Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp4209349pxb; Tue, 17 Nov 2020 14:29:38 -0800 (PST) X-Google-Smtp-Source: ABdhPJyHMAGYqxw6cadpKE0+K69itcEUxHVOIOz2X+gsXQ6mqY71AIjIJh3zbwcLbBHa6QD8k+QN X-Received: by 2002:a05:6402:44b:: with SMTP id p11mr23133499edw.164.1605652178667; Tue, 17 Nov 2020 14:29:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605652178; cv=none; d=google.com; s=arc-20160816; b=DdIVg5gRLQ7/fiF13QSm0eu/4bU7vPiMBGRzofGenCbC2tHIBVz27YQMYRHBU5bEVE OXIsquBlkbTTrlb06aDGKB5ZCvIv7GDweY0h5v6gbawUhCPNH9QXUv9zmxNFKZOUkq/o 1mNgkE5/FnqismEs1f3lWRvbUZXhzTEVrkDD+Hnz8QO6z6k5TlmBZ0GPgXwuZK6gXcOk 4ENeO9K5xv0W9cYkvpsIr+5O/vO+pV+r1q/Pu6B78olRLFjLhg3FYYPzim532ghqXVda sqf7jO1q7AVI4t6DkzdWZwRmF4LwkHy1hZ57raSnF3pljV4xUfrRwwlzt+hPF87wrw3/ qvZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=xnlr1iEGzQiIhl5dP4uuNSzhUXuuT88dsIDUQE8u2cs=; b=I7silgR2A1FaoA3hx4uCSNVCkkbjDLidTsXd5V6JCusOt8bHl/SvKJFJWVGTCvRSRL Qs6XUHxJMTE715vCWXhDEmQLXHOxgpgcudzhR7QQnWaTAPHpEBiCdU/8N6icr6h8Xskd blzFgVNaKa0N5JgZMErQZw3SvagowI4lvJCewJqne/EIYWznP0zP1WDijoR9cqRnyufs Ksi0YXtBg8fCwpHo4eLvn348I3RfUXw9C1zvc0yk/7cF3uRibDqpYkVdF04Wvo7PKkLq OfdvSGUzGpXfhxSn4ohPyD2NY89RfBriA7W4/4AvZaJh7vbyo7Wv1tJfXKdiIDVOrW2O AWbg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ngK+nrIR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w7si8653542ejn.180.2020.11.17.14.28.53; Tue, 17 Nov 2020 14:29:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ngK+nrIR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729108AbgKQW0D (ORCPT + 99 others); Tue, 17 Nov 2020 17:26:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:38206 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725823AbgKQW0D (ORCPT ); Tue, 17 Nov 2020 17:26:03 -0500 Received: from kicinski-fedora-PC1C0HJN.hsd1.ca.comcast.net (c-67-180-217-166.hsd1.ca.comcast.net [67.180.217.166]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0CDF3241A6; Tue, 17 Nov 2020 22:26:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605651962; bh=oolxzZft70FKdrR5koKNa14651ERpY0sfPZUoLt+SKw=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=ngK+nrIRMKPhN+J5uZcql2PrzLrKZaW8pxtXdhSBlqaOF+DNS5W3tkYFFWqhz9jub 3xEOKj78jUGahxn++pXBprA8VephbYFUS+GCtwgt0ApkOwqc4tVU8+HvNTH+ugf2pF bI3VHTWcHH0Dp5kwkh9LqNO/CwAGRpJzHaNvTfyo= Date: Tue, 17 Nov 2020 14:25:59 -0800 From: Jakub Kicinski To: Tom Seewald Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Vishal Kulkarni , "David S. Miller" , Rohit Maheshwari Subject: Re: [PATCH] cxbgb4: Fix build failure when CHELSIO_TLS_DEVICE=n Message-ID: <20201117142559.37e6847f@kicinski-fedora-PC1C0HJN.hsd1.ca.comcast.net> In-Reply-To: <20201116023140.28975-1-tseewald@gmail.com> References: <20201116023140.28975-1-tseewald@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 15 Nov 2020 20:31:40 -0600 Tom Seewald wrote: > After commit 9d2e5e9eeb59 ("cxgb4/ch_ktls: decrypted bit is not enough") > building the kernel with CHELSIO_T4=y and CHELSIO_TLS_DEVICE=n results > in the following error: > > ld: drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.o: in function > `cxgb_select_queue': > cxgb4_main.c:(.text+0x2dac): undefined reference to `tls_validate_xmit_skb' > > This is caused by cxgb_select_queue() calling cxgb4_is_ktls_skb() without > checking if CHELSIO_TLS_DEVICE=y. Fix this by calling cxgb4_is_ktls_skb() > only when this config option is enabled. > > Fixes: 9d2e5e9eeb59 ("cxgb4/ch_ktls: decrypted bit is not enough") > Signed-off-by: Tom Seewald > --- > drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c b/drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c > index 7fd264a6d085..8e8783afd6df 100644 > --- a/drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c > +++ b/drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c > @@ -1176,7 +1176,9 @@ static u16 cxgb_select_queue(struct net_device *dev, struct sk_buff *skb, > txq = netdev_pick_tx(dev, skb, sb_dev); > if (xfrm_offload(skb) || is_ptp_enabled(skb, dev) || > skb->encapsulation || > - cxgb4_is_ktls_skb(skb) || > +#if IS_ENABLED(CONFIG_CHELSIO_TLS_DEVICE) > + cxgb4_is_ktls_skb(skb) || > +#endif /* CHELSIO_TLS_DEVICE */ > (proto != IPPROTO_TCP && proto != IPPROTO_UDP)) > txq = txq % pi->nqsets; > The tls header already tries to solve this issue, it just does it poorly. This is a better fix: diff --git a/include/net/tls.h b/include/net/tls.h index baf1e99d8193..2ff3f4f7954a 100644 --- a/include/net/tls.h +++ b/include/net/tls.h @@ -441,11 +441,11 @@ struct sk_buff * tls_validate_xmit_skb(struct sock *sk, struct net_device *dev, struct sk_buff *skb); static inline bool tls_is_sk_tx_device_offloaded(struct sock *sk) { -#ifdef CONFIG_SOCK_VALIDATE_XMIT +#ifdef CONFIG_TLS_DEVICE return sk_fullsock(sk) && (smp_load_acquire(&sk->sk_validate_xmit_skb) == &tls_validate_xmit_skb); #else return false; Please test this and submit if it indeed solves the problem. Thanks!