Received: by 2002:a05:7412:3b8b:b0:fc:a2b0:25d7 with SMTP id nd11csp2583672rdb; Mon, 12 Feb 2024 09:16:25 -0800 (PST) X-Google-Smtp-Source: AGHT+IGLUPNmB7uHp9y+M3D5UDwD8rEMyCrUbG06W1Dpxlk8f1n9ij9UvOULHCUtiG7VbGeENNat X-Received: by 2002:a05:622a:188a:b0:42c:7deb:b6e2 with SMTP id v10-20020a05622a188a00b0042c7debb6e2mr2625902qtc.9.1707758185289; Mon, 12 Feb 2024 09:16:25 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707758185; cv=pass; d=google.com; s=arc-20160816; b=jDgudcuoc0yEfcYA0TJQJbck9Qd7dKoJrQ33E6oyoeScNxXVQ9RKWhggLTBXThv558 nzEfUdt72+fDxuI2FJtV1D0S47G5iCCULQpYZwGHWSSpm8V/vb6ce8M1A6LPv7KkGbWY oRt1ufhpOtOjOVWNipqjebEe+6g/Vk/Iwraw+c/zQ09ZzA5krODkpKX0HBYCN4948W7x DBIbSlH2ZyxSGqpUWVi4ULaB37ey/F4nIpAwaPFGcrY/or/MkRJ/UTWXncvVdaSMXUIx 9bjaNCspyVHrB+m5EdYHvD0LM7rm0MGzFVEIJTB07jlQXMqUJNSA546A2DEQQRAAjMg+ rvuQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:organization:autocrypt :references:cc:to:content-language:subject:reply-to:from:user-agent :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :date:message-id:dkim-signature; bh=TCXHNKWb/+6WoCF9TfRpEBDgQbEjGvXi9Ab6Kdl3ZDQ=; fh=W7ldWLdl3PzY0dsI1F/oEkbmKZHYvYT0YedIWBqoJpo=; b=pywwVpY9bY0KhJElpyAfg/5EppWBU5H5vbflXpX0dd4gAeotPfCY38Ue0LgUwSjFg9 oKcnDxf/hekKWeFFEhppFID7L3HhnrbTPCWs8vvtAdpIHVhE6clFxZM53dZLGUzFpLvh Rw5N5ZkMm0uC2592PuVdogtnIfwxX394S+83050/NPh1yiNxlkuP70cJ+JhGATOTT8hv HM6ltcNKi2urMsmm1l1HEIjz/jv5HhanWS38/NbmxBrBsss4/OUQjLHmHcTAw0wa10e/ ye9HBZIlcvvzk2gfAy1FAhqZuLQlt7KssZQWQIQLVuGpnp51H4WdZtZK8aawgv8luMQm tBTQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=l3gw3I34; arc=pass (i=1 spf=pass spfdomain=linaro.org dkim=pass dkdomain=linaro.org dmarc=pass fromdomain=linaro.org); spf=pass (google.com: domain of linux-kernel+bounces-62075-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-62075-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org X-Forwarded-Encrypted: i=2; AJvYcCVp/TBvVs/neElg16yDJPRFjKS94YWPjAcc2IjlZ92O5zV/nvIdeQ/E4UDMjrg4s9w8VOvPq3JKn/N7ZErf8qgf0Q1Djg3AIwPuh3WWOA== Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id n26-20020ac8675a000000b0042c8b9d719esi751198qtp.369.2024.02.12.09.16.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 12 Feb 2024 09:16:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-62075-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=l3gw3I34; arc=pass (i=1 spf=pass spfdomain=linaro.org dkim=pass dkdomain=linaro.org dmarc=pass fromdomain=linaro.org); spf=pass (google.com: domain of linux-kernel+bounces-62075-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-62075-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id AEA4F1C228CD for ; Mon, 12 Feb 2024 17:16:23 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 601F73D984; Mon, 12 Feb 2024 17:15:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="l3gw3I34" Received: from mail-wr1-f54.google.com (mail-wr1-f54.google.com [209.85.221.