Patch Series

Subject Enable Inbound IPsec offload on Marvell CN10K SoC
Author tanmay@marvell.com
Date 2025-08-19 02:14:52 +0000 UTC
Version 4
Cc amitsinght@marvell.com bbhushan2@marvell.com davem@davemloft.net gakula@marvell.com horms@kernel.org kirankumark@marvell.com leon@kernel.org linux-crypto@vger.kernel.org ndabilpuram@marvell.com netdev@vger.kernel.org rkudurumalla@marvell.com sgoutham@marvell.com tanmay@marvell.com

Patches (14)

Name Content
[PATCH net-next v4 01/14] crypto: octeontx2: Share engine group info with AF driver [Body]
[PATCH net-next v4 02/14] octeontx2-af: Configure crypto hardware for inline ipsec [Body]
[PATCH net-next v4 03/14] octeontx2-af: Setup Large Memory Transaction for crypto [Body]
[PATCH net-next v4 04/14] octeontx2-af: Handle inbound inline ipsec config in AF [Body]
[PATCH net-next v4 05/14] octeontx2-af: Add support for CPT second pass [Body]
[PATCH net-next v4 06/14] octeontx2-af: Add support for SPI to SA index translation [Body]
[PATCH net-next v4 07/14] octeontx2-af: Add mbox to alloc/free BPIDs [Body]
[PATCH net-next v4 08/14] octeontx2-pf: ipsec: Allocate Ingress SA table [Body]
[PATCH net-next v4 09/14] octeontx2-pf: ipsec: Setup NIX HW resources for inbound flows [Body]
[PATCH net-next v4 10/14] octeontx2-pf: ipsec: Handle NPA threshold interrupt [Body]
[PATCH net-next v4 11/14] octeontx2-pf: ipsec: Initialize ingress IPsec [Body]
[PATCH net-next v4 12/14] octeontx2-pf: ipsec: Process CPT metapackets [Body]
[PATCH net-next v4 13/14] octeontx2-pf: ipsec: Manage NPC rules and SPI-to-SA table entries [Body]
[PATCH net-next v4 14/14] octeontx2-pf: ipsec: Add XFRM state and policy hooks for inbound flows [Body]

Session 2025-08-19

ID (for dev) 3b125e4f-9f73-40a3-b35c-e11440193914
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
Build Base 8159572936392b514e404bab2d60e47cebd5acfe [Config] passed [Log]
Build Patched 8159572936392b514e404bab2d60e47cebd5acfe [Config] [patched] passed [Log]
Boot test: Base 8159572936392b514e404bab2d60e47cebd5acfe [Config] passed
Boot test: Patched 8159572936392b514e404bab2d60e47cebd5acfe [Config] [patched] passed
Fuzzing 8159572936392b514e404bab2d60e47cebd5acfe [Config] 8159572936392b514e404bab2d60e47cebd5acfe [Config] [patched] skipped [Log] [Artifacts]