All of lore.kernel.org
 help / color / mirror / Atom feed
From: Corentin Labbe <clabbe@baylibre.com>
To: heiko@sntech.de, herbert@gondor.apana.org.au,
	krzysztof.kozlowski+dt@linaro.org, robh+dt@kernel.org
Cc: linux-crypto@vger.kernel.org, devicetree@vger.kernel.org,
	linux-arm-kernel@lists.infradead.org,
	linux-kernel@vger.kernel.org, linux-rockchip@lists.infradead.org,
	Corentin Labbe <clabbe@baylibre.com>
Subject: [PATCH v6 03/33] crypto: rockchip: do not do custom power management
Date: Mon, 25 Apr 2022 20:20:49 +0000	[thread overview]
Message-ID: <20220425202119.3566743-4-clabbe@baylibre.com> (raw)
In-Reply-To: <20220425202119.3566743-1-clabbe@baylibre.com>

The clock enable/disable at tfm init/exit is fragile,
if 2 tfm are init in the same time and one is removed just after,
it will leave the hardware uncloked even if a user remains.

Instead simply enable clocks at probe time.
We will do PM later.

Fixes: ce0183cb6464b ("crypto: rockchip - switch to skcipher API")
Signed-off-by: Corentin Labbe <clabbe@baylibre.com>
---
 drivers/crypto/rockchip/rk3288_crypto.c          | 4 ++--
 drivers/crypto/rockchip/rk3288_crypto.h          | 2 --
 drivers/crypto/rockchip/rk3288_crypto_ahash.c    | 3 +--
 drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 5 +++--
 4 files changed, 6 insertions(+), 8 deletions(-)

diff --git a/drivers/crypto/rockchip/rk3288_crypto.c b/drivers/crypto/rockchip/rk3288_crypto.c
index 21d3f1458584..4cff49b82983 100644
--- a/drivers/crypto/rockchip/rk3288_crypto.c
+++ b/drivers/crypto/rockchip/rk3288_crypto.c
@@ -394,8 +394,7 @@ static int rk_crypto_probe(struct platform_device *pdev)
 		     rk_crypto_done_task_cb, (unsigned long)crypto_info);
 	crypto_init_queue(&crypto_info->queue, 50);
 
-	crypto_info->enable_clk = rk_crypto_enable_clk;
-	crypto_info->disable_clk = rk_crypto_disable_clk;
+	rk_crypto_enable_clk(crypto_info);
 	crypto_info->load_data = rk_load_data;
 	crypto_info->unload_data = rk_unload_data;
 	crypto_info->enqueue = rk_crypto_enqueue;
@@ -422,6 +421,7 @@ static int rk_crypto_remove(struct platform_device *pdev)
 	struct rk_crypto_info *crypto_tmp = platform_get_drvdata(pdev);
 
 	rk_crypto_unregister();
+	rk_crypto_disable_clk(crypto_tmp);
 	tasklet_kill(&crypto_tmp->done_task);
 	tasklet_kill(&crypto_tmp->queue_task);
 	return 0;
diff --git a/drivers/crypto/rockchip/rk3288_crypto.h b/drivers/crypto/rockchip/rk3288_crypto.h
index 97278c2574ff..2fa7131e4060 100644
--- a/drivers/crypto/rockchip/rk3288_crypto.h
+++ b/drivers/crypto/rockchip/rk3288_crypto.h
@@ -220,8 +220,6 @@ struct rk_crypto_info {
 	int (*start)(struct rk_crypto_info *dev);
 	int (*update)(struct rk_crypto_info *dev);
 	void (*complete)(struct crypto_async_request *base, int err);
-	int (*enable_clk)(struct rk_crypto_info *dev);
-	void (*disable_clk)(struct rk_crypto_info *dev);
 	int (*load_data)(struct rk_crypto_info *dev,
 			 struct scatterlist *sg_src,
 			 struct scatterlist *sg_dst);
diff --git a/drivers/crypto/rockchip/rk3288_crypto_ahash.c b/drivers/crypto/rockchip/rk3288_crypto_ahash.c
index ed03058497bc..49017d1fb510 100644
--- a/drivers/crypto/rockchip/rk3288_crypto_ahash.c
+++ b/drivers/crypto/rockchip/rk3288_crypto_ahash.c
@@ -301,7 +301,7 @@ static int rk_cra_hash_init(struct crypto_tfm *tfm)
 				 sizeof(struct rk_ahash_rctx) +
 				 crypto_ahash_reqsize(tctx->fallback_tfm));
 
