From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 5F4DF425E3 for ; Wed, 20 Sep 2023 04:59:46 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 5921E40277; Wed, 20 Sep 2023 04:59:46 +0200 (CEST) Received: from mail-vk1-f227.google.com (mail-vk1-f227.google.com [209.85.221.227]) by mails.dpdk.org (Postfix) with ESMTP id 23B2940277 for ; Wed, 20 Sep 2023 04:59:44 +0200 (CEST) Received: by mail-vk1-f227.google.com with SMTP id 71dfb90a1353d-48feedb90d2so2488382e0c.1 for ; Tue, 19 Sep 2023 19:59:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iol.unh.edu; s=unh-iol; t=1695178783; x=1695783583; darn=dpdk.org; h=cc:to:from:subject:message-id:date:from:to:cc:subject:date :message-id:reply-to; bh=8DQ+mURjq5YDMNrHI6lh6F55hgX1KiLxmS4hbqi726k=; b=WvvhoMLeKpegFV1T0DRQLP7M9Z4qaFJJ4bSwQjzD+CqpEkOXA22muSsmLF8NIddgT/ OlVWKXddOWQQ3D7avT6QHE/hC+F3p7Xxts1hM2YyvK1XeMRUUzq8aRRQQ6ohMdg6GnVu 2F0G2kTY7kNSfjJTDMvRKpfzbBpFbu4FKoGTM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1695178783; x=1695783583; h=cc:to:from:subject:message-id:date:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=8DQ+mURjq5YDMNrHI6lh6F55hgX1KiLxmS4hbqi726k=; b=nMA41Zj0twrCSTVdAoXuY+ZHl6/O2XvKANdHSv7kzVuEG0UW61DJXYjDPRtIuWR49D wfPClttSsVrTvg6s/U7JAmyPzsW+pFXgPCjV2tJq5F7uilkVgwW6icMKiSepsxdCS8Ii H4xY9qICtJrNGuGNXahcfmaeSSIUySUchatU9sHbkSrr66hs0lFl1yVF4vbIi/z58LoJ mC5Tf2btZ7ZWTZT+TaDQsqWSNlJl0dJUgJugoeICHPVFvMrA+vYiUVA7mtyR06DXishm dP+toZNZN5ZWfXHafzqmFc1BaIrH4XlF0+hZbiXwiODEQy0m47cMXHeOfYNzFCf9JkSe fdrQ== X-Gm-Message-State: AOJu0YyOHVj2SMKIlB7QjD8ce8wH1qXiE90VyrLCqDEGcrCQI0aiQ13Q BaIYHkf77aIrvEaggSfSUO2q38WPgA8FNrbxiC5JAxnqR+gZGARvXBylWg== X-Google-Smtp-Source: AGHT+IELLtHPwg6yKOuS+jZEX7q3rO7Pclz9XgjiaN380eYHF5LxL+c16RwvvQZlEoKg33p0e0qWAiemBnQR X-Received: by 2002:a1f:ea44:0:b0:495:be1c:5be9 with SMTP id i65-20020a1fea44000000b00495be1c5be9mr1488633vkh.1.1695178783397; Tue, 19 Sep 2023 19:59:43 -0700 (PDT) Received: from postal.iol.unh.edu (postal.iol.unh.edu. [132.177.123.84]) by smtp-relay.gmail.com with ESMTPS id n21-20020a9f3155000000b0078f560c83a2sm995930uab.0.2023.09.19.19.59.43 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 19 Sep 2023 19:59:43 -0700 (PDT) X-Relaying-Domain: iol.unh.edu Date: Tue, 19 Sep 2023 19:59:43 -0700 (PDT) Message-ID: <650a601f.9f0a0220.6bf1.7425SMTPIN_ADDED_MISSING@mx.google.com> Received: from [172.21.0.2] (unknown [172.18.0.240]) by postal.iol.unh.edu (Postfix) with ESMTP id CC45B6052514; Tue, 19 Sep 2023 22:59:42 -0400 (EDT) Subject: |WARNING| pw131656 [PATCH] [v5, 26/26] net/nfp: extend the usage of nfp BAR from 8 to 24 From: dpdklab@iol.unh.edu To: test-report@dpdk.org Cc: dpdk-test-reports@iol.unh.edu Content-Type: text/plain X-BeenThere: test-report@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: automatic DPDK test reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: test-report-bounces@dpdk.org Test-Label: iol-testing Test-Status: WARNING http://dpdk.org/patch/131656 _apply patch failure_ Submitter: Chaoyong He Date: Wednesday, September 20 2023 01:29:33 Applied on: CommitID:a4e700a878e7fa2651fd718e61f7228c3277e556 Apply patch set 131656 failed: Checking patch drivers/net/nfp/nfp_ethdev.c... error: while searching for: * use a lock file if UIO is being used. */ if (pci_dev->kdrv == RTE_PCI_KDRV_VFIO) cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, false); else cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, true); if (cpp == NULL) { PMD_INIT_LOG(ERR, "A CPP handle can not be obtained"); error: patch failed: drivers/net/nfp/nfp_ethdev.c:920 error: while searching for: * use a lock file if UIO is being used. */ if (pci_dev->kdrv == RTE_PCI_KDRV_VFIO) cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, false); else cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, true); if (cpp == NULL) { PMD_INIT_LOG(ERR, "A CPP handle can not be obtained"); error: patch failed: drivers/net/nfp/nfp_ethdev.c:1121 Checking patch drivers/net/nfp/nfpcore/nfp6000_pcie.c... error: drivers/net/nfp/nfpcore/nfp6000_pcie.c: does not exist in index Checking patch drivers/net/nfp/nfpcore/nfp6000_pcie.h... error: drivers/net/nfp/nfpcore/nfp6000_pcie.h: does not exist in index Checking patch drivers/net/nfp/nfpcore/nfp_cpp.h... error: while searching for: #define NFP_CPP_NUM_TARGETS 16 /* * NFP CPP operations structure */ error: patch failed: drivers/net/nfp/nfpcore/nfp_cpp.h:18 error: while searching for: size_t area_priv_size; /* Instance an NFP CPP */ int (*init)(struct nfp_cpp *cpp, struct rte_pci_device *dev); /* * Free the bus. error: patch failed: drivers/net/nfp/nfpcore/nfp_cpp.h:26 Checking patch drivers/net/nfp/nfpcore/nfp_cppcore.c... error: while searching for: * NOTE: cpp_lock is NOT locked for op->init, * since it may call NFP CPP API operations */ err = cpp->op->init(cpp, pci_dev); if (err < 0) { PMD_DRV_LOG(ERR, "NFP interface initialization failed"); free(cpp); error: patch failed: drivers/net/nfp/nfpcore/nfp_cppcore.c:947 Applying patch drivers/net/nfp/nfp_ethdev.c with 2 rejects... Rejected hunk #1. Rejected hunk #2. Applying patch drivers/net/nfp/nfpcore/nfp_cpp.h with 2 rejects... Rejected hunk #1. Rejected hunk #2. Applying patch drivers/net/nfp/nfpcore/nfp_cppcore.c with 1 reject... Rejected hunk #1. hint: Use 'git am --show-current-patch' to see the failed patch diff a/drivers/net/nfp/nfp_ethdev.c b/drivers/net/nfp/nfp_ethdev.c (rejected hunks) @@ -920,9 +920,9 @@ nfp_pf_init(struct rte_pci_device *pci_dev) * use a lock file if UIO is being used. */ if (pci_dev->kdrv == RTE_PCI_KDRV_VFIO) - cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, false); + cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, dev_info, false); else - cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, true); + cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, dev_info, true); if (cpp == NULL) { PMD_INIT_LOG(ERR, "A CPP handle can not be obtained"); @@ -1121,9 +1121,9 @@ nfp_pf_secondary_init(struct rte_pci_device *pci_dev) * use a lock file if UIO is being used. */ if (pci_dev->kdrv == RTE_PCI_KDRV_VFIO) - cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, false); + cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, dev_info, false); else - cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, true); + cpp = nfp_cpp_from_nfp6000_pcie(pci_dev, dev_info, true); if (cpp == NULL) { PMD_INIT_LOG(ERR, "A CPP handle can not be obtained"); diff a/drivers/net/nfp/nfpcore/nfp_cpp.h b/drivers/net/nfp/nfpcore/nfp_cpp.h (rejected hunks) @@ -18,6 +18,8 @@ struct nfp_cpp_area; #define NFP_CPP_NUM_TARGETS 16 +#define PCI_64BIT_BAR_COUNT 3 + /* * NFP CPP operations structure */ @@ -26,8 +28,7 @@ struct nfp_cpp_operations { size_t area_priv_size; /* Instance an NFP CPP */ - int (*init)(struct nfp_cpp *cpp, - struct rte_pci_device *dev); + int (*init)(struct nfp_cpp *cpp); /* * Free the bus. diff a/drivers/net/nfp/nfpcore/nfp_cppcore.c b/drivers/net/nfp/nfpcore/nfp_cppcore.c (rejected hunks) @@ -947,7 +947,7 @@ nfp_cpp_alloc(struct rte_pci_device *pci_dev, * NOTE: cpp_lock is NOT locked for op->init, * since it may call NFP CPP API operations */ - err = cpp->op->init(cpp, pci_dev); + err = cpp->op->init(cpp); if (err < 0) { PMD_DRV_LOG(ERR, "NFP interface initialization failed"); free(cpp); https://lab.dpdk.org/results/dashboard/patchsets/27657/ UNH-IOL DPDK Community Lab