Acked-by: Hemant Agrawal
On 31-Jul-23 9:07 AM, Akhil Goyal wrote:
Caution: This is an external email. Please take care when clicking links or
opening attachments. When in doubt, report the message using the 'Report this
email' button
Removed the algorithm strings arrays ``rte_crypto_cipher_a
For non-EAL pthreads, rte_lcore_id() will not be valid.
So, batch allocation cannot be used as we won't have a
dedicated alloc buffer for the thread. So, fallback to
bulk alloc in such cases.
Fixes: 91531e63f43b ("mempool/cnxk: add cn10k batch dequeue")
Signed-off-by: Ashwin Sekhar T K
---
driv
Currently mempool_cnxk driver uses asynchronous allocation
for all pools. This asynchronous allocation can result in
local caching of additional 512 objects on a single core
even when cache is disabled. This will eventually lead to
starvation on pools where the number of objects is very less.
This
> -Original Message-
> From: Akhil Goyal
>
> dpdk-test-crypto-perf application returns failure for all the cases which are
> not supported by the device.
>
> This patch captures rte_errno to check if the case run is supported or not, if
> not supported, the application would now retur
I believe it is not disabled in some checks.
http://mails.dpdk.org/archives/test-report/2023-July/432810.html
This is reported for today’s patch.
From: Patrick Robb
Sent: Friday, July 28, 2023 10:32 PM
To: Thomas Monjalon
Cc: Bruce Richardson ; dev@dpdk.org
Subject: [EXT] Re: [PATCH v2] doc: ann
dpdk-test-crypto-perf application returns failure for all
the cases which are not supported by the device.
This patch captures rte_errno to check if the case run is
supported or not, if not supported, the application would
now return ENOTSUP which can be used in automation to
identify between fail
From: Ankur Dwivedi
Before running each MACsec test, the device capability is read. The
capability is then verified to check if the device supports a feature or
not. If the feature is not supported the test is skipped.
Signed-off-by: Ankur Dwivedi
---
app/test/test_security_inline_macsec.c | 3
From: Ankur Dwivedi
This patch adds the MACsec algorithm field in security capability index
structure. This field is compared against the MACsec alg to return the
correct capability.
Signed-off-by: Ankur Dwivedi
---
lib/security/rte_security.c | 4
lib/security/rte_security.h | 3 +++
2 f
From: Ankur Dwivedi
Adds the MACsec capability for CN10K-B.
The ethernet security capability structure is populated based on the
feature supported by the device.
Signed-off-by: Ankur Dwivedi
---
drivers/common/cnxk/roc_features.h | 6 ++
drivers/common/cnxk/roc_mcs.h | 3 +
drivers
Removed the algorithm strings arrays ``rte_crypto_cipher_algorithm_strings``,
``rte_crypto_auth_algorithm_strings``, ``rte_crypto_aead_algorithm_strings``
and ``rte_crypto_asym_xform_strings``.
Application can use the new APIs ``rte_cryptodev_get_cipher_algo_string``,
``rte_cryptodev_get_auth_algo_
From: Satheesh Paul
For MCAM rules with PF/VF action, the PF's default rule action is
is copied and overwritten over the user provided action. Fixing this
by setting default action only if no other action (like queue) is
specified by user.
Fixes: a07f7ced436def ("common/cnxk: add NPC init and fi
On Sat, 29 Jul 2023 19:12:05 -0700
Stephen Hemminger wrote:
> Deprecation and removal was announced in 22.11.
> Make it so.
>
> Leave kernel/linux with empty directory because
> CI is trying to directly build it. At some later date,
> kernel/linux can be removed.
>
> Signed-off-by: Stephen Hemm
Guys
I apologize if this has already been asked before, but has anyone ever succeed
in running DPDK on a Linux running within Parallels on a Mac with Apple Silicon?
We are a group of developers of a product which uses DPDK a lot, and on Linux
boxes running in Intels we actually manage to run it s
13 matches
Mail list logo