[dpdk-stable] [DPDK 1/5] test/ipsec: fix failures in tests 12 and 13
Bernard Iremonger
bernard.iremonger at intel.com
Wed May 22 15:18:51 CEST 2019
Calling rte_cryptodev_enqueue_burst() in a loop for 1
packet at a time results in some random mbufs with 36 leading 0's.
Calling rte_cryptodev_enqueue_burst() for a burst of packets solves
this issue.
Fixes: 59d7353b0df0 ("test/ipsec: fix test suite setup")
Cc: stable at dpdk.org
Signed-off-by: Bernard Iremonger <bernard.iremonger at intel.com>
---
app/test/test_ipsec.c | 34 +++++++++++++++++++---------------
1 file changed, 19 insertions(+), 15 deletions(-)
diff --git a/app/test/test_ipsec.c b/app/test/test_ipsec.c
index 64e56c0..9859cb9 100644
--- a/app/test/test_ipsec.c
+++ b/app/test/test_ipsec.c
@@ -897,13 +897,14 @@ crypto_ipsec_2sa(void)
"rte_ipsec_pkt_crypto_prepare fail\n");
return TEST_FAILED;
}
- k = rte_cryptodev_enqueue_burst(ts_params->valid_dev, 0,
- ut_params->cop + i, 1);
- if (k != 1) {
- RTE_LOG(ERR, USER1,
- "rte_cryptodev_enqueue_burst fail\n");
- return TEST_FAILED;
- }
+ }
+
+ k = rte_cryptodev_enqueue_burst(ts_params->valid_dev, 0,
+ ut_params->cop, BURST_SIZE);
+ if (k != BURST_SIZE) {
+ RTE_LOG(ERR, USER1,
+ "rte_cryptodev_enqueue_burst fail k=%u\n", k);
+ return TEST_FAILED;
}
if (crypto_dequeue_burst(BURST_SIZE) == TEST_FAILED)
@@ -1012,12 +1013,14 @@ crypto_ipsec_4grp_check_cnt(uint32_t grp_ind, struct rte_ipsec_group *grp)
return rc;
}
+#define GRP_4 4
+
static int
crypto_ipsec_2sa_4grp(void)
{
struct ipsec_testsuite_params *ts_params = &testsuite_params;
struct ipsec_unitest_params *ut_params = &unittest_params;
- struct rte_ipsec_group grp[BURST_SIZE];
+ struct rte_ipsec_group grp[GRP_4];
uint32_t k, ng, i, j;
uint32_t rc = 0;
@@ -1032,13 +1035,14 @@ crypto_ipsec_2sa_4grp(void)
"rte_ipsec_pkt_crypto_prepare fail\n");
return TEST_FAILED;
}
- k = rte_cryptodev_enqueue_burst(ts_params->valid_dev, 0,
- ut_params->cop + i, 1);
- if (k != 1) {
- RTE_LOG(ERR, USER1,
- "rte_cryptodev_enqueue_burst fail\n");
- return TEST_FAILED;
- }
+ }
+
+ k = rte_cryptodev_enqueue_burst(ts_params->valid_dev, 0,
+ ut_params->cop, BURST_SIZE);
+ if (k != BURST_SIZE) {
+ RTE_LOG(ERR, USER1,
+ "rte_cryptodev_enqueue_burst fail k=%u\n", k);
+ return TEST_FAILED;
}
if (crypto_dequeue_burst(BURST_SIZE) == TEST_FAILED)
--
2.7.4
More information about the stable
mailing list