Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3450563ybb; Mon, 13 Apr 2020 08:19:23 -0700 (PDT) X-Google-Smtp-Source: APiQypIBj6wzSrsiBS6CKH8A6zcnbPgjy5ORAVjfW+23PU+uDdU4nogMLnTySzwhfRkYT0Vj3HkR X-Received: by 2002:a50:a685:: with SMTP id e5mr12718983edc.243.1586791163010; Mon, 13 Apr 2020 08:19:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586791162; cv=none; d=google.com; s=arc-20160816; b=JOQhjWx9v2Z8gHRJ+ZetzIZ5zfqcky89dL9BrqtV6qtmQwgGTozG7+nKH7/6RW2FvN BCZ8SkNp5uWq1TSUza4n5YvBHWWM1mp2njD0xZvmnct+ewbFlNfYNoepMnWMInLKPLz3 /enVd/BGIVMdk2pUvoiRSb1M1qHabKsqujigT1Z6uGiU75QaZdhonJccRXuThKxUs+B/ X7DP/Ze3VvSZ28laS4GqE4lxEBmL/v7mX6QvlHhaX1XBWISS1MHaNLMmnw6AYPEMUzFq cRml0crucI9uxpUtIhAqVZzQ9kACGO60S7UdPRF21cNZLxMxOgrUWFbCTSc7ggVlipp9 Uisw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=XJDPFo8fqcYWDRjonHZXLoQ3lE4u0WPkkJfrXTORSrw=; b=EZz18jjpOrYjrHidaZb1eAmjQWBvN0ubdZd7oSNPiagZ551zjt+ejluHsOaHSCUq/2 HoScsxBvgr4tS2VQXVSygbc0JX0DwH/Ln3IrBVssE/4nGAmEbWfAIXWpOwVxbVC/t+bb xBNosZtg21id3L47um8bn9D0bI/xKIWRcyeKNkRF1nXNiEu8UbtDyO9P2Bc4qOm3Vu+b 3Mk0AlRQNjGAfUb5fPJkyNKtAxLsRi+fsoM2OzUhLr2csy6J4NkycULEbn5b3LDqGt4F mVpZfv8E3ZKP3KhL5SVcwbA2ezbdjFMAnC3vK3cl3Kw0XjUky2fT165iK7pejqJOmF2u +lYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="qIb/BKe1"; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z21si750895edq.21.2020.04.13.08.18.48; Mon, 13 Apr 2020 08:19:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="qIb/BKe1"; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730079AbgDMNr5 (ORCPT + 99 others); Mon, 13 Apr 2020 09:47:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:42648 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730085AbgDMNr5 (ORCPT ); Mon, 13 Apr 2020 09:47:57 -0400 Received: from mail-wr1-f51.google.com (mail-wr1-f51.google.com [209.85.221.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8BBA42078A for ; Mon, 13 Apr 2020 13:47:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1586785676; bh=ykz+oUdvZuqEeDitw3NKWogAtpy7iDFRDIavWOYwXsI=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=qIb/BKe1WGVnyRqen+EPf0MJ6Jpw2bJ57cM9BPkLsTC7lJGw44gfhUIOYND6shFsL kZfWb9msZ20sVNUnI7nRI7m6I+isWJ7hf00dg3AdAi3lulFjTETgdz6EZs3ufU+JzD HE8PMTUEVCobpNs+Ag5yg5t9/My1MEtC5R6NIpus= Received: by mail-wr1-f51.google.com with SMTP id u13so9719763wrp.3 for ; Mon, 13 Apr 2020 06:47:56 -0700 (PDT) X-Gm-Message-State: AGi0PuZanKPa7aGEZBHi/VPqT8uEiyqGpL3w2yJz8yNOgp0bi0H/VGYS akCuikKUuyDgF5rhPxciqCUkRhm2ZCbqryJP6cHHsQ== X-Received: by 2002:a5d:4fcf:: with SMTP id h15mr18483790wrw.262.1586785674798; Mon, 13 Apr 2020 06:47:54 -0700 (PDT) MIME-Version: 1.0 References: <1584100028-21279-1-git-send-email-schalla@marvell.com> <20200320053149.GC1315@sol.localdomain> In-Reply-To: From: Ard Biesheuvel Date: Mon, 13 Apr 2020 15:47:43 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [EXT] Re: [PATCH v2 0/4] Add Support for Marvell OcteonTX Cryptographic To: Srujana Challa Cc: Eric Biggers , "herbert@gondor.apana.org.au" , "davem@davemloft.net" , "linux-crypto@vger.kernel.org" , Narayana Prasad Raju Athreya , Suheil Chandran , "arno@natisbad.org" , "bbrezillon@kernel.org" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, 13 Apr 2020 at 15:21, Srujana Challa wrote: > > > Subject: RE: [EXT] Re: [PATCH v2 0/4] Add Support for Marvell OcteonTX > > Cryptographic > > > > > On Fri, 20 Mar 2020 at 06:47, Srujana Challa wr= ote: > > > > > > > > > On Fri, Mar 13, 2020 at 05:17:04PM +0530, Srujana Challa wrote: > > > > > > The following series adds support for Marvell Cryptographic Acc= elerarion > > > > > > Unit (CPT) on OcteonTX CN83XX SoC. > > > > > > > > > > > > Changes since v1: > > > > > > * Replaced CRYPTO_BLKCIPHER with CRYPTO_SKCIPHER in Kconfig. > > > > > > > > > > > > Srujana Challa (4): > > > > > > drivers: crypto: create common Kconfig and Makefile for Marve= ll > > > > > > drivers: crypto: add support for OCTEON TX CPT engine > > > > > > drivers: crypto: add the Virtual Function driver for CPT > > > > > > crypto: marvell: enable OcteonTX cpt options for build > > > > > > > > > > There's no mention of testing. Did you try > > > > > CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=3Dy? > > > > > > > > > Yes, the crypto self-tests are passed. > > > > > > *which* selftests are passed? Please confirm that they all passed wit= h > > > that kconfig option set > > Apologies. I have overlooked the config option, I thought it was > > CONFIG_CRYPTO_MANAGER_DISABLE_TESTS, all crypto self-tests are passed > > with this option disabled. I have started verifying with > > CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=3Dy, I am getting few errors for > > unsupported input lengths, will submit the patch with fixes. > > We confirmed that the failures are with unsupported lengths on our hardwa= re, for some lengths we can resolve the issue by having validation checks i= n the driver but for some unsupported cases "testmgr.c" is excepting always= success, I am still unsure how to fix/prevent these kind of failures. Can = anyone please kindly help me out how to proceed on this issue. > Thanks for your help. You need to allocate fallbacks for the modes that your driver cannot support. There are plenty of examples of that in the kernel tree.