https://bugs.dpdk.org/show_bug.cgi?id=1317
Bug ID: 1317
Summary: Fashionhikes
Product: DPDK
Version: 22.11
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: Normal
Com
Dynamically allocated log type is a standard approach among all drivers.
Switch to it.
Signed-off-by: Tomasz Duszynski
---
drivers/raw/cnxk_bphy/cnxk_bphy.c | 32 +-
drivers/raw/cnxk_bphy/cnxk_bphy_cgx.c | 4 ++-
drivers/raw/cnxk_bphy/cnxk_bphy_cgx.h | 7
Hi,
> -Original Message-
> From: Bing Zhao
> Sent: Monday, November 13, 2023 9:21 AM
> To: Matan Azrad ; Slava Ovsiienko
> ; Raslan Darawsheh ;
> Suanming Mou ; Ori Kam
> Cc: dev@dpdk.org; Erez Shitrit ; sta...@dpdk.org
> Subject: [PATCH] net/mlx5/hws: fix typo in the log
>
> Change "c
Hi,
> -Original Message-
> From: Bing Zhao
> Sent: Monday, November 13, 2023 9:25 AM
> To: Matan Azrad ; Slava Ovsiienko
> ; Raslan Darawsheh ;
> Suanming Mou ; Ori Kam
> Cc: dev@dpdk.org; Xueming(Steven) Li ;
> sta...@dpdk.org
> Subject: [PATCH] net/mlx5: fix shared Rx queue list manage
Hi,
> -Original Message-
> From: Bing Zhao
> Sent: Monday, November 13, 2023 9:30 AM
> To: Matan Azrad ; Slava Ovsiienko
> ; Raslan Darawsheh ;
> Suanming Mou ; Ori Kam
> Cc: dev@dpdk.org; Eli Britstein ; sta...@dpdk.org
> Subject: [PATCH] net/mlx5: zero encap UDP csum for IPv4 too
>
>
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
lib/node/kernel_tx.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/node/kernel
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
lib/eventdev/rte_event_eth_rx_adapter.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --gi
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
lib/pdump/rte_pdump.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/lib/pdum
The function strerror() is insecure in a multi-thread environment.
rte_strerror() has been provided in DPDK to replace it.
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
devtools/checkpatches.sh | 8
1 file changed, 8 insertions(+)
diff --git a/devtools/checkpatches.sh b/dev
The function strerror() is insecure in a multi-thread environment.
This series of patches fix it. In this patchset, only the libs and
drivers are modified.
Dengdui Huang (43):
devtools: forbid use of strerror
eal: use rte strerror
eventdev: use rte strerror
latency: use rte strerror
node
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
lib/latencystats/rte_latencystats.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --gi
The function strerror() is insecure in a multi-thread environment.
This patch uses strerror_r() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
lib/telemetry/telemetry.c| 28 ++--
lib/telemetry/telemetry_legacy.c | 5
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
lib/power/guest_channel.c| 7 ---
lib/power/power_kvm_vm.c | 3 ++-
lib/power/power_
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
lib/bpf/bpf_load_elf.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/bpf/bpf_l
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/bus/dpaa/base/fman/fman.c | 2 +-
drivers/bus/dpaa/dpaa_bus.c | 2 +-
2 files changed, 2 i
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
lib/vhost/socket.c | 13 +++--
lib/vhost/vduse.c | 30 +++---
l
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
lib/eal/common/eal_common_fbarray.c | 2 +-
lib/eal/common/eal_common_options.c | 7 ++--
lib/
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/bus/cdx/cdx.c | 2 +-
drivers/bus/cdx/cdx_vfio.c | 13 +++--
2 files changed, 8 in
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/bus/fslmc/fslmc_vfio.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/bus/vdev/vdev.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/bus/
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/bus/vmbus/linux/vmbus_bus.c | 7 ---
drivers/bus/vmbus/linux/vmbus_uio.c | 21 +++
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/bus/pci/bsd/pci.c| 8
drivers/bus/pci/linux/pci.c | 7 ---
drivers/b
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/common/cnxk/roc_dev.c | 4 +++-
drivers/common/cnxk/roc_model.c | 4 +++-
drivers/common/cnxk/
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/common/mlx5/linux/mlx5_nl.c | 12 ++--
drivers/common/mlx5/mlx5_common.c| 6 +++---
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/dma/idxd/idxd_bus.c | 14 +++---
1 file changed, 7 insertions(+), 7 deletions(-)
diff -
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/crypto/caam_jr/caam_jr_uio.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/af_packet/rte_eth_af_packet.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/enetfec/enet_uio.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drive
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/af_xdp/rte_eth_af_xdp.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/dpaa2/dpaa2_ethdev.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/dpaa/dpaa_ethdev.c | 4 ++--
drivers/net/dpaa/fmlib/fm_lib.c | 6 +++---
2 files changed, 5
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/ice/ice_testpmd.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/dr
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/failsafe/failsafe.c | 8
drivers/net/failsafe/failsafe_args.c| 4 ++--
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/i40e/i40e_testpmd.c | 42 -
1 file changed, 21 insertions(+)
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/bonding/bonding_testpmd.c | 4 ++--
drivers/net/bonding/rte_eth_bond_api.c | 2 +-
driver
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/ixgbe/ixgbe_testpmd.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
di
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/memif/memif_socket.c | 4 ++--
drivers/net/memif/rte_eth_memif.c | 20 ++--
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/qede/qede_regs.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/dri
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/sfc/sfc_flow.c| 2 +-
drivers/net/sfc/sfc_flow_tunnel.c | 2 +-
drivers/net/sfc/sf
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/mlx4/mlx4.c| 14 +++---
drivers/net/mlx4/mlx4_ethdev.c | 18 +---
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/bnxt/bnxt_stats.c | 2 +-
drivers/net/bnxt/rte_pmd_bnxt.c |
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/vhost/rte_eth_vhost.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --gi
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/raw/ifpga/afu_pmd_n3000.c | 5 +++--
drivers/raw/ifpga/base/ifpga_fme_rsu.c | 12 +++--
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/mlx5/hws/mlx5dr_matcher.c | 2 +-
drivers/net/mlx5/linux/mlx5_ethdev_os.c | 20 ++
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/tap/rte_eth_tap.c | 26 +-
drivers/net/tap/tap_flow.c| 18 ++
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/net/virtio/virtio_user/vhost_kernel.c | 8 +++---
.../net/virtio/virtio_user/vhost_kernel_tap.c
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/vdpa/sfc/sfc_vdpa_ops.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/vdpa/mlx5/mlx5_vdpa_virtq.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/
The function strerror() is insecure in a multi-thread environment.
This patch uses rte_strerror() to replace it.
Cc: sta...@dpdk.org
Signed-off-by: Dengdui Huang
Acked-by: Chengwen Feng
---
drivers/vdpa/ifc/ifcvf_vdpa.c | 23 ---
1 file changed, 12 insertions(+), 11 deletio
> From: Aditya Ambadipudi [mailto:aditya.ambadip...@arm.com]
> Sent: Monday, 13 November 2023 19.15
>
> Hello all.
>
> My name is Aditya Ambadipudi. I am not the sharpest tool in the shed.
>
> I was reading through the rte_ring datastructure. And I have two questions
> about the optimizations
Hi Michael,
> -Original Message-
> From: Michael Baum
> Sent: Monday, November 13, 2023 12:44 PM
> To: dev@dpdk.org
> Cc: Matan Azrad ; Raslan Darawsheh
> ; Slava Ovsiienko ; Ori Kam
> ; Suanming Mou
> Subject: [PATCH] net/mlx5: allow jump to current group
I think this is a fix
>
> In
Hi,
> -Original Message-
> From: Bing Zhao
> Sent: Monday, November 13, 2023 2:42 PM
> To: Matan Azrad ; Slava Ovsiienko
> ; Raslan Darawsheh ;
> Suanming Mou ; Ori Kam
> Cc: dev@dpdk.org; Dariusz Sosnowski ;
> sta...@dpdk.org
> Subject: [PATCH] net/mlx5: fix the LACP redirection in Rx d
Hi,
> -Original Message-
> From: Alexander Kozyrev
> Sent: Thursday, October 12, 2023 7:35 PM
> To: dev@dpdk.org
> Cc: sta...@dpdk.org; Suanming Mou ; Slava
> Ovsiienko
> Subject: [PATCH] net/mlx5: fix MPRQ stride size check
>
> We should only check that MPRQ stride size is bigger than t
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
This patchset replaces strtok with strtok_s in app, example
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
This patch adds check in checkpatches.sh for strtok, which
Hi DPDK,
When DPDK is built in debug mode by setting RTE_LOG_DP_LEVEL=RTE_LOG_DEBUG,
l3fwd build fails due to
static inline functions dump_acl4_rule(), dump_acl6_rule() defined in
l3fwd_acl.c are called from l3fwd_acl_scalar.h:l3fwd_acl_send_packets() and
other typo errors as below.
