Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp608345pxb; Tue, 5 Apr 2022 15:50:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzuxXeAb5D4XTDIMZbvXqS+TwsaGdNt+ni+RLJPhDm1rFx4LO+JOcfEqFqmTWffIHBFAWY+ X-Received: by 2002:a63:5759:0:b0:399:5816:6a80 with SMTP id h25-20020a635759000000b0039958166a80mr4726505pgm.253.1649199005876; Tue, 05 Apr 2022 15:50:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649199005; cv=none; d=google.com; s=arc-20160816; b=Xc3W5edlgxPpY7RYtfgyZwTBYuhrREefoCr6YbiE5ShRMReKgIl19jPgqQihApZvbh 3bNvSD3T8JBMv6kR3ANfEGMe13GwSMNNVLMxvdNCHl6xzxGGIKZ+nruZ/VXyzDXgtkQd vhHqJLYUl/uGCeUXScc6eim7obuKTJ0XdwQ7xxp37cZuriBfE9iROKzXFD7dA5Zk6/0k bIKNzFT5fgsVb9Lr1OzQcS8uLi2Wf+1RrV5280ujg1Wd941UUobbXgQG1S7xR2Omb2zT nwOEZBFG75VLWEheW3Ngj+IFDeU5HpJQcdzLe2Q6udoOHMFDu1gMDTwfOVYposExv6Az C5FQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=RVstSPcYDAOQFpZzw8T3sQweIE4KOTGbPwpMnJaPUt0=; b=w5gYqQZEddJLLJpKq7zO/VVUobEIl4YTaXHC7KpA65v/QAppFqofiXjnY5Kpl1yzHJ bsOdu3NP5kBl41LYvwnOe9Q8NaMEjcxENJq4kLq8x6ooBm4q8fJi2y9DrQMpHomhNBuc ZgmHL4uvugeO5UkxQ6G6tk8PT5ASPJxSUq64rC42l+WsPU3bQaQLnUgqV62Qy9iSnbeS e3552bxE8DwYvD8PfeXs5Yw77tInTA21n/A4M+V6lL2/H/ijvRroyeVzNzxVNud1bFjY tRa/cLKgIP8nzncdDmyKh1eFkmM3GOGu4PqDQsaPifzTUM8lvJbBMCvimNAUioi6zM5E tD/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=DiQGlsIL; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id a5-20020a655c85000000b00382a7c2cad7si13010578pgt.206.2022.04.05.15.50.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 05 Apr 2022 15:50:05 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=DiQGlsIL; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 216FA6A401; Tue, 5 Apr 2022 15:32:10 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345694AbiDEOzR (ORCPT + 99 others); Tue, 5 Apr 2022 10:55:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54028 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343759AbiDEJlu (ORCPT ); Tue, 5 Apr 2022 05:41:50 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE3ADBD7C0; Tue, 5 Apr 2022 02:27:22 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4E16C616A3; Tue, 5 Apr 2022 09:27:22 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 586D3C385A0; Tue, 5 Apr 2022 09:27:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649150841; bh=dJqjmaqKxFV7sUbqP5+pRkKSgwrc/ZXn1ubpRSJTH04=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DiQGlsILwJu1mEx9YGs0+bBkDCDX8EqBQXknHMru/EPSkn24KVJFkNIpf4y9ObWfU x47OOxOhnf3NZk5ZEP34hUeykLM3aMTCLeyQlYCWUiQw541oALVoGADY9Ey16aouCt zHULhhVKBP2ZDHfjiPKsMNkA3qL21t1TsAz34c0w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Shijith Thotton , Herbert Xu , Sasha Levin Subject: [PATCH 5.15 200/913] crypto: octeontx2 - remove CONFIG_DM_CRYPT check Date: Tue, 5 Apr 2022 09:21:02 +0200 Message-Id: <20220405070345.853750494@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220405070339.801210740@linuxfoundation.org> References: <20220405070339.801210740@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Shijith Thotton [ Upstream commit 2d841af23ae8f398c85dd1ff2dc24b5ec8ba4569 ] No issues were found while using the driver with dm-crypt enabled. So CONFIG_DM_CRYPT check in the driver can be removed. This also fixes the NULL pointer dereference in driver release if CONFIG_DM_CRYPT is enabled. ... Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008 ... Call trace: crypto_unregister_alg+0x68/0xfc crypto_unregister_skciphers+0x44/0x60 otx2_cpt_crypto_exit+0x100/0x1a0 otx2_cptvf_remove+0xf8/0x200 pci_device_remove+0x3c/0xd4 __device_release_driver+0x188/0x234 device_release_driver+0x2c/0x4c ... Fixes: 6f03f0e8b6c8 ("crypto: octeontx2 - register with linux crypto framework") Signed-off-by: Shijith Thotton Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- .../crypto/marvell/octeontx2/otx2_cptvf_algs.c | 17 +++++++---------- 1 file changed, 7 insertions(+), 10 deletions(-) diff --git a/drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c b/drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c index 877a948469bd..570074e23b60 100644 --- a/drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c +++ b/drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c @@ -1634,16 +1634,13 @@ static inline int cpt_register_algs(void) { int i, err = 0; - if (!IS_ENABLED(CONFIG_DM_CRYPT)) { - for (i = 0; i < ARRAY_SIZE(otx2_cpt_skciphers); i++) - otx2_cpt_skciphers[i].base.cra_flags &= - ~CRYPTO_ALG_DEAD; - - err = crypto_register_skciphers(otx2_cpt_skciphers, - ARRAY_SIZE(otx2_cpt_skciphers)); - if (err) - return err; - } + for (i = 0; i < ARRAY_SIZE(otx2_cpt_skciphers); i++) + otx2_cpt_skciphers[i].base.cra_flags &= ~CRYPTO_ALG_DEAD; + + err = crypto_register_skciphers(otx2_cpt_skciphers, + ARRAY_SIZE(otx2_cpt_skciphers)); + if (err) + return err; for (i = 0; i < ARRAY_SIZE(otx2_cpt_aeads); i++) otx2_cpt_aeads[i].base.cra_flags &= ~CRYPTO_ALG_DEAD; -- 2.34.1