Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

crypto: omap-aes-gcm - convert to use crypto engine

Currently omap-aes-gcm algorithms are using local implementation for
crypto request queuing logic. Instead, implement this via usage of
crypto engine which is used already for rest of the omap aes algorithms.
This avoids some random conflicts / crashes also which can happen if
both aes and aes-gcm are attempted to be used simultaneously.

Signed-off-by: Tero Kristo <t-kristo@ti.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>

authored by

Tero Kristo and committed by
Herbert Xu
04a4616e 1cfd9f3f

+55 -68
+54 -44
drivers/crypto/omap-aes-gcm.c
··· 13 13 #include <linux/dmaengine.h> 14 14 #include <linux/omap-dma.h> 15 15 #include <linux/interrupt.h> 16 + #include <linux/pm_runtime.h> 16 17 #include <crypto/aes.h> 17 18 #include <crypto/gcm.h> 18 19 #include <crypto/scatterwalk.h> ··· 30 29 { 31 30 struct aead_request *req = dd->aead_req; 32 31 33 - dd->flags &= ~FLAGS_BUSY; 34 32 dd->in_sg = NULL; 35 33 dd->out_sg = NULL; 36 34 37 - req->base.complete(&req->base, ret); 35 + crypto_finalize_aead_request(dd->engine, req, ret); 36 + 37 + pm_runtime_mark_last_busy(dd->dev); 38 + pm_runtime_put_autosuspend(dd->dev); 38 39 } 39 40 40 41 static void omap_aes_gcm_done_task(struct omap_aes_dev *dd) ··· 84 81 } 85 82 86 83 omap_aes_gcm_finish_req(dd, ret); 87 - omap_aes_gcm_handle_queue(dd, NULL); 88 84 } 89 85 90 86 static int omap_aes_gcm_copy_buffers(struct omap_aes_dev *dd, ··· 129 127 if (cryptlen) { 130 128 tmp = scatterwalk_ffwd(sg_arr, req->src, req->assoclen); 131 129 130 + if (nsg) 131 + sg_unmark_end(dd->in_sgl); 132 + 132 133 ret = omap_crypto_align_sg(&tmp, cryptlen, 133 134 AES_BLOCK_SIZE, &dd->in_sgl[nsg], 134 135 OMAP_CRYPTO_COPY_DATA | ··· 151 146 dd->out_sg = req->dst; 152 147 dd->orig_out = req->dst; 153 148 154 - dd->out_sg = scatterwalk_ffwd(sg_arr, req->dst, assoclen); 149 + dd->out_sg = scatterwalk_ffwd(sg_arr, req->dst, req->assoclen); 155 150 156 151 flags = 0; 157 152 if (req->src == req->dst || dd->out_sg == sg_arr) ··· 207 202 static int omap_aes_gcm_handle_queue(struct omap_aes_dev *dd, 208 203 struct aead_request *req) 209 204 { 210 - struct omap_aes_gcm_ctx *ctx; 211 - struct aead_request *backlog; 212 - struct omap_aes_reqctx *rctx; 213 - unsigned long flags; 214 - int err, ret = 0; 215 - 216 - spin_lock_irqsave(&dd->lock, flags); 217 205 if (req) 218 - ret = aead_enqueue_request(&dd->aead_queue, req); 219 - if (dd->flags & FLAGS_BUSY) { 220 - spin_unlock_irqrestore(&dd->lock, flags); 221 - return ret; 222 - } 206 + return crypto_transfer_aead_request_to_engine(dd->engine, req); 223 207 224 - backlog = aead_get_backlog(&dd->aead_queue); 225 - req = aead_dequeue_request(&dd->aead_queue); 226 - if (req) 227 - dd->flags |= FLAGS_BUSY; 228 - spin_unlock_irqrestore(&dd->lock, flags); 208 + return 0; 209 + } 229 210 230 - if (!req) 231 - return ret; 211 + static int omap_aes_gcm_prepare_req(struct crypto_engine *engine, void *areq) 212 + { 213 + struct aead_request *req = container_of(areq, struct aead_request, 214 + base); 215 + struct omap_aes_reqctx *rctx = aead_request_ctx(req); 216 + struct omap_aes_dev *dd = rctx->dd; 217 + struct omap_aes_gcm_ctx *ctx = crypto_aead_ctx(crypto_aead_reqtfm(req)); 218 + int err; 232 