From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 5F746A04F3 for ; Thu, 19 Dec 2019 15:35:40 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 54E8D330; Thu, 19 Dec 2019 15:35:40 +0100 (CET) Received: from mail-wr1-f43.google.com (mail-wr1-f43.google.com [209.85.221.43]) by dpdk.org (Postfix) with ESMTP id 66BE31BF73 for ; Thu, 19 Dec 2019 15:35:39 +0100 (CET) Received: by mail-wr1-f43.google.com with SMTP id b6so6247421wrq.0 for ; Thu, 19 Dec 2019 06:35:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=Xve1mRoxiJGGcCaOr+A+mH3X97GFgedpKh7KH9DyXuY=; b=l0GpiQ/PwAzOja3qbXbc0+/KUBti4gnWQunbslZZnpdzdcMy+SI7VCYr1Kv1aTlM6r Y70fmDPF70Wf+O0Tnhl9AeSSH7lR8f2IFR4+psg2Kgp3l0JEgCqkAh/3O8mgCdy+bQ2T 0tvOCbOW+qn7a/F0m871A7/Onpx+Z5sQx9wh2jZk8hCPL3rTEOoLvfQi6aLDFnnXzscK 3FkAdRBBCgz4F6iukRVJGDZZHjfqa6A7//x6/9St/0tBPKiBUasi4DZxFzhMTAuqYk2R m5F7iKJITubt6sSLgw9rb4oSaZ6ysChJS7T014bWejrlyreROg7xy6E83c7cp/2Gb9jb gB2Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Xve1mRoxiJGGcCaOr+A+mH3X97GFgedpKh7KH9DyXuY=; b=ENaB00WpQnwL3ksIO8OYWkfK7HdZsE2HozYoPdnklBFV6eprZ1Rvpll4wLPUh41/j1 qKB0TkM6/BwhGJ3AzZJAdiaatiFaG7EzgczPElTs3FWj22kVOL4SfzTKUnB4b33jxP/u QrrpGHZvnsSW5CMCdzeGQdnVZe09wbG6WwO1HhQ6r1pD2liXgxnog3lJREI8YsyFmZRD d5MvOJuyjgNwq1l1hyafj6pEZm1ucKM/BhdxSzz3JqF7NsA9Y/eXYIr6Wtte6kbPYre6 15vMA5kE+TLEDtwiihD6UV2hCm984NsBkQcsC1TEhrSuABnQuuo8Cfajcqbc+X7h2SCm ntow== X-Gm-Message-State: APjAAAXJkHWGxSvAUYPFLfe4ql+CxADh3E9Tdz9ANnoHBYWYawiaiOkP XIkIchEYou/GmiFo1eZds6U= X-Google-Smtp-Source: APXvYqwg9SkmEmerkzHAXYkUC44clKZ/IoRxoB6M72fKyVY9yPc5UKRDUQk4KlGH98u9B29rIkft5Q== X-Received: by 2002:adf:e984:: with SMTP id h4mr9584937wrm.275.1576766139131; Thu, 19 Dec 2019 06:35:39 -0800 (PST) Received: from localhost ([88.98.246.218]) by smtp.gmail.com with ESMTPSA id d8sm6406084wrx.71.2019.12.19.06.35.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 19 Dec 2019 06:35:38 -0800 (PST) From: luca.boccassi@gmail.com To: Radu Nicolau Cc: Akhil Goyal , Anoob Joseph , dpdk stable Date: Thu, 19 Dec 2019 14:32:46 +0000 Message-Id: <20191219143447.21506-19-luca.boccassi@gmail.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20191219143447.21506-1-luca.boccassi@gmail.com> References: <20191219143447.21506-1-luca.boccassi@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: [dpdk-stable] patch 'security: fix doxygen fields' has been queued to LTS release 17.11.10 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Sender: "stable" Hi, FYI, your patch has been queued to LTS release 17.11.10 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 12/21/19. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Thanks. Luca Boccassi --- >From 0dc35d5907227c38b34ec641fdd2223b1552741a Mon Sep 17 00:00:00 2001 From: Radu Nicolau Date: Wed, 4 Sep 2019 12:03:11 +0100 Subject: [PATCH] security: fix doxygen fields [ upstream commit 382df9dfb6a8449b595e80d7ec391f90e3420d15 ] Replace /**< with /** for multiline doxygen comments. Fixes: c261d1431bd8 ("security: introduce security API and framework") Signed-off-by: Radu Nicolau Acked-by: Akhil Goyal Acked-by: Anoob Joseph --- lib/librte_security/rte_security.h | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/lib/librte_security/rte_security.h b/lib/librte_security/rte_security.h index 2b609cbf7a..2c8cf6ba74 100644 --- a/lib/librte_security/rte_security.h +++ b/lib/librte_security/rte_security.h @@ -143,14 +143,14 @@ struct rte_security_ipsec_tunnel_param { * IPsec Security Association option flags */ struct rte_security_ipsec_sa_options { - /**< Extended Sequence Numbers (ESN) + /** Extended Sequence Numbers (ESN) * * * 1: Use extended (64 bit) sequence numbers * * 0: Use normal sequence numbers */ uint32_t esn : 1; - /**< UDP encapsulation + /** UDP encapsulation * * * 1: Do UDP encapsulation/decapsulation so that IPSEC packets can * traverse through NAT boxes. @@ -158,7 +158,7 @@ struct rte_security_ipsec_sa_options { */ uint32_t udp_encap : 1; - /**< Copy DSCP bits + /** Copy DSCP bits * * * 1: Copy IPv4 or IPv6 DSCP bits from inner IP header to * the outer IP header in encapsulation, and vice versa in @@ -167,7 +167,7 @@ struct rte_security_ipsec_sa_options { */ uint32_t copy_dscp : 1; - /**< Copy IPv6 Flow Label + /** Copy IPv6 Flow Label * * * 1: Copy IPv6 flow label from inner IPv6 header to the * outer IPv6 header. @@ -175,7 +175,7 @@ struct rte_security_ipsec_sa_options { */ uint32_t copy_flabel : 1; - /**< Copy IPv4 Don't Fragment bit + /** Copy IPv4 Don't Fragment bit * * * 1: Copy the DF bit from the inner IPv4 header to the outer * IPv4 header. @@ -183,7 +183,7 @@ struct rte_security_ipsec_sa_options { */ uint32_t copy_df : 1; - /**< Decrement inner packet Time To Live (TTL) field + /** Decrement inner packet Time To Live (TTL) field * * * 1: In tunnel mode, decrement inner packet IPv4 TTL or * IPv6 Hop Limit after tunnel decapsulation, or before tunnel -- 2.20.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2019-12-19 14:32:27.086213241 +0000 +++ 0019-security-fix-doxygen-fields.patch 2019-12-19 14:32:25.457284976 +0000 @@ -1,25 +1,26 @@ -From 382df9dfb6a8449b595e80d7ec391f90e3420d15 Mon Sep 17 00:00:00 2001 +From 0dc35d5907227c38b34ec641fdd2223b1552741a Mon Sep 17 00:00:00 2001 From: Radu Nicolau Date: Wed, 4 Sep 2019 12:03:11 +0100 Subject: [PATCH] security: fix doxygen fields +[ upstream commit 382df9dfb6a8449b595e80d7ec391f90e3420d15 ] + Replace /**< with /** for multiline doxygen comments. Fixes: c261d1431bd8 ("security: introduce security API and framework") -Cc: stable@dpdk.org Signed-off-by: Radu Nicolau Acked-by: Akhil Goyal Acked-by: Anoob Joseph --- - lib/librte_security/rte_security.h | 14 +++++++------- - 1 file changed, 7 insertions(+), 7 deletions(-) + lib/librte_security/rte_security.h | 12 ++++++------ + 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/lib/librte_security/rte_security.h b/lib/librte_security/rte_security.h -index 242c908d1c..2d064f4d04 100644 +index 2b609cbf7a..2c8cf6ba74 100644 --- a/lib/librte_security/rte_security.h +++ b/lib/librte_security/rte_security.h -@@ -115,14 +115,14 @@ struct rte_security_ipsec_tunnel_param { +@@ -143,14 +143,14 @@ struct rte_security_ipsec_tunnel_param { * IPsec Security Association option flags */ struct rte_security_ipsec_sa_options { @@ -36,7 +37,7 @@ * * * 1: Do UDP encapsulation/decapsulation so that IPSEC packets can * traverse through NAT boxes. -@@ -130,7 +130,7 @@ struct rte_security_ipsec_sa_options { +@@ -158,7 +158,7 @@ struct rte_security_ipsec_sa_options { */ uint32_t udp_encap : 1; @@ -45,7 +46,7 @@ * * * 1: Copy IPv4 or IPv6 DSCP bits from inner IP header to * the outer IP header in encapsulation, and vice versa in -@@ -139,7 +139,7 @@ struct rte_security_ipsec_sa_options { +@@ -167,7 +167,7 @@ struct rte_security_ipsec_sa_options { */ uint32_t copy_dscp : 1; @@ -54,7 +55,7 @@ * * * 1: Copy IPv6 flow label from inner IPv6 header to the * outer IPv6 header. -@@ -147,7 +147,7 @@ struct rte_security_ipsec_sa_options { +@@ -175,7 +175,7 @@ struct rte_security_ipsec_sa_options { */ uint32_t copy_flabel : 1; @@ -63,7 +64,7 @@ * * * 1: Copy the DF bit from the inner IPv4 header to the outer * IPv4 header. -@@ -155,7 +155,7 @@ struct rte_security_ipsec_sa_options { +@@ -183,7 +183,7 @@ struct rte_security_ipsec_sa_options { */ uint32_t copy_df : 1; @@ -72,15 +73,6 @@ * * * 1: In tunnel mode, decrement inner packet IPv4 TTL or * IPv6 Hop Limit after tunnel decapsulation, or before tunnel -@@ -164,7 +164,7 @@ struct rte_security_ipsec_sa_options { - */ - uint32_t dec_ttl : 1; - -- /**< Explicit Congestion Notification (ECN) -+ /** Explicit Congestion Notification (ECN) - * - * * 1: In tunnel mode, enable outer header ECN Field copied from - * inner header in tunnel encapsulation, or inner header ECN -- 2.20.1