From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 77475A0613 for ; Tue, 27 Aug 2019 11:31:28 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 6D9D154AE; Tue, 27 Aug 2019 11:31:28 +0200 (CEST) Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by dpdk.org (Postfix) with ESMTP id B4BCF1C0D4 for ; Tue, 27 Aug 2019 11:31:27 +0200 (CEST) Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 33C81800DE6; Tue, 27 Aug 2019 09:31:27 +0000 (UTC) Received: from rh.redhat.com (ovpn-117-48.ams2.redhat.com [10.36.117.48]) by smtp.corp.redhat.com (Postfix) with ESMTP id C6F9F5C1B2; Tue, 27 Aug 2019 09:31:25 +0000 (UTC) From: Kevin Traynor To: Dilshod Urazov Cc: Andrew Rybchenko , Bernard Iremonger , dpdk stable Date: Tue, 27 Aug 2019 10:30:08 +0100 Message-Id: <20190827093032.20423-31-ktraynor@redhat.com> In-Reply-To: <20190827093032.20423-1-ktraynor@redhat.com> References: <20190827093032.20423-1-ktraynor@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.6.2 (mx1.redhat.com [10.5.110.67]); Tue, 27 Aug 2019 09:31:27 +0000 (UTC) Subject: [dpdk-stable] patch 'examples/ipsec-secgw: fix error sign' has been queued to LTS release 18.11.3 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Sender: "stable" Hi, FYI, your patch has been queued to LTS release 18.11.3 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 09/03/19. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/kevintraynor/dpdk-stable-queue This queued commit can be viewed at: https://github.com/kevintraynor/dpdk-stable-queue/commit/e8242045dda0690a29458f42ef6a147a90ba2f81 Thanks. Kevin Traynor --- >From e8242045dda0690a29458f42ef6a147a90ba2f81 Mon Sep 17 00:00:00 2001 From: Dilshod Urazov Date: Fri, 5 Jul 2019 13:18:09 +0100 Subject: [PATCH] examples/ipsec-secgw: fix error sign [ upstream commit 4fbf33243175311781e8f130b53890859304dc29 ] rte_errno values should be positive. Fixes: d299106e8e31 ("examples/ipsec-secgw: add IPsec sample application") Signed-off-by: Dilshod Urazov Signed-off-by: Andrew Rybchenko Acked-by: Bernard Iremonger --- examples/ipsec-secgw/sa.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/examples/ipsec-secgw/sa.c b/examples/ipsec-secgw/sa.c index f7b6eb0bb..a2c718156 100644 --- a/examples/ipsec-secgw/sa.c +++ b/examples/ipsec-secgw/sa.c @@ -738,5 +738,5 @@ sa_create(const char *name, int32_t socket_id) if (mz == NULL) { printf("Failed to allocate SA DB memory\n"); - rte_errno = -ENOMEM; + rte_errno = ENOMEM; return NULL; } -- 2.20.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2019-08-27 09:40:12.600288062 +0100 +++ 0031-examples-ipsec-secgw-fix-error-sign.patch 2019-08-27 09:40:10.915144510 +0100 @@ -1 +1 @@ -From 4fbf33243175311781e8f130b53890859304dc29 Mon Sep 17 00:00:00 2001 +From e8242045dda0690a29458f42ef6a147a90ba2f81 Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit 4fbf33243175311781e8f130b53890859304dc29 ] + @@ -9 +10,0 @@ -Cc: stable@dpdk.org @@ -19 +20 @@ -index 1083915f9..d700c8ea4 100644 +index f7b6eb0bb..a2c718156 100644 @@ -22 +23 @@ -@@ -744,5 +744,5 @@ sa_create(const char *name, int32_t socket_id) +@@ -738,5 +738,5 @@ sa_create(const char *name, int32_t socket_id)