219 233 - if (backlog) 234 - backlog->base.complete(&backlog->base, -EINPROGRESS); 235 - 236 - ctx = crypto_aead_ctx(crypto_aead_reqtfm(req)); 237 - rctx = aead_request_ctx(req); 238 - 239 - dd->ctx = &ctx->octx; 240 - rctx->dd = dd; 241 220 dd->aead_req = req; 242 221 243 222 rctx->mode &= FLAGS_MODE_MASK; ··· 231 242 if (err) 232 243 return err; 233 244 234 - err = omap_aes_write_ctrl(dd); 235 - if (!err) { 236 - if (dd->in_sg_len) 237 - err = omap_aes_crypt_dma_start(dd); 238 - else 239 - omap_aes_gcm_dma_out_callback(dd); 240 - } 245 + dd->ctx = &ctx->octx; 241 246 242 - if (err) { 243 - omap_aes_gcm_finish_req(dd, err); 244 - omap_aes_gcm_handle_queue(dd, NULL); 245 - } 246 - 247 - return ret; 247 + return omap_aes_write_ctrl(dd); 248 248 } 249 249 250 250 static int omap_aes_gcm_crypt(struct aead_request *req, unsigned long mode) ··· 355 377 unsigned int authsize) 356 378 { 357 379 return crypto_rfc4106_check_authsize(authsize); 380 + } 381 + 382 + static int omap_aes_gcm_crypt_req(struct crypto_engine *engine, void *areq) 383 + { 384 + struct aead_request *req = container_of(areq, struct aead_request, 385 + base); 386 + struct omap_aes_reqctx *rctx = aead_request_ctx(req); 387 + struct omap_aes_dev *dd = rctx->dd; 388 + int ret = 0; 389 + 390 + if (!dd) 391 + return -ENODEV; 392 + 393 + if (dd->in_sg_len) 394 + ret = omap_aes_crypt_dma_start(dd); 395 + else 396 + omap_aes_gcm_dma_out_callback(dd); 397 + 398 + return ret; 399 + } 400 + 401 + int omap_aes_gcm_cra_init(struct crypto_aead *tfm) 402 + { 403 + struct omap_aes_ctx *ctx = crypto_aead_ctx(tfm); 404 + 405 + ctx->enginectx.op.prepare_request = omap_aes_gcm_prepare_req; 406 + ctx->enginectx.op.unprepare_request = NULL; 407 + ctx->enginectx.op.do_one_request = omap_aes_gcm_crypt_req; 408 + 409 + crypto_aead_set_reqsize(tfm, sizeof(struct omap_aes_reqctx)); 410 + 411 + return 0; 358 412 }
-23
drivers/crypto/omap-aes.c
··· 657 657 return 0; 658 658 } 659 659 660 - static int omap_aes_gcm_cra_init(struct crypto_aead *tfm) 661 - { 662 - struct omap_aes_dev *dd = NULL; 663 - int err; 664 - 665 - /* Find AES device, currently picks the first device */ 666 - spin_lock_bh(&list_lock); 667 - list_for_each_entry(dd, &dev_list, list) { 668 - break; 669 - } 670 - spin_unlock_bh(&list_lock); 671 - 672 - err = pm_runtime_get_sync(dd->dev); 673 - if (err < 0) { 674 - dev_err(dd->dev, "%s: failed to get_sync(%d)\n", 675 - __func__, err); 676 - return err; 677 - } 678 - 679 - tfm->reqsize = sizeof(struct omap_aes_reqctx); 680 - return 0; 681 - } 682 - 683 660 static void omap_aes_exit_tfm(struct crypto_skcipher *tfm) 684 661 { 685 662 struct omap_aes_ctx *ctx = crypto_skcipher_ctx(tfm);
+1 -1
drivers/crypto/omap-aes.h
··· 80 80 81 81 #define FLAGS_INIT BIT(5) 82 82 #define FLAGS_FAST BIT(6) 83 - #define FLAGS_BUSY BIT(7) 84 83 85 84 #define FLAGS_IN_DATA_ST_SHIFT 8 86 85 #define FLAGS_OUT_DATA_ST_SHIFT 10 ··· 211 212 int omap_aes_4106gcm_decrypt(struct aead_request *req); 212 213 int omap_aes_4106gcm_setauthsize(struct crypto_aead *parent, 213 214 unsigned int authsize); 215 + int omap_aes_gcm_cra_init(struct crypto_aead *tfm); 214 216 int omap_aes_write_ctrl(struct omap_aes_dev *dd); 215 217 int omap_aes_crypt_dma_start(struct omap_aes_dev *dd); 216 218 int omap_aes_crypt_dma_stop(struct omap_aes_dev *dd);