7 +42,8 @@ cperf_throughput_test_free(struct cperf_throughput_ctx *ctx)
 		}
 #ifdef RTE_LIB_SECURITY
 		else if (ctx->options->op_type == CPERF_PDCP ||
-			 ctx->options->op_type == CPERF_DOCSIS) {
+			 ctx->options->op_type == CPERF_DOCSIS ||
+			 ctx->options->op_type == CPERF_IPSEC) {
 			struct rte_security_ctx *sec_ctx =
 				(struct rte_security_ctx *)
 					rte_cryptodev_get_sec_ctx(ctx->dev_id);
diff a/app/test-crypto-perf/cperf_test_vectors.c b/app/test-crypto-perf/cperf_test_vectors.c	(rejected hunks)
@@ -448,7 +448,8 @@ cperf_test_vector_get_dummy(struct cperf_options *options)
 		t_vec->modex.elen = sizeof(perf_mod_e);
 	}
 
-	if (options->op_type ==	CPERF_PDCP) {
+	if (options->op_type ==	CPERF_PDCP ||
+			options->op_type == CPERF_IPSEC) {
 		if (options->cipher_algo == RTE_CRYPTO_CIPHER_NULL) {
 			t_vec->cipher_key.length = 0;
 			t_vec->ciphertext.data = plaintext;
diff a/app/test-crypto-perf/main.c b/app/test-crypto-perf/main.c	(rejected hunks)
@@ -41,6 +41,7 @@ const char *cperf_op_type_strs[] = {
 	[CPERF_AEAD] = "aead",
 	[CPERF_PDCP] = "pdcp",
 	[CPERF_DOCSIS] = "docsis",
+	[CPERF_IPSEC] = "ipsec",
 	[CPERF_ASYM_MODEX] = "modex"
 };
 
@@ -278,9 +279,9 @@ cperf_initialize_cryptodev(struct cperf_options *opts, uint8_t *enabled_cdevs)
 			/* Fall through */
 		case CPERF_PDCP:
 		case CPERF_DOCSIS:
+		case CPERF_IPSEC:
 			/* Fall through */
 		default:
-
 			conf.ff_disable |= RTE_CRYPTODEV_FF_ASYMMETRIC_CRYPTO;
 		}
 

https://lab.dpdk.org/results/dashboard/patchsets/18233/

UNH-IOL DPDK Community Lab

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2021-08-17 18:13 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-08-17 18:13 [dpdk-test-report] |WARNING| pw97014 [PATCH] test/crypto-perf: support lookaside IPsec dpdklab

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).