On Wed, Jan 31, 2018 at 12:27:18PM -0800, Junaid Shahid wrote:
> Changes in v3:
> - Rebased on top of the latest linux-next
> Changes in v2:
> - Integrated https://patchwork.kernel.org/patch/10173981
> Currently, the AESNI gcm(aes) implementation uses zero-copy only when the
> entire src and dest request buffers, including the AAD, the data and the
> Auth Tag are contiguous. This series enables the use of zero-copy even if the
> AAD and/or Auth Tag are in different buffers than the actual data, as long as
> each of them individually satisfies the zero-copy conditions (i.e. the entire
> buffer is either in low-mem or within a single high-mem page). Furthermore,
> it also enables the use of zero-copy even if only one of src and dest 
> satisfies
> these conditions rather than only when both of them do.
> Junaid Shahid (4):
>   crypto: aesni - Fix out-of-bounds access of the AAD buffer in AVX
>     gcm-aesni
>   crypto: aesni - Enable one-sided zero copy for gcm(aes) request
>     buffers
>   crypto: aesni - Directly use kmap_atomic instead of scatter_walk
>     object in gcm(aes)
>   crypto: aesni - Use zero-copy for gcm(aes) even if the
>     AAD/Data/AuthTag are separate
>  arch/x86/crypto/aesni-intel_avx-x86_64.S | 154 +++++-----------
>  arch/x86/crypto/aesni-intel_glue.c       | 307 
> +++++++++++++++++++------------
>  2 files changed, 227 insertions(+), 234 deletions(-)

I think this conflicts with Dave Watson's work.  Could you rebase
this on top of his patches?

Email: Herbert Xu <herb...@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

Reply via email to