exist in the same pipeline, and
the default mempool configuration is used (one MEMPOOL0 is shared between
all source ports), the invalid mempool pointer (NULL) will be assigned to
source ports other than first source port.
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
examples
Coverity issue: 120143
Fixes: 7f64b9c004aa ("examples/ip_pipeline: rework config file syntax")
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
examples/ip_pipeline/config_parse.c | 4
1 file changed, 4 insertions(+)
diff --git a/examples/ip_pipeline/config_parse.c
Coverity issue: 107102
Fixes: 7f64b9c004aa ("examples/ip_pipeline: rework config file syntax")
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
examples/ip_pipeline/config_parse_tm.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/examples/i
Coverity issue: 107109
Fixes: 7122d30131ad ("examples/ip_pipeline: rework flow classification
pipeline")
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
examples/ip_pipeline/pipeline/pipeline_flow_classification.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Coverity issue: 107127
Fixes: 7f64b9c004aa ("examples/ip_pipeline: rework config file syntax")
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
examples/ip_pipeline/config_parse_tm.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/examples/i
Coverity issue: 107136
Fixes: 7f64b9c004aa ("examples/ip_pipeline: rework config file syntax")
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
examples/ip_pipeline/config_parse.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/examples/i
Coverity issue: 107133
Fixes: eb32fe7c5574 ("examples/ip_pipeline: rework initialization parameters")
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
*v2
fixed bug: fix possible buff not null terminated bug
examples/ip_pipeline/init.c | 3 ++-
1 file changed, 2 insert
Coverity issue: 107133
Fixes: eb32fe7c5574 ("examples/ip_pipeline: rework initialization parameters")
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
*v2
fixed bug: fix possible buff not null terminated bug
examples/ip_pipeline/init.c | 2 +-
1 file changed, 1 inser
ot;
(http://dpdk.org/ml/archives/dev/2016-May/038364.html)
v2:
*added AES counter mode support to l2fwd-crypto sample application
Fan Zhang (3):
aesni_mb: add counter mode support
app/test: add aes-ni multi-buffer pmd test cases for AES CTR
examples/l2fwd-crypto: enable AES counter mode ci
This patch provides counter mode support to AES-NI multi-buffer library.
The following cipher algorithm is enabled:
- RTE_CRYPTO_CIPHER_AES_CTR
Signed-off-by: Fan Zhang
---
doc/guides/cryptodevs/aesni_mb.rst | 3 +++
doc/guides/cryptodevs/overview.rst | 6 +++---
doc
Added tests cases for AES-NI MB PMD working in counter mode.
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev.c | 13 +
1 file changed, 13 insertions(+)
diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index 03d6f02..45e6daa 100644
--- a/app/test
This patch enables AES counter mode algorithm support to l2fwd-crypto
sample application.
Signed-off-by: Fan Zhang
---
examples/l2fwd-crypto/main.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/examples/l2fwd-crypto/main.c b/examples/l2fwd-crypto/main.c
index d18c813..66fc874 100644
r AES-NI MB PMD"
(http://dpdk.org/ml/archives/dev/2016-June/040222.html)
v2
*fix session not freed after the test finished problem
*remove l2fwd-crypto sample application patch
Fan Zhang (4):
app/test: categorize crypto AES test vectors into new file
app/test: add unified crypto aes test
a
This patch accumulates crypto AES test vectors into a new header file.
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev_aes.h | 822 ++
1 file changed, 822 insertions(+)
create mode 100755 app/test/test_cryptodev_aes.h
diff --git a/app/test
This patch adds a new crypto AES unified test function.
Signed-off-by: Fan Zhang
---
app/test/Makefile | 1 +
app/test/test_cryptodev_aes.c | 663 ++
app/test/test_cryptodev_aes.h | 6 +
3 files changed, 670 insertions(+)
create mode
This patch adds the HMAC-SHA224 and HMAC-SHA384 digest generation and
verification tests to crypto
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev_aes.c | 26
app/test/test_cryptodev_aes.h | 296 ++
2 files changed, 322 insertions(+)
diff
This patch replaces the AES test code with new unified crypto AES test
function.
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev.c | 1613 ++--
app/test/test_cryptodev_aes_ctr_test_vectors.h | 257
2 files changed, 122 insertions(+), 1748
r AES-NI MB PMD"
(http://dpdk.org/ml/archives/dev/2016-June/040222.html)
v2
*fix session not freed after the test finished problem
*remove l2fwd-crypto sample application patch
v3
*fix clang compile error
Fan Zhang (4):
app/test: categorize crypto AES test vectors into new file
app/test: ad
This patch accumulates crypto AES test vectors into a new header file.
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev_aes.h | 822 ++
1 file changed, 822 insertions(+)
create mode 100755 app/test/test_cryptodev_aes.h
diff --git a/app/test
This patch adds a new crypto AES unified test function.
Signed-off-by: Fan Zhang
---
app/test/Makefile | 1 +
app/test/test_cryptodev_aes.c | 663 ++
app/test/test_cryptodev_aes.h | 6 +
3 files changed, 670 insertions(+)
create mode
This patch adds the HMAC-SHA224 and HMAC-SHA384 digest generation and
verification tests to crypto
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev_aes.c | 26
app/test/test_cryptodev_aes.h | 296 ++
2 files changed, 322 insertions(+)
diff
This patch replaces the AES test code with new unified crypto AES test
function.
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev.c | 1613 ++--
app/test/test_cryptodev_aes.c |6 +-
app/test/test_cryptodev_aes_ctr_test_vectors.h
r AES-NI MB PMD"
(http://dpdk.org/ml/archives/dev/2016-June/040222.html)
v2
*fix session not freed after the test finished problem
*remove l2fwd-crypto sample application patch
v3
*fix clang compile error
v4
*fix the misplaced commit in the v3 patchset
Fan Zhang (4):
app/test: categorize cry
This patch accumulates crypto AES test vectors into a new header file.
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev_aes.h | 822 ++
1 file changed, 822 insertions(+)
create mode 100755 app/test/test_cryptodev_aes.h
diff --git a/app/test
This patch adds a new crypto AES unified test function.
Signed-off-by: Fan Zhang
---
app/test/Makefile | 1 +
app/test/test_cryptodev_aes.c | 663 ++
app/test/test_cryptodev_aes.h | 6 +
3 files changed, 670 insertions(+)
create mode
This patch replaces the AES test code with new unified crypto AES test
function.
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev.c | 1613 ++--
app/test/test_cryptodev_aes_ctr_test_vectors.h | 257
2 files changed, 122 insertions(+), 1748
This patch adds the HMAC-SHA224 and HMAC-SHA384 digest generation and
verification tests to crypto
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev_aes.c | 26
app/test/test_cryptodev_aes.h | 296 ++
2 files changed, 322 insertions(+)
diff
r AES-NI MB PMD"
(http://dpdk.org/ml/archives/dev/2016-June/040222.html)
v2
*fix session not freed after the test finished problem
*remove l2fwd-crypto sample application patch
v3
*fix clang compile error
v4
*fix the misplaced commit in the v3 patchset
v5
*squash several patches into one patch
This patch adds the HMAC-SHA224 and HMAC-SHA384 digest generation and
verification tests to crypto
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev_aes.c | 26
app/test/test_cryptodev_aes.h | 296 ++
2 files changed, 322 insertions(+)
diff
This patch reworks the crypto AES unit test by introducing a new unified
test function
Signed-off-by: Fan Zhang
---
app/test/Makefile |1 +
app/test/test_cryptodev.c | 1613 ++--
app/test/test_cryptodev_aes.c
patches into one patch
v6
*remove unused macro
Fan Zhang (2):
app/test: rework the crypto AES unit test
app/test: add crypto AES-CBC-128 HMAC-SHA224 and HMAC-SHA384 unit
tests
app/test/Makefile |1 +
app/test/test_cryptodev.c | 1613
This patch adds the HMAC-SHA224 and HMAC-SHA384 digest generation and
verification tests to crypto
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev_aes.c | 26
app/test/test_cryptodev_aes.h | 296 ++
2 files changed, 322 insertions(+)
diff
This patch reworks the crypto AES unit test by introducing a new unified
test function
Signed-off-by: Fan Zhang
---
app/test/Makefile |1 +
app/test/test_cryptodev.c | 1613 ++--
app/test/test_cryptodev_aes.c
functions such as Traffic Metering/marking and policer functions have
been implemented as flow-table action handler.
