From patchwork Sat Jun 30 22:26:56 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eric Biggers X-Patchwork-Id: 937488 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="WjTnSKIg"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 41J7WS4w4Pz9rvt for ; Sun, 1 Jul 2018 08:30:28 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751894AbeF3WaW (ORCPT ); Sat, 30 Jun 2018 18:30:22 -0400 Received: from mail-pl0-f68.google.com ([209.85.160.68]:38510 "EHLO mail-pl0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751778AbeF3WaU (ORCPT ); Sat, 30 Jun 2018 18:30:20 -0400 Received: by mail-pl0-f68.google.com with SMTP id d10-v6so6144068plo.5; Sat, 30 Jun 2018 15:30:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=tnhjW6VXko7FgmhxWIBQziNvYz3b1fc1OR5Avc6wRvs=; b=WjTnSKIgyU3/CfJtEJHQLz1n7QWXLXHk+NYkQQPkvEXPU7VV9La/wb6VvWS5tdf0Xt Q8DEvoE7qZdObLa6928awn8nNrmDbIKs+JUuwQ97kGyYArHPe4HARRv1yHKP5G2Qns+H ZmMi7XcLZUdYH0TjcEkaw+UypOA+YTMZnRtVS+3ybYFP5899IpUFAIyhRw/8QJPxDP5u VACnBP/WstFlpmPMvDc43oMgoFowFvrs8hIuu/75LINmtVP3CvfoH37nwQc9KyjwrwM1 kTm2kw28UDMKojVfd1r4H6LP3VhOI4rrjSOp/5Ykn9qwaJUcXF3kB8DY+JhCxE0xypen VbQw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=tnhjW6VXko7FgmhxWIBQziNvYz3b1fc1OR5Avc6wRvs=; b=AF/+V/Dv0swx9D98+Cpj4ovQ4RYXxzReAWlG3IgsUBlCuH5H0UPiCoCd0w2Av1F8oq TDozfbnDBfqZ9N68k/Y2ZXuGFxPxaVnMw1CgX9InZ3hbJpsKKgh85JRBswzVNgcZNyl2 8HV7CORMBDYW8fwo1Uy/V2Mnv4hzsBCM2lUWGDPh8OygzAN7m0miWLIK8/hb5pC/YWmo s4rdfCwcXSzbUYomh1k1tWIxElGUEIN2mHMoOtFQTq5voGxcMNuk/sYra4yplBTl+XiI P8pb5T83AH1pUB77SKPeLCYGWADemhPqYZ4IEngpvn2kTnbwqVDjmLD05lAHFw46Mq/F 9dlA== X-Gm-Message-State: APt69E1jg5RUcMHBk7gyVn1aAPuUxmkDT2ErufkZsDM2Pi3xIurQ4v2a guz1Fe/b72nWtJKOCt6tOeSqlsym X-Google-Smtp-Source: ADUXVKJ8NgAA5G2olZb0D6Um1ALBt2pF0Q5doQb3wl7UKI1FzQyDgJz3wcqc4EPl+ItatvdV4TEANw== X-Received: by 2002:a17:902:1081:: with SMTP id c1-v6mr20156131pla.153.1530397819651; Sat, 30 Jun 2018 15:30:19 -0700 (PDT) Received: from sol.localdomain (c-67-185-97-198.hsd1.wa.comcast.net. [67.185.97.198]) by smtp.gmail.com with ESMTPSA id 10-v6sm34898235pfs.111.2018.06.30.15.30.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 30 Jun 2018 15:30:19 -0700 (PDT) From: Eric Biggers To: netdev@vger.kernel.org, "David S . Miller" Cc: David Lebrun , linux-crypto@vger.kernel.org, Eric Biggers Subject: [PATCH net] ipv6: sr: fix passing wrong flags to crypto_alloc_shash() Date: Sat, 30 Jun 2018 15:26:56 -0700 Message-Id: <20180630222656.333-1-ebiggers3@gmail.com> X-Mailer: git-send-email 2.18.0 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org From: Eric Biggers The 'mask' argument to crypto_alloc_shash() uses the CRYPTO_ALG_* flags, not 'gfp_t'. So don't pass GFP_KERNEL to it. Fixes: bf355b8d2c30 ("ipv6: sr: add core files for SR HMAC support") Signed-off-by: Eric Biggers --- net/ipv6/seg6_hmac.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/ipv6/seg6_hmac.c b/net/ipv6/seg6_hmac.c index 33fb35cbfac13..558fe8cc6d438 100644 --- a/net/ipv6/seg6_hmac.c +++ b/net/ipv6/seg6_hmac.c @@ -373,7 +373,7 @@ static int seg6_hmac_init_algo(void) return -ENOMEM; for_each_possible_cpu(cpu) { - tfm = crypto_alloc_shash(algo->name, 0, GFP_KERNEL); + tfm = crypto_alloc_shash(algo->name, 0, 0); if (IS_ERR(tfm)) return PTR_ERR(tfm); p_tfm = per_cpu_ptr(algo->tfms, cpu);