From: "Iuliana Prodan (OSS)" <iuliana.prodan@oss.nxp.com>
To: Herbert Xu <herbert@gondor.apana.org.au>,
Ard Biesheuvel <ard.biesheuvel@linaro.org>,
"David S. Miller" <davem@davemloft.net>,
Horia Geanta <horia.geanta@nxp.com>
Cc: Aymen Sghaier <aymen.sghaier@nxp.com>,
Silvano Di Ninno <silvano.dininno@nxp.com>,
Franck Lenormand <franck.lenormand@nxp.com>,
linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org,
linux-imx <linux-imx@nxp.com>,
Iuliana Prodan <iuliana.prodan@nxp.com>
Subject: [RFC PATCH 0/4] crypto: add CRYPTO_TFM_REQ_DMA flag
Date: Wed, 25 Nov 2020 23:13:07 +0200 [thread overview]
Message-ID: <20201125211311.2179-1-iuliana.prodan@oss.nxp.com> (raw)
From: Iuliana Prodan <iuliana.prodan@nxp.com>
Add the option to allocate the crypto request object plus any extra space
needed by the driver into a DMA-able memory.
Add CRYPTO_TFM_REQ_DMA flag to be used by backend implementations to
indicate to crypto API the need to allocate GFP_DMA memory
for private contexts of the crypto requests.
For IPsec use cases, CRYPTO_TFM_REQ_DMA flag is also checked in
esp_alloc_tmp() function for IPv4 and IPv6.
This series includes an example of how a driver can use
CRYPTO_TFM_REQ_DMA flag while setting reqsize to a larger value
to avoid allocating memory at crypto request runtime.
The extra size needed by the driver is added to the reqsize field
that indicates how much memory could be needed per request.
Iuliana Prodan (4):
crypto: add CRYPTO_TFM_REQ_DMA flag
net: esp: check CRYPTO_TFM_REQ_DMA flag when allocating crypto request
crypto: caam - avoid allocating memory at crypto request runtime for
skcipher
crypto: caam - avoid allocating memory at crypto request runtime for
aead
drivers/crypto/caam/caamalg.c | 130 +++++++++++++++++++++++++---------
include/crypto/aead.h | 4 ++
include/crypto/akcipher.h | 21 ++++++
include/crypto/hash.h | 4 ++
include/crypto/skcipher.h | 4 ++
include/linux/crypto.h | 1 +
net/ipv4/esp4.c | 7 +-
net/ipv6/esp6.c | 7 +-
8 files changed, 144 insertions(+), 34 deletions(-)
--
2.17.1
next reply other threads:[~2020-11-25 21:14 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-11-25 21:13 Iuliana Prodan (OSS) [this message]
2020-11-25 21:13 ` [RFC PATCH 1/4] crypto: add CRYPTO_TFM_REQ_DMA flag Iuliana Prodan (OSS)
2020-11-25 21:13 ` [RFC PATCH 2/4] net: esp: check CRYPTO_TFM_REQ_DMA flag when allocating crypto request Iuliana Prodan (OSS)
2020-11-25 21:13 ` [RFC PATCH 3/4] crypto: caam - avoid allocating memory at crypto request runtime for skcipher Iuliana Prodan (OSS)
2020-11-25 21:13 ` [RFC PATCH 4/4] crypto: caam - avoid allocating memory at crypto request runtime for aead Iuliana Prodan (OSS)
2020-11-25 23:32 ` kernel test robot
2020-11-25 21:16 ` [RFC PATCH 0/4] crypto: add CRYPTO_TFM_REQ_DMA flag Ard Biesheuvel
2020-11-25 21:39 ` Iuliana Prodan
2020-11-26 7:09 ` Ard Biesheuvel
2020-11-26 16:00 ` Iuliana Prodan
2020-11-26 17:12 ` Ard Biesheuvel
2020-11-26 18:21 ` Iuliana Prodan
2020-12-07 13:49 ` Horia Geantă
2020-12-08 7:43 ` Ard Biesheuvel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20201125211311.2179-1-iuliana.prodan@oss.nxp.com \
--to=iuliana.prodan@oss.nxp.com \
--cc=ard.biesheuvel@linaro.org \
--cc=aymen.sghaier@nxp.com \
--cc=davem@davemloft.net \
--cc=franck.lenormand@nxp.com \
--cc=herbert@gondor.apana.org.au \
--cc=horia.geanta@nxp.com \
--cc=iuliana.prodan@nxp.com \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-imx@nxp.com \
--cc=linux-kernel@vger.kernel.org \
--cc=silvano.dininno@nxp.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.