| 80bb303d | 25-Mar-2022 |
Volodymyr Fialko <[email protected]> |
event/cnxk: fix base pointer for SSO head wait
Function roc_sso_hws_head_wait() expects a base as input pointer, and it will itself get tag_op from the base. By passing tag_op instead of base pointe
event/cnxk: fix base pointer for SSO head wait
Function roc_sso_hws_head_wait() expects a base as input pointer, and it will itself get tag_op from the base. By passing tag_op instead of base pointer to this function will add SSOW_LF_GWS_TAG register offset twice, which will lead to accessing wrong register.
Fixes: 1f5b3d55c041 ("event/cnxk: store and reuse workslot status") Cc: [email protected]
Signed-off-by: Volodymyr Fialko <[email protected]> Acked-by: Jerin Jacob <[email protected]>
show more ...
|
| 76da1b51 | 28-Apr-2022 |
Gagandeep Singh <[email protected]> |
crypto/dpaa_sec: move cdb preparation to session create
Driver is preparing the shared descriptor of session while attaching the session to a queue pair. It should be prepared on session create.
Si
crypto/dpaa_sec: move cdb preparation to session create
Driver is preparing the shared descriptor of session while attaching the session to a queue pair. It should be prepared on session create.
Signed-off-by: Gagandeep Singh <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| ba2f161c | 28-Apr-2022 |
Gagandeep Singh <[email protected]> |
bus/dpaa: remove unused thread-specific variables
There are some crypto driver related thread specific variables which are no longer used, so removing them.
Signed-off-by: Gagandeep Singh <g.singh@
bus/dpaa: remove unused thread-specific variables
There are some crypto driver related thread specific variables which are no longer used, so removing them.
Signed-off-by: Gagandeep Singh <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| 04408e46 | 28-Apr-2022 |
Gagandeep Singh <[email protected]> |
crypto/dpaa2_sec: fix operation status for simple FD
Driver is not filling the operation status on dequeue in case the FD is simple.
So setting the status as per the results.
Fixes: 0a23d4b6f4c2 (
crypto/dpaa2_sec: fix operation status for simple FD
Driver is not filling the operation status on dequeue in case the FD is simple.
So setting the status as per the results.
Fixes: 0a23d4b6f4c2 ("crypto/dpaa2_sec: support protocol offload IPsec") Cc: [email protected]
Signed-off-by: Gagandeep Singh <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| e3d26438 | 28-Apr-2022 |
Gagandeep Singh <[email protected]> |
crypto/dpaa2_sec: fix crypto operation pointer
Driver is filling the crypto_op variable with an invalid value for atomic and ordered events which can results into segmentation fault.
This patch ass
crypto/dpaa2_sec: fix crypto operation pointer
Driver is filling the crypto_op variable with an invalid value for atomic and ordered events which can results into segmentation fault.
This patch assigning the correct crypto_op and event buffer pointers by extracting from FD.
Fixes: a77db24643b7 ("crypto/dpaa2_sec: support atomic queues") Fixes: 4562de326d30 ("crypto/dpaa2_sec: support ordered queue") Cc: [email protected]
Signed-off-by: Gagandeep Singh <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| 95af364b | 28-Apr-2022 |
Gagandeep Singh <[email protected]> |
crypto/dpaa2_sec: create fle pool per queue pair
Driver is creating a fle pool with a fixed number of buffers for all queue pairs of a DPSECI object. These fle buffers are equivalent to the number o
crypto/dpaa2_sec: create fle pool per queue pair
Driver is creating a fle pool with a fixed number of buffers for all queue pairs of a DPSECI object. These fle buffers are equivalent to the number of descriptors.
In this patch, creating the fle pool for each queue pair so that user can control the number of descriptors of a queue pair using API rte_cryptodev_queue_pair_setup().
Signed-off-by: Gagandeep Singh <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| 96ec64f1 | 28-Apr-2022 |
Vanshika Shukla <[email protected]> |
crypto/dpaa_sec: fix secondary process probing
DPAA hardware supports non-i/o performing secondary applications only. So we do not have to probe crypto devices in secondary applications.
Fixes: c3e
crypto/dpaa_sec: fix secondary process probing
DPAA hardware supports non-i/o performing secondary applications only. So we do not have to probe crypto devices in secondary applications.
Fixes: c3e85bdcc6e6 ("crypto/dpaa_sec: add crypto driver for NXP DPAA platform") Cc: [email protected]
Signed-off-by: Vanshika Shukla <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| c2e4aa01 | 28-Apr-2022 |
Gagandeep Singh <[email protected]> |
crypto/dpaa_sec: replace use of old build macros
Use the newer security macros defined by meson.
Signed-off-by: Gagandeep Singh <[email protected]> Acked-by: Akhil Goyal <[email protected]> |
| 8a3167db | 28-Apr-2022 |
Gagandeep Singh <[email protected]> |
crypto/dpaa_sec: enable QI physically
To perform crypto operations on DPAA platform, QI interface of HW must be enabled. Earlier DPAA crypto driver was dependent on kernel for QI enable. Now with th
crypto/dpaa_sec: enable QI physically
To perform crypto operations on DPAA platform, QI interface of HW must be enabled. Earlier DPAA crypto driver was dependent on kernel for QI enable. Now with this patch there is no such dependency on kernel.
Signed-off-by: Gagandeep Singh <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| 46cc6dcc | 28-Apr-2022 |
Gagandeep Singh <[email protected]> |
crypto/dpaa2_sec: fix chained FD length in raw datapath
DPAA2 sec raw driver is calculating the wrong lengths while creating the FD for chain. This patch fixes lengths for chain FD.
Fixes: aa6ec1fd
crypto/dpaa2_sec: fix chained FD length in raw datapath
DPAA2 sec raw driver is calculating the wrong lengths while creating the FD for chain. This patch fixes lengths for chain FD.
Fixes: aa6ec1fd8443 ("crypto/dpaa2_sec: support authenc with raw buffer API") Cc: [email protected]
Signed-off-by: Gagandeep Singh <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| b5e761fc | 28-Apr-2022 |
Gagandeep Singh <[email protected]> |
crypto/dpaa_sec: fix chained FD length in raw datapath
DPAA sec raw driver is calculating the wrong lengths while creating the FD for chain. This patch fixes lengths for chain FD.
Fixes: 78156d38e1
crypto/dpaa_sec: fix chained FD length in raw datapath
DPAA sec raw driver is calculating the wrong lengths while creating the FD for chain. This patch fixes lengths for chain FD.
Fixes: 78156d38e112 ("crypto/dpaa_sec: support authonly and chain with raw API") Cc: [email protected]
Signed-off-by: Gagandeep Singh <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| e2b70a30 | 28-Apr-2022 |
Gagandeep Singh <[email protected]> |
crypto/dpaa2_sec: fix buffer pool ID check
Simple fd rely on bpid of the buffers whereas other FD types can support buffers without bpid of pool.
So moving the bpid check to simple fd to mbuf conve
crypto/dpaa2_sec: fix buffer pool ID check
Simple fd rely on bpid of the buffers whereas other FD types can support buffers without bpid of pool.
So moving the bpid check to simple fd to mbuf conversion function.
Fixes: 8d1f3a5d751b ("crypto/dpaa2_sec: support crypto operation") Cc: [email protected]
Signed-off-by: Gagandeep Singh <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| 6a2b01a4 | 28-Apr-2022 |
Gagandeep Singh <[email protected]> |
crypto/dpaa2_sec: fix fle buffer leak
Driver allocates a fle buffer for each packet before enqueue and free the buffer on dequeue. But in case if there are enqueue failures, then code should free th
crypto/dpaa2_sec: fix fle buffer leak
Driver allocates a fle buffer for each packet before enqueue and free the buffer on dequeue. But in case if there are enqueue failures, then code should free the fle buffers.
Fixes: 4562de326d30 ("crypto/dpaa2_sec: support ordered queue") Fixes: 3ffce51a1f04 ("crypto/dpaa2_sec: add enqueue retry timeout") Cc: [email protected]
Signed-off-by: Gagandeep Singh <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| 146fe289 | 18-Apr-2022 |
Raja Zidane <[email protected]> |
crypto/mlx5: fix login cleanup
In case of a probing failure caused by wrong devarg provided, login isn't destroyed when exiting.
Destroy login on failure.
Fixes: ba707cdb6da2 ("crypto/mlx5: fix qu
crypto/mlx5: fix login cleanup
In case of a probing failure caused by wrong devarg provided, login isn't destroyed when exiting.
Destroy login on failure.
Fixes: ba707cdb6da2 ("crypto/mlx5: fix queue size configuration") Cc: [email protected]
Signed-off-by: Raja Zidane <[email protected]> Acked-by: Matan Azrad <[email protected]>
show more ...
|
| 59f8c378 | 21-Apr-2022 |
Gowrishankar Muthukrishnan <[email protected]> |
crypto/cnxk: prevent out-of-bound access in capabilities
In a situation where crypto_caps elements are checked only for RTE_CRYPTO_OP_TYPE_UNDEFINED until valid op defined, there is possibility for
crypto/cnxk: prevent out-of-bound access in capabilities
In a situation where crypto_caps elements are checked only for RTE_CRYPTO_OP_TYPE_UNDEFINED until valid op defined, there is possibility for an out of bound access. Add this array by one element for current capabilities.
Signed-off-by: Gowrishankar Muthukrishnan <[email protected]> Acked-by: Anoob Joseph <[email protected]>
show more ...
|
| c662a1f9 | 25-Apr-2022 |
Anoob Joseph <[email protected]> |
crypto/cnxk: use set ctx operation for session destroy
Usage of flush and invalidate would involve delays to account for flush delay. Use set_ctx operation instead. When set_ctx fails, fall back to
crypto/cnxk: use set ctx operation for session destroy
Usage of flush and invalidate would involve delays to account for flush delay. Use set_ctx operation instead. When set_ctx fails, fall back to flush + invalidate scheme.
Signed-off-by: Anoob Joseph <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| 6fb81d26 | 25-Apr-2022 |
Anoob Joseph <[email protected]> |
crypto/cnxk: remove useless return code
The function doesn't return error. Remove return.
Signed-off-by: Anoob Joseph <[email protected]> Acked-by: Akhil Goyal <[email protected]> |
| e85982ab | 25-Apr-2022 |
Archana Muniganti <[email protected]> |
crypto/cnxk: support AES-GMAC
Added lookaside IPsec AES-GMAC support in CNXK PMD.
Signed-off-by: Archana Muniganti <[email protected]> Acked-by: Anoob Joseph <[email protected]> Acked-by: Akhil
crypto/cnxk: support AES-GMAC
Added lookaside IPsec AES-GMAC support in CNXK PMD.
Signed-off-by: Archana Muniganti <[email protected]> Acked-by: Anoob Joseph <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| b4409f2b | 25-Apr-2022 |
Archana Muniganti <[email protected]> |
crypto/cnxk: support AH mode
Added IPsec AH mode support in CN9K and CN10K PMD
Signed-off-by: Archana Muniganti <[email protected]> Acked-by: Anoob Joseph <[email protected]> Acked-by: Akhil Go
crypto/cnxk: support AH mode
Added IPsec AH mode support in CN9K and CN10K PMD
Signed-off-by: Archana Muniganti <[email protected]> Acked-by: Anoob Joseph <[email protected]> Acked-by: Akhil Goyal <[email protected]>
show more ...
|
| 841147ef | 17-Mar-2022 |
Gagandeep Singh <[email protected]> |
crypto/dpaa_sec: fix digest size
DPAA crypto driver can support 64 bytes size digest size for SHA512-HMAC. This patch changes the value of macro max supported digest size to 64.
Fixes: c3e85bdcc6e6
crypto/dpaa_sec: fix digest size
DPAA crypto driver can support 64 bytes size digest size for SHA512-HMAC. This patch changes the value of macro max supported digest size to 64.
Fixes: c3e85bdcc6e6 ("crypto/dpaa_sec: add crypto driver for NXP DPAA platform") Cc: [email protected]
Signed-off-by: Gagandeep Singh <[email protected]>
show more ...
|
| 2c6b3438 | 09-Mar-2022 |
Piotr Bronowski <[email protected]> |
crypto/ipsec_mb: fix GCM requested digest length
This patch removes coverity defect CID 375828: Untrusted value as argument (TAINTED_SCALAR)
Coverity issue: 375828 Fixes: ceb863938708 ("crypto/aesn
crypto/ipsec_mb: fix GCM requested digest length
This patch removes coverity defect CID 375828: Untrusted value as argument (TAINTED_SCALAR)
Coverity issue: 375828 Fixes: ceb863938708 ("crypto/aesni_gcm: support all truncated digest sizes") Cc: [email protected]
Signed-off-by: Piotr Bronowski <[email protected]> Acked-by: Ciara Power <[email protected]>
show more ...
|
| 837269c2 | 09-Mar-2022 |
Pablo de Lara <[email protected]> |
crypto/ipsec_mb: fix GMAC parameters setting
AES-GMAC requires plaintext length to be 0 when using AES-GCM, so only AAD data is used.
Fixes: a501609ea646 ("crypto/ipsec_mb: fix length and offset se
crypto/ipsec_mb: fix GMAC parameters setting
AES-GMAC requires plaintext length to be 0 when using AES-GCM, so only AAD data is used.
Fixes: a501609ea646 ("crypto/ipsec_mb: fix length and offset settings") Cc: [email protected]
Signed-off-by: Pablo de Lara <[email protected]> Acked-by: Fan Zhang <[email protected]> Acked-by: Radu Nicolau <[email protected]> Tested-by: Radu Nicolau <[email protected]>
show more ...
|
| 1df04571 | 01-Mar-2022 |
Kai Ji <[email protected]> |
crypto/qat: fix process type handling
This patch fix the memory corruptions issue reported by coverity. The process type handling in QAT PMDs where only primary and secondary process are supported i
crypto/qat: fix process type handling
This patch fix the memory corruptions issue reported by coverity. The process type handling in QAT PMDs where only primary and secondary process are supported in qat build request.
Coverity issue: 376551, 376570, 376534 Fixes: fb3b9f492205 ("crypto/qat: rework burst data path")
Signed-off-by: Kai Ji <[email protected]>
show more ...
|
| 8545c6d2 | 01-Mar-2022 |
Arek Kusztal <[email protected]> |
crypto/qat: fix smaller modulus cases for mod exp
This patch fixes not working cases when modulus is smaller than other arguments.
Fixes: 3b78aa7b2317 ("crypto/qat: refactor asymmetric crypto funct
crypto/qat: fix smaller modulus cases for mod exp
This patch fixes not working cases when modulus is smaller than other arguments.
Fixes: 3b78aa7b2317 ("crypto/qat: refactor asymmetric crypto functions")
Signed-off-by: Arek Kusztal <[email protected]> Acked-by: Fan Zhang <[email protected]>
show more ...
|
| 8f46d07b | 28-Feb-2022 |
Arek Kusztal <[email protected]> |
crypto/qat: fix RSA clearing
This patch fixes structurally dead code in QAT asym pmd.
Coverity issue: 376563 Fixes: 002486db239e ("crypto/qat: refactor asymmetric session")
Signed-off-by: Arek Kus
crypto/qat: fix RSA clearing
This patch fixes structurally dead code in QAT asym pmd.
Coverity issue: 376563 Fixes: 002486db239e ("crypto/qat: refactor asymmetric session")
Signed-off-by: Arek Kusztal <[email protected]>
show more ...
|