Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1899621ybl; Tue, 3 Dec 2019 14:39:22 -0800 (PST) X-Google-Smtp-Source: APXvYqxdMV3rvK7PsblNq0qMfZUqV1wP5Q98mmNf2Aqjwk/tWY2IakLfqgraNF3WuKRDxxR1WsZc X-Received: by 2002:aca:1a10:: with SMTP id a16mr303297oia.9.1575412762540; Tue, 03 Dec 2019 14:39:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575412762; cv=none; d=google.com; s=arc-20160816; b=iNNrfr5EA1UA4y/IERB7aDw6/wo8M+bomRIJVU4jH9z22nanPfFMQkdBEtEsEaAb8V Fh8L5/3038hvN1KZCLHb9sm37s1wk62xNz7MNQx6y5cUhpgsm1D4b2aWYO40M6T8NEL7 4bqByQU0K5gIBQSLhbHkwiiqvan73l4qbCWmYpR6X4ldCeh/QOjgBQ+icgKgtHIcsBnS 5vFe6bUE8DiuKUuolJen4XhOhomtJkiSFU9vPPDxq+d57DJFvgRmUohn4vlr7t6B3xCw D0HipCFz7AkN2+o0icWiqb4lcpB2bzBbue6gAMA7yn3g/r7vebQOhAG6fgCDEuDlKsyv FU4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=1Dx11AQgJ6Yf5veu27gsWKMncisuyw9WUTUxrOuh2j0=; b=es150e0IOqal6m+ll6xobDh3YM2k4+z3Q6JnCy80kQBlKivVc2jzLMjHXDtqz6Ixlu 1hJ3FtpuHqz8b/POHcpRZeLFaPcjeWdUIwWDItPhFqdxdStOd5/OUvGaq03tBfS4uCDx J0kYSdiGz3DD9xtdfE7gb9k425tHZu7L6JAof6vBP522jFZKBBCEhcdgxositLdoFqFG maGhFGpAoMe7P8yghyPIRrto1BKqkMLjrM7QCxcGiO1ogEULYkx7NKnGpTzicCJkN/Qu HoSvBtDttwfMKQbWhy2RoX6a+OAbrl8S5VQGCaxsQxDFYr3wV96KleFPNihMP6GwSfW1 ULTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mqrwwWzu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i12si2144696otk.215.2019.12.03.14.39.10; Tue, 03 Dec 2019 14:39:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mqrwwWzu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727634AbfLCWhe (ORCPT + 99 others); Tue, 3 Dec 2019 17:37:34 -0500 Received: from mail.kernel.org ([198.145.29.99]:45832 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727722AbfLCWhb (ORCPT ); Tue, 3 Dec 2019 17:37:31 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5AC162073C; Tue, 3 Dec 2019 22:37:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575412650; bh=bbv4kIv0JEg2XdqcHA1mlb5X4tvo2jsrDB0t8sD3azE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mqrwwWzuyV3i/miRhjReZh5tdtyehjQWD75dBZEp+m7XV9i0siJPuP1fawYzXZMaD yy0kq9bJ6Egp+Ie64odMfacN4XUbkyppkz4JrZB/VkF759r4Xqdt7p3DvAr3hLUN3R Z6M1Yd/xtjulcGrKjbhsUyN2LfDRLFkM/6n1u86k= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pascal van Leeuwen , Herbert Xu Subject: [PATCH 5.4 04/46] crypto: inside-secure - Fix stability issue with Macchiatobin Date: Tue, 3 Dec 2019 23:35:24 +0100 Message-Id: <20191203212714.413552019@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191203212705.175425505@linuxfoundation.org> References: <20191203212705.175425505@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pascal van Leeuwen commit b8c5d882c8334d05754b69dcdf1cfd6bc48a9e12 upstream. This patch corrects an error in the Transform Record Cache initialization code that was causing intermittent stability problems on the Macchiatobin board. Unfortunately, due to HW platform specifics, the problem could not happen on the main development platform, being the VCU118 Xilinx development board. And since it was a problem with hash table access, it was very dependent on the actual physical context record DMA buffers being used, i.e. with some (bad) luck it could seemingly work quit stable for a while. Signed-off-by: Pascal van Leeuwen Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/inside-secure/safexcel.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/crypto/inside-secure/safexcel.c +++ b/drivers/crypto/inside-secure/safexcel.c @@ -221,9 +221,9 @@ static void eip197_trc_cache_init(struct /* Step #3: Determine log2 of hash table size */ cs_ht_sz = __fls(asize - cs_rc_max) - 2; /* Step #4: determine current size of hash table in dwords */ - cs_ht_wc = 16<> 4)); + cs_rc_max = min_t(uint, cs_rc_abs_max, asize - (cs_ht_wc >> 2)); /* Clear the cache RAMs */ eip197_trc_cache_clear(priv, cs_rc_max, cs_ht_wc);