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 65C423FE2B for ; Mon, 12 Feb 2024 17:15:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.54 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707758148; cv=none; b=GRLQn4d/kmDmFY5lBpIS6weYPLIwITEdTY6W1NAMbmk2aQGTOSvV7hjhwcJs43m8F6TOTX9bG2XBjLRlvdUz6VVyDeIyC4HatSpFja0pBMgEBMti+/elWTqrEkNMasoYetH+8Lp+o30QSzXp4RoCWwjp4FuPM/uk9OIWKvU09Oo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707758148; c=relaxed/simple; bh=eJxT5RVj55SZTquxPtiS0BzpdsApr0VOzPCbOysOtiA=; h=Message-ID:Date:MIME-Version:From:Subject:To:Cc:References: In-Reply-To:Content-Type; b=rhbNWLb0X7OwIyZQ0s7kyRSQAr7LCcvBR4+42KoBL3BFT0K+O0pbr+60+lBK/9dKz3zhjUwcgVbnPT8AU5CvCU5KL1HwEZ1yR1rOSQ3Bgzp8vP2WgqbRkwa0b7a+ea11dZizDwC3ZCq1SAto/qhKcbw0TvTq7ToHIHtlM0OdwH4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linaro.org; spf=pass smtp.mailfrom=linaro.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b=l3gw3I34; arc=none smtp.client-ip=209.85.221.54 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linaro.org Received: by mail-wr1-f54.google.com with SMTP id ffacd0b85a97d-337d05b8942so2901838f8f.3 for ; Mon, 12 Feb 2024 09:15:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1707758144; x=1708362944; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:organization:autocrypt :references:cc:to:content-language:subject:reply-to:from:user-agent :mime-version:date:message-id:from:to:cc:subject:date:message-id :reply-to; bh=TCXHNKWb/+6WoCF9TfRpEBDgQbEjGvXi9Ab6Kdl3ZDQ=; b=l3gw3I34cJPh87oSXzKNY3xtPWj2Z7miLkmoBBug3Uoo9GQ4RZFzI+Zz1ogksXAqzu RFS+ol9s656ATGeCa/6riMhZkL2H/5ka+NmVJVrUtS4rroS6Yy0ryf1dGiqQYRY2x/dl /SbjzGgmtJlh5Xu1I5auJkgE1WfNUN+80E4aGhWZDwzfw5XEElylabOXl2UjFrTDocUs HmAqpSQCEu++J0JV6LuRKmpwi5urlMlWv1fJVy7Kl8pxV97RyaYadgae5e2pYz1YQd8C J83R/a79xTEEtqfYwNq+A++nqaXngIl9TvuL8xjX0g5PjwQYoPLqJ2jKVqXRORzR/IAf LRLw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1707758144; x=1708362944; h=content-transfer-encoding:in-reply-to:organization:autocrypt :references:cc:to:content-language:subject:reply-to:from:user-agent :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject :date:message-id:reply-to; bh=TCXHNKWb/+6WoCF9TfRpEBDgQbEjGvXi9Ab6Kdl3ZDQ=; b=MmlrgQjakS5e0twhUfJAG71XIhhQChJtRSLNzrbb03seZ3iBIkTvbDifZPwT5CHdlY 6byTvutpaDzNDinrmam7WE4XiVvkIX+ETDqC8sYaqHxYJI+lHFGx6/cA7IXVo5ueBcut 5ax4v8WmupYq5H1HaIIC/KnMjWiUbG6lNqZ1H34EolzyX2KZgnGcRIu9PWdYXw78JjOk xsSL99cIifokpTz1yDM8abbsCgp2QMWx9s2NSiTwI3xrLARtYmrd1Tx188/XHKyzNjn8 8oE1DzHHe0FjM3g6rPXMiqq8dh+WCXIu4R7ZlwHKTh6BYhW1jOk/GbhJelcR7jp+DCzf