Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp459860iob; Wed, 18 May 2022 06:05:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzRkvYTtsT3Vg9KoaPgATK14aj/960tFp71WgeNGRTlg/oahCLbm1anOgI/WffEfY4JxfD6 X-Received: by 2002:a17:902:864b:b0:15e:f9e0:20ca with SMTP id y11-20020a170902864b00b0015ef9e020camr27015293plt.122.1652879115631; Wed, 18 May 2022 06:05:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652879115; cv=none; d=google.com; s=arc-20160816; b=ePdXB7WyD9jd0Ll1cKIZg79tvv28bXLT6MQb7Flt8xR5F/5/75o8XmRVeJ8KmtZFaX 9eqJl4bbR0nqsx26Hb5xzZ7m677WJfQ4f9p3On5h9ZJ1YnRl7geamfWbNu4I1UOkDi6H EOfJ/k2TKMfpFyX5JXeGbSo1aJwaJD34FKMUREoPpqREgnQI6KpidvpbbuLulePrpN+K TUKmKD6h+q9abr6Jc6EeO3RUnxKKkbUGEgZk96RTyeALj2QG6sNnxuVa22GuI9AWFG0I 1O9hEVbEupOFGe+YmmdIgfYofqHgg196LL5J8mRUGowgReMq/Pi44xQE74RBL7HoRptg jx/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:reply-to:subject:references:cc:to:user-agent :mime-version:date:message-id; bh=SGnB6vdSdKZD6vYbsTuqCfIuuGpmc5F23V/j1oxY0Lw=; b=eT6o9XdUn/CpKuASiKdnd3RJgF4zYvsYbkg6cBnpI/T2JmgayT+Mqf6RyX1GdacbQL adFgZUKu7SSa7x+idtBy9IbX0nJvxm6yG45H/jzXJnA025LaSZ4j+BoHjAd9sGbmuvKJ TsW4ZPjBP0StbvvESVWYIXrgrNs4lylw2lHjaz/ATmYJoW0W4SoNPCFtszLzlJwUzkrC k5R3y4akIeWn083yCqjsNyKvpWlvWelZbacvXK6d+RyhJO9NpdAgj2ZSOwUHiBePlVFo tkESSJelXe4FvUKw3EG2cWUOZDf+4tQmjtFGODvF2u8BJap+4123ntDHo4zj02B+7QfM 5bRQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id x20-20020a63f714000000b003db86914412si2455141pgh.665.2022.05.18.06.05.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 May 2022 06:05:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id DD64E62E2; Wed, 18 May 2022 06:00:48 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237491AbiERNAq (ORCPT + 99 others); Wed, 18 May 2022 09:00:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58076 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237425AbiERNAp (ORCPT ); Wed, 18 May 2022 09:00:45 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id C2BC1115D; Wed, 18 May 2022 06:00:42 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8F0A723A; Wed, 18 May 2022 06:00:42 -0700 (PDT) Received: from [10.57.34.214] (unknown [10.57.34.214]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 4134E3F73D; Wed, 18 May 2022 06:00:41 -0700 (PDT) Message-ID: <8f6d8d1f-2872-15b9-d38b-1e8eb26f781b@foss.arm.com> Date: Wed, 18 May 2022 14:00:40 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 To: ardb@kernel.org Cc: davem@davemloft.net, giovanni.cabiddu@intel.com, herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, qat-linux@intel.com, yoan.picchi@arm.com, andre.przywara@arm.com References: Subject: Re: [RFC PATCH 2/2] Removes the x86 dependency on the QAT drivers Reply-To: yoan.picchi@arm.com Content-Language: en-CA From: Yoan Picchi In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org >> From: Yoan Picchi >> >> The QAT acceleration card can be very helpfull for some tasks like >> dealing with IPSEC but it is currently restricted to be used only on x86 machine. >> Looking at the code we didn't see any reasons why those drivers might >> not work on other architectures. We've successfully built all of them >> on x86, arm64, arm32, mips64, powerpc64, riscv64 and sparc64. >> >> We also have tested the driver with an Intel Corporation C62x Chipset >> QuickAssist Technology (rev 04) PCIe card on an arm64 server. After >> the numa patch, it works with the AF_ALG crypto userland interface, >> allowing us to encrypt some data with cbc for instance. We've also >> successfully created some VF, bound them to DPDK, and used the card >> this way, thus showing some real life usecases of x86 do work on arm64 too. >> >> Please let us know if we missed something that would warrants some >> further testing. >Thanks Yoan. > >Can you please confirm that you tested the driver on the platform you reported using a kernel with CONFIG_CRYPTO_MANAGER_DISABLE_TESTS not set and CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=y and the self test >is passing? >You can check it by running >    $ cat /proc/crypto | grep -B 4 passed | grep -e "qat_\|qat-" | sort This should report: >    driver       : qat_aes_cbc >    driver       : qat_aes_cbc_hmac_sha1 >    driver       : qat_aes_cbc_hmac_sha256 >    driver       : qat_aes_cbc_hmac_sha512 >    driver       : qat_aes_ctr >    driver       : qat_aes_xts >    driver       : qat-dh >    driver       : qat-rsa > >Note that if you are using the HEAD of cryptodev-2.6 you will have to either revert 8893d27ffcaf6ec6267038a177cb87bcde4dd3de or apply >https://patchwork.kernel.org/project/linux-crypto/list/?series=639755 as the algorithms have been temporarily disabled. > >Regards, > >-- >Giovanni Hi Giovanni. Thanks for the instructions, I did not know of this test. I rebuilt my kernel on arm64 with those parameter and I confirm I get the same output with $ cat /proc/crypto | grep -B 4 passed | grep -e "qat_\|qat-" | sort Kindly, Yoan