Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1394963rwb; Mon, 7 Nov 2022 00:50:18 -0800 (PST) X-Google-Smtp-Source: AMsMyM6Tfr3cwwKBUmfltcXPDTXfrMFwTwO4UyJ6Jm0QCuHmfwNFl50EfOucL+J8te+gVJAIixZL X-Received: by 2002:a17:90b:4c07:b0:213:44f5:6073 with SMTP id na7-20020a17090b4c0700b0021344f56073mr50401832pjb.184.1667811017934; Mon, 07 Nov 2022 00:50:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1667811017; cv=none; d=google.com; s=arc-20160816; b=VYSwldYGx/t+AMAQ5gboDDK1bf9SCHIVblAypE34YeKqVswiJMDKDRnb0ykvKjm3PI DCLOeae727jJ+tcNrP/2Tln4RsSoKWc3n1e2H5oDHS2maW7QBdVeubK66Sksf8kgJIZW OoSPFBYB5ZZzCSrRU/LH9ShqGB190n2eQrNlcWoa3JRKJrOG5eVIBBEJaOJqTdlWg0ri TuAbvU+ulWHsjiC4N6ZKrs2/xSvlgd+3zPkXamtWeXxwgthnYIIVxabKD3aTgSXdYB0g /OoGErjGuZI9f7VmvRsNGU0I9XrY0AOssJgo4pt5n2HvBFaxmjJsTlk9V+/x5WdPH0wC 8v7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=/whepujpLXykt+A/ZP+hnuHZmXasTvHRS/Zpj2yXoqc=; b=hb2Kbj/K6PVl0wGtLtYcBYYsCOwMU/tW1KfaCL7kkETU9ix1lHepS18WjAnQqcJTlS hsg4YX/jDEKy1VM3g7wySIrt4iyQE0NROHiPQWxKoesDll6lhga2DFwJ/omjHlae3ap7 RZnQLGP9SNWKD4ZuEdEYL/fogIKKxzkMSL7eUGtL69a2PflcPNYFBrjQkcgKsuYwHfbX WB3Vlu1T8BBP+PrXrkirqDFRTRaCtZYeXImz5B8qrmo+1SbWTMFT0PLAPCrjfILDP9gE tjjbovShynQsTA0i5ZDZ2tJ4U7oxSvckfjPdLjYE1Q9N7m2jqH68ZQDObB4Dq9MK4ISb B0ig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id oj7-20020a17090b4d8700b0020a7f4402d0si11276110pjb.27.2022.11.07.00.50.03; Mon, 07 Nov 2022 00:50:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230209AbiKGIsY (ORCPT + 99 others); Mon, 7 Nov 2022 03:48:24 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49836 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230434AbiKGIsX (ORCPT ); Mon, 7 Nov 2022 03:48:23 -0500 Received: from formenos.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0A4762D5 for ; Mon, 7 Nov 2022 00:48:22 -0800 (PST) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1orxn8-00AyQ8-9R; Mon, 07 Nov 2022 16:48:15 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Mon, 07 Nov 2022 16:48:14 +0800 Date: Mon, 7 Nov 2022 16:48:14 +0800 From: Herbert Xu To: Taehee Yoo Cc: linux-crypto@vger.kernel.org, davem@davemloft.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, hpa@zytor.com, kirill.shutemov@linux.intel.com, richard@nod.at, viro@zeniv.linux.org.uk, sathyanarayanan.kuppuswamy@linux.intel.com, jpoimboe@kernel.org, elliott@hpe.com, x86@kernel.org, jussi.kivilinna@iki.fi Subject: Re: [PATCH v3 1/4] crypto: aria: add keystream array into struct aria_ctx Message-ID: References: <20221106143627.30920-1-ap420073@gmail.com> <20221106143627.30920-2-ap420073@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221106143627.30920-2-ap420073@gmail.com> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Sun, Nov 06, 2022 at 02:36:24PM +0000, Taehee Yoo wrote: > > struct aria_ctx { > u32 enc_key[ARIA_MAX_RD_KEYS][ARIA_RD_KEY_WORDS]; > u32 dec_key[ARIA_MAX_RD_KEYS][ARIA_RD_KEY_WORDS]; > int rounds; > int key_length; > +#if defined(CONFIG_CRYPTO_ARIA_AESNI_AVX_X86_64) || \ > + defined(CONFIG_CRYPTO_ARIA_AESNI_AVX_X86_64_MODULE) > + u8 keystream[ARIA_KEYSTREAM_SIZE]; > +#endif > }; The tfm ctx is shared between all users of the tfm. You need something that is private to the request so this needs to be moved into the reqctx. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt