From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 8888D468E4 for ; Thu, 12 Jun 2025 23:08:38 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 83D5C42DD9; Thu, 12 Jun 2025 23:08:38 +0200 (CEST) Received: from mail-wm1-f42.google.com (mail-wm1-f42.google.com [209.85.128.42]) by mails.dpdk.org (Postfix) with ESMTP id 6FA0C42E3A for ; Thu, 12 Jun 2025 23:08:36 +0200 (CEST) Received: by mail-wm1-f42.google.com with SMTP id 5b1f17b1804b1-45305c280a3so6342505e9.3 for ; Thu, 12 Jun 2025 14:08:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1749762516; x=1750367316; darn=dpdk.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=1t47h3plRd6gtEe2XLUTKJIzvhfXCUH5V57R0H2YRwg=; b=SO/w+ERVPMkOEP6seli5Pd5o9MdSZ6Eocyf1COUnDv3kMn7tPQq7uhNb97uKZNCtFF AQyWtrcCQxmq+Z/lWFuTKM469HvpO7rlgUEOuH6SZc/iEH/HPPnw58UTqjEsHcVtpq3d WudB9hzya0wSr0o+A2cegYCAoF32zF7oj65AaQVr//sJend4aLu4xIWtnx54syyXO1yK TJ8giMVdDejtN+1jgQkz1UnrViMjdmRcRx85pyWf8IWJTyYGMoWVQbFiRFq7Z+OVbHAO FLAXBr0xvY/rSkKFjCISHuwLK0YqQBGddvLDl+8lteGft2ud1QIY9Tq2sGU1xTx9ov7h PINw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1749762516; x=1750367316; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=1t47h3plRd6gtEe2XLUTKJIzvhfXCUH5V57R0H2YRwg=; b=AE9Xp9x47Zpkt68qPYvt4/QmIMk3Sjt5A87MMmqv7CW310yRF8AHF9/7UjmVJOzKwf q/YMF37b8DZcuoh7uC0MUeT3HTsyDn3mo22Qrze/5irK5xnVwHa6mtm9liAZyxPgRHug 1DEVw4/ju+mD2eYY2soKyQmlT3FLonDI+w4KWB32nY3OJIkIwPr62ECPY6zn19OFJei9 UbvD1qdtDS5agz6uuM7yu2KM1s//RAzYe0LBNHf3JlrmM9k9qGaJ8IsGyAfg68Afbz9y 9AxpBrjvTZHNXS5iXdASYg8y3Pl1ihMa+I47SJe5uo+Kjnv6RtIvYrL2zMtupJLAjbRt HLtA== X-Gm-Message-State: AOJu0YwG3DyXYOVwMnAtaWdj/xDE7i2LajILKnF67I+VDOFxdlD04fU0 1mamsf1ntUnbXepVYLtVJZhcov4VpRNNcq169o4ZUXQhNX/lxRV2ZNDSWJBnPL6F X-Gm-Gg: ASbGnctnUO19kXQBdpVAZUJ7PByhsc/xVfxuq/5GbPszkLN9DaZ/BtbNcYThuBnHxsR hYo/gFNreQvXVdaPsYmvo49ej9aBDiFtU7UUdGLyPlHilaOquWsPxSo3Q21GwayJ2naWzXDf7Wn TwReYvTj/317TOgfedT0UKQ36hylfWXOeA8QJpsEPgtpF2J4TuhiisQ/l7PGmBuzpvTuaTrmRTE nKfNRCIRhrYd1XijYPRuXb39XVtE+04kZZFcosSUxFmiHRQzKx3mTqBsRpDmS0I48C49T4NBR5C e2OfCoginhR3sFdt6Es/196sr2pcLb6LzAvMeVoOFbcyZPnSMMZOcsKaHEAnC53gajun X-Google-Smtp-Source: AGHT+IFLhTI/J5W8TZPmRTGx+IfSimbiUeD1zTajXbvuX4uAeYVjS1HyvhueISRo0pAY5tWxlF1qRA== X-Received: by 2002:a05:6000:4202:b0:3a4:fa09:d13b with SMTP id ffacd0b85a97d-3a56876174bmr579316f8f.59.1749762515876; Thu, 12 Jun 2025 14:08:35 -0700 (PDT) Received: from localhost ([2a01:4b00:d036:ae00:f2df:571a:ae4c:bef2]) by smtp.gmail.com with UTF8SMTPSA id ffacd0b85a97d-3a568a67361sm400414f8f.30.2025.06.12.14.08.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 12 Jun 2025 14:08:35 -0700 (PDT) From: luca.boccassi@gmail.com To: Arkadiusz Kusztal Cc: dpdk stable Subject: patch 'crypto/qat: fix out-of-place chain/cipher/auth headers' has been queued to stable release 22.11.9 Date: Thu, 12 Jun 2025 22:06:35 +0100 Message-ID: <20250612210733.2506558-18-luca.boccassi@gmail.com> X-Mailer: git-send-email 2.47.2 In-Reply-To: <20250612210733.2506558-1-luca.boccassi@gmail.com> References: <20250612210733.2506558-1-luca.boccassi@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 22.11.9 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 06/14/25. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/bluca/dpdk-stable This queued commit can be viewed at: https://github.com/bluca/dpdk-stable/commit/c30b27d67f8e6914eb4278fc4320e84035a76989 Thanks. Luca Boccassi --- >From c30b27d67f8e6914eb4278fc4320e84035a76989 Mon Sep 17 00:00:00 2001 From: Arkadiusz Kusztal Date: Mon, 28 Apr 2025 06:30:41 +0000 Subject: [PATCH] crypto/qat: fix out-of-place chain/cipher/auth headers [ upstream commit 317d05f3721c9a740614adf77aa89d00d5302cf7 ] This commit fixes a problem with overwriting data in the OOP header in RAW API crypto processing when using chain, cipher and auth algorithms. Fixes: 85fec6fd9674 ("crypto/qat: unify raw data path functions") Signed-off-by: Arkadiusz Kusztal --- drivers/crypto/qat/dev/qat_crypto_pmd_gens.h | 146 +++++++++++++++++++ drivers/crypto/qat/dev/qat_sym_pmd_gen1.c | 40 +++-- 2 files changed, 171 insertions(+), 15 deletions(-) diff --git a/drivers/crypto/qat/dev/qat_crypto_pmd_gens.h b/drivers/crypto/qat/dev/qat_crypto_pmd_gens.h index 739649e793..6f676a2c44 100644 --- a/drivers/crypto/qat/dev/qat_crypto_pmd_gens.h +++ b/drivers/crypto/qat/dev/qat_crypto_pmd_gens.h @@ -261,6 +261,152 @@ done: return src_tot_length; } +struct qat_sym_req_mid_info { + uint32_t data_len; + union rte_crypto_sym_ofs ofs; +}; + +static inline +struct qat_sym_req_mid_info qat_sym_req_mid_set( + int *error, struct icp_qat_fw_la_bulk_req *const req, + struct qat_sym_op_cookie *const cookie, const void *const opaque, + const struct rte_crypto_sgl *sgl_src, const struct rte_crypto_sgl *sgl_dst, + const union rte_crypto_sym_ofs ofs) +{ + struct qat_sym_req_mid_info info = { }; /* Returned value */ + uint32_t src_tot_length = 0; + uint32_t dst_tot_length = 0; /* Used only for input validity checks */ + uint32_t src_length = 0; + uint32_t dst_length = 0; + uint64_t src_data_addr = 0; + uint64_t dst_data_addr = 0; + union rte_crypto_sym_ofs out_ofs = ofs; + const struct rte_crypto_vec * const vec_src = sgl_src->vec; + const struct rte_crypto_vec * const vec_dst = sgl_dst->vec; + const uint32_t n_src = sgl_src->num; + const uint32_t n_dst = sgl_dst->num; + const uint16_t offset = RTE_MIN(ofs.ofs.cipher.head, ofs.ofs.auth.head); + const uint8_t is_flat = !(n_src > 1 || n_dst > 1); /* Flat buffer or the SGL */ + const uint8_t is_in_place = !n_dst; /* In-place or out-of-place */ + + *error = 0; + if (unlikely((n_src < 1 || n_src > QAT_SYM_SGL_MAX_NUMBER) || + n_dst > QAT_SYM_SGL_MAX_NUMBER)) { + QAT_LOG(DEBUG, + "Invalid number of sgls, source no: %u, dst no: %u, opaque: %p", + n_src, n_dst, opaque); + *error = -1; + return info; + } + + /* --- Flat buffer --- */ + if (is_flat) { + src_data_addr = vec_src->iova; + dst_data_addr = vec_src->iova; + src_length = vec_src->len; + dst_length = vec_src->len; + + if (is_in_place) + goto done; + /* Out-of-place + * If OOP, we need to keep in mind that offset needs to + * start where the aead starts + */ + dst_length = vec_dst->len; + /* Comparison between different types, intentional */ + if (unlikely(offset > src_length || offset > dst_length)) { + QAT_LOG(DEBUG, + "Invalid size of the vector parameters, source length: %u, dst length: %u, opaque: %p", + src_length, dst_length, opaque); + *error = -1; + return info; + } + out_ofs.ofs.cipher.head -= offset; + out_ofs.ofs.auth.head -= offset; + src_data_addr += offset; + dst_data_addr = vec_dst->iova + offset; + src_length -= offset; + dst_length -= offset; + src_tot_length = src_length; + dst_tot_length = dst_length; + goto check; + } + + /* --- Scatter-gather list --- */ + struct qat_sgl * const qat_sgl_src = (struct qat_sgl *)&cookie->qat_sgl_src; + uint16_t i; + + ICP_QAT_FW_COMN_PTR_TYPE_SET(req->comn_hdr.comn_req_flags, + QAT_COMN_PTR_TYPE_SGL); + qat_sgl_src->num_bufs = n_src; + src_data_addr = cookie->qat_sgl_src_phys_addr; + /* Fill all the source buffers but the first one */ + for (i = 1; i < n_src; i++) { + qat_sgl_src->buffers[i].len = (vec_src + i)->len; + qat_sgl_src->buffers[i].addr = (vec_src + i)->iova; + src_tot_length += qat_sgl_src->buffers[i].len; + } + + if (is_in_place) { + /* SGL source first entry, no OOP */ + qat_sgl_src->buffers[0].len = vec_src->len; + qat_sgl_src->buffers[0].addr = vec_src->iova; + dst_data_addr = src_data_addr; + goto done; + } + /* Out-of-place */ + struct qat_sgl * const qat_sgl_dst = + (struct qat_sgl *)&cookie->qat_sgl_dst; + /* + * Offset reaching outside of the first buffer is not supported (RAW api). + * Integer promotion here, but it does not bother this time + */ + if (unlikely(offset > vec_src->len || offset > vec_dst->len)) { + QAT_LOG(DEBUG, + "Invalid size of the vector parameters, source length: %u, dst length: %u, opaque: %p", + vec_src->len, vec_dst->len, opaque); + *error = -1; + return info; + } + out_ofs.ofs.cipher.head -= offset; + out_ofs.ofs.auth.head -= offset; + /* SGL source first entry, adjusted to OOP offsets */ + qat_sgl_src->buffers[0].addr = vec_src->iova + offset; + qat_sgl_src->buffers[0].len = vec_src->len - offset; + /* SGL destination first entry, adjusted to OOP offsets */ + qat_sgl_dst->buffers[0].addr = vec_dst->iova + offset; + qat_sgl_dst->buffers[0].len = vec_dst->len - offset; + /* Fill the remaining destination buffers */ + for (i = 1; i < n_dst; i++) { + qat_sgl_dst->buffers[i].len = (vec_dst + i)->len; + qat_sgl_dst->buffers[i].addr = (vec_dst + i)->iova; + dst_tot_length += qat_sgl_dst->buffers[i].len; + } + dst_tot_length += qat_sgl_dst->buffers[0].len; + qat_sgl_dst->num_bufs = n_dst; + dst_data_addr = cookie->qat_sgl_dst_phys_addr; + +check: /* If error, return directly. If success, jump to one of these labels */ + if (src_tot_length != dst_tot_length) { + QAT_LOG(DEBUG, + "Source length is not equal to the destination length %u, dst no: %u, opaque: %p", + src_tot_length, dst_tot_length, opaque); + *error = -1; + return info; + } +done: + req->comn_mid.opaque_data = (uintptr_t)opaque; + req->comn_mid.src_data_addr = src_data_addr; + req->comn_mid.dest_data_addr = dst_data_addr; + req->comn_mid.src_length = src_length; + req->comn_mid.dst_length = dst_length; + + info.data_len = src_tot_length; + info.ofs = out_ofs; + + return info; +} + static __rte_always_inline int32_t qat_sym_build_req_set_data(struct icp_qat_fw_la_bulk_req *req, void *opaque, struct qat_sym_op_cookie *cookie, diff --git a/drivers/crypto/qat/dev/qat_sym_pmd_gen1.c b/drivers/crypto/qat/dev/qat_sym_pmd_gen1.c index d4eabc009a..1856770522 100644 --- a/drivers/crypto/qat/dev/qat_sym_pmd_gen1.c +++ b/drivers/crypto/qat/dev/qat_sym_pmd_gen1.c @@ -551,16 +551,20 @@ qat_sym_dp_enqueue_cipher_jobs_gen1(void *qp_data, uint8_t *drv_ctx, for (i = 0; i < n; i++) { struct qat_sym_op_cookie *cookie = qp->op_cookies[tail >> tx_queue->trailz]; + struct qat_sym_req_mid_info info = { }; + union rte_crypto_sym_ofs temp_ofs = ofs; + int error = 0; + temp_ofs.ofs.auth = temp_ofs.ofs.cipher; req = (struct icp_qat_fw_la_bulk_req *)( (uint8_t *)tx_queue->base_addr + tail); rte_mov128((uint8_t *)req, (const uint8_t *)&(ctx->fw_req)); if (vec->dest_sgl) { - data_len = qat_sym_build_req_set_data(req, - user_data[i], cookie, - vec->src_sgl[i].vec, vec->src_sgl[i].num, - vec->dest_sgl[i].vec, vec->dest_sgl[i].num); + info = qat_sym_req_mid_set(&error, req, cookie, user_data[i], + &vec->src_sgl[i], &vec->dest_sgl[i], temp_ofs); + data_len = info.data_len; + ofs = info.ofs; } else { data_len = qat_sym_build_req_set_data(req, user_data[i], cookie, @@ -568,7 +572,7 @@ qat_sym_dp_enqueue_cipher_jobs_gen1(void *qp_data, uint8_t *drv_ctx, vec->src_sgl[i].num, NULL, 0); } - if (unlikely(data_len < 0)) + if (unlikely(data_len < 0 || error)) break; enqueue_one_cipher_job_gen1(ctx, req, &vec->iv[i], ofs, (uint32_t)data_len); @@ -668,16 +672,20 @@ qat_sym_dp_enqueue_auth_jobs_gen1(void *qp_data, uint8_t *drv_ctx, for (i = 0; i < n; i++) { struct qat_sym_op_cookie *cookie = qp->op_cookies[tail >> tx_queue->trailz]; + struct qat_sym_req_mid_info info = { }; + union rte_crypto_sym_ofs temp_ofs = ofs; + int error = 0; + temp_ofs.ofs.cipher = temp_ofs.ofs.auth; req = (struct icp_qat_fw_la_bulk_req *)( (uint8_t *)tx_queue->base_addr + tail); rte_mov128((uint8_t *)req, (const uint8_t *)&(ctx->fw_req)); if (vec->dest_sgl) { - data_len = qat_sym_build_req_set_data(req, - user_data[i], cookie, - vec->src_sgl[i].vec, vec->src_sgl[i].num, - vec->dest_sgl[i].vec, vec->dest_sgl[i].num); + info = qat_sym_req_mid_set(&error, req, cookie, user_data[i], + &vec->src_sgl[i], &vec->dest_sgl[i], temp_ofs); + data_len = info.data_len; + ofs = info.ofs; } else { data_len = qat_sym_build_req_set_data(req, user_data[i], cookie, @@ -685,7 +693,7 @@ qat_sym_dp_enqueue_auth_jobs_gen1(void *qp_data, uint8_t *drv_ctx, vec->src_sgl[i].num, NULL, 0); } - if (unlikely(data_len < 0)) + if (unlikely(data_len < 0 || error)) break; if (ctx->qat_hash_alg == ICP_QAT_HW_AUTH_ALGO_NULL) { @@ -794,16 +802,18 @@ qat_sym_dp_enqueue_chain_jobs_gen1(void *qp_data, uint8_t *drv_ctx, for (i = 0; i < n; i++) { struct qat_sym_op_cookie *cookie = qp->op_cookies[tail >> tx_queue->trailz]; + struct