Releases: MarvellEmbeddedProcessors/dao
Releases · MarvellEmbeddedProcessors/dao
snort-3-cn10k-26.06.0-ubuntu-24.04-devel
lib/liquid_crypto: fix memory leak on sess create failure When session create completes with DAO_LC_SESS_ID_INVALID, the request's sess_meta was not freed, leaking metadata on the failure path in dao_liquid_crypto_cmd_event_dequeue(). Free sess_meta via liquid_crypto_sym_sess_meta_free() before emitting the failed create event. Signed-off-by: Aakash Sasidharan <asasidharan@marvell.com>
ml-models-cn10k-26.06.0-ubuntu-24.04-devel
lib/liquid_crypto: fix memory leak on sess create failure When session create completes with DAO_LC_SESS_ID_INVALID, the request's sess_meta was not freed, leaking metadata on the failure path in dao_liquid_crypto_cmd_event_dequeue(). Free sess_meta via liquid_crypto_sym_sess_meta_free() before emitting the failed create event. Signed-off-by: Aakash Sasidharan <asasidharan@marvell.com>
vpp-25.02.0-cn10k-26.06.0-ubuntu-24.04-devel
lib/liquid-crypto: fix session ID handling in session destroy Track symmetric session kind in dao_lc_sym_sess_meta (flags + enum) and derive the wire destroy id via dao_lc_sym_sess_meta_wire_destroy_id() so HASH and AES key wrap paths send DAO_LC_SESS_ID_HASH / DAO_LC_SESS_ID_AES_KEY_WRAP instead of w7. On session create completion, when the device returns those sentinel ids, record the kind on the meta blob and register the opaque meta pointer in the lookup table; otherwise store the hardware session id as before. For destroy, keep sess_meta on the inflight request, use the wire id helper when building the destroy command, and on completion map the sentinel ids back to the opaque before liquid_crypto_sym_sess_meta_remove(). Surface errors and invalidate sess_id when meta removal fails. Signed-off-by: Aakash Sasidharan <asasidharan@marvell.com>
snort-3-cn10k-26.02.0-ubuntu-24.04-devel
lib/liquid-crypto: fix session ID handling in session destroy Track symmetric session kind in dao_lc_sym_sess_meta (flags + enum) and derive the wire destroy id via dao_lc_sym_sess_meta_wire_destroy_id() so HASH and AES key wrap paths send DAO_LC_SESS_ID_HASH / DAO_LC_SESS_ID_AES_KEY_WRAP instead of w7. On session create completion, when the device returns those sentinel ids, record the kind on the meta blob and register the opaque meta pointer in the lookup table; otherwise store the hardware session id as before. For destroy, keep sess_meta on the inflight request, use the wire id helper when building the destroy command, and on completion map the sentinel ids back to the opaque before liquid_crypto_sym_sess_meta_remove(). Surface errors and invalidate sess_id when meta removal fails. Signed-off-by: Aakash Sasidharan <asasidharan@marvell.com>
ovs-3.4.1-cn10k-26.06.0-ubuntu-24.04-devel
lib/liquid-crypto: fix session ID handling in session destroy Track symmetric session kind in dao_lc_sym_sess_meta (flags + enum) and derive the wire destroy id via dao_lc_sym_sess_meta_wire_destroy_id() so HASH and AES key wrap paths send DAO_LC_SESS_ID_HASH / DAO_LC_SESS_ID_AES_KEY_WRAP instead of w7. On session create completion, when the device returns those sentinel ids, record the kind on the meta blob and register the opaque meta pointer in the lookup table; otherwise store the hardware session id as before. For destroy, keep sess_meta on the inflight request, use the wire id helper when building the destroy command, and on completion map the sentinel ids back to the opaque before liquid_crypto_sym_sess_meta_remove(). Surface errors and invalidate sess_id when meta removal fails. Signed-off-by: Aakash Sasidharan <asasidharan@marvell.com>
oct-ep-target-cn10k-26.06.0-ubuntu-24.04-devel
lib/liquid-crypto: fix session ID handling in session destroy Track symmetric session kind in dao_lc_sym_sess_meta (flags + enum) and derive the wire destroy id via dao_lc_sym_sess_meta_wire_destroy_id() so HASH and AES key wrap paths send DAO_LC_SESS_ID_HASH / DAO_LC_SESS_ID_AES_KEY_WRAP instead of w7. On session create completion, when the device returns those sentinel ids, record the kind on the meta blob and register the opaque meta pointer in the lookup table; otherwise store the hardware session id as before. For destroy, keep sess_meta on the inflight request, use the wire id helper when building the destroy command, and on completion map the sentinel ids back to the opaque before liquid_crypto_sym_sess_meta_remove(). Surface errors and invalidate sess_id when meta removal fails. Signed-off-by: Aakash Sasidharan <asasidharan@marvell.com>
ml-models-cn10k-26.02.0-ubuntu-24.04-devel
lib/liquid-crypto: fix session ID handling in session destroy Track symmetric session kind in dao_lc_sym_sess_meta (flags + enum) and derive the wire destroy id via dao_lc_sym_sess_meta_wire_destroy_id() so HASH and AES key wrap paths send DAO_LC_SESS_ID_HASH / DAO_LC_SESS_ID_AES_KEY_WRAP instead of w7. On session create completion, when the device returns those sentinel ids, record the kind on the meta blob and register the opaque meta pointer in the lookup table; otherwise store the hardware session id as before. For destroy, keep sess_meta on the inflight request, use the wire id helper when building the destroy command, and on completion map the sentinel ids back to the opaque before liquid_crypto_sym_sess_meta_remove(). Surface errors and invalidate sess_id when meta removal fails. Signed-off-by: Aakash Sasidharan <asasidharan@marvell.com>
dao-cn10k-26.06.0-ubuntu-24.04-devel
lib/liquid-crypto: fix session ID handling in session destroy Track symmetric session kind in dao_lc_sym_sess_meta (flags + enum) and derive the wire destroy id via dao_lc_sym_sess_meta_wire_destroy_id() so HASH and AES key wrap paths send DAO_LC_SESS_ID_HASH / DAO_LC_SESS_ID_AES_KEY_WRAP instead of w7. On session create completion, when the device returns those sentinel ids, record the kind on the meta blob and register the opaque meta pointer in the lookup table; otherwise store the hardware session id as before. For destroy, keep sess_meta on the inflight request, use the wire id helper when building the destroy command, and on completion map the sentinel ids back to the opaque before liquid_crypto_sym_sess_meta_remove(). Surface errors and invalidate sess_id when meta removal fails. Signed-off-by: Aakash Sasidharan <asasidharan@marvell.com>
ossl_eng-1.0.0-cn10k-26.06.0-ubuntu-24.04-devel
lib/common: use current tail to check dma completion use current tail to check dma completion to avoid indefinite wait Signed-off-by: Nithin Dabilpuram <ndabilpuram@marvell.com> Signed-off-by: Kommula Shiva Shankar <kshankar@marvell.com>
openssl-1.1.1q-cn10k-26.06.0-ubuntu-24.04-devel
lib/common: use current tail to check dma completion use current tail to check dma completion to avoid indefinite wait Signed-off-by: Nithin Dabilpuram <ndabilpuram@marvell.com> Signed-off-by: Kommula Shiva Shankar <kshankar@marvell.com>