From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by dpdk.space (Postfix) with ESMTP id BB84CA0679 for ; Tue, 30 Apr 2019 19:02:43 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id AF0EA29CB; Tue, 30 Apr 2019 19:02:43 +0200 (CEST) Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by dpdk.org (Postfix) with ESMTP id 942555A6A for ; Tue, 30 Apr 2019 19:02:41 +0200 (CEST) Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 01F4D30992AA; Tue, 30 Apr 2019 17:02:36 +0000 (UTC) Received: from rh.redhat.com (ovpn-117-211.ams2.redhat.com [10.36.117.211]) by smtp.corp.redhat.com (Postfix) with ESMTP id E8AC06D0B4; Tue, 30 Apr 2019 17:02:34 +0000 (UTC) From: Kevin Traynor To: Gagandeep Singh Cc: Akhil Goyal , dpdk stable Date: Tue, 30 Apr 2019 18:01:26 +0100 Message-Id: <20190430170133.2331-31-ktraynor@redhat.com> In-Reply-To: <20190430170133.2331-1-ktraynor@redhat.com> References: <20190430170133.2331-1-ktraynor@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.43]); Tue, 30 Apr 2019 17:02:41 +0000 (UTC) Subject: [dpdk-stable] patch 'crypto/caam_jr: fix total length in auth only s/g' has been queued to LTS release 18.11.2 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Sender: "stable" Hi, FYI, your patch has been queued to LTS release 18.11.2 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 05/07/19. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches can be viewed on a temporary branch at: https://github.com/kevintraynor/dpdk-stable-queue.git Thanks. Kevin Traynor --- >From 48b5635a668f12fa8774b0077e999e7c20a132b8 Mon Sep 17 00:00:00 2001 From: Gagandeep Singh Date: Mon, 8 Apr 2019 08:59:30 +0000 Subject: [PATCH] crypto/caam_jr: fix total length in auth only s/g [ upstream commit 3386ca38bdc4c835489ed088e2ea0843e90dc5b6 ] CAAM return wrong digest value in AUTH only sg test case because digest calculated on wrong length of data Fixes: 71dd6b9d44e7 ("crypto/caam_jr: add scatter gather") Signed-off-by: Gagandeep Singh Acked-by: Akhil Goyal --- drivers/crypto/caam_jr/caam_jr.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/caam_jr/caam_jr.c b/drivers/crypto/caam_jr/caam_jr.c index 20452e3b7..efc69b6eb 100644 --- a/drivers/crypto/caam_jr/caam_jr.c +++ b/drivers/crypto/caam_jr/caam_jr.c @@ -799,5 +799,5 @@ build_auth_only_sg(struct rte_crypto_op *op, struct caam_jr_session *ses) length += ses->digest_length; } else { - length -= ses->digest_length; + sg->len -= ses->digest_length; } -- 2.20.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2019-04-30 17:58:15.275452653 +0100 +++ 0031-crypto-caam_jr-fix-total-length-in-auth-only-s-g.patch 2019-04-30 17:58:13.808139759 +0100 @@ -1 +1 @@ -From 3386ca38bdc4c835489ed088e2ea0843e90dc5b6 Mon Sep 17 00:00:00 2001 +From 48b5635a668f12fa8774b0077e999e7c20a132b8 Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit 3386ca38bdc4c835489ed088e2ea0843e90dc5b6 ] + @@ -10 +11,0 @@ -Cc: stable@dpdk.org @@ -19 +20 @@ -index da9e9821e..5028bd2a4 100644 +index 20452e3b7..efc69b6eb 100644 @@ -22 +23 @@ -@@ -800,5 +800,5 @@ build_auth_only_sg(struct rte_crypto_op *op, struct caam_jr_session *ses) +@@ -799,5 +799,5 @@ build_auth_only_sg(struct rte_crypto_op *op, struct caam_jr_session *ses)