Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp93391pxb; Thu, 14 Jan 2021 00:24:05 -0800 (PST) X-Google-Smtp-Source: ABdhPJwSCpSKhiYQOXf2bIjjDUIapErrACgf2TCUIUVXfU+Bugkq+948Nw2KYk1pQO6xsM6zeNzP X-Received: by 2002:a50:f304:: with SMTP id p4mr4804979edm.118.1610612645323; Thu, 14 Jan 2021 00:24:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610612645; cv=none; d=google.com; s=arc-20160816; b=cuewCbbkoHVpxJXGbO2P0UkJF+AF2wYiL8PpvRcwCwb4fpxd9uWFGRmQeD0cqkBlho KO4fD2q+iEulkRsGkyNq2LkY+Rb5x3Lh/oyq9seT6vMLlUOo+rTtKwH4DWZcJy4dO65c jFVJ2owErra0AQdnFJSh1266XghYmxF/3fbjwD9RM7EnSfiqn9MrzKx70CwlW7FaIqNG fVFUsMG5CAgjaqG8u7lcWJmwG8yEVaaoM/5OKiWtHeKLLz6fyN4P7JuZ74OjQO7udhdE dZYFNwNnQfQ7iAYU65FHkG8lgd5tCeEZ7URvWTwjFI3oPb4SlrvBoOvSuaiCPa24B2qq Wgrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=PBIP388eh1NIty3RhMag+1Sz2F/sMS/9oAeapTrqRog=; b=en6wkf2/GsQnKxIYTleMwVuK+1fgeVgUMc3138nKQwW/MRfQ9AxhIDNh4GgO7+AKiq RQvv6Y5xocd3ftw5dwUHNijC5xm9fe3DgTuDaMhQyhEL+vizjBBfLmpvxfQzAMfVJ3+t 6DEBYm+3TyrWgReDsmIPWiZwMtmvZWznWSrUvrOpNKblOZ2q1VMwCjTeOJxgYXllSC3T iVlfWcKM3TqRIWx5lIzPGGdOhR79VfuCA+WWY8p06596o81toXlJQl6VvIKEqxCZpJ6D kkDZIjfYgoW7/fE1q15GBXUfokbMPQ+nuJZY+nWi4wKnktw3twfK24S07Z4EW/V3ZU/b SsVQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fW62+OOb; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g20si176197ejm.29.2021.01.14.00.23.45; Thu, 14 Jan 2021 00:24:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fW62+OOb; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726204AbhANIXn (ORCPT + 99 others); Thu, 14 Jan 2021 03:23:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:33406 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726089AbhANIXm (ORCPT ); Thu, 14 Jan 2021 03:23:42 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 905AB23A05; Thu, 14 Jan 2021 08:23:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1610612581; bh=tcP3FAxNWPO+N4kiJcS2Bq7JbQemWOqO+dy+LA9kwSQ=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=fW62+OOb01l+2muJ3PQpw2bl9Hl68xyktuBP5/yvFz8bThGasc6XuEvN3347R7OHS Zxj4CRejF/9OCWcIwgsX2O3p9r/zIuRVrAJtPHvDppCHszohOe6j+laJqeWriLVmsb r4ZvRuGrX8BgeO5v4RYacFocrVlpJSKkhnIk9ft6JlhsTQ+RwCe6Z1GprQVYh1dXJJ QXA2B0rGvmfaeZc+5SwMzIr3cvV0POh6rsIPze19UXZO8sNCbMdsluc4UMZvyd9Ak4 MDdERRTnBG3S8qBON0EhGZE1ZPo6Obirf4fvJVRYwZqvVQIKebGbpSk/Tr9xgDKI2S vflt6WRXuuWJA== Received: by mail-ot1-f50.google.com with SMTP id n42so4452023ota.12; Thu, 14 Jan 2021 00:23:01 -0800 (PST) X-Gm-Message-State: AOAM532YflfVmK274y8Q1D8kcN3dz0OahAdegPiAKEJNKsYix2Mwf1Nd +S6G3SJY0UfcgY+MjGLWvQNlyi+uB1/DzdFt3sw= X-Received: by 2002:a05:6830:1c24:: with SMTP id f4mr3779599ote.108.1610612580759; Thu, 14 Jan 2021 00:23:00 -0800 (PST) MIME-Version: 1.0 References: <20201218170106.23280-1-ardb@kernel.org> <20201219020433.GA11077@gondor.apana.org.au> In-Reply-To: <20201219020433.GA11077@gondor.apana.org.au> From: Ard Biesheuvel Date: Thu, 14 Jan 2021 09:22:49 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [RFC PATCH 0/5] running kernel mode SIMD with softirqs disabled To: Herbert Xu Cc: Linux Crypto Mailing List , Linux ARM , Linux Kernel Mailing List , Dave Martin , Mark Brown , Eric Biggers , Will Deacon , Catalin Marinas , Thomas Gleixner , Peter Zijlstra , Sebastian Andrzej Siewior , Ingo Molnar Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Sat, 19 Dec 2020 at 03:05, Herbert Xu wrote: > > On Fri, Dec 18, 2020 at 06:01:01PM +0100, Ard Biesheuvel wrote: > > > > Questions: > > - what did I miss or break horribly? > > - does any of this matter for RT? AIUI, RT runs softirqs from a dedicated > > kthread, so I don't think it cares. > > - what would be a reasonable upper bound to keep softirqs disabled? I suppose > > 100s of cycles or less is overkill, but I'm not sure how to derive a better > > answer. > > - could we do the same on x86, now that kernel_fpu_begin/end is no longer > > expensive? > > If this approach works not only would it allow us to support the > synchronous users better, it would also allow us to remove loads > of cruft in the Crypto API that exist solely to support these SIMD > code paths. > > So I eagerly await the assessment of the scheduler/RT folks on this > approach. > Any insights here? Is there a ballpark upper bound for the duration of a softirq disabled section? Other reasons why dis/enabling softirq handling is a bad idea?