Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1936751imm; Thu, 24 May 2018 03:13:38 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrIgsrgkZs+Gy0km2k40jPPuAX6LeJuZ8CkstunyCx50vLG2o8catghfx6sDR83Pk88Qn6N X-Received: by 2002:a62:a315:: with SMTP id s21-v6mr6658197pfe.168.1527156818461; Thu, 24 May 2018 03:13:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527156818; cv=none; d=google.com; s=arc-20160816; b=euy+vREgPh24JRqSt9cpAzLLLa1tbwPjw/3e+CykoI8DCK4DhKt3XwgLQf2lv0Qlvd 7piYzYxfx4r1F5yAtiD2nqhLoBBwCBuwMXQ+RzbeTO4djMqwLDyNvrDRdGv67oM1lFkZ Vhyb2v73FVpPcwxOe7A0NGevyFM9l0I86wuKAFkj9KC+2vVIL53ui/xxgPOLw8SIqnif 1OhAH9B7Yfl5cyYUgqV6S7aA32w4yLRpKXnSHeJSy7qjw647zLRGBxTSCKvkYvULbP28 do20oSsvdE/L+kDbmdWseWACZsPquki1o0hQ3w6x1Md4KwwK8NYRrQSyG6CQPmIvypjt 4LzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=cA0IPStflY6mubUBCgFsyhHxtVner11SAW0ZAjGbPqw=; b=socIqq4eINTcURUs7fssITXvyv4FUCVQg5ADc9YseM9wVGqZTi0x4yJSAYdp14Jd8+ v0bRHNtUNXppuJ+eGuudaWqDo1Y0wqcoccUGpURSqZfUO9qLr/yr9N784PprGKdYxWWF n8UUWXBYaMi6WUXNEC1m4pJ0lgZnqWoAVFeXxp+Zy1wDcJI5zGB7gNuMdTCU8rw5NDUh Y2nyzVWpgRae5fC1cgNO0sP+KwXG9q5XjTzDq4SPTfJ/cxi9sXV+h+i5mqURUSLrsF58 AObI36H175FrN38BMeZ8H9RC/kF3noDywn4bBgDs9FxCQaA7bylx0IMZinaTPJHVcM8u vBSQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Xh0wUiYa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e8-v6si4780153pgu.511.2018.05.24.03.13.23; Thu, 24 May 2018 03:13:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Xh0wUiYa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1031692AbeEXKM2 (ORCPT + 99 others); Thu, 24 May 2018 06:12:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:54358 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1031505AbeEXKFJ (ORCPT ); Thu, 24 May 2018 06:05:09 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 53A5920891; Thu, 24 May 2018 10:05:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527156307; bh=z39VRUXFyOABaA9ID3DME7lLeAEdUJmdEa+sN+Dl4IM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Xh0wUiYaNPJjH2Ims1zGoyWuto8bnQ4lYG8P1QjMr9B0cJwe7RLSeswYJ+2LT2CbV N0opSe55QbJauzJF6ZJBx6CwvFygecZbPJa57fNki45PSsdWXFRJwX4pG//GszPbC7 cPO5IpE7I9hzF0hh0G/gb1ReWP5M0ubKIAgqyVQw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ofer Heifetz , Antoine Tenart , Herbert Xu , Sasha Levin Subject: [PATCH 4.16 104/161] crypto: inside-secure - do not overwrite the threshold value Date: Thu, 24 May 2018 11:38:49 +0200 Message-Id: <20180524093030.885344589@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180524093018.331893860@linuxfoundation.org> References: <20180524093018.331893860@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.16-stable review patch. If anyone has any objections, please let me know. ------------------ From: Antoine Tenart [ Upstream commit e1d24c0bb76648cdf789b168defb6e31adb0b1b1 ] This patch fixes the Inside Secure SafeXcel driver not to overwrite the interrupt threshold value. In certain cases the value of this register, which controls when to fire an interrupt, was overwritten. This lead to packet not being processed or acked as the driver never was aware of their completion. This patch fixes this behaviour by not setting the threshold when requests are being processed by the engine. Fixes: dc7e28a3286e ("crypto: inside-secure - dequeue all requests at once") Suggested-by: Ofer Heifetz Signed-off-by: Antoine Tenart Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/inside-secure/safexcel.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) --- a/drivers/crypto/inside-secure/safexcel.c +++ b/drivers/crypto/inside-secure/safexcel.c @@ -523,8 +523,7 @@ finalize: if (!priv->ring[ring].busy) { nreq -= safexcel_try_push_requests(priv, ring, nreq); - if (nreq) - priv->ring[ring].busy = true; + priv->ring[ring].busy = true; } priv->ring[ring].requests_left += nreq;