-	return tctx->dev->enable_clk(tctx->dev);
+	return 0;
 }
 
 static void rk_cra_hash_exit(struct crypto_tfm *tfm)
@@ -309,7 +309,6 @@ static void rk_cra_hash_exit(struct crypto_tfm *tfm)
 	struct rk_ahash_ctx *tctx = crypto_tfm_ctx(tfm);
 
 	free_page((unsigned long)tctx->dev->addr_vir);
-	return tctx->dev->disable_clk(tctx->dev);
 }
 
 struct rk_crypto_tmp rk_ahash_sha1 = {
diff --git a/drivers/crypto/rockchip/rk3288_crypto_skcipher.c b/drivers/crypto/rockchip/rk3288_crypto_skcipher.c
index 5bbf0d2722e1..8c44a19eab75 100644
--- a/drivers/crypto/rockchip/rk3288_crypto_skcipher.c
+++ b/drivers/crypto/rockchip/rk3288_crypto_skcipher.c
@@ -388,8 +388,10 @@ static int rk_ablk_init_tfm(struct crypto_skcipher *tfm)
 	ctx->dev->update = rk_ablk_rx;
 	ctx->dev->complete = rk_crypto_complete;
 	ctx->dev->addr_vir = (char *)__get_free_page(GFP_KERNEL);
+	if (!ctx->dev->addr_vir)
+		return -ENOMEM;
 
-	return ctx->dev->addr_vir ? ctx->dev->enable_clk(ctx->dev) : -ENOMEM;
+	return 0;
 }
 
 static void rk_ablk_exit_tfm(struct crypto_skcipher *tfm)
@@ -397,7 +399,6 @@ static void rk_ablk_exit_tfm(struct crypto_skcipher *tfm)
 	struct rk_cipher_ctx *ctx = crypto_skcipher_ctx(tfm);
 
 	free_page((unsigned long)ctx->dev->addr_vir);
-	ctx->dev->disable_clk(ctx->dev);
 }
 
 struct rk_crypto_tmp rk_ecb_aes_alg = {
-- 
2.35.1


WARNING: multiple messages have this Message-ID (diff)
From: Corentin Labbe <clabbe@baylibre.com>
To: heiko@sntech.de, herbert@gondor.apana.org.au,
	krzysztof.kozlowski+dt@linaro.org, robh+dt@kernel.org
Cc: linux-crypto@vger.kernel.org, devicetree@vger.kernel.org,
	linux-arm-kernel@lists.infradead.org,
	linux-kernel@vger.kernel.org, linux-rockchip@lists.infradead.org,
	Corentin Labbe <clabbe@baylibre.com>
Subject: [PATCH v6 03/33] crypto: rockchip: do not do custom power management
Date: Mon, 25 Apr 2022 20:20:49 +0000	[thread overview]
Message-ID: <20220425202119.3566743-4-clabbe@baylibre.com> (raw)
In-Reply-To: <20220425202119.3566743-1-clabbe@baylibre.com>

The clock enable/disable at tfm init/exit is fragile,
if 2 tfm are init in the same time and one is removed just after,
it will leave the hardware uncloked even if a user remains.

Instead simply enable clocks at probe time.
We will do PM later.

