Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp2217176pxb; Fri, 17 Sep 2021 05:07:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyZH9a4s/ar/OfTyyUBGvtOAiAgLWCy6OmDsFB3gmMybXG8yniU9t6/cxtBef0wxVjyQX4v X-Received: by 2002:a05:6638:2611:: with SMTP id m17mr8530152jat.85.1631880466469; Fri, 17 Sep 2021 05:07:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631880466; cv=none; d=google.com; s=arc-20160816; b=q8Ri/NOu3KYGQBstdJWgbJAexCoA7XuKUepTwlGMWO4RC4PpriVYcZoKRzuNBxmZ/8 PcRTxv1cmmC0kbPPe2AhwFXpcP/cvjY4Fo8MN0xYHEy7ckZiXykkOyZs+9yZQ0cIvwKI G6M/dmJYJylySFXcerWZSXtirQkKcoVZXXLdU6plRMh2Mf4JgpLo0iUB7WLwt1jGlr2w Dm7BWoDA87bqwNgdWd06Bo4x5e407NGXiFBRB0tFmzkpFjVi8ATFU2N1qTSbgWH7O14Z PK7VFfiKwPuUGrgcBsTgJ3Z9OBj7ticOsyq5ulB12ezcwT9LlZVBWrrXC9uPgPwAz/lL FGcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=bUr6g9qEoU0shZiFStmhFEXZcaP/IF8A3ar6OeNvcxg=; b=x6ydzCgVk+ZcaK08v6YYonhZpUcXQQK/+8doTZ/vC95jp6dkbJNClY22Rmq4F7B+Qu yQng+cJ4goTBsrf/PLTTvsjllr3bqVBPm7IAaxoGBCurb3C/oHt1Tl0WzxUpQ2f16qQO GVi6DfcSDnnFUA2fJDdO6kuahvyl8ZxWOGGk5PHwtMqn5yRBWD9ll5nYbiUemuBvA8qD IOXozXd0P6jvjmfHV8AcEl3Fg/0TUvc6yvSq6yTvEdJO1SVtIYi/M6/xmmFEd9LfC0bA 7rhxuW1HDmCOB44CXEiAfg72N2EsPJicz0IuQU4/QlCJZ74thU9rsAbgRYtpjOP/pV9E yAMg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p4si6038172ilc.19.2021.09.17.05.07.34; Fri, 17 Sep 2021 05:07:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243832AbhIQDU3 (ORCPT + 99 others); Thu, 16 Sep 2021 23:20:29 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:55242 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243829AbhIQDU1 (ORCPT ); Thu, 16 Sep 2021 23:20:27 -0400 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtp (Exim 4.92 #5 (Debian)) id 1mR4P3-00069W-Be; Fri, 17 Sep 2021 11:19:05 +0800 Received: from herbert by gondobar with local (Exim 4.92) (envelope-from ) id 1mR4P2-0001jg-Vd; Fri, 17 Sep 2021 11:19:05 +0800 Date: Fri, 17 Sep 2021 11:19:04 +0800 From: Herbert Xu To: Ard Biesheuvel Cc: linux-crypto@vger.kernel.org, linux-arm-kernel@lists.infradead.org, ebiggers@kernel.org Subject: Re: [PATCH v7 0/7] running kernel mode SIMD with softirqs disabled Message-ID: <20210917031904.GC6559@gondor.apana.org.au> References: <20210827070342.218276-1-ardb@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210827070342.218276-1-ardb@kernel.org> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, Aug 27, 2021 at 09:03:35AM +0200, Ard Biesheuvel wrote: > This is a follow-up to [0], but given that the arm64 architectural > pieces have been merged for arm64, the only remaining changes are crypto > specific. Therefore, the audience has been reduced to those people who > are somewhat more likely to care about these specifics. > > The AEAD and skcipher APIs may only be called from task or softirq > context. This permits the arm64 AEAD and skcipher code to get rid of all > scalar fallbacks, given that on this architecture, softirqs are now no > longer served while the SIMD unit is being used in kernel mode, which > means that the scalar fallbacks are never needed. These are removed in > this series. > > Changes since v6: > - add patch to yield the NEON every 4k of input when processing the AAD > - add some more acks from Eric > > Changes since v5: > - add Eric's R-b to patches #1 to #3 > - split CCM changes into 3 separate patches > > Changes since v4: > - drop skcipher_walk layer change to deal with zero sized walks > - drop aead/skcipher layer sanity checks on invocations from hardirq > context > - add patch to clean up CCM a bit more after removing the SIMD code path > > Changes since v3: > - clarify the nature of the issue addressed by patch #1, and apply the > same fix to the skcipher walker > - update patches #2 and #3 so that the failures can be observed by the > crypto stats code > > [0] https://lore.kernel.org/linux-arm-kernel/20210302090118.30666-1-ardb@kernel.org/ > > Ard Biesheuvel (7): > crypto: arm64/gcm-aes-ce - remove non-SIMD fallback path > crypto: arm64/aes-neonbs - stop using SIMD helper for skciphers > crypto: arm64/aes-ce - stop using SIMD helper for skciphers > crypto: arm64/aes-ccm - yield NEON when processing auth-only data > crypto: arm64/aes-ccm - remove non-SIMD fallback path > crypto: arm64/aes-ccm - reduce NEON begin/end calls for common case > crypto: arm64/aes-ccm - avoid by-ref argument for ce_aes_ccm_auth_data > > arch/arm64/crypto/Kconfig | 6 - > arch/arm64/crypto/aes-ce-ccm-core.S | 24 +-- > arch/arm64/crypto/aes-ce-ccm-glue.c | 203 ++++++------------- > arch/arm64/crypto/aes-glue.c | 102 ++-------- > arch/arm64/crypto/aes-neonbs-glue.c | 122 +----------- > arch/arm64/crypto/ghash-ce-glue.c | 209 +++++--------------- > 6 files changed, 148 insertions(+), 518 deletions(-) All applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt