From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 1DE8BA0C41 for ; Tue, 30 Nov 2021 17:36:40 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 16B5A410F7; Tue, 30 Nov 2021 17:36:40 +0100 (CET) Received: from smtp-relay-internal-0.canonical.com (smtp-relay-internal-0.canonical.com [185.125.188.122]) by mails.dpdk.org (Postfix) with ESMTP id EA95441177 for ; Tue, 30 Nov 2021 17:36:38 +0100 (CET) Received: from mail-ed1-f70.google.com (mail-ed1-f70.google.com [209.85.208.70]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id C23883F1B1 for ; Tue, 30 Nov 2021 16:36:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1638290197; bh=wwCmnlu+8clnzAwrte4viCae5OjqUGrTpTXz1fF3SdM=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=M3p/NfbS2fRRjcypdxj6Z1ID/vqncYZOC+lAG3Ijqf6uF4m+Ka7HVJEccWVLw4Ydy CDJvBqjE6SvTLsr4rtgaX8Na6Q+8rz4rMKDOZ/q3SOAPD0nHL9NRqoUp7pyLxMnJql 69IHusjZmSHGUx4bBaGZRRd9po2YM58Bs0VKj5vv+Igo/tesXjGVX3bCrstJzaNe+q OOI6gjEinSe9cz+mr50gCpqjXz2kzweofFrJupWPJmihExV+5gBOyPvchDYqxOfPMK 0usWX7y7zlx7QatAHFVQa5FWQSbTuJt2eQj+8u+00POnUrmIl2Sc2x45vfi3GlBcSz yvCyYeslFWVZA== Received: by mail-ed1-f70.google.com with SMTP id a3-20020a05640213c300b003e7d12bb925so17537849edx.9 for ; Tue, 30 Nov 2021 08:36:37 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=wwCmnlu+8clnzAwrte4viCae5OjqUGrTpTXz1fF3SdM=; b=ojNKf+VUmI3jhusVaC8hxLBMxjq9Jx5KkrsCRfIJNPFUEz0fLpMtoDpWAfVG1cSJ1B Hl0PEB7dHBYEpXyIjaUe3dJVX3FcNEjL1QrRwuWaeUTz0/M3XAl2JsrrKjLmTKu5AsXM ILbdltCwE+yn2TdgDetEXveJMW3VcRNWWNJAmGldN389Y4wWdYMu97ExNR9KXORlETSR 9JouLUI5bN5WGOWbL02lW/FH+V8d0foasjVef6LRtJSQoS/KAdCBk8aSkUePN8x32xgU U/AbuhMaFj+DLQEDkru3c6JMgV/HfHtJb0pM75QAwXDU3bvn2vMvoD8kN9350IKd2Al6 F73A== X-Gm-Message-State: AOAM530AZItlQycX0rw6OcvmrreGWaCkhXToNOS0E5/deutY8aq2jlK1 blpZpCjTI/V7ffHdfSSM6N9S/5AeJap6UHMmj3OfnXqBYHN1D5VC5mdE2C/ySnggtu9YSc0v5jf mQD5U9G9UD/qRAoEhcC15TWCp X-Received: by 2002:a17:906:2c47:: with SMTP id f7mr252881ejh.94.1638290197282; Tue, 30 Nov 2021 08:36:37 -0800 (PST) X-Google-Smtp-Source: ABdhPJweTq9QYj8GLXv7AUF5I64OxPYGQuz+L5CrWj11xpsly9uYmiDFl56JnBVlm+wO0CtOT+ZNGw== X-Received: by 2002:a17:906:2c47:: with SMTP id f7mr252860ejh.94.1638290197100; Tue, 30 Nov 2021 08:36:37 -0800 (PST) Received: from localhost.localdomain ([2001:67c:1560:8007::aac:c4ad]) by smtp.gmail.com with ESMTPSA id e13sm9224302eje.95.2021.11.30.08.36.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Nov 2021 08:36:36 -0800 (PST) From: christian.ehrhardt@canonical.com To: David Christensen Cc: dpdk stable Subject: patch 'eal/ppc: ignore GCC 10 stringop-overflow warnings' has been queued to stable release 19.11.11 Date: Tue, 30 Nov 2021 17:33:34 +0100 Message-Id: <20211130163605.2460997-10-christian.ehrhardt@canonical.com> X-Mailer: git-send-email 2.34.0 In-Reply-To: <20211130163605.2460997-1-christian.ehrhardt@canonical.com> References: <20211130163605.2460997-1-christian.ehrhardt@canonical.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 19.11.11 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before December 10th 2021. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/cpaelzer/dpdk-stable-queue This queued commit can be viewed at: https://github.com/cpaelzer/dpdk-stable-queue/commit/4990929c60fec6666e4b5891d01f5b555e7a443d Thanks. Christian Ehrhardt --- >From 4990929c60fec6666e4b5891d01f5b555e7a443d Mon Sep 17 00:00:00 2001 From: David Christensen Date: Thu, 2 Sep 2021 15:15:14 -0700 Subject: [PATCH] eal/ppc: ignore GCC 10 stringop-overflow warnings [ upstream commit c13e6177394365d4db1595ea038bd9c3de04d32f ] Suppress gcc warning "warning: writing 16 bytes into a region of size 0" for users of the POWER rte_memcpy() function. Existing rte_memcpy() code takes different code paths based on the actual size of the move so the warning is already addressed. See also commit b5b3ea803e47 ("eal/x86: ignore gcc 10 stringop-overflow warnings") Signed-off-by: David Christensen --- .../common/include/arch/ppc_64/rte_memcpy.h | 15 ++++++++++++--- 1 file changed, 12 insertions(+), 3 deletions(-) diff --git a/lib/librte_eal/common/include/arch/ppc_64/rte_memcpy.h b/lib/librte_eal/common/include/arch/ppc_64/rte_memcpy.h index e63a1211a8..10ed5159af 100644 --- a/lib/librte_eal/common/include/arch/ppc_64/rte_memcpy.h +++ b/lib/librte_eal/common/include/arch/ppc_64/rte_memcpy.h @@ -1,6 +1,6 @@ /* * SPDX-License-Identifier: BSD-3-Clause - * Copyright (C) IBM Corporation 2014. + * Copyright (C) IBM Corporation 2014,2021 */ #ifndef _RTE_MEMCPY_PPC_64_H_ @@ -19,11 +19,16 @@ extern "C" { #include "generic/rte_memcpy.h" -#if (GCC_VERSION >= 90000 && GCC_VERSION < 90400) +#if defined(RTE_TOOLCHAIN_GCC) && (GCC_VERSION >= 90000) #pragma GCC diagnostic push #pragma GCC diagnostic ignored "-Warray-bounds" #endif +#if defined(RTE_TOOLCHAIN_GCC) && (GCC_VERSION >= 100000) +#pragma GCC diagnostic push +#pragma GCC diagnostic ignored "-Wstringop-overflow" +#endif + static inline void rte_mov16(uint8_t *dst, const uint8_t *src) { @@ -199,7 +204,11 @@ rte_memcpy_func(void *dst, const void *src, size_t n) return ret; } -#if (GCC_VERSION >= 90000 && GCC_VERSION < 90400) +#if defined(RTE_TOOLCHAIN_GCC) && (GCC_VERSION >= 100000) +#pragma GCC diagnostic pop +#endif + +#if defined(RTE_TOOLCHAIN_GCC) && (GCC_VERSION >= 90000) #pragma GCC diagnostic pop #endif -- 2.34.0 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2021-11-30 16:50:06.735658011 +0100 +++ 0010-eal-ppc-ignore-GCC-10-stringop-overflow-warnings.patch 2021-11-30 16:50:05.514871505 +0100 @@ -1 +1 @@ -From c13e6177394365d4db1595ea038bd9c3de04d32f Mon Sep 17 00:00:00 2001 +From 4990929c60fec6666e4b5891d01f5b555e7a443d Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit c13e6177394365d4db1595ea038bd9c3de04d32f ] + @@ -12,2 +13,0 @@ -Cc: stable@dpdk.org - @@ -16 +16 @@ - lib/eal/ppc/include/rte_memcpy.h | 15 ++++++++++++--- + .../common/include/arch/ppc_64/rte_memcpy.h | 15 ++++++++++++--- @@ -19,4 +19,4 @@ -diff --git a/lib/eal/ppc/include/rte_memcpy.h b/lib/eal/ppc/include/rte_memcpy.h -index c2a1f356d5..6f388c0234 100644 ---- a/lib/eal/ppc/include/rte_memcpy.h -+++ b/lib/eal/ppc/include/rte_memcpy.h +diff --git a/lib/librte_eal/common/include/arch/ppc_64/rte_memcpy.h b/lib/librte_eal/common/include/arch/ppc_64/rte_memcpy.h +index e63a1211a8..10ed5159af 100644 +--- a/lib/librte_eal/common/include/arch/ppc_64/rte_memcpy.h ++++ b/lib/librte_eal/common/include/arch/ppc_64/rte_memcpy.h @@ -31 +31 @@ -@@ -18,11 +18,16 @@ extern "C" { +@@ -19,11 +19,16 @@ extern "C" { @@ -49 +49 @@ -@@ -198,7 +203,11 @@ rte_memcpy_func(void *dst, const void *src, size_t n) +@@ -199,7 +204,11 @@ rte_memcpy_func(void *dst, const void *src, size_t n)