Signed-off-by: Maciej Gajdzica
Signed-off-by: Jasvinder Singh
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
*v2
Add CLI command check for pipeline type and update
functions such as Traffic Metering/marking and policer functions have
been implemented as flow-table action handler.
Signed-off-by: Jasvinder Singh
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
*v2
Add CLI command check for pipeline type and update such check to all
existing
functions such as Traffic Metering/marking and policer functions have
been implemented as flow-table action handler.
Signed-off-by: Jasvinder Singh
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
This patch depends on patch "ip_pipeline: add pipeline type validation"
http:
This patch fix the following Coverity issue:
Coverity issue: 120147
Fixes: 7122d30131ad ("examples/ip_pipeline: rework flow classification
pipeline")
Signed-off-by: Fan Zhang
---
.../pipeline/pipeline_flow_classification_be.c | 31 +-
1 file changed, 19
/dropped.
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
lib/librte_port/rte_port_source_sink.c | 68 +-
1 file changed, 66 insertions(+), 2 deletions(-)
diff --git a/lib/librte_port/rte_port_source_sink.c
b/lib/librte_port/rte_port_source_sink.c
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
lib/librte_port/rte_port_source_sink.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/lib/librte_port/rte_port_source_sink.c
b/lib/librte_port/rte_port_source_sink.c
index 234ab18..5e10144 100644
--- a/lib/l
Fixes the sink port statistics incomplete problem. The problem was
introduced by commit "Packet Framework librte_port: Source/Sink ports"
(commit id ef3403fb6f9a3c4b730d2e4fbe7ddc0291ffa992)
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
lib/librte_port/rte_port_source_s
This patchset adds CPU utilization rate computation and CLI command
support to packet framework. The thread idle rate is updated once per
second. User can use thread CLI command to display it.
Fan Zhang (2):
examples/ip_pipeline: CPU utilization measurement and rate computation
examples
.
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
examples/ip_pipeline/app.h| 7
examples/ip_pipeline/init.c | 5 +++
examples/ip_pipeline/thread.c | 81 +--
examples/ip_pipeline/thread.h | 13 +++
4 files changed, 104 insertions(+), 2
-by: Cristian Dumitrescu
Fan Zhang (4):
lib/librte_port: add PCAP file support to source port
example/ip_pipeline: add PCAP file support
lib/librte_port: add packet dumping to PCAP file support in sink port
examples/ip_pipeline: add packets dumping to PCAP file support
config/common_bsdapp
.
To enable PCAP support to IP pipeline, the compiler option
CONFIG_RTE_PORT_PCAP must be set to 'y'. It is possible to disable PCAP
support by removing "pcap_file_rd" and "pcap_bytes_rd_per_pkt" lines
from the configuration file.
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
it
continuously dump the packets to the file, or stops at certain dumping
This feature shares same CONFIG_RTE_PORT_PCAP compiler option as source
port PCAP file support feature. Users can enable or disable this feature
by setting CONFIG_RTE_PORT_PCAP compiler option "y" or "n".
Signed-off-
ossible to disable this
feature by removing "pcap_file_wr" and "pcap_n_pkt_wr" lines from the
configuration file.
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
examples/ip_pipeline/app.h | 2 +
examples/ip_pipeline/config_parse.c | 159
This patch updates the pipelne configuration file parser, cleans up nesting
if/else conditions, and add clearer error message display.
Signed-off-by: Fan Zhang
---
examples/ip_pipeline/config_parse.c | 798
examples/ip_pipeline/pipeline_be.h | 48 +++
2
This patch adds link identification feature to packet framework. To
identify a link, user can use both existing port-mask option, or specify
PCI device in each LINK section in the configuration file.
Signed-off-by: Fan Zhang
---
examples/ip_pipeline/app.h | 1 +
examples/ip_pipeline
This patchset adds the configuration file supported to ipsec_secgw
sample application. Two sample configuration files, ep0.cfg and ep1.cfg
are also added to show how to configure two systems back-to-back that
would forward traffic through an IPsec tunnel
Fan Zhang (2):
examples/ipsec_secgw
pplication.
Configuration item formats:
SP rule format:
sp esp \
SA rule format:
sa
Routing rule format:
rt
Signed-off-by: Fan Zhang
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 806 ---
examples/ipsec-secgw/Makefile| 1 +
examples/i
This patch adds two sample configuration files to ipsec-secgw sample
application. The sample configuration files shows how to set-up systems
back-to-back that would forward traffic through an IPsec tunnel.
