From patchwork Thu Nov 3 07:40:34 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: guanjun X-Patchwork-Id: 1074 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp374844wru; Thu, 3 Nov 2022 00:41:34 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6QyLpdQqG8OeAj2+PaAkTvyExrLkHG5wV+ZYrenZzKc8SqSUeI1h/1B7HmUKEslcwQcMgR X-Received: by 2002:a17:902:c1cb:b0:188:51c0:6cb with SMTP id c11-20020a170902c1cb00b0018851c006cbmr2571852plc.113.1667461294423; Thu, 03 Nov 2022 00:41:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667461294; cv=none; d=google.com; s=arc-20160816; b=AyPP6ovMO0wtQsIOGgegcdpTfkUzy3NbrYIf2B2ETM7qqxl1kS2HzRMsBLMvXZNrf1 GjY8Vv2AWHXFUiGAWUOt1mlx+R0qdnEE54NwxTDvM2eW2z0JSw4JO84ngpHhrTSWvRjd aQDsA+RqXpb6p5NYCPjjx1CoLDt4sSodRPWIZK/HfaYCEuGn+Sg9+ehlVMCxkNP7Z2ZR aJY1OIoNC96oaT3nFNupsk/GUCVlDvHqkitTBV1I1Lcjy8gmxaKjJL9SLaSVZwXdWuck W+pMXn63GUOFv33y/WMSVrWQ8wQ/EWqbNhEjTwf2+NrWQAts0eDJKyiFxCrgdgXrLt6M XUJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=H+KUEei3Deq+QWgtNoY/MwiPQG8GQXr0SQIdmD3auLg=; b=UuSWXh3K/urD4721ZVUZxk2pbQeHLWo+D8vSnz9J89IWzaqhjlNluSaMKWJbeIyce1 7UT5BG5m47F/Zh38Nqk9MoNzxodwfxvktzkpbyAXm7I44at3voEkIfxudlV46b7ONzKm 35SDzsNP9vgCCTghHfAtXYWrplzPCGYXgm1J+WCcxeKU+RanJUkNIewfb3mvk6+x2K8y QMLCPSWGdYXIrzrd2B0c1T0uPFudRJ25mOkHfDUR9am8CZmYWVmrc1BsnGsfm54K0LcB 11HnGtCLEU2V74C4GoU088G+l2Wpf8eNDrD16GYBb+f4trc+t7F5XZKqzFOS9RM0gIyo vaKQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e10-20020a170902cf4a00b0017857e4e6easi18502151plg.343.2022.11.03.00.41.21; Thu, 03 Nov 2022 00:41:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230426AbiKCHkw (ORCPT + 99 others); Thu, 3 Nov 2022 03:40:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37922 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230013AbiKCHkt (ORCPT ); Thu, 3 Nov 2022 03:40:49 -0400 Received: from out30-131.freemail.mail.aliyun.com (out30-131.freemail.mail.aliyun.com [115.124.30.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AEF5D10A2; Thu, 3 Nov 2022 00:40:47 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R161e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046059;MF=guanjun@linux.alibaba.com;NM=1;PH=DS;RN=8;SR=0;TI=SMTPD_---0VTrcGFd_1667461243; Received: from localhost(mailfrom:guanjun@linux.alibaba.com fp:SMTPD_---0VTrcGFd_1667461243) by smtp.aliyun-inc.com; Thu, 03 Nov 2022 15:40:45 +0800 From: 'Guanjun' To: herbert@gondor.apana.org.au, elliott@hpe.com Cc: zelin.deng@linux.alibaba.com, artie.ding@linux.alibaba.com, guanjun@linux.alibaba.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, xuchun.shang@linux.alibaba.com Subject: [PATCH v3 RESEND 0/9] Drivers for Alibaba YCC (Yitian Cryptography Complex) cryptographic accelerator Date: Thu, 3 Nov 2022 15:40:34 +0800 Message-Id: <1667461243-48652-1-git-send-email-guanjun@linux.alibaba.com> X-Mailer: git-send-email 1.8.3.1 X-Spam-Status: No, score=-9.9 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1748459894349295062?= X-GMAIL-MSGID: =?utf-8?q?1748459894349295062?