Signed-off-by: Vladimir Medvedkin
---
lib/librte_hash/rte_thash.h | 33 ++---
1 file changed, 2 insertions(+), 31 deletions(-)
diff --git a/lib/librte_hash/rte_thash.h b/lib/librte_hash/rte_thash.h
index a6ddb7bf7..1b33f4813 100644
--- a/lib/librte_hash/rte_thash.h
++
Signed-off-by: Vladimir Medvedkin
---
MAINTAINERS | 1 +
1 file changed, 1 insertion(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index 835d8a201..eef480ab5 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -1133,6 +1133,7 @@ F: test/test/test_func_reentrancy.c
LPM
M: Bruce Richardson
+M: Vladimir
Signed-off-by: Vladimir Medvedkin
---
MAINTAINERS | 3 +++
1 file changed, 3 insertions(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index eef480ab5..81affda53 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -1131,6 +1131,9 @@ F: doc/guides/prog_guide/hash_lib.rst
F: test/test/test_*hash*
F: test/t
Meeting notes for the DPDK technical board meeting held on 2019-01-30
Attendees: 8/9
- Bruce Richardson
- Ferruh Yigit
- Hemant Agrawal
- Jerin Jacob
- Konstantin Ananyev
- Maxime Coquelin
- Olivier Matz
- Thomas Monjalon
1) Windows
If the port has received less than ``pkt_per_port`` packets (for
example, the port has missed some packets), the test is in an infinite
loop.
Instead of expecting a number of packet to receive, let the port to be
drained by itself. If no more packets are received, the test can
continue.
Fixes: 00
Anything that crashes a host is a host bug. The host can never trust the
guest to be well behaved. These are serious often with security
implications. Hopefully VMware will or has already addressed it.
On Sat, Feb 2, 2019, 6:18 AM https://bugs.dpdk.org/show_bug.cgi?id=204
>
> Bug ID:
sprintf function is not secure as it doesn't check the length of string.
More secure function snprintf is used.
Fixes: 3fc5ca2f63 ("kni: initial import")
Fixes: b9ee370557 ("kni: update kernel driver ethtool baseline")
Cc: sta...@dpdk.org
Signed-off-by: Pallantla Poornima
---
kernel/linux/kni/e
sprintf function is not secure as it doesn't check the length of string.
More secure function snprintf is used.
Fixes: f714a18885 ("app/testbbdev: add test application for bbdev")
Cc: sta...@dpdk.org
Signed-off-by: Pallantla Poornima
---
app/test-bbdev/test_bbdev.c | 8
1 file changed,
sprintf function is not secure as it doesn't check the length of string.
More secure function snprintf is used.
Fixes: 3c7f3dcfb0 ("event/opdl: add PMD main body and helper function")
Cc: sta...@dpdk.org
Signed-off-by: Pallantla Poornima
---
drivers/event/opdl/opdl_evdev.c| 7 ---
d
sprintf function is not secure as it doesn't check the length of string.
More secure function snprintf is used.
Fixes: 896c265ef9 ("net/nfp: use new CPP interface")
Fixes: c4171b520b ("net/nfp: support PF multiport")
Cc: sta...@dpdk.org
Signed-off-by: Pallantla Poornima
---
drivers/net/nfp/nfp_
sprintf function is not secure as it doesn't check the length of string.
More secure function snprintf is used.
Fixes: daabf2fb94 ("net/softnic: map flow action to table action")
Cc: sta...@dpdk.org
Signed-off-by: Pallantla Poornima
---
drivers/net/softnic/rte_eth_softnic_flow.c | 5 +++--
1 fi
sprintf function is not secure as it doesn't check the length of string.
More secure function snprintf is used.
Fixes: 450f079131 ("power: add traffic pattern aware power control")
Cc: sta...@dpdk.org
Signed-off-by: Pallantla Poornima
---
lib/librte_power/rte_power_empty_poll.c | 2 +-
1 file c
sprintf function is not secure as it doesn't check the length of string.
More secure function snprintf is used.
Fixes: d7280c9fff ("vhost: support selective datapath")
Cc: sta...@dpdk.org
Signed-off-by: Pallantla Poornima
---
lib/librte_vhost/vdpa.c | 2 +-
1 file changed, 1 insertion(+), 1 del
Hello all,
Now that DPDK 19.02 was released three days ago (on time!!), hopefully
there will be time
for people to answer the following question:
According to the "DPDK Getting Started Guide",
"If UEFI secure boot is enabled, the Linux kernel may disallow the use of
UIO on the system.
T
14 matches
Mail list logo