diff options
| author | Chang S. Bae <[email protected]> | 2023-06-21 05:06:53 -0700 |
|---|---|---|
| committer | Herbert Xu <[email protected]> | 2023-07-14 18:23:14 +1000 |
| commit | 74c6df413f64f349e8ae4166d97324803bf55b58 (patch) | |
| tree | 9c40c883469f953ecc688a619fa55c3709355e3a /tools/perf/scripts/python/stackcollapse.py | |
| parent | babb80b3ecc6f40c962e13c654ebcd27f25ee327 (diff) | |
crypto: x86/aesni - Align the address before aes_set_key_common()
aes_set_key_common() performs runtime alignment to the void *raw_ctx
pointer. This facilitates consistent access to the 16byte-aligned
address during key extension.
However, the alignment is already handlded in the GCM-related setkey
functions before invoking the common function. Consequently, the
alignment in the common function is unnecessary for those functions.
To establish a consistent approach throughout the glue code, remove
the aes_ctx() call from its current location. Instead, place it at
each call site where the runtime alignment is currently absent.
Link: https://lore.kernel.org/lkml/[email protected]/
Suggested-by: Eric Biggers <[email protected]>
Signed-off-by: Chang S. Bae <[email protected]>
Cc: [email protected]
Cc: [email protected]
Cc: [email protected]
Signed-off-by: Herbert Xu <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/stackcollapse.py')
0 files changed, 0 insertions, 0 deletions