[Bug 1317] Fashionhikes

2023-11-14 Thread bugzilla
https://bugs.dpdk.org/show_bug.cgi?id=1317 Bug ID: 1317 Summary: Fashionhikes Product: DPDK Version: 22.11 Hardware: All OS: All Status: UNCONFIRMED Severity: normal Priority: Normal Com

[PATCH] raw/cnxk_bphy: switch to dynamic logging

2023-11-14 Thread Tomasz Duszynski
Dynamically allocated log type is a standard approach among all drivers. Switch to it. Signed-off-by: Tomasz Duszynski --- drivers/raw/cnxk_bphy/cnxk_bphy.c | 32 +- drivers/raw/cnxk_bphy/cnxk_bphy_cgx.c | 4 ++- drivers/raw/cnxk_bphy/cnxk_bphy_cgx.h | 7

RE: [PATCH] net/mlx5/hws: fix typo in the log

2023-11-14 Thread Raslan Darawsheh
Hi, > -Original Message- > From: Bing Zhao > Sent: Monday, November 13, 2023 9:21 AM > To: Matan Azrad ; Slava Ovsiienko > ; Raslan Darawsheh ; > Suanming Mou ; Ori Kam > Cc: dev@dpdk.org; Erez Shitrit ; sta...@dpdk.org > Subject: [PATCH] net/mlx5/hws: fix typo in the log > > Change "c

RE: [PATCH] net/mlx5: fix shared Rx queue list management

2023-11-14 Thread Raslan Darawsheh
Hi, > -Original Message- > From: Bing Zhao > Sent: Monday, November 13, 2023 9:25 AM > To: Matan Azrad ; Slava Ovsiienko > ; Raslan Darawsheh ; > Suanming Mou ; Ori Kam > Cc: dev@dpdk.org; Xueming(Steven) Li ; > sta...@dpdk.org > Subject: [PATCH] net/mlx5: fix shared Rx queue list manage

RE: [PATCH] net/mlx5: zero encap UDP csum for IPv4 too

2023-11-14 Thread Raslan Darawsheh
Hi, > -Original Message- > From: Bing Zhao > Sent: Monday, November 13, 2023 9:30 AM > To: Matan Azrad ; Slava Ovsiienko > ; Raslan Darawsheh ; > Suanming Mou ; Ori Kam > Cc: dev@dpdk.org; Eli Britstein ; sta...@dpdk.org > Subject: [PATCH] net/mlx5: zero encap UDP csum for IPv4 too > >

[PATCH 05/43] node: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- lib/node/kernel_tx.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/node/kernel

[PATCH 03/43] eventdev: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- lib/eventdev/rte_event_eth_rx_adapter.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --gi

[PATCH 06/43] pdump: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- lib/pdump/rte_pdump.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lib/pdum

[PATCH 01/43] devtools: forbid use of strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. rte_strerror() has been provided in DPDK to replace it. Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- devtools/checkpatches.sh | 8 1 file changed, 8 insertions(+) diff --git a/devtools/checkpatches.sh b/dev

[PATCH 00/43] replace strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This series of patches fix it. In this patchset, only the libs and drivers are modified. Dengdui Huang (43): devtools: forbid use of strerror eal: use rte strerror eventdev: use rte strerror latency: use rte strerror node

[PATCH 04/43] latency: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- lib/latencystats/rte_latencystats.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --gi

[PATCH 08/43] telemetry: replace strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses strerror_r() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- lib/telemetry/telemetry.c| 28 ++-- lib/telemetry/telemetry_legacy.c | 5

[PATCH 07/43] power: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- lib/power/guest_channel.c| 7 --- lib/power/power_kvm_vm.c | 3 ++- lib/power/power_

[PATCH 10/43] bpf: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- lib/bpf/bpf_load_elf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/bpf/bpf_l

[PATCH 12/43] bus/dpaa: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/bus/dpaa/base/fman/fman.c | 2 +- drivers/bus/dpaa/dpaa_bus.c | 2 +- 2 files changed, 2 i

[PATCH 09/43] vhost: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- lib/vhost/socket.c | 13 +++-- lib/vhost/vduse.c | 30 +++--- l

[PATCH 02/43] eal: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- lib/eal/common/eal_common_fbarray.c | 2 +- lib/eal/common/eal_common_options.c | 7 ++-- lib/

[PATCH 11/43] bus/cdx: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/bus/cdx/cdx.c | 2 +- drivers/bus/cdx/cdx_vfio.c | 13 +++-- 2 files changed, 8 in

[PATCH 13/43] bus/fslmc: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/bus/fslmc/fslmc_vfio.c | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) diff

[PATCH 15/43] bus/vdev: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/bus/vdev/vdev.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/bus/

[PATCH 16/43] bus/vmbus: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/bus/vmbus/linux/vmbus_bus.c | 7 --- drivers/bus/vmbus/linux/vmbus_uio.c | 21 +++

[PATCH 14/43] bus/pci: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/bus/pci/bsd/pci.c| 8 drivers/bus/pci/linux/pci.c | 7 --- drivers/b

[PATCH 17/43] common/cnxk: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/common/cnxk/roc_dev.c | 4 +++- drivers/common/cnxk/roc_model.c | 4 +++- drivers/common/cnxk/

[PATCH 18/43] common/mlx5: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/common/mlx5/linux/mlx5_nl.c | 12 ++-- drivers/common/mlx5/mlx5_common.c| 6 +++---

[PATCH 20/43] dma/idxd: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/dma/idxd/idxd_bus.c | 14 +++--- 1 file changed, 7 insertions(+), 7 deletions(-) diff -

[PATCH 19/43] crypto/caam_jr: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/crypto/caam_jr/caam_jr_uio.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --

[PATCH 21/43] net/af_packet: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/af_packet/rte_eth_af_packet.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --

[PATCH 27/43] net/enetfec: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/enetfec/enet_uio.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drive

[PATCH 23/43] net/af_xdp: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/af_xdp/rte_eth_af_xdp.c | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-)

[PATCH 26/43] net/dpaa2: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/dpaa2/dpaa2_ethdev.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a

[PATCH 25/43] net/dpaa: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/dpaa/dpaa_ethdev.c | 4 ++-- drivers/net/dpaa/fmlib/fm_lib.c | 6 +++--- 2 files changed, 5

[PATCH 30/43] net/ice: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/ice/ice_testpmd.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/dr

[PATCH 28/43] net/failsafe: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/failsafe/failsafe.c | 8 drivers/net/failsafe/failsafe_args.c| 4 ++--

[PATCH 29/43] net/i40e: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/i40e/i40e_testpmd.c | 42 - 1 file changed, 21 insertions(+)

[PATCH 24/43] net/bonding: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/bonding/bonding_testpmd.c | 4 ++-- drivers/net/bonding/rte_eth_bond_api.c | 2 +- driver

[PATCH 31/43] net/ixgbe: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/ixgbe/ixgbe_testpmd.c | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) di

[PATCH 32/43] net/memif: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/memif/memif_socket.c | 4 ++-- drivers/net/memif/rte_eth_memif.c | 20 ++--

[PATCH 35/43] net/qede: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/qede/qede_regs.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/dri

[PATCH 36/43] net/sfc: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/sfc/sfc_flow.c| 2 +- drivers/net/sfc/sfc_flow_tunnel.c | 2 +- drivers/net/sfc/sf

[PATCH 33/43] net/mlx4: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/mlx4/mlx4.c| 14 +++--- drivers/net/mlx4/mlx4_ethdev.c | 18 +---

[PATCH 22/43] net/bnxt: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/bnxt/bnxt_stats.c | 2 +- drivers/net/bnxt/rte_pmd_bnxt.c |

[PATCH 38/43] net/vhost: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/vhost/rte_eth_vhost.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --gi

[PATCH 40/43] raw/ifpga: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/raw/ifpga/afu_pmd_n3000.c | 5 +++-- drivers/raw/ifpga/base/ifpga_fme_rsu.c | 12 +++--

[PATCH 34/43] net/mlx5: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/mlx5/hws/mlx5dr_matcher.c | 2 +- drivers/net/mlx5/linux/mlx5_ethdev_os.c | 20 ++

[PATCH 37/43] net/tap: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/tap/rte_eth_tap.c | 26 +- drivers/net/tap/tap_flow.c| 18 ++

[PATCH 39/43] net/virtio: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/net/virtio/virtio_user/vhost_kernel.c | 8 +++--- .../net/virtio/virtio_user/vhost_kernel_tap.c

[PATCH 43/43] vdpa/sfc: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/vdpa/sfc/sfc_vdpa_ops.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git

[PATCH 42/43] vdpa/mlx5: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/vdpa/mlx5/mlx5_vdpa_virtq.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/

[PATCH 41/43] vdpa/ifc: use rte strerror

2023-11-14 Thread Dengdui Huang
The function strerror() is insecure in a multi-thread environment. This patch uses rte_strerror() to replace it. Cc: sta...@dpdk.org Signed-off-by: Dengdui Huang Acked-by: Chengwen Feng --- drivers/vdpa/ifc/ifcvf_vdpa.c | 23 --- 1 file changed, 12 insertions(+), 11 deletio

RE: Question about loop unrolling in rte_ring datastructure.

2023-11-14 Thread Morten Brørup
> From: Aditya Ambadipudi [mailto:aditya.ambadip...@arm.com] > Sent: Monday, 13 November 2023 19.15 > > Hello all. > > My name is Aditya Ambadipudi. I am not the sharpest tool in the shed. > > I was reading through the rte_ring datastructure. And I have two questions > about the optimizations

RE: [PATCH] net/mlx5: allow jump to current group

2023-11-14 Thread Raslan Darawsheh
Hi Michael, > -Original Message- > From: Michael Baum > Sent: Monday, November 13, 2023 12:44 PM > To: dev@dpdk.org > Cc: Matan Azrad ; Raslan Darawsheh > ; Slava Ovsiienko ; Ori Kam > ; Suanming Mou > Subject: [PATCH] net/mlx5: allow jump to current group I think this is a fix > > In

RE: [PATCH] net/mlx5: fix the LACP redirection in Rx domain

2023-11-14 Thread Raslan Darawsheh
Hi, > -Original Message- > From: Bing Zhao > Sent: Monday, November 13, 2023 2:42 PM > To: Matan Azrad ; Slava Ovsiienko > ; Raslan Darawsheh ; > Suanming Mou ; Ori Kam > Cc: dev@dpdk.org; Dariusz Sosnowski ; > sta...@dpdk.org > Subject: [PATCH] net/mlx5: fix the LACP redirection in Rx d

RE: [PATCH] net/mlx5: fix MPRQ stride size check

2023-11-14 Thread Raslan Darawsheh
Hi, > -Original Message- > From: Alexander Kozyrev > Sent: Thursday, October 12, 2023 7:35 PM > To: dev@dpdk.org > Cc: sta...@dpdk.org; Suanming Mou ; Slava > Ovsiienko > Subject: [PATCH] net/mlx5: fix MPRQ stride size check > > We should only check that MPRQ stride size is bigger than t

[PATCH v2 01/22] app/graph: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 00/22] replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. This patchset replaces strtok with strtok_s in app, example

[PATCH v2 02/22] app/bbdev: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 03/22] app/compress-perf: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 04/22] app/crypto-perf: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 06/22] app/test-fib: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 05/22] app/dma-perf: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 07/22] app/flow-perf: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 09/22] dmadev: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 08/22] app/test-mldev: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 10/22] eal: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 11/22] ethdev: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 12/22] eventdev: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 13/22] security: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 15/22] bus/fslmc: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 14/22] telemetry: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 16/22] common/cnxk: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 17/22] event/cnxk: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 18/22] net/ark: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 19/22] raw/cnxk_gpio: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 21/22] examples/vhost: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 20/22] examples/l2fwd-crypto: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v2 22/22] devtools: check for some reentrant function

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. This patch adds check in checkpatches.sh for strtok, which

l3fwd build errors in debug DPDK build with RTE_LOG_DP_LEVEL=RTE_LOG_DEBUG

2023-11-14 Thread Kundapura, Ganapati
Hi DPDK, When DPDK is built in debug mode by setting RTE_LOG_DP_LEVEL=RTE_LOG_DEBUG, l3fwd build fails due to static inline functions dump_acl4_rule(), dump_acl6_rule() defined in l3fwd_acl.c are called from l3fwd_acl_scalar.h:l3fwd_acl_send_packets() and other typo errors as below. Can I post

[Bug 1317] Fashionhikes

2023-11-14 Thread bugzilla
https://bugs.dpdk.org/show_bug.cgi?id=1317 Thomas Monjalon (tho...@monjalon.net) changed: What|Removed |Added CC||tho...@monjalon.net

[Bug 1318] l3fwd build errors in debug DPDK build with RTE_LOG_DP_LEVEL=RTE_LOG_DEBUG

2023-11-14 Thread bugzilla
https://bugs.dpdk.org/show_bug.cgi?id=1318 Bug ID: 1318 Summary: l3fwd build errors in debug DPDK build with RTE_LOG_DP_LEVEL=RTE_LOG_DEBUG Product: DPDK Version: 23.11 Hardware: All OS: All Stat

[Bug 1319] Einsteinhorsemag

2023-11-14 Thread bugzilla
https://bugs.dpdk.org/show_bug.cgi?id=1319 Bug ID: 1319 Summary: Einsteinhorsemag Product: DPDK Version: 23.03 Hardware: All OS: All Status: UNCONFIRMED Severity: normal Priority: Normal

