Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp612630pxx; Mon, 26 Oct 2020 16:54:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwVt6AGRE64y+IRJxZkLeUka06Vzy8sOX/0K01ixVfeAjff2R9dHWe81acEroD09OLOtLQF X-Received: by 2002:a50:da8d:: with SMTP id q13mr837474edj.370.1603756468617; Mon, 26 Oct 2020 16:54:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603756468; cv=none; d=google.com; s=arc-20160816; b=sSkfCByWE/oxCKr2IiFQZZJ6uoXfn7PX4kU05uMtlEzOsIy8ELr1hd3MMYq2cS9oxr 8Waeu0uLBtHITJ1S+IW/wNCvtpbIwwCCPyiqdzYcarmigGuqEW8KL940nWx5OZslLr/V LqCSZ61MPXhA6hj2TF3a5znVVD6qc3zNuLt2QHeXi7MGGsryR31CZSLQCzFFcDXhDwfu 4xUwEAGcKuQcwJ4yEEOCrnCedgFi8MuLK0yXIYRiJNBBrb5hx62zxt2oMXDNgjxWdgqb aUPAhRFIAG79YXVz3vTGSX4Tk+pZC/oBQZXVahjG3BopGc4PjrQ43m7vqCEiCKEZdP9l VWLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=wDok6mK6jj1xqJezMhbajGV2er1Tr2+JJe5VysYjIII=; b=rW6oDwFRdzZKk3sm+KxmF+nR16LEMJoEmS316HXRF68CteM/zk+tt0VTh/kmMlBMbb G9g7jMDxKaNQZWTNvT+qs880iLK5ht3ajgr1kl+EX+jfwAcM/Zg5hFJFTupKJD0Szfgm bFUnJxHLrd2kycjh8Hqdexb7LDyKaeJLDVNJohNOHJ8VpLfsl2Jby7Cxgu/jpipAoZtY GXBp+vq0vBivZhC8RfPLhMxqCrNRU4yTs87DqBI+6moxI1LDh21K7n/rs4OX4ojEercl NHjx0z2M+Os6AB7mU1a5GVxg8oNwLr4kA78D1KuJKNAeSnIuCXmgaKIblqn07AHTmlaG TKbw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h6si8393923ejp.369.2020.10.26.16.54.05; Mon, 26 Oct 2020 16:54:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2408560AbgJZTNV (ORCPT + 99 others); Mon, 26 Oct 2020 15:13:21 -0400 Received: from inva020.nxp.com ([92.121.34.13]:48744 "EHLO inva020.nxp.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2392992AbgJZTGi (ORCPT ); Mon, 26 Oct 2020 15:06:38 -0400 Received: from inva020.nxp.com (localhost [127.0.0.1]) by inva020.eu-rdc02.nxp.com (Postfix) with ESMTP id E54FD1A056F; Mon, 26 Oct 2020 20:06:35 +0100 (CET) Received: from inva024.eu-rdc02.nxp.com (inva024.eu-rdc02.nxp.com [134.27.226.22]) by inva020.eu-rdc02.nxp.com (Postfix) with ESMTP id D85FA1A00AB; Mon, 26 Oct 2020 20:06:35 +0100 (CET) Received: from lorenz.ea.freescale.net (lorenz.ea.freescale.net [10.171.71.5]) by inva024.eu-rdc02.nxp.com (Postfix) with ESMTP id 6223820308; Mon, 26 Oct 2020 20:06:35 +0100 (CET) From: Iuliana Prodan To: Herbert Xu , Horia Geanta , Aymen Sghaier Cc: "David S. Miller" , Silvano Di Ninno , Franck Lenormand , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linux-imx , Andrei Botila , Dragos Rosioru , Iuliana Prodan Subject: [PATCH v2] crypto: caam - enable crypto-engine retry mechanism Date: Mon, 26 Oct 2020 21:06:26 +0200 Message-Id: <1603739186-4007-1-git-send-email-iuliana.prodan@nxp.com> X-Mailer: git-send-email 2.1.0 X-Virus-Scanned: ClamAV using ClamSMTP Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Use the new crypto_engine_alloc_init_and_set() function to initialize crypto-engine and enable retry mechanism. Set the maximum size for crypto-engine software queue based on Job Ring size (JOBR_DEPTH) and a threshold (reserved for the non-crypto-API requests that are not passed through crypto-engine). The callback for do_batch_requests is NULL, since CAAM doesn't support linked requests. Signed-off-by: Iuliana Prodan --- Changes since v1: - add comment for THRESHOLD define; - update max size for crypto-engine queue. drivers/crypto/caam/intern.h | 8 ++++++++ drivers/crypto/caam/jr.c | 4 +++- 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/caam/intern.h b/drivers/crypto/caam/intern.h index 9112279..7d45b21 100644 --- a/drivers/crypto/caam/intern.h +++ b/drivers/crypto/caam/intern.h @@ -16,6 +16,14 @@ /* Currently comes from Kconfig param as a ^2 (driver-required) */ #define JOBR_DEPTH (1 << CONFIG_CRYPTO_DEV_FSL_CAAM_RINGSIZE) +/* + * Maximum size for crypto-engine software queue based on Job Ring + * size (JOBR_DEPTH) and a THRESHOLD (reserved for the non-crypto-API + * requests that are not passed through crypto-engine) + */ +#define THRESHOLD 15 +#define CRYPTO_ENGINE_MAX_QLEN (JOBR_DEPTH - THRESHOLD) + /* Kconfig params for interrupt coalescing if selected (else zero) */ #ifdef CONFIG_CRYPTO_DEV_FSL_CAAM_INTC #define JOBR_INTC JRCFG_ICEN diff --git a/drivers/crypto/caam/jr.c b/drivers/crypto/caam/jr.c index 6f66996..7f2b1101 100644 --- a/drivers/crypto/caam/jr.c +++ b/drivers/crypto/caam/jr.c @@ -550,7 +550,9 @@ static int caam_jr_probe(struct platform_device *pdev) } /* Initialize crypto engine */ - jrpriv->engine = crypto_engine_alloc_init(jrdev, false); + jrpriv->engine = crypto_engine_alloc_init_and_set(jrdev, true, NULL, + false, + CRYPTO_ENGINE_MAX_QLEN); if (!jrpriv->engine) { dev_err(jrdev, "Could not init crypto-engine\n"); return -ENOMEM; -- 2.1.0