As it turns out, the AVX2 multibuffer SHA routines are currently
broken [0], in a way that would have likely been noticed if this
code were in wide use. Since the code is too complicated to be
maintained by anyone except the original authors, and since the
performance benefits for real-world use cases are debatable to
begin with, it is better to drop it entirely for the moment.
[0] https://marc.info/?l=linux-crypto-vger&m=153476243825350&w=2
Suggested-by: Eric Biggers <[email protected]>
Cc: Megha Dey <[email protected]>
Cc: Tim Chen <[email protected]>
Cc: Geert Uytterhoeven <[email protected]>
Cc: Martin Schwidefsky <[email protected]>
Cc: Heiko Carstens <[email protected]>
Cc: Thomas Gleixner <[email protected]>
Cc: Ingo Molnar <[email protected]>
Signed-off-by: Ard Biesheuvel <[email protected]>
---
MAINTAINERS | 8 -
arch/m68k/configs/amiga_defconfig | 1 -
arch/m68k/configs/apollo_defconfig | 1 -
arch/m68k/configs/atari_defconfig | 1 -
arch/m68k/configs/bvme6000_defconfig | 1 -
arch/m68k/configs/hp300_defconfig | 1 -
arch/m68k/configs/mac_defconfig | 1 -
arch/m68k/configs/multi_defconfig | 1 -
arch/m68k/configs/mvme147_defconfig | 1 -
arch/m68k/configs/mvme16x_defconfig | 1 -
arch/m68k/configs/q40_defconfig | 1 -
arch/m68k/configs/sun3_defconfig | 1 -
arch/m68k/configs/sun3x_defconfig | 1 -
arch/s390/configs/debug_defconfig | 1 -
arch/s390/configs/performance_defconfig | 1 -
arch/x86/crypto/Makefile | 3 -
arch/x86/crypto/sha1-mb/Makefile | 14 -
arch/x86/crypto/sha1-mb/sha1_mb.c | 1011 ----------------
arch/x86/crypto/sha1-mb/sha1_mb_ctx.h | 134 ---
arch/x86/crypto/sha1-mb/sha1_mb_mgr.h | 110 --
.../crypto/sha1-mb/sha1_mb_mgr_datastruct.S | 287 -----
.../crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S | 304 -----
.../crypto/sha1-mb/sha1_mb_mgr_init_avx2.c | 64 -
.../crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S | 209 ----
arch/x86/crypto/sha1-mb/sha1_x8_avx2.S | 492 --------
arch/x86/crypto/sha256-mb/Makefile | 14 -
arch/x86/crypto/sha256-mb/sha256_mb.c | 1013 ----------------
arch/x86/crypto/sha256-mb/sha256_mb_ctx.h | 134 ---
arch/x86/crypto/sha256-mb/sha256_mb_mgr.h | 108 --
.../sha256-mb/sha256_mb_mgr_datastruct.S | 304 -----
.../sha256-mb/sha256_mb_mgr_flush_avx2.S | 307 -----
.../sha256-mb/sha256_mb_mgr_init_avx2.c | 65 -
.../sha256-mb/sha256_mb_mgr_submit_avx2.S | 214 ----
arch/x86/crypto/sha256-mb/sha256_x8_avx2.S | 598 ----------
arch/x86/crypto/sha512-mb/Makefile | 12 -
arch/x86/crypto/sha512-mb/sha512_mb.c | 1047 -----------------
arch/x86/crypto/sha512-mb/sha512_mb_ctx.h | 128 --
arch/x86/crypto/sha512-mb/sha512_mb_mgr.h | 104 --
.../sha512-mb/sha512_mb_mgr_datastruct.S | 281 -----
.../sha512-mb/sha512_mb_mgr_flush_avx2.S | 297 -----
.../sha512-mb/sha512_mb_mgr_init_avx2.c | 69 --
.../sha512-mb/sha512_mb_mgr_submit_avx2.S | 224 ----
arch/x86/crypto/sha512-mb/sha512_x4_avx2.S | 531 ---------
crypto/Kconfig | 62 -
crypto/Makefile | 1 -
crypto/mcryptd.c | 675 -----------
include/crypto/mcryptd.h | 114 --
47 files changed, 8952 deletions(-)
delete mode 100644 arch/x86/crypto/sha1-mb/Makefile
delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb.c
delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_ctx.h
delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr.h
delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S
delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S
delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c
delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S
delete mode 100644 arch/x86/crypto/sha1-mb/sha1_x8_avx2.S
delete mode 100644 arch/x86/crypto/sha256-mb/Makefile
delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb.c
delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_ctx.h
delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr.h
delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S
delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S
delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c
delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S
delete mode 100644 arch/x86/crypto/sha256-mb/sha256_x8_avx2.S
delete mode 100644 arch/x86/crypto/sha512-mb/Makefile
delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb.c
delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_ctx.h
delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr.h
delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S
delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S
delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c
delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S
delete mode 100644 arch/x86/crypto/sha512-mb/sha512_x4_avx2.S
delete mode 100644 crypto/mcryptd.c
delete mode 100644 include/crypto/mcryptd.h
diff --git a/MAINTAINERS b/MAINTAINERS
index 24b200d91b30..05747b8ac88e 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -7487,14 +7487,6 @@ S: Supported
F: drivers/infiniband/hw/i40iw/
F: include/uapi/rdma/i40iw-abi.h
-INTEL SHA MULTIBUFFER DRIVER
-M: Megha Dey <[email protected]>
-R: Tim Chen <[email protected]>
-L: [email protected]
-S: Supported
-F: arch/x86/crypto/sha*-mb/
-F: crypto/mcryptd.c
-
INTEL TELEMETRY DRIVER
M: Souvik Kumar Chakravarty <[email protected]>
L: [email protected]
diff --git a/arch/m68k/configs/amiga_defconfig b/arch/m68k/configs/amiga_defconfig
index 1d5483f6e457..70b10d712624 100644
--- a/arch/m68k/configs/amiga_defconfig
+++ b/arch/m68k/configs/amiga_defconfig
@@ -621,7 +621,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/m68k/configs/apollo_defconfig b/arch/m68k/configs/apollo_defconfig
index 52a0af127951..211eec5859e8 100644
--- a/arch/m68k/configs/apollo_defconfig
+++ b/arch/m68k/configs/apollo_defconfig
@@ -578,7 +578,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/m68k/configs/atari_defconfig b/arch/m68k/configs/atari_defconfig
index b3103e51268a..0da45c6084f7 100644
--- a/arch/m68k/configs/atari_defconfig
+++ b/arch/m68k/configs/atari_defconfig
@@ -599,7 +599,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/m68k/configs/bvme6000_defconfig b/arch/m68k/configs/bvme6000_defconfig
index fb7d651a4cab..c09ae7219416 100644
--- a/arch/m68k/configs/bvme6000_defconfig
+++ b/arch/m68k/configs/bvme6000_defconfig
@@ -570,7 +570,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/m68k/configs/hp300_defconfig b/arch/m68k/configs/hp300_defconfig
index 6b37f5537c39..8c4775b30748 100644
--- a/arch/m68k/configs/hp300_defconfig
+++ b/arch/m68k/configs/hp300_defconfig
@@ -580,7 +580,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/m68k/configs/mac_defconfig b/arch/m68k/configs/mac_defconfig
index c717bf879449..48ad520e2f2d 100644
--- a/arch/m68k/configs/mac_defconfig
+++ b/arch/m68k/configs/mac_defconfig
@@ -602,7 +602,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/m68k/configs/multi_defconfig b/arch/m68k/configs/multi_defconfig
index 226c994ce794..3a3cccb9f625 100644
--- a/arch/m68k/configs/multi_defconfig
+++ b/arch/m68k/configs/multi_defconfig
@@ -684,7 +684,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/m68k/configs/mvme147_defconfig b/arch/m68k/configs/mvme147_defconfig
index b383327fd77a..63dc311f94ff 100644
--- a/arch/m68k/configs/mvme147_defconfig
+++ b/arch/m68k/configs/mvme147_defconfig
@@ -570,7 +570,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/m68k/configs/mvme16x_defconfig b/arch/m68k/configs/mvme16x_defconfig
index 9783d3deb9e9..1ae39d1f9bb5 100644
--- a/arch/m68k/configs/mvme16x_defconfig
+++ b/arch/m68k/configs/mvme16x_defconfig
@@ -570,7 +570,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/m68k/configs/q40_defconfig b/arch/m68k/configs/q40_defconfig
index a35d10ee10cb..ba2f351811da 100644
--- a/arch/m68k/configs/q40_defconfig
+++ b/arch/m68k/configs/q40_defconfig
@@ -593,7 +593,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/m68k/configs/sun3_defconfig b/arch/m68k/configs/sun3_defconfig
index 573bf922d448..544b7475ff6a 100644
--- a/arch/m68k/configs/sun3_defconfig
+++ b/arch/m68k/configs/sun3_defconfig
@@ -571,7 +571,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/m68k/configs/sun3x_defconfig b/arch/m68k/configs/sun3x_defconfig
index efb27a7fcc55..149edafbb9f9 100644
--- a/arch/m68k/configs/sun3x_defconfig
+++ b/arch/m68k/configs/sun3x_defconfig
@@ -572,7 +572,6 @@ CONFIG_CRYPTO_ECDH=m
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_USER=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_AEGIS128=m
diff --git a/arch/s390/configs/debug_defconfig b/arch/s390/configs/debug_defconfig
index 941d8cc6c9f5..259d1698ac50 100644
--- a/arch/s390/configs/debug_defconfig
+++ b/arch/s390/configs/debug_defconfig
@@ -668,7 +668,6 @@ CONFIG_CRYPTO_USER=m
# CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set
CONFIG_CRYPTO_PCRYPT=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_LRW=m
diff --git a/arch/s390/configs/performance_defconfig b/arch/s390/configs/performance_defconfig
index eb6f75f24208..37fd60c20e22 100644
--- a/arch/s390/configs/performance_defconfig
+++ b/arch/s390/configs/performance_defconfig
@@ -610,7 +610,6 @@ CONFIG_CRYPTO_USER=m
# CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set
CONFIG_CRYPTO_PCRYPT=m
CONFIG_CRYPTO_CRYPTD=m
-CONFIG_CRYPTO_MCRYPTD=m
CONFIG_CRYPTO_TEST=m
CONFIG_CRYPTO_CHACHA20POLY1305=m
CONFIG_CRYPTO_LRW=m
diff --git a/arch/x86/crypto/Makefile b/arch/x86/crypto/Makefile
index a450ad573dcb..9edfa5469f9f 100644
--- a/arch/x86/crypto/Makefile
+++ b/arch/x86/crypto/Makefile
@@ -60,9 +60,6 @@ endif
ifeq ($(avx2_supported),yes)
obj-$(CONFIG_CRYPTO_CAMELLIA_AESNI_AVX2_X86_64) += camellia-aesni-avx2.o
obj-$(CONFIG_CRYPTO_SERPENT_AVX2_X86_64) += serpent-avx2.o
- obj-$(CONFIG_CRYPTO_SHA1_MB) += sha1-mb/
- obj-$(CONFIG_CRYPTO_SHA256_MB) += sha256-mb/
- obj-$(CONFIG_CRYPTO_SHA512_MB) += sha512-mb/
obj-$(CONFIG_CRYPTO_MORUS1280_AVX2) += morus1280-avx2.o
endif
diff --git a/arch/x86/crypto/sha1-mb/Makefile b/arch/x86/crypto/sha1-mb/Makefile
deleted file mode 100644
index 815ded3ba90e..000000000000
--- a/arch/x86/crypto/sha1-mb/Makefile
+++ /dev/null
@@ -1,14 +0,0 @@
-# SPDX-License-Identifier: GPL-2.0
-#
-# Arch-specific CryptoAPI modules.
-#
-
-OBJECT_FILES_NON_STANDARD := y
-
-avx2_supported := $(call as-instr,vpgatherdd %ymm0$(comma)(%eax$(comma)%ymm1\
- $(comma)4)$(comma)%ymm2,yes,no)
-ifeq ($(avx2_supported),yes)
- obj-$(CONFIG_CRYPTO_SHA1_MB) += sha1-mb.o
- sha1-mb-y := sha1_mb.o sha1_mb_mgr_flush_avx2.o \
- sha1_mb_mgr_init_avx2.o sha1_mb_mgr_submit_avx2.o sha1_x8_avx2.o
-endif
diff --git a/arch/x86/crypto/sha1-mb/sha1_mb.c b/arch/x86/crypto/sha1-mb/sha1_mb.c
deleted file mode 100644
index b93805664c1d..000000000000
--- a/arch/x86/crypto/sha1-mb/sha1_mb.c
+++ /dev/null
@@ -1,1011 +0,0 @@
-/*
- * Multi buffer SHA1 algorithm Glue Code
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Tim Chen <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
-
-#include <crypto/internal/hash.h>
-#include <linux/init.h>
-#include <linux/module.h>
-#include <linux/mm.h>
-#include <linux/cryptohash.h>
-#include <linux/types.h>
-#include <linux/list.h>
-#include <crypto/scatterwalk.h>
-#include <crypto/sha.h>
-#include <crypto/mcryptd.h>
-#include <crypto/crypto_wq.h>
-#include <asm/byteorder.h>
-#include <linux/hardirq.h>
-#include <asm/fpu/api.h>
-#include "sha1_mb_ctx.h"
-
-#define FLUSH_INTERVAL 1000 /* in usec */
-
-static struct mcryptd_alg_state sha1_mb_alg_state;
-
-struct sha1_mb_ctx {
- struct mcryptd_ahash *mcryptd_tfm;
-};
-
-static inline struct mcryptd_hash_request_ctx
- *cast_hash_to_mcryptd_ctx(struct sha1_hash_ctx *hash_ctx)
-{
- struct ahash_request *areq;
-
- areq = container_of((void *) hash_ctx, struct ahash_request, __ctx);
- return container_of(areq, struct mcryptd_hash_request_ctx, areq);
-}
-
-static inline struct ahash_request
- *cast_mcryptd_ctx_to_req(struct mcryptd_hash_request_ctx *ctx)
-{
- return container_of((void *) ctx, struct ahash_request, __ctx);
-}
-
-static void req_ctx_init(struct mcryptd_hash_request_ctx *rctx,
- struct ahash_request *areq)
-{
- rctx->flag = HASH_UPDATE;
-}
-
-static asmlinkage void (*sha1_job_mgr_init)(struct sha1_mb_mgr *state);
-static asmlinkage struct job_sha1* (*sha1_job_mgr_submit)
- (struct sha1_mb_mgr *state, struct job_sha1 *job);
-static asmlinkage struct job_sha1* (*sha1_job_mgr_flush)
- (struct sha1_mb_mgr *state);
-static asmlinkage struct job_sha1* (*sha1_job_mgr_get_comp_job)
- (struct sha1_mb_mgr *state);
-
-static inline uint32_t sha1_pad(uint8_t padblock[SHA1_BLOCK_SIZE * 2],
- uint64_t total_len)
-{
- uint32_t i = total_len & (SHA1_BLOCK_SIZE - 1);
-
- memset(&padblock[i], 0, SHA1_BLOCK_SIZE);
- padblock[i] = 0x80;
-
- i += ((SHA1_BLOCK_SIZE - 1) &
- (0 - (total_len + SHA1_PADLENGTHFIELD_SIZE + 1)))
- + 1 + SHA1_PADLENGTHFIELD_SIZE;
-
-#if SHA1_PADLENGTHFIELD_SIZE == 16
- *((uint64_t *) &padblock[i - 16]) = 0;
-#endif
-
- *((uint64_t *) &padblock[i - 8]) = cpu_to_be64(total_len << 3);
-
- /* Number of extra blocks to hash */
- return i >> SHA1_LOG2_BLOCK_SIZE;
-}
-
-static struct sha1_hash_ctx *sha1_ctx_mgr_resubmit(struct sha1_ctx_mgr *mgr,
- struct sha1_hash_ctx *ctx)
-{
- while (ctx) {
- if (ctx->status & HASH_CTX_STS_COMPLETE) {
- /* Clear PROCESSING bit */
- ctx->status = HASH_CTX_STS_COMPLETE;
- return ctx;
- }
-
- /*
- * If the extra blocks are empty, begin hashing what remains
- * in the user's buffer.
- */
- if (ctx->partial_block_buffer_length == 0 &&
- ctx->incoming_buffer_length) {
-
- const void *buffer = ctx->incoming_buffer;
- uint32_t len = ctx->incoming_buffer_length;
- uint32_t copy_len;
-
- /*
- * Only entire blocks can be hashed.
- * Copy remainder to extra blocks buffer.
- */
- copy_len = len & (SHA1_BLOCK_SIZE-1);
-
- if (copy_len) {
- len -= copy_len;
- memcpy(ctx->partial_block_buffer,
- ((const char *) buffer + len),
- copy_len);
- ctx->partial_block_buffer_length = copy_len;
- }
-
- ctx->incoming_buffer_length = 0;
-
- /* len should be a multiple of the block size now */
- assert((len % SHA1_BLOCK_SIZE) == 0);
-
- /* Set len to the number of blocks to be hashed */
- len >>= SHA1_LOG2_BLOCK_SIZE;
-
- if (len) {
-
- ctx->job.buffer = (uint8_t *) buffer;
- ctx->job.len = len;
- ctx = (struct sha1_hash_ctx *)sha1_job_mgr_submit(&mgr->mgr,
- &ctx->job);
- continue;
- }
- }
-
- /*
- * If the extra blocks are not empty, then we are
- * either on the last block(s) or we need more
- * user input before continuing.
- */
- if (ctx->status & HASH_CTX_STS_LAST) {
-
- uint8_t *buf = ctx->partial_block_buffer;
- uint32_t n_extra_blocks =
- sha1_pad(buf, ctx->total_length);
-
- ctx->status = (HASH_CTX_STS_PROCESSING |
- HASH_CTX_STS_COMPLETE);
- ctx->job.buffer = buf;
- ctx->job.len = (uint32_t) n_extra_blocks;
- ctx = (struct sha1_hash_ctx *)
- sha1_job_mgr_submit(&mgr->mgr, &ctx->job);
- continue;
- }
-
- ctx->status = HASH_CTX_STS_IDLE;
- return ctx;
- }
-
- return NULL;
-}
-
-static struct sha1_hash_ctx
- *sha1_ctx_mgr_get_comp_ctx(struct sha1_ctx_mgr *mgr)
-{
- /*
- * If get_comp_job returns NULL, there are no jobs complete.
- * If get_comp_job returns a job, verify that it is safe to return to
- * the user.
- * If it is not ready, resubmit the job to finish processing.
- * If sha1_ctx_mgr_resubmit returned a job, it is ready to be returned.
- * Otherwise, all jobs currently being managed by the hash_ctx_mgr
- * still need processing.
- */
- struct sha1_hash_ctx *ctx;
-
- ctx = (struct sha1_hash_ctx *) sha1_job_mgr_get_comp_job(&mgr->mgr);
- return sha1_ctx_mgr_resubmit(mgr, ctx);
-}
-
-static void sha1_ctx_mgr_init(struct sha1_ctx_mgr *mgr)
-{
- sha1_job_mgr_init(&mgr->mgr);
-}
-
-static struct sha1_hash_ctx *sha1_ctx_mgr_submit(struct sha1_ctx_mgr *mgr,
- struct sha1_hash_ctx *ctx,
- const void *buffer,
- uint32_t len,
- int flags)
-{
- if (flags & ~(HASH_UPDATE | HASH_LAST)) {
- /* User should not pass anything other than UPDATE or LAST */
- ctx->error = HASH_CTX_ERROR_INVALID_FLAGS;
- return ctx;
- }
-
- if (ctx->status & HASH_CTX_STS_PROCESSING) {
- /* Cannot submit to a currently processing job. */
- ctx->error = HASH_CTX_ERROR_ALREADY_PROCESSING;
- return ctx;
- }
-
- if (ctx->status & HASH_CTX_STS_COMPLETE) {
- /* Cannot update a finished job. */
- ctx->error = HASH_CTX_ERROR_ALREADY_COMPLETED;
- return ctx;
- }
-
- /*
- * If we made it here, there were no errors during this call to
- * submit
- */
- ctx->error = HASH_CTX_ERROR_NONE;
-
- /* Store buffer ptr info from user */
- ctx->incoming_buffer = buffer;
- ctx->incoming_buffer_length = len;
-
- /*
- * Store the user's request flags and mark this ctx as currently
- * being processed.
- */
- ctx->status = (flags & HASH_LAST) ?
- (HASH_CTX_STS_PROCESSING | HASH_CTX_STS_LAST) :
- HASH_CTX_STS_PROCESSING;
-
- /* Advance byte counter */
- ctx->total_length += len;
-
- /*
- * If there is anything currently buffered in the extra blocks,
- * append to it until it contains a whole block.
- * Or if the user's buffer contains less than a whole block,
- * append as much as possible to the extra block.
- */
- if (ctx->partial_block_buffer_length || len < SHA1_BLOCK_SIZE) {
- /*
- * Compute how many bytes to copy from user buffer into
- * extra block
- */
- uint32_t copy_len = SHA1_BLOCK_SIZE -
- ctx->partial_block_buffer_length;
- if (len < copy_len)
- copy_len = len;
-
- if (copy_len) {
- /* Copy and update relevant pointers and counters */
- memcpy(&ctx->partial_block_buffer[ctx->partial_block_buffer_length],
- buffer, copy_len);
-
- ctx->partial_block_buffer_length += copy_len;
- ctx->incoming_buffer = (const void *)
- ((const char *)buffer + copy_len);
- ctx->incoming_buffer_length = len - copy_len;
- }
-
- /*
- * The extra block should never contain more than 1 block
- * here
- */
- assert(ctx->partial_block_buffer_length <= SHA1_BLOCK_SIZE);
-
- /*
- * If the extra block buffer contains exactly 1 block, it can
- * be hashed.
- */
- if (ctx->partial_block_buffer_length >= SHA1_BLOCK_SIZE) {
- ctx->partial_block_buffer_length = 0;
-
- ctx->job.buffer = ctx->partial_block_buffer;
- ctx->job.len = 1;
- ctx = (struct sha1_hash_ctx *)
- sha1_job_mgr_submit(&mgr->mgr, &ctx->job);
- }
- }
-
- return sha1_ctx_mgr_resubmit(mgr, ctx);
-}
-
-static struct sha1_hash_ctx *sha1_ctx_mgr_flush(struct sha1_ctx_mgr *mgr)
-{
- struct sha1_hash_ctx *ctx;
-
- while (1) {
- ctx = (struct sha1_hash_ctx *) sha1_job_mgr_flush(&mgr->mgr);
-
- /* If flush returned 0, there are no more jobs in flight. */
- if (!ctx)
- return NULL;
-
- /*
- * If flush returned a job, resubmit the job to finish
- * processing.
- */
- ctx = sha1_ctx_mgr_resubmit(mgr, ctx);
-
- /*
- * If sha1_ctx_mgr_resubmit returned a job, it is ready to be
- * returned. Otherwise, all jobs currently being managed by the
- * sha1_ctx_mgr still need processing. Loop.
- */
- if (ctx)
- return ctx;
- }
-}
-
-static int sha1_mb_init(struct ahash_request *areq)
-{
- struct sha1_hash_ctx *sctx = ahash_request_ctx(areq);
-
- hash_ctx_init(sctx);
- sctx->job.result_digest[0] = SHA1_H0;
- sctx->job.result_digest[1] = SHA1_H1;
- sctx->job.result_digest[2] = SHA1_H2;
- sctx->job.result_digest[3] = SHA1_H3;
- sctx->job.result_digest[4] = SHA1_H4;
- sctx->total_length = 0;
- sctx->partial_block_buffer_length = 0;
- sctx->status = HASH_CTX_STS_IDLE;
-
- return 0;
-}
-
-static int sha1_mb_set_results(struct mcryptd_hash_request_ctx *rctx)
-{
- int i;
- struct sha1_hash_ctx *sctx = ahash_request_ctx(&rctx->areq);
- __be32 *dst = (__be32 *) rctx->out;
-
- for (i = 0; i < 5; ++i)
- dst[i] = cpu_to_be32(sctx->job.result_digest[i]);
-
- return 0;
-}
-
-static int sha_finish_walk(struct mcryptd_hash_request_ctx **ret_rctx,
- struct mcryptd_alg_cstate *cstate, bool flush)
-{
- int flag = HASH_UPDATE;
- int nbytes, err = 0;
- struct mcryptd_hash_request_ctx *rctx = *ret_rctx;
- struct sha1_hash_ctx *sha_ctx;
-
- /* more work ? */
- while (!(rctx->flag & HASH_DONE)) {
- nbytes = crypto_ahash_walk_done(&rctx->walk, 0);
- if (nbytes < 0) {
- err = nbytes;
- goto out;
- }
- /* check if the walk is done */
- if (crypto_ahash_walk_last(&rctx->walk)) {
- rctx->flag |= HASH_DONE;
- if (rctx->flag & HASH_FINAL)
- flag |= HASH_LAST;
-
- }
- sha_ctx = (struct sha1_hash_ctx *)
- ahash_request_ctx(&rctx->areq);
- kernel_fpu_begin();
- sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx,
- rctx->walk.data, nbytes, flag);
- if (!sha_ctx) {
- if (flush)
- sha_ctx = sha1_ctx_mgr_flush(cstate->mgr);
- }
- kernel_fpu_end();
- if (sha_ctx)
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- else {
- rctx = NULL;
- goto out;
- }
- }
-
- /* copy the results */
- if (rctx->flag & HASH_FINAL)
- sha1_mb_set_results(rctx);
-
-out:
- *ret_rctx = rctx;
- return err;
-}
-
-static int sha_complete_job(struct mcryptd_hash_request_ctx *rctx,
- struct mcryptd_alg_cstate *cstate,
- int err)
-{
- struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
- struct sha1_hash_ctx *sha_ctx;
- struct mcryptd_hash_request_ctx *req_ctx;
- int ret;
-
- /* remove from work list */
- spin_lock(&cstate->work_lock);
- list_del(&rctx->waiter);
- spin_unlock(&cstate->work_lock);
-
- if (irqs_disabled())
- rctx->complete(&req->base, err);
- else {
- local_bh_disable();
- rctx->complete(&req->base, err);
- local_bh_enable();
- }
-
- /* check to see if there are other jobs that are done */
- sha_ctx = sha1_ctx_mgr_get_comp_ctx(cstate->mgr);
- while (sha_ctx) {
- req_ctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&req_ctx, cstate, false);
- if (req_ctx) {
- spin_lock(&cstate->work_lock);
- list_del(&req_ctx->waiter);
- spin_unlock(&cstate->work_lock);
-
- req = cast_mcryptd_ctx_to_req(req_ctx);
- if (irqs_disabled())
- req_ctx->complete(&req->base, ret);
- else {
- local_bh_disable();
- req_ctx->complete(&req->base, ret);
- local_bh_enable();
- }
- }
- sha_ctx = sha1_ctx_mgr_get_comp_ctx(cstate->mgr);
- }
-
- return 0;
-}
-
-static void sha1_mb_add_list(struct mcryptd_hash_request_ctx *rctx,
- struct mcryptd_alg_cstate *cstate)
-{
- unsigned long next_flush;
- unsigned long delay = usecs_to_jiffies(FLUSH_INTERVAL);
-
- /* initialize tag */
- rctx->tag.arrival = jiffies; /* tag the arrival time */
- rctx->tag.seq_num = cstate->next_seq_num++;
- next_flush = rctx->tag.arrival + delay;
- rctx->tag.expire = next_flush;
-
- spin_lock(&cstate->work_lock);
- list_add_tail(&rctx->waiter, &cstate->work_list);
- spin_unlock(&cstate->work_lock);
-
- mcryptd_arm_flusher(cstate, delay);
-}
-
-static int sha1_mb_update(struct ahash_request *areq)
-{
- struct mcryptd_hash_request_ctx *rctx =
- container_of(areq, struct mcryptd_hash_request_ctx, areq);
- struct mcryptd_alg_cstate *cstate =
- this_cpu_ptr(sha1_mb_alg_state.alg_cstate);
-
- struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
- struct sha1_hash_ctx *sha_ctx;
- int ret = 0, nbytes;
-
-
- /* sanity check */
- if (rctx->tag.cpu != smp_processor_id()) {
- pr_err("mcryptd error: cpu clash\n");
- goto done;
- }
-
- /* need to init context */
- req_ctx_init(rctx, areq);
-
- nbytes = crypto_ahash_walk_first(req, &rctx->walk);
-
- if (nbytes < 0) {
- ret = nbytes;
- goto done;
- }
-
- if (crypto_ahash_walk_last(&rctx->walk))
- rctx->flag |= HASH_DONE;
-
- /* submit */
- sha_ctx = (struct sha1_hash_ctx *) ahash_request_ctx(areq);
- sha1_mb_add_list(rctx, cstate);
- kernel_fpu_begin();
- sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
- nbytes, HASH_UPDATE);
- kernel_fpu_end();
-
- /* check if anything is returned */
- if (!sha_ctx)
- return -EINPROGRESS;
-
- if (sha_ctx->error) {
- ret = sha_ctx->error;
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- goto done;
- }
-
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&rctx, cstate, false);
-
- if (!rctx)
- return -EINPROGRESS;
-done:
- sha_complete_job(rctx, cstate, ret);
- return ret;
-}
-
-static int sha1_mb_finup(struct ahash_request *areq)
-{
- struct mcryptd_hash_request_ctx *rctx =
- container_of(areq, struct mcryptd_hash_request_ctx, areq);
- struct mcryptd_alg_cstate *cstate =
- this_cpu_ptr(sha1_mb_alg_state.alg_cstate);
-
- struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
- struct sha1_hash_ctx *sha_ctx;
- int ret = 0, flag = HASH_UPDATE, nbytes;
-
- /* sanity check */
- if (rctx->tag.cpu != smp_processor_id()) {
- pr_err("mcryptd error: cpu clash\n");
- goto done;
- }
-
- /* need to init context */
- req_ctx_init(rctx, areq);
-
- nbytes = crypto_ahash_walk_first(req, &rctx->walk);
-
- if (nbytes < 0) {
- ret = nbytes;
- goto done;
- }
-
- if (crypto_ahash_walk_last(&rctx->walk)) {
- rctx->flag |= HASH_DONE;
- flag = HASH_LAST;
- }
-
- /* submit */
- rctx->flag |= HASH_FINAL;
- sha_ctx = (struct sha1_hash_ctx *) ahash_request_ctx(areq);
- sha1_mb_add_list(rctx, cstate);
-
- kernel_fpu_begin();
- sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
- nbytes, flag);
- kernel_fpu_end();
-
- /* check if anything is returned */
- if (!sha_ctx)
- return -EINPROGRESS;
-
- if (sha_ctx->error) {
- ret = sha_ctx->error;
- goto done;
- }
-
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&rctx, cstate, false);
- if (!rctx)
- return -EINPROGRESS;
-done:
- sha_complete_job(rctx, cstate, ret);
- return ret;
-}
-
-static int sha1_mb_final(struct ahash_request *areq)
-{
- struct mcryptd_hash_request_ctx *rctx =
- container_of(areq, struct mcryptd_hash_request_ctx, areq);
- struct mcryptd_alg_cstate *cstate =
- this_cpu_ptr(sha1_mb_alg_state.alg_cstate);
-
- struct sha1_hash_ctx *sha_ctx;
- int ret = 0;
- u8 data;
-
- /* sanity check */
- if (rctx->tag.cpu != smp_processor_id()) {
- pr_err("mcryptd error: cpu clash\n");
- goto done;
- }
-
- /* need to init context */
- req_ctx_init(rctx, areq);
-
- rctx->flag |= HASH_DONE | HASH_FINAL;
-
- sha_ctx = (struct sha1_hash_ctx *) ahash_request_ctx(areq);
- /* flag HASH_FINAL and 0 data size */
- sha1_mb_add_list(rctx, cstate);
- kernel_fpu_begin();
- sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx, &data, 0,
- HASH_LAST);
- kernel_fpu_end();
-
- /* check if anything is returned */
- if (!sha_ctx)
- return -EINPROGRESS;
-
- if (sha_ctx->error) {
- ret = sha_ctx->error;
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- goto done;
- }
-
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&rctx, cstate, false);
- if (!rctx)
- return -EINPROGRESS;
-done:
- sha_complete_job(rctx, cstate, ret);
- return ret;
-}
-
-static int sha1_mb_export(struct ahash_request *areq, void *out)
-{
- struct sha1_hash_ctx *sctx = ahash_request_ctx(areq);
-
- memcpy(out, sctx, sizeof(*sctx));
-
- return 0;
-}
-
-static int sha1_mb_import(struct ahash_request *areq, const void *in)
-{
- struct sha1_hash_ctx *sctx = ahash_request_ctx(areq);
-
- memcpy(sctx, in, sizeof(*sctx));
-
- return 0;
-}
-
-static int sha1_mb_async_init_tfm(struct crypto_tfm *tfm)
-{
- struct mcryptd_ahash *mcryptd_tfm;
- struct sha1_mb_ctx *ctx = crypto_tfm_ctx(tfm);
- struct mcryptd_hash_ctx *mctx;
-
- mcryptd_tfm = mcryptd_alloc_ahash("__intel_sha1-mb",
- CRYPTO_ALG_INTERNAL,
- CRYPTO_ALG_INTERNAL);
- if (IS_ERR(mcryptd_tfm))
- return PTR_ERR(mcryptd_tfm);
- mctx = crypto_ahash_ctx(&mcryptd_tfm->base);
- mctx->alg_state = &sha1_mb_alg_state;
- ctx->mcryptd_tfm = mcryptd_tfm;
- crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
- sizeof(struct ahash_request) +
- crypto_ahash_reqsize(&mcryptd_tfm->base));
-
- return 0;
-}
-
-static void sha1_mb_async_exit_tfm(struct crypto_tfm *tfm)
-{
- struct sha1_mb_ctx *ctx = crypto_tfm_ctx(tfm);
-
- mcryptd_free_ahash(ctx->mcryptd_tfm);
-}
-
-static int sha1_mb_areq_init_tfm(struct crypto_tfm *tfm)
-{
- crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
- sizeof(struct ahash_request) +
- sizeof(struct sha1_hash_ctx));
-
- return 0;
-}
-
-static void sha1_mb_areq_exit_tfm(struct crypto_tfm *tfm)
-{
- struct sha1_mb_ctx *ctx = crypto_tfm_ctx(tfm);
-
- mcryptd_free_ahash(ctx->mcryptd_tfm);
-}
-
-static struct ahash_alg sha1_mb_areq_alg = {
- .init = sha1_mb_init,
- .update = sha1_mb_update,
- .final = sha1_mb_final,
- .finup = sha1_mb_finup,
- .export = sha1_mb_export,
- .import = sha1_mb_import,
- .halg = {
- .digestsize = SHA1_DIGEST_SIZE,
- .statesize = sizeof(struct sha1_hash_ctx),
- .base = {
- .cra_name = "__sha1-mb",
- .cra_driver_name = "__intel_sha1-mb",
- .cra_priority = 100,
- /*
- * use ASYNC flag as some buffers in multi-buffer
- * algo may not have completed before hashing thread
- * sleep
- */
- .cra_flags = CRYPTO_ALG_ASYNC |
- CRYPTO_ALG_INTERNAL,
- .cra_blocksize = SHA1_BLOCK_SIZE,
- .cra_module = THIS_MODULE,
- .cra_list = LIST_HEAD_INIT
- (sha1_mb_areq_alg.halg.base.cra_list),
- .cra_init = sha1_mb_areq_init_tfm,
- .cra_exit = sha1_mb_areq_exit_tfm,
- .cra_ctxsize = sizeof(struct sha1_hash_ctx),
- }
- }
-};
-
-static int sha1_mb_async_init(struct ahash_request *req)
-{
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_init(mcryptd_req);
-}
-
-static int sha1_mb_async_update(struct ahash_request *req)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
-
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_update(mcryptd_req);
-}
-
-static int sha1_mb_async_finup(struct ahash_request *req)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
-
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_finup(mcryptd_req);
-}
-
-static int sha1_mb_async_final(struct ahash_request *req)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
-
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_final(mcryptd_req);
-}
-
-static int sha1_mb_async_digest(struct ahash_request *req)
-{
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_digest(mcryptd_req);
-}
-
-static int sha1_mb_async_export(struct ahash_request *req, void *out)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_export(mcryptd_req, out);
-}
-
-static int sha1_mb_async_import(struct ahash_request *req, const void *in)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
- struct crypto_ahash *child = mcryptd_ahash_child(mcryptd_tfm);
- struct mcryptd_hash_request_ctx *rctx;
- struct ahash_request *areq;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- rctx = ahash_request_ctx(mcryptd_req);
- areq = &rctx->areq;
-
- ahash_request_set_tfm(areq, child);
- ahash_request_set_callback(areq, CRYPTO_TFM_REQ_MAY_SLEEP,
- rctx->complete, req);
-
- return crypto_ahash_import(mcryptd_req, in);
-}
-
-static struct ahash_alg sha1_mb_async_alg = {
- .init = sha1_mb_async_init,
- .update = sha1_mb_async_update,
- .final = sha1_mb_async_final,
- .finup = sha1_mb_async_finup,
- .digest = sha1_mb_async_digest,
- .export = sha1_mb_async_export,
- .import = sha1_mb_async_import,
- .halg = {
- .digestsize = SHA1_DIGEST_SIZE,
- .statesize = sizeof(struct sha1_hash_ctx),
- .base = {
- .cra_name = "sha1",
- .cra_driver_name = "sha1_mb",
- /*
- * Low priority, since with few concurrent hash requests
- * this is extremely slow due to the flush delay. Users
- * whose workloads would benefit from this can request
- * it explicitly by driver name, or can increase its
- * priority at runtime using NETLINK_CRYPTO.
- */
- .cra_priority = 50,
- .cra_flags = CRYPTO_ALG_ASYNC,
- .cra_blocksize = SHA1_BLOCK_SIZE,
- .cra_module = THIS_MODULE,
- .cra_list = LIST_HEAD_INIT(sha1_mb_async_alg.halg.base.cra_list),
- .cra_init = sha1_mb_async_init_tfm,
- .cra_exit = sha1_mb_async_exit_tfm,
- .cra_ctxsize = sizeof(struct sha1_mb_ctx),
- .cra_alignmask = 0,
- },
- },
-};
-
-static unsigned long sha1_mb_flusher(struct mcryptd_alg_cstate *cstate)
-{
- struct mcryptd_hash_request_ctx *rctx;
- unsigned long cur_time;
- unsigned long next_flush = 0;
- struct sha1_hash_ctx *sha_ctx;
-
-
- cur_time = jiffies;
-
- while (!list_empty(&cstate->work_list)) {
- rctx = list_entry(cstate->work_list.next,
- struct mcryptd_hash_request_ctx, waiter);
- if (time_before(cur_time, rctx->tag.expire))
- break;
- kernel_fpu_begin();
- sha_ctx = (struct sha1_hash_ctx *)
- sha1_ctx_mgr_flush(cstate->mgr);
- kernel_fpu_end();
- if (!sha_ctx) {
- pr_err("sha1_mb error: nothing got flushed for non-empty list\n");
- break;
- }
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- sha_finish_walk(&rctx, cstate, true);
- sha_complete_job(rctx, cstate, 0);
- }
-
- if (!list_empty(&cstate->work_list)) {
- rctx = list_entry(cstate->work_list.next,
- struct mcryptd_hash_request_ctx, waiter);
- /* get the hash context and then flush time */
- next_flush = rctx->tag.expire;
- mcryptd_arm_flusher(cstate, get_delay(next_flush));
- }
- return next_flush;
-}
-
-static int __init sha1_mb_mod_init(void)
-{
-
- int cpu;
- int err;
- struct mcryptd_alg_cstate *cpu_state;
-
- /* check for dependent cpu features */
- if (!boot_cpu_has(X86_FEATURE_AVX2) ||
- !boot_cpu_has(X86_FEATURE_BMI2))
- return -ENODEV;
-
- /* initialize multibuffer structures */
- sha1_mb_alg_state.alg_cstate = alloc_percpu(struct mcryptd_alg_cstate);
-
- sha1_job_mgr_init = sha1_mb_mgr_init_avx2;
- sha1_job_mgr_submit = sha1_mb_mgr_submit_avx2;
- sha1_job_mgr_flush = sha1_mb_mgr_flush_avx2;
- sha1_job_mgr_get_comp_job = sha1_mb_mgr_get_comp_job_avx2;
-
- if (!sha1_mb_alg_state.alg_cstate)
- return -ENOMEM;
- for_each_possible_cpu(cpu) {
- cpu_state = per_cpu_ptr(sha1_mb_alg_state.alg_cstate, cpu);
- cpu_state->next_flush = 0;
- cpu_state->next_seq_num = 0;
- cpu_state->flusher_engaged = false;
- INIT_DELAYED_WORK(&cpu_state->flush, mcryptd_flusher);
- cpu_state->cpu = cpu;
- cpu_state->alg_state = &sha1_mb_alg_state;
- cpu_state->mgr = kzalloc(sizeof(struct sha1_ctx_mgr),
- GFP_KERNEL);
- if (!cpu_state->mgr)
- goto err2;
- sha1_ctx_mgr_init(cpu_state->mgr);
- INIT_LIST_HEAD(&cpu_state->work_list);
- spin_lock_init(&cpu_state->work_lock);
- }
- sha1_mb_alg_state.flusher = &sha1_mb_flusher;
-
- err = crypto_register_ahash(&sha1_mb_areq_alg);
- if (err)
- goto err2;
- err = crypto_register_ahash(&sha1_mb_async_alg);
- if (err)
- goto err1;
-
-
- return 0;
-err1:
- crypto_unregister_ahash(&sha1_mb_areq_alg);
-err2:
- for_each_possible_cpu(cpu) {
- cpu_state = per_cpu_ptr(sha1_mb_alg_state.alg_cstate, cpu);
- kfree(cpu_state->mgr);
- }
- free_percpu(sha1_mb_alg_state.alg_cstate);
- return -ENODEV;
-}
-
-static void __exit sha1_mb_mod_fini(void)
-{
- int cpu;
- struct mcryptd_alg_cstate *cpu_state;
-
- crypto_unregister_ahash(&sha1_mb_async_alg);
- crypto_unregister_ahash(&sha1_mb_areq_alg);
- for_each_possible_cpu(cpu) {
- cpu_state = per_cpu_ptr(sha1_mb_alg_state.alg_cstate, cpu);
- kfree(cpu_state->mgr);
- }
- free_percpu(sha1_mb_alg_state.alg_cstate);
-}
-
-module_init(sha1_mb_mod_init);
-module_exit(sha1_mb_mod_fini);
-
-MODULE_LICENSE("GPL");
-MODULE_DESCRIPTION("SHA1 Secure Hash Algorithm, multi buffer accelerated");
-
-MODULE_ALIAS_CRYPTO("sha1");
diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_ctx.h b/arch/x86/crypto/sha1-mb/sha1_mb_ctx.h
deleted file mode 100644
index 9454bd16f9f8..000000000000
--- a/arch/x86/crypto/sha1-mb/sha1_mb_ctx.h
+++ /dev/null
@@ -1,134 +0,0 @@
-/*
- * Header file for multi buffer SHA context
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Tim Chen <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#ifndef _SHA_MB_CTX_INTERNAL_H
-#define _SHA_MB_CTX_INTERNAL_H
-
-#include "sha1_mb_mgr.h"
-
-#define HASH_UPDATE 0x00
-#define HASH_LAST 0x01
-#define HASH_DONE 0x02
-#define HASH_FINAL 0x04
-
-#define HASH_CTX_STS_IDLE 0x00
-#define HASH_CTX_STS_PROCESSING 0x01
-#define HASH_CTX_STS_LAST 0x02
-#define HASH_CTX_STS_COMPLETE 0x04
-
-enum hash_ctx_error {
- HASH_CTX_ERROR_NONE = 0,
- HASH_CTX_ERROR_INVALID_FLAGS = -1,
- HASH_CTX_ERROR_ALREADY_PROCESSING = -2,
- HASH_CTX_ERROR_ALREADY_COMPLETED = -3,
-
-#ifdef HASH_CTX_DEBUG
- HASH_CTX_ERROR_DEBUG_DIGEST_MISMATCH = -4,
-#endif
-};
-
-
-#define hash_ctx_user_data(ctx) ((ctx)->user_data)
-#define hash_ctx_digest(ctx) ((ctx)->job.result_digest)
-#define hash_ctx_processing(ctx) ((ctx)->status & HASH_CTX_STS_PROCESSING)
-#define hash_ctx_complete(ctx) ((ctx)->status == HASH_CTX_STS_COMPLETE)
-#define hash_ctx_status(ctx) ((ctx)->status)
-#define hash_ctx_error(ctx) ((ctx)->error)
-#define hash_ctx_init(ctx) \
- do { \
- (ctx)->error = HASH_CTX_ERROR_NONE; \
- (ctx)->status = HASH_CTX_STS_COMPLETE; \
- } while (0)
-
-
-/* Hash Constants and Typedefs */
-#define SHA1_DIGEST_LENGTH 5
-#define SHA1_LOG2_BLOCK_SIZE 6
-
-#define SHA1_PADLENGTHFIELD_SIZE 8
-
-#ifdef SHA_MB_DEBUG
-#define assert(expr) \
-do { \
- if (unlikely(!(expr))) { \
- printk(KERN_ERR "Assertion failed! %s,%s,%s,line=%d\n", \
- #expr, __FILE__, __func__, __LINE__); \
- } \
-} while (0)
-#else
-#define assert(expr) do {} while (0)
-#endif
-
-struct sha1_ctx_mgr {
- struct sha1_mb_mgr mgr;
-};
-
-/* typedef struct sha1_ctx_mgr sha1_ctx_mgr; */
-
-struct sha1_hash_ctx {
- /* Must be at struct offset 0 */
- struct job_sha1 job;
- /* status flag */
- int status;
- /* error flag */
- int error;
-
- uint64_t total_length;
- const void *incoming_buffer;
- uint32_t incoming_buffer_length;
- uint8_t partial_block_buffer[SHA1_BLOCK_SIZE * 2];
- uint32_t partial_block_buffer_length;
- void *user_data;
-};
-
-#endif
diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr.h b/arch/x86/crypto/sha1-mb/sha1_mb_mgr.h
deleted file mode 100644
index 08ad1a9acfd7..000000000000
--- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr.h
+++ /dev/null
@@ -1,110 +0,0 @@
-/*
- * Header file for multi buffer SHA1 algorithm manager
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * James Guilford <[email protected]>
- * Tim Chen <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-#ifndef __SHA_MB_MGR_H
-#define __SHA_MB_MGR_H
-
-
-#include <linux/types.h>
-
-#define NUM_SHA1_DIGEST_WORDS 5
-
-enum job_sts { STS_UNKNOWN = 0,
- STS_BEING_PROCESSED = 1,
- STS_COMPLETED = 2,
- STS_INTERNAL_ERROR = 3,
- STS_ERROR = 4
-};
-
-struct job_sha1 {
- u8 *buffer;
- u32 len;
- u32 result_digest[NUM_SHA1_DIGEST_WORDS] __aligned(32);
- enum job_sts status;
- void *user_data;
-};
-
-/* SHA1 out-of-order scheduler */
-
-/* typedef uint32_t sha1_digest_array[5][8]; */
-
-struct sha1_args_x8 {
- uint32_t digest[5][8];
- uint8_t *data_ptr[8];
-};
-
-struct sha1_lane_data {
- struct job_sha1 *job_in_lane;
-};
-
-struct sha1_mb_mgr {
- struct sha1_args_x8 args;
-
- uint32_t lens[8];
-
- /* each byte is index (0...7) of unused lanes */
- uint64_t unused_lanes;
- /* byte 4 is set to FF as a flag */
- struct sha1_lane_data ldata[8];
-};
-
-
-#define SHA1_MB_MGR_NUM_LANES_AVX2 8
-
-void sha1_mb_mgr_init_avx2(struct sha1_mb_mgr *state);
-struct job_sha1 *sha1_mb_mgr_submit_avx2(struct sha1_mb_mgr *state,
- struct job_sha1 *job);
-struct job_sha1 *sha1_mb_mgr_flush_avx2(struct sha1_mb_mgr *state);
-struct job_sha1 *sha1_mb_mgr_get_comp_job_avx2(struct sha1_mb_mgr *state);
-
-#endif
diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S
deleted file mode 100644
index 86688c6e7a25..000000000000
--- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S
+++ /dev/null
@@ -1,287 +0,0 @@
-/*
- * Header file for multi buffer SHA1 algorithm data structure
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * James Guilford <[email protected]>
- * Tim Chen <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-# Macros for defining data structures
-
-# Usage example
-
-#START_FIELDS # JOB_AES
-### name size align
-#FIELD _plaintext, 8, 8 # pointer to plaintext
-#FIELD _ciphertext, 8, 8 # pointer to ciphertext
-#FIELD _IV, 16, 8 # IV
-#FIELD _keys, 8, 8 # pointer to keys
-#FIELD _len, 4, 4 # length in bytes
-#FIELD _status, 4, 4 # status enumeration
-#FIELD _user_data, 8, 8 # pointer to user data
-#UNION _union, size1, align1, \
-# size2, align2, \
-# size3, align3, \
-# ...
-#END_FIELDS
-#%assign _JOB_AES_size _FIELD_OFFSET
-#%assign _JOB_AES_align _STRUCT_ALIGN
-
-#########################################################################
-
-# Alternate "struc-like" syntax:
-# STRUCT job_aes2
-# RES_Q .plaintext, 1
-# RES_Q .ciphertext, 1
-# RES_DQ .IV, 1
-# RES_B .nested, _JOB_AES_SIZE, _JOB_AES_ALIGN
-# RES_U .union, size1, align1, \
-# size2, align2, \
-# ...
-# ENDSTRUCT
-# # Following only needed if nesting
-# %assign job_aes2_size _FIELD_OFFSET
-# %assign job_aes2_align _STRUCT_ALIGN
-#
-# RES_* macros take a name, a count and an optional alignment.
-# The count in in terms of the base size of the macro, and the
-# default alignment is the base size.
-# The macros are:
-# Macro Base size
-# RES_B 1
-# RES_W 2
-# RES_D 4
-# RES_Q 8
-# RES_DQ 16
-# RES_Y 32
-# RES_Z 64
-#
-# RES_U defines a union. It's arguments are a name and two or more
-# pairs of "size, alignment"
-#
-# The two assigns are only needed if this structure is being nested
-# within another. Even if the assigns are not done, one can still use
-# STRUCT_NAME_size as the size of the structure.
-#
-# Note that for nesting, you still need to assign to STRUCT_NAME_size.
-#
-# The differences between this and using "struc" directly are that each
-# type is implicitly aligned to its natural length (although this can be
-# over-ridden with an explicit third parameter), and that the structure
-# is padded at the end to its overall alignment.
-#
-
-#########################################################################
-
-#ifndef _SHA1_MB_MGR_DATASTRUCT_ASM_
-#define _SHA1_MB_MGR_DATASTRUCT_ASM_
-
-## START_FIELDS
-.macro START_FIELDS
- _FIELD_OFFSET = 0
- _STRUCT_ALIGN = 0
-.endm
-
-## FIELD name size align
-.macro FIELD name size align
- _FIELD_OFFSET = (_FIELD_OFFSET + (\align) - 1) & (~ ((\align)-1))
- \name = _FIELD_OFFSET
- _FIELD_OFFSET = _FIELD_OFFSET + (\size)
-.if (\align > _STRUCT_ALIGN)
- _STRUCT_ALIGN = \align
-.endif
-.endm
-
-## END_FIELDS
-.macro END_FIELDS
- _FIELD_OFFSET = (_FIELD_OFFSET + _STRUCT_ALIGN-1) & (~ (_STRUCT_ALIGN-1))
-.endm
-
-########################################################################
-
-.macro STRUCT p1
-START_FIELDS
-.struc \p1
-.endm
-
-.macro ENDSTRUCT
- tmp = _FIELD_OFFSET
- END_FIELDS
- tmp = (_FIELD_OFFSET - %%tmp)
-.if (tmp > 0)
- .lcomm tmp
-.endif
-.endstruc
-.endm
-
-## RES_int name size align
-.macro RES_int p1 p2 p3
- name = \p1
- size = \p2
- align = .\p3
-
- _FIELD_OFFSET = (_FIELD_OFFSET + (align) - 1) & (~ ((align)-1))
-.align align
-.lcomm name size
- _FIELD_OFFSET = _FIELD_OFFSET + (size)
-.if (align > _STRUCT_ALIGN)
- _STRUCT_ALIGN = align
-.endif
-.endm
-
-
-
-# macro RES_B name, size [, align]
-.macro RES_B _name, _size, _align=1
-RES_int _name _size _align
-.endm
-
-# macro RES_W name, size [, align]
-.macro RES_W _name, _size, _align=2
-RES_int _name 2*(_size) _align
-.endm
-
-# macro RES_D name, size [, align]
-.macro RES_D _name, _size, _align=4
-RES_int _name 4*(_size) _align
-.endm
-
-# macro RES_Q name, size [, align]
-.macro RES_Q _name, _size, _align=8
-RES_int _name 8*(_size) _align
-.endm
-
-# macro RES_DQ name, size [, align]
-.macro RES_DQ _name, _size, _align=16
-RES_int _name 16*(_size) _align
-.endm
-
-# macro RES_Y name, size [, align]
-.macro RES_Y _name, _size, _align=32
-RES_int _name 32*(_size) _align
-.endm
-
-# macro RES_Z name, size [, align]
-.macro RES_Z _name, _size, _align=64
-RES_int _name 64*(_size) _align
-.endm
-
-
-#endif
-
-########################################################################
-#### Define constants
-########################################################################
-
-########################################################################
-#### Define SHA1 Out Of Order Data Structures
-########################################################################
-
-START_FIELDS # LANE_DATA
-### name size align
-FIELD _job_in_lane, 8, 8 # pointer to job object
-END_FIELDS
-
-_LANE_DATA_size = _FIELD_OFFSET
-_LANE_DATA_align = _STRUCT_ALIGN
-
-########################################################################
-
-START_FIELDS # SHA1_ARGS_X8
-### name size align
-FIELD _digest, 4*5*8, 16 # transposed digest
-FIELD _data_ptr, 8*8, 8 # array of pointers to data
-END_FIELDS
-
-_SHA1_ARGS_X4_size = _FIELD_OFFSET
-_SHA1_ARGS_X4_align = _STRUCT_ALIGN
-_SHA1_ARGS_X8_size = _FIELD_OFFSET
-_SHA1_ARGS_X8_align = _STRUCT_ALIGN
-
-########################################################################
-
-START_FIELDS # MB_MGR
-### name size align
-FIELD _args, _SHA1_ARGS_X4_size, _SHA1_ARGS_X4_align
-FIELD _lens, 4*8, 8
-FIELD _unused_lanes, 8, 8
-FIELD _ldata, _LANE_DATA_size*8, _LANE_DATA_align
-END_FIELDS
-
-_MB_MGR_size = _FIELD_OFFSET
-_MB_MGR_align = _STRUCT_ALIGN
-
-_args_digest = _args + _digest
-_args_data_ptr = _args + _data_ptr
-
-
-########################################################################
-#### Define constants
-########################################################################
-
-#define STS_UNKNOWN 0
-#define STS_BEING_PROCESSED 1
-#define STS_COMPLETED 2
-
-########################################################################
-#### Define JOB_SHA1 structure
-########################################################################
-
-START_FIELDS # JOB_SHA1
-
-### name size align
-FIELD _buffer, 8, 8 # pointer to buffer
-FIELD _len, 4, 4 # length in bytes
-FIELD _result_digest, 5*4, 32 # Digest (output)
-FIELD _status, 4, 4
-FIELD _user_data, 8, 8
-END_FIELDS
-
-_JOB_SHA1_size = _FIELD_OFFSET
-_JOB_SHA1_align = _STRUCT_ALIGN
diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S
deleted file mode 100644
index 7cfba738f104..000000000000
--- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S
+++ /dev/null
@@ -1,304 +0,0 @@
-/*
- * Flush routine for SHA1 multibuffer
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * James Guilford <[email protected]>
- * Tim Chen <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-#include <linux/linkage.h>
-#include <asm/frame.h>
-#include "sha1_mb_mgr_datastruct.S"
-
-
-.extern sha1_x8_avx2
-
-# LINUX register definitions
-#define arg1 %rdi
-#define arg2 %rsi
-
-# Common definitions
-#define state arg1
-#define job arg2
-#define len2 arg2
-
-# idx must be a register not clobbered by sha1_x8_avx2
-#define idx %r8
-#define DWORD_idx %r8d
-
-#define unused_lanes %rbx
-#define lane_data %rbx
-#define tmp2 %rbx
-#define tmp2_w %ebx
-
-#define job_rax %rax
-#define tmp1 %rax
-#define size_offset %rax
-#define tmp %rax
-#define start_offset %rax
-
-#define tmp3 %arg1
-
-#define extra_blocks %arg2
-#define p %arg2
-
-.macro LABEL prefix n
-\prefix\n\():
-.endm
-
-.macro JNE_SKIP i
-jne skip_\i
-.endm
-
-.altmacro
-.macro SET_OFFSET _offset
-offset = \_offset
-.endm
-.noaltmacro
-
-# JOB* sha1_mb_mgr_flush_avx2(MB_MGR *state)
-# arg 1 : rcx : state
-ENTRY(sha1_mb_mgr_flush_avx2)
- FRAME_BEGIN
- push %rbx
-
- # If bit (32+3) is set, then all lanes are empty
- mov _unused_lanes(state), unused_lanes
- bt $32+3, unused_lanes
- jc return_null
-
- # find a lane with a non-null job
- xor idx, idx
- offset = (_ldata + 1 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne one(%rip), idx
- offset = (_ldata + 2 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne two(%rip), idx
- offset = (_ldata + 3 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne three(%rip), idx
- offset = (_ldata + 4 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne four(%rip), idx
- offset = (_ldata + 5 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne five(%rip), idx
- offset = (_ldata + 6 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne six(%rip), idx
- offset = (_ldata + 7 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne seven(%rip), idx
-
- # copy idx to empty lanes
-copy_lane_data:
- offset = (_args + _data_ptr)
- mov offset(state,idx,8), tmp
-
- I = 0
-.rep 8
- offset = (_ldata + I * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
-.altmacro
- JNE_SKIP %I
- offset = (_args + _data_ptr + 8*I)
- mov tmp, offset(state)
- offset = (_lens + 4*I)
- movl $0xFFFFFFFF, offset(state)
-LABEL skip_ %I
- I = (I+1)
-.noaltmacro
-.endr
-
- # Find min length
- vmovdqu _lens+0*16(state), %xmm0
- vmovdqu _lens+1*16(state), %xmm1
-
- vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
- vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
- vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min value in low dword
-
- vmovd %xmm2, DWORD_idx
- mov idx, len2
- and $0xF, idx
- shr $4, len2
- jz len_is_0
-
- vpand clear_low_nibble(%rip), %xmm2, %xmm2
- vpshufd $0, %xmm2, %xmm2
-
- vpsubd %xmm2, %xmm0, %xmm0
- vpsubd %xmm2, %xmm1, %xmm1
-
- vmovdqu %xmm0, _lens+0*16(state)
- vmovdqu %xmm1, _lens+1*16(state)
-
- # "state" and "args" are the same address, arg1
- # len is arg2
- call sha1_x8_avx2
- # state and idx are intact
-
-
-len_is_0:
- # process completed job "idx"
- imul $_LANE_DATA_size, idx, lane_data
- lea _ldata(state, lane_data), lane_data
-
- mov _job_in_lane(lane_data), job_rax
- movq $0, _job_in_lane(lane_data)
- movl $STS_COMPLETED, _status(job_rax)
- mov _unused_lanes(state), unused_lanes
- shl $4, unused_lanes
- or idx, unused_lanes
- mov unused_lanes, _unused_lanes(state)
-
- movl $0xFFFFFFFF, _lens(state, idx, 4)
-
- vmovd _args_digest(state , idx, 4) , %xmm0
- vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
- vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
- vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
- movl _args_digest+4*32(state, idx, 4), tmp2_w
-
- vmovdqu %xmm0, _result_digest(job_rax)
- offset = (_result_digest + 1*16)
- mov tmp2_w, offset(job_rax)
-
-return:
- pop %rbx
- FRAME_END
- ret
-
-return_null:
- xor job_rax, job_rax
- jmp return
-ENDPROC(sha1_mb_mgr_flush_avx2)
-
-
-#################################################################
-
-.align 16
-ENTRY(sha1_mb_mgr_get_comp_job_avx2)
- push %rbx
-
- ## if bit 32+3 is set, then all lanes are empty
- mov _unused_lanes(state), unused_lanes
- bt $(32+3), unused_lanes
- jc .return_null
-
- # Find min length
- vmovdqu _lens(state), %xmm0
- vmovdqu _lens+1*16(state), %xmm1
-
- vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
- vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
- vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min value in low dword
-
- vmovd %xmm2, DWORD_idx
- test $~0xF, idx
- jnz .return_null
-
- # process completed job "idx"
- imul $_LANE_DATA_size, idx, lane_data
- lea _ldata(state, lane_data), lane_data
-
- mov _job_in_lane(lane_data), job_rax
- movq $0, _job_in_lane(lane_data)
- movl $STS_COMPLETED, _status(job_rax)
- mov _unused_lanes(state), unused_lanes
- shl $4, unused_lanes
- or idx, unused_lanes
- mov unused_lanes, _unused_lanes(state)
-
- movl $0xFFFFFFFF, _lens(state, idx, 4)
-
- vmovd _args_digest(state, idx, 4), %xmm0
- vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
- vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
- vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
- movl _args_digest+4*32(state, idx, 4), tmp2_w
-
- vmovdqu %xmm0, _result_digest(job_rax)
- movl tmp2_w, _result_digest+1*16(job_rax)
-
- pop %rbx
-
- ret
-
-.return_null:
- xor job_rax, job_rax
- pop %rbx
- ret
-ENDPROC(sha1_mb_mgr_get_comp_job_avx2)
-
-.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
-.align 16
-clear_low_nibble:
-.octa 0x000000000000000000000000FFFFFFF0
-
-.section .rodata.cst8, "aM", @progbits, 8
-.align 8
-one:
-.quad 1
-two:
-.quad 2
-three:
-.quad 3
-four:
-.quad 4
-five:
-.quad 5
-six:
-.quad 6
-seven:
-.quad 7
diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c
deleted file mode 100644
index d2add0d35f43..000000000000
--- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c
+++ /dev/null
@@ -1,64 +0,0 @@
-/*
- * Initialization code for multi buffer SHA1 algorithm for AVX2
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Tim Chen <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include "sha1_mb_mgr.h"
-
-void sha1_mb_mgr_init_avx2(struct sha1_mb_mgr *state)
-{
- unsigned int j;
- state->unused_lanes = 0xF76543210ULL;
- for (j = 0; j < 8; j++) {
- state->lens[j] = 0xFFFFFFFF;
- state->ldata[j].job_in_lane = NULL;
- }
-}
diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S
deleted file mode 100644
index 7a93b1c0d69a..000000000000
--- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S
+++ /dev/null
@@ -1,209 +0,0 @@
-/*
- * Buffer submit code for multi buffer SHA1 algorithm
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * James Guilford <[email protected]>
- * Tim Chen <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include <linux/linkage.h>
-#include <asm/frame.h>
-#include "sha1_mb_mgr_datastruct.S"
-
-
-.extern sha1_x8_avx
-
-# LINUX register definitions
-arg1 = %rdi
-arg2 = %rsi
-size_offset = %rcx
-tmp2 = %rcx
-extra_blocks = %rdx
-
-# Common definitions
-#define state arg1
-#define job %rsi
-#define len2 arg2
-#define p2 arg2
-
-# idx must be a register not clobberred by sha1_x8_avx2
-idx = %r8
-DWORD_idx = %r8d
-last_len = %r8
-
-p = %r11
-start_offset = %r11
-
-unused_lanes = %rbx
-BYTE_unused_lanes = %bl
-
-job_rax = %rax
-len = %rax
-DWORD_len = %eax
-
-lane = %r12
-tmp3 = %r12
-
-tmp = %r9
-DWORD_tmp = %r9d
-
-lane_data = %r10
-
-# JOB* submit_mb_mgr_submit_avx2(MB_MGR *state, job_sha1 *job)
-# arg 1 : rcx : state
-# arg 2 : rdx : job
-ENTRY(sha1_mb_mgr_submit_avx2)
- FRAME_BEGIN
- push %rbx
- push %r12
-
- mov _unused_lanes(state), unused_lanes
- mov unused_lanes, lane
- and $0xF, lane
- shr $4, unused_lanes
- imul $_LANE_DATA_size, lane, lane_data
- movl $STS_BEING_PROCESSED, _status(job)
- lea _ldata(state, lane_data), lane_data
- mov unused_lanes, _unused_lanes(state)
- movl _len(job), DWORD_len
-
- mov job, _job_in_lane(lane_data)
- shl $4, len
- or lane, len
-
- movl DWORD_len, _lens(state , lane, 4)
-
- # Load digest words from result_digest
- vmovdqu _result_digest(job), %xmm0
- mov _result_digest+1*16(job), DWORD_tmp
- vmovd %xmm0, _args_digest(state, lane, 4)
- vpextrd $1, %xmm0, _args_digest+1*32(state , lane, 4)
- vpextrd $2, %xmm0, _args_digest+2*32(state , lane, 4)
- vpextrd $3, %xmm0, _args_digest+3*32(state , lane, 4)
- movl DWORD_tmp, _args_digest+4*32(state , lane, 4)
-
- mov _buffer(job), p
- mov p, _args_data_ptr(state, lane, 8)
-
- cmp $0xF, unused_lanes
- jne return_null
-
-start_loop:
- # Find min length
- vmovdqa _lens(state), %xmm0
- vmovdqa _lens+1*16(state), %xmm1
-
- vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
- vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
- vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min value in low dword
-
- vmovd %xmm2, DWORD_idx
- mov idx, len2
- and $0xF, idx
- shr $4, len2
- jz len_is_0
-
- vpand clear_low_nibble(%rip), %xmm2, %xmm2
- vpshufd $0, %xmm2, %xmm2
-
- vpsubd %xmm2, %xmm0, %xmm0
- vpsubd %xmm2, %xmm1, %xmm1
-
- vmovdqa %xmm0, _lens + 0*16(state)
- vmovdqa %xmm1, _lens + 1*16(state)
-
-
- # "state" and "args" are the same address, arg1
- # len is arg2
- call sha1_x8_avx2
-
- # state and idx are intact
-
-len_is_0:
- # process completed job "idx"
- imul $_LANE_DATA_size, idx, lane_data
- lea _ldata(state, lane_data), lane_data
-
- mov _job_in_lane(lane_data), job_rax
- mov _unused_lanes(state), unused_lanes
- movq $0, _job_in_lane(lane_data)
- movl $STS_COMPLETED, _status(job_rax)
- shl $4, unused_lanes
- or idx, unused_lanes
- mov unused_lanes, _unused_lanes(state)
-
- movl $0xFFFFFFFF, _lens(state, idx, 4)
-
- vmovd _args_digest(state, idx, 4), %xmm0
- vpinsrd $1, _args_digest+1*32(state , idx, 4), %xmm0, %xmm0
- vpinsrd $2, _args_digest+2*32(state , idx, 4), %xmm0, %xmm0
- vpinsrd $3, _args_digest+3*32(state , idx, 4), %xmm0, %xmm0
- movl _args_digest+4*32(state, idx, 4), DWORD_tmp
-
- vmovdqu %xmm0, _result_digest(job_rax)
- movl DWORD_tmp, _result_digest+1*16(job_rax)
-
-return:
- pop %r12
- pop %rbx
- FRAME_END
- ret
-
-return_null:
- xor job_rax, job_rax
- jmp return
-
-ENDPROC(sha1_mb_mgr_submit_avx2)
-
-.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
-.align 16
-clear_low_nibble:
- .octa 0x000000000000000000000000FFFFFFF0
diff --git a/arch/x86/crypto/sha1-mb/sha1_x8_avx2.S b/arch/x86/crypto/sha1-mb/sha1_x8_avx2.S
deleted file mode 100644
index 20f77aa633de..000000000000
--- a/arch/x86/crypto/sha1-mb/sha1_x8_avx2.S
+++ /dev/null
@@ -1,492 +0,0 @@
-/*
- * Multi-buffer SHA1 algorithm hash compute routine
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * James Guilford <[email protected]>
- * Tim Chen <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2014 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include <linux/linkage.h>
-#include "sha1_mb_mgr_datastruct.S"
-
-## code to compute oct SHA1 using SSE-256
-## outer calling routine takes care of save and restore of XMM registers
-
-## Function clobbers: rax, rcx, rdx, rbx, rsi, rdi, r9-r15# ymm0-15
-##
-## Linux clobbers: rax rbx rcx rdx rsi r9 r10 r11 r12 r13 r14 r15
-## Linux preserves: rdi rbp r8
-##
-## clobbers ymm0-15
-
-
-# TRANSPOSE8 r0, r1, r2, r3, r4, r5, r6, r7, t0, t1
-# "transpose" data in {r0...r7} using temps {t0...t1}
-# Input looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
-# r0 = {a7 a6 a5 a4 a3 a2 a1 a0}
-# r1 = {b7 b6 b5 b4 b3 b2 b1 b0}
-# r2 = {c7 c6 c5 c4 c3 c2 c1 c0}
-# r3 = {d7 d6 d5 d4 d3 d2 d1 d0}
-# r4 = {e7 e6 e5 e4 e3 e2 e1 e0}
-# r5 = {f7 f6 f5 f4 f3 f2 f1 f0}
-# r6 = {g7 g6 g5 g4 g3 g2 g1 g0}
-# r7 = {h7 h6 h5 h4 h3 h2 h1 h0}
-#
-# Output looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
-# r0 = {h0 g0 f0 e0 d0 c0 b0 a0}
-# r1 = {h1 g1 f1 e1 d1 c1 b1 a1}
-# r2 = {h2 g2 f2 e2 d2 c2 b2 a2}
-# r3 = {h3 g3 f3 e3 d3 c3 b3 a3}
-# r4 = {h4 g4 f4 e4 d4 c4 b4 a4}
-# r5 = {h5 g5 f5 e5 d5 c5 b5 a5}
-# r6 = {h6 g6 f6 e6 d6 c6 b6 a6}
-# r7 = {h7 g7 f7 e7 d7 c7 b7 a7}
-#
-
-.macro TRANSPOSE8 r0 r1 r2 r3 r4 r5 r6 r7 t0 t1
- # process top half (r0..r3) {a...d}
- vshufps $0x44, \r1, \r0, \t0 # t0 = {b5 b4 a5 a4 b1 b0 a1 a0}
- vshufps $0xEE, \r1, \r0, \r0 # r0 = {b7 b6 a7 a6 b3 b2 a3 a2}
- vshufps $0x44, \r3, \r2, \t1 # t1 = {d5 d4 c5 c4 d1 d0 c1 c0}
- vshufps $0xEE, \r3, \r2, \r2 # r2 = {d7 d6 c7 c6 d3 d2 c3 c2}
- vshufps $0xDD, \t1, \t0, \r3 # r3 = {d5 c5 b5 a5 d1 c1 b1 a1}
- vshufps $0x88, \r2, \r0, \r1 # r1 = {d6 c6 b6 a6 d2 c2 b2 a2}
- vshufps $0xDD, \r2, \r0, \r0 # r0 = {d7 c7 b7 a7 d3 c3 b3 a3}
- vshufps $0x88, \t1, \t0, \t0 # t0 = {d4 c4 b4 a4 d0 c0 b0 a0}
-
- # use r2 in place of t0
- # process bottom half (r4..r7) {e...h}
- vshufps $0x44, \r5, \r4, \r2 # r2 = {f5 f4 e5 e4 f1 f0 e1 e0}
- vshufps $0xEE, \r5, \r4, \r4 # r4 = {f7 f6 e7 e6 f3 f2 e3 e2}
- vshufps $0x44, \r7, \r6, \t1 # t1 = {h5 h4 g5 g4 h1 h0 g1 g0}
- vshufps $0xEE, \r7, \r6, \r6 # r6 = {h7 h6 g7 g6 h3 h2 g3 g2}
- vshufps $0xDD, \t1, \r2, \r7 # r7 = {h5 g5 f5 e5 h1 g1 f1 e1}
- vshufps $0x88, \r6, \r4, \r5 # r5 = {h6 g6 f6 e6 h2 g2 f2 e2}
- vshufps $0xDD, \r6, \r4, \r4 # r4 = {h7 g7 f7 e7 h3 g3 f3 e3}
- vshufps $0x88, \t1, \r2, \t1 # t1 = {h4 g4 f4 e4 h0 g0 f0 e0}
-
- vperm2f128 $0x13, \r1, \r5, \r6 # h6...a6
- vperm2f128 $0x02, \r1, \r5, \r2 # h2...a2
- vperm2f128 $0x13, \r3, \r7, \r5 # h5...a5
- vperm2f128 $0x02, \r3, \r7, \r1 # h1...a1
- vperm2f128 $0x13, \r0, \r4, \r7 # h7...a7
- vperm2f128 $0x02, \r0, \r4, \r3 # h3...a3
- vperm2f128 $0x13, \t0, \t1, \r4 # h4...a4
- vperm2f128 $0x02, \t0, \t1, \r0 # h0...a0
-
-.endm
-##
-## Magic functions defined in FIPS 180-1
-##
-# macro MAGIC_F0 F,B,C,D,T ## F = (D ^ (B & (C ^ D)))
-.macro MAGIC_F0 regF regB regC regD regT
- vpxor \regD, \regC, \regF
- vpand \regB, \regF, \regF
- vpxor \regD, \regF, \regF
-.endm
-
-# macro MAGIC_F1 F,B,C,D,T ## F = (B ^ C ^ D)
-.macro MAGIC_F1 regF regB regC regD regT
- vpxor \regC, \regD, \regF
- vpxor \regB, \regF, \regF
-.endm
-
-# macro MAGIC_F2 F,B,C,D,T ## F = ((B & C) | (B & D) | (C & D))
-.macro MAGIC_F2 regF regB regC regD regT
- vpor \regC, \regB, \regF
- vpand \regC, \regB, \regT
- vpand \regD, \regF, \regF
- vpor \regT, \regF, \regF
-.endm
-
-# macro MAGIC_F3 F,B,C,D,T ## F = (B ^ C ^ D)
-.macro MAGIC_F3 regF regB regC regD regT
- MAGIC_F1 \regF,\regB,\regC,\regD,\regT
-.endm
-
-# PROLD reg, imm, tmp
-.macro PROLD reg imm tmp
- vpsrld $(32-\imm), \reg, \tmp
- vpslld $\imm, \reg, \reg
- vpor \tmp, \reg, \reg
-.endm
-
-.macro PROLD_nd reg imm tmp src
- vpsrld $(32-\imm), \src, \tmp
- vpslld $\imm, \src, \reg
- vpor \tmp, \reg, \reg
-.endm
-
-.macro SHA1_STEP_00_15 regA regB regC regD regE regT regF memW immCNT MAGIC
- vpaddd \immCNT, \regE, \regE
- vpaddd \memW*32(%rsp), \regE, \regE
- PROLD_nd \regT, 5, \regF, \regA
- vpaddd \regT, \regE, \regE
- \MAGIC \regF, \regB, \regC, \regD, \regT
- PROLD \regB, 30, \regT
- vpaddd \regF, \regE, \regE
-.endm
-
-.macro SHA1_STEP_16_79 regA regB regC regD regE regT regF memW immCNT MAGIC
- vpaddd \immCNT, \regE, \regE
- offset = ((\memW - 14) & 15) * 32
- vmovdqu offset(%rsp), W14
- vpxor W14, W16, W16
- offset = ((\memW - 8) & 15) * 32
- vpxor offset(%rsp), W16, W16
- offset = ((\memW - 3) & 15) * 32
- vpxor offset(%rsp), W16, W16
- vpsrld $(32-1), W16, \regF
- vpslld $1, W16, W16
- vpor W16, \regF, \regF
-
- ROTATE_W
-
- offset = ((\memW - 0) & 15) * 32
- vmovdqu \regF, offset(%rsp)
- vpaddd \regF, \regE, \regE
- PROLD_nd \regT, 5, \regF, \regA
- vpaddd \regT, \regE, \regE
- \MAGIC \regF,\regB,\regC,\regD,\regT ## FUN = MAGIC_Fi(B,C,D)
- PROLD \regB,30, \regT
- vpaddd \regF, \regE, \regE
-.endm
-
-########################################################################
-########################################################################
-########################################################################
-
-## FRAMESZ plus pushes must be an odd multiple of 8
-YMM_SAVE = (15-15)*32
-FRAMESZ = 32*16 + YMM_SAVE
-_YMM = FRAMESZ - YMM_SAVE
-
-#define VMOVPS vmovups
-
-IDX = %rax
-inp0 = %r9
-inp1 = %r10
-inp2 = %r11
-inp3 = %r12
-inp4 = %r13
-inp5 = %r14
-inp6 = %r15
-inp7 = %rcx
-arg1 = %rdi
-arg2 = %rsi
-RSP_SAVE = %rdx
-
-# ymm0 A
-# ymm1 B
-# ymm2 C
-# ymm3 D
-# ymm4 E
-# ymm5 F AA
-# ymm6 T0 BB
-# ymm7 T1 CC
-# ymm8 T2 DD
-# ymm9 T3 EE
-# ymm10 T4 TMP
-# ymm11 T5 FUN
-# ymm12 T6 K
-# ymm13 T7 W14
-# ymm14 T8 W15
-# ymm15 T9 W16
-
-
-A = %ymm0
-B = %ymm1
-C = %ymm2
-D = %ymm3
-E = %ymm4
-F = %ymm5
-T0 = %ymm6
-T1 = %ymm7
-T2 = %ymm8
-T3 = %ymm9
-T4 = %ymm10
-T5 = %ymm11
-T6 = %ymm12
-T7 = %ymm13
-T8 = %ymm14
-T9 = %ymm15
-
-AA = %ymm5
-BB = %ymm6
-CC = %ymm7
-DD = %ymm8
-EE = %ymm9
-TMP = %ymm10
-FUN = %ymm11
-K = %ymm12
-W14 = %ymm13
-W15 = %ymm14
-W16 = %ymm15
-
-.macro ROTATE_ARGS
- TMP_ = E
- E = D
- D = C
- C = B
- B = A
- A = TMP_
-.endm
-
-.macro ROTATE_W
-TMP_ = W16
-W16 = W15
-W15 = W14
-W14 = TMP_
-.endm
-
-# 8 streams x 5 32bit words per digest x 4 bytes per word
-#define DIGEST_SIZE (8*5*4)
-
-.align 32
-
-# void sha1_x8_avx2(void **input_data, UINT128 *digest, UINT32 size)
-# arg 1 : pointer to array[4] of pointer to input data
-# arg 2 : size (in blocks) ;; assumed to be >= 1
-#
-ENTRY(sha1_x8_avx2)
-
- # save callee-saved clobbered registers to comply with C function ABI
- push %r12
- push %r13
- push %r14
- push %r15
-
- #save rsp
- mov %rsp, RSP_SAVE
- sub $FRAMESZ, %rsp
-
- #align rsp to 32 Bytes
- and $~0x1F, %rsp
-
- ## Initialize digests
- vmovdqu 0*32(arg1), A
- vmovdqu 1*32(arg1), B
- vmovdqu 2*32(arg1), C
- vmovdqu 3*32(arg1), D
- vmovdqu 4*32(arg1), E
-
- ## transpose input onto stack
- mov _data_ptr+0*8(arg1),inp0
- mov _data_ptr+1*8(arg1),inp1
- mov _data_ptr+2*8(arg1),inp2
- mov _data_ptr+3*8(arg1),inp3
- mov _data_ptr+4*8(arg1),inp4
- mov _data_ptr+5*8(arg1),inp5
- mov _data_ptr+6*8(arg1),inp6
- mov _data_ptr+7*8(arg1),inp7
-
- xor IDX, IDX
-lloop:
- vmovdqu PSHUFFLE_BYTE_FLIP_MASK(%rip), F
- I=0
-.rep 2
- VMOVPS (inp0, IDX), T0
- VMOVPS (inp1, IDX), T1
- VMOVPS (inp2, IDX), T2
- VMOVPS (inp3, IDX), T3
- VMOVPS (inp4, IDX), T4
- VMOVPS (inp5, IDX), T5
- VMOVPS (inp6, IDX), T6
- VMOVPS (inp7, IDX), T7
-
- TRANSPOSE8 T0, T1, T2, T3, T4, T5, T6, T7, T8, T9
- vpshufb F, T0, T0
- vmovdqu T0, (I*8)*32(%rsp)
- vpshufb F, T1, T1
- vmovdqu T1, (I*8+1)*32(%rsp)
- vpshufb F, T2, T2
- vmovdqu T2, (I*8+2)*32(%rsp)
- vpshufb F, T3, T3
- vmovdqu T3, (I*8+3)*32(%rsp)
- vpshufb F, T4, T4
- vmovdqu T4, (I*8+4)*32(%rsp)
- vpshufb F, T5, T5
- vmovdqu T5, (I*8+5)*32(%rsp)
- vpshufb F, T6, T6
- vmovdqu T6, (I*8+6)*32(%rsp)
- vpshufb F, T7, T7
- vmovdqu T7, (I*8+7)*32(%rsp)
- add $32, IDX
- I = (I+1)
-.endr
- # save old digests
- vmovdqu A,AA
- vmovdqu B,BB
- vmovdqu C,CC
- vmovdqu D,DD
- vmovdqu E,EE
-
-##
-## perform 0-79 steps
-##
- vmovdqu K00_19(%rip), K
-## do rounds 0...15
- I = 0
-.rep 16
- SHA1_STEP_00_15 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F0
- ROTATE_ARGS
- I = (I+1)
-.endr
-
-## do rounds 16...19
- vmovdqu ((16 - 16) & 15) * 32 (%rsp), W16
- vmovdqu ((16 - 15) & 15) * 32 (%rsp), W15
-.rep 4
- SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F0
- ROTATE_ARGS
- I = (I+1)
-.endr
-
-## do rounds 20...39
- vmovdqu K20_39(%rip), K
-.rep 20
- SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F1
- ROTATE_ARGS
- I = (I+1)
-.endr
-
-## do rounds 40...59
- vmovdqu K40_59(%rip), K
-.rep 20
- SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F2
- ROTATE_ARGS
- I = (I+1)
-.endr
-
-## do rounds 60...79
- vmovdqu K60_79(%rip), K
-.rep 20
- SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F3
- ROTATE_ARGS
- I = (I+1)
-.endr
-
- vpaddd AA,A,A
- vpaddd BB,B,B
- vpaddd CC,C,C
- vpaddd DD,D,D
- vpaddd EE,E,E
-
- sub $1, arg2
- jne lloop
-
- # write out digests
- vmovdqu A, 0*32(arg1)
- vmovdqu B, 1*32(arg1)
- vmovdqu C, 2*32(arg1)
- vmovdqu D, 3*32(arg1)
- vmovdqu E, 4*32(arg1)
-
- # update input pointers
- add IDX, inp0
- add IDX, inp1
- add IDX, inp2
- add IDX, inp3
- add IDX, inp4
- add IDX, inp5
- add IDX, inp6
- add IDX, inp7
- mov inp0, _data_ptr (arg1)
- mov inp1, _data_ptr + 1*8(arg1)
- mov inp2, _data_ptr + 2*8(arg1)
- mov inp3, _data_ptr + 3*8(arg1)
- mov inp4, _data_ptr + 4*8(arg1)
- mov inp5, _data_ptr + 5*8(arg1)
- mov inp6, _data_ptr + 6*8(arg1)
- mov inp7, _data_ptr + 7*8(arg1)
-
- ################
- ## Postamble
-
- mov RSP_SAVE, %rsp
-
- # restore callee-saved clobbered registers
- pop %r15
- pop %r14
- pop %r13
- pop %r12
-
- ret
-ENDPROC(sha1_x8_avx2)
-
-
-.section .rodata.cst32.K00_19, "aM", @progbits, 32
-.align 32
-K00_19:
-.octa 0x5A8279995A8279995A8279995A827999
-.octa 0x5A8279995A8279995A8279995A827999
-
-.section .rodata.cst32.K20_39, "aM", @progbits, 32
-.align 32
-K20_39:
-.octa 0x6ED9EBA16ED9EBA16ED9EBA16ED9EBA1
-.octa 0x6ED9EBA16ED9EBA16ED9EBA16ED9EBA1
-
-.section .rodata.cst32.K40_59, "aM", @progbits, 32
-.align 32
-K40_59:
-.octa 0x8F1BBCDC8F1BBCDC8F1BBCDC8F1BBCDC
-.octa 0x8F1BBCDC8F1BBCDC8F1BBCDC8F1BBCDC
-
-.section .rodata.cst32.K60_79, "aM", @progbits, 32
-.align 32
-K60_79:
-.octa 0xCA62C1D6CA62C1D6CA62C1D6CA62C1D6
-.octa 0xCA62C1D6CA62C1D6CA62C1D6CA62C1D6
-
-.section .rodata.cst32.PSHUFFLE_BYTE_FLIP_MASK, "aM", @progbits, 32
-.align 32
-PSHUFFLE_BYTE_FLIP_MASK:
-.octa 0x0c0d0e0f08090a0b0405060700010203
-.octa 0x0c0d0e0f08090a0b0405060700010203
diff --git a/arch/x86/crypto/sha256-mb/Makefile b/arch/x86/crypto/sha256-mb/Makefile
deleted file mode 100644
index 53ad6e7db747..000000000000
--- a/arch/x86/crypto/sha256-mb/Makefile
+++ /dev/null
@@ -1,14 +0,0 @@
-# SPDX-License-Identifier: GPL-2.0
-#
-# Arch-specific CryptoAPI modules.
-#
-
-OBJECT_FILES_NON_STANDARD := y
-
-avx2_supported := $(call as-instr,vpgatherdd %ymm0$(comma)(%eax$(comma)%ymm1\
- $(comma)4)$(comma)%ymm2,yes,no)
-ifeq ($(avx2_supported),yes)
- obj-$(CONFIG_CRYPTO_SHA256_MB) += sha256-mb.o
- sha256-mb-y := sha256_mb.o sha256_mb_mgr_flush_avx2.o \
- sha256_mb_mgr_init_avx2.o sha256_mb_mgr_submit_avx2.o sha256_x8_avx2.o
-endif
diff --git a/arch/x86/crypto/sha256-mb/sha256_mb.c b/arch/x86/crypto/sha256-mb/sha256_mb.c
deleted file mode 100644
index 97c5fc43e115..000000000000
--- a/arch/x86/crypto/sha256-mb/sha256_mb.c
+++ /dev/null
@@ -1,1013 +0,0 @@
-/*
- * Multi buffer SHA256 algorithm Glue Code
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
-
-#include <crypto/internal/hash.h>
-#include <linux/init.h>
-#include <linux/module.h>
-#include <linux/mm.h>
-#include <linux/cryptohash.h>
-#include <linux/types.h>
-#include <linux/list.h>
-#include <crypto/scatterwalk.h>
-#include <crypto/sha.h>
-#include <crypto/mcryptd.h>
-#include <crypto/crypto_wq.h>
-#include <asm/byteorder.h>
-#include <linux/hardirq.h>
-#include <asm/fpu/api.h>
-#include "sha256_mb_ctx.h"
-
-#define FLUSH_INTERVAL 1000 /* in usec */
-
-static struct mcryptd_alg_state sha256_mb_alg_state;
-
-struct sha256_mb_ctx {
- struct mcryptd_ahash *mcryptd_tfm;
-};
-
-static inline struct mcryptd_hash_request_ctx
- *cast_hash_to_mcryptd_ctx(struct sha256_hash_ctx *hash_ctx)
-{
- struct ahash_request *areq;
-
- areq = container_of((void *) hash_ctx, struct ahash_request, __ctx);
- return container_of(areq, struct mcryptd_hash_request_ctx, areq);
-}
-
-static inline struct ahash_request
- *cast_mcryptd_ctx_to_req(struct mcryptd_hash_request_ctx *ctx)
-{
- return container_of((void *) ctx, struct ahash_request, __ctx);
-}
-
-static void req_ctx_init(struct mcryptd_hash_request_ctx *rctx,
- struct ahash_request *areq)
-{
- rctx->flag = HASH_UPDATE;
-}
-
-static asmlinkage void (*sha256_job_mgr_init)(struct sha256_mb_mgr *state);
-static asmlinkage struct job_sha256* (*sha256_job_mgr_submit)
- (struct sha256_mb_mgr *state, struct job_sha256 *job);
-static asmlinkage struct job_sha256* (*sha256_job_mgr_flush)
- (struct sha256_mb_mgr *state);
-static asmlinkage struct job_sha256* (*sha256_job_mgr_get_comp_job)
- (struct sha256_mb_mgr *state);
-
-inline uint32_t sha256_pad(uint8_t padblock[SHA256_BLOCK_SIZE * 2],
- uint64_t total_len)
-{
- uint32_t i = total_len & (SHA256_BLOCK_SIZE - 1);
-
- memset(&padblock[i], 0, SHA256_BLOCK_SIZE);
- padblock[i] = 0x80;
-
- i += ((SHA256_BLOCK_SIZE - 1) &
- (0 - (total_len + SHA256_PADLENGTHFIELD_SIZE + 1)))
- + 1 + SHA256_PADLENGTHFIELD_SIZE;
-
-#if SHA256_PADLENGTHFIELD_SIZE == 16
- *((uint64_t *) &padblock[i - 16]) = 0;
-#endif
-
- *((uint64_t *) &padblock[i - 8]) = cpu_to_be64(total_len << 3);
-
- /* Number of extra blocks to hash */
- return i >> SHA256_LOG2_BLOCK_SIZE;
-}
-
-static struct sha256_hash_ctx
- *sha256_ctx_mgr_resubmit(struct sha256_ctx_mgr *mgr,
- struct sha256_hash_ctx *ctx)
-{
- while (ctx) {
- if (ctx->status & HASH_CTX_STS_COMPLETE) {
- /* Clear PROCESSING bit */
- ctx->status = HASH_CTX_STS_COMPLETE;
- return ctx;
- }
-
- /*
- * If the extra blocks are empty, begin hashing what remains
- * in the user's buffer.
- */
- if (ctx->partial_block_buffer_length == 0 &&
- ctx->incoming_buffer_length) {
-
- const void *buffer = ctx->incoming_buffer;
- uint32_t len = ctx->incoming_buffer_length;
- uint32_t copy_len;
-
- /*
- * Only entire blocks can be hashed.
- * Copy remainder to extra blocks buffer.
- */
- copy_len = len & (SHA256_BLOCK_SIZE-1);
-
- if (copy_len) {
- len -= copy_len;
- memcpy(ctx->partial_block_buffer,
- ((const char *) buffer + len),
- copy_len);
- ctx->partial_block_buffer_length = copy_len;
- }
-
- ctx->incoming_buffer_length = 0;
-
- /* len should be a multiple of the block size now */
- assert((len % SHA256_BLOCK_SIZE) == 0);
-
- /* Set len to the number of blocks to be hashed */
- len >>= SHA256_LOG2_BLOCK_SIZE;
-
- if (len) {
-
- ctx->job.buffer = (uint8_t *) buffer;
- ctx->job.len = len;
- ctx = (struct sha256_hash_ctx *)
- sha256_job_mgr_submit(&mgr->mgr, &ctx->job);
- continue;
- }
- }
-
- /*
- * If the extra blocks are not empty, then we are
- * either on the last block(s) or we need more
- * user input before continuing.
- */
- if (ctx->status & HASH_CTX_STS_LAST) {
-
- uint8_t *buf = ctx->partial_block_buffer;
- uint32_t n_extra_blocks =
- sha256_pad(buf, ctx->total_length);
-
- ctx->status = (HASH_CTX_STS_PROCESSING |
- HASH_CTX_STS_COMPLETE);
- ctx->job.buffer = buf;
- ctx->job.len = (uint32_t) n_extra_blocks;
- ctx = (struct sha256_hash_ctx *)
- sha256_job_mgr_submit(&mgr->mgr, &ctx->job);
- continue;
- }
-
- ctx->status = HASH_CTX_STS_IDLE;
- return ctx;
- }
-
- return NULL;
-}
-
-static struct sha256_hash_ctx
- *sha256_ctx_mgr_get_comp_ctx(struct sha256_ctx_mgr *mgr)
-{
- /*
- * If get_comp_job returns NULL, there are no jobs complete.
- * If get_comp_job returns a job, verify that it is safe to return to
- * the user. If it is not ready, resubmit the job to finish processing.
- * If sha256_ctx_mgr_resubmit returned a job, it is ready to be
- * returned. Otherwise, all jobs currently being managed by the
- * hash_ctx_mgr still need processing.
- */
- struct sha256_hash_ctx *ctx;
-
- ctx = (struct sha256_hash_ctx *) sha256_job_mgr_get_comp_job(&mgr->mgr);
- return sha256_ctx_mgr_resubmit(mgr, ctx);
-}
-
-static void sha256_ctx_mgr_init(struct sha256_ctx_mgr *mgr)
-{
- sha256_job_mgr_init(&mgr->mgr);
-}
-
-static struct sha256_hash_ctx *sha256_ctx_mgr_submit(struct sha256_ctx_mgr *mgr,
- struct sha256_hash_ctx *ctx,
- const void *buffer,
- uint32_t len,
- int flags)
-{
- if (flags & ~(HASH_UPDATE | HASH_LAST)) {
- /* User should not pass anything other than UPDATE or LAST */
- ctx->error = HASH_CTX_ERROR_INVALID_FLAGS;
- return ctx;
- }
-
- if (ctx->status & HASH_CTX_STS_PROCESSING) {
- /* Cannot submit to a currently processing job. */
- ctx->error = HASH_CTX_ERROR_ALREADY_PROCESSING;
- return ctx;
- }
-
- if (ctx->status & HASH_CTX_STS_COMPLETE) {
- /* Cannot update a finished job. */
- ctx->error = HASH_CTX_ERROR_ALREADY_COMPLETED;
- return ctx;
- }
-
- /* If we made it here, there was no error during this call to submit */
- ctx->error = HASH_CTX_ERROR_NONE;
-
- /* Store buffer ptr info from user */
- ctx->incoming_buffer = buffer;
- ctx->incoming_buffer_length = len;
-
- /*
- * Store the user's request flags and mark this ctx as currently
- * being processed.
- */
- ctx->status = (flags & HASH_LAST) ?
- (HASH_CTX_STS_PROCESSING | HASH_CTX_STS_LAST) :
- HASH_CTX_STS_PROCESSING;
-
- /* Advance byte counter */
- ctx->total_length += len;
-
- /*
- * If there is anything currently buffered in the extra blocks,
- * append to it until it contains a whole block.
- * Or if the user's buffer contains less than a whole block,
- * append as much as possible to the extra block.
- */
- if (ctx->partial_block_buffer_length || len < SHA256_BLOCK_SIZE) {
- /*
- * Compute how many bytes to copy from user buffer into
- * extra block
- */
- uint32_t copy_len = SHA256_BLOCK_SIZE -
- ctx->partial_block_buffer_length;
- if (len < copy_len)
- copy_len = len;
-
- if (copy_len) {
- /* Copy and update relevant pointers and counters */
- memcpy(
- &ctx->partial_block_buffer[ctx->partial_block_buffer_length],
- buffer, copy_len);
-
- ctx->partial_block_buffer_length += copy_len;
- ctx->incoming_buffer = (const void *)
- ((const char *)buffer + copy_len);
- ctx->incoming_buffer_length = len - copy_len;
- }
-
- /* The extra block should never contain more than 1 block */
- assert(ctx->partial_block_buffer_length <= SHA256_BLOCK_SIZE);
-
- /*
- * If the extra block buffer contains exactly 1 block,
- * it can be hashed.
- */
- if (ctx->partial_block_buffer_length >= SHA256_BLOCK_SIZE) {
- ctx->partial_block_buffer_length = 0;
-
- ctx->job.buffer = ctx->partial_block_buffer;
- ctx->job.len = 1;
- ctx = (struct sha256_hash_ctx *)
- sha256_job_mgr_submit(&mgr->mgr, &ctx->job);
- }
- }
-
- return sha256_ctx_mgr_resubmit(mgr, ctx);
-}
-
-static struct sha256_hash_ctx *sha256_ctx_mgr_flush(struct sha256_ctx_mgr *mgr)
-{
- struct sha256_hash_ctx *ctx;
-
- while (1) {
- ctx = (struct sha256_hash_ctx *)
- sha256_job_mgr_flush(&mgr->mgr);
-
- /* If flush returned 0, there are no more jobs in flight. */
- if (!ctx)
- return NULL;
-
- /*
- * If flush returned a job, resubmit the job to finish
- * processing.
- */
- ctx = sha256_ctx_mgr_resubmit(mgr, ctx);
-
- /*
- * If sha256_ctx_mgr_resubmit returned a job, it is ready to
- * be returned. Otherwise, all jobs currently being managed by
- * the sha256_ctx_mgr still need processing. Loop.
- */
- if (ctx)
- return ctx;
- }
-}
-
-static int sha256_mb_init(struct ahash_request *areq)
-{
- struct sha256_hash_ctx *sctx = ahash_request_ctx(areq);
-
- hash_ctx_init(sctx);
- sctx->job.result_digest[0] = SHA256_H0;
- sctx->job.result_digest[1] = SHA256_H1;
- sctx->job.result_digest[2] = SHA256_H2;
- sctx->job.result_digest[3] = SHA256_H3;
- sctx->job.result_digest[4] = SHA256_H4;
- sctx->job.result_digest[5] = SHA256_H5;
- sctx->job.result_digest[6] = SHA256_H6;
- sctx->job.result_digest[7] = SHA256_H7;
- sctx->total_length = 0;
- sctx->partial_block_buffer_length = 0;
- sctx->status = HASH_CTX_STS_IDLE;
-
- return 0;
-}
-
-static int sha256_mb_set_results(struct mcryptd_hash_request_ctx *rctx)
-{
- int i;
- struct sha256_hash_ctx *sctx = ahash_request_ctx(&rctx->areq);
- __be32 *dst = (__be32 *) rctx->out;
-
- for (i = 0; i < 8; ++i)
- dst[i] = cpu_to_be32(sctx->job.result_digest[i]);
-
- return 0;
-}
-
-static int sha_finish_walk(struct mcryptd_hash_request_ctx **ret_rctx,
- struct mcryptd_alg_cstate *cstate, bool flush)
-{
- int flag = HASH_UPDATE;
- int nbytes, err = 0;
- struct mcryptd_hash_request_ctx *rctx = *ret_rctx;
- struct sha256_hash_ctx *sha_ctx;
-
- /* more work ? */
- while (!(rctx->flag & HASH_DONE)) {
- nbytes = crypto_ahash_walk_done(&rctx->walk, 0);
- if (nbytes < 0) {
- err = nbytes;
- goto out;
- }
- /* check if the walk is done */
- if (crypto_ahash_walk_last(&rctx->walk)) {
- rctx->flag |= HASH_DONE;
- if (rctx->flag & HASH_FINAL)
- flag |= HASH_LAST;
-
- }
- sha_ctx = (struct sha256_hash_ctx *)
- ahash_request_ctx(&rctx->areq);
- kernel_fpu_begin();
- sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx,
- rctx->walk.data, nbytes, flag);
- if (!sha_ctx) {
- if (flush)
- sha_ctx = sha256_ctx_mgr_flush(cstate->mgr);
- }
- kernel_fpu_end();
- if (sha_ctx)
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- else {
- rctx = NULL;
- goto out;
- }
- }
-
- /* copy the results */
- if (rctx->flag & HASH_FINAL)
- sha256_mb_set_results(rctx);
-
-out:
- *ret_rctx = rctx;
- return err;
-}
-
-static int sha_complete_job(struct mcryptd_hash_request_ctx *rctx,
- struct mcryptd_alg_cstate *cstate,
- int err)
-{
- struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
- struct sha256_hash_ctx *sha_ctx;
- struct mcryptd_hash_request_ctx *req_ctx;
- int ret;
-
- /* remove from work list */
- spin_lock(&cstate->work_lock);
- list_del(&rctx->waiter);
- spin_unlock(&cstate->work_lock);
-
- if (irqs_disabled())
- rctx->complete(&req->base, err);
- else {
- local_bh_disable();
- rctx->complete(&req->base, err);
- local_bh_enable();
- }
-
- /* check to see if there are other jobs that are done */
- sha_ctx = sha256_ctx_mgr_get_comp_ctx(cstate->mgr);
- while (sha_ctx) {
- req_ctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&req_ctx, cstate, false);
- if (req_ctx) {
- spin_lock(&cstate->work_lock);
- list_del(&req_ctx->waiter);
- spin_unlock(&cstate->work_lock);
-
- req = cast_mcryptd_ctx_to_req(req_ctx);
- if (irqs_disabled())
- req_ctx->complete(&req->base, ret);
- else {
- local_bh_disable();
- req_ctx->complete(&req->base, ret);
- local_bh_enable();
- }
- }
- sha_ctx = sha256_ctx_mgr_get_comp_ctx(cstate->mgr);
- }
-
- return 0;
-}
-
-static void sha256_mb_add_list(struct mcryptd_hash_request_ctx *rctx,
- struct mcryptd_alg_cstate *cstate)
-{
- unsigned long next_flush;
- unsigned long delay = usecs_to_jiffies(FLUSH_INTERVAL);
-
- /* initialize tag */
- rctx->tag.arrival = jiffies; /* tag the arrival time */
- rctx->tag.seq_num = cstate->next_seq_num++;
- next_flush = rctx->tag.arrival + delay;
- rctx->tag.expire = next_flush;
-
- spin_lock(&cstate->work_lock);
- list_add_tail(&rctx->waiter, &cstate->work_list);
- spin_unlock(&cstate->work_lock);
-
- mcryptd_arm_flusher(cstate, delay);
-}
-
-static int sha256_mb_update(struct ahash_request *areq)
-{
- struct mcryptd_hash_request_ctx *rctx =
- container_of(areq, struct mcryptd_hash_request_ctx, areq);
- struct mcryptd_alg_cstate *cstate =
- this_cpu_ptr(sha256_mb_alg_state.alg_cstate);
-
- struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
- struct sha256_hash_ctx *sha_ctx;
- int ret = 0, nbytes;
-
- /* sanity check */
- if (rctx->tag.cpu != smp_processor_id()) {
- pr_err("mcryptd error: cpu clash\n");
- goto done;
- }
-
- /* need to init context */
- req_ctx_init(rctx, areq);
-
- nbytes = crypto_ahash_walk_first(req, &rctx->walk);
-
- if (nbytes < 0) {
- ret = nbytes;
- goto done;
- }
-
- if (crypto_ahash_walk_last(&rctx->walk))
- rctx->flag |= HASH_DONE;
-
- /* submit */
- sha_ctx = (struct sha256_hash_ctx *) ahash_request_ctx(areq);
- sha256_mb_add_list(rctx, cstate);
- kernel_fpu_begin();
- sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
- nbytes, HASH_UPDATE);
- kernel_fpu_end();
-
- /* check if anything is returned */
- if (!sha_ctx)
- return -EINPROGRESS;
-
- if (sha_ctx->error) {
- ret = sha_ctx->error;
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- goto done;
- }
-
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&rctx, cstate, false);
-
- if (!rctx)
- return -EINPROGRESS;
-done:
- sha_complete_job(rctx, cstate, ret);
- return ret;
-}
-
-static int sha256_mb_finup(struct ahash_request *areq)
-{
- struct mcryptd_hash_request_ctx *rctx =
- container_of(areq, struct mcryptd_hash_request_ctx, areq);
- struct mcryptd_alg_cstate *cstate =
- this_cpu_ptr(sha256_mb_alg_state.alg_cstate);
-
- struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
- struct sha256_hash_ctx *sha_ctx;
- int ret = 0, flag = HASH_UPDATE, nbytes;
-
- /* sanity check */
- if (rctx->tag.cpu != smp_processor_id()) {
- pr_err("mcryptd error: cpu clash\n");
- goto done;
- }
-
- /* need to init context */
- req_ctx_init(rctx, areq);
-
- nbytes = crypto_ahash_walk_first(req, &rctx->walk);
-
- if (nbytes < 0) {
- ret = nbytes;
- goto done;
- }
-
- if (crypto_ahash_walk_last(&rctx->walk)) {
- rctx->flag |= HASH_DONE;
- flag = HASH_LAST;
- }
-
- /* submit */
- rctx->flag |= HASH_FINAL;
- sha_ctx = (struct sha256_hash_ctx *) ahash_request_ctx(areq);
- sha256_mb_add_list(rctx, cstate);
-
- kernel_fpu_begin();
- sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
- nbytes, flag);
- kernel_fpu_end();
-
- /* check if anything is returned */
- if (!sha_ctx)
- return -EINPROGRESS;
-
- if (sha_ctx->error) {
- ret = sha_ctx->error;
- goto done;
- }
-
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&rctx, cstate, false);
- if (!rctx)
- return -EINPROGRESS;
-done:
- sha_complete_job(rctx, cstate, ret);
- return ret;
-}
-
-static int sha256_mb_final(struct ahash_request *areq)
-{
- struct mcryptd_hash_request_ctx *rctx =
- container_of(areq, struct mcryptd_hash_request_ctx,
- areq);
- struct mcryptd_alg_cstate *cstate =
- this_cpu_ptr(sha256_mb_alg_state.alg_cstate);
-
- struct sha256_hash_ctx *sha_ctx;
- int ret = 0;
- u8 data;
-
- /* sanity check */
- if (rctx->tag.cpu != smp_processor_id()) {
- pr_err("mcryptd error: cpu clash\n");
- goto done;
- }
-
- /* need to init context */
- req_ctx_init(rctx, areq);
-
- rctx->flag |= HASH_DONE | HASH_FINAL;
-
- sha_ctx = (struct sha256_hash_ctx *) ahash_request_ctx(areq);
- /* flag HASH_FINAL and 0 data size */
- sha256_mb_add_list(rctx, cstate);
- kernel_fpu_begin();
- sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx, &data, 0,
- HASH_LAST);
- kernel_fpu_end();
-
- /* check if anything is returned */
- if (!sha_ctx)
- return -EINPROGRESS;
-
- if (sha_ctx->error) {
- ret = sha_ctx->error;
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- goto done;
- }
-
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&rctx, cstate, false);
- if (!rctx)
- return -EINPROGRESS;
-done:
- sha_complete_job(rctx, cstate, ret);
- return ret;
-}
-
-static int sha256_mb_export(struct ahash_request *areq, void *out)
-{
- struct sha256_hash_ctx *sctx = ahash_request_ctx(areq);
-
- memcpy(out, sctx, sizeof(*sctx));
-
- return 0;
-}
-
-static int sha256_mb_import(struct ahash_request *areq, const void *in)
-{
- struct sha256_hash_ctx *sctx = ahash_request_ctx(areq);
-
- memcpy(sctx, in, sizeof(*sctx));
-
- return 0;
-}
-
-static int sha256_mb_async_init_tfm(struct crypto_tfm *tfm)
-{
- struct mcryptd_ahash *mcryptd_tfm;
- struct sha256_mb_ctx *ctx = crypto_tfm_ctx(tfm);
- struct mcryptd_hash_ctx *mctx;
-
- mcryptd_tfm = mcryptd_alloc_ahash("__intel_sha256-mb",
- CRYPTO_ALG_INTERNAL,
- CRYPTO_ALG_INTERNAL);
- if (IS_ERR(mcryptd_tfm))
- return PTR_ERR(mcryptd_tfm);
- mctx = crypto_ahash_ctx(&mcryptd_tfm->base);
- mctx->alg_state = &sha256_mb_alg_state;
- ctx->mcryptd_tfm = mcryptd_tfm;
- crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
- sizeof(struct ahash_request) +
- crypto_ahash_reqsize(&mcryptd_tfm->base));
-
- return 0;
-}
-
-static void sha256_mb_async_exit_tfm(struct crypto_tfm *tfm)
-{
- struct sha256_mb_ctx *ctx = crypto_tfm_ctx(tfm);
-
- mcryptd_free_ahash(ctx->mcryptd_tfm);
-}
-
-static int sha256_mb_areq_init_tfm(struct crypto_tfm *tfm)
-{
- crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
- sizeof(struct ahash_request) +
- sizeof(struct sha256_hash_ctx));
-
- return 0;
-}
-
-static void sha256_mb_areq_exit_tfm(struct crypto_tfm *tfm)
-{
- struct sha256_mb_ctx *ctx = crypto_tfm_ctx(tfm);
-
- mcryptd_free_ahash(ctx->mcryptd_tfm);
-}
-
-static struct ahash_alg sha256_mb_areq_alg = {
- .init = sha256_mb_init,
- .update = sha256_mb_update,
- .final = sha256_mb_final,
- .finup = sha256_mb_finup,
- .export = sha256_mb_export,
- .import = sha256_mb_import,
- .halg = {
- .digestsize = SHA256_DIGEST_SIZE,
- .statesize = sizeof(struct sha256_hash_ctx),
- .base = {
- .cra_name = "__sha256-mb",
- .cra_driver_name = "__intel_sha256-mb",
- .cra_priority = 100,
- /*
- * use ASYNC flag as some buffers in multi-buffer
- * algo may not have completed before hashing thread
- * sleep
- */
- .cra_flags = CRYPTO_ALG_ASYNC |
- CRYPTO_ALG_INTERNAL,
- .cra_blocksize = SHA256_BLOCK_SIZE,
- .cra_module = THIS_MODULE,
- .cra_list = LIST_HEAD_INIT
- (sha256_mb_areq_alg.halg.base.cra_list),
- .cra_init = sha256_mb_areq_init_tfm,
- .cra_exit = sha256_mb_areq_exit_tfm,
- .cra_ctxsize = sizeof(struct sha256_hash_ctx),
- }
- }
-};
-
-static int sha256_mb_async_init(struct ahash_request *req)
-{
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_init(mcryptd_req);
-}
-
-static int sha256_mb_async_update(struct ahash_request *req)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
-
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_update(mcryptd_req);
-}
-
-static int sha256_mb_async_finup(struct ahash_request *req)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
-
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_finup(mcryptd_req);
-}
-
-static int sha256_mb_async_final(struct ahash_request *req)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
-
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_final(mcryptd_req);
-}
-
-static int sha256_mb_async_digest(struct ahash_request *req)
-{
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_digest(mcryptd_req);
-}
-
-static int sha256_mb_async_export(struct ahash_request *req, void *out)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_export(mcryptd_req, out);
-}
-
-static int sha256_mb_async_import(struct ahash_request *req, const void *in)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
- struct crypto_ahash *child = mcryptd_ahash_child(mcryptd_tfm);
- struct mcryptd_hash_request_ctx *rctx;
- struct ahash_request *areq;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- rctx = ahash_request_ctx(mcryptd_req);
- areq = &rctx->areq;
-
- ahash_request_set_tfm(areq, child);
- ahash_request_set_callback(areq, CRYPTO_TFM_REQ_MAY_SLEEP,
- rctx->complete, req);
-
- return crypto_ahash_import(mcryptd_req, in);
-}
-
-static struct ahash_alg sha256_mb_async_alg = {
- .init = sha256_mb_async_init,
- .update = sha256_mb_async_update,
- .final = sha256_mb_async_final,
- .finup = sha256_mb_async_finup,
- .export = sha256_mb_async_export,
- .import = sha256_mb_async_import,
- .digest = sha256_mb_async_digest,
- .halg = {
- .digestsize = SHA256_DIGEST_SIZE,
- .statesize = sizeof(struct sha256_hash_ctx),
- .base = {
- .cra_name = "sha256",
- .cra_driver_name = "sha256_mb",
- /*
- * Low priority, since with few concurrent hash requests
- * this is extremely slow due to the flush delay. Users
- * whose workloads would benefit from this can request
- * it explicitly by driver name, or can increase its
- * priority at runtime using NETLINK_CRYPTO.
