Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp357162iob; Fri, 13 May 2022 03:19:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwITQQG/Xp/QHoQmjzRp/H1YBu2vzTu3j3uqyCH1AHJmxVzgwC0V56L5KLKzTPsIgslUZyP X-Received: by 2002:a63:dc42:0:b0:3c5:e187:572 with SMTP id f2-20020a63dc42000000b003c5e1870572mr3472917pgj.82.1652437149943; Fri, 13 May 2022 03:19:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652437149; cv=none; d=google.com; s=arc-20160816; b=Wk/FS1dUslGjCQallma+5ILHvU1bHY+PkckeQYVKItyWLs/tBUjG2/Jwjnd9mNGHFo oH8mRJ3gmH+pgFdrnFQbKCsHIELWBsqLpsR0/p1XLW2evIg5ojm/RtpDhvrfbnOOkF1n WtU6XnNwFMZJGX0DwhNkjZvvkWgmlwt6+3FwHGup1/HuUnY87Zp/v3mNB+jlaQD/OjAL rVLOMYvxRpQUSbZz5DGrejyNzNc5JttY8QxGpKtttixK+0fC+x67rt2bGWiR8jHDrUJb cQkcew2fOUTwg4j1nQIa+qbi7LcdQkUywHGkuknc3Y9cpOdq4/+F8a7CSeA1awebQbeD K5Ew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=invIJhsYOz/QzGQ72WogC+6z4QJ6zBOYiL7ETxA1H/E=; b=HGSYEHI+h+XzLBIgdt21NC/CE1R11SvoCPWF72tFRdzry2OhLnwnpNAyFmZC11RUzy niJ+wLBYYytM7nVXZxi6tpKIsoBN13zlsSbqvoYdLP5/Z05ia6SHkI84bHzi7CxWRrgr yoJJ28aelAGGwMzjyOPi2U+lqSVdT8PzpdIzds4VFvdRJJ/Tag8wfyc7K1QBfR1n1rJm tnlpJkFEIuUmQHU/6ac/+2717ouueCXaEFEqYIRoqNKvi/SQLg+HIAxZNqvOLtQpHsi5 ujJfmtXLnu/P5e9BuiCvxbSDyvTjXhUUyAlDa9YLsgMmJv7LJh1J3zX/k0YBk5AohOy/ ZgFA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ng4-20020a17090b1a8400b001cab35fecb9si3022446pjb.187.2022.05.13.03.18.42; Fri, 13 May 2022 03:19:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1354218AbiEMIJP (ORCPT + 99 others); Fri, 13 May 2022 04:09:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49102 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1378097AbiEMIJN (ORCPT ); Fri, 13 May 2022 04:09:13 -0400 Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 50BAB1DFD81; Fri, 13 May 2022 01:09:09 -0700 (PDT) Received: from dggpeml500026.china.huawei.com (unknown [172.30.72.53]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4L01V10R0Dz1JBlJ; Fri, 13 May 2022 16:07:53 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500026.china.huawei.com (7.185.36.106) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 13 May 2022 16:09:07 +0800 Received: from huawei.com (10.67.165.24) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 13 May 2022 16:09:07 +0800 From: Kai Ye To: CC: , , , Subject: [PATCH] crypto: hisilicon/sec - delete the flag CRYPTO_ALG_ALLOCATES_MEMORY Date: Fri, 13 May 2022 16:02:44 +0800 Message-ID: <20220513080244.19304-1-yekai13@huawei.com> X-Mailer: git-send-email 2.33.0 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.67.165.24] X-ClientProxiedBy: dggems702-chm.china.huawei.com (10.3.19.179) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Should not to uses the CRYPTO_ALG_ALLOCATES_MEMORY in SEC2. The SEC2 driver uses the pre-allocated buffers, including the src sgl pool, dst sgl pool and other qp ctx resources. (e.g. IV buffer, mac buffer, key buffer). The SEC2 driver doesn't allocate memory during request processing. The driver only maps software sgl to allocated hardware sgl during I/O. So here is fix it. Signed-off-by: Kai Ye --- drivers/crypto/hisilicon/sec2/sec_crypto.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/drivers/crypto/hisilicon/sec2/sec_crypto.c b/drivers/crypto/hisilicon/sec2/sec_crypto.c index a91635c348b5..6eebe739893c 100644 --- a/drivers/crypto/hisilicon/sec2/sec_crypto.c +++ b/drivers/crypto/hisilicon/sec2/sec_crypto.c @@ -2113,7 +2113,6 @@ static int sec_skcipher_decrypt(struct skcipher_request *sk_req) .cra_driver_name = "hisi_sec_"sec_cra_name,\ .cra_priority = SEC_PRIORITY,\ .cra_flags = CRYPTO_ALG_ASYNC |\ - CRYPTO_ALG_ALLOCATES_MEMORY |\ CRYPTO_ALG_NEED_FALLBACK,\ .cra_blocksize = blk_size,\ .cra_ctxsize = sizeof(struct sec_ctx),\ @@ -2366,7 +2365,6 @@ static int sec_aead_decrypt(struct aead_request *a_req) .cra_driver_name = "hisi_sec_"sec_cra_name,\ .cra_priority = SEC_PRIORITY,\ .cra_flags = CRYPTO_ALG_ASYNC |\ - CRYPTO_ALG_ALLOCATES_MEMORY |\ CRYPTO_ALG_NEED_FALLBACK,\ .cra_blocksize = blk_size,\ .cra_ctxsize = sizeof(struct sec_ctx),\ -- 2.33.0