patches for DPDK stable branches
 help / color / mirror / Atom feed
From: Kevin Traynor <ktraynor@redhat.com>
To: Nithinsen Kaithakadan <nkaithakadan@marvell.com>
Cc: Akhil Goyal <gakhil@marvell.com>, dpdk stable <stable@dpdk.org>
Subject: patch 'test/crypto: fix mbuf handling' has been queued to stable release 24.11.4
Date: Fri, 31 Oct 2025 14:34:04 +0000	[thread overview]
Message-ID: <20251031143421.324432-122-ktraynor@redhat.com> (raw)
In-Reply-To: <20251031143421.324432-1-ktraynor@redhat.com>

Hi,

FYI, your patch has been queued to stable release 24.11.4

Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet.
It will be pushed if I get no objections before 11/05/25. So please
shout if anyone has objections.

Also note that after the patch there's a diff of the upstream commit vs the
patch applied to the branch. This will indicate if there was any rebasing
needed to apply to the stable branch. If there were code changes for rebasing
(ie: not only metadata diffs), please double check that the rebase was
correctly done.

Queued patches are on a temporary branch at:
https://github.com/kevintraynor/dpdk-stable

This queued commit can be viewed at:
https://github.com/kevintraynor/dpdk-stable/commit/c887c7dffa80bd217098fc6fab1e7e0f25f107a5

Thanks.

Kevin

---
From c887c7dffa80bd217098fc6fab1e7e0f25f107a5 Mon Sep 17 00:00:00 2001
From: Nithinsen Kaithakadan <nkaithakadan@marvell.com>
Date: Tue, 23 Sep 2025 14:22:54 +0000
Subject: [PATCH] test/crypto: fix mbuf handling

[ upstream commit 1ff54c055d95736aae05a40b361427215c318cc1 ]

This patch resolves the following mbuf sanity check errors.
  - updating nb_segs and pkt_len in the head mbuf after
    freeing intermediate nodes in the chain.
  - fix incorrect usage of rte_pktmbuf_append by ensuring
    the head mbuf is passed instead of an intermediate
    node, allowing proper tail detection and metadata
    update.

Fixes: dc3f6c5347b2 ("test/crypto: fix wireless auth digest segment")
Fixes: 43220096d66a ("test/crypto: add PDCP cases for scatter gather")
Fixes: dcdd01691f39 ("test/crypto: add GMAC SGL")
Fixes: f3dbf94be60c ("app/test: check SGL on QAT")

Signed-off-by: Nithinsen Kaithakadan <nkaithakadan@marvell.com>
Acked-by: Akhil Goyal <gakhil@marvell.com>
---
 app/test/test_cryptodev.c | 59 ++++++++++++++++++++++++++-------------
 1 file changed, 40 insertions(+), 19 deletions(-)

diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
index 8a175b9e70..540373e452 100644
--- a/app/test/test_cryptodev.c
+++ b/app/test/test_cryptodev.c
@@ -3460,4 +3460,6 @@ create_wireless_algo_auth_cipher_operation(
 		struct rte_mbuf *sgl_buf = (op_mode == IN_PLACE ?
 				sym_op->m_src : sym_op->m_dst);
+		struct rte_mbuf *sgl_buf_head = sgl_buf;
+
 		while (remaining_off >= rte_pktmbuf_data_len(sgl_buf)) {
 			remaining_off -= rte_pktmbuf_data_len(sgl_buf);
@@ -3467,9 +3469,16 @@ create_wireless_algo_auth_cipher_operation(
 		/* The last segment should be large enough to hold full digest */
 		if (sgl_buf->data_len < auth_tag_len) {
-			rte_pktmbuf_free(sgl_buf->next);
-			sgl_buf->next = NULL;
-			TEST_ASSERT_NOT_NULL(rte_pktmbuf_append(sgl_buf,
-					auth_tag_len - sgl_buf->data_len),
-					"No room to append auth tag");
+			uint16_t next_data_len = 0;
+			if (sgl_buf->next != NULL) {
+				next_data_len = sgl_buf->next->data_len;
+
+				rte_pktmbuf_free(sgl_buf->next);
+				sgl_buf->next = NULL;
+				sgl_buf_head->nb_segs -= 1;
+				sgl_buf_head->pkt_len -= next_data_len;
+			}
+			TEST_ASSERT_NOT_NULL(rte_pktmbuf_append(
+						sgl_buf_head, auth_tag_len - sgl_buf->data_len),
+						"No room to append auth tag");
 		}
 
@@ -9767,9 +9776,11 @@ test_pdcp_proto_SGL(int i, int oop,
 			memset(rte_pktmbuf_mtod(buf_oop, uint8_t *),
 					0, rte_pktmbuf_tailroom(buf_oop));
-			rte_pktmbuf_append(buf_oop, to_trn);
+			TEST_ASSERT_NOT_NULL(ut_params->obuf, "Output buffer not initialized");
+			TEST_ASSERT_NOT_NULL(rte_pktmbuf_append(ut_params->obuf, to_trn), "Failed to append to mbuf");
 		}
 
-		plaintext = (uint8_t *)rte_pktmbuf_append(buf,
+		plaintext = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf,
 				to_trn);
+		TEST_ASSERT_NOT_NULL(plaintext, "Failed to append plaintext");
 
 		memcpy(plaintext, input_vec + trn_data, to_trn);
@@ -9800,5 +9811,5 @@ test_pdcp_proto_SGL(int i, int oop,
 			memset(rte_pktmbuf_mtod(buf_oop, uint8_t *),
 					0, rte_pktmbuf_tailroom(buf_oop));
-			rte_pktmbuf_append(buf_oop, to_trn);
+			TEST_ASSERT_NOT_NULL(rte_pktmbuf_append(ut_params->obuf, to_trn), "Failed to append to mbuf");
 
 			trn_data += to_trn;
@@ -15872,13 +15883,16 @@ test_AES_GMAC_authentication_SGL(const struct gmac_test_data *tdata,
 				rte_pktmbuf_tailroom(buf));
 
-		plaintext = (uint8_t *)rte_pktmbuf_append(buf,
+		plaintext = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf,
 				to_trn);
+		TEST_ASSERT_NOT_NULL(plaintext, "Failed to append plaintext");
 
 		memcpy(plaintext, tdata->plaintext.data + trn_data,
 				to_trn);
 		trn_data += to_trn;
-		if (trn_data  == tdata->plaintext.len)
-			digest_mem = (uint8_t *)rte_pktmbuf_append(buf,
+		if (trn_data  == tdata->plaintext.len) {
+			digest_mem = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf,
 					tdata->gmac_tag.len);
+			TEST_ASSERT_NOT_NULL(digest_mem, "Failed to append digest data");
+		}
 	}
 	ut_params->ibuf->nb_segs = segs;
@@ -17177,9 +17191,10 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,
 			memset(rte_pktmbuf_mtod(buf_oop, uint8_t *),
 					0, rte_pktmbuf_tailroom(buf_oop));
-			rte_pktmbuf_append(buf_oop, to_trn);
+			TEST_ASSERT_NOT_NULL(rte_pktmbuf_append(ut_params->obuf, to_trn), "Failed to append to mbuf");
 		}
 
-		plaintext = (uint8_t *)rte_pktmbuf_append(buf,
+		plaintext = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf,
 				to_trn);
+		TEST_ASSERT_NOT_NULL(plaintext, "Failed to append plaintext");
 
 		memcpy(plaintext, tdata->plaintext.data + trn_data,
@@ -17188,10 +17203,14 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,
 		if (trn_data  == tdata->plaintext.len) {
 			if (oop) {
-				if (!fragsz_oop)
-					digest_mem = rte_pktmbuf_append(buf_oop,
+				if (!fragsz_oop) {
+					digest_mem = rte_pktmbuf_append(ut_params->obuf,
 						tdata->auth_tag.len);
-			} else
-				digest_mem = (uint8_t *)rte_pktmbuf_append(buf,
+					TEST_ASSERT_NOT_NULL(digest_mem, "Failed to append auth tag");
+				}
+			} else {
+				digest_mem = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf,
 					tdata->auth_tag.len);
+				TEST_ASSERT_NOT_NULL(digest_mem, "Failed to append auth tag");
+			}
 		}
 	}
@@ -17228,14 +17247,16 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,
 			buf_last_oop = buf_oop->next =
 					rte_pktmbuf_alloc(ts_params->mbuf_pool);
+			TEST_ASSERT_NOT_NULL(buf_oop->next, "Unexpected end of chain");
 			buf_oop = buf_oop->next;
 			memset(rte_pktmbuf_mtod(buf_oop, uint8_t *),
 					0, rte_pktmbuf_tailroom(buf_oop));
-			rte_pktmbuf_append(buf_oop, to_trn);
+			TEST_ASSERT_NOT_NULL(rte_pktmbuf_append(ut_params->obuf, to_trn), "Failed to append to mbuf");
 
 			trn_data += to_trn;
 
 			if (trn_data  == tdata->plaintext.len) {
-				digest_mem = rte_pktmbuf_append(buf_oop,
+				digest_mem = rte_pktmbuf_append(ut_params->obuf,
 					tdata->auth_tag.len);
+				TEST_ASSERT_NOT_NULL(digest_mem, "Failed to append auth tag");
 			}
 		}
-- 
2.51.0

---
  Diff of the applied patch vs upstream commit (please double-check if non-empty:
---
--- -	2025-10-31 13:53:55.898071652 +0000
+++ 0122-test-crypto-fix-mbuf-handling.patch	2025-10-31 13:53:52.312524230 +0000
@@ -1 +1 @@
-From 1ff54c055d95736aae05a40b361427215c318cc1 Mon Sep 17 00:00:00 2001
+From c887c7dffa80bd217098fc6fab1e7e0f25f107a5 Mon Sep 17 00:00:00 2001
@@ -5,0 +6,2 @@
+[ upstream commit 1ff54c055d95736aae05a40b361427215c318cc1 ]
+
@@ -18 +19,0 @@
-Cc: stable@dpdk.org
@@ -27 +28 @@
-index 5229ac2bf6..f092f608a9 100644
+index 8a175b9e70..540373e452 100644
@@ -30 +31 @@
-@@ -3489,4 +3489,6 @@ create_wireless_algo_auth_cipher_operation(
+@@ -3460,4 +3460,6 @@ create_wireless_algo_auth_cipher_operation(
@@ -37 +38 @@
-@@ -3496,9 +3498,16 @@ create_wireless_algo_auth_cipher_operation(
+@@ -3467,9 +3469,16 @@ create_wireless_algo_auth_cipher_operation(
@@ -59 +60 @@
-@@ -9796,9 +9805,11 @@ test_pdcp_proto_SGL(int i, int oop,
+@@ -9767,9 +9776,11 @@ test_pdcp_proto_SGL(int i, int oop,
@@ -73 +74 @@
-@@ -9829,5 +9840,5 @@ test_pdcp_proto_SGL(int i, int oop,
+@@ -9800,5 +9811,5 @@ test_pdcp_proto_SGL(int i, int oop,
@@ -80 +81 @@
-@@ -15917,13 +15928,16 @@ test_AES_GMAC_authentication_SGL(const struct gmac_test_data *tdata,
+@@ -15872,13 +15883,16 @@ test_AES_GMAC_authentication_SGL(const struct gmac_test_data *tdata,
@@ -100 +101 @@
-@@ -17224,9 +17238,10 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,
+@@ -17177,9 +17191,10 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,
@@ -113 +114 @@
-@@ -17235,10 +17250,14 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,
+@@ -17188,10 +17203,14 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,
@@ -132 +133 @@
-@@ -17275,14 +17294,16 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,
+@@ -17228,14 +17247,16 @@ test_authenticated_encryption_SGL(const struct aead_test_data *tdata,


  parent reply	other threads:[~2025-10-31 14:40 UTC|newest]

Thread overview: 135+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-10-31 14:32 patch 'test/telemetry: fix test calling all commands' " Kevin Traynor
2025-10-31 14:32 ` patch 'eal: fix plugin dir walk' " Kevin Traynor
2025-10-31 14:32 ` patch 'cmdline: fix port list parsing' " Kevin Traynor
2025-10-31 14:32 ` patch 'tailq: fix lookup macro' " Kevin Traynor
2025-10-31 14:32 ` patch 'hash: fix unaligned access in predictable RSS' " Kevin Traynor
2025-10-31 14:32 ` patch 'graph: fix stats query with no node xstats' " Kevin Traynor
2025-10-31 14:32 ` patch 'graph: fix unaligned access in stats' " Kevin Traynor
2025-10-31 14:32 ` patch 'eventdev: fix listing timer adapters with telemetry' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/gve: send whole packet when mbuf is large' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/gve: clean when insufficient Tx descriptors' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/gve: do not write zero-length " Kevin Traynor
2025-10-31 14:32 ` patch 'net/gve: validate Tx packet before sending' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/gve: add DQO Tx descriptor limit' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/gve: fix DQO TSO " Kevin Traynor
2025-10-31 14:32 ` patch 'net/gve: clear DQO Tx descriptors before writing' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/vmxnet3: fix mapping of mempools to queues' " Kevin Traynor
2025-10-31 14:32 ` patch 'app/testpmd: increase size of set cores list command' " Kevin Traynor
2025-10-31 14:32 ` patch 'bus/dpaa: improve cleanup' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/gve: free device resources on close' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/dpaa2: fix extract buffer preparation' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/dpaa2: fix shaper rate' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/tap: fix BPF with cross-compilation' " Kevin Traynor
2025-10-31 14:32 ` patch 'app/testpmd: fix mask in flow random item' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/zxdh: fix Arm build' " Kevin Traynor
2025-10-31 14:32 ` patch 'app/testpmd: monitor state of primary process' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/gve: fix disabling interrupts on DQ' " Kevin Traynor
2025-10-31 14:32 ` patch 'app/testpmd: fix conntrack action query' " Kevin Traynor
2025-10-31 14:32 ` patch 'doc: add conntrack state inspect command to testpmd guide' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/gve: free Rx mbufs if allocation fails on ring setup' " Kevin Traynor
2025-10-31 14:32 ` patch 'app/testpmd: validate DSCP and VLAN for meter creation' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix index-based flow rules' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix default flow rules start' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix storage of shared Rx queues' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix use after scope of RSS configuration' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix unsupported flow rule port action' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix double free in non-template flow destroy' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix non-template age rules flush' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix non-template RSS expansion' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix connection tracking state item validation' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5/hws: fix TIR action support in FDB' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix indirect flow age action handling' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix Direct Verbs counter offset detection' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/mlx5: fix interface name parameter definition' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/iavf: fix Tx vector path selection logic' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/ixgbe: fix SCTP port filtering on E610' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/intel: fix assumption about tag placement order' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/ice: fix VLAN tag reporting on Rx' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/ice/base: fix adding special words' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/ice/base: fix memory leak in HW profile handling' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/ice/base: fix memory leak in recipe " Kevin Traynor
2025-10-31 14:32 ` patch 'gro: fix payload corruption in coalescing packets' " Kevin Traynor
2025-10-31 14:32 ` patch 'eal: fix DMA mask validation with IOVA mode option' " Kevin Traynor
2025-10-31 14:32 ` patch 'eal: fix MP socket cleanup' " Kevin Traynor
2025-10-31 14:32 ` patch 'crypto/ipsec_mb: fix QP release in secondary' " Kevin Traynor
2025-10-31 14:32 ` patch 'efd: fix AVX2 support' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/octeon_ep: handle interrupt enable failure' " Kevin Traynor
2025-10-31 14:32 ` patch 'net/octeon_ep: fix mbuf data offset update' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/octeon_ep: fix device start' " Kevin Traynor
2025-10-31 14:33 ` patch 'common/cnxk: fix async event handling' " Kevin Traynor
2025-10-31 14:33 ` patch 'doc: fix feature list of ice driver' " Kevin Traynor
2025-10-31 14:33 ` patch 'doc: fix feature list of iavf " Kevin Traynor
2025-10-31 14:33 ` patch 'eal/arm: fix C++ build for 32-bit memcpy' " Kevin Traynor
2025-10-31 14:33 ` patch 'test/debug: fix crash with mlx5 devices' " Kevin Traynor
2025-10-31 14:33 ` patch 'bus/pci: fix build with MinGW 13' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/mlx5: " Kevin Traynor
2025-10-31 14:33 ` patch 'bbdev: " Kevin Traynor
2025-10-31 14:33 ` patch 'dma/hisilicon: fix stop with pending transfers' " Kevin Traynor
2025-10-31 14:33 ` patch 'test/dma: fix failure condition' " Kevin Traynor
2025-10-31 14:33 ` patch 'eal/x86: enable timeout in AMD power monitor' " Kevin Traynor
2025-11-01 15:31   ` Tummala, Sivaprasad
2025-10-31 14:33 ` patch 'test/func_reentrancy: fix args to EAL init call' " Kevin Traynor
2025-10-31 14:33 ` patch 'fib6: fix memory leak on delete operation' " Kevin Traynor
2025-10-31 14:33 ` patch 'fib6: fix tbl8 allocation check logic' " Kevin Traynor
2025-10-31 14:33 ` patch 'vhost: add VDUSE virtqueue ready state polling workaround' " Kevin Traynor
2025-10-31 14:33 ` patch 'vhost: fix virtqueue info init in VDUSE vring setup' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/virtio-user: fix used ring address calculation' " Kevin Traynor
2025-10-31 14:33 ` patch 'vhost: fix double fetch when dequeue offloading' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/bnxt: fix free of not allocated object' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/ice/base: fix integer overflow on NVM init' " Kevin Traynor
2025-10-31 14:33 ` patch 'doc: fix display of commands in cpfl guide' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/ice: fix initialization with 8 ports' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/ice: remove indirection for FDIR filters' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/ice: fix memory leak in raw pattern parse' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/i40e: fix symmetric Toeplitz hashing for SCTP' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/mlx5: fix ESP item validation to match on seqnum' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/mlx5: fix ESP header match after UDP for group 0' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/mlx5: fix multicast' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/mlx5: fix flow encapsulation hash' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/mlx5: fix indirect flow action memory leak' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/mlx5: fix MTU initialization' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/mlx5: fix leak of flow indexed pools' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/mlx5: fix flow aging race condition' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/hns3: fix inconsistent lock' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/hns3: fix VLAN resources freeing' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/hns3: fix overwrite mbuf in vector path' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/af_packet: fix crash in secondary process' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/ark: remove double mbuf free' " Kevin Traynor
2025-10-31 14:33 ` patch 'app/testpmd: stop forwarding in secondary process' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/tap: fix build with LTO' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/hns3: fix VLAN tag loss for short tunnel frame' " Kevin Traynor
2025-10-31 14:33 ` patch 'ethdev: fix VLAN filter parameter description' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/enetfec: fix file descriptor leak on read error' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/enetfec: fix out-of-bounds access in UIO mapping' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/enetfec: fix buffer descriptor size configuration' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/enetfec: fix Tx queue free' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/enetfec: fix checksum flag handling and error return' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/enetfec: reject multi-queue configuration' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/enetfec: fix memory leak in Rx buffer cleanup' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/enetfec: reject Tx deferred queue' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/tap: fix interrupt callback crash after failed start' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/ntnic: fix potential format overflow' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/ena: fix PCI BAR mapping on 64K page size' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/ena/base: fix unsafe memcpy on invalid memory' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/dpaa2: fix uninitialized variable' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/dpaa2: free buffers from error queue' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/dpaa2: fix L3/L4 checksum results' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/dpaa2: receive packets with additional parse errors' " Kevin Traynor
2025-10-31 14:33 ` patch 'net/dpaa2: fix error frame dump' " Kevin Traynor
2025-10-31 14:34 ` patch 'net/dpaa2: fix flow rule resizing' " Kevin Traynor
2025-10-31 14:34 ` patch 'crypto/qat: fix ECDH' " Kevin Traynor
2025-10-31 14:34 ` patch 'crypto/qat: fix source buffer alignment' " Kevin Traynor
2025-10-31 14:34 ` patch 'crypto/cnxk: refactor RSA verification' " Kevin Traynor
2025-10-31 14:34 ` Kevin Traynor [this message]
2025-10-31 14:34 ` patch 'app/crypto-perf: fix plaintext size exceeds buffer size' " Kevin Traynor
2025-10-31 14:34 ` patch 'test/crypto: fix vector initialization' " Kevin Traynor
2025-10-31 14:34 ` patch 'crypto/virtio: fix cookies leak' " Kevin Traynor
2025-10-31 14:34 ` patch 'bitops: improve power of 2 alignment documentation' " Kevin Traynor
2025-10-31 14:34 ` patch 'sched: fix WRR parameter data type' " Kevin Traynor
2025-10-31 14:34 ` patch 'test/argparse: change initialization to workaround LTO' " Kevin Traynor
2025-10-31 14:34 ` patch 'config/arm: enable NUMA for Neoverse N2' " Kevin Traynor
2025-10-31 14:34 ` patch 'dts: fix docstring in checksum suite' " Kevin Traynor
2025-10-31 14:34 ` patch 'bus/pci: fix resource leak in secondary process' " Kevin Traynor
2025-10-31 14:34 ` patch 'net/ice: fix vector Rx VLAN offload flags' " Kevin Traynor
2025-10-31 14:34 ` patch 'net/ice: remove unsupported SCTP Rx offload' " Kevin Traynor
2025-10-31 14:34 ` patch 'cmdline: fix highest bit port list parsing' " Kevin Traynor

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20251031143421.324432-122-ktraynor@redhat.com \
    --to=ktraynor@redhat.com \
    --cc=gakhil@marvell.com \
    --cc=nkaithakadan@marvell.com \
    --cc=stable@dpdk.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).