Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3634857pxb; Mon, 24 Jan 2022 14:03:37 -0800 (PST) X-Google-Smtp-Source: ABdhPJzkANywVC5aXuMW1fIvjUaaWi3esvhjJiYIAUCcCvCkGT1hv0t1RPVKZ4oemvIjM6Xx4vU2 X-Received: by 2002:a63:804a:: with SMTP id j71mr13196096pgd.48.1643061817721; Mon, 24 Jan 2022 14:03:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643061817; cv=none; d=google.com; s=arc-20160816; b=blAzElrqV2ua1dayUhVeG/9yCQjXliEkhs2b8zYtK7Vj8gcrmvmU2p/7fKP3knHzt6 rT7A1tAV3VK2zz4W67M4rU7u/mVNH3+2wsiURipXFrcSFjxPg1s9BZIe11GUbyRYvCLE XkFjwqgpgYJB+b6Wr+Wm4tLJ548XUG5VVJ/F9gX5ofaH8uB8246VsVgKZeEK1RhhL3wk CBgoyEIUksOJt/4kJbgQUkzxq09dk+m4WcD3DpOrw2mSUSJRDfh/bEnicnAe4Zivi457 HTjvJoer3tn26nkdJaz4EGegg3mOP7cxJpb40twXXqcOr+C5b1dfbkfGrrZVTO1k5Zlm 1kYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=D5B7o+AUBvjOLgDi2nrxxhdGaLAg1pKaRvimBRh3Mco=; b=uKg19GncFxSiToa+E1t4Y4ZVHUFrb0FvsTBrlpHAJUKyvxPYIlP+mo8vFj/YYQFCAK xz5I2AI3QpMSuyk0dgZsnPe20BC8G5kVWTmSMbSZmegQFmo2IIe4j+ytSZHJ5b4C34ev 7Ulo2vHpM1fkJBmlZS7+i83XL/xy6U7SiezJLE8wJzSIlUYAptFcaDOl6LYDVQbFabi/ FODASzImeucXARJ1raqjsFZintVr836xVSiDB4mxqpSkTyWMEeseuYCbPRNfxz8IWk8B BeMn5mLxaP/Yak9Tpbx6VD+F48gtdJlJ/cgKcc7pVs/L5hM8bSxCLNa7rQsAIshdJ1bV Co7g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ekvRSSrm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i6si409220pjh.96.2022.01.24.14.03.25; Mon, 24 Jan 2022 14:03:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ekvRSSrm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1574783AbiAXVuT (ORCPT + 99 others); Mon, 24 Jan 2022 16:50:19 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48754 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1448767AbiAXVNq (ORCPT ); Mon, 24 Jan 2022 16:13:46 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6F423C09F48F; Mon, 24 Jan 2022 12:11:07 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 360C4B81229; Mon, 24 Jan 2022 20:11:06 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 66800C340E5; Mon, 24 Jan 2022 20:11:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643055064; bh=CJ40P4ApaPT+yCkIt+R5SbXdg418MmTbXEyQxB9sxMU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ekvRSSrmktBXuhiQiXLkk3eUU4AdxXm4XC/CdNrsf9K9JB0u7EwFs3Z8AjWLTd+2E iNjXWYnRyAzTGChBzRBtmquEo7Z7GQZomT+qhEFhmZV/i0J9rBHO36xVrqfALBqMUa nwqOaNmQ+C3DgwPhtWH/wFsBWEsPit4TkWzgQjNs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jakub Kicinski , Ard Biesheuvel , Herbert Xu Subject: [PATCH 5.15 029/846] crypto: x86/aesni - dont require alignment of data Date: Mon, 24 Jan 2022 19:32:26 +0100 Message-Id: <20220124184101.923485350@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124184100.867127425@linuxfoundation.org> References: <20220124184100.867127425@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jakub Kicinski commit d480a26bdf872529919e7c30e17f79d0d7b8c4da upstream. x86 AES-NI routines can deal with unaligned data. Crypto context (key, iv etc.) have to be aligned but we take care of that separately by copying it onto the stack. We were feeding unaligned data into crypto routines up until commit 83c83e658863 ("crypto: aesni - refactor scatterlist processing") switched to use the full skcipher API which uses cra_alignmask to decide data alignment. This fixes 21% performance regression in kTLS. Tested by booting with CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=y (and running thru various kTLS packets). CC: stable@vger.kernel.org # 5.15+ Fixes: 83c83e658863 ("crypto: aesni - refactor scatterlist processing") Signed-off-by: Jakub Kicinski Acked-by: Ard Biesheuvel Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- arch/x86/crypto/aesni-intel_glue.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/arch/x86/crypto/aesni-intel_glue.c +++ b/arch/x86/crypto/aesni-intel_glue.c @@ -1107,7 +1107,7 @@ static struct aead_alg aesni_aeads[] = { .cra_flags = CRYPTO_ALG_INTERNAL, .cra_blocksize = 1, .cra_ctxsize = sizeof(struct aesni_rfc4106_gcm_ctx), - .cra_alignmask = AESNI_ALIGN - 1, + .cra_alignmask = 0, .cra_module = THIS_MODULE, }, }, { @@ -1124,7 +1124,7 @@ static struct aead_alg aesni_aeads[] = { .cra_flags = CRYPTO_ALG_INTERNAL, .cra_blocksize = 1, .cra_ctxsize = sizeof(struct generic_gcmaes_ctx), - .cra_alignmask = AESNI_ALIGN - 1, + .cra_alignmask = 0, .cra_module = THIS_MODULE, }, } };