Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3704796ybv; Mon, 10 Feb 2020 05:02:53 -0800 (PST) X-Google-Smtp-Source: APXvYqy/C6LKz8+ge3AtSUiOKdHwPeUSDhDZUEv7JqvlAZWYCO3WO755OBtNRAojxwvNf/tUV2B3 X-Received: by 2002:aca:503:: with SMTP id 3mr732491oif.24.1581339773427; Mon, 10 Feb 2020 05:02:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581339773; cv=none; d=google.com; s=arc-20160816; b=KIxNix9YsHAsJ8zgBWsOgJ9Q/whAbwmQwtHztF6aavJiOoglSGn0S8PPJYhpqQnMIn 7jwixSau85NtfWdWC+AGeV0Lv6jWhzR3nPjJ/LnDMngkAzQaQCsYHB3MvLHLLK1e/WHr KYu0UeKMLRgGjRYLpMTaNtZPi9GTLTYzzGV3i0SLVjQV6OFiEHUqPXBLCjNNSF1vl+Oi qMJDwR7xlyQay1L1KbIngJi7GEzAVTQu1BtKpCm6dTPTmaU14ROzU+tDAF/gSrRtMvnU +ds5Lt7x0jHYRVlyTOlJSj483bG2OVsMviWJro/Db9OTR/a7Ie+PgZ7Vghgs1jAJ0dnN eKfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=i/0/xoxGAy1r4BINAs4u7o/n3cnEcrQhdgPBeGRyslw=; b=sUe0N/HHYS7nsgxYtW5z5jAOK9X1AyXN4JbRcfmIs9TEWnCNHRaa90QtBzKb8R0va2 Ew6EGS1dARiMEZtB9tE0CAKIZxs4VEPrXC3+JqY0Zvd+TGseGaUg8Ez3BNOQCBpoHFPE tmragJmtCPyffOf/Q9PMmrfsIxcu1pC1Vb6ECT6ftdCbxx6bmdUWt0trcsHH9hVBsYnC qveYz7HGydwwzCFGfB8FDzCcDSfmG0fioDreaJDQnGQwIxTNZfG/SZFvqPD7/pPRnxNb 4lVLNhftMHHkSkCkG80wvYnTHpqEcU2Xo7UIhFZqwQdrrI582jvZ7AY/0+R9yEeYaRan F3xg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dawMGupo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b21si229839ots.38.2020.02.10.05.02.36; Mon, 10 Feb 2020 05:02:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dawMGupo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730528AbgBJNBz (ORCPT + 99 others); Mon, 10 Feb 2020 08:01:55 -0500 Received: from mail.kernel.org ([198.145.29.99]:40998 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729783AbgBJMkm (ORCPT ); Mon, 10 Feb 2020 07:40:42 -0500 Received: from localhost (unknown [209.37.97.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F196C2467C; Mon, 10 Feb 2020 12:40:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581338442; bh=UrvypBgypcPzAr+C9fAiejRCLfVDQOskhpqRCz/HBgc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dawMGupoQph8NiUk6i31ISe46326wnJ5IyD8v5xtELE131ZPMY+jLpJjvcbMGCh5s Z0w5uCpx46cO3H46fnqSXVRHDjO/blFl3ZOJi7qYBycpHy13BGcKxUmIIOIGVV2R7A aGGljKp7jpaH48eEPv+WcAygiyplo2pZeqAo8yto= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Gary R Hook , Ard Biesheuvel , Herbert Xu Subject: [PATCH 5.5 180/367] crypto: ccp - set max RSA modulus size for v3 platform devices as well Date: Mon, 10 Feb 2020 04:31:33 -0800 Message-Id: <20200210122441.392218501@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200210122423.695146547@linuxfoundation.org> References: <20200210122423.695146547@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ard Biesheuvel commit 11548f5a5747813ff84bed6f2ea01100053b0d8d upstream. AMD Seattle incorporates a non-PCI version of the v3 CCP crypto accelerator, and this version was left behind when the maximum RSA modulus size was parameterized in order to support v5 hardware which supports larger moduli than v3 hardware does. Due to this oversight, RSA acceleration no longer works at all on these systems. Fix this by setting the .rsamax property to the appropriate value for v3 platform hardware. Fixes: e28c190db66830c0 ("csrypto: ccp - Expand RSA support for a v5 ccp") Cc: Gary R Hook Signed-off-by: Ard Biesheuvel Acked-by: Gary R Hook Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/ccp/ccp-dev-v3.c | 1 + 1 file changed, 1 insertion(+) --- a/drivers/crypto/ccp/ccp-dev-v3.c +++ b/drivers/crypto/ccp/ccp-dev-v3.c @@ -586,6 +586,7 @@ const struct ccp_vdata ccpv3_platform = .setup = NULL, .perform = &ccp3_actions, .offset = 0, + .rsamax = CCP_RSA_MAX_WIDTH, }; const struct ccp_vdata ccpv3 = {