patches for DPDK stable branches
 help / color / mirror / Atom feed
From: Kevin Traynor <ktraynor@redhat.com>
To: David Marchand <david.marchand@redhat.com>
Cc: Sunil Uttarwar <sunilprakashrao.uttarwar@amd.com>,
	dpdk stable <stable@dpdk.org>
Subject: patch 'crypto/ccp: fix IOVA handling' has been queued to stable release 21.11.4
Date: Thu, 23 Feb 2023 15:05:21 +0000	[thread overview]
Message-ID: <20230223150631.723699-30-ktraynor@redhat.com> (raw)
In-Reply-To: <20230223150631.723699-1-ktraynor@redhat.com>

Hi,

FYI, your patch has been queued to stable release 21.11.4

Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet.
It will be pushed if I get no objections before 02/28/23. So please
shout if anyone has objections.

Also note that after the patch there's a diff of the upstream commit vs the
patch applied to the branch. This will indicate if there was any rebasing
needed to apply to the stable branch. If there were code changes for rebasing
(ie: not only metadata diffs), please double check that the rebase was
correctly done.

Queued patches are on a temporary branch at:
https://github.com/kevintraynor/dpdk-stable

This queued commit can be viewed at:
https://github.com/kevintraynor/dpdk-stable/commit/b2c5b2d8a87130ea095a1b202460927caf0d4d82

Thanks.

Kevin

---
From b2c5b2d8a87130ea095a1b202460927caf0d4d82 Mon Sep 17 00:00:00 2001
From: David Marchand <david.marchand@redhat.com>
Date: Tue, 4 Oct 2022 11:51:31 +0200
Subject: [PATCH] crypto/ccp: fix IOVA handling

[ upstream commit 9631fb8f10dfafb0547fbf9127b162e62b2bef43 ]

Using IOVA or physical addresses is something that the user (via
--iova-mode=) or the bus code decides.

The crypto/ccp PCI driver should only use rte_mem_virt2iova.
It should not try to decide what to use solely based on the kmod
the PCI device is bound to.

While at it, the global variable sha_ctx looks unsafe and unneeded.
Remove it.

Fixes: 09a0fd736a08 ("crypto/ccp: enable IOMMU")

Signed-off-by: David Marchand <david.marchand@redhat.com>
Acked-by: Sunil Uttarwar <sunilprakashrao.uttarwar@amd.com>
---
 drivers/crypto/ccp/ccp_crypto.c  | 105 ++++++-------------------------
 drivers/crypto/ccp/ccp_dev.c     |   9 +--
 drivers/crypto/ccp/ccp_pci.c     |  34 ----------
 drivers/crypto/ccp/ccp_pci.h     |   3 -
 drivers/crypto/ccp/rte_ccp_pmd.c |   3 -
 5 files changed, 19 insertions(+), 135 deletions(-)

diff --git a/drivers/crypto/ccp/ccp_crypto.c b/drivers/crypto/ccp/ccp_crypto.c
index 4bab18323b..351d8ac63e 100644
--- a/drivers/crypto/ccp/ccp_crypto.c
+++ b/drivers/crypto/ccp/ccp_crypto.c
@@ -34,6 +34,4 @@
 #include <openssl/hmac.h>
 
-extern int iommu_mode;
-void *sha_ctx;
 /* SHA initial context values */
 uint32_t ccp_sha1_init[SHA_COMMON_DIGEST_SIZE / sizeof(uint32_t)] = {
@@ -749,11 +747,6 @@ ccp_configure_session_cipher(struct ccp_session *sess,
 		return -ENOTSUP;
 	}
-	if (iommu_mode == 2) {
-		sess->cipher.nonce_phys = rte_mem_virt2iova(sess->cipher.nonce);
-		sess->cipher.key_phys = rte_mem_virt2iova(sess->cipher.key_ccp);
-	} else {
-		sess->cipher.nonce_phys = rte_mem_virt2phy(sess->cipher.nonce);
-		sess->cipher.key_phys = rte_mem_virt2phy(sess->cipher.key_ccp);
-	}
+	sess->cipher.nonce_phys = rte_mem_virt2iova(sess->cipher.nonce);
+	sess->cipher.key_phys = rte_mem_virt2iova(sess->cipher.key_ccp);
 	return 0;
 }
@@ -794,5 +787,4 @@ ccp_configure_session_auth(struct ccp_session *sess,
 		sess->auth.ctx_len = CCP_SB_BYTES;
 		sess->auth.offset = CCP_SB_BYTES - SHA1_DIGEST_SIZE;
-		rte_memcpy(sha_ctx, sess->auth.ctx, SHA_COMMON_DIGEST_SIZE);
 		break;
 	case RTE_CRYPTO_AUTH_SHA1_HMAC:
@@ -833,5 +825,4 @@ ccp_configure_session_auth(struct ccp_session *sess,
 		sess->auth.ctx_len = CCP_SB_BYTES;
 		sess->auth.offset = CCP_SB_BYTES - SHA224_DIGEST_SIZE;
-		rte_memcpy(sha_ctx, sess->auth.ctx, SHA256_DIGEST_SIZE);
 		break;
 	case RTE_CRYPTO_AUTH_SHA224_HMAC:
@@ -896,5 +887,4 @@ ccp_configure_session_auth(struct ccp_session *sess,
 		sess->auth.ctx_len = CCP_SB_BYTES;
 		sess->auth.offset = CCP_SB_BYTES - SHA256_DIGEST_SIZE;
-		rte_memcpy(sha_ctx, sess->auth.ctx, SHA256_DIGEST_SIZE);
 		break;
 	case RTE_CRYPTO_AUTH_SHA256_HMAC:
@@ -959,5 +949,4 @@ ccp_configure_session_auth(struct ccp_session *sess,
 		sess->auth.ctx_len = CCP_SB_BYTES << 1;
 		sess->auth.offset = (CCP_SB_BYTES << 1) - SHA384_DIGEST_SIZE;
-		rte_memcpy(sha_ctx, sess->auth.ctx, SHA512_DIGEST_SIZE);
 		break;
 	case RTE_CRYPTO_AUTH_SHA384_HMAC:
@@ -1024,5 +1013,4 @@ ccp_configure_session_auth(struct ccp_session *sess,
 		sess->auth.ctx_len = CCP_SB_BYTES << 1;
 		sess->auth.offset = (CCP_SB_BYTES << 1) - SHA512_DIGEST_SIZE;
-		rte_memcpy(sha_ctx, sess->auth.ctx, SHA512_DIGEST_SIZE);
 		break;
 	case RTE_CRYPTO_AUTH_SHA512_HMAC:
@@ -1174,11 +1162,6 @@ ccp_configure_session_aead(struct ccp_session *sess,
 		return -ENOTSUP;
 	}
-	if (iommu_mode == 2) {
-		sess->cipher.nonce_phys = rte_mem_virt2iova(sess->cipher.nonce);
-		sess->cipher.key_phys = rte_mem_virt2iova(sess->cipher.key_ccp);
-	} else {
-		sess->cipher.nonce_phys = rte_mem_virt2phy(sess->cipher.nonce);
-		sess->cipher.key_phys = rte_mem_virt2phy(sess->cipher.key_ccp);
-	}
+	sess->cipher.nonce_phys = rte_mem_virt2iova(sess->cipher.nonce);
+	sess->cipher.key_phys = rte_mem_virt2iova(sess->cipher.key_ccp);
 	return 0;
 }
@@ -1595,12 +1578,6 @@ ccp_perform_hmac(struct rte_crypto_op *op,
 	append_ptr = (void *)rte_pktmbuf_append(op->sym->m_src,
 						session->auth.ctx_len);
-	if (iommu_mode == 2) {
-		dest_addr = (phys_addr_t)rte_mem_virt2iova(append_ptr);
-		pst.src_addr = (phys_addr_t)rte_mem_virt2iova((void *)addr);
-	} else {
-		dest_addr = (phys_addr_t)rte_mem_virt2phy(append_ptr);
-		pst.src_addr = (phys_addr_t)rte_mem_virt2phy((void *)addr);
-	}
-	dest_addr_t = dest_addr;
+	dest_addr_t = dest_addr = (phys_addr_t)rte_mem_virt2iova(append_ptr);
+	pst.src_addr = (phys_addr_t)rte_mem_virt2iova((void *)addr);
 