- */
- .cra_priority = 50,
- .cra_flags = CRYPTO_ALG_ASYNC,
- .cra_blocksize = SHA256_BLOCK_SIZE,
- .cra_module = THIS_MODULE,
- .cra_list = LIST_HEAD_INIT
- (sha256_mb_async_alg.halg.base.cra_list),
- .cra_init = sha256_mb_async_init_tfm,
- .cra_exit = sha256_mb_async_exit_tfm,
- .cra_ctxsize = sizeof(struct sha256_mb_ctx),
- .cra_alignmask = 0,
- },
- },
-};
-
-static unsigned long sha256_mb_flusher(struct mcryptd_alg_cstate *cstate)
-{
- struct mcryptd_hash_request_ctx *rctx;
- unsigned long cur_time;
- unsigned long next_flush = 0;
- struct sha256_hash_ctx *sha_ctx;
-
-
- cur_time = jiffies;
-
- while (!list_empty(&cstate->work_list)) {
- rctx = list_entry(cstate->work_list.next,
- struct mcryptd_hash_request_ctx, waiter);
- if (time_before(cur_time, rctx->tag.expire))
- break;
- kernel_fpu_begin();
- sha_ctx = (struct sha256_hash_ctx *)
- sha256_ctx_mgr_flush(cstate->mgr);
- kernel_fpu_end();
- if (!sha_ctx) {
- pr_err("sha256_mb error: nothing got"
- " flushed for non-empty list\n");
- break;
- }
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- sha_finish_walk(&rctx, cstate, true);
- sha_complete_job(rctx, cstate, 0);
- }
-
- if (!list_empty(&cstate->work_list)) {
- rctx = list_entry(cstate->work_list.next,
- struct mcryptd_hash_request_ctx, waiter);
- /* get the hash context and then flush time */
- next_flush = rctx->tag.expire;
- mcryptd_arm_flusher(cstate, get_delay(next_flush));
- }
- return next_flush;
-}
-
-static int __init sha256_mb_mod_init(void)
-{
-
- int cpu;
- int err;
- struct mcryptd_alg_cstate *cpu_state;
-
- /* check for dependent cpu features */
- if (!boot_cpu_has(X86_FEATURE_AVX2) ||
- !boot_cpu_has(X86_FEATURE_BMI2))
- return -ENODEV;
-
- /* initialize multibuffer structures */
- sha256_mb_alg_state.alg_cstate = alloc_percpu
- (struct mcryptd_alg_cstate);
-
- sha256_job_mgr_init = sha256_mb_mgr_init_avx2;
- sha256_job_mgr_submit = sha256_mb_mgr_submit_avx2;
- sha256_job_mgr_flush = sha256_mb_mgr_flush_avx2;
- sha256_job_mgr_get_comp_job = sha256_mb_mgr_get_comp_job_avx2;
-
- if (!sha256_mb_alg_state.alg_cstate)
- return -ENOMEM;
- for_each_possible_cpu(cpu) {
- cpu_state = per_cpu_ptr(sha256_mb_alg_state.alg_cstate, cpu);
- cpu_state->next_flush = 0;
- cpu_state->next_seq_num = 0;
- cpu_state->flusher_engaged = false;
- INIT_DELAYED_WORK(&cpu_state->flush, mcryptd_flusher);
- cpu_state->cpu = cpu;
- cpu_state->alg_state = &sha256_mb_alg_state;
- cpu_state->mgr = kzalloc(sizeof(struct sha256_ctx_mgr),
- GFP_KERNEL);
- if (!cpu_state->mgr)
- goto err2;
- sha256_ctx_mgr_init(cpu_state->mgr);
- INIT_LIST_HEAD(&cpu_state->work_list);
- spin_lock_init(&cpu_state->work_lock);
- }
- sha256_mb_alg_state.flusher = &sha256_mb_flusher;
-
- err = crypto_register_ahash(&sha256_mb_areq_alg);
- if (err)
- goto err2;
- err = crypto_register_ahash(&sha256_mb_async_alg);
- if (err)
- goto err1;
-
-
- return 0;
-err1:
- crypto_unregister_ahash(&sha256_mb_areq_alg);
-err2:
- for_each_possible_cpu(cpu) {
- cpu_state = per_cpu_ptr(sha256_mb_alg_state.alg_cstate, cpu);
- kfree(cpu_state->mgr);
- }
- free_percpu(sha256_mb_alg_state.alg_cstate);
- return -ENODEV;
-}
-
-static void __exit sha256_mb_mod_fini(void)
-{
- int cpu;
- struct mcryptd_alg_cstate *cpu_state;
-
- crypto_unregister_ahash(&sha256_mb_async_alg);
- crypto_unregister_ahash(&sha256_mb_areq_alg);
- for_each_possible_cpu(cpu) {
- cpu_state = per_cpu_ptr(sha256_mb_alg_state.alg_cstate, cpu);
- kfree(cpu_state->mgr);
- }
- free_percpu(sha256_mb_alg_state.alg_cstate);
-}
-
-module_init(sha256_mb_mod_init);
-module_exit(sha256_mb_mod_fini);
-
-MODULE_LICENSE("GPL");
-MODULE_DESCRIPTION("SHA256 Secure Hash Algorithm, multi buffer accelerated");
-
-MODULE_ALIAS_CRYPTO("sha256");
diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_ctx.h b/arch/x86/crypto/sha256-mb/sha256_mb_ctx.h
deleted file mode 100644
index 7c432543dc7f..000000000000
--- a/arch/x86/crypto/sha256-mb/sha256_mb_ctx.h
+++ /dev/null
@@ -1,134 +0,0 @@
-/*
- * Header file for multi buffer SHA256 context
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#ifndef _SHA_MB_CTX_INTERNAL_H
-#define _SHA_MB_CTX_INTERNAL_H
-
-#include "sha256_mb_mgr.h"
-
-#define HASH_UPDATE 0x00
-#define HASH_LAST 0x01
-#define HASH_DONE 0x02
-#define HASH_FINAL 0x04
-
-#define HASH_CTX_STS_IDLE 0x00
-#define HASH_CTX_STS_PROCESSING 0x01
-#define HASH_CTX_STS_LAST 0x02
-#define HASH_CTX_STS_COMPLETE 0x04
-
-enum hash_ctx_error {
- HASH_CTX_ERROR_NONE = 0,
- HASH_CTX_ERROR_INVALID_FLAGS = -1,
- HASH_CTX_ERROR_ALREADY_PROCESSING = -2,
- HASH_CTX_ERROR_ALREADY_COMPLETED = -3,
-
-#ifdef HASH_CTX_DEBUG
- HASH_CTX_ERROR_DEBUG_DIGEST_MISMATCH = -4,
-#endif
-};
-
-
-#define hash_ctx_user_data(ctx) ((ctx)->user_data)
-#define hash_ctx_digest(ctx) ((ctx)->job.result_digest)
-#define hash_ctx_processing(ctx) ((ctx)->status & HASH_CTX_STS_PROCESSING)
-#define hash_ctx_complete(ctx) ((ctx)->status == HASH_CTX_STS_COMPLETE)
-#define hash_ctx_status(ctx) ((ctx)->status)
-#define hash_ctx_error(ctx) ((ctx)->error)
-#define hash_ctx_init(ctx) \
- do { \
- (ctx)->error = HASH_CTX_ERROR_NONE; \
- (ctx)->status = HASH_CTX_STS_COMPLETE; \
- } while (0)
-
-
-/* Hash Constants and Typedefs */
-#define SHA256_DIGEST_LENGTH 8
-#define SHA256_LOG2_BLOCK_SIZE 6
-
-#define SHA256_PADLENGTHFIELD_SIZE 8
-
-#ifdef SHA_MB_DEBUG
-#define assert(expr) \
-do { \
- if (unlikely(!(expr))) { \
- printk(KERN_ERR "Assertion failed! %s,%s,%s,line=%d\n", \
- #expr, __FILE__, __func__, __LINE__); \
- } \
-} while (0)
-#else
-#define assert(expr) do {} while (0)
-#endif
-
-struct sha256_ctx_mgr {
- struct sha256_mb_mgr mgr;
-};
-
-/* typedef struct sha256_ctx_mgr sha256_ctx_mgr; */
-
-struct sha256_hash_ctx {
- /* Must be at struct offset 0 */
- struct job_sha256 job;
- /* status flag */
- int status;
- /* error flag */
- int error;
-
- uint64_t total_length;
- const void *incoming_buffer;
- uint32_t incoming_buffer_length;
- uint8_t partial_block_buffer[SHA256_BLOCK_SIZE * 2];
- uint32_t partial_block_buffer_length;
- void *user_data;
-};
-
-#endif
diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr.h b/arch/x86/crypto/sha256-mb/sha256_mb_mgr.h
deleted file mode 100644
index b01ae408c56d..000000000000
--- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr.h
+++ /dev/null
@@ -1,108 +0,0 @@
-/*
- * Header file for multi buffer SHA256 algorithm manager
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-#ifndef __SHA_MB_MGR_H
-#define __SHA_MB_MGR_H
-
-#include <linux/types.h>
-
-#define NUM_SHA256_DIGEST_WORDS 8
-
-enum job_sts { STS_UNKNOWN = 0,
- STS_BEING_PROCESSED = 1,
- STS_COMPLETED = 2,
- STS_INTERNAL_ERROR = 3,
- STS_ERROR = 4
-};
-
-struct job_sha256 {
- u8 *buffer;
- u32 len;
- u32 result_digest[NUM_SHA256_DIGEST_WORDS] __aligned(32);
- enum job_sts status;
- void *user_data;
-};
-
-/* SHA256 out-of-order scheduler */
-
-/* typedef uint32_t sha8_digest_array[8][8]; */
-
-struct sha256_args_x8 {
- uint32_t digest[8][8];
- uint8_t *data_ptr[8];
-};
-
-struct sha256_lane_data {
- struct job_sha256 *job_in_lane;
-};
-
-struct sha256_mb_mgr {
- struct sha256_args_x8 args;
-
- uint32_t lens[8];
-
- /* each byte is index (0...7) of unused lanes */
- uint64_t unused_lanes;
- /* byte 4 is set to FF as a flag */
- struct sha256_lane_data ldata[8];
-};
-
-
-#define SHA256_MB_MGR_NUM_LANES_AVX2 8
-
-void sha256_mb_mgr_init_avx2(struct sha256_mb_mgr *state);
-struct job_sha256 *sha256_mb_mgr_submit_avx2(struct sha256_mb_mgr *state,
- struct job_sha256 *job);
-struct job_sha256 *sha256_mb_mgr_flush_avx2(struct sha256_mb_mgr *state);
-struct job_sha256 *sha256_mb_mgr_get_comp_job_avx2(struct sha256_mb_mgr *state);
-
-#endif
diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S
deleted file mode 100644
index 5c377bac21d0..000000000000
--- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S
+++ /dev/null
@@ -1,304 +0,0 @@
-/*
- * Header file for multi buffer SHA256 algorithm data structure
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-# Macros for defining data structures
-
-# Usage example
-
-#START_FIELDS # JOB_AES
-### name size align
-#FIELD _plaintext, 8, 8 # pointer to plaintext
-#FIELD _ciphertext, 8, 8 # pointer to ciphertext
-#FIELD _IV, 16, 8 # IV
-#FIELD _keys, 8, 8 # pointer to keys
-#FIELD _len, 4, 4 # length in bytes
-#FIELD _status, 4, 4 # status enumeration
-#FIELD _user_data, 8, 8 # pointer to user data
-#UNION _union, size1, align1, \
-# size2, align2, \
-# size3, align3, \
-# ...
-#END_FIELDS
-#%assign _JOB_AES_size _FIELD_OFFSET
-#%assign _JOB_AES_align _STRUCT_ALIGN
-
-#########################################################################
-
-# Alternate "struc-like" syntax:
-# STRUCT job_aes2
-# RES_Q .plaintext, 1
-# RES_Q .ciphertext, 1
-# RES_DQ .IV, 1
-# RES_B .nested, _JOB_AES_SIZE, _JOB_AES_ALIGN
-# RES_U .union, size1, align1, \
-# size2, align2, \
-# ...
-# ENDSTRUCT
-# # Following only needed if nesting
-# %assign job_aes2_size _FIELD_OFFSET
-# %assign job_aes2_align _STRUCT_ALIGN
-#
-# RES_* macros take a name, a count and an optional alignment.
-# The count in in terms of the base size of the macro, and the
-# default alignment is the base size.
-# The macros are:
-# Macro Base size
-# RES_B 1
-# RES_W 2
-# RES_D 4
-# RES_Q 8
-# RES_DQ 16
-# RES_Y 32
-# RES_Z 64
-#
-# RES_U defines a union. It's arguments are a name and two or more
-# pairs of "size, alignment"
-#
-# The two assigns are only needed if this structure is being nested
-# within another. Even if the assigns are not done, one can still use
-# STRUCT_NAME_size as the size of the structure.
-#
-# Note that for nesting, you still need to assign to STRUCT_NAME_size.
-#
-# The differences between this and using "struc" directly are that each
-# type is implicitly aligned to its natural length (although this can be
-# over-ridden with an explicit third parameter), and that the structure
-# is padded at the end to its overall alignment.
-#
-
-#########################################################################
-
-#ifndef _DATASTRUCT_ASM_
-#define _DATASTRUCT_ASM_
-
-#define SZ8 8*SHA256_DIGEST_WORD_SIZE
-#define ROUNDS 64*SZ8
-#define PTR_SZ 8
-#define SHA256_DIGEST_WORD_SIZE 4
-#define MAX_SHA256_LANES 8
-#define SHA256_DIGEST_WORDS 8
-#define SHA256_DIGEST_ROW_SIZE (MAX_SHA256_LANES * SHA256_DIGEST_WORD_SIZE)
-#define SHA256_DIGEST_SIZE (SHA256_DIGEST_ROW_SIZE * SHA256_DIGEST_WORDS)
-#define SHA256_BLK_SZ 64
-
-# START_FIELDS
-.macro START_FIELDS
- _FIELD_OFFSET = 0
- _STRUCT_ALIGN = 0
-.endm
-
-# FIELD name size align
-.macro FIELD name size align
- _FIELD_OFFSET = (_FIELD_OFFSET + (\align) - 1) & (~ ((\align)-1))
- \name = _FIELD_OFFSET
- _FIELD_OFFSET = _FIELD_OFFSET + (\size)
-.if (\align > _STRUCT_ALIGN)
- _STRUCT_ALIGN = \align
-.endif
-.endm
-
-# END_FIELDS
-.macro END_FIELDS
- _FIELD_OFFSET = (_FIELD_OFFSET + _STRUCT_ALIGN-1) & (~ (_STRUCT_ALIGN-1))
-.endm
-
-########################################################################
-
-.macro STRUCT p1
-START_FIELDS
-.struc \p1
-.endm
-
-.macro ENDSTRUCT
- tmp = _FIELD_OFFSET
- END_FIELDS
- tmp = (_FIELD_OFFSET - %%tmp)
-.if (tmp > 0)
- .lcomm tmp
-.endif
-.endstruc
-.endm
-
-## RES_int name size align
-.macro RES_int p1 p2 p3
- name = \p1
- size = \p2
- align = .\p3
-
- _FIELD_OFFSET = (_FIELD_OFFSET + (align) - 1) & (~ ((align)-1))
-.align align
-.lcomm name size
- _FIELD_OFFSET = _FIELD_OFFSET + (size)
-.if (align > _STRUCT_ALIGN)
- _STRUCT_ALIGN = align
-.endif
-.endm
-
-# macro RES_B name, size [, align]
-.macro RES_B _name, _size, _align=1
-RES_int _name _size _align
-.endm
-
-# macro RES_W name, size [, align]
-.macro RES_W _name, _size, _align=2
-RES_int _name 2*(_size) _align
-.endm
-
-# macro RES_D name, size [, align]
-.macro RES_D _name, _size, _align=4
-RES_int _name 4*(_size) _align
-.endm
-
-# macro RES_Q name, size [, align]
-.macro RES_Q _name, _size, _align=8
-RES_int _name 8*(_size) _align
-.endm
-
-# macro RES_DQ name, size [, align]
-.macro RES_DQ _name, _size, _align=16
-RES_int _name 16*(_size) _align
-.endm
-
-# macro RES_Y name, size [, align]
-.macro RES_Y _name, _size, _align=32
-RES_int _name 32*(_size) _align
-.endm
-
-# macro RES_Z name, size [, align]
-.macro RES_Z _name, _size, _align=64
-RES_int _name 64*(_size) _align
-.endm
-
-#endif
-
-
-########################################################################
-#### Define SHA256 Out Of Order Data Structures
-########################################################################
-
-START_FIELDS # LANE_DATA
-### name size align
-FIELD _job_in_lane, 8, 8 # pointer to job object
-END_FIELDS
-
- _LANE_DATA_size = _FIELD_OFFSET
- _LANE_DATA_align = _STRUCT_ALIGN
-
-########################################################################
-
-START_FIELDS # SHA256_ARGS_X4
-### name size align
-FIELD _digest, 4*8*8, 4 # transposed digest
-FIELD _data_ptr, 8*8, 8 # array of pointers to data
-END_FIELDS
-
- _SHA256_ARGS_X4_size = _FIELD_OFFSET
- _SHA256_ARGS_X4_align = _STRUCT_ALIGN
- _SHA256_ARGS_X8_size = _FIELD_OFFSET
- _SHA256_ARGS_X8_align = _STRUCT_ALIGN
-
-#######################################################################
-
-START_FIELDS # MB_MGR
-### name size align
-FIELD _args, _SHA256_ARGS_X4_size, _SHA256_ARGS_X4_align
-FIELD _lens, 4*8, 8
-FIELD _unused_lanes, 8, 8
-FIELD _ldata, _LANE_DATA_size*8, _LANE_DATA_align
-END_FIELDS
-
- _MB_MGR_size = _FIELD_OFFSET
- _MB_MGR_align = _STRUCT_ALIGN
-
-_args_digest = _args + _digest
-_args_data_ptr = _args + _data_ptr
-
-#######################################################################
-
-START_FIELDS #STACK_FRAME
-### name size align
-FIELD _data, 16*SZ8, 1 # transposed digest
-FIELD _digest, 8*SZ8, 1 # array of pointers to data
-FIELD _ytmp, 4*SZ8, 1
-FIELD _rsp, 8, 1
-END_FIELDS
-
- _STACK_FRAME_size = _FIELD_OFFSET
- _STACK_FRAME_align = _STRUCT_ALIGN
-
-#######################################################################
-
-########################################################################
-#### Define constants
-########################################################################
-
-#define STS_UNKNOWN 0
-#define STS_BEING_PROCESSED 1
-#define STS_COMPLETED 2
-
-########################################################################
-#### Define JOB_SHA256 structure
-########################################################################
-
-START_FIELDS # JOB_SHA256
-
-### name size align
-FIELD _buffer, 8, 8 # pointer to buffer
-FIELD _len, 8, 8 # length in bytes
-FIELD _result_digest, 8*4, 32 # Digest (output)
-FIELD _status, 4, 4
-FIELD _user_data, 8, 8
-END_FIELDS
-
- _JOB_SHA256_size = _FIELD_OFFSET
- _JOB_SHA256_align = _STRUCT_ALIGN
diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S
deleted file mode 100644
index d2364c55bbde..000000000000
--- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S
+++ /dev/null
@@ -1,307 +0,0 @@
-/*
- * Flush routine for SHA256 multibuffer
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-#include <linux/linkage.h>
-#include <asm/frame.h>
-#include "sha256_mb_mgr_datastruct.S"
-
-.extern sha256_x8_avx2
-
-#LINUX register definitions
-#define arg1 %rdi
-#define arg2 %rsi
-
-# Common register definitions
-#define state arg1
-#define job arg2
-#define len2 arg2
-
-# idx must be a register not clobberred by sha1_mult
-#define idx %r8
-#define DWORD_idx %r8d
-
-#define unused_lanes %rbx
-#define lane_data %rbx
-#define tmp2 %rbx
-#define tmp2_w %ebx
-
-#define job_rax %rax
-#define tmp1 %rax
-#define size_offset %rax
-#define tmp %rax
-#define start_offset %rax
-
-#define tmp3 %arg1
-
-#define extra_blocks %arg2
-#define p %arg2
-
-.macro LABEL prefix n
-\prefix\n\():
-.endm
-
-.macro JNE_SKIP i
-jne skip_\i
-.endm
-
-.altmacro
-.macro SET_OFFSET _offset
-offset = \_offset
-.endm
-.noaltmacro
-
-# JOB_SHA256* sha256_mb_mgr_flush_avx2(MB_MGR *state)
-# arg 1 : rcx : state
-ENTRY(sha256_mb_mgr_flush_avx2)
- FRAME_BEGIN
- push %rbx
-
- # If bit (32+3) is set, then all lanes are empty
- mov _unused_lanes(state), unused_lanes
- bt $32+3, unused_lanes
- jc return_null
-
- # find a lane with a non-null job
- xor idx, idx
- offset = (_ldata + 1 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne one(%rip), idx
- offset = (_ldata + 2 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne two(%rip), idx
- offset = (_ldata + 3 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne three(%rip), idx
- offset = (_ldata + 4 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne four(%rip), idx
- offset = (_ldata + 5 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne five(%rip), idx
- offset = (_ldata + 6 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne six(%rip), idx
- offset = (_ldata + 7 * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne seven(%rip), idx
-
- # copy idx to empty lanes
-copy_lane_data:
- offset = (_args + _data_ptr)
- mov offset(state,idx,8), tmp
-
- I = 0
-.rep 8
- offset = (_ldata + I * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
-.altmacro
- JNE_SKIP %I
- offset = (_args + _data_ptr + 8*I)
- mov tmp, offset(state)
- offset = (_lens + 4*I)
- movl $0xFFFFFFFF, offset(state)
-LABEL skip_ %I
- I = (I+1)
-.noaltmacro
-.endr
-
- # Find min length
- vmovdqu _lens+0*16(state), %xmm0
- vmovdqu _lens+1*16(state), %xmm1
-
- vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
- vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
- vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min val in low dword
-
- vmovd %xmm2, DWORD_idx
- mov idx, len2
- and $0xF, idx
- shr $4, len2
- jz len_is_0
-
- vpand clear_low_nibble(%rip), %xmm2, %xmm2
- vpshufd $0, %xmm2, %xmm2
-
- vpsubd %xmm2, %xmm0, %xmm0
- vpsubd %xmm2, %xmm1, %xmm1
-
- vmovdqu %xmm0, _lens+0*16(state)
- vmovdqu %xmm1, _lens+1*16(state)
-
- # "state" and "args" are the same address, arg1
- # len is arg2
- call sha256_x8_avx2
- # state and idx are intact
-
-len_is_0:
- # process completed job "idx"
- imul $_LANE_DATA_size, idx, lane_data
- lea _ldata(state, lane_data), lane_data
-
- mov _job_in_lane(lane_data), job_rax
- movq $0, _job_in_lane(lane_data)
- movl $STS_COMPLETED, _status(job_rax)
- mov _unused_lanes(state), unused_lanes
- shl $4, unused_lanes
- or idx, unused_lanes
-
- mov unused_lanes, _unused_lanes(state)
- movl $0xFFFFFFFF, _lens(state,idx,4)
-
- vmovd _args_digest(state , idx, 4) , %xmm0
- vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
- vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
- vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
- vmovd _args_digest+4*32(state, idx, 4), %xmm1
- vpinsrd $1, _args_digest+5*32(state, idx, 4), %xmm1, %xmm1
- vpinsrd $2, _args_digest+6*32(state, idx, 4), %xmm1, %xmm1
- vpinsrd $3, _args_digest+7*32(state, idx, 4), %xmm1, %xmm1
-
- vmovdqu %xmm0, _result_digest(job_rax)
- offset = (_result_digest + 1*16)
- vmovdqu %xmm1, offset(job_rax)
-
-return:
- pop %rbx
- FRAME_END
- ret
-
-return_null:
- xor job_rax, job_rax
- jmp return
-ENDPROC(sha256_mb_mgr_flush_avx2)
-
-##############################################################################
-
-.align 16
-ENTRY(sha256_mb_mgr_get_comp_job_avx2)
- push %rbx
-
- ## if bit 32+3 is set, then all lanes are empty
- mov _unused_lanes(state), unused_lanes
- bt $(32+3), unused_lanes
- jc .return_null
-
- # Find min length
- vmovdqu _lens(state), %xmm0
- vmovdqu _lens+1*16(state), %xmm1
-
- vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
- vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
- vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min val in low dword
-
- vmovd %xmm2, DWORD_idx
- test $~0xF, idx
- jnz .return_null
-
- # process completed job "idx"
- imul $_LANE_DATA_size, idx, lane_data
- lea _ldata(state, lane_data), lane_data
-
- mov _job_in_lane(lane_data), job_rax
- movq $0, _job_in_lane(lane_data)
- movl $STS_COMPLETED, _status(job_rax)
- mov _unused_lanes(state), unused_lanes
- shl $4, unused_lanes
- or idx, unused_lanes
- mov unused_lanes, _unused_lanes(state)
-
- movl $0xFFFFFFFF, _lens(state, idx, 4)
-
- vmovd _args_digest(state, idx, 4), %xmm0
- vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
- vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
- vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
- vmovd _args_digest+4*32(state, idx, 4), %xmm1
- vpinsrd $1, _args_digest+5*32(state, idx, 4), %xmm1, %xmm1
- vpinsrd $2, _args_digest+6*32(state, idx, 4), %xmm1, %xmm1
- vpinsrd $3, _args_digest+7*32(state, idx, 4), %xmm1, %xmm1
-
- vmovdqu %xmm0, _result_digest(job_rax)
- offset = (_result_digest + 1*16)
- vmovdqu %xmm1, offset(job_rax)
-
- pop %rbx
-
- ret
-
-.return_null:
- xor job_rax, job_rax
- pop %rbx
- ret
-ENDPROC(sha256_mb_mgr_get_comp_job_avx2)
-
-.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
-.align 16
-clear_low_nibble:
-.octa 0x000000000000000000000000FFFFFFF0
-
-.section .rodata.cst8, "aM", @progbits, 8
-.align 8
-one:
-.quad 1
-two:
-.quad 2
-three:
-.quad 3
-four:
-.quad 4
-five:
-.quad 5
-six:
-.quad 6
-seven:
-.quad 7
diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c
deleted file mode 100644
index b0c498371e67..000000000000
--- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c
+++ /dev/null
@@ -1,65 +0,0 @@
-/*
- * Initialization code for multi buffer SHA256 algorithm for AVX2
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include "sha256_mb_mgr.h"
-
-void sha256_mb_mgr_init_avx2(struct sha256_mb_mgr *state)
-{
- unsigned int j;
-
- state->unused_lanes = 0xF76543210ULL;
- for (j = 0; j < 8; j++) {
- state->lens[j] = 0xFFFFFFFF;
- state->ldata[j].job_in_lane = NULL;
- }
-}
diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S
deleted file mode 100644
index b36ae7454084..000000000000
--- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S
+++ /dev/null
@@ -1,214 +0,0 @@
-/*
- * Buffer submit code for multi buffer SHA256 algorithm
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include <linux/linkage.h>
-#include <asm/frame.h>
-#include "sha256_mb_mgr_datastruct.S"
-
-.extern sha256_x8_avx2
-
-# LINUX register definitions
-arg1 = %rdi
-arg2 = %rsi
-size_offset = %rcx
-tmp2 = %rcx
-extra_blocks = %rdx
-
-# Common definitions
-#define state arg1
-#define job %rsi
-#define len2 arg2
-#define p2 arg2
-
-# idx must be a register not clobberred by sha1_x8_avx2
-idx = %r8
-DWORD_idx = %r8d
-last_len = %r8
-
-p = %r11
-start_offset = %r11
-
-unused_lanes = %rbx
-BYTE_unused_lanes = %bl
-
-job_rax = %rax
-len = %rax
-DWORD_len = %eax
-
-lane = %r12
-tmp3 = %r12
-
-tmp = %r9
-DWORD_tmp = %r9d
-
-lane_data = %r10
-
-# JOB* sha256_mb_mgr_submit_avx2(MB_MGR *state, JOB_SHA256 *job)
-# arg 1 : rcx : state
-# arg 2 : rdx : job
-ENTRY(sha256_mb_mgr_submit_avx2)
- FRAME_BEGIN
- push %rbx
- push %r12
-
- mov _unused_lanes(state), unused_lanes
- mov unused_lanes, lane
- and $0xF, lane
- shr $4, unused_lanes
- imul $_LANE_DATA_size, lane, lane_data
- movl $STS_BEING_PROCESSED, _status(job)
- lea _ldata(state, lane_data), lane_data
- mov unused_lanes, _unused_lanes(state)
- movl _len(job), DWORD_len
-
- mov job, _job_in_lane(lane_data)
- shl $4, len
- or lane, len
-
- movl DWORD_len, _lens(state , lane, 4)
-
- # Load digest words from result_digest
- vmovdqu _result_digest(job), %xmm0
- vmovdqu _result_digest+1*16(job), %xmm1
- vmovd %xmm0, _args_digest(state, lane, 4)
- vpextrd $1, %xmm0, _args_digest+1*32(state , lane, 4)
- vpextrd $2, %xmm0, _args_digest+2*32(state , lane, 4)
- vpextrd $3, %xmm0, _args_digest+3*32(state , lane, 4)
- vmovd %xmm1, _args_digest+4*32(state , lane, 4)
-
- vpextrd $1, %xmm1, _args_digest+5*32(state , lane, 4)
- vpextrd $2, %xmm1, _args_digest+6*32(state , lane, 4)
- vpextrd $3, %xmm1, _args_digest+7*32(state , lane, 4)
-
- mov _buffer(job), p
- mov p, _args_data_ptr(state, lane, 8)
-
- cmp $0xF, unused_lanes
- jne return_null
-
-start_loop:
- # Find min length
- vmovdqa _lens(state), %xmm0
- vmovdqa _lens+1*16(state), %xmm1
-
- vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
- vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
- vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
- vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min val in low dword
-
- vmovd %xmm2, DWORD_idx
- mov idx, len2
- and $0xF, idx
- shr $4, len2
- jz len_is_0
-
- vpand clear_low_nibble(%rip), %xmm2, %xmm2
- vpshufd $0, %xmm2, %xmm2
-
- vpsubd %xmm2, %xmm0, %xmm0
- vpsubd %xmm2, %xmm1, %xmm1
-
- vmovdqa %xmm0, _lens + 0*16(state)
- vmovdqa %xmm1, _lens + 1*16(state)
-
- # "state" and "args" are the same address, arg1
- # len is arg2
- call sha256_x8_avx2
-
- # state and idx are intact
-
-len_is_0:
- # process completed job "idx"
- imul $_LANE_DATA_size, idx, lane_data
- lea _ldata(state, lane_data), lane_data
-
- mov _job_in_lane(lane_data), job_rax
- mov _unused_lanes(state), unused_lanes
- movq $0, _job_in_lane(lane_data)
- movl $STS_COMPLETED, _status(job_rax)
- shl $4, unused_lanes
- or idx, unused_lanes
- mov unused_lanes, _unused_lanes(state)
-
- movl $0xFFFFFFFF, _lens(state,idx,4)
-
- vmovd _args_digest(state, idx, 4), %xmm0
- vpinsrd $1, _args_digest+1*32(state , idx, 4), %xmm0, %xmm0
- vpinsrd $2, _args_digest+2*32(state , idx, 4), %xmm0, %xmm0
- vpinsrd $3, _args_digest+3*32(state , idx, 4), %xmm0, %xmm0
- vmovd _args_digest+4*32(state, idx, 4), %xmm1
-
- vpinsrd $1, _args_digest+5*32(state , idx, 4), %xmm1, %xmm1
- vpinsrd $2, _args_digest+6*32(state , idx, 4), %xmm1, %xmm1
- vpinsrd $3, _args_digest+7*32(state , idx, 4), %xmm1, %xmm1
-
- vmovdqu %xmm0, _result_digest(job_rax)
- vmovdqu %xmm1, _result_digest+1*16(job_rax)
-
-return:
- pop %r12
- pop %rbx
- FRAME_END
- ret
-
-return_null:
- xor job_rax, job_rax
- jmp return
-
-ENDPROC(sha256_mb_mgr_submit_avx2)
-
-.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
-.align 16
-clear_low_nibble:
- .octa 0x000000000000000000000000FFFFFFF0
diff --git a/arch/x86/crypto/sha256-mb/sha256_x8_avx2.S b/arch/x86/crypto/sha256-mb/sha256_x8_avx2.S
deleted file mode 100644
index 1687c80c5995..000000000000
--- a/arch/x86/crypto/sha256-mb/sha256_x8_avx2.S
+++ /dev/null
@@ -1,598 +0,0 @@
-/*
- * Multi-buffer SHA256 algorithm hash compute routine
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include <linux/linkage.h>
-#include "sha256_mb_mgr_datastruct.S"
-
-## code to compute oct SHA256 using SSE-256
-## outer calling routine takes care of save and restore of XMM registers
-## Logic designed/laid out by JDG
-
-## Function clobbers: rax, rcx, rdx, rbx, rsi, rdi, r9-r15; %ymm0-15
-## Linux clobbers: rax rbx rcx rdx rsi r9 r10 r11 r12 r13 r14 r15
-## Linux preserves: rdi rbp r8
-##
-## clobbers %ymm0-15
-
-arg1 = %rdi
-arg2 = %rsi
-reg3 = %rcx
-reg4 = %rdx
-
-# Common definitions
-STATE = arg1
-INP_SIZE = arg2
-
-IDX = %rax
-ROUND = %rbx
-TBL = reg3
-
-inp0 = %r9
-inp1 = %r10
-inp2 = %r11
-inp3 = %r12
-inp4 = %r13
-inp5 = %r14
-inp6 = %r15
-inp7 = reg4
-
-a = %ymm0
-b = %ymm1
-c = %ymm2
-d = %ymm3
-e = %ymm4
-f = %ymm5
-g = %ymm6
-h = %ymm7
-
-T1 = %ymm8
-
-a0 = %ymm12
-a1 = %ymm13
-a2 = %ymm14
-TMP = %ymm15
-TMP0 = %ymm6
-TMP1 = %ymm7
-
-TT0 = %ymm8
-TT1 = %ymm9
-TT2 = %ymm10
-TT3 = %ymm11
-TT4 = %ymm12
-TT5 = %ymm13
-TT6 = %ymm14
-TT7 = %ymm15
-
-# Define stack usage
-
-# Assume stack aligned to 32 bytes before call
-# Therefore FRAMESZ mod 32 must be 32-8 = 24
-
-#define FRAMESZ 0x388
-
-#define VMOVPS vmovups
-
-# TRANSPOSE8 r0, r1, r2, r3, r4, r5, r6, r7, t0, t1
-# "transpose" data in {r0...r7} using temps {t0...t1}
-# Input looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
-# r0 = {a7 a6 a5 a4 a3 a2 a1 a0}
-# r1 = {b7 b6 b5 b4 b3 b2 b1 b0}
-# r2 = {c7 c6 c5 c4 c3 c2 c1 c0}
-# r3 = {d7 d6 d5 d4 d3 d2 d1 d0}
-# r4 = {e7 e6 e5 e4 e3 e2 e1 e0}
-# r5 = {f7 f6 f5 f4 f3 f2 f1 f0}
-# r6 = {g7 g6 g5 g4 g3 g2 g1 g0}
-# r7 = {h7 h6 h5 h4 h3 h2 h1 h0}
-#
-# Output looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
-# r0 = {h0 g0 f0 e0 d0 c0 b0 a0}
-# r1 = {h1 g1 f1 e1 d1 c1 b1 a1}
-# r2 = {h2 g2 f2 e2 d2 c2 b2 a2}
-# r3 = {h3 g3 f3 e3 d3 c3 b3 a3}
-# r4 = {h4 g4 f4 e4 d4 c4 b4 a4}
-# r5 = {h5 g5 f5 e5 d5 c5 b5 a5}
-# r6 = {h6 g6 f6 e6 d6 c6 b6 a6}
-# r7 = {h7 g7 f7 e7 d7 c7 b7 a7}
-#
-
-.macro TRANSPOSE8 r0 r1 r2 r3 r4 r5 r6 r7 t0 t1
- # process top half (r0..r3) {a...d}
- vshufps $0x44, \r1, \r0, \t0 # t0 = {b5 b4 a5 a4 b1 b0 a1 a0}
- vshufps $0xEE, \r1, \r0, \r0 # r0 = {b7 b6 a7 a6 b3 b2 a3 a2}
- vshufps $0x44, \r3, \r2, \t1 # t1 = {d5 d4 c5 c4 d1 d0 c1 c0}
- vshufps $0xEE, \r3, \r2, \r2 # r2 = {d7 d6 c7 c6 d3 d2 c3 c2}
- vshufps $0xDD, \t1, \t0, \r3 # r3 = {d5 c5 b5 a5 d1 c1 b1 a1}
- vshufps $0x88, \r2, \r0, \r1 # r1 = {d6 c6 b6 a6 d2 c2 b2 a2}
- vshufps $0xDD, \r2, \r0, \r0 # r0 = {d7 c7 b7 a7 d3 c3 b3 a3}
- vshufps $0x88, \t1, \t0, \t0 # t0 = {d4 c4 b4 a4 d0 c0 b0 a0}
-
- # use r2 in place of t0
- # process bottom half (r4..r7) {e...h}
- vshufps $0x44, \r5, \r4, \r2 # r2 = {f5 f4 e5 e4 f1 f0 e1 e0}
- vshufps $0xEE, \r5, \r4, \r4 # r4 = {f7 f6 e7 e6 f3 f2 e3 e2}
- vshufps $0x44, \r7, \r6, \t1 # t1 = {h5 h4 g5 g4 h1 h0 g1 g0}
- vshufps $0xEE, \r7, \r6, \r6 # r6 = {h7 h6 g7 g6 h3 h2 g3 g2}
- vshufps $0xDD, \t1, \r2, \r7 # r7 = {h5 g5 f5 e5 h1 g1 f1 e1}
- vshufps $0x88, \r6, \r4, \r5 # r5 = {h6 g6 f6 e6 h2 g2 f2 e2}
- vshufps $0xDD, \r6, \r4, \r4 # r4 = {h7 g7 f7 e7 h3 g3 f3 e3}
- vshufps $0x88, \t1, \r2, \t1 # t1 = {h4 g4 f4 e4 h0 g0 f0 e0}
-
- vperm2f128 $0x13, \r1, \r5, \r6 # h6...a6
- vperm2f128 $0x02, \r1, \r5, \r2 # h2...a2
- vperm2f128 $0x13, \r3, \r7, \r5 # h5...a5
- vperm2f128 $0x02, \r3, \r7, \r1 # h1...a1
- vperm2f128 $0x13, \r0, \r4, \r7 # h7...a7
- vperm2f128 $0x02, \r0, \r4, \r3 # h3...a3
- vperm2f128 $0x13, \t0, \t1, \r4 # h4...a4
- vperm2f128 $0x02, \t0, \t1, \r0 # h0...a0
-
-.endm
-
-.macro ROTATE_ARGS
-TMP_ = h
-h = g
-g = f
-f = e
-e = d
-d = c
-c = b
-b = a
-a = TMP_
-.endm
-
-.macro _PRORD reg imm tmp
- vpslld $(32-\imm),\reg,\tmp
- vpsrld $\imm,\reg, \reg
- vpor \tmp,\reg, \reg
-.endm
-
-# PRORD_nd reg, imm, tmp, src
-.macro _PRORD_nd reg imm tmp src
- vpslld $(32-\imm), \src, \tmp
- vpsrld $\imm, \src, \reg
- vpor \tmp, \reg, \reg
-.endm
-
-# PRORD dst/src, amt
-.macro PRORD reg imm
- _PRORD \reg,\imm,TMP
-.endm
-
-# PRORD_nd dst, src, amt
-.macro PRORD_nd reg tmp imm
- _PRORD_nd \reg, \imm, TMP, \tmp
-.endm
-
-# arguments passed implicitly in preprocessor symbols i, a...h
-.macro ROUND_00_15 _T1 i
- PRORD_nd a0,e,5 # sig1: a0 = (e >> 5)
-
- vpxor g, f, a2 # ch: a2 = f^g
- vpand e,a2, a2 # ch: a2 = (f^g)&e
- vpxor g, a2, a2 # a2 = ch
-
- PRORD_nd a1,e,25 # sig1: a1 = (e >> 25)
-
- vmovdqu \_T1,(SZ8*(\i & 0xf))(%rsp)
- vpaddd (TBL,ROUND,1), \_T1, \_T1 # T1 = W + K
- vpxor e,a0, a0 # sig1: a0 = e ^ (e >> 5)
- PRORD a0, 6 # sig1: a0 = (e >> 6) ^ (e >> 11)
- vpaddd a2, h, h # h = h + ch
- PRORD_nd a2,a,11 # sig0: a2 = (a >> 11)
- vpaddd \_T1,h, h # h = h + ch + W + K
- vpxor a1, a0, a0 # a0 = sigma1
- PRORD_nd a1,a,22 # sig0: a1 = (a >> 22)
- vpxor c, a, \_T1 # maj: T1 = a^c
- add $SZ8, ROUND # ROUND++
- vpand b, \_T1, \_T1 # maj: T1 = (a^c)&b
- vpaddd a0, h, h
- vpaddd h, d, d
- vpxor a, a2, a2 # sig0: a2 = a ^ (a >> 11)
- PRORD a2,2 # sig0: a2 = (a >> 2) ^ (a >> 13)
- vpxor a1, a2, a2 # a2 = sig0
- vpand c, a, a1 # maj: a1 = a&c
- vpor \_T1, a1, a1 # a1 = maj
- vpaddd a1, h, h # h = h + ch + W + K + maj
- vpaddd a2, h, h # h = h + ch + W + K + maj + sigma0
- ROTATE_ARGS
-.endm
-
-# arguments passed implicitly in preprocessor symbols i, a...h
-.macro ROUND_16_XX _T1 i
- vmovdqu (SZ8*((\i-15)&0xf))(%rsp), \_T1
- vmovdqu (SZ8*((\i-2)&0xf))(%rsp), a1
- vmovdqu \_T1, a0
- PRORD \_T1,11
- vmovdqu a1, a2
- PRORD a1,2
- vpxor a0, \_T1, \_T1
- PRORD \_T1, 7
- vpxor a2, a1, a1
- PRORD a1, 17
- vpsrld $3, a0, a0
- vpxor a0, \_T1, \_T1
- vpsrld $10, a2, a2
- vpxor a2, a1, a1
- vpaddd (SZ8*((\i-16)&0xf))(%rsp), \_T1, \_T1
- vpaddd (SZ8*((\i-7)&0xf))(%rsp), a1, a1
- vpaddd a1, \_T1, \_T1
-
- ROUND_00_15 \_T1,\i
-.endm
-
-# SHA256_ARGS:
-# UINT128 digest[8]; // transposed digests
-# UINT8 *data_ptr[4];
-
-# void sha256_x8_avx2(SHA256_ARGS *args, UINT64 bytes);
-# arg 1 : STATE : pointer to array of pointers to input data
-# arg 2 : INP_SIZE : size of input in blocks
- # general registers preserved in outer calling routine
- # outer calling routine saves all the XMM registers
- # save rsp, allocate 32-byte aligned for local variables
-ENTRY(sha256_x8_avx2)
-
- # save callee-saved clobbered registers to comply with C function ABI
- push %r12
- push %r13
- push %r14
- push %r15
-
- mov %rsp, IDX
- sub $FRAMESZ, %rsp
- and $~0x1F, %rsp
- mov IDX, _rsp(%rsp)
-
- # Load the pre-transposed incoming digest.
- vmovdqu 0*SHA256_DIGEST_ROW_SIZE(STATE),a
- vmovdqu 1*SHA256_DIGEST_ROW_SIZE(STATE),b
- vmovdqu 2*SHA256_DIGEST_ROW_SIZE(STATE),c
- vmovdqu 3*SHA256_DIGEST_ROW_SIZE(STATE),d
- vmovdqu 4*SHA256_DIGEST_ROW_SIZE(STATE),e
- vmovdqu 5*SHA256_DIGEST_ROW_SIZE(STATE),f
- vmovdqu 6*SHA256_DIGEST_ROW_SIZE(STATE),g
- vmovdqu 7*SHA256_DIGEST_ROW_SIZE(STATE),h
-
- lea K256_8(%rip),TBL
-
- # load the address of each of the 4 message lanes
- # getting ready to transpose input onto stack
- mov _args_data_ptr+0*PTR_SZ(STATE),inp0
- mov _args_data_ptr+1*PTR_SZ(STATE),inp1
- mov _args_data_ptr+2*PTR_SZ(STATE),inp2
- mov _args_data_ptr+3*PTR_SZ(STATE),inp3
- mov _args_data_ptr+4*PTR_SZ(STATE),inp4
- mov _args_data_ptr+5*PTR_SZ(STATE),inp5
- mov _args_data_ptr+6*PTR_SZ(STATE),inp6
- mov _args_data_ptr+7*PTR_SZ(STATE),inp7
-
- xor IDX, IDX
-lloop:
- xor ROUND, ROUND
-
- # save old digest
- vmovdqu a, _digest(%rsp)
- vmovdqu b, _digest+1*SZ8(%rsp)
- vmovdqu c, _digest+2*SZ8(%rsp)
- vmovdqu d, _digest+3*SZ8(%rsp)
- vmovdqu e, _digest+4*SZ8(%rsp)
- vmovdqu f, _digest+5*SZ8(%rsp)
- vmovdqu g, _digest+6*SZ8(%rsp)
- vmovdqu h, _digest+7*SZ8(%rsp)
- i = 0
-.rep 2
- VMOVPS i*32(inp0, IDX), TT0
- VMOVPS i*32(inp1, IDX), TT1
- VMOVPS i*32(inp2, IDX), TT2
- VMOVPS i*32(inp3, IDX), TT3
- VMOVPS i*32(inp4, IDX), TT4
- VMOVPS i*32(inp5, IDX), TT5
- VMOVPS i*32(inp6, IDX), TT6
- VMOVPS i*32(inp7, IDX), TT7
- vmovdqu g, _ytmp(%rsp)
- vmovdqu h, _ytmp+1*SZ8(%rsp)
- TRANSPOSE8 TT0, TT1, TT2, TT3, TT4, TT5, TT6, TT7, TMP0, TMP1
- vmovdqu PSHUFFLE_BYTE_FLIP_MASK(%rip), TMP1
- vmovdqu _ytmp(%rsp), g
- vpshufb TMP1, TT0, TT0
- vpshufb TMP1, TT1, TT1
- vpshufb TMP1, TT2, TT2
- vpshufb TMP1, TT3, TT3
- vpshufb TMP1, TT4, TT4
- vpshufb TMP1, TT5, TT5
- vpshufb TMP1, TT6, TT6
- vpshufb TMP1, TT7, TT7
- vmovdqu _ytmp+1*SZ8(%rsp), h
- vmovdqu TT4, _ytmp(%rsp)
- vmovdqu TT5, _ytmp+1*SZ8(%rsp)
- vmovdqu TT6, _ytmp+2*SZ8(%rsp)
- vmovdqu TT7, _ytmp+3*SZ8(%rsp)
- ROUND_00_15 TT0,(i*8+0)
- vmovdqu _ytmp(%rsp), TT0
- ROUND_00_15 TT1,(i*8+1)
- vmovdqu _ytmp+1*SZ8(%rsp), TT1
- ROUND_00_15 TT2,(i*8+2)
- vmovdqu _ytmp+2*SZ8(%rsp), TT2
- ROUND_00_15 TT3,(i*8+3)
- vmovdqu _ytmp+3*SZ8(%rsp), TT3
- ROUND_00_15 TT0,(i*8+4)
- ROUND_00_15 TT1,(i*8+5)
- ROUND_00_15 TT2,(i*8+6)
- ROUND_00_15 TT3,(i*8+7)
- i = (i+1)
-.endr
- add $64, IDX
- i = (i*8)
-
- jmp Lrounds_16_xx
-.align 16
-Lrounds_16_xx:
-.rep 16
- ROUND_16_XX T1, i
- i = (i+1)
-.endr
-
- cmp $ROUNDS,ROUND
- jb Lrounds_16_xx
-
- # add old digest
- vpaddd _digest+0*SZ8(%rsp), a, a
- vpaddd _digest+1*SZ8(%rsp), b, b
- vpaddd _digest+2*SZ8(%rsp), c, c
- vpaddd _digest+3*SZ8(%rsp), d, d
- vpaddd _digest+4*SZ8(%rsp), e, e
- vpaddd _digest+5*SZ8(%rsp), f, f
- vpaddd _digest+6*SZ8(%rsp), g, g
- vpaddd _digest+7*SZ8(%rsp), h, h
-
- sub $1, INP_SIZE # unit is blocks
- jne lloop
-
- # write back to memory (state object) the transposed digest
- vmovdqu a, 0*SHA256_DIGEST_ROW_SIZE(STATE)
- vmovdqu b, 1*SHA256_DIGEST_ROW_SIZE(STATE)
- vmovdqu c, 2*SHA256_DIGEST_ROW_SIZE(STATE)
- vmovdqu d, 3*SHA256_DIGEST_ROW_SIZE(STATE)
- vmovdqu e, 4*SHA256_DIGEST_ROW_SIZE(STATE)
- vmovdqu f, 5*SHA256_DIGEST_ROW_SIZE(STATE)
- vmovdqu g, 6*SHA256_DIGEST_ROW_SIZE(STATE)
- vmovdqu h, 7*SHA256_DIGEST_ROW_SIZE(STATE)
-
- # update input pointers
- add IDX, inp0
- mov inp0, _args_data_ptr+0*8(STATE)
- add IDX, inp1
- mov inp1, _args_data_ptr+1*8(STATE)
- add IDX, inp2
- mov inp2, _args_data_ptr+2*8(STATE)
- add IDX, inp3
- mov inp3, _args_data_ptr+3*8(STATE)
- add IDX, inp4
- mov inp4, _args_data_ptr+4*8(STATE)
- add IDX, inp5
- mov inp5, _args_data_ptr+5*8(STATE)
- add IDX, inp6
- mov inp6, _args_data_ptr+6*8(STATE)
- add IDX, inp7
- mov inp7, _args_data_ptr+7*8(STATE)
-
- # Postamble
- mov _rsp(%rsp), %rsp
-
- # restore callee-saved clobbered registers
- pop %r15
- pop %r14
- pop %r13
- pop %r12
-
- ret
-ENDPROC(sha256_x8_avx2)
-
-.section .rodata.K256_8, "a", @progbits
-.align 64
-K256_8:
- .octa 0x428a2f98428a2f98428a2f98428a2f98
- .octa 0x428a2f98428a2f98428a2f98428a2f98
- .octa 0x71374491713744917137449171374491
- .octa 0x71374491713744917137449171374491
- .octa 0xb5c0fbcfb5c0fbcfb5c0fbcfb5c0fbcf
- .octa 0xb5c0fbcfb5c0fbcfb5c0fbcfb5c0fbcf
- .octa 0xe9b5dba5e9b5dba5e9b5dba5e9b5dba5
- .octa 0xe9b5dba5e9b5dba5e9b5dba5e9b5dba5
- .octa 0x3956c25b3956c25b3956c25b3956c25b
- .octa 0x3956c25b3956c25b3956c25b3956c25b
- .octa 0x59f111f159f111f159f111f159f111f1
- .octa 0x59f111f159f111f159f111f159f111f1
- .octa 0x923f82a4923f82a4923f82a4923f82a4
- .octa 0x923f82a4923f82a4923f82a4923f82a4
- .octa 0xab1c5ed5ab1c5ed5ab1c5ed5ab1c5ed5
- .octa 0xab1c5ed5ab1c5ed5ab1c5ed5ab1c5ed5
- .octa 0xd807aa98d807aa98d807aa98d807aa98
- .octa 0xd807aa98d807aa98d807aa98d807aa98
- .octa 0x12835b0112835b0112835b0112835b01
- .octa 0x12835b0112835b0112835b0112835b01
- .octa 0x243185be243185be243185be243185be
- .octa 0x243185be243185be243185be243185be
- .octa 0x550c7dc3550c7dc3550c7dc3550c7dc3
- .octa 0x550c7dc3550c7dc3550c7dc3550c7dc3
- .octa 0x72be5d7472be5d7472be5d7472be5d74
- .octa 0x72be5d7472be5d7472be5d7472be5d74
- .octa 0x80deb1fe80deb1fe80deb1fe80deb1fe
- .octa 0x80deb1fe80deb1fe80deb1fe80deb1fe
- .octa 0x9bdc06a79bdc06a79bdc06a79bdc06a7
- .octa 0x9bdc06a79bdc06a79bdc06a79bdc06a7
- .octa 0xc19bf174c19bf174c19bf174c19bf174
- .octa 0xc19bf174c19bf174c19bf174c19bf174
- .octa 0xe49b69c1e49b69c1e49b69c1e49b69c1
- .octa 0xe49b69c1e49b69c1e49b69c1e49b69c1
- .octa 0xefbe4786efbe4786efbe4786efbe4786
- .octa 0xefbe4786efbe4786efbe4786efbe4786
- .octa 0x0fc19dc60fc19dc60fc19dc60fc19dc6
- .octa 0x0fc19dc60fc19dc60fc19dc60fc19dc6
- .octa 0x240ca1cc240ca1cc240ca1cc240ca1cc
- .octa 0x240ca1cc240ca1cc240ca1cc240ca1cc
- .octa 0x2de92c6f2de92c6f2de92c6f2de92c6f
- .octa 0x2de92c6f2de92c6f2de92c6f2de92c6f
- .octa 0x4a7484aa4a7484aa4a7484aa4a7484aa
- .octa 0x4a7484aa4a7484aa4a7484aa4a7484aa
- .octa 0x5cb0a9dc5cb0a9dc5cb0a9dc5cb0a9dc
- .octa 0x5cb0a9dc5cb0a9dc5cb0a9dc5cb0a9dc
- .octa 0x76f988da76f988da76f988da76f988da
- .octa 0x76f988da76f988da76f988da76f988da
- .octa 0x983e5152983e5152983e5152983e5152
- .octa 0x983e5152983e5152983e5152983e5152
- .octa 0xa831c66da831c66da831c66da831c66d
- .octa 0xa831c66da831c66da831c66da831c66d
- .octa 0xb00327c8b00327c8b00327c8b00327c8
- .octa 0xb00327c8b00327c8b00327c8b00327c8
- .octa 0xbf597fc7bf597fc7bf597fc7bf597fc7
- .octa 0xbf597fc7bf597fc7bf597fc7bf597fc7
- .octa 0xc6e00bf3c6e00bf3c6e00bf3c6e00bf3
- .octa 0xc6e00bf3c6e00bf3c6e00bf3c6e00bf3
- .octa 0xd5a79147d5a79147d5a79147d5a79147
- .octa 0xd5a79147d5a79147d5a79147d5a79147
- .octa 0x06ca635106ca635106ca635106ca6351
- .octa 0x06ca635106ca635106ca635106ca6351
- .octa 0x14292967142929671429296714292967
- .octa 0x14292967142929671429296714292967
- .octa 0x27b70a8527b70a8527b70a8527b70a85
- .octa 0x27b70a8527b70a8527b70a8527b70a85
- .octa 0x2e1b21382e1b21382e1b21382e1b2138
- .octa 0x2e1b21382e1b21382e1b21382e1b2138
- .octa 0x4d2c6dfc4d2c6dfc4d2c6dfc4d2c6dfc
- .octa 0x4d2c6dfc4d2c6dfc4d2c6dfc4d2c6dfc
- .octa 0x53380d1353380d1353380d1353380d13
- .octa 0x53380d1353380d1353380d1353380d13
- .octa 0x650a7354650a7354650a7354650a7354
- .octa 0x650a7354650a7354650a7354650a7354
- .octa 0x766a0abb766a0abb766a0abb766a0abb
- .octa 0x766a0abb766a0abb766a0abb766a0abb
- .octa 0x81c2c92e81c2c92e81c2c92e81c2c92e
- .octa 0x81c2c92e81c2c92e81c2c92e81c2c92e
- .octa 0x92722c8592722c8592722c8592722c85
- .octa 0x92722c8592722c8592722c8592722c85
- .octa 0xa2bfe8a1a2bfe8a1a2bfe8a1a2bfe8a1
- .octa 0xa2bfe8a1a2bfe8a1a2bfe8a1a2bfe8a1
- .octa 0xa81a664ba81a664ba81a664ba81a664b
- .octa 0xa81a664ba81a664ba81a664ba81a664b
- .octa 0xc24b8b70c24b8b70c24b8b70c24b8b70
- .octa 0xc24b8b70c24b8b70c24b8b70c24b8b70
- .octa 0xc76c51a3c76c51a3c76c51a3c76c51a3
- .octa 0xc76c51a3c76c51a3c76c51a3c76c51a3
- .octa 0xd192e819d192e819d192e819d192e819
- .octa 0xd192e819d192e819d192e819d192e819
- .octa 0xd6990624d6990624d6990624d6990624
- .octa 0xd6990624d6990624d6990624d6990624
- .octa 0xf40e3585f40e3585f40e3585f40e3585
- .octa 0xf40e3585f40e3585f40e3585f40e3585
- .octa 0x106aa070106aa070106aa070106aa070
- .octa 0x106aa070106aa070106aa070106aa070
- .octa 0x19a4c11619a4c11619a4c11619a4c116
- .octa 0x19a4c11619a4c11619a4c11619a4c116
- .octa 0x1e376c081e376c081e376c081e376c08
- .octa 0x1e376c081e376c081e376c081e376c08
- .octa 0x2748774c2748774c2748774c2748774c
- .octa 0x2748774c2748774c2748774c2748774c
- .octa 0x34b0bcb534b0bcb534b0bcb534b0bcb5
- .octa 0x34b0bcb534b0bcb534b0bcb534b0bcb5
- .octa 0x391c0cb3391c0cb3391c0cb3391c0cb3
- .octa 0x391c0cb3391c0cb3391c0cb3391c0cb3
- .octa 0x4ed8aa4a4ed8aa4a4ed8aa4a4ed8aa4a
- .octa 0x4ed8aa4a4ed8aa4a4ed8aa4a4ed8aa4a
- .octa 0x5b9cca4f5b9cca4f5b9cca4f5b9cca4f
- .octa 0x5b9cca4f5b9cca4f5b9cca4f5b9cca4f
- .octa 0x682e6ff3682e6ff3682e6ff3682e6ff3
- .octa 0x682e6ff3682e6ff3682e6ff3682e6ff3
- .octa 0x748f82ee748f82ee748f82ee748f82ee
- .octa 0x748f82ee748f82ee748f82ee748f82ee
- .octa 0x78a5636f78a5636f78a5636f78a5636f
- .octa 0x78a5636f78a5636f78a5636f78a5636f
- .octa 0x84c8781484c8781484c8781484c87814
- .octa 0x84c8781484c8781484c8781484c87814
- .octa 0x8cc702088cc702088cc702088cc70208
- .octa 0x8cc702088cc702088cc702088cc70208
- .octa 0x90befffa90befffa90befffa90befffa
- .octa 0x90befffa90befffa90befffa90befffa
- .octa 0xa4506ceba4506ceba4506ceba4506ceb
- .octa 0xa4506ceba4506ceba4506ceba4506ceb
- .octa 0xbef9a3f7bef9a3f7bef9a3f7bef9a3f7
- .octa 0xbef9a3f7bef9a3f7bef9a3f7bef9a3f7
- .octa 0xc67178f2c67178f2c67178f2c67178f2
- .octa 0xc67178f2c67178f2c67178f2c67178f2
-
-.section .rodata.cst32.PSHUFFLE_BYTE_FLIP_MASK, "aM", @progbits, 32
-.align 32
-PSHUFFLE_BYTE_FLIP_MASK:
-.octa 0x0c0d0e0f08090a0b0405060700010203
-.octa 0x0c0d0e0f08090a0b0405060700010203
-
-.section .rodata.cst256.K256, "aM", @progbits, 256
-.align 64
-.global K256
-K256:
- .int 0x428a2f98,0x71374491,0xb5c0fbcf,0xe9b5dba5
- .int 0x3956c25b,0x59f111f1,0x923f82a4,0xab1c5ed5
- .int 0xd807aa98,0x12835b01,0x243185be,0x550c7dc3
- .int 0x72be5d74,0x80deb1fe,0x9bdc06a7,0xc19bf174
- .int 0xe49b69c1,0xefbe4786,0x0fc19dc6,0x240ca1cc
- .int 0x2de92c6f,0x4a7484aa,0x5cb0a9dc,0x76f988da
- .int 0x983e5152,0xa831c66d,0xb00327c8,0xbf597fc7
- .int 0xc6e00bf3,0xd5a79147,0x06ca6351,0x14292967
- .int 0x27b70a85,0x2e1b2138,0x4d2c6dfc,0x53380d13
- .int 0x650a7354,0x766a0abb,0x81c2c92e,0x92722c85
- .int 0xa2bfe8a1,0xa81a664b,0xc24b8b70,0xc76c51a3
- .int 0xd192e819,0xd6990624,0xf40e3585,0x106aa070
- .int 0x19a4c116,0x1e376c08,0x2748774c,0x34b0bcb5
- .int 0x391c0cb3,0x4ed8aa4a,0x5b9cca4f,0x682e6ff3
- .int 0x748f82ee,0x78a5636f,0x84c87814,0x8cc70208
- .int 0x90befffa,0xa4506ceb,0xbef9a3f7,0xc67178f2
diff --git a/arch/x86/crypto/sha512-mb/Makefile b/arch/x86/crypto/sha512-mb/Makefile
deleted file mode 100644
index 90f1ef69152e..000000000000
--- a/arch/x86/crypto/sha512-mb/Makefile
+++ /dev/null
@@ -1,12 +0,0 @@
-# SPDX-License-Identifier: GPL-2.0
-#
-# Arch-specific CryptoAPI modules.
-#
-
-avx2_supported := $(call as-instr,vpgatherdd %ymm0$(comma)(%eax$(comma)%ymm1\
- $(comma)4)$(comma)%ymm2,yes,no)
-ifeq ($(avx2_supported),yes)
- obj-$(CONFIG_CRYPTO_SHA512_MB) += sha512-mb.o
- sha512-mb-y := sha512_mb.o sha512_mb_mgr_flush_avx2.o \
- sha512_mb_mgr_init_avx2.o sha512_mb_mgr_submit_avx2.o sha512_x4_avx2.o
-endif
diff --git a/arch/x86/crypto/sha512-mb/sha512_mb.c b/arch/x86/crypto/sha512-mb/sha512_mb.c
deleted file mode 100644
index 26b85678012d..000000000000
--- a/arch/x86/crypto/sha512-mb/sha512_mb.c
+++ /dev/null
@@ -1,1047 +0,0 @@
-/*
- * Multi buffer SHA512 algorithm Glue Code
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
-
-#include <crypto/internal/hash.h>
-#include <linux/init.h>
-#include <linux/module.h>
-#include <linux/mm.h>
-#include <linux/cryptohash.h>
-#include <linux/types.h>
-#include <linux/list.h>
-#include <crypto/scatterwalk.h>
-#include <crypto/sha.h>
-#include <crypto/mcryptd.h>
-#include <crypto/crypto_wq.h>
-#include <asm/byteorder.h>
-#include <linux/hardirq.h>
-#include <asm/fpu/api.h>
-#include "sha512_mb_ctx.h"
-
-#define FLUSH_INTERVAL 1000 /* in usec */
-
-static struct mcryptd_alg_state sha512_mb_alg_state;
-
-struct sha512_mb_ctx {
- struct mcryptd_ahash *mcryptd_tfm;
-};
-
-static inline struct mcryptd_hash_request_ctx
- *cast_hash_to_mcryptd_ctx(struct sha512_hash_ctx *hash_ctx)
-{
- struct ahash_request *areq;
-
- areq = container_of((void *) hash_ctx, struct ahash_request, __ctx);
- return container_of(areq, struct mcryptd_hash_request_ctx, areq);
-}
-
-static inline struct ahash_request
- *cast_mcryptd_ctx_to_req(struct mcryptd_hash_request_ctx *ctx)
-{
- return container_of((void *) ctx, struct ahash_request, __ctx);
-}
-
-static void req_ctx_init(struct mcryptd_hash_request_ctx *rctx,
- struct ahash_request *areq)
-{
- rctx->flag = HASH_UPDATE;
-}
-
-static asmlinkage void (*sha512_job_mgr_init)(struct sha512_mb_mgr *state);
-static asmlinkage struct job_sha512* (*sha512_job_mgr_submit)
- (struct sha512_mb_mgr *state,
- struct job_sha512 *job);
-static asmlinkage struct job_sha512* (*sha512_job_mgr_flush)
- (struct sha512_mb_mgr *state);
-static asmlinkage struct job_sha512* (*sha512_job_mgr_get_comp_job)
- (struct sha512_mb_mgr *state);
-
-inline uint32_t sha512_pad(uint8_t padblock[SHA512_BLOCK_SIZE * 2],
- uint64_t total_len)
-{
- uint32_t i = total_len & (SHA512_BLOCK_SIZE - 1);
-
- memset(&padblock[i], 0, SHA512_BLOCK_SIZE);
- padblock[i] = 0x80;
-
- i += ((SHA512_BLOCK_SIZE - 1) &
- (0 - (total_len + SHA512_PADLENGTHFIELD_SIZE + 1)))
- + 1 + SHA512_PADLENGTHFIELD_SIZE;
-
-#if SHA512_PADLENGTHFIELD_SIZE == 16
- *((uint64_t *) &padblock[i - 16]) = 0;
-#endif
-
- *((uint64_t *) &padblock[i - 8]) = cpu_to_be64(total_len << 3);
-
- /* Number of extra blocks to hash */
- return i >> SHA512_LOG2_BLOCK_SIZE;
-}
-
-static struct sha512_hash_ctx *sha512_ctx_mgr_resubmit
- (struct sha512_ctx_mgr *mgr, struct sha512_hash_ctx *ctx)
-{
- while (ctx) {
- if (ctx->status & HASH_CTX_STS_COMPLETE) {
- /* Clear PROCESSING bit */
- ctx->status = HASH_CTX_STS_COMPLETE;
- return ctx;
- }
-
- /*
- * If the extra blocks are empty, begin hashing what remains
- * in the user's buffer.
- */
- if (ctx->partial_block_buffer_length == 0 &&
- ctx->incoming_buffer_length) {
-
- const void *buffer = ctx->incoming_buffer;
- uint32_t len = ctx->incoming_buffer_length;
- uint32_t copy_len;
-
- /*
- * Only entire blocks can be hashed.
- * Copy remainder to extra blocks buffer.
- */
- copy_len = len & (SHA512_BLOCK_SIZE-1);
-
- if (copy_len) {
- len -= copy_len;
- memcpy(ctx->partial_block_buffer,
- ((const char *) buffer + len),
- copy_len);
- ctx->partial_block_buffer_length = copy_len;
- }
-
- ctx->incoming_buffer_length = 0;
-
- /* len should be a multiple of the block size now */
- assert((len % SHA512_BLOCK_SIZE) == 0);
-
- /* Set len to the number of blocks to be hashed */
- len >>= SHA512_LOG2_BLOCK_SIZE;
-
- if (len) {
-
- ctx->job.buffer = (uint8_t *) buffer;
- ctx->job.len = len;
- ctx = (struct sha512_hash_ctx *)
- sha512_job_mgr_submit(&mgr->mgr,
- &ctx->job);
- continue;
- }
- }
-
- /*
- * If the extra blocks are not empty, then we are
- * either on the last block(s) or we need more
- * user input before continuing.
- */
- if (ctx->status & HASH_CTX_STS_LAST) {
-
- uint8_t *buf = ctx->partial_block_buffer;
- uint32_t n_extra_blocks =
- sha512_pad(buf, ctx->total_length);
-
- ctx->status = (HASH_CTX_STS_PROCESSING |
- HASH_CTX_STS_COMPLETE);
- ctx->job.buffer = buf;
- ctx->job.len = (uint32_t) n_extra_blocks;
- ctx = (struct sha512_hash_ctx *)
- sha512_job_mgr_submit(&mgr->mgr, &ctx->job);
- continue;
- }
-
- if (ctx)
- ctx->status = HASH_CTX_STS_IDLE;
- return ctx;
- }
-
- return NULL;
-}
-
-static struct sha512_hash_ctx
- *sha512_ctx_mgr_get_comp_ctx(struct mcryptd_alg_cstate *cstate)
-{
- /*
- * If get_comp_job returns NULL, there are no jobs complete.
- * If get_comp_job returns a job, verify that it is safe to return to
- * the user.
- * If it is not ready, resubmit the job to finish processing.
- * If sha512_ctx_mgr_resubmit returned a job, it is ready to be
- * returned.
- * Otherwise, all jobs currently being managed by the hash_ctx_mgr
- * still need processing.
- */
- struct sha512_ctx_mgr *mgr;
- struct sha512_hash_ctx *ctx;
- unsigned long flags;
-
- mgr = cstate->mgr;
- spin_lock_irqsave(&cstate->work_lock, flags);
- ctx = (struct sha512_hash_ctx *)
- sha512_job_mgr_get_comp_job(&mgr->mgr);
- ctx = sha512_ctx_mgr_resubmit(mgr, ctx);
- spin_unlock_irqrestore(&cstate->work_lock, flags);
- return ctx;
-}
-
-static void sha512_ctx_mgr_init(struct sha512_ctx_mgr *mgr)
-{
- sha512_job_mgr_init(&mgr->mgr);
-}
-
-static struct sha512_hash_ctx
- *sha512_ctx_mgr_submit(struct mcryptd_alg_cstate *cstate,
- struct sha512_hash_ctx *ctx,
- const void *buffer,
- uint32_t len,
- int flags)
-{
- struct sha512_ctx_mgr *mgr;
- unsigned long irqflags;
-
- mgr = cstate->mgr;
- spin_lock_irqsave(&cstate->work_lock, irqflags);
- if (flags & ~(HASH_UPDATE | HASH_LAST)) {
- /* User should not pass anything other than UPDATE or LAST */
- ctx->error = HASH_CTX_ERROR_INVALID_FLAGS;
- goto unlock;
- }
-
- if (ctx->status & HASH_CTX_STS_PROCESSING) {
- /* Cannot submit to a currently processing job. */
- ctx->error = HASH_CTX_ERROR_ALREADY_PROCESSING;
- goto unlock;
- }
-
- if (ctx->status & HASH_CTX_STS_COMPLETE) {
- /* Cannot update a finished job. */
- ctx->error = HASH_CTX_ERROR_ALREADY_COMPLETED;
- goto unlock;
- }
-
- /*
- * If we made it here, there were no errors during this call to
- * submit
- */
- ctx->error = HASH_CTX_ERROR_NONE;
-
- /* Store buffer ptr info from user */
- ctx->incoming_buffer = buffer;
- ctx->incoming_buffer_length = len;
-
- /*
- * Store the user's request flags and mark this ctx as currently being
- * processed.
- */
- ctx->status = (flags & HASH_LAST) ?
- (HASH_CTX_STS_PROCESSING | HASH_CTX_STS_LAST) :
- HASH_CTX_STS_PROCESSING;
-
- /* Advance byte counter */
- ctx->total_length += len;
-
- /*
- * If there is anything currently buffered in the extra blocks,
- * append to it until it contains a whole block.
- * Or if the user's buffer contains less than a whole block,
- * append as much as possible to the extra block.
- */
- if (ctx->partial_block_buffer_length || len < SHA512_BLOCK_SIZE) {
- /* Compute how many bytes to copy from user buffer into extra
- * block
- */
- uint32_t copy_len = SHA512_BLOCK_SIZE -
- ctx->partial_block_buffer_length;
- if (len < copy_len)
- copy_len = len;
-
- if (copy_len) {
- /* Copy and update relevant pointers and counters */
- memcpy
- (&ctx->partial_block_buffer[ctx->partial_block_buffer_length],
- buffer, copy_len);
-
- ctx->partial_block_buffer_length += copy_len;
- ctx->incoming_buffer = (const void *)
- ((const char *)buffer + copy_len);
- ctx->incoming_buffer_length = len - copy_len;
- }
-
- /* The extra block should never contain more than 1 block
- * here
- */
- assert(ctx->partial_block_buffer_length <= SHA512_BLOCK_SIZE);
-
- /* If the extra block buffer contains exactly 1 block, it can
- * be hashed.
- */
- if (ctx->partial_block_buffer_length >= SHA512_BLOCK_SIZE) {
- ctx->partial_block_buffer_length = 0;
-
- ctx->job.buffer = ctx->partial_block_buffer;
- ctx->job.len = 1;
- ctx = (struct sha512_hash_ctx *)
- sha512_job_mgr_submit(&mgr->mgr, &ctx->job);
- }
- }
-
- ctx = sha512_ctx_mgr_resubmit(mgr, ctx);
-unlock:
- spin_unlock_irqrestore(&cstate->work_lock, irqflags);
- return ctx;
-}
-
-static struct sha512_hash_ctx *sha512_ctx_mgr_flush(struct mcryptd_alg_cstate *cstate)
-{
- struct sha512_ctx_mgr *mgr;
- struct sha512_hash_ctx *ctx;
- unsigned long flags;
-
- mgr = cstate->mgr;
- spin_lock_irqsave(&cstate->work_lock, flags);
- while (1) {
- ctx = (struct sha512_hash_ctx *)
- sha512_job_mgr_flush(&mgr->mgr);
-
- /* If flush returned 0, there are no more jobs in flight. */
- if (!ctx)
- break;
-
- /*
- * If flush returned a job, resubmit the job to finish
- * processing.
- */
- ctx = sha512_ctx_mgr_resubmit(mgr, ctx);
-
- /*
- * If sha512_ctx_mgr_resubmit returned a job, it is ready to
- * be returned. Otherwise, all jobs currently being managed by
- * the sha512_ctx_mgr still need processing. Loop.
- */
- if (ctx)
- break;
- }
- spin_unlock_irqrestore(&cstate->work_lock, flags);
- return ctx;
-}
-
-static int sha512_mb_init(struct ahash_request *areq)
-{
- struct sha512_hash_ctx *sctx = ahash_request_ctx(areq);
-
- hash_ctx_init(sctx);
- sctx->job.result_digest[0] = SHA512_H0;
- sctx->job.result_digest[1] = SHA512_H1;
- sctx->job.result_digest[2] = SHA512_H2;
- sctx->job.result_digest[3] = SHA512_H3;
- sctx->job.result_digest[4] = SHA512_H4;
- sctx->job.result_digest[5] = SHA512_H5;
- sctx->job.result_digest[6] = SHA512_H6;
- sctx->job.result_digest[7] = SHA512_H7;
- sctx->total_length = 0;
- sctx->partial_block_buffer_length = 0;
- sctx->status = HASH_CTX_STS_IDLE;
-
- return 0;
-}
-
-static int sha512_mb_set_results(struct mcryptd_hash_request_ctx *rctx)
-{
- int i;
- struct sha512_hash_ctx *sctx = ahash_request_ctx(&rctx->areq);
- __be64 *dst = (__be64 *) rctx->out;
-
- for (i = 0; i < 8; ++i)
- dst[i] = cpu_to_be64(sctx->job.result_digest[i]);
-
- return 0;
-}
-
-static int sha_finish_walk(struct mcryptd_hash_request_ctx **ret_rctx,
- struct mcryptd_alg_cstate *cstate, bool flush)
-{
- int flag = HASH_UPDATE;
- int nbytes, err = 0;
- struct mcryptd_hash_request_ctx *rctx = *ret_rctx;
- struct sha512_hash_ctx *sha_ctx;
-
- /* more work ? */
- while (!(rctx->flag & HASH_DONE)) {
- nbytes = crypto_ahash_walk_done(&rctx->walk, 0);
- if (nbytes < 0) {
- err = nbytes;
- goto out;
- }
- /* check if the walk is done */
- if (crypto_ahash_walk_last(&rctx->walk)) {
- rctx->flag |= HASH_DONE;
- if (rctx->flag & HASH_FINAL)
- flag |= HASH_LAST;
-
- }
- sha_ctx = (struct sha512_hash_ctx *)
- ahash_request_ctx(&rctx->areq);
- kernel_fpu_begin();
- sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx,
- rctx->walk.data, nbytes, flag);
- if (!sha_ctx) {
- if (flush)
- sha_ctx = sha512_ctx_mgr_flush(cstate);
- }
- kernel_fpu_end();
- if (sha_ctx)
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- else {
- rctx = NULL;
- goto out;
- }
- }
-
- /* copy the results */
- if (rctx->flag & HASH_FINAL)
- sha512_mb_set_results(rctx);
-
-out:
- *ret_rctx = rctx;
- return err;
-}
-
-static int sha_complete_job(struct mcryptd_hash_request_ctx *rctx,
- struct mcryptd_alg_cstate *cstate,
- int err)
-{
- struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
- struct sha512_hash_ctx *sha_ctx;
- struct mcryptd_hash_request_ctx *req_ctx;
- int ret;
- unsigned long flags;
-
- /* remove from work list */
- spin_lock_irqsave(&cstate->work_lock, flags);
- list_del(&rctx->waiter);
- spin_unlock_irqrestore(&cstate->work_lock, flags);
-
- if (irqs_disabled())
- rctx->complete(&req->base, err);
- else {
- local_bh_disable();
- rctx->complete(&req->base, err);
- local_bh_enable();
- }
-
- /* check to see if there are other jobs that are done */
- sha_ctx = sha512_ctx_mgr_get_comp_ctx(cstate);
- while (sha_ctx) {
- req_ctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&req_ctx, cstate, false);
- if (req_ctx) {
- spin_lock_irqsave(&cstate->work_lock, flags);
- list_del(&req_ctx->waiter);
- spin_unlock_irqrestore(&cstate->work_lock, flags);
-
- req = cast_mcryptd_ctx_to_req(req_ctx);
- if (irqs_disabled())
- req_ctx->complete(&req->base, ret);
- else {
- local_bh_disable();
- req_ctx->complete(&req->base, ret);
- local_bh_enable();
- }
- }
- sha_ctx = sha512_ctx_mgr_get_comp_ctx(cstate);
- }
-
- return 0;
-}
-
-static void sha512_mb_add_list(struct mcryptd_hash_request_ctx *rctx,
- struct mcryptd_alg_cstate *cstate)
-{
- unsigned long next_flush;
- unsigned long delay = usecs_to_jiffies(FLUSH_INTERVAL);
- unsigned long flags;
-
- /* initialize tag */
- rctx->tag.arrival = jiffies; /* tag the arrival time */
- rctx->tag.seq_num = cstate->next_seq_num++;
- next_flush = rctx->tag.arrival + delay;
- rctx->tag.expire = next_flush;
-
- spin_lock_irqsave(&cstate->work_lock, flags);
- list_add_tail(&rctx->waiter, &cstate->work_list);
- spin_unlock_irqrestore(&cstate->work_lock, flags);
-
- mcryptd_arm_flusher(cstate, delay);
-}
-
-static int sha512_mb_update(struct ahash_request *areq)
-{
- struct mcryptd_hash_request_ctx *rctx =
- container_of(areq, struct mcryptd_hash_request_ctx,
- areq);
- struct mcryptd_alg_cstate *cstate =
- this_cpu_ptr(sha512_mb_alg_state.alg_cstate);
-
- struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
- struct sha512_hash_ctx *sha_ctx;
- int ret = 0, nbytes;
-
-
- /* sanity check */
- if (rctx->tag.cpu != smp_processor_id()) {
- pr_err("mcryptd error: cpu clash\n");
- goto done;
- }
-
- /* need to init context */
- req_ctx_init(rctx, areq);
-
- nbytes = crypto_ahash_walk_first(req, &rctx->walk);
-
- if (nbytes < 0) {
- ret = nbytes;
- goto done;
- }
-
- if (crypto_ahash_walk_last(&rctx->walk))
- rctx->flag |= HASH_DONE;
-
- /* submit */
- sha_ctx = (struct sha512_hash_ctx *) ahash_request_ctx(areq);
- sha512_mb_add_list(rctx, cstate);
- kernel_fpu_begin();
- sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx, rctx->walk.data,
- nbytes, HASH_UPDATE);
- kernel_fpu_end();
-
- /* check if anything is returned */
- if (!sha_ctx)
- return -EINPROGRESS;
-
- if (sha_ctx->error) {
- ret = sha_ctx->error;
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- goto done;
- }
-
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&rctx, cstate, false);
-
- if (!rctx)
- return -EINPROGRESS;
-done:
- sha_complete_job(rctx, cstate, ret);
- return ret;
-}
-
-static int sha512_mb_finup(struct ahash_request *areq)
-{
- struct mcryptd_hash_request_ctx *rctx =
- container_of(areq, struct mcryptd_hash_request_ctx,
- areq);
- struct mcryptd_alg_cstate *cstate =
- this_cpu_ptr(sha512_mb_alg_state.alg_cstate);
-
- struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
- struct sha512_hash_ctx *sha_ctx;
- int ret = 0, flag = HASH_UPDATE, nbytes;
-
- /* sanity check */
- if (rctx->tag.cpu != smp_processor_id()) {
- pr_err("mcryptd error: cpu clash\n");
- goto done;
- }
-
- /* need to init context */
- req_ctx_init(rctx, areq);
-
- nbytes = crypto_ahash_walk_first(req, &rctx->walk);
-
- if (nbytes < 0) {
- ret = nbytes;
- goto done;
- }
-
- if (crypto_ahash_walk_last(&rctx->walk)) {
- rctx->flag |= HASH_DONE;
- flag = HASH_LAST;
- }
-
- /* submit */
- rctx->flag |= HASH_FINAL;
- sha_ctx = (struct sha512_hash_ctx *) ahash_request_ctx(areq);
- sha512_mb_add_list(rctx, cstate);
-
- kernel_fpu_begin();
- sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx, rctx->walk.data,
- nbytes, flag);
- kernel_fpu_end();
-
- /* check if anything is returned */
- if (!sha_ctx)
- return -EINPROGRESS;
-
- if (sha_ctx->error) {
- ret = sha_ctx->error;
- goto done;
- }
-
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&rctx, cstate, false);
- if (!rctx)
- return -EINPROGRESS;
-done:
- sha_complete_job(rctx, cstate, ret);
- return ret;
-}
-
-static int sha512_mb_final(struct ahash_request *areq)
-{
- struct mcryptd_hash_request_ctx *rctx =
- container_of(areq, struct mcryptd_hash_request_ctx,
- areq);
- struct mcryptd_alg_cstate *cstate =
- this_cpu_ptr(sha512_mb_alg_state.alg_cstate);
-
- struct sha512_hash_ctx *sha_ctx;
- int ret = 0;
- u8 data;
-
- /* sanity check */
- if (rctx->tag.cpu != smp_processor_id()) {
- pr_err("mcryptd error: cpu clash\n");
- goto done;
- }
-
- /* need to init context */
- req_ctx_init(rctx, areq);
-
- rctx->flag |= HASH_DONE | HASH_FINAL;
-
- sha_ctx = (struct sha512_hash_ctx *) ahash_request_ctx(areq);
- /* flag HASH_FINAL and 0 data size */
- sha512_mb_add_list(rctx, cstate);
- kernel_fpu_begin();
- sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx, &data, 0, HASH_LAST);
- kernel_fpu_end();
-
- /* check if anything is returned */
- if (!sha_ctx)
- return -EINPROGRESS;
-
- if (sha_ctx->error) {
- ret = sha_ctx->error;
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- goto done;
- }
-
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- ret = sha_finish_walk(&rctx, cstate, false);
- if (!rctx)
- return -EINPROGRESS;
-done:
- sha_complete_job(rctx, cstate, ret);
- return ret;
-}
-
-static int sha512_mb_export(struct ahash_request *areq, void *out)
-{
- struct sha512_hash_ctx *sctx = ahash_request_ctx(areq);
-
- memcpy(out, sctx, sizeof(*sctx));
-
- return 0;
-}
-
-static int sha512_mb_import(struct ahash_request *areq, const void *in)
-{
- struct sha512_hash_ctx *sctx = ahash_request_ctx(areq);
-
- memcpy(sctx, in, sizeof(*sctx));
-
- return 0;
-}
-
-static int sha512_mb_async_init_tfm(struct crypto_tfm *tfm)
-{
- struct mcryptd_ahash *mcryptd_tfm;
- struct sha512_mb_ctx *ctx = crypto_tfm_ctx(tfm);
- struct mcryptd_hash_ctx *mctx;
-
- mcryptd_tfm = mcryptd_alloc_ahash("__intel_sha512-mb",
- CRYPTO_ALG_INTERNAL,
- CRYPTO_ALG_INTERNAL);
- if (IS_ERR(mcryptd_tfm))
- return PTR_ERR(mcryptd_tfm);
- mctx = crypto_ahash_ctx(&mcryptd_tfm->base);
- mctx->alg_state = &sha512_mb_alg_state;
- ctx->mcryptd_tfm = mcryptd_tfm;
- crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
- sizeof(struct ahash_request) +
- crypto_ahash_reqsize(&mcryptd_tfm->base));
-
- return 0;
-}
-
-static void sha512_mb_async_exit_tfm(struct crypto_tfm *tfm)
-{
- struct sha512_mb_ctx *ctx = crypto_tfm_ctx(tfm);
-
- mcryptd_free_ahash(ctx->mcryptd_tfm);
-}
-
-static int sha512_mb_areq_init_tfm(struct crypto_tfm *tfm)
-{
- crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
- sizeof(struct ahash_request) +
- sizeof(struct sha512_hash_ctx));
-
- return 0;
-}
-
-static void sha512_mb_areq_exit_tfm(struct crypto_tfm *tfm)
-{
- struct sha512_mb_ctx *ctx = crypto_tfm_ctx(tfm);
-
- mcryptd_free_ahash(ctx->mcryptd_tfm);
-}
-
-static struct ahash_alg sha512_mb_areq_alg = {
- .init = sha512_mb_init,
- .update = sha512_mb_update,
- .final = sha512_mb_final,
- .finup = sha512_mb_finup,
- .export = sha512_mb_export,
- .import = sha512_mb_import,
- .halg = {
- .digestsize = SHA512_DIGEST_SIZE,
- .statesize = sizeof(struct sha512_hash_ctx),
- .base = {
- .cra_name = "__sha512-mb",
- .cra_driver_name = "__intel_sha512-mb",
- .cra_priority = 100,
- /*
- * use ASYNC flag as some buffers in multi-buffer
- * algo may not have completed before hashing thread
- * sleep
- */
- .cra_flags = CRYPTO_ALG_ASYNC |
- CRYPTO_ALG_INTERNAL,
- .cra_blocksize = SHA512_BLOCK_SIZE,
- .cra_module = THIS_MODULE,
- .cra_list = LIST_HEAD_INIT
- (sha512_mb_areq_alg.halg.base.cra_list),
- .cra_init = sha512_mb_areq_init_tfm,
- .cra_exit = sha512_mb_areq_exit_tfm,
- .cra_ctxsize = sizeof(struct sha512_hash_ctx),
- }
- }
-};
-
-static int sha512_mb_async_init(struct ahash_request *req)
-{
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_init(mcryptd_req);
-}
-
-static int sha512_mb_async_update(struct ahash_request *req)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
-
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_update(mcryptd_req);
-}
-
-static int sha512_mb_async_finup(struct ahash_request *req)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
-
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_finup(mcryptd_req);
-}
-
-static int sha512_mb_async_final(struct ahash_request *req)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
-
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_final(mcryptd_req);
-}
-
-static int sha512_mb_async_digest(struct ahash_request *req)
-{
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_digest(mcryptd_req);
-}
-
-static int sha512_mb_async_export(struct ahash_request *req, void *out)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- return crypto_ahash_export(mcryptd_req, out);
-}
-
-static int sha512_mb_async_import(struct ahash_request *req, const void *in)
-{
- struct ahash_request *mcryptd_req = ahash_request_ctx(req);
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
- struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
- struct crypto_ahash *child = mcryptd_ahash_child(mcryptd_tfm);
- struct mcryptd_hash_request_ctx *rctx;
- struct ahash_request *areq;
-
- memcpy(mcryptd_req, req, sizeof(*req));
- ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
- rctx = ahash_request_ctx(mcryptd_req);
-
- areq = &rctx->areq;
-
- ahash_request_set_tfm(areq, child);
- ahash_request_set_callback(areq, CRYPTO_TFM_REQ_MAY_SLEEP,
- rctx->complete, req);
-
- return crypto_ahash_import(mcryptd_req, in);
-}
-
-static struct ahash_alg sha512_mb_async_alg = {
- .init = sha512_mb_async_init,
- .update = sha512_mb_async_update,
- .final = sha512_mb_async_final,
- .finup = sha512_mb_async_finup,
- .digest = sha512_mb_async_digest,
- .export = sha512_mb_async_export,
- .import = sha512_mb_async_import,
- .halg = {
- .digestsize = SHA512_DIGEST_SIZE,
- .statesize = sizeof(struct sha512_hash_ctx),
- .base = {
- .cra_name = "sha512",
- .cra_driver_name = "sha512_mb",
- /*
- * Low priority, since with few concurrent hash requests
- * this is extremely slow due to the flush delay. Users
- * whose workloads would benefit from this can request
- * it explicitly by driver name, or can increase its
- * priority at runtime using NETLINK_CRYPTO.
- */
- .cra_priority = 50,
- .cra_flags = CRYPTO_ALG_ASYNC,
- .cra_blocksize = SHA512_BLOCK_SIZE,
- .cra_module = THIS_MODULE,
- .cra_list = LIST_HEAD_INIT
- (sha512_mb_async_alg.halg.base.cra_list),
- .cra_init = sha512_mb_async_init_tfm,
- .cra_exit = sha512_mb_async_exit_tfm,
- .cra_ctxsize = sizeof(struct sha512_mb_ctx),
- .cra_alignmask = 0,
- },
- },
-};
-
-static unsigned long sha512_mb_flusher(struct mcryptd_alg_cstate *cstate)
-{
- struct mcryptd_hash_request_ctx *rctx;
- unsigned long cur_time;
- unsigned long next_flush = 0;
- struct sha512_hash_ctx *sha_ctx;
-
-
- cur_time = jiffies;
-
- while (!list_empty(&cstate->work_list)) {
- rctx = list_entry(cstate->work_list.next,
- struct mcryptd_hash_request_ctx, waiter);
- if time_before(cur_time, rctx->tag.expire)
- break;
- kernel_fpu_begin();
- sha_ctx = (struct sha512_hash_ctx *)
- sha512_ctx_mgr_flush(cstate);
- kernel_fpu_end();
- if (!sha_ctx) {
- pr_err("sha512_mb error: nothing got flushed for"
- " non-empty list\n");
- break;
- }
- rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
- sha_finish_walk(&rctx, cstate, true);
- sha_complete_job(rctx, cstate, 0);
- }
-
- if (!list_empty(&cstate->work_list)) {
- rctx = list_entry(cstate->work_list.next,
- struct mcryptd_hash_request_ctx, waiter);
- /* get the hash context and then flush time */
- next_flush = rctx->tag.expire;
- mcryptd_arm_flusher(cstate, get_delay(next_flush));
- }
- return next_flush;
-}
-
-static int __init sha512_mb_mod_init(void)
-{
-
- int cpu;
- int err;
- struct mcryptd_alg_cstate *cpu_state;
-
- /* check for dependent cpu features */
- if (!boot_cpu_has(X86_FEATURE_AVX2) ||
- !boot_cpu_has(X86_FEATURE_BMI2))
- return -ENODEV;
-
- /* initialize multibuffer structures */
- sha512_mb_alg_state.alg_cstate =
- alloc_percpu(struct mcryptd_alg_cstate);
-
- sha512_job_mgr_init = sha512_mb_mgr_init_avx2;
- sha512_job_mgr_submit = sha512_mb_mgr_submit_avx2;
- sha512_job_mgr_flush = sha512_mb_mgr_flush_avx2;
- sha512_job_mgr_get_comp_job = sha512_mb_mgr_get_comp_job_avx2;
-
- if (!sha512_mb_alg_state.alg_cstate)
- return -ENOMEM;
- for_each_possible_cpu(cpu) {
- cpu_state = per_cpu_ptr(sha512_mb_alg_state.alg_cstate, cpu);
- cpu_state->next_flush = 0;
- cpu_state->next_seq_num = 0;
- cpu_state->flusher_engaged = false;
- INIT_DELAYED_WORK(&cpu_state->flush, mcryptd_flusher);
- cpu_state->cpu = cpu;
- cpu_state->alg_state = &sha512_mb_alg_state;
- cpu_state->mgr = kzalloc(sizeof(struct sha512_ctx_mgr),
- GFP_KERNEL);
- if (!cpu_state->mgr)
- goto err2;
- sha512_ctx_mgr_init(cpu_state->mgr);
- INIT_LIST_HEAD(&cpu_state->work_list);
- spin_lock_init(&cpu_state->work_lock);
- }
- sha512_mb_alg_state.flusher = &sha512_mb_flusher;
-
- err = crypto_register_ahash(&sha512_mb_areq_alg);
- if (err)
- goto err2;
- err = crypto_register_ahash(&sha512_mb_async_alg);
- if (err)
- goto err1;
-
-
- return 0;
-err1:
- crypto_unregister_ahash(&sha512_mb_areq_alg);
-err2:
- for_each_possible_cpu(cpu) {
- cpu_state = per_cpu_ptr(sha512_mb_alg_state.alg_cstate, cpu);
- kfree(cpu_state->mgr);
- }
- free_percpu(sha512_mb_alg_state.alg_cstate);
- return -ENODEV;
-}
-
-static void __exit sha512_mb_mod_fini(void)
-{
- int cpu;
- struct mcryptd_alg_cstate *cpu_state;
-
- crypto_unregister_ahash(&sha512_mb_async_alg);
- crypto_unregister_ahash(&sha512_mb_areq_alg);
- for_each_possible_cpu(cpu) {
- cpu_state = per_cpu_ptr(sha512_mb_alg_state.alg_cstate, cpu);
- kfree(cpu_state->mgr);
- }
- free_percpu(sha512_mb_alg_state.alg_cstate);
-}
-
-module_init(sha512_mb_mod_init);
-module_exit(sha512_mb_mod_fini);
-
-MODULE_LICENSE("GPL");
-MODULE_DESCRIPTION("SHA512 Secure Hash Algorithm, multi buffer accelerated");
-
-MODULE_ALIAS("sha512");
diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_ctx.h b/arch/x86/crypto/sha512-mb/sha512_mb_ctx.h
deleted file mode 100644
index e5c465bd821e..000000000000
--- a/arch/x86/crypto/sha512-mb/sha512_mb_ctx.h
+++ /dev/null
@@ -1,128 +0,0 @@
-/*
- * Header file for multi buffer SHA512 context
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#ifndef _SHA_MB_CTX_INTERNAL_H
-#define _SHA_MB_CTX_INTERNAL_H
-
-#include "sha512_mb_mgr.h"
-
-#define HASH_UPDATE 0x00
-#define HASH_LAST 0x01
-#define HASH_DONE 0x02
-#define HASH_FINAL 0x04
-
-#define HASH_CTX_STS_IDLE 0x00
-#define HASH_CTX_STS_PROCESSING 0x01
-#define HASH_CTX_STS_LAST 0x02
-#define HASH_CTX_STS_COMPLETE 0x04
-
-enum hash_ctx_error {
- HASH_CTX_ERROR_NONE = 0,
- HASH_CTX_ERROR_INVALID_FLAGS = -1,
- HASH_CTX_ERROR_ALREADY_PROCESSING = -2,
- HASH_CTX_ERROR_ALREADY_COMPLETED = -3,
-};
-
-#define hash_ctx_user_data(ctx) ((ctx)->user_data)
-#define hash_ctx_digest(ctx) ((ctx)->job.result_digest)
-#define hash_ctx_processing(ctx) ((ctx)->status & HASH_CTX_STS_PROCESSING)
-#define hash_ctx_complete(ctx) ((ctx)->status == HASH_CTX_STS_COMPLETE)
-#define hash_ctx_status(ctx) ((ctx)->status)
-#define hash_ctx_error(ctx) ((ctx)->error)
-#define hash_ctx_init(ctx) \
- do { \
- (ctx)->error = HASH_CTX_ERROR_NONE; \
- (ctx)->status = HASH_CTX_STS_COMPLETE; \
- } while (0)
-
-/* Hash Constants and Typedefs */
-#define SHA512_DIGEST_LENGTH 8
-#define SHA512_LOG2_BLOCK_SIZE 7
-
-#define SHA512_PADLENGTHFIELD_SIZE 16
-
-#ifdef SHA_MB_DEBUG
-#define assert(expr) \
-do { \
- if (unlikely(!(expr))) { \
- printk(KERN_ERR "Assertion failed! %s,%s,%s,line=%d\n", \
- #expr, __FILE__, __func__, __LINE__); \
- } \
-} while (0)
-#else
-#define assert(expr) do {} while (0)
-#endif
-
-struct sha512_ctx_mgr {
- struct sha512_mb_mgr mgr;
-};
-
-/* typedef struct sha512_ctx_mgr sha512_ctx_mgr; */
-
-struct sha512_hash_ctx {
- /* Must be at struct offset 0 */
- struct job_sha512 job;
- /* status flag */
- int status;
- /* error flag */
- int error;
-
- uint64_t total_length;
- const void *incoming_buffer;
- uint32_t incoming_buffer_length;
- uint8_t partial_block_buffer[SHA512_BLOCK_SIZE * 2];
- uint32_t partial_block_buffer_length;
- void *user_data;
-};
-
-#endif
diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr.h b/arch/x86/crypto/sha512-mb/sha512_mb_mgr.h
deleted file mode 100644
index 178f17eef382..000000000000
--- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr.h
+++ /dev/null
@@ -1,104 +0,0 @@
-/*
- * Header file for multi buffer SHA512 algorithm manager
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#ifndef __SHA_MB_MGR_H
-#define __SHA_MB_MGR_H
-
-#include <linux/types.h>
-
-#define NUM_SHA512_DIGEST_WORDS 8
-
-enum job_sts {STS_UNKNOWN = 0,
- STS_BEING_PROCESSED = 1,
- STS_COMPLETED = 2,
- STS_INTERNAL_ERROR = 3,
- STS_ERROR = 4
-};
-
-struct job_sha512 {
- u8 *buffer;
- u64 len;
- u64 result_digest[NUM_SHA512_DIGEST_WORDS] __aligned(32);
- enum job_sts status;
- void *user_data;
-};
-
-struct sha512_args_x4 {
- uint64_t digest[8][4];
- uint8_t *data_ptr[4];
-};
-
-struct sha512_lane_data {
- struct job_sha512 *job_in_lane;
-};
-
-struct sha512_mb_mgr {
- struct sha512_args_x4 args;
-
- uint64_t lens[4];
-
- /* each byte is index (0...7) of unused lanes */
- uint64_t unused_lanes;
- /* byte 4 is set to FF as a flag */
- struct sha512_lane_data ldata[4];
-};
-
-#define SHA512_MB_MGR_NUM_LANES_AVX2 4
-
-void sha512_mb_mgr_init_avx2(struct sha512_mb_mgr *state);
-struct job_sha512 *sha512_mb_mgr_submit_avx2(struct sha512_mb_mgr *state,
- struct job_sha512 *job);
-struct job_sha512 *sha512_mb_mgr_flush_avx2(struct sha512_mb_mgr *state);
-struct job_sha512 *sha512_mb_mgr_get_comp_job_avx2(struct sha512_mb_mgr *state);
-
-#endif
diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S
deleted file mode 100644
index cf2636d4c9ba..000000000000
--- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S
+++ /dev/null
@@ -1,281 +0,0 @@
-/*
- * Header file for multi buffer SHA256 algorithm data structure
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-# Macros for defining data structures
-
-# Usage example
-
-#START_FIELDS # JOB_AES
-### name size align
-#FIELD _plaintext, 8, 8 # pointer to plaintext
-#FIELD _ciphertext, 8, 8 # pointer to ciphertext
-#FIELD _IV, 16, 8 # IV
-#FIELD _keys, 8, 8 # pointer to keys
-#FIELD _len, 4, 4 # length in bytes
-#FIELD _status, 4, 4 # status enumeration
-#FIELD _user_data, 8, 8 # pointer to user data
-#UNION _union, size1, align1, \
-# size2, align2, \
-# size3, align3, \
-# ...
-#END_FIELDS
-#%assign _JOB_AES_size _FIELD_OFFSET
-#%assign _JOB_AES_align _STRUCT_ALIGN
-
-#########################################################################
-
-# Alternate "struc-like" syntax:
-# STRUCT job_aes2
-# RES_Q .plaintext, 1
-# RES_Q .ciphertext, 1
-# RES_DQ .IV, 1
-# RES_B .nested, _JOB_AES_SIZE, _JOB_AES_ALIGN
-# RES_U .union, size1, align1, \
-# size2, align2, \
-# ...
-# ENDSTRUCT
-# # Following only needed if nesting
-# %assign job_aes2_size _FIELD_OFFSET
-# %assign job_aes2_align _STRUCT_ALIGN
-#
-# RES_* macros take a name, a count and an optional alignment.
-# The count in in terms of the base size of the macro, and the
-# default alignment is the base size.
-# The macros are:
-# Macro Base size
-# RES_B 1
-# RES_W 2
-# RES_D 4
-# RES_Q 8
-# RES_DQ 16
-# RES_Y 32
-# RES_Z 64
-#
-# RES_U defines a union. It's arguments are a name and two or more
-# pairs of "size, alignment"
-#
-# The two assigns are only needed if this structure is being nested
-# within another. Even if the assigns are not done, one can still use
-# STRUCT_NAME_size as the size of the structure.
-#
-# Note that for nesting, you still need to assign to STRUCT_NAME_size.
-#
-# The differences between this and using "struc" directly are that each
-# type is implicitly aligned to its natural length (although this can be
-# over-ridden with an explicit third parameter), and that the structure
-# is padded at the end to its overall alignment.
-#
-
-#########################################################################
-
-#ifndef _DATASTRUCT_ASM_
-#define _DATASTRUCT_ASM_
-
-#define PTR_SZ 8
-#define SHA512_DIGEST_WORD_SIZE 8
-#define SHA512_MB_MGR_NUM_LANES_AVX2 4
-#define NUM_SHA512_DIGEST_WORDS 8
-#define SZ4 4*SHA512_DIGEST_WORD_SIZE
-#define ROUNDS 80*SZ4
-#define SHA512_DIGEST_ROW_SIZE (SHA512_MB_MGR_NUM_LANES_AVX2 * 8)
-
-# START_FIELDS
-.macro START_FIELDS
- _FIELD_OFFSET = 0
- _STRUCT_ALIGN = 0
-.endm
-
-# FIELD name size align
-.macro FIELD name size align
- _FIELD_OFFSET = (_FIELD_OFFSET + (\align) - 1) & (~ ((\align)-1))
- \name = _FIELD_OFFSET
- _FIELD_OFFSET = _FIELD_OFFSET + (\size)
-.if (\align > _STRUCT_ALIGN)
- _STRUCT_ALIGN = \align
-.endif
-.endm
-
-# END_FIELDS
-.macro END_FIELDS
- _FIELD_OFFSET = (_FIELD_OFFSET + _STRUCT_ALIGN-1) & (~ (_STRUCT_ALIGN-1))
-.endm
-
-.macro STRUCT p1
-START_FIELDS
-.struc \p1
-.endm
-
-.macro ENDSTRUCT
- tmp = _FIELD_OFFSET
- END_FIELDS
- tmp = (_FIELD_OFFSET - ##tmp)
-.if (tmp > 0)
- .lcomm tmp
-.endm
-
-## RES_int name size align
-.macro RES_int p1 p2 p3
- name = \p1
- size = \p2
- align = .\p3
-
- _FIELD_OFFSET = (_FIELD_OFFSET + (align) - 1) & (~ ((align)-1))
-.align align
-.lcomm name size
- _FIELD_OFFSET = _FIELD_OFFSET + (size)
-.if (align > _STRUCT_ALIGN)
- _STRUCT_ALIGN = align
-.endif
-.endm
-
-# macro RES_B name, size [, align]
-.macro RES_B _name, _size, _align=1
-RES_int _name _size _align
-.endm
-
-# macro RES_W name, size [, align]
-.macro RES_W _name, _size, _align=2
-RES_int _name 2*(_size) _align
-.endm
-
-# macro RES_D name, size [, align]
-.macro RES_D _name, _size, _align=4
-RES_int _name 4*(_size) _align
-.endm
-
-# macro RES_Q name, size [, align]
-.macro RES_Q _name, _size, _align=8
-RES_int _name 8*(_size) _align
-.endm
-
-# macro RES_DQ name, size [, align]
-.macro RES_DQ _name, _size, _align=16
-RES_int _name 16*(_size) _align
-.endm
-
-# macro RES_Y name, size [, align]
-.macro RES_Y _name, _size, _align=32
-RES_int _name 32*(_size) _align
-.endm
-
-# macro RES_Z name, size [, align]
-.macro RES_Z _name, _size, _align=64
-RES_int _name 64*(_size) _align
-.endm
-
-#endif
-
-###################################################################
-### Define SHA512 Out Of Order Data Structures
-###################################################################
-
-START_FIELDS # LANE_DATA
-### name size align
-FIELD _job_in_lane, 8, 8 # pointer to job object
-END_FIELDS
-
- _LANE_DATA_size = _FIELD_OFFSET
- _LANE_DATA_align = _STRUCT_ALIGN
-
-####################################################################
-
-START_FIELDS # SHA512_ARGS_X4
-### name size align
-FIELD _digest, 8*8*4, 4 # transposed digest
-FIELD _data_ptr, 8*4, 8 # array of pointers to data
-END_FIELDS
-
- _SHA512_ARGS_X4_size = _FIELD_OFFSET
- _SHA512_ARGS_X4_align = _STRUCT_ALIGN
-
-#####################################################################
-
-START_FIELDS # MB_MGR
-### name size align
-FIELD _args, _SHA512_ARGS_X4_size, _SHA512_ARGS_X4_align
-FIELD _lens, 8*4, 8
-FIELD _unused_lanes, 8, 8
-FIELD _ldata, _LANE_DATA_size*4, _LANE_DATA_align
-END_FIELDS
-
- _MB_MGR_size = _FIELD_OFFSET
- _MB_MGR_align = _STRUCT_ALIGN
-
-_args_digest = _args + _digest
-_args_data_ptr = _args + _data_ptr
-
-#######################################################################
-
-#######################################################################
-#### Define constants
-#######################################################################
-
-#define STS_UNKNOWN 0
-#define STS_BEING_PROCESSED 1
-#define STS_COMPLETED 2
-
-#######################################################################
-#### Define JOB_SHA512 structure
-#######################################################################
-
-START_FIELDS # JOB_SHA512
-### name size align
-FIELD _buffer, 8, 8 # pointer to buffer
-FIELD _len, 8, 8 # length in bytes
-FIELD _result_digest, 8*8, 32 # Digest (output)
-FIELD _status, 4, 4
-FIELD _user_data, 8, 8
-END_FIELDS
-
- _JOB_SHA512_size = _FIELD_OFFSET
- _JOB_SHA512_align = _STRUCT_ALIGN
diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S
deleted file mode 100644
index 7c629caebc05..000000000000
--- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S
+++ /dev/null
@@ -1,297 +0,0 @@
-/*
- * Flush routine for SHA512 multibuffer
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include <linux/linkage.h>
-#include <asm/frame.h>
-#include "sha512_mb_mgr_datastruct.S"
-
-.extern sha512_x4_avx2
-
-# LINUX register definitions
-#define arg1 %rdi
-#define arg2 %rsi
-
-# idx needs to be other than arg1, arg2, rbx, r12
-#define idx %rdx
-
-# Common definitions
-#define state arg1
-#define job arg2
-#define len2 arg2
-
-#define unused_lanes %rbx
-#define lane_data %rbx
-#define tmp2 %rbx
-
-#define job_rax %rax
-#define tmp1 %rax
-#define size_offset %rax
-#define tmp %rax
-#define start_offset %rax
-
-#define tmp3 arg1
-
-#define extra_blocks arg2
-#define p arg2
-
-#define tmp4 %r8
-#define lens0 %r8
-
-#define lens1 %r9
-#define lens2 %r10
-#define lens3 %r11
-
-.macro LABEL prefix n
-\prefix\n\():
-.endm
-
-.macro JNE_SKIP i
-jne skip_\i
-.endm
-
-.altmacro
-.macro SET_OFFSET _offset
-offset = \_offset
-.endm
-.noaltmacro
-
-# JOB* sha512_mb_mgr_flush_avx2(MB_MGR *state)
-# arg 1 : rcx : state
-ENTRY(sha512_mb_mgr_flush_avx2)
- FRAME_BEGIN
- push %rbx
-
- # If bit (32+3) is set, then all lanes are empty
- mov _unused_lanes(state), unused_lanes
- bt $32+7, unused_lanes
- jc return_null
-
- # find a lane with a non-null job
- xor idx, idx
- offset = (_ldata + 1*_LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne one(%rip), idx
- offset = (_ldata + 2*_LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne two(%rip), idx
- offset = (_ldata + 3*_LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
- cmovne three(%rip), idx
-
- # copy idx to empty lanes
-copy_lane_data:
- offset = (_args + _data_ptr)
- mov offset(state,idx,8), tmp
-
- I = 0
-.rep 4
- offset = (_ldata + I * _LANE_DATA_size + _job_in_lane)
- cmpq $0, offset(state)
-.altmacro
- JNE_SKIP %I
- offset = (_args + _data_ptr + 8*I)
- mov tmp, offset(state)
- offset = (_lens + 8*I +4)
- movl $0xFFFFFFFF, offset(state)
-LABEL skip_ %I
- I = (I+1)
-.noaltmacro
-.endr
-
- # Find min length
- mov _lens + 0*8(state),lens0
- mov lens0,idx
- mov _lens + 1*8(state),lens1
- cmp idx,lens1
- cmovb lens1,idx
- mov _lens + 2*8(state),lens2
- cmp idx,lens2
- cmovb lens2,idx
- mov _lens + 3*8(state),lens3
- cmp idx,lens3
- cmovb lens3,idx
- mov idx,len2
- and $0xF,idx
- and $~0xFF,len2
- jz len_is_0
-
- sub len2, lens0
- sub len2, lens1
- sub len2, lens2
- sub len2, lens3
- shr $32,len2
- mov lens0, _lens + 0*8(state)
- mov lens1, _lens + 1*8(state)
- mov lens2, _lens + 2*8(state)
- mov lens3, _lens + 3*8(state)
-
- # "state" and "args" are the same address, arg1
- # len is arg2
- call sha512_x4_avx2
- # state and idx are intact
-
-len_is_0:
- # process completed job "idx"
- imul $_LANE_DATA_size, idx, lane_data
- lea _ldata(state, lane_data), lane_data
-
- mov _job_in_lane(lane_data), job_rax
- movq $0, _job_in_lane(lane_data)
- movl $STS_COMPLETED, _status(job_rax)
- mov _unused_lanes(state), unused_lanes
- shl $8, unused_lanes
- or idx, unused_lanes
- mov unused_lanes, _unused_lanes(state)
-
- movl $0xFFFFFFFF, _lens+4(state, idx, 8)
-
- vmovq _args_digest+0*32(state, idx, 8), %xmm0
- vpinsrq $1, _args_digest+1*32(state, idx, 8), %xmm0, %xmm0
- vmovq _args_digest+2*32(state, idx, 8), %xmm1
- vpinsrq $1, _args_digest+3*32(state, idx, 8), %xmm1, %xmm1
- vmovq _args_digest+4*32(state, idx, 8), %xmm2
- vpinsrq $1, _args_digest+5*32(state, idx, 8), %xmm2, %xmm2
- vmovq _args_digest+6*32(state, idx, 8), %xmm3
- vpinsrq $1, _args_digest+7*32(state, idx, 8), %xmm3, %xmm3
-
- vmovdqu %xmm0, _result_digest(job_rax)
- vmovdqu %xmm1, _result_digest+1*16(job_rax)
- vmovdqu %xmm2, _result_digest+2*16(job_rax)
- vmovdqu %xmm3, _result_digest+3*16(job_rax)
-
-return:
- pop %rbx
- FRAME_END
- ret
-
-return_null:
- xor job_rax, job_rax
- jmp return
-ENDPROC(sha512_mb_mgr_flush_avx2)
-.align 16
-
-ENTRY(sha512_mb_mgr_get_comp_job_avx2)
- push %rbx
-
- mov _unused_lanes(state), unused_lanes
- bt $(32+7), unused_lanes
- jc .return_null
-
- # Find min length
- mov _lens(state),lens0
- mov lens0,idx
- mov _lens+1*8(state),lens1
- cmp idx,lens1
- cmovb lens1,idx
- mov _lens+2*8(state),lens2
- cmp idx,lens2
- cmovb lens2,idx
- mov _lens+3*8(state),lens3
- cmp idx,lens3
- cmovb lens3,idx
- test $~0xF,idx
- jnz .return_null
- and $0xF,idx
-
- #process completed job "idx"
- imul $_LANE_DATA_size, idx, lane_data
- lea _ldata(state, lane_data), lane_data
-
- mov _job_in_lane(lane_data), job_rax
- movq $0, _job_in_lane(lane_data)
- movl $STS_COMPLETED, _status(job_rax)
- mov _unused_lanes(state), unused_lanes
- shl $8, unused_lanes
- or idx, unused_lanes
- mov unused_lanes, _unused_lanes(state)
-
- movl $0xFFFFFFFF, _lens+4(state, idx, 8)
-
- vmovq _args_digest(state, idx, 8), %xmm0
- vpinsrq $1, _args_digest+1*32(state, idx, 8), %xmm0, %xmm0
- vmovq _args_digest+2*32(state, idx, 8), %xmm1
- vpinsrq $1, _args_digest+3*32(state, idx, 8), %xmm1, %xmm1
- vmovq _args_digest+4*32(state, idx, 8), %xmm2
- vpinsrq $1, _args_digest+5*32(state, idx, 8), %xmm2, %xmm2
- vmovq _args_digest+6*32(state, idx, 8), %xmm3
- vpinsrq $1, _args_digest+7*32(state, idx, 8), %xmm3, %xmm3
-
- vmovdqu %xmm0, _result_digest+0*16(job_rax)
- vmovdqu %xmm1, _result_digest+1*16(job_rax)
- vmovdqu %xmm2, _result_digest+2*16(job_rax)
- vmovdqu %xmm3, _result_digest+3*16(job_rax)
-
- pop %rbx
-
- ret
-
-.return_null:
- xor job_rax, job_rax
- pop %rbx
- ret
-ENDPROC(sha512_mb_mgr_get_comp_job_avx2)
-
-.section .rodata.cst8.one, "aM", @progbits, 8
-.align 8
-one:
-.quad 1
-
-.section .rodata.cst8.two, "aM", @progbits, 8
-.align 8
-two:
-.quad 2
-
-.section .rodata.cst8.three, "aM", @progbits, 8
-.align 8
-three:
-.quad 3
diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c
deleted file mode 100644
index d08805032f01..000000000000
--- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c
+++ /dev/null
@@ -1,69 +0,0 @@
-/*
- * Initialization code for multi buffer SHA256 algorithm for AVX2
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include "sha512_mb_mgr.h"
-
-void sha512_mb_mgr_init_avx2(struct sha512_mb_mgr *state)
-{
- unsigned int j;
-
- /* initially all lanes are unused */
- state->lens[0] = 0xFFFFFFFF00000000;
- state->lens[1] = 0xFFFFFFFF00000001;
- state->lens[2] = 0xFFFFFFFF00000002;
- state->lens[3] = 0xFFFFFFFF00000003;
-
- state->unused_lanes = 0xFF03020100;
- for (j = 0; j < 4; j++)
- state->ldata[j].job_in_lane = NULL;
-}
diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S
deleted file mode 100644
index 4ba709ba78e5..000000000000
--- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S
+++ /dev/null
@@ -1,224 +0,0 @@
-/*
- * Buffer submit code for multi buffer SHA512 algorithm
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-#include <linux/linkage.h>
-#include <asm/frame.h>
-#include "sha512_mb_mgr_datastruct.S"
-
-.extern sha512_x4_avx2
-
-#define arg1 %rdi
-#define arg2 %rsi
-
-#define idx %rdx
-#define last_len %rdx
-
-#define size_offset %rcx
-#define tmp2 %rcx
-
-# Common definitions
-#define state arg1
-#define job arg2
-#define len2 arg2
-#define p2 arg2
-
-#define p %r11
-#define start_offset %r11
-
-#define unused_lanes %rbx
-
-#define job_rax %rax
-#define len %rax
-
-#define lane %r12
-#define tmp3 %r12
-#define lens3 %r12
-
-#define extra_blocks %r8
-#define lens0 %r8
-
-#define tmp %r9
-#define lens1 %r9
-
-#define lane_data %r10
-#define lens2 %r10
-
-#define DWORD_len %eax
-
-# JOB* sha512_mb_mgr_submit_avx2(MB_MGR *state, JOB *job)
-# arg 1 : rcx : state
-# arg 2 : rdx : job
-ENTRY(sha512_mb_mgr_submit_avx2)
- FRAME_BEGIN
- push %rbx
- push %r12
-
- mov _unused_lanes(state), unused_lanes
- movzb %bl,lane
- shr $8, unused_lanes
- imul $_LANE_DATA_size, lane,lane_data
- movl $STS_BEING_PROCESSED, _status(job)
- lea _ldata(state, lane_data), lane_data
- mov unused_lanes, _unused_lanes(state)
- movl _len(job), DWORD_len
-
- mov job, _job_in_lane(lane_data)
- movl DWORD_len,_lens+4(state , lane, 8)
-
- # Load digest words from result_digest
- vmovdqu _result_digest+0*16(job), %xmm0
- vmovdqu _result_digest+1*16(job), %xmm1
- vmovdqu _result_digest+2*16(job), %xmm2
- vmovdqu _result_digest+3*16(job), %xmm3
-
- vmovq %xmm0, _args_digest(state, lane, 8)
- vpextrq $1, %xmm0, _args_digest+1*32(state , lane, 8)
- vmovq %xmm1, _args_digest+2*32(state , lane, 8)
- vpextrq $1, %xmm1, _args_digest+3*32(state , lane, 8)
- vmovq %xmm2, _args_digest+4*32(state , lane, 8)
- vpextrq $1, %xmm2, _args_digest+5*32(state , lane, 8)
- vmovq %xmm3, _args_digest+6*32(state , lane, 8)
- vpextrq $1, %xmm3, _args_digest+7*32(state , lane, 8)
-
- mov _buffer(job), p
- mov p, _args_data_ptr(state, lane, 8)
-
- cmp $0xFF, unused_lanes
- jne return_null
-
-start_loop:
-
- # Find min length
- mov _lens+0*8(state),lens0
- mov lens0,idx
- mov _lens+1*8(state),lens1
- cmp idx,lens1
- cmovb lens1, idx
- mov _lens+2*8(state),lens2
- cmp idx,lens2
- cmovb lens2,idx
- mov _lens+3*8(state),lens3
- cmp idx,lens3
- cmovb lens3,idx
- mov idx,len2
- and $0xF,idx
- and $~0xFF,len2
- jz len_is_0
-
- sub len2,lens0
- sub len2,lens1
- sub len2,lens2
- sub len2,lens3
- shr $32,len2
- mov lens0, _lens + 0*8(state)
- mov lens1, _lens + 1*8(state)
- mov lens2, _lens + 2*8(state)
- mov lens3, _lens + 3*8(state)
-
- # "state" and "args" are the same address, arg1
- # len is arg2
- call sha512_x4_avx2
- # state and idx are intact
-
-len_is_0:
-
- # process completed job "idx"
- imul $_LANE_DATA_size, idx, lane_data
- lea _ldata(state, lane_data), lane_data
-
- mov _job_in_lane(lane_data), job_rax
- mov _unused_lanes(state), unused_lanes
- movq $0, _job_in_lane(lane_data)
- movl $STS_COMPLETED, _status(job_rax)
- shl $8, unused_lanes
- or idx, unused_lanes
- mov unused_lanes, _unused_lanes(state)
-
- movl $0xFFFFFFFF,_lens+4(state,idx,8)
- vmovq _args_digest+0*32(state , idx, 8), %xmm0
- vpinsrq $1, _args_digest+1*32(state , idx, 8), %xmm0, %xmm0
- vmovq _args_digest+2*32(state , idx, 8), %xmm1
- vpinsrq $1, _args_digest+3*32(state , idx, 8), %xmm1, %xmm1
- vmovq _args_digest+4*32(state , idx, 8), %xmm2
- vpinsrq $1, _args_digest+5*32(state , idx, 8), %xmm2, %xmm2
- vmovq _args_digest+6*32(state , idx, 8), %xmm3
- vpinsrq $1, _args_digest+7*32(state , idx, 8), %xmm3, %xmm3
-
- vmovdqu %xmm0, _result_digest + 0*16(job_rax)
- vmovdqu %xmm1, _result_digest + 1*16(job_rax)
- vmovdqu %xmm2, _result_digest + 2*16(job_rax)
- vmovdqu %xmm3, _result_digest + 3*16(job_rax)
-
-return:
- pop %r12
- pop %rbx
- FRAME_END
- ret
-
-return_null:
- xor job_rax, job_rax
- jmp return
-ENDPROC(sha512_mb_mgr_submit_avx2)
-
-/* UNUSED?