gQsQ== X-Gm-Message-State: AOJu0YxNV2HJreFe1EaGV+auxWHYruTZOMapJKeo2pnXsBMM5xmBR7QE lcTOYpV10HmpMkm8kceaiLPwu16MqXIC/mYqLHkj/dOV+bI5yXydn9saganOxlTN4OS2t+dodv8 oB5tcKw== X-Received: by 2002:a5d:69ce:0:b0:33b:7134:a3b0 with SMTP id s14-20020a5d69ce000000b0033b7134a3b0mr4505799wrw.13.1707758144612; Mon, 12 Feb 2024 09:15:44 -0800 (PST) X-Forwarded-Encrypted: i=1; AJvYcCW6Zt5xGHtn0aO0cbHV0aGF7RNvEVbzEGaAXJX2mSHAmtpL9hz+vYfmtFNGqStaC22mv44bRhjSbpubmpfEiwscyp+W0HRi+WuwjTT/6aIBB93yZ5bMowJx8fcGSRA0GpHRiQtc4c08Kcw7iaZa3dkdD9H2q7yqy5YM3/kAEekeWtWDAZYv5Mi8EiOfni97ZiHcXbiGYWUlRfy4AQTOxDplW+FWknAK9+iOGtudd9+QD/RCgHdjFyZGT1yr70wL9cNtNz5nLXyXqx9C7gGU9C0HszM7fKQJ85nV6lydm9YAGKZE0QfcbXbA5AYkOOFwb2ZMZCEUl0xsgqyQrL9ReE8F3ERezd2JdTcQb49LeoV9wyWitrifkruKzfZLzLykebYmF1kvIUwq4vtbrmTzHQO55VfHqn/Si9d6iiVf8vTHrIsgkF6iVMKJGq9o/PBgq9sh4wdYn9Si0LIc2t3peHgjyjhlPzlDwGDqKGqKVfl2jEzp42Cc4B8fLTxuekT52VDeO1Gc+UAHcRnDuskNaSsqFqjl4MAkPXFcuzH0RHWdAx0793JpK7QOGf2zCQfZhPdze19pBPfMsBOmpRf9hCLWQbGrCNrC84bl Received: from ?IPV6:2a01:e0a:982:cbb0:fcee:f026:296d:135f? ([2a01:e0a:982:cbb0:fcee:f026:296d:135f]) by smtp.gmail.com with ESMTPSA id e9-20020a056000120900b0033ae54cdd97sm7275866wrx.100.2024.02.12.09.15.42 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 12 Feb 2024 09:15:43 -0800 (PST) Message-ID: <92397728-d763-402d-b3e6-f4edd6f71740@linaro.org> Date: Mon, 12 Feb 2024 18:15:42 +0100 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird From: neil.armstrong@linaro.org Reply-To: neil.armstrong@linaro.org Subject: Re: [PATCH v4 10/20] drivers: crypto: meson: avoid kzalloc in engine thread Content-Language: en-US, fr To: Alexey Romanov , clabbe@baylibre.com, herbert@gondor.apana.org.au, davem@davemloft.net, robh+dt@kernel.org, krzysztof.kozlowski+dt@linaro.org, conor+dt@kernel.org, khilman@baylibre.com, jbrunet@baylibre.com, martin.blumenstingl@googlemail.com, vadim.fedorenko@linux.dev Cc: linux-crypto@vger.kernel.org, linux-amlogic@lists.infradead.org, linux-kernel@vger.kernel.org, devicetree@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kernel@salutedevices.com References: <20240212135108.549755-1-avromanov@salutedevices.com> <20240212135108.549755-11-avromanov@salutedevices.com> Autocrypt: addr=neil.armstrong@linaro.org; keydata= xsBNBE1ZBs8BCAD78xVLsXPwV/2qQx2FaO/7mhWL0Qodw8UcQJnkrWmgTFRobtTWxuRx8WWP GTjuhvbleoQ5Cxjr+v+1ARGCH46MxFP5DwauzPekwJUD5QKZlaw/bURTLmS2id5wWi3lqVH4 BVF2WzvGyyeV1o4RTCYDnZ9VLLylJ9bneEaIs/7cjCEbipGGFlfIML3sfqnIvMAxIMZrvcl9 qPV2k+KQ7q+aXavU5W+yLNn7QtXUB530Zlk/d2ETgzQ5FLYYnUDAaRl+8JUTjc0CNOTpCeik 80TZcE6f8M76Xa6yU8VcNko94Ck7iB4vj70q76P/J7kt98hklrr85/3NU3oti3nrIHmHABEB AAHNKk5laWwgQXJtc3Ryb25nIDxuZWlsLmFybXN0cm9uZ0BsaW5hcm8ub3JnPsLAkQQTAQoA