Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2560177pxb; Mon, 19 Apr 2021 08:25:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyD6spYqXtm5O437PW8ArgqtIO0limxmgjyd46yh34TAArAKHnt+O6rK05NWQwAd/E6Q4iZ X-Received: by 2002:a05:6402:2708:: with SMTP id y8mr26542921edd.265.1618845958802; Mon, 19 Apr 2021 08:25:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618845958; cv=none; d=google.com; s=arc-20160816; b=drOOcRzMqtpH9eEVQCY/NDYNN5AM2194iCgNIghA8+aqp5z1P1uv7Ovm1QGpo6ycUf qZ9psVwy826L2vBuawuNxmbTWtnCaNpdWJDwiyKcSKqaJs6yNNqSSP9+jk7F+nRqNgir +aPOBPPN4fEFVOOE/jLN+XCiWq9xM/ilrLPDFpMOvRucVBsREx7SoqpIaX13ZpcGdm00 zAFUFEZsB79nJrlxdgrut4+A3Z5Faa9/caf0TYLUw9QmWYFaod+rdBHl2SjcKnsC/Fmb dmp8nbc0t/aZJd3wG4PwSw0+N6RKYHINoO/K/GH5CZ03sIMGDchBNqRAjzYx3pi2YLWR W2wg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=GJeBeQraNeYZ0fA6iazjr+lSvWMgTv6YVr7dXYndcXA=; b=aqFAZKHooeAVv/E/7uwrBKA0tSZ/LPLy9+O8csf9wl0QPuabiumTHiVEQZfgWf7L0B LksBpxdaKi/bNbImLX1Ug50P1B95NSuxwi5wkJVgDnj57KmVdpCI7mVJ+N4u6ZADRtgC gQbPac1cyigkIiJdXRbrPLzhf2A1X6EEE5lpPiAu0BdOjOMCL3cbqc9XphGlyXNEt9gN ycxnNtiUgPb/4xcifqg6QLSkwAvmVWjTSryAQ8Sy9u0YHNQ7gEicGgWjxchfuwDjODqh 46lMsAq72/tTXHkj4f9R3mLWwg6+likoQ7txWrCvZiA5UMknsUKzrwuiCTaWK+qWDDMC C9vw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=BSdNk2hr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f15si13801935edm.87.2021.04.19.08.25.35; Mon, 19 Apr 2021 08:25:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=BSdNk2hr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240062AbhDSNSc (ORCPT + 99 others); Mon, 19 Apr 2021 09:18:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:46846 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240268AbhDSNPL (ORCPT ); Mon, 19 Apr 2021 09:15:11 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7FEC3613D7; Mon, 19 Apr 2021 13:13:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1618838001; bh=J9UUaUQJXpc+Wtidh7Auovyz9JrG1MkqCjWCk6hUegc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=BSdNk2hrz313AkV+D+iKcM1/kfiUMOcRO9rEBxu343AgexXNFrDgV5oIBdJ5Z11Rd G/PfXDVhkN0wfPlWS/jDRwVha8hdPzSIjrRpfjE81QC1Y5TxJJlmE+r2p2PzYJM2WE 2dbEZAFidD5HPEnYvocwzIZD8++/Zh1tcZk9oyQM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vinay Kumar Yadav , Rohit Maheshwari , "David S. Miller" Subject: [PATCH 5.11 100/122] ch_ktls: tcb close causes tls connection failure Date: Mon, 19 Apr 2021 15:06:20 +0200 Message-Id: <20210419130533.556638249@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210419130530.166331793@linuxfoundation.org> References: <20210419130530.166331793@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vinay Kumar Yadav commit 21d8c25e3f4b9052a471ced8f47b531956eb9963 upstream. HW doesn't need marking TCB closed. This TCB state change sometimes causes problem to the new connection which gets the same tid. Fixes: 34aba2c45024 ("cxgb4/chcr : Register to tls add and del callback") Signed-off-by: Vinay Kumar Yadav Signed-off-by: Rohit Maheshwari Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/chcr_ktls.c | 19 ---------- 1 file changed, 19 deletions(-) --- a/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/chcr_ktls.c +++ b/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/chcr_ktls.c @@ -355,18 +355,6 @@ static int chcr_set_tcb_field(struct chc } /* - * chcr_ktls_mark_tcb_close: mark tcb state to CLOSE - * @tx_info - driver specific tls info. - * return: NET_TX_OK/NET_XMIT_DROP. - */ -static int chcr_ktls_mark_tcb_close(struct chcr_ktls_info *tx_info) -{ - return chcr_set_tcb_field(tx_info, TCB_T_STATE_W, - TCB_T_STATE_V(TCB_T_STATE_M), - CHCR_TCB_STATE_CLOSED, 1); -} - -/* * chcr_ktls_dev_del: call back for tls_dev_del. * Remove the tid and l2t entry and close the connection. * it per connection basis. @@ -400,8 +388,6 @@ static void chcr_ktls_dev_del(struct net /* clear tid */ if (tx_info->tid != -1) { - /* clear tcb state and then release tid */ - chcr_ktls_mark_tcb_close(tx_info); cxgb4_remove_tid(&tx_info->adap->tids, tx_info->tx_chan, tx_info->tid, tx_info->ip_family); } @@ -579,7 +565,6 @@ static int chcr_ktls_dev_add(struct net_ return 0; free_tid: - chcr_ktls_mark_tcb_close(tx_info); #if IS_ENABLED(CONFIG_IPV6) /* clear clip entry */ if (tx_info->ip_family == AF_INET6) @@ -677,10 +662,6 @@ static int chcr_ktls_cpl_act_open_rpl(st if (tx_info->pending_close) { spin_unlock(&tx_info->lock); if (!status) { - /* it's a late success, tcb status is establised, - * mark it close. - */ - chcr_ktls_mark_tcb_close(tx_info); cxgb4_remove_tid(&tx_info->adap->tids, tx_info->tx_chan, tid, tx_info->ip_family); }