qat_sym_req_mid_info info = { }; + int error = 0; req = (struct icp_qat_fw_la_bulk_req *)( (uint8_t *)tx_queue->base_addr + tail); rte_mov128((uint8_t *)req, (const uint8_t *)&(ctx->fw_req)); if (vec->dest_sgl) { - data_len = qat_sym_build_req_set_data(req, - user_data[i], cookie, - vec->src_sgl[i].vec, vec->src_sgl[i].num, - vec->dest_sgl[i].vec, vec->dest_sgl[i].num); + info = qat_sym_req_mid_set(&error, req, cookie, user_data[i], + &vec->src_sgl[i], &vec->dest_sgl[i], ofs); + data_len = info.data_len; + ofs = info.ofs; } else { data_len = qat_sym_build_req_set_data(req, user_data[i], cookie, @@ -811,7 +821,7 @@ qat_sym_dp_enqueue_chain_jobs_gen1(void *qp_data, uint8_t *drv_ctx, vec->src_sgl[i].num, NULL, 0); } - if (unlikely(data_len < 0)) + if (unlikely(data_len < 0 || error)) break; if (ctx->qat_hash_alg == ICP_QAT_HW_AUTH_ALGO_NULL) { -- 2.47.2 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2025-06-12 22:06:24.559856964 +0100 +++ 0018-crypto-qat-fix-out-of-place-chain-cipher-auth-header.patch 2025-06-12 22:06:23.806043286 +0100 @@ -1 +1 @@ -From 317d05f3721c9a740614adf77aa89d00d5302cf7 Mon Sep 17 00:00:00 2001 +From c30b27d67f8e6914eb4278fc4320e84035a76989 Mon Sep 17 00:00:00 2001 @@ -5,0 +6,2 @@ +[ upstream commit 317d05f3721c9a740614adf77aa89d00d5302cf7 ] + @@ -10 +11,0 @@ -Cc: stable@dpdk.org @@ -19 +20 @@ -index c447f2cb45..846636f57d 100644 +index 739649e793..6f676a2c44 100644 @@ -22 +23 @@ -@@ -280,6 +280,152 @@ done: +@@ -261,6 +261,152 @@ done: @@ -176 +177 @@ -index 3976d03179..561166203c 100644 +index d4eabc009a..1856770522 100644 @@ -179 +180 @@ -@@ -567,16 +567,20 @@ qat_sym_dp_enqueue_cipher_jobs_gen1(void *qp_data, uint8_t *drv_ctx, +@@ -551,16 +551,20 @@ qat_sym_dp_enqueue_cipher_jobs_gen1(void *qp_data, uint8_t *drv_ctx, @@ -204 +205 @@ -@@ -584,7 +588,7 @@ qat_sym_dp_enqueue_cipher_jobs_gen1(void *qp_data, uint8_t *drv_ctx, +@@ -568,7 +572,7 @@ qat_sym_dp_enqueue_cipher_jobs_gen1(void *qp_data, uint8_t *drv_ctx, @@ -211,3 +212,3 @@ - - if (ctx->is_zuc256) -@@ -688,16 +692,20 @@ qat_sym_dp_enqueue_auth_jobs_gen1(void *qp_data, uint8_t *drv_ctx, + enqueue_one_cipher_job_gen1(ctx, req, &vec->iv[i], ofs, + (uint32_t)data_len); +@@ -668,16 +672,20 @@ qat_sym_dp_enqueue_auth_jobs_gen1(void *qp_data, uint8_t *drv_ctx, @@ -238 +239 @@ -@@ -705,7 +713,7 @@ qat_sym_dp_enqueue_auth_jobs_gen1(void *qp_data, uint8_t *drv_ctx, +@@ -685,7 +693,7 @@ qat_sym_dp_enqueue_auth_jobs_gen1(void *qp_data, uint8_t *drv_ctx, @@ -246,2 +247,2 @@ - if (ctx->is_zuc256) -@@ -819,16 +827,18 @@ qat_sym_dp_enqueue_chain_jobs_gen1(void *qp_data, uint8_t *drv_ctx, + if (ctx->qat_hash_alg == ICP_QAT_HW_AUTH_ALGO_NULL) { +@@ -794,16 +802,18 @@ qat_sym_dp_enqueue_chain_jobs_gen1(void *qp_data, uint8_t *drv_ctx, @@ -270 +271 @@ -@@ -836,7 +846,7 @@ qat_sym_dp_enqueue_chain_jobs_gen1(void *qp_data, uint8_t *drv_ctx, +@@ -811,7 +821,7 @@ qat_sym_dp_enqueue_chain_jobs_gen1(void *qp_data, uint8_t *drv_ctx, @@ -278 +279 @@ - if (ctx->is_zuc256) { + if (ctx->qat_hash_alg == ICP_QAT_HW_AUTH_ALGO_NULL) {