OwIbIwULCQgHAwUVCgkICwUWAgMBAAIeAQIXgBYhBInsPQWERiF0UPIoSBaat7Gkz/iuBQJk Q5wSAhkBAAoJEBaat7Gkz/iuyhMIANiD94qDtUTJRfEW6GwXmtKWwl/mvqQtaTtZID2dos04 YqBbshiJbejgVJjy+HODcNUIKBB3PSLaln4ltdsV73SBcwUNdzebfKspAQunCM22Mn6FBIxQ GizsMLcP/0FX4en9NaKGfK6ZdKK6kN1GR9YffMJd2P08EO8mHowmSRe/ExAODhAs9W7XXExw UNCY4pVJyRPpEhv373vvff60bHxc1k/FF9WaPscMt7hlkbFLUs85kHtQAmr8pV5Hy9ezsSRa GzJmiVclkPc2BY592IGBXRDQ38urXeM4nfhhvqA50b/nAEXc6FzqgXqDkEIwR66/Gbp0t3+r yQzpKRyQif3OwE0ETVkGzwEIALyKDN/OGURaHBVzwjgYq+ZtifvekdrSNl8TIDH8g1xicBYp QTbPn6bbSZbdvfeQPNCcD4/EhXZuhQXMcoJsQQQnO4vwVULmPGgtGf8PVc7dxKOeta+qUh6+ SRh3vIcAUFHDT3f/Zdspz+e2E0hPV2hiSvICLk11qO6cyJE13zeNFoeY3ggrKY+IzbFomIZY 4yG6xI99NIPEVE9lNBXBKIlewIyVlkOaYvJWSV+p5gdJXOvScNN1epm5YHmf9aE2ZjnqZGoM Mtsyw18YoX9BqMFInxqYQQ3j/HpVgTSvmo5ea5qQDDUaCsaTf8UeDcwYOtgI8iL4oHcsGtUX oUk33HEAEQEAAcLAXwQYAQIACQUCTVkGzwIbDAAKCRAWmrexpM/4rrXiB/sGbkQ6itMrAIfn M7IbRuiSZS1unlySUVYu3SD6YBYnNi3G5EpbwfBNuT3H8//rVvtOFK4OD8cRYkxXRQmTvqa3 3eDIHu/zr1HMKErm+2SD6PO9umRef8V82o2oaCLvf4WeIssFjwB0b6a12opuRP7yo3E3gTCS KmbUuLv1CtxKQF+fUV1cVaTPMyT25Od+RC1K+iOR0F54oUJvJeq7fUzbn/KdlhA8XPGzwGRy 4zcsPWvwnXgfe5tk680fEKZVwOZKIEuJC3v+/yZpQzDvGYJvbyix0lHnrCzq43WefRHI5XTT QbM0WUIBIcGmq38+OgUsMYu4NzLu7uZFAcmp6h8g Organization: Linaro Developer Services In-Reply-To: <20240212135108.549755-11-avromanov@salutedevices.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 12/02/2024 14:50, Alexey Romanov wrote: > It makes no sense to allocate memory via kzalloc, we > can use static buffer, speedup data processing and > don't think about kfree() calls. > > Signed-off-by: Alexey Romanov > --- > drivers/crypto/amlogic/amlogic-gxl-cipher.c | 26 ++++++++------------- > drivers/crypto/amlogic/amlogic-gxl.h | 6 ++--- > 2 files changed, 13 insertions(+), 19 deletions(-) > > diff --git a/drivers/crypto/amlogic/amlogic-gxl-cipher.c b/drivers/crypto/amlogic/amlogic-gxl-cipher.c > index c1b3569a614a..3f42b2cc568d 100644 > --- a/drivers/crypto/amlogic/amlogic-gxl-cipher.c > +++ b/drivers/crypto/amlogic/amlogic-gxl-cipher.c > @@ -91,7 +91,6 @@ struct cipher_ctx { > struct skcipher_request *areq; > struct scatterlist *src_sg; > struct scatterlist *dst_sg; > - void *bkeyiv; > > unsigned int src_offset; > unsigned int dst_offset; > @@ -156,8 +155,7 @@ static void meson_setup_keyiv_descs(struct cipher_ctx *ctx) > return; > > if (blockmode == DESC_OPMODE_CBC) { > - memcpy(ctx->bkeyiv + AES_MAX_KEY_SIZE, ctx->areq->iv, ivsize); > - ctx->keyiv.len = AES_MAX_KEY_SIZE + ivsize; > + memcpy(op->keyiv + AES_MAX_KEY_SIZE, ctx->areq->iv, ivsize); > dma_sync_single_for_device(mc->dev, ctx->keyiv.addr, > ctx->keyiv.len, DMA_TO_DEVICE); > } > @@ -304,6 +302,7 @@ static int meson_cipher(struct skcipher_request *areq) > .dst_sg = areq->dst, > .cryptlen = areq->cryptlen, > }; > + unsigned int ivsize = crypto_skcipher_ivsize(tfm); > int err; > > dev_dbg(mc->dev, "%s %s %u %x IV(%u) key=%u ctx.flow=%d\n", __func__, > @@ -319,16 +318,16 @@ static int meson_cipher(struct skcipher_request *areq) > mc->chanlist[rctx->flow].stat_req++; > #endif > > - ctx.bkeyiv = kzalloc(48, GFP_KERNEL | GFP_DMA); > - if (!ctx.bkeyiv) > - return -ENOMEM; > - > - memcpy(ctx.bkeyiv, op->key, op->keylen); > ctx.keyiv.len = op->keylen; > if (ctx.keyiv.len == AES_KEYSIZE_192) > ctx.keyiv.len = AES_MAX_KEY_SIZE; > > - ctx.keyiv.addr = dma_map_single(mc->dev, ctx.bkeyiv, ctx.keyiv.len, > + if (algt->blockmode == DESC_OPMODE_CBC) { > + memcpy(op->keyiv + AES_MAX_KEY_SIZE, areq->iv, ivsize); > + ctx.keyiv.len = AES_MAX_KEY_SIZE + ivsize; > + } > + > + ctx.keyiv.addr = dma_map_single(mc->dev, op->keyiv, ctx.keyiv.len, > DMA_TO_DEVICE); > err = dma_mapping_error(mc->dev, ctx.keyiv.addr); > if (err) { > @@ -366,8 +365,6 @@ static int meson_cipher(struct skcipher_request *areq) > meson_unmap_scatterlist(areq, mc); > > theend: > - kfree_sensitive(ctx.bkeyiv); > - > return err; > } > > @@ -450,7 +447,6 @@ static void meson_cipher_exit(struct crypto_tfm *tfm) > { > struct meson_cipher_tfm_ctx *op = crypto_tfm_ctx(tfm); > > - kfree_sensitive(op->key); > crypto_free_skcipher(op->fallback_tfm); > } > > @@ -474,11 +470,9 @@ static int meson_aes_setkey(struct crypto_skcipher *tfm, const u8 *key, > dev_dbg(mc->dev, "ERROR: Invalid keylen %u\n", keylen); > return -EINVAL; > } > - kfree_sensitive(op->key); > + > + memcpy(op->keyiv, key, keylen); > op->keylen = keylen; > - op->key = kmemdup(key, keylen, GFP_KERNEL | GFP_DMA); > - if (!op->key) > - return -ENOMEM; > > return crypto_skcipher_setkey(op->fallback_tfm, key, keylen); > } > diff --git a/drivers/crypto/amlogic/amlogic-gxl.h b/drivers/crypto/amlogic/amlogic-gxl.h > index eb2f8cd72b65..e1453dd2e9f4 100644 > --- a/drivers/crypto/amlogic/amlogic-gxl.h > +++ b/drivers/crypto/amlogic/amlogic-gxl.h > @@ -129,15 +129,15 @@ struct meson_cipher_req_ctx { > > /* > * struct meson_cipher_tfm_ctx - context for a skcipher TFM > - * @key: pointer to key data > + * @keyiv: key data > * @keylen: len of the key > * @keymode: The keymode(type and size of key) associated with this TFM > * @mc: pointer to the private data of driver handling this TFM > * @fallback_tfm: pointer to the fallback TFM > */ > struct meson_cipher_tfm_ctx { > - u32 *key; > - u32 keylen; > + u8 keyiv[AES_MAX_KEY_SIZE + AES_BLOCK_SIZE] ____cacheline_aligned; > + u32 keylen ____cacheline_aligned; > u32 keymode; > struct meson_dev *mc; > struct crypto_skcipher *fallback_tfm; Reviewed-by: Neil Armstrong