[Bug 1319] Einsteinhorsemag

2023-11-14 Thread bugzilla
https://bugs.dpdk.org/show_bug.cgi?id=1319 Thomas Monjalon (tho...@monjalon.net) changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED

[Bug 1320] ContourCafe

2023-11-14 Thread bugzilla
https://bugs.dpdk.org/show_bug.cgi?id=1320 Bug ID: 1320 Summary: ContourCafe Product: DPDK Version: 23.07 Hardware: All OS: All Status: UNCONFIRMED Severity: normal Priority: Normal Comp

RE: release candidate 23.11-rc2

2023-11-14 Thread Xu, HailinX
From: Xu, HailinX Sent: Thursday, November 9, 2023 4:34 PM To: 'Thomas Monjalon' ; dev@dpdk.org Cc: Kovacevic, Marko ; Mcnamara, John ; Richardson, Bruce ; Ferruh Yigit Subject: RE: release candidate 23.11-rc2 > -Original Message- > From: Thomas Monjalon mailto:tho...@monjalon.net>>

[Bug 1321] Tattoomagz

2023-11-14 Thread bugzilla
https://bugs.dpdk.org/show_bug.cgi?id=1321 Bug ID: 1321 Summary: Tattoomagz Product: DPDK Version: 23.03 Hardware: All OS: All Status: UNCONFIRMED Severity: normal Priority: Normal Compo

[Bug 1322] Sharetok

2023-11-14 Thread bugzilla
https://bugs.dpdk.org/show_bug.cgi?id=1322 Bug ID: 1322 Summary: Sharetok Product: DPDK Version: 22.11 Hardware: All OS: All Status: UNCONFIRMED Severity: normal Priority: Normal Compone

[PATCH] vfio: add get device info API

2023-11-14 Thread Mingjin Ye
This patch adds an API to support getting device information. The driver can use the "rte_vfio_get_device_info" helper to get device information from EAL. Cc: sta...@dpdk.org Signed-off-by: Mingjin Ye --- lib/eal/include/rte_vfio.h | 26 ++ lib/eal/linux/eal_vfio.c |

[PATCH v6] bus/pci: fix legacy device IO port map

2023-11-14 Thread Mingjin Ye
When doing IO port mapping for legacy device in secondary process, the region information is missing, so, we need to refill it. Fixes: 4b741542ecde ("bus/pci: avoid depending on private kernel value") Cc: sta...@dpdk.org Signed-off-by: Mingjin Ye --- v6: - split patch v5: - adding checks to vf

[PATCH v7] app/test: secondary process passes allow parameters

2023-11-14 Thread Mingjin Ye
In EAL related test cases, the allow parameters are not passed to the secondary process, resulting in unexpected NICs being loaded. This patch fixes this issue by appending the allow parameters to the secondary process. Fixes: af75078fece3 ("first public release") Cc: sta...@dpdk.org Signed-off-

RE: [PATCH] maintainers: Adding new maintainer to Nvidia mlx5

2023-11-14 Thread Matan Azrad
From: Suanming Mou > > > Adding Dariusz Sosnowski as NVIDIA mlx5 maintainer. > > > > > > Signed-off-by: Maayan Kashani > > > > Welcome, Dariusz > > Acked-by: Viacheslav Ovsiienko > Acked-by: Suanming Mou Welcome Dariusz! Acked-by: Matan Azrad

[PATCH] vfio: add get device info API

2023-11-14 Thread Mingjin Ye
This patch adds an API to support getting device information. The driver can use the "rte_vfio_get_device_info" helper to get device information from EAL. Cc: sta...@dpdk.org Signed-off-by: Mingjin Ye --- lib/eal/include/rte_vfio.h | 26 ++ lib/eal/linux/eal_vfio.c |

[PATCH v3 00/22] replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. This patchset replaces strtok with strtok_s in app, example

[PATCH v3 01/22] app/graph: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v3 05/22] app/dma-perf: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v3 06/22] app/test-fib: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v3 03/22] app/compress-perf: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v3 02/22] app/bbdev: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v3 04/22] app/crypto-perf: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v3 08/22] app/test-mldev: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v3 07/22] app/flow-perf: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

[PATCH v3 09/22] dmadev: replace strtok with reentrant version

2023-11-14 Thread Jie Hai
Multiple threads calling the same function may cause condition race issues, which often leads to abnormal behavior and can cause more serious vulnerabilities such as abnormal termination, denial of service, and compromised data integrity. The strtok() is non-reentrant, it is better to replace it w

  1   2   3   >