Received: by 2002:a6b:7707:0:0:0:0:0 with SMTP id n7csp2622110iom; Fri, 20 May 2022 11:38:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxYp1XEVMnztv80+sfIbN3nS9KLzFTodjAxiRLF4XeOoODr3J45Y8gotxeJSTIbvAlM7g9U X-Received: by 2002:a17:906:9f0c:b0:6f5:bed:d0a8 with SMTP id fy12-20020a1709069f0c00b006f50bedd0a8mr9934431ejc.94.1653071903997; Fri, 20 May 2022 11:38:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653071903; cv=none; d=google.com; s=arc-20160816; b=FReOwY+O2x5G6LK2vINa/N2IoXrBHwBv3V1SN30KYPT/+pucB2V3W9WvQ/yBF/7WNo 0FjlOe5aPKZ61sq38Bd1wEpMgmStHwW3Z6yF9jUhOMwXFwiqbFlhYreA3aEahKxYyhJz ApEgCXWtQmO0+av8UeYLfpmyTCngfZ9UqxuRXn2+sos3IdxmvzoEgRGqw4Fxcuc4yj4Q /ZqKc0HufBOhulzdhmR4bEibLcSGOncZIsDb9G5do16SebxRuzYaMzDkvuWYb2QdjqO5 yf+Py51gDR2FkPCbn2MXknqOGk+w/DO3jj20j4/4mhYREFYQLHoSBZ73VOjefxVARavR XdQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=2EM5YIPNpM52CnmBuFOZnlwwPBOv4pMaG+/1pE96UxA=; b=pxb0u+zM5n7vwZnOFmPEsmk0jttnVbDpf8QKUFZK/jQ+91gVC8BMB3R6JFel3/EO+3 LfMuR8wne+GoVmmOo9Rvz5OCkVCWov6fHBWap+FoDYuu5nqn0Vi3UG6V13gdKvag7oBi EBOr7e7ijI6w098iWcEazEMS4NVGr/RmFq6RfmMMaFXd+vP+zvuu9vXXWF5vLrYRJU2k su4oSFS3Goyy5MLy3wZoWMEgffoFNyC1ZiNX9u1tqStKxBCAG2yrfVCwnWZV9iZj57hb B/ix5vkn8/Pd80WdbG/S9eDw9OHxiN4tkXWUNtYD7Yi5Z7VeJ3uIq70XQkqz5IBwTUb/ ROPA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id go10-20020a1709070d8a00b006fea2fbaf6csi4433945ejc.666.2022.05.20.11.37.56; Fri, 20 May 2022 11:38:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344545AbiETF5w (ORCPT + 99 others); Fri, 20 May 2022 01:57:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42158 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244615AbiETF5u (ORCPT ); Fri, 20 May 2022 01:57:50 -0400 Received: from fornost.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 615FB14AA69 for ; Thu, 19 May 2022 22:57:49 -0700 (PDT) Received: from gwarestrin.arnor.me.apana.org.au ([192.168.103.7]) by fornost.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1nrvdx-00Fhys-6a; Fri, 20 May 2022 15:57:46 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Fri, 20 May 2022 13:57:45 +0800 Date: Fri, 20 May 2022 13:57:45 +0800 From: Herbert Xu To: Giovanni Cabiddu Cc: linux-crypto@vger.kernel.org, qat-linux@intel.com, Vlad Dronov Subject: Re: [PATCH v3 00/10] crypto: qat - re-enable algorithms Message-ID: References: <20220509133417.56043-1-giovanni.cabiddu@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220509133417.56043-1-giovanni.cabiddu@intel.com> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, May 09, 2022 at 02:34:07PM +0100, Giovanni Cabiddu wrote: > This set is an extension of a previous set called `crypto: qat - fix dm-crypt > related issues` which aims to re-enable the algorithms in the QAT driver > after [1]. > > This fixes a number of issues with the implementation of the QAT algs, > both symmetric and asymmetric. > In particular this set enables the QAT driver to handle correctly the > flags CRYPTO_TFM_REQ_MAY_BACKLOG and CRYPTO_TFM_REQ_MAY_SLEEP, > fixes an hidden issue in RSA and DH which appeared after commit f5ff79fddf0e, > related to the usage of dma_free_coherent() from a tasklet, and includes > important fixes in the akcipher algorithms. > > One item to mention is that, differently from the previous set, this > one does not removes the flag CRYPTO_ALG_ALLOCATES_MEMORY which will > be removed after the conversation in [2] is closed. > > [1] https://lore.kernel.org/linux-crypto/YiEyGoHacN80FcOL@silpixa00400314/ > [2] https://lore.kernel.org/linux-crypto/Yl6PlqyucVLCzwF5@silpixa00400314/ > > Changes from v2: > - Removed `crypto: qat - set to zero DH parameters before free` from > set. > - Added fixes tags to patches `crypto: qat - add param check for RSA` > and `crypto: qat - add param check for DH` > > Changes from v1: > - Clarified commit message in `crypto: qat - refactor submission logic` > to indicate why the patch should be included in stable kernels > - Removed `crypto: qat - use memzero_explicit() for algs` from set > after feedback from Greg KH > - Replaced memzero_explicit() with memset() in `crypto: qat - set to > zero DH parameters before free` after feedback from Greg KH > > Giovanni Cabiddu (10): > crypto: qat - use pre-allocated buffers in datapath > crypto: qat - refactor submission logic > crypto: qat - add backlog mechanism > crypto: qat - fix memory leak in RSA > crypto: qat - remove dma_free_coherent() for RSA > crypto: qat - remove dma_free_coherent() for DH > crypto: qat - add param check for RSA > crypto: qat - add param check for DH > crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag > crypto: qat - re-enable registration of algorithms > > drivers/crypto/qat/qat_4xxx/adf_drv.c | 7 - > drivers/crypto/qat/qat_common/Makefile | 1 + > drivers/crypto/qat/qat_common/adf_transport.c | 11 + > drivers/crypto/qat/qat_common/adf_transport.h | 1 + > .../qat/qat_common/adf_transport_internal.h | 1 + > drivers/crypto/qat/qat_common/qat_algs.c | 153 +++++---- > drivers/crypto/qat/qat_common/qat_algs_send.c | 86 +++++ > drivers/crypto/qat/qat_common/qat_algs_send.h | 11 + > drivers/crypto/qat/qat_common/qat_asym_algs.c | 304 +++++++++--------- > drivers/crypto/qat/qat_common/qat_crypto.c | 10 +- > drivers/crypto/qat/qat_common/qat_crypto.h | 44 +++ > 11 files changed, 392 insertions(+), 237 deletions(-) > create mode 100644 drivers/crypto/qat/qat_common/qat_algs_send.c > create mode 100644 drivers/crypto/qat/qat_common/qat_algs_send.h All applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt