Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp442265ybk; Wed, 13 May 2020 04:19:19 -0700 (PDT) X-Google-Smtp-Source: APiQypLVp6lGgXLjP+T20lBgeLUgK7Bwwa+QS0UpgQLrA2F3JW04NCueN3dZJsm5GarPYJ/ESx3X X-Received: by 2002:a17:906:90c1:: with SMTP id v1mr20756123ejw.322.1589368759696; Wed, 13 May 2020 04:19:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589368759; cv=none; d=google.com; s=arc-20160816; b=Xf+iaU6i3u0XF5X+ViPB+6ziSMCz9Uh9yh6Q7KdUS5C8WF2F7NIWz9PhClTgZFntDB cJFLT8NS5My9i2BgB/FlVC4DGLdS3sfbJ++v/O2qAVN73BPRvg00J1STprTGRRqX2EF9 24sorKQnt51QM80/UXPKWmh1F7GoyThG/+ivHWC0OcE63LAURhzn2RTM5cKXl0Lqff0u 1atxD8roH6q4MBDbCp4Ozeh0Z9rBmXl6fKRI1UCMZbI6amsohCQyI2/Umi2BjBOoKKHS NdFl/D8Sk2ql4mcaRfyR+5adyrgoCGMZFnhE4jodjWHHYc3Zz4W3pRXC5P7QcXnyGieX 1Xxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=en6Ymwx6VatC9YLucTDSyaUT57QiEwS/sMnY4809f1A=; b=GnJOXXPd5g5ZXsLQiZDMvdVBRD8eQf2TTnX9gHVUxEsFN2fcx7qp18YXY0C92Yppqc Oeguy8ax6LeiXa/PUwGcSPGSBeOGNkLDKkYRAP33szW4Nm1NlZ3pMh11occiLF53XRb3 UwnlLCv2c2cBt4LTeXLdh2giZr2fmFlfzPaQLih2kSA7cy1yAZp8UEzuM1xp/i2oKKBP 88o17x9Th2kIsPEXocM6SBtWM715uNjW22biT4mEH95uAfxVTkPQTWbr0niYI24vlcH/ XOzsvc5m52HtvMdYeXIuQ0oJwW2nSMGP/VC07nijw7L+PU0Nk7ArMvwz5p+yRlEzs5sS IZ2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SHQ5rOCE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p11si8749487ejj.491.2020.05.13.04.18.56; Wed, 13 May 2020 04:19:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SHQ5rOCE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387766AbgEMJzq (ORCPT + 99 others); Wed, 13 May 2020 05:55:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:59044 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388299AbgEMJzp (ORCPT ); Wed, 13 May 2020 05:55:45 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7270A20753; Wed, 13 May 2020 09:55:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589363743; bh=jBWitMYFdNu0214x8a7VCY4Sq+QrJC98y5VwtH5igU4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SHQ5rOCEqXBs0maeZWtTCY8XTo0vf20aLgNKyD6fnHAz+0/jP8t1dOay80InMws2i TXOGzOluB/eXPyG03fBKjL1NizzR/XaQ26dMRMrnDANG3tXjglRFKHZYdTIQ9nq6Zx ozfrxu2XqtsDGEyy04L5TAjmf4BOL3qoRDA7Pn7g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Jason A. Donenfeld" , Eric Biggers , Herbert Xu Subject: [PATCH 5.6 069/118] crypto: arch/nhpoly1305 - process in explicit 4k chunks Date: Wed, 13 May 2020 11:44:48 +0200 Message-Id: <20200513094423.857357935@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200513094417.618129545@linuxfoundation.org> References: <20200513094417.618129545@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jason A. Donenfeld commit a9a8ba90fa5857c2c8a0e32eef2159cec717da11 upstream. Rather than chunking via PAGE_SIZE, this commit changes the arch implementations to chunk in explicit 4k parts, so that calculations on maximum acceptable latency don't suddenly become invalid on platforms where PAGE_SIZE isn't 4k, such as arm64. Fixes: 0f961f9f670e ("crypto: x86/nhpoly1305 - add AVX2 accelerated NHPoly1305") Fixes: 012c82388c03 ("crypto: x86/nhpoly1305 - add SSE2 accelerated NHPoly1305") Fixes: a00fa0c88774 ("crypto: arm64/nhpoly1305 - add NEON-accelerated NHPoly1305") Fixes: 16aae3595a9d ("crypto: arm/nhpoly1305 - add NEON-accelerated NHPoly1305") Cc: stable@vger.kernel.org Signed-off-by: Jason A. Donenfeld Reviewed-by: Eric Biggers Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- arch/arm/crypto/nhpoly1305-neon-glue.c | 2 +- arch/arm64/crypto/nhpoly1305-neon-glue.c | 2 +- arch/x86/crypto/nhpoly1305-avx2-glue.c | 2 +- arch/x86/crypto/nhpoly1305-sse2-glue.c | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) --- a/arch/arm/crypto/nhpoly1305-neon-glue.c +++ b/arch/arm/crypto/nhpoly1305-neon-glue.c @@ -30,7 +30,7 @@ static int nhpoly1305_neon_update(struct return crypto_nhpoly1305_update(desc, src, srclen); do { - unsigned int n = min_t(unsigned int, srclen, PAGE_SIZE); + unsigned int n = min_t(unsigned int, srclen, SZ_4K); kernel_neon_begin(); crypto_nhpoly1305_update_helper(desc, src, n, _nh_neon); --- a/arch/arm64/crypto/nhpoly1305-neon-glue.c +++ b/arch/arm64/crypto/nhpoly1305-neon-glue.c @@ -30,7 +30,7 @@ static int nhpoly1305_neon_update(struct return crypto_nhpoly1305_update(desc, src, srclen); do { - unsigned int n = min_t(unsigned int, srclen, PAGE_SIZE); + unsigned int n = min_t(unsigned int, srclen, SZ_4K); kernel_neon_begin(); crypto_nhpoly1305_update_helper(desc, src, n, _nh_neon); --- a/arch/x86/crypto/nhpoly1305-avx2-glue.c +++ b/arch/x86/crypto/nhpoly1305-avx2-glue.c @@ -29,7 +29,7 @@ static int nhpoly1305_avx2_update(struct return crypto_nhpoly1305_update(desc, src, srclen); do { - unsigned int n = min_t(unsigned int, srclen, PAGE_SIZE); + unsigned int n = min_t(unsigned int, srclen, SZ_4K); kernel_fpu_begin(); crypto_nhpoly1305_update_helper(desc, src, n, _nh_avx2); --- a/arch/x86/crypto/nhpoly1305-sse2-glue.c +++ b/arch/x86/crypto/nhpoly1305-sse2-glue.c @@ -29,7 +29,7 @@ static int nhpoly1305_sse2_update(struct return crypto_nhpoly1305_update(desc, src, srclen); do { - unsigned int n = min_t(unsigned int, srclen, PAGE_SIZE); + unsigned int n = min_t(unsigned int, srclen, SZ_4K); kernel_fpu_begin(); crypto_nhpoly1305_update_helper(desc, src, n, _nh_sse2);