data value for ofld packets is changed to
MAX_IMM_OFLD_TX_DATA_WR_LEN. Using the same in cxgbit also.
Fixes: 36bedb3f2e5b8 ("crypto: chtls - Inline TLS record Tx")
Signed-off-by: Ayush Sawal
---
drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.h| 3 +++
drivers/net/ethernet/chel
Hi Jakub,
On 1/15/2021 12:12 AM, Jakub Kicinski wrote:
On Wed, 13 Jan 2021 10:13:02 +0530 Ayush Sawal wrote:
Removing initialization of nrxq and rxq_size in uld_info. As
ipsec uses nic queues only, there is no need to create uld
rx queues for ipsec.
Why is this a fix? Does it break something
Removing initialization of nrxq and rxq_size in uld_info. As
ipsec uses nic queues only, there is no need to create uld
rx queues for ipsec.
Fixes: 1b77be463929e ("crypto/chcr: Moving chelsio's inline ipsec functionality
to /drivers/net")
Signed-off-by: Ayush Sawal
---
.../net/e
in chtls_set_quiesce_ctrl().
V2->V3:
- As kfree_skb() has a check for null skb, so removed this
check before calling kfree_skb() in func chtls_send_reset().
Fixes: cc35c88ae4db ("crypto : chtls - CPL handler definition")
Signed-off-by: Rohit Maheshwari
Signed-off-by: Ayush Sawal
---
drivers/net/
in chtls_set_quiesce_ctrl().
Fixes: cc35c88ae4db ("crypto : chtls - CPL handler definition")
Signed-off-by: Rohit Maheshwari
Signed-off-by: Ayush Sawal
---
drivers/net/ethernet/chelsio/cxgb4/t4_tcb.h | 7
.../chelsio/inline_crypto/chtls/chtls.h | 4 ++
.../chelsio/inline_crypto/chtls/chtls
ition")
Signed-off-by: Rohit Maheshwari
Signed-off-by: Ayush Sawal
---
drivers/net/ethernet/chelsio/cxgb4/t4_tcb.h | 7
.../chelsio/inline_crypto/chtls/chtls.h | 4 ++
.../chelsio/inline_crypto/chtls/chtls_cm.c| 35 ++--
.../chelsio/inline_crypto/chtls/chtls_hw
In case of server removal lookup_stid() may return NULL pointer, which
is used as listen_ctx. So added a check before accessing this pointer.
Fixes: cc35c88ae4db ("crypto : chtls - CPL handler definition")
Signed-off-by: Vinay Kumar Yadav
Signed-off-by: Ayush Sawal
---
drivers/ne
ndler definition")
Signed-off-by: Vinay Kumar Yadav
Signed-off-by: Ayush Sawal
---
drivers/net/ethernet/chelsio/inline_crypto/chtls/chtls_cm.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/net/ethernet/chelsio/inline_crypto/chtls/chtls_cm.c
b/drivers/net/ethern
umar Yadav
Signed-off-by: Ayush Sawal
---
.../net/ethernet/chelsio/inline_crypto/chtls/chtls_cm.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/drivers/net/ethernet/chelsio/inline_crypto/chtls/chtls_cm.c
b/drivers/net/ethernet/chelsio/inline_crypto/chtls/chtls_
In chtls_pass_accept_request(), removing the chtls_reqsk_free()
call to avoid oreq freeing twice. Here oreq is the pointer to
struct request_sock.
Fixes: cc35c88ae4db ("crypto : chtls - CPL handler definition")
Signed-off-by: Rohit Maheshwari
Signed-off-by: Ayush Sawal
---
drivers/ne
If route to peer is not configured, we might get non tls
devices from dst_neigh_lookup() which is invalid, adding a
check to avoid it.
Fixes: cc35c88ae4db ("crypto : chtls - CPL handler definition")
Signed-off-by: Rohit Maheshwari
Signed-off-by: Ayush Sawal
---
.../chelsio/inline_cr
chtls resources release sequence.
Ayush Sawal (7):
chtls: Fix hardware tid leak
chtls: Remove invalid set_tcb call
chtls: Fix panic when route to peer not configured
chtls: Avoid unnecessary freeing of oreq pointer
chtls: Replace skb_dequeue with skb_peek
chtls: Added a check to avoid
)
Signed-off-by: Rohit Maheshwari
Signed-off-by: Ayush Sawal
---
drivers/net/ethernet/chelsio/inline_crypto/chtls/chtls_cm.c | 3 ---
1 file changed, 3 deletions(-)
diff --git a/drivers/net/ethernet/chelsio/inline_crypto/chtls/chtls_cm.c
b/drivers/net/ethernet/chelsio/inline_crypto/chtls/c
Maheshwari
Signed-off-by: Ayush Sawal
---
.../chelsio/inline_crypto/chtls/chtls_cm.c| 39 ++-
1 file changed, 3 insertions(+), 36 deletions(-)
diff --git a/drivers/net/ethernet/chelsio/inline_crypto/chtls/chtls_cm.c
b/drivers/net/ethernet/chelsio/inline_crypto/chtls/chtls_
continuation line of the function
arguments.
V2->V3:
Fix the checkpatch.pl warnings.
Fixes: 1b77be463929 ("crypto/chcr: Moving chelsio's inline ipsec functionality
to /drivers/net")
Signed-off-by: Ayush Sawal
---
drivers/crypto/chelsio/chcr_core.h| 2 -
continuation line of the function
arguments.
Fixes: 1b77be463929 ("crypto/chcr: Moving chelsio's inline ipsec functionality
to /drivers/net")
Signed-off-by: Ayush Sawal
---
drivers/crypto/chelsio/chcr_core.h| 2 -
.../inline_crypto/ch_ipsec/chcr_ipsec.c | 147 ++
This patch changes the module name to "ch_ipsec" and prepends
"ch_ipsec" string instead of "chcr" in all debug messages and
function names.
Fixes: 1b77be463929 ("crypto/chcr: Moving chelsio's inline ipsec functionality
to /drivers/net")
Signed-off
: Add support for Inline IPSec")
Signed-off-by: Ayush Sawal
---
drivers/net/ethernet/chelsio/cxgb4/cxgb4.h| 5 +
.../net/ethernet/chelsio/cxgb4/cxgb4_main.c | 184 --
.../net/ethernet/chelsio/cxgb4/cxgb4_uld.h| 3 +
.../inline_crypto/ch_ipsec/chcr_ipsec.c |
On 7/27/2020 2:46 PM, Steffen Klassert wrote:
On Sat, Jul 25, 2020 at 04:20:34PM +1000, Herbert Xu wrote:
On Fri, Jul 24, 2020 at 05:01:08PM -0700, David Miller wrote:
Please start submitting chcr patches to the crypto subsystem, where it
belongs, instead of the networking GIT trees.
Hi Dave
rivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c:6088:35: error:
>> 'struct cxgb4_uld_info' has no member named 'xfrmdev_ops'
6088 | if (!adap->uld[CXGB4_ULD_CRYPTO].xfrmdev_ops) {
Fixes: 6dad4e8ab3ec ("chcr: Add support for Inline IPSec")
Report
chcr_xfrmdev_ops with cxgb4.
Fixes: 6dad4e8ab3ec ("chcr: Add support for Inline IPSec")
Signed-off-by: Ayush Sawal
---
drivers/crypto/chelsio/chcr_core.c| 35 ++--
drivers/crypto/chelsio/chcr_core.h| 7 +
drivers/crypto/chelsio/chcr_ipsec.c | 41 +
d
Hi Herbert,
On 6/11/2020 9:18 AM, Herbert Xu wrote:
On Wed, Jun 10, 2020 at 02:54:32AM +0530, Ayush Sawal wrote:
This patch puts a check for algorithm unregister, to avoid removal of
driver if the algorithm is under use.
Signed-off-by: Ayush Sawal
---
drivers/crypto/chelsio/chcr_algo.c
This patch puts a check for algorithm unregister, to avoid removal of
driver if the algorithm is under use.
Signed-off-by: Ayush Sawal
---
drivers/crypto/chelsio/chcr_algo.c | 18 ++
1 file changed, 14 insertions(+), 4 deletions(-)
diff --git a/drivers/crypto/chelsio
This patch calculates src and dst sg lengths separately for
dma mapping in case of aead operation.
This fixes a panic which occurs due to the accessing of a zero
length sg.
Panic:
[ 138.173225] kernel BUG at drivers/iommu/intel-iommu.c:1184!
Signed-off-by: Ayush Sawal
---
drivers/crypto
Patch 1: This fixes the kernel panic which occurs due to the accessing
of a zero length sg.
Patch 2: Avoiding unregistering the algorithm if cra_refcnt is not 1.
Ayush Sawal (2):
Crypto/chcr: Calculate src and dst sg lengths separately for dma map
Crypto/chcr: Checking cra_refcnt before
On 6/2/2020 3:48 PM, Stephen Rothwell wrote:
Hi Ayush,
On Tue, 2 Jun 2020 13:01:09 +0530 Ayush Sawal wrote:
On 6/2/2020 4:42 AM, Stephen Rothwell wrote:
In commit
055be6865dea ("Crypto/chcr: Fixes a coccinile check error")
Fixes tag
Fixes: 567be3a5d227 ("cry
Hi Stephen & David,
On 6/2/2020 4:42 AM, Stephen Rothwell wrote:
Hi all,
In commit
055be6865dea ("Crypto/chcr: Fixes a coccinile check error")
Fixes tag
Fixes: 567be3a5d227 ("crypto:
has these problem(s):
- Subject has leading but no trailing parentheses
- Subject has leading b
om u32 variable to the
original u8 key stream, put_aligned_be32() is used.
Signed-off-by: Ayush Sawal
---
drivers/crypto/chelsio/chcr_algo.c | 10 --
drivers/crypto/chelsio/chcr_ipsec.c | 2 +-
2 files changed, 5 insertions(+), 7 deletions(-)
diff --git a/drivers/crypto/chelsio/chcr_alg
ed_be32() and
put_unaligned_be16/32() functions.
patch2: Modified subject of the patch.
Ayush Sawal (2):
Crypto/chcr: Fixes compilations warnings
Crypto/chcr: Fixes a coccinile check error
drivers/crypto/chelsio/chcr_algo.c | 11 +--
drivers/crypto/chelsio/chcr_ipsec.c | 2 +-
2 fil
ss the requests").
Fixes: 567be3a5d227 ("crypto:
chelsio - Use multiple txq/rxq per tfm to process the requests").
V1->V2
-Modified subject.
Signed-off-by: Ayush Sawal
---
drivers/crypto/chelsio/chcr_algo.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/crypto/chelsio/chcr_a
ss the requests").
Fixes: 567be3a5d227 ("crypto:
chelsio - Use multiple txq/rxq per tfm to process the requests").
Signed-off-by: Ayush Sawal
---
drivers/crypto/chelsio/chcr_algo.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/crypto/chelsio/chcr_algo.c
b/drivers/crypt
Patch 1: Fixes the warnings seen when compiling using sparse tool.
Patch 2: Fixes a cocci check error introduced after commit
567be3a5d227 ("crypto: chelsio - Use multiple txq/rxq per
tfm to process the requests").
Ayush Sawal (2):
Crypto/chcr: Fixes compilations warnings
Crypto/c
This patch fixes the compilation warnings displayed by sparse tool for
chcr driver.
Signed-off-by: Ayush Sawal
---
drivers/crypto/chelsio/chcr_algo.c | 8
drivers/crypto/chelsio/chcr_ipsec.c | 2 +-
2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/drivers/crypto/chelsio
driver_xmit is called, which receives a segmented mtu sized packet which
is what the driver expects for ipsec offload. So this case becomes
unnecessary here, therefore removing it.
Signed-off-by: Ayush Sawal
---
drivers/crypto/chelsio/chcr_ipsec.c | 3 ---
1 file changed, 3 deletions(-)
diff
34 matches
Mail list logo