Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp2160454pxb; Fri, 25 Mar 2022 12:09:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw1Vlf3OA2ov4whKmP1yYY4l5W8ZNUsoO0IbO8hNOypyIwUpGjHvmxSbS6idym7XmRK1+BT X-Received: by 2002:a17:903:22c6:b0:154:4156:f397 with SMTP id y6-20020a17090322c600b001544156f397mr13105924plg.29.1648235391138; Fri, 25 Mar 2022 12:09:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648235391; cv=none; d=google.com; s=arc-20160816; b=zt18+bUvf63/HtCSX3fqQ2Rb5x0Sp/o2O0wJDmMItXpIQWzh6j8xKTsswsfO48XAUy QYoVQxn6uewKp2avCOcmLjVK7g/66uTuYFnzsZ3HX8BQ5WgURDgSbMf4j60IoTiw2EWR 2c8Jt3c2qRS9BwJfzgJe92wujPm7mdwbM4z4Gfu06RROqJtoJVxHBtJCLw8eLGB5ODhJ AlkpEfk5mz8/WE2k4GKVi9O6OS82Hw0iHiIC5bwMgehsAmoSd3iiSH1MBMOwDs7rWJ7F 63Wx5cp8QpkJhwPhrOssVECHz4zgjtOpzAvY69BrksKI97lCNBii4S7cyYDM6YDhqMFW Tkew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=80zAaP96cgvKQCa4tQ95PuHS50N5liNJ+nXnPUpBF9w=; b=RiZ4F3n32c8sUVRoHDPZaKZJ9q70nycU1fE8y9d5nfy0tf99YvV5HX1w/ZkDX4VvTx FA1i1qMa0lyVj0hvbpr4fogRicdpDT4TRr7Vew2pe4b9LNTl2PFdSdhyto21eDo+hzMK 7lidlCyaAd4Vs9jy+V4BvXSvQ6vZa8ESUCuZKV3fOpXs7TCp2qWHeTJiVaI5790GLqAA vJcZvI/y3jk/qvXBKPnfz4Z/FC434vPFWVwhuy4YJ1vLSizKHl2NouEkD5fOtUMlkX0S OGBV0Ietri4I119Uo5D8v7Hirc808F+K4kvJZS0egNzy4FWqQXXz7U5XNcRP/QWEPQlv 9C8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=G7HooegS; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id 12-20020a056a00072c00b004fa3a8dfffasi3305079pfm.177.2022.03.25.12.09.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 25 Mar 2022 12:09:51 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=G7HooegS; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from out1.vger.email (out1.vger.email [IPv6:2620:137:e000::1:20]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5B16E205949; Fri, 25 Mar 2022 11:16:00 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233951AbiCYPHD (ORCPT + 99 others); Fri, 25 Mar 2022 11:07:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34284 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1356712AbiCYPGm (ORCPT ); Fri, 25 Mar 2022 11:06:42 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DEA09D95FB; Fri, 25 Mar 2022 08:05:03 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 370C261B97; Fri, 25 Mar 2022 15:05:03 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3F953C340E9; Fri, 25 Mar 2022 15:05:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1648220702; bh=RuC+1rqugxNuew2WMFrSfKADvorEHXodJr0P7fQnOpU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=G7HooegSsS4DY8g+NUJeJTybYqO2/I3ytqKT623q4SfWt9VV+SCCfnIpAvddy+IdP s82hD9Yfn+tl+XFDXz6laU2zlqXrBAZUk2C5CgNgwJzlaWe8ZQEIZGonkCgULdK2ch 4k6kJk3QFGK6rF748PCXq8xVzCQGAsCkJ9Aizq08= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Giovanni Cabiddu , Herbert Xu Subject: [PATCH 4.9 13/14] crypto: qat - disable registration of algorithms Date: Fri, 25 Mar 2022 16:04:41 +0100 Message-Id: <20220325150416.084395159@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220325150415.694544076@linuxfoundation.org> References: <20220325150415.694544076@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Giovanni Cabiddu commit 8893d27ffcaf6ec6267038a177cb87bcde4dd3de upstream. The implementations of aead and skcipher in the QAT driver do not support properly requests with the CRYPTO_TFM_REQ_MAY_BACKLOG flag set. If the HW queue is full, the driver returns -EBUSY but does not enqueue the request. This can result in applications like dm-crypt waiting indefinitely for a completion of a request that was never submitted to the hardware. To avoid this problem, disable the registration of all crypto algorithms in the QAT driver by setting the number of crypto instances to 0 at configuration time. Cc: stable@vger.kernel.org Signed-off-by: Giovanni Cabiddu Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/qat/qat_common/qat_crypto.c | 8 ++++++++ 1 file changed, 8 insertions(+) --- a/drivers/crypto/qat/qat_common/qat_crypto.c +++ b/drivers/crypto/qat/qat_common/qat_crypto.c @@ -170,6 +170,14 @@ int qat_crypto_dev_config(struct adf_acc goto err; if (adf_cfg_section_add(accel_dev, "Accelerator0")) goto err; + + /* Temporarily set the number of crypto instances to zero to avoid + * registering the crypto algorithms. + * This will be removed when the algorithms will support the + * CRYPTO_TFM_REQ_MAY_BACKLOG flag + */ + instances = 0; + for (i = 0; i < instances; i++) { val = i; snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_BANK_NUM, i);