From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 28AAAA034F for ; Tue, 1 Mar 2022 11:44:19 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 24434426DE; Tue, 1 Mar 2022 11:44:19 +0100 (CET) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by mails.dpdk.org (Postfix) with ESMTP id CAC0A407FF for ; Tue, 1 Mar 2022 11:44:17 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1646131457; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=aJjQaHHuwhLoLCa9rqhb40HJb7EpB8+mOBOPGBDghAg=; b=AS7FoDQF2ezCRGMSavgYppndwWAlV5KWXrmJtKXb7ocrw1J+fPrERV78P08n3sTFj7C471 7MWJwA8GezYSFLwlWWn2s7f1q7N1b5wSqLfBfiUcOb1usnBym+bXkian40aUGeulNOExzy TXj38hylTbxw3g92cUShNKXCyxlT+zc= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-464-4rWuhx3jPIqWspn5xCRbSQ-1; Tue, 01 Mar 2022 05:44:14 -0500 X-MC-Unique: 4rWuhx3jPIqWspn5xCRbSQ-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 12E691868335; Tue, 1 Mar 2022 10:44:13 +0000 (UTC) Received: from rh.Home (unknown [10.39.194.142]) by smtp.corp.redhat.com (Postfix) with ESMTP id 09477752D1; Tue, 1 Mar 2022 10:44:11 +0000 (UTC) From: Kevin Traynor To: Yunjian Wang Cc: Ferruh Yigit , dpdk stable Subject: patch 'net/iavf: reset security context pointer on stop' has been queued to stable release 21.11.1 Date: Tue, 1 Mar 2022 10:41:56 +0000 Message-Id: <20220301104300.334382-40-ktraynor@redhat.com> In-Reply-To: <20220301104300.334382-1-ktraynor@redhat.com> References: <20220301104300.334382-1-ktraynor@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=ktraynor@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 21.11.1 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 03/06/22. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/kevintraynor/dpdk-stable This queued commit can be viewed at: https://github.com/kevintraynor/dpdk-stable/commit/a42a8745993eb2627c6b60406e25de6926037627 Thanks. Kevin --- >From a42a8745993eb2627c6b60406e25de6926037627 Mon Sep 17 00:00:00 2001 From: Yunjian Wang Date: Tue, 15 Feb 2022 21:02:27 +0800 Subject: [PATCH] net/iavf: reset security context pointer on stop [ upstream commit 23abab4f14d3e2425e74c296769d21b79d696096 ] When iavf_security_ctx_destroy() is cleaning up, it does not correctly set the security_ctx variable to NULL, which will lead to wild pointer. Fixes: 6bc987ecb860 ("net/iavf: support IPsec inline crypto") Signed-off-by: Yunjian Wang Reviewed-by: Ferruh Yigit --- drivers/net/iavf/iavf_ipsec_crypto.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/net/iavf/iavf_ipsec_crypto.c b/drivers/net/iavf/iavf_ipsec_crypto.c index 6ac1b213db..a63e42f29a 100644 --- a/drivers/net/iavf/iavf_ipsec_crypto.c +++ b/drivers/net/iavf/iavf_ipsec_crypto.c @@ -1554,6 +1554,6 @@ iavf_security_ctx_destroy(struct iavf_adapter *adapter) rte_free(sctx); - iavf_sctx = NULL; - sctx = NULL; + adapter->security_ctx = NULL; + adapter->vf.eth_dev->security_ctx = NULL; return 0; -- 2.34.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2022-03-01 10:41:02.400013874 +0000 +++ 0040-net-iavf-reset-security-context-pointer-on-stop.patch 2022-03-01 10:41:01.302244097 +0000 @@ -1 +1 @@ -From 23abab4f14d3e2425e74c296769d21b79d696096 Mon Sep 17 00:00:00 2001 +From a42a8745993eb2627c6b60406e25de6926037627 Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit 23abab4f14d3e2425e74c296769d21b79d696096 ] + @@ -10 +11,0 @@ -Cc: stable@dpdk.org