Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp4050539ybb; Mon, 6 Apr 2020 23:04:58 -0700 (PDT) X-Google-Smtp-Source: APiQypKvvt1x9yufIjDKN7woMfcgRearwm/wtVtqmAOMqG2mQ6ClGTqf7j7cY75LNhO8r7aeT1Wc X-Received: by 2002:a9d:5781:: with SMTP id q1mr319524oth.258.1586239497821; Mon, 06 Apr 2020 23:04:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586239497; cv=none; d=google.com; s=arc-20160816; b=Y/7cGWKxSAHxwG/+7ym/n9Ba0R7S5LdjxIPOP+EuA7wjdLrJ9thUM5uFwTgeK27ZAU 0jg+JAjn17nXOsYG40FXTC1D83rMs1MgmcXWvpcC2KwrE1HSWZBrfc3CgtfobRdSdn9A tG3x0vGKKioTr0/dcYzzWCddnG7l8nufYRwR3BgG4Gi4NkPbOTZJu9DgAd7RU1q1SDyn bhf/j7BrbFaKXC4hgkqt8RnPnv53o+228KyaPurhigbbuzeDrIkKNyK1j8BpcNbPRXqS qMffoActyvGQPQkxXSAsNIsbkepHbwL309vFuHEk3CwWQFG4vWHGya1PoZLavjH5stoK 7qWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=9hnnTrVNyuYfRp4zMhUYM+MLhpdMY9kDSJcJ62FQ3Go=; b=Ae5Cddcgq1FyG72reh+mZkmQH5+MWrhSUFJcCclLE2ic98uSU2mZmVoKu2dw7MEnmT a5uiRMzjz0eJioWeHtPAMHY4iB+mujC4gffY1ucUrPND7jp7jZziHluvkUumjhsLO5LQ UL0D+OQXjsTC0C4Ntslrvs4IjOYtNZ19z2sCd8wrrb++aRB8DGw6ZYvRMG3tJ7eAji0r TqwA7AHUk8LIhF4ApDF8UqA2zhidrh5cDCey/uw1CH8rSl/WFPGVUqAsvEGauUP6/q4Z DmPJsllj7DzChTKBsRW01RX3HHzMVcPfYP+uZoBUC6zZT+Ineec7s4yR6YvqKuzuAKx4 9fTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RPMDrS76; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u16si867935oth.230.2020.04.06.23.04.35; Mon, 06 Apr 2020 23:04:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RPMDrS76; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726687AbgDGGEO (ORCPT + 99 others); Tue, 7 Apr 2020 02:04:14 -0400 Received: from mail.kernel.org ([198.145.29.99]:34576 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725802AbgDGGEO (ORCPT ); Tue, 7 Apr 2020 02:04:14 -0400 Received: from sol.hsd1.ca.comcast.net (c-107-3-166-239.hsd1.ca.comcast.net [107.3.166.239]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4A1D72051A; Tue, 7 Apr 2020 06:04:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1586239453; bh=cESVjNv8wDERqvJRgrWmpES3qp0fDrI8i1y53OkBYME=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RPMDrS76dTeN3ibl4UBkEAH9iQzmcoFewH0QZtcCPI3A0TBk1bHgrH0ddnwZoGoYZ JsY+QUGXwlA5jHXrf/wmYPzzAF4yFEfBp6BdReDfG/UQ5FzexdbWkyr3eQ7sCr05DI 3re4wuLS45eiicgrcvZWTats1nCxHEEIWlYXB30A= From: Eric Biggers To: linux-crypto@vger.kernel.org Cc: stable@vger.kernel.org, "Martin K . Petersen" Subject: [PATCH v2] crypto: algapi - Avoid spurious modprobe on LOADED Date: Mon, 6 Apr 2020 23:02:40 -0700 Message-Id: <20200407060240.175837-1-ebiggers@kernel.org> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200407051744.GA13037@gondor.apana.org.au> References: <20200407051744.GA13037@gondor.apana.org.au> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: Eric Biggers Currently after any algorithm is registered and tested, there's an unnecessary request_module("cryptomgr") even if it's already loaded. Also, CRYPTO_MSG_ALG_LOADED is sent twice, and thus if the algorithm is "crct10dif", lib/crc-t10dif.c replaces the tfm twice rather than once. This occurs because CRYPTO_MSG_ALG_LOADED is sent using crypto_probing_notify(), which tries to load "cryptomgr" if the notification is not handled (NOTIFY_DONE). This doesn't make sense because "cryptomgr" doesn't handle this notification. Fix this by using crypto_notify() instead of crypto_probing_notify(). Fixes: dd8b083f9a5e ("crypto: api - Introduce notifier for new crypto algorithms") Cc: # v4.20+ Cc: Martin K. Petersen Signed-off-by: Eric Biggers --- crypto/algapi.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/algapi.c b/crypto/algapi.c index 69605e21af92..849254d7e627 100644 --- a/crypto/algapi.c +++ b/crypto/algapi.c @@ -403,7 +403,7 @@ static void crypto_wait_for_test(struct crypto_larval *larval) err = wait_for_completion_killable(&larval->completion); WARN_ON(err); if (!err) - crypto_probing_notify(CRYPTO_MSG_ALG_LOADED, larval); + crypto_notify(CRYPTO_MSG_ALG_LOADED, larval); out: crypto_larval_kill(&larval->alg); -- 2.26.0