Hi Krzysztof, Some comments inline. On Thu, Aug 30, 2018 at 07:15:39PM +0200, Krzysztof Kozlowski wrote: > Add driver for using the Freescale/NXP Vybrid processor CRC block for > CRC16 and CRC32 offloading. The driver implements shash_alg and was > tested using internal testmgr tests and libkcapi. > > Signed-off-by: Krzysztof Kozlowski <krzk@xxxxxxxxxx> > --- > MAINTAINERS | 7 + > drivers/crypto/Kconfig | 10 ++ > drivers/crypto/Makefile | 1 + > drivers/crypto/vf-crc.c | 387 ++++++++++++++++++++++++++++++++++++++++++++++ > include/linux/crc32poly.h | 7 + > 5 files changed, 412 insertions(+) > create mode 100644 drivers/crypto/vf-crc.c > > diff --git a/MAINTAINERS b/MAINTAINERS > index 0a340f680230..e84fa829a4e4 100644 > --- a/MAINTAINERS > +++ b/MAINTAINERS > @@ -15388,6 +15388,13 @@ S: Maintained > F: Documentation/fb/uvesafb.txt > F: drivers/video/fbdev/uvesafb.* > > +VF500/VF610 HW CRC DRIVER > +M: Krzysztof Kozlowski <krzk@xxxxxxxxxx> > +L: linux-crypto@xxxxxxxxxxxxxxx > +S: Maintained > +F: drivers/crypto/vf-crc.c > +F: Documentation/devicetree/bindings/crypto/fsl-vf610-crc.txt > + > VF610 NAND DRIVER > M: Stefan Agner <stefan@xxxxxxxx> > L: linux-mtd@xxxxxxxxxxxxxxxxxxx > diff --git a/drivers/crypto/Kconfig b/drivers/crypto/Kconfig > index 20314d7a7b58..0ade940ac79c 100644 > --- a/drivers/crypto/Kconfig > +++ b/drivers/crypto/Kconfig > @@ -418,6 +418,16 @@ config CRYPTO_DEV_MXS_DCP > To compile this driver as a module, choose M here: the module > will be called mxs-dcp. > > +config CRYPTO_DEV_VF_CRC > + tristate "Support for Freescale/NXP Vybrid CRC HW accelerator" > + select CRYPTO_HASH > + help > + This option enables support for the CRC16/32 hardware accelerator > + on Freescale/NXP Vybrid VF500/VF610 SoCs. > + > + To compile this driver as a module, choose M here: the module > + will be called vf-crc. > + > config CRYPTO_DEV_EXYNOS_RNG > tristate "EXYNOS HW pseudo random number generator support" > depends on ARCH_EXYNOS || COMPILE_TEST > diff --git a/drivers/crypto/Makefile b/drivers/crypto/Makefile > index c23396f32c8a..418c08bdc19c 100644 > --- a/drivers/crypto/Makefile > +++ b/drivers/crypto/Makefile > @@ -41,6 +41,7 @@ obj-$(CONFIG_ARCH_STM32) += stm32/ > obj-$(CONFIG_CRYPTO_DEV_SUN4I_SS) += sunxi-ss/ > obj-$(CONFIG_CRYPTO_DEV_TALITOS) += talitos.o > obj-$(CONFIG_CRYPTO_DEV_UX500) += ux500/ > +obj-$(CONFIG_CRYPTO_DEV_VF_CRC) += vf-crc.o > obj-$(CONFIG_CRYPTO_DEV_VIRTIO) += virtio/ > obj-$(CONFIG_CRYPTO_DEV_VMX) += vmx/ > obj-$(CONFIG_CRYPTO_DEV_BCM_SPU) += bcm/ > +static int vf_crc_update_prepare(struct vf_crc_tfm_ctx *mctx, > + struct vf_crc_desc_ctx *desc_ctx) > +{ > + struct vf_crc *crc = desc_ctx->crc; > + int ret; > + > + ret = clk_prepare_enable(crc->clk); > + if (ret) { > + dev_err(crc->dev, "Failed to enable clock\n"); > + return ret; > + } Generally have you measured the performance of this driver? Is it faster than the software implementation? Under certain circumstances a clk_prepare_enable might become expensive, so it could happen that all this clk enabling/disabling takes longer than the action you do in between. Using pm_runtime might help here. > + > + mutex_lock(&crc->lock); > + > + /* > + * Check if we are continuing to process request already configured > + * in HW. HW has to be re-initialized only on first update() for given > + * request or if new request was processed after last call to update(). > + */ > + if (crc->processed_desc == desc_ctx) > + return 0; You never set crc->processed_desc to anything, so this optimization never triggers. Unless properly implementing this skip-to-reinitialize-hardware really brings a measurerable performance gain I would just drop this optimization. In the end you only save a few register writes, but it makes the driver more complicated. > + > + vf_crc_initialize_regs(mctx, desc_ctx); > + > + return 0; > +} > + > +static int vf_crc_finup(struct shash_desc *desc, const u8 *data, > + unsigned int len, u8 *out) > +{ > + return vf_crc_update(desc, data, len) ?: > + vf_crc_final(desc, out); > +} > + > +static int vf_crc_digest(struct shash_desc *desc, const u8 *data, > + unsigned int leng, u8 *out) > +{ > + return vf_crc_init(desc) ?: vf_crc_finup(desc, data, leng, out); > +} These seem unnecessary. The crypto core will set these with similar wrappers if unspecified. > +static int vf_crc_probe(struct platform_device *pdev) > +{ > + struct device *dev = &pdev->dev; > + struct resource *res; > + struct vf_crc *crc; > + int ret; > + > + if (vf_crc_data) { > + dev_err(dev, "Device already registered (only one instance allowed)\n"); > + return -EINVAL; > + } > + > + crc = devm_kzalloc(dev, sizeof(*crc), GFP_KERNEL); > + if (!crc) > + return -ENOMEM; > + > + crc->dev = dev; > + > + res = platform_get_resource(pdev, IORESOURCE_MEM, 0); > + crc->iobase = devm_ioremap_resource(dev, res); > + if (IS_ERR(crc->iobase)) > + return PTR_ERR(crc->iobase); > + > + crc->clk = devm_clk_get(dev, "crc"); > + if (IS_ERR(crc->clk)) { > + dev_err(dev, "Could not get clock\n"); > + return PTR_ERR(crc->clk); > + } > + > + vf_crc_data = crc; > + > + ret = crypto_register_shashes(algs, ARRAY_SIZE(algs)); > + if (ret) { > + dev_err(dev, "Failed to register crypto algorithms\n"); > + goto err; > + } > + > + mutex_init(&crc->lock); Should be done before the shashes are registered. Sascha -- Pengutronix e.K. | | Industrial Linux Solutions | http://www.pengutronix.de/ | Peiner Str. 6-8, 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |