Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4823057pxj; Wed, 12 May 2021 14:10:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwoiiVxnqkHExX+u+ZzNIeEigKMu4/9mEJX88daDkfNlgzAqBzxLpJQbMyjk7JQkiNXxBIh X-Received: by 2002:a17:906:3bc6:: with SMTP id v6mr40431240ejf.165.1620853823233; Wed, 12 May 2021 14:10:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620853823; cv=none; d=google.com; s=arc-20160816; b=rllatnlwS45XGwIm0GrFgGD/mEojTAYDZO4gPTYYxBmlwisQ+kzkAvqm5fkeo7jkg0 ulXVBezu/EWB2+A9HewaOwPczGKhVB84b6GBnb6voifasQMQHMsYFmNoFiF1Yd+tCjGe rf3zQHjKAThSbDiRnnAgviP9PDW1nSb3SgIstgv/yZmRLcotrNAb1HqyPBRahDL5OPVF jzQUGgq0UyuW7Fguq52HoD2ym4XLh3b0ZOZwJNtM5BJtct7drSue1hL5zoq2CplWDrKh CRyTTPD5beHtb8Bb7T5JYPr4koaVXPMj1NbFkCjM1igxU20WtmfWe8tK4ZRkTCnCmSQ9 C3FA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=HvgbDMmgbSMPuPAkco43ngeBnP2qFxEebUsYWErODco=; b=U8jqt6dxKsi5uSHMnfwV3z05EQruL0mz70cjyTwNi9TApimIWgpdwKfzJSDuNxAJGq HNj6If3fQG7KCQjnU0jp7MFpeFEp9LFtWdzuB68LNyPURZ7n4rugeYXWmiFGtyXBlqA0 9FdAjNKwJL5I7iFQxfzhTbjkknDfxd/IoRNgLJbWnktzCbMwBOQeupIaKJhaLYAtC/bE Tk/tKDL1KCVdLrYbrNW85LQU4g7RvD8QVi6W65KDAPaYgat3LMUGKbdRy1YIBB/VAiWe Bk/0xDROVSWYPo1EqJm1aLQfhC47vdW+jjujF4d6Z3KwgmnVs45bOlyNrlcMaAThRMQe A6WQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Rdka4BjJ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m10si1044035eji.560.2021.05.12.14.09.50; Wed, 12 May 2021 14:10:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Rdka4BjJ; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345779AbhELVIR (ORCPT + 99 others); Wed, 12 May 2021 17:08:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:57174 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344521AbhELUMa (ORCPT ); Wed, 12 May 2021 16:12:30 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id BAA43613FB; Wed, 12 May 2021 20:11:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1620850281; bh=3TFHlYbgs5TDv6kvL2Z+EmWCUhN1bJEXciDXrAKpvaw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Rdka4BjJS9gRKT1s96RPLFKpXqumhSWbtmiAwgtAtPvQBzC/DfutQrh8nkBo2UIX5 x5g9EWu3Kqo6bj5PIyBhaLECP60eGeLX2tdfHlH8+K4BWCCVQX1FQEuxYdsS5bkfy/ YDg5LXXyZzD0yewhKXuVaodgEHmWPgfiyaRTPac0RHhAoC6gDV4qugtg1rqKo6Y29w y40ut5X3jLWoqBiCKBgG8F8kNxd7cJ5cCkLOtMQf/ZQRCbbWFEmoZlmwL67nS6PDOB /YVZT/Mqlhj2h3tb7cHCRpBaeRsBGT0vZzhVaMnInn+rPX2+9PQrHhnJonvnwgdPeH /4nJqPHRhQt5w== Date: Wed, 12 May 2021 13:11:19 -0700 From: Eric Biggers To: Ard Biesheuvel Cc: linux-crypto@vger.kernel.org, linux-arm-kernel@lists.infradead.org, herbert@gondor.apana.org.au, will@kernel.org, kernel-team@android.com Subject: Re: [PATCH v3 0/7] running kernel mode SIMD with softirqs disabled Message-ID: References: <20210512184439.8778-1-ardb@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210512184439.8778-1-ardb@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, May 12, 2021 at 08:44:32PM +0200, Ard Biesheuvel wrote: > This is a follow-up to [0], but given that the arm64 architectural > pieces have been merged for arm64, the only remaining changes are crypto > specific. Therefore, the audience has been reduced to those people who > are likely to care about these specifics. > > Patch #1 addresses an issue in the skcipher walker which doesn't handle > zero sized AEAD inputs entirely consistently, which is uncovered by the > change in patch #7. > > Patches #2 and #3 add some sanity checks to the public AEAD and skcipher > APIs to limit their availibility to either task or softirq context > (which is the only way in which they are currently being used). Adding > this restriction permits the arm64 crypto code to get rid of all scalar > fallbacks, given that on this architecture, softirqs are no longer > served while the SIMD unit is being used in kernel mode, which means > that the scalar fallbacks are never needed. These are removed in the > remaining 4 patches. > > [0] https://lore.kernel.org/linux-arm-kernel/20210302090118.30666-1-ardb@kernel.org/ Did you check whether any updates to the self-tests in testmgr.c are warranted? Specifically, is disabling the use of SIMD for testing still something that makes sense? - Eric