summaryrefslogtreecommitdiff
path: root/net/ipv6/af_inet6.c
diff options
context:
space:
mode:
authorDavid S. Miller <davem@davemloft.net>2018-08-13 08:41:09 -0700
committerDavid S. Miller <davem@davemloft.net>2018-08-13 08:41:09 -0700
commit8f78004442202b4ee28657513d78e6bb937e877c (patch)
tree2388709906c2696baa252891f4845d8a680b8369 /net/ipv6/af_inet6.c
parent78cbac647e61fb20ad615075949ea77cedf74e0c (diff)
parent0b243d004ea640875115d1500ec429a3e9f9fae9 (diff)
downloadlwn-8f78004442202b4ee28657513d78e6bb937e877c.tar.gz
lwn-8f78004442202b4ee28657513d78e6bb937e877c.zip
Merge branch 'net-tls-Combined-memory-allocation-for-decryption-request'
Vakul Garg says: ==================== net/tls: Combined memory allocation for decryption request This patch does a combined memory allocation from heap for scatterlists, aead_request, aad and iv for the tls record decryption path. In present code, aead_request is allocated from heap, scatterlists on a conditional basis are allocated on heap or on stack. This is inefficient as it may requires multiple kmalloc/kfree. The initialization vector passed in cryption request is allocated on stack. This is a problem since the stack memory is not dma-able from crypto accelerators. Doing one combined memory allocation for each decryption request fixes both the above issues. It also paves a way to be able to submit multiple async decryption requests while the previous one is pending i.e. being processed or queued. ==================== Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ipv6/af_inet6.c')
0 files changed, 0 insertions, 0 deletions