Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp2164380pxb; Fri, 25 Mar 2022 12:14:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxoJDMoqgz/PL7oARmnuXvIOgKave9Csy7ubPlesDCxI5FbjJgxtRvaTNgvTKL54/8B50VY X-Received: by 2002:a65:5803:0:b0:382:5f9c:79b9 with SMTP id g3-20020a655803000000b003825f9c79b9mr831472pgr.51.1648235649488; Fri, 25 Mar 2022 12:14:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648235649; cv=none; d=google.com; s=arc-20160816; b=C5bN/DJ1V4N6c6XZpOSCIrPgOfPlabE+29T1Gb+ChpnHJtpDLEKQ2+EIzin60gK4vL SqbsCgdU44MtdUdCaQBe4lNOeakTqWdwYMCGsoImgl4u3StU6EAJl22Gltk/HgD1vm6m zvIhZlwt0bA1UQe7oOwguL81xNJe+hNtIy/EdruhUhkzFk62PXCXuf5JYMW0Qu0+oldT /M+RCmnhD7WPtK7TsYC54h7EpTABlDXG+GCoLSTOUqb61XqCUHtKhD/W3zT1U5lEmfy3 wVEYnj73VcSjIlvV8FcR0t050rV0FLWGZmbMII5AK6NwJtMH5NqYDBEbawW/zF8LWng7 2/Vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=As6asN6jKVh21jLQSg2R5pjp16djfquRsZCIzhZS8Ws=; b=Y6JZPLbfIqTjMmz75Nr7TAxTR4ZBgoFbERN/uVdIvaJZyxkA+dPuaRI6zzKgVTeRRT yMSDCvFDssc4Iv2WJYI0+DNk4Bn166vqxV4EBB1i3pm+BWw3gOs8lFU+ZVXOYUeFjip1 JJSLJ9+AMev0ZNCvq9XUx/Dp3rZgkRfuzFbt4Jt1LFGiXuqaLzFpJisU/op4mzxiu8lL I+J/Wg+VF/iv2exVDyLfTfbVsGo2I7P/ZnrZLXbKUJzAJKXGurORnQsL1mbF7TXNFIBJ jU6jcEWZ7JyMvqUnJyCfe0015Ffvu2JIz3q1iZAx9TQ4ISYsl3erEyIrPIY+u6eP4uCx apOA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=RD+K2c8n; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id q7-20020a17090311c700b001544764a235si3511318plh.522.2022.03.25.12.14.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 25 Mar 2022 12:14:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=RD+K2c8n; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id C05ED21C04B; Fri, 25 Mar 2022 11:18:56 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1357520AbiCYP0x (ORCPT + 99 others); Fri, 25 Mar 2022 11:26:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44928 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1376521AbiCYPV6 (ORCPT ); Fri, 25 Mar 2022 11:21:58 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7ADF56C905; Fri, 25 Mar 2022 08:16:11 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 3070F60AB7; Fri, 25 Mar 2022 15:15:43 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 25AFCC340E9; Fri, 25 Mar 2022 15:15:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1648221342; bh=xB09mWxvdIPI9n6hFFKfaWkT0NX9SojhxvqtWd6DOqc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RD+K2c8n7XjfHcZ6haOhh4GfYsm13h8jBMOlIdzkreebhztKlmz1V/c+DQLQpqDj7 hUl1OrOuqM/kqV9HGZmO8/TN/71FFcs5aazC9Mv5s8Ujoafui9o4K2xYpCTRrgYjk/ hZ6ZBg/4gygM6vk4Wth2MtTv2pa4hv+d88j+4D5Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Giovanni Cabiddu , Herbert Xu Subject: [PATCH 5.15 27/37] crypto: qat - disable registration of algorithms Date: Fri, 25 Mar 2022 16:14:28 +0100 Message-Id: <20220325150420.707670625@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220325150419.931802116@linuxfoundation.org> References: <20220325150419.931802116@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Giovanni Cabiddu commit 8893d27ffcaf6ec6267038a177cb87bcde4dd3de upstream. The implementations of aead and skcipher in the QAT driver do not support properly requests with the CRYPTO_TFM_REQ_MAY_BACKLOG flag set. If the HW queue is full, the driver returns -EBUSY but does not enqueue the request. This can result in applications like dm-crypt waiting indefinitely for a completion of a request that was never submitted to the hardware. To avoid this problem, disable the registration of all crypto algorithms in the QAT driver by setting the number of crypto instances to 0 at configuration time. Cc: stable@vger.kernel.org Signed-off-by: Giovanni Cabiddu Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/qat/qat_4xxx/adf_drv.c | 7 +++++++ drivers/crypto/qat/qat_common/qat_crypto.c | 7 +++++++ 2 files changed, 14 insertions(+) --- a/drivers/crypto/qat/qat_4xxx/adf_drv.c +++ b/drivers/crypto/qat/qat_4xxx/adf_drv.c @@ -52,6 +52,13 @@ static int adf_crypto_dev_config(struct if (ret) goto err; + /* Temporarily set the number of crypto instances to zero to avoid + * registering the crypto algorithms. + * This will be removed when the algorithms will support the + * CRYPTO_TFM_REQ_MAY_BACKLOG flag + */ + instances = 0; + for (i = 0; i < instances; i++) { val = i; bank = i * 2; --- a/drivers/crypto/qat/qat_common/qat_crypto.c +++ b/drivers/crypto/qat/qat_common/qat_crypto.c @@ -136,6 +136,13 @@ int qat_crypto_dev_config(struct adf_acc if (ret) goto err; + /* Temporarily set the number of crypto instances to zero to avoid + * registering the crypto algorithms. + * This will be removed when the algorithms will support the + * CRYPTO_TFM_REQ_MAY_BACKLOG flag + */ + instances = 0; + for (i = 0; i < instances; i++) { val = i; snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_BANK_NUM, i);