Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753848AbdFSIuq (ORCPT ); Mon, 19 Jun 2017 04:50:46 -0400 Received: from mail-dm3nam03on0056.outbound.protection.outlook.com ([104.47.41.56]:10767 "EHLO NAM03-DM3-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753769AbdFSIul (ORCPT ); Mon, 19 Jun 2017 04:50:41 -0400 Authentication-Results: spf=fail (sender IP is 192.88.168.50) smtp.mailfrom=nxp.com; vger.kernel.org; dkim=none (message not signed) header.d=none;vger.kernel.org; dmarc=fail action=none header.from=nxp.com; From: =?UTF-8?q?Horia=20Geant=C4=83?= To: Herbert Xu , David Gstir CC: "David S. Miller" , Dan Douglass , , Radu Solea , , Subject: [PATCH 2/2] crypto: caam - fix gfp allocation flags (part II) Date: Mon, 19 Jun 2017 11:44:46 +0300 Message-ID: <20170619084446.27967-2-horia.geanta@nxp.com> X-Mailer: git-send-email 2.12.0.264.gd6db3f216544 In-Reply-To: <20170619084446.27967-1-horia.geanta@nxp.com> References: <5215CFD1-A162-4668-A34C-1C29509DC27E@sigma-star.at> <20170619084446.27967-1-horia.geanta@nxp.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-EOPAttributedMessage: 0 X-Matching-Connectors: 131423358202900193;(91ab9b29-cfa4-454e-5278-08d120cd25b8);() X-Forefront-Antispam-Report: CIP:192.88.168.50;IPV:NLI;CTRY:US;EFV:NLI;SFV:NSPM;SFS:(10009020)(6009001)(336005)(39400400002)(39860400002)(39410400002)(39850400002)(39380400002)(39450400003)(39840400002)(2980300002)(1109001)(1110001)(339900001)(199003)(189002)(9170700003)(50226002)(81156014)(81166006)(8936002)(53936002)(38730400002)(575784001)(86362001)(23676002)(105606002)(8656002)(356003)(2950100002)(189998001)(6666003)(8676002)(50466002)(5820100001)(54906002)(4326008)(47776003)(33646002)(104016004)(1076002)(76176999)(106466001)(2870700001)(2906002)(36756003)(77096006)(50986999)(498600001)(5660300001)(85426001)(305945005);DIR:OUT;SFP:1101;SCL:1;SRVR:BN3PR0301MB1187;H:tx30smr01.am.freescale.net;FPR:;SPF:Fail;MLV:ovrnspm;A:1;MX:1;PTR:InfoDomainNonexistent;LANG:en; X-Microsoft-Exchange-Diagnostics: 1;BN1AFFO11FD020;1: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 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 8b080b20-7d7c-45c7-6ee1-08d4b6f03756 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001)(201703131430075)(201703131517081);SRVR:BN3PR0301MB1187; X-Microsoft-Exchange-Diagnostics: 1;BN3PR0301MB1187;3:9p8TIndjDAn4ukxdEO4FV4xkbUtg650DDDrQaxGIrA5FSlwuFcVaR6i6bgMH25QYumaBom5vydfnU+k9dmSDai/xkzY3xs5FoxBVPOfofy5XljiqRswtaAFT19E7eKXRhGhnw1VkZzOdGNo/+9HRzUxkKynGADhzlhmpbhz75DWif8ZPCXpewq6tqIMprRuouUePIz7q6j212Sanha2nq4Hj06Q38A0Jz6+xHHqxpO5fPXNgeP8XZN2ZD+gslxKhOou3YO2ihWGvTkA4VK4FQoUo+k67BBbdq2GgrnllWBPotyLqZj1PBvaGMTBZBaGESsLcJQHayyLMMBxjitrDZ+nWn27FstQIcKXVQvANUNSQkybt+bK8JSBiEg2ZpZFQOQuWXoGUAFj8J8KTttiQw2lmZOc+TXeJUo9dF5Bsflggm/k543d0B9l7f9FmgW4L;25:jBsWC3gSIEcoNpTF2ukIn7FEZFWfLcUsDFw80sCV5qSqGVBb+tELS0J0NEesJOJu34BwkyaBTWNPrViRL8oqFIRdzgvBy0yAvzZWKspSETzzXuuqvw2sYPI+yL5UPblE1UHybKjc/wfHcmcIIHKGyHQLVYgzKfioYB2ixfJmSum4tHFZuVa24qtYS980FQRIoSXRVXHSjDo/Hc7Llxz9qfutV21C4uBsgu8bwdB8NdFwR08J41cFaCytfkIvGXrGBt8XKKikxdKCYmtkdOYQ33VBdA8T/5fcHx+K3PvJsF9QwagaC2bL2pNekImJggaGT+eHvr5SpTl6DyKWrt/QThFRcuHMkAIIkPkix9uyGiprDA2oRj4Sav86IPmYuQQSF+hfqN80fEG6laHxYg31p7tg+bP60oT987s1YnT4RjpDORJeCxrNA+X00DvqqXH3OfUxF99ryssSZF9rhQsjlwx0S31RMKzBATQdPHJv3Mo= X-MS-TrafficTypeDiagnostic: BN3PR0301MB1187: X-Microsoft-Exchange-Diagnostics: 1;BN3PR0301MB1187;31:Y5VqxRN6CcoeyxGxxwB7BHYqNSbkf0IBZKd0BXIr/kdepI6lBatXv3YPjeLMiPtm9xVEZjnxYKEKKbergfbBo7H6awahWg38jFo/65SNAzfaMSXBZtIaiyAbNLHf5kSg8NH91Y72BFTRbYSd+nB/pHcaXA/z5NmhKK266l/PSm4TCHYIyPxykJkuiXwYgCx8+xKR/Poo97opGenW0808iTUBomDqUzSAEFO8zRc3iLSeIzJbm5wukdbkhQnoQA8ja3wxnc/mTf2XhnGf3kPhqw== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(185117386973197); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(601004)(2401047)(13018025)(8121501046)(5005006)(13016025)(93006095)(93001095)(100000703101)(100105400095)(10201501046)(3002001)(6055026)(6096035)(201703131430075)(201703131448075)(201703131433075)(201703161259150)(201703151042153)(20161123565025)(20161123561025)(20161123563025)(20161123556025)(20161123559100)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:BN3PR0301MB1187;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:BN3PR0301MB1187; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjNQUjAzMDFNQjExODc7NDpJczNXR2pmUHlaMVB3bFBrQ3VnVEdnWWhq?= =?utf-8?B?cy9tMGJHb09iaEQwMzhMVzdpajVDUm5nSmpMOWxTM0htaWxjckZKZDcxSHg0?= =?utf-8?B?QlVPelllMXBTWDdjYVl0NTBoM050TDB3R2ZPcDFzVWZjbHh4N2dZak83WkMv?= =?utf-8?B?aUpXV2lMbElHTSs2MGhlbDBlV2N6aFAwd2h1b2xzNUVkdEtoQjdHQ2E2eDJV?= =?utf-8?B?VWNLRE1FS2xveEovMEJ3ZFVBRXUwVHczK09ZbGJNQWN3bnpNYUFNRlVJR0o1?= =?utf-8?B?YzNBRU82UmRqZjdTcXVsZkMyL2hUR2xXcmFNVzRkb01IdGdORVlRdEN1RGlt?= =?utf-8?B?YmUwcmM1OWkvYjhSV09TZjBrNlY3TFBpbGxYckJWdis5R1hySHp1RVl0U2lu?= =?utf-8?B?VnRMMmErRVBsZWMrbVpBemxIT0EvYWZhUXB3QW0xZGpOZElOL3ZSTGNLd3Q4?= =?utf-8?B?d1NMS3pWbzE3RFpsOURYVHV4Y05RelJTaURNbHJsNmhqTHVSRzM4UFZtRFJz?= =?utf-8?B?NGlCbXZrTDVLQkVYOUZhM0xPTkxrUHRNSWhQN1NsaERIOWdpUU4zTHo2SlJq?= =?utf-8?B?clI4TldiRXNleG1xdEFuZmFGNzU2UkhpU2VIYngwdEY1Ky9LYkpKWm8ySnVQ?= =?utf-8?B?VkUvSWZURDFPL1NpTmJCdkl3anlrU1JPSDZVcG1iclgwN3JtNlUzK1NGa2RN?= =?utf-8?B?WmI5OHVEM2grNjlTNm81aVlBTnpMKzVDQ2hwRUtnR3l6Z0dEU3o1OUxqeTRR?= =?utf-8?B?cEhjVDJQeVp3eGYxRWJlWVlTZzNCZUdCWUhsRXkxWnhyZFhZV28zMUU1M1Rw?= =?utf-8?B?b1hJdXk2TjFMbEE0cm1lbVV2K3l2cHNqVVB5c0RmaDhuWmxlS3d2UHl5WnVK?= =?utf-8?B?NGgwblhka0FpeVk4cUNIQ2Y1NUd2eTRaU0F1MFdzZDZpa2V5RVE1ZVVjaTVX?= =?utf-8?B?MnpWKzE4a2JEc3FvYlpmQVlrSzA3VEFYcUEvV3cyUHZsbDlRRUs3Yi9GbEJN?= =?utf-8?B?WmNBUENVWHBMYVVNdUlNWVZ5c2cwWDZ1M2Fra0tSK0N5dFRhbXFubmx0Qk5o?= =?utf-8?B?enJXWWhTU1VBWnhzWTFucjFzTW1ncUZpbWNJYzMrcU96bzQ2WGdlVHgyMUl2?= =?utf-8?B?S0lsbThKd0FDeW9zY0JWMEtrbGdncE9jQ3N0Mm5rU3hJeTFhdjhUWU1pSTJr?= =?utf-8?B?dk5MMmpPbjNXZmQ1b1llUnlmdUV1L08xa3YvNS9QVlZzZnRSK2VJU0EyeGhG?= =?utf-8?B?MDhZZXNFVWlUWFJnZTNieE1kanRQVnBxOG9WRERlWWFPMkdmOGVVNVMyL1pn?= =?utf-8?B?czBrbS8wR0wrZ3BoWEQwSUlXek1NRjV4ZmVqMDl4T1kwWERuTXBHSVZoc0pY?= =?utf-8?B?NW9OK1drVUdvdk5xcE5meDlvd2pBSVRwU2ZNYTh4ZHJVd2xrUWFuRGlRNjNz?= =?utf-8?B?Z2lkQVFJVWJUZFNTV1JqRDd2cnVmcHM2QTRRTjBFUE9rSFVBQ21aL0ZlZ1Ew?= =?utf-8?B?SjB3K1RUb0c1ZTVYb1pPazQwYlNVenNISlNyWG5adWFDbEFQR1NpSUtBOVUv?= =?utf-8?B?RjRBTnkwQ1RWOUU5cWp1aExzTXZ4bHU4eHhjYStKSTYrL3ZrUHpwR2ZzVHVG?= =?utf-8?B?VDZrVGlIQWZBQ1kyTVo5bUlSd3V6NU4yOGNDVmhJK0JyQkswVkNCSTdsWlJG?= =?utf-8?Q?T3XyXpxZ5WPhSw2NhoMrp482PgR9JwW5GkN8qheJ?= X-Forefront-PRVS: 0343AC1D30 X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjNQUjAzMDFNQjExODc7MjM6OThCWFNYVzdGWmY3eE5OTXdjSVE5ZTdu?= =?utf-8?B?eDZmRFVkc1dqL3REakxBV3FrWmpINlBDTGVzbVc0WHpXdTd2dFBHUG9JUzV0?= =?utf-8?B?aDV5L3prb0FiRXR4aHp6NEtiQTBQYjBzYVgreVZoYnRjSXc2bHd2Q1JveUtX?= =?utf-8?B?MDBlOFhRUzBxSlQ1Q2I0U2tRL3ljR1FFRy9HZGFZSlY5bDJHdlptckNxcWFL?= =?utf-8?B?UE92UjltMjJQSmdFSDBlRzRxRFBUa0Q3Y2FtSGU1MnRiZTBlWnc2cyt1c2ZH?= =?utf-8?B?TEFiOGlFaTN6ci9UWENHODJ2OFRKTFp4a3J3Y2krSlNrZlQrejBXbWhOVVFw?= =?utf-8?B?U1hiQnVxK2h5Si9YRC9nR3BBMVl6VDFqNld4bWlQaHpyUUNNZ3BMbzJic0J3?= =?utf-8?B?Nk5HQitYSkJ1V0szdlNRMFRpMlZkWFB0UExrTldKSCtoL3BsY3NzcVg2UE5v?= =?utf-8?B?RjdLTjlOYko3QktxamhaeHdieXR0dmZ6WXVqM3FDRFZWWTgyMGpvSUdpTjMy?= =?utf-8?B?MzlrRDUxUHVkK1pHRjhmWHRkVHhZSWNJRnlPUFgrMi9xUDkrREozQjZlYmFS?= =?utf-8?B?L3RhMnFlSEpKUTBpeVBaOExtSTZ6WmRPdzlGU3V4cVFhbEV1Y2MyMkR3d3Ax?= =?utf-8?B?T0k2UDhlTzluWnpXVmFrM2MzSjBnbmxLYXhMbmRFRnhPbmxHdzVxM0FZTVYv?