 	/** Load PHash1 to LSB*/
@@ -1684,8 +1661,5 @@ ccp_perform_hmac(struct rte_crypto_op *op,
 	/** Load PHash2 to LSB*/
 	addr += session->auth.ctx_len;
-	if (iommu_mode == 2)
-		pst.src_addr = (phys_addr_t)rte_mem_virt2iova((void *)addr);
-	else
-		pst.src_addr = (phys_addr_t)rte_mem_virt2phy((void *)addr);
+	pst.src_addr = (phys_addr_t)rte_mem_virt2iova((void *)addr);
 	pst.dest_addr = (phys_addr_t)(cmd_q->sb_sha * CCP_SB_BYTES);
 	pst.len = session->auth.ctx_len;
@@ -1775,12 +1749,6 @@ ccp_perform_sha(struct rte_crypto_op *op,
 	append_ptr = (void *)rte_pktmbuf_append(op->sym->m_src,
 						session->auth.ctx_len);
-	if (iommu_mode == 2) {
-		dest_addr = (phys_addr_t)rte_mem_virt2iova(append_ptr);
-		pst.src_addr = (phys_addr_t)sha_ctx;
-	} else {
-		dest_addr = (phys_addr_t)rte_mem_virt2phy(append_ptr);
-		pst.src_addr = (phys_addr_t)rte_mem_virt2phy((void *)
-						     session->auth.ctx);
-	}
+	pst.src_addr = (phys_addr_t)rte_mem_virt2iova((void *)session->auth.ctx);
+	dest_addr = (phys_addr_t)rte_mem_virt2iova(append_ptr);
 
 	/** Passthru sha context*/
@@ -1872,13 +1840,6 @@ ccp_perform_sha3_hmac(struct rte_crypto_op *op,
 		return -1;
 	}
-	if (iommu_mode == 2) {
-		dest_addr = (phys_addr_t)rte_mem_virt2iova((void *)append_ptr);
-		ctx_paddr = (phys_addr_t)rte_mem_virt2iova(
-					session->auth.pre_compute);
-	} else {
-		dest_addr = (phys_addr_t)rte_mem_virt2phy((void *)append_ptr);
-		ctx_paddr = (phys_addr_t)rte_mem_virt2phy(
-					session->auth.pre_compute);
-	}
+	dest_addr = (phys_addr_t)rte_mem_virt2iova((void *)append_ptr);
+	ctx_paddr = (phys_addr_t)rte_mem_virt2iova(session->auth.pre_compute);
 	dest_addr_t = dest_addr + (session->auth.ctx_len / 2);
 	desc = &cmd_q->qbase_desc[cmd_q->qidx];
@@ -2018,11 +1979,6 @@ ccp_perform_sha3(struct rte_crypto_op *op,
 		return -1;
 	}
-	if (iommu_mode == 2) {
-		dest_addr = (phys_addr_t)rte_mem_virt2iova((void *)append_ptr);
-		ctx_paddr = (phys_addr_t)rte_mem_virt2iova((void *)ctx_addr);
-	} else {
-		dest_addr = (phys_addr_t)rte_mem_virt2phy((void *)append_ptr);
-		ctx_paddr = (phys_addr_t)rte_mem_virt2phy((void *)ctx_addr);
-	}
+	dest_addr = (phys_addr_t)rte_mem_virt2iova((void *)append_ptr);
+	ctx_paddr = (phys_addr_t)rte_mem_virt2iova((void *)ctx_addr);
 
 	ctx_addr = session->auth.sha3_ctx;
@@ -2100,11 +2056,5 @@ ccp_perform_aes_cmac(struct rte_crypto_op *op,
 		ctx_addr = session->auth.pre_compute;
 		memset(ctx_addr, 0, AES_BLOCK_SIZE);
-		if (iommu_mode == 2)
-			pst.src_addr = (phys_addr_t)rte_mem_virt2iova(
-							(void *)ctx_addr);
-		else
-			pst.src_addr = (phys_addr_t)rte_mem_virt2phy(
-							(void *)ctx_addr);
-
+		pst.src_addr = (phys_addr_t)rte_mem_virt2iova((void *)ctx_addr);
 		pst.dest_addr = (phys_addr_t)(cmd_q->sb_iv * CCP_SB_BYTES);
 		pst.len = CCP_SB_BYTES;
@@ -2144,10 +2094,5 @@ ccp_perform_aes_cmac(struct rte_crypto_op *op,
 		ctx_addr = session->auth.pre_compute + CCP_SB_BYTES;
 		memset(ctx_addr, 0, AES_BLOCK_SIZE);
-		if (iommu_mode == 2)
-			pst.src_addr = (phys_addr_t)rte_mem_virt2iova(
-							(void *)ctx_addr);
-		else
-			pst.src_addr = (phys_addr_t)rte_mem_virt2phy(
-							(void *)ctx_addr);
+		pst.src_addr = (phys_addr_t)rte_mem_virt2iova((void *)ctx_addr);
 		pst.dest_addr = (phys_addr_t)(cmd_q->sb_iv * CCP_SB_BYTES);
 		pst.len = CCP_SB_BYTES;
@@ -2343,10 +2288,5 @@ ccp_perform_3des(struct rte_crypto_op *op,
 		rte_memcpy(lsb_buf + (CCP_SB_BYTES - session->iv.length),
 			   iv, session->iv.length);
-		if (iommu_mode == 2)
-			pst.src_addr = (phys_addr_t)rte_mem_virt2iova(
-							(void *) lsb_buf);
-		else
-			pst.src_addr = (phys_addr_t)rte_mem_virt2phy(
-							(void *) lsb_buf);
+		pst.src_addr = (phys_addr_t)rte_mem_virt2iova((void *) lsb_buf);
 		pst.dest_addr = (phys_addr_t)(cmd_q->sb_iv * CCP_SB_BYTES);
 		pst.len = CCP_SB_BYTES;
@@ -2371,9 +2311,5 @@ ccp_perform_3des(struct rte_crypto_op *op,
 		dest_addr = src_addr;
 
-	if (iommu_mode == 2)
-		key_addr = rte_mem_virt2iova(session->cipher.key_ccp);
-	else
-		key_addr = rte_mem_virt2phy(session->cipher.key_ccp);
-
+	key_addr = rte_mem_virt2iova(session->cipher.key_ccp);
 	desc = &cmd_q->qbase_desc[cmd_q->qidx];
 
@@ -2769,10 +2705,5 @@ process_ops_to_enqueue(struct ccp_qp *qp,
 	b_info->desccnt = 0;
 	b_info->cmd_q = cmd_q;
-	if (iommu_mode == 2)
-		b_info->lsb_buf_phys =
-			(phys_addr_t)rte_mem_virt2iova((void *)b_info->lsb_buf);
-	else
-		b_info->lsb_buf_phys =
-			(phys_addr_t)rte_mem_virt2phy((void *)b_info->lsb_buf);
+	b_info->lsb_buf_phys = (phys_addr_t)rte_mem_virt2iova((void *)b_info->lsb_buf);
 
 	rte_atomic64_sub(&b_info->cmd_q->free_slots, slots_req);
diff --git a/drivers/crypto/ccp/ccp_dev.c b/drivers/crypto/ccp/ccp_dev.c
index 3f00b2522b..54c568afd1 100644
--- a/drivers/crypto/ccp/ccp_dev.c
+++ b/drivers/crypto/ccp/ccp_dev.c
@@ -24,5 +24,4 @@
 #include "ccp_pmd_private.h"
 
-int iommu_mode;
 struct ccp_list ccp_list = TAILQ_HEAD_INITIALIZER(ccp_list);
 static int ccp_dev_id;
@@ -653,5 +652,5 @@ static int
 ccp_probe_device(int ccp_type, struct rte_pci_device *pci_dev)
 {
-	struct ccp_device *ccp_dev = NULL;
+	struct ccp_device *ccp_dev;
 
 	ccp_dev = rte_zmalloc("ccp_device", sizeof(*ccp_dev),
@@ -685,14 +684,8 @@ ccp_probe_devices(struct rte_pci_device *pci_dev,
 	DIR *dir;
 	int ret = 0;
-	int module_idx = 0;
 	uint16_t domain;
 	uint8_t bus, devid, function;
 	char dirname[PATH_MAX];
 
