From patchwork Fri Feb 2 14:04:16 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sivaramakrishnan Venkat X-Patchwork-Id: 136331 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id F0E8F43A50; Fri, 2 Feb 2024 15:04:25 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 7D289402BF; Fri, 2 Feb 2024 15:04:25 +0100 (CET) Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.20]) by mails.dpdk.org (Postfix) with ESMTP id 7A82540265 for ; Fri, 2 Feb 2024 15:04:23 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1706882662; x=1738418662; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=BwLdHl40hs3L9/tt21EVI81bT8khco7bHDOd/58a2Qc=; b=LiSgx+1vtHBZzsUpJqXHd+f4JvkGoEOf0I+6CehKAuqfkQQaCv20mwzk UNs05fSAL5N17Fe87JM3kENoAp8LGefEWK488a/p2FSMeRrgN4ejQcCjc TytbGds5qN0l/zWUm1oCi+ZleX/GS1hh3p95opoBstAS8ldGSGJIjlupz VdQoBHy7Xuw76vDg/DGJ/REDfORyEBrpIrNWeMUBYqlmOPxP6dVIt6cLA KfE/Hh4pX5s6DIt6sQeuWWd4exgBML1T9e1fVnaY1mfySn40Mm2RYkY0q jWPUIhOYSn9vRWunvS3ARhW8xQ/WDYnq/0WptVXBs0iD/DxWoGA8K4sXy g==; X-IronPort-AV: E=McAfee;i="6600,9927,10971"; a="80916" X-IronPort-AV: E=Sophos;i="6.05,238,1701158400"; d="scan'208";a="80916" Received: from fmviesa008.fm.intel.com ([10.60.135.148]) by orvoesa112.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Feb 2024 06:04:21 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.05,238,1701158400"; d="scan'208";a="282377" Received: from silpixa00400902.ir.intel.com ([10.243.23.146]) by fmviesa008.fm.intel.com with ESMTP; 02 Feb 2024 06:04:19 -0800 From: Sivaramakrishnan Venkat To: Kai Ji , Pablo de Lara Cc: dev@dpdk.org, bruce.richardson@intel.com, ciara.power@intel.com, Sivaramakrishnan Venkat Subject: [PATCH v3 1/2] crypto/ipsec_mb: bump minimum IPsec Multi-buffer version Date: Fri, 2 Feb 2024 14:04:16 +0000 Message-Id: <20240202140417.2399200-1-venkatx.sivaramakrishnan@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20240119114026.1552305-1-venkatx.sivaramakrishnan@intel.com> References: <20240119114026.1552305-1-venkatx.sivaramakrishnan@intel.com> MIME-Version: 1.0 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org SW PMDs increment IPsec Multi-buffer version to 1.4. A minimum IPsec Multi-buffer version of 1.4 or greater is now required. Signed-off-by: Sivaramakrishnan Venkat Acked-by: Ciara Power Acked-by: Pablo de Lara --- v2: - Removed unused macro in ipsec_mb_ops.c - set_gcm_job() modified correctly to keep multi_sgl_job line - Updated SW PMDs documentation for minimum IPSec Multi-buffer version - Updated commit message, and patch title. --- doc/guides/cryptodevs/aesni_gcm.rst | 3 +- doc/guides/cryptodevs/aesni_mb.rst | 3 +- doc/guides/cryptodevs/chacha20_poly1305.rst | 3 +- doc/guides/cryptodevs/kasumi.rst | 3 +- doc/guides/cryptodevs/snow3g.rst | 3 +- doc/guides/cryptodevs/zuc.rst | 3 +- drivers/crypto/ipsec_mb/ipsec_mb_ops.c | 23 --- drivers/crypto/ipsec_mb/meson.build | 2 +- drivers/crypto/ipsec_mb/pmd_aesni_mb.c | 165 -------------------- drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h | 9 -- 10 files changed, 13 insertions(+), 204 deletions(-) diff --git a/doc/guides/cryptodevs/aesni_gcm.rst b/doc/guides/cryptodevs/aesni_gcm.rst index f5773426ee..dc665e536c 100644 --- a/doc/guides/cryptodevs/aesni_gcm.rst +++ b/doc/guides/cryptodevs/aesni_gcm.rst @@ -85,7 +85,8 @@ and the external crypto libraries supported by them: 18.05 - 19.02 Multi-buffer library 0.49 - 0.52 19.05 - 20.08 Multi-buffer library 0.52 - 0.55 20.11 - 21.08 Multi-buffer library 0.53 - 1.3* - 21.11+ Multi-buffer library 1.0 - 1.5* + 21.11 - 23.11 Multi-buffer library 1.0 - 1.5* + 24.03+ Multi-buffer library 1.4 - 1.5* ============= ================================ \* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. diff --git a/doc/guides/cryptodevs/aesni_mb.rst b/doc/guides/cryptodevs/aesni_mb.rst index b2e74ba417..5d670ee237 100644 --- a/doc/guides/cryptodevs/aesni_mb.rst +++ b/doc/guides/cryptodevs/aesni_mb.rst @@ -146,7 +146,8 @@ and the Multi-Buffer library version supported by them: 19.05 - 19.08 0.52 19.11 - 20.08 0.52 - 0.55 20.11 - 21.08 0.53 - 1.3* - 21.11+ 1.0 - 1.5* + 21.11 - 23.11 1.0 - 1.5* + 24.03+ 1.4 - 1.5* ============== ============================ \* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. diff --git a/doc/guides/cryptodevs/chacha20_poly1305.rst b/doc/guides/cryptodevs/chacha20_poly1305.rst index 9d4bf86cf1..c32866b301 100644 --- a/doc/guides/cryptodevs/chacha20_poly1305.rst +++ b/doc/guides/cryptodevs/chacha20_poly1305.rst @@ -72,7 +72,8 @@ and the external crypto libraries supported by them: ============= ================================ DPDK version Crypto library version ============= ================================ - 21.11+ Multi-buffer library 1.0-1.5* + 21.11 - 23.11 Multi-buffer library 1.0-1.5* + 24.03+ Multi-buffer library 1.4-1.5* ============= ================================ \* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. diff --git a/doc/guides/cryptodevs/kasumi.rst b/doc/guides/cryptodevs/kasumi.rst index 0989054875..a8f4e6b204 100644 --- a/doc/guides/cryptodevs/kasumi.rst +++ b/doc/guides/cryptodevs/kasumi.rst @@ -87,7 +87,8 @@ and the external crypto libraries supported by them: ============= ================================ 16.11 - 19.11 LibSSO KASUMI 20.02 - 21.08 Multi-buffer library 0.53 - 1.3* - 21.11+ Multi-buffer library 1.0 - 1.5* + 21.11 - 23.11 Multi-buffer library 1.0 - 1.5* + 24.03+ Multi-buffer library 1.4 - 1.5* ============= ================================ \* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. diff --git a/doc/guides/cryptodevs/snow3g.rst b/doc/guides/cryptodevs/snow3g.rst index 3392932653..46863462e5 100644 --- a/doc/guides/cryptodevs/snow3g.rst +++ b/doc/guides/cryptodevs/snow3g.rst @@ -96,7 +96,8 @@ and the external crypto libraries supported by them: ============= ================================ 16.04 - 19.11 LibSSO SNOW3G 20.02 - 21.08 Multi-buffer library 0.53 - 1.3* - 21.11+ Multi-buffer library 1.0 - 1.5* + 21.11 - 23.11 Multi-buffer library 1.0 - 1.5* + 24.03+ Multi-buffer library 1.4 - 1.5* ============= ================================ \* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. diff --git a/doc/guides/cryptodevs/zuc.rst b/doc/guides/cryptodevs/zuc.rst index a414b5ad2c..51867e1a16 100644 --- a/doc/guides/cryptodevs/zuc.rst +++ b/doc/guides/cryptodevs/zuc.rst @@ -95,7 +95,8 @@ and the external crypto libraries supported by them: ============= ================================ 16.11 - 19.11 LibSSO ZUC 20.02 - 21.08 Multi-buffer library 0.53 - 1.3* - 21.11+ Multi-buffer library 1.0 - 1.5* + 21.11 - 23.11 Multi-buffer library 1.0 - 1.5* + 24.03+ Multi-buffer library 1.4 - 1.5* ============= ================================ \* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. diff --git a/drivers/crypto/ipsec_mb/ipsec_mb_ops.c b/drivers/crypto/ipsec_mb/ipsec_mb_ops.c index 30f919cd40..0223eb07c0 100644 --- a/drivers/crypto/ipsec_mb/ipsec_mb_ops.c +++ b/drivers/crypto/ipsec_mb/ipsec_mb_ops.c @@ -10,7 +10,6 @@ #include "ipsec_mb_private.h" -#define IMB_MP_REQ_VER_STR "1.1.0" /** Configure device */ int @@ -146,15 +145,10 @@ ipsec_mb_qp_release(struct rte_cryptodev *dev, uint16_t qp_id) if (rte_eal_process_type() == RTE_PROC_PRIMARY) { rte_ring_free(rte_ring_lookup(qp->name)); -#if IMB_VERSION(1, 1, 0) > IMB_VERSION_NUM - if (qp->mb_mgr) - free_mb_mgr(qp->mb_mgr); -#else if (qp->mb_mgr_mz) { rte_memzone_free(qp->mb_mgr_mz); qp->mb_mgr = NULL; } -#endif rte_free(qp); dev->data->queue_pairs[qp_id] = NULL; } else { /* secondary process */ @@ -210,7 +204,6 @@ static struct rte_ring RING_F_SP_ENQ | RING_F_SC_DEQ); } -#if IMB_VERSION(1, 1, 0) <= IMB_VERSION_NUM static IMB_MGR * ipsec_mb_alloc_mgr_from_memzone(const struct rte_memzone **mb_mgr_mz, const char *mb_mgr_mz_name) @@ -243,7 +236,6 @@ ipsec_mb_alloc_mgr_from_memzone(const struct rte_memzone **mb_mgr_mz, } return mb_mgr; } -#endif /** Setup a queue pair */ int @@ -259,12 +251,6 @@ ipsec_mb_qp_setup(struct rte_cryptodev *dev, uint16_t qp_id, int ret; if (rte_eal_process_type() == RTE_PROC_SECONDARY) { -#if IMB_VERSION(1, 1, 0) > IMB_VERSION_NUM - IPSEC_MB_LOG(ERR, "The intel-ipsec-mb version (%s) does not support multiprocess," - "the minimum version required for this feature is %s.", - IMB_VERSION_STR, IMB_MP_REQ_VER_STR); - return -EINVAL; -#endif qp = dev->data->queue_pairs[qp_id]; if (qp == NULL) { IPSEC_MB_LOG(DEBUG, "Secondary process setting up device qp."); @@ -284,15 +270,11 @@ ipsec_mb_qp_setup(struct rte_cryptodev *dev, uint16_t qp_id, return -ENOMEM; } -#if IMB_VERSION(1, 1, 0) > IMB_VERSION_NUM - qp->mb_mgr = alloc_init_mb_mgr(); -#else char mz_name[IPSEC_MB_MAX_MZ_NAME]; snprintf(mz_name, sizeof(mz_name), "IMB_MGR_DEV_%d_QP_%d", dev->data->dev_id, qp_id); qp->mb_mgr = ipsec_mb_alloc_mgr_from_memzone(&(qp->mb_mgr_mz), mz_name); -#endif if (qp->mb_mgr == NULL) { ret = -ENOMEM; goto qp_setup_cleanup; @@ -329,15 +311,10 @@ ipsec_mb_qp_setup(struct rte_cryptodev *dev, uint16_t qp_id, return 0; qp_setup_cleanup: -#if IMB_VERSION(1, 1, 0) > IMB_VERSION_NUM - if (qp->mb_mgr) - free_mb_mgr(qp->mb_mgr); -#else if (rte_eal_process_type() == RTE_PROC_SECONDARY) return ret; if (qp->mb_mgr_mz) rte_memzone_free(qp->mb_mgr_mz); -#endif rte_free(qp); return ret; } diff --git a/drivers/crypto/ipsec_mb/meson.build b/drivers/crypto/ipsec_mb/meson.build index 87bf965554..0c988d7411 100644 --- a/drivers/crypto/ipsec_mb/meson.build +++ b/drivers/crypto/ipsec_mb/meson.build @@ -7,7 +7,7 @@ if is_windows subdir_done() endif -IMB_required_ver = '1.0.0' +IMB_required_ver = '1.4.0' IMB_header = '#include' if arch_subdir == 'arm' IMB_header = '#include' diff --git a/drivers/crypto/ipsec_mb/pmd_aesni_mb.c b/drivers/crypto/ipsec_mb/pmd_aesni_mb.c index 4de4866cf3..b93267f1c3 100644 --- a/drivers/crypto/ipsec_mb/pmd_aesni_mb.c +++ b/drivers/crypto/ipsec_mb/pmd_aesni_mb.c @@ -210,13 +210,9 @@ aesni_mb_set_session_auth_parameters(const IMB_MGR *mb_mgr, } } else if (xform->auth.key.length == 32) { sess->template_job.hash_alg = IMB_AUTH_ZUC256_EIA3_BITLEN; -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM if (sess->auth.req_digest_len != 4 && sess->auth.req_digest_len != 8 && sess->auth.req_digest_len != 16) { -#else - if (sess->auth.req_digest_len != 4) { -#endif IPSEC_MB_LOG(ERR, "Invalid digest size\n"); return -EINVAL; } @@ -845,11 +841,9 @@ aesni_mb_session_configure(IMB_MGR *mb_mgr, } } -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM sess->session_id = imb_set_session(mb_mgr, &sess->template_job); sess->pid = getpid(); RTE_PER_LCORE(pid) = sess->pid; -#endif return 0; } @@ -982,9 +976,7 @@ aesni_mb_set_docsis_sec_session_parameters( goto error_exit; } -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM ipsec_sess->session_id = imb_set_session(mb_mgr, &ipsec_sess->template_job); -#endif error_exit: free_mb_mgr(mb_mgr); @@ -1239,7 +1231,6 @@ imb_lib_support_sgl_algo(IMB_CIPHER_MODE alg) return 0; } -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM static inline int single_sgl_job(IMB_JOB *job, struct rte_crypto_op *op, int