-.section .rodata.cst16, "aM", @progbits, 16
-.align 16
-H0: .int 0x6a09e667
-H1: .int 0xbb67ae85
-H2: .int 0x3c6ef372
-H3: .int 0xa54ff53a
-H4: .int 0x510e527f
-H5: .int 0x9b05688c
-H6: .int 0x1f83d9ab
-H7: .int 0x5be0cd19
-*/
diff --git a/arch/x86/crypto/sha512-mb/sha512_x4_avx2.S b/arch/x86/crypto/sha512-mb/sha512_x4_avx2.S
deleted file mode 100644
index e22e907643a6..000000000000
--- a/arch/x86/crypto/sha512-mb/sha512_x4_avx2.S
+++ /dev/null
@@ -1,531 +0,0 @@
-/*
- * Multi-buffer SHA512 algorithm hash compute routine
- *
- * This file is provided under a dual BSD/GPLv2 license. When using or
- * redistributing this file, you may do so under either license.
- *
- * GPL LICENSE SUMMARY
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of version 2 of the GNU General Public License as
- * published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * Contact Information:
- * Megha Dey <[email protected]>
- *
- * BSD LICENSE
- *
- * Copyright(c) 2016 Intel Corporation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * * Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * * Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- * * Neither the name of Intel Corporation nor the names of its
- * contributors may be used to endorse or promote products derived
- * from this software without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- */
-
-# code to compute quad SHA512 using AVX2
-# use YMMs to tackle the larger digest size
-# outer calling routine takes care of save and restore of XMM registers
-# Logic designed/laid out by JDG
-
-# Function clobbers: rax, rcx, rdx, rbx, rsi, rdi, r9-r15; ymm0-15
-# Stack must be aligned to 32 bytes before call
-# Linux clobbers: rax rbx rcx rsi r8 r9 r10 r11 r12
-# Linux preserves: rcx rdx rdi rbp r13 r14 r15
-# clobbers ymm0-15
-
-#include <linux/linkage.h>
-#include "sha512_mb_mgr_datastruct.S"
-
-arg1 = %rdi
-arg2 = %rsi
-
-# Common definitions
-STATE = arg1
-INP_SIZE = arg2
-
-IDX = %rax
-ROUND = %rbx
-TBL = %r8
-
-inp0 = %r9
-inp1 = %r10
-inp2 = %r11
-inp3 = %r12
-
-a = %ymm0
-b = %ymm1
-c = %ymm2
-d = %ymm3
-e = %ymm4
-f = %ymm5
-g = %ymm6
-h = %ymm7
-
-a0 = %ymm8
-a1 = %ymm9
-a2 = %ymm10
-
-TT0 = %ymm14
-TT1 = %ymm13
-TT2 = %ymm12
-TT3 = %ymm11
-TT4 = %ymm10
-TT5 = %ymm9
-
-T1 = %ymm14
-TMP = %ymm15
-
-# Define stack usage
-STACK_SPACE1 = SZ4*16 + NUM_SHA512_DIGEST_WORDS*SZ4 + 24
-
-#define VMOVPD vmovupd
-_digest = SZ4*16
-
-# transpose r0, r1, r2, r3, t0, t1
-# "transpose" data in {r0..r3} using temps {t0..t3}
-# Input looks like: {r0 r1 r2 r3}
-# r0 = {a7 a6 a5 a4 a3 a2 a1 a0}
-# r1 = {b7 b6 b5 b4 b3 b2 b1 b0}
-# r2 = {c7 c6 c5 c4 c3 c2 c1 c0}
-# r3 = {d7 d6 d5 d4 d3 d2 d1 d0}
-#
-# output looks like: {t0 r1 r0 r3}
-# t0 = {d1 d0 c1 c0 b1 b0 a1 a0}
-# r1 = {d3 d2 c3 c2 b3 b2 a3 a2}
-# r0 = {d5 d4 c5 c4 b5 b4 a5 a4}
-# r3 = {d7 d6 c7 c6 b7 b6 a7 a6}
-
-.macro TRANSPOSE r0 r1 r2 r3 t0 t1
- vshufps $0x44, \r1, \r0, \t0 # t0 = {b5 b4 a5 a4 b1 b0 a1 a0}
- vshufps $0xEE, \r1, \r0, \r0 # r0 = {b7 b6 a7 a6 b3 b2 a3 a2}
- vshufps $0x44, \r3, \r2, \t1 # t1 = {d5 d4 c5 c4 d1 d0 c1 c0}
- vshufps $0xEE, \r3, \r2, \r2 # r2 = {d7 d6 c7 c6 d3 d2 c3 c2}
-
- vperm2f128 $0x20, \r2, \r0, \r1 # h6...a6
- vperm2f128 $0x31, \r2, \r0, \r3 # h2...a2
- vperm2f128 $0x31, \t1, \t0, \r0 # h5...a5
- vperm2f128 $0x20, \t1, \t0, \t0 # h1...a1
-.endm
-
-.macro ROTATE_ARGS
-TMP_ = h
-h = g
-g = f
-f = e
-e = d
-d = c
-c = b
-b = a
-a = TMP_
-.endm
-
-# PRORQ reg, imm, tmp
-# packed-rotate-right-double
-# does a rotate by doing two shifts and an or
-.macro _PRORQ reg imm tmp
- vpsllq $(64-\imm),\reg,\tmp
- vpsrlq $\imm,\reg, \reg
- vpor \tmp,\reg, \reg
-.endm
-
-# non-destructive
-# PRORQ_nd reg, imm, tmp, src
-.macro _PRORQ_nd reg imm tmp src
- vpsllq $(64-\imm), \src, \tmp
- vpsrlq $\imm, \src, \reg
- vpor \tmp, \reg, \reg
-.endm
-
-# PRORQ dst/src, amt
-.macro PRORQ reg imm
- _PRORQ \reg, \imm, TMP
-.endm
-
-# PRORQ_nd dst, src, amt
-.macro PRORQ_nd reg tmp imm
- _PRORQ_nd \reg, \imm, TMP, \tmp
-.endm
-
-#; arguments passed implicitly in preprocessor symbols i, a...h
-.macro ROUND_00_15 _T1 i
- PRORQ_nd a0, e, (18-14) # sig1: a0 = (e >> 4)
-
- vpxor g, f, a2 # ch: a2 = f^g
- vpand e,a2, a2 # ch: a2 = (f^g)&e
- vpxor g, a2, a2 # a2 = ch
-
- PRORQ_nd a1,e,41 # sig1: a1 = (e >> 25)
-
- offset = SZ4*(\i & 0xf)
- vmovdqu \_T1,offset(%rsp)
- vpaddq (TBL,ROUND,1), \_T1, \_T1 # T1 = W + K
- vpxor e,a0, a0 # sig1: a0 = e ^ (e >> 5)
- PRORQ a0, 14 # sig1: a0 = (e >> 6) ^ (e >> 11)
- vpaddq a2, h, h # h = h + ch
- PRORQ_nd a2,a,6 # sig0: a2 = (a >> 11)
- vpaddq \_T1,h, h # h = h + ch + W + K
- vpxor a1, a0, a0 # a0 = sigma1
- vmovdqu a,\_T1
- PRORQ_nd a1,a,39 # sig0: a1 = (a >> 22)
- vpxor c, \_T1, \_T1 # maj: T1 = a^c
- add $SZ4, ROUND # ROUND++
- vpand b, \_T1, \_T1 # maj: T1 = (a^c)&b
- vpaddq a0, h, h
- vpaddq h, d, d
- vpxor a, a2, a2 # sig0: a2 = a ^ (a >> 11)
- PRORQ a2,28 # sig0: a2 = (a >> 2) ^ (a >> 13)
- vpxor a1, a2, a2 # a2 = sig0
- vpand c, a, a1 # maj: a1 = a&c
- vpor \_T1, a1, a1 # a1 = maj
- vpaddq a1, h, h # h = h + ch + W + K + maj
- vpaddq a2, h, h # h = h + ch + W + K + maj + sigma0
- ROTATE_ARGS
-.endm
-
-
-#; arguments passed implicitly in preprocessor symbols i, a...h
-.macro ROUND_16_XX _T1 i
- vmovdqu SZ4*((\i-15)&0xf)(%rsp), \_T1
- vmovdqu SZ4*((\i-2)&0xf)(%rsp), a1
- vmovdqu \_T1, a0
- PRORQ \_T1,7
- vmovdqu a1, a2
- PRORQ a1,42
- vpxor a0, \_T1, \_T1
- PRORQ \_T1, 1
- vpxor a2, a1, a1
- PRORQ a1, 19
- vpsrlq $7, a0, a0
- vpxor a0, \_T1, \_T1
- vpsrlq $6, a2, a2
- vpxor a2, a1, a1
- vpaddq SZ4*((\i-16)&0xf)(%rsp), \_T1, \_T1
- vpaddq SZ4*((\i-7)&0xf)(%rsp), a1, a1
- vpaddq a1, \_T1, \_T1
-
- ROUND_00_15 \_T1,\i
-.endm
-
-
-# void sha512_x4_avx2(void *STATE, const int INP_SIZE)
-# arg 1 : STATE : pointer to input data
-# arg 2 : INP_SIZE : size of data in blocks (assumed >= 1)
-ENTRY(sha512_x4_avx2)
- # general registers preserved in outer calling routine
- # outer calling routine saves all the XMM registers
- # save callee-saved clobbered registers to comply with C function ABI
- push %r12
- push %r13
- push %r14
- push %r15
-
- sub $STACK_SPACE1, %rsp
-
- # Load the pre-transposed incoming digest.
- vmovdqu 0*SHA512_DIGEST_ROW_SIZE(STATE),a
- vmovdqu 1*SHA512_DIGEST_ROW_SIZE(STATE),b
- vmovdqu 2*SHA512_DIGEST_ROW_SIZE(STATE),c
- vmovdqu 3*SHA512_DIGEST_ROW_SIZE(STATE),d
- vmovdqu 4*SHA512_DIGEST_ROW_SIZE(STATE),e
- vmovdqu 5*SHA512_DIGEST_ROW_SIZE(STATE),f
- vmovdqu 6*SHA512_DIGEST_ROW_SIZE(STATE),g
- vmovdqu 7*SHA512_DIGEST_ROW_SIZE(STATE),h
-
- lea K512_4(%rip),TBL
-
- # load the address of each of the 4 message lanes
- # getting ready to transpose input onto stack
- mov _data_ptr+0*PTR_SZ(STATE),inp0
- mov _data_ptr+1*PTR_SZ(STATE),inp1
- mov _data_ptr+2*PTR_SZ(STATE),inp2
- mov _data_ptr+3*PTR_SZ(STATE),inp3
-
- xor IDX, IDX
-lloop:
- xor ROUND, ROUND
-
- # save old digest
- vmovdqu a, _digest(%rsp)
- vmovdqu b, _digest+1*SZ4(%rsp)
- vmovdqu c, _digest+2*SZ4(%rsp)
- vmovdqu d, _digest+3*SZ4(%rsp)
- vmovdqu e, _digest+4*SZ4(%rsp)
- vmovdqu f, _digest+5*SZ4(%rsp)
- vmovdqu g, _digest+6*SZ4(%rsp)
- vmovdqu h, _digest+7*SZ4(%rsp)
- i = 0
-.rep 4
- vmovdqu PSHUFFLE_BYTE_FLIP_MASK(%rip), TMP
- VMOVPD i*32(inp0, IDX), TT2
- VMOVPD i*32(inp1, IDX), TT1
- VMOVPD i*32(inp2, IDX), TT4
- VMOVPD i*32(inp3, IDX), TT3
- TRANSPOSE TT2, TT1, TT4, TT3, TT0, TT5
- vpshufb TMP, TT0, TT0
- vpshufb TMP, TT1, TT1
- vpshufb TMP, TT2, TT2
- vpshufb TMP, TT3, TT3
- ROUND_00_15 TT0,(i*4+0)
- ROUND_00_15 TT1,(i*4+1)
- ROUND_00_15 TT2,(i*4+2)
- ROUND_00_15 TT3,(i*4+3)
- i = (i+1)
-.endr
- add $128, IDX
-
- i = (i*4)
-
- jmp Lrounds_16_xx
-.align 16
-Lrounds_16_xx:
-.rep 16
- ROUND_16_XX T1, i
- i = (i+1)
-.endr
- cmp $0xa00,ROUND
- jb Lrounds_16_xx
-
- # add old digest
- vpaddq _digest(%rsp), a, a
- vpaddq _digest+1*SZ4(%rsp), b, b
- vpaddq _digest+2*SZ4(%rsp), c, c
- vpaddq _digest+3*SZ4(%rsp), d, d
- vpaddq _digest+4*SZ4(%rsp), e, e
- vpaddq _digest+5*SZ4(%rsp), f, f
- vpaddq _digest+6*SZ4(%rsp), g, g
- vpaddq _digest+7*SZ4(%rsp), h, h
-
- sub $1, INP_SIZE # unit is blocks
- jne lloop
-
- # write back to memory (state object) the transposed digest
- vmovdqu a, 0*SHA512_DIGEST_ROW_SIZE(STATE)
- vmovdqu b, 1*SHA512_DIGEST_ROW_SIZE(STATE)
- vmovdqu c, 2*SHA512_DIGEST_ROW_SIZE(STATE)
- vmovdqu d, 3*SHA512_DIGEST_ROW_SIZE(STATE)
- vmovdqu e, 4*SHA512_DIGEST_ROW_SIZE(STATE)
- vmovdqu f, 5*SHA512_DIGEST_ROW_SIZE(STATE)
- vmovdqu g, 6*SHA512_DIGEST_ROW_SIZE(STATE)
- vmovdqu h, 7*SHA512_DIGEST_ROW_SIZE(STATE)
-
- # update input data pointers
- add IDX, inp0
- mov inp0, _data_ptr+0*PTR_SZ(STATE)
- add IDX, inp1
- mov inp1, _data_ptr+1*PTR_SZ(STATE)
- add IDX, inp2
- mov inp2, _data_ptr+2*PTR_SZ(STATE)
- add IDX, inp3
- mov inp3, _data_ptr+3*PTR_SZ(STATE)
-
- #;;;;;;;;;;;;;;;
- #; Postamble
- add $STACK_SPACE1, %rsp
- # restore callee-saved clobbered registers
-
- pop %r15
- pop %r14
- pop %r13
- pop %r12
-
- # outer calling routine restores XMM and other GP registers
- ret
-ENDPROC(sha512_x4_avx2)
-
-.section .rodata.K512_4, "a", @progbits
-.align 64
-K512_4:
- .octa 0x428a2f98d728ae22428a2f98d728ae22,\
- 0x428a2f98d728ae22428a2f98d728ae22
- .octa 0x7137449123ef65cd7137449123ef65cd,\
- 0x7137449123ef65cd7137449123ef65cd
- .octa 0xb5c0fbcfec4d3b2fb5c0fbcfec4d3b2f,\
- 0xb5c0fbcfec4d3b2fb5c0fbcfec4d3b2f
- .octa 0xe9b5dba58189dbbce9b5dba58189dbbc,\
- 0xe9b5dba58189dbbce9b5dba58189dbbc
- .octa 0x3956c25bf348b5383956c25bf348b538,\
- 0x3956c25bf348b5383956c25bf348b538
- .octa 0x59f111f1b605d01959f111f1b605d019,\
- 0x59f111f1b605d01959f111f1b605d019
- .octa 0x923f82a4af194f9b923f82a4af194f9b,\
- 0x923f82a4af194f9b923f82a4af194f9b
- .octa 0xab1c5ed5da6d8118ab1c5ed5da6d8118,\
- 0xab1c5ed5da6d8118ab1c5ed5da6d8118
- .octa 0xd807aa98a3030242d807aa98a3030242,\
- 0xd807aa98a3030242d807aa98a3030242
- .octa 0x12835b0145706fbe12835b0145706fbe,\
- 0x12835b0145706fbe12835b0145706fbe
- .octa 0x243185be4ee4b28c243185be4ee4b28c,\
- 0x243185be4ee4b28c243185be4ee4b28c
- .octa 0x550c7dc3d5ffb4e2550c7dc3d5ffb4e2,\
- 0x550c7dc3d5ffb4e2550c7dc3d5ffb4e2
- .octa 0x72be5d74f27b896f72be5d74f27b896f,\
- 0x72be5d74f27b896f72be5d74f27b896f
- .octa 0x80deb1fe3b1696b180deb1fe3b1696b1,\
- 0x80deb1fe3b1696b180deb1fe3b1696b1
- .octa 0x9bdc06a725c712359bdc06a725c71235,\
- 0x9bdc06a725c712359bdc06a725c71235
- .octa 0xc19bf174cf692694c19bf174cf692694,\
- 0xc19bf174cf692694c19bf174cf692694
- .octa 0xe49b69c19ef14ad2e49b69c19ef14ad2,\
- 0xe49b69c19ef14ad2e49b69c19ef14ad2
- .octa 0xefbe4786384f25e3efbe4786384f25e3,\
- 0xefbe4786384f25e3efbe4786384f25e3
- .octa 0x0fc19dc68b8cd5b50fc19dc68b8cd5b5,\
- 0x0fc19dc68b8cd5b50fc19dc68b8cd5b5
- .octa 0x240ca1cc77ac9c65240ca1cc77ac9c65,\
- 0x240ca1cc77ac9c65240ca1cc77ac9c65
- .octa 0x2de92c6f592b02752de92c6f592b0275,\
- 0x2de92c6f592b02752de92c6f592b0275
- .octa 0x4a7484aa6ea6e4834a7484aa6ea6e483,\
- 0x4a7484aa6ea6e4834a7484aa6ea6e483
- .octa 0x5cb0a9dcbd41fbd45cb0a9dcbd41fbd4,\
- 0x5cb0a9dcbd41fbd45cb0a9dcbd41fbd4
- .octa 0x76f988da831153b576f988da831153b5,\
- 0x76f988da831153b576f988da831153b5
- .octa 0x983e5152ee66dfab983e5152ee66dfab,\
- 0x983e5152ee66dfab983e5152ee66dfab
- .octa 0xa831c66d2db43210a831c66d2db43210,\
- 0xa831c66d2db43210a831c66d2db43210
- .octa 0xb00327c898fb213fb00327c898fb213f,\
- 0xb00327c898fb213fb00327c898fb213f
- .octa 0xbf597fc7beef0ee4bf597fc7beef0ee4,\
- 0xbf597fc7beef0ee4bf597fc7beef0ee4
- .octa 0xc6e00bf33da88fc2c6e00bf33da88fc2,\
- 0xc6e00bf33da88fc2c6e00bf33da88fc2
- .octa 0xd5a79147930aa725d5a79147930aa725,\
- 0xd5a79147930aa725d5a79147930aa725
- .octa 0x06ca6351e003826f06ca6351e003826f,\
- 0x06ca6351e003826f06ca6351e003826f
- .octa 0x142929670a0e6e70142929670a0e6e70,\
- 0x142929670a0e6e70142929670a0e6e70
- .octa 0x27b70a8546d22ffc27b70a8546d22ffc,\
- 0x27b70a8546d22ffc27b70a8546d22ffc
- .octa 0x2e1b21385c26c9262e1b21385c26c926,\
- 0x2e1b21385c26c9262e1b21385c26c926
- .octa 0x4d2c6dfc5ac42aed4d2c6dfc5ac42aed,\
- 0x4d2c6dfc5ac42aed4d2c6dfc5ac42aed
- .octa 0x53380d139d95b3df53380d139d95b3df,\
- 0x53380d139d95b3df53380d139d95b3df
- .octa 0x650a73548baf63de650a73548baf63de,\
- 0x650a73548baf63de650a73548baf63de
- .octa 0x766a0abb3c77b2a8766a0abb3c77b2a8,\
- 0x766a0abb3c77b2a8766a0abb3c77b2a8
- .octa 0x81c2c92e47edaee681c2c92e47edaee6,\
- 0x81c2c92e47edaee681c2c92e47edaee6
- .octa 0x92722c851482353b92722c851482353b,\
- 0x92722c851482353b92722c851482353b
- .octa 0xa2bfe8a14cf10364a2bfe8a14cf10364,\
- 0xa2bfe8a14cf10364a2bfe8a14cf10364
- .octa 0xa81a664bbc423001a81a664bbc423001,\
- 0xa81a664bbc423001a81a664bbc423001
- .octa 0xc24b8b70d0f89791c24b8b70d0f89791,\
- 0xc24b8b70d0f89791c24b8b70d0f89791
- .octa 0xc76c51a30654be30c76c51a30654be30,\
- 0xc76c51a30654be30c76c51a30654be30
- .octa 0xd192e819d6ef5218d192e819d6ef5218,\
- 0xd192e819d6ef5218d192e819d6ef5218
- .octa 0xd69906245565a910d69906245565a910,\
- 0xd69906245565a910d69906245565a910
- .octa 0xf40e35855771202af40e35855771202a,\
- 0xf40e35855771202af40e35855771202a
- .octa 0x106aa07032bbd1b8106aa07032bbd1b8,\
- 0x106aa07032bbd1b8106aa07032bbd1b8
- .octa 0x19a4c116b8d2d0c819a4c116b8d2d0c8,\
- 0x19a4c116b8d2d0c819a4c116b8d2d0c8
- .octa 0x1e376c085141ab531e376c085141ab53,\
- 0x1e376c085141ab531e376c085141ab53
- .octa 0x2748774cdf8eeb992748774cdf8eeb99,\
- 0x2748774cdf8eeb992748774cdf8eeb99
- .octa 0x34b0bcb5e19b48a834b0bcb5e19b48a8,\
- 0x34b0bcb5e19b48a834b0bcb5e19b48a8
- .octa 0x391c0cb3c5c95a63391c0cb3c5c95a63,\
- 0x391c0cb3c5c95a63391c0cb3c5c95a63
- .octa 0x4ed8aa4ae3418acb4ed8aa4ae3418acb,\
- 0x4ed8aa4ae3418acb4ed8aa4ae3418acb
- .octa 0x5b9cca4f7763e3735b9cca4f7763e373,\
- 0x5b9cca4f7763e3735b9cca4f7763e373
- .octa 0x682e6ff3d6b2b8a3682e6ff3d6b2b8a3,\
- 0x682e6ff3d6b2b8a3682e6ff3d6b2b8a3
- .octa 0x748f82ee5defb2fc748f82ee5defb2fc,\
- 0x748f82ee5defb2fc748f82ee5defb2fc
- .octa 0x78a5636f43172f6078a5636f43172f60,\
- 0x78a5636f43172f6078a5636f43172f60
- .octa 0x84c87814a1f0ab7284c87814a1f0ab72,\
- 0x84c87814a1f0ab7284c87814a1f0ab72
- .octa 0x8cc702081a6439ec8cc702081a6439ec,\
- 0x8cc702081a6439ec8cc702081a6439ec
- .octa 0x90befffa23631e2890befffa23631e28,\
- 0x90befffa23631e2890befffa23631e28
- .octa 0xa4506cebde82bde9a4506cebde82bde9,\
- 0xa4506cebde82bde9a4506cebde82bde9
- .octa 0xbef9a3f7b2c67915bef9a3f7b2c67915,\
- 0xbef9a3f7b2c67915bef9a3f7b2c67915
- .octa 0xc67178f2e372532bc67178f2e372532b,\
- 0xc67178f2e372532bc67178f2e372532b
- .octa 0xca273eceea26619cca273eceea26619c,\
- 0xca273eceea26619cca273eceea26619c
- .octa 0xd186b8c721c0c207d186b8c721c0c207,\
- 0xd186b8c721c0c207d186b8c721c0c207
- .octa 0xeada7dd6cde0eb1eeada7dd6cde0eb1e,\
- 0xeada7dd6cde0eb1eeada7dd6cde0eb1e
- .octa 0xf57d4f7fee6ed178f57d4f7fee6ed178,\
- 0xf57d4f7fee6ed178f57d4f7fee6ed178
- .octa 0x06f067aa72176fba06f067aa72176fba,\
- 0x06f067aa72176fba06f067aa72176fba
- .octa 0x0a637dc5a2c898a60a637dc5a2c898a6,\
- 0x0a637dc5a2c898a60a637dc5a2c898a6
- .octa 0x113f9804bef90dae113f9804bef90dae,\
- 0x113f9804bef90dae113f9804bef90dae
- .octa 0x1b710b35131c471b1b710b35131c471b,\
- 0x1b710b35131c471b1b710b35131c471b
- .octa 0x28db77f523047d8428db77f523047d84,\
- 0x28db77f523047d8428db77f523047d84
- .octa 0x32caab7b40c7249332caab7b40c72493,\
- 0x32caab7b40c7249332caab7b40c72493
- .octa 0x3c9ebe0a15c9bebc3c9ebe0a15c9bebc,\
- 0x3c9ebe0a15c9bebc3c9ebe0a15c9bebc
- .octa 0x431d67c49c100d4c431d67c49c100d4c,\
- 0x431d67c49c100d4c431d67c49c100d4c
- .octa 0x4cc5d4becb3e42b64cc5d4becb3e42b6,\
- 0x4cc5d4becb3e42b64cc5d4becb3e42b6
- .octa 0x597f299cfc657e2a597f299cfc657e2a,\
- 0x597f299cfc657e2a597f299cfc657e2a
- .octa 0x5fcb6fab3ad6faec5fcb6fab3ad6faec,\
- 0x5fcb6fab3ad6faec5fcb6fab3ad6faec
- .octa 0x6c44198c4a4758176c44198c4a475817,\
- 0x6c44198c4a4758176c44198c4a475817
-
-.section .rodata.cst32.PSHUFFLE_BYTE_FLIP_MASK, "aM", @progbits, 32
-.align 32
-PSHUFFLE_BYTE_FLIP_MASK: .octa 0x08090a0b0c0d0e0f0001020304050607
- .octa 0x18191a1b1c1d1e1f1011121314151617
diff --git a/crypto/Kconfig b/crypto/Kconfig
index f3e40ac56d93..4ee600bdefdb 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -213,20 +213,6 @@ config CRYPTO_CRYPTD
converts an arbitrary synchronous software crypto algorithm
into an asynchronous algorithm that executes in a kernel thread.
-config CRYPTO_MCRYPTD
- tristate "Software async multi-buffer crypto daemon"
- select CRYPTO_BLKCIPHER
- select CRYPTO_HASH
- select CRYPTO_MANAGER
- select CRYPTO_WORKQUEUE
- help
- This is a generic software asynchronous crypto daemon that
- provides the kernel thread to assist multi-buffer crypto
- algorithms for submitting jobs and flushing jobs in multi-buffer
- crypto algorithms. Multi-buffer crypto algorithms are executed
- in the context of this kernel thread and drivers can post
- their crypto request asynchronously to be processed by this daemon.
-
config CRYPTO_AUTHENC
tristate "Authenc support"
select CRYPTO_AEAD
@@ -848,54 +834,6 @@ config CRYPTO_SHA1_PPC_SPE
SHA-1 secure hash standard (DFIPS 180-4) implemented
using powerpc SPE SIMD instruction set.
-config CRYPTO_SHA1_MB
- tristate "SHA1 digest algorithm (x86_64 Multi-Buffer, Experimental)"
- depends on X86 && 64BIT
- select CRYPTO_SHA1
- select CRYPTO_HASH
- select CRYPTO_MCRYPTD
- help
- SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
- using multi-buffer technique. This algorithm computes on
- multiple data lanes concurrently with SIMD instructions for
- better throughput. It should not be enabled by default but
- used when there is significant amount of work to keep the keep
- the data lanes filled to get performance benefit. If the data
- lanes remain unfilled, a flush operation will be initiated to
- process the crypto jobs, adding a slight latency.
-
-config CRYPTO_SHA256_MB
- tristate "SHA256 digest algorithm (x86_64 Multi-Buffer, Experimental)"
- depends on X86 && 64BIT
- select CRYPTO_SHA256
- select CRYPTO_HASH
- select CRYPTO_MCRYPTD
- help
- SHA-256 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
- using multi-buffer technique. This algorithm computes on
- multiple data lanes concurrently with SIMD instructions for
- better throughput. It should not be enabled by default but
- used when there is significant amount of work to keep the keep
- the data lanes filled to get performance benefit. If the data
- lanes remain unfilled, a flush operation will be initiated to
- process the crypto jobs, adding a slight latency.
-
-config CRYPTO_SHA512_MB
- tristate "SHA512 digest algorithm (x86_64 Multi-Buffer, Experimental)"
- depends on X86 && 64BIT
- select CRYPTO_SHA512
- select CRYPTO_HASH
- select CRYPTO_MCRYPTD
- help
- SHA-512 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
- using multi-buffer technique. This algorithm computes on
- multiple data lanes concurrently with SIMD instructions for
- better throughput. It should not be enabled by default but
- used when there is significant amount of work to keep the keep
- the data lanes filled to get performance benefit. If the data
- lanes remain unfilled, a flush operation will be initiated to
- process the crypto jobs, adding a slight latency.
-
config CRYPTO_SHA256
tristate "SHA224 and SHA256 digest algorithm"
select CRYPTO_HASH
diff --git a/crypto/Makefile b/crypto/Makefile
index 6d1d40eeb964..80e3da755cbf 100644
--- a/crypto/Makefile
+++ b/crypto/Makefile
@@ -93,7 +93,6 @@ obj-$(CONFIG_CRYPTO_MORUS640) += morus640.o
obj-$(CONFIG_CRYPTO_MORUS1280) += morus1280.o
obj-$(CONFIG_CRYPTO_PCRYPT) += pcrypt.o
obj-$(CONFIG_CRYPTO_CRYPTD) += cryptd.o
-obj-$(CONFIG_CRYPTO_MCRYPTD) += mcryptd.o
obj-$(CONFIG_CRYPTO_DES) += des_generic.o
obj-$(CONFIG_CRYPTO_FCRYPT) += fcrypt.o
obj-$(CONFIG_CRYPTO_BLOWFISH) += blowfish_generic.o
diff --git a/crypto/mcryptd.c b/crypto/mcryptd.c
deleted file mode 100644
index f14152147ce8..000000000000
--- a/crypto/mcryptd.c
+++ /dev/null
@@ -1,675 +0,0 @@
-/*
- * Software multibuffer async crypto daemon.
- *
- * Copyright (c) 2014 Tim Chen <[email protected]>
- *
- * Adapted from crypto daemon.
- *
- * This program is free software; you can redistribute it and/or modify it
- * under the terms of the GNU General Public License as published by the Free
- * Software Foundation; either version 2 of the License, or (at your option)
- * any later version.
- *
- */
-
-#include <crypto/algapi.h>
-#include <crypto/internal/hash.h>
-#include <crypto/internal/aead.h>
-#include <crypto/mcryptd.h>
-#include <crypto/crypto_wq.h>
-#include <linux/err.h>
-#include <linux/init.h>
-#include <linux/kernel.h>
-#include <linux/list.h>
-#include <linux/module.h>
-#include <linux/scatterlist.h>
-#include <linux/sched.h>
-#include <linux/sched/stat.h>
-#include <linux/slab.h>
-
-#define MCRYPTD_MAX_CPU_QLEN 100
-#define MCRYPTD_BATCH 9
-
-static void *mcryptd_alloc_instance(struct crypto_alg *alg, unsigned int head,
- unsigned int tail);
-
-struct mcryptd_flush_list {
- struct list_head list;
- struct mutex lock;
-};
-
-static struct mcryptd_flush_list __percpu *mcryptd_flist;
-
-struct hashd_instance_ctx {
- struct crypto_ahash_spawn spawn;
- struct mcryptd_queue *queue;
-};
-
-static void mcryptd_queue_worker(struct work_struct *work);
-
-void mcryptd_arm_flusher(struct mcryptd_alg_cstate *cstate, unsigned long delay)
-{
- struct mcryptd_flush_list *flist;
-
- if (!cstate->flusher_engaged) {
- /* put the flusher on the flush list */
- flist = per_cpu_ptr(mcryptd_flist, smp_processor_id());
- mutex_lock(&flist->lock);
- list_add_tail(&cstate->flush_list, &flist->list);
- cstate->flusher_engaged = true;
- cstate->next_flush = jiffies + delay;
- queue_delayed_work_on(smp_processor_id(), kcrypto_wq,
- &cstate->flush, delay);
- mutex_unlock(&flist->lock);
- }
-}
-EXPORT_SYMBOL(mcryptd_arm_flusher);
-
-static int mcryptd_init_queue(struct mcryptd_queue *queue,
- unsigned int max_cpu_qlen)
-{
- int cpu;
- struct mcryptd_cpu_queue *cpu_queue;
-
- queue->cpu_queue = alloc_percpu(struct mcryptd_cpu_queue);
- pr_debug("mqueue:%p mcryptd_cpu_queue %p\n", queue, queue->cpu_queue);
- if (!queue->cpu_queue)
- return -ENOMEM;
- for_each_possible_cpu(cpu) {
- cpu_queue = per_cpu_ptr(queue->cpu_queue, cpu);
- pr_debug("cpu_queue #%d %p\n", cpu, queue->cpu_queue);
- crypto_init_queue(&cpu_queue->queue, max_cpu_qlen);
- INIT_WORK(&cpu_queue->work, mcryptd_queue_worker);
- spin_lock_init(&cpu_queue->q_lock);
- }
- return 0;
-}
-
-static void mcryptd_fini_queue(struct mcryptd_queue *queue)
-{
- int cpu;
- struct mcryptd_cpu_queue *cpu_queue;
-
- for_each_possible_cpu(cpu) {
- cpu_queue = per_cpu_ptr(queue->cpu_queue, cpu);
- BUG_ON(cpu_queue->queue.qlen);
- }
- free_percpu(queue->cpu_queue);
-}
-
-static int mcryptd_enqueue_request(struct mcryptd_queue *queue,
- struct crypto_async_request *request,
- struct mcryptd_hash_request_ctx *rctx)
-{
- int cpu, err;
- struct mcryptd_cpu_queue *cpu_queue;
-
- cpu_queue = raw_cpu_ptr(queue->cpu_queue);
- spin_lock(&cpu_queue->q_lock);
- cpu = smp_processor_id();
- rctx->tag.cpu = smp_processor_id();
-
- err = crypto_enqueue_request(&cpu_queue->queue, request);
- pr_debug("enqueue request: cpu %d cpu_queue %p request %p\n",
- cpu, cpu_queue, request);
- spin_unlock(&cpu_queue->q_lock);
- queue_work_on(cpu, kcrypto_wq, &cpu_queue->work);
-
- return err;
-}
-
-/*
- * Try to opportunisticlly flush the partially completed jobs if
- * crypto daemon is the only task running.
- */
-static void mcryptd_opportunistic_flush(void)
-{
- struct mcryptd_flush_list *flist;
- struct mcryptd_alg_cstate *cstate;
-
- flist = per_cpu_ptr(mcryptd_flist, smp_processor_id());
- while (single_task_running()) {
- mutex_lock(&flist->lock);
- cstate = list_first_entry_or_null(&flist->list,
- struct mcryptd_alg_cstate, flush_list);
- if (!cstate || !cstate->flusher_engaged) {
- mutex_unlock(&flist->lock);
- return;
- }
- list_del(&cstate->flush_list);
- cstate->flusher_engaged = false;
- mutex_unlock(&flist->lock);
- cstate->alg_state->flusher(cstate);
- }
-}
-
-/*
- * Called in workqueue context, do one real cryption work (via
- * req->complete) and reschedule itself if there are more work to
- * do.
- */
-static void mcryptd_queue_worker(struct work_struct *work)
-{
- struct mcryptd_cpu_queue *cpu_queue;
- struct crypto_async_request *req, *backlog;
- int i;
-
- /*
- * Need to loop through more than once for multi-buffer to
- * be effective.
- */
-
- cpu_queue = container_of(work, struct mcryptd_cpu_queue, work);
- i = 0;
- while (i < MCRYPTD_BATCH || single_task_running()) {
-
- spin_lock_bh(&cpu_queue->q_lock);
- backlog = crypto_get_backlog(&cpu_queue->queue);
- req = crypto_dequeue_request(&cpu_queue->queue);
- spin_unlock_bh(&cpu_queue->q_lock);
-
- if (!req) {
- mcryptd_opportunistic_flush();
- return;
- }
-
- if (backlog)
- backlog->complete(backlog, -EINPROGRESS);
- req->complete(req, 0);
- if (!cpu_queue->queue.qlen)
- return;
- ++i;
- }
- if (cpu_queue->queue.qlen)
- queue_work_on(smp_processor_id(), kcrypto_wq, &cpu_queue->work);
-}
-
-void mcryptd_flusher(struct work_struct *__work)
-{
- struct mcryptd_alg_cstate *alg_cpu_state;
- struct mcryptd_alg_state *alg_state;
- struct mcryptd_flush_list *flist;
- int cpu;
-
- cpu = smp_processor_id();
- alg_cpu_state = container_of(to_delayed_work(__work),
- struct mcryptd_alg_cstate, flush);
- alg_state = alg_cpu_state->alg_state;
- if (alg_cpu_state->cpu != cpu)
- pr_debug("mcryptd error: work on cpu %d, should be cpu %d\n",
- cpu, alg_cpu_state->cpu);
-
- if (alg_cpu_state->flusher_engaged) {
- flist = per_cpu_ptr(mcryptd_flist, cpu);
- mutex_lock(&flist->lock);
- list_del(&alg_cpu_state->flush_list);
- alg_cpu_state->flusher_engaged = false;
- mutex_unlock(&flist->lock);
- alg_state->flusher(alg_cpu_state);
- }
-}
-EXPORT_SYMBOL_GPL(mcryptd_flusher);
-
-static inline struct mcryptd_queue *mcryptd_get_queue(struct crypto_tfm *tfm)
-{
- struct crypto_instance *inst = crypto_tfm_alg_instance(tfm);
- struct mcryptd_instance_ctx *ictx = crypto_instance_ctx(inst);
-
- return ictx->queue;
-}
-
-static void *mcryptd_alloc_instance(struct crypto_alg *alg, unsigned int head,
- unsigned int tail)
-{
- char *p;
- struct crypto_instance *inst;
- int err;
-
- p = kzalloc(head + sizeof(*inst) + tail, GFP_KERNEL);
- if (!p)
- return ERR_PTR(-ENOMEM);
-
- inst = (void *)(p + head);
-
- err = -ENAMETOOLONG;
- if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
- "mcryptd(%s)", alg->cra_driver_name) >= CRYPTO_MAX_ALG_NAME)
- goto out_free_inst;
-
- memcpy(inst->alg.cra_name, alg->cra_name, CRYPTO_MAX_ALG_NAME);
-
- inst->alg.cra_priority = alg->cra_priority + 50;
- inst->alg.cra_blocksize = alg->cra_blocksize;
- inst->alg.cra_alignmask = alg->cra_alignmask;
-
-out:
- return p;
-
-out_free_inst:
- kfree(p);
- p = ERR_PTR(err);
- goto out;
-}
-
-static inline bool mcryptd_check_internal(struct rtattr **tb, u32 *type,
- u32 *mask)
-{
- struct crypto_attr_type *algt;
-
- algt = crypto_get_attr_type(tb);
- if (IS_ERR(algt))
- return false;
-
- *type |= algt->type & CRYPTO_ALG_INTERNAL;
- *mask |= algt->mask & CRYPTO_ALG_INTERNAL;
-
- if (*type & *mask & CRYPTO_ALG_INTERNAL)
- return true;
- else
- return false;
-}
-
-static int mcryptd_hash_init_tfm(struct crypto_tfm *tfm)
-{
- struct crypto_instance *inst = crypto_tfm_alg_instance(tfm);
- struct hashd_instance_ctx *ictx = crypto_instance_ctx(inst);
- struct crypto_ahash_spawn *spawn = &ictx->spawn;
- struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(tfm);
- struct crypto_ahash *hash;
-
- hash = crypto_spawn_ahash(spawn);
- if (IS_ERR(hash))
- return PTR_ERR(hash);
-
- ctx->child = hash;
- crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
- sizeof(struct mcryptd_hash_request_ctx) +
- crypto_ahash_reqsize(hash));
- return 0;
-}
-
-static void mcryptd_hash_exit_tfm(struct crypto_tfm *tfm)
-{
- struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(tfm);
-
- crypto_free_ahash(ctx->child);
-}
-
-static int mcryptd_hash_setkey(struct crypto_ahash *parent,
- const u8 *key, unsigned int keylen)
-{
- struct mcryptd_hash_ctx *ctx = crypto_ahash_ctx(parent);
- struct crypto_ahash *child = ctx->child;
- int err;
-
- crypto_ahash_clear_flags(child, CRYPTO_TFM_REQ_MASK);
- crypto_ahash_set_flags(child, crypto_ahash_get_flags(parent) &
- CRYPTO_TFM_REQ_MASK);
- err = crypto_ahash_setkey(child, key, keylen);
- crypto_ahash_set_flags(parent, crypto_ahash_get_flags(child) &
- CRYPTO_TFM_RES_MASK);
- return err;
-}
-
-static int mcryptd_hash_enqueue(struct ahash_request *req,
- crypto_completion_t complete)
-{
- int ret;
-
- struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
- struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
- struct mcryptd_queue *queue =
- mcryptd_get_queue(crypto_ahash_tfm(tfm));
-
- rctx->complete = req->base.complete;
- req->base.complete = complete;
-
- ret = mcryptd_enqueue_request(queue, &req->base, rctx);
-
- return ret;
-}
-
-static void mcryptd_hash_init(struct crypto_async_request *req_async, int err)
-{
- struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm);
- struct crypto_ahash *child = ctx->child;
- struct ahash_request *req = ahash_request_cast(req_async);
- struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
- struct ahash_request *desc = &rctx->areq;
-
- if (unlikely(err == -EINPROGRESS))
- goto out;
-
- ahash_request_set_tfm(desc, child);
- ahash_request_set_callback(desc, CRYPTO_TFM_REQ_MAY_SLEEP,
- rctx->complete, req_async);
-
- rctx->out = req->result;
- err = crypto_ahash_init(desc);
-
-out:
- local_bh_disable();
- rctx->complete(&req->base, err);
- local_bh_enable();
-}
-
-static int mcryptd_hash_init_enqueue(struct ahash_request *req)
-{
- return mcryptd_hash_enqueue(req, mcryptd_hash_init);
-}
-
-static void mcryptd_hash_update(struct crypto_async_request *req_async, int err)
-{
- struct ahash_request *req = ahash_request_cast(req_async);
- struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
-
- if (unlikely(err == -EINPROGRESS))
- goto out;
-
- rctx->out = req->result;
- err = crypto_ahash_update(&rctx->areq);
- if (err) {
- req->base.complete = rctx->complete;
- goto out;
- }
-
- return;
-out:
- local_bh_disable();
- rctx->complete(&req->base, err);
- local_bh_enable();
-}
-
-static int mcryptd_hash_update_enqueue(struct ahash_request *req)
-{
- return mcryptd_hash_enqueue(req, mcryptd_hash_update);
-}
-
-static void mcryptd_hash_final(struct crypto_async_request *req_async, int err)
-{
- struct ahash_request *req = ahash_request_cast(req_async);
- struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
-
- if (unlikely(err == -EINPROGRESS))
- goto out;
-
- rctx->out = req->result;
- err = crypto_ahash_final(&rctx->areq);
- if (err) {
- req->base.complete = rctx->complete;
- goto out;
- }
-
- return;
-out:
- local_bh_disable();
- rctx->complete(&req->base, err);
- local_bh_enable();
-}
-
-static int mcryptd_hash_final_enqueue(struct ahash_request *req)
-{
- return mcryptd_hash_enqueue(req, mcryptd_hash_final);
-}
-
-static void mcryptd_hash_finup(struct crypto_async_request *req_async, int err)
-{
- struct ahash_request *req = ahash_request_cast(req_async);
- struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
-
- if (unlikely(err == -EINPROGRESS))
- goto out;
- rctx->out = req->result;
- err = crypto_ahash_finup(&rctx->areq);
-
- if (err) {
- req->base.complete = rctx->complete;
- goto out;
- }
-
- return;
-out:
- local_bh_disable();
- rctx->complete(&req->base, err);
- local_bh_enable();
-}
-
-static int mcryptd_hash_finup_enqueue(struct ahash_request *req)
-{
- return mcryptd_hash_enqueue(req, mcryptd_hash_finup);
-}
-
-static void mcryptd_hash_digest(struct crypto_async_request *req_async, int err)
-{
- struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm);
- struct crypto_ahash *child = ctx->child;
- struct ahash_request *req = ahash_request_cast(req_async);
- struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
- struct ahash_request *desc = &rctx->areq;
-
- if (unlikely(err == -EINPROGRESS))
- goto out;
-
- ahash_request_set_tfm(desc, child);
- ahash_request_set_callback(desc, CRYPTO_TFM_REQ_MAY_SLEEP,
- rctx->complete, req_async);
-
- rctx->out = req->result;
- err = crypto_ahash_init(desc) ?: crypto_ahash_finup(desc);
-
-out:
- local_bh_disable();
- rctx->complete(&req->base, err);
- local_bh_enable();
-}
-
-static int mcryptd_hash_digest_enqueue(struct ahash_request *req)
-{
- return mcryptd_hash_enqueue(req, mcryptd_hash_digest);
-}
-
-static int mcryptd_hash_export(struct ahash_request *req, void *out)
-{
- struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
-
- return crypto_ahash_export(&rctx->areq, out);
-}
-
-static int mcryptd_hash_import(struct ahash_request *req, const void *in)
-{
- struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
-
- return crypto_ahash_import(&rctx->areq, in);
-}
-
-static int mcryptd_create_hash(struct crypto_template *tmpl, struct rtattr **tb,
- struct mcryptd_queue *queue)
-{
- struct hashd_instance_ctx *ctx;
- struct ahash_instance *inst;
- struct hash_alg_common *halg;
- struct crypto_alg *alg;
- u32 type = 0;
- u32 mask = 0;
- int err;
-
- if (!mcryptd_check_internal(tb, &type, &mask))
- return -EINVAL;
-
- halg = ahash_attr_alg(tb[1], type, mask);
- if (IS_ERR(halg))
- return PTR_ERR(halg);
-
- alg = &halg->base;
- pr_debug("crypto: mcryptd hash alg: %s\n", alg->cra_name);
- inst = mcryptd_alloc_instance(alg, ahash_instance_headroom(),
- sizeof(*ctx));
- err = PTR_ERR(inst);
- if (IS_ERR(inst))
- goto out_put_alg;
-
- ctx = ahash_instance_ctx(inst);
- ctx->queue = queue;
-
- err = crypto_init_ahash_spawn(&ctx->spawn, halg,
- ahash_crypto_instance(inst));
- if (err)
- goto out_free_inst;
-
- inst->alg.halg.base.cra_flags = CRYPTO_ALG_ASYNC |
- (alg->cra_flags & (CRYPTO_ALG_INTERNAL |
- CRYPTO_ALG_OPTIONAL_KEY));
-
- inst->alg.halg.digestsize = halg->digestsize;
- inst->alg.halg.statesize = halg->statesize;
- inst->alg.halg.base.cra_ctxsize = sizeof(struct mcryptd_hash_ctx);
-
- inst->alg.halg.base.cra_init = mcryptd_hash_init_tfm;
- inst->alg.halg.base.cra_exit = mcryptd_hash_exit_tfm;
-
- inst->alg.init = mcryptd_hash_init_enqueue;
- inst->alg.update = mcryptd_hash_update_enqueue;
- inst->alg.final = mcryptd_hash_final_enqueue;
- inst->alg.finup = mcryptd_hash_finup_enqueue;
- inst->alg.export = mcryptd_hash_export;
- inst->alg.import = mcryptd_hash_import;
- if (crypto_hash_alg_has_setkey(halg))
- inst->alg.setkey = mcryptd_hash_setkey;
- inst->alg.digest = mcryptd_hash_digest_enqueue;
-
- err = ahash_register_instance(tmpl, inst);
- if (err) {
- crypto_drop_ahash(&ctx->spawn);
-out_free_inst:
- kfree(inst);
- }
-
-out_put_alg:
- crypto_mod_put(alg);
- return err;
-}
-
-static struct mcryptd_queue mqueue;
-
-static int mcryptd_create(struct crypto_template *tmpl, struct rtattr **tb)
-{
- struct crypto_attr_type *algt;
-
- algt = crypto_get_attr_type(tb);
- if (IS_ERR(algt))
- return PTR_ERR(algt);
-
- switch (algt->type & algt->mask & CRYPTO_ALG_TYPE_MASK) {
- case CRYPTO_ALG_TYPE_DIGEST:
- return mcryptd_create_hash(tmpl, tb, &mqueue);
- break;
- }
-
- return -EINVAL;
-}
-
-static void mcryptd_free(struct crypto_instance *inst)
-{
- struct mcryptd_instance_ctx *ctx = crypto_instance_ctx(inst);
- struct hashd_instance_ctx *hctx = crypto_instance_ctx(inst);
-
- switch (inst->alg.cra_flags & CRYPTO_ALG_TYPE_MASK) {
- case CRYPTO_ALG_TYPE_AHASH:
- crypto_drop_ahash(&hctx->spawn);
- kfree(ahash_instance(inst));
- return;
- default:
- crypto_drop_spawn(&ctx->spawn);
- kfree(inst);
- }
-}
-
-static struct crypto_template mcryptd_tmpl = {
- .name = "mcryptd",
- .create = mcryptd_create,
- .free = mcryptd_free,
- .module = THIS_MODULE,
-};
-
-struct mcryptd_ahash *mcryptd_alloc_ahash(const char *alg_name,
- u32 type, u32 mask)
-{
- char mcryptd_alg_name[CRYPTO_MAX_ALG_NAME];
- struct crypto_ahash *tfm;
-
- if (snprintf(mcryptd_alg_name, CRYPTO_MAX_ALG_NAME,
- "mcryptd(%s)", alg_name) >= CRYPTO_MAX_ALG_NAME)
- return ERR_PTR(-EINVAL);
- tfm = crypto_alloc_ahash(mcryptd_alg_name, type, mask);
- if (IS_ERR(tfm))
- return ERR_CAST(tfm);
- if (tfm->base.__crt_alg->cra_module != THIS_MODULE) {
- crypto_free_ahash(tfm);
- return ERR_PTR(-EINVAL);
- }
-
- return __mcryptd_ahash_cast(tfm);
-}
-EXPORT_SYMBOL_GPL(mcryptd_alloc_ahash);
-
-struct crypto_ahash *mcryptd_ahash_child(struct mcryptd_ahash *tfm)
-{
- struct mcryptd_hash_ctx *ctx = crypto_ahash_ctx(&tfm->base);
-
- return ctx->child;
-}
-EXPORT_SYMBOL_GPL(mcryptd_ahash_child);
-
-struct ahash_request *mcryptd_ahash_desc(struct ahash_request *req)
-{
- struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
- return &rctx->areq;
-}
-EXPORT_SYMBOL_GPL(mcryptd_ahash_desc);
-
-void mcryptd_free_ahash(struct mcryptd_ahash *tfm)
-{
- crypto_free_ahash(&tfm->base);
-}
-EXPORT_SYMBOL_GPL(mcryptd_free_ahash);
-
-static int __init mcryptd_init(void)
-{
- int err, cpu;
- struct mcryptd_flush_list *flist;
-
- mcryptd_flist = alloc_percpu(struct mcryptd_flush_list);
- for_each_possible_cpu(cpu) {
- flist = per_cpu_ptr(mcryptd_flist, cpu);
- INIT_LIST_HEAD(&flist->list);
- mutex_init(&flist->lock);
- }
-
- err = mcryptd_init_queue(&mqueue, MCRYPTD_MAX_CPU_QLEN);
- if (err) {
- free_percpu(mcryptd_flist);
- return err;
- }
-
- err = crypto_register_template(&mcryptd_tmpl);
- if (err) {
- mcryptd_fini_queue(&mqueue);
- free_percpu(mcryptd_flist);
- }
-
- return err;
-}
-
-static void __exit mcryptd_exit(void)
-{
- mcryptd_fini_queue(&mqueue);
- crypto_unregister_template(&mcryptd_tmpl);
- free_percpu(mcryptd_flist);
-}
-
-subsys_initcall(mcryptd_init);
-module_exit(mcryptd_exit);
-
-MODULE_LICENSE("GPL");
-MODULE_DESCRIPTION("Software async multibuffer crypto daemon");
-MODULE_ALIAS_CRYPTO("mcryptd");
diff --git a/include/crypto/mcryptd.h b/include/crypto/mcryptd.h
deleted file mode 100644
index b67404fc4b34..000000000000
--- a/include/crypto/mcryptd.h
+++ /dev/null
@@ -1,114 +0,0 @@
-/* SPDX-License-Identifier: GPL-2.0 */
-/*
- * Software async multibuffer crypto daemon headers
- *
- * Author:
- * Tim Chen <[email protected]>
- *
- * Copyright (c) 2014, Intel Corporation.
- */
-
-#ifndef _CRYPTO_MCRYPT_H
-#define _CRYPTO_MCRYPT_H
-
-#include <linux/crypto.h>
-#include <linux/kernel.h>
-#include <crypto/hash.h>
-
-struct mcryptd_ahash {
- struct crypto_ahash base;
-};
-
-static inline struct mcryptd_ahash *__mcryptd_ahash_cast(
- struct crypto_ahash *tfm)
-{
- return (struct mcryptd_ahash *)tfm;
-}
-
-struct mcryptd_cpu_queue {
- struct crypto_queue queue;
- spinlock_t q_lock;
- struct work_struct work;
-};
-
-struct mcryptd_queue {
- struct mcryptd_cpu_queue __percpu *cpu_queue;
-};
-
-struct mcryptd_instance_ctx {
- struct crypto_spawn spawn;
- struct mcryptd_queue *queue;
-};
-
-struct mcryptd_hash_ctx {
- struct crypto_ahash *child;
- struct mcryptd_alg_state *alg_state;
-};
-
-struct mcryptd_tag {
- /* seq number of request */
- unsigned seq_num;
- /* arrival time of request */
- unsigned long arrival;
- unsigned long expire;
- int cpu;
-};
-
-struct mcryptd_hash_request_ctx {
- struct list_head waiter;
- crypto_completion_t complete;
- struct mcryptd_tag tag;
- struct crypto_hash_walk walk;
- u8 *out;
- int flag;
- struct ahash_request areq;
-};
-
-struct mcryptd_ahash *mcryptd_alloc_ahash(const char *alg_name,
- u32 type, u32 mask);
-struct crypto_ahash *mcryptd_ahash_child(struct mcryptd_ahash *tfm);
-struct ahash_request *mcryptd_ahash_desc(struct ahash_request *req);
-void mcryptd_free_ahash(struct mcryptd_ahash *tfm);
-void mcryptd_flusher(struct work_struct *work);
-
-enum mcryptd_req_type {
- MCRYPTD_NONE,
- MCRYPTD_UPDATE,
- MCRYPTD_FINUP,
- MCRYPTD_DIGEST,
- MCRYPTD_FINAL
-};
-
-struct mcryptd_alg_cstate {
- unsigned long next_flush;
- unsigned next_seq_num;
- bool flusher_engaged;
- struct delayed_work flush;
- int cpu;
- struct mcryptd_alg_state *alg_state;
- void *mgr;
- spinlock_t work_lock;
- struct list_head work_list;
- struct list_head flush_list;
-};
-
-struct mcryptd_alg_state {
- struct mcryptd_alg_cstate __percpu *alg_cstate;
- unsigned long (*flusher)(struct mcryptd_alg_cstate *cstate);
-};
-
-/* return delay in jiffies from current time */
-static inline unsigned long get_delay(unsigned long t)
-{
- long delay;
-
- delay = (long) t - (long) jiffies;
- if (delay <= 0)
- return 0;
- else
- return (unsigned long) delay;
-}
-
-void mcryptd_arm_flusher(struct mcryptd_alg_cstate *cstate, unsigned long delay);
-
-#endif
--
2.18.0
On 08/22/2018 01:51 AM, Ard Biesheuvel wrote:
> As it turns out, the AVX2 multibuffer SHA routines are currently
> broken [0], in a way that would have likely been noticed if this
> code were in wide use. Since the code is too complicated to be
> maintained by anyone except the original authors, and since the
> performance benefits for real-world use cases are debatable to
> begin with, it is better to drop it entirely for the moment.
>
> [0] https://marc.info/?l=linux-crypto-vger&m=153476243825350&w=2
Sorry I was out of the loop for a while and haven't been following
the code too closely.
Megha is maintaining the code now. Before we pull the code,
please give us a chance to fix it first.
Thanks.
Tim
>
> Suggested-by: Eric Biggers <[email protected]>
> Cc: Megha Dey <[email protected]>
> Cc: Tim Chen <[email protected]>
> Cc: Geert Uytterhoeven <[email protected]>
> Cc: Martin Schwidefsky <[email protected]>
> Cc: Heiko Carstens <[email protected]>
> Cc: Thomas Gleixner <[email protected]>
> Cc: Ingo Molnar <[email protected]>
> Signed-off-by: Ard Biesheuvel <[email protected]>
> ---
> MAINTAINERS | 8 -
> arch/m68k/configs/amiga_defconfig | 1 -
> arch/m68k/configs/apollo_defconfig | 1 -
> arch/m68k/configs/atari_defconfig | 1 -
> arch/m68k/configs/bvme6000_defconfig | 1 -
> arch/m68k/configs/hp300_defconfig | 1 -
> arch/m68k/configs/mac_defconfig | 1 -
> arch/m68k/configs/multi_defconfig | 1 -
> arch/m68k/configs/mvme147_defconfig | 1 -
> arch/m68k/configs/mvme16x_defconfig | 1 -
> arch/m68k/configs/q40_defconfig | 1 -
> arch/m68k/configs/sun3_defconfig | 1 -
> arch/m68k/configs/sun3x_defconfig | 1 -
> arch/s390/configs/debug_defconfig | 1 -
> arch/s390/configs/performance_defconfig | 1 -
> arch/x86/crypto/Makefile | 3 -
> arch/x86/crypto/sha1-mb/Makefile | 14 -
> arch/x86/crypto/sha1-mb/sha1_mb.c | 1011 ----------------
> arch/x86/crypto/sha1-mb/sha1_mb_ctx.h | 134 ---
> arch/x86/crypto/sha1-mb/sha1_mb_mgr.h | 110 --
> .../crypto/sha1-mb/sha1_mb_mgr_datastruct.S | 287 -----
> .../crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S | 304 -----
> .../crypto/sha1-mb/sha1_mb_mgr_init_avx2.c | 64 -
> .../crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S | 209 ----
> arch/x86/crypto/sha1-mb/sha1_x8_avx2.S | 492 --------
> arch/x86/crypto/sha256-mb/Makefile | 14 -
> arch/x86/crypto/sha256-mb/sha256_mb.c | 1013 ----------------
> arch/x86/crypto/sha256-mb/sha256_mb_ctx.h | 134 ---
> arch/x86/crypto/sha256-mb/sha256_mb_mgr.h | 108 --
> .../sha256-mb/sha256_mb_mgr_datastruct.S | 304 -----
> .../sha256-mb/sha256_mb_mgr_flush_avx2.S | 307 -----
> .../sha256-mb/sha256_mb_mgr_init_avx2.c | 65 -
> .../sha256-mb/sha256_mb_mgr_submit_avx2.S | 214 ----
> arch/x86/crypto/sha256-mb/sha256_x8_avx2.S | 598 ----------
> arch/x86/crypto/sha512-mb/Makefile | 12 -
> arch/x86/crypto/sha512-mb/sha512_mb.c | 1047 -----------------
> arch/x86/crypto/sha512-mb/sha512_mb_ctx.h | 128 --
> arch/x86/crypto/sha512-mb/sha512_mb_mgr.h | 104 --
> .../sha512-mb/sha512_mb_mgr_datastruct.S | 281 -----
> .../sha512-mb/sha512_mb_mgr_flush_avx2.S | 297 -----
> .../sha512-mb/sha512_mb_mgr_init_avx2.c | 69 --
> .../sha512-mb/sha512_mb_mgr_submit_avx2.S | 224 ----
> arch/x86/crypto/sha512-mb/sha512_x4_avx2.S | 531 ---------
> crypto/Kconfig | 62 -
> crypto/Makefile | 1 -
> crypto/mcryptd.c | 675 -----------
> include/crypto/mcryptd.h | 114 --
> 47 files changed, 8952 deletions(-)
> delete mode 100644 arch/x86/crypto/sha1-mb/Makefile
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb.c
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_ctx.h
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr.h
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_x8_avx2.S
> delete mode 100644 arch/x86/crypto/sha256-mb/Makefile
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb.c
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_ctx.h
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr.h
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_x8_avx2.S
> delete mode 100644 arch/x86/crypto/sha512-mb/Makefile
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb.c
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_ctx.h
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr.h
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_x4_avx2.S
> delete mode 100644 crypto/mcryptd.c
> delete mode 100644 include/crypto/mcryptd.h
>
> diff --git a/MAINTAINERS b/MAINTAINERS
> index 24b200d91b30..05747b8ac88e 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -7487,14 +7487,6 @@ S: Supported
> F: drivers/infiniband/hw/i40iw/
> F: include/uapi/rdma/i40iw-abi.h
>
> -INTEL SHA MULTIBUFFER DRIVER
> -M: Megha Dey <[email protected]>
> -R: Tim Chen <[email protected]>
> -L: [email protected]
> -S: Supported
> -F: arch/x86/crypto/sha*-mb/
> -F: crypto/mcryptd.c
> -
> INTEL TELEMETRY DRIVER
> M: Souvik Kumar Chakravarty <[email protected]>
> L: [email protected]
> diff --git a/arch/m68k/configs/amiga_defconfig b/arch/m68k/configs/amiga_defconfig
> index 1d5483f6e457..70b10d712624 100644
> --- a/arch/m68k/configs/amiga_defconfig
> +++ b/arch/m68k/configs/amiga_defconfig
> @@ -621,7 +621,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/m68k/configs/apollo_defconfig b/arch/m68k/configs/apollo_defconfig
> index 52a0af127951..211eec5859e8 100644
> --- a/arch/m68k/configs/apollo_defconfig
> +++ b/arch/m68k/configs/apollo_defconfig
> @@ -578,7 +578,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/m68k/configs/atari_defconfig b/arch/m68k/configs/atari_defconfig
> index b3103e51268a..0da45c6084f7 100644
> --- a/arch/m68k/configs/atari_defconfig
> +++ b/arch/m68k/configs/atari_defconfig
> @@ -599,7 +599,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/m68k/configs/bvme6000_defconfig b/arch/m68k/configs/bvme6000_defconfig
> index fb7d651a4cab..c09ae7219416 100644
> --- a/arch/m68k/configs/bvme6000_defconfig
> +++ b/arch/m68k/configs/bvme6000_defconfig
> @@ -570,7 +570,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/m68k/configs/hp300_defconfig b/arch/m68k/configs/hp300_defconfig
> index 6b37f5537c39..8c4775b30748 100644
> --- a/arch/m68k/configs/hp300_defconfig
> +++ b/arch/m68k/configs/hp300_defconfig
> @@ -580,7 +580,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/m68k/configs/mac_defconfig b/arch/m68k/configs/mac_defconfig
> index c717bf879449..48ad520e2f2d 100644
> --- a/arch/m68k/configs/mac_defconfig
> +++ b/arch/m68k/configs/mac_defconfig
> @@ -602,7 +602,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/m68k/configs/multi_defconfig b/arch/m68k/configs/multi_defconfig
> index 226c994ce794..3a3cccb9f625 100644
> --- a/arch/m68k/configs/multi_defconfig
> +++ b/arch/m68k/configs/multi_defconfig
> @@ -684,7 +684,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/m68k/configs/mvme147_defconfig b/arch/m68k/configs/mvme147_defconfig
> index b383327fd77a..63dc311f94ff 100644
> --- a/arch/m68k/configs/mvme147_defconfig
> +++ b/arch/m68k/configs/mvme147_defconfig
> @@ -570,7 +570,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/m68k/configs/mvme16x_defconfig b/arch/m68k/configs/mvme16x_defconfig
> index 9783d3deb9e9..1ae39d1f9bb5 100644
> --- a/arch/m68k/configs/mvme16x_defconfig
> +++ b/arch/m68k/configs/mvme16x_defconfig
> @@ -570,7 +570,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/m68k/configs/q40_defconfig b/arch/m68k/configs/q40_defconfig
> index a35d10ee10cb..ba2f351811da 100644
> --- a/arch/m68k/configs/q40_defconfig
> +++ b/arch/m68k/configs/q40_defconfig
> @@ -593,7 +593,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/m68k/configs/sun3_defconfig b/arch/m68k/configs/sun3_defconfig
> index 573bf922d448..544b7475ff6a 100644
> --- a/arch/m68k/configs/sun3_defconfig
> +++ b/arch/m68k/configs/sun3_defconfig
> @@ -571,7 +571,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/m68k/configs/sun3x_defconfig b/arch/m68k/configs/sun3x_defconfig
> index efb27a7fcc55..149edafbb9f9 100644
> --- a/arch/m68k/configs/sun3x_defconfig
> +++ b/arch/m68k/configs/sun3x_defconfig
> @@ -572,7 +572,6 @@ CONFIG_CRYPTO_ECDH=m
> CONFIG_CRYPTO_MANAGER=y
> CONFIG_CRYPTO_USER=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_AEGIS128=m
> diff --git a/arch/s390/configs/debug_defconfig b/arch/s390/configs/debug_defconfig
> index 941d8cc6c9f5..259d1698ac50 100644
> --- a/arch/s390/configs/debug_defconfig
> +++ b/arch/s390/configs/debug_defconfig
> @@ -668,7 +668,6 @@ CONFIG_CRYPTO_USER=m
> # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set
> CONFIG_CRYPTO_PCRYPT=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_LRW=m
> diff --git a/arch/s390/configs/performance_defconfig b/arch/s390/configs/performance_defconfig
> index eb6f75f24208..37fd60c20e22 100644
> --- a/arch/s390/configs/performance_defconfig
> +++ b/arch/s390/configs/performance_defconfig
> @@ -610,7 +610,6 @@ CONFIG_CRYPTO_USER=m
> # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set
> CONFIG_CRYPTO_PCRYPT=m
> CONFIG_CRYPTO_CRYPTD=m
> -CONFIG_CRYPTO_MCRYPTD=m
> CONFIG_CRYPTO_TEST=m
> CONFIG_CRYPTO_CHACHA20POLY1305=m
> CONFIG_CRYPTO_LRW=m
> diff --git a/arch/x86/crypto/Makefile b/arch/x86/crypto/Makefile
> index a450ad573dcb..9edfa5469f9f 100644
> --- a/arch/x86/crypto/Makefile
> +++ b/arch/x86/crypto/Makefile
> @@ -60,9 +60,6 @@ endif
> ifeq ($(avx2_supported),yes)
> obj-$(CONFIG_CRYPTO_CAMELLIA_AESNI_AVX2_X86_64) += camellia-aesni-avx2.o
> obj-$(CONFIG_CRYPTO_SERPENT_AVX2_X86_64) += serpent-avx2.o
> - obj-$(CONFIG_CRYPTO_SHA1_MB) += sha1-mb/
> - obj-$(CONFIG_CRYPTO_SHA256_MB) += sha256-mb/
> - obj-$(CONFIG_CRYPTO_SHA512_MB) += sha512-mb/
>
> obj-$(CONFIG_CRYPTO_MORUS1280_AVX2) += morus1280-avx2.o
> endif
> diff --git a/arch/x86/crypto/sha1-mb/Makefile b/arch/x86/crypto/sha1-mb/Makefile
> deleted file mode 100644
> index 815ded3ba90e..000000000000
> --- a/arch/x86/crypto/sha1-mb/Makefile
> +++ /dev/null
> @@ -1,14 +0,0 @@
> -# SPDX-License-Identifier: GPL-2.0
> -#
> -# Arch-specific CryptoAPI modules.
> -#
> -
> -OBJECT_FILES_NON_STANDARD := y
> -
> -avx2_supported := $(call as-instr,vpgatherdd %ymm0$(comma)(%eax$(comma)%ymm1\
> - $(comma)4)$(comma)%ymm2,yes,no)
> -ifeq ($(avx2_supported),yes)
> - obj-$(CONFIG_CRYPTO_SHA1_MB) += sha1-mb.o
> - sha1-mb-y := sha1_mb.o sha1_mb_mgr_flush_avx2.o \
> - sha1_mb_mgr_init_avx2.o sha1_mb_mgr_submit_avx2.o sha1_x8_avx2.o
> -endif
> diff --git a/arch/x86/crypto/sha1-mb/sha1_mb.c b/arch/x86/crypto/sha1-mb/sha1_mb.c
> deleted file mode 100644
> index b93805664c1d..000000000000
> --- a/arch/x86/crypto/sha1-mb/sha1_mb.c
> +++ /dev/null
> @@ -1,1011 +0,0 @@
> -/*
> - * Multi buffer SHA1 algorithm Glue Code
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Tim Chen <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
> -
> -#include <crypto/internal/hash.h>
> -#include <linux/init.h>
> -#include <linux/module.h>
> -#include <linux/mm.h>
> -#include <linux/cryptohash.h>
> -#include <linux/types.h>
> -#include <linux/list.h>
> -#include <crypto/scatterwalk.h>
> -#include <crypto/sha.h>
> -#include <crypto/mcryptd.h>
> -#include <crypto/crypto_wq.h>
> -#include <asm/byteorder.h>
> -#include <linux/hardirq.h>
> -#include <asm/fpu/api.h>
> -#include "sha1_mb_ctx.h"
> -
> -#define FLUSH_INTERVAL 1000 /* in usec */
> -
> -static struct mcryptd_alg_state sha1_mb_alg_state;
> -
> -struct sha1_mb_ctx {
> - struct mcryptd_ahash *mcryptd_tfm;
> -};
> -
> -static inline struct mcryptd_hash_request_ctx
> - *cast_hash_to_mcryptd_ctx(struct sha1_hash_ctx *hash_ctx)
> -{
> - struct ahash_request *areq;
> -
> - areq = container_of((void *) hash_ctx, struct ahash_request, __ctx);
> - return container_of(areq, struct mcryptd_hash_request_ctx, areq);
> -}
> -
> -static inline struct ahash_request
> - *cast_mcryptd_ctx_to_req(struct mcryptd_hash_request_ctx *ctx)
> -{
> - return container_of((void *) ctx, struct ahash_request, __ctx);
> -}
> -
> -static void req_ctx_init(struct mcryptd_hash_request_ctx *rctx,
> - struct ahash_request *areq)
> -{
> - rctx->flag = HASH_UPDATE;
> -}
> -
> -static asmlinkage void (*sha1_job_mgr_init)(struct sha1_mb_mgr *state);
> -static asmlinkage struct job_sha1* (*sha1_job_mgr_submit)
> - (struct sha1_mb_mgr *state, struct job_sha1 *job);
> -static asmlinkage struct job_sha1* (*sha1_job_mgr_flush)
> - (struct sha1_mb_mgr *state);
> -static asmlinkage struct job_sha1* (*sha1_job_mgr_get_comp_job)
> - (struct sha1_mb_mgr *state);
> -
> -static inline uint32_t sha1_pad(uint8_t padblock[SHA1_BLOCK_SIZE * 2],
> - uint64_t total_len)
> -{
> - uint32_t i = total_len & (SHA1_BLOCK_SIZE - 1);
> -
> - memset(&padblock[i], 0, SHA1_BLOCK_SIZE);
> - padblock[i] = 0x80;
> -
> - i += ((SHA1_BLOCK_SIZE - 1) &
> - (0 - (total_len + SHA1_PADLENGTHFIELD_SIZE + 1)))
> - + 1 + SHA1_PADLENGTHFIELD_SIZE;
> -
> -#if SHA1_PADLENGTHFIELD_SIZE == 16
> - *((uint64_t *) &padblock[i - 16]) = 0;
> -#endif
> -
> - *((uint64_t *) &padblock[i - 8]) = cpu_to_be64(total_len << 3);
> -
> - /* Number of extra blocks to hash */
> - return i >> SHA1_LOG2_BLOCK_SIZE;
> -}
> -
> -static struct sha1_hash_ctx *sha1_ctx_mgr_resubmit(struct sha1_ctx_mgr *mgr,
> - struct sha1_hash_ctx *ctx)
> -{
> - while (ctx) {
> - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> - /* Clear PROCESSING bit */
> - ctx->status = HASH_CTX_STS_COMPLETE;
> - return ctx;
> - }
> -
> - /*
> - * If the extra blocks are empty, begin hashing what remains
> - * in the user's buffer.
> - */
> - if (ctx->partial_block_buffer_length == 0 &&
> - ctx->incoming_buffer_length) {
> -
> - const void *buffer = ctx->incoming_buffer;
> - uint32_t len = ctx->incoming_buffer_length;
> - uint32_t copy_len;
> -
> - /*
> - * Only entire blocks can be hashed.
> - * Copy remainder to extra blocks buffer.
> - */
> - copy_len = len & (SHA1_BLOCK_SIZE-1);
> -
> - if (copy_len) {
> - len -= copy_len;
> - memcpy(ctx->partial_block_buffer,
> - ((const char *) buffer + len),
> - copy_len);
> - ctx->partial_block_buffer_length = copy_len;
> - }
> -
> - ctx->incoming_buffer_length = 0;
> -
> - /* len should be a multiple of the block size now */
> - assert((len % SHA1_BLOCK_SIZE) == 0);
> -
> - /* Set len to the number of blocks to be hashed */
> - len >>= SHA1_LOG2_BLOCK_SIZE;
> -
> - if (len) {
> -
> - ctx->job.buffer = (uint8_t *) buffer;
> - ctx->job.len = len;
> - ctx = (struct sha1_hash_ctx *)sha1_job_mgr_submit(&mgr->mgr,
> - &ctx->job);
> - continue;
> - }
> - }
> -
> - /*
> - * If the extra blocks are not empty, then we are
> - * either on the last block(s) or we need more
> - * user input before continuing.
> - */
> - if (ctx->status & HASH_CTX_STS_LAST) {
> -
> - uint8_t *buf = ctx->partial_block_buffer;
> - uint32_t n_extra_blocks =
> - sha1_pad(buf, ctx->total_length);
> -
> - ctx->status = (HASH_CTX_STS_PROCESSING |
> - HASH_CTX_STS_COMPLETE);
> - ctx->job.buffer = buf;
> - ctx->job.len = (uint32_t) n_extra_blocks;
> - ctx = (struct sha1_hash_ctx *)
> - sha1_job_mgr_submit(&mgr->mgr, &ctx->job);
> - continue;
> - }
> -
> - ctx->status = HASH_CTX_STS_IDLE;
> - return ctx;
> - }
> -
> - return NULL;
> -}
> -
> -static struct sha1_hash_ctx
> - *sha1_ctx_mgr_get_comp_ctx(struct sha1_ctx_mgr *mgr)
> -{
> - /*
> - * If get_comp_job returns NULL, there are no jobs complete.
> - * If get_comp_job returns a job, verify that it is safe to return to
> - * the user.
> - * If it is not ready, resubmit the job to finish processing.
> - * If sha1_ctx_mgr_resubmit returned a job, it is ready to be returned.
> - * Otherwise, all jobs currently being managed by the hash_ctx_mgr
> - * still need processing.
> - */
> - struct sha1_hash_ctx *ctx;
> -
> - ctx = (struct sha1_hash_ctx *) sha1_job_mgr_get_comp_job(&mgr->mgr);
> - return sha1_ctx_mgr_resubmit(mgr, ctx);
> -}
> -
> -static void sha1_ctx_mgr_init(struct sha1_ctx_mgr *mgr)
> -{
> - sha1_job_mgr_init(&mgr->mgr);
> -}
> -
> -static struct sha1_hash_ctx *sha1_ctx_mgr_submit(struct sha1_ctx_mgr *mgr,
> - struct sha1_hash_ctx *ctx,
> - const void *buffer,
> - uint32_t len,
> - int flags)
> -{
> - if (flags & ~(HASH_UPDATE | HASH_LAST)) {
> - /* User should not pass anything other than UPDATE or LAST */
> - ctx->error = HASH_CTX_ERROR_INVALID_FLAGS;
> - return ctx;
> - }
> -
> - if (ctx->status & HASH_CTX_STS_PROCESSING) {
> - /* Cannot submit to a currently processing job. */
> - ctx->error = HASH_CTX_ERROR_ALREADY_PROCESSING;
> - return ctx;
> - }
> -
> - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> - /* Cannot update a finished job. */
> - ctx->error = HASH_CTX_ERROR_ALREADY_COMPLETED;
> - return ctx;
> - }
> -
> - /*
> - * If we made it here, there were no errors during this call to
> - * submit
> - */
> - ctx->error = HASH_CTX_ERROR_NONE;
> -
> - /* Store buffer ptr info from user */
> - ctx->incoming_buffer = buffer;
> - ctx->incoming_buffer_length = len;
> -
> - /*
> - * Store the user's request flags and mark this ctx as currently
> - * being processed.
> - */
> - ctx->status = (flags & HASH_LAST) ?
> - (HASH_CTX_STS_PROCESSING | HASH_CTX_STS_LAST) :
> - HASH_CTX_STS_PROCESSING;
> -
> - /* Advance byte counter */
> - ctx->total_length += len;
> -
> - /*
> - * If there is anything currently buffered in the extra blocks,
> - * append to it until it contains a whole block.
> - * Or if the user's buffer contains less than a whole block,
> - * append as much as possible to the extra block.
> - */
> - if (ctx->partial_block_buffer_length || len < SHA1_BLOCK_SIZE) {
> - /*
> - * Compute how many bytes to copy from user buffer into
> - * extra block
> - */
> - uint32_t copy_len = SHA1_BLOCK_SIZE -
> - ctx->partial_block_buffer_length;
> - if (len < copy_len)
> - copy_len = len;
> -
> - if (copy_len) {
> - /* Copy and update relevant pointers and counters */
> - memcpy(&ctx->partial_block_buffer[ctx->partial_block_buffer_length],
> - buffer, copy_len);
> -
> - ctx->partial_block_buffer_length += copy_len;
> - ctx->incoming_buffer = (const void *)
> - ((const char *)buffer + copy_len);
> - ctx->incoming_buffer_length = len - copy_len;
> - }
> -
> - /*
> - * The extra block should never contain more than 1 block
> - * here
> - */
> - assert(ctx->partial_block_buffer_length <= SHA1_BLOCK_SIZE);
> -
> - /*
> - * If the extra block buffer contains exactly 1 block, it can
> - * be hashed.
> - */
> - if (ctx->partial_block_buffer_length >= SHA1_BLOCK_SIZE) {
> - ctx->partial_block_buffer_length = 0;
> -
> - ctx->job.buffer = ctx->partial_block_buffer;
> - ctx->job.len = 1;
> - ctx = (struct sha1_hash_ctx *)
> - sha1_job_mgr_submit(&mgr->mgr, &ctx->job);
> - }
> - }
> -
> - return sha1_ctx_mgr_resubmit(mgr, ctx);
> -}
> -
> -static struct sha1_hash_ctx *sha1_ctx_mgr_flush(struct sha1_ctx_mgr *mgr)
> -{
> - struct sha1_hash_ctx *ctx;
> -
> - while (1) {
> - ctx = (struct sha1_hash_ctx *) sha1_job_mgr_flush(&mgr->mgr);
> -
> - /* If flush returned 0, there are no more jobs in flight. */
> - if (!ctx)
> - return NULL;
> -
> - /*
> - * If flush returned a job, resubmit the job to finish
> - * processing.
> - */
> - ctx = sha1_ctx_mgr_resubmit(mgr, ctx);
> -
> - /*
> - * If sha1_ctx_mgr_resubmit returned a job, it is ready to be
> - * returned. Otherwise, all jobs currently being managed by the
> - * sha1_ctx_mgr still need processing. Loop.
> - */
> - if (ctx)
> - return ctx;
> - }
> -}
> -
> -static int sha1_mb_init(struct ahash_request *areq)
> -{
> - struct sha1_hash_ctx *sctx = ahash_request_ctx(areq);
> -
> - hash_ctx_init(sctx);
> - sctx->job.result_digest[0] = SHA1_H0;
> - sctx->job.result_digest[1] = SHA1_H1;
> - sctx->job.result_digest[2] = SHA1_H2;
> - sctx->job.result_digest[3] = SHA1_H3;
> - sctx->job.result_digest[4] = SHA1_H4;
> - sctx->total_length = 0;
> - sctx->partial_block_buffer_length = 0;
> - sctx->status = HASH_CTX_STS_IDLE;
> -
> - return 0;
> -}
> -
> -static int sha1_mb_set_results(struct mcryptd_hash_request_ctx *rctx)
> -{
> - int i;
> - struct sha1_hash_ctx *sctx = ahash_request_ctx(&rctx->areq);
> - __be32 *dst = (__be32 *) rctx->out;
> -
> - for (i = 0; i < 5; ++i)
> - dst[i] = cpu_to_be32(sctx->job.result_digest[i]);
> -
> - return 0;
> -}
> -
> -static int sha_finish_walk(struct mcryptd_hash_request_ctx **ret_rctx,
> - struct mcryptd_alg_cstate *cstate, bool flush)
> -{
> - int flag = HASH_UPDATE;
> - int nbytes, err = 0;
> - struct mcryptd_hash_request_ctx *rctx = *ret_rctx;
> - struct sha1_hash_ctx *sha_ctx;
> -
> - /* more work ? */
> - while (!(rctx->flag & HASH_DONE)) {
> - nbytes = crypto_ahash_walk_done(&rctx->walk, 0);
> - if (nbytes < 0) {
> - err = nbytes;
> - goto out;
> - }
> - /* check if the walk is done */
> - if (crypto_ahash_walk_last(&rctx->walk)) {
> - rctx->flag |= HASH_DONE;
> - if (rctx->flag & HASH_FINAL)
> - flag |= HASH_LAST;
> -
> - }
> - sha_ctx = (struct sha1_hash_ctx *)
> - ahash_request_ctx(&rctx->areq);
> - kernel_fpu_begin();
> - sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx,
> - rctx->walk.data, nbytes, flag);
> - if (!sha_ctx) {
> - if (flush)
> - sha_ctx = sha1_ctx_mgr_flush(cstate->mgr);
> - }
> - kernel_fpu_end();
> - if (sha_ctx)
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - else {
> - rctx = NULL;
> - goto out;
> - }
> - }
> -
> - /* copy the results */
> - if (rctx->flag & HASH_FINAL)
> - sha1_mb_set_results(rctx);
> -
> -out:
> - *ret_rctx = rctx;
> - return err;
> -}
> -
> -static int sha_complete_job(struct mcryptd_hash_request_ctx *rctx,
> - struct mcryptd_alg_cstate *cstate,
> - int err)
> -{
> - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> - struct sha1_hash_ctx *sha_ctx;
> - struct mcryptd_hash_request_ctx *req_ctx;
> - int ret;
> -
> - /* remove from work list */
> - spin_lock(&cstate->work_lock);
> - list_del(&rctx->waiter);
> - spin_unlock(&cstate->work_lock);
> -
> - if (irqs_disabled())
> - rctx->complete(&req->base, err);
> - else {
> - local_bh_disable();
> - rctx->complete(&req->base, err);
> - local_bh_enable();
> - }
> -
> - /* check to see if there are other jobs that are done */
> - sha_ctx = sha1_ctx_mgr_get_comp_ctx(cstate->mgr);
> - while (sha_ctx) {
> - req_ctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&req_ctx, cstate, false);
> - if (req_ctx) {
> - spin_lock(&cstate->work_lock);
> - list_del(&req_ctx->waiter);
> - spin_unlock(&cstate->work_lock);
> -
> - req = cast_mcryptd_ctx_to_req(req_ctx);
> - if (irqs_disabled())
> - req_ctx->complete(&req->base, ret);
> - else {
> - local_bh_disable();
> - req_ctx->complete(&req->base, ret);
> - local_bh_enable();
> - }
> - }
> - sha_ctx = sha1_ctx_mgr_get_comp_ctx(cstate->mgr);
> - }
> -
> - return 0;
> -}
> -
> -static void sha1_mb_add_list(struct mcryptd_hash_request_ctx *rctx,
> - struct mcryptd_alg_cstate *cstate)
> -{
> - unsigned long next_flush;
> - unsigned long delay = usecs_to_jiffies(FLUSH_INTERVAL);
> -
> - /* initialize tag */
> - rctx->tag.arrival = jiffies; /* tag the arrival time */
> - rctx->tag.seq_num = cstate->next_seq_num++;
> - next_flush = rctx->tag.arrival + delay;
> - rctx->tag.expire = next_flush;
> -
> - spin_lock(&cstate->work_lock);
> - list_add_tail(&rctx->waiter, &cstate->work_list);
> - spin_unlock(&cstate->work_lock);
> -
> - mcryptd_arm_flusher(cstate, delay);
> -}
> -
> -static int sha1_mb_update(struct ahash_request *areq)
> -{
> - struct mcryptd_hash_request_ctx *rctx =
> - container_of(areq, struct mcryptd_hash_request_ctx, areq);
> - struct mcryptd_alg_cstate *cstate =
> - this_cpu_ptr(sha1_mb_alg_state.alg_cstate);
> -
> - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> - struct sha1_hash_ctx *sha_ctx;
> - int ret = 0, nbytes;
> -
> -
> - /* sanity check */
> - if (rctx->tag.cpu != smp_processor_id()) {
> - pr_err("mcryptd error: cpu clash\n");
> - goto done;
> - }
> -
> - /* need to init context */
> - req_ctx_init(rctx, areq);
> -
> - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> -
> - if (nbytes < 0) {
> - ret = nbytes;
> - goto done;
> - }
> -
> - if (crypto_ahash_walk_last(&rctx->walk))
> - rctx->flag |= HASH_DONE;
> -
> - /* submit */
> - sha_ctx = (struct sha1_hash_ctx *) ahash_request_ctx(areq);
> - sha1_mb_add_list(rctx, cstate);
> - kernel_fpu_begin();
> - sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
> - nbytes, HASH_UPDATE);
> - kernel_fpu_end();
> -
> - /* check if anything is returned */
> - if (!sha_ctx)
> - return -EINPROGRESS;
> -
> - if (sha_ctx->error) {
> - ret = sha_ctx->error;
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - goto done;
> - }
> -
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&rctx, cstate, false);
> -
> - if (!rctx)
> - return -EINPROGRESS;
> -done:
> - sha_complete_job(rctx, cstate, ret);
> - return ret;
> -}
> -
> -static int sha1_mb_finup(struct ahash_request *areq)
> -{
> - struct mcryptd_hash_request_ctx *rctx =
> - container_of(areq, struct mcryptd_hash_request_ctx, areq);
> - struct mcryptd_alg_cstate *cstate =
> - this_cpu_ptr(sha1_mb_alg_state.alg_cstate);
> -
> - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> - struct sha1_hash_ctx *sha_ctx;
> - int ret = 0, flag = HASH_UPDATE, nbytes;
> -
> - /* sanity check */
> - if (rctx->tag.cpu != smp_processor_id()) {
> - pr_err("mcryptd error: cpu clash\n");
> - goto done;
> - }
> -
> - /* need to init context */
> - req_ctx_init(rctx, areq);
> -
> - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> -
> - if (nbytes < 0) {
> - ret = nbytes;
> - goto done;
> - }
> -
> - if (crypto_ahash_walk_last(&rctx->walk)) {
> - rctx->flag |= HASH_DONE;
> - flag = HASH_LAST;
> - }
> -
> - /* submit */
> - rctx->flag |= HASH_FINAL;
> - sha_ctx = (struct sha1_hash_ctx *) ahash_request_ctx(areq);
> - sha1_mb_add_list(rctx, cstate);
> -
> - kernel_fpu_begin();
> - sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
> - nbytes, flag);
> - kernel_fpu_end();
> -
> - /* check if anything is returned */
> - if (!sha_ctx)
> - return -EINPROGRESS;
> -
> - if (sha_ctx->error) {
> - ret = sha_ctx->error;
> - goto done;
> - }
> -
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&rctx, cstate, false);
> - if (!rctx)
> - return -EINPROGRESS;
> -done:
> - sha_complete_job(rctx, cstate, ret);
> - return ret;
> -}
> -
> -static int sha1_mb_final(struct ahash_request *areq)
> -{
> - struct mcryptd_hash_request_ctx *rctx =
> - container_of(areq, struct mcryptd_hash_request_ctx, areq);
> - struct mcryptd_alg_cstate *cstate =
> - this_cpu_ptr(sha1_mb_alg_state.alg_cstate);
> -
> - struct sha1_hash_ctx *sha_ctx;
> - int ret = 0;
> - u8 data;
> -
> - /* sanity check */
> - if (rctx->tag.cpu != smp_processor_id()) {
> - pr_err("mcryptd error: cpu clash\n");
> - goto done;
> - }
> -
> - /* need to init context */
> - req_ctx_init(rctx, areq);
> -
> - rctx->flag |= HASH_DONE | HASH_FINAL;
> -
> - sha_ctx = (struct sha1_hash_ctx *) ahash_request_ctx(areq);
> - /* flag HASH_FINAL and 0 data size */
> - sha1_mb_add_list(rctx, cstate);
> - kernel_fpu_begin();
> - sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx, &data, 0,
> - HASH_LAST);
> - kernel_fpu_end();
> -
> - /* check if anything is returned */
> - if (!sha_ctx)
> - return -EINPROGRESS;
> -
> - if (sha_ctx->error) {
> - ret = sha_ctx->error;
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - goto done;
> - }
> -
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&rctx, cstate, false);
> - if (!rctx)
> - return -EINPROGRESS;
> -done:
> - sha_complete_job(rctx, cstate, ret);
> - return ret;
> -}
> -
> -static int sha1_mb_export(struct ahash_request *areq, void *out)
> -{
> - struct sha1_hash_ctx *sctx = ahash_request_ctx(areq);
> -
> - memcpy(out, sctx, sizeof(*sctx));
> -
> - return 0;
> -}
> -
> -static int sha1_mb_import(struct ahash_request *areq, const void *in)
> -{
> - struct sha1_hash_ctx *sctx = ahash_request_ctx(areq);
> -
> - memcpy(sctx, in, sizeof(*sctx));
> -
> - return 0;
> -}
> -
> -static int sha1_mb_async_init_tfm(struct crypto_tfm *tfm)
> -{
> - struct mcryptd_ahash *mcryptd_tfm;
> - struct sha1_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> - struct mcryptd_hash_ctx *mctx;
> -
> - mcryptd_tfm = mcryptd_alloc_ahash("__intel_sha1-mb",
> - CRYPTO_ALG_INTERNAL,
> - CRYPTO_ALG_INTERNAL);
> - if (IS_ERR(mcryptd_tfm))
> - return PTR_ERR(mcryptd_tfm);
> - mctx = crypto_ahash_ctx(&mcryptd_tfm->base);
> - mctx->alg_state = &sha1_mb_alg_state;
> - ctx->mcryptd_tfm = mcryptd_tfm;
> - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> - sizeof(struct ahash_request) +
> - crypto_ahash_reqsize(&mcryptd_tfm->base));
> -
> - return 0;
> -}
> -
> -static void sha1_mb_async_exit_tfm(struct crypto_tfm *tfm)
> -{
> - struct sha1_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> -
> - mcryptd_free_ahash(ctx->mcryptd_tfm);
> -}
> -
> -static int sha1_mb_areq_init_tfm(struct crypto_tfm *tfm)
> -{
> - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> - sizeof(struct ahash_request) +
> - sizeof(struct sha1_hash_ctx));
> -
> - return 0;
> -}
> -
> -static void sha1_mb_areq_exit_tfm(struct crypto_tfm *tfm)
> -{
> - struct sha1_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> -
> - mcryptd_free_ahash(ctx->mcryptd_tfm);
> -}
> -
> -static struct ahash_alg sha1_mb_areq_alg = {
> - .init = sha1_mb_init,
> - .update = sha1_mb_update,
> - .final = sha1_mb_final,
> - .finup = sha1_mb_finup,
> - .export = sha1_mb_export,
> - .import = sha1_mb_import,
> - .halg = {
> - .digestsize = SHA1_DIGEST_SIZE,
> - .statesize = sizeof(struct sha1_hash_ctx),
> - .base = {
> - .cra_name = "__sha1-mb",
> - .cra_driver_name = "__intel_sha1-mb",
> - .cra_priority = 100,
> - /*
> - * use ASYNC flag as some buffers in multi-buffer
> - * algo may not have completed before hashing thread
> - * sleep
> - */
> - .cra_flags = CRYPTO_ALG_ASYNC |
> - CRYPTO_ALG_INTERNAL,
> - .cra_blocksize = SHA1_BLOCK_SIZE,
> - .cra_module = THIS_MODULE,
> - .cra_list = LIST_HEAD_INIT
> - (sha1_mb_areq_alg.halg.base.cra_list),
> - .cra_init = sha1_mb_areq_init_tfm,
> - .cra_exit = sha1_mb_areq_exit_tfm,
> - .cra_ctxsize = sizeof(struct sha1_hash_ctx),
> - }
> - }
> -};
> -
> -static int sha1_mb_async_init(struct ahash_request *req)
> -{
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_init(mcryptd_req);
> -}
> -
> -static int sha1_mb_async_update(struct ahash_request *req)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> -
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_update(mcryptd_req);
> -}
> -
> -static int sha1_mb_async_finup(struct ahash_request *req)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> -
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_finup(mcryptd_req);
> -}
> -
> -static int sha1_mb_async_final(struct ahash_request *req)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> -
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_final(mcryptd_req);
> -}
> -
> -static int sha1_mb_async_digest(struct ahash_request *req)
> -{
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_digest(mcryptd_req);
> -}
> -
> -static int sha1_mb_async_export(struct ahash_request *req, void *out)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_export(mcryptd_req, out);
> -}
> -
> -static int sha1_mb_async_import(struct ahash_request *req, const void *in)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> - struct crypto_ahash *child = mcryptd_ahash_child(mcryptd_tfm);
> - struct mcryptd_hash_request_ctx *rctx;
> - struct ahash_request *areq;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - rctx = ahash_request_ctx(mcryptd_req);
> - areq = &rctx->areq;
> -
> - ahash_request_set_tfm(areq, child);
> - ahash_request_set_callback(areq, CRYPTO_TFM_REQ_MAY_SLEEP,
> - rctx->complete, req);
> -
> - return crypto_ahash_import(mcryptd_req, in);
> -}
> -
> -static struct ahash_alg sha1_mb_async_alg = {
> - .init = sha1_mb_async_init,
> - .update = sha1_mb_async_update,
> - .final = sha1_mb_async_final,
> - .finup = sha1_mb_async_finup,
> - .digest = sha1_mb_async_digest,
> - .export = sha1_mb_async_export,
> - .import = sha1_mb_async_import,
> - .halg = {
> - .digestsize = SHA1_DIGEST_SIZE,
> - .statesize = sizeof(struct sha1_hash_ctx),
> - .base = {
> - .cra_name = "sha1",
> - .cra_driver_name = "sha1_mb",
> - /*
> - * Low priority, since with few concurrent hash requests
> - * this is extremely slow due to the flush delay. Users
> - * whose workloads would benefit from this can request
> - * it explicitly by driver name, or can increase its
> - * priority at runtime using NETLINK_CRYPTO.
> - */
> - .cra_priority = 50,
> - .cra_flags = CRYPTO_ALG_ASYNC,
> - .cra_blocksize = SHA1_BLOCK_SIZE,
> - .cra_module = THIS_MODULE,
> - .cra_list = LIST_HEAD_INIT(sha1_mb_async_alg.halg.base.cra_list),
> - .cra_init = sha1_mb_async_init_tfm,
> - .cra_exit = sha1_mb_async_exit_tfm,
> - .cra_ctxsize = sizeof(struct sha1_mb_ctx),
> - .cra_alignmask = 0,
> - },
> - },
> -};
> -
> -static unsigned long sha1_mb_flusher(struct mcryptd_alg_cstate *cstate)
> -{
> - struct mcryptd_hash_request_ctx *rctx;
> - unsigned long cur_time;
> - unsigned long next_flush = 0;
> - struct sha1_hash_ctx *sha_ctx;
> -
> -
> - cur_time = jiffies;
> -
> - while (!list_empty(&cstate->work_list)) {
> - rctx = list_entry(cstate->work_list.next,
> - struct mcryptd_hash_request_ctx, waiter);
> - if (time_before(cur_time, rctx->tag.expire))
> - break;
> - kernel_fpu_begin();
> - sha_ctx = (struct sha1_hash_ctx *)
> - sha1_ctx_mgr_flush(cstate->mgr);
> - kernel_fpu_end();
> - if (!sha_ctx) {
> - pr_err("sha1_mb error: nothing got flushed for non-empty list\n");
> - break;
> - }
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - sha_finish_walk(&rctx, cstate, true);
> - sha_complete_job(rctx, cstate, 0);
> - }
> -
> - if (!list_empty(&cstate->work_list)) {
> - rctx = list_entry(cstate->work_list.next,
> - struct mcryptd_hash_request_ctx, waiter);
> - /* get the hash context and then flush time */
> - next_flush = rctx->tag.expire;
> - mcryptd_arm_flusher(cstate, get_delay(next_flush));
> - }
> - return next_flush;
> -}
> -
> -static int __init sha1_mb_mod_init(void)
> -{
> -
> - int cpu;
> - int err;
> - struct mcryptd_alg_cstate *cpu_state;
> -
> - /* check for dependent cpu features */
> - if (!boot_cpu_has(X86_FEATURE_AVX2) ||
> - !boot_cpu_has(X86_FEATURE_BMI2))
> - return -ENODEV;
> -
> - /* initialize multibuffer structures */
> - sha1_mb_alg_state.alg_cstate = alloc_percpu(struct mcryptd_alg_cstate);
> -
> - sha1_job_mgr_init = sha1_mb_mgr_init_avx2;
> - sha1_job_mgr_submit = sha1_mb_mgr_submit_avx2;
> - sha1_job_mgr_flush = sha1_mb_mgr_flush_avx2;
> - sha1_job_mgr_get_comp_job = sha1_mb_mgr_get_comp_job_avx2;
> -
> - if (!sha1_mb_alg_state.alg_cstate)
> - return -ENOMEM;
> - for_each_possible_cpu(cpu) {
> - cpu_state = per_cpu_ptr(sha1_mb_alg_state.alg_cstate, cpu);
> - cpu_state->next_flush = 0;
> - cpu_state->next_seq_num = 0;
> - cpu_state->flusher_engaged = false;
> - INIT_DELAYED_WORK(&cpu_state->flush, mcryptd_flusher);
> - cpu_state->cpu = cpu;
> - cpu_state->alg_state = &sha1_mb_alg_state;
> - cpu_state->mgr = kzalloc(sizeof(struct sha1_ctx_mgr),
> - GFP_KERNEL);
> - if (!cpu_state->mgr)
> - goto err2;
> - sha1_ctx_mgr_init(cpu_state->mgr);
> - INIT_LIST_HEAD(&cpu_state->work_list);
> - spin_lock_init(&cpu_state->work_lock);
> - }
> - sha1_mb_alg_state.flusher = &sha1_mb_flusher;
> -
> - err = crypto_register_ahash(&sha1_mb_areq_alg);
> - if (err)
> - goto err2;
> - err = crypto_register_ahash(&sha1_mb_async_alg);
> - if (err)
> - goto err1;
> -
> -
> - return 0;
> -err1:
> - crypto_unregister_ahash(&sha1_mb_areq_alg);
> -err2:
> - for_each_possible_cpu(cpu) {
> - cpu_state = per_cpu_ptr(sha1_mb_alg_state.alg_cstate, cpu);
> - kfree(cpu_state->mgr);
> - }
> - free_percpu(sha1_mb_alg_state.alg_cstate);
> - return -ENODEV;
> -}
> -
> -static void __exit sha1_mb_mod_fini(void)
> -{
> - int cpu;
> - struct mcryptd_alg_cstate *cpu_state;
> -
> - crypto_unregister_ahash(&sha1_mb_async_alg);
> - crypto_unregister_ahash(&sha1_mb_areq_alg);
> - for_each_possible_cpu(cpu) {
> - cpu_state = per_cpu_ptr(sha1_mb_alg_state.alg_cstate, cpu);
> - kfree(cpu_state->mgr);
> - }
> - free_percpu(sha1_mb_alg_state.alg_cstate);
> -}
> -
> -module_init(sha1_mb_mod_init);
> -module_exit(sha1_mb_mod_fini);
> -
> -MODULE_LICENSE("GPL");
> -MODULE_DESCRIPTION("SHA1 Secure Hash Algorithm, multi buffer accelerated");
> -
> -MODULE_ALIAS_CRYPTO("sha1");
> diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_ctx.h b/arch/x86/crypto/sha1-mb/sha1_mb_ctx.h
> deleted file mode 100644
> index 9454bd16f9f8..000000000000
> --- a/arch/x86/crypto/sha1-mb/sha1_mb_ctx.h
> +++ /dev/null
> @@ -1,134 +0,0 @@
> -/*
> - * Header file for multi buffer SHA context
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Tim Chen <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#ifndef _SHA_MB_CTX_INTERNAL_H
> -#define _SHA_MB_CTX_INTERNAL_H
> -
> -#include "sha1_mb_mgr.h"
> -
> -#define HASH_UPDATE 0x00
> -#define HASH_LAST 0x01
> -#define HASH_DONE 0x02
> -#define HASH_FINAL 0x04
> -
> -#define HASH_CTX_STS_IDLE 0x00
> -#define HASH_CTX_STS_PROCESSING 0x01
> -#define HASH_CTX_STS_LAST 0x02
> -#define HASH_CTX_STS_COMPLETE 0x04
> -
> -enum hash_ctx_error {
> - HASH_CTX_ERROR_NONE = 0,
> - HASH_CTX_ERROR_INVALID_FLAGS = -1,
> - HASH_CTX_ERROR_ALREADY_PROCESSING = -2,
> - HASH_CTX_ERROR_ALREADY_COMPLETED = -3,
> -
> -#ifdef HASH_CTX_DEBUG
> - HASH_CTX_ERROR_DEBUG_DIGEST_MISMATCH = -4,
> -#endif
> -};
> -
> -
> -#define hash_ctx_user_data(ctx) ((ctx)->user_data)
> -#define hash_ctx_digest(ctx) ((ctx)->job.result_digest)
> -#define hash_ctx_processing(ctx) ((ctx)->status & HASH_CTX_STS_PROCESSING)
> -#define hash_ctx_complete(ctx) ((ctx)->status == HASH_CTX_STS_COMPLETE)
> -#define hash_ctx_status(ctx) ((ctx)->status)
> -#define hash_ctx_error(ctx) ((ctx)->error)
> -#define hash_ctx_init(ctx) \
> - do { \
> - (ctx)->error = HASH_CTX_ERROR_NONE; \
> - (ctx)->status = HASH_CTX_STS_COMPLETE; \
> - } while (0)
> -
> -
> -/* Hash Constants and Typedefs */
> -#define SHA1_DIGEST_LENGTH 5
> -#define SHA1_LOG2_BLOCK_SIZE 6
> -
> -#define SHA1_PADLENGTHFIELD_SIZE 8
> -
> -#ifdef SHA_MB_DEBUG
> -#define assert(expr) \
> -do { \
> - if (unlikely(!(expr))) { \
> - printk(KERN_ERR "Assertion failed! %s,%s,%s,line=%d\n", \
> - #expr, __FILE__, __func__, __LINE__); \
> - } \
> -} while (0)
> -#else
> -#define assert(expr) do {} while (0)
> -#endif
> -
> -struct sha1_ctx_mgr {
> - struct sha1_mb_mgr mgr;
> -};
> -
> -/* typedef struct sha1_ctx_mgr sha1_ctx_mgr; */
> -
> -struct sha1_hash_ctx {
> - /* Must be at struct offset 0 */
> - struct job_sha1 job;
> - /* status flag */
> - int status;
> - /* error flag */
> - int error;
> -
> - uint64_t total_length;
> - const void *incoming_buffer;
> - uint32_t incoming_buffer_length;
> - uint8_t partial_block_buffer[SHA1_BLOCK_SIZE * 2];
> - uint32_t partial_block_buffer_length;
> - void *user_data;
> -};
> -
> -#endif
> diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr.h b/arch/x86/crypto/sha1-mb/sha1_mb_mgr.h
> deleted file mode 100644
> index 08ad1a9acfd7..000000000000
> --- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr.h
> +++ /dev/null
> @@ -1,110 +0,0 @@
> -/*
> - * Header file for multi buffer SHA1 algorithm manager
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * James Guilford <[email protected]>
> - * Tim Chen <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -#ifndef __SHA_MB_MGR_H
> -#define __SHA_MB_MGR_H
> -
> -
> -#include <linux/types.h>
> -
> -#define NUM_SHA1_DIGEST_WORDS 5
> -
> -enum job_sts { STS_UNKNOWN = 0,
> - STS_BEING_PROCESSED = 1,
> - STS_COMPLETED = 2,
> - STS_INTERNAL_ERROR = 3,
> - STS_ERROR = 4
> -};
> -
> -struct job_sha1 {
> - u8 *buffer;
> - u32 len;
> - u32 result_digest[NUM_SHA1_DIGEST_WORDS] __aligned(32);
> - enum job_sts status;
> - void *user_data;
> -};
> -
> -/* SHA1 out-of-order scheduler */
> -
> -/* typedef uint32_t sha1_digest_array[5][8]; */
> -
> -struct sha1_args_x8 {
> - uint32_t digest[5][8];
> - uint8_t *data_ptr[8];
> -};
> -
> -struct sha1_lane_data {
> - struct job_sha1 *job_in_lane;
> -};
> -
> -struct sha1_mb_mgr {
> - struct sha1_args_x8 args;
> -
> - uint32_t lens[8];
> -
> - /* each byte is index (0...7) of unused lanes */
> - uint64_t unused_lanes;
> - /* byte 4 is set to FF as a flag */
> - struct sha1_lane_data ldata[8];
> -};
> -
> -
> -#define SHA1_MB_MGR_NUM_LANES_AVX2 8
> -
> -void sha1_mb_mgr_init_avx2(struct sha1_mb_mgr *state);
> -struct job_sha1 *sha1_mb_mgr_submit_avx2(struct sha1_mb_mgr *state,
> - struct job_sha1 *job);
> -struct job_sha1 *sha1_mb_mgr_flush_avx2(struct sha1_mb_mgr *state);
> -struct job_sha1 *sha1_mb_mgr_get_comp_job_avx2(struct sha1_mb_mgr *state);
> -
> -#endif
> diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S
> deleted file mode 100644
> index 86688c6e7a25..000000000000
> --- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S
> +++ /dev/null
> @@ -1,287 +0,0 @@
> -/*
> - * Header file for multi buffer SHA1 algorithm data structure
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * James Guilford <[email protected]>
> - * Tim Chen <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -# Macros for defining data structures
> -
> -# Usage example
> -
> -#START_FIELDS # JOB_AES
> -### name size align
> -#FIELD _plaintext, 8, 8 # pointer to plaintext
> -#FIELD _ciphertext, 8, 8 # pointer to ciphertext
> -#FIELD _IV, 16, 8 # IV
> -#FIELD _keys, 8, 8 # pointer to keys
> -#FIELD _len, 4, 4 # length in bytes
> -#FIELD _status, 4, 4 # status enumeration
> -#FIELD _user_data, 8, 8 # pointer to user data
> -#UNION _union, size1, align1, \
> -# size2, align2, \
> -# size3, align3, \
> -# ...
> -#END_FIELDS
> -#%assign _JOB_AES_size _FIELD_OFFSET
> -#%assign _JOB_AES_align _STRUCT_ALIGN
> -
> -#########################################################################
> -
> -# Alternate "struc-like" syntax:
> -# STRUCT job_aes2
> -# RES_Q .plaintext, 1
> -# RES_Q .ciphertext, 1
> -# RES_DQ .IV, 1
> -# RES_B .nested, _JOB_AES_SIZE, _JOB_AES_ALIGN
> -# RES_U .union, size1, align1, \
> -# size2, align2, \
> -# ...
> -# ENDSTRUCT
> -# # Following only needed if nesting
> -# %assign job_aes2_size _FIELD_OFFSET
> -# %assign job_aes2_align _STRUCT_ALIGN
> -#
> -# RES_* macros take a name, a count and an optional alignment.
> -# The count in in terms of the base size of the macro, and the
> -# default alignment is the base size.
> -# The macros are:
> -# Macro Base size
> -# RES_B 1
> -# RES_W 2
> -# RES_D 4
> -# RES_Q 8
> -# RES_DQ 16
> -# RES_Y 32
> -# RES_Z 64
> -#
> -# RES_U defines a union. It's arguments are a name and two or more
> -# pairs of "size, alignment"
> -#
> -# The two assigns are only needed if this structure is being nested
> -# within another. Even if the assigns are not done, one can still use
> -# STRUCT_NAME_size as the size of the structure.
> -#
> -# Note that for nesting, you still need to assign to STRUCT_NAME_size.
> -#
> -# The differences between this and using "struc" directly are that each
> -# type is implicitly aligned to its natural length (although this can be
> -# over-ridden with an explicit third parameter), and that the structure
> -# is padded at the end to its overall alignment.
> -#
> -
> -#########################################################################
> -
> -#ifndef _SHA1_MB_MGR_DATASTRUCT_ASM_
> -#define _SHA1_MB_MGR_DATASTRUCT_ASM_
> -
> -## START_FIELDS
> -.macro START_FIELDS
> - _FIELD_OFFSET = 0
> - _STRUCT_ALIGN = 0
> -.endm
> -
> -## FIELD name size align
> -.macro FIELD name size align
> - _FIELD_OFFSET = (_FIELD_OFFSET + (\align) - 1) & (~ ((\align)-1))
> - \name = _FIELD_OFFSET
> - _FIELD_OFFSET = _FIELD_OFFSET + (\size)
> -.if (\align > _STRUCT_ALIGN)
> - _STRUCT_ALIGN = \align
> -.endif
> -.endm
> -
> -## END_FIELDS
> -.macro END_FIELDS
> - _FIELD_OFFSET = (_FIELD_OFFSET + _STRUCT_ALIGN-1) & (~ (_STRUCT_ALIGN-1))
> -.endm
> -
> -########################################################################
> -
> -.macro STRUCT p1
> -START_FIELDS
> -.struc \p1
> -.endm
> -
> -.macro ENDSTRUCT
> - tmp = _FIELD_OFFSET
> - END_FIELDS
> - tmp = (_FIELD_OFFSET - %%tmp)
> -.if (tmp > 0)
> - .lcomm tmp
> -.endif
> -.endstruc
> -.endm
> -
> -## RES_int name size align
> -.macro RES_int p1 p2 p3
> - name = \p1
> - size = \p2
> - align = .\p3
> -
> - _FIELD_OFFSET = (_FIELD_OFFSET + (align) - 1) & (~ ((align)-1))
> -.align align
> -.lcomm name size
> - _FIELD_OFFSET = _FIELD_OFFSET + (size)
> -.if (align > _STRUCT_ALIGN)
> - _STRUCT_ALIGN = align
> -.endif
> -.endm
> -
> -
> -
> -# macro RES_B name, size [, align]
> -.macro RES_B _name, _size, _align=1
> -RES_int _name _size _align
> -.endm
> -
> -# macro RES_W name, size [, align]
> -.macro RES_W _name, _size, _align=2
> -RES_int _name 2*(_size) _align
> -.endm
> -
> -# macro RES_D name, size [, align]
> -.macro RES_D _name, _size, _align=4
> -RES_int _name 4*(_size) _align
> -.endm
> -
> -# macro RES_Q name, size [, align]
> -.macro RES_Q _name, _size, _align=8
> -RES_int _name 8*(_size) _align
> -.endm
> -
> -# macro RES_DQ name, size [, align]
> -.macro RES_DQ _name, _size, _align=16
> -RES_int _name 16*(_size) _align
> -.endm
> -
> -# macro RES_Y name, size [, align]
> -.macro RES_Y _name, _size, _align=32
> -RES_int _name 32*(_size) _align
> -.endm
> -
> -# macro RES_Z name, size [, align]
> -.macro RES_Z _name, _size, _align=64
> -RES_int _name 64*(_size) _align
> -.endm
> -
> -
> -#endif
> -
> -########################################################################
> -#### Define constants
> -########################################################################
> -
> -########################################################################
> -#### Define SHA1 Out Of Order Data Structures
> -########################################################################
> -
> -START_FIELDS # LANE_DATA
> -### name size align
> -FIELD _job_in_lane, 8, 8 # pointer to job object
> -END_FIELDS
> -
> -_LANE_DATA_size = _FIELD_OFFSET
> -_LANE_DATA_align = _STRUCT_ALIGN
> -
> -########################################################################
> -
> -START_FIELDS # SHA1_ARGS_X8
> -### name size align
> -FIELD _digest, 4*5*8, 16 # transposed digest
> -FIELD _data_ptr, 8*8, 8 # array of pointers to data
> -END_FIELDS
> -
> -_SHA1_ARGS_X4_size = _FIELD_OFFSET
> -_SHA1_ARGS_X4_align = _STRUCT_ALIGN
> -_SHA1_ARGS_X8_size = _FIELD_OFFSET
> -_SHA1_ARGS_X8_align = _STRUCT_ALIGN
> -
> -########################################################################
> -
> -START_FIELDS # MB_MGR
> -### name size align
> -FIELD _args, _SHA1_ARGS_X4_size, _SHA1_ARGS_X4_align
> -FIELD _lens, 4*8, 8
> -FIELD _unused_lanes, 8, 8
> -FIELD _ldata, _LANE_DATA_size*8, _LANE_DATA_align
> -END_FIELDS
> -
> -_MB_MGR_size = _FIELD_OFFSET
> -_MB_MGR_align = _STRUCT_ALIGN
> -
> -_args_digest = _args + _digest
> -_args_data_ptr = _args + _data_ptr
> -
> -
> -########################################################################
> -#### Define constants
> -########################################################################
> -
> -#define STS_UNKNOWN 0
> -#define STS_BEING_PROCESSED 1
> -#define STS_COMPLETED 2
> -
> -########################################################################
> -#### Define JOB_SHA1 structure
> -########################################################################
> -
> -START_FIELDS # JOB_SHA1
> -
> -### name size align
> -FIELD _buffer, 8, 8 # pointer to buffer
> -FIELD _len, 4, 4 # length in bytes
> -FIELD _result_digest, 5*4, 32 # Digest (output)
> -FIELD _status, 4, 4
> -FIELD _user_data, 8, 8
> -END_FIELDS
> -
> -_JOB_SHA1_size = _FIELD_OFFSET
> -_JOB_SHA1_align = _STRUCT_ALIGN
> diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S
> deleted file mode 100644
> index 7cfba738f104..000000000000
> --- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S
> +++ /dev/null
> @@ -1,304 +0,0 @@
> -/*
> - * Flush routine for SHA1 multibuffer
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * James Guilford <[email protected]>
> - * Tim Chen <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -#include <linux/linkage.h>
> -#include <asm/frame.h>
> -#include "sha1_mb_mgr_datastruct.S"
> -
> -
> -.extern sha1_x8_avx2
> -
> -# LINUX register definitions
> -#define arg1 %rdi
> -#define arg2 %rsi
> -
> -# Common definitions
> -#define state arg1
> -#define job arg2
> -#define len2 arg2
> -
> -# idx must be a register not clobbered by sha1_x8_avx2
> -#define idx %r8
> -#define DWORD_idx %r8d
> -
> -#define unused_lanes %rbx
> -#define lane_data %rbx
> -#define tmp2 %rbx
> -#define tmp2_w %ebx
> -
> -#define job_rax %rax
> -#define tmp1 %rax
> -#define size_offset %rax
> -#define tmp %rax
> -#define start_offset %rax
> -
> -#define tmp3 %arg1
> -
> -#define extra_blocks %arg2
> -#define p %arg2
> -
> -.macro LABEL prefix n
> -\prefix\n\():
> -.endm
> -
> -.macro JNE_SKIP i
> -jne skip_\i
> -.endm
> -
> -.altmacro
> -.macro SET_OFFSET _offset
> -offset = \_offset
> -.endm
> -.noaltmacro
> -
> -# JOB* sha1_mb_mgr_flush_avx2(MB_MGR *state)
> -# arg 1 : rcx : state
> -ENTRY(sha1_mb_mgr_flush_avx2)
> - FRAME_BEGIN
> - push %rbx
> -
> - # If bit (32+3) is set, then all lanes are empty
> - mov _unused_lanes(state), unused_lanes
> - bt $32+3, unused_lanes
> - jc return_null
> -
> - # find a lane with a non-null job
> - xor idx, idx
> - offset = (_ldata + 1 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne one(%rip), idx
> - offset = (_ldata + 2 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne two(%rip), idx
> - offset = (_ldata + 3 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne three(%rip), idx
> - offset = (_ldata + 4 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne four(%rip), idx
> - offset = (_ldata + 5 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne five(%rip), idx
> - offset = (_ldata + 6 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne six(%rip), idx
> - offset = (_ldata + 7 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne seven(%rip), idx
> -
> - # copy idx to empty lanes
> -copy_lane_data:
> - offset = (_args + _data_ptr)
> - mov offset(state,idx,8), tmp
> -
> - I = 0
> -.rep 8
> - offset = (_ldata + I * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> -.altmacro
> - JNE_SKIP %I
> - offset = (_args + _data_ptr + 8*I)
> - mov tmp, offset(state)
> - offset = (_lens + 4*I)
> - movl $0xFFFFFFFF, offset(state)
> -LABEL skip_ %I
> - I = (I+1)
> -.noaltmacro
> -.endr
> -
> - # Find min length
> - vmovdqu _lens+0*16(state), %xmm0
> - vmovdqu _lens+1*16(state), %xmm1
> -
> - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min value in low dword
> -
> - vmovd %xmm2, DWORD_idx
> - mov idx, len2
> - and $0xF, idx
> - shr $4, len2
> - jz len_is_0
> -
> - vpand clear_low_nibble(%rip), %xmm2, %xmm2
> - vpshufd $0, %xmm2, %xmm2
> -
> - vpsubd %xmm2, %xmm0, %xmm0
> - vpsubd %xmm2, %xmm1, %xmm1
> -
> - vmovdqu %xmm0, _lens+0*16(state)
> - vmovdqu %xmm1, _lens+1*16(state)
> -
> - # "state" and "args" are the same address, arg1
> - # len is arg2
> - call sha1_x8_avx2
> - # state and idx are intact
> -
> -
> -len_is_0:
> - # process completed job "idx"
> - imul $_LANE_DATA_size, idx, lane_data
> - lea _ldata(state, lane_data), lane_data
> -
> - mov _job_in_lane(lane_data), job_rax
> - movq $0, _job_in_lane(lane_data)
> - movl $STS_COMPLETED, _status(job_rax)
> - mov _unused_lanes(state), unused_lanes
> - shl $4, unused_lanes
> - or idx, unused_lanes
> - mov unused_lanes, _unused_lanes(state)
> -
> - movl $0xFFFFFFFF, _lens(state, idx, 4)
> -
> - vmovd _args_digest(state , idx, 4) , %xmm0
> - vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
> - vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
> - vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
> - movl _args_digest+4*32(state, idx, 4), tmp2_w
> -
> - vmovdqu %xmm0, _result_digest(job_rax)
> - offset = (_result_digest + 1*16)
> - mov tmp2_w, offset(job_rax)
> -
> -return:
> - pop %rbx
> - FRAME_END
> - ret
> -
> -return_null:
> - xor job_rax, job_rax
> - jmp return
> -ENDPROC(sha1_mb_mgr_flush_avx2)
> -
> -
> -#################################################################
> -
> -.align 16
> -ENTRY(sha1_mb_mgr_get_comp_job_avx2)
> - push %rbx
> -
> - ## if bit 32+3 is set, then all lanes are empty
> - mov _unused_lanes(state), unused_lanes
> - bt $(32+3), unused_lanes
> - jc .return_null
> -
> - # Find min length
> - vmovdqu _lens(state), %xmm0
> - vmovdqu _lens+1*16(state), %xmm1
> -
> - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min value in low dword
> -
> - vmovd %xmm2, DWORD_idx
> - test $~0xF, idx
> - jnz .return_null
> -
> - # process completed job "idx"
> - imul $_LANE_DATA_size, idx, lane_data
> - lea _ldata(state, lane_data), lane_data
> -
> - mov _job_in_lane(lane_data), job_rax
> - movq $0, _job_in_lane(lane_data)
> - movl $STS_COMPLETED, _status(job_rax)
> - mov _unused_lanes(state), unused_lanes
> - shl $4, unused_lanes
> - or idx, unused_lanes
> - mov unused_lanes, _unused_lanes(state)
> -
> - movl $0xFFFFFFFF, _lens(state, idx, 4)
> -
> - vmovd _args_digest(state, idx, 4), %xmm0
> - vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
> - vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
> - vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
> - movl _args_digest+4*32(state, idx, 4), tmp2_w
> -
> - vmovdqu %xmm0, _result_digest(job_rax)
> - movl tmp2_w, _result_digest+1*16(job_rax)
> -
> - pop %rbx
> -
> - ret
> -
> -.return_null:
> - xor job_rax, job_rax
> - pop %rbx
> - ret
> -ENDPROC(sha1_mb_mgr_get_comp_job_avx2)
> -
> -.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
> -.align 16
> -clear_low_nibble:
> -.octa 0x000000000000000000000000FFFFFFF0
> -
> -.section .rodata.cst8, "aM", @progbits, 8
> -.align 8
> -one:
> -.quad 1
> -two:
> -.quad 2
> -three:
> -.quad 3
> -four:
> -.quad 4
> -five:
> -.quad 5
> -six:
> -.quad 6
> -seven:
> -.quad 7
> diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c
> deleted file mode 100644
> index d2add0d35f43..000000000000
> --- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c
> +++ /dev/null
> @@ -1,64 +0,0 @@
> -/*
> - * Initialization code for multi buffer SHA1 algorithm for AVX2
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Tim Chen <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#include "sha1_mb_mgr.h"
> -
> -void sha1_mb_mgr_init_avx2(struct sha1_mb_mgr *state)
> -{
> - unsigned int j;
> - state->unused_lanes = 0xF76543210ULL;
> - for (j = 0; j < 8; j++) {
> - state->lens[j] = 0xFFFFFFFF;
> - state->ldata[j].job_in_lane = NULL;
> - }
> -}
> diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S
> deleted file mode 100644
> index 7a93b1c0d69a..000000000000
> --- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S
> +++ /dev/null
> @@ -1,209 +0,0 @@
> -/*
> - * Buffer submit code for multi buffer SHA1 algorithm
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * James Guilford <[email protected]>
> - * Tim Chen <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#include <linux/linkage.h>
> -#include <asm/frame.h>
> -#include "sha1_mb_mgr_datastruct.S"
> -
> -
> -.extern sha1_x8_avx
> -
> -# LINUX register definitions
> -arg1 = %rdi
> -arg2 = %rsi
> -size_offset = %rcx
> -tmp2 = %rcx
> -extra_blocks = %rdx
> -
> -# Common definitions
> -#define state arg1
> -#define job %rsi
> -#define len2 arg2
> -#define p2 arg2
> -
> -# idx must be a register not clobberred by sha1_x8_avx2
> -idx = %r8
> -DWORD_idx = %r8d
> -last_len = %r8
> -
> -p = %r11
> -start_offset = %r11
> -
> -unused_lanes = %rbx
> -BYTE_unused_lanes = %bl
> -
> -job_rax = %rax
> -len = %rax
> -DWORD_len = %eax
> -
> -lane = %r12
> -tmp3 = %r12
> -
> -tmp = %r9
> -DWORD_tmp = %r9d
> -
> -lane_data = %r10
> -
> -# JOB* submit_mb_mgr_submit_avx2(MB_MGR *state, job_sha1 *job)
> -# arg 1 : rcx : state
> -# arg 2 : rdx : job
> -ENTRY(sha1_mb_mgr_submit_avx2)
> - FRAME_BEGIN
> - push %rbx
> - push %r12
> -
> - mov _unused_lanes(state), unused_lanes
> - mov unused_lanes, lane
> - and $0xF, lane
> - shr $4, unused_lanes
> - imul $_LANE_DATA_size, lane, lane_data
> - movl $STS_BEING_PROCESSED, _status(job)
> - lea _ldata(state, lane_data), lane_data
> - mov unused_lanes, _unused_lanes(state)
> - movl _len(job), DWORD_len
> -
> - mov job, _job_in_lane(lane_data)
> - shl $4, len
> - or lane, len
> -
> - movl DWORD_len, _lens(state , lane, 4)
> -
> - # Load digest words from result_digest
> - vmovdqu _result_digest(job), %xmm0
> - mov _result_digest+1*16(job), DWORD_tmp
> - vmovd %xmm0, _args_digest(state, lane, 4)
> - vpextrd $1, %xmm0, _args_digest+1*32(state , lane, 4)
> - vpextrd $2, %xmm0, _args_digest+2*32(state , lane, 4)
> - vpextrd $3, %xmm0, _args_digest+3*32(state , lane, 4)
> - movl DWORD_tmp, _args_digest+4*32(state , lane, 4)
> -
> - mov _buffer(job), p
> - mov p, _args_data_ptr(state, lane, 8)
> -
> - cmp $0xF, unused_lanes
> - jne return_null
> -
> -start_loop:
> - # Find min length
> - vmovdqa _lens(state), %xmm0
> - vmovdqa _lens+1*16(state), %xmm1
> -
> - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min value in low dword
> -
> - vmovd %xmm2, DWORD_idx
> - mov idx, len2
> - and $0xF, idx
> - shr $4, len2
> - jz len_is_0
> -
> - vpand clear_low_nibble(%rip), %xmm2, %xmm2
> - vpshufd $0, %xmm2, %xmm2
> -
> - vpsubd %xmm2, %xmm0, %xmm0
> - vpsubd %xmm2, %xmm1, %xmm1
> -
> - vmovdqa %xmm0, _lens + 0*16(state)
> - vmovdqa %xmm1, _lens + 1*16(state)
> -
> -
> - # "state" and "args" are the same address, arg1
> - # len is arg2
> - call sha1_x8_avx2
> -
> - # state and idx are intact
> -
> -len_is_0:
> - # process completed job "idx"
> - imul $_LANE_DATA_size, idx, lane_data
> - lea _ldata(state, lane_data), lane_data
> -
> - mov _job_in_lane(lane_data), job_rax
> - mov _unused_lanes(state), unused_lanes
> - movq $0, _job_in_lane(lane_data)
> - movl $STS_COMPLETED, _status(job_rax)
> - shl $4, unused_lanes
> - or idx, unused_lanes
> - mov unused_lanes, _unused_lanes(state)
> -
> - movl $0xFFFFFFFF, _lens(state, idx, 4)
> -
> - vmovd _args_digest(state, idx, 4), %xmm0
> - vpinsrd $1, _args_digest+1*32(state , idx, 4), %xmm0, %xmm0
> - vpinsrd $2, _args_digest+2*32(state , idx, 4), %xmm0, %xmm0
> - vpinsrd $3, _args_digest+3*32(state , idx, 4), %xmm0, %xmm0
> - movl _args_digest+4*32(state, idx, 4), DWORD_tmp
> -
> - vmovdqu %xmm0, _result_digest(job_rax)
> - movl DWORD_tmp, _result_digest+1*16(job_rax)
> -
> -return:
> - pop %r12
> - pop %rbx
> - FRAME_END
> - ret
> -
> -return_null:
> - xor job_rax, job_rax
> - jmp return
> -
> -ENDPROC(sha1_mb_mgr_submit_avx2)
> -
> -.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
> -.align 16
> -clear_low_nibble:
> - .octa 0x000000000000000000000000FFFFFFF0
> diff --git a/arch/x86/crypto/sha1-mb/sha1_x8_avx2.S b/arch/x86/crypto/sha1-mb/sha1_x8_avx2.S
> deleted file mode 100644
> index 20f77aa633de..000000000000
> --- a/arch/x86/crypto/sha1-mb/sha1_x8_avx2.S
> +++ /dev/null
> @@ -1,492 +0,0 @@
> -/*
> - * Multi-buffer SHA1 algorithm hash compute routine
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * James Guilford <[email protected]>
> - * Tim Chen <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2014 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#include <linux/linkage.h>
> -#include "sha1_mb_mgr_datastruct.S"
> -
> -## code to compute oct SHA1 using SSE-256
> -## outer calling routine takes care of save and restore of XMM registers
> -
> -## Function clobbers: rax, rcx, rdx, rbx, rsi, rdi, r9-r15# ymm0-15
> -##
> -## Linux clobbers: rax rbx rcx rdx rsi r9 r10 r11 r12 r13 r14 r15
> -## Linux preserves: rdi rbp r8
> -##
> -## clobbers ymm0-15
> -
> -
> -# TRANSPOSE8 r0, r1, r2, r3, r4, r5, r6, r7, t0, t1
> -# "transpose" data in {r0...r7} using temps {t0...t1}
> -# Input looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
> -# r0 = {a7 a6 a5 a4 a3 a2 a1 a0}
> -# r1 = {b7 b6 b5 b4 b3 b2 b1 b0}
> -# r2 = {c7 c6 c5 c4 c3 c2 c1 c0}
> -# r3 = {d7 d6 d5 d4 d3 d2 d1 d0}
> -# r4 = {e7 e6 e5 e4 e3 e2 e1 e0}
> -# r5 = {f7 f6 f5 f4 f3 f2 f1 f0}
> -# r6 = {g7 g6 g5 g4 g3 g2 g1 g0}
> -# r7 = {h7 h6 h5 h4 h3 h2 h1 h0}
> -#
> -# Output looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
> -# r0 = {h0 g0 f0 e0 d0 c0 b0 a0}
> -# r1 = {h1 g1 f1 e1 d1 c1 b1 a1}
> -# r2 = {h2 g2 f2 e2 d2 c2 b2 a2}
> -# r3 = {h3 g3 f3 e3 d3 c3 b3 a3}
> -# r4 = {h4 g4 f4 e4 d4 c4 b4 a4}
> -# r5 = {h5 g5 f5 e5 d5 c5 b5 a5}
> -# r6 = {h6 g6 f6 e6 d6 c6 b6 a6}
> -# r7 = {h7 g7 f7 e7 d7 c7 b7 a7}
> -#
> -
> -.macro TRANSPOSE8 r0 r1 r2 r3 r4 r5 r6 r7 t0 t1
> - # process top half (r0..r3) {a...d}
> - vshufps $0x44, \r1, \r0, \t0 # t0 = {b5 b4 a5 a4 b1 b0 a1 a0}
> - vshufps $0xEE, \r1, \r0, \r0 # r0 = {b7 b6 a7 a6 b3 b2 a3 a2}
> - vshufps $0x44, \r3, \r2, \t1 # t1 = {d5 d4 c5 c4 d1 d0 c1 c0}
> - vshufps $0xEE, \r3, \r2, \r2 # r2 = {d7 d6 c7 c6 d3 d2 c3 c2}
> - vshufps $0xDD, \t1, \t0, \r3 # r3 = {d5 c5 b5 a5 d1 c1 b1 a1}
> - vshufps $0x88, \r2, \r0, \r1 # r1 = {d6 c6 b6 a6 d2 c2 b2 a2}
> - vshufps $0xDD, \r2, \r0, \r0 # r0 = {d7 c7 b7 a7 d3 c3 b3 a3}
> - vshufps $0x88, \t1, \t0, \t0 # t0 = {d4 c4 b4 a4 d0 c0 b0 a0}
> -
> - # use r2 in place of t0
> - # process bottom half (r4..r7) {e...h}
> - vshufps $0x44, \r5, \r4, \r2 # r2 = {f5 f4 e5 e4 f1 f0 e1 e0}
> - vshufps $0xEE, \r5, \r4, \r4 # r4 = {f7 f6 e7 e6 f3 f2 e3 e2}
> - vshufps $0x44, \r7, \r6, \t1 # t1 = {h5 h4 g5 g4 h1 h0 g1 g0}
> - vshufps $0xEE, \r7, \r6, \r6 # r6 = {h7 h6 g7 g6 h3 h2 g3 g2}
> - vshufps $0xDD, \t1, \r2, \r7 # r7 = {h5 g5 f5 e5 h1 g1 f1 e1}
> - vshufps $0x88, \r6, \r4, \r5 # r5 = {h6 g6 f6 e6 h2 g2 f2 e2}
> - vshufps $0xDD, \r6, \r4, \r4 # r4 = {h7 g7 f7 e7 h3 g3 f3 e3}
> - vshufps $0x88, \t1, \r2, \t1 # t1 = {h4 g4 f4 e4 h0 g0 f0 e0}
> -
> - vperm2f128 $0x13, \r1, \r5, \r6 # h6...a6
> - vperm2f128 $0x02, \r1, \r5, \r2 # h2...a2
> - vperm2f128 $0x13, \r3, \r7, \r5 # h5...a5
> - vperm2f128 $0x02, \r3, \r7, \r1 # h1...a1
> - vperm2f128 $0x13, \r0, \r4, \r7 # h7...a7
> - vperm2f128 $0x02, \r0, \r4, \r3 # h3...a3
> - vperm2f128 $0x13, \t0, \t1, \r4 # h4...a4
> - vperm2f128 $0x02, \t0, \t1, \r0 # h0...a0
> -
> -.endm
> -##
> -## Magic functions defined in FIPS 180-1
> -##
> -# macro MAGIC_F0 F,B,C,D,T ## F = (D ^ (B & (C ^ D)))
> -.macro MAGIC_F0 regF regB regC regD regT
> - vpxor \regD, \regC, \regF
> - vpand \regB, \regF, \regF
> - vpxor \regD, \regF, \regF
> -.endm
> -
> -# macro MAGIC_F1 F,B,C,D,T ## F = (B ^ C ^ D)
> -.macro MAGIC_F1 regF regB regC regD regT
> - vpxor \regC, \regD, \regF
> - vpxor \regB, \regF, \regF
> -.endm
> -
> -# macro MAGIC_F2 F,B,C,D,T ## F = ((B & C) | (B & D) | (C & D))
> -.macro MAGIC_F2 regF regB regC regD regT
> - vpor \regC, \regB, \regF
> - vpand \regC, \regB, \regT
> - vpand \regD, \regF, \regF
> - vpor \regT, \regF, \regF
> -.endm
> -
> -# macro MAGIC_F3 F,B,C,D,T ## F = (B ^ C ^ D)
> -.macro MAGIC_F3 regF regB regC regD regT
> - MAGIC_F1 \regF,\regB,\regC,\regD,\regT
> -.endm
> -
> -# PROLD reg, imm, tmp
> -.macro PROLD reg imm tmp
> - vpsrld $(32-\imm), \reg, \tmp
> - vpslld $\imm, \reg, \reg
> - vpor \tmp, \reg, \reg
> -.endm
> -
> -.macro PROLD_nd reg imm tmp src
> - vpsrld $(32-\imm), \src, \tmp
> - vpslld $\imm, \src, \reg
> - vpor \tmp, \reg, \reg
> -.endm
> -
> -.macro SHA1_STEP_00_15 regA regB regC regD regE regT regF memW immCNT MAGIC
> - vpaddd \immCNT, \regE, \regE
> - vpaddd \memW*32(%rsp), \regE, \regE
> - PROLD_nd \regT, 5, \regF, \regA
> - vpaddd \regT, \regE, \regE
> - \MAGIC \regF, \regB, \regC, \regD, \regT
> - PROLD \regB, 30, \regT
> - vpaddd \regF, \regE, \regE
> -.endm
> -
> -.macro SHA1_STEP_16_79 regA regB regC regD regE regT regF memW immCNT MAGIC
> - vpaddd \immCNT, \regE, \regE
> - offset = ((\memW - 14) & 15) * 32
> - vmovdqu offset(%rsp), W14
> - vpxor W14, W16, W16
> - offset = ((\memW - 8) & 15) * 32
> - vpxor offset(%rsp), W16, W16
> - offset = ((\memW - 3) & 15) * 32
> - vpxor offset(%rsp), W16, W16
> - vpsrld $(32-1), W16, \regF
> - vpslld $1, W16, W16
> - vpor W16, \regF, \regF
> -
> - ROTATE_W
> -
> - offset = ((\memW - 0) & 15) * 32
> - vmovdqu \regF, offset(%rsp)
> - vpaddd \regF, \regE, \regE
> - PROLD_nd \regT, 5, \regF, \regA
> - vpaddd \regT, \regE, \regE
> - \MAGIC \regF,\regB,\regC,\regD,\regT ## FUN = MAGIC_Fi(B,C,D)
> - PROLD \regB,30, \regT
> - vpaddd \regF, \regE, \regE
> -.endm
> -
> -########################################################################
> -########################################################################
> -########################################################################
> -
> -## FRAMESZ plus pushes must be an odd multiple of 8
> -YMM_SAVE = (15-15)*32
> -FRAMESZ = 32*16 + YMM_SAVE
> -_YMM = FRAMESZ - YMM_SAVE
> -
> -#define VMOVPS vmovups
> -
> -IDX = %rax
> -inp0 = %r9
> -inp1 = %r10
> -inp2 = %r11
> -inp3 = %r12
> -inp4 = %r13
> -inp5 = %r14
> -inp6 = %r15
> -inp7 = %rcx
> -arg1 = %rdi
> -arg2 = %rsi
> -RSP_SAVE = %rdx
> -
> -# ymm0 A
> -# ymm1 B
> -# ymm2 C
> -# ymm3 D
> -# ymm4 E
> -# ymm5 F AA
> -# ymm6 T0 BB
> -# ymm7 T1 CC
> -# ymm8 T2 DD
> -# ymm9 T3 EE
> -# ymm10 T4 TMP
> -# ymm11 T5 FUN
> -# ymm12 T6 K
> -# ymm13 T7 W14
> -# ymm14 T8 W15
> -# ymm15 T9 W16
> -
> -
> -A = %ymm0
> -B = %ymm1
> -C = %ymm2
> -D = %ymm3
> -E = %ymm4
> -F = %ymm5
> -T0 = %ymm6
> -T1 = %ymm7
> -T2 = %ymm8
> -T3 = %ymm9
> -T4 = %ymm10
> -T5 = %ymm11
> -T6 = %ymm12
> -T7 = %ymm13
> -T8 = %ymm14
> -T9 = %ymm15
> -
> -AA = %ymm5
> -BB = %ymm6
> -CC = %ymm7
> -DD = %ymm8
> -EE = %ymm9
> -TMP = %ymm10
> -FUN = %ymm11
> -K = %ymm12
> -W14 = %ymm13
> -W15 = %ymm14
> -W16 = %ymm15
> -
> -.macro ROTATE_ARGS
> - TMP_ = E
> - E = D
> - D = C
> - C = B
> - B = A
> - A = TMP_
> -.endm
> -
> -.macro ROTATE_W
> -TMP_ = W16
> -W16 = W15
> -W15 = W14
> -W14 = TMP_
> -.endm
> -
> -# 8 streams x 5 32bit words per digest x 4 bytes per word
> -#define DIGEST_SIZE (8*5*4)
> -
> -.align 32
> -
> -# void sha1_x8_avx2(void **input_data, UINT128 *digest, UINT32 size)
> -# arg 1 : pointer to array[4] of pointer to input data
> -# arg 2 : size (in blocks) ;; assumed to be >= 1
> -#
> -ENTRY(sha1_x8_avx2)
> -
> - # save callee-saved clobbered registers to comply with C function ABI
> - push %r12
> - push %r13
> - push %r14
> - push %r15
> -
> - #save rsp
> - mov %rsp, RSP_SAVE
> - sub $FRAMESZ, %rsp
> -
> - #align rsp to 32 Bytes
> - and $~0x1F, %rsp
> -
> - ## Initialize digests
> - vmovdqu 0*32(arg1), A
> - vmovdqu 1*32(arg1), B
> - vmovdqu 2*32(arg1), C
> - vmovdqu 3*32(arg1), D
> - vmovdqu 4*32(arg1), E
> -
> - ## transpose input onto stack
> - mov _data_ptr+0*8(arg1),inp0
> - mov _data_ptr+1*8(arg1),inp1
> - mov _data_ptr+2*8(arg1),inp2
> - mov _data_ptr+3*8(arg1),inp3
> - mov _data_ptr+4*8(arg1),inp4
> - mov _data_ptr+5*8(arg1),inp5
> - mov _data_ptr+6*8(arg1),inp6
> - mov _data_ptr+7*8(arg1),inp7
> -
> - xor IDX, IDX
> -lloop:
> - vmovdqu PSHUFFLE_BYTE_FLIP_MASK(%rip), F
> - I=0
> -.rep 2
> - VMOVPS (inp0, IDX), T0
> - VMOVPS (inp1, IDX), T1
> - VMOVPS (inp2, IDX), T2
> - VMOVPS (inp3, IDX), T3
> - VMOVPS (inp4, IDX), T4
> - VMOVPS (inp5, IDX), T5
> - VMOVPS (inp6, IDX), T6
> - VMOVPS (inp7, IDX), T7
> -
> - TRANSPOSE8 T0, T1, T2, T3, T4, T5, T6, T7, T8, T9
> - vpshufb F, T0, T0
> - vmovdqu T0, (I*8)*32(%rsp)
> - vpshufb F, T1, T1
> - vmovdqu T1, (I*8+1)*32(%rsp)
> - vpshufb F, T2, T2
> - vmovdqu T2, (I*8+2)*32(%rsp)
> - vpshufb F, T3, T3
> - vmovdqu T3, (I*8+3)*32(%rsp)
> - vpshufb F, T4, T4
> - vmovdqu T4, (I*8+4)*32(%rsp)
> - vpshufb F, T5, T5
> - vmovdqu T5, (I*8+5)*32(%rsp)
> - vpshufb F, T6, T6
> - vmovdqu T6, (I*8+6)*32(%rsp)
> - vpshufb F, T7, T7
> - vmovdqu T7, (I*8+7)*32(%rsp)
> - add $32, IDX
> - I = (I+1)
> -.endr
> - # save old digests
> - vmovdqu A,AA
> - vmovdqu B,BB
> - vmovdqu C,CC
> - vmovdqu D,DD
> - vmovdqu E,EE
> -
> -##
> -## perform 0-79 steps
> -##
> - vmovdqu K00_19(%rip), K
> -## do rounds 0...15
> - I = 0
> -.rep 16
> - SHA1_STEP_00_15 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F0
> - ROTATE_ARGS
> - I = (I+1)
> -.endr
> -
> -## do rounds 16...19
> - vmovdqu ((16 - 16) & 15) * 32 (%rsp), W16
> - vmovdqu ((16 - 15) & 15) * 32 (%rsp), W15
> -.rep 4
> - SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F0
> - ROTATE_ARGS
> - I = (I+1)
> -.endr
> -
> -## do rounds 20...39
> - vmovdqu K20_39(%rip), K
> -.rep 20
> - SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F1
> - ROTATE_ARGS
> - I = (I+1)
> -.endr
> -
> -## do rounds 40...59
> - vmovdqu K40_59(%rip), K
> -.rep 20
> - SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F2
> - ROTATE_ARGS
> - I = (I+1)
> -.endr
> -
> -## do rounds 60...79
> - vmovdqu K60_79(%rip), K
> -.rep 20
> - SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F3
> - ROTATE_ARGS
> - I = (I+1)
> -.endr
> -
> - vpaddd AA,A,A
> - vpaddd BB,B,B
> - vpaddd CC,C,C
> - vpaddd DD,D,D
> - vpaddd EE,E,E
> -
> - sub $1, arg2
> - jne lloop
> -
> - # write out digests
> - vmovdqu A, 0*32(arg1)
> - vmovdqu B, 1*32(arg1)
> - vmovdqu C, 2*32(arg1)
> - vmovdqu D, 3*32(arg1)
> - vmovdqu E, 4*32(arg1)
> -
> - # update input pointers
> - add IDX, inp0
> - add IDX, inp1
> - add IDX, inp2
> - add IDX, inp3
> - add IDX, inp4
> - add IDX, inp5
> - add IDX, inp6
> - add IDX, inp7
> - mov inp0, _data_ptr (arg1)
> - mov inp1, _data_ptr + 1*8(arg1)
> - mov inp2, _data_ptr + 2*8(arg1)
> - mov inp3, _data_ptr + 3*8(arg1)
> - mov inp4, _data_ptr + 4*8(arg1)
> - mov inp5, _data_ptr + 5*8(arg1)
> - mov inp6, _data_ptr + 6*8(arg1)
> - mov inp7, _data_ptr + 7*8(arg1)
> -
> - ################
> - ## Postamble
> -
> - mov RSP_SAVE, %rsp
> -
> - # restore callee-saved clobbered registers
> - pop %r15
> - pop %r14
> - pop %r13
> - pop %r12
> -
> - ret
> -ENDPROC(sha1_x8_avx2)
> -
> -
> -.section .rodata.cst32.K00_19, "aM", @progbits, 32
> -.align 32
> -K00_19:
> -.octa 0x5A8279995A8279995A8279995A827999
> -.octa 0x5A8279995A8279995A8279995A827999
> -
> -.section .rodata.cst32.K20_39, "aM", @progbits, 32
> -.align 32
> -K20_39:
> -.octa 0x6ED9EBA16ED9EBA16ED9EBA16ED9EBA1
> -.octa 0x6ED9EBA16ED9EBA16ED9EBA16ED9EBA1
> -
> -.section .rodata.cst32.K40_59, "aM", @progbits, 32
> -.align 32
> -K40_59:
> -.octa 0x8F1BBCDC8F1BBCDC8F1BBCDC8F1BBCDC
> -.octa 0x8F1BBCDC8F1BBCDC8F1BBCDC8F1BBCDC
> -
> -.section .rodata.cst32.K60_79, "aM", @progbits, 32
> -.align 32
> -K60_79:
> -.octa 0xCA62C1D6CA62C1D6CA62C1D6CA62C1D6
> -.octa 0xCA62C1D6CA62C1D6CA62C1D6CA62C1D6
> -
> -.section .rodata.cst32.PSHUFFLE_BYTE_FLIP_MASK, "aM", @progbits, 32
> -.align 32
> -PSHUFFLE_BYTE_FLIP_MASK:
> -.octa 0x0c0d0e0f08090a0b0405060700010203
> -.octa 0x0c0d0e0f08090a0b0405060700010203
> diff --git a/arch/x86/crypto/sha256-mb/Makefile b/arch/x86/crypto/sha256-mb/Makefile
> deleted file mode 100644
> index 53ad6e7db747..000000000000
> --- a/arch/x86/crypto/sha256-mb/Makefile
> +++ /dev/null
> @@ -1,14 +0,0 @@
> -# SPDX-License-Identifier: GPL-2.0
> -#
> -# Arch-specific CryptoAPI modules.
> -#
> -
> -OBJECT_FILES_NON_STANDARD := y
> -
> -avx2_supported := $(call as-instr,vpgatherdd %ymm0$(comma)(%eax$(comma)%ymm1\
> - $(comma)4)$(comma)%ymm2,yes,no)
> -ifeq ($(avx2_supported),yes)
> - obj-$(CONFIG_CRYPTO_SHA256_MB) += sha256-mb.o
> - sha256-mb-y := sha256_mb.o sha256_mb_mgr_flush_avx2.o \
> - sha256_mb_mgr_init_avx2.o sha256_mb_mgr_submit_avx2.o sha256_x8_avx2.o
> -endif
> diff --git a/arch/x86/crypto/sha256-mb/sha256_mb.c b/arch/x86/crypto/sha256-mb/sha256_mb.c
> deleted file mode 100644
> index 97c5fc43e115..000000000000
> --- a/arch/x86/crypto/sha256-mb/sha256_mb.c
> +++ /dev/null
> @@ -1,1013 +0,0 @@
> -/*
> - * Multi buffer SHA256 algorithm Glue Code
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
> -
> -#include <crypto/internal/hash.h>
> -#include <linux/init.h>
> -#include <linux/module.h>
> -#include <linux/mm.h>
> -#include <linux/cryptohash.h>
> -#include <linux/types.h>
> -#include <linux/list.h>
> -#include <crypto/scatterwalk.h>
> -#include <crypto/sha.h>
> -#include <crypto/mcryptd.h>
> -#include <crypto/crypto_wq.h>
> -#include <asm/byteorder.h>
> -#include <linux/hardirq.h>
> -#include <asm/fpu/api.h>
> -#include "sha256_mb_ctx.h"
> -
> -#define FLUSH_INTERVAL 1000 /* in usec */
> -
> -static struct mcryptd_alg_state sha256_mb_alg_state;
> -
> -struct sha256_mb_ctx {
> - struct mcryptd_ahash *mcryptd_tfm;
> -};
> -
> -static inline struct mcryptd_hash_request_ctx
> - *cast_hash_to_mcryptd_ctx(struct sha256_hash_ctx *hash_ctx)
> -{
> - struct ahash_request *areq;
> -
> - areq = container_of((void *) hash_ctx, struct ahash_request, __ctx);
> - return container_of(areq, struct mcryptd_hash_request_ctx, areq);
> -}
> -
> -static inline struct ahash_request
> - *cast_mcryptd_ctx_to_req(struct mcryptd_hash_request_ctx *ctx)
> -{
> - return container_of((void *) ctx, struct ahash_request, __ctx);
> -}
> -
> -static void req_ctx_init(struct mcryptd_hash_request_ctx *rctx,
> - struct ahash_request *areq)
> -{
> - rctx->flag = HASH_UPDATE;
> -}
> -
> -static asmlinkage void (*sha256_job_mgr_init)(struct sha256_mb_mgr *state);
> -static asmlinkage struct job_sha256* (*sha256_job_mgr_submit)
> - (struct sha256_mb_mgr *state, struct job_sha256 *job);
> -static asmlinkage struct job_sha256* (*sha256_job_mgr_flush)
> - (struct sha256_mb_mgr *state);
> -static asmlinkage struct job_sha256* (*sha256_job_mgr_get_comp_job)
> - (struct sha256_mb_mgr *state);
> -
> -inline uint32_t sha256_pad(uint8_t padblock[SHA256_BLOCK_SIZE * 2],
> - uint64_t total_len)
> -{
> - uint32_t i = total_len & (SHA256_BLOCK_SIZE - 1);
> -
> - memset(&padblock[i], 0, SHA256_BLOCK_SIZE);
> - padblock[i] = 0x80;
> -
> - i += ((SHA256_BLOCK_SIZE - 1) &
> - (0 - (total_len + SHA256_PADLENGTHFIELD_SIZE + 1)))
> - + 1 + SHA256_PADLENGTHFIELD_SIZE;
> -
> -#if SHA256_PADLENGTHFIELD_SIZE == 16
> - *((uint64_t *) &padblock[i - 16]) = 0;
> -#endif
> -
> - *((uint64_t *) &padblock[i - 8]) = cpu_to_be64(total_len << 3);
> -
> - /* Number of extra blocks to hash */
> - return i >> SHA256_LOG2_BLOCK_SIZE;
> -}
> -
> -static struct sha256_hash_ctx
> - *sha256_ctx_mgr_resubmit(struct sha256_ctx_mgr *mgr,
> - struct sha256_hash_ctx *ctx)
> -{
> - while (ctx) {
> - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> - /* Clear PROCESSING bit */
> - ctx->status = HASH_CTX_STS_COMPLETE;
> - return ctx;
> - }
> -
> - /*
> - * If the extra blocks are empty, begin hashing what remains
> - * in the user's buffer.
> - */
> - if (ctx->partial_block_buffer_length == 0 &&
> - ctx->incoming_buffer_length) {
> -
> - const void *buffer = ctx->incoming_buffer;
> - uint32_t len = ctx->incoming_buffer_length;
> - uint32_t copy_len;
> -
> - /*
> - * Only entire blocks can be hashed.
> - * Copy remainder to extra blocks buffer.
> - */
> - copy_len = len & (SHA256_BLOCK_SIZE-1);
> -
> - if (copy_len) {
> - len -= copy_len;
> - memcpy(ctx->partial_block_buffer,
> - ((const char *) buffer + len),
> - copy_len);
> - ctx->partial_block_buffer_length = copy_len;
> - }
> -
> - ctx->incoming_buffer_length = 0;
> -
> - /* len should be a multiple of the block size now */
> - assert((len % SHA256_BLOCK_SIZE) == 0);
> -
> - /* Set len to the number of blocks to be hashed */
> - len >>= SHA256_LOG2_BLOCK_SIZE;
> -
> - if (len) {
> -
> - ctx->job.buffer = (uint8_t *) buffer;
> - ctx->job.len = len;
> - ctx = (struct sha256_hash_ctx *)
> - sha256_job_mgr_submit(&mgr->mgr, &ctx->job);
> - continue;
> - }
> - }
> -
> - /*
> - * If the extra blocks are not empty, then we are
> - * either on the last block(s) or we need more
> - * user input before continuing.
> - */
> - if (ctx->status & HASH_CTX_STS_LAST) {
> -
> - uint8_t *buf = ctx->partial_block_buffer;
> - uint32_t n_extra_blocks =
> - sha256_pad(buf, ctx->total_length);
> -
> - ctx->status = (HASH_CTX_STS_PROCESSING |
> - HASH_CTX_STS_COMPLETE);
> - ctx->job.buffer = buf;
> - ctx->job.len = (uint32_t) n_extra_blocks;
> - ctx = (struct sha256_hash_ctx *)
> - sha256_job_mgr_submit(&mgr->mgr, &ctx->job);
> - continue;
> - }
> -
> - ctx->status = HASH_CTX_STS_IDLE;
> - return ctx;
> - }
> -
> - return NULL;
> -}
> -
> -static struct sha256_hash_ctx
> - *sha256_ctx_mgr_get_comp_ctx(struct sha256_ctx_mgr *mgr)
> -{
> - /*
> - * If get_comp_job returns NULL, there are no jobs complete.
> - * If get_comp_job returns a job, verify that it is safe to return to
> - * the user. If it is not ready, resubmit the job to finish processing.
> - * If sha256_ctx_mgr_resubmit returned a job, it is ready to be
> - * returned. Otherwise, all jobs currently being managed by the
> - * hash_ctx_mgr still need processing.
> - */
> - struct sha256_hash_ctx *ctx;
> -
> - ctx = (struct sha256_hash_ctx *) sha256_job_mgr_get_comp_job(&mgr->mgr);
> - return sha256_ctx_mgr_resubmit(mgr, ctx);
> -}
> -
> -static void sha256_ctx_mgr_init(struct sha256_ctx_mgr *mgr)
> -{
> - sha256_job_mgr_init(&mgr->mgr);
> -}
> -
> -static struct sha256_hash_ctx *sha256_ctx_mgr_submit(struct sha256_ctx_mgr *mgr,
> - struct sha256_hash_ctx *ctx,
> - const void *buffer,
> - uint32_t len,
> - int flags)
> -{
> - if (flags & ~(HASH_UPDATE | HASH_LAST)) {
> - /* User should not pass anything other than UPDATE or LAST */
> - ctx->error = HASH_CTX_ERROR_INVALID_FLAGS;
> - return ctx;
> - }
> -
> - if (ctx->status & HASH_CTX_STS_PROCESSING) {
> - /* Cannot submit to a currently processing job. */
> - ctx->error = HASH_CTX_ERROR_ALREADY_PROCESSING;
> - return ctx;
> - }
> -
> - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> - /* Cannot update a finished job. */
> - ctx->error = HASH_CTX_ERROR_ALREADY_COMPLETED;
> - return ctx;
> - }
> -
> - /* If we made it here, there was no error during this call to submit */
> - ctx->error = HASH_CTX_ERROR_NONE;
> -
> - /* Store buffer ptr info from user */
> - ctx->incoming_buffer = buffer;
> - ctx->incoming_buffer_length = len;
> -
> - /*
> - * Store the user's request flags and mark this ctx as currently
> - * being processed.
> - */
> - ctx->status = (flags & HASH_LAST) ?
> - (HASH_CTX_STS_PROCESSING | HASH_CTX_STS_LAST) :
> - HASH_CTX_STS_PROCESSING;
> -
> - /* Advance byte counter */
> - ctx->total_length += len;
> -
> - /*
> - * If there is anything currently buffered in the extra blocks,
> - * append to it until it contains a whole block.
> - * Or if the user's buffer contains less than a whole block,
> - * append as much as possible to the extra block.
> - */
> - if (ctx->partial_block_buffer_length || len < SHA256_BLOCK_SIZE) {
> - /*
> - * Compute how many bytes to copy from user buffer into
> - * extra block
> - */
> - uint32_t copy_len = SHA256_BLOCK_SIZE -
> - ctx->partial_block_buffer_length;
> - if (len < copy_len)
> - copy_len = len;
> -
> - if (copy_len) {
> - /* Copy and update relevant pointers and counters */
> - memcpy(
> - &ctx->partial_block_buffer[ctx->partial_block_buffer_length],
> - buffer, copy_len);
> -
> - ctx->partial_block_buffer_length += copy_len;
> - ctx->incoming_buffer = (const void *)
> - ((const char *)buffer + copy_len);
> - ctx->incoming_buffer_length = len - copy_len;
> - }
> -
> - /* The extra block should never contain more than 1 block */
> - assert(ctx->partial_block_buffer_length <= SHA256_BLOCK_SIZE);
> -
> - /*
> - * If the extra block buffer contains exactly 1 block,
> - * it can be hashed.
> - */
> - if (ctx->partial_block_buffer_length >= SHA256_BLOCK_SIZE) {
> - ctx->partial_block_buffer_length = 0;
> -
> - ctx->job.buffer = ctx->partial_block_buffer;
> - ctx->job.len = 1;
> - ctx = (struct sha256_hash_ctx *)
> - sha256_job_mgr_submit(&mgr->mgr, &ctx->job);
> - }
> - }
> -
> - return sha256_ctx_mgr_resubmit(mgr, ctx);
> -}
> -
> -static struct sha256_hash_ctx *sha256_ctx_mgr_flush(struct sha256_ctx_mgr *mgr)
> -{
> - struct sha256_hash_ctx *ctx;
> -
> - while (1) {
> - ctx = (struct sha256_hash_ctx *)
> - sha256_job_mgr_flush(&mgr->mgr);
> -
> - /* If flush returned 0, there are no more jobs in flight. */
> - if (!ctx)
> - return NULL;
> -
> - /*
> - * If flush returned a job, resubmit the job to finish
> - * processing.
> - */
> - ctx = sha256_ctx_mgr_resubmit(mgr, ctx);
> -
> - /*
> - * If sha256_ctx_mgr_resubmit returned a job, it is ready to
> - * be returned. Otherwise, all jobs currently being managed by
> - * the sha256_ctx_mgr still need processing. Loop.
> - */
> - if (ctx)
> - return ctx;
> - }
> -}
> -
> -static int sha256_mb_init(struct ahash_request *areq)
> -{
> - struct sha256_hash_ctx *sctx = ahash_request_ctx(areq);
> -
> - hash_ctx_init(sctx);
> - sctx->job.result_digest[0] = SHA256_H0;
> - sctx->job.result_digest[1] = SHA256_H1;
> - sctx->job.result_digest[2] = SHA256_H2;
> - sctx->job.result_digest[3] = SHA256_H3;
> - sctx->job.result_digest[4] = SHA256_H4;
> - sctx->job.result_digest[5] = SHA256_H5;
> - sctx->job.result_digest[6] = SHA256_H6;
> - sctx->job.result_digest[7] = SHA256_H7;
> - sctx->total_length = 0;
> - sctx->partial_block_buffer_length = 0;
> - sctx->status = HASH_CTX_STS_IDLE;
> -
> - return 0;
> -}
> -
> -static int sha256_mb_set_results(struct mcryptd_hash_request_ctx *rctx)
> -{
> - int i;
> - struct sha256_hash_ctx *sctx = ahash_request_ctx(&rctx->areq);
> - __be32 *dst = (__be32 *) rctx->out;
> -
> - for (i = 0; i < 8; ++i)
> - dst[i] = cpu_to_be32(sctx->job.result_digest[i]);
> -
> - return 0;
> -}
> -
> -static int sha_finish_walk(struct mcryptd_hash_request_ctx **ret_rctx,
> - struct mcryptd_alg_cstate *cstate, bool flush)
> -{
> - int flag = HASH_UPDATE;
> - int nbytes, err = 0;
> - struct mcryptd_hash_request_ctx *rctx = *ret_rctx;
> - struct sha256_hash_ctx *sha_ctx;
> -
> - /* more work ? */
> - while (!(rctx->flag & HASH_DONE)) {
> - nbytes = crypto_ahash_walk_done(&rctx->walk, 0);
> - if (nbytes < 0) {
> - err = nbytes;
> - goto out;
> - }
> - /* check if the walk is done */
> - if (crypto_ahash_walk_last(&rctx->walk)) {
> - rctx->flag |= HASH_DONE;
> - if (rctx->flag & HASH_FINAL)
> - flag |= HASH_LAST;
> -
> - }
> - sha_ctx = (struct sha256_hash_ctx *)
> - ahash_request_ctx(&rctx->areq);
> - kernel_fpu_begin();
> - sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx,
> - rctx->walk.data, nbytes, flag);
> - if (!sha_ctx) {
> - if (flush)
> - sha_ctx = sha256_ctx_mgr_flush(cstate->mgr);
> - }
> - kernel_fpu_end();
> - if (sha_ctx)
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - else {
> - rctx = NULL;
> - goto out;
> - }
> - }
> -
> - /* copy the results */
> - if (rctx->flag & HASH_FINAL)
> - sha256_mb_set_results(rctx);
> -
> -out:
> - *ret_rctx = rctx;
> - return err;
> -}
> -
> -static int sha_complete_job(struct mcryptd_hash_request_ctx *rctx,
> - struct mcryptd_alg_cstate *cstate,
> - int err)
> -{
> - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> - struct sha256_hash_ctx *sha_ctx;
> - struct mcryptd_hash_request_ctx *req_ctx;
> - int ret;
> -
> - /* remove from work list */
> - spin_lock(&cstate->work_lock);
> - list_del(&rctx->waiter);
> - spin_unlock(&cstate->work_lock);
> -
> - if (irqs_disabled())
> - rctx->complete(&req->base, err);
> - else {
> - local_bh_disable();
> - rctx->complete(&req->base, err);
> - local_bh_enable();
> - }
> -
> - /* check to see if there are other jobs that are done */
> - sha_ctx = sha256_ctx_mgr_get_comp_ctx(cstate->mgr);
> - while (sha_ctx) {
> - req_ctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&req_ctx, cstate, false);
> - if (req_ctx) {
> - spin_lock(&cstate->work_lock);
> - list_del(&req_ctx->waiter);
> - spin_unlock(&cstate->work_lock);
> -
> - req = cast_mcryptd_ctx_to_req(req_ctx);
> - if (irqs_disabled())
> - req_ctx->complete(&req->base, ret);
> - else {
> - local_bh_disable();
> - req_ctx->complete(&req->base, ret);
> - local_bh_enable();
> - }
> - }
> - sha_ctx = sha256_ctx_mgr_get_comp_ctx(cstate->mgr);
> - }
> -
> - return 0;
> -}
> -
> -static void sha256_mb_add_list(struct mcryptd_hash_request_ctx *rctx,
> - struct mcryptd_alg_cstate *cstate)
> -{
> - unsigned long next_flush;
> - unsigned long delay = usecs_to_jiffies(FLUSH_INTERVAL);
> -
> - /* initialize tag */
> - rctx->tag.arrival = jiffies; /* tag the arrival time */
> - rctx->tag.seq_num = cstate->next_seq_num++;
> - next_flush = rctx->tag.arrival + delay;
> - rctx->tag.expire = next_flush;
> -
> - spin_lock(&cstate->work_lock);
> - list_add_tail(&rctx->waiter, &cstate->work_list);
> - spin_unlock(&cstate->work_lock);
> -
> - mcryptd_arm_flusher(cstate, delay);
> -}
> -
> -static int sha256_mb_update(struct ahash_request *areq)
> -{
> - struct mcryptd_hash_request_ctx *rctx =
> - container_of(areq, struct mcryptd_hash_request_ctx, areq);
> - struct mcryptd_alg_cstate *cstate =
> - this_cpu_ptr(sha256_mb_alg_state.alg_cstate);
> -
> - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> - struct sha256_hash_ctx *sha_ctx;
> - int ret = 0, nbytes;
> -
> - /* sanity check */
> - if (rctx->tag.cpu != smp_processor_id()) {
> - pr_err("mcryptd error: cpu clash\n");
> - goto done;
> - }
> -
> - /* need to init context */
> - req_ctx_init(rctx, areq);
> -
> - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> -
> - if (nbytes < 0) {
> - ret = nbytes;
> - goto done;
> - }
> -
> - if (crypto_ahash_walk_last(&rctx->walk))
> - rctx->flag |= HASH_DONE;
> -
> - /* submit */
> - sha_ctx = (struct sha256_hash_ctx *) ahash_request_ctx(areq);
> - sha256_mb_add_list(rctx, cstate);
> - kernel_fpu_begin();
> - sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
> - nbytes, HASH_UPDATE);
> - kernel_fpu_end();
> -
> - /* check if anything is returned */
> - if (!sha_ctx)
> - return -EINPROGRESS;
> -
> - if (sha_ctx->error) {
> - ret = sha_ctx->error;
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - goto done;
> - }
> -
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&rctx, cstate, false);
> -
> - if (!rctx)
> - return -EINPROGRESS;
> -done:
> - sha_complete_job(rctx, cstate, ret);
> - return ret;
> -}
> -
> -static int sha256_mb_finup(struct ahash_request *areq)
> -{
> - struct mcryptd_hash_request_ctx *rctx =
> - container_of(areq, struct mcryptd_hash_request_ctx, areq);
> - struct mcryptd_alg_cstate *cstate =
> - this_cpu_ptr(sha256_mb_alg_state.alg_cstate);
> -
> - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> - struct sha256_hash_ctx *sha_ctx;
> - int ret = 0, flag = HASH_UPDATE, nbytes;
> -
> - /* sanity check */
> - if (rctx->tag.cpu != smp_processor_id()) {
> - pr_err("mcryptd error: cpu clash\n");
> - goto done;
> - }
> -
> - /* need to init context */
> - req_ctx_init(rctx, areq);
> -
> - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> -
> - if (nbytes < 0) {
> - ret = nbytes;
> - goto done;
> - }
> -
> - if (crypto_ahash_walk_last(&rctx->walk)) {
> - rctx->flag |= HASH_DONE;
> - flag = HASH_LAST;
> - }
> -
> - /* submit */
> - rctx->flag |= HASH_FINAL;
> - sha_ctx = (struct sha256_hash_ctx *) ahash_request_ctx(areq);
> - sha256_mb_add_list(rctx, cstate);
> -
> - kernel_fpu_begin();
> - sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
> - nbytes, flag);
> - kernel_fpu_end();
> -
> - /* check if anything is returned */
> - if (!sha_ctx)
> - return -EINPROGRESS;
> -
> - if (sha_ctx->error) {
> - ret = sha_ctx->error;
> - goto done;
> - }
> -
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&rctx, cstate, false);
> - if (!rctx)
> - return -EINPROGRESS;
> -done:
> - sha_complete_job(rctx, cstate, ret);
> - return ret;
> -}
> -
> -static int sha256_mb_final(struct ahash_request *areq)
> -{
> - struct mcryptd_hash_request_ctx *rctx =
> - container_of(areq, struct mcryptd_hash_request_ctx,
> - areq);
> - struct mcryptd_alg_cstate *cstate =
> - this_cpu_ptr(sha256_mb_alg_state.alg_cstate);
> -
> - struct sha256_hash_ctx *sha_ctx;
> - int ret = 0;
> - u8 data;
> -
> - /* sanity check */
> - if (rctx->tag.cpu != smp_processor_id()) {
> - pr_err("mcryptd error: cpu clash\n");
> - goto done;
> - }
> -
> - /* need to init context */
> - req_ctx_init(rctx, areq);
> -
> - rctx->flag |= HASH_DONE | HASH_FINAL;
> -
> - sha_ctx = (struct sha256_hash_ctx *) ahash_request_ctx(areq);
> - /* flag HASH_FINAL and 0 data size */
> - sha256_mb_add_list(rctx, cstate);
> - kernel_fpu_begin();
> - sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx, &data, 0,
> - HASH_LAST);
> - kernel_fpu_end();
> -
> - /* check if anything is returned */
> - if (!sha_ctx)
> - return -EINPROGRESS;
> -
> - if (sha_ctx->error) {
> - ret = sha_ctx->error;
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - goto done;
> - }
> -
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&rctx, cstate, false);
> - if (!rctx)
> - return -EINPROGRESS;
> -done:
> - sha_complete_job(rctx, cstate, ret);
> - return ret;
> -}
> -
> -static int sha256_mb_export(struct ahash_request *areq, void *out)
> -{
> - struct sha256_hash_ctx *sctx = ahash_request_ctx(areq);
> -
> - memcpy(out, sctx, sizeof(*sctx));
> -
> - return 0;
> -}
> -
> -static int sha256_mb_import(struct ahash_request *areq, const void *in)
> -{
> - struct sha256_hash_ctx *sctx = ahash_request_ctx(areq);
> -
> - memcpy(sctx, in, sizeof(*sctx));
> -
> - return 0;
> -}
> -
> -static int sha256_mb_async_init_tfm(struct crypto_tfm *tfm)
> -{
> - struct mcryptd_ahash *mcryptd_tfm;
> - struct sha256_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> - struct mcryptd_hash_ctx *mctx;
> -
> - mcryptd_tfm = mcryptd_alloc_ahash("__intel_sha256-mb",
> - CRYPTO_ALG_INTERNAL,
> - CRYPTO_ALG_INTERNAL);
> - if (IS_ERR(mcryptd_tfm))
> - return PTR_ERR(mcryptd_tfm);
> - mctx = crypto_ahash_ctx(&mcryptd_tfm->base);
> - mctx->alg_state = &sha256_mb_alg_state;
> - ctx->mcryptd_tfm = mcryptd_tfm;
> - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> - sizeof(struct ahash_request) +
> - crypto_ahash_reqsize(&mcryptd_tfm->base));
> -
> - return 0;
> -}
> -
> -static void sha256_mb_async_exit_tfm(struct crypto_tfm *tfm)
> -{
> - struct sha256_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> -
> - mcryptd_free_ahash(ctx->mcryptd_tfm);
> -}
> -
> -static int sha256_mb_areq_init_tfm(struct crypto_tfm *tfm)
> -{
> - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> - sizeof(struct ahash_request) +
> - sizeof(struct sha256_hash_ctx));
> -
> - return 0;
> -}
> -
> -static void sha256_mb_areq_exit_tfm(struct crypto_tfm *tfm)
> -{
> - struct sha256_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> -
> - mcryptd_free_ahash(ctx->mcryptd_tfm);
> -}
> -
> -static struct ahash_alg sha256_mb_areq_alg = {
> - .init = sha256_mb_init,
> - .update = sha256_mb_update,
> - .final = sha256_mb_final,
> - .finup = sha256_mb_finup,
> - .export = sha256_mb_export,
> - .import = sha256_mb_import,
> - .halg = {
> - .digestsize = SHA256_DIGEST_SIZE,
> - .statesize = sizeof(struct sha256_hash_ctx),
> - .base = {
> - .cra_name = "__sha256-mb",
> - .cra_driver_name = "__intel_sha256-mb",
> - .cra_priority = 100,
> - /*
> - * use ASYNC flag as some buffers in multi-buffer
> - * algo may not have completed before hashing thread
> - * sleep
> - */
> - .cra_flags = CRYPTO_ALG_ASYNC |
> - CRYPTO_ALG_INTERNAL,
> - .cra_blocksize = SHA256_BLOCK_SIZE,
> - .cra_module = THIS_MODULE,
> - .cra_list = LIST_HEAD_INIT
> - (sha256_mb_areq_alg.halg.base.cra_list),
> - .cra_init = sha256_mb_areq_init_tfm,
> - .cra_exit = sha256_mb_areq_exit_tfm,
> - .cra_ctxsize = sizeof(struct sha256_hash_ctx),
> - }
> - }
> -};
> -
> -static int sha256_mb_async_init(struct ahash_request *req)
> -{
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_init(mcryptd_req);
> -}
> -
> -static int sha256_mb_async_update(struct ahash_request *req)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> -
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_update(mcryptd_req);
> -}
> -
> -static int sha256_mb_async_finup(struct ahash_request *req)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> -
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_finup(mcryptd_req);
> -}
> -
> -static int sha256_mb_async_final(struct ahash_request *req)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> -
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_final(mcryptd_req);
> -}
> -
> -static int sha256_mb_async_digest(struct ahash_request *req)
> -{
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_digest(mcryptd_req);
> -}
> -
> -static int sha256_mb_async_export(struct ahash_request *req, void *out)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_export(mcryptd_req, out);
> -}
> -
> -static int sha256_mb_async_import(struct ahash_request *req, const void *in)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> - struct crypto_ahash *child = mcryptd_ahash_child(mcryptd_tfm);
> - struct mcryptd_hash_request_ctx *rctx;
> - struct ahash_request *areq;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - rctx = ahash_request_ctx(mcryptd_req);
> - areq = &rctx->areq;
> -
> - ahash_request_set_tfm(areq, child);
> - ahash_request_set_callback(areq, CRYPTO_TFM_REQ_MAY_SLEEP,
> - rctx->complete, req);
> -
> - return crypto_ahash_import(mcryptd_req, in);
> -}
> -
> -static struct ahash_alg sha256_mb_async_alg = {
> - .init = sha256_mb_async_init,
> - .update = sha256_mb_async_update,
> - .final = sha256_mb_async_final,
> - .finup = sha256_mb_async_finup,
> - .export = sha256_mb_async_export,
> - .import = sha256_mb_async_import,
> - .digest = sha256_mb_async_digest,
> - .halg = {
> - .digestsize = SHA256_DIGEST_SIZE,
> - .statesize = sizeof(struct sha256_hash_ctx),
> - .base = {
> - .cra_name = "sha256",
> - .cra_driver_name = "sha256_mb",
> - /*
> - * Low priority, since with few concurrent hash requests
> - * this is extremely slow due to the flush delay. Users
> - * whose workloads would benefit from this can request
> - * it explicitly by driver name, or can increase its
> - * priority at runtime using NETLINK_CRYPTO.
> - */
> - .cra_priority = 50,
> - .cra_flags = CRYPTO_ALG_ASYNC,
> - .cra_blocksize = SHA256_BLOCK_SIZE,
> - .cra_module = THIS_MODULE,
> - .cra_list = LIST_HEAD_INIT
> - (sha256_mb_async_alg.halg.base.cra_list),
> - .cra_init = sha256_mb_async_init_tfm,
> - .cra_exit = sha256_mb_async_exit_tfm,
> - .cra_ctxsize = sizeof(struct sha256_mb_ctx),
> - .cra_alignmask = 0,
> - },
> - },
> -};
> -
> -static unsigned long sha256_mb_flusher(struct mcryptd_alg_cstate *cstate)
> -{
> - struct mcryptd_hash_request_ctx *rctx;
> - unsigned long cur_time;
> - unsigned long next_flush = 0;
> - struct sha256_hash_ctx *sha_ctx;
> -
> -
> - cur_time = jiffies;
> -
> - while (!list_empty(&cstate->work_list)) {
> - rctx = list_entry(cstate->work_list.next,
> - struct mcryptd_hash_request_ctx, waiter);
> - if (time_before(cur_time, rctx->tag.expire))
> - break;
> - kernel_fpu_begin();
> - sha_ctx = (struct sha256_hash_ctx *)
> - sha256_ctx_mgr_flush(cstate->mgr);
> - kernel_fpu_end();
> - if (!sha_ctx) {
> - pr_err("sha256_mb error: nothing got"
> - " flushed for non-empty list\n");
> - break;
> - }
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - sha_finish_walk(&rctx, cstate, true);
> - sha_complete_job(rctx, cstate, 0);
> - }
> -
> - if (!list_empty(&cstate->work_list)) {
> - rctx = list_entry(cstate->work_list.next,
> - struct mcryptd_hash_request_ctx, waiter);
> - /* get the hash context and then flush time */
> - next_flush = rctx->tag.expire;
> - mcryptd_arm_flusher(cstate, get_delay(next_flush));
> - }
> - return next_flush;
> -}
> -
> -static int __init sha256_mb_mod_init(void)
> -{
> -
> - int cpu;
> - int err;
> - struct mcryptd_alg_cstate *cpu_state;
> -
> - /* check for dependent cpu features */
> - if (!boot_cpu_has(X86_FEATURE_AVX2) ||
> - !boot_cpu_has(X86_FEATURE_BMI2))
> - return -ENODEV;
> -
> - /* initialize multibuffer structures */
> - sha256_mb_alg_state.alg_cstate = alloc_percpu
> - (struct mcryptd_alg_cstate);
> -
> - sha256_job_mgr_init = sha256_mb_mgr_init_avx2;
> - sha256_job_mgr_submit = sha256_mb_mgr_submit_avx2;
> - sha256_job_mgr_flush = sha256_mb_mgr_flush_avx2;
> - sha256_job_mgr_get_comp_job = sha256_mb_mgr_get_comp_job_avx2;
> -
> - if (!sha256_mb_alg_state.alg_cstate)
> - return -ENOMEM;
> - for_each_possible_cpu(cpu) {
> - cpu_state = per_cpu_ptr(sha256_mb_alg_state.alg_cstate, cpu);
> - cpu_state->next_flush = 0;
> - cpu_state->next_seq_num = 0;
> - cpu_state->flusher_engaged = false;
> - INIT_DELAYED_WORK(&cpu_state->flush, mcryptd_flusher);
> - cpu_state->cpu = cpu;
> - cpu_state->alg_state = &sha256_mb_alg_state;
> - cpu_state->mgr = kzalloc(sizeof(struct sha256_ctx_mgr),
> - GFP_KERNEL);
> - if (!cpu_state->mgr)
> - goto err2;
> - sha256_ctx_mgr_init(cpu_state->mgr);
> - INIT_LIST_HEAD(&cpu_state->work_list);
> - spin_lock_init(&cpu_state->work_lock);
> - }
> - sha256_mb_alg_state.flusher = &sha256_mb_flusher;
> -
> - err = crypto_register_ahash(&sha256_mb_areq_alg);
> - if (err)
> - goto err2;
> - err = crypto_register_ahash(&sha256_mb_async_alg);
> - if (err)
> - goto err1;
> -
> -
> - return 0;
> -err1:
> - crypto_unregister_ahash(&sha256_mb_areq_alg);
> -err2:
> - for_each_possible_cpu(cpu) {
> - cpu_state = per_cpu_ptr(sha256_mb_alg_state.alg_cstate, cpu);
> - kfree(cpu_state->mgr);
> - }
> - free_percpu(sha256_mb_alg_state.alg_cstate);
> - return -ENODEV;
> -}
> -
> -static void __exit sha256_mb_mod_fini(void)
> -{
> - int cpu;
> - struct mcryptd_alg_cstate *cpu_state;
> -
> - crypto_unregister_ahash(&sha256_mb_async_alg);
> - crypto_unregister_ahash(&sha256_mb_areq_alg);
> - for_each_possible_cpu(cpu) {
> - cpu_state = per_cpu_ptr(sha256_mb_alg_state.alg_cstate, cpu);
> - kfree(cpu_state->mgr);
> - }
> - free_percpu(sha256_mb_alg_state.alg_cstate);
> -}
> -
> -module_init(sha256_mb_mod_init);
> -module_exit(sha256_mb_mod_fini);
> -
> -MODULE_LICENSE("GPL");
> -MODULE_DESCRIPTION("SHA256 Secure Hash Algorithm, multi buffer accelerated");
> -
> -MODULE_ALIAS_CRYPTO("sha256");
> diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_ctx.h b/arch/x86/crypto/sha256-mb/sha256_mb_ctx.h
> deleted file mode 100644
> index 7c432543dc7f..000000000000
> --- a/arch/x86/crypto/sha256-mb/sha256_mb_ctx.h
> +++ /dev/null
> @@ -1,134 +0,0 @@
> -/*
> - * Header file for multi buffer SHA256 context
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#ifndef _SHA_MB_CTX_INTERNAL_H
> -#define _SHA_MB_CTX_INTERNAL_H
> -
> -#include "sha256_mb_mgr.h"
> -
> -#define HASH_UPDATE 0x00
> -#define HASH_LAST 0x01
> -#define HASH_DONE 0x02
> -#define HASH_FINAL 0x04
> -
> -#define HASH_CTX_STS_IDLE 0x00
> -#define HASH_CTX_STS_PROCESSING 0x01
> -#define HASH_CTX_STS_LAST 0x02
> -#define HASH_CTX_STS_COMPLETE 0x04
> -
> -enum hash_ctx_error {
> - HASH_CTX_ERROR_NONE = 0,
> - HASH_CTX_ERROR_INVALID_FLAGS = -1,
> - HASH_CTX_ERROR_ALREADY_PROCESSING = -2,
> - HASH_CTX_ERROR_ALREADY_COMPLETED = -3,
> -
> -#ifdef HASH_CTX_DEBUG
> - HASH_CTX_ERROR_DEBUG_DIGEST_MISMATCH = -4,
> -#endif
> -};
> -
> -
> -#define hash_ctx_user_data(ctx) ((ctx)->user_data)
> -#define hash_ctx_digest(ctx) ((ctx)->job.result_digest)
> -#define hash_ctx_processing(ctx) ((ctx)->status & HASH_CTX_STS_PROCESSING)
> -#define hash_ctx_complete(ctx) ((ctx)->status == HASH_CTX_STS_COMPLETE)
> -#define hash_ctx_status(ctx) ((ctx)->status)
> -#define hash_ctx_error(ctx) ((ctx)->error)
> -#define hash_ctx_init(ctx) \
> - do { \
> - (ctx)->error = HASH_CTX_ERROR_NONE; \
> - (ctx)->status = HASH_CTX_STS_COMPLETE; \
> - } while (0)
> -
> -
> -/* Hash Constants and Typedefs */
> -#define SHA256_DIGEST_LENGTH 8
> -#define SHA256_LOG2_BLOCK_SIZE 6
> -
> -#define SHA256_PADLENGTHFIELD_SIZE 8
> -
> -#ifdef SHA_MB_DEBUG
> -#define assert(expr) \
> -do { \
> - if (unlikely(!(expr))) { \
> - printk(KERN_ERR "Assertion failed! %s,%s,%s,line=%d\n", \
> - #expr, __FILE__, __func__, __LINE__); \
> - } \
> -} while (0)
> -#else
> -#define assert(expr) do {} while (0)
> -#endif
> -
> -struct sha256_ctx_mgr {
> - struct sha256_mb_mgr mgr;
> -};
> -
> -/* typedef struct sha256_ctx_mgr sha256_ctx_mgr; */
> -
> -struct sha256_hash_ctx {
> - /* Must be at struct offset 0 */
> - struct job_sha256 job;
> - /* status flag */
> - int status;
> - /* error flag */
> - int error;
> -
> - uint64_t total_length;
> - const void *incoming_buffer;
> - uint32_t incoming_buffer_length;
> - uint8_t partial_block_buffer[SHA256_BLOCK_SIZE * 2];
> - uint32_t partial_block_buffer_length;
> - void *user_data;
> -};
> -
> -#endif
> diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr.h b/arch/x86/crypto/sha256-mb/sha256_mb_mgr.h
> deleted file mode 100644
> index b01ae408c56d..000000000000
> --- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr.h
> +++ /dev/null
> @@ -1,108 +0,0 @@
> -/*
> - * Header file for multi buffer SHA256 algorithm manager
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -#ifndef __SHA_MB_MGR_H
> -#define __SHA_MB_MGR_H
> -
> -#include <linux/types.h>
> -
> -#define NUM_SHA256_DIGEST_WORDS 8
> -
> -enum job_sts { STS_UNKNOWN = 0,
> - STS_BEING_PROCESSED = 1,
> - STS_COMPLETED = 2,
> - STS_INTERNAL_ERROR = 3,
> - STS_ERROR = 4
> -};
> -
> -struct job_sha256 {
> - u8 *buffer;
> - u32 len;
> - u32 result_digest[NUM_SHA256_DIGEST_WORDS] __aligned(32);
> - enum job_sts status;
> - void *user_data;
> -};
> -
> -/* SHA256 out-of-order scheduler */
> -
> -/* typedef uint32_t sha8_digest_array[8][8]; */
> -
> -struct sha256_args_x8 {
> - uint32_t digest[8][8];
> - uint8_t *data_ptr[8];
> -};
> -
> -struct sha256_lane_data {
> - struct job_sha256 *job_in_lane;
> -};
> -
> -struct sha256_mb_mgr {
> - struct sha256_args_x8 args;
> -
> - uint32_t lens[8];
> -
> - /* each byte is index (0...7) of unused lanes */
> - uint64_t unused_lanes;
> - /* byte 4 is set to FF as a flag */
> - struct sha256_lane_data ldata[8];
> -};
> -
> -
> -#define SHA256_MB_MGR_NUM_LANES_AVX2 8
> -
> -void sha256_mb_mgr_init_avx2(struct sha256_mb_mgr *state);
> -struct job_sha256 *sha256_mb_mgr_submit_avx2(struct sha256_mb_mgr *state,
> - struct job_sha256 *job);
> -struct job_sha256 *sha256_mb_mgr_flush_avx2(struct sha256_mb_mgr *state);
> -struct job_sha256 *sha256_mb_mgr_get_comp_job_avx2(struct sha256_mb_mgr *state);
> -
> -#endif
> diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S
> deleted file mode 100644
> index 5c377bac21d0..000000000000
> --- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S
> +++ /dev/null
> @@ -1,304 +0,0 @@
> -/*
> - * Header file for multi buffer SHA256 algorithm data structure
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -# Macros for defining data structures
> -
> -# Usage example
> -
> -#START_FIELDS # JOB_AES
> -### name size align
> -#FIELD _plaintext, 8, 8 # pointer to plaintext
> -#FIELD _ciphertext, 8, 8 # pointer to ciphertext
> -#FIELD _IV, 16, 8 # IV
> -#FIELD _keys, 8, 8 # pointer to keys
> -#FIELD _len, 4, 4 # length in bytes
> -#FIELD _status, 4, 4 # status enumeration
> -#FIELD _user_data, 8, 8 # pointer to user data
> -#UNION _union, size1, align1, \
> -# size2, align2, \
> -# size3, align3, \
> -# ...
> -#END_FIELDS
> -#%assign _JOB_AES_size _FIELD_OFFSET
> -#%assign _JOB_AES_align _STRUCT_ALIGN
> -
> -#########################################################################
> -
> -# Alternate "struc-like" syntax:
> -# STRUCT job_aes2
> -# RES_Q .plaintext, 1
> -# RES_Q .ciphertext, 1
> -# RES_DQ .IV, 1
> -# RES_B .nested, _JOB_AES_SIZE, _JOB_AES_ALIGN
> -# RES_U .union, size1, align1, \
> -# size2, align2, \
> -# ...
> -# ENDSTRUCT
> -# # Following only needed if nesting
> -# %assign job_aes2_size _FIELD_OFFSET
> -# %assign job_aes2_align _STRUCT_ALIGN
> -#
> -# RES_* macros take a name, a count and an optional alignment.
> -# The count in in terms of the base size of the macro, and the
> -# default alignment is the base size.
> -# The macros are:
> -# Macro Base size
> -# RES_B 1
> -# RES_W 2
> -# RES_D 4
> -# RES_Q 8
> -# RES_DQ 16
> -# RES_Y 32
> -# RES_Z 64
> -#
> -# RES_U defines a union. It's arguments are a name and two or more
> -# pairs of "size, alignment"
> -#
> -# The two assigns are only needed if this structure is being nested
> -# within another. Even if the assigns are not done, one can still use
> -# STRUCT_NAME_size as the size of the structure.
> -#
> -# Note that for nesting, you still need to assign to STRUCT_NAME_size.
> -#
> -# The differences between this and using "struc" directly are that each
> -# type is implicitly aligned to its natural length (although this can be
> -# over-ridden with an explicit third parameter), and that the structure
> -# is padded at the end to its overall alignment.
> -#
> -
> -#########################################################################
> -
> -#ifndef _DATASTRUCT_ASM_
> -#define _DATASTRUCT_ASM_
> -
> -#define SZ8 8*SHA256_DIGEST_WORD_SIZE
> -#define ROUNDS 64*SZ8
> -#define PTR_SZ 8
> -#define SHA256_DIGEST_WORD_SIZE 4
> -#define MAX_SHA256_LANES 8
> -#define SHA256_DIGEST_WORDS 8
> -#define SHA256_DIGEST_ROW_SIZE (MAX_SHA256_LANES * SHA256_DIGEST_WORD_SIZE)
> -#define SHA256_DIGEST_SIZE (SHA256_DIGEST_ROW_SIZE * SHA256_DIGEST_WORDS)
> -#define SHA256_BLK_SZ 64
> -
> -# START_FIELDS
> -.macro START_FIELDS
> - _FIELD_OFFSET = 0
> - _STRUCT_ALIGN = 0
> -.endm
> -
> -# FIELD name size align
> -.macro FIELD name size align
> - _FIELD_OFFSET = (_FIELD_OFFSET + (\align) - 1) & (~ ((\align)-1))
> - \name = _FIELD_OFFSET
> - _FIELD_OFFSET = _FIELD_OFFSET + (\size)
> -.if (\align > _STRUCT_ALIGN)
> - _STRUCT_ALIGN = \align
> -.endif
> -.endm
> -
> -# END_FIELDS
> -.macro END_FIELDS
> - _FIELD_OFFSET = (_FIELD_OFFSET + _STRUCT_ALIGN-1) & (~ (_STRUCT_ALIGN-1))
> -.endm
> -
> -########################################################################
> -
> -.macro STRUCT p1
> -START_FIELDS
> -.struc \p1
> -.endm
> -
> -.macro ENDSTRUCT
> - tmp = _FIELD_OFFSET
> - END_FIELDS
> - tmp = (_FIELD_OFFSET - %%tmp)
> -.if (tmp > 0)
> - .lcomm tmp
> -.endif
> -.endstruc
> -.endm
> -
> -## RES_int name size align
> -.macro RES_int p1 p2 p3
> - name = \p1
> - size = \p2
> - align = .\p3
> -
> - _FIELD_OFFSET = (_FIELD_OFFSET + (align) - 1) & (~ ((align)-1))
> -.align align
> -.lcomm name size
> - _FIELD_OFFSET = _FIELD_OFFSET + (size)
> -.if (align > _STRUCT_ALIGN)
> - _STRUCT_ALIGN = align
> -.endif
> -.endm
> -
> -# macro RES_B name, size [, align]
> -.macro RES_B _name, _size, _align=1
> -RES_int _name _size _align
> -.endm
> -
> -# macro RES_W name, size [, align]
> -.macro RES_W _name, _size, _align=2
> -RES_int _name 2*(_size) _align
> -.endm
> -
> -# macro RES_D name, size [, align]
> -.macro RES_D _name, _size, _align=4
> -RES_int _name 4*(_size) _align
> -.endm
> -
> -# macro RES_Q name, size [, align]
> -.macro RES_Q _name, _size, _align=8
> -RES_int _name 8*(_size) _align
> -.endm
> -
> -# macro RES_DQ name, size [, align]
> -.macro RES_DQ _name, _size, _align=16
> -RES_int _name 16*(_size) _align
> -.endm
> -
> -# macro RES_Y name, size [, align]
> -.macro RES_Y _name, _size, _align=32
> -RES_int _name 32*(_size) _align
> -.endm
> -
> -# macro RES_Z name, size [, align]
> -.macro RES_Z _name, _size, _align=64
> -RES_int _name 64*(_size) _align
> -.endm
> -
> -#endif
> -
> -
> -########################################################################
> -#### Define SHA256 Out Of Order Data Structures
> -########################################################################
> -
> -START_FIELDS # LANE_DATA
> -### name size align
> -FIELD _job_in_lane, 8, 8 # pointer to job object
> -END_FIELDS
> -
> - _LANE_DATA_size = _FIELD_OFFSET
> - _LANE_DATA_align = _STRUCT_ALIGN
> -
> -########################################################################
> -
> -START_FIELDS # SHA256_ARGS_X4
> -### name size align
> -FIELD _digest, 4*8*8, 4 # transposed digest
> -FIELD _data_ptr, 8*8, 8 # array of pointers to data
> -END_FIELDS
> -
> - _SHA256_ARGS_X4_size = _FIELD_OFFSET
> - _SHA256_ARGS_X4_align = _STRUCT_ALIGN
> - _SHA256_ARGS_X8_size = _FIELD_OFFSET
> - _SHA256_ARGS_X8_align = _STRUCT_ALIGN
> -
> -#######################################################################
> -
> -START_FIELDS # MB_MGR
> -### name size align
> -FIELD _args, _SHA256_ARGS_X4_size, _SHA256_ARGS_X4_align
> -FIELD _lens, 4*8, 8
> -FIELD _unused_lanes, 8, 8
> -FIELD _ldata, _LANE_DATA_size*8, _LANE_DATA_align
> -END_FIELDS
> -
> - _MB_MGR_size = _FIELD_OFFSET
> - _MB_MGR_align = _STRUCT_ALIGN
> -
> -_args_digest = _args + _digest
> -_args_data_ptr = _args + _data_ptr
> -
> -#######################################################################
> -
> -START_FIELDS #STACK_FRAME
> -### name size align
> -FIELD _data, 16*SZ8, 1 # transposed digest
> -FIELD _digest, 8*SZ8, 1 # array of pointers to data
> -FIELD _ytmp, 4*SZ8, 1
> -FIELD _rsp, 8, 1
> -END_FIELDS
> -
> - _STACK_FRAME_size = _FIELD_OFFSET
> - _STACK_FRAME_align = _STRUCT_ALIGN
> -
> -#######################################################################
> -
> -########################################################################
> -#### Define constants
> -########################################################################
> -
> -#define STS_UNKNOWN 0
> -#define STS_BEING_PROCESSED 1
> -#define STS_COMPLETED 2
> -
> -########################################################################
> -#### Define JOB_SHA256 structure
> -########################################################################
> -
> -START_FIELDS # JOB_SHA256
> -
> -### name size align
> -FIELD _buffer, 8, 8 # pointer to buffer
> -FIELD _len, 8, 8 # length in bytes
> -FIELD _result_digest, 8*4, 32 # Digest (output)
> -FIELD _status, 4, 4
> -FIELD _user_data, 8, 8
> -END_FIELDS
> -
> - _JOB_SHA256_size = _FIELD_OFFSET
> - _JOB_SHA256_align = _STRUCT_ALIGN
> diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S
> deleted file mode 100644
> index d2364c55bbde..000000000000
> --- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S
> +++ /dev/null
> @@ -1,307 +0,0 @@
> -/*
> - * Flush routine for SHA256 multibuffer
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -#include <linux/linkage.h>
> -#include <asm/frame.h>
> -#include "sha256_mb_mgr_datastruct.S"
> -
> -.extern sha256_x8_avx2
> -
> -#LINUX register definitions
> -#define arg1 %rdi
> -#define arg2 %rsi
> -
> -# Common register definitions
> -#define state arg1
> -#define job arg2
> -#define len2 arg2
> -
> -# idx must be a register not clobberred by sha1_mult
> -#define idx %r8
> -#define DWORD_idx %r8d
> -
> -#define unused_lanes %rbx
> -#define lane_data %rbx
> -#define tmp2 %rbx
> -#define tmp2_w %ebx
> -
> -#define job_rax %rax
> -#define tmp1 %rax
> -#define size_offset %rax
> -#define tmp %rax
> -#define start_offset %rax
> -
> -#define tmp3 %arg1
> -
> -#define extra_blocks %arg2
> -#define p %arg2
> -
> -.macro LABEL prefix n
> -\prefix\n\():
> -.endm
> -
> -.macro JNE_SKIP i
> -jne skip_\i
> -.endm
> -
> -.altmacro
> -.macro SET_OFFSET _offset
> -offset = \_offset
> -.endm
> -.noaltmacro
> -
> -# JOB_SHA256* sha256_mb_mgr_flush_avx2(MB_MGR *state)
> -# arg 1 : rcx : state
> -ENTRY(sha256_mb_mgr_flush_avx2)
> - FRAME_BEGIN
> - push %rbx
> -
> - # If bit (32+3) is set, then all lanes are empty
> - mov _unused_lanes(state), unused_lanes
> - bt $32+3, unused_lanes
> - jc return_null
> -
> - # find a lane with a non-null job
> - xor idx, idx
> - offset = (_ldata + 1 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne one(%rip), idx
> - offset = (_ldata + 2 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne two(%rip), idx
> - offset = (_ldata + 3 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne three(%rip), idx
> - offset = (_ldata + 4 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne four(%rip), idx
> - offset = (_ldata + 5 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne five(%rip), idx
> - offset = (_ldata + 6 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne six(%rip), idx
> - offset = (_ldata + 7 * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne seven(%rip), idx
> -
> - # copy idx to empty lanes
> -copy_lane_data:
> - offset = (_args + _data_ptr)
> - mov offset(state,idx,8), tmp
> -
> - I = 0
> -.rep 8
> - offset = (_ldata + I * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> -.altmacro
> - JNE_SKIP %I
> - offset = (_args + _data_ptr + 8*I)
> - mov tmp, offset(state)
> - offset = (_lens + 4*I)
> - movl $0xFFFFFFFF, offset(state)
> -LABEL skip_ %I
> - I = (I+1)
> -.noaltmacro
> -.endr
> -
> - # Find min length
> - vmovdqu _lens+0*16(state), %xmm0
> - vmovdqu _lens+1*16(state), %xmm1
> -
> - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min val in low dword
> -
> - vmovd %xmm2, DWORD_idx
> - mov idx, len2
> - and $0xF, idx
> - shr $4, len2
> - jz len_is_0
> -
> - vpand clear_low_nibble(%rip), %xmm2, %xmm2
> - vpshufd $0, %xmm2, %xmm2
> -
> - vpsubd %xmm2, %xmm0, %xmm0
> - vpsubd %xmm2, %xmm1, %xmm1
> -
> - vmovdqu %xmm0, _lens+0*16(state)
> - vmovdqu %xmm1, _lens+1*16(state)
> -
> - # "state" and "args" are the same address, arg1
> - # len is arg2
> - call sha256_x8_avx2
> - # state and idx are intact
> -
> -len_is_0:
> - # process completed job "idx"
> - imul $_LANE_DATA_size, idx, lane_data
> - lea _ldata(state, lane_data), lane_data
> -
> - mov _job_in_lane(lane_data), job_rax
> - movq $0, _job_in_lane(lane_data)
> - movl $STS_COMPLETED, _status(job_rax)
> - mov _unused_lanes(state), unused_lanes
> - shl $4, unused_lanes
> - or idx, unused_lanes
> -
> - mov unused_lanes, _unused_lanes(state)
> - movl $0xFFFFFFFF, _lens(state,idx,4)
> -
> - vmovd _args_digest(state , idx, 4) , %xmm0
> - vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
> - vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
> - vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
> - vmovd _args_digest+4*32(state, idx, 4), %xmm1
> - vpinsrd $1, _args_digest+5*32(state, idx, 4), %xmm1, %xmm1
> - vpinsrd $2, _args_digest+6*32(state, idx, 4), %xmm1, %xmm1
> - vpinsrd $3, _args_digest+7*32(state, idx, 4), %xmm1, %xmm1
> -
> - vmovdqu %xmm0, _result_digest(job_rax)
> - offset = (_result_digest + 1*16)
> - vmovdqu %xmm1, offset(job_rax)
> -
> -return:
> - pop %rbx
> - FRAME_END
> - ret
> -
> -return_null:
> - xor job_rax, job_rax
> - jmp return
> -ENDPROC(sha256_mb_mgr_flush_avx2)
> -
> -##############################################################################
> -
> -.align 16
> -ENTRY(sha256_mb_mgr_get_comp_job_avx2)
> - push %rbx
> -
> - ## if bit 32+3 is set, then all lanes are empty
> - mov _unused_lanes(state), unused_lanes
> - bt $(32+3), unused_lanes
> - jc .return_null
> -
> - # Find min length
> - vmovdqu _lens(state), %xmm0
> - vmovdqu _lens+1*16(state), %xmm1
> -
> - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min val in low dword
> -
> - vmovd %xmm2, DWORD_idx
> - test $~0xF, idx
> - jnz .return_null
> -
> - # process completed job "idx"
> - imul $_LANE_DATA_size, idx, lane_data
> - lea _ldata(state, lane_data), lane_data
> -
> - mov _job_in_lane(lane_data), job_rax
> - movq $0, _job_in_lane(lane_data)
> - movl $STS_COMPLETED, _status(job_rax)
> - mov _unused_lanes(state), unused_lanes
> - shl $4, unused_lanes
> - or idx, unused_lanes
> - mov unused_lanes, _unused_lanes(state)
> -
> - movl $0xFFFFFFFF, _lens(state, idx, 4)
> -
> - vmovd _args_digest(state, idx, 4), %xmm0
> - vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
> - vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
> - vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
> - vmovd _args_digest+4*32(state, idx, 4), %xmm1
> - vpinsrd $1, _args_digest+5*32(state, idx, 4), %xmm1, %xmm1
> - vpinsrd $2, _args_digest+6*32(state, idx, 4), %xmm1, %xmm1
> - vpinsrd $3, _args_digest+7*32(state, idx, 4), %xmm1, %xmm1
> -
> - vmovdqu %xmm0, _result_digest(job_rax)
> - offset = (_result_digest + 1*16)
> - vmovdqu %xmm1, offset(job_rax)
> -
> - pop %rbx
> -
> - ret
> -
> -.return_null:
> - xor job_rax, job_rax
> - pop %rbx
> - ret
> -ENDPROC(sha256_mb_mgr_get_comp_job_avx2)
> -
> -.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
> -.align 16
> -clear_low_nibble:
> -.octa 0x000000000000000000000000FFFFFFF0
> -
> -.section .rodata.cst8, "aM", @progbits, 8
> -.align 8
> -one:
> -.quad 1
> -two:
> -.quad 2
> -three:
> -.quad 3
> -four:
> -.quad 4
> -five:
> -.quad 5
> -six:
> -.quad 6
> -seven:
> -.quad 7
> diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c
> deleted file mode 100644
> index b0c498371e67..000000000000
> --- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c
> +++ /dev/null
> @@ -1,65 +0,0 @@
> -/*
> - * Initialization code for multi buffer SHA256 algorithm for AVX2
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#include "sha256_mb_mgr.h"
> -
> -void sha256_mb_mgr_init_avx2(struct sha256_mb_mgr *state)
> -{
> - unsigned int j;
> -
> - state->unused_lanes = 0xF76543210ULL;
> - for (j = 0; j < 8; j++) {
> - state->lens[j] = 0xFFFFFFFF;
> - state->ldata[j].job_in_lane = NULL;
> - }
> -}
> diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S
> deleted file mode 100644
> index b36ae7454084..000000000000
> --- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S
> +++ /dev/null
> @@ -1,214 +0,0 @@
> -/*
> - * Buffer submit code for multi buffer SHA256 algorithm
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#include <linux/linkage.h>
> -#include <asm/frame.h>
> -#include "sha256_mb_mgr_datastruct.S"
> -
> -.extern sha256_x8_avx2
> -
> -# LINUX register definitions
> -arg1 = %rdi
> -arg2 = %rsi
> -size_offset = %rcx
> -tmp2 = %rcx
> -extra_blocks = %rdx
> -
> -# Common definitions
> -#define state arg1
> -#define job %rsi
> -#define len2 arg2
> -#define p2 arg2
> -
> -# idx must be a register not clobberred by sha1_x8_avx2
> -idx = %r8
> -DWORD_idx = %r8d
> -last_len = %r8
> -
> -p = %r11
> -start_offset = %r11
> -
> -unused_lanes = %rbx
> -BYTE_unused_lanes = %bl
> -
> -job_rax = %rax
> -len = %rax
> -DWORD_len = %eax
> -
> -lane = %r12
> -tmp3 = %r12
> -
> -tmp = %r9
> -DWORD_tmp = %r9d
> -
> -lane_data = %r10
> -
> -# JOB* sha256_mb_mgr_submit_avx2(MB_MGR *state, JOB_SHA256 *job)
> -# arg 1 : rcx : state
> -# arg 2 : rdx : job
> -ENTRY(sha256_mb_mgr_submit_avx2)
> - FRAME_BEGIN
> - push %rbx
> - push %r12
> -
> - mov _unused_lanes(state), unused_lanes
> - mov unused_lanes, lane
> - and $0xF, lane
> - shr $4, unused_lanes
> - imul $_LANE_DATA_size, lane, lane_data
> - movl $STS_BEING_PROCESSED, _status(job)
> - lea _ldata(state, lane_data), lane_data
> - mov unused_lanes, _unused_lanes(state)
> - movl _len(job), DWORD_len
> -
> - mov job, _job_in_lane(lane_data)
> - shl $4, len
> - or lane, len
> -
> - movl DWORD_len, _lens(state , lane, 4)
> -
> - # Load digest words from result_digest
> - vmovdqu _result_digest(job), %xmm0
> - vmovdqu _result_digest+1*16(job), %xmm1
> - vmovd %xmm0, _args_digest(state, lane, 4)
> - vpextrd $1, %xmm0, _args_digest+1*32(state , lane, 4)
> - vpextrd $2, %xmm0, _args_digest+2*32(state , lane, 4)
> - vpextrd $3, %xmm0, _args_digest+3*32(state , lane, 4)
> - vmovd %xmm1, _args_digest+4*32(state , lane, 4)
> -
> - vpextrd $1, %xmm1, _args_digest+5*32(state , lane, 4)
> - vpextrd $2, %xmm1, _args_digest+6*32(state , lane, 4)
> - vpextrd $3, %xmm1, _args_digest+7*32(state , lane, 4)
> -
> - mov _buffer(job), p
> - mov p, _args_data_ptr(state, lane, 8)
> -
> - cmp $0xF, unused_lanes
> - jne return_null
> -
> -start_loop:
> - # Find min length
> - vmovdqa _lens(state), %xmm0
> - vmovdqa _lens+1*16(state), %xmm1
> -
> - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min val in low dword
> -
> - vmovd %xmm2, DWORD_idx
> - mov idx, len2
> - and $0xF, idx
> - shr $4, len2
> - jz len_is_0
> -
> - vpand clear_low_nibble(%rip), %xmm2, %xmm2
> - vpshufd $0, %xmm2, %xmm2
> -
> - vpsubd %xmm2, %xmm0, %xmm0
> - vpsubd %xmm2, %xmm1, %xmm1
> -
> - vmovdqa %xmm0, _lens + 0*16(state)
> - vmovdqa %xmm1, _lens + 1*16(state)
> -
> - # "state" and "args" are the same address, arg1
> - # len is arg2
> - call sha256_x8_avx2
> -
> - # state and idx are intact
> -
> -len_is_0:
> - # process completed job "idx"
> - imul $_LANE_DATA_size, idx, lane_data
> - lea _ldata(state, lane_data), lane_data
> -
> - mov _job_in_lane(lane_data), job_rax
> - mov _unused_lanes(state), unused_lanes
> - movq $0, _job_in_lane(lane_data)
> - movl $STS_COMPLETED, _status(job_rax)
> - shl $4, unused_lanes
> - or idx, unused_lanes
> - mov unused_lanes, _unused_lanes(state)
> -
> - movl $0xFFFFFFFF, _lens(state,idx,4)
> -
> - vmovd _args_digest(state, idx, 4), %xmm0
> - vpinsrd $1, _args_digest+1*32(state , idx, 4), %xmm0, %xmm0
> - vpinsrd $2, _args_digest+2*32(state , idx, 4), %xmm0, %xmm0
> - vpinsrd $3, _args_digest+3*32(state , idx, 4), %xmm0, %xmm0
> - vmovd _args_digest+4*32(state, idx, 4), %xmm1
> -
> - vpinsrd $1, _args_digest+5*32(state , idx, 4), %xmm1, %xmm1
> - vpinsrd $2, _args_digest+6*32(state , idx, 4), %xmm1, %xmm1
> - vpinsrd $3, _args_digest+7*32(state , idx, 4), %xmm1, %xmm1
> -
> - vmovdqu %xmm0, _result_digest(job_rax)
> - vmovdqu %xmm1, _result_digest+1*16(job_rax)
> -
> -return:
> - pop %r12
> - pop %rbx
> - FRAME_END
> - ret
> -
> -return_null:
> - xor job_rax, job_rax
> - jmp return
> -
> -ENDPROC(sha256_mb_mgr_submit_avx2)
> -
> -.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
> -.align 16
> -clear_low_nibble:
> - .octa 0x000000000000000000000000FFFFFFF0
> diff --git a/arch/x86/crypto/sha256-mb/sha256_x8_avx2.S b/arch/x86/crypto/sha256-mb/sha256_x8_avx2.S
> deleted file mode 100644
> index 1687c80c5995..000000000000
> --- a/arch/x86/crypto/sha256-mb/sha256_x8_avx2.S
> +++ /dev/null
> @@ -1,598 +0,0 @@
> -/*
> - * Multi-buffer SHA256 algorithm hash compute routine
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#include <linux/linkage.h>
> -#include "sha256_mb_mgr_datastruct.S"
> -
> -## code to compute oct SHA256 using SSE-256
> -## outer calling routine takes care of save and restore of XMM registers
> -## Logic designed/laid out by JDG
> -
> -## Function clobbers: rax, rcx, rdx, rbx, rsi, rdi, r9-r15; %ymm0-15
> -## Linux clobbers: rax rbx rcx rdx rsi r9 r10 r11 r12 r13 r14 r15
> -## Linux preserves: rdi rbp r8
> -##
> -## clobbers %ymm0-15
> -
> -arg1 = %rdi
> -arg2 = %rsi
> -reg3 = %rcx
> -reg4 = %rdx
> -
> -# Common definitions
> -STATE = arg1
> -INP_SIZE = arg2
> -
> -IDX = %rax
> -ROUND = %rbx
> -TBL = reg3
> -
> -inp0 = %r9
> -inp1 = %r10
> -inp2 = %r11
> -inp3 = %r12
> -inp4 = %r13
> -inp5 = %r14
> -inp6 = %r15
> -inp7 = reg4
> -
> -a = %ymm0
> -b = %ymm1
> -c = %ymm2
> -d = %ymm3
> -e = %ymm4
> -f = %ymm5
> -g = %ymm6
> -h = %ymm7
> -
> -T1 = %ymm8
> -
> -a0 = %ymm12
> -a1 = %ymm13
> -a2 = %ymm14
> -TMP = %ymm15
> -TMP0 = %ymm6
> -TMP1 = %ymm7
> -
> -TT0 = %ymm8
> -TT1 = %ymm9
> -TT2 = %ymm10
> -TT3 = %ymm11
> -TT4 = %ymm12
> -TT5 = %ymm13
> -TT6 = %ymm14
> -TT7 = %ymm15
> -
> -# Define stack usage
> -
> -# Assume stack aligned to 32 bytes before call
> -# Therefore FRAMESZ mod 32 must be 32-8 = 24
> -
> -#define FRAMESZ 0x388
> -
> -#define VMOVPS vmovups
> -
> -# TRANSPOSE8 r0, r1, r2, r3, r4, r5, r6, r7, t0, t1
> -# "transpose" data in {r0...r7} using temps {t0...t1}
> -# Input looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
> -# r0 = {a7 a6 a5 a4 a3 a2 a1 a0}
> -# r1 = {b7 b6 b5 b4 b3 b2 b1 b0}
> -# r2 = {c7 c6 c5 c4 c3 c2 c1 c0}
> -# r3 = {d7 d6 d5 d4 d3 d2 d1 d0}
> -# r4 = {e7 e6 e5 e4 e3 e2 e1 e0}
> -# r5 = {f7 f6 f5 f4 f3 f2 f1 f0}
> -# r6 = {g7 g6 g5 g4 g3 g2 g1 g0}
> -# r7 = {h7 h6 h5 h4 h3 h2 h1 h0}
> -#
> -# Output looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
> -# r0 = {h0 g0 f0 e0 d0 c0 b0 a0}
> -# r1 = {h1 g1 f1 e1 d1 c1 b1 a1}
> -# r2 = {h2 g2 f2 e2 d2 c2 b2 a2}
> -# r3 = {h3 g3 f3 e3 d3 c3 b3 a3}
> -# r4 = {h4 g4 f4 e4 d4 c4 b4 a4}
> -# r5 = {h5 g5 f5 e5 d5 c5 b5 a5}
> -# r6 = {h6 g6 f6 e6 d6 c6 b6 a6}
> -# r7 = {h7 g7 f7 e7 d7 c7 b7 a7}
> -#
> -
> -.macro TRANSPOSE8 r0 r1 r2 r3 r4 r5 r6 r7 t0 t1
> - # process top half (r0..r3) {a...d}
> - vshufps $0x44, \r1, \r0, \t0 # t0 = {b5 b4 a5 a4 b1 b0 a1 a0}
> - vshufps $0xEE, \r1, \r0, \r0 # r0 = {b7 b6 a7 a6 b3 b2 a3 a2}
> - vshufps $0x44, \r3, \r2, \t1 # t1 = {d5 d4 c5 c4 d1 d0 c1 c0}
> - vshufps $0xEE, \r3, \r2, \r2 # r2 = {d7 d6 c7 c6 d3 d2 c3 c2}
> - vshufps $0xDD, \t1, \t0, \r3 # r3 = {d5 c5 b5 a5 d1 c1 b1 a1}
> - vshufps $0x88, \r2, \r0, \r1 # r1 = {d6 c6 b6 a6 d2 c2 b2 a2}
> - vshufps $0xDD, \r2, \r0, \r0 # r0 = {d7 c7 b7 a7 d3 c3 b3 a3}
> - vshufps $0x88, \t1, \t0, \t0 # t0 = {d4 c4 b4 a4 d0 c0 b0 a0}
> -
> - # use r2 in place of t0
> - # process bottom half (r4..r7) {e...h}
> - vshufps $0x44, \r5, \r4, \r2 # r2 = {f5 f4 e5 e4 f1 f0 e1 e0}
> - vshufps $0xEE, \r5, \r4, \r4 # r4 = {f7 f6 e7 e6 f3 f2 e3 e2}
> - vshufps $0x44, \r7, \r6, \t1 # t1 = {h5 h4 g5 g4 h1 h0 g1 g0}
> - vshufps $0xEE, \r7, \r6, \r6 # r6 = {h7 h6 g7 g6 h3 h2 g3 g2}
> - vshufps $0xDD, \t1, \r2, \r7 # r7 = {h5 g5 f5 e5 h1 g1 f1 e1}
> - vshufps $0x88, \r6, \r4, \r5 # r5 = {h6 g6 f6 e6 h2 g2 f2 e2}
> - vshufps $0xDD, \r6, \r4, \r4 # r4 = {h7 g7 f7 e7 h3 g3 f3 e3}
> - vshufps $0x88, \t1, \r2, \t1 # t1 = {h4 g4 f4 e4 h0 g0 f0 e0}
> -
> - vperm2f128 $0x13, \r1, \r5, \r6 # h6...a6
> - vperm2f128 $0x02, \r1, \r5, \r2 # h2...a2
> - vperm2f128 $0x13, \r3, \r7, \r5 # h5...a5
> - vperm2f128 $0x02, \r3, \r7, \r1 # h1...a1
> - vperm2f128 $0x13, \r0, \r4, \r7 # h7...a7
> - vperm2f128 $0x02, \r0, \r4, \r3 # h3...a3
> - vperm2f128 $0x13, \t0, \t1, \r4 # h4...a4
> - vperm2f128 $0x02, \t0, \t1, \r0 # h0...a0
> -
> -.endm
> -
> -.macro ROTATE_ARGS
> -TMP_ = h
> -h = g
> -g = f
> -f = e
> -e = d
> -d = c
> -c = b
> -b = a
> -a = TMP_
> -.endm
> -
> -.macro _PRORD reg imm tmp
> - vpslld $(32-\imm),\reg,\tmp
> - vpsrld $\imm,\reg, \reg
> - vpor \tmp,\reg, \reg
> -.endm
> -
> -# PRORD_nd reg, imm, tmp, src
> -.macro _PRORD_nd reg imm tmp src
> - vpslld $(32-\imm), \src, \tmp
> - vpsrld $\imm, \src, \reg
> - vpor \tmp, \reg, \reg
> -.endm
> -
> -# PRORD dst/src, amt
> -.macro PRORD reg imm
> - _PRORD \reg,\imm,TMP
> -.endm
> -
> -# PRORD_nd dst, src, amt
> -.macro PRORD_nd reg tmp imm
> - _PRORD_nd \reg, \imm, TMP, \tmp
> -.endm
> -
> -# arguments passed implicitly in preprocessor symbols i, a...h
> -.macro ROUND_00_15 _T1 i
> - PRORD_nd a0,e,5 # sig1: a0 = (e >> 5)
> -
> - vpxor g, f, a2 # ch: a2 = f^g
> - vpand e,a2, a2 # ch: a2 = (f^g)&e
> - vpxor g, a2, a2 # a2 = ch
> -
> - PRORD_nd a1,e,25 # sig1: a1 = (e >> 25)
> -
> - vmovdqu \_T1,(SZ8*(\i & 0xf))(%rsp)
> - vpaddd (TBL,ROUND,1), \_T1, \_T1 # T1 = W + K
> - vpxor e,a0, a0 # sig1: a0 = e ^ (e >> 5)
> - PRORD a0, 6 # sig1: a0 = (e >> 6) ^ (e >> 11)
> - vpaddd a2, h, h # h = h + ch
> - PRORD_nd a2,a,11 # sig0: a2 = (a >> 11)
> - vpaddd \_T1,h, h # h = h + ch + W + K
> - vpxor a1, a0, a0 # a0 = sigma1
> - PRORD_nd a1,a,22 # sig0: a1 = (a >> 22)
> - vpxor c, a, \_T1 # maj: T1 = a^c
> - add $SZ8, ROUND # ROUND++
> - vpand b, \_T1, \_T1 # maj: T1 = (a^c)&b
> - vpaddd a0, h, h
> - vpaddd h, d, d
> - vpxor a, a2, a2 # sig0: a2 = a ^ (a >> 11)
> - PRORD a2,2 # sig0: a2 = (a >> 2) ^ (a >> 13)
> - vpxor a1, a2, a2 # a2 = sig0
> - vpand c, a, a1 # maj: a1 = a&c
> - vpor \_T1, a1, a1 # a1 = maj
> - vpaddd a1, h, h # h = h + ch + W + K + maj
> - vpaddd a2, h, h # h = h + ch + W + K + maj + sigma0
> - ROTATE_ARGS
> -.endm
> -
> -# arguments passed implicitly in preprocessor symbols i, a...h
> -.macro ROUND_16_XX _T1 i
> - vmovdqu (SZ8*((\i-15)&0xf))(%rsp), \_T1
> - vmovdqu (SZ8*((\i-2)&0xf))(%rsp), a1
> - vmovdqu \_T1, a0
> - PRORD \_T1,11
> - vmovdqu a1, a2
> - PRORD a1,2
> - vpxor a0, \_T1, \_T1
> - PRORD \_T1, 7
> - vpxor a2, a1, a1
> - PRORD a1, 17
> - vpsrld $3, a0, a0
> - vpxor a0, \_T1, \_T1
> - vpsrld $10, a2, a2
> - vpxor a2, a1, a1
> - vpaddd (SZ8*((\i-16)&0xf))(%rsp), \_T1, \_T1
> - vpaddd (SZ8*((\i-7)&0xf))(%rsp), a1, a1
> - vpaddd a1, \_T1, \_T1
> -
> - ROUND_00_15 \_T1,\i
> -.endm
> -
> -# SHA256_ARGS:
> -# UINT128 digest[8]; // transposed digests
> -# UINT8 *data_ptr[4];
> -
> -# void sha256_x8_avx2(SHA256_ARGS *args, UINT64 bytes);
> -# arg 1 : STATE : pointer to array of pointers to input data
> -# arg 2 : INP_SIZE : size of input in blocks
> - # general registers preserved in outer calling routine
> - # outer calling routine saves all the XMM registers
> - # save rsp, allocate 32-byte aligned for local variables
> -ENTRY(sha256_x8_avx2)
> -
> - # save callee-saved clobbered registers to comply with C function ABI
> - push %r12
> - push %r13
> - push %r14
> - push %r15
> -
> - mov %rsp, IDX
> - sub $FRAMESZ, %rsp
> - and $~0x1F, %rsp
> - mov IDX, _rsp(%rsp)
> -
> - # Load the pre-transposed incoming digest.
> - vmovdqu 0*SHA256_DIGEST_ROW_SIZE(STATE),a
> - vmovdqu 1*SHA256_DIGEST_ROW_SIZE(STATE),b
> - vmovdqu 2*SHA256_DIGEST_ROW_SIZE(STATE),c
> - vmovdqu 3*SHA256_DIGEST_ROW_SIZE(STATE),d
> - vmovdqu 4*SHA256_DIGEST_ROW_SIZE(STATE),e
> - vmovdqu 5*SHA256_DIGEST_ROW_SIZE(STATE),f
> - vmovdqu 6*SHA256_DIGEST_ROW_SIZE(STATE),g
> - vmovdqu 7*SHA256_DIGEST_ROW_SIZE(STATE),h
> -
> - lea K256_8(%rip),TBL
> -
> - # load the address of each of the 4 message lanes
> - # getting ready to transpose input onto stack
> - mov _args_data_ptr+0*PTR_SZ(STATE),inp0
> - mov _args_data_ptr+1*PTR_SZ(STATE),inp1
> - mov _args_data_ptr+2*PTR_SZ(STATE),inp2
> - mov _args_data_ptr+3*PTR_SZ(STATE),inp3
> - mov _args_data_ptr+4*PTR_SZ(STATE),inp4
> - mov _args_data_ptr+5*PTR_SZ(STATE),inp5
> - mov _args_data_ptr+6*PTR_SZ(STATE),inp6
> - mov _args_data_ptr+7*PTR_SZ(STATE),inp7
> -
> - xor IDX, IDX
> -lloop:
> - xor ROUND, ROUND
> -
> - # save old digest
> - vmovdqu a, _digest(%rsp)
> - vmovdqu b, _digest+1*SZ8(%rsp)
> - vmovdqu c, _digest+2*SZ8(%rsp)
> - vmovdqu d, _digest+3*SZ8(%rsp)
> - vmovdqu e, _digest+4*SZ8(%rsp)
> - vmovdqu f, _digest+5*SZ8(%rsp)
> - vmovdqu g, _digest+6*SZ8(%rsp)
> - vmovdqu h, _digest+7*SZ8(%rsp)
> - i = 0
> -.rep 2
> - VMOVPS i*32(inp0, IDX), TT0
> - VMOVPS i*32(inp1, IDX), TT1
> - VMOVPS i*32(inp2, IDX), TT2
> - VMOVPS i*32(inp3, IDX), TT3
> - VMOVPS i*32(inp4, IDX), TT4
> - VMOVPS i*32(inp5, IDX), TT5
> - VMOVPS i*32(inp6, IDX), TT6
> - VMOVPS i*32(inp7, IDX), TT7
> - vmovdqu g, _ytmp(%rsp)
> - vmovdqu h, _ytmp+1*SZ8(%rsp)
> - TRANSPOSE8 TT0, TT1, TT2, TT3, TT4, TT5, TT6, TT7, TMP0, TMP1
> - vmovdqu PSHUFFLE_BYTE_FLIP_MASK(%rip), TMP1
> - vmovdqu _ytmp(%rsp), g
> - vpshufb TMP1, TT0, TT0
> - vpshufb TMP1, TT1, TT1
> - vpshufb TMP1, TT2, TT2
> - vpshufb TMP1, TT3, TT3
> - vpshufb TMP1, TT4, TT4
> - vpshufb TMP1, TT5, TT5
> - vpshufb TMP1, TT6, TT6
> - vpshufb TMP1, TT7, TT7
> - vmovdqu _ytmp+1*SZ8(%rsp), h
> - vmovdqu TT4, _ytmp(%rsp)
> - vmovdqu TT5, _ytmp+1*SZ8(%rsp)
> - vmovdqu TT6, _ytmp+2*SZ8(%rsp)
> - vmovdqu TT7, _ytmp+3*SZ8(%rsp)
> - ROUND_00_15 TT0,(i*8+0)
> - vmovdqu _ytmp(%rsp), TT0
> - ROUND_00_15 TT1,(i*8+1)
> - vmovdqu _ytmp+1*SZ8(%rsp), TT1
> - ROUND_00_15 TT2,(i*8+2)
> - vmovdqu _ytmp+2*SZ8(%rsp), TT2
> - ROUND_00_15 TT3,(i*8+3)
> - vmovdqu _ytmp+3*SZ8(%rsp), TT3
> - ROUND_00_15 TT0,(i*8+4)
> - ROUND_00_15 TT1,(i*8+5)
> - ROUND_00_15 TT2,(i*8+6)
> - ROUND_00_15 TT3,(i*8+7)
> - i = (i+1)
> -.endr
> - add $64, IDX
> - i = (i*8)
> -
> - jmp Lrounds_16_xx
> -.align 16
> -Lrounds_16_xx:
> -.rep 16
> - ROUND_16_XX T1, i
> - i = (i+1)
> -.endr
> -
> - cmp $ROUNDS,ROUND
> - jb Lrounds_16_xx
> -
> - # add old digest
> - vpaddd _digest+0*SZ8(%rsp), a, a
> - vpaddd _digest+1*SZ8(%rsp), b, b
> - vpaddd _digest+2*SZ8(%rsp), c, c
> - vpaddd _digest+3*SZ8(%rsp), d, d
> - vpaddd _digest+4*SZ8(%rsp), e, e
> - vpaddd _digest+5*SZ8(%rsp), f, f
> - vpaddd _digest+6*SZ8(%rsp), g, g
> - vpaddd _digest+7*SZ8(%rsp), h, h
> -
> - sub $1, INP_SIZE # unit is blocks
> - jne lloop
> -
> - # write back to memory (state object) the transposed digest
> - vmovdqu a, 0*SHA256_DIGEST_ROW_SIZE(STATE)
> - vmovdqu b, 1*SHA256_DIGEST_ROW_SIZE(STATE)
> - vmovdqu c, 2*SHA256_DIGEST_ROW_SIZE(STATE)
> - vmovdqu d, 3*SHA256_DIGEST_ROW_SIZE(STATE)
> - vmovdqu e, 4*SHA256_DIGEST_ROW_SIZE(STATE)
> - vmovdqu f, 5*SHA256_DIGEST_ROW_SIZE(STATE)
> - vmovdqu g, 6*SHA256_DIGEST_ROW_SIZE(STATE)
> - vmovdqu h, 7*SHA256_DIGEST_ROW_SIZE(STATE)
> -
> - # update input pointers
> - add IDX, inp0
> - mov inp0, _args_data_ptr+0*8(STATE)
> - add IDX, inp1
> - mov inp1, _args_data_ptr+1*8(STATE)
> - add IDX, inp2
> - mov inp2, _args_data_ptr+2*8(STATE)
> - add IDX, inp3
> - mov inp3, _args_data_ptr+3*8(STATE)
> - add IDX, inp4
> - mov inp4, _args_data_ptr+4*8(STATE)
> - add IDX, inp5
> - mov inp5, _args_data_ptr+5*8(STATE)
> - add IDX, inp6
> - mov inp6, _args_data_ptr+6*8(STATE)
> - add IDX, inp7
> - mov inp7, _args_data_ptr+7*8(STATE)
> -
> - # Postamble
> - mov _rsp(%rsp), %rsp
> -
> - # restore callee-saved clobbered registers
> - pop %r15
> - pop %r14
> - pop %r13
> - pop %r12
> -
> - ret
> -ENDPROC(sha256_x8_avx2)
> -
> -.section .rodata.K256_8, "a", @progbits
> -.align 64
> -K256_8:
> - .octa 0x428a2f98428a2f98428a2f98428a2f98
> - .octa 0x428a2f98428a2f98428a2f98428a2f98
> - .octa 0x71374491713744917137449171374491
> - .octa 0x71374491713744917137449171374491
> - .octa 0xb5c0fbcfb5c0fbcfb5c0fbcfb5c0fbcf
> - .octa 0xb5c0fbcfb5c0fbcfb5c0fbcfb5c0fbcf
> - .octa 0xe9b5dba5e9b5dba5e9b5dba5e9b5dba5
> - .octa 0xe9b5dba5e9b5dba5e9b5dba5e9b5dba5
> - .octa 0x3956c25b3956c25b3956c25b3956c25b
> - .octa 0x3956c25b3956c25b3956c25b3956c25b
> - .octa 0x59f111f159f111f159f111f159f111f1
> - .octa 0x59f111f159f111f159f111f159f111f1
> - .octa 0x923f82a4923f82a4923f82a4923f82a4
> - .octa 0x923f82a4923f82a4923f82a4923f82a4
> - .octa 0xab1c5ed5ab1c5ed5ab1c5ed5ab1c5ed5
> - .octa 0xab1c5ed5ab1c5ed5ab1c5ed5ab1c5ed5
> - .octa 0xd807aa98d807aa98d807aa98d807aa98
> - .octa 0xd807aa98d807aa98d807aa98d807aa98
> - .octa 0x12835b0112835b0112835b0112835b01
> - .octa 0x12835b0112835b0112835b0112835b01
> - .octa 0x243185be243185be243185be243185be
> - .octa 0x243185be243185be243185be243185be
> - .octa 0x550c7dc3550c7dc3550c7dc3550c7dc3
> - .octa 0x550c7dc3550c7dc3550c7dc3550c7dc3
> - .octa 0x72be5d7472be5d7472be5d7472be5d74
> - .octa 0x72be5d7472be5d7472be5d7472be5d74
> - .octa 0x80deb1fe80deb1fe80deb1fe80deb1fe
> - .octa 0x80deb1fe80deb1fe80deb1fe80deb1fe
> - .octa 0x9bdc06a79bdc06a79bdc06a79bdc06a7
> - .octa 0x9bdc06a79bdc06a79bdc06a79bdc06a7
> - .octa 0xc19bf174c19bf174c19bf174c19bf174
> - .octa 0xc19bf174c19bf174c19bf174c19bf174
> - .octa 0xe49b69c1e49b69c1e49b69c1e49b69c1
> - .octa 0xe49b69c1e49b69c1e49b69c1e49b69c1
> - .octa 0xefbe4786efbe4786efbe4786efbe4786
> - .octa 0xefbe4786efbe4786efbe4786efbe4786
> - .octa 0x0fc19dc60fc19dc60fc19dc60fc19dc6
> - .octa 0x0fc19dc60fc19dc60fc19dc60fc19dc6
> - .octa 0x240ca1cc240ca1cc240ca1cc240ca1cc
> - .octa 0x240ca1cc240ca1cc240ca1cc240ca1cc
> - .octa 0x2de92c6f2de92c6f2de92c6f2de92c6f
> - .octa 0x2de92c6f2de92c6f2de92c6f2de92c6f
> - .octa 0x4a7484aa4a7484aa4a7484aa4a7484aa
> - .octa 0x4a7484aa4a7484aa4a7484aa4a7484aa
> - .octa 0x5cb0a9dc5cb0a9dc5cb0a9dc5cb0a9dc
> - .octa 0x5cb0a9dc5cb0a9dc5cb0a9dc5cb0a9dc
> - .octa 0x76f988da76f988da76f988da76f988da
> - .octa 0x76f988da76f988da76f988da76f988da
> - .octa 0x983e5152983e5152983e5152983e5152
> - .octa 0x983e5152983e5152983e5152983e5152
> - .octa 0xa831c66da831c66da831c66da831c66d
> - .octa 0xa831c66da831c66da831c66da831c66d
> - .octa 0xb00327c8b00327c8b00327c8b00327c8
> - .octa 0xb00327c8b00327c8b00327c8b00327c8
> - .octa 0xbf597fc7bf597fc7bf597fc7bf597fc7
> - .octa 0xbf597fc7bf597fc7bf597fc7bf597fc7
> - .octa 0xc6e00bf3c6e00bf3c6e00bf3c6e00bf3
> - .octa 0xc6e00bf3c6e00bf3c6e00bf3c6e00bf3
> - .octa 0xd5a79147d5a79147d5a79147d5a79147
> - .octa 0xd5a79147d5a79147d5a79147d5a79147
> - .octa 0x06ca635106ca635106ca635106ca6351
> - .octa 0x06ca635106ca635106ca635106ca6351
> - .octa 0x14292967142929671429296714292967
> - .octa 0x14292967142929671429296714292967
> - .octa 0x27b70a8527b70a8527b70a8527b70a85
> - .octa 0x27b70a8527b70a8527b70a8527b70a85
> - .octa 0x2e1b21382e1b21382e1b21382e1b2138
> - .octa 0x2e1b21382e1b21382e1b21382e1b2138
> - .octa 0x4d2c6dfc4d2c6dfc4d2c6dfc4d2c6dfc
> - .octa 0x4d2c6dfc4d2c6dfc4d2c6dfc4d2c6dfc
> - .octa 0x53380d1353380d1353380d1353380d13
> - .octa 0x53380d1353380d1353380d1353380d13
> - .octa 0x650a7354650a7354650a7354650a7354
> - .octa 0x650a7354650a7354650a7354650a7354
> - .octa 0x766a0abb766a0abb766a0abb766a0abb
> - .octa 0x766a0abb766a0abb766a0abb766a0abb
> - .octa 0x81c2c92e81c2c92e81c2c92e81c2c92e
> - .octa 0x81c2c92e81c2c92e81c2c92e81c2c92e
> - .octa 0x92722c8592722c8592722c8592722c85
> - .octa 0x92722c8592722c8592722c8592722c85
> - .octa 0xa2bfe8a1a2bfe8a1a2bfe8a1a2bfe8a1
> - .octa 0xa2bfe8a1a2bfe8a1a2bfe8a1a2bfe8a1
> - .octa 0xa81a664ba81a664ba81a664ba81a664b
> - .octa 0xa81a664ba81a664ba81a664ba81a664b
> - .octa 0xc24b8b70c24b8b70c24b8b70c24b8b70
> - .octa 0xc24b8b70c24b8b70c24b8b70c24b8b70
> - .octa 0xc76c51a3c76c51a3c76c51a3c76c51a3
> - .octa 0xc76c51a3c76c51a3c76c51a3c76c51a3
> - .octa 0xd192e819d192e819d192e819d192e819
> - .octa 0xd192e819d192e819d192e819d192e819
> - .octa 0xd6990624d6990624d6990624d6990624
> - .octa 0xd6990624d6990624d6990624d6990624
> - .octa 0xf40e3585f40e3585f40e3585f40e3585
> - .octa 0xf40e3585f40e3585f40e3585f40e3585
> - .octa 0x106aa070106aa070106aa070106aa070
> - .octa 0x106aa070106aa070106aa070106aa070
> - .octa 0x19a4c11619a4c11619a4c11619a4c116
> - .octa 0x19a4c11619a4c11619a4c11619a4c116
> - .octa 0x1e376c081e376c081e376c081e376c08
> - .octa 0x1e376c081e376c081e376c081e376c08
> - .octa 0x2748774c2748774c2748774c2748774c
> - .octa 0x2748774c2748774c2748774c2748774c
> - .octa 0x34b0bcb534b0bcb534b0bcb534b0bcb5
> - .octa 0x34b0bcb534b0bcb534b0bcb534b0bcb5
> - .octa 0x391c0cb3391c0cb3391c0cb3391c0cb3
> - .octa 0x391c0cb3391c0cb3391c0cb3391c0cb3
> - .octa 0x4ed8aa4a4ed8aa4a4ed8aa4a4ed8aa4a
> - .octa 0x4ed8aa4a4ed8aa4a4ed8aa4a4ed8aa4a
> - .octa 0x5b9cca4f5b9cca4f5b9cca4f5b9cca4f
> - .octa 0x5b9cca4f5b9cca4f5b9cca4f5b9cca4f
> - .octa 0x682e6ff3682e6ff3682e6ff3682e6ff3
> - .octa 0x682e6ff3682e6ff3682e6ff3682e6ff3
> - .octa 0x748f82ee748f82ee748f82ee748f82ee
> - .octa 0x748f82ee748f82ee748f82ee748f82ee
> - .octa 0x78a5636f78a5636f78a5636f78a5636f
> - .octa 0x78a5636f78a5636f78a5636f78a5636f
> - .octa 0x84c8781484c8781484c8781484c87814
> - .octa 0x84c8781484c8781484c8781484c87814
> - .octa 0x8cc702088cc702088cc702088cc70208
> - .octa 0x8cc702088cc702088cc702088cc70208
> - .octa 0x90befffa90befffa90befffa90befffa
> - .octa 0x90befffa90befffa90befffa90befffa
> - .octa 0xa4506ceba4506ceba4506ceba4506ceb
> - .octa 0xa4506ceba4506ceba4506ceba4506ceb
> - .octa 0xbef9a3f7bef9a3f7bef9a3f7bef9a3f7
> - .octa 0xbef9a3f7bef9a3f7bef9a3f7bef9a3f7
> - .octa 0xc67178f2c67178f2c67178f2c67178f2
> - .octa 0xc67178f2c67178f2c67178f2c67178f2
> -
> -.section .rodata.cst32.PSHUFFLE_BYTE_FLIP_MASK, "aM", @progbits, 32
> -.align 32
> -PSHUFFLE_BYTE_FLIP_MASK:
> -.octa 0x0c0d0e0f08090a0b0405060700010203
> -.octa 0x0c0d0e0f08090a0b0405060700010203
> -
> -.section .rodata.cst256.K256, "aM", @progbits, 256
> -.align 64
> -.global K256
> -K256:
> - .int 0x428a2f98,0x71374491,0xb5c0fbcf,0xe9b5dba5
> - .int 0x3956c25b,0x59f111f1,0x923f82a4,0xab1c5ed5
> - .int 0xd807aa98,0x12835b01,0x243185be,0x550c7dc3
> - .int 0x72be5d74,0x80deb1fe,0x9bdc06a7,0xc19bf174
> - .int 0xe49b69c1,0xefbe4786,0x0fc19dc6,0x240ca1cc
> - .int 0x2de92c6f,0x4a7484aa,0x5cb0a9dc,0x76f988da
> - .int 0x983e5152,0xa831c66d,0xb00327c8,0xbf597fc7
> - .int 0xc6e00bf3,0xd5a79147,0x06ca6351,0x14292967
> - .int 0x27b70a85,0x2e1b2138,0x4d2c6dfc,0x53380d13
> - .int 0x650a7354,0x766a0abb,0x81c2c92e,0x92722c85
> - .int 0xa2bfe8a1,0xa81a664b,0xc24b8b70,0xc76c51a3
> - .int 0xd192e819,0xd6990624,0xf40e3585,0x106aa070
> - .int 0x19a4c116,0x1e376c08,0x2748774c,0x34b0bcb5
> - .int 0x391c0cb3,0x4ed8aa4a,0x5b9cca4f,0x682e6ff3
> - .int 0x748f82ee,0x78a5636f,0x84c87814,0x8cc70208
> - .int 0x90befffa,0xa4506ceb,0xbef9a3f7,0xc67178f2
> diff --git a/arch/x86/crypto/sha512-mb/Makefile b/arch/x86/crypto/sha512-mb/Makefile
> deleted file mode 100644
> index 90f1ef69152e..000000000000
> --- a/arch/x86/crypto/sha512-mb/Makefile
> +++ /dev/null
> @@ -1,12 +0,0 @@
> -# SPDX-License-Identifier: GPL-2.0
> -#
> -# Arch-specific CryptoAPI modules.
> -#
> -
> -avx2_supported := $(call as-instr,vpgatherdd %ymm0$(comma)(%eax$(comma)%ymm1\
> - $(comma)4)$(comma)%ymm2,yes,no)
> -ifeq ($(avx2_supported),yes)
> - obj-$(CONFIG_CRYPTO_SHA512_MB) += sha512-mb.o
> - sha512-mb-y := sha512_mb.o sha512_mb_mgr_flush_avx2.o \
> - sha512_mb_mgr_init_avx2.o sha512_mb_mgr_submit_avx2.o sha512_x4_avx2.o
> -endif
> diff --git a/arch/x86/crypto/sha512-mb/sha512_mb.c b/arch/x86/crypto/sha512-mb/sha512_mb.c
> deleted file mode 100644
> index 26b85678012d..000000000000
> --- a/arch/x86/crypto/sha512-mb/sha512_mb.c
> +++ /dev/null
> @@ -1,1047 +0,0 @@
> -/*
> - * Multi buffer SHA512 algorithm Glue Code
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
> -
> -#include <crypto/internal/hash.h>
> -#include <linux/init.h>
> -#include <linux/module.h>
> -#include <linux/mm.h>
> -#include <linux/cryptohash.h>
> -#include <linux/types.h>
> -#include <linux/list.h>
> -#include <crypto/scatterwalk.h>
> -#include <crypto/sha.h>
> -#include <crypto/mcryptd.h>
> -#include <crypto/crypto_wq.h>
> -#include <asm/byteorder.h>
> -#include <linux/hardirq.h>
> -#include <asm/fpu/api.h>
> -#include "sha512_mb_ctx.h"
> -
> -#define FLUSH_INTERVAL 1000 /* in usec */
> -
> -static struct mcryptd_alg_state sha512_mb_alg_state;
> -
> -struct sha512_mb_ctx {
> - struct mcryptd_ahash *mcryptd_tfm;
> -};
> -
> -static inline struct mcryptd_hash_request_ctx
> - *cast_hash_to_mcryptd_ctx(struct sha512_hash_ctx *hash_ctx)
> -{
> - struct ahash_request *areq;
> -
> - areq = container_of((void *) hash_ctx, struct ahash_request, __ctx);
> - return container_of(areq, struct mcryptd_hash_request_ctx, areq);
> -}
> -
> -static inline struct ahash_request
> - *cast_mcryptd_ctx_to_req(struct mcryptd_hash_request_ctx *ctx)
> -{
> - return container_of((void *) ctx, struct ahash_request, __ctx);
> -}
> -
> -static void req_ctx_init(struct mcryptd_hash_request_ctx *rctx,
> - struct ahash_request *areq)
> -{
> - rctx->flag = HASH_UPDATE;
> -}
> -
> -static asmlinkage void (*sha512_job_mgr_init)(struct sha512_mb_mgr *state);
> -static asmlinkage struct job_sha512* (*sha512_job_mgr_submit)
> - (struct sha512_mb_mgr *state,
> - struct job_sha512 *job);
> -static asmlinkage struct job_sha512* (*sha512_job_mgr_flush)
> - (struct sha512_mb_mgr *state);
> -static asmlinkage struct job_sha512* (*sha512_job_mgr_get_comp_job)
> - (struct sha512_mb_mgr *state);
> -
> -inline uint32_t sha512_pad(uint8_t padblock[SHA512_BLOCK_SIZE * 2],
> - uint64_t total_len)
> -{
> - uint32_t i = total_len & (SHA512_BLOCK_SIZE - 1);
> -
> - memset(&padblock[i], 0, SHA512_BLOCK_SIZE);
> - padblock[i] = 0x80;
> -
> - i += ((SHA512_BLOCK_SIZE - 1) &
> - (0 - (total_len + SHA512_PADLENGTHFIELD_SIZE + 1)))
> - + 1 + SHA512_PADLENGTHFIELD_SIZE;
> -
> -#if SHA512_PADLENGTHFIELD_SIZE == 16
> - *((uint64_t *) &padblock[i - 16]) = 0;
> -#endif
> -
> - *((uint64_t *) &padblock[i - 8]) = cpu_to_be64(total_len << 3);
> -
> - /* Number of extra blocks to hash */
> - return i >> SHA512_LOG2_BLOCK_SIZE;
> -}
> -
> -static struct sha512_hash_ctx *sha512_ctx_mgr_resubmit
> - (struct sha512_ctx_mgr *mgr, struct sha512_hash_ctx *ctx)
> -{
> - while (ctx) {
> - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> - /* Clear PROCESSING bit */
> - ctx->status = HASH_CTX_STS_COMPLETE;
> - return ctx;
> - }
> -
> - /*
> - * If the extra blocks are empty, begin hashing what remains
> - * in the user's buffer.
> - */
> - if (ctx->partial_block_buffer_length == 0 &&
> - ctx->incoming_buffer_length) {
> -
> - const void *buffer = ctx->incoming_buffer;
> - uint32_t len = ctx->incoming_buffer_length;
> - uint32_t copy_len;
> -
> - /*
> - * Only entire blocks can be hashed.
> - * Copy remainder to extra blocks buffer.
> - */
> - copy_len = len & (SHA512_BLOCK_SIZE-1);
> -
> - if (copy_len) {
> - len -= copy_len;
> - memcpy(ctx->partial_block_buffer,
> - ((const char *) buffer + len),
> - copy_len);
> - ctx->partial_block_buffer_length = copy_len;
> - }
> -
> - ctx->incoming_buffer_length = 0;
> -
> - /* len should be a multiple of the block size now */
> - assert((len % SHA512_BLOCK_SIZE) == 0);
> -
> - /* Set len to the number of blocks to be hashed */
> - len >>= SHA512_LOG2_BLOCK_SIZE;
> -
> - if (len) {
> -
> - ctx->job.buffer = (uint8_t *) buffer;
> - ctx->job.len = len;
> - ctx = (struct sha512_hash_ctx *)
> - sha512_job_mgr_submit(&mgr->mgr,
> - &ctx->job);
> - continue;
> - }
> - }
> -
> - /*
> - * If the extra blocks are not empty, then we are
> - * either on the last block(s) or we need more
> - * user input before continuing.
> - */
> - if (ctx->status & HASH_CTX_STS_LAST) {
> -
> - uint8_t *buf = ctx->partial_block_buffer;
> - uint32_t n_extra_blocks =
> - sha512_pad(buf, ctx->total_length);
> -
> - ctx->status = (HASH_CTX_STS_PROCESSING |
> - HASH_CTX_STS_COMPLETE);
> - ctx->job.buffer = buf;
> - ctx->job.len = (uint32_t) n_extra_blocks;
> - ctx = (struct sha512_hash_ctx *)
> - sha512_job_mgr_submit(&mgr->mgr, &ctx->job);
> - continue;
> - }
> -
> - if (ctx)
> - ctx->status = HASH_CTX_STS_IDLE;
> - return ctx;
> - }
> -
> - return NULL;
> -}
> -
> -static struct sha512_hash_ctx
> - *sha512_ctx_mgr_get_comp_ctx(struct mcryptd_alg_cstate *cstate)
> -{
> - /*
> - * If get_comp_job returns NULL, there are no jobs complete.
> - * If get_comp_job returns a job, verify that it is safe to return to
> - * the user.
> - * If it is not ready, resubmit the job to finish processing.
> - * If sha512_ctx_mgr_resubmit returned a job, it is ready to be
> - * returned.
> - * Otherwise, all jobs currently being managed by the hash_ctx_mgr
> - * still need processing.
> - */
> - struct sha512_ctx_mgr *mgr;
> - struct sha512_hash_ctx *ctx;
> - unsigned long flags;
> -
> - mgr = cstate->mgr;
> - spin_lock_irqsave(&cstate->work_lock, flags);
> - ctx = (struct sha512_hash_ctx *)
> - sha512_job_mgr_get_comp_job(&mgr->mgr);
> - ctx = sha512_ctx_mgr_resubmit(mgr, ctx);
> - spin_unlock_irqrestore(&cstate->work_lock, flags);
> - return ctx;
> -}
> -
> -static void sha512_ctx_mgr_init(struct sha512_ctx_mgr *mgr)
> -{
> - sha512_job_mgr_init(&mgr->mgr);
> -}
> -
> -static struct sha512_hash_ctx
> - *sha512_ctx_mgr_submit(struct mcryptd_alg_cstate *cstate,
> - struct sha512_hash_ctx *ctx,
> - const void *buffer,
> - uint32_t len,
> - int flags)
> -{
> - struct sha512_ctx_mgr *mgr;
> - unsigned long irqflags;
> -
> - mgr = cstate->mgr;
> - spin_lock_irqsave(&cstate->work_lock, irqflags);
> - if (flags & ~(HASH_UPDATE | HASH_LAST)) {
> - /* User should not pass anything other than UPDATE or LAST */
> - ctx->error = HASH_CTX_ERROR_INVALID_FLAGS;
> - goto unlock;
> - }
> -
> - if (ctx->status & HASH_CTX_STS_PROCESSING) {
> - /* Cannot submit to a currently processing job. */
> - ctx->error = HASH_CTX_ERROR_ALREADY_PROCESSING;
> - goto unlock;
> - }
> -
> - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> - /* Cannot update a finished job. */
> - ctx->error = HASH_CTX_ERROR_ALREADY_COMPLETED;
> - goto unlock;
> - }
> -
> - /*
> - * If we made it here, there were no errors during this call to
> - * submit
> - */
> - ctx->error = HASH_CTX_ERROR_NONE;
> -
> - /* Store buffer ptr info from user */
> - ctx->incoming_buffer = buffer;
> - ctx->incoming_buffer_length = len;
> -
> - /*
> - * Store the user's request flags and mark this ctx as currently being
> - * processed.
> - */
> - ctx->status = (flags & HASH_LAST) ?
> - (HASH_CTX_STS_PROCESSING | HASH_CTX_STS_LAST) :
> - HASH_CTX_STS_PROCESSING;
> -
> - /* Advance byte counter */
> - ctx->total_length += len;
> -
> - /*
> - * If there is anything currently buffered in the extra blocks,
> - * append to it until it contains a whole block.
> - * Or if the user's buffer contains less than a whole block,
> - * append as much as possible to the extra block.
> - */
> - if (ctx->partial_block_buffer_length || len < SHA512_BLOCK_SIZE) {
> - /* Compute how many bytes to copy from user buffer into extra
> - * block
> - */
> - uint32_t copy_len = SHA512_BLOCK_SIZE -
> - ctx->partial_block_buffer_length;
> - if (len < copy_len)
> - copy_len = len;
> -
> - if (copy_len) {
> - /* Copy and update relevant pointers and counters */
> - memcpy
> - (&ctx->partial_block_buffer[ctx->partial_block_buffer_length],
> - buffer, copy_len);
> -
> - ctx->partial_block_buffer_length += copy_len;
> - ctx->incoming_buffer = (const void *)
> - ((const char *)buffer + copy_len);
> - ctx->incoming_buffer_length = len - copy_len;
> - }
> -
> - /* The extra block should never contain more than 1 block
> - * here
> - */
> - assert(ctx->partial_block_buffer_length <= SHA512_BLOCK_SIZE);
> -
> - /* If the extra block buffer contains exactly 1 block, it can
> - * be hashed.
> - */
> - if (ctx->partial_block_buffer_length >= SHA512_BLOCK_SIZE) {
> - ctx->partial_block_buffer_length = 0;
> -
> - ctx->job.buffer = ctx->partial_block_buffer;
> - ctx->job.len = 1;
> - ctx = (struct sha512_hash_ctx *)
> - sha512_job_mgr_submit(&mgr->mgr, &ctx->job);
> - }
> - }
> -
> - ctx = sha512_ctx_mgr_resubmit(mgr, ctx);
> -unlock:
> - spin_unlock_irqrestore(&cstate->work_lock, irqflags);
> - return ctx;
> -}
> -
> -static struct sha512_hash_ctx *sha512_ctx_mgr_flush(struct mcryptd_alg_cstate *cstate)
> -{
> - struct sha512_ctx_mgr *mgr;
> - struct sha512_hash_ctx *ctx;
> - unsigned long flags;
> -
> - mgr = cstate->mgr;
> - spin_lock_irqsave(&cstate->work_lock, flags);
> - while (1) {
> - ctx = (struct sha512_hash_ctx *)
> - sha512_job_mgr_flush(&mgr->mgr);
> -
> - /* If flush returned 0, there are no more jobs in flight. */
> - if (!ctx)
> - break;
> -
> - /*
> - * If flush returned a job, resubmit the job to finish
> - * processing.
> - */
> - ctx = sha512_ctx_mgr_resubmit(mgr, ctx);
> -
> - /*
> - * If sha512_ctx_mgr_resubmit returned a job, it is ready to
> - * be returned. Otherwise, all jobs currently being managed by
> - * the sha512_ctx_mgr still need processing. Loop.
> - */
> - if (ctx)
> - break;
> - }
> - spin_unlock_irqrestore(&cstate->work_lock, flags);
> - return ctx;
> -}
> -
> -static int sha512_mb_init(struct ahash_request *areq)
> -{
> - struct sha512_hash_ctx *sctx = ahash_request_ctx(areq);
> -
> - hash_ctx_init(sctx);
> - sctx->job.result_digest[0] = SHA512_H0;
> - sctx->job.result_digest[1] = SHA512_H1;
> - sctx->job.result_digest[2] = SHA512_H2;
> - sctx->job.result_digest[3] = SHA512_H3;
> - sctx->job.result_digest[4] = SHA512_H4;
> - sctx->job.result_digest[5] = SHA512_H5;
> - sctx->job.result_digest[6] = SHA512_H6;
> - sctx->job.result_digest[7] = SHA512_H7;
> - sctx->total_length = 0;
> - sctx->partial_block_buffer_length = 0;
> - sctx->status = HASH_CTX_STS_IDLE;
> -
> - return 0;
> -}
> -
> -static int sha512_mb_set_results(struct mcryptd_hash_request_ctx *rctx)
> -{
> - int i;
> - struct sha512_hash_ctx *sctx = ahash_request_ctx(&rctx->areq);
> - __be64 *dst = (__be64 *) rctx->out;
> -
> - for (i = 0; i < 8; ++i)
> - dst[i] = cpu_to_be64(sctx->job.result_digest[i]);
> -
> - return 0;
> -}
> -
> -static int sha_finish_walk(struct mcryptd_hash_request_ctx **ret_rctx,
> - struct mcryptd_alg_cstate *cstate, bool flush)
> -{
> - int flag = HASH_UPDATE;
> - int nbytes, err = 0;
> - struct mcryptd_hash_request_ctx *rctx = *ret_rctx;
> - struct sha512_hash_ctx *sha_ctx;
> -
> - /* more work ? */
> - while (!(rctx->flag & HASH_DONE)) {
> - nbytes = crypto_ahash_walk_done(&rctx->walk, 0);
> - if (nbytes < 0) {
> - err = nbytes;
> - goto out;
> - }
> - /* check if the walk is done */
> - if (crypto_ahash_walk_last(&rctx->walk)) {
> - rctx->flag |= HASH_DONE;
> - if (rctx->flag & HASH_FINAL)
> - flag |= HASH_LAST;
> -
> - }
> - sha_ctx = (struct sha512_hash_ctx *)
> - ahash_request_ctx(&rctx->areq);
> - kernel_fpu_begin();
> - sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx,
> - rctx->walk.data, nbytes, flag);
> - if (!sha_ctx) {
> - if (flush)
> - sha_ctx = sha512_ctx_mgr_flush(cstate);
> - }
> - kernel_fpu_end();
> - if (sha_ctx)
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - else {
> - rctx = NULL;
> - goto out;
> - }
> - }
> -
> - /* copy the results */
> - if (rctx->flag & HASH_FINAL)
> - sha512_mb_set_results(rctx);
> -
> -out:
> - *ret_rctx = rctx;
> - return err;
> -}
> -
> -static int sha_complete_job(struct mcryptd_hash_request_ctx *rctx,
> - struct mcryptd_alg_cstate *cstate,
> - int err)
> -{
> - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> - struct sha512_hash_ctx *sha_ctx;
> - struct mcryptd_hash_request_ctx *req_ctx;
> - int ret;
> - unsigned long flags;
> -
> - /* remove from work list */
> - spin_lock_irqsave(&cstate->work_lock, flags);
> - list_del(&rctx->waiter);
> - spin_unlock_irqrestore(&cstate->work_lock, flags);
> -
> - if (irqs_disabled())
> - rctx->complete(&req->base, err);
> - else {
> - local_bh_disable();
> - rctx->complete(&req->base, err);
> - local_bh_enable();
> - }
> -
> - /* check to see if there are other jobs that are done */
> - sha_ctx = sha512_ctx_mgr_get_comp_ctx(cstate);
> - while (sha_ctx) {
> - req_ctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&req_ctx, cstate, false);
> - if (req_ctx) {
> - spin_lock_irqsave(&cstate->work_lock, flags);
> - list_del(&req_ctx->waiter);
> - spin_unlock_irqrestore(&cstate->work_lock, flags);
> -
> - req = cast_mcryptd_ctx_to_req(req_ctx);
> - if (irqs_disabled())
> - req_ctx->complete(&req->base, ret);
> - else {
> - local_bh_disable();
> - req_ctx->complete(&req->base, ret);
> - local_bh_enable();
> - }
> - }
> - sha_ctx = sha512_ctx_mgr_get_comp_ctx(cstate);
> - }
> -
> - return 0;
> -}
> -
> -static void sha512_mb_add_list(struct mcryptd_hash_request_ctx *rctx,
> - struct mcryptd_alg_cstate *cstate)
> -{
> - unsigned long next_flush;
> - unsigned long delay = usecs_to_jiffies(FLUSH_INTERVAL);
> - unsigned long flags;
> -
> - /* initialize tag */
> - rctx->tag.arrival = jiffies; /* tag the arrival time */
> - rctx->tag.seq_num = cstate->next_seq_num++;
> - next_flush = rctx->tag.arrival + delay;
> - rctx->tag.expire = next_flush;
> -
> - spin_lock_irqsave(&cstate->work_lock, flags);
> - list_add_tail(&rctx->waiter, &cstate->work_list);
> - spin_unlock_irqrestore(&cstate->work_lock, flags);
> -
> - mcryptd_arm_flusher(cstate, delay);
> -}
> -
> -static int sha512_mb_update(struct ahash_request *areq)
> -{
> - struct mcryptd_hash_request_ctx *rctx =
> - container_of(areq, struct mcryptd_hash_request_ctx,
> - areq);
> - struct mcryptd_alg_cstate *cstate =
> - this_cpu_ptr(sha512_mb_alg_state.alg_cstate);
> -
> - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> - struct sha512_hash_ctx *sha_ctx;
> - int ret = 0, nbytes;
> -
> -
> - /* sanity check */
> - if (rctx->tag.cpu != smp_processor_id()) {
> - pr_err("mcryptd error: cpu clash\n");
> - goto done;
> - }
> -
> - /* need to init context */
> - req_ctx_init(rctx, areq);
> -
> - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> -
> - if (nbytes < 0) {
> - ret = nbytes;
> - goto done;
> - }
> -
> - if (crypto_ahash_walk_last(&rctx->walk))
> - rctx->flag |= HASH_DONE;
> -
> - /* submit */
> - sha_ctx = (struct sha512_hash_ctx *) ahash_request_ctx(areq);
> - sha512_mb_add_list(rctx, cstate);
> - kernel_fpu_begin();
> - sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx, rctx->walk.data,
> - nbytes, HASH_UPDATE);
> - kernel_fpu_end();
> -
> - /* check if anything is returned */
> - if (!sha_ctx)
> - return -EINPROGRESS;
> -
> - if (sha_ctx->error) {
> - ret = sha_ctx->error;
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - goto done;
> - }
> -
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&rctx, cstate, false);
> -
> - if (!rctx)
> - return -EINPROGRESS;
> -done:
> - sha_complete_job(rctx, cstate, ret);
> - return ret;
> -}
> -
> -static int sha512_mb_finup(struct ahash_request *areq)
> -{
> - struct mcryptd_hash_request_ctx *rctx =
> - container_of(areq, struct mcryptd_hash_request_ctx,
> - areq);
> - struct mcryptd_alg_cstate *cstate =
> - this_cpu_ptr(sha512_mb_alg_state.alg_cstate);
> -
> - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> - struct sha512_hash_ctx *sha_ctx;
> - int ret = 0, flag = HASH_UPDATE, nbytes;
> -
> - /* sanity check */
> - if (rctx->tag.cpu != smp_processor_id()) {
> - pr_err("mcryptd error: cpu clash\n");
> - goto done;
> - }
> -
> - /* need to init context */
> - req_ctx_init(rctx, areq);
> -
> - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> -
> - if (nbytes < 0) {
> - ret = nbytes;
> - goto done;
> - }
> -
> - if (crypto_ahash_walk_last(&rctx->walk)) {
> - rctx->flag |= HASH_DONE;
> - flag = HASH_LAST;
> - }
> -
> - /* submit */
> - rctx->flag |= HASH_FINAL;
> - sha_ctx = (struct sha512_hash_ctx *) ahash_request_ctx(areq);
> - sha512_mb_add_list(rctx, cstate);
> -
> - kernel_fpu_begin();
> - sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx, rctx->walk.data,
> - nbytes, flag);
> - kernel_fpu_end();
> -
> - /* check if anything is returned */
> - if (!sha_ctx)
> - return -EINPROGRESS;
> -
> - if (sha_ctx->error) {
> - ret = sha_ctx->error;
> - goto done;
> - }
> -
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&rctx, cstate, false);
> - if (!rctx)
> - return -EINPROGRESS;
> -done:
> - sha_complete_job(rctx, cstate, ret);
> - return ret;
> -}
> -
> -static int sha512_mb_final(struct ahash_request *areq)
> -{
> - struct mcryptd_hash_request_ctx *rctx =
> - container_of(areq, struct mcryptd_hash_request_ctx,
> - areq);
> - struct mcryptd_alg_cstate *cstate =
> - this_cpu_ptr(sha512_mb_alg_state.alg_cstate);
> -
> - struct sha512_hash_ctx *sha_ctx;
> - int ret = 0;
> - u8 data;
> -
> - /* sanity check */
> - if (rctx->tag.cpu != smp_processor_id()) {
> - pr_err("mcryptd error: cpu clash\n");
> - goto done;
> - }
> -
> - /* need to init context */
> - req_ctx_init(rctx, areq);
> -
> - rctx->flag |= HASH_DONE | HASH_FINAL;
> -
> - sha_ctx = (struct sha512_hash_ctx *) ahash_request_ctx(areq);
> - /* flag HASH_FINAL and 0 data size */
> - sha512_mb_add_list(rctx, cstate);
> - kernel_fpu_begin();
> - sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx, &data, 0, HASH_LAST);
> - kernel_fpu_end();
> -
> - /* check if anything is returned */
> - if (!sha_ctx)
> - return -EINPROGRESS;
> -
> - if (sha_ctx->error) {
> - ret = sha_ctx->error;
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - goto done;
> - }
> -
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - ret = sha_finish_walk(&rctx, cstate, false);
> - if (!rctx)
> - return -EINPROGRESS;
> -done:
> - sha_complete_job(rctx, cstate, ret);
> - return ret;
> -}
> -
> -static int sha512_mb_export(struct ahash_request *areq, void *out)
> -{
> - struct sha512_hash_ctx *sctx = ahash_request_ctx(areq);
> -
> - memcpy(out, sctx, sizeof(*sctx));
> -
> - return 0;
> -}
> -
> -static int sha512_mb_import(struct ahash_request *areq, const void *in)
> -{
> - struct sha512_hash_ctx *sctx = ahash_request_ctx(areq);
> -
> - memcpy(sctx, in, sizeof(*sctx));
> -
> - return 0;
> -}
> -
> -static int sha512_mb_async_init_tfm(struct crypto_tfm *tfm)
> -{
> - struct mcryptd_ahash *mcryptd_tfm;
> - struct sha512_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> - struct mcryptd_hash_ctx *mctx;
> -
> - mcryptd_tfm = mcryptd_alloc_ahash("__intel_sha512-mb",
> - CRYPTO_ALG_INTERNAL,
> - CRYPTO_ALG_INTERNAL);
> - if (IS_ERR(mcryptd_tfm))
> - return PTR_ERR(mcryptd_tfm);
> - mctx = crypto_ahash_ctx(&mcryptd_tfm->base);
> - mctx->alg_state = &sha512_mb_alg_state;
> - ctx->mcryptd_tfm = mcryptd_tfm;
> - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> - sizeof(struct ahash_request) +
> - crypto_ahash_reqsize(&mcryptd_tfm->base));
> -
> - return 0;
> -}
> -
> -static void sha512_mb_async_exit_tfm(struct crypto_tfm *tfm)
> -{
> - struct sha512_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> -
> - mcryptd_free_ahash(ctx->mcryptd_tfm);
> -}
> -
> -static int sha512_mb_areq_init_tfm(struct crypto_tfm *tfm)
> -{
> - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> - sizeof(struct ahash_request) +
> - sizeof(struct sha512_hash_ctx));
> -
> - return 0;
> -}
> -
> -static void sha512_mb_areq_exit_tfm(struct crypto_tfm *tfm)
> -{
> - struct sha512_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> -
> - mcryptd_free_ahash(ctx->mcryptd_tfm);
> -}
> -
> -static struct ahash_alg sha512_mb_areq_alg = {
> - .init = sha512_mb_init,
> - .update = sha512_mb_update,
> - .final = sha512_mb_final,
> - .finup = sha512_mb_finup,
> - .export = sha512_mb_export,
> - .import = sha512_mb_import,
> - .halg = {
> - .digestsize = SHA512_DIGEST_SIZE,
> - .statesize = sizeof(struct sha512_hash_ctx),
> - .base = {
> - .cra_name = "__sha512-mb",
> - .cra_driver_name = "__intel_sha512-mb",
> - .cra_priority = 100,
> - /*
> - * use ASYNC flag as some buffers in multi-buffer
> - * algo may not have completed before hashing thread
> - * sleep
> - */
> - .cra_flags = CRYPTO_ALG_ASYNC |
> - CRYPTO_ALG_INTERNAL,
> - .cra_blocksize = SHA512_BLOCK_SIZE,
> - .cra_module = THIS_MODULE,
> - .cra_list = LIST_HEAD_INIT
> - (sha512_mb_areq_alg.halg.base.cra_list),
> - .cra_init = sha512_mb_areq_init_tfm,
> - .cra_exit = sha512_mb_areq_exit_tfm,
> - .cra_ctxsize = sizeof(struct sha512_hash_ctx),
> - }
> - }
> -};
> -
> -static int sha512_mb_async_init(struct ahash_request *req)
> -{
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_init(mcryptd_req);
> -}
> -
> -static int sha512_mb_async_update(struct ahash_request *req)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> -
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_update(mcryptd_req);
> -}
> -
> -static int sha512_mb_async_finup(struct ahash_request *req)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> -
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_finup(mcryptd_req);
> -}
> -
> -static int sha512_mb_async_final(struct ahash_request *req)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> -
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_final(mcryptd_req);
> -}
> -
> -static int sha512_mb_async_digest(struct ahash_request *req)
> -{
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_digest(mcryptd_req);
> -}
> -
> -static int sha512_mb_async_export(struct ahash_request *req, void *out)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - return crypto_ahash_export(mcryptd_req, out);
> -}
> -
> -static int sha512_mb_async_import(struct ahash_request *req, const void *in)
> -{
> - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> - struct crypto_ahash *child = mcryptd_ahash_child(mcryptd_tfm);
> - struct mcryptd_hash_request_ctx *rctx;
> - struct ahash_request *areq;
> -
> - memcpy(mcryptd_req, req, sizeof(*req));
> - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> - rctx = ahash_request_ctx(mcryptd_req);
> -
> - areq = &rctx->areq;
> -
> - ahash_request_set_tfm(areq, child);
> - ahash_request_set_callback(areq, CRYPTO_TFM_REQ_MAY_SLEEP,
> - rctx->complete, req);
> -
> - return crypto_ahash_import(mcryptd_req, in);
> -}
> -
> -static struct ahash_alg sha512_mb_async_alg = {
> - .init = sha512_mb_async_init,
> - .update = sha512_mb_async_update,
> - .final = sha512_mb_async_final,
> - .finup = sha512_mb_async_finup,
> - .digest = sha512_mb_async_digest,
> - .export = sha512_mb_async_export,
> - .import = sha512_mb_async_import,
> - .halg = {
> - .digestsize = SHA512_DIGEST_SIZE,
> - .statesize = sizeof(struct sha512_hash_ctx),
> - .base = {
> - .cra_name = "sha512",
> - .cra_driver_name = "sha512_mb",
> - /*
> - * Low priority, since with few concurrent hash requests
> - * this is extremely slow due to the flush delay. Users
> - * whose workloads would benefit from this can request
> - * it explicitly by driver name, or can increase its
> - * priority at runtime using NETLINK_CRYPTO.
> - */
> - .cra_priority = 50,
> - .cra_flags = CRYPTO_ALG_ASYNC,
> - .cra_blocksize = SHA512_BLOCK_SIZE,
> - .cra_module = THIS_MODULE,
> - .cra_list = LIST_HEAD_INIT
> - (sha512_mb_async_alg.halg.base.cra_list),
> - .cra_init = sha512_mb_async_init_tfm,
> - .cra_exit = sha512_mb_async_exit_tfm,
> - .cra_ctxsize = sizeof(struct sha512_mb_ctx),
> - .cra_alignmask = 0,
> - },
> - },
> -};
> -
> -static unsigned long sha512_mb_flusher(struct mcryptd_alg_cstate *cstate)
> -{
> - struct mcryptd_hash_request_ctx *rctx;
> - unsigned long cur_time;
> - unsigned long next_flush = 0;
> - struct sha512_hash_ctx *sha_ctx;
> -
> -
> - cur_time = jiffies;
> -
> - while (!list_empty(&cstate->work_list)) {
> - rctx = list_entry(cstate->work_list.next,
> - struct mcryptd_hash_request_ctx, waiter);
> - if time_before(cur_time, rctx->tag.expire)
> - break;
> - kernel_fpu_begin();
> - sha_ctx = (struct sha512_hash_ctx *)
> - sha512_ctx_mgr_flush(cstate);
> - kernel_fpu_end();
> - if (!sha_ctx) {
> - pr_err("sha512_mb error: nothing got flushed for"
> - " non-empty list\n");
> - break;
> - }
> - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> - sha_finish_walk(&rctx, cstate, true);
> - sha_complete_job(rctx, cstate, 0);
> - }
> -
> - if (!list_empty(&cstate->work_list)) {
> - rctx = list_entry(cstate->work_list.next,
> - struct mcryptd_hash_request_ctx, waiter);
> - /* get the hash context and then flush time */
> - next_flush = rctx->tag.expire;
> - mcryptd_arm_flusher(cstate, get_delay(next_flush));
> - }
> - return next_flush;
> -}
> -
> -static int __init sha512_mb_mod_init(void)
> -{
> -
> - int cpu;
> - int err;
> - struct mcryptd_alg_cstate *cpu_state;
> -
> - /* check for dependent cpu features */
> - if (!boot_cpu_has(X86_FEATURE_AVX2) ||
> - !boot_cpu_has(X86_FEATURE_BMI2))
> - return -ENODEV;
> -
> - /* initialize multibuffer structures */
> - sha512_mb_alg_state.alg_cstate =
> - alloc_percpu(struct mcryptd_alg_cstate);
> -
> - sha512_job_mgr_init = sha512_mb_mgr_init_avx2;
> - sha512_job_mgr_submit = sha512_mb_mgr_submit_avx2;
> - sha512_job_mgr_flush = sha512_mb_mgr_flush_avx2;
> - sha512_job_mgr_get_comp_job = sha512_mb_mgr_get_comp_job_avx2;
> -
> - if (!sha512_mb_alg_state.alg_cstate)
> - return -ENOMEM;
> - for_each_possible_cpu(cpu) {
> - cpu_state = per_cpu_ptr(sha512_mb_alg_state.alg_cstate, cpu);
> - cpu_state->next_flush = 0;
> - cpu_state->next_seq_num = 0;
> - cpu_state->flusher_engaged = false;
> - INIT_DELAYED_WORK(&cpu_state->flush, mcryptd_flusher);
> - cpu_state->cpu = cpu;
> - cpu_state->alg_state = &sha512_mb_alg_state;
> - cpu_state->mgr = kzalloc(sizeof(struct sha512_ctx_mgr),
> - GFP_KERNEL);
> - if (!cpu_state->mgr)
> - goto err2;
> - sha512_ctx_mgr_init(cpu_state->mgr);
> - INIT_LIST_HEAD(&cpu_state->work_list);
> - spin_lock_init(&cpu_state->work_lock);
> - }
> - sha512_mb_alg_state.flusher = &sha512_mb_flusher;
> -
> - err = crypto_register_ahash(&sha512_mb_areq_alg);
> - if (err)
> - goto err2;
> - err = crypto_register_ahash(&sha512_mb_async_alg);
> - if (err)
> - goto err1;
> -
> -
> - return 0;
> -err1:
> - crypto_unregister_ahash(&sha512_mb_areq_alg);
> -err2:
> - for_each_possible_cpu(cpu) {
> - cpu_state = per_cpu_ptr(sha512_mb_alg_state.alg_cstate, cpu);
> - kfree(cpu_state->mgr);
> - }
> - free_percpu(sha512_mb_alg_state.alg_cstate);
> - return -ENODEV;
> -}
> -
> -static void __exit sha512_mb_mod_fini(void)
> -{
> - int cpu;
> - struct mcryptd_alg_cstate *cpu_state;
> -
> - crypto_unregister_ahash(&sha512_mb_async_alg);
> - crypto_unregister_ahash(&sha512_mb_areq_alg);
> - for_each_possible_cpu(cpu) {
> - cpu_state = per_cpu_ptr(sha512_mb_alg_state.alg_cstate, cpu);
> - kfree(cpu_state->mgr);
> - }
> - free_percpu(sha512_mb_alg_state.alg_cstate);
> -}
> -
> -module_init(sha512_mb_mod_init);
> -module_exit(sha512_mb_mod_fini);
> -
> -MODULE_LICENSE("GPL");
> -MODULE_DESCRIPTION("SHA512 Secure Hash Algorithm, multi buffer accelerated");
> -
> -MODULE_ALIAS("sha512");
> diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_ctx.h b/arch/x86/crypto/sha512-mb/sha512_mb_ctx.h
> deleted file mode 100644
> index e5c465bd821e..000000000000
> --- a/arch/x86/crypto/sha512-mb/sha512_mb_ctx.h
> +++ /dev/null
> @@ -1,128 +0,0 @@
> -/*
> - * Header file for multi buffer SHA512 context
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#ifndef _SHA_MB_CTX_INTERNAL_H
> -#define _SHA_MB_CTX_INTERNAL_H
> -
> -#include "sha512_mb_mgr.h"
> -
> -#define HASH_UPDATE 0x00
> -#define HASH_LAST 0x01
> -#define HASH_DONE 0x02
> -#define HASH_FINAL 0x04
> -
> -#define HASH_CTX_STS_IDLE 0x00
> -#define HASH_CTX_STS_PROCESSING 0x01
> -#define HASH_CTX_STS_LAST 0x02
> -#define HASH_CTX_STS_COMPLETE 0x04
> -
> -enum hash_ctx_error {
> - HASH_CTX_ERROR_NONE = 0,
> - HASH_CTX_ERROR_INVALID_FLAGS = -1,
> - HASH_CTX_ERROR_ALREADY_PROCESSING = -2,
> - HASH_CTX_ERROR_ALREADY_COMPLETED = -3,
> -};
> -
> -#define hash_ctx_user_data(ctx) ((ctx)->user_data)
> -#define hash_ctx_digest(ctx) ((ctx)->job.result_digest)
> -#define hash_ctx_processing(ctx) ((ctx)->status & HASH_CTX_STS_PROCESSING)
> -#define hash_ctx_complete(ctx) ((ctx)->status == HASH_CTX_STS_COMPLETE)
> -#define hash_ctx_status(ctx) ((ctx)->status)
> -#define hash_ctx_error(ctx) ((ctx)->error)
> -#define hash_ctx_init(ctx) \
> - do { \
> - (ctx)->error = HASH_CTX_ERROR_NONE; \
> - (ctx)->status = HASH_CTX_STS_COMPLETE; \
> - } while (0)
> -
> -/* Hash Constants and Typedefs */
> -#define SHA512_DIGEST_LENGTH 8
> -#define SHA512_LOG2_BLOCK_SIZE 7
> -
> -#define SHA512_PADLENGTHFIELD_SIZE 16
> -
> -#ifdef SHA_MB_DEBUG
> -#define assert(expr) \
> -do { \
> - if (unlikely(!(expr))) { \
> - printk(KERN_ERR "Assertion failed! %s,%s,%s,line=%d\n", \
> - #expr, __FILE__, __func__, __LINE__); \
> - } \
> -} while (0)
> -#else
> -#define assert(expr) do {} while (0)
> -#endif
> -
> -struct sha512_ctx_mgr {
> - struct sha512_mb_mgr mgr;
> -};
> -
> -/* typedef struct sha512_ctx_mgr sha512_ctx_mgr; */
> -
> -struct sha512_hash_ctx {
> - /* Must be at struct offset 0 */
> - struct job_sha512 job;
> - /* status flag */
> - int status;
> - /* error flag */
> - int error;
> -
> - uint64_t total_length;
> - const void *incoming_buffer;
> - uint32_t incoming_buffer_length;
> - uint8_t partial_block_buffer[SHA512_BLOCK_SIZE * 2];
> - uint32_t partial_block_buffer_length;
> - void *user_data;
> -};
> -
> -#endif
> diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr.h b/arch/x86/crypto/sha512-mb/sha512_mb_mgr.h
> deleted file mode 100644
> index 178f17eef382..000000000000
> --- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr.h
> +++ /dev/null
> @@ -1,104 +0,0 @@
> -/*
> - * Header file for multi buffer SHA512 algorithm manager
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#ifndef __SHA_MB_MGR_H
> -#define __SHA_MB_MGR_H
> -
> -#include <linux/types.h>
> -
> -#define NUM_SHA512_DIGEST_WORDS 8
> -
> -enum job_sts {STS_UNKNOWN = 0,
> - STS_BEING_PROCESSED = 1,
> - STS_COMPLETED = 2,
> - STS_INTERNAL_ERROR = 3,
> - STS_ERROR = 4
> -};
> -
> -struct job_sha512 {
> - u8 *buffer;
> - u64 len;
> - u64 result_digest[NUM_SHA512_DIGEST_WORDS] __aligned(32);
> - enum job_sts status;
> - void *user_data;
> -};
> -
> -struct sha512_args_x4 {
> - uint64_t digest[8][4];
> - uint8_t *data_ptr[4];
> -};
> -
> -struct sha512_lane_data {
> - struct job_sha512 *job_in_lane;
> -};
> -
> -struct sha512_mb_mgr {
> - struct sha512_args_x4 args;
> -
> - uint64_t lens[4];
> -
> - /* each byte is index (0...7) of unused lanes */
> - uint64_t unused_lanes;
> - /* byte 4 is set to FF as a flag */
> - struct sha512_lane_data ldata[4];
> -};
> -
> -#define SHA512_MB_MGR_NUM_LANES_AVX2 4
> -
> -void sha512_mb_mgr_init_avx2(struct sha512_mb_mgr *state);
> -struct job_sha512 *sha512_mb_mgr_submit_avx2(struct sha512_mb_mgr *state,
> - struct job_sha512 *job);
> -struct job_sha512 *sha512_mb_mgr_flush_avx2(struct sha512_mb_mgr *state);
> -struct job_sha512 *sha512_mb_mgr_get_comp_job_avx2(struct sha512_mb_mgr *state);
> -
> -#endif
> diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S
> deleted file mode 100644
> index cf2636d4c9ba..000000000000
> --- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S
> +++ /dev/null
> @@ -1,281 +0,0 @@
> -/*
> - * Header file for multi buffer SHA256 algorithm data structure
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -# Macros for defining data structures
> -
> -# Usage example
> -
> -#START_FIELDS # JOB_AES
> -### name size align
> -#FIELD _plaintext, 8, 8 # pointer to plaintext
> -#FIELD _ciphertext, 8, 8 # pointer to ciphertext
> -#FIELD _IV, 16, 8 # IV
> -#FIELD _keys, 8, 8 # pointer to keys
> -#FIELD _len, 4, 4 # length in bytes
> -#FIELD _status, 4, 4 # status enumeration
> -#FIELD _user_data, 8, 8 # pointer to user data
> -#UNION _union, size1, align1, \
> -# size2, align2, \
> -# size3, align3, \
> -# ...
> -#END_FIELDS
> -#%assign _JOB_AES_size _FIELD_OFFSET
> -#%assign _JOB_AES_align _STRUCT_ALIGN
> -
> -#########################################################################
> -
> -# Alternate "struc-like" syntax:
> -# STRUCT job_aes2
> -# RES_Q .plaintext, 1
> -# RES_Q .ciphertext, 1
> -# RES_DQ .IV, 1
> -# RES_B .nested, _JOB_AES_SIZE, _JOB_AES_ALIGN
> -# RES_U .union, size1, align1, \
> -# size2, align2, \
> -# ...
> -# ENDSTRUCT
> -# # Following only needed if nesting
> -# %assign job_aes2_size _FIELD_OFFSET
> -# %assign job_aes2_align _STRUCT_ALIGN
> -#
> -# RES_* macros take a name, a count and an optional alignment.
> -# The count in in terms of the base size of the macro, and the
> -# default alignment is the base size.
> -# The macros are:
> -# Macro Base size
> -# RES_B 1
> -# RES_W 2
> -# RES_D 4
> -# RES_Q 8
> -# RES_DQ 16
> -# RES_Y 32
> -# RES_Z 64
> -#
> -# RES_U defines a union. It's arguments are a name and two or more
> -# pairs of "size, alignment"
> -#
> -# The two assigns are only needed if this structure is being nested
> -# within another. Even if the assigns are not done, one can still use
> -# STRUCT_NAME_size as the size of the structure.
> -#
> -# Note that for nesting, you still need to assign to STRUCT_NAME_size.
> -#
> -# The differences between this and using "struc" directly are that each
> -# type is implicitly aligned to its natural length (although this can be
> -# over-ridden with an explicit third parameter), and that the structure
> -# is padded at the end to its overall alignment.
> -#
> -
> -#########################################################################
> -
> -#ifndef _DATASTRUCT_ASM_
> -#define _DATASTRUCT_ASM_
> -
> -#define PTR_SZ 8
> -#define SHA512_DIGEST_WORD_SIZE 8
> -#define SHA512_MB_MGR_NUM_LANES_AVX2 4
> -#define NUM_SHA512_DIGEST_WORDS 8
> -#define SZ4 4*SHA512_DIGEST_WORD_SIZE
> -#define ROUNDS 80*SZ4
> -#define SHA512_DIGEST_ROW_SIZE (SHA512_MB_MGR_NUM_LANES_AVX2 * 8)
> -
> -# START_FIELDS
> -.macro START_FIELDS
> - _FIELD_OFFSET = 0
> - _STRUCT_ALIGN = 0
> -.endm
> -
> -# FIELD name size align
> -.macro FIELD name size align
> - _FIELD_OFFSET = (_FIELD_OFFSET + (\align) - 1) & (~ ((\align)-1))
> - \name = _FIELD_OFFSET
> - _FIELD_OFFSET = _FIELD_OFFSET + (\size)
> -.if (\align > _STRUCT_ALIGN)
> - _STRUCT_ALIGN = \align
> -.endif
> -.endm
> -
> -# END_FIELDS
> -.macro END_FIELDS
> - _FIELD_OFFSET = (_FIELD_OFFSET + _STRUCT_ALIGN-1) & (~ (_STRUCT_ALIGN-1))
> -.endm
> -
> -.macro STRUCT p1
> -START_FIELDS
> -.struc \p1
> -.endm
> -
> -.macro ENDSTRUCT
> - tmp = _FIELD_OFFSET
> - END_FIELDS
> - tmp = (_FIELD_OFFSET - ##tmp)
> -.if (tmp > 0)
> - .lcomm tmp
> -.endm
> -
> -## RES_int name size align
> -.macro RES_int p1 p2 p3
> - name = \p1
> - size = \p2
> - align = .\p3
> -
> - _FIELD_OFFSET = (_FIELD_OFFSET + (align) - 1) & (~ ((align)-1))
> -.align align
> -.lcomm name size
> - _FIELD_OFFSET = _FIELD_OFFSET + (size)
> -.if (align > _STRUCT_ALIGN)
> - _STRUCT_ALIGN = align
> -.endif
> -.endm
> -
> -# macro RES_B name, size [, align]
> -.macro RES_B _name, _size, _align=1
> -RES_int _name _size _align
> -.endm
> -
> -# macro RES_W name, size [, align]
> -.macro RES_W _name, _size, _align=2
> -RES_int _name 2*(_size) _align
> -.endm
> -
> -# macro RES_D name, size [, align]
> -.macro RES_D _name, _size, _align=4
> -RES_int _name 4*(_size) _align
> -.endm
> -
> -# macro RES_Q name, size [, align]
> -.macro RES_Q _name, _size, _align=8
> -RES_int _name 8*(_size) _align
> -.endm
> -
> -# macro RES_DQ name, size [, align]
> -.macro RES_DQ _name, _size, _align=16
> -RES_int _name 16*(_size) _align
> -.endm
> -
> -# macro RES_Y name, size [, align]
> -.macro RES_Y _name, _size, _align=32
> -RES_int _name 32*(_size) _align
> -.endm
> -
> -# macro RES_Z name, size [, align]
> -.macro RES_Z _name, _size, _align=64
> -RES_int _name 64*(_size) _align
> -.endm
> -
> -#endif
> -
> -###################################################################
> -### Define SHA512 Out Of Order Data Structures
> -###################################################################
> -
> -START_FIELDS # LANE_DATA
> -### name size align
> -FIELD _job_in_lane, 8, 8 # pointer to job object
> -END_FIELDS
> -
> - _LANE_DATA_size = _FIELD_OFFSET
> - _LANE_DATA_align = _STRUCT_ALIGN
> -
> -####################################################################
> -
> -START_FIELDS # SHA512_ARGS_X4
> -### name size align
> -FIELD _digest, 8*8*4, 4 # transposed digest
> -FIELD _data_ptr, 8*4, 8 # array of pointers to data
> -END_FIELDS
> -
> - _SHA512_ARGS_X4_size = _FIELD_OFFSET
> - _SHA512_ARGS_X4_align = _STRUCT_ALIGN
> -
> -#####################################################################
> -
> -START_FIELDS # MB_MGR
> -### name size align
> -FIELD _args, _SHA512_ARGS_X4_size, _SHA512_ARGS_X4_align
> -FIELD _lens, 8*4, 8
> -FIELD _unused_lanes, 8, 8
> -FIELD _ldata, _LANE_DATA_size*4, _LANE_DATA_align
> -END_FIELDS
> -
> - _MB_MGR_size = _FIELD_OFFSET
> - _MB_MGR_align = _STRUCT_ALIGN
> -
> -_args_digest = _args + _digest
> -_args_data_ptr = _args + _data_ptr
> -
> -#######################################################################
> -
> -#######################################################################
> -#### Define constants
> -#######################################################################
> -
> -#define STS_UNKNOWN 0
> -#define STS_BEING_PROCESSED 1
> -#define STS_COMPLETED 2
> -
> -#######################################################################
> -#### Define JOB_SHA512 structure
> -#######################################################################
> -
> -START_FIELDS # JOB_SHA512
> -### name size align
> -FIELD _buffer, 8, 8 # pointer to buffer
> -FIELD _len, 8, 8 # length in bytes
> -FIELD _result_digest, 8*8, 32 # Digest (output)
> -FIELD _status, 4, 4
> -FIELD _user_data, 8, 8
> -END_FIELDS
> -
> - _JOB_SHA512_size = _FIELD_OFFSET
> - _JOB_SHA512_align = _STRUCT_ALIGN
> diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S
> deleted file mode 100644
> index 7c629caebc05..000000000000
> --- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S
> +++ /dev/null
> @@ -1,297 +0,0 @@
> -/*
> - * Flush routine for SHA512 multibuffer
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#include <linux/linkage.h>
> -#include <asm/frame.h>
> -#include "sha512_mb_mgr_datastruct.S"
> -
> -.extern sha512_x4_avx2
> -
> -# LINUX register definitions
> -#define arg1 %rdi
> -#define arg2 %rsi
> -
> -# idx needs to be other than arg1, arg2, rbx, r12
> -#define idx %rdx
> -
> -# Common definitions
> -#define state arg1
> -#define job arg2
> -#define len2 arg2
> -
> -#define unused_lanes %rbx
> -#define lane_data %rbx
> -#define tmp2 %rbx
> -
> -#define job_rax %rax
> -#define tmp1 %rax
> -#define size_offset %rax
> -#define tmp %rax
> -#define start_offset %rax
> -
> -#define tmp3 arg1
> -
> -#define extra_blocks arg2
> -#define p arg2
> -
> -#define tmp4 %r8
> -#define lens0 %r8
> -
> -#define lens1 %r9
> -#define lens2 %r10
> -#define lens3 %r11
> -
> -.macro LABEL prefix n
> -\prefix\n\():
> -.endm
> -
> -.macro JNE_SKIP i
> -jne skip_\i
> -.endm
> -
> -.altmacro
> -.macro SET_OFFSET _offset
> -offset = \_offset
> -.endm
> -.noaltmacro
> -
> -# JOB* sha512_mb_mgr_flush_avx2(MB_MGR *state)
> -# arg 1 : rcx : state
> -ENTRY(sha512_mb_mgr_flush_avx2)
> - FRAME_BEGIN
> - push %rbx
> -
> - # If bit (32+3) is set, then all lanes are empty
> - mov _unused_lanes(state), unused_lanes
> - bt $32+7, unused_lanes
> - jc return_null
> -
> - # find a lane with a non-null job
> - xor idx, idx
> - offset = (_ldata + 1*_LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne one(%rip), idx
> - offset = (_ldata + 2*_LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne two(%rip), idx
> - offset = (_ldata + 3*_LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> - cmovne three(%rip), idx
> -
> - # copy idx to empty lanes
> -copy_lane_data:
> - offset = (_args + _data_ptr)
> - mov offset(state,idx,8), tmp
> -
> - I = 0
> -.rep 4
> - offset = (_ldata + I * _LANE_DATA_size + _job_in_lane)
> - cmpq $0, offset(state)
> -.altmacro
> - JNE_SKIP %I
> - offset = (_args + _data_ptr + 8*I)
> - mov tmp, offset(state)
> - offset = (_lens + 8*I +4)
> - movl $0xFFFFFFFF, offset(state)
> -LABEL skip_ %I
> - I = (I+1)
> -.noaltmacro
> -.endr
> -
> - # Find min length
> - mov _lens + 0*8(state),lens0
> - mov lens0,idx
> - mov _lens + 1*8(state),lens1
> - cmp idx,lens1
> - cmovb lens1,idx
> - mov _lens + 2*8(state),lens2
> - cmp idx,lens2
> - cmovb lens2,idx
> - mov _lens + 3*8(state),lens3
> - cmp idx,lens3
> - cmovb lens3,idx
> - mov idx,len2
> - and $0xF,idx
> - and $~0xFF,len2
> - jz len_is_0
> -
> - sub len2, lens0
> - sub len2, lens1
> - sub len2, lens2
> - sub len2, lens3
> - shr $32,len2
> - mov lens0, _lens + 0*8(state)
> - mov lens1, _lens + 1*8(state)
> - mov lens2, _lens + 2*8(state)
> - mov lens3, _lens + 3*8(state)
> -
> - # "state" and "args" are the same address, arg1
> - # len is arg2
> - call sha512_x4_avx2
> - # state and idx are intact
> -
> -len_is_0:
> - # process completed job "idx"
> - imul $_LANE_DATA_size, idx, lane_data
> - lea _ldata(state, lane_data), lane_data
> -
> - mov _job_in_lane(lane_data), job_rax
> - movq $0, _job_in_lane(lane_data)
> - movl $STS_COMPLETED, _status(job_rax)
> - mov _unused_lanes(state), unused_lanes
> - shl $8, unused_lanes
> - or idx, unused_lanes
> - mov unused_lanes, _unused_lanes(state)
> -
> - movl $0xFFFFFFFF, _lens+4(state, idx, 8)
> -
> - vmovq _args_digest+0*32(state, idx, 8), %xmm0
> - vpinsrq $1, _args_digest+1*32(state, idx, 8), %xmm0, %xmm0
> - vmovq _args_digest+2*32(state, idx, 8), %xmm1
> - vpinsrq $1, _args_digest+3*32(state, idx, 8), %xmm1, %xmm1
> - vmovq _args_digest+4*32(state, idx, 8), %xmm2
> - vpinsrq $1, _args_digest+5*32(state, idx, 8), %xmm2, %xmm2
> - vmovq _args_digest+6*32(state, idx, 8), %xmm3
> - vpinsrq $1, _args_digest+7*32(state, idx, 8), %xmm3, %xmm3
> -
> - vmovdqu %xmm0, _result_digest(job_rax)
> - vmovdqu %xmm1, _result_digest+1*16(job_rax)
> - vmovdqu %xmm2, _result_digest+2*16(job_rax)
> - vmovdqu %xmm3, _result_digest+3*16(job_rax)
> -
> -return:
> - pop %rbx
> - FRAME_END
> - ret
> -
> -return_null:
> - xor job_rax, job_rax
> - jmp return
> -ENDPROC(sha512_mb_mgr_flush_avx2)
> -.align 16
> -
> -ENTRY(sha512_mb_mgr_get_comp_job_avx2)
> - push %rbx
> -
> - mov _unused_lanes(state), unused_lanes
> - bt $(32+7), unused_lanes
> - jc .return_null
> -
> - # Find min length
> - mov _lens(state),lens0
> - mov lens0,idx
> - mov _lens+1*8(state),lens1
> - cmp idx,lens1
> - cmovb lens1,idx
> - mov _lens+2*8(state),lens2
> - cmp idx,lens2
> - cmovb lens2,idx
> - mov _lens+3*8(state),lens3
> - cmp idx,lens3
> - cmovb lens3,idx
> - test $~0xF,idx
> - jnz .return_null
> - and $0xF,idx
> -
> - #process completed job "idx"
> - imul $_LANE_DATA_size, idx, lane_data
> - lea _ldata(state, lane_data), lane_data
> -
> - mov _job_in_lane(lane_data), job_rax
> - movq $0, _job_in_lane(lane_data)
> - movl $STS_COMPLETED, _status(job_rax)
> - mov _unused_lanes(state), unused_lanes
> - shl $8, unused_lanes
> - or idx, unused_lanes
> - mov unused_lanes, _unused_lanes(state)
> -
> - movl $0xFFFFFFFF, _lens+4(state, idx, 8)
> -
> - vmovq _args_digest(state, idx, 8), %xmm0
> - vpinsrq $1, _args_digest+1*32(state, idx, 8), %xmm0, %xmm0
> - vmovq _args_digest+2*32(state, idx, 8), %xmm1
> - vpinsrq $1, _args_digest+3*32(state, idx, 8), %xmm1, %xmm1
> - vmovq _args_digest+4*32(state, idx, 8), %xmm2
> - vpinsrq $1, _args_digest+5*32(state, idx, 8), %xmm2, %xmm2
> - vmovq _args_digest+6*32(state, idx, 8), %xmm3
> - vpinsrq $1, _args_digest+7*32(state, idx, 8), %xmm3, %xmm3
> -
> - vmovdqu %xmm0, _result_digest+0*16(job_rax)
> - vmovdqu %xmm1, _result_digest+1*16(job_rax)
> - vmovdqu %xmm2, _result_digest+2*16(job_rax)
> - vmovdqu %xmm3, _result_digest+3*16(job_rax)
> -
> - pop %rbx
> -
> - ret
> -
> -.return_null:
> - xor job_rax, job_rax
> - pop %rbx
> - ret
> -ENDPROC(sha512_mb_mgr_get_comp_job_avx2)
> -
> -.section .rodata.cst8.one, "aM", @progbits, 8
> -.align 8
> -one:
> -.quad 1
> -
> -.section .rodata.cst8.two, "aM", @progbits, 8
> -.align 8
> -two:
> -.quad 2
> -
> -.section .rodata.cst8.three, "aM", @progbits, 8
> -.align 8
> -three:
> -.quad 3
> diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c
> deleted file mode 100644
> index d08805032f01..000000000000
> --- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c
> +++ /dev/null
> @@ -1,69 +0,0 @@
> -/*
> - * Initialization code for multi buffer SHA256 algorithm for AVX2
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#include "sha512_mb_mgr.h"
> -
> -void sha512_mb_mgr_init_avx2(struct sha512_mb_mgr *state)
> -{
> - unsigned int j;
> -
> - /* initially all lanes are unused */
> - state->lens[0] = 0xFFFFFFFF00000000;
> - state->lens[1] = 0xFFFFFFFF00000001;
> - state->lens[2] = 0xFFFFFFFF00000002;
> - state->lens[3] = 0xFFFFFFFF00000003;
> -
> - state->unused_lanes = 0xFF03020100;
> - for (j = 0; j < 4; j++)
> - state->ldata[j].job_in_lane = NULL;
> -}
> diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S
> deleted file mode 100644
> index 4ba709ba78e5..000000000000
> --- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S
> +++ /dev/null
> @@ -1,224 +0,0 @@
> -/*
> - * Buffer submit code for multi buffer SHA512 algorithm
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -#include <linux/linkage.h>
> -#include <asm/frame.h>
> -#include "sha512_mb_mgr_datastruct.S"
> -
> -.extern sha512_x4_avx2
> -
> -#define arg1 %rdi
> -#define arg2 %rsi
> -
> -#define idx %rdx
> -#define last_len %rdx
> -
> -#define size_offset %rcx
> -#define tmp2 %rcx
> -
> -# Common definitions
> -#define state arg1
> -#define job arg2
> -#define len2 arg2
> -#define p2 arg2
> -
> -#define p %r11
> -#define start_offset %r11
> -
> -#define unused_lanes %rbx
> -
> -#define job_rax %rax
> -#define len %rax
> -
> -#define lane %r12
> -#define tmp3 %r12
> -#define lens3 %r12
> -
> -#define extra_blocks %r8
> -#define lens0 %r8
> -
> -#define tmp %r9
> -#define lens1 %r9
> -
> -#define lane_data %r10
> -#define lens2 %r10
> -
> -#define DWORD_len %eax
> -
> -# JOB* sha512_mb_mgr_submit_avx2(MB_MGR *state, JOB *job)
> -# arg 1 : rcx : state
> -# arg 2 : rdx : job
> -ENTRY(sha512_mb_mgr_submit_avx2)
> - FRAME_BEGIN
> - push %rbx
> - push %r12
> -
> - mov _unused_lanes(state), unused_lanes
> - movzb %bl,lane
> - shr $8, unused_lanes
> - imul $_LANE_DATA_size, lane,lane_data
> - movl $STS_BEING_PROCESSED, _status(job)
> - lea _ldata(state, lane_data), lane_data
> - mov unused_lanes, _unused_lanes(state)
> - movl _len(job), DWORD_len
> -
> - mov job, _job_in_lane(lane_data)
> - movl DWORD_len,_lens+4(state , lane, 8)
> -
> - # Load digest words from result_digest
> - vmovdqu _result_digest+0*16(job), %xmm0
> - vmovdqu _result_digest+1*16(job), %xmm1
> - vmovdqu _result_digest+2*16(job), %xmm2
> - vmovdqu _result_digest+3*16(job), %xmm3
> -
> - vmovq %xmm0, _args_digest(state, lane, 8)
> - vpextrq $1, %xmm0, _args_digest+1*32(state , lane, 8)
> - vmovq %xmm1, _args_digest+2*32(state , lane, 8)
> - vpextrq $1, %xmm1, _args_digest+3*32(state , lane, 8)
> - vmovq %xmm2, _args_digest+4*32(state , lane, 8)
> - vpextrq $1, %xmm2, _args_digest+5*32(state , lane, 8)
> - vmovq %xmm3, _args_digest+6*32(state , lane, 8)
> - vpextrq $1, %xmm3, _args_digest+7*32(state , lane, 8)
> -
> - mov _buffer(job), p
> - mov p, _args_data_ptr(state, lane, 8)
> -
> - cmp $0xFF, unused_lanes
> - jne return_null
> -
> -start_loop:
> -
> - # Find min length
> - mov _lens+0*8(state),lens0
> - mov lens0,idx
> - mov _lens+1*8(state),lens1
> - cmp idx,lens1
> - cmovb lens1, idx
> - mov _lens+2*8(state),lens2
> - cmp idx,lens2
> - cmovb lens2,idx
> - mov _lens+3*8(state),lens3
> - cmp idx,lens3
> - cmovb lens3,idx
> - mov idx,len2
> - and $0xF,idx
> - and $~0xFF,len2
> - jz len_is_0
> -
> - sub len2,lens0
> - sub len2,lens1
> - sub len2,lens2
> - sub len2,lens3
> - shr $32,len2
> - mov lens0, _lens + 0*8(state)
> - mov lens1, _lens + 1*8(state)
> - mov lens2, _lens + 2*8(state)
> - mov lens3, _lens + 3*8(state)
> -
> - # "state" and "args" are the same address, arg1
> - # len is arg2
> - call sha512_x4_avx2
> - # state and idx are intact
> -
> -len_is_0:
> -
> - # process completed job "idx"
> - imul $_LANE_DATA_size, idx, lane_data
> - lea _ldata(state, lane_data), lane_data
> -
> - mov _job_in_lane(lane_data), job_rax
> - mov _unused_lanes(state), unused_lanes
> - movq $0, _job_in_lane(lane_data)
> - movl $STS_COMPLETED, _status(job_rax)
> - shl $8, unused_lanes
> - or idx, unused_lanes
> - mov unused_lanes, _unused_lanes(state)
> -
> - movl $0xFFFFFFFF,_lens+4(state,idx,8)
> - vmovq _args_digest+0*32(state , idx, 8), %xmm0
> - vpinsrq $1, _args_digest+1*32(state , idx, 8), %xmm0, %xmm0
> - vmovq _args_digest+2*32(state , idx, 8), %xmm1
> - vpinsrq $1, _args_digest+3*32(state , idx, 8), %xmm1, %xmm1
> - vmovq _args_digest+4*32(state , idx, 8), %xmm2
> - vpinsrq $1, _args_digest+5*32(state , idx, 8), %xmm2, %xmm2
> - vmovq _args_digest+6*32(state , idx, 8), %xmm3
> - vpinsrq $1, _args_digest+7*32(state , idx, 8), %xmm3, %xmm3
> -
> - vmovdqu %xmm0, _result_digest + 0*16(job_rax)
> - vmovdqu %xmm1, _result_digest + 1*16(job_rax)
> - vmovdqu %xmm2, _result_digest + 2*16(job_rax)
> - vmovdqu %xmm3, _result_digest + 3*16(job_rax)
> -
> -return:
> - pop %r12
> - pop %rbx
> - FRAME_END
> - ret
> -
> -return_null:
> - xor job_rax, job_rax
> - jmp return
> -ENDPROC(sha512_mb_mgr_submit_avx2)
> -
> -/* UNUSED?
> -.section .rodata.cst16, "aM", @progbits, 16
> -.align 16
> -H0: .int 0x6a09e667
> -H1: .int 0xbb67ae85
> -H2: .int 0x3c6ef372
> -H3: .int 0xa54ff53a
> -H4: .int 0x510e527f
> -H5: .int 0x9b05688c
> -H6: .int 0x1f83d9ab
> -H7: .int 0x5be0cd19
> -*/
> diff --git a/arch/x86/crypto/sha512-mb/sha512_x4_avx2.S b/arch/x86/crypto/sha512-mb/sha512_x4_avx2.S
> deleted file mode 100644
> index e22e907643a6..000000000000
> --- a/arch/x86/crypto/sha512-mb/sha512_x4_avx2.S
> +++ /dev/null
> @@ -1,531 +0,0 @@
> -/*
> - * Multi-buffer SHA512 algorithm hash compute routine
> - *
> - * This file is provided under a dual BSD/GPLv2 license. When using or
> - * redistributing this file, you may do so under either license.
> - *
> - * GPL LICENSE SUMMARY
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * This program is free software; you can redistribute it and/or modify
> - * it under the terms of version 2 of the GNU General Public License as
> - * published by the Free Software Foundation.
> - *
> - * This program is distributed in the hope that it will be useful, but
> - * WITHOUT ANY WARRANTY; without even the implied warranty of
> - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - * General Public License for more details.
> - *
> - * Contact Information:
> - * Megha Dey <[email protected]>
> - *
> - * BSD LICENSE
> - *
> - * Copyright(c) 2016 Intel Corporation.
> - *
> - * Redistribution and use in source and binary forms, with or without
> - * modification, are permitted provided that the following conditions
> - * are met:
> - *
> - * * Redistributions of source code must retain the above copyright
> - * notice, this list of conditions and the following disclaimer.
> - * * Redistributions in binary form must reproduce the above copyright
> - * notice, this list of conditions and the following disclaimer in
> - * the documentation and/or other materials provided with the
> - * distribution.
> - * * Neither the name of Intel Corporation nor the names of its
> - * contributors may be used to endorse or promote products derived
> - * from this software without specific prior written permission.
> - *
> - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> - */
> -
> -# code to compute quad SHA512 using AVX2
> -# use YMMs to tackle the larger digest size
> -# outer calling routine takes care of save and restore of XMM registers
> -# Logic designed/laid out by JDG
> -
> -# Function clobbers: rax, rcx, rdx, rbx, rsi, rdi, r9-r15; ymm0-15
> -# Stack must be aligned to 32 bytes before call
> -# Linux clobbers: rax rbx rcx rsi r8 r9 r10 r11 r12
> -# Linux preserves: rcx rdx rdi rbp r13 r14 r15
> -# clobbers ymm0-15
> -
> -#include <linux/linkage.h>
> -#include "sha512_mb_mgr_datastruct.S"
> -
> -arg1 = %rdi
> -arg2 = %rsi
> -
> -# Common definitions
> -STATE = arg1
> -INP_SIZE = arg2
> -
> -IDX = %rax
> -ROUND = %rbx
> -TBL = %r8
> -
> -inp0 = %r9
> -inp1 = %r10
> -inp2 = %r11
> -inp3 = %r12
> -
> -a = %ymm0
> -b = %ymm1
> -c = %ymm2
> -d = %ymm3
> -e = %ymm4
> -f = %ymm5
> -g = %ymm6
> -h = %ymm7
> -
> -a0 = %ymm8
> -a1 = %ymm9
> -a2 = %ymm10
> -
> -TT0 = %ymm14
> -TT1 = %ymm13
> -TT2 = %ymm12
> -TT3 = %ymm11
> -TT4 = %ymm10
> -TT5 = %ymm9
> -
> -T1 = %ymm14
> -TMP = %ymm15
> -
> -# Define stack usage
> -STACK_SPACE1 = SZ4*16 + NUM_SHA512_DIGEST_WORDS*SZ4 + 24
> -
> -#define VMOVPD vmovupd
> -_digest = SZ4*16
> -
> -# transpose r0, r1, r2, r3, t0, t1
> -# "transpose" data in {r0..r3} using temps {t0..t3}
> -# Input looks like: {r0 r1 r2 r3}
> -# r0 = {a7 a6 a5 a4 a3 a2 a1 a0}
> -# r1 = {b7 b6 b5 b4 b3 b2 b1 b0}
> -# r2 = {c7 c6 c5 c4 c3 c2 c1 c0}
> -# r3 = {d7 d6 d5 d4 d3 d2 d1 d0}
> -#
> -# output looks like: {t0 r1 r0 r3}
> -# t0 = {d1 d0 c1 c0 b1 b0 a1 a0}
> -# r1 = {d3 d2 c3 c2 b3 b2 a3 a2}
> -# r0 = {d5 d4 c5 c4 b5 b4 a5 a4}
> -# r3 = {d7 d6 c7 c6 b7 b6 a7 a6}
> -
> -.macro TRANSPOSE r0 r1 r2 r3 t0 t1
> - vshufps $0x44, \r1, \r0, \t0 # t0 = {b5 b4 a5 a4 b1 b0 a1 a0}
> - vshufps $0xEE, \r1, \r0, \r0 # r0 = {b7 b6 a7 a6 b3 b2 a3 a2}
> - vshufps $0x44, \r3, \r2, \t1 # t1 = {d5 d4 c5 c4 d1 d0 c1 c0}
> - vshufps $0xEE, \r3, \r2, \r2 # r2 = {d7 d6 c7 c6 d3 d2 c3 c2}
> -
> - vperm2f128 $0x20, \r2, \r0, \r1 # h6...a6
> - vperm2f128 $0x31, \r2, \r0, \r3 # h2...a2
> - vperm2f128 $0x31, \t1, \t0, \r0 # h5...a5
> - vperm2f128 $0x20, \t1, \t0, \t0 # h1...a1
> -.endm
> -
> -.macro ROTATE_ARGS
> -TMP_ = h
> -h = g
> -g = f
> -f = e
> -e = d
> -d = c
> -c = b
> -b = a
> -a = TMP_
> -.endm
> -
> -# PRORQ reg, imm, tmp
> -# packed-rotate-right-double
> -# does a rotate by doing two shifts and an or
> -.macro _PRORQ reg imm tmp
> - vpsllq $(64-\imm),\reg,\tmp
> - vpsrlq $\imm,\reg, \reg
> - vpor \tmp,\reg, \reg
> -.endm
> -
> -# non-destructive
> -# PRORQ_nd reg, imm, tmp, src
> -.macro _PRORQ_nd reg imm tmp src
> - vpsllq $(64-\imm), \src, \tmp
> - vpsrlq $\imm, \src, \reg
> - vpor \tmp, \reg, \reg
> -.endm
> -
> -# PRORQ dst/src, amt
> -.macro PRORQ reg imm
> - _PRORQ \reg, \imm, TMP
> -.endm
> -
> -# PRORQ_nd dst, src, amt
> -.macro PRORQ_nd reg tmp imm
> - _PRORQ_nd \reg, \imm, TMP, \tmp
> -.endm
> -
> -#; arguments passed implicitly in preprocessor symbols i, a...h
> -.macro ROUND_00_15 _T1 i
> - PRORQ_nd a0, e, (18-14) # sig1: a0 = (e >> 4)
> -
> - vpxor g, f, a2 # ch: a2 = f^g
> - vpand e,a2, a2 # ch: a2 = (f^g)&e
> - vpxor g, a2, a2 # a2 = ch
> -
> - PRORQ_nd a1,e,41 # sig1: a1 = (e >> 25)
> -
> - offset = SZ4*(\i & 0xf)
> - vmovdqu \_T1,offset(%rsp)
> - vpaddq (TBL,ROUND,1), \_T1, \_T1 # T1 = W + K
> - vpxor e,a0, a0 # sig1: a0 = e ^ (e >> 5)
> - PRORQ a0, 14 # sig1: a0 = (e >> 6) ^ (e >> 11)
> - vpaddq a2, h, h # h = h + ch
> - PRORQ_nd a2,a,6 # sig0: a2 = (a >> 11)
> - vpaddq \_T1,h, h # h = h + ch + W + K
> - vpxor a1, a0, a0 # a0 = sigma1
> - vmovdqu a,\_T1
> - PRORQ_nd a1,a,39 # sig0: a1 = (a >> 22)
> - vpxor c, \_T1, \_T1 # maj: T1 = a^c
> - add $SZ4, ROUND # ROUND++
> - vpand b, \_T1, \_T1 # maj: T1 = (a^c)&b
> - vpaddq a0, h, h
> - vpaddq h, d, d
> - vpxor a, a2, a2 # sig0: a2 = a ^ (a >> 11)
> - PRORQ a2,28 # sig0: a2 = (a >> 2) ^ (a >> 13)
> - vpxor a1, a2, a2 # a2 = sig0
> - vpand c, a, a1 # maj: a1 = a&c
> - vpor \_T1, a1, a1 # a1 = maj
> - vpaddq a1, h, h # h = h + ch + W + K + maj
> - vpaddq a2, h, h # h = h + ch + W + K + maj + sigma0
> - ROTATE_ARGS
> -.endm
> -
> -
> -#; arguments passed implicitly in preprocessor symbols i, a...h
> -.macro ROUND_16_XX _T1 i
> - vmovdqu SZ4*((\i-15)&0xf)(%rsp), \_T1
> - vmovdqu SZ4*((\i-2)&0xf)(%rsp), a1
> - vmovdqu \_T1, a0
> - PRORQ \_T1,7
> - vmovdqu a1, a2
> - PRORQ a1,42
> - vpxor a0, \_T1, \_T1
> - PRORQ \_T1, 1
> - vpxor a2, a1, a1
> - PRORQ a1, 19
> - vpsrlq $7, a0, a0
> - vpxor a0, \_T1, \_T1
> - vpsrlq $6, a2, a2
> - vpxor a2, a1, a1
> - vpaddq SZ4*((\i-16)&0xf)(%rsp), \_T1, \_T1
> - vpaddq SZ4*((\i-7)&0xf)(%rsp), a1, a1
> - vpaddq a1, \_T1, \_T1
> -
> - ROUND_00_15 \_T1,\i
> -.endm
> -
> -
> -# void sha512_x4_avx2(void *STATE, const int INP_SIZE)
> -# arg 1 : STATE : pointer to input data
> -# arg 2 : INP_SIZE : size of data in blocks (assumed >= 1)
> -ENTRY(sha512_x4_avx2)
> - # general registers preserved in outer calling routine
> - # outer calling routine saves all the XMM registers
> - # save callee-saved clobbered registers to comply with C function ABI
> - push %r12
> - push %r13
> - push %r14
> - push %r15
> -
> - sub $STACK_SPACE1, %rsp
> -
> - # Load the pre-transposed incoming digest.
> - vmovdqu 0*SHA512_DIGEST_ROW_SIZE(STATE),a
> - vmovdqu 1*SHA512_DIGEST_ROW_SIZE(STATE),b
> - vmovdqu 2*SHA512_DIGEST_ROW_SIZE(STATE),c
> - vmovdqu 3*SHA512_DIGEST_ROW_SIZE(STATE),d
> - vmovdqu 4*SHA512_DIGEST_ROW_SIZE(STATE),e
> - vmovdqu 5*SHA512_DIGEST_ROW_SIZE(STATE),f
> - vmovdqu 6*SHA512_DIGEST_ROW_SIZE(STATE),g
> - vmovdqu 7*SHA512_DIGEST_ROW_SIZE(STATE),h
> -
> - lea K512_4(%rip),TBL
> -
> - # load the address of each of the 4 message lanes
> - # getting ready to transpose input onto stack
> - mov _data_ptr+0*PTR_SZ(STATE),inp0
> - mov _data_ptr+1*PTR_SZ(STATE),inp1
> - mov _data_ptr+2*PTR_SZ(STATE),inp2
> - mov _data_ptr+3*PTR_SZ(STATE),inp3
> -
> - xor IDX, IDX
> -lloop:
> - xor ROUND, ROUND
> -
> - # save old digest
> - vmovdqu a, _digest(%rsp)
> - vmovdqu b, _digest+1*SZ4(%rsp)
> - vmovdqu c, _digest+2*SZ4(%rsp)
> - vmovdqu d, _digest+3*SZ4(%rsp)
> - vmovdqu e, _digest+4*SZ4(%rsp)
> - vmovdqu f, _digest+5*SZ4(%rsp)
> - vmovdqu g, _digest+6*SZ4(%rsp)
> - vmovdqu h, _digest+7*SZ4(%rsp)
> - i = 0
> -.rep 4
> - vmovdqu PSHUFFLE_BYTE_FLIP_MASK(%rip), TMP
> - VMOVPD i*32(inp0, IDX), TT2
> - VMOVPD i*32(inp1, IDX), TT1
> - VMOVPD i*32(inp2, IDX), TT4
> - VMOVPD i*32(inp3, IDX), TT3
> - TRANSPOSE TT2, TT1, TT4, TT3, TT0, TT5
> - vpshufb TMP, TT0, TT0
> - vpshufb TMP, TT1, TT1
> - vpshufb TMP, TT2, TT2
> - vpshufb TMP, TT3, TT3
> - ROUND_00_15 TT0,(i*4+0)
> - ROUND_00_15 TT1,(i*4+1)
> - ROUND_00_15 TT2,(i*4+2)
> - ROUND_00_15 TT3,(i*4+3)
> - i = (i+1)
> -.endr
> - add $128, IDX
> -
> - i = (i*4)
> -
> - jmp Lrounds_16_xx
> -.align 16
> -Lrounds_16_xx:
> -.rep 16
> - ROUND_16_XX T1, i
> - i = (i+1)
> -.endr
> - cmp $0xa00,ROUND
> - jb Lrounds_16_xx
> -
> - # add old digest
> - vpaddq _digest(%rsp), a, a
> - vpaddq _digest+1*SZ4(%rsp), b, b
> - vpaddq _digest+2*SZ4(%rsp), c, c
> - vpaddq _digest+3*SZ4(%rsp), d, d
> - vpaddq _digest+4*SZ4(%rsp), e, e
> - vpaddq _digest+5*SZ4(%rsp), f, f
> - vpaddq _digest+6*SZ4(%rsp), g, g
> - vpaddq _digest+7*SZ4(%rsp), h, h
> -
> - sub $1, INP_SIZE # unit is blocks
> - jne lloop
> -
> - # write back to memory (state object) the transposed digest
> - vmovdqu a, 0*SHA512_DIGEST_ROW_SIZE(STATE)
> - vmovdqu b, 1*SHA512_DIGEST_ROW_SIZE(STATE)
> - vmovdqu c, 2*SHA512_DIGEST_ROW_SIZE(STATE)
> - vmovdqu d, 3*SHA512_DIGEST_ROW_SIZE(STATE)
> - vmovdqu e, 4*SHA512_DIGEST_ROW_SIZE(STATE)
> - vmovdqu f, 5*SHA512_DIGEST_ROW_SIZE(STATE)
> - vmovdqu g, 6*SHA512_DIGEST_ROW_SIZE(STATE)
> - vmovdqu h, 7*SHA512_DIGEST_ROW_SIZE(STATE)
> -
> - # update input data pointers
> - add IDX, inp0
> - mov inp0, _data_ptr+0*PTR_SZ(STATE)
> - add IDX, inp1
> - mov inp1, _data_ptr+1*PTR_SZ(STATE)
> - add IDX, inp2
> - mov inp2, _data_ptr+2*PTR_SZ(STATE)
> - add IDX, inp3
> - mov inp3, _data_ptr+3*PTR_SZ(STATE)
> -
> - #;;;;;;;;;;;;;;;
> - #; Postamble
> - add $STACK_SPACE1, %rsp
> - # restore callee-saved clobbered registers
> -
> - pop %r15
> - pop %r14
> - pop %r13
> - pop %r12
> -
> - # outer calling routine restores XMM and other GP registers
> - ret
> -ENDPROC(sha512_x4_avx2)
> -
> -.section .rodata.K512_4, "a", @progbits
> -.align 64
> -K512_4:
> - .octa 0x428a2f98d728ae22428a2f98d728ae22,\
> - 0x428a2f98d728ae22428a2f98d728ae22
> - .octa 0x7137449123ef65cd7137449123ef65cd,\
> - 0x7137449123ef65cd7137449123ef65cd
> - .octa 0xb5c0fbcfec4d3b2fb5c0fbcfec4d3b2f,\
> - 0xb5c0fbcfec4d3b2fb5c0fbcfec4d3b2f
> - .octa 0xe9b5dba58189dbbce9b5dba58189dbbc,\
> - 0xe9b5dba58189dbbce9b5dba58189dbbc
> - .octa 0x3956c25bf348b5383956c25bf348b538,\
> - 0x3956c25bf348b5383956c25bf348b538
> - .octa 0x59f111f1b605d01959f111f1b605d019,\
> - 0x59f111f1b605d01959f111f1b605d019
> - .octa 0x923f82a4af194f9b923f82a4af194f9b,\
> - 0x923f82a4af194f9b923f82a4af194f9b
> - .octa 0xab1c5ed5da6d8118ab1c5ed5da6d8118,\
> - 0xab1c5ed5da6d8118ab1c5ed5da6d8118
> - .octa 0xd807aa98a3030242d807aa98a3030242,\
> - 0xd807aa98a3030242d807aa98a3030242
> - .octa 0x12835b0145706fbe12835b0145706fbe,\
> - 0x12835b0145706fbe12835b0145706fbe
> - .octa 0x243185be4ee4b28c243185be4ee4b28c,\
> - 0x243185be4ee4b28c243185be4ee4b28c
> - .octa 0x550c7dc3d5ffb4e2550c7dc3d5ffb4e2,\
> - 0x550c7dc3d5ffb4e2550c7dc3d5ffb4e2
> - .octa 0x72be5d74f27b896f72be5d74f27b896f,\
> - 0x72be5d74f27b896f72be5d74f27b896f
> - .octa 0x80deb1fe3b1696b180deb1fe3b1696b1,\
> - 0x80deb1fe3b1696b180deb1fe3b1696b1
> - .octa 0x9bdc06a725c712359bdc06a725c71235,\
> - 0x9bdc06a725c712359bdc06a725c71235
> - .octa 0xc19bf174cf692694c19bf174cf692694,\
> - 0xc19bf174cf692694c19bf174cf692694
> - .octa 0xe49b69c19ef14ad2e49b69c19ef14ad2,\
> - 0xe49b69c19ef14ad2e49b69c19ef14ad2
> - .octa 0xefbe4786384f25e3efbe4786384f25e3,\
> - 0xefbe4786384f25e3efbe4786384f25e3
> - .octa 0x0fc19dc68b8cd5b50fc19dc68b8cd5b5,\
> - 0x0fc19dc68b8cd5b50fc19dc68b8cd5b5
> - .octa 0x240ca1cc77ac9c65240ca1cc77ac9c65,\
> - 0x240ca1cc77ac9c65240ca1cc77ac9c65
> - .octa 0x2de92c6f592b02752de92c6f592b0275,\
> - 0x2de92c6f592b02752de92c6f592b0275
> - .octa 0x4a7484aa6ea6e4834a7484aa6ea6e483,\
> - 0x4a7484aa6ea6e4834a7484aa6ea6e483
> - .octa 0x5cb0a9dcbd41fbd45cb0a9dcbd41fbd4,\
> - 0x5cb0a9dcbd41fbd45cb0a9dcbd41fbd4
> - .octa 0x76f988da831153b576f988da831153b5,\
> - 0x76f988da831153b576f988da831153b5
> - .octa 0x983e5152ee66dfab983e5152ee66dfab,\
> - 0x983e5152ee66dfab983e5152ee66dfab
> - .octa 0xa831c66d2db43210a831c66d2db43210,\
> - 0xa831c66d2db43210a831c66d2db43210
> - .octa 0xb00327c898fb213fb00327c898fb213f,\
> - 0xb00327c898fb213fb00327c898fb213f
> - .octa 0xbf597fc7beef0ee4bf597fc7beef0ee4,\
> - 0xbf597fc7beef0ee4bf597fc7beef0ee4
> - .octa 0xc6e00bf33da88fc2c6e00bf33da88fc2,\
> - 0xc6e00bf33da88fc2c6e00bf33da88fc2
> - .octa 0xd5a79147930aa725d5a79147930aa725,\
> - 0xd5a79147930aa725d5a79147930aa725
> - .octa 0x06ca6351e003826f06ca6351e003826f,\
> - 0x06ca6351e003826f06ca6351e003826f
> - .octa 0x142929670a0e6e70142929670a0e6e70,\
> - 0x142929670a0e6e70142929670a0e6e70
> - .octa 0x27b70a8546d22ffc27b70a8546d22ffc,\
> - 0x27b70a8546d22ffc27b70a8546d22ffc
> - .octa 0x2e1b21385c26c9262e1b21385c26c926,\
> - 0x2e1b21385c26c9262e1b21385c26c926
> - .octa 0x4d2c6dfc5ac42aed4d2c6dfc5ac42aed,\
> - 0x4d2c6dfc5ac42aed4d2c6dfc5ac42aed
> - .octa 0x53380d139d95b3df53380d139d95b3df,\
> - 0x53380d139d95b3df53380d139d95b3df
> - .octa 0x650a73548baf63de650a73548baf63de,\
> - 0x650a73548baf63de650a73548baf63de
> - .octa 0x766a0abb3c77b2a8766a0abb3c77b2a8,\
> - 0x766a0abb3c77b2a8766a0abb3c77b2a8
> - .octa 0x81c2c92e47edaee681c2c92e47edaee6,\
> - 0x81c2c92e47edaee681c2c92e47edaee6
> - .octa 0x92722c851482353b92722c851482353b,\
> - 0x92722c851482353b92722c851482353b
> - .octa 0xa2bfe8a14cf10364a2bfe8a14cf10364,\
> - 0xa2bfe8a14cf10364a2bfe8a14cf10364
> - .octa 0xa81a664bbc423001a81a664bbc423001,\
> - 0xa81a664bbc423001a81a664bbc423001
> - .octa 0xc24b8b70d0f89791c24b8b70d0f89791,\
> - 0xc24b8b70d0f89791c24b8b70d0f89791
> - .octa 0xc76c51a30654be30c76c51a30654be30,\
> - 0xc76c51a30654be30c76c51a30654be30
> - .octa 0xd192e819d6ef5218d192e819d6ef5218,\
> - 0xd192e819d6ef5218d192e819d6ef5218
> - .octa 0xd69906245565a910d69906245565a910,\
> - 0xd69906245565a910d69906245565a910
> - .octa 0xf40e35855771202af40e35855771202a,\
> - 0xf40e35855771202af40e35855771202a
> - .octa 0x106aa07032bbd1b8106aa07032bbd1b8,\
> - 0x106aa07032bbd1b8106aa07032bbd1b8
> - .octa 0x19a4c116b8d2d0c819a4c116b8d2d0c8,\
> - 0x19a4c116b8d2d0c819a4c116b8d2d0c8
> - .octa 0x1e376c085141ab531e376c085141ab53,\
> - 0x1e376c085141ab531e376c085141ab53
> - .octa 0x2748774cdf8eeb992748774cdf8eeb99,\
> - 0x2748774cdf8eeb992748774cdf8eeb99
> - .octa 0x34b0bcb5e19b48a834b0bcb5e19b48a8,\
> - 0x34b0bcb5e19b48a834b0bcb5e19b48a8
> - .octa 0x391c0cb3c5c95a63391c0cb3c5c95a63,\
> - 0x391c0cb3c5c95a63391c0cb3c5c95a63
> - .octa 0x4ed8aa4ae3418acb4ed8aa4ae3418acb,\
> - 0x4ed8aa4ae3418acb4ed8aa4ae3418acb
> - .octa 0x5b9cca4f7763e3735b9cca4f7763e373,\
> - 0x5b9cca4f7763e3735b9cca4f7763e373
> - .octa 0x682e6ff3d6b2b8a3682e6ff3d6b2b8a3,\
> - 0x682e6ff3d6b2b8a3682e6ff3d6b2b8a3
> - .octa 0x748f82ee5defb2fc748f82ee5defb2fc,\
> - 0x748f82ee5defb2fc748f82ee5defb2fc
> - .octa 0x78a5636f43172f6078a5636f43172f60,\
> - 0x78a5636f43172f6078a5636f43172f60
> - .octa 0x84c87814a1f0ab7284c87814a1f0ab72,\
> - 0x84c87814a1f0ab7284c87814a1f0ab72
> - .octa 0x8cc702081a6439ec8cc702081a6439ec,\
> - 0x8cc702081a6439ec8cc702081a6439ec
> - .octa 0x90befffa23631e2890befffa23631e28,\
> - 0x90befffa23631e2890befffa23631e28
> - .octa 0xa4506cebde82bde9a4506cebde82bde9,\
> - 0xa4506cebde82bde9a4506cebde82bde9
> - .octa 0xbef9a3f7b2c67915bef9a3f7b2c67915,\
> - 0xbef9a3f7b2c67915bef9a3f7b2c67915
> - .octa 0xc67178f2e372532bc67178f2e372532b,\
> - 0xc67178f2e372532bc67178f2e372532b
> - .octa 0xca273eceea26619cca273eceea26619c,\
> - 0xca273eceea26619cca273eceea26619c
> - .octa 0xd186b8c721c0c207d186b8c721c0c207,\
> - 0xd186b8c721c0c207d186b8c721c0c207
> - .octa 0xeada7dd6cde0eb1eeada7dd6cde0eb1e,\
> - 0xeada7dd6cde0eb1eeada7dd6cde0eb1e
> - .octa 0xf57d4f7fee6ed178f57d4f7fee6ed178,\
> - 0xf57d4f7fee6ed178f57d4f7fee6ed178
> - .octa 0x06f067aa72176fba06f067aa72176fba,\
> - 0x06f067aa72176fba06f067aa72176fba
> - .octa 0x0a637dc5a2c898a60a637dc5a2c898a6,\
> - 0x0a637dc5a2c898a60a637dc5a2c898a6
> - .octa 0x113f9804bef90dae113f9804bef90dae,\
> - 0x113f9804bef90dae113f9804bef90dae
> - .octa 0x1b710b35131c471b1b710b35131c471b,\
> - 0x1b710b35131c471b1b710b35131c471b
> - .octa 0x28db77f523047d8428db77f523047d84,\
> - 0x28db77f523047d8428db77f523047d84
> - .octa 0x32caab7b40c7249332caab7b40c72493,\
> - 0x32caab7b40c7249332caab7b40c72493
> - .octa 0x3c9ebe0a15c9bebc3c9ebe0a15c9bebc,\
> - 0x3c9ebe0a15c9bebc3c9ebe0a15c9bebc
> - .octa 0x431d67c49c100d4c431d67c49c100d4c,\
> - 0x431d67c49c100d4c431d67c49c100d4c
> - .octa 0x4cc5d4becb3e42b64cc5d4becb3e42b6,\
> - 0x4cc5d4becb3e42b64cc5d4becb3e42b6
> - .octa 0x597f299cfc657e2a597f299cfc657e2a,\
> - 0x597f299cfc657e2a597f299cfc657e2a
> - .octa 0x5fcb6fab3ad6faec5fcb6fab3ad6faec,\
> - 0x5fcb6fab3ad6faec5fcb6fab3ad6faec
> - .octa 0x6c44198c4a4758176c44198c4a475817,\
> - 0x6c44198c4a4758176c44198c4a475817
> -
> -.section .rodata.cst32.PSHUFFLE_BYTE_FLIP_MASK, "aM", @progbits, 32
> -.align 32
> -PSHUFFLE_BYTE_FLIP_MASK: .octa 0x08090a0b0c0d0e0f0001020304050607
> - .octa 0x18191a1b1c1d1e1f1011121314151617
> diff --git a/crypto/Kconfig b/crypto/Kconfig
> index f3e40ac56d93..4ee600bdefdb 100644
> --- a/crypto/Kconfig
> +++ b/crypto/Kconfig
> @@ -213,20 +213,6 @@ config CRYPTO_CRYPTD
> converts an arbitrary synchronous software crypto algorithm
> into an asynchronous algorithm that executes in a kernel thread.
>
> -config CRYPTO_MCRYPTD
> - tristate "Software async multi-buffer crypto daemon"
> - select CRYPTO_BLKCIPHER
> - select CRYPTO_HASH
> - select CRYPTO_MANAGER
> - select CRYPTO_WORKQUEUE
> - help
> - This is a generic software asynchronous crypto daemon that
> - provides the kernel thread to assist multi-buffer crypto
> - algorithms for submitting jobs and flushing jobs in multi-buffer
> - crypto algorithms. Multi-buffer crypto algorithms are executed
> - in the context of this kernel thread and drivers can post
> - their crypto request asynchronously to be processed by this daemon.
> -
> config CRYPTO_AUTHENC
> tristate "Authenc support"
> select CRYPTO_AEAD
> @@ -848,54 +834,6 @@ config CRYPTO_SHA1_PPC_SPE
> SHA-1 secure hash standard (DFIPS 180-4) implemented
> using powerpc SPE SIMD instruction set.
>
> -config CRYPTO_SHA1_MB
> - tristate "SHA1 digest algorithm (x86_64 Multi-Buffer, Experimental)"
> - depends on X86 && 64BIT
> - select CRYPTO_SHA1
> - select CRYPTO_HASH
> - select CRYPTO_MCRYPTD
> - help
> - SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
> - using multi-buffer technique. This algorithm computes on
> - multiple data lanes concurrently with SIMD instructions for
> - better throughput. It should not be enabled by default but
> - used when there is significant amount of work to keep the keep
> - the data lanes filled to get performance benefit. If the data
> - lanes remain unfilled, a flush operation will be initiated to
> - process the crypto jobs, adding a slight latency.
> -
> -config CRYPTO_SHA256_MB
> - tristate "SHA256 digest algorithm (x86_64 Multi-Buffer, Experimental)"
> - depends on X86 && 64BIT
> - select CRYPTO_SHA256
> - select CRYPTO_HASH
> - select CRYPTO_MCRYPTD
> - help
> - SHA-256 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
> - using multi-buffer technique. This algorithm computes on
> - multiple data lanes concurrently with SIMD instructions for
> - better throughput. It should not be enabled by default but
> - used when there is significant amount of work to keep the keep
> - the data lanes filled to get performance benefit. If the data
> - lanes remain unfilled, a flush operation will be initiated to
> - process the crypto jobs, adding a slight latency.
> -
> -config CRYPTO_SHA512_MB
> - tristate "SHA512 digest algorithm (x86_64 Multi-Buffer, Experimental)"
> - depends on X86 && 64BIT
> - select CRYPTO_SHA512
> - select CRYPTO_HASH
> - select CRYPTO_MCRYPTD
> - help
> - SHA-512 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
> - using multi-buffer technique. This algorithm computes on
> - multiple data lanes concurrently with SIMD instructions for
> - better throughput. It should not be enabled by default but
> - used when there is significant amount of work to keep the keep
> - the data lanes filled to get performance benefit. If the data
> - lanes remain unfilled, a flush operation will be initiated to
> - process the crypto jobs, adding a slight latency.
> -
> config CRYPTO_SHA256
> tristate "SHA224 and SHA256 digest algorithm"
> select CRYPTO_HASH
> diff --git a/crypto/Makefile b/crypto/Makefile
> index 6d1d40eeb964..80e3da755cbf 100644
> --- a/crypto/Makefile
> +++ b/crypto/Makefile
> @@ -93,7 +93,6 @@ obj-$(CONFIG_CRYPTO_MORUS640) += morus640.o
> obj-$(CONFIG_CRYPTO_MORUS1280) += morus1280.o
> obj-$(CONFIG_CRYPTO_PCRYPT) += pcrypt.o
> obj-$(CONFIG_CRYPTO_CRYPTD) += cryptd.o
> -obj-$(CONFIG_CRYPTO_MCRYPTD) += mcryptd.o
> obj-$(CONFIG_CRYPTO_DES) += des_generic.o
> obj-$(CONFIG_CRYPTO_FCRYPT) += fcrypt.o
> obj-$(CONFIG_CRYPTO_BLOWFISH) += blowfish_generic.o
> diff --git a/crypto/mcryptd.c b/crypto/mcryptd.c
> deleted file mode 100644
> index f14152147ce8..000000000000
> --- a/crypto/mcryptd.c
> +++ /dev/null
> @@ -1,675 +0,0 @@
> -/*
> - * Software multibuffer async crypto daemon.
> - *
> - * Copyright (c) 2014 Tim Chen <[email protected]>
> - *
> - * Adapted from crypto daemon.
> - *
> - * This program is free software; you can redistribute it and/or modify it
> - * under the terms of the GNU General Public License as published by the Free
> - * Software Foundation; either version 2 of the License, or (at your option)
> - * any later version.
> - *
> - */
> -
> -#include <crypto/algapi.h>
> -#include <crypto/internal/hash.h>
> -#include <crypto/internal/aead.h>
> -#include <crypto/mcryptd.h>
> -#include <crypto/crypto_wq.h>
> -#include <linux/err.h>
> -#include <linux/init.h>
> -#include <linux/kernel.h>
> -#include <linux/list.h>
> -#include <linux/module.h>
> -#include <linux/scatterlist.h>
> -#include <linux/sched.h>
> -#include <linux/sched/stat.h>
> -#include <linux/slab.h>
> -
> -#define MCRYPTD_MAX_CPU_QLEN 100
> -#define MCRYPTD_BATCH 9
> -
> -static void *mcryptd_alloc_instance(struct crypto_alg *alg, unsigned int head,
> - unsigned int tail);
> -
> -struct mcryptd_flush_list {
> - struct list_head list;
> - struct mutex lock;
> -};
> -
> -static struct mcryptd_flush_list __percpu *mcryptd_flist;
> -
> -struct hashd_instance_ctx {
> - struct crypto_ahash_spawn spawn;
> - struct mcryptd_queue *queue;
> -};
> -
> -static void mcryptd_queue_worker(struct work_struct *work);
> -
> -void mcryptd_arm_flusher(struct mcryptd_alg_cstate *cstate, unsigned long delay)
> -{
> - struct mcryptd_flush_list *flist;
> -
> - if (!cstate->flusher_engaged) {
> - /* put the flusher on the flush list */
> - flist = per_cpu_ptr(mcryptd_flist, smp_processor_id());
> - mutex_lock(&flist->lock);
> - list_add_tail(&cstate->flush_list, &flist->list);
> - cstate->flusher_engaged = true;
> - cstate->next_flush = jiffies + delay;
> - queue_delayed_work_on(smp_processor_id(), kcrypto_wq,
> - &cstate->flush, delay);
> - mutex_unlock(&flist->lock);
> - }
> -}
> -EXPORT_SYMBOL(mcryptd_arm_flusher);
> -
> -static int mcryptd_init_queue(struct mcryptd_queue *queue,
> - unsigned int max_cpu_qlen)
> -{
> - int cpu;
> - struct mcryptd_cpu_queue *cpu_queue;
> -
> - queue->cpu_queue = alloc_percpu(struct mcryptd_cpu_queue);
> - pr_debug("mqueue:%p mcryptd_cpu_queue %p\n", queue, queue->cpu_queue);
> - if (!queue->cpu_queue)
> - return -ENOMEM;
> - for_each_possible_cpu(cpu) {
> - cpu_queue = per_cpu_ptr(queue->cpu_queue, cpu);
> - pr_debug("cpu_queue #%d %p\n", cpu, queue->cpu_queue);
> - crypto_init_queue(&cpu_queue->queue, max_cpu_qlen);
> - INIT_WORK(&cpu_queue->work, mcryptd_queue_worker);
> - spin_lock_init(&cpu_queue->q_lock);
> - }
> - return 0;
> -}
> -
> -static void mcryptd_fini_queue(struct mcryptd_queue *queue)
> -{
> - int cpu;
> - struct mcryptd_cpu_queue *cpu_queue;
> -
> - for_each_possible_cpu(cpu) {
> - cpu_queue = per_cpu_ptr(queue->cpu_queue, cpu);
> - BUG_ON(cpu_queue->queue.qlen);
> - }
> - free_percpu(queue->cpu_queue);
> -}
> -
> -static int mcryptd_enqueue_request(struct mcryptd_queue *queue,
> - struct crypto_async_request *request,
> - struct mcryptd_hash_request_ctx *rctx)
> -{
> - int cpu, err;
> - struct mcryptd_cpu_queue *cpu_queue;
> -
> - cpu_queue = raw_cpu_ptr(queue->cpu_queue);
> - spin_lock(&cpu_queue->q_lock);
> - cpu = smp_processor_id();
> - rctx->tag.cpu = smp_processor_id();
> -
> - err = crypto_enqueue_request(&cpu_queue->queue, request);
> - pr_debug("enqueue request: cpu %d cpu_queue %p request %p\n",
> - cpu, cpu_queue, request);
> - spin_unlock(&cpu_queue->q_lock);
> - queue_work_on(cpu, kcrypto_wq, &cpu_queue->work);
> -
> - return err;
> -}
> -
> -/*
> - * Try to opportunisticlly flush the partially completed jobs if
> - * crypto daemon is the only task running.
> - */
> -static void mcryptd_opportunistic_flush(void)
> -{
> - struct mcryptd_flush_list *flist;
> - struct mcryptd_alg_cstate *cstate;
> -
> - flist = per_cpu_ptr(mcryptd_flist, smp_processor_id());
> - while (single_task_running()) {
> - mutex_lock(&flist->lock);
> - cstate = list_first_entry_or_null(&flist->list,
> - struct mcryptd_alg_cstate, flush_list);
> - if (!cstate || !cstate->flusher_engaged) {
> - mutex_unlock(&flist->lock);
> - return;
> - }
> - list_del(&cstate->flush_list);
> - cstate->flusher_engaged = false;
> - mutex_unlock(&flist->lock);
> - cstate->alg_state->flusher(cstate);
> - }
> -}
> -
> -/*
> - * Called in workqueue context, do one real cryption work (via
> - * req->complete) and reschedule itself if there are more work to
> - * do.
> - */
> -static void mcryptd_queue_worker(struct work_struct *work)
> -{
> - struct mcryptd_cpu_queue *cpu_queue;
> - struct crypto_async_request *req, *backlog;
> - int i;
> -
> - /*
> - * Need to loop through more than once for multi-buffer to
> - * be effective.
> - */
> -
> - cpu_queue = container_of(work, struct mcryptd_cpu_queue, work);
> - i = 0;
> - while (i < MCRYPTD_BATCH || single_task_running()) {
> -
> - spin_lock_bh(&cpu_queue->q_lock);
> - backlog = crypto_get_backlog(&cpu_queue->queue);
> - req = crypto_dequeue_request(&cpu_queue->queue);
> - spin_unlock_bh(&cpu_queue->q_lock);
> -
> - if (!req) {
> - mcryptd_opportunistic_flush();
> - return;
> - }
> -
> - if (backlog)
> - backlog->complete(backlog, -EINPROGRESS);
> - req->complete(req, 0);
> - if (!cpu_queue->queue.qlen)
> - return;
> - ++i;
> - }
> - if (cpu_queue->queue.qlen)
> - queue_work_on(smp_processor_id(), kcrypto_wq, &cpu_queue->work);
> -}
> -
> -void mcryptd_flusher(struct work_struct *__work)
> -{
> - struct mcryptd_alg_cstate *alg_cpu_state;
> - struct mcryptd_alg_state *alg_state;
> - struct mcryptd_flush_list *flist;
> - int cpu;
> -
> - cpu = smp_processor_id();
> - alg_cpu_state = container_of(to_delayed_work(__work),
> - struct mcryptd_alg_cstate, flush);
> - alg_state = alg_cpu_state->alg_state;
> - if (alg_cpu_state->cpu != cpu)
> - pr_debug("mcryptd error: work on cpu %d, should be cpu %d\n",
> - cpu, alg_cpu_state->cpu);
> -
> - if (alg_cpu_state->flusher_engaged) {
> - flist = per_cpu_ptr(mcryptd_flist, cpu);
> - mutex_lock(&flist->lock);
> - list_del(&alg_cpu_state->flush_list);
> - alg_cpu_state->flusher_engaged = false;
> - mutex_unlock(&flist->lock);
> - alg_state->flusher(alg_cpu_state);
> - }
> -}
> -EXPORT_SYMBOL_GPL(mcryptd_flusher);
> -
> -static inline struct mcryptd_queue *mcryptd_get_queue(struct crypto_tfm *tfm)
> -{
> - struct crypto_instance *inst = crypto_tfm_alg_instance(tfm);
> - struct mcryptd_instance_ctx *ictx = crypto_instance_ctx(inst);
> -
> - return ictx->queue;
> -}
> -
> -static void *mcryptd_alloc_instance(struct crypto_alg *alg, unsigned int head,
> - unsigned int tail)
> -{
> - char *p;
> - struct crypto_instance *inst;
> - int err;
> -
> - p = kzalloc(head + sizeof(*inst) + tail, GFP_KERNEL);
> - if (!p)
> - return ERR_PTR(-ENOMEM);
> -
> - inst = (void *)(p + head);
> -
> - err = -ENAMETOOLONG;
> - if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
> - "mcryptd(%s)", alg->cra_driver_name) >= CRYPTO_MAX_ALG_NAME)
> - goto out_free_inst;
> -
> - memcpy(inst->alg.cra_name, alg->cra_name, CRYPTO_MAX_ALG_NAME);
> -
> - inst->alg.cra_priority = alg->cra_priority + 50;
> - inst->alg.cra_blocksize = alg->cra_blocksize;
> - inst->alg.cra_alignmask = alg->cra_alignmask;
> -
> -out:
> - return p;
> -
> -out_free_inst:
> - kfree(p);
> - p = ERR_PTR(err);
> - goto out;
> -}
> -
> -static inline bool mcryptd_check_internal(struct rtattr **tb, u32 *type,
> - u32 *mask)
> -{
> - struct crypto_attr_type *algt;
> -
> - algt = crypto_get_attr_type(tb);
> - if (IS_ERR(algt))
> - return false;
> -
> - *type |= algt->type & CRYPTO_ALG_INTERNAL;
> - *mask |= algt->mask & CRYPTO_ALG_INTERNAL;
> -
> - if (*type & *mask & CRYPTO_ALG_INTERNAL)
> - return true;
> - else
> - return false;
> -}
> -
> -static int mcryptd_hash_init_tfm(struct crypto_tfm *tfm)
> -{
> - struct crypto_instance *inst = crypto_tfm_alg_instance(tfm);
> - struct hashd_instance_ctx *ictx = crypto_instance_ctx(inst);
> - struct crypto_ahash_spawn *spawn = &ictx->spawn;
> - struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(tfm);
> - struct crypto_ahash *hash;
> -
> - hash = crypto_spawn_ahash(spawn);
> - if (IS_ERR(hash))
> - return PTR_ERR(hash);
> -
> - ctx->child = hash;
> - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> - sizeof(struct mcryptd_hash_request_ctx) +
> - crypto_ahash_reqsize(hash));
> - return 0;
> -}
> -
> -static void mcryptd_hash_exit_tfm(struct crypto_tfm *tfm)
> -{
> - struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(tfm);
> -
> - crypto_free_ahash(ctx->child);
> -}
> -
> -static int mcryptd_hash_setkey(struct crypto_ahash *parent,
> - const u8 *key, unsigned int keylen)
> -{
> - struct mcryptd_hash_ctx *ctx = crypto_ahash_ctx(parent);
> - struct crypto_ahash *child = ctx->child;
> - int err;
> -
> - crypto_ahash_clear_flags(child, CRYPTO_TFM_REQ_MASK);
> - crypto_ahash_set_flags(child, crypto_ahash_get_flags(parent) &
> - CRYPTO_TFM_REQ_MASK);
> - err = crypto_ahash_setkey(child, key, keylen);
> - crypto_ahash_set_flags(parent, crypto_ahash_get_flags(child) &
> - CRYPTO_TFM_RES_MASK);
> - return err;
> -}
> -
> -static int mcryptd_hash_enqueue(struct ahash_request *req,
> - crypto_completion_t complete)
> -{
> - int ret;
> -
> - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> - struct mcryptd_queue *queue =
> - mcryptd_get_queue(crypto_ahash_tfm(tfm));
> -
> - rctx->complete = req->base.complete;
> - req->base.complete = complete;
> -
> - ret = mcryptd_enqueue_request(queue, &req->base, rctx);
> -
> - return ret;
> -}
> -
> -static void mcryptd_hash_init(struct crypto_async_request *req_async, int err)
> -{
> - struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm);
> - struct crypto_ahash *child = ctx->child;
> - struct ahash_request *req = ahash_request_cast(req_async);
> - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> - struct ahash_request *desc = &rctx->areq;
> -
> - if (unlikely(err == -EINPROGRESS))
> - goto out;
> -
> - ahash_request_set_tfm(desc, child);
> - ahash_request_set_callback(desc, CRYPTO_TFM_REQ_MAY_SLEEP,
> - rctx->complete, req_async);
> -
> - rctx->out = req->result;
> - err = crypto_ahash_init(desc);
> -
> -out:
> - local_bh_disable();
> - rctx->complete(&req->base, err);
> - local_bh_enable();
> -}
> -
> -static int mcryptd_hash_init_enqueue(struct ahash_request *req)
> -{
> - return mcryptd_hash_enqueue(req, mcryptd_hash_init);
> -}
> -
> -static void mcryptd_hash_update(struct crypto_async_request *req_async, int err)
> -{
> - struct ahash_request *req = ahash_request_cast(req_async);
> - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> -
> - if (unlikely(err == -EINPROGRESS))
> - goto out;
> -
> - rctx->out = req->result;
> - err = crypto_ahash_update(&rctx->areq);
> - if (err) {
> - req->base.complete = rctx->complete;
> - goto out;
> - }
> -
> - return;
> -out:
> - local_bh_disable();
> - rctx->complete(&req->base, err);
> - local_bh_enable();
> -}
> -
> -static int mcryptd_hash_update_enqueue(struct ahash_request *req)
> -{
> - return mcryptd_hash_enqueue(req, mcryptd_hash_update);
> -}
> -
> -static void mcryptd_hash_final(struct crypto_async_request *req_async, int err)
> -{
> - struct ahash_request *req = ahash_request_cast(req_async);
> - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> -
> - if (unlikely(err == -EINPROGRESS))
> - goto out;
> -
> - rctx->out = req->result;
> - err = crypto_ahash_final(&rctx->areq);
> - if (err) {
> - req->base.complete = rctx->complete;
> - goto out;
> - }
> -
> - return;
> -out:
> - local_bh_disable();
> - rctx->complete(&req->base, err);
> - local_bh_enable();
> -}
> -
> -static int mcryptd_hash_final_enqueue(struct ahash_request *req)
> -{
> - return mcryptd_hash_enqueue(req, mcryptd_hash_final);
> -}
> -
> -static void mcryptd_hash_finup(struct crypto_async_request *req_async, int err)
> -{
> - struct ahash_request *req = ahash_request_cast(req_async);
> - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> -
> - if (unlikely(err == -EINPROGRESS))
> - goto out;
> - rctx->out = req->result;
> - err = crypto_ahash_finup(&rctx->areq);
> -
> - if (err) {
> - req->base.complete = rctx->complete;
> - goto out;
> - }
> -
> - return;
> -out:
> - local_bh_disable();
> - rctx->complete(&req->base, err);
> - local_bh_enable();
> -}
> -
> -static int mcryptd_hash_finup_enqueue(struct ahash_request *req)
> -{
> - return mcryptd_hash_enqueue(req, mcryptd_hash_finup);
> -}
> -
> -static void mcryptd_hash_digest(struct crypto_async_request *req_async, int err)
> -{
> - struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm);
> - struct crypto_ahash *child = ctx->child;
> - struct ahash_request *req = ahash_request_cast(req_async);
> - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> - struct ahash_request *desc = &rctx->areq;
> -
> - if (unlikely(err == -EINPROGRESS))
> - goto out;
> -
> - ahash_request_set_tfm(desc, child);
> - ahash_request_set_callback(desc, CRYPTO_TFM_REQ_MAY_SLEEP,
> - rctx->complete, req_async);
> -
> - rctx->out = req->result;
> - err = crypto_ahash_init(desc) ?: crypto_ahash_finup(desc);
> -
> -out:
> - local_bh_disable();
> - rctx->complete(&req->base, err);
> - local_bh_enable();
> -}
> -
> -static int mcryptd_hash_digest_enqueue(struct ahash_request *req)
> -{
> - return mcryptd_hash_enqueue(req, mcryptd_hash_digest);
> -}
> -
> -static int mcryptd_hash_export(struct ahash_request *req, void *out)
> -{
> - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> -
> - return crypto_ahash_export(&rctx->areq, out);
> -}
> -
> -static int mcryptd_hash_import(struct ahash_request *req, const void *in)
> -{
> - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> -
> - return crypto_ahash_import(&rctx->areq, in);
> -}
> -
> -static int mcryptd_create_hash(struct crypto_template *tmpl, struct rtattr **tb,
> - struct mcryptd_queue *queue)
> -{
> - struct hashd_instance_ctx *ctx;
> - struct ahash_instance *inst;
> - struct hash_alg_common *halg;
> - struct crypto_alg *alg;
> - u32 type = 0;
> - u32 mask = 0;
> - int err;
> -
> - if (!mcryptd_check_internal(tb, &type, &mask))
> - return -EINVAL;
> -
> - halg = ahash_attr_alg(tb[1], type, mask);
> - if (IS_ERR(halg))
> - return PTR_ERR(halg);
> -
> - alg = &halg->base;
> - pr_debug("crypto: mcryptd hash alg: %s\n", alg->cra_name);
> - inst = mcryptd_alloc_instance(alg, ahash_instance_headroom(),
> - sizeof(*ctx));
> - err = PTR_ERR(inst);
> - if (IS_ERR(inst))
> - goto out_put_alg;
> -
> - ctx = ahash_instance_ctx(inst);
> - ctx->queue = queue;
> -
> - err = crypto_init_ahash_spawn(&ctx->spawn, halg,
> - ahash_crypto_instance(inst));
> - if (err)
> - goto out_free_inst;
> -
> - inst->alg.halg.base.cra_flags = CRYPTO_ALG_ASYNC |
> - (alg->cra_flags & (CRYPTO_ALG_INTERNAL |
> - CRYPTO_ALG_OPTIONAL_KEY));
> -
> - inst->alg.halg.digestsize = halg->digestsize;
> - inst->alg.halg.statesize = halg->statesize;
> - inst->alg.halg.base.cra_ctxsize = sizeof(struct mcryptd_hash_ctx);
> -
> - inst->alg.halg.base.cra_init = mcryptd_hash_init_tfm;
> - inst->alg.halg.base.cra_exit = mcryptd_hash_exit_tfm;
> -
> - inst->alg.init = mcryptd_hash_init_enqueue;
> - inst->alg.update = mcryptd_hash_update_enqueue;
> - inst->alg.final = mcryptd_hash_final_enqueue;
> - inst->alg.finup = mcryptd_hash_finup_enqueue;
> - inst->alg.export = mcryptd_hash_export;
> - inst->alg.import = mcryptd_hash_import;
> - if (crypto_hash_alg_has_setkey(halg))
> - inst->alg.setkey = mcryptd_hash_setkey;
> - inst->alg.digest = mcryptd_hash_digest_enqueue;
> -
> - err = ahash_register_instance(tmpl, inst);
> - if (err) {
> - crypto_drop_ahash(&ctx->spawn);
> -out_free_inst:
> - kfree(inst);
> - }
> -
> -out_put_alg:
> - crypto_mod_put(alg);
> - return err;
> -}
> -
> -static struct mcryptd_queue mqueue;
> -
> -static int mcryptd_create(struct crypto_template *tmpl, struct rtattr **tb)
> -{
> - struct crypto_attr_type *algt;
> -
> - algt = crypto_get_attr_type(tb);
> - if (IS_ERR(algt))
> - return PTR_ERR(algt);
> -
> - switch (algt->type & algt->mask & CRYPTO_ALG_TYPE_MASK) {
> - case CRYPTO_ALG_TYPE_DIGEST:
> - return mcryptd_create_hash(tmpl, tb, &mqueue);
> - break;
> - }
> -
> - return -EINVAL;
> -}
> -
> -static void mcryptd_free(struct crypto_instance *inst)
> -{
> - struct mcryptd_instance_ctx *ctx = crypto_instance_ctx(inst);
> - struct hashd_instance_ctx *hctx = crypto_instance_ctx(inst);
> -
> - switch (inst->alg.cra_flags & CRYPTO_ALG_TYPE_MASK) {
> - case CRYPTO_ALG_TYPE_AHASH:
> - crypto_drop_ahash(&hctx->spawn);
> - kfree(ahash_instance(inst));
> - return;
> - default:
> - crypto_drop_spawn(&ctx->spawn);
> - kfree(inst);
> - }
> -}
> -
> -static struct crypto_template mcryptd_tmpl = {
> - .name = "mcryptd",
> - .create = mcryptd_create,
> - .free = mcryptd_free,
> - .module = THIS_MODULE,
> -};
> -
> -struct mcryptd_ahash *mcryptd_alloc_ahash(const char *alg_name,
> - u32 type, u32 mask)
> -{
> - char mcryptd_alg_name[CRYPTO_MAX_ALG_NAME];
> - struct crypto_ahash *tfm;
> -
> - if (snprintf(mcryptd_alg_name, CRYPTO_MAX_ALG_NAME,
> - "mcryptd(%s)", alg_name) >= CRYPTO_MAX_ALG_NAME)
> - return ERR_PTR(-EINVAL);
> - tfm = crypto_alloc_ahash(mcryptd_alg_name, type, mask);
> - if (IS_ERR(tfm))
> - return ERR_CAST(tfm);
> - if (tfm->base.__crt_alg->cra_module != THIS_MODULE) {
> - crypto_free_ahash(tfm);
> - return ERR_PTR(-EINVAL);
> - }
> -
> - return __mcryptd_ahash_cast(tfm);
> -}
> -EXPORT_SYMBOL_GPL(mcryptd_alloc_ahash);
> -
> -struct crypto_ahash *mcryptd_ahash_child(struct mcryptd_ahash *tfm)
> -{
> - struct mcryptd_hash_ctx *ctx = crypto_ahash_ctx(&tfm->base);
> -
> - return ctx->child;
> -}
> -EXPORT_SYMBOL_GPL(mcryptd_ahash_child);
> -
> -struct ahash_request *mcryptd_ahash_desc(struct ahash_request *req)
> -{
> - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> - return &rctx->areq;
> -}
> -EXPORT_SYMBOL_GPL(mcryptd_ahash_desc);
> -
> -void mcryptd_free_ahash(struct mcryptd_ahash *tfm)
> -{
> - crypto_free_ahash(&tfm->base);
> -}
> -EXPORT_SYMBOL_GPL(mcryptd_free_ahash);
> -
> -static int __init mcryptd_init(void)
> -{
> - int err, cpu;
> - struct mcryptd_flush_list *flist;
> -
> - mcryptd_flist = alloc_percpu(struct mcryptd_flush_list);
> - for_each_possible_cpu(cpu) {
> - flist = per_cpu_ptr(mcryptd_flist, cpu);
> - INIT_LIST_HEAD(&flist->list);
> - mutex_init(&flist->lock);
> - }
> -
> - err = mcryptd_init_queue(&mqueue, MCRYPTD_MAX_CPU_QLEN);
> - if (err) {
> - free_percpu(mcryptd_flist);
> - return err;
> - }
> -
> - err = crypto_register_template(&mcryptd_tmpl);
> - if (err) {
> - mcryptd_fini_queue(&mqueue);
> - free_percpu(mcryptd_flist);
> - }
> -
> - return err;
> -}
> -
> -static void __exit mcryptd_exit(void)
> -{
> - mcryptd_fini_queue(&mqueue);
> - crypto_unregister_template(&mcryptd_tmpl);
> - free_percpu(mcryptd_flist);
> -}
> -
> -subsys_initcall(mcryptd_init);
> -module_exit(mcryptd_exit);
> -
> -MODULE_LICENSE("GPL");
> -MODULE_DESCRIPTION("Software async multibuffer crypto daemon");
> -MODULE_ALIAS_CRYPTO("mcryptd");
> diff --git a/include/crypto/mcryptd.h b/include/crypto/mcryptd.h
> deleted file mode 100644
> index b67404fc4b34..000000000000
> --- a/include/crypto/mcryptd.h
> +++ /dev/null
> @@ -1,114 +0,0 @@
> -/* SPDX-License-Identifier: GPL-2.0 */
> -/*
> - * Software async multibuffer crypto daemon headers
> - *
> - * Author:
> - * Tim Chen <[email protected]>
> - *
> - * Copyright (c) 2014, Intel Corporation.
> - */
> -
> -#ifndef _CRYPTO_MCRYPT_H
> -#define _CRYPTO_MCRYPT_H
> -
> -#include <linux/crypto.h>
> -#include <linux/kernel.h>
> -#include <crypto/hash.h>
> -
> -struct mcryptd_ahash {
> - struct crypto_ahash base;
> -};
> -
> -static inline struct mcryptd_ahash *__mcryptd_ahash_cast(
> - struct crypto_ahash *tfm)
> -{
> - return (struct mcryptd_ahash *)tfm;
> -}
> -
> -struct mcryptd_cpu_queue {
> - struct crypto_queue queue;
> - spinlock_t q_lock;
> - struct work_struct work;
> -};
> -
> -struct mcryptd_queue {
> - struct mcryptd_cpu_queue __percpu *cpu_queue;
> -};
> -
> -struct mcryptd_instance_ctx {
> - struct crypto_spawn spawn;
> - struct mcryptd_queue *queue;
> -};
> -
> -struct mcryptd_hash_ctx {
> - struct crypto_ahash *child;
> - struct mcryptd_alg_state *alg_state;
> -};
> -
> -struct mcryptd_tag {
> - /* seq number of request */
> - unsigned seq_num;
> - /* arrival time of request */
> - unsigned long arrival;
> - unsigned long expire;
> - int cpu;
> -};
> -
> -struct mcryptd_hash_request_ctx {
> - struct list_head waiter;
> - crypto_completion_t complete;
> - struct mcryptd_tag tag;
> - struct crypto_hash_walk walk;
> - u8 *out;
> - int flag;
> - struct ahash_request areq;
> -};
> -
> -struct mcryptd_ahash *mcryptd_alloc_ahash(const char *alg_name,
> - u32 type, u32 mask);
> -struct crypto_ahash *mcryptd_ahash_child(struct mcryptd_ahash *tfm);
> -struct ahash_request *mcryptd_ahash_desc(struct ahash_request *req);
> -void mcryptd_free_ahash(struct mcryptd_ahash *tfm);
> -void mcryptd_flusher(struct work_struct *work);
> -
> -enum mcryptd_req_type {
> - MCRYPTD_NONE,
> - MCRYPTD_UPDATE,
> - MCRYPTD_FINUP,
> - MCRYPTD_DIGEST,
> - MCRYPTD_FINAL
> -};
> -
> -struct mcryptd_alg_cstate {
> - unsigned long next_flush;
> - unsigned next_seq_num;
> - bool flusher_engaged;
> - struct delayed_work flush;
> - int cpu;
> - struct mcryptd_alg_state *alg_state;
> - void *mgr;
> - spinlock_t work_lock;
> - struct list_head work_list;
> - struct list_head flush_list;
> -};
> -
> -struct mcryptd_alg_state {
> - struct mcryptd_alg_cstate __percpu *alg_cstate;
> - unsigned long (*flusher)(struct mcryptd_alg_cstate *cstate);
> -};
> -
> -/* return delay in jiffies from current time */
> -static inline unsigned long get_delay(unsigned long t)
> -{
> - long delay;
> -
> - delay = (long) t - (long) jiffies;
> - if (delay <= 0)
> - return 0;
> - else
> - return (unsigned long) delay;
> -}
> -
> -void mcryptd_arm_flusher(struct mcryptd_alg_cstate *cstate, unsigned long delay);
> -
> -#endif
>
On Mon, 2018-08-27 at 15:28 -0700, Tim Chen wrote:
> On 08/22/2018 01:51 AM, Ard Biesheuvel wrote:
> > As it turns out, the AVX2 multibuffer SHA routines are currently
> > broken [0], in a way that would have likely been noticed if this
> > code were in wide use. Since the code is too complicated to be
> > maintained by anyone except the original authors, and since the
> > performance benefits for real-world use cases are debatable to
> > begin with, it is better to drop it entirely for the moment.
> >
> > [0] https://marc.info/?l=linux-crypto-vger&m=153476243825350&w=2
>
> Sorry I was out of the loop for a while and haven't been following
> the code too closely.
>
> Megha is maintaining the code now. Before we pull the code,
> please give us a chance to fix it first.
>
> Thanks.
>
> Tim
>
Hi,
I am working to find a fix for these corner cases. If possible, we would
like to fix the issues instead of removing the code altogether.
-Megha
> >
> > Suggested-by: Eric Biggers <[email protected]>
> > Cc: Megha Dey <[email protected]>
> > Cc: Tim Chen <[email protected]>
> > Cc: Geert Uytterhoeven <[email protected]>
> > Cc: Martin Schwidefsky <[email protected]>
> > Cc: Heiko Carstens <[email protected]>
> > Cc: Thomas Gleixner <[email protected]>
> > Cc: Ingo Molnar <[email protected]>
> > Signed-off-by: Ard Biesheuvel <[email protected]>
> > ---
> > MAINTAINERS | 8 -
> > arch/m68k/configs/amiga_defconfig | 1 -
> > arch/m68k/configs/apollo_defconfig | 1 -
> > arch/m68k/configs/atari_defconfig | 1 -
> > arch/m68k/configs/bvme6000_defconfig | 1 -
> > arch/m68k/configs/hp300_defconfig | 1 -
> > arch/m68k/configs/mac_defconfig | 1 -
> > arch/m68k/configs/multi_defconfig | 1 -
> > arch/m68k/configs/mvme147_defconfig | 1 -
> > arch/m68k/configs/mvme16x_defconfig | 1 -
> > arch/m68k/configs/q40_defconfig | 1 -
> > arch/m68k/configs/sun3_defconfig | 1 -
> > arch/m68k/configs/sun3x_defconfig | 1 -
> > arch/s390/configs/debug_defconfig | 1 -
> > arch/s390/configs/performance_defconfig | 1 -
> > arch/x86/crypto/Makefile | 3 -
> > arch/x86/crypto/sha1-mb/Makefile | 14 -
> > arch/x86/crypto/sha1-mb/sha1_mb.c | 1011 ----------------
> > arch/x86/crypto/sha1-mb/sha1_mb_ctx.h | 134 ---
> > arch/x86/crypto/sha1-mb/sha1_mb_mgr.h | 110 --
> > .../crypto/sha1-mb/sha1_mb_mgr_datastruct.S | 287 -----
> > .../crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S | 304 -----
> > .../crypto/sha1-mb/sha1_mb_mgr_init_avx2.c | 64 -
> > .../crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S | 209 ----
> > arch/x86/crypto/sha1-mb/sha1_x8_avx2.S | 492 --------
> > arch/x86/crypto/sha256-mb/Makefile | 14 -
> > arch/x86/crypto/sha256-mb/sha256_mb.c | 1013 ----------------
> > arch/x86/crypto/sha256-mb/sha256_mb_ctx.h | 134 ---
> > arch/x86/crypto/sha256-mb/sha256_mb_mgr.h | 108 --
> > .../sha256-mb/sha256_mb_mgr_datastruct.S | 304 -----
> > .../sha256-mb/sha256_mb_mgr_flush_avx2.S | 307 -----
> > .../sha256-mb/sha256_mb_mgr_init_avx2.c | 65 -
> > .../sha256-mb/sha256_mb_mgr_submit_avx2.S | 214 ----
> > arch/x86/crypto/sha256-mb/sha256_x8_avx2.S | 598 ----------
> > arch/x86/crypto/sha512-mb/Makefile | 12 -
> > arch/x86/crypto/sha512-mb/sha512_mb.c | 1047 -----------------
> > arch/x86/crypto/sha512-mb/sha512_mb_ctx.h | 128 --
> > arch/x86/crypto/sha512-mb/sha512_mb_mgr.h | 104 --
> > .../sha512-mb/sha512_mb_mgr_datastruct.S | 281 -----
> > .../sha512-mb/sha512_mb_mgr_flush_avx2.S | 297 -----
> > .../sha512-mb/sha512_mb_mgr_init_avx2.c | 69 --
> > .../sha512-mb/sha512_mb_mgr_submit_avx2.S | 224 ----
> > arch/x86/crypto/sha512-mb/sha512_x4_avx2.S | 531 ---------
> > crypto/Kconfig | 62 -
> > crypto/Makefile | 1 -
> > crypto/mcryptd.c | 675 -----------
> > include/crypto/mcryptd.h | 114 --
> > 47 files changed, 8952 deletions(-)
> > delete mode 100644 arch/x86/crypto/sha1-mb/Makefile
> > delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb.c
> > delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_ctx.h
> > delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr.h
> > delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S
> > delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S
> > delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c
> > delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S
> > delete mode 100644 arch/x86/crypto/sha1-mb/sha1_x8_avx2.S
> > delete mode 100644 arch/x86/crypto/sha256-mb/Makefile
> > delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb.c
> > delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_ctx.h
> > delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr.h
> > delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S
> > delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S
> > delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c
> > delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S
> > delete mode 100644 arch/x86/crypto/sha256-mb/sha256_x8_avx2.S
> > delete mode 100644 arch/x86/crypto/sha512-mb/Makefile
> > delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb.c
> > delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_ctx.h
> > delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr.h
> > delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S
> > delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S
> > delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c
> > delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S
> > delete mode 100644 arch/x86/crypto/sha512-mb/sha512_x4_avx2.S
> > delete mode 100644 crypto/mcryptd.c
> > delete mode 100644 include/crypto/mcryptd.h
> >
> > diff --git a/MAINTAINERS b/MAINTAINERS
> > index 24b200d91b30..05747b8ac88e 100644
> > --- a/MAINTAINERS
> > +++ b/MAINTAINERS
> > @@ -7487,14 +7487,6 @@ S: Supported
> > F: drivers/infiniband/hw/i40iw/
> > F: include/uapi/rdma/i40iw-abi.h
> >
> > -INTEL SHA MULTIBUFFER DRIVER
> > -M: Megha Dey <[email protected]>
> > -R: Tim Chen <[email protected]>
> > -L: [email protected]
> > -S: Supported
> > -F: arch/x86/crypto/sha*-mb/
> > -F: crypto/mcryptd.c
> > -
> > INTEL TELEMETRY DRIVER
> > M: Souvik Kumar Chakravarty <[email protected]>
> > L: [email protected]
> > diff --git a/arch/m68k/configs/amiga_defconfig b/arch/m68k/configs/amiga_defconfig
> > index 1d5483f6e457..70b10d712624 100644
> > --- a/arch/m68k/configs/amiga_defconfig
> > +++ b/arch/m68k/configs/amiga_defconfig
> > @@ -621,7 +621,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/m68k/configs/apollo_defconfig b/arch/m68k/configs/apollo_defconfig
> > index 52a0af127951..211eec5859e8 100644
> > --- a/arch/m68k/configs/apollo_defconfig
> > +++ b/arch/m68k/configs/apollo_defconfig
> > @@ -578,7 +578,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/m68k/configs/atari_defconfig b/arch/m68k/configs/atari_defconfig
> > index b3103e51268a..0da45c6084f7 100644
> > --- a/arch/m68k/configs/atari_defconfig
> > +++ b/arch/m68k/configs/atari_defconfig
> > @@ -599,7 +599,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/m68k/configs/bvme6000_defconfig b/arch/m68k/configs/bvme6000_defconfig
> > index fb7d651a4cab..c09ae7219416 100644
> > --- a/arch/m68k/configs/bvme6000_defconfig
> > +++ b/arch/m68k/configs/bvme6000_defconfig
> > @@ -570,7 +570,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/m68k/configs/hp300_defconfig b/arch/m68k/configs/hp300_defconfig
> > index 6b37f5537c39..8c4775b30748 100644
> > --- a/arch/m68k/configs/hp300_defconfig
> > +++ b/arch/m68k/configs/hp300_defconfig
> > @@ -580,7 +580,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/m68k/configs/mac_defconfig b/arch/m68k/configs/mac_defconfig
> > index c717bf879449..48ad520e2f2d 100644
> > --- a/arch/m68k/configs/mac_defconfig
> > +++ b/arch/m68k/configs/mac_defconfig
> > @@ -602,7 +602,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/m68k/configs/multi_defconfig b/arch/m68k/configs/multi_defconfig
> > index 226c994ce794..3a3cccb9f625 100644
> > --- a/arch/m68k/configs/multi_defconfig
> > +++ b/arch/m68k/configs/multi_defconfig
> > @@ -684,7 +684,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/m68k/configs/mvme147_defconfig b/arch/m68k/configs/mvme147_defconfig
> > index b383327fd77a..63dc311f94ff 100644
> > --- a/arch/m68k/configs/mvme147_defconfig
> > +++ b/arch/m68k/configs/mvme147_defconfig
> > @@ -570,7 +570,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/m68k/configs/mvme16x_defconfig b/arch/m68k/configs/mvme16x_defconfig
> > index 9783d3deb9e9..1ae39d1f9bb5 100644
> > --- a/arch/m68k/configs/mvme16x_defconfig
> > +++ b/arch/m68k/configs/mvme16x_defconfig
> > @@ -570,7 +570,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/m68k/configs/q40_defconfig b/arch/m68k/configs/q40_defconfig
> > index a35d10ee10cb..ba2f351811da 100644
> > --- a/arch/m68k/configs/q40_defconfig
> > +++ b/arch/m68k/configs/q40_defconfig
> > @@ -593,7 +593,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/m68k/configs/sun3_defconfig b/arch/m68k/configs/sun3_defconfig
> > index 573bf922d448..544b7475ff6a 100644
> > --- a/arch/m68k/configs/sun3_defconfig
> > +++ b/arch/m68k/configs/sun3_defconfig
> > @@ -571,7 +571,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/m68k/configs/sun3x_defconfig b/arch/m68k/configs/sun3x_defconfig
> > index efb27a7fcc55..149edafbb9f9 100644
> > --- a/arch/m68k/configs/sun3x_defconfig
> > +++ b/arch/m68k/configs/sun3x_defconfig
> > @@ -572,7 +572,6 @@ CONFIG_CRYPTO_ECDH=m
> > CONFIG_CRYPTO_MANAGER=y
> > CONFIG_CRYPTO_USER=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_AEGIS128=m
> > diff --git a/arch/s390/configs/debug_defconfig b/arch/s390/configs/debug_defconfig
> > index 941d8cc6c9f5..259d1698ac50 100644
> > --- a/arch/s390/configs/debug_defconfig
> > +++ b/arch/s390/configs/debug_defconfig
> > @@ -668,7 +668,6 @@ CONFIG_CRYPTO_USER=m
> > # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set
> > CONFIG_CRYPTO_PCRYPT=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_LRW=m
> > diff --git a/arch/s390/configs/performance_defconfig b/arch/s390/configs/performance_defconfig
> > index eb6f75f24208..37fd60c20e22 100644
> > --- a/arch/s390/configs/performance_defconfig
> > +++ b/arch/s390/configs/performance_defconfig
> > @@ -610,7 +610,6 @@ CONFIG_CRYPTO_USER=m
> > # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set
> > CONFIG_CRYPTO_PCRYPT=m
> > CONFIG_CRYPTO_CRYPTD=m
> > -CONFIG_CRYPTO_MCRYPTD=m
> > CONFIG_CRYPTO_TEST=m
> > CONFIG_CRYPTO_CHACHA20POLY1305=m
> > CONFIG_CRYPTO_LRW=m
> > diff --git a/arch/x86/crypto/Makefile b/arch/x86/crypto/Makefile
> > index a450ad573dcb..9edfa5469f9f 100644
> > --- a/arch/x86/crypto/Makefile
> > +++ b/arch/x86/crypto/Makefile
> > @@ -60,9 +60,6 @@ endif
> > ifeq ($(avx2_supported),yes)
> > obj-$(CONFIG_CRYPTO_CAMELLIA_AESNI_AVX2_X86_64) += camellia-aesni-avx2.o
> > obj-$(CONFIG_CRYPTO_SERPENT_AVX2_X86_64) += serpent-avx2.o
> > - obj-$(CONFIG_CRYPTO_SHA1_MB) += sha1-mb/
> > - obj-$(CONFIG_CRYPTO_SHA256_MB) += sha256-mb/
> > - obj-$(CONFIG_CRYPTO_SHA512_MB) += sha512-mb/
> >
> > obj-$(CONFIG_CRYPTO_MORUS1280_AVX2) += morus1280-avx2.o
> > endif
> > diff --git a/arch/x86/crypto/sha1-mb/Makefile b/arch/x86/crypto/sha1-mb/Makefile
> > deleted file mode 100644
> > index 815ded3ba90e..000000000000
> > --- a/arch/x86/crypto/sha1-mb/Makefile
> > +++ /dev/null
> > @@ -1,14 +0,0 @@
> > -# SPDX-License-Identifier: GPL-2.0
> > -#
> > -# Arch-specific CryptoAPI modules.
> > -#
> > -
> > -OBJECT_FILES_NON_STANDARD := y
> > -
> > -avx2_supported := $(call as-instr,vpgatherdd %ymm0$(comma)(%eax$(comma)%ymm1\
> > - $(comma)4)$(comma)%ymm2,yes,no)
> > -ifeq ($(avx2_supported),yes)
> > - obj-$(CONFIG_CRYPTO_SHA1_MB) += sha1-mb.o
> > - sha1-mb-y := sha1_mb.o sha1_mb_mgr_flush_avx2.o \
> > - sha1_mb_mgr_init_avx2.o sha1_mb_mgr_submit_avx2.o sha1_x8_avx2.o
> > -endif
> > diff --git a/arch/x86/crypto/sha1-mb/sha1_mb.c b/arch/x86/crypto/sha1-mb/sha1_mb.c
> > deleted file mode 100644
> > index b93805664c1d..000000000000
> > --- a/arch/x86/crypto/sha1-mb/sha1_mb.c
> > +++ /dev/null
> > @@ -1,1011 +0,0 @@
> > -/*
> > - * Multi buffer SHA1 algorithm Glue Code
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Tim Chen <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
> > -
> > -#include <crypto/internal/hash.h>
> > -#include <linux/init.h>
> > -#include <linux/module.h>
> > -#include <linux/mm.h>
> > -#include <linux/cryptohash.h>
> > -#include <linux/types.h>
> > -#include <linux/list.h>
> > -#include <crypto/scatterwalk.h>
> > -#include <crypto/sha.h>
> > -#include <crypto/mcryptd.h>
> > -#include <crypto/crypto_wq.h>
> > -#include <asm/byteorder.h>
> > -#include <linux/hardirq.h>
> > -#include <asm/fpu/api.h>
> > -#include "sha1_mb_ctx.h"
> > -
> > -#define FLUSH_INTERVAL 1000 /* in usec */
> > -
> > -static struct mcryptd_alg_state sha1_mb_alg_state;
> > -
> > -struct sha1_mb_ctx {
> > - struct mcryptd_ahash *mcryptd_tfm;
> > -};
> > -
> > -static inline struct mcryptd_hash_request_ctx
> > - *cast_hash_to_mcryptd_ctx(struct sha1_hash_ctx *hash_ctx)
> > -{
> > - struct ahash_request *areq;
> > -
> > - areq = container_of((void *) hash_ctx, struct ahash_request, __ctx);
> > - return container_of(areq, struct mcryptd_hash_request_ctx, areq);
> > -}
> > -
> > -static inline struct ahash_request
> > - *cast_mcryptd_ctx_to_req(struct mcryptd_hash_request_ctx *ctx)
> > -{
> > - return container_of((void *) ctx, struct ahash_request, __ctx);
> > -}
> > -
> > -static void req_ctx_init(struct mcryptd_hash_request_ctx *rctx,
> > - struct ahash_request *areq)
> > -{
> > - rctx->flag = HASH_UPDATE;
> > -}
> > -
> > -static asmlinkage void (*sha1_job_mgr_init)(struct sha1_mb_mgr *state);
> > -static asmlinkage struct job_sha1* (*sha1_job_mgr_submit)
> > - (struct sha1_mb_mgr *state, struct job_sha1 *job);
> > -static asmlinkage struct job_sha1* (*sha1_job_mgr_flush)
> > - (struct sha1_mb_mgr *state);
> > -static asmlinkage struct job_sha1* (*sha1_job_mgr_get_comp_job)
> > - (struct sha1_mb_mgr *state);
> > -
> > -static inline uint32_t sha1_pad(uint8_t padblock[SHA1_BLOCK_SIZE * 2],
> > - uint64_t total_len)
> > -{
> > - uint32_t i = total_len & (SHA1_BLOCK_SIZE - 1);
> > -
> > - memset(&padblock[i], 0, SHA1_BLOCK_SIZE);
> > - padblock[i] = 0x80;
> > -
> > - i += ((SHA1_BLOCK_SIZE - 1) &
> > - (0 - (total_len + SHA1_PADLENGTHFIELD_SIZE + 1)))
> > - + 1 + SHA1_PADLENGTHFIELD_SIZE;
> > -
> > -#if SHA1_PADLENGTHFIELD_SIZE == 16
> > - *((uint64_t *) &padblock[i - 16]) = 0;
> > -#endif
> > -
> > - *((uint64_t *) &padblock[i - 8]) = cpu_to_be64(total_len << 3);
> > -
> > - /* Number of extra blocks to hash */
> > - return i >> SHA1_LOG2_BLOCK_SIZE;
> > -}
> > -
> > -static struct sha1_hash_ctx *sha1_ctx_mgr_resubmit(struct sha1_ctx_mgr *mgr,
> > - struct sha1_hash_ctx *ctx)
> > -{
> > - while (ctx) {
> > - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> > - /* Clear PROCESSING bit */
> > - ctx->status = HASH_CTX_STS_COMPLETE;
> > - return ctx;
> > - }
> > -
> > - /*
> > - * If the extra blocks are empty, begin hashing what remains
> > - * in the user's buffer.
> > - */
> > - if (ctx->partial_block_buffer_length == 0 &&
> > - ctx->incoming_buffer_length) {
> > -
> > - const void *buffer = ctx->incoming_buffer;
> > - uint32_t len = ctx->incoming_buffer_length;
> > - uint32_t copy_len;
> > -
> > - /*
> > - * Only entire blocks can be hashed.
> > - * Copy remainder to extra blocks buffer.
> > - */
> > - copy_len = len & (SHA1_BLOCK_SIZE-1);
> > -
> > - if (copy_len) {
> > - len -= copy_len;
> > - memcpy(ctx->partial_block_buffer,
> > - ((const char *) buffer + len),
> > - copy_len);
> > - ctx->partial_block_buffer_length = copy_len;
> > - }
> > -
> > - ctx->incoming_buffer_length = 0;
> > -
> > - /* len should be a multiple of the block size now */
> > - assert((len % SHA1_BLOCK_SIZE) == 0);
> > -
> > - /* Set len to the number of blocks to be hashed */
> > - len >>= SHA1_LOG2_BLOCK_SIZE;
> > -
> > - if (len) {
> > -
> > - ctx->job.buffer = (uint8_t *) buffer;
> > - ctx->job.len = len;
> > - ctx = (struct sha1_hash_ctx *)sha1_job_mgr_submit(&mgr->mgr,
> > - &ctx->job);
> > - continue;
> > - }
> > - }
> > -
> > - /*
> > - * If the extra blocks are not empty, then we are
> > - * either on the last block(s) or we need more
> > - * user input before continuing.
> > - */
> > - if (ctx->status & HASH_CTX_STS_LAST) {
> > -
> > - uint8_t *buf = ctx->partial_block_buffer;
> > - uint32_t n_extra_blocks =
> > - sha1_pad(buf, ctx->total_length);
> > -
> > - ctx->status = (HASH_CTX_STS_PROCESSING |
> > - HASH_CTX_STS_COMPLETE);
> > - ctx->job.buffer = buf;
> > - ctx->job.len = (uint32_t) n_extra_blocks;
> > - ctx = (struct sha1_hash_ctx *)
> > - sha1_job_mgr_submit(&mgr->mgr, &ctx->job);
> > - continue;
> > - }
> > -
> > - ctx->status = HASH_CTX_STS_IDLE;
> > - return ctx;
> > - }
> > -
> > - return NULL;
> > -}
> > -
> > -static struct sha1_hash_ctx
> > - *sha1_ctx_mgr_get_comp_ctx(struct sha1_ctx_mgr *mgr)
> > -{
> > - /*
> > - * If get_comp_job returns NULL, there are no jobs complete.
> > - * If get_comp_job returns a job, verify that it is safe to return to
> > - * the user.
> > - * If it is not ready, resubmit the job to finish processing.
> > - * If sha1_ctx_mgr_resubmit returned a job, it is ready to be returned.
> > - * Otherwise, all jobs currently being managed by the hash_ctx_mgr
> > - * still need processing.
> > - */
> > - struct sha1_hash_ctx *ctx;
> > -
> > - ctx = (struct sha1_hash_ctx *) sha1_job_mgr_get_comp_job(&mgr->mgr);
> > - return sha1_ctx_mgr_resubmit(mgr, ctx);
> > -}
> > -
> > -static void sha1_ctx_mgr_init(struct sha1_ctx_mgr *mgr)
> > -{
> > - sha1_job_mgr_init(&mgr->mgr);
> > -}
> > -
> > -static struct sha1_hash_ctx *sha1_ctx_mgr_submit(struct sha1_ctx_mgr *mgr,
> > - struct sha1_hash_ctx *ctx,
> > - const void *buffer,
> > - uint32_t len,
> > - int flags)
> > -{
> > - if (flags & ~(HASH_UPDATE | HASH_LAST)) {
> > - /* User should not pass anything other than UPDATE or LAST */
> > - ctx->error = HASH_CTX_ERROR_INVALID_FLAGS;
> > - return ctx;
> > - }
> > -
> > - if (ctx->status & HASH_CTX_STS_PROCESSING) {
> > - /* Cannot submit to a currently processing job. */
> > - ctx->error = HASH_CTX_ERROR_ALREADY_PROCESSING;
> > - return ctx;
> > - }
> > -
> > - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> > - /* Cannot update a finished job. */
> > - ctx->error = HASH_CTX_ERROR_ALREADY_COMPLETED;
> > - return ctx;
> > - }
> > -
> > - /*
> > - * If we made it here, there were no errors during this call to
> > - * submit
> > - */
> > - ctx->error = HASH_CTX_ERROR_NONE;
> > -
> > - /* Store buffer ptr info from user */
> > - ctx->incoming_buffer = buffer;
> > - ctx->incoming_buffer_length = len;
> > -
> > - /*
> > - * Store the user's request flags and mark this ctx as currently
> > - * being processed.
> > - */
> > - ctx->status = (flags & HASH_LAST) ?
> > - (HASH_CTX_STS_PROCESSING | HASH_CTX_STS_LAST) :
> > - HASH_CTX_STS_PROCESSING;
> > -
> > - /* Advance byte counter */
> > - ctx->total_length += len;
> > -
> > - /*
> > - * If there is anything currently buffered in the extra blocks,
> > - * append to it until it contains a whole block.
> > - * Or if the user's buffer contains less than a whole block,
> > - * append as much as possible to the extra block.
> > - */
> > - if (ctx->partial_block_buffer_length || len < SHA1_BLOCK_SIZE) {
> > - /*
> > - * Compute how many bytes to copy from user buffer into
> > - * extra block
> > - */
> > - uint32_t copy_len = SHA1_BLOCK_SIZE -
> > - ctx->partial_block_buffer_length;
> > - if (len < copy_len)
> > - copy_len = len;
> > -
> > - if (copy_len) {
> > - /* Copy and update relevant pointers and counters */
> > - memcpy(&ctx->partial_block_buffer[ctx->partial_block_buffer_length],
> > - buffer, copy_len);
> > -
> > - ctx->partial_block_buffer_length += copy_len;
> > - ctx->incoming_buffer = (const void *)
> > - ((const char *)buffer + copy_len);
> > - ctx->incoming_buffer_length = len - copy_len;
> > - }
> > -
> > - /*
> > - * The extra block should never contain more than 1 block
> > - * here
> > - */
> > - assert(ctx->partial_block_buffer_length <= SHA1_BLOCK_SIZE);
> > -
> > - /*
> > - * If the extra block buffer contains exactly 1 block, it can
> > - * be hashed.
> > - */
> > - if (ctx->partial_block_buffer_length >= SHA1_BLOCK_SIZE) {
> > - ctx->partial_block_buffer_length = 0;
> > -
> > - ctx->job.buffer = ctx->partial_block_buffer;
> > - ctx->job.len = 1;
> > - ctx = (struct sha1_hash_ctx *)
> > - sha1_job_mgr_submit(&mgr->mgr, &ctx->job);
> > - }
> > - }
> > -
> > - return sha1_ctx_mgr_resubmit(mgr, ctx);
> > -}
> > -
> > -static struct sha1_hash_ctx *sha1_ctx_mgr_flush(struct sha1_ctx_mgr *mgr)
> > -{
> > - struct sha1_hash_ctx *ctx;
> > -
> > - while (1) {
> > - ctx = (struct sha1_hash_ctx *) sha1_job_mgr_flush(&mgr->mgr);
> > -
> > - /* If flush returned 0, there are no more jobs in flight. */
> > - if (!ctx)
> > - return NULL;
> > -
> > - /*
> > - * If flush returned a job, resubmit the job to finish
> > - * processing.
> > - */
> > - ctx = sha1_ctx_mgr_resubmit(mgr, ctx);
> > -
> > - /*
> > - * If sha1_ctx_mgr_resubmit returned a job, it is ready to be
> > - * returned. Otherwise, all jobs currently being managed by the
> > - * sha1_ctx_mgr still need processing. Loop.
> > - */
> > - if (ctx)
> > - return ctx;
> > - }
> > -}
> > -
> > -static int sha1_mb_init(struct ahash_request *areq)
> > -{
> > - struct sha1_hash_ctx *sctx = ahash_request_ctx(areq);
> > -
> > - hash_ctx_init(sctx);
> > - sctx->job.result_digest[0] = SHA1_H0;
> > - sctx->job.result_digest[1] = SHA1_H1;
> > - sctx->job.result_digest[2] = SHA1_H2;
> > - sctx->job.result_digest[3] = SHA1_H3;
> > - sctx->job.result_digest[4] = SHA1_H4;
> > - sctx->total_length = 0;
> > - sctx->partial_block_buffer_length = 0;
> > - sctx->status = HASH_CTX_STS_IDLE;
> > -
> > - return 0;
> > -}
> > -
> > -static int sha1_mb_set_results(struct mcryptd_hash_request_ctx *rctx)
> > -{
> > - int i;
> > - struct sha1_hash_ctx *sctx = ahash_request_ctx(&rctx->areq);
> > - __be32 *dst = (__be32 *) rctx->out;
> > -
> > - for (i = 0; i < 5; ++i)
> > - dst[i] = cpu_to_be32(sctx->job.result_digest[i]);
> > -
> > - return 0;
> > -}
> > -
> > -static int sha_finish_walk(struct mcryptd_hash_request_ctx **ret_rctx,
> > - struct mcryptd_alg_cstate *cstate, bool flush)
> > -{
> > - int flag = HASH_UPDATE;
> > - int nbytes, err = 0;
> > - struct mcryptd_hash_request_ctx *rctx = *ret_rctx;
> > - struct sha1_hash_ctx *sha_ctx;
> > -
> > - /* more work ? */
> > - while (!(rctx->flag & HASH_DONE)) {
> > - nbytes = crypto_ahash_walk_done(&rctx->walk, 0);
> > - if (nbytes < 0) {
> > - err = nbytes;
> > - goto out;
> > - }
> > - /* check if the walk is done */
> > - if (crypto_ahash_walk_last(&rctx->walk)) {
> > - rctx->flag |= HASH_DONE;
> > - if (rctx->flag & HASH_FINAL)
> > - flag |= HASH_LAST;
> > -
> > - }
> > - sha_ctx = (struct sha1_hash_ctx *)
> > - ahash_request_ctx(&rctx->areq);
> > - kernel_fpu_begin();
> > - sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx,
> > - rctx->walk.data, nbytes, flag);
> > - if (!sha_ctx) {
> > - if (flush)
> > - sha_ctx = sha1_ctx_mgr_flush(cstate->mgr);
> > - }
> > - kernel_fpu_end();
> > - if (sha_ctx)
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - else {
> > - rctx = NULL;
> > - goto out;
> > - }
> > - }
> > -
> > - /* copy the results */
> > - if (rctx->flag & HASH_FINAL)
> > - sha1_mb_set_results(rctx);
> > -
> > -out:
> > - *ret_rctx = rctx;
> > - return err;
> > -}
> > -
> > -static int sha_complete_job(struct mcryptd_hash_request_ctx *rctx,
> > - struct mcryptd_alg_cstate *cstate,
> > - int err)
> > -{
> > - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> > - struct sha1_hash_ctx *sha_ctx;
> > - struct mcryptd_hash_request_ctx *req_ctx;
> > - int ret;
> > -
> > - /* remove from work list */
> > - spin_lock(&cstate->work_lock);
> > - list_del(&rctx->waiter);
> > - spin_unlock(&cstate->work_lock);
> > -
> > - if (irqs_disabled())
> > - rctx->complete(&req->base, err);
> > - else {
> > - local_bh_disable();
> > - rctx->complete(&req->base, err);
> > - local_bh_enable();
> > - }
> > -
> > - /* check to see if there are other jobs that are done */
> > - sha_ctx = sha1_ctx_mgr_get_comp_ctx(cstate->mgr);
> > - while (sha_ctx) {
> > - req_ctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&req_ctx, cstate, false);
> > - if (req_ctx) {
> > - spin_lock(&cstate->work_lock);
> > - list_del(&req_ctx->waiter);
> > - spin_unlock(&cstate->work_lock);
> > -
> > - req = cast_mcryptd_ctx_to_req(req_ctx);
> > - if (irqs_disabled())
> > - req_ctx->complete(&req->base, ret);
> > - else {
> > - local_bh_disable();
> > - req_ctx->complete(&req->base, ret);
> > - local_bh_enable();
> > - }
> > - }
> > - sha_ctx = sha1_ctx_mgr_get_comp_ctx(cstate->mgr);
> > - }
> > -
> > - return 0;
> > -}
> > -
> > -static void sha1_mb_add_list(struct mcryptd_hash_request_ctx *rctx,
> > - struct mcryptd_alg_cstate *cstate)
> > -{
> > - unsigned long next_flush;
> > - unsigned long delay = usecs_to_jiffies(FLUSH_INTERVAL);
> > -
> > - /* initialize tag */
> > - rctx->tag.arrival = jiffies; /* tag the arrival time */
> > - rctx->tag.seq_num = cstate->next_seq_num++;
> > - next_flush = rctx->tag.arrival + delay;
> > - rctx->tag.expire = next_flush;
> > -
> > - spin_lock(&cstate->work_lock);
> > - list_add_tail(&rctx->waiter, &cstate->work_list);
> > - spin_unlock(&cstate->work_lock);
> > -
> > - mcryptd_arm_flusher(cstate, delay);
> > -}
> > -
> > -static int sha1_mb_update(struct ahash_request *areq)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx =
> > - container_of(areq, struct mcryptd_hash_request_ctx, areq);
> > - struct mcryptd_alg_cstate *cstate =
> > - this_cpu_ptr(sha1_mb_alg_state.alg_cstate);
> > -
> > - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> > - struct sha1_hash_ctx *sha_ctx;
> > - int ret = 0, nbytes;
> > -
> > -
> > - /* sanity check */
> > - if (rctx->tag.cpu != smp_processor_id()) {
> > - pr_err("mcryptd error: cpu clash\n");
> > - goto done;
> > - }
> > -
> > - /* need to init context */
> > - req_ctx_init(rctx, areq);
> > -
> > - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> > -
> > - if (nbytes < 0) {
> > - ret = nbytes;
> > - goto done;
> > - }
> > -
> > - if (crypto_ahash_walk_last(&rctx->walk))
> > - rctx->flag |= HASH_DONE;
> > -
> > - /* submit */
> > - sha_ctx = (struct sha1_hash_ctx *) ahash_request_ctx(areq);
> > - sha1_mb_add_list(rctx, cstate);
> > - kernel_fpu_begin();
> > - sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
> > - nbytes, HASH_UPDATE);
> > - kernel_fpu_end();
> > -
> > - /* check if anything is returned */
> > - if (!sha_ctx)
> > - return -EINPROGRESS;
> > -
> > - if (sha_ctx->error) {
> > - ret = sha_ctx->error;
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - goto done;
> > - }
> > -
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&rctx, cstate, false);
> > -
> > - if (!rctx)
> > - return -EINPROGRESS;
> > -done:
> > - sha_complete_job(rctx, cstate, ret);
> > - return ret;
> > -}
> > -
> > -static int sha1_mb_finup(struct ahash_request *areq)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx =
> > - container_of(areq, struct mcryptd_hash_request_ctx, areq);
> > - struct mcryptd_alg_cstate *cstate =
> > - this_cpu_ptr(sha1_mb_alg_state.alg_cstate);
> > -
> > - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> > - struct sha1_hash_ctx *sha_ctx;
> > - int ret = 0, flag = HASH_UPDATE, nbytes;
> > -
> > - /* sanity check */
> > - if (rctx->tag.cpu != smp_processor_id()) {
> > - pr_err("mcryptd error: cpu clash\n");
> > - goto done;
> > - }
> > -
> > - /* need to init context */
> > - req_ctx_init(rctx, areq);
> > -
> > - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> > -
> > - if (nbytes < 0) {
> > - ret = nbytes;
> > - goto done;
> > - }
> > -
> > - if (crypto_ahash_walk_last(&rctx->walk)) {
> > - rctx->flag |= HASH_DONE;
> > - flag = HASH_LAST;
> > - }
> > -
> > - /* submit */
> > - rctx->flag |= HASH_FINAL;
> > - sha_ctx = (struct sha1_hash_ctx *) ahash_request_ctx(areq);
> > - sha1_mb_add_list(rctx, cstate);
> > -
> > - kernel_fpu_begin();
> > - sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
> > - nbytes, flag);
> > - kernel_fpu_end();
> > -
> > - /* check if anything is returned */
> > - if (!sha_ctx)
> > - return -EINPROGRESS;
> > -
> > - if (sha_ctx->error) {
> > - ret = sha_ctx->error;
> > - goto done;
> > - }
> > -
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&rctx, cstate, false);
> > - if (!rctx)
> > - return -EINPROGRESS;
> > -done:
> > - sha_complete_job(rctx, cstate, ret);
> > - return ret;
> > -}
> > -
> > -static int sha1_mb_final(struct ahash_request *areq)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx =
> > - container_of(areq, struct mcryptd_hash_request_ctx, areq);
> > - struct mcryptd_alg_cstate *cstate =
> > - this_cpu_ptr(sha1_mb_alg_state.alg_cstate);
> > -
> > - struct sha1_hash_ctx *sha_ctx;
> > - int ret = 0;
> > - u8 data;
> > -
> > - /* sanity check */
> > - if (rctx->tag.cpu != smp_processor_id()) {
> > - pr_err("mcryptd error: cpu clash\n");
> > - goto done;
> > - }
> > -
> > - /* need to init context */
> > - req_ctx_init(rctx, areq);
> > -
> > - rctx->flag |= HASH_DONE | HASH_FINAL;
> > -
> > - sha_ctx = (struct sha1_hash_ctx *) ahash_request_ctx(areq);
> > - /* flag HASH_FINAL and 0 data size */
> > - sha1_mb_add_list(rctx, cstate);
> > - kernel_fpu_begin();
> > - sha_ctx = sha1_ctx_mgr_submit(cstate->mgr, sha_ctx, &data, 0,
> > - HASH_LAST);
> > - kernel_fpu_end();
> > -
> > - /* check if anything is returned */
> > - if (!sha_ctx)
> > - return -EINPROGRESS;
> > -
> > - if (sha_ctx->error) {
> > - ret = sha_ctx->error;
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - goto done;
> > - }
> > -
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&rctx, cstate, false);
> > - if (!rctx)
> > - return -EINPROGRESS;
> > -done:
> > - sha_complete_job(rctx, cstate, ret);
> > - return ret;
> > -}
> > -
> > -static int sha1_mb_export(struct ahash_request *areq, void *out)
> > -{
> > - struct sha1_hash_ctx *sctx = ahash_request_ctx(areq);
> > -
> > - memcpy(out, sctx, sizeof(*sctx));
> > -
> > - return 0;
> > -}
> > -
> > -static int sha1_mb_import(struct ahash_request *areq, const void *in)
> > -{
> > - struct sha1_hash_ctx *sctx = ahash_request_ctx(areq);
> > -
> > - memcpy(sctx, in, sizeof(*sctx));
> > -
> > - return 0;
> > -}
> > -
> > -static int sha1_mb_async_init_tfm(struct crypto_tfm *tfm)
> > -{
> > - struct mcryptd_ahash *mcryptd_tfm;
> > - struct sha1_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> > - struct mcryptd_hash_ctx *mctx;
> > -
> > - mcryptd_tfm = mcryptd_alloc_ahash("__intel_sha1-mb",
> > - CRYPTO_ALG_INTERNAL,
> > - CRYPTO_ALG_INTERNAL);
> > - if (IS_ERR(mcryptd_tfm))
> > - return PTR_ERR(mcryptd_tfm);
> > - mctx = crypto_ahash_ctx(&mcryptd_tfm->base);
> > - mctx->alg_state = &sha1_mb_alg_state;
> > - ctx->mcryptd_tfm = mcryptd_tfm;
> > - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> > - sizeof(struct ahash_request) +
> > - crypto_ahash_reqsize(&mcryptd_tfm->base));
> > -
> > - return 0;
> > -}
> > -
> > -static void sha1_mb_async_exit_tfm(struct crypto_tfm *tfm)
> > -{
> > - struct sha1_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> > -
> > - mcryptd_free_ahash(ctx->mcryptd_tfm);
> > -}
> > -
> > -static int sha1_mb_areq_init_tfm(struct crypto_tfm *tfm)
> > -{
> > - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> > - sizeof(struct ahash_request) +
> > - sizeof(struct sha1_hash_ctx));
> > -
> > - return 0;
> > -}
> > -
> > -static void sha1_mb_areq_exit_tfm(struct crypto_tfm *tfm)
> > -{
> > - struct sha1_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> > -
> > - mcryptd_free_ahash(ctx->mcryptd_tfm);
> > -}
> > -
> > -static struct ahash_alg sha1_mb_areq_alg = {
> > - .init = sha1_mb_init,
> > - .update = sha1_mb_update,
> > - .final = sha1_mb_final,
> > - .finup = sha1_mb_finup,
> > - .export = sha1_mb_export,
> > - .import = sha1_mb_import,
> > - .halg = {
> > - .digestsize = SHA1_DIGEST_SIZE,
> > - .statesize = sizeof(struct sha1_hash_ctx),
> > - .base = {
> > - .cra_name = "__sha1-mb",
> > - .cra_driver_name = "__intel_sha1-mb",
> > - .cra_priority = 100,
> > - /*
> > - * use ASYNC flag as some buffers in multi-buffer
> > - * algo may not have completed before hashing thread
> > - * sleep
> > - */
> > - .cra_flags = CRYPTO_ALG_ASYNC |
> > - CRYPTO_ALG_INTERNAL,
> > - .cra_blocksize = SHA1_BLOCK_SIZE,
> > - .cra_module = THIS_MODULE,
> > - .cra_list = LIST_HEAD_INIT
> > - (sha1_mb_areq_alg.halg.base.cra_list),
> > - .cra_init = sha1_mb_areq_init_tfm,
> > - .cra_exit = sha1_mb_areq_exit_tfm,
> > - .cra_ctxsize = sizeof(struct sha1_hash_ctx),
> > - }
> > - }
> > -};
> > -
> > -static int sha1_mb_async_init(struct ahash_request *req)
> > -{
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_init(mcryptd_req);
> > -}
> > -
> > -static int sha1_mb_async_update(struct ahash_request *req)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > -
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_update(mcryptd_req);
> > -}
> > -
> > -static int sha1_mb_async_finup(struct ahash_request *req)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > -
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_finup(mcryptd_req);
> > -}
> > -
> > -static int sha1_mb_async_final(struct ahash_request *req)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > -
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_final(mcryptd_req);
> > -}
> > -
> > -static int sha1_mb_async_digest(struct ahash_request *req)
> > -{
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_digest(mcryptd_req);
> > -}
> > -
> > -static int sha1_mb_async_export(struct ahash_request *req, void *out)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_export(mcryptd_req, out);
> > -}
> > -
> > -static int sha1_mb_async_import(struct ahash_request *req, const void *in)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha1_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > - struct crypto_ahash *child = mcryptd_ahash_child(mcryptd_tfm);
> > - struct mcryptd_hash_request_ctx *rctx;
> > - struct ahash_request *areq;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - rctx = ahash_request_ctx(mcryptd_req);
> > - areq = &rctx->areq;
> > -
> > - ahash_request_set_tfm(areq, child);
> > - ahash_request_set_callback(areq, CRYPTO_TFM_REQ_MAY_SLEEP,
> > - rctx->complete, req);
> > -
> > - return crypto_ahash_import(mcryptd_req, in);
> > -}
> > -
> > -static struct ahash_alg sha1_mb_async_alg = {
> > - .init = sha1_mb_async_init,
> > - .update = sha1_mb_async_update,
> > - .final = sha1_mb_async_final,
> > - .finup = sha1_mb_async_finup,
> > - .digest = sha1_mb_async_digest,
> > - .export = sha1_mb_async_export,
> > - .import = sha1_mb_async_import,
> > - .halg = {
> > - .digestsize = SHA1_DIGEST_SIZE,
> > - .statesize = sizeof(struct sha1_hash_ctx),
> > - .base = {
> > - .cra_name = "sha1",
> > - .cra_driver_name = "sha1_mb",
> > - /*
> > - * Low priority, since with few concurrent hash requests
> > - * this is extremely slow due to the flush delay. Users
> > - * whose workloads would benefit from this can request
> > - * it explicitly by driver name, or can increase its
> > - * priority at runtime using NETLINK_CRYPTO.
> > - */
> > - .cra_priority = 50,
> > - .cra_flags = CRYPTO_ALG_ASYNC,
> > - .cra_blocksize = SHA1_BLOCK_SIZE,
> > - .cra_module = THIS_MODULE,
> > - .cra_list = LIST_HEAD_INIT(sha1_mb_async_alg.halg.base.cra_list),
> > - .cra_init = sha1_mb_async_init_tfm,
> > - .cra_exit = sha1_mb_async_exit_tfm,
> > - .cra_ctxsize = sizeof(struct sha1_mb_ctx),
> > - .cra_alignmask = 0,
> > - },
> > - },
> > -};
> > -
> > -static unsigned long sha1_mb_flusher(struct mcryptd_alg_cstate *cstate)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx;
> > - unsigned long cur_time;
> > - unsigned long next_flush = 0;
> > - struct sha1_hash_ctx *sha_ctx;
> > -
> > -
> > - cur_time = jiffies;
> > -
> > - while (!list_empty(&cstate->work_list)) {
> > - rctx = list_entry(cstate->work_list.next,
> > - struct mcryptd_hash_request_ctx, waiter);
> > - if (time_before(cur_time, rctx->tag.expire))
> > - break;
> > - kernel_fpu_begin();
> > - sha_ctx = (struct sha1_hash_ctx *)
> > - sha1_ctx_mgr_flush(cstate->mgr);
> > - kernel_fpu_end();
> > - if (!sha_ctx) {
> > - pr_err("sha1_mb error: nothing got flushed for non-empty list\n");
> > - break;
> > - }
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - sha_finish_walk(&rctx, cstate, true);
> > - sha_complete_job(rctx, cstate, 0);
> > - }
> > -
> > - if (!list_empty(&cstate->work_list)) {
> > - rctx = list_entry(cstate->work_list.next,
> > - struct mcryptd_hash_request_ctx, waiter);
> > - /* get the hash context and then flush time */
> > - next_flush = rctx->tag.expire;
> > - mcryptd_arm_flusher(cstate, get_delay(next_flush));
> > - }
> > - return next_flush;
> > -}
> > -
> > -static int __init sha1_mb_mod_init(void)
> > -{
> > -
> > - int cpu;
> > - int err;
> > - struct mcryptd_alg_cstate *cpu_state;
> > -
> > - /* check for dependent cpu features */
> > - if (!boot_cpu_has(X86_FEATURE_AVX2) ||
> > - !boot_cpu_has(X86_FEATURE_BMI2))
> > - return -ENODEV;
> > -
> > - /* initialize multibuffer structures */
> > - sha1_mb_alg_state.alg_cstate = alloc_percpu(struct mcryptd_alg_cstate);
> > -
> > - sha1_job_mgr_init = sha1_mb_mgr_init_avx2;
> > - sha1_job_mgr_submit = sha1_mb_mgr_submit_avx2;
> > - sha1_job_mgr_flush = sha1_mb_mgr_flush_avx2;
> > - sha1_job_mgr_get_comp_job = sha1_mb_mgr_get_comp_job_avx2;
> > -
> > - if (!sha1_mb_alg_state.alg_cstate)
> > - return -ENOMEM;
> > - for_each_possible_cpu(cpu) {
> > - cpu_state = per_cpu_ptr(sha1_mb_alg_state.alg_cstate, cpu);
> > - cpu_state->next_flush = 0;
> > - cpu_state->next_seq_num = 0;
> > - cpu_state->flusher_engaged = false;
> > - INIT_DELAYED_WORK(&cpu_state->flush, mcryptd_flusher);
> > - cpu_state->cpu = cpu;
> > - cpu_state->alg_state = &sha1_mb_alg_state;
> > - cpu_state->mgr = kzalloc(sizeof(struct sha1_ctx_mgr),
> > - GFP_KERNEL);
> > - if (!cpu_state->mgr)
> > - goto err2;
> > - sha1_ctx_mgr_init(cpu_state->mgr);
> > - INIT_LIST_HEAD(&cpu_state->work_list);
> > - spin_lock_init(&cpu_state->work_lock);
> > - }
> > - sha1_mb_alg_state.flusher = &sha1_mb_flusher;
> > -
> > - err = crypto_register_ahash(&sha1_mb_areq_alg);
> > - if (err)
> > - goto err2;
> > - err = crypto_register_ahash(&sha1_mb_async_alg);
> > - if (err)
> > - goto err1;
> > -
> > -
> > - return 0;
> > -err1:
> > - crypto_unregister_ahash(&sha1_mb_areq_alg);
> > -err2:
> > - for_each_possible_cpu(cpu) {
> > - cpu_state = per_cpu_ptr(sha1_mb_alg_state.alg_cstate, cpu);
> > - kfree(cpu_state->mgr);
> > - }
> > - free_percpu(sha1_mb_alg_state.alg_cstate);
> > - return -ENODEV;
> > -}
> > -
> > -static void __exit sha1_mb_mod_fini(void)
> > -{
> > - int cpu;
> > - struct mcryptd_alg_cstate *cpu_state;
> > -
> > - crypto_unregister_ahash(&sha1_mb_async_alg);
> > - crypto_unregister_ahash(&sha1_mb_areq_alg);
> > - for_each_possible_cpu(cpu) {
> > - cpu_state = per_cpu_ptr(sha1_mb_alg_state.alg_cstate, cpu);
> > - kfree(cpu_state->mgr);
> > - }
> > - free_percpu(sha1_mb_alg_state.alg_cstate);
> > -}
> > -
> > -module_init(sha1_mb_mod_init);
> > -module_exit(sha1_mb_mod_fini);
> > -
> > -MODULE_LICENSE("GPL");
> > -MODULE_DESCRIPTION("SHA1 Secure Hash Algorithm, multi buffer accelerated");
> > -
> > -MODULE_ALIAS_CRYPTO("sha1");
> > diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_ctx.h b/arch/x86/crypto/sha1-mb/sha1_mb_ctx.h
> > deleted file mode 100644
> > index 9454bd16f9f8..000000000000
> > --- a/arch/x86/crypto/sha1-mb/sha1_mb_ctx.h
> > +++ /dev/null
> > @@ -1,134 +0,0 @@
> > -/*
> > - * Header file for multi buffer SHA context
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Tim Chen <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#ifndef _SHA_MB_CTX_INTERNAL_H
> > -#define _SHA_MB_CTX_INTERNAL_H
> > -
> > -#include "sha1_mb_mgr.h"
> > -
> > -#define HASH_UPDATE 0x00
> > -#define HASH_LAST 0x01
> > -#define HASH_DONE 0x02
> > -#define HASH_FINAL 0x04
> > -
> > -#define HASH_CTX_STS_IDLE 0x00
> > -#define HASH_CTX_STS_PROCESSING 0x01
> > -#define HASH_CTX_STS_LAST 0x02
> > -#define HASH_CTX_STS_COMPLETE 0x04
> > -
> > -enum hash_ctx_error {
> > - HASH_CTX_ERROR_NONE = 0,
> > - HASH_CTX_ERROR_INVALID_FLAGS = -1,
> > - HASH_CTX_ERROR_ALREADY_PROCESSING = -2,
> > - HASH_CTX_ERROR_ALREADY_COMPLETED = -3,
> > -
> > -#ifdef HASH_CTX_DEBUG
> > - HASH_CTX_ERROR_DEBUG_DIGEST_MISMATCH = -4,
> > -#endif
> > -};
> > -
> > -
> > -#define hash_ctx_user_data(ctx) ((ctx)->user_data)
> > -#define hash_ctx_digest(ctx) ((ctx)->job.result_digest)
> > -#define hash_ctx_processing(ctx) ((ctx)->status & HASH_CTX_STS_PROCESSING)
> > -#define hash_ctx_complete(ctx) ((ctx)->status == HASH_CTX_STS_COMPLETE)
> > -#define hash_ctx_status(ctx) ((ctx)->status)
> > -#define hash_ctx_error(ctx) ((ctx)->error)
> > -#define hash_ctx_init(ctx) \
> > - do { \
> > - (ctx)->error = HASH_CTX_ERROR_NONE; \
> > - (ctx)->status = HASH_CTX_STS_COMPLETE; \
> > - } while (0)
> > -
> > -
> > -/* Hash Constants and Typedefs */
> > -#define SHA1_DIGEST_LENGTH 5
> > -#define SHA1_LOG2_BLOCK_SIZE 6
> > -
> > -#define SHA1_PADLENGTHFIELD_SIZE 8
> > -
> > -#ifdef SHA_MB_DEBUG
> > -#define assert(expr) \
> > -do { \
> > - if (unlikely(!(expr))) { \
> > - printk(KERN_ERR "Assertion failed! %s,%s,%s,line=%d\n", \
> > - #expr, __FILE__, __func__, __LINE__); \
> > - } \
> > -} while (0)
> > -#else
> > -#define assert(expr) do {} while (0)
> > -#endif
> > -
> > -struct sha1_ctx_mgr {
> > - struct sha1_mb_mgr mgr;
> > -};
> > -
> > -/* typedef struct sha1_ctx_mgr sha1_ctx_mgr; */
> > -
> > -struct sha1_hash_ctx {
> > - /* Must be at struct offset 0 */
> > - struct job_sha1 job;
> > - /* status flag */
> > - int status;
> > - /* error flag */
> > - int error;
> > -
> > - uint64_t total_length;
> > - const void *incoming_buffer;
> > - uint32_t incoming_buffer_length;
> > - uint8_t partial_block_buffer[SHA1_BLOCK_SIZE * 2];
> > - uint32_t partial_block_buffer_length;
> > - void *user_data;
> > -};
> > -
> > -#endif
> > diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr.h b/arch/x86/crypto/sha1-mb/sha1_mb_mgr.h
> > deleted file mode 100644
> > index 08ad1a9acfd7..000000000000
> > --- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr.h
> > +++ /dev/null
> > @@ -1,110 +0,0 @@
> > -/*
> > - * Header file for multi buffer SHA1 algorithm manager
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * James Guilford <[email protected]>
> > - * Tim Chen <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -#ifndef __SHA_MB_MGR_H
> > -#define __SHA_MB_MGR_H
> > -
> > -
> > -#include <linux/types.h>
> > -
> > -#define NUM_SHA1_DIGEST_WORDS 5
> > -
> > -enum job_sts { STS_UNKNOWN = 0,
> > - STS_BEING_PROCESSED = 1,
> > - STS_COMPLETED = 2,
> > - STS_INTERNAL_ERROR = 3,
> > - STS_ERROR = 4
> > -};
> > -
> > -struct job_sha1 {
> > - u8 *buffer;
> > - u32 len;
> > - u32 result_digest[NUM_SHA1_DIGEST_WORDS] __aligned(32);
> > - enum job_sts status;
> > - void *user_data;
> > -};
> > -
> > -/* SHA1 out-of-order scheduler */
> > -
> > -/* typedef uint32_t sha1_digest_array[5][8]; */
> > -
> > -struct sha1_args_x8 {
> > - uint32_t digest[5][8];
> > - uint8_t *data_ptr[8];
> > -};
> > -
> > -struct sha1_lane_data {
> > - struct job_sha1 *job_in_lane;
> > -};
> > -
> > -struct sha1_mb_mgr {
> > - struct sha1_args_x8 args;
> > -
> > - uint32_t lens[8];
> > -
> > - /* each byte is index (0...7) of unused lanes */
> > - uint64_t unused_lanes;
> > - /* byte 4 is set to FF as a flag */
> > - struct sha1_lane_data ldata[8];
> > -};
> > -
> > -
> > -#define SHA1_MB_MGR_NUM_LANES_AVX2 8
> > -
> > -void sha1_mb_mgr_init_avx2(struct sha1_mb_mgr *state);
> > -struct job_sha1 *sha1_mb_mgr_submit_avx2(struct sha1_mb_mgr *state,
> > - struct job_sha1 *job);
> > -struct job_sha1 *sha1_mb_mgr_flush_avx2(struct sha1_mb_mgr *state);
> > -struct job_sha1 *sha1_mb_mgr_get_comp_job_avx2(struct sha1_mb_mgr *state);
> > -
> > -#endif
> > diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S
> > deleted file mode 100644
> > index 86688c6e7a25..000000000000
> > --- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S
> > +++ /dev/null
> > @@ -1,287 +0,0 @@
> > -/*
> > - * Header file for multi buffer SHA1 algorithm data structure
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * James Guilford <[email protected]>
> > - * Tim Chen <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -# Macros for defining data structures
> > -
> > -# Usage example
> > -
> > -#START_FIELDS # JOB_AES
> > -### name size align
> > -#FIELD _plaintext, 8, 8 # pointer to plaintext
> > -#FIELD _ciphertext, 8, 8 # pointer to ciphertext
> > -#FIELD _IV, 16, 8 # IV
> > -#FIELD _keys, 8, 8 # pointer to keys
> > -#FIELD _len, 4, 4 # length in bytes
> > -#FIELD _status, 4, 4 # status enumeration
> > -#FIELD _user_data, 8, 8 # pointer to user data
> > -#UNION _union, size1, align1, \
> > -# size2, align2, \
> > -# size3, align3, \
> > -# ...
> > -#END_FIELDS
> > -#%assign _JOB_AES_size _FIELD_OFFSET
> > -#%assign _JOB_AES_align _STRUCT_ALIGN
> > -
> > -#########################################################################
> > -
> > -# Alternate "struc-like" syntax:
> > -# STRUCT job_aes2
> > -# RES_Q .plaintext, 1
> > -# RES_Q .ciphertext, 1
> > -# RES_DQ .IV, 1
> > -# RES_B .nested, _JOB_AES_SIZE, _JOB_AES_ALIGN
> > -# RES_U .union, size1, align1, \
> > -# size2, align2, \
> > -# ...
> > -# ENDSTRUCT
> > -# # Following only needed if nesting
> > -# %assign job_aes2_size _FIELD_OFFSET
> > -# %assign job_aes2_align _STRUCT_ALIGN
> > -#
> > -# RES_* macros take a name, a count and an optional alignment.
> > -# The count in in terms of the base size of the macro, and the
> > -# default alignment is the base size.
> > -# The macros are:
> > -# Macro Base size
> > -# RES_B 1
> > -# RES_W 2
> > -# RES_D 4
> > -# RES_Q 8
> > -# RES_DQ 16
> > -# RES_Y 32
> > -# RES_Z 64
> > -#
> > -# RES_U defines a union. It's arguments are a name and two or more
> > -# pairs of "size, alignment"
> > -#
> > -# The two assigns are only needed if this structure is being nested
> > -# within another. Even if the assigns are not done, one can still use
> > -# STRUCT_NAME_size as the size of the structure.
> > -#
> > -# Note that for nesting, you still need to assign to STRUCT_NAME_size.
> > -#
> > -# The differences between this and using "struc" directly are that each
> > -# type is implicitly aligned to its natural length (although this can be
> > -# over-ridden with an explicit third parameter), and that the structure
> > -# is padded at the end to its overall alignment.
> > -#
> > -
> > -#########################################################################
> > -
> > -#ifndef _SHA1_MB_MGR_DATASTRUCT_ASM_
> > -#define _SHA1_MB_MGR_DATASTRUCT_ASM_
> > -
> > -## START_FIELDS
> > -.macro START_FIELDS
> > - _FIELD_OFFSET = 0
> > - _STRUCT_ALIGN = 0
> > -.endm
> > -
> > -## FIELD name size align
> > -.macro FIELD name size align
> > - _FIELD_OFFSET = (_FIELD_OFFSET + (\align) - 1) & (~ ((\align)-1))
> > - \name = _FIELD_OFFSET
> > - _FIELD_OFFSET = _FIELD_OFFSET + (\size)
> > -.if (\align > _STRUCT_ALIGN)
> > - _STRUCT_ALIGN = \align
> > -.endif
> > -.endm
> > -
> > -## END_FIELDS
> > -.macro END_FIELDS
> > - _FIELD_OFFSET = (_FIELD_OFFSET + _STRUCT_ALIGN-1) & (~ (_STRUCT_ALIGN-1))
> > -.endm
> > -
> > -########################################################################
> > -
> > -.macro STRUCT p1
> > -START_FIELDS
> > -.struc \p1
> > -.endm
> > -
> > -.macro ENDSTRUCT
> > - tmp = _FIELD_OFFSET
> > - END_FIELDS
> > - tmp = (_FIELD_OFFSET - %%tmp)
> > -.if (tmp > 0)
> > - .lcomm tmp
> > -.endif
> > -.endstruc
> > -.endm
> > -
> > -## RES_int name size align
> > -.macro RES_int p1 p2 p3
> > - name = \p1
> > - size = \p2
> > - align = .\p3
> > -
> > - _FIELD_OFFSET = (_FIELD_OFFSET + (align) - 1) & (~ ((align)-1))
> > -.align align
> > -.lcomm name size
> > - _FIELD_OFFSET = _FIELD_OFFSET + (size)
> > -.if (align > _STRUCT_ALIGN)
> > - _STRUCT_ALIGN = align
> > -.endif
> > -.endm
> > -
> > -
> > -
> > -# macro RES_B name, size [, align]
> > -.macro RES_B _name, _size, _align=1
> > -RES_int _name _size _align
> > -.endm
> > -
> > -# macro RES_W name, size [, align]
> > -.macro RES_W _name, _size, _align=2
> > -RES_int _name 2*(_size) _align
> > -.endm
> > -
> > -# macro RES_D name, size [, align]
> > -.macro RES_D _name, _size, _align=4
> > -RES_int _name 4*(_size) _align
> > -.endm
> > -
> > -# macro RES_Q name, size [, align]
> > -.macro RES_Q _name, _size, _align=8
> > -RES_int _name 8*(_size) _align
> > -.endm
> > -
> > -# macro RES_DQ name, size [, align]
> > -.macro RES_DQ _name, _size, _align=16
> > -RES_int _name 16*(_size) _align
> > -.endm
> > -
> > -# macro RES_Y name, size [, align]
> > -.macro RES_Y _name, _size, _align=32
> > -RES_int _name 32*(_size) _align
> > -.endm
> > -
> > -# macro RES_Z name, size [, align]
> > -.macro RES_Z _name, _size, _align=64
> > -RES_int _name 64*(_size) _align
> > -.endm
> > -
> > -
> > -#endif
> > -
> > -########################################################################
> > -#### Define constants
> > -########################################################################
> > -
> > -########################################################################
> > -#### Define SHA1 Out Of Order Data Structures
> > -########################################################################
> > -
> > -START_FIELDS # LANE_DATA
> > -### name size align
> > -FIELD _job_in_lane, 8, 8 # pointer to job object
> > -END_FIELDS
> > -
> > -_LANE_DATA_size = _FIELD_OFFSET
> > -_LANE_DATA_align = _STRUCT_ALIGN
> > -
> > -########################################################################
> > -
> > -START_FIELDS # SHA1_ARGS_X8
> > -### name size align
> > -FIELD _digest, 4*5*8, 16 # transposed digest
> > -FIELD _data_ptr, 8*8, 8 # array of pointers to data
> > -END_FIELDS
> > -
> > -_SHA1_ARGS_X4_size = _FIELD_OFFSET
> > -_SHA1_ARGS_X4_align = _STRUCT_ALIGN
> > -_SHA1_ARGS_X8_size = _FIELD_OFFSET
> > -_SHA1_ARGS_X8_align = _STRUCT_ALIGN
> > -
> > -########################################################################
> > -
> > -START_FIELDS # MB_MGR
> > -### name size align
> > -FIELD _args, _SHA1_ARGS_X4_size, _SHA1_ARGS_X4_align
> > -FIELD _lens, 4*8, 8
> > -FIELD _unused_lanes, 8, 8
> > -FIELD _ldata, _LANE_DATA_size*8, _LANE_DATA_align
> > -END_FIELDS
> > -
> > -_MB_MGR_size = _FIELD_OFFSET
> > -_MB_MGR_align = _STRUCT_ALIGN
> > -
> > -_args_digest = _args + _digest
> > -_args_data_ptr = _args + _data_ptr
> > -
> > -
> > -########################################################################
> > -#### Define constants
> > -########################################################################
> > -
> > -#define STS_UNKNOWN 0
> > -#define STS_BEING_PROCESSED 1
> > -#define STS_COMPLETED 2
> > -
> > -########################################################################
> > -#### Define JOB_SHA1 structure
> > -########################################################################
> > -
> > -START_FIELDS # JOB_SHA1
> > -
> > -### name size align
> > -FIELD _buffer, 8, 8 # pointer to buffer
> > -FIELD _len, 4, 4 # length in bytes
> > -FIELD _result_digest, 5*4, 32 # Digest (output)
> > -FIELD _status, 4, 4
> > -FIELD _user_data, 8, 8
> > -END_FIELDS
> > -
> > -_JOB_SHA1_size = _FIELD_OFFSET
> > -_JOB_SHA1_align = _STRUCT_ALIGN
> > diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S
> > deleted file mode 100644
> > index 7cfba738f104..000000000000
> > --- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S
> > +++ /dev/null
> > @@ -1,304 +0,0 @@
> > -/*
> > - * Flush routine for SHA1 multibuffer
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * James Guilford <[email protected]>
> > - * Tim Chen <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -#include <linux/linkage.h>
> > -#include <asm/frame.h>
> > -#include "sha1_mb_mgr_datastruct.S"
> > -
> > -
> > -.extern sha1_x8_avx2
> > -
> > -# LINUX register definitions
> > -#define arg1 %rdi
> > -#define arg2 %rsi
> > -
> > -# Common definitions
> > -#define state arg1
> > -#define job arg2
> > -#define len2 arg2
> > -
> > -# idx must be a register not clobbered by sha1_x8_avx2
> > -#define idx %r8
> > -#define DWORD_idx %r8d
> > -
> > -#define unused_lanes %rbx
> > -#define lane_data %rbx
> > -#define tmp2 %rbx
> > -#define tmp2_w %ebx
> > -
> > -#define job_rax %rax
> > -#define tmp1 %rax
> > -#define size_offset %rax
> > -#define tmp %rax
> > -#define start_offset %rax
> > -
> > -#define tmp3 %arg1
> > -
> > -#define extra_blocks %arg2
> > -#define p %arg2
> > -
> > -.macro LABEL prefix n
> > -\prefix\n\():
> > -.endm
> > -
> > -.macro JNE_SKIP i
> > -jne skip_\i
> > -.endm
> > -
> > -.altmacro
> > -.macro SET_OFFSET _offset
> > -offset = \_offset
> > -.endm
> > -.noaltmacro
> > -
> > -# JOB* sha1_mb_mgr_flush_avx2(MB_MGR *state)
> > -# arg 1 : rcx : state
> > -ENTRY(sha1_mb_mgr_flush_avx2)
> > - FRAME_BEGIN
> > - push %rbx
> > -
> > - # If bit (32+3) is set, then all lanes are empty
> > - mov _unused_lanes(state), unused_lanes
> > - bt $32+3, unused_lanes
> > - jc return_null
> > -
> > - # find a lane with a non-null job
> > - xor idx, idx
> > - offset = (_ldata + 1 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne one(%rip), idx
> > - offset = (_ldata + 2 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne two(%rip), idx
> > - offset = (_ldata + 3 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne three(%rip), idx
> > - offset = (_ldata + 4 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne four(%rip), idx
> > - offset = (_ldata + 5 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne five(%rip), idx
> > - offset = (_ldata + 6 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne six(%rip), idx
> > - offset = (_ldata + 7 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne seven(%rip), idx
> > -
> > - # copy idx to empty lanes
> > -copy_lane_data:
> > - offset = (_args + _data_ptr)
> > - mov offset(state,idx,8), tmp
> > -
> > - I = 0
> > -.rep 8
> > - offset = (_ldata + I * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > -.altmacro
> > - JNE_SKIP %I
> > - offset = (_args + _data_ptr + 8*I)
> > - mov tmp, offset(state)
> > - offset = (_lens + 4*I)
> > - movl $0xFFFFFFFF, offset(state)
> > -LABEL skip_ %I
> > - I = (I+1)
> > -.noaltmacro
> > -.endr
> > -
> > - # Find min length
> > - vmovdqu _lens+0*16(state), %xmm0
> > - vmovdqu _lens+1*16(state), %xmm1
> > -
> > - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> > - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> > - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min value in low dword
> > -
> > - vmovd %xmm2, DWORD_idx
> > - mov idx, len2
> > - and $0xF, idx
> > - shr $4, len2
> > - jz len_is_0
> > -
> > - vpand clear_low_nibble(%rip), %xmm2, %xmm2
> > - vpshufd $0, %xmm2, %xmm2
> > -
> > - vpsubd %xmm2, %xmm0, %xmm0
> > - vpsubd %xmm2, %xmm1, %xmm1
> > -
> > - vmovdqu %xmm0, _lens+0*16(state)
> > - vmovdqu %xmm1, _lens+1*16(state)
> > -
> > - # "state" and "args" are the same address, arg1
> > - # len is arg2
> > - call sha1_x8_avx2
> > - # state and idx are intact
> > -
> > -
> > -len_is_0:
> > - # process completed job "idx"
> > - imul $_LANE_DATA_size, idx, lane_data
> > - lea _ldata(state, lane_data), lane_data
> > -
> > - mov _job_in_lane(lane_data), job_rax
> > - movq $0, _job_in_lane(lane_data)
> > - movl $STS_COMPLETED, _status(job_rax)
> > - mov _unused_lanes(state), unused_lanes
> > - shl $4, unused_lanes
> > - or idx, unused_lanes
> > - mov unused_lanes, _unused_lanes(state)
> > -
> > - movl $0xFFFFFFFF, _lens(state, idx, 4)
> > -
> > - vmovd _args_digest(state , idx, 4) , %xmm0
> > - vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
> > - vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
> > - vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
> > - movl _args_digest+4*32(state, idx, 4), tmp2_w
> > -
> > - vmovdqu %xmm0, _result_digest(job_rax)
> > - offset = (_result_digest + 1*16)
> > - mov tmp2_w, offset(job_rax)
> > -
> > -return:
> > - pop %rbx
> > - FRAME_END
> > - ret
> > -
> > -return_null:
> > - xor job_rax, job_rax
> > - jmp return
> > -ENDPROC(sha1_mb_mgr_flush_avx2)
> > -
> > -
> > -#################################################################
> > -
> > -.align 16
> > -ENTRY(sha1_mb_mgr_get_comp_job_avx2)
> > - push %rbx
> > -
> > - ## if bit 32+3 is set, then all lanes are empty
> > - mov _unused_lanes(state), unused_lanes
> > - bt $(32+3), unused_lanes
> > - jc .return_null
> > -
> > - # Find min length
> > - vmovdqu _lens(state), %xmm0
> > - vmovdqu _lens+1*16(state), %xmm1
> > -
> > - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> > - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> > - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min value in low dword
> > -
> > - vmovd %xmm2, DWORD_idx
> > - test $~0xF, idx
> > - jnz .return_null
> > -
> > - # process completed job "idx"
> > - imul $_LANE_DATA_size, idx, lane_data
> > - lea _ldata(state, lane_data), lane_data
> > -
> > - mov _job_in_lane(lane_data), job_rax
> > - movq $0, _job_in_lane(lane_data)
> > - movl $STS_COMPLETED, _status(job_rax)
> > - mov _unused_lanes(state), unused_lanes
> > - shl $4, unused_lanes
> > - or idx, unused_lanes
> > - mov unused_lanes, _unused_lanes(state)
> > -
> > - movl $0xFFFFFFFF, _lens(state, idx, 4)
> > -
> > - vmovd _args_digest(state, idx, 4), %xmm0
> > - vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
> > - vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
> > - vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
> > - movl _args_digest+4*32(state, idx, 4), tmp2_w
> > -
> > - vmovdqu %xmm0, _result_digest(job_rax)
> > - movl tmp2_w, _result_digest+1*16(job_rax)
> > -
> > - pop %rbx
> > -
> > - ret
> > -
> > -.return_null:
> > - xor job_rax, job_rax
> > - pop %rbx
> > - ret
> > -ENDPROC(sha1_mb_mgr_get_comp_job_avx2)
> > -
> > -.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
> > -.align 16
> > -clear_low_nibble:
> > -.octa 0x000000000000000000000000FFFFFFF0
> > -
> > -.section .rodata.cst8, "aM", @progbits, 8
> > -.align 8
> > -one:
> > -.quad 1
> > -two:
> > -.quad 2
> > -three:
> > -.quad 3
> > -four:
> > -.quad 4
> > -five:
> > -.quad 5
> > -six:
> > -.quad 6
> > -seven:
> > -.quad 7
> > diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c
> > deleted file mode 100644
> > index d2add0d35f43..000000000000
> > --- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c
> > +++ /dev/null
> > @@ -1,64 +0,0 @@
> > -/*
> > - * Initialization code for multi buffer SHA1 algorithm for AVX2
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Tim Chen <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#include "sha1_mb_mgr.h"
> > -
> > -void sha1_mb_mgr_init_avx2(struct sha1_mb_mgr *state)
> > -{
> > - unsigned int j;
> > - state->unused_lanes = 0xF76543210ULL;
> > - for (j = 0; j < 8; j++) {
> > - state->lens[j] = 0xFFFFFFFF;
> > - state->ldata[j].job_in_lane = NULL;
> > - }
> > -}
> > diff --git a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S b/arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S
> > deleted file mode 100644
> > index 7a93b1c0d69a..000000000000
> > --- a/arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S
> > +++ /dev/null
> > @@ -1,209 +0,0 @@
> > -/*
> > - * Buffer submit code for multi buffer SHA1 algorithm
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * James Guilford <[email protected]>
> > - * Tim Chen <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#include <linux/linkage.h>
> > -#include <asm/frame.h>
> > -#include "sha1_mb_mgr_datastruct.S"
> > -
> > -
> > -.extern sha1_x8_avx
> > -
> > -# LINUX register definitions
> > -arg1 = %rdi
> > -arg2 = %rsi
> > -size_offset = %rcx
> > -tmp2 = %rcx
> > -extra_blocks = %rdx
> > -
> > -# Common definitions
> > -#define state arg1
> > -#define job %rsi
> > -#define len2 arg2
> > -#define p2 arg2
> > -
> > -# idx must be a register not clobberred by sha1_x8_avx2
> > -idx = %r8
> > -DWORD_idx = %r8d
> > -last_len = %r8
> > -
> > -p = %r11
> > -start_offset = %r11
> > -
> > -unused_lanes = %rbx
> > -BYTE_unused_lanes = %bl
> > -
> > -job_rax = %rax
> > -len = %rax
> > -DWORD_len = %eax
> > -
> > -lane = %r12
> > -tmp3 = %r12
> > -
> > -tmp = %r9
> > -DWORD_tmp = %r9d
> > -
> > -lane_data = %r10
> > -
> > -# JOB* submit_mb_mgr_submit_avx2(MB_MGR *state, job_sha1 *job)
> > -# arg 1 : rcx : state
> > -# arg 2 : rdx : job
> > -ENTRY(sha1_mb_mgr_submit_avx2)
> > - FRAME_BEGIN
> > - push %rbx
> > - push %r12
> > -
> > - mov _unused_lanes(state), unused_lanes
> > - mov unused_lanes, lane
> > - and $0xF, lane
> > - shr $4, unused_lanes
> > - imul $_LANE_DATA_size, lane, lane_data
> > - movl $STS_BEING_PROCESSED, _status(job)
> > - lea _ldata(state, lane_data), lane_data
> > - mov unused_lanes, _unused_lanes(state)
> > - movl _len(job), DWORD_len
> > -
> > - mov job, _job_in_lane(lane_data)
> > - shl $4, len
> > - or lane, len
> > -
> > - movl DWORD_len, _lens(state , lane, 4)
> > -
> > - # Load digest words from result_digest
> > - vmovdqu _result_digest(job), %xmm0
> > - mov _result_digest+1*16(job), DWORD_tmp
> > - vmovd %xmm0, _args_digest(state, lane, 4)
> > - vpextrd $1, %xmm0, _args_digest+1*32(state , lane, 4)
> > - vpextrd $2, %xmm0, _args_digest+2*32(state , lane, 4)
> > - vpextrd $3, %xmm0, _args_digest+3*32(state , lane, 4)
> > - movl DWORD_tmp, _args_digest+4*32(state , lane, 4)
> > -
> > - mov _buffer(job), p
> > - mov p, _args_data_ptr(state, lane, 8)
> > -
> > - cmp $0xF, unused_lanes
> > - jne return_null
> > -
> > -start_loop:
> > - # Find min length
> > - vmovdqa _lens(state), %xmm0
> > - vmovdqa _lens+1*16(state), %xmm1
> > -
> > - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> > - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> > - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min value in low dword
> > -
> > - vmovd %xmm2, DWORD_idx
> > - mov idx, len2
> > - and $0xF, idx
> > - shr $4, len2
> > - jz len_is_0
> > -
> > - vpand clear_low_nibble(%rip), %xmm2, %xmm2
> > - vpshufd $0, %xmm2, %xmm2
> > -
> > - vpsubd %xmm2, %xmm0, %xmm0
> > - vpsubd %xmm2, %xmm1, %xmm1
> > -
> > - vmovdqa %xmm0, _lens + 0*16(state)
> > - vmovdqa %xmm1, _lens + 1*16(state)
> > -
> > -
> > - # "state" and "args" are the same address, arg1
> > - # len is arg2
> > - call sha1_x8_avx2
> > -
> > - # state and idx are intact
> > -
> > -len_is_0:
> > - # process completed job "idx"
> > - imul $_LANE_DATA_size, idx, lane_data
> > - lea _ldata(state, lane_data), lane_data
> > -
> > - mov _job_in_lane(lane_data), job_rax
> > - mov _unused_lanes(state), unused_lanes
> > - movq $0, _job_in_lane(lane_data)
> > - movl $STS_COMPLETED, _status(job_rax)
> > - shl $4, unused_lanes
> > - or idx, unused_lanes
> > - mov unused_lanes, _unused_lanes(state)
> > -
> > - movl $0xFFFFFFFF, _lens(state, idx, 4)
> > -
> > - vmovd _args_digest(state, idx, 4), %xmm0
> > - vpinsrd $1, _args_digest+1*32(state , idx, 4), %xmm0, %xmm0
> > - vpinsrd $2, _args_digest+2*32(state , idx, 4), %xmm0, %xmm0
> > - vpinsrd $3, _args_digest+3*32(state , idx, 4), %xmm0, %xmm0
> > - movl _args_digest+4*32(state, idx, 4), DWORD_tmp
> > -
> > - vmovdqu %xmm0, _result_digest(job_rax)
> > - movl DWORD_tmp, _result_digest+1*16(job_rax)
> > -
> > -return:
> > - pop %r12
> > - pop %rbx
> > - FRAME_END
> > - ret
> > -
> > -return_null:
> > - xor job_rax, job_rax
> > - jmp return
> > -
> > -ENDPROC(sha1_mb_mgr_submit_avx2)
> > -
> > -.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
> > -.align 16
> > -clear_low_nibble:
> > - .octa 0x000000000000000000000000FFFFFFF0
> > diff --git a/arch/x86/crypto/sha1-mb/sha1_x8_avx2.S b/arch/x86/crypto/sha1-mb/sha1_x8_avx2.S
> > deleted file mode 100644
> > index 20f77aa633de..000000000000
> > --- a/arch/x86/crypto/sha1-mb/sha1_x8_avx2.S
> > +++ /dev/null
> > @@ -1,492 +0,0 @@
> > -/*
> > - * Multi-buffer SHA1 algorithm hash compute routine
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * James Guilford <[email protected]>
> > - * Tim Chen <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2014 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#include <linux/linkage.h>
> > -#include "sha1_mb_mgr_datastruct.S"
> > -
> > -## code to compute oct SHA1 using SSE-256
> > -## outer calling routine takes care of save and restore of XMM registers
> > -
> > -## Function clobbers: rax, rcx, rdx, rbx, rsi, rdi, r9-r15# ymm0-15
> > -##
> > -## Linux clobbers: rax rbx rcx rdx rsi r9 r10 r11 r12 r13 r14 r15
> > -## Linux preserves: rdi rbp r8
> > -##
> > -## clobbers ymm0-15
> > -
> > -
> > -# TRANSPOSE8 r0, r1, r2, r3, r4, r5, r6, r7, t0, t1
> > -# "transpose" data in {r0...r7} using temps {t0...t1}
> > -# Input looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
> > -# r0 = {a7 a6 a5 a4 a3 a2 a1 a0}
> > -# r1 = {b7 b6 b5 b4 b3 b2 b1 b0}
> > -# r2 = {c7 c6 c5 c4 c3 c2 c1 c0}
> > -# r3 = {d7 d6 d5 d4 d3 d2 d1 d0}
> > -# r4 = {e7 e6 e5 e4 e3 e2 e1 e0}
> > -# r5 = {f7 f6 f5 f4 f3 f2 f1 f0}
> > -# r6 = {g7 g6 g5 g4 g3 g2 g1 g0}
> > -# r7 = {h7 h6 h5 h4 h3 h2 h1 h0}
> > -#
> > -# Output looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
> > -# r0 = {h0 g0 f0 e0 d0 c0 b0 a0}
> > -# r1 = {h1 g1 f1 e1 d1 c1 b1 a1}
> > -# r2 = {h2 g2 f2 e2 d2 c2 b2 a2}
> > -# r3 = {h3 g3 f3 e3 d3 c3 b3 a3}
> > -# r4 = {h4 g4 f4 e4 d4 c4 b4 a4}
> > -# r5 = {h5 g5 f5 e5 d5 c5 b5 a5}
> > -# r6 = {h6 g6 f6 e6 d6 c6 b6 a6}
> > -# r7 = {h7 g7 f7 e7 d7 c7 b7 a7}
> > -#
> > -
> > -.macro TRANSPOSE8 r0 r1 r2 r3 r4 r5 r6 r7 t0 t1
> > - # process top half (r0..r3) {a...d}
> > - vshufps $0x44, \r1, \r0, \t0 # t0 = {b5 b4 a5 a4 b1 b0 a1 a0}
> > - vshufps $0xEE, \r1, \r0, \r0 # r0 = {b7 b6 a7 a6 b3 b2 a3 a2}
> > - vshufps $0x44, \r3, \r2, \t1 # t1 = {d5 d4 c5 c4 d1 d0 c1 c0}
> > - vshufps $0xEE, \r3, \r2, \r2 # r2 = {d7 d6 c7 c6 d3 d2 c3 c2}
> > - vshufps $0xDD, \t1, \t0, \r3 # r3 = {d5 c5 b5 a5 d1 c1 b1 a1}
> > - vshufps $0x88, \r2, \r0, \r1 # r1 = {d6 c6 b6 a6 d2 c2 b2 a2}
> > - vshufps $0xDD, \r2, \r0, \r0 # r0 = {d7 c7 b7 a7 d3 c3 b3 a3}
> > - vshufps $0x88, \t1, \t0, \t0 # t0 = {d4 c4 b4 a4 d0 c0 b0 a0}
> > -
> > - # use r2 in place of t0
> > - # process bottom half (r4..r7) {e...h}
> > - vshufps $0x44, \r5, \r4, \r2 # r2 = {f5 f4 e5 e4 f1 f0 e1 e0}
> > - vshufps $0xEE, \r5, \r4, \r4 # r4 = {f7 f6 e7 e6 f3 f2 e3 e2}
> > - vshufps $0x44, \r7, \r6, \t1 # t1 = {h5 h4 g5 g4 h1 h0 g1 g0}
> > - vshufps $0xEE, \r7, \r6, \r6 # r6 = {h7 h6 g7 g6 h3 h2 g3 g2}
> > - vshufps $0xDD, \t1, \r2, \r7 # r7 = {h5 g5 f5 e5 h1 g1 f1 e1}
> > - vshufps $0x88, \r6, \r4, \r5 # r5 = {h6 g6 f6 e6 h2 g2 f2 e2}
> > - vshufps $0xDD, \r6, \r4, \r4 # r4 = {h7 g7 f7 e7 h3 g3 f3 e3}
> > - vshufps $0x88, \t1, \r2, \t1 # t1 = {h4 g4 f4 e4 h0 g0 f0 e0}
> > -
> > - vperm2f128 $0x13, \r1, \r5, \r6 # h6...a6
> > - vperm2f128 $0x02, \r1, \r5, \r2 # h2...a2
> > - vperm2f128 $0x13, \r3, \r7, \r5 # h5...a5
> > - vperm2f128 $0x02, \r3, \r7, \r1 # h1...a1
> > - vperm2f128 $0x13, \r0, \r4, \r7 # h7...a7
> > - vperm2f128 $0x02, \r0, \r4, \r3 # h3...a3
> > - vperm2f128 $0x13, \t0, \t1, \r4 # h4...a4
> > - vperm2f128 $0x02, \t0, \t1, \r0 # h0...a0
> > -
> > -.endm
> > -##
> > -## Magic functions defined in FIPS 180-1
> > -##
> > -# macro MAGIC_F0 F,B,C,D,T ## F = (D ^ (B & (C ^ D)))
> > -.macro MAGIC_F0 regF regB regC regD regT
> > - vpxor \regD, \regC, \regF
> > - vpand \regB, \regF, \regF
> > - vpxor \regD, \regF, \regF
> > -.endm
> > -
> > -# macro MAGIC_F1 F,B,C,D,T ## F = (B ^ C ^ D)
> > -.macro MAGIC_F1 regF regB regC regD regT
> > - vpxor \regC, \regD, \regF
> > - vpxor \regB, \regF, \regF
> > -.endm
> > -
> > -# macro MAGIC_F2 F,B,C,D,T ## F = ((B & C) | (B & D) | (C & D))
> > -.macro MAGIC_F2 regF regB regC regD regT
> > - vpor \regC, \regB, \regF
> > - vpand \regC, \regB, \regT
> > - vpand \regD, \regF, \regF
> > - vpor \regT, \regF, \regF
> > -.endm
> > -
> > -# macro MAGIC_F3 F,B,C,D,T ## F = (B ^ C ^ D)
> > -.macro MAGIC_F3 regF regB regC regD regT
> > - MAGIC_F1 \regF,\regB,\regC,\regD,\regT
> > -.endm
> > -
> > -# PROLD reg, imm, tmp
> > -.macro PROLD reg imm tmp
> > - vpsrld $(32-\imm), \reg, \tmp
> > - vpslld $\imm, \reg, \reg
> > - vpor \tmp, \reg, \reg
> > -.endm
> > -
> > -.macro PROLD_nd reg imm tmp src
> > - vpsrld $(32-\imm), \src, \tmp
> > - vpslld $\imm, \src, \reg
> > - vpor \tmp, \reg, \reg
> > -.endm
> > -
> > -.macro SHA1_STEP_00_15 regA regB regC regD regE regT regF memW immCNT MAGIC
> > - vpaddd \immCNT, \regE, \regE
> > - vpaddd \memW*32(%rsp), \regE, \regE
> > - PROLD_nd \regT, 5, \regF, \regA
> > - vpaddd \regT, \regE, \regE
> > - \MAGIC \regF, \regB, \regC, \regD, \regT
> > - PROLD \regB, 30, \regT
> > - vpaddd \regF, \regE, \regE
> > -.endm
> > -
> > -.macro SHA1_STEP_16_79 regA regB regC regD regE regT regF memW immCNT MAGIC
> > - vpaddd \immCNT, \regE, \regE
> > - offset = ((\memW - 14) & 15) * 32
> > - vmovdqu offset(%rsp), W14
> > - vpxor W14, W16, W16
> > - offset = ((\memW - 8) & 15) * 32
> > - vpxor offset(%rsp), W16, W16
> > - offset = ((\memW - 3) & 15) * 32
> > - vpxor offset(%rsp), W16, W16
> > - vpsrld $(32-1), W16, \regF
> > - vpslld $1, W16, W16
> > - vpor W16, \regF, \regF
> > -
> > - ROTATE_W
> > -
> > - offset = ((\memW - 0) & 15) * 32
> > - vmovdqu \regF, offset(%rsp)
> > - vpaddd \regF, \regE, \regE
> > - PROLD_nd \regT, 5, \regF, \regA
> > - vpaddd \regT, \regE, \regE
> > - \MAGIC \regF,\regB,\regC,\regD,\regT ## FUN = MAGIC_Fi(B,C,D)
> > - PROLD \regB,30, \regT
> > - vpaddd \regF, \regE, \regE
> > -.endm
> > -
> > -########################################################################
> > -########################################################################
> > -########################################################################
> > -
> > -## FRAMESZ plus pushes must be an odd multiple of 8
> > -YMM_SAVE = (15-15)*32
> > -FRAMESZ = 32*16 + YMM_SAVE
> > -_YMM = FRAMESZ - YMM_SAVE
> > -
> > -#define VMOVPS vmovups
> > -
> > -IDX = %rax
> > -inp0 = %r9
> > -inp1 = %r10
> > -inp2 = %r11
> > -inp3 = %r12
> > -inp4 = %r13
> > -inp5 = %r14
> > -inp6 = %r15
> > -inp7 = %rcx
> > -arg1 = %rdi
> > -arg2 = %rsi
> > -RSP_SAVE = %rdx
> > -
> > -# ymm0 A
> > -# ymm1 B
> > -# ymm2 C
> > -# ymm3 D
> > -# ymm4 E
> > -# ymm5 F AA
> > -# ymm6 T0 BB
> > -# ymm7 T1 CC
> > -# ymm8 T2 DD
> > -# ymm9 T3 EE
> > -# ymm10 T4 TMP
> > -# ymm11 T5 FUN
> > -# ymm12 T6 K
> > -# ymm13 T7 W14
> > -# ymm14 T8 W15
> > -# ymm15 T9 W16
> > -
> > -
> > -A = %ymm0
> > -B = %ymm1
> > -C = %ymm2
> > -D = %ymm3
> > -E = %ymm4
> > -F = %ymm5
> > -T0 = %ymm6
> > -T1 = %ymm7
> > -T2 = %ymm8
> > -T3 = %ymm9
> > -T4 = %ymm10
> > -T5 = %ymm11
> > -T6 = %ymm12
> > -T7 = %ymm13
> > -T8 = %ymm14
> > -T9 = %ymm15
> > -
> > -AA = %ymm5
> > -BB = %ymm6
> > -CC = %ymm7
> > -DD = %ymm8
> > -EE = %ymm9
> > -TMP = %ymm10
> > -FUN = %ymm11
> > -K = %ymm12
> > -W14 = %ymm13
> > -W15 = %ymm14
> > -W16 = %ymm15
> > -
> > -.macro ROTATE_ARGS
> > - TMP_ = E
> > - E = D
> > - D = C
> > - C = B
> > - B = A
> > - A = TMP_
> > -.endm
> > -
> > -.macro ROTATE_W
> > -TMP_ = W16
> > -W16 = W15
> > -W15 = W14
> > -W14 = TMP_
> > -.endm
> > -
> > -# 8 streams x 5 32bit words per digest x 4 bytes per word
> > -#define DIGEST_SIZE (8*5*4)
> > -
> > -.align 32
> > -
> > -# void sha1_x8_avx2(void **input_data, UINT128 *digest, UINT32 size)
> > -# arg 1 : pointer to array[4] of pointer to input data
> > -# arg 2 : size (in blocks) ;; assumed to be >= 1
> > -#
> > -ENTRY(sha1_x8_avx2)
> > -
> > - # save callee-saved clobbered registers to comply with C function ABI
> > - push %r12
> > - push %r13
> > - push %r14
> > - push %r15
> > -
> > - #save rsp
> > - mov %rsp, RSP_SAVE
> > - sub $FRAMESZ, %rsp
> > -
> > - #align rsp to 32 Bytes
> > - and $~0x1F, %rsp
> > -
> > - ## Initialize digests
> > - vmovdqu 0*32(arg1), A
> > - vmovdqu 1*32(arg1), B
> > - vmovdqu 2*32(arg1), C
> > - vmovdqu 3*32(arg1), D
> > - vmovdqu 4*32(arg1), E
> > -
> > - ## transpose input onto stack
> > - mov _data_ptr+0*8(arg1),inp0
> > - mov _data_ptr+1*8(arg1),inp1
> > - mov _data_ptr+2*8(arg1),inp2
> > - mov _data_ptr+3*8(arg1),inp3
> > - mov _data_ptr+4*8(arg1),inp4
> > - mov _data_ptr+5*8(arg1),inp5
> > - mov _data_ptr+6*8(arg1),inp6
> > - mov _data_ptr+7*8(arg1),inp7
> > -
> > - xor IDX, IDX
> > -lloop:
> > - vmovdqu PSHUFFLE_BYTE_FLIP_MASK(%rip), F
> > - I=0
> > -.rep 2
> > - VMOVPS (inp0, IDX), T0
> > - VMOVPS (inp1, IDX), T1
> > - VMOVPS (inp2, IDX), T2
> > - VMOVPS (inp3, IDX), T3
> > - VMOVPS (inp4, IDX), T4
> > - VMOVPS (inp5, IDX), T5
> > - VMOVPS (inp6, IDX), T6
> > - VMOVPS (inp7, IDX), T7
> > -
> > - TRANSPOSE8 T0, T1, T2, T3, T4, T5, T6, T7, T8, T9
> > - vpshufb F, T0, T0
> > - vmovdqu T0, (I*8)*32(%rsp)
> > - vpshufb F, T1, T1
> > - vmovdqu T1, (I*8+1)*32(%rsp)
> > - vpshufb F, T2, T2
> > - vmovdqu T2, (I*8+2)*32(%rsp)
> > - vpshufb F, T3, T3
> > - vmovdqu T3, (I*8+3)*32(%rsp)
> > - vpshufb F, T4, T4
> > - vmovdqu T4, (I*8+4)*32(%rsp)
> > - vpshufb F, T5, T5
> > - vmovdqu T5, (I*8+5)*32(%rsp)
> > - vpshufb F, T6, T6
> > - vmovdqu T6, (I*8+6)*32(%rsp)
> > - vpshufb F, T7, T7
> > - vmovdqu T7, (I*8+7)*32(%rsp)
> > - add $32, IDX
> > - I = (I+1)
> > -.endr
> > - # save old digests
> > - vmovdqu A,AA
> > - vmovdqu B,BB
> > - vmovdqu C,CC
> > - vmovdqu D,DD
> > - vmovdqu E,EE
> > -
> > -##
> > -## perform 0-79 steps
> > -##
> > - vmovdqu K00_19(%rip), K
> > -## do rounds 0...15
> > - I = 0
> > -.rep 16
> > - SHA1_STEP_00_15 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F0
> > - ROTATE_ARGS
> > - I = (I+1)
> > -.endr
> > -
> > -## do rounds 16...19
> > - vmovdqu ((16 - 16) & 15) * 32 (%rsp), W16
> > - vmovdqu ((16 - 15) & 15) * 32 (%rsp), W15
> > -.rep 4
> > - SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F0
> > - ROTATE_ARGS
> > - I = (I+1)
> > -.endr
> > -
> > -## do rounds 20...39
> > - vmovdqu K20_39(%rip), K
> > -.rep 20
> > - SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F1
> > - ROTATE_ARGS
> > - I = (I+1)
> > -.endr
> > -
> > -## do rounds 40...59
> > - vmovdqu K40_59(%rip), K
> > -.rep 20
> > - SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F2
> > - ROTATE_ARGS
> > - I = (I+1)
> > -.endr
> > -
> > -## do rounds 60...79
> > - vmovdqu K60_79(%rip), K
> > -.rep 20
> > - SHA1_STEP_16_79 A,B,C,D,E, TMP,FUN, I, K, MAGIC_F3
> > - ROTATE_ARGS
> > - I = (I+1)
> > -.endr
> > -
> > - vpaddd AA,A,A
> > - vpaddd BB,B,B
> > - vpaddd CC,C,C
> > - vpaddd DD,D,D
> > - vpaddd EE,E,E
> > -
> > - sub $1, arg2
> > - jne lloop
> > -
> > - # write out digests
> > - vmovdqu A, 0*32(arg1)
> > - vmovdqu B, 1*32(arg1)
> > - vmovdqu C, 2*32(arg1)
> > - vmovdqu D, 3*32(arg1)
> > - vmovdqu E, 4*32(arg1)
> > -
> > - # update input pointers
> > - add IDX, inp0
> > - add IDX, inp1
> > - add IDX, inp2
> > - add IDX, inp3
> > - add IDX, inp4
> > - add IDX, inp5
> > - add IDX, inp6
> > - add IDX, inp7
> > - mov inp0, _data_ptr (arg1)
> > - mov inp1, _data_ptr + 1*8(arg1)
> > - mov inp2, _data_ptr + 2*8(arg1)
> > - mov inp3, _data_ptr + 3*8(arg1)
> > - mov inp4, _data_ptr + 4*8(arg1)
> > - mov inp5, _data_ptr + 5*8(arg1)
> > - mov inp6, _data_ptr + 6*8(arg1)
> > - mov inp7, _data_ptr + 7*8(arg1)
> > -
> > - ################
> > - ## Postamble
> > -
> > - mov RSP_SAVE, %rsp
> > -
> > - # restore callee-saved clobbered registers
> > - pop %r15
> > - pop %r14
> > - pop %r13
> > - pop %r12
> > -
> > - ret
> > -ENDPROC(sha1_x8_avx2)
> > -
> > -
> > -.section .rodata.cst32.K00_19, "aM", @progbits, 32
> > -.align 32
> > -K00_19:
> > -.octa 0x5A8279995A8279995A8279995A827999
> > -.octa 0x5A8279995A8279995A8279995A827999
> > -
> > -.section .rodata.cst32.K20_39, "aM", @progbits, 32
> > -.align 32
> > -K20_39:
> > -.octa 0x6ED9EBA16ED9EBA16ED9EBA16ED9EBA1
> > -.octa 0x6ED9EBA16ED9EBA16ED9EBA16ED9EBA1
> > -
> > -.section .rodata.cst32.K40_59, "aM", @progbits, 32
> > -.align 32
> > -K40_59:
> > -.octa 0x8F1BBCDC8F1BBCDC8F1BBCDC8F1BBCDC
> > -.octa 0x8F1BBCDC8F1BBCDC8F1BBCDC8F1BBCDC
> > -
> > -.section .rodata.cst32.K60_79, "aM", @progbits, 32
> > -.align 32
> > -K60_79:
> > -.octa 0xCA62C1D6CA62C1D6CA62C1D6CA62C1D6
> > -.octa 0xCA62C1D6CA62C1D6CA62C1D6CA62C1D6
> > -
> > -.section .rodata.cst32.PSHUFFLE_BYTE_FLIP_MASK, "aM", @progbits, 32
> > -.align 32
> > -PSHUFFLE_BYTE_FLIP_MASK:
> > -.octa 0x0c0d0e0f08090a0b0405060700010203
> > -.octa 0x0c0d0e0f08090a0b0405060700010203
> > diff --git a/arch/x86/crypto/sha256-mb/Makefile b/arch/x86/crypto/sha256-mb/Makefile
> > deleted file mode 100644
> > index 53ad6e7db747..000000000000
> > --- a/arch/x86/crypto/sha256-mb/Makefile
> > +++ /dev/null
> > @@ -1,14 +0,0 @@
> > -# SPDX-License-Identifier: GPL-2.0
> > -#
> > -# Arch-specific CryptoAPI modules.
> > -#
> > -
> > -OBJECT_FILES_NON_STANDARD := y
> > -
> > -avx2_supported := $(call as-instr,vpgatherdd %ymm0$(comma)(%eax$(comma)%ymm1\
> > - $(comma)4)$(comma)%ymm2,yes,no)
> > -ifeq ($(avx2_supported),yes)
> > - obj-$(CONFIG_CRYPTO_SHA256_MB) += sha256-mb.o
> > - sha256-mb-y := sha256_mb.o sha256_mb_mgr_flush_avx2.o \
> > - sha256_mb_mgr_init_avx2.o sha256_mb_mgr_submit_avx2.o sha256_x8_avx2.o
> > -endif
> > diff --git a/arch/x86/crypto/sha256-mb/sha256_mb.c b/arch/x86/crypto/sha256-mb/sha256_mb.c
> > deleted file mode 100644
> > index 97c5fc43e115..000000000000
> > --- a/arch/x86/crypto/sha256-mb/sha256_mb.c
> > +++ /dev/null
> > @@ -1,1013 +0,0 @@
> > -/*
> > - * Multi buffer SHA256 algorithm Glue Code
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
> > -
> > -#include <crypto/internal/hash.h>
> > -#include <linux/init.h>
> > -#include <linux/module.h>
> > -#include <linux/mm.h>
> > -#include <linux/cryptohash.h>
> > -#include <linux/types.h>
> > -#include <linux/list.h>
> > -#include <crypto/scatterwalk.h>
> > -#include <crypto/sha.h>
> > -#include <crypto/mcryptd.h>
> > -#include <crypto/crypto_wq.h>
> > -#include <asm/byteorder.h>
> > -#include <linux/hardirq.h>
> > -#include <asm/fpu/api.h>
> > -#include "sha256_mb_ctx.h"
> > -
> > -#define FLUSH_INTERVAL 1000 /* in usec */
> > -
> > -static struct mcryptd_alg_state sha256_mb_alg_state;
> > -
> > -struct sha256_mb_ctx {
> > - struct mcryptd_ahash *mcryptd_tfm;
> > -};
> > -
> > -static inline struct mcryptd_hash_request_ctx
> > - *cast_hash_to_mcryptd_ctx(struct sha256_hash_ctx *hash_ctx)
> > -{
> > - struct ahash_request *areq;
> > -
> > - areq = container_of((void *) hash_ctx, struct ahash_request, __ctx);
> > - return container_of(areq, struct mcryptd_hash_request_ctx, areq);
> > -}
> > -
> > -static inline struct ahash_request
> > - *cast_mcryptd_ctx_to_req(struct mcryptd_hash_request_ctx *ctx)
> > -{
> > - return container_of((void *) ctx, struct ahash_request, __ctx);
> > -}
> > -
> > -static void req_ctx_init(struct mcryptd_hash_request_ctx *rctx,
> > - struct ahash_request *areq)
> > -{
> > - rctx->flag = HASH_UPDATE;
> > -}
> > -
> > -static asmlinkage void (*sha256_job_mgr_init)(struct sha256_mb_mgr *state);
> > -static asmlinkage struct job_sha256* (*sha256_job_mgr_submit)
> > - (struct sha256_mb_mgr *state, struct job_sha256 *job);
> > -static asmlinkage struct job_sha256* (*sha256_job_mgr_flush)
> > - (struct sha256_mb_mgr *state);
> > -static asmlinkage struct job_sha256* (*sha256_job_mgr_get_comp_job)
> > - (struct sha256_mb_mgr *state);
> > -
> > -inline uint32_t sha256_pad(uint8_t padblock[SHA256_BLOCK_SIZE * 2],
> > - uint64_t total_len)
> > -{
> > - uint32_t i = total_len & (SHA256_BLOCK_SIZE - 1);
> > -
> > - memset(&padblock[i], 0, SHA256_BLOCK_SIZE);
> > - padblock[i] = 0x80;
> > -
> > - i += ((SHA256_BLOCK_SIZE - 1) &
> > - (0 - (total_len + SHA256_PADLENGTHFIELD_SIZE + 1)))
> > - + 1 + SHA256_PADLENGTHFIELD_SIZE;
> > -
> > -#if SHA256_PADLENGTHFIELD_SIZE == 16
> > - *((uint64_t *) &padblock[i - 16]) = 0;
> > -#endif
> > -
> > - *((uint64_t *) &padblock[i - 8]) = cpu_to_be64(total_len << 3);
> > -
> > - /* Number of extra blocks to hash */
> > - return i >> SHA256_LOG2_BLOCK_SIZE;
> > -}
> > -
> > -static struct sha256_hash_ctx
> > - *sha256_ctx_mgr_resubmit(struct sha256_ctx_mgr *mgr,
> > - struct sha256_hash_ctx *ctx)
> > -{
> > - while (ctx) {
> > - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> > - /* Clear PROCESSING bit */
> > - ctx->status = HASH_CTX_STS_COMPLETE;
> > - return ctx;
> > - }
> > -
> > - /*
> > - * If the extra blocks are empty, begin hashing what remains
> > - * in the user's buffer.
> > - */
> > - if (ctx->partial_block_buffer_length == 0 &&
> > - ctx->incoming_buffer_length) {
> > -
> > - const void *buffer = ctx->incoming_buffer;
> > - uint32_t len = ctx->incoming_buffer_length;
> > - uint32_t copy_len;
> > -
> > - /*
> > - * Only entire blocks can be hashed.
> > - * Copy remainder to extra blocks buffer.
> > - */
> > - copy_len = len & (SHA256_BLOCK_SIZE-1);
> > -
> > - if (copy_len) {
> > - len -= copy_len;
> > - memcpy(ctx->partial_block_buffer,
> > - ((const char *) buffer + len),
> > - copy_len);
> > - ctx->partial_block_buffer_length = copy_len;
> > - }
> > -
> > - ctx->incoming_buffer_length = 0;
> > -
> > - /* len should be a multiple of the block size now */
> > - assert((len % SHA256_BLOCK_SIZE) == 0);
> > -
> > - /* Set len to the number of blocks to be hashed */
> > - len >>= SHA256_LOG2_BLOCK_SIZE;
> > -
> > - if (len) {
> > -
> > - ctx->job.buffer = (uint8_t *) buffer;
> > - ctx->job.len = len;
> > - ctx = (struct sha256_hash_ctx *)
> > - sha256_job_mgr_submit(&mgr->mgr, &ctx->job);
> > - continue;
> > - }
> > - }
> > -
> > - /*
> > - * If the extra blocks are not empty, then we are
> > - * either on the last block(s) or we need more
> > - * user input before continuing.
> > - */
> > - if (ctx->status & HASH_CTX_STS_LAST) {
> > -
> > - uint8_t *buf = ctx->partial_block_buffer;
> > - uint32_t n_extra_blocks =
> > - sha256_pad(buf, ctx->total_length);
> > -
> > - ctx->status = (HASH_CTX_STS_PROCESSING |
> > - HASH_CTX_STS_COMPLETE);
> > - ctx->job.buffer = buf;
> > - ctx->job.len = (uint32_t) n_extra_blocks;
> > - ctx = (struct sha256_hash_ctx *)
> > - sha256_job_mgr_submit(&mgr->mgr, &ctx->job);
> > - continue;
> > - }
> > -
> > - ctx->status = HASH_CTX_STS_IDLE;
> > - return ctx;
> > - }
> > -
> > - return NULL;
> > -}
> > -
> > -static struct sha256_hash_ctx
> > - *sha256_ctx_mgr_get_comp_ctx(struct sha256_ctx_mgr *mgr)
> > -{
> > - /*
> > - * If get_comp_job returns NULL, there are no jobs complete.
> > - * If get_comp_job returns a job, verify that it is safe to return to
> > - * the user. If it is not ready, resubmit the job to finish processing.
> > - * If sha256_ctx_mgr_resubmit returned a job, it is ready to be
> > - * returned. Otherwise, all jobs currently being managed by the
> > - * hash_ctx_mgr still need processing.
> > - */
> > - struct sha256_hash_ctx *ctx;
> > -
> > - ctx = (struct sha256_hash_ctx *) sha256_job_mgr_get_comp_job(&mgr->mgr);
> > - return sha256_ctx_mgr_resubmit(mgr, ctx);
> > -}
> > -
> > -static void sha256_ctx_mgr_init(struct sha256_ctx_mgr *mgr)
> > -{
> > - sha256_job_mgr_init(&mgr->mgr);
> > -}
> > -
> > -static struct sha256_hash_ctx *sha256_ctx_mgr_submit(struct sha256_ctx_mgr *mgr,
> > - struct sha256_hash_ctx *ctx,
> > - const void *buffer,
> > - uint32_t len,
> > - int flags)
> > -{
> > - if (flags & ~(HASH_UPDATE | HASH_LAST)) {
> > - /* User should not pass anything other than UPDATE or LAST */
> > - ctx->error = HASH_CTX_ERROR_INVALID_FLAGS;
> > - return ctx;
> > - }
> > -
> > - if (ctx->status & HASH_CTX_STS_PROCESSING) {
> > - /* Cannot submit to a currently processing job. */
> > - ctx->error = HASH_CTX_ERROR_ALREADY_PROCESSING;
> > - return ctx;
> > - }
> > -
> > - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> > - /* Cannot update a finished job. */
> > - ctx->error = HASH_CTX_ERROR_ALREADY_COMPLETED;
> > - return ctx;
> > - }
> > -
> > - /* If we made it here, there was no error during this call to submit */
> > - ctx->error = HASH_CTX_ERROR_NONE;
> > -
> > - /* Store buffer ptr info from user */
> > - ctx->incoming_buffer = buffer;
> > - ctx->incoming_buffer_length = len;
> > -
> > - /*
> > - * Store the user's request flags and mark this ctx as currently
> > - * being processed.
> > - */
> > - ctx->status = (flags & HASH_LAST) ?
> > - (HASH_CTX_STS_PROCESSING | HASH_CTX_STS_LAST) :
> > - HASH_CTX_STS_PROCESSING;
> > -
> > - /* Advance byte counter */
> > - ctx->total_length += len;
> > -
> > - /*
> > - * If there is anything currently buffered in the extra blocks,
> > - * append to it until it contains a whole block.
> > - * Or if the user's buffer contains less than a whole block,
> > - * append as much as possible to the extra block.
> > - */
> > - if (ctx->partial_block_buffer_length || len < SHA256_BLOCK_SIZE) {
> > - /*
> > - * Compute how many bytes to copy from user buffer into
> > - * extra block
> > - */
> > - uint32_t copy_len = SHA256_BLOCK_SIZE -
> > - ctx->partial_block_buffer_length;
> > - if (len < copy_len)
> > - copy_len = len;
> > -
> > - if (copy_len) {
> > - /* Copy and update relevant pointers and counters */
> > - memcpy(
> > - &ctx->partial_block_buffer[ctx->partial_block_buffer_length],
> > - buffer, copy_len);
> > -
> > - ctx->partial_block_buffer_length += copy_len;
> > - ctx->incoming_buffer = (const void *)
> > - ((const char *)buffer + copy_len);
> > - ctx->incoming_buffer_length = len - copy_len;
> > - }
> > -
> > - /* The extra block should never contain more than 1 block */
> > - assert(ctx->partial_block_buffer_length <= SHA256_BLOCK_SIZE);
> > -
> > - /*
> > - * If the extra block buffer contains exactly 1 block,
> > - * it can be hashed.
> > - */
> > - if (ctx->partial_block_buffer_length >= SHA256_BLOCK_SIZE) {
> > - ctx->partial_block_buffer_length = 0;
> > -
> > - ctx->job.buffer = ctx->partial_block_buffer;
> > - ctx->job.len = 1;
> > - ctx = (struct sha256_hash_ctx *)
> > - sha256_job_mgr_submit(&mgr->mgr, &ctx->job);
> > - }
> > - }
> > -
> > - return sha256_ctx_mgr_resubmit(mgr, ctx);
> > -}
> > -
> > -static struct sha256_hash_ctx *sha256_ctx_mgr_flush(struct sha256_ctx_mgr *mgr)
> > -{
> > - struct sha256_hash_ctx *ctx;
> > -
> > - while (1) {
> > - ctx = (struct sha256_hash_ctx *)
> > - sha256_job_mgr_flush(&mgr->mgr);
> > -
> > - /* If flush returned 0, there are no more jobs in flight. */
> > - if (!ctx)
> > - return NULL;
> > -
> > - /*
> > - * If flush returned a job, resubmit the job to finish
> > - * processing.
> > - */
> > - ctx = sha256_ctx_mgr_resubmit(mgr, ctx);
> > -
> > - /*
> > - * If sha256_ctx_mgr_resubmit returned a job, it is ready to
> > - * be returned. Otherwise, all jobs currently being managed by
> > - * the sha256_ctx_mgr still need processing. Loop.
> > - */
> > - if (ctx)
> > - return ctx;
> > - }
> > -}
> > -
> > -static int sha256_mb_init(struct ahash_request *areq)
> > -{
> > - struct sha256_hash_ctx *sctx = ahash_request_ctx(areq);
> > -
> > - hash_ctx_init(sctx);
> > - sctx->job.result_digest[0] = SHA256_H0;
> > - sctx->job.result_digest[1] = SHA256_H1;
> > - sctx->job.result_digest[2] = SHA256_H2;
> > - sctx->job.result_digest[3] = SHA256_H3;
> > - sctx->job.result_digest[4] = SHA256_H4;
> > - sctx->job.result_digest[5] = SHA256_H5;
> > - sctx->job.result_digest[6] = SHA256_H6;
> > - sctx->job.result_digest[7] = SHA256_H7;
> > - sctx->total_length = 0;
> > - sctx->partial_block_buffer_length = 0;
> > - sctx->status = HASH_CTX_STS_IDLE;
> > -
> > - return 0;
> > -}
> > -
> > -static int sha256_mb_set_results(struct mcryptd_hash_request_ctx *rctx)
> > -{
> > - int i;
> > - struct sha256_hash_ctx *sctx = ahash_request_ctx(&rctx->areq);
> > - __be32 *dst = (__be32 *) rctx->out;
> > -
> > - for (i = 0; i < 8; ++i)
> > - dst[i] = cpu_to_be32(sctx->job.result_digest[i]);
> > -
> > - return 0;
> > -}
> > -
> > -static int sha_finish_walk(struct mcryptd_hash_request_ctx **ret_rctx,
> > - struct mcryptd_alg_cstate *cstate, bool flush)
> > -{
> > - int flag = HASH_UPDATE;
> > - int nbytes, err = 0;
> > - struct mcryptd_hash_request_ctx *rctx = *ret_rctx;
> > - struct sha256_hash_ctx *sha_ctx;
> > -
> > - /* more work ? */
> > - while (!(rctx->flag & HASH_DONE)) {
> > - nbytes = crypto_ahash_walk_done(&rctx->walk, 0);
> > - if (nbytes < 0) {
> > - err = nbytes;
> > - goto out;
> > - }
> > - /* check if the walk is done */
> > - if (crypto_ahash_walk_last(&rctx->walk)) {
> > - rctx->flag |= HASH_DONE;
> > - if (rctx->flag & HASH_FINAL)
> > - flag |= HASH_LAST;
> > -
> > - }
> > - sha_ctx = (struct sha256_hash_ctx *)
> > - ahash_request_ctx(&rctx->areq);
> > - kernel_fpu_begin();
> > - sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx,
> > - rctx->walk.data, nbytes, flag);
> > - if (!sha_ctx) {
> > - if (flush)
> > - sha_ctx = sha256_ctx_mgr_flush(cstate->mgr);
> > - }
> > - kernel_fpu_end();
> > - if (sha_ctx)
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - else {
> > - rctx = NULL;
> > - goto out;
> > - }
> > - }
> > -
> > - /* copy the results */
> > - if (rctx->flag & HASH_FINAL)
> > - sha256_mb_set_results(rctx);
> > -
> > -out:
> > - *ret_rctx = rctx;
> > - return err;
> > -}
> > -
> > -static int sha_complete_job(struct mcryptd_hash_request_ctx *rctx,
> > - struct mcryptd_alg_cstate *cstate,
> > - int err)
> > -{
> > - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> > - struct sha256_hash_ctx *sha_ctx;
> > - struct mcryptd_hash_request_ctx *req_ctx;
> > - int ret;
> > -
> > - /* remove from work list */
> > - spin_lock(&cstate->work_lock);
> > - list_del(&rctx->waiter);
> > - spin_unlock(&cstate->work_lock);
> > -
> > - if (irqs_disabled())
> > - rctx->complete(&req->base, err);
> > - else {
> > - local_bh_disable();
> > - rctx->complete(&req->base, err);
> > - local_bh_enable();
> > - }
> > -
> > - /* check to see if there are other jobs that are done */
> > - sha_ctx = sha256_ctx_mgr_get_comp_ctx(cstate->mgr);
> > - while (sha_ctx) {
> > - req_ctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&req_ctx, cstate, false);
> > - if (req_ctx) {
> > - spin_lock(&cstate->work_lock);
> > - list_del(&req_ctx->waiter);
> > - spin_unlock(&cstate->work_lock);
> > -
> > - req = cast_mcryptd_ctx_to_req(req_ctx);
> > - if (irqs_disabled())
> > - req_ctx->complete(&req->base, ret);
> > - else {
> > - local_bh_disable();
> > - req_ctx->complete(&req->base, ret);
> > - local_bh_enable();
> > - }
> > - }
> > - sha_ctx = sha256_ctx_mgr_get_comp_ctx(cstate->mgr);
> > - }
> > -
> > - return 0;
> > -}
> > -
> > -static void sha256_mb_add_list(struct mcryptd_hash_request_ctx *rctx,
> > - struct mcryptd_alg_cstate *cstate)
> > -{
> > - unsigned long next_flush;
> > - unsigned long delay = usecs_to_jiffies(FLUSH_INTERVAL);
> > -
> > - /* initialize tag */
> > - rctx->tag.arrival = jiffies; /* tag the arrival time */
> > - rctx->tag.seq_num = cstate->next_seq_num++;
> > - next_flush = rctx->tag.arrival + delay;
> > - rctx->tag.expire = next_flush;
> > -
> > - spin_lock(&cstate->work_lock);
> > - list_add_tail(&rctx->waiter, &cstate->work_list);
> > - spin_unlock(&cstate->work_lock);
> > -
> > - mcryptd_arm_flusher(cstate, delay);
> > -}
> > -
> > -static int sha256_mb_update(struct ahash_request *areq)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx =
> > - container_of(areq, struct mcryptd_hash_request_ctx, areq);
> > - struct mcryptd_alg_cstate *cstate =
> > - this_cpu_ptr(sha256_mb_alg_state.alg_cstate);
> > -
> > - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> > - struct sha256_hash_ctx *sha_ctx;
> > - int ret = 0, nbytes;
> > -
> > - /* sanity check */
> > - if (rctx->tag.cpu != smp_processor_id()) {
> > - pr_err("mcryptd error: cpu clash\n");
> > - goto done;
> > - }
> > -
> > - /* need to init context */
> > - req_ctx_init(rctx, areq);
> > -
> > - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> > -
> > - if (nbytes < 0) {
> > - ret = nbytes;
> > - goto done;
> > - }
> > -
> > - if (crypto_ahash_walk_last(&rctx->walk))
> > - rctx->flag |= HASH_DONE;
> > -
> > - /* submit */
> > - sha_ctx = (struct sha256_hash_ctx *) ahash_request_ctx(areq);
> > - sha256_mb_add_list(rctx, cstate);
> > - kernel_fpu_begin();
> > - sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
> > - nbytes, HASH_UPDATE);
> > - kernel_fpu_end();
> > -
> > - /* check if anything is returned */
> > - if (!sha_ctx)
> > - return -EINPROGRESS;
> > -
> > - if (sha_ctx->error) {
> > - ret = sha_ctx->error;
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - goto done;
> > - }
> > -
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&rctx, cstate, false);
> > -
> > - if (!rctx)
> > - return -EINPROGRESS;
> > -done:
> > - sha_complete_job(rctx, cstate, ret);
> > - return ret;
> > -}
> > -
> > -static int sha256_mb_finup(struct ahash_request *areq)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx =
> > - container_of(areq, struct mcryptd_hash_request_ctx, areq);
> > - struct mcryptd_alg_cstate *cstate =
> > - this_cpu_ptr(sha256_mb_alg_state.alg_cstate);
> > -
> > - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> > - struct sha256_hash_ctx *sha_ctx;
> > - int ret = 0, flag = HASH_UPDATE, nbytes;
> > -
> > - /* sanity check */
> > - if (rctx->tag.cpu != smp_processor_id()) {
> > - pr_err("mcryptd error: cpu clash\n");
> > - goto done;
> > - }
> > -
> > - /* need to init context */
> > - req_ctx_init(rctx, areq);
> > -
> > - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> > -
> > - if (nbytes < 0) {
> > - ret = nbytes;
> > - goto done;
> > - }
> > -
> > - if (crypto_ahash_walk_last(&rctx->walk)) {
> > - rctx->flag |= HASH_DONE;
> > - flag = HASH_LAST;
> > - }
> > -
> > - /* submit */
> > - rctx->flag |= HASH_FINAL;
> > - sha_ctx = (struct sha256_hash_ctx *) ahash_request_ctx(areq);
> > - sha256_mb_add_list(rctx, cstate);
> > -
> > - kernel_fpu_begin();
> > - sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx, rctx->walk.data,
> > - nbytes, flag);
> > - kernel_fpu_end();
> > -
> > - /* check if anything is returned */
> > - if (!sha_ctx)
> > - return -EINPROGRESS;
> > -
> > - if (sha_ctx->error) {
> > - ret = sha_ctx->error;
> > - goto done;
> > - }
> > -
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&rctx, cstate, false);
> > - if (!rctx)
> > - return -EINPROGRESS;
> > -done:
> > - sha_complete_job(rctx, cstate, ret);
> > - return ret;
> > -}
> > -
> > -static int sha256_mb_final(struct ahash_request *areq)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx =
> > - container_of(areq, struct mcryptd_hash_request_ctx,
> > - areq);
> > - struct mcryptd_alg_cstate *cstate =
> > - this_cpu_ptr(sha256_mb_alg_state.alg_cstate);
> > -
> > - struct sha256_hash_ctx *sha_ctx;
> > - int ret = 0;
> > - u8 data;
> > -
> > - /* sanity check */
> > - if (rctx->tag.cpu != smp_processor_id()) {
> > - pr_err("mcryptd error: cpu clash\n");
> > - goto done;
> > - }
> > -
> > - /* need to init context */
> > - req_ctx_init(rctx, areq);
> > -
> > - rctx->flag |= HASH_DONE | HASH_FINAL;
> > -
> > - sha_ctx = (struct sha256_hash_ctx *) ahash_request_ctx(areq);
> > - /* flag HASH_FINAL and 0 data size */
> > - sha256_mb_add_list(rctx, cstate);
> > - kernel_fpu_begin();
> > - sha_ctx = sha256_ctx_mgr_submit(cstate->mgr, sha_ctx, &data, 0,
> > - HASH_LAST);
> > - kernel_fpu_end();
> > -
> > - /* check if anything is returned */
> > - if (!sha_ctx)
> > - return -EINPROGRESS;
> > -
> > - if (sha_ctx->error) {
> > - ret = sha_ctx->error;
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - goto done;
> > - }
> > -
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&rctx, cstate, false);
> > - if (!rctx)
> > - return -EINPROGRESS;
> > -done:
> > - sha_complete_job(rctx, cstate, ret);
> > - return ret;
> > -}
> > -
> > -static int sha256_mb_export(struct ahash_request *areq, void *out)
> > -{
> > - struct sha256_hash_ctx *sctx = ahash_request_ctx(areq);
> > -
> > - memcpy(out, sctx, sizeof(*sctx));
> > -
> > - return 0;
> > -}
> > -
> > -static int sha256_mb_import(struct ahash_request *areq, const void *in)
> > -{
> > - struct sha256_hash_ctx *sctx = ahash_request_ctx(areq);
> > -
> > - memcpy(sctx, in, sizeof(*sctx));
> > -
> > - return 0;
> > -}
> > -
> > -static int sha256_mb_async_init_tfm(struct crypto_tfm *tfm)
> > -{
> > - struct mcryptd_ahash *mcryptd_tfm;
> > - struct sha256_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> > - struct mcryptd_hash_ctx *mctx;
> > -
> > - mcryptd_tfm = mcryptd_alloc_ahash("__intel_sha256-mb",
> > - CRYPTO_ALG_INTERNAL,
> > - CRYPTO_ALG_INTERNAL);
> > - if (IS_ERR(mcryptd_tfm))
> > - return PTR_ERR(mcryptd_tfm);
> > - mctx = crypto_ahash_ctx(&mcryptd_tfm->base);
> > - mctx->alg_state = &sha256_mb_alg_state;
> > - ctx->mcryptd_tfm = mcryptd_tfm;
> > - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> > - sizeof(struct ahash_request) +
> > - crypto_ahash_reqsize(&mcryptd_tfm->base));
> > -
> > - return 0;
> > -}
> > -
> > -static void sha256_mb_async_exit_tfm(struct crypto_tfm *tfm)
> > -{
> > - struct sha256_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> > -
> > - mcryptd_free_ahash(ctx->mcryptd_tfm);
> > -}
> > -
> > -static int sha256_mb_areq_init_tfm(struct crypto_tfm *tfm)
> > -{
> > - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> > - sizeof(struct ahash_request) +
> > - sizeof(struct sha256_hash_ctx));
> > -
> > - return 0;
> > -}
> > -
> > -static void sha256_mb_areq_exit_tfm(struct crypto_tfm *tfm)
> > -{
> > - struct sha256_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> > -
> > - mcryptd_free_ahash(ctx->mcryptd_tfm);
> > -}
> > -
> > -static struct ahash_alg sha256_mb_areq_alg = {
> > - .init = sha256_mb_init,
> > - .update = sha256_mb_update,
> > - .final = sha256_mb_final,
> > - .finup = sha256_mb_finup,
> > - .export = sha256_mb_export,
> > - .import = sha256_mb_import,
> > - .halg = {
> > - .digestsize = SHA256_DIGEST_SIZE,
> > - .statesize = sizeof(struct sha256_hash_ctx),
> > - .base = {
> > - .cra_name = "__sha256-mb",
> > - .cra_driver_name = "__intel_sha256-mb",
> > - .cra_priority = 100,
> > - /*
> > - * use ASYNC flag as some buffers in multi-buffer
> > - * algo may not have completed before hashing thread
> > - * sleep
> > - */
> > - .cra_flags = CRYPTO_ALG_ASYNC |
> > - CRYPTO_ALG_INTERNAL,
> > - .cra_blocksize = SHA256_BLOCK_SIZE,
> > - .cra_module = THIS_MODULE,
> > - .cra_list = LIST_HEAD_INIT
> > - (sha256_mb_areq_alg.halg.base.cra_list),
> > - .cra_init = sha256_mb_areq_init_tfm,
> > - .cra_exit = sha256_mb_areq_exit_tfm,
> > - .cra_ctxsize = sizeof(struct sha256_hash_ctx),
> > - }
> > - }
> > -};
> > -
> > -static int sha256_mb_async_init(struct ahash_request *req)
> > -{
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_init(mcryptd_req);
> > -}
> > -
> > -static int sha256_mb_async_update(struct ahash_request *req)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > -
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_update(mcryptd_req);
> > -}
> > -
> > -static int sha256_mb_async_finup(struct ahash_request *req)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > -
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_finup(mcryptd_req);
> > -}
> > -
> > -static int sha256_mb_async_final(struct ahash_request *req)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > -
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_final(mcryptd_req);
> > -}
> > -
> > -static int sha256_mb_async_digest(struct ahash_request *req)
> > -{
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_digest(mcryptd_req);
> > -}
> > -
> > -static int sha256_mb_async_export(struct ahash_request *req, void *out)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_export(mcryptd_req, out);
> > -}
> > -
> > -static int sha256_mb_async_import(struct ahash_request *req, const void *in)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha256_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > - struct crypto_ahash *child = mcryptd_ahash_child(mcryptd_tfm);
> > - struct mcryptd_hash_request_ctx *rctx;
> > - struct ahash_request *areq;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - rctx = ahash_request_ctx(mcryptd_req);
> > - areq = &rctx->areq;
> > -
> > - ahash_request_set_tfm(areq, child);
> > - ahash_request_set_callback(areq, CRYPTO_TFM_REQ_MAY_SLEEP,
> > - rctx->complete, req);
> > -
> > - return crypto_ahash_import(mcryptd_req, in);
> > -}
> > -
> > -static struct ahash_alg sha256_mb_async_alg = {
> > - .init = sha256_mb_async_init,
> > - .update = sha256_mb_async_update,
> > - .final = sha256_mb_async_final,
> > - .finup = sha256_mb_async_finup,
> > - .export = sha256_mb_async_export,
> > - .import = sha256_mb_async_import,
> > - .digest = sha256_mb_async_digest,
> > - .halg = {
> > - .digestsize = SHA256_DIGEST_SIZE,
> > - .statesize = sizeof(struct sha256_hash_ctx),
> > - .base = {
> > - .cra_name = "sha256",
> > - .cra_driver_name = "sha256_mb",
> > - /*
> > - * Low priority, since with few concurrent hash requests
> > - * this is extremely slow due to the flush delay. Users
> > - * whose workloads would benefit from this can request
> > - * it explicitly by driver name, or can increase its
> > - * priority at runtime using NETLINK_CRYPTO.
> > - */
> > - .cra_priority = 50,
> > - .cra_flags = CRYPTO_ALG_ASYNC,
> > - .cra_blocksize = SHA256_BLOCK_SIZE,
> > - .cra_module = THIS_MODULE,
> > - .cra_list = LIST_HEAD_INIT
> > - (sha256_mb_async_alg.halg.base.cra_list),
> > - .cra_init = sha256_mb_async_init_tfm,
> > - .cra_exit = sha256_mb_async_exit_tfm,
> > - .cra_ctxsize = sizeof(struct sha256_mb_ctx),
> > - .cra_alignmask = 0,
> > - },
> > - },
> > -};
> > -
> > -static unsigned long sha256_mb_flusher(struct mcryptd_alg_cstate *cstate)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx;
> > - unsigned long cur_time;
> > - unsigned long next_flush = 0;
> > - struct sha256_hash_ctx *sha_ctx;
> > -
> > -
> > - cur_time = jiffies;
> > -
> > - while (!list_empty(&cstate->work_list)) {
> > - rctx = list_entry(cstate->work_list.next,
> > - struct mcryptd_hash_request_ctx, waiter);
> > - if (time_before(cur_time, rctx->tag.expire))
> > - break;
> > - kernel_fpu_begin();
> > - sha_ctx = (struct sha256_hash_ctx *)
> > - sha256_ctx_mgr_flush(cstate->mgr);
> > - kernel_fpu_end();
> > - if (!sha_ctx) {
> > - pr_err("sha256_mb error: nothing got"
> > - " flushed for non-empty list\n");
> > - break;
> > - }
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - sha_finish_walk(&rctx, cstate, true);
> > - sha_complete_job(rctx, cstate, 0);
> > - }
> > -
> > - if (!list_empty(&cstate->work_list)) {
> > - rctx = list_entry(cstate->work_list.next,
> > - struct mcryptd_hash_request_ctx, waiter);
> > - /* get the hash context and then flush time */
> > - next_flush = rctx->tag.expire;
> > - mcryptd_arm_flusher(cstate, get_delay(next_flush));
> > - }
> > - return next_flush;
> > -}
> > -
> > -static int __init sha256_mb_mod_init(void)
> > -{
> > -
> > - int cpu;
> > - int err;
> > - struct mcryptd_alg_cstate *cpu_state;
> > -
> > - /* check for dependent cpu features */
> > - if (!boot_cpu_has(X86_FEATURE_AVX2) ||
> > - !boot_cpu_has(X86_FEATURE_BMI2))
> > - return -ENODEV;
> > -
> > - /* initialize multibuffer structures */
> > - sha256_mb_alg_state.alg_cstate = alloc_percpu
> > - (struct mcryptd_alg_cstate);
> > -
> > - sha256_job_mgr_init = sha256_mb_mgr_init_avx2;
> > - sha256_job_mgr_submit = sha256_mb_mgr_submit_avx2;
> > - sha256_job_mgr_flush = sha256_mb_mgr_flush_avx2;
> > - sha256_job_mgr_get_comp_job = sha256_mb_mgr_get_comp_job_avx2;
> > -
> > - if (!sha256_mb_alg_state.alg_cstate)
> > - return -ENOMEM;
> > - for_each_possible_cpu(cpu) {
> > - cpu_state = per_cpu_ptr(sha256_mb_alg_state.alg_cstate, cpu);
> > - cpu_state->next_flush = 0;
> > - cpu_state->next_seq_num = 0;
> > - cpu_state->flusher_engaged = false;
> > - INIT_DELAYED_WORK(&cpu_state->flush, mcryptd_flusher);
> > - cpu_state->cpu = cpu;
> > - cpu_state->alg_state = &sha256_mb_alg_state;
> > - cpu_state->mgr = kzalloc(sizeof(struct sha256_ctx_mgr),
> > - GFP_KERNEL);
> > - if (!cpu_state->mgr)
> > - goto err2;
> > - sha256_ctx_mgr_init(cpu_state->mgr);
> > - INIT_LIST_HEAD(&cpu_state->work_list);
> > - spin_lock_init(&cpu_state->work_lock);
> > - }
> > - sha256_mb_alg_state.flusher = &sha256_mb_flusher;
> > -
> > - err = crypto_register_ahash(&sha256_mb_areq_alg);
> > - if (err)
> > - goto err2;
> > - err = crypto_register_ahash(&sha256_mb_async_alg);
> > - if (err)
> > - goto err1;
> > -
> > -
> > - return 0;
> > -err1:
> > - crypto_unregister_ahash(&sha256_mb_areq_alg);
> > -err2:
> > - for_each_possible_cpu(cpu) {
> > - cpu_state = per_cpu_ptr(sha256_mb_alg_state.alg_cstate, cpu);
> > - kfree(cpu_state->mgr);
> > - }
> > - free_percpu(sha256_mb_alg_state.alg_cstate);
> > - return -ENODEV;
> > -}
> > -
> > -static void __exit sha256_mb_mod_fini(void)
> > -{
> > - int cpu;
> > - struct mcryptd_alg_cstate *cpu_state;
> > -
> > - crypto_unregister_ahash(&sha256_mb_async_alg);
> > - crypto_unregister_ahash(&sha256_mb_areq_alg);
> > - for_each_possible_cpu(cpu) {
> > - cpu_state = per_cpu_ptr(sha256_mb_alg_state.alg_cstate, cpu);
> > - kfree(cpu_state->mgr);
> > - }
> > - free_percpu(sha256_mb_alg_state.alg_cstate);
> > -}
> > -
> > -module_init(sha256_mb_mod_init);
> > -module_exit(sha256_mb_mod_fini);
> > -
> > -MODULE_LICENSE("GPL");
> > -MODULE_DESCRIPTION("SHA256 Secure Hash Algorithm, multi buffer accelerated");
> > -
> > -MODULE_ALIAS_CRYPTO("sha256");
> > diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_ctx.h b/arch/x86/crypto/sha256-mb/sha256_mb_ctx.h
> > deleted file mode 100644
> > index 7c432543dc7f..000000000000
> > --- a/arch/x86/crypto/sha256-mb/sha256_mb_ctx.h
> > +++ /dev/null
> > @@ -1,134 +0,0 @@
> > -/*
> > - * Header file for multi buffer SHA256 context
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#ifndef _SHA_MB_CTX_INTERNAL_H
> > -#define _SHA_MB_CTX_INTERNAL_H
> > -
> > -#include "sha256_mb_mgr.h"
> > -
> > -#define HASH_UPDATE 0x00
> > -#define HASH_LAST 0x01
> > -#define HASH_DONE 0x02
> > -#define HASH_FINAL 0x04
> > -
> > -#define HASH_CTX_STS_IDLE 0x00
> > -#define HASH_CTX_STS_PROCESSING 0x01
> > -#define HASH_CTX_STS_LAST 0x02
> > -#define HASH_CTX_STS_COMPLETE 0x04
> > -
> > -enum hash_ctx_error {
> > - HASH_CTX_ERROR_NONE = 0,
> > - HASH_CTX_ERROR_INVALID_FLAGS = -1,
> > - HASH_CTX_ERROR_ALREADY_PROCESSING = -2,
> > - HASH_CTX_ERROR_ALREADY_COMPLETED = -3,
> > -
> > -#ifdef HASH_CTX_DEBUG
> > - HASH_CTX_ERROR_DEBUG_DIGEST_MISMATCH = -4,
> > -#endif
> > -};
> > -
> > -
> > -#define hash_ctx_user_data(ctx) ((ctx)->user_data)
> > -#define hash_ctx_digest(ctx) ((ctx)->job.result_digest)
> > -#define hash_ctx_processing(ctx) ((ctx)->status & HASH_CTX_STS_PROCESSING)
> > -#define hash_ctx_complete(ctx) ((ctx)->status == HASH_CTX_STS_COMPLETE)
> > -#define hash_ctx_status(ctx) ((ctx)->status)
> > -#define hash_ctx_error(ctx) ((ctx)->error)
> > -#define hash_ctx_init(ctx) \
> > - do { \
> > - (ctx)->error = HASH_CTX_ERROR_NONE; \
> > - (ctx)->status = HASH_CTX_STS_COMPLETE; \
> > - } while (0)
> > -
> > -
> > -/* Hash Constants and Typedefs */
> > -#define SHA256_DIGEST_LENGTH 8
> > -#define SHA256_LOG2_BLOCK_SIZE 6
> > -
> > -#define SHA256_PADLENGTHFIELD_SIZE 8
> > -
> > -#ifdef SHA_MB_DEBUG
> > -#define assert(expr) \
> > -do { \
> > - if (unlikely(!(expr))) { \
> > - printk(KERN_ERR "Assertion failed! %s,%s,%s,line=%d\n", \
> > - #expr, __FILE__, __func__, __LINE__); \
> > - } \
> > -} while (0)
> > -#else
> > -#define assert(expr) do {} while (0)
> > -#endif
> > -
> > -struct sha256_ctx_mgr {
> > - struct sha256_mb_mgr mgr;
> > -};
> > -
> > -/* typedef struct sha256_ctx_mgr sha256_ctx_mgr; */
> > -
> > -struct sha256_hash_ctx {
> > - /* Must be at struct offset 0 */
> > - struct job_sha256 job;
> > - /* status flag */
> > - int status;
> > - /* error flag */
> > - int error;
> > -
> > - uint64_t total_length;
> > - const void *incoming_buffer;
> > - uint32_t incoming_buffer_length;
> > - uint8_t partial_block_buffer[SHA256_BLOCK_SIZE * 2];
> > - uint32_t partial_block_buffer_length;
> > - void *user_data;
> > -};
> > -
> > -#endif
> > diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr.h b/arch/x86/crypto/sha256-mb/sha256_mb_mgr.h
> > deleted file mode 100644
> > index b01ae408c56d..000000000000
> > --- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr.h
> > +++ /dev/null
> > @@ -1,108 +0,0 @@
> > -/*
> > - * Header file for multi buffer SHA256 algorithm manager
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -#ifndef __SHA_MB_MGR_H
> > -#define __SHA_MB_MGR_H
> > -
> > -#include <linux/types.h>
> > -
> > -#define NUM_SHA256_DIGEST_WORDS 8
> > -
> > -enum job_sts { STS_UNKNOWN = 0,
> > - STS_BEING_PROCESSED = 1,
> > - STS_COMPLETED = 2,
> > - STS_INTERNAL_ERROR = 3,
> > - STS_ERROR = 4
> > -};
> > -
> > -struct job_sha256 {
> > - u8 *buffer;
> > - u32 len;
> > - u32 result_digest[NUM_SHA256_DIGEST_WORDS] __aligned(32);
> > - enum job_sts status;
> > - void *user_data;
> > -};
> > -
> > -/* SHA256 out-of-order scheduler */
> > -
> > -/* typedef uint32_t sha8_digest_array[8][8]; */
> > -
> > -struct sha256_args_x8 {
> > - uint32_t digest[8][8];
> > - uint8_t *data_ptr[8];
> > -};
> > -
> > -struct sha256_lane_data {
> > - struct job_sha256 *job_in_lane;
> > -};
> > -
> > -struct sha256_mb_mgr {
> > - struct sha256_args_x8 args;
> > -
> > - uint32_t lens[8];
> > -
> > - /* each byte is index (0...7) of unused lanes */
> > - uint64_t unused_lanes;
> > - /* byte 4 is set to FF as a flag */
> > - struct sha256_lane_data ldata[8];
> > -};
> > -
> > -
> > -#define SHA256_MB_MGR_NUM_LANES_AVX2 8
> > -
> > -void sha256_mb_mgr_init_avx2(struct sha256_mb_mgr *state);
> > -struct job_sha256 *sha256_mb_mgr_submit_avx2(struct sha256_mb_mgr *state,
> > - struct job_sha256 *job);
> > -struct job_sha256 *sha256_mb_mgr_flush_avx2(struct sha256_mb_mgr *state);
> > -struct job_sha256 *sha256_mb_mgr_get_comp_job_avx2(struct sha256_mb_mgr *state);
> > -
> > -#endif
> > diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S
> > deleted file mode 100644
> > index 5c377bac21d0..000000000000
> > --- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S
> > +++ /dev/null
> > @@ -1,304 +0,0 @@
> > -/*
> > - * Header file for multi buffer SHA256 algorithm data structure
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -# Macros for defining data structures
> > -
> > -# Usage example
> > -
> > -#START_FIELDS # JOB_AES
> > -### name size align
> > -#FIELD _plaintext, 8, 8 # pointer to plaintext
> > -#FIELD _ciphertext, 8, 8 # pointer to ciphertext
> > -#FIELD _IV, 16, 8 # IV
> > -#FIELD _keys, 8, 8 # pointer to keys
> > -#FIELD _len, 4, 4 # length in bytes
> > -#FIELD _status, 4, 4 # status enumeration
> > -#FIELD _user_data, 8, 8 # pointer to user data
> > -#UNION _union, size1, align1, \
> > -# size2, align2, \
> > -# size3, align3, \
> > -# ...
> > -#END_FIELDS
> > -#%assign _JOB_AES_size _FIELD_OFFSET
> > -#%assign _JOB_AES_align _STRUCT_ALIGN
> > -
> > -#########################################################################
> > -
> > -# Alternate "struc-like" syntax:
> > -# STRUCT job_aes2
> > -# RES_Q .plaintext, 1
> > -# RES_Q .ciphertext, 1
> > -# RES_DQ .IV, 1
> > -# RES_B .nested, _JOB_AES_SIZE, _JOB_AES_ALIGN
> > -# RES_U .union, size1, align1, \
> > -# size2, align2, \
> > -# ...
> > -# ENDSTRUCT
> > -# # Following only needed if nesting
> > -# %assign job_aes2_size _FIELD_OFFSET
> > -# %assign job_aes2_align _STRUCT_ALIGN
> > -#
> > -# RES_* macros take a name, a count and an optional alignment.
> > -# The count in in terms of the base size of the macro, and the
> > -# default alignment is the base size.
> > -# The macros are:
> > -# Macro Base size
> > -# RES_B 1
> > -# RES_W 2
> > -# RES_D 4
> > -# RES_Q 8
> > -# RES_DQ 16
> > -# RES_Y 32
> > -# RES_Z 64
> > -#
> > -# RES_U defines a union. It's arguments are a name and two or more
> > -# pairs of "size, alignment"
> > -#
> > -# The two assigns are only needed if this structure is being nested
> > -# within another. Even if the assigns are not done, one can still use
> > -# STRUCT_NAME_size as the size of the structure.
> > -#
> > -# Note that for nesting, you still need to assign to STRUCT_NAME_size.
> > -#
> > -# The differences between this and using "struc" directly are that each
> > -# type is implicitly aligned to its natural length (although this can be
> > -# over-ridden with an explicit third parameter), and that the structure
> > -# is padded at the end to its overall alignment.
> > -#
> > -
> > -#########################################################################
> > -
> > -#ifndef _DATASTRUCT_ASM_
> > -#define _DATASTRUCT_ASM_
> > -
> > -#define SZ8 8*SHA256_DIGEST_WORD_SIZE
> > -#define ROUNDS 64*SZ8
> > -#define PTR_SZ 8
> > -#define SHA256_DIGEST_WORD_SIZE 4
> > -#define MAX_SHA256_LANES 8
> > -#define SHA256_DIGEST_WORDS 8
> > -#define SHA256_DIGEST_ROW_SIZE (MAX_SHA256_LANES * SHA256_DIGEST_WORD_SIZE)
> > -#define SHA256_DIGEST_SIZE (SHA256_DIGEST_ROW_SIZE * SHA256_DIGEST_WORDS)
> > -#define SHA256_BLK_SZ 64
> > -
> > -# START_FIELDS
> > -.macro START_FIELDS
> > - _FIELD_OFFSET = 0
> > - _STRUCT_ALIGN = 0
> > -.endm
> > -
> > -# FIELD name size align
> > -.macro FIELD name size align
> > - _FIELD_OFFSET = (_FIELD_OFFSET + (\align) - 1) & (~ ((\align)-1))
> > - \name = _FIELD_OFFSET
> > - _FIELD_OFFSET = _FIELD_OFFSET + (\size)
> > -.if (\align > _STRUCT_ALIGN)
> > - _STRUCT_ALIGN = \align
> > -.endif
> > -.endm
> > -
> > -# END_FIELDS
> > -.macro END_FIELDS
> > - _FIELD_OFFSET = (_FIELD_OFFSET + _STRUCT_ALIGN-1) & (~ (_STRUCT_ALIGN-1))
> > -.endm
> > -
> > -########################################################################
> > -
> > -.macro STRUCT p1
> > -START_FIELDS
> > -.struc \p1
> > -.endm
> > -
> > -.macro ENDSTRUCT
> > - tmp = _FIELD_OFFSET
> > - END_FIELDS
> > - tmp = (_FIELD_OFFSET - %%tmp)
> > -.if (tmp > 0)
> > - .lcomm tmp
> > -.endif
> > -.endstruc
> > -.endm
> > -
> > -## RES_int name size align
> > -.macro RES_int p1 p2 p3
> > - name = \p1
> > - size = \p2
> > - align = .\p3
> > -
> > - _FIELD_OFFSET = (_FIELD_OFFSET + (align) - 1) & (~ ((align)-1))
> > -.align align
> > -.lcomm name size
> > - _FIELD_OFFSET = _FIELD_OFFSET + (size)
> > -.if (align > _STRUCT_ALIGN)
> > - _STRUCT_ALIGN = align
> > -.endif
> > -.endm
> > -
> > -# macro RES_B name, size [, align]
> > -.macro RES_B _name, _size, _align=1
> > -RES_int _name _size _align
> > -.endm
> > -
> > -# macro RES_W name, size [, align]
> > -.macro RES_W _name, _size, _align=2
> > -RES_int _name 2*(_size) _align
> > -.endm
> > -
> > -# macro RES_D name, size [, align]
> > -.macro RES_D _name, _size, _align=4
> > -RES_int _name 4*(_size) _align
> > -.endm
> > -
> > -# macro RES_Q name, size [, align]
> > -.macro RES_Q _name, _size, _align=8
> > -RES_int _name 8*(_size) _align
> > -.endm
> > -
> > -# macro RES_DQ name, size [, align]
> > -.macro RES_DQ _name, _size, _align=16
> > -RES_int _name 16*(_size) _align
> > -.endm
> > -
> > -# macro RES_Y name, size [, align]
> > -.macro RES_Y _name, _size, _align=32
> > -RES_int _name 32*(_size) _align
> > -.endm
> > -
> > -# macro RES_Z name, size [, align]
> > -.macro RES_Z _name, _size, _align=64
> > -RES_int _name 64*(_size) _align
> > -.endm
> > -
> > -#endif
> > -
> > -
> > -########################################################################
> > -#### Define SHA256 Out Of Order Data Structures
> > -########################################################################
> > -
> > -START_FIELDS # LANE_DATA
> > -### name size align
> > -FIELD _job_in_lane, 8, 8 # pointer to job object
> > -END_FIELDS
> > -
> > - _LANE_DATA_size = _FIELD_OFFSET
> > - _LANE_DATA_align = _STRUCT_ALIGN
> > -
> > -########################################################################
> > -
> > -START_FIELDS # SHA256_ARGS_X4
> > -### name size align
> > -FIELD _digest, 4*8*8, 4 # transposed digest
> > -FIELD _data_ptr, 8*8, 8 # array of pointers to data
> > -END_FIELDS
> > -
> > - _SHA256_ARGS_X4_size = _FIELD_OFFSET
> > - _SHA256_ARGS_X4_align = _STRUCT_ALIGN
> > - _SHA256_ARGS_X8_size = _FIELD_OFFSET
> > - _SHA256_ARGS_X8_align = _STRUCT_ALIGN
> > -
> > -#######################################################################
> > -
> > -START_FIELDS # MB_MGR
> > -### name size align
> > -FIELD _args, _SHA256_ARGS_X4_size, _SHA256_ARGS_X4_align
> > -FIELD _lens, 4*8, 8
> > -FIELD _unused_lanes, 8, 8
> > -FIELD _ldata, _LANE_DATA_size*8, _LANE_DATA_align
> > -END_FIELDS
> > -
> > - _MB_MGR_size = _FIELD_OFFSET
> > - _MB_MGR_align = _STRUCT_ALIGN
> > -
> > -_args_digest = _args + _digest
> > -_args_data_ptr = _args + _data_ptr
> > -
> > -#######################################################################
> > -
> > -START_FIELDS #STACK_FRAME
> > -### name size align
> > -FIELD _data, 16*SZ8, 1 # transposed digest
> > -FIELD _digest, 8*SZ8, 1 # array of pointers to data
> > -FIELD _ytmp, 4*SZ8, 1
> > -FIELD _rsp, 8, 1
> > -END_FIELDS
> > -
> > - _STACK_FRAME_size = _FIELD_OFFSET
> > - _STACK_FRAME_align = _STRUCT_ALIGN
> > -
> > -#######################################################################
> > -
> > -########################################################################
> > -#### Define constants
> > -########################################################################
> > -
> > -#define STS_UNKNOWN 0
> > -#define STS_BEING_PROCESSED 1
> > -#define STS_COMPLETED 2
> > -
> > -########################################################################
> > -#### Define JOB_SHA256 structure
> > -########################################################################
> > -
> > -START_FIELDS # JOB_SHA256
> > -
> > -### name size align
> > -FIELD _buffer, 8, 8 # pointer to buffer
> > -FIELD _len, 8, 8 # length in bytes
> > -FIELD _result_digest, 8*4, 32 # Digest (output)
> > -FIELD _status, 4, 4
> > -FIELD _user_data, 8, 8
> > -END_FIELDS
> > -
> > - _JOB_SHA256_size = _FIELD_OFFSET
> > - _JOB_SHA256_align = _STRUCT_ALIGN
> > diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S
> > deleted file mode 100644
> > index d2364c55bbde..000000000000
> > --- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S
> > +++ /dev/null
> > @@ -1,307 +0,0 @@
> > -/*
> > - * Flush routine for SHA256 multibuffer
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -#include <linux/linkage.h>
> > -#include <asm/frame.h>
> > -#include "sha256_mb_mgr_datastruct.S"
> > -
> > -.extern sha256_x8_avx2
> > -
> > -#LINUX register definitions
> > -#define arg1 %rdi
> > -#define arg2 %rsi
> > -
> > -# Common register definitions
> > -#define state arg1
> > -#define job arg2
> > -#define len2 arg2
> > -
> > -# idx must be a register not clobberred by sha1_mult
> > -#define idx %r8
> > -#define DWORD_idx %r8d
> > -
> > -#define unused_lanes %rbx
> > -#define lane_data %rbx
> > -#define tmp2 %rbx
> > -#define tmp2_w %ebx
> > -
> > -#define job_rax %rax
> > -#define tmp1 %rax
> > -#define size_offset %rax
> > -#define tmp %rax
> > -#define start_offset %rax
> > -
> > -#define tmp3 %arg1
> > -
> > -#define extra_blocks %arg2
> > -#define p %arg2
> > -
> > -.macro LABEL prefix n
> > -\prefix\n\():
> > -.endm
> > -
> > -.macro JNE_SKIP i
> > -jne skip_\i
> > -.endm
> > -
> > -.altmacro
> > -.macro SET_OFFSET _offset
> > -offset = \_offset
> > -.endm
> > -.noaltmacro
> > -
> > -# JOB_SHA256* sha256_mb_mgr_flush_avx2(MB_MGR *state)
> > -# arg 1 : rcx : state
> > -ENTRY(sha256_mb_mgr_flush_avx2)
> > - FRAME_BEGIN
> > - push %rbx
> > -
> > - # If bit (32+3) is set, then all lanes are empty
> > - mov _unused_lanes(state), unused_lanes
> > - bt $32+3, unused_lanes
> > - jc return_null
> > -
> > - # find a lane with a non-null job
> > - xor idx, idx
> > - offset = (_ldata + 1 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne one(%rip), idx
> > - offset = (_ldata + 2 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne two(%rip), idx
> > - offset = (_ldata + 3 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne three(%rip), idx
> > - offset = (_ldata + 4 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne four(%rip), idx
> > - offset = (_ldata + 5 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne five(%rip), idx
> > - offset = (_ldata + 6 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne six(%rip), idx
> > - offset = (_ldata + 7 * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne seven(%rip), idx
> > -
> > - # copy idx to empty lanes
> > -copy_lane_data:
> > - offset = (_args + _data_ptr)
> > - mov offset(state,idx,8), tmp
> > -
> > - I = 0
> > -.rep 8
> > - offset = (_ldata + I * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > -.altmacro
> > - JNE_SKIP %I
> > - offset = (_args + _data_ptr + 8*I)
> > - mov tmp, offset(state)
> > - offset = (_lens + 4*I)
> > - movl $0xFFFFFFFF, offset(state)
> > -LABEL skip_ %I
> > - I = (I+1)
> > -.noaltmacro
> > -.endr
> > -
> > - # Find min length
> > - vmovdqu _lens+0*16(state), %xmm0
> > - vmovdqu _lens+1*16(state), %xmm1
> > -
> > - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> > - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> > - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min val in low dword
> > -
> > - vmovd %xmm2, DWORD_idx
> > - mov idx, len2
> > - and $0xF, idx
> > - shr $4, len2
> > - jz len_is_0
> > -
> > - vpand clear_low_nibble(%rip), %xmm2, %xmm2
> > - vpshufd $0, %xmm2, %xmm2
> > -
> > - vpsubd %xmm2, %xmm0, %xmm0
> > - vpsubd %xmm2, %xmm1, %xmm1
> > -
> > - vmovdqu %xmm0, _lens+0*16(state)
> > - vmovdqu %xmm1, _lens+1*16(state)
> > -
> > - # "state" and "args" are the same address, arg1
> > - # len is arg2
> > - call sha256_x8_avx2
> > - # state and idx are intact
> > -
> > -len_is_0:
> > - # process completed job "idx"
> > - imul $_LANE_DATA_size, idx, lane_data
> > - lea _ldata(state, lane_data), lane_data
> > -
> > - mov _job_in_lane(lane_data), job_rax
> > - movq $0, _job_in_lane(lane_data)
> > - movl $STS_COMPLETED, _status(job_rax)
> > - mov _unused_lanes(state), unused_lanes
> > - shl $4, unused_lanes
> > - or idx, unused_lanes
> > -
> > - mov unused_lanes, _unused_lanes(state)
> > - movl $0xFFFFFFFF, _lens(state,idx,4)
> > -
> > - vmovd _args_digest(state , idx, 4) , %xmm0
> > - vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
> > - vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
> > - vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
> > - vmovd _args_digest+4*32(state, idx, 4), %xmm1
> > - vpinsrd $1, _args_digest+5*32(state, idx, 4), %xmm1, %xmm1
> > - vpinsrd $2, _args_digest+6*32(state, idx, 4), %xmm1, %xmm1
> > - vpinsrd $3, _args_digest+7*32(state, idx, 4), %xmm1, %xmm1
> > -
> > - vmovdqu %xmm0, _result_digest(job_rax)
> > - offset = (_result_digest + 1*16)
> > - vmovdqu %xmm1, offset(job_rax)
> > -
> > -return:
> > - pop %rbx
> > - FRAME_END
> > - ret
> > -
> > -return_null:
> > - xor job_rax, job_rax
> > - jmp return
> > -ENDPROC(sha256_mb_mgr_flush_avx2)
> > -
> > -##############################################################################
> > -
> > -.align 16
> > -ENTRY(sha256_mb_mgr_get_comp_job_avx2)
> > - push %rbx
> > -
> > - ## if bit 32+3 is set, then all lanes are empty
> > - mov _unused_lanes(state), unused_lanes
> > - bt $(32+3), unused_lanes
> > - jc .return_null
> > -
> > - # Find min length
> > - vmovdqu _lens(state), %xmm0
> > - vmovdqu _lens+1*16(state), %xmm1
> > -
> > - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> > - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> > - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min val in low dword
> > -
> > - vmovd %xmm2, DWORD_idx
> > - test $~0xF, idx
> > - jnz .return_null
> > -
> > - # process completed job "idx"
> > - imul $_LANE_DATA_size, idx, lane_data
> > - lea _ldata(state, lane_data), lane_data
> > -
> > - mov _job_in_lane(lane_data), job_rax
> > - movq $0, _job_in_lane(lane_data)
> > - movl $STS_COMPLETED, _status(job_rax)
> > - mov _unused_lanes(state), unused_lanes
> > - shl $4, unused_lanes
> > - or idx, unused_lanes
> > - mov unused_lanes, _unused_lanes(state)
> > -
> > - movl $0xFFFFFFFF, _lens(state, idx, 4)
> > -
> > - vmovd _args_digest(state, idx, 4), %xmm0
> > - vpinsrd $1, _args_digest+1*32(state, idx, 4), %xmm0, %xmm0
> > - vpinsrd $2, _args_digest+2*32(state, idx, 4), %xmm0, %xmm0
> > - vpinsrd $3, _args_digest+3*32(state, idx, 4), %xmm0, %xmm0
> > - vmovd _args_digest+4*32(state, idx, 4), %xmm1
> > - vpinsrd $1, _args_digest+5*32(state, idx, 4), %xmm1, %xmm1
> > - vpinsrd $2, _args_digest+6*32(state, idx, 4), %xmm1, %xmm1
> > - vpinsrd $3, _args_digest+7*32(state, idx, 4), %xmm1, %xmm1
> > -
> > - vmovdqu %xmm0, _result_digest(job_rax)
> > - offset = (_result_digest + 1*16)
> > - vmovdqu %xmm1, offset(job_rax)
> > -
> > - pop %rbx
> > -
> > - ret
> > -
> > -.return_null:
> > - xor job_rax, job_rax
> > - pop %rbx
> > - ret
> > -ENDPROC(sha256_mb_mgr_get_comp_job_avx2)
> > -
> > -.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
> > -.align 16
> > -clear_low_nibble:
> > -.octa 0x000000000000000000000000FFFFFFF0
> > -
> > -.section .rodata.cst8, "aM", @progbits, 8
> > -.align 8
> > -one:
> > -.quad 1
> > -two:
> > -.quad 2
> > -three:
> > -.quad 3
> > -four:
> > -.quad 4
> > -five:
> > -.quad 5
> > -six:
> > -.quad 6
> > -seven:
> > -.quad 7
> > diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c
> > deleted file mode 100644
> > index b0c498371e67..000000000000
> > --- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c
> > +++ /dev/null
> > @@ -1,65 +0,0 @@
> > -/*
> > - * Initialization code for multi buffer SHA256 algorithm for AVX2
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#include "sha256_mb_mgr.h"
> > -
> > -void sha256_mb_mgr_init_avx2(struct sha256_mb_mgr *state)
> > -{
> > - unsigned int j;
> > -
> > - state->unused_lanes = 0xF76543210ULL;
> > - for (j = 0; j < 8; j++) {
> > - state->lens[j] = 0xFFFFFFFF;
> > - state->ldata[j].job_in_lane = NULL;
> > - }
> > -}
> > diff --git a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S b/arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S
> > deleted file mode 100644
> > index b36ae7454084..000000000000
> > --- a/arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S
> > +++ /dev/null
> > @@ -1,214 +0,0 @@
> > -/*
> > - * Buffer submit code for multi buffer SHA256 algorithm
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#include <linux/linkage.h>
> > -#include <asm/frame.h>
> > -#include "sha256_mb_mgr_datastruct.S"
> > -
> > -.extern sha256_x8_avx2
> > -
> > -# LINUX register definitions
> > -arg1 = %rdi
> > -arg2 = %rsi
> > -size_offset = %rcx
> > -tmp2 = %rcx
> > -extra_blocks = %rdx
> > -
> > -# Common definitions
> > -#define state arg1
> > -#define job %rsi
> > -#define len2 arg2
> > -#define p2 arg2
> > -
> > -# idx must be a register not clobberred by sha1_x8_avx2
> > -idx = %r8
> > -DWORD_idx = %r8d
> > -last_len = %r8
> > -
> > -p = %r11
> > -start_offset = %r11
> > -
> > -unused_lanes = %rbx
> > -BYTE_unused_lanes = %bl
> > -
> > -job_rax = %rax
> > -len = %rax
> > -DWORD_len = %eax
> > -
> > -lane = %r12
> > -tmp3 = %r12
> > -
> > -tmp = %r9
> > -DWORD_tmp = %r9d
> > -
> > -lane_data = %r10
> > -
> > -# JOB* sha256_mb_mgr_submit_avx2(MB_MGR *state, JOB_SHA256 *job)
> > -# arg 1 : rcx : state
> > -# arg 2 : rdx : job
> > -ENTRY(sha256_mb_mgr_submit_avx2)
> > - FRAME_BEGIN
> > - push %rbx
> > - push %r12
> > -
> > - mov _unused_lanes(state), unused_lanes
> > - mov unused_lanes, lane
> > - and $0xF, lane
> > - shr $4, unused_lanes
> > - imul $_LANE_DATA_size, lane, lane_data
> > - movl $STS_BEING_PROCESSED, _status(job)
> > - lea _ldata(state, lane_data), lane_data
> > - mov unused_lanes, _unused_lanes(state)
> > - movl _len(job), DWORD_len
> > -
> > - mov job, _job_in_lane(lane_data)
> > - shl $4, len
> > - or lane, len
> > -
> > - movl DWORD_len, _lens(state , lane, 4)
> > -
> > - # Load digest words from result_digest
> > - vmovdqu _result_digest(job), %xmm0
> > - vmovdqu _result_digest+1*16(job), %xmm1
> > - vmovd %xmm0, _args_digest(state, lane, 4)
> > - vpextrd $1, %xmm0, _args_digest+1*32(state , lane, 4)
> > - vpextrd $2, %xmm0, _args_digest+2*32(state , lane, 4)
> > - vpextrd $3, %xmm0, _args_digest+3*32(state , lane, 4)
> > - vmovd %xmm1, _args_digest+4*32(state , lane, 4)
> > -
> > - vpextrd $1, %xmm1, _args_digest+5*32(state , lane, 4)
> > - vpextrd $2, %xmm1, _args_digest+6*32(state , lane, 4)
> > - vpextrd $3, %xmm1, _args_digest+7*32(state , lane, 4)
> > -
> > - mov _buffer(job), p
> > - mov p, _args_data_ptr(state, lane, 8)
> > -
> > - cmp $0xF, unused_lanes
> > - jne return_null
> > -
> > -start_loop:
> > - # Find min length
> > - vmovdqa _lens(state), %xmm0
> > - vmovdqa _lens+1*16(state), %xmm1
> > -
> > - vpminud %xmm1, %xmm0, %xmm2 # xmm2 has {D,C,B,A}
> > - vpalignr $8, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,D,C}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has {x,x,E,F}
> > - vpalignr $4, %xmm2, %xmm3, %xmm3 # xmm3 has {x,x,x,E}
> > - vpminud %xmm3, %xmm2, %xmm2 # xmm2 has min val in low dword
> > -
> > - vmovd %xmm2, DWORD_idx
> > - mov idx, len2
> > - and $0xF, idx
> > - shr $4, len2
> > - jz len_is_0
> > -
> > - vpand clear_low_nibble(%rip), %xmm2, %xmm2
> > - vpshufd $0, %xmm2, %xmm2
> > -
> > - vpsubd %xmm2, %xmm0, %xmm0
> > - vpsubd %xmm2, %xmm1, %xmm1
> > -
> > - vmovdqa %xmm0, _lens + 0*16(state)
> > - vmovdqa %xmm1, _lens + 1*16(state)
> > -
> > - # "state" and "args" are the same address, arg1
> > - # len is arg2
> > - call sha256_x8_avx2
> > -
> > - # state and idx are intact
> > -
> > -len_is_0:
> > - # process completed job "idx"
> > - imul $_LANE_DATA_size, idx, lane_data
> > - lea _ldata(state, lane_data), lane_data
> > -
> > - mov _job_in_lane(lane_data), job_rax
> > - mov _unused_lanes(state), unused_lanes
> > - movq $0, _job_in_lane(lane_data)
> > - movl $STS_COMPLETED, _status(job_rax)
> > - shl $4, unused_lanes
> > - or idx, unused_lanes
> > - mov unused_lanes, _unused_lanes(state)
> > -
> > - movl $0xFFFFFFFF, _lens(state,idx,4)
> > -
> > - vmovd _args_digest(state, idx, 4), %xmm0
> > - vpinsrd $1, _args_digest+1*32(state , idx, 4), %xmm0, %xmm0
> > - vpinsrd $2, _args_digest+2*32(state , idx, 4), %xmm0, %xmm0
> > - vpinsrd $3, _args_digest+3*32(state , idx, 4), %xmm0, %xmm0
> > - vmovd _args_digest+4*32(state, idx, 4), %xmm1
> > -
> > - vpinsrd $1, _args_digest+5*32(state , idx, 4), %xmm1, %xmm1
> > - vpinsrd $2, _args_digest+6*32(state , idx, 4), %xmm1, %xmm1
> > - vpinsrd $3, _args_digest+7*32(state , idx, 4), %xmm1, %xmm1
> > -
> > - vmovdqu %xmm0, _result_digest(job_rax)
> > - vmovdqu %xmm1, _result_digest+1*16(job_rax)
> > -
> > -return:
> > - pop %r12
> > - pop %rbx
> > - FRAME_END
> > - ret
> > -
> > -return_null:
> > - xor job_rax, job_rax
> > - jmp return
> > -
> > -ENDPROC(sha256_mb_mgr_submit_avx2)
> > -
> > -.section .rodata.cst16.clear_low_nibble, "aM", @progbits, 16
> > -.align 16
> > -clear_low_nibble:
> > - .octa 0x000000000000000000000000FFFFFFF0
> > diff --git a/arch/x86/crypto/sha256-mb/sha256_x8_avx2.S b/arch/x86/crypto/sha256-mb/sha256_x8_avx2.S
> > deleted file mode 100644
> > index 1687c80c5995..000000000000
> > --- a/arch/x86/crypto/sha256-mb/sha256_x8_avx2.S
> > +++ /dev/null
> > @@ -1,598 +0,0 @@
> > -/*
> > - * Multi-buffer SHA256 algorithm hash compute routine
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#include <linux/linkage.h>
> > -#include "sha256_mb_mgr_datastruct.S"
> > -
> > -## code to compute oct SHA256 using SSE-256
> > -## outer calling routine takes care of save and restore of XMM registers
> > -## Logic designed/laid out by JDG
> > -
> > -## Function clobbers: rax, rcx, rdx, rbx, rsi, rdi, r9-r15; %ymm0-15
> > -## Linux clobbers: rax rbx rcx rdx rsi r9 r10 r11 r12 r13 r14 r15
> > -## Linux preserves: rdi rbp r8
> > -##
> > -## clobbers %ymm0-15
> > -
> > -arg1 = %rdi
> > -arg2 = %rsi
> > -reg3 = %rcx
> > -reg4 = %rdx
> > -
> > -# Common definitions
> > -STATE = arg1
> > -INP_SIZE = arg2
> > -
> > -IDX = %rax
> > -ROUND = %rbx
> > -TBL = reg3
> > -
> > -inp0 = %r9
> > -inp1 = %r10
> > -inp2 = %r11
> > -inp3 = %r12
> > -inp4 = %r13
> > -inp5 = %r14
> > -inp6 = %r15
> > -inp7 = reg4
> > -
> > -a = %ymm0
> > -b = %ymm1
> > -c = %ymm2
> > -d = %ymm3
> > -e = %ymm4
> > -f = %ymm5
> > -g = %ymm6
> > -h = %ymm7
> > -
> > -T1 = %ymm8
> > -
> > -a0 = %ymm12
> > -a1 = %ymm13
> > -a2 = %ymm14
> > -TMP = %ymm15
> > -TMP0 = %ymm6
> > -TMP1 = %ymm7
> > -
> > -TT0 = %ymm8
> > -TT1 = %ymm9
> > -TT2 = %ymm10
> > -TT3 = %ymm11
> > -TT4 = %ymm12
> > -TT5 = %ymm13
> > -TT6 = %ymm14
> > -TT7 = %ymm15
> > -
> > -# Define stack usage
> > -
> > -# Assume stack aligned to 32 bytes before call
> > -# Therefore FRAMESZ mod 32 must be 32-8 = 24
> > -
> > -#define FRAMESZ 0x388
> > -
> > -#define VMOVPS vmovups
> > -
> > -# TRANSPOSE8 r0, r1, r2, r3, r4, r5, r6, r7, t0, t1
> > -# "transpose" data in {r0...r7} using temps {t0...t1}
> > -# Input looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
> > -# r0 = {a7 a6 a5 a4 a3 a2 a1 a0}
> > -# r1 = {b7 b6 b5 b4 b3 b2 b1 b0}
> > -# r2 = {c7 c6 c5 c4 c3 c2 c1 c0}
> > -# r3 = {d7 d6 d5 d4 d3 d2 d1 d0}
> > -# r4 = {e7 e6 e5 e4 e3 e2 e1 e0}
> > -# r5 = {f7 f6 f5 f4 f3 f2 f1 f0}
> > -# r6 = {g7 g6 g5 g4 g3 g2 g1 g0}
> > -# r7 = {h7 h6 h5 h4 h3 h2 h1 h0}
> > -#
> > -# Output looks like: {r0 r1 r2 r3 r4 r5 r6 r7}
> > -# r0 = {h0 g0 f0 e0 d0 c0 b0 a0}
> > -# r1 = {h1 g1 f1 e1 d1 c1 b1 a1}
> > -# r2 = {h2 g2 f2 e2 d2 c2 b2 a2}
> > -# r3 = {h3 g3 f3 e3 d3 c3 b3 a3}
> > -# r4 = {h4 g4 f4 e4 d4 c4 b4 a4}
> > -# r5 = {h5 g5 f5 e5 d5 c5 b5 a5}
> > -# r6 = {h6 g6 f6 e6 d6 c6 b6 a6}
> > -# r7 = {h7 g7 f7 e7 d7 c7 b7 a7}
> > -#
> > -
> > -.macro TRANSPOSE8 r0 r1 r2 r3 r4 r5 r6 r7 t0 t1
> > - # process top half (r0..r3) {a...d}
> > - vshufps $0x44, \r1, \r0, \t0 # t0 = {b5 b4 a5 a4 b1 b0 a1 a0}
> > - vshufps $0xEE, \r1, \r0, \r0 # r0 = {b7 b6 a7 a6 b3 b2 a3 a2}
> > - vshufps $0x44, \r3, \r2, \t1 # t1 = {d5 d4 c5 c4 d1 d0 c1 c0}
> > - vshufps $0xEE, \r3, \r2, \r2 # r2 = {d7 d6 c7 c6 d3 d2 c3 c2}
> > - vshufps $0xDD, \t1, \t0, \r3 # r3 = {d5 c5 b5 a5 d1 c1 b1 a1}
> > - vshufps $0x88, \r2, \r0, \r1 # r1 = {d6 c6 b6 a6 d2 c2 b2 a2}
> > - vshufps $0xDD, \r2, \r0, \r0 # r0 = {d7 c7 b7 a7 d3 c3 b3 a3}
> > - vshufps $0x88, \t1, \t0, \t0 # t0 = {d4 c4 b4 a4 d0 c0 b0 a0}
> > -
> > - # use r2 in place of t0
> > - # process bottom half (r4..r7) {e...h}
> > - vshufps $0x44, \r5, \r4, \r2 # r2 = {f5 f4 e5 e4 f1 f0 e1 e0}
> > - vshufps $0xEE, \r5, \r4, \r4 # r4 = {f7 f6 e7 e6 f3 f2 e3 e2}
> > - vshufps $0x44, \r7, \r6, \t1 # t1 = {h5 h4 g5 g4 h1 h0 g1 g0}
> > - vshufps $0xEE, \r7, \r6, \r6 # r6 = {h7 h6 g7 g6 h3 h2 g3 g2}
> > - vshufps $0xDD, \t1, \r2, \r7 # r7 = {h5 g5 f5 e5 h1 g1 f1 e1}
> > - vshufps $0x88, \r6, \r4, \r5 # r5 = {h6 g6 f6 e6 h2 g2 f2 e2}
> > - vshufps $0xDD, \r6, \r4, \r4 # r4 = {h7 g7 f7 e7 h3 g3 f3 e3}
> > - vshufps $0x88, \t1, \r2, \t1 # t1 = {h4 g4 f4 e4 h0 g0 f0 e0}
> > -
> > - vperm2f128 $0x13, \r1, \r5, \r6 # h6...a6
> > - vperm2f128 $0x02, \r1, \r5, \r2 # h2...a2
> > - vperm2f128 $0x13, \r3, \r7, \r5 # h5...a5
> > - vperm2f128 $0x02, \r3, \r7, \r1 # h1...a1
> > - vperm2f128 $0x13, \r0, \r4, \r7 # h7...a7
> > - vperm2f128 $0x02, \r0, \r4, \r3 # h3...a3
> > - vperm2f128 $0x13, \t0, \t1, \r4 # h4...a4
> > - vperm2f128 $0x02, \t0, \t1, \r0 # h0...a0
> > -
> > -.endm
> > -
> > -.macro ROTATE_ARGS
> > -TMP_ = h
> > -h = g
> > -g = f
> > -f = e
> > -e = d
> > -d = c
> > -c = b
> > -b = a
> > -a = TMP_
> > -.endm
> > -
> > -.macro _PRORD reg imm tmp
> > - vpslld $(32-\imm),\reg,\tmp
> > - vpsrld $\imm,\reg, \reg
> > - vpor \tmp,\reg, \reg
> > -.endm
> > -
> > -# PRORD_nd reg, imm, tmp, src
> > -.macro _PRORD_nd reg imm tmp src
> > - vpslld $(32-\imm), \src, \tmp
> > - vpsrld $\imm, \src, \reg
> > - vpor \tmp, \reg, \reg
> > -.endm
> > -
> > -# PRORD dst/src, amt
> > -.macro PRORD reg imm
> > - _PRORD \reg,\imm,TMP
> > -.endm
> > -
> > -# PRORD_nd dst, src, amt
> > -.macro PRORD_nd reg tmp imm
> > - _PRORD_nd \reg, \imm, TMP, \tmp
> > -.endm
> > -
> > -# arguments passed implicitly in preprocessor symbols i, a...h
> > -.macro ROUND_00_15 _T1 i
> > - PRORD_nd a0,e,5 # sig1: a0 = (e >> 5)
> > -
> > - vpxor g, f, a2 # ch: a2 = f^g
> > - vpand e,a2, a2 # ch: a2 = (f^g)&e
> > - vpxor g, a2, a2 # a2 = ch
> > -
> > - PRORD_nd a1,e,25 # sig1: a1 = (e >> 25)
> > -
> > - vmovdqu \_T1,(SZ8*(\i & 0xf))(%rsp)
> > - vpaddd (TBL,ROUND,1), \_T1, \_T1 # T1 = W + K
> > - vpxor e,a0, a0 # sig1: a0 = e ^ (e >> 5)
> > - PRORD a0, 6 # sig1: a0 = (e >> 6) ^ (e >> 11)
> > - vpaddd a2, h, h # h = h + ch
> > - PRORD_nd a2,a,11 # sig0: a2 = (a >> 11)
> > - vpaddd \_T1,h, h # h = h + ch + W + K
> > - vpxor a1, a0, a0 # a0 = sigma1
> > - PRORD_nd a1,a,22 # sig0: a1 = (a >> 22)
> > - vpxor c, a, \_T1 # maj: T1 = a^c
> > - add $SZ8, ROUND # ROUND++
> > - vpand b, \_T1, \_T1 # maj: T1 = (a^c)&b
> > - vpaddd a0, h, h
> > - vpaddd h, d, d
> > - vpxor a, a2, a2 # sig0: a2 = a ^ (a >> 11)
> > - PRORD a2,2 # sig0: a2 = (a >> 2) ^ (a >> 13)
> > - vpxor a1, a2, a2 # a2 = sig0
> > - vpand c, a, a1 # maj: a1 = a&c
> > - vpor \_T1, a1, a1 # a1 = maj
> > - vpaddd a1, h, h # h = h + ch + W + K + maj
> > - vpaddd a2, h, h # h = h + ch + W + K + maj + sigma0
> > - ROTATE_ARGS
> > -.endm
> > -
> > -# arguments passed implicitly in preprocessor symbols i, a...h
> > -.macro ROUND_16_XX _T1 i
> > - vmovdqu (SZ8*((\i-15)&0xf))(%rsp), \_T1
> > - vmovdqu (SZ8*((\i-2)&0xf))(%rsp), a1
> > - vmovdqu \_T1, a0
> > - PRORD \_T1,11
> > - vmovdqu a1, a2
> > - PRORD a1,2
> > - vpxor a0, \_T1, \_T1
> > - PRORD \_T1, 7
> > - vpxor a2, a1, a1
> > - PRORD a1, 17
> > - vpsrld $3, a0, a0
> > - vpxor a0, \_T1, \_T1
> > - vpsrld $10, a2, a2
> > - vpxor a2, a1, a1
> > - vpaddd (SZ8*((\i-16)&0xf))(%rsp), \_T1, \_T1
> > - vpaddd (SZ8*((\i-7)&0xf))(%rsp), a1, a1
> > - vpaddd a1, \_T1, \_T1
> > -
> > - ROUND_00_15 \_T1,\i
> > -.endm
> > -
> > -# SHA256_ARGS:
> > -# UINT128 digest[8]; // transposed digests
> > -# UINT8 *data_ptr[4];
> > -
> > -# void sha256_x8_avx2(SHA256_ARGS *args, UINT64 bytes);
> > -# arg 1 : STATE : pointer to array of pointers to input data
> > -# arg 2 : INP_SIZE : size of input in blocks
> > - # general registers preserved in outer calling routine
> > - # outer calling routine saves all the XMM registers
> > - # save rsp, allocate 32-byte aligned for local variables
> > -ENTRY(sha256_x8_avx2)
> > -
> > - # save callee-saved clobbered registers to comply with C function ABI
> > - push %r12
> > - push %r13
> > - push %r14
> > - push %r15
> > -
> > - mov %rsp, IDX
> > - sub $FRAMESZ, %rsp
> > - and $~0x1F, %rsp
> > - mov IDX, _rsp(%rsp)
> > -
> > - # Load the pre-transposed incoming digest.
> > - vmovdqu 0*SHA256_DIGEST_ROW_SIZE(STATE),a
> > - vmovdqu 1*SHA256_DIGEST_ROW_SIZE(STATE),b
> > - vmovdqu 2*SHA256_DIGEST_ROW_SIZE(STATE),c
> > - vmovdqu 3*SHA256_DIGEST_ROW_SIZE(STATE),d
> > - vmovdqu 4*SHA256_DIGEST_ROW_SIZE(STATE),e
> > - vmovdqu 5*SHA256_DIGEST_ROW_SIZE(STATE),f
> > - vmovdqu 6*SHA256_DIGEST_ROW_SIZE(STATE),g
> > - vmovdqu 7*SHA256_DIGEST_ROW_SIZE(STATE),h
> > -
> > - lea K256_8(%rip),TBL
> > -
> > - # load the address of each of the 4 message lanes
> > - # getting ready to transpose input onto stack
> > - mov _args_data_ptr+0*PTR_SZ(STATE),inp0
> > - mov _args_data_ptr+1*PTR_SZ(STATE),inp1
> > - mov _args_data_ptr+2*PTR_SZ(STATE),inp2
> > - mov _args_data_ptr+3*PTR_SZ(STATE),inp3
> > - mov _args_data_ptr+4*PTR_SZ(STATE),inp4
> > - mov _args_data_ptr+5*PTR_SZ(STATE),inp5
> > - mov _args_data_ptr+6*PTR_SZ(STATE),inp6
> > - mov _args_data_ptr+7*PTR_SZ(STATE),inp7
> > -
> > - xor IDX, IDX
> > -lloop:
> > - xor ROUND, ROUND
> > -
> > - # save old digest
> > - vmovdqu a, _digest(%rsp)
> > - vmovdqu b, _digest+1*SZ8(%rsp)
> > - vmovdqu c, _digest+2*SZ8(%rsp)
> > - vmovdqu d, _digest+3*SZ8(%rsp)
> > - vmovdqu e, _digest+4*SZ8(%rsp)
> > - vmovdqu f, _digest+5*SZ8(%rsp)
> > - vmovdqu g, _digest+6*SZ8(%rsp)
> > - vmovdqu h, _digest+7*SZ8(%rsp)
> > - i = 0
> > -.rep 2
> > - VMOVPS i*32(inp0, IDX), TT0
> > - VMOVPS i*32(inp1, IDX), TT1
> > - VMOVPS i*32(inp2, IDX), TT2
> > - VMOVPS i*32(inp3, IDX), TT3
> > - VMOVPS i*32(inp4, IDX), TT4
> > - VMOVPS i*32(inp5, IDX), TT5
> > - VMOVPS i*32(inp6, IDX), TT6
> > - VMOVPS i*32(inp7, IDX), TT7
> > - vmovdqu g, _ytmp(%rsp)
> > - vmovdqu h, _ytmp+1*SZ8(%rsp)
> > - TRANSPOSE8 TT0, TT1, TT2, TT3, TT4, TT5, TT6, TT7, TMP0, TMP1
> > - vmovdqu PSHUFFLE_BYTE_FLIP_MASK(%rip), TMP1
> > - vmovdqu _ytmp(%rsp), g
> > - vpshufb TMP1, TT0, TT0
> > - vpshufb TMP1, TT1, TT1
> > - vpshufb TMP1, TT2, TT2
> > - vpshufb TMP1, TT3, TT3
> > - vpshufb TMP1, TT4, TT4
> > - vpshufb TMP1, TT5, TT5
> > - vpshufb TMP1, TT6, TT6
> > - vpshufb TMP1, TT7, TT7
> > - vmovdqu _ytmp+1*SZ8(%rsp), h
> > - vmovdqu TT4, _ytmp(%rsp)
> > - vmovdqu TT5, _ytmp+1*SZ8(%rsp)
> > - vmovdqu TT6, _ytmp+2*SZ8(%rsp)
> > - vmovdqu TT7, _ytmp+3*SZ8(%rsp)
> > - ROUND_00_15 TT0,(i*8+0)
> > - vmovdqu _ytmp(%rsp), TT0
> > - ROUND_00_15 TT1,(i*8+1)
> > - vmovdqu _ytmp+1*SZ8(%rsp), TT1
> > - ROUND_00_15 TT2,(i*8+2)
> > - vmovdqu _ytmp+2*SZ8(%rsp), TT2
> > - ROUND_00_15 TT3,(i*8+3)
> > - vmovdqu _ytmp+3*SZ8(%rsp), TT3
> > - ROUND_00_15 TT0,(i*8+4)
> > - ROUND_00_15 TT1,(i*8+5)
> > - ROUND_00_15 TT2,(i*8+6)
> > - ROUND_00_15 TT3,(i*8+7)
> > - i = (i+1)
> > -.endr
> > - add $64, IDX
> > - i = (i*8)
> > -
> > - jmp Lrounds_16_xx
> > -.align 16
> > -Lrounds_16_xx:
> > -.rep 16
> > - ROUND_16_XX T1, i
> > - i = (i+1)
> > -.endr
> > -
> > - cmp $ROUNDS,ROUND
> > - jb Lrounds_16_xx
> > -
> > - # add old digest
> > - vpaddd _digest+0*SZ8(%rsp), a, a
> > - vpaddd _digest+1*SZ8(%rsp), b, b
> > - vpaddd _digest+2*SZ8(%rsp), c, c
> > - vpaddd _digest+3*SZ8(%rsp), d, d
> > - vpaddd _digest+4*SZ8(%rsp), e, e
> > - vpaddd _digest+5*SZ8(%rsp), f, f
> > - vpaddd _digest+6*SZ8(%rsp), g, g
> > - vpaddd _digest+7*SZ8(%rsp), h, h
> > -
> > - sub $1, INP_SIZE # unit is blocks
> > - jne lloop
> > -
> > - # write back to memory (state object) the transposed digest
> > - vmovdqu a, 0*SHA256_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu b, 1*SHA256_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu c, 2*SHA256_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu d, 3*SHA256_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu e, 4*SHA256_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu f, 5*SHA256_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu g, 6*SHA256_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu h, 7*SHA256_DIGEST_ROW_SIZE(STATE)
> > -
> > - # update input pointers
> > - add IDX, inp0
> > - mov inp0, _args_data_ptr+0*8(STATE)
> > - add IDX, inp1
> > - mov inp1, _args_data_ptr+1*8(STATE)
> > - add IDX, inp2
> > - mov inp2, _args_data_ptr+2*8(STATE)
> > - add IDX, inp3
> > - mov inp3, _args_data_ptr+3*8(STATE)
> > - add IDX, inp4
> > - mov inp4, _args_data_ptr+4*8(STATE)
> > - add IDX, inp5
> > - mov inp5, _args_data_ptr+5*8(STATE)
> > - add IDX, inp6
> > - mov inp6, _args_data_ptr+6*8(STATE)
> > - add IDX, inp7
> > - mov inp7, _args_data_ptr+7*8(STATE)
> > -
> > - # Postamble
> > - mov _rsp(%rsp), %rsp
> > -
> > - # restore callee-saved clobbered registers
> > - pop %r15
> > - pop %r14
> > - pop %r13
> > - pop %r12
> > -
> > - ret
> > -ENDPROC(sha256_x8_avx2)
> > -
> > -.section .rodata.K256_8, "a", @progbits
> > -.align 64
> > -K256_8:
> > - .octa 0x428a2f98428a2f98428a2f98428a2f98
> > - .octa 0x428a2f98428a2f98428a2f98428a2f98
> > - .octa 0x71374491713744917137449171374491
> > - .octa 0x71374491713744917137449171374491
> > - .octa 0xb5c0fbcfb5c0fbcfb5c0fbcfb5c0fbcf
> > - .octa 0xb5c0fbcfb5c0fbcfb5c0fbcfb5c0fbcf
> > - .octa 0xe9b5dba5e9b5dba5e9b5dba5e9b5dba5
> > - .octa 0xe9b5dba5e9b5dba5e9b5dba5e9b5dba5
> > - .octa 0x3956c25b3956c25b3956c25b3956c25b
> > - .octa 0x3956c25b3956c25b3956c25b3956c25b
> > - .octa 0x59f111f159f111f159f111f159f111f1
> > - .octa 0x59f111f159f111f159f111f159f111f1
> > - .octa 0x923f82a4923f82a4923f82a4923f82a4
> > - .octa 0x923f82a4923f82a4923f82a4923f82a4
> > - .octa 0xab1c5ed5ab1c5ed5ab1c5ed5ab1c5ed5
> > - .octa 0xab1c5ed5ab1c5ed5ab1c5ed5ab1c5ed5
> > - .octa 0xd807aa98d807aa98d807aa98d807aa98
> > - .octa 0xd807aa98d807aa98d807aa98d807aa98
> > - .octa 0x12835b0112835b0112835b0112835b01
> > - .octa 0x12835b0112835b0112835b0112835b01
> > - .octa 0x243185be243185be243185be243185be
> > - .octa 0x243185be243185be243185be243185be
> > - .octa 0x550c7dc3550c7dc3550c7dc3550c7dc3
> > - .octa 0x550c7dc3550c7dc3550c7dc3550c7dc3
> > - .octa 0x72be5d7472be5d7472be5d7472be5d74
> > - .octa 0x72be5d7472be5d7472be5d7472be5d74
> > - .octa 0x80deb1fe80deb1fe80deb1fe80deb1fe
> > - .octa 0x80deb1fe80deb1fe80deb1fe80deb1fe
> > - .octa 0x9bdc06a79bdc06a79bdc06a79bdc06a7
> > - .octa 0x9bdc06a79bdc06a79bdc06a79bdc06a7
> > - .octa 0xc19bf174c19bf174c19bf174c19bf174
> > - .octa 0xc19bf174c19bf174c19bf174c19bf174
> > - .octa 0xe49b69c1e49b69c1e49b69c1e49b69c1
> > - .octa 0xe49b69c1e49b69c1e49b69c1e49b69c1
> > - .octa 0xefbe4786efbe4786efbe4786efbe4786
> > - .octa 0xefbe4786efbe4786efbe4786efbe4786
> > - .octa 0x0fc19dc60fc19dc60fc19dc60fc19dc6
> > - .octa 0x0fc19dc60fc19dc60fc19dc60fc19dc6
> > - .octa 0x240ca1cc240ca1cc240ca1cc240ca1cc
> > - .octa 0x240ca1cc240ca1cc240ca1cc240ca1cc
> > - .octa 0x2de92c6f2de92c6f2de92c6f2de92c6f
> > - .octa 0x2de92c6f2de92c6f2de92c6f2de92c6f
> > - .octa 0x4a7484aa4a7484aa4a7484aa4a7484aa
> > - .octa 0x4a7484aa4a7484aa4a7484aa4a7484aa
> > - .octa 0x5cb0a9dc5cb0a9dc5cb0a9dc5cb0a9dc
> > - .octa 0x5cb0a9dc5cb0a9dc5cb0a9dc5cb0a9dc
> > - .octa 0x76f988da76f988da76f988da76f988da
> > - .octa 0x76f988da76f988da76f988da76f988da
> > - .octa 0x983e5152983e5152983e5152983e5152
> > - .octa 0x983e5152983e5152983e5152983e5152
> > - .octa 0xa831c66da831c66da831c66da831c66d
> > - .octa 0xa831c66da831c66da831c66da831c66d
> > - .octa 0xb00327c8b00327c8b00327c8b00327c8
> > - .octa 0xb00327c8b00327c8b00327c8b00327c8
> > - .octa 0xbf597fc7bf597fc7bf597fc7bf597fc7
> > - .octa 0xbf597fc7bf597fc7bf597fc7bf597fc7
> > - .octa 0xc6e00bf3c6e00bf3c6e00bf3c6e00bf3
> > - .octa 0xc6e00bf3c6e00bf3c6e00bf3c6e00bf3
> > - .octa 0xd5a79147d5a79147d5a79147d5a79147
> > - .octa 0xd5a79147d5a79147d5a79147d5a79147
> > - .octa 0x06ca635106ca635106ca635106ca6351
> > - .octa 0x06ca635106ca635106ca635106ca6351
> > - .octa 0x14292967142929671429296714292967
> > - .octa 0x14292967142929671429296714292967
> > - .octa 0x27b70a8527b70a8527b70a8527b70a85
> > - .octa 0x27b70a8527b70a8527b70a8527b70a85
> > - .octa 0x2e1b21382e1b21382e1b21382e1b2138
> > - .octa 0x2e1b21382e1b21382e1b21382e1b2138
> > - .octa 0x4d2c6dfc4d2c6dfc4d2c6dfc4d2c6dfc
> > - .octa 0x4d2c6dfc4d2c6dfc4d2c6dfc4d2c6dfc
> > - .octa 0x53380d1353380d1353380d1353380d13
> > - .octa 0x53380d1353380d1353380d1353380d13
> > - .octa 0x650a7354650a7354650a7354650a7354
> > - .octa 0x650a7354650a7354650a7354650a7354
> > - .octa 0x766a0abb766a0abb766a0abb766a0abb
> > - .octa 0x766a0abb766a0abb766a0abb766a0abb
> > - .octa 0x81c2c92e81c2c92e81c2c92e81c2c92e
> > - .octa 0x81c2c92e81c2c92e81c2c92e81c2c92e
> > - .octa 0x92722c8592722c8592722c8592722c85
> > - .octa 0x92722c8592722c8592722c8592722c85
> > - .octa 0xa2bfe8a1a2bfe8a1a2bfe8a1a2bfe8a1
> > - .octa 0xa2bfe8a1a2bfe8a1a2bfe8a1a2bfe8a1
> > - .octa 0xa81a664ba81a664ba81a664ba81a664b
> > - .octa 0xa81a664ba81a664ba81a664ba81a664b
> > - .octa 0xc24b8b70c24b8b70c24b8b70c24b8b70
> > - .octa 0xc24b8b70c24b8b70c24b8b70c24b8b70
> > - .octa 0xc76c51a3c76c51a3c76c51a3c76c51a3
> > - .octa 0xc76c51a3c76c51a3c76c51a3c76c51a3
> > - .octa 0xd192e819d192e819d192e819d192e819
> > - .octa 0xd192e819d192e819d192e819d192e819
> > - .octa 0xd6990624d6990624d6990624d6990624
> > - .octa 0xd6990624d6990624d6990624d6990624
> > - .octa 0xf40e3585f40e3585f40e3585f40e3585
> > - .octa 0xf40e3585f40e3585f40e3585f40e3585
> > - .octa 0x106aa070106aa070106aa070106aa070
> > - .octa 0x106aa070106aa070106aa070106aa070
> > - .octa 0x19a4c11619a4c11619a4c11619a4c116
> > - .octa 0x19a4c11619a4c11619a4c11619a4c116
> > - .octa 0x1e376c081e376c081e376c081e376c08
> > - .octa 0x1e376c081e376c081e376c081e376c08
> > - .octa 0x2748774c2748774c2748774c2748774c
> > - .octa 0x2748774c2748774c2748774c2748774c
> > - .octa 0x34b0bcb534b0bcb534b0bcb534b0bcb5
> > - .octa 0x34b0bcb534b0bcb534b0bcb534b0bcb5
> > - .octa 0x391c0cb3391c0cb3391c0cb3391c0cb3
> > - .octa 0x391c0cb3391c0cb3391c0cb3391c0cb3
> > - .octa 0x4ed8aa4a4ed8aa4a4ed8aa4a4ed8aa4a
> > - .octa 0x4ed8aa4a4ed8aa4a4ed8aa4a4ed8aa4a
> > - .octa 0x5b9cca4f5b9cca4f5b9cca4f5b9cca4f
> > - .octa 0x5b9cca4f5b9cca4f5b9cca4f5b9cca4f
> > - .octa 0x682e6ff3682e6ff3682e6ff3682e6ff3
> > - .octa 0x682e6ff3682e6ff3682e6ff3682e6ff3
> > - .octa 0x748f82ee748f82ee748f82ee748f82ee
> > - .octa 0x748f82ee748f82ee748f82ee748f82ee
> > - .octa 0x78a5636f78a5636f78a5636f78a5636f
> > - .octa 0x78a5636f78a5636f78a5636f78a5636f
> > - .octa 0x84c8781484c8781484c8781484c87814
> > - .octa 0x84c8781484c8781484c8781484c87814
> > - .octa 0x8cc702088cc702088cc702088cc70208
> > - .octa 0x8cc702088cc702088cc702088cc70208
> > - .octa 0x90befffa90befffa90befffa90befffa
> > - .octa 0x90befffa90befffa90befffa90befffa
> > - .octa 0xa4506ceba4506ceba4506ceba4506ceb
> > - .octa 0xa4506ceba4506ceba4506ceba4506ceb
> > - .octa 0xbef9a3f7bef9a3f7bef9a3f7bef9a3f7
> > - .octa 0xbef9a3f7bef9a3f7bef9a3f7bef9a3f7
> > - .octa 0xc67178f2c67178f2c67178f2c67178f2
> > - .octa 0xc67178f2c67178f2c67178f2c67178f2
> > -
> > -.section .rodata.cst32.PSHUFFLE_BYTE_FLIP_MASK, "aM", @progbits, 32
> > -.align 32
> > -PSHUFFLE_BYTE_FLIP_MASK:
> > -.octa 0x0c0d0e0f08090a0b0405060700010203
> > -.octa 0x0c0d0e0f08090a0b0405060700010203
> > -
> > -.section .rodata.cst256.K256, "aM", @progbits, 256
> > -.align 64
> > -.global K256
> > -K256:
> > - .int 0x428a2f98,0x71374491,0xb5c0fbcf,0xe9b5dba5
> > - .int 0x3956c25b,0x59f111f1,0x923f82a4,0xab1c5ed5
> > - .int 0xd807aa98,0x12835b01,0x243185be,0x550c7dc3
> > - .int 0x72be5d74,0x80deb1fe,0x9bdc06a7,0xc19bf174
> > - .int 0xe49b69c1,0xefbe4786,0x0fc19dc6,0x240ca1cc
> > - .int 0x2de92c6f,0x4a7484aa,0x5cb0a9dc,0x76f988da
> > - .int 0x983e5152,0xa831c66d,0xb00327c8,0xbf597fc7
> > - .int 0xc6e00bf3,0xd5a79147,0x06ca6351,0x14292967
> > - .int 0x27b70a85,0x2e1b2138,0x4d2c6dfc,0x53380d13
> > - .int 0x650a7354,0x766a0abb,0x81c2c92e,0x92722c85
> > - .int 0xa2bfe8a1,0xa81a664b,0xc24b8b70,0xc76c51a3
> > - .int 0xd192e819,0xd6990624,0xf40e3585,0x106aa070
> > - .int 0x19a4c116,0x1e376c08,0x2748774c,0x34b0bcb5
> > - .int 0x391c0cb3,0x4ed8aa4a,0x5b9cca4f,0x682e6ff3
> > - .int 0x748f82ee,0x78a5636f,0x84c87814,0x8cc70208
> > - .int 0x90befffa,0xa4506ceb,0xbef9a3f7,0xc67178f2
> > diff --git a/arch/x86/crypto/sha512-mb/Makefile b/arch/x86/crypto/sha512-mb/Makefile
> > deleted file mode 100644
> > index 90f1ef69152e..000000000000
> > --- a/arch/x86/crypto/sha512-mb/Makefile
> > +++ /dev/null
> > @@ -1,12 +0,0 @@
> > -# SPDX-License-Identifier: GPL-2.0
> > -#
> > -# Arch-specific CryptoAPI modules.
> > -#
> > -
> > -avx2_supported := $(call as-instr,vpgatherdd %ymm0$(comma)(%eax$(comma)%ymm1\
> > - $(comma)4)$(comma)%ymm2,yes,no)
> > -ifeq ($(avx2_supported),yes)
> > - obj-$(CONFIG_CRYPTO_SHA512_MB) += sha512-mb.o
> > - sha512-mb-y := sha512_mb.o sha512_mb_mgr_flush_avx2.o \
> > - sha512_mb_mgr_init_avx2.o sha512_mb_mgr_submit_avx2.o sha512_x4_avx2.o
> > -endif
> > diff --git a/arch/x86/crypto/sha512-mb/sha512_mb.c b/arch/x86/crypto/sha512-mb/sha512_mb.c
> > deleted file mode 100644
> > index 26b85678012d..000000000000
> > --- a/arch/x86/crypto/sha512-mb/sha512_mb.c
> > +++ /dev/null
> > @@ -1,1047 +0,0 @@
> > -/*
> > - * Multi buffer SHA512 algorithm Glue Code
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
> > -
> > -#include <crypto/internal/hash.h>
> > -#include <linux/init.h>
> > -#include <linux/module.h>
> > -#include <linux/mm.h>
> > -#include <linux/cryptohash.h>
> > -#include <linux/types.h>
> > -#include <linux/list.h>
> > -#include <crypto/scatterwalk.h>
> > -#include <crypto/sha.h>
> > -#include <crypto/mcryptd.h>
> > -#include <crypto/crypto_wq.h>
> > -#include <asm/byteorder.h>
> > -#include <linux/hardirq.h>
> > -#include <asm/fpu/api.h>
> > -#include "sha512_mb_ctx.h"
> > -
> > -#define FLUSH_INTERVAL 1000 /* in usec */
> > -
> > -static struct mcryptd_alg_state sha512_mb_alg_state;
> > -
> > -struct sha512_mb_ctx {
> > - struct mcryptd_ahash *mcryptd_tfm;
> > -};
> > -
> > -static inline struct mcryptd_hash_request_ctx
> > - *cast_hash_to_mcryptd_ctx(struct sha512_hash_ctx *hash_ctx)
> > -{
> > - struct ahash_request *areq;
> > -
> > - areq = container_of((void *) hash_ctx, struct ahash_request, __ctx);
> > - return container_of(areq, struct mcryptd_hash_request_ctx, areq);
> > -}
> > -
> > -static inline struct ahash_request
> > - *cast_mcryptd_ctx_to_req(struct mcryptd_hash_request_ctx *ctx)
> > -{
> > - return container_of((void *) ctx, struct ahash_request, __ctx);
> > -}
> > -
> > -static void req_ctx_init(struct mcryptd_hash_request_ctx *rctx,
> > - struct ahash_request *areq)
> > -{
> > - rctx->flag = HASH_UPDATE;
> > -}
> > -
> > -static asmlinkage void (*sha512_job_mgr_init)(struct sha512_mb_mgr *state);
> > -static asmlinkage struct job_sha512* (*sha512_job_mgr_submit)
> > - (struct sha512_mb_mgr *state,
> > - struct job_sha512 *job);
> > -static asmlinkage struct job_sha512* (*sha512_job_mgr_flush)
> > - (struct sha512_mb_mgr *state);
> > -static asmlinkage struct job_sha512* (*sha512_job_mgr_get_comp_job)
> > - (struct sha512_mb_mgr *state);
> > -
> > -inline uint32_t sha512_pad(uint8_t padblock[SHA512_BLOCK_SIZE * 2],
> > - uint64_t total_len)
> > -{
> > - uint32_t i = total_len & (SHA512_BLOCK_SIZE - 1);
> > -
> > - memset(&padblock[i], 0, SHA512_BLOCK_SIZE);
> > - padblock[i] = 0x80;
> > -
> > - i += ((SHA512_BLOCK_SIZE - 1) &
> > - (0 - (total_len + SHA512_PADLENGTHFIELD_SIZE + 1)))
> > - + 1 + SHA512_PADLENGTHFIELD_SIZE;
> > -
> > -#if SHA512_PADLENGTHFIELD_SIZE == 16
> > - *((uint64_t *) &padblock[i - 16]) = 0;
> > -#endif
> > -
> > - *((uint64_t *) &padblock[i - 8]) = cpu_to_be64(total_len << 3);
> > -
> > - /* Number of extra blocks to hash */
> > - return i >> SHA512_LOG2_BLOCK_SIZE;
> > -}
> > -
> > -static struct sha512_hash_ctx *sha512_ctx_mgr_resubmit
> > - (struct sha512_ctx_mgr *mgr, struct sha512_hash_ctx *ctx)
> > -{
> > - while (ctx) {
> > - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> > - /* Clear PROCESSING bit */
> > - ctx->status = HASH_CTX_STS_COMPLETE;
> > - return ctx;
> > - }
> > -
> > - /*
> > - * If the extra blocks are empty, begin hashing what remains
> > - * in the user's buffer.
> > - */
> > - if (ctx->partial_block_buffer_length == 0 &&
> > - ctx->incoming_buffer_length) {
> > -
> > - const void *buffer = ctx->incoming_buffer;
> > - uint32_t len = ctx->incoming_buffer_length;
> > - uint32_t copy_len;
> > -
> > - /*
> > - * Only entire blocks can be hashed.
> > - * Copy remainder to extra blocks buffer.
> > - */
> > - copy_len = len & (SHA512_BLOCK_SIZE-1);
> > -
> > - if (copy_len) {
> > - len -= copy_len;
> > - memcpy(ctx->partial_block_buffer,
> > - ((const char *) buffer + len),
> > - copy_len);
> > - ctx->partial_block_buffer_length = copy_len;
> > - }
> > -
> > - ctx->incoming_buffer_length = 0;
> > -
> > - /* len should be a multiple of the block size now */
> > - assert((len % SHA512_BLOCK_SIZE) == 0);
> > -
> > - /* Set len to the number of blocks to be hashed */
> > - len >>= SHA512_LOG2_BLOCK_SIZE;
> > -
> > - if (len) {
> > -
> > - ctx->job.buffer = (uint8_t *) buffer;
> > - ctx->job.len = len;
> > - ctx = (struct sha512_hash_ctx *)
> > - sha512_job_mgr_submit(&mgr->mgr,
> > - &ctx->job);
> > - continue;
> > - }
> > - }
> > -
> > - /*
> > - * If the extra blocks are not empty, then we are
> > - * either on the last block(s) or we need more
> > - * user input before continuing.
> > - */
> > - if (ctx->status & HASH_CTX_STS_LAST) {
> > -
> > - uint8_t *buf = ctx->partial_block_buffer;
> > - uint32_t n_extra_blocks =
> > - sha512_pad(buf, ctx->total_length);
> > -
> > - ctx->status = (HASH_CTX_STS_PROCESSING |
> > - HASH_CTX_STS_COMPLETE);
> > - ctx->job.buffer = buf;
> > - ctx->job.len = (uint32_t) n_extra_blocks;
> > - ctx = (struct sha512_hash_ctx *)
> > - sha512_job_mgr_submit(&mgr->mgr, &ctx->job);
> > - continue;
> > - }
> > -
> > - if (ctx)
> > - ctx->status = HASH_CTX_STS_IDLE;
> > - return ctx;
> > - }
> > -
> > - return NULL;
> > -}
> > -
> > -static struct sha512_hash_ctx
> > - *sha512_ctx_mgr_get_comp_ctx(struct mcryptd_alg_cstate *cstate)
> > -{
> > - /*
> > - * If get_comp_job returns NULL, there are no jobs complete.
> > - * If get_comp_job returns a job, verify that it is safe to return to
> > - * the user.
> > - * If it is not ready, resubmit the job to finish processing.
> > - * If sha512_ctx_mgr_resubmit returned a job, it is ready to be
> > - * returned.
> > - * Otherwise, all jobs currently being managed by the hash_ctx_mgr
> > - * still need processing.
> > - */
> > - struct sha512_ctx_mgr *mgr;
> > - struct sha512_hash_ctx *ctx;
> > - unsigned long flags;
> > -
> > - mgr = cstate->mgr;
> > - spin_lock_irqsave(&cstate->work_lock, flags);
> > - ctx = (struct sha512_hash_ctx *)
> > - sha512_job_mgr_get_comp_job(&mgr->mgr);
> > - ctx = sha512_ctx_mgr_resubmit(mgr, ctx);
> > - spin_unlock_irqrestore(&cstate->work_lock, flags);
> > - return ctx;
> > -}
> > -
> > -static void sha512_ctx_mgr_init(struct sha512_ctx_mgr *mgr)
> > -{
> > - sha512_job_mgr_init(&mgr->mgr);
> > -}
> > -
> > -static struct sha512_hash_ctx
> > - *sha512_ctx_mgr_submit(struct mcryptd_alg_cstate *cstate,
> > - struct sha512_hash_ctx *ctx,
> > - const void *buffer,
> > - uint32_t len,
> > - int flags)
> > -{
> > - struct sha512_ctx_mgr *mgr;
> > - unsigned long irqflags;
> > -
> > - mgr = cstate->mgr;
> > - spin_lock_irqsave(&cstate->work_lock, irqflags);
> > - if (flags & ~(HASH_UPDATE | HASH_LAST)) {
> > - /* User should not pass anything other than UPDATE or LAST */
> > - ctx->error = HASH_CTX_ERROR_INVALID_FLAGS;
> > - goto unlock;
> > - }
> > -
> > - if (ctx->status & HASH_CTX_STS_PROCESSING) {
> > - /* Cannot submit to a currently processing job. */
> > - ctx->error = HASH_CTX_ERROR_ALREADY_PROCESSING;
> > - goto unlock;
> > - }
> > -
> > - if (ctx->status & HASH_CTX_STS_COMPLETE) {
> > - /* Cannot update a finished job. */
> > - ctx->error = HASH_CTX_ERROR_ALREADY_COMPLETED;
> > - goto unlock;
> > - }
> > -
> > - /*
> > - * If we made it here, there were no errors during this call to
> > - * submit
> > - */
> > - ctx->error = HASH_CTX_ERROR_NONE;
> > -
> > - /* Store buffer ptr info from user */
> > - ctx->incoming_buffer = buffer;
> > - ctx->incoming_buffer_length = len;
> > -
> > - /*
> > - * Store the user's request flags and mark this ctx as currently being
> > - * processed.
> > - */
> > - ctx->status = (flags & HASH_LAST) ?
> > - (HASH_CTX_STS_PROCESSING | HASH_CTX_STS_LAST) :
> > - HASH_CTX_STS_PROCESSING;
> > -
> > - /* Advance byte counter */
> > - ctx->total_length += len;
> > -
> > - /*
> > - * If there is anything currently buffered in the extra blocks,
> > - * append to it until it contains a whole block.
> > - * Or if the user's buffer contains less than a whole block,
> > - * append as much as possible to the extra block.
> > - */
> > - if (ctx->partial_block_buffer_length || len < SHA512_BLOCK_SIZE) {
> > - /* Compute how many bytes to copy from user buffer into extra
> > - * block
> > - */
> > - uint32_t copy_len = SHA512_BLOCK_SIZE -
> > - ctx->partial_block_buffer_length;
> > - if (len < copy_len)
> > - copy_len = len;
> > -
> > - if (copy_len) {
> > - /* Copy and update relevant pointers and counters */
> > - memcpy
> > - (&ctx->partial_block_buffer[ctx->partial_block_buffer_length],
> > - buffer, copy_len);
> > -
> > - ctx->partial_block_buffer_length += copy_len;
> > - ctx->incoming_buffer = (const void *)
> > - ((const char *)buffer + copy_len);
> > - ctx->incoming_buffer_length = len - copy_len;
> > - }
> > -
> > - /* The extra block should never contain more than 1 block
> > - * here
> > - */
> > - assert(ctx->partial_block_buffer_length <= SHA512_BLOCK_SIZE);
> > -
> > - /* If the extra block buffer contains exactly 1 block, it can
> > - * be hashed.
> > - */
> > - if (ctx->partial_block_buffer_length >= SHA512_BLOCK_SIZE) {
> > - ctx->partial_block_buffer_length = 0;
> > -
> > - ctx->job.buffer = ctx->partial_block_buffer;
> > - ctx->job.len = 1;
> > - ctx = (struct sha512_hash_ctx *)
> > - sha512_job_mgr_submit(&mgr->mgr, &ctx->job);
> > - }
> > - }
> > -
> > - ctx = sha512_ctx_mgr_resubmit(mgr, ctx);
> > -unlock:
> > - spin_unlock_irqrestore(&cstate->work_lock, irqflags);
> > - return ctx;
> > -}
> > -
> > -static struct sha512_hash_ctx *sha512_ctx_mgr_flush(struct mcryptd_alg_cstate *cstate)
> > -{
> > - struct sha512_ctx_mgr *mgr;
> > - struct sha512_hash_ctx *ctx;
> > - unsigned long flags;
> > -
> > - mgr = cstate->mgr;
> > - spin_lock_irqsave(&cstate->work_lock, flags);
> > - while (1) {
> > - ctx = (struct sha512_hash_ctx *)
> > - sha512_job_mgr_flush(&mgr->mgr);
> > -
> > - /* If flush returned 0, there are no more jobs in flight. */
> > - if (!ctx)
> > - break;
> > -
> > - /*
> > - * If flush returned a job, resubmit the job to finish
> > - * processing.
> > - */
> > - ctx = sha512_ctx_mgr_resubmit(mgr, ctx);
> > -
> > - /*
> > - * If sha512_ctx_mgr_resubmit returned a job, it is ready to
> > - * be returned. Otherwise, all jobs currently being managed by
> > - * the sha512_ctx_mgr still need processing. Loop.
