Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1440719ybl; Fri, 10 Jan 2020 18:49:09 -0800 (PST) X-Google-Smtp-Source: APXvYqyMwKzFNY/NxvBXAK2fwiVgupEeAmatLT/nQg2nfDfRkH6LEWfucyYK7WU4YzZ/+vuptfuD X-Received: by 2002:aca:481:: with SMTP id 123mr5044616oie.110.1578710949491; Fri, 10 Jan 2020 18:49:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578710949; cv=none; d=google.com; s=arc-20160816; b=QH5mqyQ9ad767VBxJlN899PHBTKq/1HvqgsoW9ZiQ2nWfjmA3ed0CdkX2c0EIrh9fR NJHoVheqd83RXejDG94DvS8wA0fsRELZFjVFLCQi9YIaZsOhLau2Qg7ABQjsOVkBGPu4 +dSTLOooGHAwYFsCrk2rOkttFSUMPP1BtkvHk8u+m1gbFNt9xumKSKcHYK5UjdrDffqY csDoDSAorjdfBxd97kPi+eLFdWP646BOol8JpS2eUszMg7FAHgAIFF8TGAL79hpQa/2k 1UAxONmQc05UXh0OLGr4SEc8aVtUJOPkJn/0/4QB3muukN24yA/CQCeEDJZm2vjUK/iD U4Hg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=4T8R/OHp8IUfH3p73E4AcP3RvxS21wwtMj4gnHlWkDY=; b=z4aLcO/J3gLlRcpzZEKXahLM1ITNUwftjMEqOWmANxfKyxdGkF//rHFezvjAhXfL+D qQ+ilFcZKr+Yb4pLOECzQT33ejsIVC2Z+wbryW906WbS9tjcdNOB2f1wum5AIf6X+wcQ 6lXSCBLQy24Mkh+xMJK0f482VbmGMiJHN04mKAbuwAQNQ9mpxSI1jq5IGgeZYm7/KE0D tlGwg8Ruoay/O2KehyhWlEa7gD+LLgNaDop1Y6QnbO444XBgv6R+nQ11ziWDO9sNTDqF Sq+9jxTznG5yus7yVvMIDDIIY9pmQv+PqNkud0XS1FPebabNzJp6nVO2ZqxlVCl9AxFL lLCQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f4si2353848oij.133.2020.01.10.18.48.58; Fri, 10 Jan 2020 18:49:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728182AbgAKCpz (ORCPT + 99 others); Fri, 10 Jan 2020 21:45:55 -0500 Received: from szxga06-in.huawei.com ([45.249.212.32]:45374 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728193AbgAKCpw (ORCPT ); Fri, 10 Jan 2020 21:45:52 -0500 Received: from DGGEMS414-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 4EBA91C2CA13BAE7BBDD; Sat, 11 Jan 2020 10:45:49 +0800 (CST) Received: from localhost.localdomain (10.67.165.24) by DGGEMS414-HUB.china.huawei.com (10.3.19.214) with Microsoft SMTP Server id 14.3.439.0; Sat, 11 Jan 2020 10:45:42 +0800 From: Zaibo Xu To: , CC: , , , , , , , , , , Subject: [PATCH v2 6/9] crypto: hisilicon - Add callback error check Date: Sat, 11 Jan 2020 10:41:53 +0800 Message-ID: <1578710516-40535-7-git-send-email-xuzaibo@huawei.com> X-Mailer: git-send-email 2.8.1 In-Reply-To: <1578710516-40535-1-git-send-email-xuzaibo@huawei.com> References: <1578710516-40535-1-git-send-email-xuzaibo@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.67.165.24] X-CFilter-Loop: Reflected Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Add error type parameter for call back checking inside. Signed-off-by: Zaibo Xu --- drivers/crypto/hisilicon/sec2/sec.h | 2 +- drivers/crypto/hisilicon/sec2/sec_crypto.c | 14 +++++++++----- 2 files changed, 10 insertions(+), 6 deletions(-) diff --git a/drivers/crypto/hisilicon/sec2/sec.h b/drivers/crypto/hisilicon/sec2/sec.h index c3b6012..97d5150 100644 --- a/drivers/crypto/hisilicon/sec2/sec.h +++ b/drivers/crypto/hisilicon/sec2/sec.h @@ -56,7 +56,7 @@ struct sec_req_op { void (*do_transfer)(struct sec_ctx *ctx, struct sec_req *req); int (*bd_fill)(struct sec_ctx *ctx, struct sec_req *req); int (*bd_send)(struct sec_ctx *ctx, struct sec_req *req); - void (*callback)(struct sec_ctx *ctx, struct sec_req *req); + void (*callback)(struct sec_ctx *ctx, struct sec_req *req, int err); int (*process)(struct sec_ctx *ctx, struct sec_req *req); }; diff --git a/drivers/crypto/hisilicon/sec2/sec_crypto.c b/drivers/crypto/hisilicon/sec2/sec_crypto.c index a6d5207..568c174 100644 --- a/drivers/crypto/hisilicon/sec2/sec_crypto.c +++ b/drivers/crypto/hisilicon/sec2/sec_crypto.c @@ -104,6 +104,7 @@ static void sec_req_cb(struct hisi_qp *qp, void *resp) struct sec_ctx *ctx; struct sec_req *req; u16 done, flag; + int err = 0; u8 type; type = bd->type_cipher_auth & SEC_TYPE_MASK; @@ -119,16 +120,18 @@ static void sec_req_cb(struct hisi_qp *qp, void *resp) flag = (le16_to_cpu(bd->type2.done_flag) & SEC_FLAG_MASK) >> SEC_FLAG_OFFSET; if (req->err_type || done != SEC_SQE_DONE || - flag != SEC_SQE_CFLAG) + flag != SEC_SQE_CFLAG) { dev_err(SEC_CTX_DEV(ctx), "err_type[%d],done[%d],flag[%d]\n", req->err_type, done, flag); + err = -EIO; + } atomic64_inc(&ctx->sec->debug.dfx.recv_cnt); ctx->req_op->buf_unmap(ctx, req); - ctx->req_op->callback(ctx, req); + ctx->req_op->callback(ctx, req, err); } static int sec_bd_send(struct sec_ctx *ctx, struct sec_req *req) @@ -618,7 +621,8 @@ static void sec_update_iv(struct sec_req *req) dev_err(SEC_CTX_DEV(req->ctx), "copy output iv error!\n"); } -static void sec_skcipher_callback(struct sec_ctx *ctx, struct sec_req *req) +static void sec_skcipher_callback(struct sec_ctx *ctx, struct sec_req *req, + int err) { struct skcipher_request *sk_req = req->c_req.sk_req; struct sec_qp_ctx *qp_ctx = req->qp_ctx; @@ -627,13 +631,13 @@ static void sec_skcipher_callback(struct sec_ctx *ctx, struct sec_req *req) sec_free_req_id(req); /* IV output at encrypto of CBC mode */ - if (ctx->c_ctx.c_mode == SEC_CMODE_CBC && req->c_req.encrypt) + if (!err && ctx->c_ctx.c_mode == SEC_CMODE_CBC && req->c_req.encrypt) sec_update_iv(req); if (req->fake_busy) sk_req->base.complete(&sk_req->base, -EINPROGRESS); - sk_req->base.complete(&sk_req->base, req->err_type); + sk_req->base.complete(&sk_req->base, err); } static void sec_request_uninit(struct sec_ctx *ctx, struct sec_req *req) -- 2.8.1