Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp3830970ybg; Sun, 20 Oct 2019 22:46:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqzDyM0z9mHTkk2Htf7E3dwXls7k7GYkRzdl1oTa7gbORj90VCP6gfuMY/nXfeElDq9BL+IJ X-Received: by 2002:aa7:c612:: with SMTP id h18mr23234045edq.245.1571636807336; Sun, 20 Oct 2019 22:46:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571636807; cv=none; d=google.com; s=arc-20160816; b=O66l2/Dc+sIbbfJaUaGQ5eVd+qLZcW0u3cUDqbwycNgbaaNw6q3O1CibYM1ZqoljBF 3ltrtjycvUiFmk79Ue2/xwn0KvCy/14qCSb+zCk9UASwDGFI7whwar7UwktSiYHU/JaL MP6uxZ4cWxCrsoWCJPxjC/Ay4RXCVUpwq3BRJAxiEKfmRyvy5DwTBHCdbln0AJMFCunG B9OjKWvXHf4easehtwmH86nL7p1KzymlT8avJ3IAirOUKGl9eaQ1uXdkWaZ/gPmVgVeZ co0CuLwnKeVPi5iIK7EPHys8AK46Fjk7KDMHYK5dTkc6n+0+v1elh3sxaGrtdkchPI4m AzBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=rMW3fNWzsBhasJYqaPtV27FFDe2ekTaoJr1amyihzI0=; b=jJCozPb1d5xvKB4kfwvaOGQSTpPV9CJpJgsBjb5BaLZTzG4ZwIkqoFdkNsupmuV8hA zuhvHa7Y53+Afj1fxUuAuaAc4isjZRzXvprw84iatrgeXkPBu84o+VF5P+TCpM0+rQ1u YkBTm7vJVfH0KnnCzjANSfiHqNtQXcnNMltBzIlkupH201AC79IEkI0ED2Q9Arws87P7 afN23haLRCLZib6APvL7WBqB4NfstTNgxbU9Xdbi6MBH9IiqfO/2VBzM0tM37Ff8O2Xc 9ADBrg8ETxXk5AtFFuogEq+ArbacyOwlSklLDNVyoTPbmiDAOlnAWImVXbwD2/aDrlKu 0cYw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p9si9229272edc.96.2019.10.20.22.46.11; Sun, 20 Oct 2019 22:46:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725900AbfJUFqJ (ORCPT + 99 others); Mon, 21 Oct 2019 01:46:09 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:55420 "EHLO fornost.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725843AbfJUFqJ (ORCPT ); Mon, 21 Oct 2019 01:46:09 -0400 Received: from gwarestrin.me.apana.org.au ([192.168.0.7] helo=gwarestrin.arnor.me.apana.org.au) by fornost.hmeau.com with smtp (Exim 4.89 #2 (Debian)) id 1iMQVz-0006Ej-AW; Mon, 21 Oct 2019 16:46:00 +1100 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Mon, 21 Oct 2019 16:45:59 +1100 Date: Mon, 21 Oct 2019 16:45:59 +1100 From: Herbert Xu To: Zhou Wang Cc: "David S. Miller" , linux-crypto@vger.kernel.org, linuxarm@huawei.com Subject: Re: [PATCH] crypto: zlib-deflate - add zlib-deflate test case in tcrypt Message-ID: <20191021054559.GA32542@gondor.apana.org.au> References: <1570695707-46528-1-git-send-email-wangzhou1@hisilicon.com> <20191018071424.GA16131@gondor.apana.org.au> <5DAD2D40.6000901@hisilicon.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5DAD2D40.6000901@hisilicon.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Oct 21, 2019 at 12:00:00PM +0800, Zhou Wang wrote: > > seems it can not work, when I run insmod tcrypt.ko alg="zlib-deflate" type=10 mask=15 > I got: insmod: can't insert 'tcrypt.ko': Resource temporarily unavailable This error is intentional. This is so that you can test again without having to unload the module. > crypto_has_alg in case 0 in do_test does find "zlib-deflate", however, it breaks and > do nothing about test. It doesn't have to do anything. As long as it causes the algorithm to be registered the crypto API will test it automatically. So after doing the modprobe, can you find the algorithm in /proc/crypto and if so what does its test status say? Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt