Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1023775pxj; Fri, 21 May 2021 04:50:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzLc8l+XBl0jSGH1JXVEgihBJKgV9q2EcPNYtDpOdhQ8BJaYyqooY0czBtB7BoHyyPypbY4 X-Received: by 2002:a17:906:d14b:: with SMTP id br11mr10067535ejb.490.1621597846853; Fri, 21 May 2021 04:50:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621597846; cv=none; d=google.com; s=arc-20160816; b=HoA1t/3wSgLHwpTXJCxXwmFAM7BIXkRu33nlgOrHhD0xI0JBDtH/GG7ipIcxntBEsB OevL2x/4obrHuLXK093dbP3nm7ddTbaOSsSOOJVC4XArh+4qT3TJc2xWDr8gRAiEDSqh htWtayFSBti2MJ6KSar8q38olVfZhyK6Urh4iggYS2sJSq77CTv3hNqdVZNJMDZm0dWr tdCIF3kaqaf5WhUDt9YnPCNxawy6sRxYp9DHOfpI8ZwTKZ1YIe/7+VeXscbVlWsiC1dK 94Ph9s3B8J2GZrPTUXhv77VqgkaEo/i8IK+8/xXyuts2acv/FX9QYzbQKncN2ueOoNwe Tg/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=Qn2ETLbGgACx+D7EFsZ87QhmBLnpZ6po869tPbKhQN0=; b=abdy0ky2jq/VCD4bCoCQGp4dkR4kVwCane3VkTqVXBpoT2vUCtP6fhPJUdTjGETHAe o5eCLR2FZ0H4MGymyNx/GCwZL455hL0gc1DH3kaYLnFXmZMT2AZuItGQlf/ngrAdhtaW OhTsK0IkawbkhX+Y5jgXnVI64XgUKZyjjK0qI7S6xtC/7LoVnPC3lqms1xkTFFD4xzfW RSpmuXTJMRPSx8urgoMzErw003D6Y8glf7XsWFnSfypqYHClRMyCoOkP5znsNqS42ny7 g7hOiaTvRYx7dV7FG6sEA5zBpdg4rR3qCGo/jkZ0L1z/X/EH21a9z2OAYcGRbV7gJ5t3 Z1Aw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=tttVzaju; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dp16si6517185ejc.200.2021.05.21.04.50.21; Fri, 21 May 2021 04:50:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=tttVzaju; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233003AbhEUKWa (ORCPT + 99 others); Fri, 21 May 2021 06:22:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:59106 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231186AbhEUKW2 (ORCPT ); Fri, 21 May 2021 06:22:28 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 26BA76135C; Fri, 21 May 2021 10:21:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1621592465; bh=N+w5QEO42mQlB9ymFmNmNrF3+V7f2xlncBeYmpsHWVs=; h=From:To:Cc:Subject:Date:From; b=tttVzajuy000G2FpHHokr6dTFG+sWZTx/MuVQO5Lr/P66zqYVA8/48HkDisGWhqla RTVGySsnv3LWGWeWLDXxXX60aVdCKjVHfpHuKPMwyTFh/Ctt/MkHqdqMI42b6maKXs EIpa/c8bYWJpq8jKFeantHrmroOr+rVoLfcxbe6DvjrETvJaRUs0jATQQeXQzLiwjO RGcROk8y8FOiccMFCfkCpTpWe4eUGGQ81Amip+VsEvWhrMnaKq6Txg/SiShzZOOFXG MemreCEArfNOJn+rgL1We0mOrMT/suTOOUdbXtnmZRZYPHoyrFH5hS39lUmwwSo7dM nxhXyk/iZvRiw== From: Ard Biesheuvel To: linux-crypto@vger.kernel.org Cc: linux-arm-kernel@lists.infradead.org, ebiggers@kernel.org, herbert@gondor.apana.org.au, will@kernel.org, kernel-team@android.com, Ard Biesheuvel Subject: [PATCH v5 0/5] running kernel mode SIMD with softirqs disabled Date: Fri, 21 May 2021 12:20:48 +0200 Message-Id: <20210521102053.66609-1-ardb@kernel.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This is a follow-up to [0], but given that the arm64 architectural pieces have been merged for arm64, the only remaining changes are crypto specific. Therefore, the audience has been reduced to those people who are somewhat more likely to care about these specifics. The AEAD and skcipher APIs may only be called from task or softirq context. This permits the arm64 AEAD and skcipher code to get rid of all scalar fallbacks, given that on this architecture, softirqs are now no longer served while the SIMD unit is being used in kernel mode, which means that the scalar fallbacks are never needed. These are removed in this series. Changes since v4: - drop skcipher_walk layer change to deal with zero sized walks - drop aead/skcipher layer sanity checks on invocations from hardirq context - add patch to clean up CCM a bit more after removing the SIMD code path Changes since v3: - clarify the nature of the issue addressed by patch #1, and apply the same fix to the skcipher walker - update patches #2 and #3 so that the failures can be observed by the crypto stats code [0] https://lore.kernel.org/linux-arm-kernel/20210302090118.30666-1-ardb@kernel.org/ Ard Biesheuvel (5): crypto: arm64/gcm-aes-ce - remove non-SIMD fallback path crypto: arm64/aes-neonbs - stop using SIMD helper for skciphers crypto: arm64/aes-ce - stop using SIMD helper for skciphers crypto: arm64/aes-ccm - remove non-SIMD fallback path crypto: arm64/aes-ccm - avoid by-ref argument for ce_aes_ccm_auth_data arch/arm64/crypto/Kconfig | 6 - arch/arm64/crypto/aes-ce-ccm-core.S | 24 +-- arch/arm64/crypto/aes-ce-ccm-glue.c | 194 ++++++------------ arch/arm64/crypto/aes-glue.c | 102 ++-------- arch/arm64/crypto/aes-neonbs-glue.c | 122 +----------- arch/arm64/crypto/ghash-ce-glue.c | 209 +++++--------------- 6 files changed, 141 insertions(+), 516 deletions(-) -- 2.20.1