= =?utf-8?B?OXllUzRzM1BKNGtkcXBydmVWVGwxZ2NyODRvdXdNS2ZxKzRQWXE1TjRWcWl2?= =?utf-8?B?U1UzVkoxMGVGYzZsYjZPNmhjdU9lTkk4TzdSa2wvTGdnd0ljcysyY3g4TDkr?= =?utf-8?B?SUV5N0Nrd1Y2Um0wa1JKb1BRR0gvTFRJQ2R3Ym9UUWpxYmVlTk5Ub0tSbUJ3?= =?utf-8?B?em9sTU9nL3VQZUNJZjVMQTQzdTZqL00yU3NKblZJNU5DRGhacEgrNE1NTGx6?= =?utf-8?B?czMxbjZtRmNreU9rRUJ6SndIc0VGOXZQd3R5bDBjamNXemRWQS9IbDR3S3A4?= =?utf-8?B?Uk80dDFhTm1MUkNQbDdpaFVncDc3bnpOZEdwZHlyL3dCejIzZUg5TmFpMEk3?= =?utf-8?B?WjYrK3EveUFNWjRCRS8ycTlWUXVvdWt0c3dMUWVJam5PYUFTQ1J5YkEzcUpj?= =?utf-8?B?cmpxckVNNCtFOFhiNWNadnZQTDRac0NiN29ERy9hTEkxSnNnNjFQYUIwOU9W?= =?utf-8?B?OGFaNjV5aTA1Y1VIU3B4NTcxQ2M0TGRJbkZKVkROZGM2alZPNWRyaFFQT2xT?= =?utf-8?B?QXhnQnZralFJcnB2UWRNTFZHWTRPeExSblJTUnRyTE81RjgwdDBpUkc0LzRh?= =?utf-8?B?RFE5RjB2ZDZJcmJxekZUelZJRnA4Rk8wSzhXVDZHcml2SkNaSTZybk9pQ2hD?= =?utf-8?B?cHJZR28zUE9PTUxySldnUi9YWVRkcHRwTUNkdE5MZWZla1RWWHhBOERpalds?= =?utf-8?B?MEJoOHVya05tRWdneWhYVTM1RDNya2dZdFNoa0pDVUNtSkt3dko2YzlTeXlq?= =?utf-8?B?MmpqN0p5cVMwT0pvZXgwTlFXVTlNb1dWVG9zYUpiMGF5Y3R2S2ZyZVpWdzJ1?= =?utf-8?B?dkdwMVE3TXg5RDZncm05eWk3WWVSd2JkczFSZSs0cncyVmRiOVZyYTg5cE1X?= =?utf-8?B?Q2hFUzhXQWIrUzk1Y0NWblgzdEtmRVZObmVZS1c2NVdnQmJuQm9UeFdhY2xy?= =?utf-8?Q?8T8OVBLMk/IvOhiSE+siFXUvKNiwEMTG4RHyXjRki?= X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTjNQUjAzMDFNQjExODc7NjpDUjJTK1doUDY4cXN6R2I0eWQvWm51VEZ6?= =?utf-8?B?bElQRWF0NVQxZFhobnh0WGhqWGVVUlRMMlpndnNqQ2tMcmp4Yk9NWDdlQzZN?= =?utf-8?B?QlhjbkVER0pURUFzcEhQcVhzbVRGSk1hT3RYOWNTb20wNW1PYnRrWkRhKzAw?= =?utf-8?B?ajQ5QWtldVNKSWU5VXNDR3E5WGUwM3diblM4TjJPRzEzcEVpMWVzUzhvMlp3?= =?utf-8?B?M3EvUzROamJ5dTNjOWhQbmkxV0dmWVZOVkFycStOci9oYnVLSjNEZ3JRYkJY?= =?utf-8?B?Y0FIUzhjT3NIejRURmdSVG1Tek5ORWVUTVc1L2VwZzB1UUtkU3dITGhyKzE1?= =?utf-8?B?NExvbDhHNEpCY2RWbDlvOWs3K3pDeWJOZmJ0b0p6THdmaU9KdzlnOExrVTdr?= =?utf-8?B?WTRoMzlqMzg1ZWFJQnRyb3VrK2p0M2I5dTdEdXBaR0t2azhiSCs0ZXBCbUkz?= =?utf-8?B?M1FQZFBYMmdmYkZDY1grV0FSQ0pYTmZkVUVweTZkeVNHcjhVaHU2NzEwL24w?= =?utf-8?B?dldNZm5VdVUwTS95SEFOdFpRZVZNZkwxWVNqUndtampmY3Z3cEp5OWREMjVm?= =?utf-8?B?aEg4R2dUMngxOTczcS9BdTBwbll5d0ZpeUxFQTJ2ZkIwbU51dkhxZERVYzZo?= =?utf-8?B?UU9KSkpYQVNURnc2Z1BMbTFrd3NVaS9UalhJUHFaejFJYWF5dlp1Uk5FR0pL?= =?utf-8?B?YkhKK0JUaE5PcU9QWGQ3REVDN3ZSU01kNHI2ZndjeUFXZWVYTG9FTkk3SnZl?= =?utf-8?B?WVE5R2lEOU5wM0VwRVJXdXVnUEYwajljWUpOSjF1Q2o3WXUyb0JVN1ErcnZE?= =?utf-8?B?Mk9wTmROeDNjbFpxa2EzNjNOSC8valpOU1RDdndQdW5JaFhUdk1ieERIOWQr?= =?utf-8?B?TThpK1VSVkVaWklDNVNMVkVmK1VqQUlSSFBMQ2JBelZQUm5qejBZbFVRMmg5?= =?utf-8?B?dXo3NHZBYnZDV0g4ZE9WcXl0NzVieVVCMXpkYy9OOVZ0SXVhUmRsTE1VcXAy?= =?utf-8?B?R0tmc1IzZ3ZKL3JOcVkxUzJSYmpDcDIvQnlETGVwellORVhUaEJzVEFXVGVO?= =?utf-8?B?ZHJIdXQ2aVR0NlRyQ3IwN2xMNGFFU0tGQlA2aDRTbWZrNkhHRjJHQ3dRY0RY?= =?utf-8?B?TE4vVnMxUE53RzFoK2p0cUtBeE5WNFk3M2U2QUo0dDhSQUdVdFNOajQrZG5W?= =?utf-8?B?aTZGU0o5dDBOTkU5c0ppNkdDNEg1NDI5NzJ5RmJqQ25FSzZ5WjhkelVaNDln?= =?utf-8?B?ek9CdEZlb1A2TXpXVTRMUHVackRZTkg1Qm5aNVBtNVNmZHJ1ZGd5aU1oM0dy?= =?utf-8?Q?wRuyepLpebEBVOzl82cWUCR9CnVu/acfg=3D?= X-Microsoft-Exchange-Diagnostics: 1;BN3PR0301MB1187;5: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;24:QfcD0ErZmooYWu5UFHX9FqxYqSwxHwSf/4+SuUzukAzAVHww8lTj2yZCuPc3ixtVYXgYOnnxVoY5X2WxW2nYkpqvHKhZ5v50axScKya8wLY= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;BN3PR0301MB1187;7:0Djo1yHX1pvuFs3u0TRFgfoqnnpYj41MFjGCp6GhlECdtE5bW2aLpOthXnn7jREa9BX31BbRFiWiHlspJiZaqzL8AX3WF4d3wAtvUAlKSZE0KY2HIjZImoYlH1fHvACq4Npf38ut5Y0YeS4blgyFz7FEmcQdYN25XDu0u+wIkpi5lNaER6VNC/2/0z8CSV7LR82CCAlZ8moyRULDGLJoCqLaCw3fumzsNXWw1rdBOfEcSvvKNTnlrSv63I4hG25/1PXXwmLKb+p3LGwJH6859I3qHwMKP3kIJ98afByb6dG8aFL2zeZlx2lhgmW6VNsPJ1c006MOCvc1nBngLAwf4ZPEAIxN9ovesh9HAwAsmsJS8OZLqOB1wm5yrCH9u9plwtfUi4DPqqHMvIZxI2/I2aMGjtC5eITZbMw+VhDUCl1bCLTZDGzo3nU+fhtNYLgp6o+1jMDjFe7uJrl5GRUYRw6P1ph0QXMhUqlgShz0ffXov2lmRlH8w7keJVQMKga7fZ0X9zwWa9JkdWQX6JaGyfQ1HXhBkYPZyic/2aNKrCRMBuy39i6xQA0Me3kSaCG4fLYZPIzw+B76oh3r5vK+a+FCxSx3cBskKVd+itPK+8TbeP60+jNE22CDLikGF3Igchc29hsLyBIaAVR/Jg2ULrToiwNFIEHAgnKd+9hc6KIOdSqlK71moiJhibcqU/UsX0VeBbv+1WeepFoLCMN2CsAMyY8qLpkgU1qQW7NCPLDZhVwFYqlC/deswnaZ+HkjHQ+FIgKP5MWngLdDP/goQPXxyU42l+Mfz6JALnN0PG8= X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Jun 2017 08:50:20.0404 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e;Ip=[192.88.168.50];Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR0301MB1187 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 9186 Lines: 183 This is the 2nd part of fixing the usage of GFP_KERNEL for memory allocations, taking care off all the places that haven't caused a real problem / failure. Again, the issue being fixed is that GFP_KERNEL should be used only when MAY_SLEEP flag is set, i.e. MAY_BACKLOG flag usage is orthogonal. Signed-off-by: Horia Geantă --- drivers/crypto/caam/caamalg.c | 7 +++---- drivers/crypto/caam/caamalg_qi.c | 10 ++++------ drivers/crypto/caam/caamhash.c | 32 ++++++++++++++++---------------- drivers/crypto/caam/caampkc.c | 4 ++-- 4 files changed, 25 insertions(+), 28 deletions(-) diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam/caamalg.c index 4ecf92e3b404..fde399c88779 100644 --- a/drivers/crypto/caam/caamalg.c +++ b/drivers/crypto/caam/caamalg.c @@ -1187,8 +1187,8 @@ static struct aead_edesc *aead_edesc_alloc(struct aead_request *req, struct crypto_aead *aead = crypto_aead_reqtfm(req); struct caam_ctx *ctx = crypto_aead_ctx(aead); struct device *jrdev = ctx->jrdev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? GFP_KERNEL : GFP_ATOMIC; + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? + GFP_KERNEL : GFP_ATOMIC; int src_nents, mapped_src_nents, dst_nents = 0, mapped_dst_nents = 0; struct aead_edesc *edesc; int sec4_sg_index, sec4_sg_len, sec4_sg_bytes; @@ -1680,8 +1680,7 @@ static struct ablkcipher_edesc *ablkcipher_giv_edesc_alloc( struct crypto_ablkcipher *ablkcipher = crypto_ablkcipher_reqtfm(req); struct caam_ctx *ctx = crypto_ablkcipher_ctx(ablkcipher); struct device *jrdev = ctx->jrdev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? GFP_KERNEL : GFP_ATOMIC; int src_nents, mapped_src_nents, dst_nents, mapped_dst_nents; struct ablkcipher_edesc *edesc; diff --git a/drivers/crypto/caam/caamalg_qi.c b/drivers/crypto/caam/caamalg_qi.c index ea0e5b8b9171..78c4c0485c58 100644 --- a/drivers/crypto/caam/caamalg_qi.c +++ b/drivers/crypto/caam/caamalg_qi.c @@ -555,8 +555,8 @@ static struct aead_edesc *aead_edesc_alloc(struct aead_request *req, struct caam_aead_alg *alg = container_of(crypto_aead_alg(aead), typeof(*alg), aead); struct device *qidev = ctx->qidev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? GFP_KERNEL : GFP_ATOMIC; + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? + GFP_KERNEL : GFP_ATOMIC; int src_nents, mapped_src_nents, dst_nents = 0, mapped_dst_nents = 0; struct aead_edesc *edesc; dma_addr_t qm_sg_dma, iv_dma = 0; @@ -808,8 +808,7 @@ static struct ablkcipher_edesc *ablkcipher_edesc_alloc(struct ablkcipher_request struct crypto_ablkcipher *ablkcipher = crypto_ablkcipher_reqtfm(req); struct caam_ctx *ctx = crypto_ablkcipher_ctx(ablkcipher); struct device *qidev = ctx->qidev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? GFP_KERNEL : GFP_ATOMIC; int src_nents, mapped_src_nents, dst_nents = 0, mapped_dst_nents = 0; struct ablkcipher_edesc *edesc; @@ -953,8 +952,7 @@ static struct ablkcipher_edesc *ablkcipher_giv_edesc_alloc( struct crypto_ablkcipher *ablkcipher = crypto_ablkcipher_reqtfm(req); struct caam_ctx *ctx = crypto_ablkcipher_ctx(ablkcipher); struct device *qidev = ctx->qidev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? GFP_KERNEL : GFP_ATOMIC; int src_nents, mapped_src_nents, dst_nents, mapped_dst_nents; struct ablkcipher_edesc *edesc; diff --git a/drivers/crypto/caam/caamhash.c b/drivers/crypto/caam/caamhash.c index da4f94eab3da..7c44c90ad593 100644 --- a/drivers/crypto/caam/caamhash.c +++ b/drivers/crypto/caam/caamhash.c @@ -719,8 +719,8 @@ static int ahash_update_ctx(struct ahash_request *req) struct caam_hash_ctx *ctx = crypto_ahash_ctx(ahash); struct caam_hash_state *state = ahash_request_ctx(req); struct device *jrdev = ctx->jrdev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? GFP_KERNEL : GFP_ATOMIC; + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? + GFP_KERNEL : GFP_ATOMIC; u8 *buf = current_buf(state); int *buflen = current_buflen(state); u8 *next_buf = alt_buf(state); @@ -849,8 +849,8 @@ static int ahash_final_ctx(struct ahash_request *req) struct caam_hash_ctx *ctx = crypto_ahash_ctx(ahash); struct caam_hash_state *state = ahash_request_ctx(req); struct device *jrdev = ctx->jrdev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? GFP_KERNEL : GFP_ATOMIC; + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? + GFP_KERNEL : GFP_ATOMIC; int buflen = *current_buflen(state); u32 *desc; int sec4_sg_bytes, sec4_sg_src_index; @@ -926,8 +926,8 @@ static int ahash_finup_ctx(struct ahash_request *req) struct caam_hash_ctx *ctx = crypto_ahash_ctx(ahash); struct caam_hash_state *state = ahash_request_ctx(req); struct device *jrdev = ctx->jrdev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? GFP_KERNEL : GFP_ATOMIC; + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? + GFP_KERNEL : GFP_ATOMIC; int buflen = *current_buflen(state); u32 *desc; int sec4_sg_src_index; @@ -1013,8 +1013,8 @@ static int ahash_digest(struct ahash_request *req) struct caam_hash_ctx *ctx = crypto_ahash_ctx(ahash); struct caam_hash_state *state = ahash_request_ctx(req); struct device *jrdev = ctx->jrdev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? GFP_KERNEL : GFP_ATOMIC; + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? + GFP_KERNEL : GFP_ATOMIC; u32 *desc; int digestsize = crypto_ahash_digestsize(ahash); int src_nents, mapped_nents; @@ -1093,8 +1093,8 @@ static int ahash_final_no_ctx(struct ahash_request *req) struct caam_hash_ctx *ctx = crypto_ahash_ctx(ahash); struct caam_hash_state *state = ahash_request_ctx(req); struct device *jrdev = ctx->jrdev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? GFP_KERNEL : GFP_ATOMIC; + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? + GFP_KERNEL : GFP_ATOMIC; u8 *buf = current_buf(state); int buflen = *current_buflen(state); u32 *desc; @@ -1154,8 +1154,8 @@ static int ahash_update_no_ctx(struct ahash_request *req) struct caam_hash_ctx *ctx = crypto_ahash_ctx(ahash); struct caam_hash_state *state = ahash_request_ctx(req); struct device *jrdev = ctx->jrdev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? GFP_KERNEL : GFP_ATOMIC; + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? + GFP_KERNEL : GFP_ATOMIC; u8 *buf = current_buf(state); int *buflen = current_buflen(state); u8 *next_buf = alt_buf(state); @@ -1280,8 +1280,8 @@ static int ahash_finup_no_ctx(struct ahash_request *req) struct caam_hash_ctx *ctx = crypto_ahash_ctx(ahash); struct caam_hash_state *state = ahash_request_ctx(req); struct device *jrdev = ctx->jrdev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? GFP_KERNEL : GFP_ATOMIC; + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? + GFP_KERNEL : GFP_ATOMIC; int buflen = *current_buflen(state); u32 *desc; int sec4_sg_bytes, sec4_sg_src_index, src_nents, mapped_nents; @@ -1370,8 +1370,8 @@ static int ahash_update_first(struct ahash_request *req) struct caam_hash_ctx *ctx = crypto_ahash_ctx(ahash); struct caam_hash_state *state = ahash_request_ctx(req); struct device *jrdev = ctx->jrdev; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? GFP_KERNEL : GFP_ATOMIC; + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? + GFP_KERNEL : GFP_ATOMIC; u8 *next_buf = alt_buf(state); int *next_buflen = alt_buflen(state); int to_hash; diff --git a/drivers/crypto/caam/caampkc.c b/drivers/crypto/caam/caampkc.c index 9c508ba6b0f1..7a897209f181 100644 --- a/drivers/crypto/caam/caampkc.c +++ b/drivers/crypto/caam/caampkc.c @@ -173,8 +173,8 @@ static struct rsa_edesc *rsa_edesc_alloc(struct akcipher_request *req, struct caam_rsa_ctx *ctx = akcipher_tfm_ctx(tfm); struct device *dev = ctx->dev; struct rsa_edesc *edesc; - gfp_t flags = (req->base.flags & (CRYPTO_TFM_REQ_MAY_BACKLOG | - CRYPTO_TFM_REQ_MAY_SLEEP)) ? GFP_KERNEL : GFP_ATOMIC; + gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ? + GFP_KERNEL : GFP_ATOMIC; int sgc; int sec4_sg_index, sec4_sg_len = 0, sec4_sg_bytes; int src_nents, dst_nents; -- 2.12.0.264.gd6db3f216544