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/ep0.cfg | 119
parsing error.
- update doc to remove whitespace tailing errors.
Fan Zhang (2):
examples/ipsec-secgw: add configuration file support
examples/ipsec-secgw: add sample configuration files
doc/guides/sample_app_ug/ipsec_secgw.rst | 809 ---
examples/ipsec-secgw/Makefile
pplication.
Configuration item formats:
SP rule format:
sp esp \
SA rule format:
sa
Routing rule format:
rt
Signed-off-by: Fan Zhang
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 809 ---
examples/ipsec-secgw/Makefile| 1 +
examples/i
This patch adds two sample configuration files to ipsec-secgw sample
application. The sample configuration files shows how to set-up systems
back-to-back that would forward traffic through an IPsec tunnel.
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/ep0.cfg | 119
v2 changes:
- fix configuration file parsing error.
- update doc to remove whitespace tailing errors.
Fan Zhang (2):
examples/ipsec-secgw: add configuration file support
examples/ipsec-secgw: add sample configuration files
doc/guides/sample_app_ug/ipsec_secgw.rst | 809
pplication.
Configuration item formats:
SP rule format:
sp esp \
SA rule format:
sa
Routing rule format:
rt
Signed-off-by: Fan Zhang
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 809 ---
examples/ipsec-secgw/Makefile| 1 +
examples/i
This patch adds two sample configuration files to ipsec-secgw sample
application. The sample configuration files shows how to set-up systems
back-to-back that would forward traffic through an IPsec tunnel.
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/ep0.cfg | 119
le parsing error.
- update doc to remove whitespace tailing errors.
Fan Zhang (2):
examples/ipsec-secgw: add configuration file support
examples/ipsec-secgw: add sample configuration files
doc/guides/sample_app_ug/ipsec_secgw.rst | 845 +--
examples/ipsec-secg
pplication.
Configuration item formats:
SP rule format:
sp esp \
SA rule format:
sa \
Routing rule format:
rt
Signed-off-by: Fan Zhang
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 845 +--
examples/ipsec-secgw/Makefile| 1 +
exam
This patch adds two sample configuration files to ipsec-secgw sample
application. The sample configuration files shows how to set-up systems
back-to-back that would forward traffic through an IPsec tunnel.
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/ep0.cfg | 160
t;
(http://dpdk.org/dev/patchwork/patch/12400/)
Fan Zhang (5):
app/test: categorize crypto AES test vectors into new file
app/test: add unified crypto aes test
app/test: utilize new unified crypto AES test function
app/test: add crypto AES-CBC-128 HMAC-SHA224 and HMAC-SHA384 unit
tests
e
This patch accumulates crypto AES test vectors into a new header file.
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev_aes.h | 822 ++
1 file changed, 822 insertions(+)
create mode 100755 app/test/test_cryptodev_aes.h
diff --git a/app/test
This patch adds a new crypto AES unified test function.
Signed-off-by: Fan Zhang
---
app/test/Makefile | 1 +
app/test/test_cryptodev_aes.c | 662 ++
app/test/test_cryptodev_aes.h | 6 +
3 files changed, 669 insertions(+)
create mode
This patch replaces the AES test code with new unified crypto AES test
function.
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev.c | 1613 ++--
app/test/test_cryptodev_aes_ctr_test_vectors.h | 257
2 files changed, 122 insertions(+), 1748
This patch enables AES counter mode algorithm support to l2fwd-crypto
sample application.
Signed-off-by: Fan Zhang
---
examples/l2fwd-crypto/main.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/examples/l2fwd-crypto/main.c b/examples/l2fwd-crypto/main.c
index d18c813..66fc874 100644
This patch adds the HMAC-SHA224 and HMAC-SHA384 digest generation and
verification tests to crypto
Signed-off-by: Fan Zhang
---
app/test/test_cryptodev_aes.c | 26
app/test/test_cryptodev_aes.h | 296 ++
2 files changed, 322 insertions(+)
diff
Fixes: 0d547ed03717 ("examples/ipsec-secgw: support configuration file")
Coverity issue: 137854
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/parser.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/examples/ipsec-secgw/parser.c b/examples/ipsec-secgw/pars
Fixes: 0d547ed03717 ("examples/ipsec-secgw: support configuration file")
Coverity issue: 137855
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/parser.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/examples/ipsec-secgw/parser.c b/examples/ipsec-secgw/pars
Coverity issue: 137875
Fixes: 0d547ed0 ("examples/ipsec-secgw: support configuration
file")
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/sa.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c
index 9e2c8a
Fixes: 0d547ed03717 ("examples/ipsec-secgw: support configuration file")
Coverity issue: 137871
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/parser.c | 124 +-
1 file changed, 62 insertions(+), 62 deletions(-)
diff --git a/examples/i
Fixes: 0d547ed0 ("examples/ipsec-secgw: support configuration
file")
Coverity issue: 137875
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/sa.c | 11 +++
1 file changed, 7 insertions(+), 4 deletions(-)
diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c
ind
Coverity issue: 137871
Fixes: 0d547ed03717 ("examples/ipsec-secgw: support configuration file")
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/parser.c | 120 --
1 file changed, 58 insertions(+), 62 deletions(-)
diff --git a/examples/i
Coverity issue: 137871
Fixes: 0d547ed03717 ("examples/ipsec-secgw: support configuration file")
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/parser.c | 116 +++---
1 file changed, 52 insertions(+), 64 deletions(-)
diff --git a/examples/i
This patch adds link identification feature to packet framework. To
identify a link, user can use both existing port-mask option, or specify
PCI device in every LINK section in the configuration file.
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
*v2
To be applied on top of:
[dpdk
:
*added RTE_NEXT_ABI macro to source port
*updated to fit ip_pipeline configuration new code style
v2:
*fixed source/sink open function returns
*removed duplicated code
*added clearer error message display on different error messages
Acked-by: Cristian Dumitrescu
Fan Zhang (4):
lib/librte_port: add
it
continuously dump the packets to the file, or stops at certain dumping
This feature shares same CONFIG_RTE_PORT_PCAP compiler option as source
port PCAP file support feature. Users can enable or disable this feature
by setting CONFIG_RTE_PORT_PCAP compiler option "y" or "n".
Signed-off-
.
To enable PCAP support to IP pipeline, the compiler option
CONFIG_RTE_PORT_PCAP must be set to 'y'. It is possible to disable PCAP
support by removing "pcap_file_rd" and "pcap_bytes_rd_per_pkt" lines
from the configuration file.
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
from a PCAP file. To increase the performance, the packets
in the file are loaded to memory initially, and copied to mbufs in circular
manner. Users can enable or disable this feature by setting
CONFIG_RTE_PORT_PCAP compiler option "y" or "n".
Signed-off-by: Fan Zhang
Acked-by:
ossible to disable this
feature by removing "pcap_file_wr" and "pcap_n_pkt_wr" lines from the
configuration file.
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
examples/ip_pipeline/app.h | 2 +
examples/ip_pipeline/config_parse.c | 172
-by: Cristian Dumitrescu
Fan Zhang (4):
lib/librte_port: add PCAP file support to source port
example/ip_pipeline: add PCAP file support
lib/librte_port: add packet dumping to PCAP file support in sink port
examples/ip_pipeline: add packets dumping to PCAP file support
config/common_base
from a PCAP file. To increase the performance, the packets
in the file are loaded to memory initially, and copied to mbufs in circular
manner. Users can enable or disable this feature by setting
CONFIG_RTE_PORT_PCAP compiler option "y" or "n".
Signed-off-by: Fan Zhang
Acked-by:
.
To enable PCAP support to IP pipeline, the compiler option
CONFIG_RTE_PORT_PCAP must be set to 'y'. It is possible to disable PCAP
support by removing "pcap_file_rd" and "pcap_bytes_rd_per_pkt" lines
from the configuration file.
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
it
continuously dump the packets to the file, or stops at certain dumping
This feature shares same CONFIG_RTE_PORT_PCAP compiler option as source
port PCAP file support feature. Users can enable or disable this feature
by setting CONFIG_RTE_PORT_PCAP compiler option "y" or "n".
Signed-off-
ossible to disable this
feature by removing "pcap_file_wr" and "pcap_n_pkt_wr" lines from the
configuration file.
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
examples/ip_pipeline/app.h | 2 +
examples/ip_pipeline/config_parse.c | 172
This patch fixes the incorrect IP header in ACL table test.