-	module_idx = ccp_check_pci_uio_module();
-	if (module_idx < 0)
-		return -1;
-
-	iommu_mode = module_idx;
 	TAILQ_INIT(&ccp_list);
 	dir = opendir(SYSFS_PCI_DEVICES);
diff --git a/drivers/crypto/ccp/ccp_pci.c b/drivers/crypto/ccp/ccp_pci.c
index c941e222c7..bd1a037f76 100644
--- a/drivers/crypto/ccp/ccp_pci.c
+++ b/drivers/crypto/ccp/ccp_pci.c
@@ -12,38 +12,4 @@
 
 #include "ccp_pci.h"
-#include "ccp_pmd_private.h"
-
-static const char * const uio_module_names[] = {
-	"igb_uio",
-	"uio_pci_generic",
-	"vfio_pci"
-};
-
-int
-ccp_check_pci_uio_module(void)
-{
-	FILE *fp;
-	int i;
-	char buf[BUFSIZ];
-
-	fp = fopen(PROC_MODULES, "r");
-	if (fp == NULL)
-		return -1;
-	i = 0;
-	while (uio_module_names[i] != NULL) {
-		while (fgets(buf, sizeof(buf), fp) != NULL) {
-			if (!strncmp(buf, uio_module_names[i],
-				     strlen(uio_module_names[i]))) {
-				fclose(fp);
-				return i;
-			}
-		}
-		i++;
-		rewind(fp);
-	}
-	fclose(fp);
-	CCP_LOG_DBG("Insert igb_uio or uio_pci_generic kernel module(s)");
-	return -1;/* uio not inserted */
-}
 
 /*
diff --git a/drivers/crypto/ccp/ccp_pci.h b/drivers/crypto/ccp/ccp_pci.h
index 7ed3bac406..f393a04d6f 100644
--- a/drivers/crypto/ccp/ccp_pci.h
+++ b/drivers/crypto/ccp/ccp_pci.h
@@ -11,7 +11,4 @@
 
 #define SYSFS_PCI_DEVICES "/sys/bus/pci/devices"
-#define PROC_MODULES "/proc/modules"
-
-int ccp_check_pci_uio_module(void);
 
 int ccp_parse_pci_addr_format(const char *buf, int bufsize, uint16_t *domain,
diff --git a/drivers/crypto/ccp/rte_ccp_pmd.c b/drivers/crypto/ccp/rte_ccp_pmd.c
index c5ec952e36..0d84c8cd0e 100644
--- a/drivers/crypto/ccp/rte_ccp_pmd.c
+++ b/drivers/crypto/ccp/rte_ccp_pmd.c
@@ -23,5 +23,4 @@ static unsigned int ccp_pmd_init_done;
 uint8_t ccp_cryptodev_driver_id;
 uint8_t cryptodev_cnt;
-extern void *sha_ctx;
 
 struct ccp_pmd_init_params {
@@ -214,5 +213,4 @@ cryptodev_ccp_remove(struct rte_pci_device *pci_dev)
 
 	ccp_pmd_init_done = 0;
-	rte_free(sha_ctx);
 
 	RTE_LOG(INFO, PMD, "Closing ccp device %s on numa socket %u\n",
@@ -301,5 +299,4 @@ cryptodev_ccp_probe(struct rte_pci_driver *pci_drv __rte_unused,
 	};
 
-	sha_ctx = (void *)rte_malloc(NULL, SHA512_DIGEST_SIZE, 64);
 	if (ccp_pmd_init_done) {
 		RTE_LOG(INFO, PMD, "CCP PMD already initialized\n");
-- 
2.39.1

---
  Diff of the applied patch vs upstream commit (please double-check if non-empty:
---
--- -	2023-02-23 14:46:24.561726299 +0000
+++ 0030-crypto-ccp-fix-IOVA-handling.patch	2023-02-23 14:46:23.745235879 +0000
@@ -1 +1 @@
-From 9631fb8f10dfafb0547fbf9127b162e62b2bef43 Mon Sep 17 00:00:00 2001
+From b2c5b2d8a87130ea095a1b202460927caf0d4d82 Mon Sep 17 00:00:00 2001
@@ -5,0 +6,2 @@
+[ upstream commit 9631fb8f10dfafb0547fbf9127b162e62b2bef43 ]
+
@@ -17 +18,0 @@
-Cc: stable@dpdk.org
@@ -30 +31 @@
-index b21b32e507..2758187d93 100644
+index 4bab18323b..351d8ac63e 100644
@@ -98 +99 @@
-@@ -1593,12 +1576,6 @@ ccp_perform_hmac(struct rte_crypto_op *op,
+@@ -1595,12 +1578,6 @@ ccp_perform_hmac(struct rte_crypto_op *op,
@@ -113 +114 @@
-@@ -1682,8 +1659,5 @@ ccp_perform_hmac(struct rte_crypto_op *op,
+@@ -1684,8 +1661,5 @@ ccp_perform_hmac(struct rte_crypto_op *op,
@@ -123 +124 @@
-@@ -1771,12 +1745,6 @@ ccp_perform_sha(struct rte_crypto_op *op,
+@@ -1775,12 +1749,6 @@ ccp_perform_sha(struct rte_crypto_op *op,
@@ -138 +139 @@
-@@ -1866,13 +1834,6 @@ ccp_perform_sha3_hmac(struct rte_crypto_op *op,
+@@ -1872,13 +1840,6 @@ ccp_perform_sha3_hmac(struct rte_crypto_op *op,
@@ -154 +155 @@
-@@ -2010,11 +1971,6 @@ ccp_perform_sha3(struct rte_crypto_op *op,
+@@ -2018,11 +1979,6 @@ ccp_perform_sha3(struct rte_crypto_op *op,
@@ -168 +169 @@
-@@ -2090,11 +2046,5 @@ ccp_perform_aes_cmac(struct rte_crypto_op *op,
+@@ -2100,11 +2056,5 @@ ccp_perform_aes_cmac(struct rte_crypto_op *op,
@@ -181 +182 @@
-@@ -2134,10 +2084,5 @@ ccp_perform_aes_cmac(struct rte_crypto_op *op,
+@@ -2144,10 +2094,5 @@ ccp_perform_aes_cmac(struct rte_crypto_op *op,
@@ -193 +194 @@
-@@ -2329,10 +2274,5 @@ ccp_perform_3des(struct rte_crypto_op *op,
+@@ -2343,10 +2288,5 @@ ccp_perform_3des(struct rte_crypto_op *op,
@@ -205 +206 @@
-@@ -2357,9 +2297,5 @@ ccp_perform_3des(struct rte_crypto_op *op,
+@@ -2371,9 +2311,5 @@ ccp_perform_3des(struct rte_crypto_op *op,
@@ -216 +217 @@
-@@ -2747,10 +2683,5 @@ process_ops_to_enqueue(struct ccp_qp *qp,
+@@ -2769,10 +2705,5 @@ process_ops_to_enqueue(struct ccp_qp *qp,
@@ -229 +230 @@
-index 410e62121e..14c54929c4 100644
+index 3f00b2522b..54c568afd1 100644
@@ -245 +246 @@
-@@ -684,14 +683,8 @@ ccp_probe_devices(struct rte_pci_device *pci_dev,
+@@ -685,14 +684,8 @@ ccp_probe_devices(struct rte_pci_device *pci_dev,
@@ -304 +305 @@
-index 6736bf8ad3..d9a8b9dcc6 100644
+index 7ed3bac406..f393a04d6f 100644
@@ -316 +317 @@
-index bcb621234c..661a796116 100644
+index c5ec952e36..0d84c8cd0e 100644
@@ -325 +326 @@
-@@ -201,5 +200,4 @@ cryptodev_ccp_remove(struct rte_pci_device *pci_dev)
+@@ -214,5 +213,4 @@ cryptodev_ccp_remove(struct rte_pci_device *pci_dev)
@@ -331 +332 @@
-@@ -288,5 +286,4 @@ cryptodev_ccp_probe(struct rte_pci_driver *pci_drv __rte_unused,
+@@ -301,5 +299,4 @@ cryptodev_ccp_probe(struct rte_pci_driver *pci_drv __rte_unused,


  parent reply	other threads:[~2023-02-23 15:07 UTC|newest]