= From: Guanjun Hi, This patch series aims to add drivers for Alibaba YCC (Yitian Cryptography Complex) cryptographic accelerator. Enables the on-chip cryptographic accelerator of Alibaba Yitian SoCs which is based on ARMv9 architecture. It includes PCIe enabling, skcipher, aead, rsa, sm2 support. Please help to review. Thanks, Guanjun. Change log: v3 -> v3 RESEND: - [*/09] Fix compile warnings when sparse turned on v2 -> v3: - [01/09] Fix the lost "$" in Makefile - [08/09] Fix compile warnings when both CONFIG_CRYPTO_SM2 and CONFIG_CRYPTO_DEV_YCC are enabled v1 RESEND -> v2: - [01/09] Remove char device that is not used now. v1 -> v1 RESEND: - [01/09] Adjust the Kconfig entry in alphabetical order - [05/09][07/09][08/09] Adjust the format of algorithm names v2: https://lore.kernel.org/all/1664350687-47330-1-git-send-email-guanjun@linux.alibaba.com/ v1: https://lore.kernel.org/all/1661334621-44413-1-git-send-email-guanjun@linux.alibaba.com/ v1 RESEND: https://lore.kernel.org/all/1662435353-114812-1-git-send-email-guanjun@linux.alibaba.com/ Guanjun (3): crypto/ycc: Add skcipher algorithm support crypto/ycc: Add aead algorithm support crypto/ycc: Add rsa algorithm support Xuchun Shang (1): crypto/ycc: Add sm2 algorithm support Zelin Deng (5): crypto/ycc: Add YCC (Yitian Cryptography Complex) accelerator driver crypto/ycc: Add ycc ring configuration crypto/ycc: Add irq support for ycc kernel rings crypto/ycc: Add device error handling support for ycc hw errors MAINTAINERS: Add Yitian Cryptography Complex (YCC) driver maintainer entry MAINTAINERS | 8 + drivers/crypto/Kconfig | 2 + drivers/crypto/Makefile | 1 + drivers/crypto/ycc/Kconfig | 18 + drivers/crypto/ycc/Makefile | 7 + drivers/crypto/ycc/sm2signature_asn1.c | 38 ++ drivers/crypto/ycc/sm2signature_asn1.h | 13 + drivers/crypto/ycc/ycc_aead.c | 646 ++++++++++++++++++++++ drivers/crypto/ycc/ycc_algs.h | 176 ++++++ drivers/crypto/ycc/ycc_dev.h | 157 ++++++ drivers/crypto/ycc/ycc_drv.c | 567 ++++++++++++++++++++ drivers/crypto/ycc/ycc_isr.c | 276 ++++++++++ drivers/crypto/ycc/ycc_isr.h | 13 + drivers/crypto/ycc/ycc_pke.c | 946 +++++++++++++++++++++++++++++++++ drivers/crypto/ycc/ycc_ring.c | 649 ++++++++++++++++++++++ drivers/crypto/ycc/ycc_ring.h | 170 ++++++ drivers/crypto/ycc/ycc_ske.c | 925 ++++++++++++++++++++++++++++++++ 17 files changed, 4612 insertions(+) create mode 100644 drivers/crypto/ycc/Kconfig create mode 100644 drivers/crypto/ycc/Makefile create mode 100644 drivers/crypto/ycc/sm2signature_asn1.c create mode 100644 drivers/crypto/ycc/sm2signature_asn1.h create mode 100644 drivers/crypto/ycc/ycc_aead.c create mode 100644 drivers/crypto/ycc/ycc_algs.h create mode 100644 drivers/crypto/ycc/ycc_dev.h create mode 100644 drivers/crypto/ycc/ycc_drv.c create mode 100644 drivers/crypto/ycc/ycc_isr.c create mode 100644 drivers/crypto/ycc/ycc_isr.h create mode 100644 drivers/crypto/ycc/ycc_pke.c create mode 100644 drivers/crypto/ycc/ycc_ring.c create mode 100644 drivers/crypto/ycc/ycc_ring.h create mode 100644 drivers/crypto/ycc/ycc_ske.c