oop, uint32_t offset, struct rte_mbuf *m_src, @@ -1324,7 +1315,6 @@ single_sgl_job(IMB_JOB *job, struct rte_crypto_op *op, job->sgl_io_segs = sgl_segs; return 0; } -#endif static inline int multi_sgl_job(IMB_JOB *job, struct rte_crypto_op *op, @@ -1394,9 +1384,7 @@ set_gcm_job(IMB_MGR *mb_mgr, IMB_JOB *job, const uint8_t sgl, job->msg_len_to_hash_in_bytes = 0; job->msg_len_to_cipher_in_bytes = 0; job->cipher_start_src_offset_in_bytes = 0; -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM imb_set_session(mb_mgr, job); -#endif } else { job->hash_start_src_offset_in_bytes = op->sym->aead.data.offset; @@ -1424,13 +1412,11 @@ set_gcm_job(IMB_MGR *mb_mgr, IMB_JOB *job, const uint8_t sgl, job->src = NULL; job->dst = NULL; -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM if (m_src->nb_segs <= MAX_NUM_SEGS) return single_sgl_job(job, op, oop, m_offset, m_src, m_dst, qp_data->sgl_segs); else -#endif return multi_sgl_job(job, op, oop, m_offset, m_src, m_dst, mb_mgr); } else { @@ -1520,10 +1506,6 @@ set_mb_job_params(IMB_JOB *job, struct ipsec_mb_qp *qp, uint8_t sgl = 0; uint8_t lb_sgl = 0; -#if IMB_VERSION(1, 3, 0) >= IMB_VERSION_NUM - (void) pid; -#endif - session = ipsec_mb_get_session_private(qp, op); if (session == NULL) { op->status = RTE_CRYPTO_OP_STATUS_INVALID_SESSION; @@ -1533,12 +1515,10 @@ set_mb_job_params(IMB_JOB *job, struct ipsec_mb_qp *qp, const IMB_CIPHER_MODE cipher_mode = session->template_job.cipher_mode; -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM if (session->pid != pid) { memcpy(job, &session->template_job, sizeof(IMB_JOB)); imb_set_session(mb_mgr, job); } else if (job->session_id != session->session_id) -#endif memcpy(job, &session->template_job, sizeof(IMB_JOB)); if (!op->sym->m_dst) { @@ -1579,9 +1559,7 @@ set_mb_job_params(IMB_JOB *job, struct ipsec_mb_qp *qp, job->u.GCM.ctx = &qp_data->gcm_sgl_ctx; job->cipher_mode = IMB_CIPHER_GCM_SGL; job->hash_alg = IMB_AUTH_GCM_SGL; -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM imb_set_session(mb_mgr, job); -#endif } break; case IMB_AUTH_AES_GMAC_128: @@ -1606,9 +1584,7 @@ set_mb_job_params(IMB_JOB *job, struct ipsec_mb_qp *qp, job->u.CHACHA20_POLY1305.ctx = &qp_data->chacha_sgl_ctx; job->cipher_mode = IMB_CIPHER_CHACHA20_POLY1305_SGL; job->hash_alg = IMB_AUTH_CHACHA20_POLY1305_SGL; -#if IMB_VERSION(1, 3, 0) < IMB_VERSION_NUM imb_set_session(mb_mgr, job); -#endif } break; default: @@ -1804,13 +1780,11 @@ set_mb_job_params(IMB_JOB *job, struct ipsec_mb_qp *qp, if (lb_sgl) return handle_sgl_linear(job, op, m_offset, session); -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM if (m_src->nb_segs <= MAX_NUM_SEGS) return single_sgl_job(job, op, oop, m_offset, m_src, m_dst, qp_data->sgl_segs); else -#endif return multi_sgl_job(job, op, oop, m_offset, m_src, m_dst, mb_mgr); } @@ -2130,7 +2104,6 @@ set_job_null_op(IMB_JOB *job, struct rte_crypto_op *op) return job; } -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM static uint16_t aesni_mb_dequeue_burst(void *queue_pair, struct rte_crypto_op **ops, uint16_t nb_ops) @@ -2263,144 +2236,6 @@ aesni_mb_dequeue_burst(void *queue_pair, struct rte_crypto_op **ops, return processed_jobs; } -#else - -/** - * Process a completed IMB_JOB job and keep processing jobs until - * get_completed_job return NULL - * - * @param qp Queue Pair to process - * @param mb_mgr IMB_MGR to use - * @param job IMB_JOB job - * @param ops crypto ops to fill - * @param nb_ops number of crypto ops - * - * @return - * - Number of processed jobs - */ -static unsigned -handle_completed_jobs(struct ipsec_mb_qp *qp, IMB_MGR *mb_mgr, - IMB_JOB *job, struct rte_crypto_op **ops, - uint16_t nb_ops) -{ - struct rte_crypto_op *op = NULL; - uint16_t processed_jobs = 0; - - while (job != NULL) { - op = post_process_mb_job(qp, job); - - if (op) { - ops[processed_jobs++] = op; - qp->stats.dequeued_count++; - } else { - qp->stats.dequeue_err_count++; - break; - } - if (processed_jobs == nb_ops) - break; - - job = IMB_GET_COMPLETED_JOB(mb_mgr); - } - - return processed_jobs; -} - -static inline uint16_t -flush_mb_mgr(struct ipsec_mb_qp *qp, IMB_MGR *mb_mgr, - struct rte_crypto_op **ops, uint16_t nb_ops) -{ - int processed_ops = 0; - - /* Flush the remaining jobs */ - IMB_JOB *job = IMB_FLUSH_JOB(mb_mgr); - - if (job) - processed_ops += handle_completed_jobs(qp, mb_mgr, job, - &ops[processed_ops], nb_ops - processed_ops); - - return processed_ops; -} - -static uint16_t -aesni_mb_dequeue_burst(void *queue_pair, struct rte_crypto_op **ops, - uint16_t nb_ops) -{ - struct ipsec_mb_qp *qp = queue_pair; - IMB_MGR *mb_mgr = qp->mb_mgr; - struct rte_crypto_op *op; - IMB_JOB *job; - int retval, processed_jobs = 0; - pid_t pid = 0; - - if (unlikely(nb_ops == 0 || mb_mgr == NULL)) - return 0; - - uint8_t digest_idx = qp->digest_idx; - - do { - /* Get next free mb job struct from mb manager */ - job = IMB_GET_NEXT_JOB(mb_mgr); - if (unlikely(job == NULL)) { - /* if no free mb job structs we need to flush mb_mgr */ - processed_jobs += flush_mb_mgr(qp, mb_mgr, - &ops[processed_jobs], - nb_ops - processed_jobs); - - if (nb_ops == processed_jobs) - break; - - job = IMB_GET_NEXT_JOB(mb_mgr); - } - - /* - * Get next operation to process from ingress queue. - * There is no need to return the job to the IMB_MGR - * if there are no more operations to process, since the IMB_MGR - * can use that pointer again in next get_next calls. - */ - retval = rte_ring_dequeue(qp->ingress_queue, (void **)&op); - if (retval < 0) - break; - - if (op->sess_type == RTE_CRYPTO_OP_SECURITY_SESSION) - retval = set_sec_mb_job_params(job, qp, op, - &digest_idx); - else - retval = set_mb_job_params(job, qp, op, - &digest_idx, mb_mgr, pid); - - if (unlikely(retval != 0)) { - qp->stats.dequeue_err_count++; - set_job_null_op(job, op); - } - - /* Submit job to multi-buffer for processing */ -#ifdef RTE_LIBRTE_PMD_AESNI_MB_DEBUG - job = IMB_SUBMIT_JOB(mb_mgr); -#else - job = IMB_SUBMIT_JOB_NOCHECK(mb_mgr); -#endif - /* - * If submit returns a processed job then handle it, - * before submitting subsequent jobs - */ - if (job) - processed_jobs += handle_completed_jobs(qp, mb_mgr, - job, &ops[processed_jobs], - nb_ops - processed_jobs); - - } while (processed_jobs < nb_ops); - - qp->digest_idx = digest_idx; - - if (processed_jobs < 1) - processed_jobs += flush_mb_mgr(qp, mb_mgr, - &ops[processed_jobs], - nb_ops - processed_jobs); - - return processed_jobs; -} -#endif static inline int check_crypto_sgl(union rte_crypto_sym_ofs so, const struct rte_crypto_sgl *sgl) { diff --git a/drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h b/drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h index 85994fe5a1..51cfd7e2aa 100644 --- a/drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h +++ b/drivers/crypto/ipsec_mb/pmd_aesni_mb_priv.h @@ -17,9 +17,7 @@ #define HMAC_IPAD_VALUE (0x36) #define HMAC_OPAD_VALUE (0x5C) -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM #define MAX_NUM_SEGS 16 -#endif static const struct rte_cryptodev_capabilities aesni_mb_capabilities[] = { { /* MD5 HMAC */ @@ -567,13 +565,8 @@ static const struct rte_cryptodev_capabilities aesni_mb_capabilities[] = { }, .digest_size = { .min = 4, -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM .max = 16, .increment = 4 -#else - .max = 4, - .increment = 0 -#endif }, .iv_size = { .min = 16, @@ -730,9 +723,7 @@ struct aesni_mb_qp_data { * by the driver when verifying a digest provided * by the user (using authentication verify operation) */ -#if IMB_VERSION(1, 2, 0) < IMB_VERSION_NUM struct IMB_SGL_IOV sgl_segs[MAX_NUM_SEGS]; -#endif union { struct gcm_context_data gcm_sgl_ctx; struct chacha20_poly1305_context_data chacha_sgl_ctx; From patchwork Fri Feb 2 14:04:17 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sivaramakrishnan Venkat X-Patchwork-Id: 136332 X-Patchwork-Delegate: gakhil@marvell.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 2D22543A50; Fri, 2 Feb 2024 15:04:32 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id A545042DAC; Fri, 2 Feb 2024 15:04:27 +0100 (CET) Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.20]) by mails.dpdk.org (Postfix) with ESMTP id 177FB40691 for ; Fri, 2 Feb 2024 15:04:25 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1706882665; x=1738418665; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=3V1RedOLhWVMbQ2OXAKF7ATC9z0ki8bWWs2DZChdn34=; b=IoFaUAg3iBmXztljkmBYM/49UBuaeg+uQiiLVYcQk1fIYeYlOuqM29ZQ BjkhCnFS39M1hsezjSIL7Uw1mi2srfpna+6SYUw3B9MH8VcUde+k/opCs j8bFdFdpOw6QujgcOkPQ0Kgo6yERu+pX6XIJtF59YNgero1nEDokvJTI6 i396yfX4rUXXrNx5DTlGZmfYxoRRYCXH1xYKOMF7gis4FBZv5+u1vhp5C gNKO+vJwegIuoeMoQkN3Fo/8wLaJ2dZbEwIspNbrvVMCBM+8lezOMgz7e lis2QK4RMSNjRxkWUAznv2FIgmvp7+/lCnMJNeCSx9jCXJuLOa8T70ybU Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10971"; a="80936" X-IronPort-AV: E=Sophos;i="6.05,238,1701158400"; d="scan'208";a="80936" Received: from fmviesa008.fm.intel.com ([10.60.135.148]) by orvoesa112.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Feb 2024 06:04:24 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.05,238,1701158400"; d="scan'208";a="282391" Received: from silpixa00400902.ir.intel.com ([10.243.23.146]) by fmviesa008.fm.intel.com with ESMTP; 02 Feb 2024 06:04:23 -0800 From: Sivaramakrishnan Venkat To: Kai Ji , Pablo de Lara Cc: dev@dpdk.org, bruce.richardson@intel.com, ciara.power@intel.com, Sivaramakrishnan Venkat Subject: [PATCH v3 2/2] doc: remove outdated version details Date: Fri, 2 Feb 2024 14:04:17 +0000 Message-Id: <20240202140417.2399200-2-venkatx.sivaramakrishnan@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20240202140417.2399200-1-venkatx.sivaramakrishnan@intel.com> References: <20240119114026.1552305-1-venkatx.sivaramakrishnan@intel.com> <20240202140417.2399200-1-venkatx.sivaramakrishnan@intel.com> MIME-Version: 1.0 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org SW PMDs documentation is updated to remove details of unsupported IPsec Multi-buffer versions.DPDK older than 20.11 is end of life. So, older DPDK versions are removed from the Crypto library version table. Signed-off-by: Sivaramakrishnan Venkat Acked-by: Pablo de Lara --- v3: - added second patch for outdated documentation updates. --- doc/guides/cryptodevs/aesni_gcm.rst | 19 +++--------------- doc/guides/cryptodevs/aesni_mb.rst | 22 +++------------------ doc/guides/cryptodevs/chacha20_poly1305.rst | 12 ++--------- doc/guides/cryptodevs/kasumi.rst | 14 +++---------- doc/guides/cryptodevs/snow3g.rst | 15 +++----------- doc/guides/cryptodevs/zuc.rst | 15 +++----------- 6 files changed, 17 insertions(+), 80 deletions(-) diff --git a/doc/guides/cryptodevs/aesni_gcm.rst b/doc/guides/cryptodevs/aesni_gcm.rst index dc665e536c..e38a03b78f 100644 --- a/doc/guides/cryptodevs/aesni_gcm.rst +++ b/doc/guides/cryptodevs/aesni_gcm.rst @@ -62,12 +62,6 @@ Once it is downloaded, extract it and follow these steps: make make install -.. note:: - - Compilation of the Multi-Buffer library is broken when GCC < 5.0, if library <= v0.53. - If a lower GCC version