Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp5058248iob; Mon, 9 May 2022 07:51:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyi5JqmdvyIDAtINN9GSvf8Bk2Pr0qcDP2DqjQHrNNF5FxTLykyKA6HbFfvxQOV2UE5hRSV X-Received: by 2002:a17:90b:3b4c:b0:1dc:7edf:c92f with SMTP id ot12-20020a17090b3b4c00b001dc7edfc92fmr18068225pjb.91.1652107877143; Mon, 09 May 2022 07:51:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652107877; cv=none; d=google.com; s=arc-20160816; b=B7koLSwa5tUdErpy+X6MJScswlL1S6tYIll0GfJ7uyGsFoxw7txJ5rnNSRNPWBGpb8 1Z18QjLW6vjRy/FF19I4iGIrG9ewrZrB3kHvSgYZnDEkWNPGt5/xxyaRhMvP8wIYGsUF hMMrH84UmfAGTC2zhVWlCOzS9zjrjE7GVhdX7X8qa06BygR8d+QeFsq6YPkc2S8K+Zul Xv+IG0jEDF4ZhBjlCU5Hl8adn7Kf5LbsD1NyPTBEzBzfDdnvknquD/rhEUejxBLkh7A7 l1AG8gzTPntb2UX9RvqbnUuitZ4zJN/3eI/8FdZNbyDHiDpeJbOWD9EM11kDJ23MX8nI OKug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:organization:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=4C2o+9fk4W7dhUHHIqRELz9kiqiICyGEnSopRoB1FQ0=; b=psmLdrDWUFjIA/kvVDP7H97SOjVi3nfPKLimqZY473GPJjKvVNI3M0uibAV0gmk7Jl WYs2MWY20XEqSgayJAYcGXchwIR/7M0j778bBfSsPkvGmkvLF8miuTV7CuA969GnyUXi MI/HzBy0NEBgjgoMJvgCTju+3rEAeSugFrLHh2MdKPRCVbsV7B3LnYNRf/7YyQ88+wFo 1deNXGnGaO+3vRjmBQaJm1Ag2jkR0o0eJ059vJZlNXHIx1taOHR+TM8v1/alTbpSzEzs wgKUPYQTgImOwz/dROhAVsHHi6aGw2bFQ7tbxg2fIuNbWPccrGuNOPPu9dFKKVSWDyPz TuYg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=F9nMofqZ; spf=softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id u69-20020a638548000000b0039d430ff61dsi15546665pgd.184.2022.05.09.07.51.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 May 2022 07:51:17 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=F9nMofqZ; spf=softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 489AE24BB1F; Mon, 9 May 2022 07:47:27 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237604AbiEIOvP (ORCPT + 99 others); Mon, 9 May 2022 10:51:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50102 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237605AbiEIOvO (ORCPT ); Mon, 9 May 2022 10:51:14 -0400 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 50E0D24BB0C; Mon, 9 May 2022 07:47:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1652107640; x=1683643640; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=ctbr8pn64aox4+GvXSlTrmhBa7uObSu6+nPSkOf5bqQ=; b=F9nMofqZ8fLjG/wJryu+78hNbdFEcKCIz/MNeccSmfUvi79RoCaVEPaD z9ugDvUaAMhNjz6NoKEmgrvBHvMiD2q8oF3Kcfqs4ejiekkcA+zpRGgx2 46mGYU8QlPUMUHYuBRipbBhrUIB4dS6HsAdCGF+mCYlmgdz2fDIqUfo7X D0SZrZdGBU+CbkloLsbV1E0lbe3sG8wzaMX6TnX7uOHSifsgdESDjLxPf WZ98SH2OadGEGpnXizV2TfqP30WmOynhM0IN415fhPVQ9SFd4bWI7DSwT 2ATIy278HdF9S3h7m8Rr6qYUOYNOQB8FAYfRDdoBrOqdyYXubz4p6OwuL w==; X-IronPort-AV: E=McAfee;i="6400,9594,10342"; a="269002439" X-IronPort-AV: E=Sophos;i="5.91,211,1647327600"; d="scan'208";a="269002439" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 May 2022 07:47:19 -0700 X-IronPort-AV: E=Sophos;i="5.91,211,1647327600"; d="scan'208";a="657093336" Received: from silpixa00400314.ir.intel.com (HELO silpixa00400314) ([10.237.222.76]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 May 2022 07:47:17 -0700 Date: Mon, 9 May 2022 15:47:10 +0100 From: Giovanni Cabiddu To: Greg KH Cc: herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org, qat-linux@intel.com, Vlad Dronov , stable@vger.kernel.org, Marco Chiappero , Adam Guerin , Wojciech Ziemba Subject: Re: [PATCH v3 10/10] crypto: qat - re-enable registration of algorithms Message-ID: References: <20220509133417.56043-1-giovanni.cabiddu@intel.com> <20220509133417.56043-11-giovanni.cabiddu@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Organization: Intel Research and Development Ireland Ltd - Co. Reg. #308263 - Collinstown Industrial Park, Leixlip, County Kildare - Ireland X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, May 09, 2022 at 04:11:27PM +0200, Greg KH wrote: > On Mon, May 09, 2022 at 02:34:17PM +0100, Giovanni Cabiddu wrote: > > Re-enable the registration of algorithms after fixes to (1) use > > pre-allocated buffers in the datapath and (2) support the > > CRYPTO_TFM_REQ_MAY_BACKLOG flag. > > > > This reverts commit 8893d27ffcaf6ec6267038a177cb87bcde4dd3de. > > Then why not just have this be a "normal" revert commit? It can be a revert commit. I didn't send a revert commit since I never saw one in the crypto mailing list. > And why is this ok for stable kernels? This feels like a new feature > (i.e. the code finally works.) Why not just have users who want to use > this use a newer kernel? What bugfix does this resolve in older kernels > (and "the driver did not work" is not really a good reason.) After the bug report in [1], the final decision was to disable the algorithms until the issue was fixed. This set is fixing the issues that cause [1] and a few other minor ones before re-enabling the algos. I think there is value in having these fixes in stable as they allow to re-enable services that were available before the 5.17 time frame. Regards, -- Giovanni [1] https://lore.kernel.org/linux-crypto/CACsaVZ+mt3CfdXV0_yJh7d50tRcGcRZ12j3n6-hoX2cz3+njsg@mail.gmail.com/