Fixes: ce0183cb6464b ("crypto: rockchip - switch to skcipher API")
Signed-off-by: Corentin Labbe <clabbe@baylibre.com>
---
 drivers/crypto/rockchip/rk3288_crypto.c          | 4 ++--
 drivers/crypto/rockchip/rk3288_crypto.h          | 2 --
 drivers/crypto/rockchip/rk3288_crypto_ahash.c    | 3 +--
 drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 5 +++--
 4 files changed, 6 insertions(+), 8 deletions(-)

diff --git a/drivers/crypto/rockchip/rk3288_crypto.c b/drivers/crypto/rockchip/rk3288_crypto.c
index 21d3f1458584..4cff49b82983 100644
--- a/drivers/crypto/rockchip/rk3288_crypto.c
+++ b/drivers/crypto/rockchip/rk3288_crypto.c
@@ -394,8 +394,7 @@ static int rk_crypto_probe(struct platform_device *pdev)
 		     rk_crypto_done_task_cb, (unsigned long)crypto_info);
 	crypto_init_queue(&crypto_info->queue, 50);
 
-	crypto_info->enable_clk = rk_crypto_enable_clk;
-	crypto_info->disable_clk = rk_crypto_disable_clk;
+	rk_crypto_enable_clk(crypto_info);
 	crypto_info->load_data = rk_load_data;
 	crypto_info->unload_data = rk_unload_data;
 	crypto_info->enqueue = rk_crypto_enqueue;
@@ -422,6 +421,7 @@ static int rk_crypto_remove(struct platform_device *pdev)
 	struct rk_crypto_info *crypto_tmp = platform_get_drvdata(pdev);
 
 	rk_crypto_unregister();
+	rk_crypto_disable_clk(crypto_tmp);
 	tasklet_kill(&crypto_tmp->done_task);
 	tasklet_kill(&crypto_tmp->queue_task);
 	return 0;
diff --git a/drivers/crypto/rockchip/rk3288_crypto.h b/drivers/crypto/rockchip/rk3288_crypto.h
index 97278c2574ff..2fa7131e4060 100644
--- a/drivers/crypto/rockchip/rk3288_crypto.h
+++ b/drivers/crypto/rockchip/rk3288_crypto.h
@@ -220,8 +220,6 @@ struct rk_crypto_info {
 	int (*start)(struct rk_crypto_info *dev);
 	int (*update)(struct rk_crypto_info *dev);
 	void (*complete)(struct crypto_async_request *base, int err);
-	int (*enable_clk)(struct rk_crypto_info *dev);
-	void (*disable_clk)(struct rk_crypto_info *dev);
 	int (*load_data)(struct rk_crypto_info *dev,
 			 struct scatterlist *sg_src,
 			 struct scatterlist *sg_dst);
diff --git a/drivers/crypto/rockchip/rk3288_crypto_ahash.c b/drivers/crypto/rockchip/rk3288_crypto_ahash.c
index ed03058497bc..49017d1fb510 100644
--- a/drivers/crypto/rockchip/rk3288_crypto_ahash.c
+++ b/drivers/crypto/rockchip/rk3288_crypto_ahash.c
@@ -301,7 +301,7 @@ static int rk_cra_hash_init(struct crypto_tfm *tfm)
 				 sizeof(struct rk_ahash_rctx) +
 				 crypto_ahash_reqsize(tctx->fallback_tfm));
 
-	return tctx->dev->enable_clk(tctx->dev);
+	return 0;
 }
 
 static void rk_cra_hash_exit(struct crypto_tfm *tfm)
@@ -309,7 +309,6 @@ static void rk_cra_hash_exit(struct crypto_tfm *tfm)
 	struct rk_ahash_ctx *tctx = crypto_tfm_ctx(tfm);
 
 	free_page((unsigned long)tctx->dev->addr_vir);
-	return tctx->dev->disable_clk(tctx->dev);
 }
 
 struct rk_crypto_tmp rk_ahash_sha1 = {
diff --git a/drivers/crypto/rockchip/rk3288_crypto_skcipher.c b/drivers/crypto/rockchip/rk3288_crypto_skcipher.c
index 5bbf0d2722e1..8c44a19eab75 100644
--- a/drivers/crypto/rockchip/rk3288_crypto_skcipher.c
+++ b/drivers/crypto/rockchip/rk3288_crypto_skcipher.c
@@ -388,8 +388,10 @@ static int rk_ablk_init_tfm(struct crypto_skcipher *tfm)
 	ctx->dev->update = rk_ablk_rx;
 	ctx->dev->complete = rk_crypto_complete;
 	ctx->dev->addr_vir = (char *)__get_free_page(GFP_KERNEL);
+	if (!ctx->dev->addr_vir)
+		return -ENOMEM;
 
-	return ctx->dev->addr_vir ? ctx->dev->enable_clk(ctx->dev) : -ENOMEM;
+	return 0;
 }
 
 static void rk_ablk_exit_tfm(struct crypto_skcipher *tfm)
@@ -397,7 +399,6 @@ static void rk_ablk_exit_tfm(struct crypto_skcipher *tfm)
 	struct rk_cipher_ctx *ctx = crypto_skcipher_ctx(tfm);
 
 	free_page((unsigned long)ctx->dev->addr_vir);
-	ctx->dev->disable_clk(ctx->dev);
 }
 
 struct rk_crypto_tmp rk_ecb_aes_alg = {
-- 
2.35.1


_______________________________________________
Linux-rockchip mailing list
Linux-rockchip@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-rockchip

WARNING: multiple messages have this Message-ID (diff)
From: Corentin Labbe <clabbe@baylibre.com>
To: heiko@sntech.de, herbert@gondor.apana.org.au,
	krzysztof.kozlowski+dt@linaro.org, robh+dt@kernel.org
Cc: linux-crypto@vger.kernel.org, devicetree@vger.kernel.org,
	linux-arm-kernel@lists.infradead.org,
	linux-kernel@vger.kernel.org, linux-rockchip@lists.infradead.org,
	Corentin Labbe <clabbe@baylibre.com>
Subject: [PATCH v6 03/33] crypto: rockchip: do not do custom power management
Date: Mon, 25 Apr 2022 20:20:49 +0000	[thread overview]
Message-ID: <20220425202119.3566743-4-clabbe@baylibre.com> (raw)
In-Reply-To: <20220425202119.3566743-1-clabbe@baylibre.com>

The clock enable/disable at tfm init/exit is fragile,
if 2 tfm are init in the same time and one is removed just after,
it will leave the hardware uncloked even if a user remains.

Instead simply enable clocks at probe time.
We will do PM later.

Fixes: ce0183cb6464b ("crypto: rockchip - switch to skcipher API")
Signed-off-by: Corentin Labbe <clabbe@baylibre.com>
---
 drivers/crypto/rockchip/rk3288_crypto.c          | 4 ++--
 drivers/crypto/rockchip/rk3288_crypto.h          | 2 --
 drivers/crypto/rockchip/rk3288_crypto_ahash.c    | 3 +--
 drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 5 +++--
 4 files changed, 6 insertions(+), 8 deletions(-)

diff --git a/drivers/crypto/rockchip/rk3288_crypto.c b/drivers/crypto/rockchip/rk3288_crypto.c
index 21d3f1458584..4cff49b82983 100644
--- a/drivers/crypto/rockchip/rk3288_crypto.c
+++ b/drivers/crypto/rockchip/rk3288_crypto.c
@@ -394,8 +394,7 @@ static int rk_crypto_probe(struct platform_device *pdev)
 		     rk_crypto_done_task_cb, (unsigned long)crypto_info);
 	crypto_init_queue(&crypto_info->queue, 50);
 