Signed-off-by: Fan Zhang
---
app/test/test_table_acl.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/app/test/test_table_acl.c b/app/test/test_table_acl.c
index 38e3a8e..2fc5f24 100644
--- a/app/test
Fixes: 377cd98e ("example/ip_pipeline: add link identification")
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
examples/ip_pipeline/config_parse.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/examples/ip_pipeline/config_parse.c
b/examples/ip_pipeline/conf
Fixes: eb5f411 ("port: add pcap file dump")
This patch fixes pcap supporting logic. The fix includes:
* Adding logic to detect illegal parameter.
* Clearer error message display.
* Remove unnecessary RTE_NEXT_ABI macro warping.
* Code clean-up
Signed-off-by: Fan Zhang
Acked-by
Fixes: fe5d046 ("examples/ip_pipeline: add pcap file dump")
This patch fixes the pcap file parsing in ip_pipeline. Originally, the
parser recognizes the pcap related entries regardless of the RTE_PORT_PCAP
macro definition status.
Signed-off-by: Fan Zhang
Acked-by: Cristian
This patchset fixes d4b4213 and eb5f411, plus code clean-up of port library.
Acked-by: Cristian Dumitrescu
Fan Zhang (3):
port: fix source port parameter check
port: fix sink port parameter check
port: code clean-up
lib/librte_port/Makefile | 5 -
lib/librte_port
Fixes: eb5f411 ("port: add pcap file dump")
This patch fixes sink port parameter checking logic. Originally, if user
set field "file_name" with meaning value but leave PCAP support feature
disabled, the program simply ignores this field without notifying the
user.
Signed-off-
This patch clean-up the code in librte_port. The clean-up includes the
following:
* Clearer error message display.
* Remove unnecessary RTE_NEXT_ABI macro warping.
* Remove __rte_unused attribute
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
lib/librte_port/Makefile
This patch fills the missing field of ipv4_5tuple structure in acl table
test.
Signed-off-by: Fan Zhang
Acked-by: Cristian Dumitrescu
---
app/test/test_table_acl.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/app/test/test_table_acl.c b/app/test/test_table_acl.c
index
or the new options
v3 change:
- fix 32-bit compilation error
v2 changes:
- fix configuration file parsing error.
- update doc to remove whitespace tailing errors.
Fan Zhang (2):
examples/ipsec-secgw: add configuration file support
examples/ipsec-secgw: add sample configuration files
This patch adds two sample configuration files to ipsec-secgw sample
application. The sample configuration files shows how to set-up systems
back-to-back that would forward traffic through an IPsec tunnel.
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/ep0.cfg | 160
pplication.
Configuration item formats:
SP rule format:
sp esp \
SA rule format:
sa \
Routing rule format:
rt
Signed-off-by: Fan Zhang
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 845 +--
examples/ipsec-secgw/Makefile| 1 +
exam
ions to SA rules
- updated documentation for the new options
v3 change:
- fix 32-bit compilation error
v2 changes:
- fix configuration file parsing error.
- update doc to remove whitespace tailing errors.
Fan Zhang (2):
examples/ipsec-secgw: add configuration file support
examples/ipsec-secgw:
pplication.
Configuration item formats:
SP rule format:
sp esp \
SA rule format:
sa \
Routing rule format:
rt
Signed-off-by: Fan Zhang
---
doc/guides/sample_app_ug/ipsec_secgw.rst | 845 +--
examples/ipsec-secgw/Makefile| 1 +
exam
This patch adds two sample configuration files to ipsec-secgw sample
application. The sample configuration files shows how to set-up systems
back-to-back that would forward traffic through an IPsec tunnel.
Signed-off-by: Fan Zhang
---
examples/ipsec-secgw/ep0.cfg | 160
:
*fixed source/sink open function returns
*removed duplicated code
*added clearer error message display on different error messages
Acked-by: Cristian Dumitrescu
Fan Zhang (4):
lib/librte_port: add PCAP file support to source port
example/ip_pipeline: add PCAP file support
lib/librte_port: add
from a PCAP file. To increase the performance, the packets
in the file are loaded to memory initially, and copied to mbufs in circular
manner. Users can enable or disable this feature by setting
CONFIG_RTE_PORT_PCAP compiler option "y" or "n".
Signed-off-by: Fan Zhang
Acked-by:
1 - 100 of 120 matches
Mail list logo