From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 202BC41C39 for ; Sat, 11 Feb 2023 21:23:51 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 17F91410EA; Sat, 11 Feb 2023 21:23:51 +0100 (CET) Received: from mail-wm1-f54.google.com (mail-wm1-f54.google.com [209.85.128.54]) by mails.dpdk.org (Postfix) with ESMTP id 99B77410DE for ; Sat, 11 Feb 2023 21:23:50 +0100 (CET) Received: by mail-wm1-f54.google.com with SMTP id n33so149142wms.0 for ; Sat, 11 Feb 2023 12:23:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=OlDiMwaNVAbwwVhGj+p2EdQU2CGmNtEOUB05Py7O6Ks=; b=WPOmF/0TycgtyaSJMtNvQZNYzv0Cme/PfP6q2Hc2gRHpMTTGDM9wtunktmHCunx/r7 DrQynWlUxyyNROjRvOTc+WtV0VU7lsjgZtdYPKuvYd1sB5aZ3uO1Jg/aBt7Wcce7JI8F NYLZRnL3FHXoa/4IuxAol0Qou82qg49soADcz3QX8EeEbY/UNMyr9V8kVVYao87QdTrP Ps9ACvAdCrX1yED7+MyRf5BJQA1EKuEhja5TkAtJRv9zRWL9KkkDUq0sYTdBmkO4pcOk GwXvSvXC2tuCuTOkJJborR8euLqnOYCWvNlYdMggBChy5Ww0M3V8ImqgO4k5zWFjj7pD ssJw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=OlDiMwaNVAbwwVhGj+p2EdQU2CGmNtEOUB05Py7O6Ks=; b=pWfPmaIDBCQ3tft4TFvdi69wcP4wkLIIiuHgaU6rmiCKH7XW/sebYZvWlL7jKZoo0j rlh/yX4uuWFPbvF9l4y5B/tZTdV/+ocIcIQpl4++4NCR+pAJu7VWVD8L7YZU+Er4Vk09 HatBf0/1Y8IemEQsmHTohLeDar05lVQhAL7/ebBhC04fR0p6N0vcsez+o+5hz64+h9yZ 3X0fYYNuBnYz7UHei5LVhLi23VOo0HhRiKrZaP97mKC7PHqk12/SvDPW2NzemLx0zw1D fivDfVGFUnPT3QurUzpsuANSY9RXvzfJKbQS6ErOcdLCf+wMVBLEOPyQVtIG4HqZvGr5 H6SQ== X-Gm-Message-State: AO0yUKW//OBtC9TMBhXCay62r+NP8/mCIDcQAnw6sIsm/ND6jP9/HvXP etzNZirMCbNn991/Jg032lM= X-Google-Smtp-Source: AK7set+ZDCGfab0osF3vKCO+cyjkHsMZ9UzpEMF5ljKcaG1GR3JkNxpJeIirjZHAe35e0LpTZ9PYuA== X-Received: by 2002:a05:600c:3309:b0:3da:b40f:7a55 with SMTP id q9-20020a05600c330900b003dab40f7a55mr1540168wmp.6.1676147030310; Sat, 11 Feb 2023 12:23:50 -0800 (PST) Received: from DESKTOP-KPIMD3E.localdomain ([2407:d000:f:390d:1cc1:7257:e31b:997e]) by smtp.gmail.com with ESMTPSA id t14-20020a05600c198e00b003dff870ce0esm13203117wmq.2.2023.02.11.12.23.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 11 Feb 2023 12:23:50 -0800 (PST) From: Tanzeel-inline To: tanzeelahmed713@gmail.com Cc: David Marchand , stable@dpdk.org, Bruce Richardson Subject: [PATCH v2 1/3] crypto/qat: fix build for generic x86 with GCC 12 Date: Sun, 12 Feb 2023 01:23:44 +0500 Message-Id: <20230211202344.1237-1-tanxeel1.ahmed@gmail.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org From: David Marchand Similar to commit 04361fe2aca8 ("crypto/qat: fix build with GCC 12"). The issue appears when building with the "generic" target we have in devtools/test-meson-builds.sh. Fixes: 3227bc7138f5 ("crypto/qat: use intel-ipsec-mb for partial hash and AES") Cc: stable@dpdk.org Signed-off-by: David Marchand Tested-by: Bruce Richardson --- drivers/crypto/qat/qat_sym_session.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/crypto/qat/qat_sym_session.c b/drivers/crypto/qat/qat_sym_session.c index 978ee49dce..622a3120f8 100644 --- a/drivers/crypto/qat/qat_sym_session.c +++ b/drivers/crypto/qat/qat_sym_session.c @@ -1366,6 +1366,8 @@ static int qat_sym_do_precomputes_ipsec_mb(enum icp_qat_hw_auth_algo hash_alg, /* init ipad and opad from key and xor with fixed values */ memset(ipad, 0, block_size); memset(opad, 0, block_size); + RTE_VERIFY(auth_keylen <= sizeof(ipad)); + RTE_VERIFY(auth_keylen <= sizeof(opad)); rte_memcpy(ipad, auth_key, auth_keylen); rte_memcpy(opad, auth_key, auth_keylen); -- 2.34.1