-	crypto_info->enable_clk = rk_crypto_enable_clk;
-	crypto_info->disable_clk = rk_crypto_disable_clk;
+	rk_crypto_enable_clk(crypto_info);
 	crypto_info->load_data = rk_load_data;
 	crypto_info->unload_data = rk_unload_data;
 	crypto_info->enqueue = rk_crypto_enqueue;
@@ -422,6 +421,7 @@ static int rk_crypto_remove(struct platform_device *pdev)
 	struct rk_crypto_info *crypto_tmp = platform_get_drvdata(pdev);
 
 	rk_crypto_unregister();
+	rk_crypto_disable_clk(crypto_tmp);
 	tasklet_kill(&crypto_tmp->done_task);
 	tasklet_kill(&crypto_tmp->queue_task);
 	return 0;
diff --git a/drivers/crypto/rockchip/rk3288_crypto.h b/drivers/crypto/rockchip/rk3288_crypto.h
index 97278c2574ff..2fa7131e4060 100644
--- a/drivers/crypto/rockchip/rk3288_crypto.h
+++ b/drivers/crypto/rockchip/rk3288_crypto.h
@@ -220,8 +220,6 @@ struct rk_crypto_info {
 	int (*start)(struct rk_crypto_info *dev);
 	int (*update)(struct rk_crypto_info *dev);
 	void (*complete)(struct crypto_async_request *base, int err);
-	int (*enable_clk)(struct rk_crypto_info *dev);
-	void (*disable_clk)(struct rk_crypto_info *dev);
 	int (*load_data)(struct rk_crypto_info *dev,
 			 struct scatterlist *sg_src,
 			 struct scatterlist *sg_dst);
diff --git a/drivers/crypto/rockchip/rk3288_crypto_ahash.c b/drivers/crypto/rockchip/rk3288_crypto_ahash.c
index ed03058497bc..49017d1fb510 100644
--- a/drivers/crypto/rockchip/rk3288_crypto_ahash.c
+++ b/drivers/crypto/rockchip/rk3288_crypto_ahash.c
@@ -301,7 +301,7 @@ static int rk_cra_hash_init(struct crypto_tfm *tfm)
 				 sizeof(struct rk_ahash_rctx) +
 				 crypto_ahash_reqsize(tctx->fallback_tfm));
 
-	return tctx->dev->enable_clk(tctx->dev);
+	return 0;
 }
 
 static void rk_cra_hash_exit(struct crypto_tfm *tfm)
@@ -309,7 +309,6 @@ static void rk_cra_hash_exit(struct crypto_tfm *tfm)
 	struct rk_ahash_ctx *tctx = crypto_tfm_ctx(tfm);
 
 	free_page((unsigned long)tctx->dev->addr_vir);
-	return tctx->dev->disable_clk(tctx->dev);
 }
 
 struct rk_crypto_tmp rk_ahash_sha1 = {
diff --git a/drivers/crypto/rockchip/rk3288_crypto_skcipher.c b/drivers/crypto/rockchip/rk3288_crypto_skcipher.c
index 5bbf0d2722e1..8c44a19eab75 100644
--- a/drivers/crypto/rockchip/rk3288_crypto_skcipher.c
+++ b/drivers/crypto/rockchip/rk3288_crypto_skcipher.c
@@ -388,8 +388,10 @@ static int rk_ablk_init_tfm(struct crypto_skcipher *tfm)
 	ctx->dev->update = rk_ablk_rx;
 	ctx->dev->complete = rk_crypto_complete;
 	ctx->dev->addr_vir = (char *)__get_free_page(GFP_KERNEL);
+	if (!ctx->dev->addr_vir)
+		return -ENOMEM;
 
