Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp2140055pxb; Fri, 25 Mar 2022 11:48:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwnELS3A/vJoSpHol6I5LGNYCyIbFpXrMCytytdGJ64GYmIzyzO3SazzuHFOdGqF1Eq42lV X-Received: by 2002:a63:211b:0:b0:382:6f4e:3408 with SMTP id h27-20020a63211b000000b003826f4e3408mr741515pgh.515.1648234096198; Fri, 25 Mar 2022 11:48:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648234096; cv=none; d=google.com; s=arc-20160816; b=gh21WNGLgdAnchl2ugsRc15IwWrwWghQ+fAxAgUwffNA1H6pilyYfGusDpt3Zqw5hF GS3R6INgTyNv7sZXHlh7MgEtVmssKOHD8J54Qr5e/lqUQjNXS8VupFODWYEnoVvmWutX WJYvINg6kfV2bMW5tvLf4TylmvjFo8yR1CqicEUoaYcQuKgMze8JD3iMBSS88Z0azQMD k1BnxEaEpShnTK1JW+bEIXq+m9JkPYQUi23/p+gbAG2GPwCkHJTQy9j9tI5KWkEj8jb/ Q9N4N3mvDudy1LSB0IUE+SWZwMNeCjWUavckyMjBuzq2HpXS+A+DuN+MHnxhS7AD9DgB NxLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Zh54MUIDlv3K03d/o7B250Xh9rkszQJHPwYuFIuiFs4=; b=WcPKczSDNQocmY6RpyfAwpvPN5Acf9FA5j0I0xTGnzvE4gitpXN4eLr3Hn4vPWxWHt An6CwUpWfY6+I/XCVFnS8kFf1ZArhWyPFxmgAZ0dI+BhKTdq6RJ1U4g84Ex39VMscGUM cZ62KdOuRKQfLGf4xPsZu2hx5fM2wyRcXz25P/9VD3UmMpqx8GBobH/QlRGsuGhHRaGL Z0wWzTtKCJoHMx2rBA8AuhO+UTdXHeuvLSt3kMf9ddjlpIgqYQvooT4MB7Ah7WLmfDvb TrX3cAwjkGpcALz7meMYV3gGWQA9Tny/RWZll4rnkvrVEsaQKuDsST7vE1+kpv7IJwKF FzYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=tfXSBsHI; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id bi12-20020a170902bf0c00b00153b2d16574si2873322plb.380.2022.03.25.11.48.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 25 Mar 2022 11:48:16 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=tfXSBsHI; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 6C8E21B7572; Fri, 25 Mar 2022 11:03:37 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1376833AbiCYPc2 (ORCPT + 99 others); Fri, 25 Mar 2022 11:32:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42878 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1377894AbiCYPYl (ORCPT ); Fri, 25 Mar 2022 11:24:41 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [IPv6:2604:1380:40e1:4800::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1E4B0EA772; Fri, 25 Mar 2022 08:19:15 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id 743D7CE2A47; Fri, 25 Mar 2022 15:19:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 845D5C340E9; Fri, 25 Mar 2022 15:19:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1648221551; bh=U0mvhw39cbsclOBd4bIH5tg1ugmW7EL5M3n3ruIMsRg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tfXSBsHIdWUlfY2MIEZbvnt6At3vnGL85VWh2uO4T4rJFIW1nbtc5v8dWIJ9uu24B t+ydBkivCvXRIrStxU9ulLpDXYFzF77+hMxlSPDdPKgVtRChjjg5wuagxVVtCoPmUE K4Q1vwH1/+btC0qxxutNr19akm5CWX8/QS++rjyA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Giovanni Cabiddu , Herbert Xu Subject: [PATCH 5.17 25/39] crypto: qat - disable registration of algorithms Date: Fri, 25 Mar 2022 16:14:40 +0100 Message-Id: <20220325150420.961866487@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220325150420.245733653@linuxfoundation.org> References: <20220325150420.245733653@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Giovanni Cabiddu commit 8893d27ffcaf6ec6267038a177cb87bcde4dd3de upstream. The implementations of aead and skcipher in the QAT driver do not support properly requests with the CRYPTO_TFM_REQ_MAY_BACKLOG flag set. If the HW queue is full, the driver returns -EBUSY but does not enqueue the request. This can result in applications like dm-crypt waiting indefinitely for a completion of a request that was never submitted to the hardware. To avoid this problem, disable the registration of all crypto algorithms in the QAT driver by setting the number of crypto instances to 0 at configuration time. Cc: stable@vger.kernel.org Signed-off-by: Giovanni Cabiddu Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/qat/qat_4xxx/adf_drv.c | 7 +++++++ drivers/crypto/qat/qat_common/qat_crypto.c | 7 +++++++ 2 files changed, 14 insertions(+) --- a/drivers/crypto/qat/qat_4xxx/adf_drv.c +++ b/drivers/crypto/qat/qat_4xxx/adf_drv.c @@ -75,6 +75,13 @@ static int adf_crypto_dev_config(struct if (ret) goto err; + /* Temporarily set the number of crypto instances to zero to avoid + * registering the crypto algorithms. + * This will be removed when the algorithms will support the + * CRYPTO_TFM_REQ_MAY_BACKLOG flag + */ + instances = 0; + for (i = 0; i < instances; i++) { val = i; bank = i * 2; --- a/drivers/crypto/qat/qat_common/qat_crypto.c +++ b/drivers/crypto/qat/qat_common/qat_crypto.c @@ -161,6 +161,13 @@ int qat_crypto_dev_config(struct adf_acc if (ret) goto err; + /* Temporarily set the number of crypto instances to zero to avoid + * registering the crypto algorithms. + * This will be removed when the algorithms will support the + * CRYPTO_TFM_REQ_MAY_BACKLOG flag + */ + instances = 0; + for (i = 0; i < instances; i++) { val = i; snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_BANK_NUM, i);