Can I post
https://bugs.dpdk.org/show_bug.cgi?id=1317
Thomas Monjalon (tho...@monjalon.net) changed:
What|Removed |Added
CC||tho...@monjalon.net
https://bugs.dpdk.org/show_bug.cgi?id=1318
Bug ID: 1318
Summary: l3fwd build errors in debug DPDK build with
RTE_LOG_DP_LEVEL=RTE_LOG_DEBUG
Product: DPDK
Version: 23.11
Hardware: All
OS: All
Stat
https://bugs.dpdk.org/show_bug.cgi?id=1319
Bug ID: 1319
Summary: Einsteinhorsemag
Product: DPDK
Version: 23.03
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: Normal
https://bugs.dpdk.org/show_bug.cgi?id=1319
Thomas Monjalon (tho...@monjalon.net) changed:
What|Removed |Added
Status|UNCONFIRMED |RESOLVED
https://bugs.dpdk.org/show_bug.cgi?id=1320
Bug ID: 1320
Summary: ContourCafe
Product: DPDK
Version: 23.07
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: Normal
Comp
From: Xu, HailinX
Sent: Thursday, November 9, 2023 4:34 PM
To: 'Thomas Monjalon' ; dev@dpdk.org
Cc: Kovacevic, Marko ; Mcnamara, John
; Richardson, Bruce ;
Ferruh Yigit
Subject: RE: release candidate 23.11-rc2
> -Original Message-
> From: Thomas Monjalon mailto:tho...@monjalon.net>>
https://bugs.dpdk.org/show_bug.cgi?id=1321
Bug ID: 1321
Summary: Tattoomagz
Product: DPDK
Version: 23.03
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: Normal
Compo
https://bugs.dpdk.org/show_bug.cgi?id=1322
Bug ID: 1322
Summary: Sharetok
Product: DPDK
Version: 22.11
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: Normal
Compone
This patch adds an API to support getting device information.
The driver can use the "rte_vfio_get_device_info" helper to get
device information from EAL.
Cc: sta...@dpdk.org
Signed-off-by: Mingjin Ye
---
lib/eal/include/rte_vfio.h | 26 ++
lib/eal/linux/eal_vfio.c |
When doing IO port mapping for legacy device in secondary process, the
region information is missing, so, we need to refill it.
Fixes: 4b741542ecde ("bus/pci: avoid depending on private kernel value")
Cc: sta...@dpdk.org
Signed-off-by: Mingjin Ye
---
v6:
- split patch
v5:
- adding checks to vf
In EAL related test cases, the allow parameters are not passed to
the secondary process, resulting in unexpected NICs being loaded.
This patch fixes this issue by appending the allow parameters to
the secondary process.
Fixes: af75078fece3 ("first public release")
Cc: sta...@dpdk.org
Signed-off-
From: Suanming Mou
> > > Adding Dariusz Sosnowski as NVIDIA mlx5 maintainer.
> > >
> > > Signed-off-by: Maayan Kashani
> >
> > Welcome, Dariusz
> > Acked-by: Viacheslav Ovsiienko
> Acked-by: Suanming Mou
Welcome Dariusz!
Acked-by: Matan Azrad
This patch adds an API to support getting device information.
The driver can use the "rte_vfio_get_device_info" helper to get
device information from EAL.
Cc: sta...@dpdk.org
Signed-off-by: Mingjin Ye
---
lib/eal/include/rte_vfio.h | 26 ++
lib/eal/linux/eal_vfio.c |
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
This patchset replaces strtok with strtok_s in app, example
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
Multiple threads calling the same function may cause condition
race issues, which often leads to abnormal behavior and can cause
more serious vulnerabilities such as abnormal termination, denial
of service, and compromised data integrity.
The strtok() is non-reentrant, it is better to replace it w
1 - 100 of 257 matches
Mail list logo