-	return ctx->dev->addr_vir ? ctx->dev->enable_clk(ctx->dev) : -ENOMEM;
+	return 0;
 }
 
 static void rk_ablk_exit_tfm(struct crypto_skcipher *tfm)
@@ -397,7 +399,6 @@ static void rk_ablk_exit_tfm(struct crypto_skcipher *tfm)
 	struct rk_cipher_ctx *ctx = crypto_skcipher_ctx(tfm);
 
 	free_page((unsigned long)ctx->dev->addr_vir);
-	ctx->dev->disable_clk(ctx->dev);
 }
 
 struct rk_crypto_tmp rk_ecb_aes_alg = {
-- 
2.35.1


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  parent reply	other threads:[~2022-04-25 20:21 UTC|newest]

Thread overview: 108+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-04-25 20:20 [PATCH v6 00/33] crypto: rockchip: permit to pass self-tests Corentin Labbe
2022-04-25 20:20 ` Corentin Labbe
2022-04-25 20:20 ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 01/33] crypto: rockchip: use dev_err for error message about interrupt Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 02/33] crypto: rockchip: do not use uninitialized variable Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` Corentin Labbe [this message]
2022-04-25 20:20   ` [PATCH v6 03/33] crypto: rockchip: do not do custom power management Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 04/33] crypto: rockchip: fix privete/private typo Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 05/33] crypto: rockchip: do not store mode globally Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 06/33] crypto: rockchip: add fallback for cipher Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 07/33] crypto: rockchip: add fallback for ahash Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 08/33] crypto: rockchip: better handle cipher key Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 09/33] crypto: rockchip: remove non-aligned handling Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 10/33] crypto: rockchip: rework by using crypto_engine Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 11/33] crypto: rockchip: rewrite type Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 12/33] crypto: rockchip: add debugfs Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20 ` [PATCH v6 13/33] crypto: rockchip: introduce PM Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:20   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 14/33] crypto: rockchip: handle reset also in PM Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 15/33] crypto: rockchip: use clk_bulk to simplify clock management Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 16/33] crypto: rockchip: add myself as maintainer Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 17/33] crypto: rockchip: use read_poll_timeout Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 18/33] crypto: rockchip: fix style issue Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 19/33] crypto: rockchip: add support for rk3328 Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 20/33] crypto: rockchip: rename ablk functions to cipher Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 21/33] crypto: rockchip: rework rk_handle_req function Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 22/33] crypto: rockchip: use a rk_crypto_info variable instead of lot of indirection Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 23/33] crypto: rockchip: use the rk_crypto_info given as parameter Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 24/33] dt-bindings: crypto: convert rockchip-crypto to YAML Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-26  7:13   ` Krzysztof Kozlowski
2022-04-26  7:13     ` Krzysztof Kozlowski
2022-04-26  7:13     ` Krzysztof Kozlowski
2022-04-25 20:21 ` [PATCH v6 25/33] dt-bindings: crypto: rockchip: convert to new driver bindings Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-26  7:17   ` Krzysztof Kozlowski
2022-04-26  7:17     ` Krzysztof Kozlowski
2022-04-26  7:17     ` Krzysztof Kozlowski
2022-04-25 20:21 ` [PATCH v6 26/33] clk: rk3399: use proper crypto0 name Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 27/33] arm64: dts: rockchip: add rk3328 crypto node Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 28/33] arm64: dts: rockchip: rk3399: add " Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 29/33] crypto: rockchip: store crypto_info in request context Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 30/33] crypto: rockchip: Check for clocks numbers and their frequencies Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 31/33] crypto: rockchip: rk_ahash_reg_init use crypto_info from parameter Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 32/33] crypto: rockchip: permit to have more than one reset Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21 ` [PATCH v6 33/33] crypto: rockchip: Add support for RK3399 Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe
2022-04-25 20:21   ` Corentin Labbe

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20220425202119.3566743-4-clabbe@baylibre.com \
    --to=clabbe@baylibre.com \
    --cc=devicetree@vger.kernel.org \
    --cc=heiko@sntech.de \
    --cc=herbert@gondor.apana.org.au \
    --cc=krzysztof.kozlowski+dt@linaro.org \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-crypto@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-rockchip@lists.infradead.org \
    --cc=robh+dt@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.