than 5.0, the workaround proposed by the following link - should be used: ``_. - As a reference, the following table shows a mapping between the past DPDK versions and the external crypto libraries supported by them: @@ -79,18 +73,11 @@ and the external crypto libraries supported by them: ============= ================================ DPDK version Crypto library version ============= ================================ - 16.04 - 16.11 Multi-buffer library 0.43 - 0.44 - 17.02 - 17.05 ISA-L Crypto v2.18 - 17.08 - 18.02 Multi-buffer library 0.46 - 0.48 - 18.05 - 19.02 Multi-buffer library 0.49 - 0.52 - 19.05 - 20.08 Multi-buffer library 0.52 - 0.55 - 20.11 - 21.08 Multi-buffer library 0.53 - 1.3* - 21.11 - 23.11 Multi-buffer library 1.0 - 1.5* - 24.03+ Multi-buffer library 1.4 - 1.5* + 20.11 - 21.08 Multi-buffer library 0.53 - 1.3 + 21.11 - 23.11 Multi-buffer library 1.0 - 1.5 + 24.03+ Multi-buffer library 1.4 - 1.5 ============= ================================ -\* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. - Initialization -------------- diff --git a/doc/guides/cryptodevs/aesni_mb.rst b/doc/guides/cryptodevs/aesni_mb.rst index 5d670ee237..bd7c8de07f 100644 --- a/doc/guides/cryptodevs/aesni_mb.rst +++ b/doc/guides/cryptodevs/aesni_mb.rst @@ -121,12 +121,6 @@ Once it is downloaded, extract it and follow these steps: make make install -.. note:: - - Compilation of the Multi-Buffer library is broken when GCC < 5.0, if library <= v0.53. - If a lower GCC version than 5.0, the workaround proposed by the following link - should be used: ``_. - As a reference, the following table shows a mapping between the past DPDK versions and the Multi-Buffer library version supported by them: @@ -137,21 +131,11 @@ and the Multi-Buffer library version supported by them: ============== ============================ DPDK version Multi-buffer library version ============== ============================ - 2.2 - 16.11 0.43 - 0.44 - 17.02 0.44 - 17.05 - 17.08 0.45 - 0.48 - 17.11 0.47 - 0.48 - 18.02 0.48 - 18.05 - 19.02 0.49 - 0.52 - 19.05 - 19.08 0.52 - 19.11 - 20.08 0.52 - 0.55 - 20.11 - 21.08 0.53 - 1.3* - 21.11 - 23.11 1.0 - 1.5* - 24.03+ 1.4 - 1.5* + 20.11 - 21.08 0.53 - 1.3 + 21.11 - 23.11 1.0 - 1.5 + 24.03+ 1.4 - 1.5 ============== ============================ -\* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. - Initialization -------------- diff --git a/doc/guides/cryptodevs/chacha20_poly1305.rst b/doc/guides/cryptodevs/chacha20_poly1305.rst index c32866b301..8e0ee4f835 100644 --- a/doc/guides/cryptodevs/chacha20_poly1305.rst +++ b/doc/guides/cryptodevs/chacha20_poly1305.rst @@ -56,12 +56,6 @@ Once it is downloaded, extract it and follow these steps: make make install -.. note:: - - Compilation of the Multi-Buffer library is broken when GCC < 5.0, if library <= v0.53. - If a lower GCC version than 5.0, the workaround proposed by the following link - should be used: ``_. - As a reference, the following table shows a mapping between the past DPDK versions and the external crypto libraries supported by them: @@ -72,12 +66,10 @@ and the external crypto libraries supported by them: ============= ================================ DPDK version Crypto library version ============= ================================ - 21.11 - 23.11 Multi-buffer library 1.0-1.5* - 24.03+ Multi-buffer library 1.4-1.5* + 21.11 - 23.11 Multi-buffer library 1.0-1.5 + 24.03+ Multi-buffer library 1.4-1.5 ============= ================================ -\* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. - Initialization -------------- diff --git a/doc/guides/cryptodevs/kasumi.rst b/doc/guides/cryptodevs/kasumi.rst index a8f4e6b204..28ac452524 100644 --- a/doc/guides/cryptodevs/kasumi.rst +++ b/doc/guides/cryptodevs/kasumi.rst @@ -69,12 +69,6 @@ Once it is downloaded, extract it and follow these steps: make make install -.. note:: - - Compilation of the Multi-Buffer library is broken when GCC < 5.0, if library <= v0.53. - If a lower GCC version than 5.0, the workaround proposed by the following link - should be used: ``_. - As a reference, the following table shows a mapping between the past DPDK versions and the external crypto libraries supported by them: @@ -86,13 +80,11 @@ and the external crypto libraries supported by them: DPDK version Crypto library version ============= ================================ 16.11 - 19.11 LibSSO KASUMI - 20.02 - 21.08 Multi-buffer library 0.53 - 1.3* - 21.11 - 23.11 Multi-buffer library 1.0 - 1.5* - 24.03+ Multi-buffer library 1.4 - 1.5* + 20.11 - 21.08 Multi-buffer library 0.53 - 1.3 + 21.11 - 23.11 Multi-buffer library 1.0 - 1.5 + 24.03+ Multi-buffer library 1.4 - 1.5 ============= ================================ -\* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. - Initialization -------------- diff --git a/doc/guides/cryptodevs/snow3g.rst b/doc/guides/cryptodevs/snow3g.rst index 46863462e5..0141f62976 100644 --- a/doc/guides/cryptodevs/snow3g.rst +++ b/doc/guides/cryptodevs/snow3g.rst @@ -78,12 +78,6 @@ Once it is downloaded, extract it and follow these steps: make make install -.. note:: - - Compilation of the Multi-Buffer library is broken when GCC < 5.0, if library <= v0.53. - If a lower GCC version than 5.0, the workaround proposed by the following link - should be used: ``_. - As a reference, the following table shows a mapping between the past DPDK versions and the external crypto libraries supported by them: @@ -94,14 +88,11 @@ and the external crypto libraries supported by them: ============= ================================ DPDK version Crypto library version ============= ================================ - 16.04 - 19.11 LibSSO SNOW3G - 20.02 - 21.08 Multi-buffer library 0.53 - 1.3* - 21.11 - 23.11 Multi-buffer library 1.0 - 1.5* - 24.03+ Multi-buffer library 1.4 - 1.5* + 20.11 - 21.08 Multi-buffer library 0.53 - 1.3 + 21.11 - 23.11 Multi-buffer library 1.0 - 1.5 + 24.03+ Multi-buffer library 1.4 - 1.5 ============= ================================ -\* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. - Initialization -------------- diff --git a/doc/guides/cryptodevs/zuc.rst b/doc/guides/cryptodevs/zuc.rst index 51867e1a16..97c14c8c77 100644 --- a/doc/guides/cryptodevs/zuc.rst +++ b/doc/guides/cryptodevs/zuc.rst @@ -77,12 +77,6 @@ Once it is downloaded, extract it and follow these steps: make make install -.. note:: - - Compilation of the Multi-Buffer library is broken when GCC < 5.0, if library <= v0.53. - If a lower GCC version than 5.0, the workaround proposed by the following link - should be used: ``_. - As a reference, the following table shows a mapping between the past DPDK versions and the external crypto libraries supported by them: @@ -93,14 +87,11 @@ and the external crypto libraries supported by them: ============= ================================ DPDK version Crypto library version ============= ================================ - 16.11 - 19.11 LibSSO ZUC - 20.02 - 21.08 Multi-buffer library 0.53 - 1.3* - 21.11 - 23.11 Multi-buffer library 1.0 - 1.5* - 24.03+ Multi-buffer library 1.4 - 1.5* + 20.11 - 21.08 Multi-buffer library 0.53 - 1.3 + 21.11 - 23.11 Multi-buffer library 1.0 - 1.5 + 24.03+ Multi-buffer library 1.4 - 1.5 ============= ================================ -\* Multi-buffer library 1.0 or newer only works for Meson but not Make build system. - Initialization --------------