[net-next v5 14/14] octeontx2-af: cn10k: MAC internal loopback support

2021-02-10 Thread Geetha sowjanya
From: Hariprasad Kelam MAC on CN10K silicon support loopback for selftest or debug purposes. This patch does necessary configuration to loopback packets upon receiving request from LMAC mapped RVU PF's netdev via mailbox. Also MAC (CGX) on OcteonTx2 silicon variants and MAC (RPM) on OcteonTx3 CN

[net-next v5 12/14] octeontx2-af: cn10k: Add RPM LMAC pause frame support

2021-02-10 Thread Geetha sowjanya
From: Rakesh Babu Flow control configuration is different for CGX(Octeontx2) and RPM(CN10K) functional blocks. This patch adds the necessary changes for RPM to support 802.3 pause frames configuration on cn10k platforms. Signed-off-by: Rakesh Babu Signed-off-by: Geetha sowjanya Signed-off-by:

[net-next v5 13/14] octeontx2-af: cn10k: Add RPM Rx/Tx stats support

2021-02-10 Thread Geetha sowjanya
From: Hariprasad Kelam RPM supports below list of counters as an extension to existing counters * class based flow control pause frames * vlan/jabber/fragmented packets * fcs/alignment/oversized error packets This patch adds support to display supported RPM counters via debugfs and define

[net-next v5 11/14] octeontx2-pf: cn10k: Get max mtu supported from admin function

2021-02-10 Thread Geetha sowjanya
From: Hariprasad Kelam CN10K supports max MTU of 16K on LMAC links and 64k on LBK links and Octeontx2 silicon supports 9K mtu on both links. Get the same from nix_get_hw_info mbox message in netdev probe. This patch also calculates receive buffer size required based on the MTU set. Signed-off-b

[net-next v5 10/14] octeontx2-af: cn10K: Add MTU configuration

2021-02-10 Thread Geetha sowjanya
From: Hariprasad Kelam OcteonTx3 CN10K silicon supports bigger MTU when compared to 9216 MTU supported by OcteonTx2 silicon variants. Lookback interface supports upto 64K and RPM LMAC interfaces support upto 16K. This patch does the necessary configuration and adds support for PF/VF drivers to r

[net-next v5 09/14] octeontx2-af: cn10k: Add support for programmable channels

2021-02-10 Thread Geetha sowjanya
From: Subbaraya Sundeep NIX uses unique channel numbers to identify the packet sources/sinks like CGX,LBK and SDP. The channel numbers assigned to each block are hardwired in CN9xxx silicon. The fixed channel numbers in CN9xxx are: 0x0 | a << 8 | b- LBK(0..3)_CH(0..63) 0x0 | a << 8

[net-next v5 07/14] octeontx2-pf: cn10k: Use LMTST lines for NPA/NIX operations

2021-02-10 Thread Geetha sowjanya
This patch adds support to use new LMTST lines for NPA batch free and burst SQE flush. Adds new dev_hw_ops structure to hold platform specific functions and create new files cn10k.c and cn10k.h. Signed-off-by: Geetha sowjanya Signed-off-by: Sunil Goutham --- .../ethernet/marvell/octeontx2/nic/M

[net-next v5 08/14] octeontx2-af: cn10k: Add RPM MAC support

2021-02-10 Thread Geetha sowjanya
From: Hariprasad Kelam OcteonTx2's next gen platform the CN10K has RPM MAC which has a different serdes when compared to CGX MAC. Though the underlying HW is different, the CSR interface has been designed largely inline with CGX MAC, with few exceptions though. So we are using the same CGX driver

[net-next v5 06/14] octeontx2-pf: cn10k: Map LMTST region

2021-02-10 Thread Geetha sowjanya
On CN10K platform transmit/receive buffer alloc and free from/to hardware had changed to support burst operation. Whereas pervious silicon's only support single buffer free at a time. To Support the same firmware allocates a DRAM region for each PF/VF for storing LMTLINES. These LMTLINES are used f

[net-next v5 05/14] octeontx2-pf: cn10k: Initialise NIX context

2021-02-10 Thread Geetha sowjanya
On CN10K platform NIX RQ and SQ context structure got changed. This patch uses new mbox message "NIX_CN10K_AQ_ENQ" for NIX context initialization on CN10K platform. This patch also updates the nix_rx_parse_s and nix_sqe_sg_s structures to add packet steering bit feilds. Signed-off-by: Geetha sowj

[net-next v5 04/14] octeontx2-af: cn10k: Update NIX and NPA context in debugfs

2021-02-10 Thread Geetha sowjanya
On CN10K platform NPA and NIX context structure bit fields had changed to support new features like bandwidth steering etc. This patch dumps approprate context for CN10K platform. Signed-off-by: Geetha sowjanya Signed-off-by: Sunil Goutham --- .../marvell/octeontx2/af/rvu_debugfs.c| 177

[net-next v5 03/14] octeontx2-af: cn10k: Update NIX/NPA context structure

2021-02-10 Thread Geetha sowjanya
NIX hardware context structure got changed to accommodate new features like bandwidth steering, L3/L4 outer/inner checksum enable/disable etc., on CN10K platform. This patch defines new mbox message NIX_CN10K_AQ_INST for new NIX context initialization. This patch also updates the NPA context struc

[net-next v5 02/14] octeontx2-pf: cn10k: Add mbox support for CN10K

2021-02-10 Thread Geetha sowjanya
From: Subbaraya Sundeep Firmware allocates memory regions for PFs and VFs in DRAM. The PFs memory region is used for AF-PF and PF-VF mailbox. This mbox facilitate communication between AF-PF and PF-VF. On CN10K platform: The DRAM region allocated to PF is enumerated as PF BAR4 memory. PF BAR4 co

[net-next v5 01/14] octeontx2-af: cn10k: Add mbox support for CN10K platform

2021-02-10 Thread Geetha sowjanya
From: Subbaraya Sundeep Firmware allocates memory regions for PFs and VFs in DRAM. The PFs memory region is used for AF-PF and PF-VF mailbox. This mbox facilitates communication between AF-PF and PF-VF. On CN10K platform: The DRAM region allocated to PF is enumerated as PF BAR4 memory. PF BAR4 c

[net-next v5 00/14] Add Marvell CN10K support

2021-02-10 Thread Geetha sowjanya
The current admin function (AF) driver and the netdev driver supports OcteonTx2 silicon variants. The same OcteonTx2's Resource Virtualization Unit (RVU) is carried forward to the next-gen silicon ie OcteonTx3, with some changes and feature enhancements. This patch set adds support for OcteonTx3 (

Re: [PATCH] crypto: serpent - Fix sparse byte order warnings

2021-02-10 Thread Ard Biesheuvel
On Wed, 10 Feb 2021 at 08:16, Herbert Xu wrote: > > This patch fixes the byte order markings in serpent. > > Signed-off-by: Herbert Xu Tested-by: Ard Biesheuvel # arm64 big-endian > > diff --git a/crypto/serpent_generic.c b/crypto/serpent_generic.c > index 236c87547a17..45f98b750053 100644 > -

[GIT PULL] keys: Collected minor fixes and cleanups

2021-02-10 Thread David Howells
Hi Linus, Here's a set of minor keyrings fixes/cleanups that I've collected from various people for the upcoming merge window. A couple of them might, in theory, be visible to userspace: (*) Make blacklist_vet_description() reject uppercase letters as they don't match the all-lowercase h

[no subject]

2021-02-10 Thread David Howells
Hi Linus, Here's a set of minor keyrings fixes/cleanups that I've collected from various people for the upcoming merge window. A couple of them might, in theory, be visible to userspace: (*) Make blacklist_vet_description() reject uppercase letters as they don't match the all-lowercase h

Re: [PATCH 4/4] crypto: allwinner - Fix the parameter of dma_unmap_sg()

2021-02-10 Thread Corentin Labbe
Le Tue, Feb 09, 2021 at 02:59:25PM +0800, chenxiang a écrit : > From: Xiang Chen > > For function dma_unmap_sg(), the parameter should be number of > elements in the scatterlist prior to the mapping, not after the mapping. > So fix this usage. > > Signed-off-by: Xiang Chen > --- > drivers/cry

[PATCH v6 4/5] certs: Factor out the blacklist hash creation

2021-02-10 Thread Mickaël Salaün
From: Mickaël Salaün Factor out the blacklist hash creation with the get_raw_hash() helper. This also centralize the "tbs" and "bin" prefixes and make them private, which help to manage them consistently. Cc: David Howells Cc: David S. Miller Cc: David Woodhouse Cc: Eric Snowberg Cc: Herbert

[PATCH v6 3/5] certs: Make blacklist_vet_description() more strict

2021-02-10 Thread Mickaël Salaün
From: Mickaël Salaün Before exposing this new key type to user space, make sure that only meaningful blacklisted hashes are accepted. This is also checked for builtin blacklisted hashes, but a following commit make sure that the user will notice (at built time) and will fix the configuration if

[PATCH v6 2/5] certs: Check that builtin blacklist hashes are valid

2021-02-10 Thread Mickaël Salaün
From: Mickaël Salaün Add and use a check-blacklist-hashes.awk script to make sure that the builtin blacklist hashes set with CONFIG_SYSTEM_BLACKLIST_HASH_LIST will effectively be taken into account as blacklisted hashes. This is useful to debug invalid hash formats, and it make sure that previou

[PATCH v6 5/5] certs: Allow root user to append signed hashes to the blacklist keyring

2021-02-10 Thread Mickaël Salaün
From: Mickaël Salaün Add a kernel option SYSTEM_BLACKLIST_AUTH_UPDATE to enable the root user to dynamically add new keys to the blacklist keyring. This enables to invalidate new certificates, either from being loaded in a keyring, or from being trusted in a PKCS#7 certificate chain. This also

[PATCH v6 0/5] Enable root to update the blacklist keyring

2021-02-10 Thread Mickaël Salaün
This new patch series is a rebase on David Howells's keys-misc branch. This mainly fixes UEFI DBX and the new Eric Snowberg's feature to import asymmetric keys to the blacklist keyring. I successfully tested this patch series with the 186 entries from https://uefi.org/sites/default/files/resources/

[PATCH v6 1/5] tools/certs: Add print-cert-tbs-hash.sh

2021-02-10 Thread Mickaël Salaün
From: Mickaël Salaün Add a new helper print-cert-tbs-hash.sh to generate a TBSCertificate hash from a given certificate. This is useful to generate a blacklist key description used to forbid loading a specific certificate in a keyring, or to invalidate a certificate provided by a PKCS#7 file. T