Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3801177yba; Mon, 29 Apr 2019 08:44:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqz200IXdqrPr8Pa7tE1ze+zlSP2tuZykLvBS0afuiXe0MLfsDgQa9bxJ5sn2bX9IjJERcSU X-Received: by 2002:aa7:9214:: with SMTP id 20mr19423895pfo.202.1556552673102; Mon, 29 Apr 2019 08:44:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556552673; cv=none; d=google.com; s=arc-20160816; b=NRzRBIRbzuhc8rA4iHT0at4bXYY4KG+lAajsIMZwF0jtgzg/jcOX1osItRlCrUArIe sg8Sl7lJL9vyzTV7HexqSxWmytTiUZDEU9ZynnKNQ6bRF9G0rzgMesKhw/vIkx9uKUC0 ExNuSvHAFKQoduYEv75ubTSB8pFQTPzQtMahRTjE7tIISdSfXt0G3yE7dZuhKjhmRkg9 Qp4gBLhjQaXwjqBhXFv0ECxJff71hglYlY1Vo9FtrBleyH1g3qd1/MzhpHhE8AMg4+Ri ET4cqamRU4S9ZVMmRheMdBYUrVmf5LJA5iolrxQztWKTwaqVKtHJigFU+iz48OpzLepL 15dg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=r4mO4Qry2zDbRMRqBwgBd6c9lLre4vsSb2KTVURe0wU=; b=cYQ51X/ln9Masf3ru0Xc0J0f8R+d14fKSRdiMwkkc5d1OGrWclzasjRKV1BXpQxbxk c9cV5H3yNucnPVVAIK2hVKbJMrP64efF/r++t/uN8dhjQbW33dKLDq9LcBO6emFiDsGX eW5Vsf0mLzr3i83pveRN+As0V+H7VfZlHljeMuiZEQS5M23t14CGra60QmCGTyYDz61j 9COUU0NLkpUOppdc3ONPEutR8ujHAAym3ExPIBnDh/R+3wMOOH4GhIrX1OaqilmfwozC 59owgP1ACkSCgVhzIiknfuh04J7yu4wHtElc6DBqxki1VMlp2/jvhlc8HKdSC3ugBk2n VtDg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a13si2895806pfi.209.2019.04.29.08.44.13; Mon, 29 Apr 2019 08:44:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728448AbfD2PoH (ORCPT + 99 others); Mon, 29 Apr 2019 11:44:07 -0400 Received: from mga18.intel.com ([134.134.136.126]:22431 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728438AbfD2PoH (ORCPT ); Mon, 29 Apr 2019 11:44:07 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 Apr 2019 08:44:07 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,410,1549958400"; d="scan'208";a="319990335" Received: from silvixa00391824.ir.intel.com (HELO silvixa00391824.ger.corp.intel.com) ([10.237.222.24]) by orsmga005.jf.intel.com with ESMTP; 29 Apr 2019 08:44:05 -0700 From: Giovanni Cabiddu To: herbert@gondor.apana.org.au Cc: linux-crypto@vger.kernel.org, Xin Zeng , Conor Mcloughlin , Sergey Portnoy , Giovanni Cabiddu Subject: [PATCH 1/7] crypto: qat - remove spin_lock in qat_ablkcipher_setkey Date: Mon, 29 Apr 2019 16:43:15 +0100 Message-Id: <20190429154321.21098-1-giovanni.cabiddu@intel.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: Xin Zeng Remove unnecessary spin lock in qat_ablkcipher_setkey. Reviewed-by: Conor Mcloughlin Tested-by: Sergey Portnoy Signed-off-by: Xin Zeng Signed-off-by: Giovanni Cabiddu --- drivers/crypto/qat/qat_common/qat_algs.c | 16 +++------------- 1 file changed, 3 insertions(+), 13 deletions(-) diff --git a/drivers/crypto/qat/qat_common/qat_algs.c b/drivers/crypto/qat/qat_common/qat_algs.c index c8d401646902..413e05e8891e 100644 --- a/drivers/crypto/qat/qat_common/qat_algs.c +++ b/drivers/crypto/qat/qat_common/qat_algs.c @@ -131,7 +131,6 @@ struct qat_alg_ablkcipher_ctx { struct icp_qat_fw_la_bulk_req dec_fw_req; struct qat_crypto_instance *inst; struct crypto_tfm *tfm; - spinlock_t lock; /* protects qat_alg_ablkcipher_ctx struct */ }; static int qat_get_inter_state_size(enum icp_qat_hw_auth_algo qat_hash_alg) @@ -912,7 +911,6 @@ static int qat_alg_ablkcipher_setkey(struct crypto_ablkcipher *tfm, struct qat_alg_ablkcipher_ctx *ctx = crypto_ablkcipher_ctx(tfm); struct device *dev; - spin_lock(&ctx->lock); if (ctx->enc_cd) { /* rekeying */ dev = &GET_DEV(ctx->inst->accel_dev); @@ -925,29 +923,22 @@ static int qat_alg_ablkcipher_setkey(struct crypto_ablkcipher *tfm, int node = get_current_node(); struct qat_crypto_instance *inst = qat_crypto_get_instance_node(node); - if (!inst) { - spin_unlock(&ctx->lock); + if (!inst) return -EINVAL; - } dev = &GET_DEV(inst->accel_dev); ctx->inst = inst; ctx->enc_cd = dma_alloc_coherent(dev, sizeof(*ctx->enc_cd), &ctx->enc_cd_paddr, GFP_ATOMIC); - if (!ctx->enc_cd) { - spin_unlock(&ctx->lock); + if (!ctx->enc_cd) return -ENOMEM; - } ctx->dec_cd = dma_alloc_coherent(dev, sizeof(*ctx->dec_cd), &ctx->dec_cd_paddr, GFP_ATOMIC); - if (!ctx->dec_cd) { - spin_unlock(&ctx->lock); + if (!ctx->dec_cd) goto out_free_enc; - } } - spin_unlock(&ctx->lock); if (qat_alg_ablkcipher_init_sessions(ctx, key, keylen, mode)) goto out_free_all; @@ -1119,7 +1110,6 @@ static int qat_alg_ablkcipher_init(struct crypto_tfm *tfm) { struct qat_alg_ablkcipher_ctx *ctx = crypto_tfm_ctx(tfm); - spin_lock_init(&ctx->lock); tfm->crt_ablkcipher.reqsize = sizeof(struct qat_crypto_request); ctx->tfm = tfm; return 0; -- 2.20.1