> -Original Message-
> From: Anoob Joseph
> Sent: Wednesday, January 3, 2024 11:43 PM
> To: Suanming Mou
> Cc: dev@dpdk.org; Ciara Power
> Subject: RE: [EXT] [PATCH] app/test-crypto-perf: fix invalid mbuf next
> operation
>
> Hi Suanming,
>
&g
Hi Suanming,
Please see inline.
Thanks,
Anoob
> -Original Message-
> From: Suanming Mou
> Sent: Wednesday, January 3, 2024 6:06 PM
> To: Anoob Joseph
> Cc: dev@dpdk.org; Ciara Power
> Subject: RE: [EXT] [PATCH] app/test-crypto-perf: fix invalid mbuf next
&
Hi,
> -Original Message-
> From: Anoob Joseph
> Sent: Wednesday, January 3, 2024 7:22 PM
> To: Suanming Mou
> Cc: dev@dpdk.org; Ciara Power
> Subject: RE: [EXT] [PATCH] app/test-crypto-perf: fix invalid mbuf next
> operation
>
> Hi Suanming,
>
&
Hi Suanming,
Good catch. Please see inline.
Thanks,
Anoob
> -Original Message-
> From: Suanming Mou
> Sent: Wednesday, January 3, 2024 9:24 AM
> To: Ciara Power
> Cc: dev@dpdk.org
> Subject: [EXT] [PATCH] app/test-crypto-perf: fix invalid mbuf next operation
&
In fill_multi_seg_mbuf(), when remaining_segments is 0,
rte_mbuf m's next should pointer to NULL instead of a
new rte_mbuf, that casues setting m->next as NULL out
of the while loop to the invalid mbuf.
This commit fixes the invalid mbuf next operation.
Fixes: bf9d6702eca9 ("app/crypto-perf: use
5 matches
Mail list logo