> > - */
> > - if (ctx)
> > - break;
> > - }
> > - spin_unlock_irqrestore(&cstate->work_lock, flags);
> > - return ctx;
> > -}
> > -
> > -static int sha512_mb_init(struct ahash_request *areq)
> > -{
> > - struct sha512_hash_ctx *sctx = ahash_request_ctx(areq);
> > -
> > - hash_ctx_init(sctx);
> > - sctx->job.result_digest[0] = SHA512_H0;
> > - sctx->job.result_digest[1] = SHA512_H1;
> > - sctx->job.result_digest[2] = SHA512_H2;
> > - sctx->job.result_digest[3] = SHA512_H3;
> > - sctx->job.result_digest[4] = SHA512_H4;
> > - sctx->job.result_digest[5] = SHA512_H5;
> > - sctx->job.result_digest[6] = SHA512_H6;
> > - sctx->job.result_digest[7] = SHA512_H7;
> > - sctx->total_length = 0;
> > - sctx->partial_block_buffer_length = 0;
> > - sctx->status = HASH_CTX_STS_IDLE;
> > -
> > - return 0;
> > -}
> > -
> > -static int sha512_mb_set_results(struct mcryptd_hash_request_ctx *rctx)
> > -{
> > - int i;
> > - struct sha512_hash_ctx *sctx = ahash_request_ctx(&rctx->areq);
> > - __be64 *dst = (__be64 *) rctx->out;
> > -
> > - for (i = 0; i < 8; ++i)
> > - dst[i] = cpu_to_be64(sctx->job.result_digest[i]);
> > -
> > - return 0;
> > -}
> > -
> > -static int sha_finish_walk(struct mcryptd_hash_request_ctx **ret_rctx,
> > - struct mcryptd_alg_cstate *cstate, bool flush)
> > -{
> > - int flag = HASH_UPDATE;
> > - int nbytes, err = 0;
> > - struct mcryptd_hash_request_ctx *rctx = *ret_rctx;
> > - struct sha512_hash_ctx *sha_ctx;
> > -
> > - /* more work ? */
> > - while (!(rctx->flag & HASH_DONE)) {
> > - nbytes = crypto_ahash_walk_done(&rctx->walk, 0);
> > - if (nbytes < 0) {
> > - err = nbytes;
> > - goto out;
> > - }
> > - /* check if the walk is done */
> > - if (crypto_ahash_walk_last(&rctx->walk)) {
> > - rctx->flag |= HASH_DONE;
> > - if (rctx->flag & HASH_FINAL)
> > - flag |= HASH_LAST;
> > -
> > - }
> > - sha_ctx = (struct sha512_hash_ctx *)
> > - ahash_request_ctx(&rctx->areq);
> > - kernel_fpu_begin();
> > - sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx,
> > - rctx->walk.data, nbytes, flag);
> > - if (!sha_ctx) {
> > - if (flush)
> > - sha_ctx = sha512_ctx_mgr_flush(cstate);
> > - }
> > - kernel_fpu_end();
> > - if (sha_ctx)
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - else {
> > - rctx = NULL;
> > - goto out;
> > - }
> > - }
> > -
> > - /* copy the results */
> > - if (rctx->flag & HASH_FINAL)
> > - sha512_mb_set_results(rctx);
> > -
> > -out:
> > - *ret_rctx = rctx;
> > - return err;
> > -}
> > -
> > -static int sha_complete_job(struct mcryptd_hash_request_ctx *rctx,
> > - struct mcryptd_alg_cstate *cstate,
> > - int err)
> > -{
> > - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> > - struct sha512_hash_ctx *sha_ctx;
> > - struct mcryptd_hash_request_ctx *req_ctx;
> > - int ret;
> > - unsigned long flags;
> > -
> > - /* remove from work list */
> > - spin_lock_irqsave(&cstate->work_lock, flags);
> > - list_del(&rctx->waiter);
> > - spin_unlock_irqrestore(&cstate->work_lock, flags);
> > -
> > - if (irqs_disabled())
> > - rctx->complete(&req->base, err);
> > - else {
> > - local_bh_disable();
> > - rctx->complete(&req->base, err);
> > - local_bh_enable();
> > - }
> > -
> > - /* check to see if there are other jobs that are done */
> > - sha_ctx = sha512_ctx_mgr_get_comp_ctx(cstate);
> > - while (sha_ctx) {
> > - req_ctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&req_ctx, cstate, false);
> > - if (req_ctx) {
> > - spin_lock_irqsave(&cstate->work_lock, flags);
> > - list_del(&req_ctx->waiter);
> > - spin_unlock_irqrestore(&cstate->work_lock, flags);
> > -
> > - req = cast_mcryptd_ctx_to_req(req_ctx);
> > - if (irqs_disabled())
> > - req_ctx->complete(&req->base, ret);
> > - else {
> > - local_bh_disable();
> > - req_ctx->complete(&req->base, ret);
> > - local_bh_enable();
> > - }
> > - }
> > - sha_ctx = sha512_ctx_mgr_get_comp_ctx(cstate);
> > - }
> > -
> > - return 0;
> > -}
> > -
> > -static void sha512_mb_add_list(struct mcryptd_hash_request_ctx *rctx,
> > - struct mcryptd_alg_cstate *cstate)
> > -{
> > - unsigned long next_flush;
> > - unsigned long delay = usecs_to_jiffies(FLUSH_INTERVAL);
> > - unsigned long flags;
> > -
> > - /* initialize tag */
> > - rctx->tag.arrival = jiffies; /* tag the arrival time */
> > - rctx->tag.seq_num = cstate->next_seq_num++;
> > - next_flush = rctx->tag.arrival + delay;
> > - rctx->tag.expire = next_flush;
> > -
> > - spin_lock_irqsave(&cstate->work_lock, flags);
> > - list_add_tail(&rctx->waiter, &cstate->work_list);
> > - spin_unlock_irqrestore(&cstate->work_lock, flags);
> > -
> > - mcryptd_arm_flusher(cstate, delay);
> > -}
> > -
> > -static int sha512_mb_update(struct ahash_request *areq)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx =
> > - container_of(areq, struct mcryptd_hash_request_ctx,
> > - areq);
> > - struct mcryptd_alg_cstate *cstate =
> > - this_cpu_ptr(sha512_mb_alg_state.alg_cstate);
> > -
> > - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> > - struct sha512_hash_ctx *sha_ctx;
> > - int ret = 0, nbytes;
> > -
> > -
> > - /* sanity check */
> > - if (rctx->tag.cpu != smp_processor_id()) {
> > - pr_err("mcryptd error: cpu clash\n");
> > - goto done;
> > - }
> > -
> > - /* need to init context */
> > - req_ctx_init(rctx, areq);
> > -
> > - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> > -
> > - if (nbytes < 0) {
> > - ret = nbytes;
> > - goto done;
> > - }
> > -
> > - if (crypto_ahash_walk_last(&rctx->walk))
> > - rctx->flag |= HASH_DONE;
> > -
> > - /* submit */
> > - sha_ctx = (struct sha512_hash_ctx *) ahash_request_ctx(areq);
> > - sha512_mb_add_list(rctx, cstate);
> > - kernel_fpu_begin();
> > - sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx, rctx->walk.data,
> > - nbytes, HASH_UPDATE);
> > - kernel_fpu_end();
> > -
> > - /* check if anything is returned */
> > - if (!sha_ctx)
> > - return -EINPROGRESS;
> > -
> > - if (sha_ctx->error) {
> > - ret = sha_ctx->error;
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - goto done;
> > - }
> > -
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&rctx, cstate, false);
> > -
> > - if (!rctx)
> > - return -EINPROGRESS;
> > -done:
> > - sha_complete_job(rctx, cstate, ret);
> > - return ret;
> > -}
> > -
> > -static int sha512_mb_finup(struct ahash_request *areq)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx =
> > - container_of(areq, struct mcryptd_hash_request_ctx,
> > - areq);
> > - struct mcryptd_alg_cstate *cstate =
> > - this_cpu_ptr(sha512_mb_alg_state.alg_cstate);
> > -
> > - struct ahash_request *req = cast_mcryptd_ctx_to_req(rctx);
> > - struct sha512_hash_ctx *sha_ctx;
> > - int ret = 0, flag = HASH_UPDATE, nbytes;
> > -
> > - /* sanity check */
> > - if (rctx->tag.cpu != smp_processor_id()) {
> > - pr_err("mcryptd error: cpu clash\n");
> > - goto done;
> > - }
> > -
> > - /* need to init context */
> > - req_ctx_init(rctx, areq);
> > -
> > - nbytes = crypto_ahash_walk_first(req, &rctx->walk);
> > -
> > - if (nbytes < 0) {
> > - ret = nbytes;
> > - goto done;
> > - }
> > -
> > - if (crypto_ahash_walk_last(&rctx->walk)) {
> > - rctx->flag |= HASH_DONE;
> > - flag = HASH_LAST;
> > - }
> > -
> > - /* submit */
> > - rctx->flag |= HASH_FINAL;
> > - sha_ctx = (struct sha512_hash_ctx *) ahash_request_ctx(areq);
> > - sha512_mb_add_list(rctx, cstate);
> > -
> > - kernel_fpu_begin();
> > - sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx, rctx->walk.data,
> > - nbytes, flag);
> > - kernel_fpu_end();
> > -
> > - /* check if anything is returned */
> > - if (!sha_ctx)
> > - return -EINPROGRESS;
> > -
> > - if (sha_ctx->error) {
> > - ret = sha_ctx->error;
> > - goto done;
> > - }
> > -
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&rctx, cstate, false);
> > - if (!rctx)
> > - return -EINPROGRESS;
> > -done:
> > - sha_complete_job(rctx, cstate, ret);
> > - return ret;
> > -}
> > -
> > -static int sha512_mb_final(struct ahash_request *areq)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx =
> > - container_of(areq, struct mcryptd_hash_request_ctx,
> > - areq);
> > - struct mcryptd_alg_cstate *cstate =
> > - this_cpu_ptr(sha512_mb_alg_state.alg_cstate);
> > -
> > - struct sha512_hash_ctx *sha_ctx;
> > - int ret = 0;
> > - u8 data;
> > -
> > - /* sanity check */
> > - if (rctx->tag.cpu != smp_processor_id()) {
> > - pr_err("mcryptd error: cpu clash\n");
> > - goto done;
> > - }
> > -
> > - /* need to init context */
> > - req_ctx_init(rctx, areq);
> > -
> > - rctx->flag |= HASH_DONE | HASH_FINAL;
> > -
> > - sha_ctx = (struct sha512_hash_ctx *) ahash_request_ctx(areq);
> > - /* flag HASH_FINAL and 0 data size */
> > - sha512_mb_add_list(rctx, cstate);
> > - kernel_fpu_begin();
> > - sha_ctx = sha512_ctx_mgr_submit(cstate, sha_ctx, &data, 0, HASH_LAST);
> > - kernel_fpu_end();
> > -
> > - /* check if anything is returned */
> > - if (!sha_ctx)
> > - return -EINPROGRESS;
> > -
> > - if (sha_ctx->error) {
> > - ret = sha_ctx->error;
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - goto done;
> > - }
> > -
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - ret = sha_finish_walk(&rctx, cstate, false);
> > - if (!rctx)
> > - return -EINPROGRESS;
> > -done:
> > - sha_complete_job(rctx, cstate, ret);
> > - return ret;
> > -}
> > -
> > -static int sha512_mb_export(struct ahash_request *areq, void *out)
> > -{
> > - struct sha512_hash_ctx *sctx = ahash_request_ctx(areq);
> > -
> > - memcpy(out, sctx, sizeof(*sctx));
> > -
> > - return 0;
> > -}
> > -
> > -static int sha512_mb_import(struct ahash_request *areq, const void *in)
> > -{
> > - struct sha512_hash_ctx *sctx = ahash_request_ctx(areq);
> > -
> > - memcpy(sctx, in, sizeof(*sctx));
> > -
> > - return 0;
> > -}
> > -
> > -static int sha512_mb_async_init_tfm(struct crypto_tfm *tfm)
> > -{
> > - struct mcryptd_ahash *mcryptd_tfm;
> > - struct sha512_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> > - struct mcryptd_hash_ctx *mctx;
> > -
> > - mcryptd_tfm = mcryptd_alloc_ahash("__intel_sha512-mb",
> > - CRYPTO_ALG_INTERNAL,
> > - CRYPTO_ALG_INTERNAL);
> > - if (IS_ERR(mcryptd_tfm))
> > - return PTR_ERR(mcryptd_tfm);
> > - mctx = crypto_ahash_ctx(&mcryptd_tfm->base);
> > - mctx->alg_state = &sha512_mb_alg_state;
> > - ctx->mcryptd_tfm = mcryptd_tfm;
> > - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> > - sizeof(struct ahash_request) +
> > - crypto_ahash_reqsize(&mcryptd_tfm->base));
> > -
> > - return 0;
> > -}
> > -
> > -static void sha512_mb_async_exit_tfm(struct crypto_tfm *tfm)
> > -{
> > - struct sha512_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> > -
> > - mcryptd_free_ahash(ctx->mcryptd_tfm);
> > -}
> > -
> > -static int sha512_mb_areq_init_tfm(struct crypto_tfm *tfm)
> > -{
> > - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> > - sizeof(struct ahash_request) +
> > - sizeof(struct sha512_hash_ctx));
> > -
> > - return 0;
> > -}
> > -
> > -static void sha512_mb_areq_exit_tfm(struct crypto_tfm *tfm)
> > -{
> > - struct sha512_mb_ctx *ctx = crypto_tfm_ctx(tfm);
> > -
> > - mcryptd_free_ahash(ctx->mcryptd_tfm);
> > -}
> > -
> > -static struct ahash_alg sha512_mb_areq_alg = {
> > - .init = sha512_mb_init,
> > - .update = sha512_mb_update,
> > - .final = sha512_mb_final,
> > - .finup = sha512_mb_finup,
> > - .export = sha512_mb_export,
> > - .import = sha512_mb_import,
> > - .halg = {
> > - .digestsize = SHA512_DIGEST_SIZE,
> > - .statesize = sizeof(struct sha512_hash_ctx),
> > - .base = {
> > - .cra_name = "__sha512-mb",
> > - .cra_driver_name = "__intel_sha512-mb",
> > - .cra_priority = 100,
> > - /*
> > - * use ASYNC flag as some buffers in multi-buffer
> > - * algo may not have completed before hashing thread
> > - * sleep
> > - */
> > - .cra_flags = CRYPTO_ALG_ASYNC |
> > - CRYPTO_ALG_INTERNAL,
> > - .cra_blocksize = SHA512_BLOCK_SIZE,
> > - .cra_module = THIS_MODULE,
> > - .cra_list = LIST_HEAD_INIT
> > - (sha512_mb_areq_alg.halg.base.cra_list),
> > - .cra_init = sha512_mb_areq_init_tfm,
> > - .cra_exit = sha512_mb_areq_exit_tfm,
> > - .cra_ctxsize = sizeof(struct sha512_hash_ctx),
> > - }
> > - }
> > -};
> > -
> > -static int sha512_mb_async_init(struct ahash_request *req)
> > -{
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_init(mcryptd_req);
> > -}
> > -
> > -static int sha512_mb_async_update(struct ahash_request *req)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > -
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_update(mcryptd_req);
> > -}
> > -
> > -static int sha512_mb_async_finup(struct ahash_request *req)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > -
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_finup(mcryptd_req);
> > -}
> > -
> > -static int sha512_mb_async_final(struct ahash_request *req)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > -
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_final(mcryptd_req);
> > -}
> > -
> > -static int sha512_mb_async_digest(struct ahash_request *req)
> > -{
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_digest(mcryptd_req);
> > -}
> > -
> > -static int sha512_mb_async_export(struct ahash_request *req, void *out)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - return crypto_ahash_export(mcryptd_req, out);
> > -}
> > -
> > -static int sha512_mb_async_import(struct ahash_request *req, const void *in)
> > -{
> > - struct ahash_request *mcryptd_req = ahash_request_ctx(req);
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct sha512_mb_ctx *ctx = crypto_ahash_ctx(tfm);
> > - struct mcryptd_ahash *mcryptd_tfm = ctx->mcryptd_tfm;
> > - struct crypto_ahash *child = mcryptd_ahash_child(mcryptd_tfm);
> > - struct mcryptd_hash_request_ctx *rctx;
> > - struct ahash_request *areq;
> > -
> > - memcpy(mcryptd_req, req, sizeof(*req));
> > - ahash_request_set_tfm(mcryptd_req, &mcryptd_tfm->base);
> > - rctx = ahash_request_ctx(mcryptd_req);
> > -
> > - areq = &rctx->areq;
> > -
> > - ahash_request_set_tfm(areq, child);
> > - ahash_request_set_callback(areq, CRYPTO_TFM_REQ_MAY_SLEEP,
> > - rctx->complete, req);
> > -
> > - return crypto_ahash_import(mcryptd_req, in);
> > -}
> > -
> > -static struct ahash_alg sha512_mb_async_alg = {
> > - .init = sha512_mb_async_init,
> > - .update = sha512_mb_async_update,
> > - .final = sha512_mb_async_final,
> > - .finup = sha512_mb_async_finup,
> > - .digest = sha512_mb_async_digest,
> > - .export = sha512_mb_async_export,
> > - .import = sha512_mb_async_import,
> > - .halg = {
> > - .digestsize = SHA512_DIGEST_SIZE,
> > - .statesize = sizeof(struct sha512_hash_ctx),
> > - .base = {
> > - .cra_name = "sha512",
> > - .cra_driver_name = "sha512_mb",
> > - /*
> > - * Low priority, since with few concurrent hash requests
> > - * this is extremely slow due to the flush delay. Users
> > - * whose workloads would benefit from this can request
> > - * it explicitly by driver name, or can increase its
> > - * priority at runtime using NETLINK_CRYPTO.
> > - */
> > - .cra_priority = 50,
> > - .cra_flags = CRYPTO_ALG_ASYNC,
> > - .cra_blocksize = SHA512_BLOCK_SIZE,
> > - .cra_module = THIS_MODULE,
> > - .cra_list = LIST_HEAD_INIT
> > - (sha512_mb_async_alg.halg.base.cra_list),
> > - .cra_init = sha512_mb_async_init_tfm,
> > - .cra_exit = sha512_mb_async_exit_tfm,
> > - .cra_ctxsize = sizeof(struct sha512_mb_ctx),
> > - .cra_alignmask = 0,
> > - },
> > - },
> > -};
> > -
> > -static unsigned long sha512_mb_flusher(struct mcryptd_alg_cstate *cstate)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx;
> > - unsigned long cur_time;
> > - unsigned long next_flush = 0;
> > - struct sha512_hash_ctx *sha_ctx;
> > -
> > -
> > - cur_time = jiffies;
> > -
> > - while (!list_empty(&cstate->work_list)) {
> > - rctx = list_entry(cstate->work_list.next,
> > - struct mcryptd_hash_request_ctx, waiter);
> > - if time_before(cur_time, rctx->tag.expire)
> > - break;
> > - kernel_fpu_begin();
> > - sha_ctx = (struct sha512_hash_ctx *)
> > - sha512_ctx_mgr_flush(cstate);
> > - kernel_fpu_end();
> > - if (!sha_ctx) {
> > - pr_err("sha512_mb error: nothing got flushed for"
> > - " non-empty list\n");
> > - break;
> > - }
> > - rctx = cast_hash_to_mcryptd_ctx(sha_ctx);
> > - sha_finish_walk(&rctx, cstate, true);
> > - sha_complete_job(rctx, cstate, 0);
> > - }
> > -
> > - if (!list_empty(&cstate->work_list)) {
> > - rctx = list_entry(cstate->work_list.next,
> > - struct mcryptd_hash_request_ctx, waiter);
> > - /* get the hash context and then flush time */
> > - next_flush = rctx->tag.expire;
> > - mcryptd_arm_flusher(cstate, get_delay(next_flush));
> > - }
> > - return next_flush;
> > -}
> > -
> > -static int __init sha512_mb_mod_init(void)
> > -{
> > -
> > - int cpu;
> > - int err;
> > - struct mcryptd_alg_cstate *cpu_state;
> > -
> > - /* check for dependent cpu features */
> > - if (!boot_cpu_has(X86_FEATURE_AVX2) ||
> > - !boot_cpu_has(X86_FEATURE_BMI2))
> > - return -ENODEV;
> > -
> > - /* initialize multibuffer structures */
> > - sha512_mb_alg_state.alg_cstate =
> > - alloc_percpu(struct mcryptd_alg_cstate);
> > -
> > - sha512_job_mgr_init = sha512_mb_mgr_init_avx2;
> > - sha512_job_mgr_submit = sha512_mb_mgr_submit_avx2;
> > - sha512_job_mgr_flush = sha512_mb_mgr_flush_avx2;
> > - sha512_job_mgr_get_comp_job = sha512_mb_mgr_get_comp_job_avx2;
> > -
> > - if (!sha512_mb_alg_state.alg_cstate)
> > - return -ENOMEM;
> > - for_each_possible_cpu(cpu) {
> > - cpu_state = per_cpu_ptr(sha512_mb_alg_state.alg_cstate, cpu);
> > - cpu_state->next_flush = 0;
> > - cpu_state->next_seq_num = 0;
> > - cpu_state->flusher_engaged = false;
> > - INIT_DELAYED_WORK(&cpu_state->flush, mcryptd_flusher);
> > - cpu_state->cpu = cpu;
> > - cpu_state->alg_state = &sha512_mb_alg_state;
> > - cpu_state->mgr = kzalloc(sizeof(struct sha512_ctx_mgr),
> > - GFP_KERNEL);
> > - if (!cpu_state->mgr)
> > - goto err2;
> > - sha512_ctx_mgr_init(cpu_state->mgr);
> > - INIT_LIST_HEAD(&cpu_state->work_list);
> > - spin_lock_init(&cpu_state->work_lock);
> > - }
> > - sha512_mb_alg_state.flusher = &sha512_mb_flusher;
> > -
> > - err = crypto_register_ahash(&sha512_mb_areq_alg);
> > - if (err)
> > - goto err2;
> > - err = crypto_register_ahash(&sha512_mb_async_alg);
> > - if (err)
> > - goto err1;
> > -
> > -
> > - return 0;
> > -err1:
> > - crypto_unregister_ahash(&sha512_mb_areq_alg);
> > -err2:
> > - for_each_possible_cpu(cpu) {
> > - cpu_state = per_cpu_ptr(sha512_mb_alg_state.alg_cstate, cpu);
> > - kfree(cpu_state->mgr);
> > - }
> > - free_percpu(sha512_mb_alg_state.alg_cstate);
> > - return -ENODEV;
> > -}
> > -
> > -static void __exit sha512_mb_mod_fini(void)
> > -{
> > - int cpu;
> > - struct mcryptd_alg_cstate *cpu_state;
> > -
> > - crypto_unregister_ahash(&sha512_mb_async_alg);
> > - crypto_unregister_ahash(&sha512_mb_areq_alg);
> > - for_each_possible_cpu(cpu) {
> > - cpu_state = per_cpu_ptr(sha512_mb_alg_state.alg_cstate, cpu);
> > - kfree(cpu_state->mgr);
> > - }
> > - free_percpu(sha512_mb_alg_state.alg_cstate);
> > -}
> > -
> > -module_init(sha512_mb_mod_init);
> > -module_exit(sha512_mb_mod_fini);
> > -
> > -MODULE_LICENSE("GPL");
> > -MODULE_DESCRIPTION("SHA512 Secure Hash Algorithm, multi buffer accelerated");
> > -
> > -MODULE_ALIAS("sha512");
> > diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_ctx.h b/arch/x86/crypto/sha512-mb/sha512_mb_ctx.h
> > deleted file mode 100644
> > index e5c465bd821e..000000000000
> > --- a/arch/x86/crypto/sha512-mb/sha512_mb_ctx.h
> > +++ /dev/null
> > @@ -1,128 +0,0 @@
> > -/*
> > - * Header file for multi buffer SHA512 context
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#ifndef _SHA_MB_CTX_INTERNAL_H
> > -#define _SHA_MB_CTX_INTERNAL_H
> > -
> > -#include "sha512_mb_mgr.h"
> > -
> > -#define HASH_UPDATE 0x00
> > -#define HASH_LAST 0x01
> > -#define HASH_DONE 0x02
> > -#define HASH_FINAL 0x04
> > -
> > -#define HASH_CTX_STS_IDLE 0x00
> > -#define HASH_CTX_STS_PROCESSING 0x01
> > -#define HASH_CTX_STS_LAST 0x02
> > -#define HASH_CTX_STS_COMPLETE 0x04
> > -
> > -enum hash_ctx_error {
> > - HASH_CTX_ERROR_NONE = 0,
> > - HASH_CTX_ERROR_INVALID_FLAGS = -1,
> > - HASH_CTX_ERROR_ALREADY_PROCESSING = -2,
> > - HASH_CTX_ERROR_ALREADY_COMPLETED = -3,
> > -};
> > -
> > -#define hash_ctx_user_data(ctx) ((ctx)->user_data)
> > -#define hash_ctx_digest(ctx) ((ctx)->job.result_digest)
> > -#define hash_ctx_processing(ctx) ((ctx)->status & HASH_CTX_STS_PROCESSING)
> > -#define hash_ctx_complete(ctx) ((ctx)->status == HASH_CTX_STS_COMPLETE)
> > -#define hash_ctx_status(ctx) ((ctx)->status)
> > -#define hash_ctx_error(ctx) ((ctx)->error)
> > -#define hash_ctx_init(ctx) \
> > - do { \
> > - (ctx)->error = HASH_CTX_ERROR_NONE; \
> > - (ctx)->status = HASH_CTX_STS_COMPLETE; \
> > - } while (0)
> > -
> > -/* Hash Constants and Typedefs */
> > -#define SHA512_DIGEST_LENGTH 8
> > -#define SHA512_LOG2_BLOCK_SIZE 7
> > -
> > -#define SHA512_PADLENGTHFIELD_SIZE 16
> > -
> > -#ifdef SHA_MB_DEBUG
> > -#define assert(expr) \
> > -do { \
> > - if (unlikely(!(expr))) { \
> > - printk(KERN_ERR "Assertion failed! %s,%s,%s,line=%d\n", \
> > - #expr, __FILE__, __func__, __LINE__); \
> > - } \
> > -} while (0)
> > -#else
> > -#define assert(expr) do {} while (0)
> > -#endif
> > -
> > -struct sha512_ctx_mgr {
> > - struct sha512_mb_mgr mgr;
> > -};
> > -
> > -/* typedef struct sha512_ctx_mgr sha512_ctx_mgr; */
> > -
> > -struct sha512_hash_ctx {
> > - /* Must be at struct offset 0 */
> > - struct job_sha512 job;
> > - /* status flag */
> > - int status;
> > - /* error flag */
> > - int error;
> > -
> > - uint64_t total_length;
> > - const void *incoming_buffer;
> > - uint32_t incoming_buffer_length;
> > - uint8_t partial_block_buffer[SHA512_BLOCK_SIZE * 2];
> > - uint32_t partial_block_buffer_length;
> > - void *user_data;
> > -};
> > -
> > -#endif
> > diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr.h b/arch/x86/crypto/sha512-mb/sha512_mb_mgr.h
> > deleted file mode 100644
> > index 178f17eef382..000000000000
> > --- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr.h
> > +++ /dev/null
> > @@ -1,104 +0,0 @@
> > -/*
> > - * Header file for multi buffer SHA512 algorithm manager
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#ifndef __SHA_MB_MGR_H
> > -#define __SHA_MB_MGR_H
> > -
> > -#include <linux/types.h>
> > -
> > -#define NUM_SHA512_DIGEST_WORDS 8
> > -
> > -enum job_sts {STS_UNKNOWN = 0,
> > - STS_BEING_PROCESSED = 1,
> > - STS_COMPLETED = 2,
> > - STS_INTERNAL_ERROR = 3,
> > - STS_ERROR = 4
> > -};
> > -
> > -struct job_sha512 {
> > - u8 *buffer;
> > - u64 len;
> > - u64 result_digest[NUM_SHA512_DIGEST_WORDS] __aligned(32);
> > - enum job_sts status;
> > - void *user_data;
> > -};
> > -
> > -struct sha512_args_x4 {
> > - uint64_t digest[8][4];
> > - uint8_t *data_ptr[4];
> > -};
> > -
> > -struct sha512_lane_data {
> > - struct job_sha512 *job_in_lane;
> > -};
> > -
> > -struct sha512_mb_mgr {
> > - struct sha512_args_x4 args;
> > -
> > - uint64_t lens[4];
> > -
> > - /* each byte is index (0...7) of unused lanes */
> > - uint64_t unused_lanes;
> > - /* byte 4 is set to FF as a flag */
> > - struct sha512_lane_data ldata[4];
> > -};
> > -
> > -#define SHA512_MB_MGR_NUM_LANES_AVX2 4
> > -
> > -void sha512_mb_mgr_init_avx2(struct sha512_mb_mgr *state);
> > -struct job_sha512 *sha512_mb_mgr_submit_avx2(struct sha512_mb_mgr *state,
> > - struct job_sha512 *job);
> > -struct job_sha512 *sha512_mb_mgr_flush_avx2(struct sha512_mb_mgr *state);
> > -struct job_sha512 *sha512_mb_mgr_get_comp_job_avx2(struct sha512_mb_mgr *state);
> > -
> > -#endif
> > diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S
> > deleted file mode 100644
> > index cf2636d4c9ba..000000000000
> > --- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S
> > +++ /dev/null
> > @@ -1,281 +0,0 @@
> > -/*
> > - * Header file for multi buffer SHA256 algorithm data structure
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -# Macros for defining data structures
> > -
> > -# Usage example
> > -
> > -#START_FIELDS # JOB_AES
> > -### name size align
> > -#FIELD _plaintext, 8, 8 # pointer to plaintext
> > -#FIELD _ciphertext, 8, 8 # pointer to ciphertext
> > -#FIELD _IV, 16, 8 # IV
> > -#FIELD _keys, 8, 8 # pointer to keys
> > -#FIELD _len, 4, 4 # length in bytes
> > -#FIELD _status, 4, 4 # status enumeration
> > -#FIELD _user_data, 8, 8 # pointer to user data
> > -#UNION _union, size1, align1, \
> > -# size2, align2, \
> > -# size3, align3, \
> > -# ...
> > -#END_FIELDS
> > -#%assign _JOB_AES_size _FIELD_OFFSET
> > -#%assign _JOB_AES_align _STRUCT_ALIGN
> > -
> > -#########################################################################
> > -
> > -# Alternate "struc-like" syntax:
> > -# STRUCT job_aes2
> > -# RES_Q .plaintext, 1
> > -# RES_Q .ciphertext, 1
> > -# RES_DQ .IV, 1
> > -# RES_B .nested, _JOB_AES_SIZE, _JOB_AES_ALIGN
> > -# RES_U .union, size1, align1, \
> > -# size2, align2, \
> > -# ...
> > -# ENDSTRUCT
> > -# # Following only needed if nesting
> > -# %assign job_aes2_size _FIELD_OFFSET
> > -# %assign job_aes2_align _STRUCT_ALIGN
> > -#
> > -# RES_* macros take a name, a count and an optional alignment.
> > -# The count in in terms of the base size of the macro, and the
> > -# default alignment is the base size.
> > -# The macros are:
> > -# Macro Base size
> > -# RES_B 1
> > -# RES_W 2
> > -# RES_D 4
> > -# RES_Q 8
> > -# RES_DQ 16
> > -# RES_Y 32
> > -# RES_Z 64
> > -#
> > -# RES_U defines a union. It's arguments are a name and two or more
> > -# pairs of "size, alignment"
> > -#
> > -# The two assigns are only needed if this structure is being nested
> > -# within another. Even if the assigns are not done, one can still use
> > -# STRUCT_NAME_size as the size of the structure.
> > -#
> > -# Note that for nesting, you still need to assign to STRUCT_NAME_size.
> > -#
> > -# The differences between this and using "struc" directly are that each
> > -# type is implicitly aligned to its natural length (although this can be
> > -# over-ridden with an explicit third parameter), and that the structure
> > -# is padded at the end to its overall alignment.
> > -#
> > -
> > -#########################################################################
> > -
> > -#ifndef _DATASTRUCT_ASM_
> > -#define _DATASTRUCT_ASM_
> > -
> > -#define PTR_SZ 8
> > -#define SHA512_DIGEST_WORD_SIZE 8
> > -#define SHA512_MB_MGR_NUM_LANES_AVX2 4
> > -#define NUM_SHA512_DIGEST_WORDS 8
> > -#define SZ4 4*SHA512_DIGEST_WORD_SIZE
> > -#define ROUNDS 80*SZ4
> > -#define SHA512_DIGEST_ROW_SIZE (SHA512_MB_MGR_NUM_LANES_AVX2 * 8)
> > -
> > -# START_FIELDS
> > -.macro START_FIELDS
> > - _FIELD_OFFSET = 0
> > - _STRUCT_ALIGN = 0
> > -.endm
> > -
> > -# FIELD name size align
> > -.macro FIELD name size align
> > - _FIELD_OFFSET = (_FIELD_OFFSET + (\align) - 1) & (~ ((\align)-1))
> > - \name = _FIELD_OFFSET
> > - _FIELD_OFFSET = _FIELD_OFFSET + (\size)
> > -.if (\align > _STRUCT_ALIGN)
> > - _STRUCT_ALIGN = \align
> > -.endif
> > -.endm
> > -
> > -# END_FIELDS
> > -.macro END_FIELDS
> > - _FIELD_OFFSET = (_FIELD_OFFSET + _STRUCT_ALIGN-1) & (~ (_STRUCT_ALIGN-1))
> > -.endm
> > -
> > -.macro STRUCT p1
> > -START_FIELDS
> > -.struc \p1
> > -.endm
> > -
> > -.macro ENDSTRUCT
> > - tmp = _FIELD_OFFSET
> > - END_FIELDS
> > - tmp = (_FIELD_OFFSET - ##tmp)
> > -.if (tmp > 0)
> > - .lcomm tmp
> > -.endm
> > -
> > -## RES_int name size align
> > -.macro RES_int p1 p2 p3
> > - name = \p1
> > - size = \p2
> > - align = .\p3
> > -
> > - _FIELD_OFFSET = (_FIELD_OFFSET + (align) - 1) & (~ ((align)-1))
> > -.align align
> > -.lcomm name size
> > - _FIELD_OFFSET = _FIELD_OFFSET + (size)
> > -.if (align > _STRUCT_ALIGN)
> > - _STRUCT_ALIGN = align
> > -.endif
> > -.endm
> > -
> > -# macro RES_B name, size [, align]
> > -.macro RES_B _name, _size, _align=1
> > -RES_int _name _size _align
> > -.endm
> > -
> > -# macro RES_W name, size [, align]
> > -.macro RES_W _name, _size, _align=2
> > -RES_int _name 2*(_size) _align
> > -.endm
> > -
> > -# macro RES_D name, size [, align]
> > -.macro RES_D _name, _size, _align=4
> > -RES_int _name 4*(_size) _align
> > -.endm
> > -
> > -# macro RES_Q name, size [, align]
> > -.macro RES_Q _name, _size, _align=8
> > -RES_int _name 8*(_size) _align
> > -.endm
> > -
> > -# macro RES_DQ name, size [, align]
> > -.macro RES_DQ _name, _size, _align=16
> > -RES_int _name 16*(_size) _align
> > -.endm
> > -
> > -# macro RES_Y name, size [, align]
> > -.macro RES_Y _name, _size, _align=32
> > -RES_int _name 32*(_size) _align
> > -.endm
> > -
> > -# macro RES_Z name, size [, align]
> > -.macro RES_Z _name, _size, _align=64
> > -RES_int _name 64*(_size) _align
> > -.endm
> > -
> > -#endif
> > -
> > -###################################################################
> > -### Define SHA512 Out Of Order Data Structures
> > -###################################################################
> > -
> > -START_FIELDS # LANE_DATA
> > -### name size align
> > -FIELD _job_in_lane, 8, 8 # pointer to job object
> > -END_FIELDS
> > -
> > - _LANE_DATA_size = _FIELD_OFFSET
> > - _LANE_DATA_align = _STRUCT_ALIGN
> > -
> > -####################################################################
> > -
> > -START_FIELDS # SHA512_ARGS_X4
> > -### name size align
> > -FIELD _digest, 8*8*4, 4 # transposed digest
> > -FIELD _data_ptr, 8*4, 8 # array of pointers to data
> > -END_FIELDS
> > -
> > - _SHA512_ARGS_X4_size = _FIELD_OFFSET
> > - _SHA512_ARGS_X4_align = _STRUCT_ALIGN
> > -
> > -#####################################################################
> > -
> > -START_FIELDS # MB_MGR
> > -### name size align
> > -FIELD _args, _SHA512_ARGS_X4_size, _SHA512_ARGS_X4_align
> > -FIELD _lens, 8*4, 8
> > -FIELD _unused_lanes, 8, 8
> > -FIELD _ldata, _LANE_DATA_size*4, _LANE_DATA_align
> > -END_FIELDS
> > -
> > - _MB_MGR_size = _FIELD_OFFSET
> > - _MB_MGR_align = _STRUCT_ALIGN
> > -
> > -_args_digest = _args + _digest
> > -_args_data_ptr = _args + _data_ptr
> > -
> > -#######################################################################
> > -
> > -#######################################################################
> > -#### Define constants
> > -#######################################################################
> > -
> > -#define STS_UNKNOWN 0
> > -#define STS_BEING_PROCESSED 1
> > -#define STS_COMPLETED 2
> > -
> > -#######################################################################
> > -#### Define JOB_SHA512 structure
> > -#######################################################################
> > -
> > -START_FIELDS # JOB_SHA512
> > -### name size align
> > -FIELD _buffer, 8, 8 # pointer to buffer
> > -FIELD _len, 8, 8 # length in bytes
> > -FIELD _result_digest, 8*8, 32 # Digest (output)
> > -FIELD _status, 4, 4
> > -FIELD _user_data, 8, 8
> > -END_FIELDS
> > -
> > - _JOB_SHA512_size = _FIELD_OFFSET
> > - _JOB_SHA512_align = _STRUCT_ALIGN
> > diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S
> > deleted file mode 100644
> > index 7c629caebc05..000000000000
> > --- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S
> > +++ /dev/null
> > @@ -1,297 +0,0 @@
> > -/*
> > - * Flush routine for SHA512 multibuffer
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#include <linux/linkage.h>
> > -#include <asm/frame.h>
> > -#include "sha512_mb_mgr_datastruct.S"
> > -
> > -.extern sha512_x4_avx2
> > -
> > -# LINUX register definitions
> > -#define arg1 %rdi
> > -#define arg2 %rsi
> > -
> > -# idx needs to be other than arg1, arg2, rbx, r12
> > -#define idx %rdx
> > -
> > -# Common definitions
> > -#define state arg1
> > -#define job arg2
> > -#define len2 arg2
> > -
> > -#define unused_lanes %rbx
> > -#define lane_data %rbx
> > -#define tmp2 %rbx
> > -
> > -#define job_rax %rax
> > -#define tmp1 %rax
> > -#define size_offset %rax
> > -#define tmp %rax
> > -#define start_offset %rax
> > -
> > -#define tmp3 arg1
> > -
> > -#define extra_blocks arg2
> > -#define p arg2
> > -
> > -#define tmp4 %r8
> > -#define lens0 %r8
> > -
> > -#define lens1 %r9
> > -#define lens2 %r10
> > -#define lens3 %r11
> > -
> > -.macro LABEL prefix n
> > -\prefix\n\():
> > -.endm
> > -
> > -.macro JNE_SKIP i
> > -jne skip_\i
> > -.endm
> > -
> > -.altmacro
> > -.macro SET_OFFSET _offset
> > -offset = \_offset
> > -.endm
> > -.noaltmacro
> > -
> > -# JOB* sha512_mb_mgr_flush_avx2(MB_MGR *state)
> > -# arg 1 : rcx : state
> > -ENTRY(sha512_mb_mgr_flush_avx2)
> > - FRAME_BEGIN
> > - push %rbx
> > -
> > - # If bit (32+3) is set, then all lanes are empty
> > - mov _unused_lanes(state), unused_lanes
> > - bt $32+7, unused_lanes
> > - jc return_null
> > -
> > - # find a lane with a non-null job
> > - xor idx, idx
> > - offset = (_ldata + 1*_LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne one(%rip), idx
> > - offset = (_ldata + 2*_LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne two(%rip), idx
> > - offset = (_ldata + 3*_LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > - cmovne three(%rip), idx
> > -
> > - # copy idx to empty lanes
> > -copy_lane_data:
> > - offset = (_args + _data_ptr)
> > - mov offset(state,idx,8), tmp
> > -
> > - I = 0
> > -.rep 4
> > - offset = (_ldata + I * _LANE_DATA_size + _job_in_lane)
> > - cmpq $0, offset(state)
> > -.altmacro
> > - JNE_SKIP %I
> > - offset = (_args + _data_ptr + 8*I)
> > - mov tmp, offset(state)
> > - offset = (_lens + 8*I +4)
> > - movl $0xFFFFFFFF, offset(state)
> > -LABEL skip_ %I
> > - I = (I+1)
> > -.noaltmacro
> > -.endr
> > -
> > - # Find min length
> > - mov _lens + 0*8(state),lens0
> > - mov lens0,idx
> > - mov _lens + 1*8(state),lens1
> > - cmp idx,lens1
> > - cmovb lens1,idx
> > - mov _lens + 2*8(state),lens2
> > - cmp idx,lens2
> > - cmovb lens2,idx
> > - mov _lens + 3*8(state),lens3
> > - cmp idx,lens3
> > - cmovb lens3,idx
> > - mov idx,len2
> > - and $0xF,idx
> > - and $~0xFF,len2
> > - jz len_is_0
> > -
> > - sub len2, lens0
> > - sub len2, lens1
> > - sub len2, lens2
> > - sub len2, lens3
> > - shr $32,len2
> > - mov lens0, _lens + 0*8(state)
> > - mov lens1, _lens + 1*8(state)
> > - mov lens2, _lens + 2*8(state)
> > - mov lens3, _lens + 3*8(state)
> > -
> > - # "state" and "args" are the same address, arg1
> > - # len is arg2
> > - call sha512_x4_avx2
> > - # state and idx are intact
> > -
> > -len_is_0:
> > - # process completed job "idx"
> > - imul $_LANE_DATA_size, idx, lane_data
> > - lea _ldata(state, lane_data), lane_data
> > -
> > - mov _job_in_lane(lane_data), job_rax
> > - movq $0, _job_in_lane(lane_data)
> > - movl $STS_COMPLETED, _status(job_rax)
> > - mov _unused_lanes(state), unused_lanes
> > - shl $8, unused_lanes
> > - or idx, unused_lanes
> > - mov unused_lanes, _unused_lanes(state)
> > -
> > - movl $0xFFFFFFFF, _lens+4(state, idx, 8)
> > -
> > - vmovq _args_digest+0*32(state, idx, 8), %xmm0
> > - vpinsrq $1, _args_digest+1*32(state, idx, 8), %xmm0, %xmm0
> > - vmovq _args_digest+2*32(state, idx, 8), %xmm1
> > - vpinsrq $1, _args_digest+3*32(state, idx, 8), %xmm1, %xmm1
> > - vmovq _args_digest+4*32(state, idx, 8), %xmm2
> > - vpinsrq $1, _args_digest+5*32(state, idx, 8), %xmm2, %xmm2
> > - vmovq _args_digest+6*32(state, idx, 8), %xmm3
> > - vpinsrq $1, _args_digest+7*32(state, idx, 8), %xmm3, %xmm3
> > -
> > - vmovdqu %xmm0, _result_digest(job_rax)
> > - vmovdqu %xmm1, _result_digest+1*16(job_rax)
> > - vmovdqu %xmm2, _result_digest+2*16(job_rax)
> > - vmovdqu %xmm3, _result_digest+3*16(job_rax)
> > -
> > -return:
> > - pop %rbx
> > - FRAME_END
> > - ret
> > -
> > -return_null:
> > - xor job_rax, job_rax
> > - jmp return
> > -ENDPROC(sha512_mb_mgr_flush_avx2)
> > -.align 16
> > -
> > -ENTRY(sha512_mb_mgr_get_comp_job_avx2)
> > - push %rbx
> > -
> > - mov _unused_lanes(state), unused_lanes
> > - bt $(32+7), unused_lanes
> > - jc .return_null
> > -
> > - # Find min length
> > - mov _lens(state),lens0
> > - mov lens0,idx
> > - mov _lens+1*8(state),lens1
> > - cmp idx,lens1
> > - cmovb lens1,idx
> > - mov _lens+2*8(state),lens2
> > - cmp idx,lens2
> > - cmovb lens2,idx
> > - mov _lens+3*8(state),lens3
> > - cmp idx,lens3
> > - cmovb lens3,idx
> > - test $~0xF,idx
> > - jnz .return_null
> > - and $0xF,idx
> > -
> > - #process completed job "idx"
> > - imul $_LANE_DATA_size, idx, lane_data
> > - lea _ldata(state, lane_data), lane_data
> > -
> > - mov _job_in_lane(lane_data), job_rax
> > - movq $0, _job_in_lane(lane_data)
> > - movl $STS_COMPLETED, _status(job_rax)
> > - mov _unused_lanes(state), unused_lanes
> > - shl $8, unused_lanes
> > - or idx, unused_lanes
> > - mov unused_lanes, _unused_lanes(state)
> > -
> > - movl $0xFFFFFFFF, _lens+4(state, idx, 8)
> > -
> > - vmovq _args_digest(state, idx, 8), %xmm0
> > - vpinsrq $1, _args_digest+1*32(state, idx, 8), %xmm0, %xmm0
> > - vmovq _args_digest+2*32(state, idx, 8), %xmm1
> > - vpinsrq $1, _args_digest+3*32(state, idx, 8), %xmm1, %xmm1
> > - vmovq _args_digest+4*32(state, idx, 8), %xmm2
> > - vpinsrq $1, _args_digest+5*32(state, idx, 8), %xmm2, %xmm2
> > - vmovq _args_digest+6*32(state, idx, 8), %xmm3
> > - vpinsrq $1, _args_digest+7*32(state, idx, 8), %xmm3, %xmm3
> > -
> > - vmovdqu %xmm0, _result_digest+0*16(job_rax)
> > - vmovdqu %xmm1, _result_digest+1*16(job_rax)
> > - vmovdqu %xmm2, _result_digest+2*16(job_rax)
> > - vmovdqu %xmm3, _result_digest+3*16(job_rax)
> > -
> > - pop %rbx
> > -
> > - ret
> > -
> > -.return_null:
> > - xor job_rax, job_rax
> > - pop %rbx
> > - ret
> > -ENDPROC(sha512_mb_mgr_get_comp_job_avx2)
> > -
> > -.section .rodata.cst8.one, "aM", @progbits, 8
> > -.align 8
> > -one:
> > -.quad 1
> > -
> > -.section .rodata.cst8.two, "aM", @progbits, 8
> > -.align 8
> > -two:
> > -.quad 2
> > -
> > -.section .rodata.cst8.three, "aM", @progbits, 8
> > -.align 8
> > -three:
> > -.quad 3
> > diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c
> > deleted file mode 100644
> > index d08805032f01..000000000000
> > --- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c
> > +++ /dev/null
> > @@ -1,69 +0,0 @@
> > -/*
> > - * Initialization code for multi buffer SHA256 algorithm for AVX2
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#include "sha512_mb_mgr.h"
> > -
> > -void sha512_mb_mgr_init_avx2(struct sha512_mb_mgr *state)
> > -{
> > - unsigned int j;
> > -
> > - /* initially all lanes are unused */
> > - state->lens[0] = 0xFFFFFFFF00000000;
> > - state->lens[1] = 0xFFFFFFFF00000001;
> > - state->lens[2] = 0xFFFFFFFF00000002;
> > - state->lens[3] = 0xFFFFFFFF00000003;
> > -
> > - state->unused_lanes = 0xFF03020100;
> > - for (j = 0; j < 4; j++)
> > - state->ldata[j].job_in_lane = NULL;
> > -}
> > diff --git a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S b/arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S
> > deleted file mode 100644
> > index 4ba709ba78e5..000000000000
> > --- a/arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S
> > +++ /dev/null
> > @@ -1,224 +0,0 @@
> > -/*
> > - * Buffer submit code for multi buffer SHA512 algorithm
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -#include <linux/linkage.h>
> > -#include <asm/frame.h>
> > -#include "sha512_mb_mgr_datastruct.S"
> > -
> > -.extern sha512_x4_avx2
> > -
> > -#define arg1 %rdi
> > -#define arg2 %rsi
> > -
> > -#define idx %rdx
> > -#define last_len %rdx
> > -
> > -#define size_offset %rcx
> > -#define tmp2 %rcx
> > -
> > -# Common definitions
> > -#define state arg1
> > -#define job arg2
> > -#define len2 arg2
> > -#define p2 arg2
> > -
> > -#define p %r11
> > -#define start_offset %r11
> > -
> > -#define unused_lanes %rbx
> > -
> > -#define job_rax %rax
> > -#define len %rax
> > -
> > -#define lane %r12
> > -#define tmp3 %r12
> > -#define lens3 %r12
> > -
> > -#define extra_blocks %r8
> > -#define lens0 %r8
> > -
> > -#define tmp %r9
> > -#define lens1 %r9
> > -
> > -#define lane_data %r10
> > -#define lens2 %r10
> > -
> > -#define DWORD_len %eax
> > -
> > -# JOB* sha512_mb_mgr_submit_avx2(MB_MGR *state, JOB *job)
> > -# arg 1 : rcx : state
> > -# arg 2 : rdx : job
> > -ENTRY(sha512_mb_mgr_submit_avx2)
> > - FRAME_BEGIN
> > - push %rbx
> > - push %r12
> > -
> > - mov _unused_lanes(state), unused_lanes
> > - movzb %bl,lane
> > - shr $8, unused_lanes
> > - imul $_LANE_DATA_size, lane,lane_data
> > - movl $STS_BEING_PROCESSED, _status(job)
> > - lea _ldata(state, lane_data), lane_data
> > - mov unused_lanes, _unused_lanes(state)
> > - movl _len(job), DWORD_len
> > -
> > - mov job, _job_in_lane(lane_data)
> > - movl DWORD_len,_lens+4(state , lane, 8)
> > -
> > - # Load digest words from result_digest
> > - vmovdqu _result_digest+0*16(job), %xmm0
> > - vmovdqu _result_digest+1*16(job), %xmm1
> > - vmovdqu _result_digest+2*16(job), %xmm2
> > - vmovdqu _result_digest+3*16(job), %xmm3
> > -
> > - vmovq %xmm0, _args_digest(state, lane, 8)
> > - vpextrq $1, %xmm0, _args_digest+1*32(state , lane, 8)
> > - vmovq %xmm1, _args_digest+2*32(state , lane, 8)
> > - vpextrq $1, %xmm1, _args_digest+3*32(state , lane, 8)
> > - vmovq %xmm2, _args_digest+4*32(state , lane, 8)
> > - vpextrq $1, %xmm2, _args_digest+5*32(state , lane, 8)
> > - vmovq %xmm3, _args_digest+6*32(state , lane, 8)
> > - vpextrq $1, %xmm3, _args_digest+7*32(state , lane, 8)
> > -
> > - mov _buffer(job), p
> > - mov p, _args_data_ptr(state, lane, 8)
> > -
> > - cmp $0xFF, unused_lanes
> > - jne return_null
> > -
> > -start_loop:
> > -
> > - # Find min length
> > - mov _lens+0*8(state),lens0
> > - mov lens0,idx
> > - mov _lens+1*8(state),lens1
> > - cmp idx,lens1
> > - cmovb lens1, idx
> > - mov _lens+2*8(state),lens2
> > - cmp idx,lens2
> > - cmovb lens2,idx
> > - mov _lens+3*8(state),lens3
> > - cmp idx,lens3
> > - cmovb lens3,idx
> > - mov idx,len2
> > - and $0xF,idx
> > - and $~0xFF,len2
> > - jz len_is_0
> > -
> > - sub len2,lens0
> > - sub len2,lens1
> > - sub len2,lens2
> > - sub len2,lens3
> > - shr $32,len2
> > - mov lens0, _lens + 0*8(state)
> > - mov lens1, _lens + 1*8(state)
> > - mov lens2, _lens + 2*8(state)
> > - mov lens3, _lens + 3*8(state)
> > -
> > - # "state" and "args" are the same address, arg1
> > - # len is arg2
> > - call sha512_x4_avx2
> > - # state and idx are intact
> > -
> > -len_is_0:
> > -
> > - # process completed job "idx"
> > - imul $_LANE_DATA_size, idx, lane_data
> > - lea _ldata(state, lane_data), lane_data
> > -
> > - mov _job_in_lane(lane_data), job_rax
> > - mov _unused_lanes(state), unused_lanes
> > - movq $0, _job_in_lane(lane_data)
> > - movl $STS_COMPLETED, _status(job_rax)
> > - shl $8, unused_lanes
> > - or idx, unused_lanes
> > - mov unused_lanes, _unused_lanes(state)
> > -
> > - movl $0xFFFFFFFF,_lens+4(state,idx,8)
> > - vmovq _args_digest+0*32(state , idx, 8), %xmm0
> > - vpinsrq $1, _args_digest+1*32(state , idx, 8), %xmm0, %xmm0
> > - vmovq _args_digest+2*32(state , idx, 8), %xmm1
> > - vpinsrq $1, _args_digest+3*32(state , idx, 8), %xmm1, %xmm1
> > - vmovq _args_digest+4*32(state , idx, 8), %xmm2
> > - vpinsrq $1, _args_digest+5*32(state , idx, 8), %xmm2, %xmm2
> > - vmovq _args_digest+6*32(state , idx, 8), %xmm3
> > - vpinsrq $1, _args_digest+7*32(state , idx, 8), %xmm3, %xmm3
> > -
> > - vmovdqu %xmm0, _result_digest + 0*16(job_rax)
> > - vmovdqu %xmm1, _result_digest + 1*16(job_rax)
> > - vmovdqu %xmm2, _result_digest + 2*16(job_rax)
> > - vmovdqu %xmm3, _result_digest + 3*16(job_rax)
> > -
> > -return:
> > - pop %r12
> > - pop %rbx
> > - FRAME_END
> > - ret
> > -
> > -return_null:
> > - xor job_rax, job_rax
> > - jmp return
> > -ENDPROC(sha512_mb_mgr_submit_avx2)
> > -
> > -/* UNUSED?
> > -.section .rodata.cst16, "aM", @progbits, 16
> > -.align 16
> > -H0: .int 0x6a09e667
> > -H1: .int 0xbb67ae85
> > -H2: .int 0x3c6ef372
> > -H3: .int 0xa54ff53a
> > -H4: .int 0x510e527f
> > -H5: .int 0x9b05688c
> > -H6: .int 0x1f83d9ab
> > -H7: .int 0x5be0cd19
> > -*/
> > diff --git a/arch/x86/crypto/sha512-mb/sha512_x4_avx2.S b/arch/x86/crypto/sha512-mb/sha512_x4_avx2.S
> > deleted file mode 100644
> > index e22e907643a6..000000000000
> > --- a/arch/x86/crypto/sha512-mb/sha512_x4_avx2.S
> > +++ /dev/null
> > @@ -1,531 +0,0 @@
> > -/*
> > - * Multi-buffer SHA512 algorithm hash compute routine
> > - *
> > - * This file is provided under a dual BSD/GPLv2 license. When using or
> > - * redistributing this file, you may do so under either license.
> > - *
> > - * GPL LICENSE SUMMARY
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * This program is free software; you can redistribute it and/or modify
> > - * it under the terms of version 2 of the GNU General Public License as
> > - * published by the Free Software Foundation.
> > - *
> > - * This program is distributed in the hope that it will be useful, but
> > - * WITHOUT ANY WARRANTY; without even the implied warranty of
> > - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> > - * General Public License for more details.
> > - *
> > - * Contact Information:
> > - * Megha Dey <[email protected]>
> > - *
> > - * BSD LICENSE
> > - *
> > - * Copyright(c) 2016 Intel Corporation.
> > - *
> > - * Redistribution and use in source and binary forms, with or without
> > - * modification, are permitted provided that the following conditions
> > - * are met:
> > - *
> > - * * Redistributions of source code must retain the above copyright
> > - * notice, this list of conditions and the following disclaimer.
> > - * * Redistributions in binary form must reproduce the above copyright
> > - * notice, this list of conditions and the following disclaimer in
> > - * the documentation and/or other materials provided with the
> > - * distribution.
> > - * * Neither the name of Intel Corporation nor the names of its
> > - * contributors may be used to endorse or promote products derived
> > - * from this software without specific prior written permission.
> > - *
> > - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> > - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> > - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> > - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> > - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> > - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> > - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> > - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> > - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> > - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> > - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> > - */
> > -
> > -# code to compute quad SHA512 using AVX2
> > -# use YMMs to tackle the larger digest size
> > -# outer calling routine takes care of save and restore of XMM registers
> > -# Logic designed/laid out by JDG
> > -
> > -# Function clobbers: rax, rcx, rdx, rbx, rsi, rdi, r9-r15; ymm0-15
> > -# Stack must be aligned to 32 bytes before call
> > -# Linux clobbers: rax rbx rcx rsi r8 r9 r10 r11 r12
> > -# Linux preserves: rcx rdx rdi rbp r13 r14 r15
> > -# clobbers ymm0-15
> > -
> > -#include <linux/linkage.h>
> > -#include "sha512_mb_mgr_datastruct.S"
> > -
> > -arg1 = %rdi
> > -arg2 = %rsi
> > -
> > -# Common definitions
> > -STATE = arg1
> > -INP_SIZE = arg2
> > -
> > -IDX = %rax
> > -ROUND = %rbx
> > -TBL = %r8
> > -
> > -inp0 = %r9
> > -inp1 = %r10
> > -inp2 = %r11
> > -inp3 = %r12
> > -
> > -a = %ymm0
> > -b = %ymm1
> > -c = %ymm2
> > -d = %ymm3
> > -e = %ymm4
> > -f = %ymm5
> > -g = %ymm6
> > -h = %ymm7
> > -
> > -a0 = %ymm8
> > -a1 = %ymm9
> > -a2 = %ymm10
> > -
> > -TT0 = %ymm14
> > -TT1 = %ymm13
> > -TT2 = %ymm12
> > -TT3 = %ymm11
> > -TT4 = %ymm10
> > -TT5 = %ymm9
> > -
> > -T1 = %ymm14
> > -TMP = %ymm15
> > -
> > -# Define stack usage
> > -STACK_SPACE1 = SZ4*16 + NUM_SHA512_DIGEST_WORDS*SZ4 + 24
> > -
> > -#define VMOVPD vmovupd
> > -_digest = SZ4*16
> > -
> > -# transpose r0, r1, r2, r3, t0, t1
> > -# "transpose" data in {r0..r3} using temps {t0..t3}
> > -# Input looks like: {r0 r1 r2 r3}
> > -# r0 = {a7 a6 a5 a4 a3 a2 a1 a0}
> > -# r1 = {b7 b6 b5 b4 b3 b2 b1 b0}
> > -# r2 = {c7 c6 c5 c4 c3 c2 c1 c0}
> > -# r3 = {d7 d6 d5 d4 d3 d2 d1 d0}
> > -#
> > -# output looks like: {t0 r1 r0 r3}
> > -# t0 = {d1 d0 c1 c0 b1 b0 a1 a0}
> > -# r1 = {d3 d2 c3 c2 b3 b2 a3 a2}
> > -# r0 = {d5 d4 c5 c4 b5 b4 a5 a4}
> > -# r3 = {d7 d6 c7 c6 b7 b6 a7 a6}
> > -
> > -.macro TRANSPOSE r0 r1 r2 r3 t0 t1
> > - vshufps $0x44, \r1, \r0, \t0 # t0 = {b5 b4 a5 a4 b1 b0 a1 a0}
> > - vshufps $0xEE, \r1, \r0, \r0 # r0 = {b7 b6 a7 a6 b3 b2 a3 a2}
> > - vshufps $0x44, \r3, \r2, \t1 # t1 = {d5 d4 c5 c4 d1 d0 c1 c0}
> > - vshufps $0xEE, \r3, \r2, \r2 # r2 = {d7 d6 c7 c6 d3 d2 c3 c2}
> > -
> > - vperm2f128 $0x20, \r2, \r0, \r1 # h6...a6
> > - vperm2f128 $0x31, \r2, \r0, \r3 # h2...a2
> > - vperm2f128 $0x31, \t1, \t0, \r0 # h5...a5
> > - vperm2f128 $0x20, \t1, \t0, \t0 # h1...a1
> > -.endm
> > -
> > -.macro ROTATE_ARGS
> > -TMP_ = h
> > -h = g
> > -g = f
> > -f = e
> > -e = d
> > -d = c
> > -c = b
> > -b = a
> > -a = TMP_
> > -.endm
> > -
> > -# PRORQ reg, imm, tmp
> > -# packed-rotate-right-double
> > -# does a rotate by doing two shifts and an or
> > -.macro _PRORQ reg imm tmp
> > - vpsllq $(64-\imm),\reg,\tmp
> > - vpsrlq $\imm,\reg, \reg
> > - vpor \tmp,\reg, \reg
> > -.endm
> > -
> > -# non-destructive
> > -# PRORQ_nd reg, imm, tmp, src
> > -.macro _PRORQ_nd reg imm tmp src
> > - vpsllq $(64-\imm), \src, \tmp
> > - vpsrlq $\imm, \src, \reg
> > - vpor \tmp, \reg, \reg
> > -.endm
> > -
> > -# PRORQ dst/src, amt
> > -.macro PRORQ reg imm
> > - _PRORQ \reg, \imm, TMP
> > -.endm
> > -
> > -# PRORQ_nd dst, src, amt
> > -.macro PRORQ_nd reg tmp imm
> > - _PRORQ_nd \reg, \imm, TMP, \tmp
> > -.endm
> > -
> > -#; arguments passed implicitly in preprocessor symbols i, a...h
> > -.macro ROUND_00_15 _T1 i
> > - PRORQ_nd a0, e, (18-14) # sig1: a0 = (e >> 4)
> > -
> > - vpxor g, f, a2 # ch: a2 = f^g
> > - vpand e,a2, a2 # ch: a2 = (f^g)&e
> > - vpxor g, a2, a2 # a2 = ch
> > -
> > - PRORQ_nd a1,e,41 # sig1: a1 = (e >> 25)
> > -
> > - offset = SZ4*(\i & 0xf)
> > - vmovdqu \_T1,offset(%rsp)
> > - vpaddq (TBL,ROUND,1), \_T1, \_T1 # T1 = W + K
> > - vpxor e,a0, a0 # sig1: a0 = e ^ (e >> 5)
> > - PRORQ a0, 14 # sig1: a0 = (e >> 6) ^ (e >> 11)
> > - vpaddq a2, h, h # h = h + ch
> > - PRORQ_nd a2,a,6 # sig0: a2 = (a >> 11)
> > - vpaddq \_T1,h, h # h = h + ch + W + K
> > - vpxor a1, a0, a0 # a0 = sigma1
> > - vmovdqu a,\_T1
> > - PRORQ_nd a1,a,39 # sig0: a1 = (a >> 22)
> > - vpxor c, \_T1, \_T1 # maj: T1 = a^c
> > - add $SZ4, ROUND # ROUND++
> > - vpand b, \_T1, \_T1 # maj: T1 = (a^c)&b
> > - vpaddq a0, h, h
> > - vpaddq h, d, d
> > - vpxor a, a2, a2 # sig0: a2 = a ^ (a >> 11)
> > - PRORQ a2,28 # sig0: a2 = (a >> 2) ^ (a >> 13)
> > - vpxor a1, a2, a2 # a2 = sig0
> > - vpand c, a, a1 # maj: a1 = a&c
> > - vpor \_T1, a1, a1 # a1 = maj
> > - vpaddq a1, h, h # h = h + ch + W + K + maj
> > - vpaddq a2, h, h # h = h + ch + W + K + maj + sigma0
> > - ROTATE_ARGS
> > -.endm
> > -
> > -
> > -#; arguments passed implicitly in preprocessor symbols i, a...h
> > -.macro ROUND_16_XX _T1 i
> > - vmovdqu SZ4*((\i-15)&0xf)(%rsp), \_T1
> > - vmovdqu SZ4*((\i-2)&0xf)(%rsp), a1
> > - vmovdqu \_T1, a0
> > - PRORQ \_T1,7
> > - vmovdqu a1, a2
> > - PRORQ a1,42
> > - vpxor a0, \_T1, \_T1
> > - PRORQ \_T1, 1
> > - vpxor a2, a1, a1
> > - PRORQ a1, 19
> > - vpsrlq $7, a0, a0
> > - vpxor a0, \_T1, \_T1
> > - vpsrlq $6, a2, a2
> > - vpxor a2, a1, a1
> > - vpaddq SZ4*((\i-16)&0xf)(%rsp), \_T1, \_T1
> > - vpaddq SZ4*((\i-7)&0xf)(%rsp), a1, a1
> > - vpaddq a1, \_T1, \_T1
> > -
> > - ROUND_00_15 \_T1,\i
> > -.endm
> > -
> > -
> > -# void sha512_x4_avx2(void *STATE, const int INP_SIZE)
> > -# arg 1 : STATE : pointer to input data
> > -# arg 2 : INP_SIZE : size of data in blocks (assumed >= 1)
> > -ENTRY(sha512_x4_avx2)
> > - # general registers preserved in outer calling routine
> > - # outer calling routine saves all the XMM registers
> > - # save callee-saved clobbered registers to comply with C function ABI
> > - push %r12
> > - push %r13
> > - push %r14
> > - push %r15
> > -
> > - sub $STACK_SPACE1, %rsp
> > -
> > - # Load the pre-transposed incoming digest.
> > - vmovdqu 0*SHA512_DIGEST_ROW_SIZE(STATE),a
> > - vmovdqu 1*SHA512_DIGEST_ROW_SIZE(STATE),b
> > - vmovdqu 2*SHA512_DIGEST_ROW_SIZE(STATE),c
> > - vmovdqu 3*SHA512_DIGEST_ROW_SIZE(STATE),d
> > - vmovdqu 4*SHA512_DIGEST_ROW_SIZE(STATE),e
> > - vmovdqu 5*SHA512_DIGEST_ROW_SIZE(STATE),f
> > - vmovdqu 6*SHA512_DIGEST_ROW_SIZE(STATE),g
> > - vmovdqu 7*SHA512_DIGEST_ROW_SIZE(STATE),h
> > -
> > - lea K512_4(%rip),TBL
> > -
> > - # load the address of each of the 4 message lanes
> > - # getting ready to transpose input onto stack
> > - mov _data_ptr+0*PTR_SZ(STATE),inp0
> > - mov _data_ptr+1*PTR_SZ(STATE),inp1
> > - mov _data_ptr+2*PTR_SZ(STATE),inp2
> > - mov _data_ptr+3*PTR_SZ(STATE),inp3
> > -
> > - xor IDX, IDX
> > -lloop:
> > - xor ROUND, ROUND
> > -
> > - # save old digest
> > - vmovdqu a, _digest(%rsp)
> > - vmovdqu b, _digest+1*SZ4(%rsp)
> > - vmovdqu c, _digest+2*SZ4(%rsp)
> > - vmovdqu d, _digest+3*SZ4(%rsp)
> > - vmovdqu e, _digest+4*SZ4(%rsp)
> > - vmovdqu f, _digest+5*SZ4(%rsp)
> > - vmovdqu g, _digest+6*SZ4(%rsp)
> > - vmovdqu h, _digest+7*SZ4(%rsp)
> > - i = 0
> > -.rep 4
> > - vmovdqu PSHUFFLE_BYTE_FLIP_MASK(%rip), TMP
> > - VMOVPD i*32(inp0, IDX), TT2
> > - VMOVPD i*32(inp1, IDX), TT1
> > - VMOVPD i*32(inp2, IDX), TT4
> > - VMOVPD i*32(inp3, IDX), TT3
> > - TRANSPOSE TT2, TT1, TT4, TT3, TT0, TT5
> > - vpshufb TMP, TT0, TT0
> > - vpshufb TMP, TT1, TT1
> > - vpshufb TMP, TT2, TT2
> > - vpshufb TMP, TT3, TT3
> > - ROUND_00_15 TT0,(i*4+0)
> > - ROUND_00_15 TT1,(i*4+1)
> > - ROUND_00_15 TT2,(i*4+2)
> > - ROUND_00_15 TT3,(i*4+3)
> > - i = (i+1)
> > -.endr
> > - add $128, IDX
> > -
> > - i = (i*4)
> > -
> > - jmp Lrounds_16_xx
> > -.align 16
> > -Lrounds_16_xx:
> > -.rep 16
> > - ROUND_16_XX T1, i
> > - i = (i+1)
> > -.endr
> > - cmp $0xa00,ROUND
> > - jb Lrounds_16_xx
> > -
> > - # add old digest
> > - vpaddq _digest(%rsp), a, a
> > - vpaddq _digest+1*SZ4(%rsp), b, b
> > - vpaddq _digest+2*SZ4(%rsp), c, c
> > - vpaddq _digest+3*SZ4(%rsp), d, d
> > - vpaddq _digest+4*SZ4(%rsp), e, e
> > - vpaddq _digest+5*SZ4(%rsp), f, f
> > - vpaddq _digest+6*SZ4(%rsp), g, g
> > - vpaddq _digest+7*SZ4(%rsp), h, h
> > -
> > - sub $1, INP_SIZE # unit is blocks
> > - jne lloop
> > -
> > - # write back to memory (state object) the transposed digest
> > - vmovdqu a, 0*SHA512_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu b, 1*SHA512_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu c, 2*SHA512_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu d, 3*SHA512_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu e, 4*SHA512_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu f, 5*SHA512_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu g, 6*SHA512_DIGEST_ROW_SIZE(STATE)
> > - vmovdqu h, 7*SHA512_DIGEST_ROW_SIZE(STATE)
> > -
> > - # update input data pointers
> > - add IDX, inp0
> > - mov inp0, _data_ptr+0*PTR_SZ(STATE)
> > - add IDX, inp1
> > - mov inp1, _data_ptr+1*PTR_SZ(STATE)
> > - add IDX, inp2
> > - mov inp2, _data_ptr+2*PTR_SZ(STATE)
> > - add IDX, inp3
> > - mov inp3, _data_ptr+3*PTR_SZ(STATE)
> > -
> > - #;;;;;;;;;;;;;;;
> > - #; Postamble
> > - add $STACK_SPACE1, %rsp
> > - # restore callee-saved clobbered registers
> > -
> > - pop %r15
> > - pop %r14
> > - pop %r13
> > - pop %r12
> > -
> > - # outer calling routine restores XMM and other GP registers
> > - ret
> > -ENDPROC(sha512_x4_avx2)
> > -
> > -.section .rodata.K512_4, "a", @progbits
> > -.align 64
> > -K512_4:
> > - .octa 0x428a2f98d728ae22428a2f98d728ae22,\
> > - 0x428a2f98d728ae22428a2f98d728ae22
> > - .octa 0x7137449123ef65cd7137449123ef65cd,\
> > - 0x7137449123ef65cd7137449123ef65cd
> > - .octa 0xb5c0fbcfec4d3b2fb5c0fbcfec4d3b2f,\
> > - 0xb5c0fbcfec4d3b2fb5c0fbcfec4d3b2f
> > - .octa 0xe9b5dba58189dbbce9b5dba58189dbbc,\
> > - 0xe9b5dba58189dbbce9b5dba58189dbbc
> > - .octa 0x3956c25bf348b5383956c25bf348b538,\
> > - 0x3956c25bf348b5383956c25bf348b538
> > - .octa 0x59f111f1b605d01959f111f1b605d019,\
> > - 0x59f111f1b605d01959f111f1b605d019
> > - .octa 0x923f82a4af194f9b923f82a4af194f9b,\
> > - 0x923f82a4af194f9b923f82a4af194f9b
> > - .octa 0xab1c5ed5da6d8118ab1c5ed5da6d8118,\
> > - 0xab1c5ed5da6d8118ab1c5ed5da6d8118
> > - .octa 0xd807aa98a3030242d807aa98a3030242,\
> > - 0xd807aa98a3030242d807aa98a3030242
> > - .octa 0x12835b0145706fbe12835b0145706fbe,\
> > - 0x12835b0145706fbe12835b0145706fbe
> > - .octa 0x243185be4ee4b28c243185be4ee4b28c,\
> > - 0x243185be4ee4b28c243185be4ee4b28c
> > - .octa 0x550c7dc3d5ffb4e2550c7dc3d5ffb4e2,\
> > - 0x550c7dc3d5ffb4e2550c7dc3d5ffb4e2
> > - .octa 0x72be5d74f27b896f72be5d74f27b896f,\
> > - 0x72be5d74f27b896f72be5d74f27b896f
> > - .octa 0x80deb1fe3b1696b180deb1fe3b1696b1,\
> > - 0x80deb1fe3b1696b180deb1fe3b1696b1
> > - .octa 0x9bdc06a725c712359bdc06a725c71235,\
> > - 0x9bdc06a725c712359bdc06a725c71235
> > - .octa 0xc19bf174cf692694c19bf174cf692694,\
> > - 0xc19bf174cf692694c19bf174cf692694
> > - .octa 0xe49b69c19ef14ad2e49b69c19ef14ad2,\
> > - 0xe49b69c19ef14ad2e49b69c19ef14ad2
> > - .octa 0xefbe4786384f25e3efbe4786384f25e3,\
> > - 0xefbe4786384f25e3efbe4786384f25e3
> > - .octa 0x0fc19dc68b8cd5b50fc19dc68b8cd5b5,\
> > - 0x0fc19dc68b8cd5b50fc19dc68b8cd5b5
> > - .octa 0x240ca1cc77ac9c65240ca1cc77ac9c65,\
> > - 0x240ca1cc77ac9c65240ca1cc77ac9c65
> > - .octa 0x2de92c6f592b02752de92c6f592b0275,\
> > - 0x2de92c6f592b02752de92c6f592b0275
> > - .octa 0x4a7484aa6ea6e4834a7484aa6ea6e483,\
> > - 0x4a7484aa6ea6e4834a7484aa6ea6e483
> > - .octa 0x5cb0a9dcbd41fbd45cb0a9dcbd41fbd4,\
> > - 0x5cb0a9dcbd41fbd45cb0a9dcbd41fbd4
> > - .octa 0x76f988da831153b576f988da831153b5,\
> > - 0x76f988da831153b576f988da831153b5
> > - .octa 0x983e5152ee66dfab983e5152ee66dfab,\
> > - 0x983e5152ee66dfab983e5152ee66dfab
> > - .octa 0xa831c66d2db43210a831c66d2db43210,\
> > - 0xa831c66d2db43210a831c66d2db43210
> > - .octa 0xb00327c898fb213fb00327c898fb213f,\
> > - 0xb00327c898fb213fb00327c898fb213f
> > - .octa 0xbf597fc7beef0ee4bf597fc7beef0ee4,\
> > - 0xbf597fc7beef0ee4bf597fc7beef0ee4
> > - .octa 0xc6e00bf33da88fc2c6e00bf33da88fc2,\
> > - 0xc6e00bf33da88fc2c6e00bf33da88fc2
> > - .octa 0xd5a79147930aa725d5a79147930aa725,\
> > - 0xd5a79147930aa725d5a79147930aa725
> > - .octa 0x06ca6351e003826f06ca6351e003826f,\
> > - 0x06ca6351e003826f06ca6351e003826f
> > - .octa 0x142929670a0e6e70142929670a0e6e70,\
> > - 0x142929670a0e6e70142929670a0e6e70
> > - .octa 0x27b70a8546d22ffc27b70a8546d22ffc,\
> > - 0x27b70a8546d22ffc27b70a8546d22ffc
> > - .octa 0x2e1b21385c26c9262e1b21385c26c926,\
> > - 0x2e1b21385c26c9262e1b21385c26c926
> > - .octa 0x4d2c6dfc5ac42aed4d2c6dfc5ac42aed,\
> > - 0x4d2c6dfc5ac42aed4d2c6dfc5ac42aed
> > - .octa 0x53380d139d95b3df53380d139d95b3df,\
> > - 0x53380d139d95b3df53380d139d95b3df
> > - .octa 0x650a73548baf63de650a73548baf63de,\
> > - 0x650a73548baf63de650a73548baf63de
> > - .octa 0x766a0abb3c77b2a8766a0abb3c77b2a8,\
> > - 0x766a0abb3c77b2a8766a0abb3c77b2a8
> > - .octa 0x81c2c92e47edaee681c2c92e47edaee6,\
> > - 0x81c2c92e47edaee681c2c92e47edaee6
> > - .octa 0x92722c851482353b92722c851482353b,\
> > - 0x92722c851482353b92722c851482353b
> > - .octa 0xa2bfe8a14cf10364a2bfe8a14cf10364,\
> > - 0xa2bfe8a14cf10364a2bfe8a14cf10364
> > - .octa 0xa81a664bbc423001a81a664bbc423001,\
> > - 0xa81a664bbc423001a81a664bbc423001
> > - .octa 0xc24b8b70d0f89791c24b8b70d0f89791,\
> > - 0xc24b8b70d0f89791c24b8b70d0f89791
> > - .octa 0xc76c51a30654be30c76c51a30654be30,\
> > - 0xc76c51a30654be30c76c51a30654be30
> > - .octa 0xd192e819d6ef5218d192e819d6ef5218,\
> > - 0xd192e819d6ef5218d192e819d6ef5218
> > - .octa 0xd69906245565a910d69906245565a910,\
> > - 0xd69906245565a910d69906245565a910
> > - .octa 0xf40e35855771202af40e35855771202a,\
> > - 0xf40e35855771202af40e35855771202a
> > - .octa 0x106aa07032bbd1b8106aa07032bbd1b8,\
> > - 0x106aa07032bbd1b8106aa07032bbd1b8
> > - .octa 0x19a4c116b8d2d0c819a4c116b8d2d0c8,\
> > - 0x19a4c116b8d2d0c819a4c116b8d2d0c8
> > - .octa 0x1e376c085141ab531e376c085141ab53,\
> > - 0x1e376c085141ab531e376c085141ab53
> > - .octa 0x2748774cdf8eeb992748774cdf8eeb99,\
> > - 0x2748774cdf8eeb992748774cdf8eeb99
> > - .octa 0x34b0bcb5e19b48a834b0bcb5e19b48a8,\
> > - 0x34b0bcb5e19b48a834b0bcb5e19b48a8
> > - .octa 0x391c0cb3c5c95a63391c0cb3c5c95a63,\
> > - 0x391c0cb3c5c95a63391c0cb3c5c95a63
> > - .octa 0x4ed8aa4ae3418acb4ed8aa4ae3418acb,\
> > - 0x4ed8aa4ae3418acb4ed8aa4ae3418acb
> > - .octa 0x5b9cca4f7763e3735b9cca4f7763e373,\
> > - 0x5b9cca4f7763e3735b9cca4f7763e373
> > - .octa 0x682e6ff3d6b2b8a3682e6ff3d6b2b8a3,\
> > - 0x682e6ff3d6b2b8a3682e6ff3d6b2b8a3
> > - .octa 0x748f82ee5defb2fc748f82ee5defb2fc,\
> > - 0x748f82ee5defb2fc748f82ee5defb2fc
> > - .octa 0x78a5636f43172f6078a5636f43172f60,\
> > - 0x78a5636f43172f6078a5636f43172f60
> > - .octa 0x84c87814a1f0ab7284c87814a1f0ab72,\
> > - 0x84c87814a1f0ab7284c87814a1f0ab72
> > - .octa 0x8cc702081a6439ec8cc702081a6439ec,\
> > - 0x8cc702081a6439ec8cc702081a6439ec
> > - .octa 0x90befffa23631e2890befffa23631e28,\
> > - 0x90befffa23631e2890befffa23631e28
> > - .octa 0xa4506cebde82bde9a4506cebde82bde9,\
> > - 0xa4506cebde82bde9a4506cebde82bde9
> > - .octa 0xbef9a3f7b2c67915bef9a3f7b2c67915,\
> > - 0xbef9a3f7b2c67915bef9a3f7b2c67915
> > - .octa 0xc67178f2e372532bc67178f2e372532b,\
> > - 0xc67178f2e372532bc67178f2e372532b
> > - .octa 0xca273eceea26619cca273eceea26619c,\
> > - 0xca273eceea26619cca273eceea26619c
> > - .octa 0xd186b8c721c0c207d186b8c721c0c207,\
> > - 0xd186b8c721c0c207d186b8c721c0c207
> > - .octa 0xeada7dd6cde0eb1eeada7dd6cde0eb1e,\
> > - 0xeada7dd6cde0eb1eeada7dd6cde0eb1e
> > - .octa 0xf57d4f7fee6ed178f57d4f7fee6ed178,\
> > - 0xf57d4f7fee6ed178f57d4f7fee6ed178
> > - .octa 0x06f067aa72176fba06f067aa72176fba,\
> > - 0x06f067aa72176fba06f067aa72176fba
> > - .octa 0x0a637dc5a2c898a60a637dc5a2c898a6,\
> > - 0x0a637dc5a2c898a60a637dc5a2c898a6
> > - .octa 0x113f9804bef90dae113f9804bef90dae,\
> > - 0x113f9804bef90dae113f9804bef90dae
> > - .octa 0x1b710b35131c471b1b710b35131c471b,\
> > - 0x1b710b35131c471b1b710b35131c471b
> > - .octa 0x28db77f523047d8428db77f523047d84,\
> > - 0x28db77f523047d8428db77f523047d84
> > - .octa 0x32caab7b40c7249332caab7b40c72493,\
> > - 0x32caab7b40c7249332caab7b40c72493
> > - .octa 0x3c9ebe0a15c9bebc3c9ebe0a15c9bebc,\
> > - 0x3c9ebe0a15c9bebc3c9ebe0a15c9bebc
> > - .octa 0x431d67c49c100d4c431d67c49c100d4c,\
> > - 0x431d67c49c100d4c431d67c49c100d4c
> > - .octa 0x4cc5d4becb3e42b64cc5d4becb3e42b6,\
> > - 0x4cc5d4becb3e42b64cc5d4becb3e42b6
> > - .octa 0x597f299cfc657e2a597f299cfc657e2a,\
> > - 0x597f299cfc657e2a597f299cfc657e2a
> > - .octa 0x5fcb6fab3ad6faec5fcb6fab3ad6faec,\
> > - 0x5fcb6fab3ad6faec5fcb6fab3ad6faec
> > - .octa 0x6c44198c4a4758176c44198c4a475817,\
> > - 0x6c44198c4a4758176c44198c4a475817
> > -
> > -.section .rodata.cst32.PSHUFFLE_BYTE_FLIP_MASK, "aM", @progbits, 32
> > -.align 32
> > -PSHUFFLE_BYTE_FLIP_MASK: .octa 0x08090a0b0c0d0e0f0001020304050607
> > - .octa 0x18191a1b1c1d1e1f1011121314151617
> > diff --git a/crypto/Kconfig b/crypto/Kconfig
> > index f3e40ac56d93..4ee600bdefdb 100644
> > --- a/crypto/Kconfig
> > +++ b/crypto/Kconfig
> > @@ -213,20 +213,6 @@ config CRYPTO_CRYPTD
> > converts an arbitrary synchronous software crypto algorithm
> > into an asynchronous algorithm that executes in a kernel thread.
> >
> > -config CRYPTO_MCRYPTD
> > - tristate "Software async multi-buffer crypto daemon"
> > - select CRYPTO_BLKCIPHER
> > - select CRYPTO_HASH
> > - select CRYPTO_MANAGER
> > - select CRYPTO_WORKQUEUE
> > - help
> > - This is a generic software asynchronous crypto daemon that
> > - provides the kernel thread to assist multi-buffer crypto
> > - algorithms for submitting jobs and flushing jobs in multi-buffer
> > - crypto algorithms. Multi-buffer crypto algorithms are executed
> > - in the context of this kernel thread and drivers can post
> > - their crypto request asynchronously to be processed by this daemon.
> > -
> > config CRYPTO_AUTHENC
> > tristate "Authenc support"
> > select CRYPTO_AEAD
> > @@ -848,54 +834,6 @@ config CRYPTO_SHA1_PPC_SPE
> > SHA-1 secure hash standard (DFIPS 180-4) implemented
> > using powerpc SPE SIMD instruction set.
> >
> > -config CRYPTO_SHA1_MB
> > - tristate "SHA1 digest algorithm (x86_64 Multi-Buffer, Experimental)"
> > - depends on X86 && 64BIT
> > - select CRYPTO_SHA1
> > - select CRYPTO_HASH
> > - select CRYPTO_MCRYPTD
> > - help
> > - SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
> > - using multi-buffer technique. This algorithm computes on
> > - multiple data lanes concurrently with SIMD instructions for
> > - better throughput. It should not be enabled by default but
> > - used when there is significant amount of work to keep the keep
> > - the data lanes filled to get performance benefit. If the data
> > - lanes remain unfilled, a flush operation will be initiated to
> > - process the crypto jobs, adding a slight latency.
> > -
> > -config CRYPTO_SHA256_MB
> > - tristate "SHA256 digest algorithm (x86_64 Multi-Buffer, Experimental)"
> > - depends on X86 && 64BIT
> > - select CRYPTO_SHA256
> > - select CRYPTO_HASH
> > - select CRYPTO_MCRYPTD
> > - help
> > - SHA-256 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
> > - using multi-buffer technique. This algorithm computes on
> > - multiple data lanes concurrently with SIMD instructions for
> > - better throughput. It should not be enabled by default but
> > - used when there is significant amount of work to keep the keep
> > - the data lanes filled to get performance benefit. If the data
> > - lanes remain unfilled, a flush operation will be initiated to
> > - process the crypto jobs, adding a slight latency.
> > -
> > -config CRYPTO_SHA512_MB
> > - tristate "SHA512 digest algorithm (x86_64 Multi-Buffer, Experimental)"
> > - depends on X86 && 64BIT
> > - select CRYPTO_SHA512
> > - select CRYPTO_HASH
> > - select CRYPTO_MCRYPTD
> > - help
> > - SHA-512 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
> > - using multi-buffer technique. This algorithm computes on
> > - multiple data lanes concurrently with SIMD instructions for
> > - better throughput. It should not be enabled by default but
> > - used when there is significant amount of work to keep the keep
> > - the data lanes filled to get performance benefit. If the data
> > - lanes remain unfilled, a flush operation will be initiated to
> > - process the crypto jobs, adding a slight latency.
> > -
> > config CRYPTO_SHA256
> > tristate "SHA224 and SHA256 digest algorithm"
> > select CRYPTO_HASH
> > diff --git a/crypto/Makefile b/crypto/Makefile
> > index 6d1d40eeb964..80e3da755cbf 100644
> > --- a/crypto/Makefile
> > +++ b/crypto/Makefile
> > @@ -93,7 +93,6 @@ obj-$(CONFIG_CRYPTO_MORUS640) += morus640.o
> > obj-$(CONFIG_CRYPTO_MORUS1280) += morus1280.o
> > obj-$(CONFIG_CRYPTO_PCRYPT) += pcrypt.o
> > obj-$(CONFIG_CRYPTO_CRYPTD) += cryptd.o
> > -obj-$(CONFIG_CRYPTO_MCRYPTD) += mcryptd.o
> > obj-$(CONFIG_CRYPTO_DES) += des_generic.o
> > obj-$(CONFIG_CRYPTO_FCRYPT) += fcrypt.o
> > obj-$(CONFIG_CRYPTO_BLOWFISH) += blowfish_generic.o
> > diff --git a/crypto/mcryptd.c b/crypto/mcryptd.c
> > deleted file mode 100644
> > index f14152147ce8..000000000000
> > --- a/crypto/mcryptd.c
> > +++ /dev/null
> > @@ -1,675 +0,0 @@
> > -/*
> > - * Software multibuffer async crypto daemon.
> > - *
> > - * Copyright (c) 2014 Tim Chen <[email protected]>
> > - *
> > - * Adapted from crypto daemon.
> > - *
> > - * This program is free software; you can redistribute it and/or modify it
> > - * under the terms of the GNU General Public License as published by the Free
> > - * Software Foundation; either version 2 of the License, or (at your option)
> > - * any later version.
> > - *
> > - */
> > -
> > -#include <crypto/algapi.h>
> > -#include <crypto/internal/hash.h>
> > -#include <crypto/internal/aead.h>
> > -#include <crypto/mcryptd.h>
> > -#include <crypto/crypto_wq.h>
> > -#include <linux/err.h>
> > -#include <linux/init.h>
> > -#include <linux/kernel.h>
> > -#include <linux/list.h>
> > -#include <linux/module.h>
> > -#include <linux/scatterlist.h>
> > -#include <linux/sched.h>
> > -#include <linux/sched/stat.h>
> > -#include <linux/slab.h>
> > -
> > -#define MCRYPTD_MAX_CPU_QLEN 100
> > -#define MCRYPTD_BATCH 9
> > -
> > -static void *mcryptd_alloc_instance(struct crypto_alg *alg, unsigned int head,
> > - unsigned int tail);
> > -
> > -struct mcryptd_flush_list {
> > - struct list_head list;
> > - struct mutex lock;
> > -};
> > -
> > -static struct mcryptd_flush_list __percpu *mcryptd_flist;
> > -
> > -struct hashd_instance_ctx {
> > - struct crypto_ahash_spawn spawn;
> > - struct mcryptd_queue *queue;
> > -};
> > -
> > -static void mcryptd_queue_worker(struct work_struct *work);
> > -
> > -void mcryptd_arm_flusher(struct mcryptd_alg_cstate *cstate, unsigned long delay)
> > -{
> > - struct mcryptd_flush_list *flist;
> > -
> > - if (!cstate->flusher_engaged) {
> > - /* put the flusher on the flush list */
> > - flist = per_cpu_ptr(mcryptd_flist, smp_processor_id());
> > - mutex_lock(&flist->lock);
> > - list_add_tail(&cstate->flush_list, &flist->list);
> > - cstate->flusher_engaged = true;
> > - cstate->next_flush = jiffies + delay;
> > - queue_delayed_work_on(smp_processor_id(), kcrypto_wq,
> > - &cstate->flush, delay);
> > - mutex_unlock(&flist->lock);
> > - }
> > -}
> > -EXPORT_SYMBOL(mcryptd_arm_flusher);
> > -
> > -static int mcryptd_init_queue(struct mcryptd_queue *queue,
> > - unsigned int max_cpu_qlen)
> > -{
> > - int cpu;
> > - struct mcryptd_cpu_queue *cpu_queue;
> > -
> > - queue->cpu_queue = alloc_percpu(struct mcryptd_cpu_queue);
> > - pr_debug("mqueue:%p mcryptd_cpu_queue %p\n", queue, queue->cpu_queue);
> > - if (!queue->cpu_queue)
> > - return -ENOMEM;
> > - for_each_possible_cpu(cpu) {
> > - cpu_queue = per_cpu_ptr(queue->cpu_queue, cpu);
> > - pr_debug("cpu_queue #%d %p\n", cpu, queue->cpu_queue);
> > - crypto_init_queue(&cpu_queue->queue, max_cpu_qlen);
> > - INIT_WORK(&cpu_queue->work, mcryptd_queue_worker);
> > - spin_lock_init(&cpu_queue->q_lock);
> > - }
> > - return 0;
> > -}
> > -
> > -static void mcryptd_fini_queue(struct mcryptd_queue *queue)
> > -{
> > - int cpu;
> > - struct mcryptd_cpu_queue *cpu_queue;
> > -
> > - for_each_possible_cpu(cpu) {
> > - cpu_queue = per_cpu_ptr(queue->cpu_queue, cpu);
> > - BUG_ON(cpu_queue->queue.qlen);
> > - }
> > - free_percpu(queue->cpu_queue);
> > -}
> > -
> > -static int mcryptd_enqueue_request(struct mcryptd_queue *queue,
> > - struct crypto_async_request *request,
> > - struct mcryptd_hash_request_ctx *rctx)
> > -{
> > - int cpu, err;
> > - struct mcryptd_cpu_queue *cpu_queue;
> > -
> > - cpu_queue = raw_cpu_ptr(queue->cpu_queue);
> > - spin_lock(&cpu_queue->q_lock);
> > - cpu = smp_processor_id();
> > - rctx->tag.cpu = smp_processor_id();
> > -
> > - err = crypto_enqueue_request(&cpu_queue->queue, request);
> > - pr_debug("enqueue request: cpu %d cpu_queue %p request %p\n",
> > - cpu, cpu_queue, request);
> > - spin_unlock(&cpu_queue->q_lock);
> > - queue_work_on(cpu, kcrypto_wq, &cpu_queue->work);
> > -
> > - return err;
> > -}
> > -
> > -/*
> > - * Try to opportunisticlly flush the partially completed jobs if
> > - * crypto daemon is the only task running.
> > - */
> > -static void mcryptd_opportunistic_flush(void)
> > -{
> > - struct mcryptd_flush_list *flist;
> > - struct mcryptd_alg_cstate *cstate;
> > -
> > - flist = per_cpu_ptr(mcryptd_flist, smp_processor_id());
> > - while (single_task_running()) {
> > - mutex_lock(&flist->lock);
> > - cstate = list_first_entry_or_null(&flist->list,
> > - struct mcryptd_alg_cstate, flush_list);
> > - if (!cstate || !cstate->flusher_engaged) {
> > - mutex_unlock(&flist->lock);
> > - return;
> > - }
> > - list_del(&cstate->flush_list);
> > - cstate->flusher_engaged = false;
> > - mutex_unlock(&flist->lock);
> > - cstate->alg_state->flusher(cstate);
> > - }
> > -}
> > -
> > -/*
> > - * Called in workqueue context, do one real cryption work (via
> > - * req->complete) and reschedule itself if there are more work to
> > - * do.
> > - */
> > -static void mcryptd_queue_worker(struct work_struct *work)
> > -{
> > - struct mcryptd_cpu_queue *cpu_queue;
> > - struct crypto_async_request *req, *backlog;
> > - int i;
> > -
> > - /*
> > - * Need to loop through more than once for multi-buffer to
> > - * be effective.
> > - */
> > -
> > - cpu_queue = container_of(work, struct mcryptd_cpu_queue, work);
> > - i = 0;
> > - while (i < MCRYPTD_BATCH || single_task_running()) {
> > -
> > - spin_lock_bh(&cpu_queue->q_lock);
> > - backlog = crypto_get_backlog(&cpu_queue->queue);
> > - req = crypto_dequeue_request(&cpu_queue->queue);
> > - spin_unlock_bh(&cpu_queue->q_lock);
> > -
> > - if (!req) {
> > - mcryptd_opportunistic_flush();
> > - return;
> > - }
> > -
> > - if (backlog)
> > - backlog->complete(backlog, -EINPROGRESS);
> > - req->complete(req, 0);
> > - if (!cpu_queue->queue.qlen)
> > - return;
> > - ++i;
> > - }
> > - if (cpu_queue->queue.qlen)
> > - queue_work_on(smp_processor_id(), kcrypto_wq, &cpu_queue->work);
> > -}
> > -
> > -void mcryptd_flusher(struct work_struct *__work)
> > -{
> > - struct mcryptd_alg_cstate *alg_cpu_state;
> > - struct mcryptd_alg_state *alg_state;
> > - struct mcryptd_flush_list *flist;
> > - int cpu;
> > -
> > - cpu = smp_processor_id();
> > - alg_cpu_state = container_of(to_delayed_work(__work),
> > - struct mcryptd_alg_cstate, flush);
> > - alg_state = alg_cpu_state->alg_state;
> > - if (alg_cpu_state->cpu != cpu)
> > - pr_debug("mcryptd error: work on cpu %d, should be cpu %d\n",
> > - cpu, alg_cpu_state->cpu);
> > -
> > - if (alg_cpu_state->flusher_engaged) {
> > - flist = per_cpu_ptr(mcryptd_flist, cpu);
> > - mutex_lock(&flist->lock);
> > - list_del(&alg_cpu_state->flush_list);
> > - alg_cpu_state->flusher_engaged = false;
> > - mutex_unlock(&flist->lock);
> > - alg_state->flusher(alg_cpu_state);
> > - }
> > -}
> > -EXPORT_SYMBOL_GPL(mcryptd_flusher);
> > -
> > -static inline struct mcryptd_queue *mcryptd_get_queue(struct crypto_tfm *tfm)
> > -{
> > - struct crypto_instance *inst = crypto_tfm_alg_instance(tfm);
> > - struct mcryptd_instance_ctx *ictx = crypto_instance_ctx(inst);
> > -
> > - return ictx->queue;
> > -}
> > -
> > -static void *mcryptd_alloc_instance(struct crypto_alg *alg, unsigned int head,
> > - unsigned int tail)
> > -{
> > - char *p;
> > - struct crypto_instance *inst;
> > - int err;
> > -
> > - p = kzalloc(head + sizeof(*inst) + tail, GFP_KERNEL);
> > - if (!p)
> > - return ERR_PTR(-ENOMEM);
> > -
> > - inst = (void *)(p + head);
> > -
> > - err = -ENAMETOOLONG;
> > - if (snprintf(inst->alg.cra_driver_name, CRYPTO_MAX_ALG_NAME,
> > - "mcryptd(%s)", alg->cra_driver_name) >= CRYPTO_MAX_ALG_NAME)
> > - goto out_free_inst;
> > -
> > - memcpy(inst->alg.cra_name, alg->cra_name, CRYPTO_MAX_ALG_NAME);
> > -
> > - inst->alg.cra_priority = alg->cra_priority + 50;
> > - inst->alg.cra_blocksize = alg->cra_blocksize;
> > - inst->alg.cra_alignmask = alg->cra_alignmask;
> > -
> > -out:
> > - return p;
> > -
> > -out_free_inst:
> > - kfree(p);
> > - p = ERR_PTR(err);
> > - goto out;
> > -}
> > -
> > -static inline bool mcryptd_check_internal(struct rtattr **tb, u32 *type,
> > - u32 *mask)
> > -{
> > - struct crypto_attr_type *algt;
> > -
> > - algt = crypto_get_attr_type(tb);
> > - if (IS_ERR(algt))
> > - return false;
> > -
> > - *type |= algt->type & CRYPTO_ALG_INTERNAL;
> > - *mask |= algt->mask & CRYPTO_ALG_INTERNAL;
> > -
> > - if (*type & *mask & CRYPTO_ALG_INTERNAL)
> > - return true;
> > - else
> > - return false;
> > -}
> > -
> > -static int mcryptd_hash_init_tfm(struct crypto_tfm *tfm)
> > -{
> > - struct crypto_instance *inst = crypto_tfm_alg_instance(tfm);
> > - struct hashd_instance_ctx *ictx = crypto_instance_ctx(inst);
> > - struct crypto_ahash_spawn *spawn = &ictx->spawn;
> > - struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(tfm);
> > - struct crypto_ahash *hash;
> > -
> > - hash = crypto_spawn_ahash(spawn);
> > - if (IS_ERR(hash))
> > - return PTR_ERR(hash);
> > -
> > - ctx->child = hash;
> > - crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm),
> > - sizeof(struct mcryptd_hash_request_ctx) +
> > - crypto_ahash_reqsize(hash));
> > - return 0;
> > -}
> > -
> > -static void mcryptd_hash_exit_tfm(struct crypto_tfm *tfm)
> > -{
> > - struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(tfm);
> > -
> > - crypto_free_ahash(ctx->child);
> > -}
> > -
> > -static int mcryptd_hash_setkey(struct crypto_ahash *parent,
> > - const u8 *key, unsigned int keylen)
> > -{
> > - struct mcryptd_hash_ctx *ctx = crypto_ahash_ctx(parent);
> > - struct crypto_ahash *child = ctx->child;
> > - int err;
> > -
> > - crypto_ahash_clear_flags(child, CRYPTO_TFM_REQ_MASK);
> > - crypto_ahash_set_flags(child, crypto_ahash_get_flags(parent) &
> > - CRYPTO_TFM_REQ_MASK);
> > - err = crypto_ahash_setkey(child, key, keylen);
> > - crypto_ahash_set_flags(parent, crypto_ahash_get_flags(child) &
> > - CRYPTO_TFM_RES_MASK);
> > - return err;
> > -}
> > -
> > -static int mcryptd_hash_enqueue(struct ahash_request *req,
> > - crypto_completion_t complete)
> > -{
> > - int ret;
> > -
> > - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> > - struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
> > - struct mcryptd_queue *queue =
> > - mcryptd_get_queue(crypto_ahash_tfm(tfm));
> > -
> > - rctx->complete = req->base.complete;
> > - req->base.complete = complete;
> > -
> > - ret = mcryptd_enqueue_request(queue, &req->base, rctx);
> > -
> > - return ret;
> > -}
> > -
> > -static void mcryptd_hash_init(struct crypto_async_request *req_async, int err)
> > -{
> > - struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm);
> > - struct crypto_ahash *child = ctx->child;
> > - struct ahash_request *req = ahash_request_cast(req_async);
> > - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> > - struct ahash_request *desc = &rctx->areq;
> > -
> > - if (unlikely(err == -EINPROGRESS))
> > - goto out;
> > -
> > - ahash_request_set_tfm(desc, child);
> > - ahash_request_set_callback(desc, CRYPTO_TFM_REQ_MAY_SLEEP,
> > - rctx->complete, req_async);
> > -
> > - rctx->out = req->result;
> > - err = crypto_ahash_init(desc);
> > -
> > -out:
> > - local_bh_disable();
> > - rctx->complete(&req->base, err);
> > - local_bh_enable();
> > -}
> > -
> > -static int mcryptd_hash_init_enqueue(struct ahash_request *req)
> > -{
> > - return mcryptd_hash_enqueue(req, mcryptd_hash_init);
> > -}
> > -
> > -static void mcryptd_hash_update(struct crypto_async_request *req_async, int err)
> > -{
> > - struct ahash_request *req = ahash_request_cast(req_async);
> > - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> > -
> > - if (unlikely(err == -EINPROGRESS))
> > - goto out;
> > -
> > - rctx->out = req->result;
> > - err = crypto_ahash_update(&rctx->areq);
> > - if (err) {
> > - req->base.complete = rctx->complete;
> > - goto out;
> > - }
> > -
> > - return;
> > -out:
> > - local_bh_disable();
> > - rctx->complete(&req->base, err);
> > - local_bh_enable();
> > -}
> > -
> > -static int mcryptd_hash_update_enqueue(struct ahash_request *req)
> > -{
> > - return mcryptd_hash_enqueue(req, mcryptd_hash_update);
> > -}
> > -
> > -static void mcryptd_hash_final(struct crypto_async_request *req_async, int err)
> > -{
> > - struct ahash_request *req = ahash_request_cast(req_async);
> > - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> > -
> > - if (unlikely(err == -EINPROGRESS))
> > - goto out;
> > -
> > - rctx->out = req->result;
> > - err = crypto_ahash_final(&rctx->areq);
> > - if (err) {
> > - req->base.complete = rctx->complete;
> > - goto out;
> > - }
> > -
> > - return;
> > -out:
> > - local_bh_disable();
> > - rctx->complete(&req->base, err);
> > - local_bh_enable();
> > -}
> > -
> > -static int mcryptd_hash_final_enqueue(struct ahash_request *req)
> > -{
> > - return mcryptd_hash_enqueue(req, mcryptd_hash_final);
> > -}
> > -
> > -static void mcryptd_hash_finup(struct crypto_async_request *req_async, int err)
> > -{
> > - struct ahash_request *req = ahash_request_cast(req_async);
> > - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> > -
> > - if (unlikely(err == -EINPROGRESS))
> > - goto out;
> > - rctx->out = req->result;
> > - err = crypto_ahash_finup(&rctx->areq);
> > -
> > - if (err) {
> > - req->base.complete = rctx->complete;
> > - goto out;
> > - }
> > -
> > - return;
> > -out:
> > - local_bh_disable();
> > - rctx->complete(&req->base, err);
> > - local_bh_enable();
> > -}
> > -
> > -static int mcryptd_hash_finup_enqueue(struct ahash_request *req)
> > -{
> > - return mcryptd_hash_enqueue(req, mcryptd_hash_finup);
> > -}
> > -
> > -static void mcryptd_hash_digest(struct crypto_async_request *req_async, int err)
> > -{
> > - struct mcryptd_hash_ctx *ctx = crypto_tfm_ctx(req_async->tfm);
> > - struct crypto_ahash *child = ctx->child;
> > - struct ahash_request *req = ahash_request_cast(req_async);
> > - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> > - struct ahash_request *desc = &rctx->areq;
> > -
> > - if (unlikely(err == -EINPROGRESS))
> > - goto out;
> > -
> > - ahash_request_set_tfm(desc, child);
> > - ahash_request_set_callback(desc, CRYPTO_TFM_REQ_MAY_SLEEP,
> > - rctx->complete, req_async);
> > -
> > - rctx->out = req->result;
> > - err = crypto_ahash_init(desc) ?: crypto_ahash_finup(desc);
> > -
> > -out:
> > - local_bh_disable();
> > - rctx->complete(&req->base, err);
> > - local_bh_enable();
> > -}
> > -
> > -static int mcryptd_hash_digest_enqueue(struct ahash_request *req)
> > -{
> > - return mcryptd_hash_enqueue(req, mcryptd_hash_digest);
> > -}
> > -
> > -static int mcryptd_hash_export(struct ahash_request *req, void *out)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> > -
> > - return crypto_ahash_export(&rctx->areq, out);
> > -}
> > -
> > -static int mcryptd_hash_import(struct ahash_request *req, const void *in)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> > -
> > - return crypto_ahash_import(&rctx->areq, in);
> > -}
> > -
> > -static int mcryptd_create_hash(struct crypto_template *tmpl, struct rtattr **tb,
> > - struct mcryptd_queue *queue)
> > -{
> > - struct hashd_instance_ctx *ctx;
> > - struct ahash_instance *inst;
> > - struct hash_alg_common *halg;
> > - struct crypto_alg *alg;
> > - u32 type = 0;
> > - u32 mask = 0;
> > - int err;
> > -
> > - if (!mcryptd_check_internal(tb, &type, &mask))
> > - return -EINVAL;
> > -
> > - halg = ahash_attr_alg(tb[1], type, mask);
> > - if (IS_ERR(halg))
> > - return PTR_ERR(halg);
> > -
> > - alg = &halg->base;
> > - pr_debug("crypto: mcryptd hash alg: %s\n", alg->cra_name);
> > - inst = mcryptd_alloc_instance(alg, ahash_instance_headroom(),
> > - sizeof(*ctx));
> > - err = PTR_ERR(inst);
> > - if (IS_ERR(inst))
> > - goto out_put_alg;
> > -
> > - ctx = ahash_instance_ctx(inst);
> > - ctx->queue = queue;
> > -
> > - err = crypto_init_ahash_spawn(&ctx->spawn, halg,
> > - ahash_crypto_instance(inst));
> > - if (err)
> > - goto out_free_inst;
> > -
> > - inst->alg.halg.base.cra_flags = CRYPTO_ALG_ASYNC |
> > - (alg->cra_flags & (CRYPTO_ALG_INTERNAL |
> > - CRYPTO_ALG_OPTIONAL_KEY));
> > -
> > - inst->alg.halg.digestsize = halg->digestsize;
> > - inst->alg.halg.statesize = halg->statesize;
> > - inst->alg.halg.base.cra_ctxsize = sizeof(struct mcryptd_hash_ctx);
> > -
> > - inst->alg.halg.base.cra_init = mcryptd_hash_init_tfm;
> > - inst->alg.halg.base.cra_exit = mcryptd_hash_exit_tfm;
> > -
> > - inst->alg.init = mcryptd_hash_init_enqueue;
> > - inst->alg.update = mcryptd_hash_update_enqueue;
> > - inst->alg.final = mcryptd_hash_final_enqueue;
> > - inst->alg.finup = mcryptd_hash_finup_enqueue;
> > - inst->alg.export = mcryptd_hash_export;
> > - inst->alg.import = mcryptd_hash_import;
> > - if (crypto_hash_alg_has_setkey(halg))
> > - inst->alg.setkey = mcryptd_hash_setkey;
> > - inst->alg.digest = mcryptd_hash_digest_enqueue;
> > -
> > - err = ahash_register_instance(tmpl, inst);
> > - if (err) {
> > - crypto_drop_ahash(&ctx->spawn);
> > -out_free_inst:
> > - kfree(inst);
> > - }
> > -
> > -out_put_alg:
> > - crypto_mod_put(alg);
> > - return err;
> > -}
> > -
> > -static struct mcryptd_queue mqueue;
> > -
> > -static int mcryptd_create(struct crypto_template *tmpl, struct rtattr **tb)
> > -{
> > - struct crypto_attr_type *algt;
> > -
> > - algt = crypto_get_attr_type(tb);
> > - if (IS_ERR(algt))
> > - return PTR_ERR(algt);
> > -
> > - switch (algt->type & algt->mask & CRYPTO_ALG_TYPE_MASK) {
> > - case CRYPTO_ALG_TYPE_DIGEST:
> > - return mcryptd_create_hash(tmpl, tb, &mqueue);
> > - break;
> > - }
> > -
> > - return -EINVAL;
> > -}
> > -
> > -static void mcryptd_free(struct crypto_instance *inst)
> > -{
> > - struct mcryptd_instance_ctx *ctx = crypto_instance_ctx(inst);
> > - struct hashd_instance_ctx *hctx = crypto_instance_ctx(inst);
> > -
> > - switch (inst->alg.cra_flags & CRYPTO_ALG_TYPE_MASK) {
> > - case CRYPTO_ALG_TYPE_AHASH:
> > - crypto_drop_ahash(&hctx->spawn);
> > - kfree(ahash_instance(inst));
> > - return;
> > - default:
> > - crypto_drop_spawn(&ctx->spawn);
> > - kfree(inst);
> > - }
> > -}
> > -
> > -static struct crypto_template mcryptd_tmpl = {
> > - .name = "mcryptd",
> > - .create = mcryptd_create,
> > - .free = mcryptd_free,
> > - .module = THIS_MODULE,
> > -};
> > -
> > -struct mcryptd_ahash *mcryptd_alloc_ahash(const char *alg_name,
> > - u32 type, u32 mask)
> > -{
> > - char mcryptd_alg_name[CRYPTO_MAX_ALG_NAME];
> > - struct crypto_ahash *tfm;
> > -
> > - if (snprintf(mcryptd_alg_name, CRYPTO_MAX_ALG_NAME,
> > - "mcryptd(%s)", alg_name) >= CRYPTO_MAX_ALG_NAME)
> > - return ERR_PTR(-EINVAL);
> > - tfm = crypto_alloc_ahash(mcryptd_alg_name, type, mask);
> > - if (IS_ERR(tfm))
> > - return ERR_CAST(tfm);
> > - if (tfm->base.__crt_alg->cra_module != THIS_MODULE) {
> > - crypto_free_ahash(tfm);
> > - return ERR_PTR(-EINVAL);
> > - }
> > -
> > - return __mcryptd_ahash_cast(tfm);
> > -}
> > -EXPORT_SYMBOL_GPL(mcryptd_alloc_ahash);
> > -
> > -struct crypto_ahash *mcryptd_ahash_child(struct mcryptd_ahash *tfm)
> > -{
> > - struct mcryptd_hash_ctx *ctx = crypto_ahash_ctx(&tfm->base);
> > -
> > - return ctx->child;
> > -}
> > -EXPORT_SYMBOL_GPL(mcryptd_ahash_child);
> > -
> > -struct ahash_request *mcryptd_ahash_desc(struct ahash_request *req)
> > -{
> > - struct mcryptd_hash_request_ctx *rctx = ahash_request_ctx(req);
> > - return &rctx->areq;
> > -}
> > -EXPORT_SYMBOL_GPL(mcryptd_ahash_desc);
> > -
> > -void mcryptd_free_ahash(struct mcryptd_ahash *tfm)
> > -{
> > - crypto_free_ahash(&tfm->base);
> > -}
> > -EXPORT_SYMBOL_GPL(mcryptd_free_ahash);
> > -
> > -static int __init mcryptd_init(void)
> > -{
> > - int err, cpu;
> > - struct mcryptd_flush_list *flist;
> > -
> > - mcryptd_flist = alloc_percpu(struct mcryptd_flush_list);
> > - for_each_possible_cpu(cpu) {
> > - flist = per_cpu_ptr(mcryptd_flist, cpu);
> > - INIT_LIST_HEAD(&flist->list);
> > - mutex_init(&flist->lock);
> > - }
> > -
> > - err = mcryptd_init_queue(&mqueue, MCRYPTD_MAX_CPU_QLEN);
> > - if (err) {
> > - free_percpu(mcryptd_flist);
> > - return err;
> > - }
> > -
> > - err = crypto_register_template(&mcryptd_tmpl);
> > - if (err) {
> > - mcryptd_fini_queue(&mqueue);
> > - free_percpu(mcryptd_flist);
> > - }
> > -
> > - return err;
> > -}
> > -
> > -static void __exit mcryptd_exit(void)
> > -{
> > - mcryptd_fini_queue(&mqueue);
> > - crypto_unregister_template(&mcryptd_tmpl);
> > - free_percpu(mcryptd_flist);
> > -}
> > -
> > -subsys_initcall(mcryptd_init);
> > -module_exit(mcryptd_exit);
> > -
> > -MODULE_LICENSE("GPL");
> > -MODULE_DESCRIPTION("Software async multibuffer crypto daemon");
> > -MODULE_ALIAS_CRYPTO("mcryptd");
> > diff --git a/include/crypto/mcryptd.h b/include/crypto/mcryptd.h
> > deleted file mode 100644
> > index b67404fc4b34..000000000000
> > --- a/include/crypto/mcryptd.h
> > +++ /dev/null
> > @@ -1,114 +0,0 @@
> > -/* SPDX-License-Identifier: GPL-2.0 */
> > -/*
> > - * Software async multibuffer crypto daemon headers
> > - *
> > - * Author:
> > - * Tim Chen <[email protected]>
> > - *
> > - * Copyright (c) 2014, Intel Corporation.
> > - */
> > -
> > -#ifndef _CRYPTO_MCRYPT_H
> > -#define _CRYPTO_MCRYPT_H
> > -
> > -#include <linux/crypto.h>
> > -#include <linux/kernel.h>
> > -#include <crypto/hash.h>
> > -
> > -struct mcryptd_ahash {
> > - struct crypto_ahash base;
> > -};
> > -
> > -static inline struct mcryptd_ahash *__mcryptd_ahash_cast(
> > - struct crypto_ahash *tfm)
> > -{
> > - return (struct mcryptd_ahash *)tfm;
> > -}
> > -
> > -struct mcryptd_cpu_queue {
> > - struct crypto_queue queue;
> > - spinlock_t q_lock;
> > - struct work_struct work;
> > -};
> > -
> > -struct mcryptd_queue {
> > - struct mcryptd_cpu_queue __percpu *cpu_queue;
> > -};
> > -
> > -struct mcryptd_instance_ctx {
> > - struct crypto_spawn spawn;
> > - struct mcryptd_queue *queue;
> > -};
> > -
> > -struct mcryptd_hash_ctx {
> > - struct crypto_ahash *child;
> > - struct mcryptd_alg_state *alg_state;
> > -};
> > -
> > -struct mcryptd_tag {
> > - /* seq number of request */
> > - unsigned seq_num;
> > - /* arrival time of request */
> > - unsigned long arrival;
> > - unsigned long expire;
> > - int cpu;
> > -};
> > -
> > -struct mcryptd_hash_request_ctx {
> > - struct list_head waiter;
> > - crypto_completion_t complete;
> > - struct mcryptd_tag tag;
> > - struct crypto_hash_walk walk;
> > - u8 *out;
> > - int flag;
> > - struct ahash_request areq;
> > -};
> > -
> > -struct mcryptd_ahash *mcryptd_alloc_ahash(const char *alg_name,
> > - u32 type, u32 mask);
> > -struct crypto_ahash *mcryptd_ahash_child(struct mcryptd_ahash *tfm);
> > -struct ahash_request *mcryptd_ahash_desc(struct ahash_request *req);
> > -void mcryptd_free_ahash(struct mcryptd_ahash *tfm);
> > -void mcryptd_flusher(struct work_struct *work);
> > -
> > -enum mcryptd_req_type {
> > - MCRYPTD_NONE,
> > - MCRYPTD_UPDATE,
> > - MCRYPTD_FINUP,
> > - MCRYPTD_DIGEST,
> > - MCRYPTD_FINAL
> > -};
> > -
> > -struct mcryptd_alg_cstate {
> > - unsigned long next_flush;
> > - unsigned next_seq_num;
> > - bool flusher_engaged;
> > - struct delayed_work flush;
> > - int cpu;
> > - struct mcryptd_alg_state *alg_state;
> > - void *mgr;
> > - spinlock_t work_lock;
> > - struct list_head work_list;
> > - struct list_head flush_list;
> > -};
> > -
> > -struct mcryptd_alg_state {
> > - struct mcryptd_alg_cstate __percpu *alg_cstate;
> > - unsigned long (*flusher)(struct mcryptd_alg_cstate *cstate);
> > -};
> > -
> > -/* return delay in jiffies from current time */
> > -static inline unsigned long get_delay(unsigned long t)
> > -{
> > - long delay;
> > -
> > - delay = (long) t - (long) jiffies;
> > - if (delay <= 0)
> > - return 0;
> > - else
> > - return (unsigned long) delay;
> > -}
> > -
> > -void mcryptd_arm_flusher(struct mcryptd_alg_cstate *cstate, unsigned long delay);
> > -
> > -#endif
> >
>
On Mon, Aug 27, 2018 at 04:19:53PM -0700, Megha Dey wrote:
> On Mon, 2018-08-27 at 15:28 -0700, Tim Chen wrote:
> > On 08/22/2018 01:51 AM, Ard Biesheuvel wrote:
> > > As it turns out, the AVX2 multibuffer SHA routines are currently
> > > broken [0], in a way that would have likely been noticed if this
> > > code were in wide use. Since the code is too complicated to be
> > > maintained by anyone except the original authors, and since the
> > > performance benefits for real-world use cases are debatable to
> > > begin with, it is better to drop it entirely for the moment.
> > >
> > > [0] https://marc.info/?l=linux-crypto-vger&m=153476243825350&w=2
> >
> > Sorry I was out of the loop for a while and haven't been following
> > the code too closely.
> >
> > Megha is maintaining the code now. Before we pull the code,
> > please give us a chance to fix it first.
> >
> > Thanks.
> >
> > Tim
> >
>
> Hi,
>
> I am working to find a fix for these corner cases. If possible, we would
> like to fix the issues instead of removing the code altogether.
I think it has taken way too long to fix these issues. The fact
that these issues have existed for so long also means that hardly
anyone uses these mb algorithms.
So I think it is best if we remove everything and then add them
back after a proper review process.
Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
On Wed, Aug 22, 2018 at 10:51:44AM +0200, Ard Biesheuvel wrote:
> As it turns out, the AVX2 multibuffer SHA routines are currently
> broken [0], in a way that would have likely been noticed if this
> code were in wide use. Since the code is too complicated to be
> maintained by anyone except the original authors, and since the
> performance benefits for real-world use cases are debatable to
> begin with, it is better to drop it entirely for the moment.
>
> [0] https://marc.info/?l=linux-crypto-vger&m=153476243825350&w=2
>
> Suggested-by: Eric Biggers <[email protected]>
> Cc: Megha Dey <[email protected]>
> Cc: Tim Chen <[email protected]>
> Cc: Geert Uytterhoeven <[email protected]>
> Cc: Martin Schwidefsky <[email protected]>
> Cc: Heiko Carstens <[email protected]>
> Cc: Thomas Gleixner <[email protected]>
> Cc: Ingo Molnar <[email protected]>
> Signed-off-by: Ard Biesheuvel <[email protected]>
> ---
> MAINTAINERS | 8 -
> arch/m68k/configs/amiga_defconfig | 1 -
> arch/m68k/configs/apollo_defconfig | 1 -
> arch/m68k/configs/atari_defconfig | 1 -
> arch/m68k/configs/bvme6000_defconfig | 1 -
> arch/m68k/configs/hp300_defconfig | 1 -
> arch/m68k/configs/mac_defconfig | 1 -
> arch/m68k/configs/multi_defconfig | 1 -
> arch/m68k/configs/mvme147_defconfig | 1 -
> arch/m68k/configs/mvme16x_defconfig | 1 -
> arch/m68k/configs/q40_defconfig | 1 -
> arch/m68k/configs/sun3_defconfig | 1 -
> arch/m68k/configs/sun3x_defconfig | 1 -
> arch/s390/configs/debug_defconfig | 1 -
> arch/s390/configs/performance_defconfig | 1 -
> arch/x86/crypto/Makefile | 3 -
> arch/x86/crypto/sha1-mb/Makefile | 14 -
> arch/x86/crypto/sha1-mb/sha1_mb.c | 1011 ----------------
> arch/x86/crypto/sha1-mb/sha1_mb_ctx.h | 134 ---
> arch/x86/crypto/sha1-mb/sha1_mb_mgr.h | 110 --
> .../crypto/sha1-mb/sha1_mb_mgr_datastruct.S | 287 -----
> .../crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S | 304 -----
> .../crypto/sha1-mb/sha1_mb_mgr_init_avx2.c | 64 -
> .../crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S | 209 ----
> arch/x86/crypto/sha1-mb/sha1_x8_avx2.S | 492 --------
> arch/x86/crypto/sha256-mb/Makefile | 14 -
> arch/x86/crypto/sha256-mb/sha256_mb.c | 1013 ----------------
> arch/x86/crypto/sha256-mb/sha256_mb_ctx.h | 134 ---
> arch/x86/crypto/sha256-mb/sha256_mb_mgr.h | 108 --
> .../sha256-mb/sha256_mb_mgr_datastruct.S | 304 -----
> .../sha256-mb/sha256_mb_mgr_flush_avx2.S | 307 -----
> .../sha256-mb/sha256_mb_mgr_init_avx2.c | 65 -
> .../sha256-mb/sha256_mb_mgr_submit_avx2.S | 214 ----
> arch/x86/crypto/sha256-mb/sha256_x8_avx2.S | 598 ----------
> arch/x86/crypto/sha512-mb/Makefile | 12 -
> arch/x86/crypto/sha512-mb/sha512_mb.c | 1047 -----------------
> arch/x86/crypto/sha512-mb/sha512_mb_ctx.h | 128 --
> arch/x86/crypto/sha512-mb/sha512_mb_mgr.h | 104 --
> .../sha512-mb/sha512_mb_mgr_datastruct.S | 281 -----
> .../sha512-mb/sha512_mb_mgr_flush_avx2.S | 297 -----
> .../sha512-mb/sha512_mb_mgr_init_avx2.c | 69 --
> .../sha512-mb/sha512_mb_mgr_submit_avx2.S | 224 ----
> arch/x86/crypto/sha512-mb/sha512_x4_avx2.S | 531 ---------
> crypto/Kconfig | 62 -
> crypto/Makefile | 1 -
> crypto/mcryptd.c | 675 -----------
> include/crypto/mcryptd.h | 114 --
> 47 files changed, 8952 deletions(-)
> delete mode 100644 arch/x86/crypto/sha1-mb/Makefile
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb.c
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_ctx.h
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr.h
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S
> delete mode 100644 arch/x86/crypto/sha1-mb/sha1_x8_avx2.S
> delete mode 100644 arch/x86/crypto/sha256-mb/Makefile
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb.c
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_ctx.h
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr.h
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_datastruct.S
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S
> delete mode 100644 arch/x86/crypto/sha256-mb/sha256_x8_avx2.S
> delete mode 100644 arch/x86/crypto/sha512-mb/Makefile
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb.c
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_ctx.h
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr.h
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_datastruct.S
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S
> delete mode 100644 arch/x86/crypto/sha512-mb/sha512_x4_avx2.S
> delete mode 100644 crypto/mcryptd.c
> delete mode 100644 include/crypto/mcryptd.h
Patch applied. Thanks.
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt