Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp2163676pxb; Fri, 25 Mar 2022 12:13:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzYjWHBzn8tt9aRh0uCJJXtFdfzaJMfwJ44hYU5jNhW0oaHtbNhbvY6XJQbmg3ftIquATdm X-Received: by 2002:a05:6a00:1304:b0:4e1:2338:f11e with SMTP id j4-20020a056a00130400b004e12338f11emr11572655pfu.24.1648235603803; Fri, 25 Mar 2022 12:13:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648235603; cv=none; d=google.com; s=arc-20160816; b=GXvaXU2XAl9BjTyGihqPL4SdeqJNDQf2ZrriFhzjMYrDXTQIzNfGNgGIbJ8Cd5qeBX LVphC/DRznh08CtG5NifjAuhbP7djNudHbsiFugLRpKYF34s63xnr4vkIxPAvVt9svGC pt6Vh2XLcmjHRYstsjgjHvfB+xNCw2U94WamgxHsodg1yj93bM3dVyIaEzI3i2+OMSwt Iu3NYPY5pzonC38HVeAjtK9nTPKKq//LgYq7GzM5wXsk3NpP4fgmqxopdnZtMY/FndsM WQti9Ge+t03M8Wfv7M3seD2u57nWLDuklZ42PFDr7YTuPEO87gbVnId8StZiQW+yBeGx xPsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=80zAaP96cgvKQCa4tQ95PuHS50N5liNJ+nXnPUpBF9w=; b=mzLPJc89vc2/riiENPjZyTPYmZM6NHbz/sBKoAbUlaBbrusPDDTjeiwFCaHVKkpkHW t/yds7d/XirXXkpydLDWPOGG/dJbLOyEWxiFrzH386nhfzSZrwJFK9eykFZ7Jkmo7wYN 93jmXLiyzqH0s4rKWOxIqtLwwOCpQr/HSsoU4hTpilfJm6rgCsCYfepW4CLV8+WqZlM4 kwu4xSJ3P8Vil2+1Cm2FXDx0ksJMrxtTSVuTvoSW9CK9L5WqKjBSCWC7nXz/gh1LKaNS xCd4BaPXgRWFhq6FcnXF2WykdzPHrdJoDTY49xbrF7u91AGyoCN0O6zTy/dysTqkPVQk 08Tg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="ibkJ3/pj"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id i9-20020a636d09000000b003816043f12fsi3117588pgc.804.2022.03.25.12.13.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 25 Mar 2022 12:13:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="ibkJ3/pj"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 2EA2B214169; Fri, 25 Mar 2022 11:18:10 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245019AbiCYPJF (ORCPT + 99 others); Fri, 25 Mar 2022 11:09:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37128 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1359669AbiCYPHt (ORCPT ); Fri, 25 Mar 2022 11:07:49 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4B2D7DA6CB; Fri, 25 Mar 2022 08:05:57 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 01918B828FA; Fri, 25 Mar 2022 15:05:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5CC00C340E9; Fri, 25 Mar 2022 15:05:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1648220754; bh=RuC+1rqugxNuew2WMFrSfKADvorEHXodJr0P7fQnOpU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ibkJ3/pjzfGHQ4iM3f3pYDks4HkO/D5Rpuguw5t8bhfJDGt2sp3+UqsIs75QnN9S4 xrRU+W/SNlBvOAgrmGYm7cTSn+facgTGlI5Sjx8YhmAXQePV1MhKD+XK9DYaVARxv6 3SgGnAz9OZgOBmbEJCete9QLy+YGDWyARqQCUoqI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Giovanni Cabiddu , Herbert Xu Subject: [PATCH 4.14 16/17] crypto: qat - disable registration of algorithms Date: Fri, 25 Mar 2022 16:04:50 +0100 Message-Id: <20220325150417.233904094@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220325150416.756136126@linuxfoundation.org> References: <20220325150416.756136126@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Giovanni Cabiddu commit 8893d27ffcaf6ec6267038a177cb87bcde4dd3de upstream. The implementations of aead and skcipher in the QAT driver do not support properly requests with the CRYPTO_TFM_REQ_MAY_BACKLOG flag set. If the HW queue is full, the driver returns -EBUSY but does not enqueue the request. This can result in applications like dm-crypt waiting indefinitely for a completion of a request that was never submitted to the hardware. To avoid this problem, disable the registration of all crypto algorithms in the QAT driver by setting the number of crypto instances to 0 at configuration time. Cc: stable@vger.kernel.org Signed-off-by: Giovanni Cabiddu Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/qat/qat_common/qat_crypto.c | 8 ++++++++ 1 file changed, 8 insertions(+) --- a/drivers/crypto/qat/qat_common/qat_crypto.c +++ b/drivers/crypto/qat/qat_common/qat_crypto.c @@ -170,6 +170,14 @@ int qat_crypto_dev_config(struct adf_acc goto err; if (adf_cfg_section_add(accel_dev, "Accelerator0")) goto err; + + /* Temporarily set the number of crypto instances to zero to avoid + * registering the crypto algorithms. + * This will be removed when the algorithms will support the + * CRYPTO_TFM_REQ_MAY_BACKLOG flag + */ + instances = 0; + for (i = 0; i < instances; i++) { val = i; snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_BANK_NUM, i);