Thread overview: 99+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-02-23 15:04 patch 'kni: fix build on RHEL 9.1' " Kevin Traynor
2023-02-23 15:04 ` patch 'hash: fix GFNI implementation build with GCC 12' " Kevin Traynor
2023-02-23 15:04 ` patch 'doc: fix dependency setup in l2fwd-cat example guide' " Kevin Traynor
2023-02-23 15:04 ` patch 'devtools: fix escaped space in grep pattern' " Kevin Traynor
2023-02-23 15:04 ` patch 'app/crypto-perf: fix number of segments' " Kevin Traynor
2023-02-23 15:04 ` patch 'app/crypto-perf: fix SPI zero' " Kevin Traynor
2023-02-23 15:04 ` patch 'app/crypto-perf: fix IPsec direction' " Kevin Traynor
2023-02-23 15:04 ` patch 'eventdev/eth_tx: fix devices loop' " Kevin Traynor
2023-02-23 15:05 ` patch 'crypto/qat: fix stream cipher direction' " Kevin Traynor
2023-02-23 15:05 ` patch 'fbarray: fix metadata dump' " Kevin Traynor
2023-02-23 15:05 ` patch 'gpudev: fix deadlocks when registering callback' " Kevin Traynor
2023-02-23 15:05 ` patch 'graph: fix node shrink' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/nfp: fix firmware name derived from PCI name' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: fix inaccurate RTC time to read' " Kevin Traynor
2023-02-23 15:05 ` patch 'app/testpmd: fix interactive mode with no ports' " Kevin Traynor
2023-02-23 15:05 ` patch 'telemetry: move include after guard' " Kevin Traynor
2023-02-23 15:05 ` patch 'ethdev: fix telemetry data truncation' " Kevin Traynor
2023-02-23 15:05 ` patch 'mempool: " Kevin Traynor
2023-02-23 15:05 ` patch 'cryptodev: " Kevin Traynor
2023-02-23 15:05 ` patch 'mem: " Kevin Traynor
2023-02-23 15:05 ` patch 'examples/qos_sched: fix debug mode' " Kevin Traynor
2023-02-23 15:05 ` patch 'app/dumpcap: fix storing port identifier' " Kevin Traynor
2023-02-23 15:05 ` patch 'vdpa/ifc: fix argument compatibility check' " Kevin Traynor
2023-02-23 15:05 ` patch 'vdpa/ifc: fix reconnection in SW-assisted live migration' " Kevin Traynor
2023-02-23 15:05 ` patch 'vhost: fix net header settings in datapath' " Kevin Traynor
2023-02-23 15:05 ` patch 'baseband/acc: fix memory leak on acc100 close' " Kevin Traynor
2023-02-23 15:05 ` patch 'baseband/acc: fix acc100 iteration counter in TB' " Kevin Traynor
2023-02-23 15:05 ` patch 'crypto/ccp: remove some printf' " Kevin Traynor
2023-02-23 15:05 ` patch 'crypto/ccp: remove some dead code for UIO' " Kevin Traynor
2023-02-23 15:05 ` Kevin Traynor [this message]
2023-02-23 15:05 ` patch 'test/crypto: fix typo in AES test' " Kevin Traynor
2023-02-23 15:05 ` patch 'test/crypto: add missing MAC-I to PDCP vectors' " Kevin Traynor
2023-02-23 15:05 ` patch 'compressdev: fix end of driver list' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/bnxt: fix Tx queue stats after queue stop and start' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/bnxt: fix Rx " Kevin Traynor
2023-02-23 15:05 ` patch 'net/bnxt: fix RSS hash in mbuf' " Kevin Traynor
2023-02-23 15:05 ` patch 'event/cnxk: wait for CPT flow control on WQE path' " Kevin Traynor
2023-02-23 15:05 ` patch 'event/cnxk: fix burst timer arm' " Kevin Traynor
2023-02-23 15:05 ` patch 'event/cnxk: fix timer operations in secondary process' " Kevin Traynor
2023-02-23 15:05 ` patch 'mem: fix hugepage info mapping' " Kevin Traynor
2023-02-23 15:05 ` patch 'raw/ifpga/base: fix init with multi-process' " Kevin Traynor
2023-02-23 15:05 ` patch 'telemetry: fix repeat display when callback don't init dict' " Kevin Traynor
2023-02-23 15:05 ` patch 'eal/linux: fix hugetlbfs sub-directories discovery' " Kevin Traynor
2023-02-23 15:05 ` patch 'test/mbuf: fix mbuf reset test' " Kevin Traynor
2023-02-23 15:05 ` patch 'eventdev/timer: fix overflow' " Kevin Traynor
2023-02-23 15:05 ` patch 'vhost: decrease log level for unimplemented requests' " Kevin Traynor
2023-02-23 15:05 ` patch 'vhost: fix possible FD leaks on truncation' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/virtio-user: fix device starting failure handling' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: declare flow rule keeping capability' " Kevin Traynor
2023-02-23 15:05 ` patch 'doc: fix description of L2TPV2 flow item' " Kevin Traynor
2023-02-23 15:05 ` patch 'app/testpmd: fix forwarding stats for Tx dropped' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/txgbe: fix default signal quality value for KX/KX4' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/txgbe: fix packet type to parse from offload flags' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/ngbe: " Kevin Traynor
2023-02-23 15:05 ` patch 'net/txgbe: fix interrupt loss' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: fix log about indirection table size' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: extract common function to query device' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: refactor set RSS hash algorithm and key interface' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: fix clearing RSS configuration' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: use RSS filter list to check duplicated rule' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: remove useless code when destroy valid RSS " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: fix warning on flush or destroy " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: fix config struct used for conversion' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: fix duplicate RSS rule check' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/sfc: export pick transfer proxy callback to representors' " Kevin Traynor
2023-02-23 15:05 ` patch 'app/testpmd: fix link check condition on port start' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: add debug info for Rx/Tx dummy function' " Kevin Traynor
2023-02-23 15:05 ` patch 'net/hns3: remove debug condition for Tx prepare' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/sfc: fix MAC address entry leak in transfer flow parsing' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/sfc: enforce fate action in transfer flow rules' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/txgbe: fix Rx buffer size in config register' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/mlx5: fix flow sample with ConnectX-5' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/mlx5: fix error CQE dumping for vectorized Rx' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/mlx5: ignore non-critical syndromes for Rx queue' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/mlx5: check compressed CQE opcode in vectorized Rx' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/i40e: reduce interrupt interval in multi-driver mode' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/ixgbe: fix firmware version consistency' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/iavf: add lock for VF commands' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/i40e: fix validation of flow transfer attribute' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/ice: " Kevin Traynor
2023-02-23 15:06 ` patch 'net/iavf: protect insertion in flow list' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/iavf: fix building data desc' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/ixgbe: enable IPv6 mask in flow rules' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/iavf: fix VLAN offload with AVX2' " Kevin Traynor
2023-02-23 15:06 ` patch 'app/compress-perf: fix some typos' " Kevin Traynor
2023-02-23 15:06 ` patch 'app/compress-perf: fix testing single operation' " Kevin Traynor
2023-02-23 15:06 ` patch 'net/bnxt: fix link state change interrupt config' " Kevin Traynor
2023-02-23 15:06 ` patch 'app/testpmd: fix crash on cleanup' " Kevin Traynor
2023-02-23 15:06 ` patch 'sched: fix alignment of structs in subport' " Kevin Traynor
2023-02-23 15:06 ` patch 'eal/freebsd: fix lock in alarm callback' " Kevin Traynor
2023-02-23 15:06 ` patch 'dma/ioat: fix device stop if no copies done' " Kevin Traynor
2023-02-23 15:06 ` patch 'dma/ioat: fix indexes after restart' " Kevin Traynor
2023-02-23 15:06 ` patch 'dma/ioat: fix error reporting on " Kevin Traynor
2023-02-23 15:06 ` patch 'reorder: invalidate buffer from ready queue in drain' " Kevin Traynor
2023-02-23 15:06 ` patch 'test/reorder: fix double free of drained buffers' " Kevin Traynor
2023-02-23 15:06 ` patch 'build: fix toolchain definition' " Kevin Traynor
2023-02-23 15:06 ` patch 'eal: use same atomic intrinsics for GCC and clang' " Kevin Traynor
2023-02-23 15:06 ` patch 'examples/cmdline: fix build with GCC 12' " Kevin Traynor
2023-02-23 15:06 ` patch 'examples/qos_sched: fix Tx port config when link down' " Kevin Traynor

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230223150631.723699-30-ktraynor@redhat.com \
    --to=ktraynor@redhat.com \
    --cc=david.marchand@redhat.com \
    --cc=stable@dpdk.org \
    --cc=sunilprakashrao.uttarwar@amd.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).