Received: by 2002:a05:6a10:9afc:0:0:0:0 with SMTP id t28csp740311pxm; Wed, 2 Mar 2022 07:35:15 -0800 (PST) X-Google-Smtp-Source: ABdhPJw3l4Bfp/bdfMNgsRLHcEv+VLxPPlUXKnIUhT/rOf0XiD12qrQKUPOAN1fpv4XXLPvvLmFb X-Received: by 2002:a63:790d:0:b0:373:cc0b:5b6a with SMTP id u13-20020a63790d000000b00373cc0b5b6amr26602331pgc.119.1646235315150; Wed, 02 Mar 2022 07:35:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646235315; cv=none; d=google.com; s=arc-20160816; b=j33WfHxlGyMYw/HXgW/ysBEnBFSbp06z64j6uyTUrynz92CHYe8Sq9DLYXvgzhqa7e eP9SYOQKcz6tdmn2VJqUUf/rge/keVJmMYRGCyPlRaENILWQRg040jiaQZcI8Jb9OSc1 zUWwgIOMG7Ehx8qnmhCF0vjdGMAYLKcyp4pV9BUJU5xXGRrVouYASKyGW4u3O+tZnNIq UfpFTfy/Gc01kiElHSqj7O2HkTkMF14M8nYm98YNpaibjybWHPSn2QXIDLEddRCslnfz 8vFKv3xi+J+sARmAFVCbCYewTx4faRnR7T/MiPAverKNhldVIb+IARTOS1Ebv+9waQqz nfsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=T21gnyd9FkX3HmiJzeuvhVXzT7kW/U6/KjF6sT0JuR4=; b=UhlOWTDyEuM+f235WpR+5p+QV/CF2y048vG5jAiBTATxSjk6BVNSOrO/3A9TCvyAnU I5KIgXntU7pBm5z10KyipQrfFyfvFSduQ7gupSZy6sUMfo0qeC0stA60FJQleK87sGr0 khDRI5uVG4ZfmzuClvCFmm9Ls8WWIAjs9SuFh2ynUnFC3u+VuQ6vuWkXUz/0W56k+mAh BjDGfT0mlE26gPR+tr5OcyVXgeIdWSsXGKyS+oESXXGqmCvOG7OyatuZkTw7pMNuW5S7 0r8RMDKAq0U5jiqUwlv03nuX4LrTw/Nbew+2Nn5VuXulRfVHHK3R13Ogj8dlmzh8iRY/ gZFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ufYPWrZb; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d16-20020a170902b71000b0014f3b4aad2fsi14998357pls.293.2022.03.02.07.34.41; Wed, 02 Mar 2022 07:35:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ufYPWrZb; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238030AbiCBO5X (ORCPT + 99 others); Wed, 2 Mar 2022 09:57:23 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58994 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234237AbiCBO5X (ORCPT ); Wed, 2 Mar 2022 09:57:23 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 47D6B48396; Wed, 2 Mar 2022 06:56:40 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id D761E61666; Wed, 2 Mar 2022 14:56:39 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id EDA49C004E1; Wed, 2 Mar 2022 14:56:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1646232999; bh=Mi9q+LtieiMun2ocnCwKvyOxp+6VG4htF2rkds+fAQw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ufYPWrZbvXBD/NeSNuQz19nBhfwAGhijZ9tRMN/rue6/lWQxOHlIsLST366pfuDxm f7GRuQ1s+ZrXZlgePnpz4cbU0IOQMu3B4ruSuZfSBLXD3tokBdgZbhtsl033uhE7Vg 7uF6KajeDwWHh9R2VhoS985ryxkpaiJVHTFO7um8= Date: Wed, 2 Mar 2022 15:56:36 +0100 From: Greg KH To: Giovanni Cabiddu Cc: Herbert Xu , Linus Torvalds , Kyle Sanderson , Dave Chinner , qat-linux@intel.com, Linux-Kernal , linux-xfs , Linux Crypto Mailing List , device-mapper development Subject: Re: Intel QAT on A2SDi-8C-HLN4F causes massive data corruption with dm-crypt + xfs Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-7.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, Mar 02, 2022 at 11:49:16AM +0000, Giovanni Cabiddu wrote: > Hi Greg, > > On Wed, Mar 02, 2022 at 11:29:00AM +0100, Greg KH wrote: > > On Tue, Mar 01, 2022 at 04:11:13PM +1200, Herbert Xu wrote: > > > On Mon, Feb 28, 2022 at 05:12:20PM -0800, Linus Torvalds wrote: > > > > > > > > It sounds like it was incidental and almost accidental that it fixed > > > > that thing, and nobody realized it should perhaps be also moved to > > > > stable. > > > > > > Yes this was incidental. The patch in question fixes an issue in > > > OOM situations where drivers that must allocate memory on each > > > request may lead to dead-lock so it's not really targeted at qat. > > > > Ok, so what commits should I backport to kernels older than 5.10 to > > resolve this? > Is it possible to wait for a set that resolves the problem rather than > backporting the patches that disables the use-case? It's already disabled in newer kernels, so we should do so for older ones to prevent problems and the delay in getting those potential fixes merged some day in the future. > I have a patchset that fixes the actual issue and we are doing an > internal review before submission to the mailing list. > I should be able to send a V1 out between today and tomorrow. > > If not, then these are the patches that should be backported: > 7bcb2c99f8ed crypto: algapi - use common mechanism for inheriting flags > 2eb27c11937e crypto: algapi - add NEED_FALLBACK to INHERITED_FLAGS > fbb6cda44190 crypto: algapi - introduce the flag CRYPTO_ALG_ALLOCATES_MEMORY > b8aa7dc5c753 crypto: drivers - set the flag CRYPTO_ALG_ALLOCATES_MEMORY > cd74693870fb dm crypt: don't use drivers that have CRYPTO_ALG_ALLOCATES_MEMORY > Herbert, correct me if I'm wrong here. These need to be manually backported as they do not apply cleanly. Can you provide such a set? Or should I just disable a specific driver here instead which would be easier overall? thanks, greg k-h