Received: by 10.192.165.148 with SMTP id m20csp1820658imm; Thu, 26 Apr 2018 02:46:16 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqAzzz8vEGJZXq5jihOpeNdgUQuwEvqIEQq+1m/N5JwkbdobkwQiGqmZqUTOelJEU4HPKZ6 X-Received: by 2002:a17:902:7596:: with SMTP id j22-v6mr4541831pll.334.1524735976681; Thu, 26 Apr 2018 02:46:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524735976; cv=none; d=google.com; s=arc-20160816; b=XffMn2fUuYpjD8bimRVuYwRAAGgGaTeQwlZ+sl7hAJAt8cBbTcc/2qN+ET/YGzzQnA HPjHxQepD2ePdrTh4tTWq/W8nhUgcwRMVnOaPSE/pBcXBwBX9whcN/196K/nXfdXJlnV ongW5o7T1ppfpn0hmMyzfHlfswqekFf6d/fNQJG+7JK3S74oKoTACPKLzbZG16J3Xr9f fzvknscPwYPytU25a4P0kR0cNAQZOME5Tp3fQp4dkSkQ/rQF2rM7rNCDNi/5Ki8KBc4s eWpJERgRfkEska5cnYk2TKA6udSE4wVb2P/nB8yOIcZFABHnuGkVCo41OtYlTwSM0LW/ tJsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=wdSnEiVaTKi9nbG3S9JnnPf5xL/KOEOjuCoYDnGg2CM=; b=foznMZ7hXFjVeTH7UaPw4XJ/QNYDUzvFn4g0lXvsIVDOxrMkC1gOGK3KLBZyTf3mj2 1LTLJkEme5hkUp/apup16erRiYggZ9cSmaJMOz0keIFm/XiTzxVyyiTMJQKzzT00FbqX fFpS8qjHaM0ftTuELQ3E3+XtoV14gUa8Si58US4DjqmZYtE82CP7jW195s0lxUBmy0js MgkJKBzKoTK15oktOMHGAhfgco/uNZJOgHmuQNVVhPSAWrjOnpUThUyLVTkjgK8+noyh igu532snU/+WF5N3WmUkiicK4khlFx5lkR2joMdlmli03hIcL+lkMjETi1hWHkwiC5p4 62ug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t5si9705303pgp.594.2018.04.26.02.46.02; Thu, 26 Apr 2018 02:46:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754562AbeDZJo6 (ORCPT + 99 others); Thu, 26 Apr 2018 05:44:58 -0400 Received: from orcrist.hmeau.com ([104.223.48.154]:45352 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753629AbeDZJo4 (ORCPT ); Thu, 26 Apr 2018 05:44:56 -0400 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1fBdSQ-0002jg-Bk; Thu, 26 Apr 2018 17:44:54 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1fBdSH-0007He-NY; Thu, 26 Apr 2018 17:44:45 +0800 Date: Thu, 26 Apr 2018 17:44:45 +0800 From: Herbert Xu To: "Dey, Megha" Cc: "linux-kernel@vger.kernel.org" , "linux-crypto@vger.kernel.org" , "davem@davemloft.net" Subject: Re: [PATCH V8 1/5] crypto: Multi-buffer encryption infrastructure support Message-ID: <20180426094445.4jiwondmtbenepo2@gondor.apana.org.au> References: <1515542948-24041-1-git-send-email-megha.dey@linux.intel.com> <1515542948-24041-2-git-send-email-megha.dey@linux.intel.com> <20180118113905.GA19904@gondor.apana.org.au> <1516322661.2526.3.camel@megha-Z97X-UD7-TH> <20180316145351.GA6231@gondor.apana.org.au> <20180418110115.v2w3o5yfv4u3gc4r@gondor.apana.org.au> <20180419032525.6csodbz6lrksyudd@gondor.apana.org.au> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 25, 2018 at 01:14:26AM +0000, Dey, Megha wrote: > > Is there any existing implementation of async crypto algorithm that uses the above approach? The ones I could find are either sync, have an outer and inner algorithm or use cryptd. > > I tried removing the mcryptd layer and the outer algorithm and some plumbing to pass the correct structures, but see crashes.(obviously some errors in the plumbing) OK, you can't just remove it because the inner algorithm requires kernel_fpu_begin/kernel_fpu_end. So we do need two layers but I don't think we need cryptd or mcryptd. The existing simd wrapper should work just fine on the inner algorithm, provided that we add hash support to it. > I am not sure if we remove mcryptd, how would we queue work, flush partially completed jobs or call completions (currently done by mcryptd) if we simply call the inner algorithm. I don't think mcryptd is providing any real facility to the flushing apart from a helper. That same helper can live anywhere. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt