Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp2358062iob; Fri, 6 May 2022 00:22:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzeWPu63Wo6j7FVyCTR7bVMGpxZZgjVIt96bQxifkBXhOfaZs/IBYJSjz3EcvdowUAn2MLy X-Received: by 2002:a17:902:e842:b0:15e:d449:fd03 with SMTP id t2-20020a170902e84200b0015ed449fd03mr2330585plg.60.1651821729925; Fri, 06 May 2022 00:22:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651821729; cv=none; d=google.com; s=arc-20160816; b=S9y/an2cB0LcStKyedPSubiKRMDrZFlPeVMxb76koS62rOwyZ/XMShR44R2xfVl2Kw kmasmDxB6NxM6DQPOa8iJZxgQzHeEuiRKXyumc7y/7g0woIBOLSr9XGpAgYfrSEuRTj/ Trxsm3sOSb07uZ5KE4rgn0cCSW/WrFn2b7RTzQyugUtPBzn/OWTqWAHS9aJSrmp39gNA 9GHbu2CWhPBO5lDlJbF8e4AjsDpw+EkM3+tmFllPIRx/DHF6T5dA7VARHyOtyMSFQ89E iC4xHOdhZcb8S8teD1NrFd2Me5LllRv96kw3B4BGOwV2i/Vs3ZFkqX5YWYQCQKcJZfV+ GwyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZyH1L7x1ISoLcbBOZnhrJJFTrrZkHDBcgbQNIf3/3oI=; b=rxSlXn8b2DRiUj+7Idfa3kToaHV0VYwolWmBr8s8uWJPwKV+YpeED1hV6HcA9P6BdG 7mWY9hnZF/4xMC/idP2OIu/dGWo3f51xCWBUudJTTEJMYtOm5E7kav/KJVZiBlN2aJBJ HXTDbCl3qpschabuxAPkssYNiAftyxwitNfVIg7Qsk2sLxIU/HF/ZxFJ5OnKTW/sybog bVpV0DtUijv86oBvYSuRqK2U8m+Q0ArYwoNxXBpAuxN6p0Unimezy2Y0REl8kFZ4qaD+ 6SLuePwHnCtx8DgxYLmtpAnDHAoUmfryuaI4qmwQID62OAFabdAGNWAtbGr6AT33hVJV Qf4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Kko1rdlA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w138-20020a627b90000000b004fa3a8dffa6si3460394pfc.93.2022.05.06.00.21.54; Fri, 06 May 2022 00:22:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Kko1rdlA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1348270AbiEDRsT (ORCPT + 99 others); Wed, 4 May 2022 13:48:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55482 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1357271AbiEDRO5 (ORCPT ); Wed, 4 May 2022 13:14:57 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CBD9C54697; Wed, 4 May 2022 09:58:25 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id B495161920; Wed, 4 May 2022 16:58:14 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 68702C385AF; Wed, 4 May 2022 16:58:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1651683494; bh=5Vle1qWJnQKV1VFtVFlv7ED24OJaCLIdTzacdmZoabs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Kko1rdlAxwTFuAoNNVrN9Zg2G9En5BFNbveEnioVFU/HXUHIkk4VvuvlOzDREpjkI 6HfMoJ5+ogbUdeNJTCH+hPOjUaNiiEWjJB6ZSzomKQdTwi1XLpX9MBMt05mqYZ0Wdb tLImYBqOfsh21Hn3KzBjc803ZDHawGDYlV5aA28s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Raed Salem , Leon Romanovsky , Shannon Nelson , Konrad Jankowski , Tony Nguyen , Jakub Kicinski , Sasha Levin Subject: [PATCH 5.17 152/225] ixgbe: ensure IPsec VF<->PF compatibility Date: Wed, 4 May 2022 18:46:30 +0200 Message-Id: <20220504153123.651407660@linuxfoundation.org> X-Mailer: git-send-email 2.36.0 In-Reply-To: <20220504153110.096069935@linuxfoundation.org> References: <20220504153110.096069935@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Leon Romanovsky [ Upstream commit f049efc7f7cd2f3c419f55040928eaefb13b3636 ] The VF driver can forward any IPsec flags and such makes the function is not extendable and prone to backward/forward incompatibility. If new software runs on VF, it won't know that PF configured something completely different as it "knows" only XFRM_OFFLOAD_INBOUND flag. Fixes: eda0333ac293 ("ixgbe: add VF IPsec management") Reviewed-by: Raed Salem Signed-off-by: Leon Romanovsky Reviewed-by: Shannon Nelson Tested-by: Konrad Jankowski Signed-off-by: Tony Nguyen Link: https://lore.kernel.org/r/20220427173152.443102-1-anthony.l.nguyen@intel.com Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c b/drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c index e596e1a9fc75..69d11ff7677d 100644 --- a/drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c +++ b/drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c @@ -903,7 +903,8 @@ int ixgbe_ipsec_vf_add_sa(struct ixgbe_adapter *adapter, u32 *msgbuf, u32 vf) /* Tx IPsec offload doesn't seem to work on this * device, so block these requests for now. */ - if (!(sam->flags & XFRM_OFFLOAD_INBOUND)) { + sam->flags = sam->flags & ~XFRM_OFFLOAD_IPV6; + if (sam->flags != XFRM_OFFLOAD_INBOUND) { err = -EOPNOTSUPP; goto err_out; } -- 2.35.1