Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp492680rwb; Wed, 9 Nov 2022 05:20:40 -0800 (PST) X-Google-Smtp-Source: AMsMyM6DAQN9d7ytoM/4KqLE1BI5mAfaObz2FS0u9+TVbUFN5Dk1PCXnjar+YWUzJKVrqAlu33Cc X-Received: by 2002:a17:907:2cf0:b0:7aa:21b1:9b4f with SMTP id hz16-20020a1709072cf000b007aa21b19b4fmr57869540ejc.752.1668000040313; Wed, 09 Nov 2022 05:20:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668000040; cv=none; d=google.com; s=arc-20160816; b=QcBRQRTbdKvhQsa4DtdvmpUwoosdY8vqG9rfa2s20TK62RdUEeUN4Lz+VHcccmzp9f FddS8yGxCX1tX1Rqn81bK8pLbyqFwWlbKxQ3VBA/tVfUwc0H5n7GbcZMqgO2r2qNFPZF e7SctSTKO0c/B41nZtqHhK3xTIEmlms/kdDG98/iafhX9jvoviVA8d3ersjOnmFdYodx E9hy6z5X20Wy6CObZpI0Guz2NQbcoLG8WPqo3+kf3tl9MY70+2c/ci2Aythv/Bfa9BLW W6P5uRdBQV7SUbZgjwJX6hwG59S+xYXxe2bfXZ3o8BAhULKaiNCX6doI3cWZFUdzFc1a YdQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=uM6sitv4Wx3WJxIss+uSEKXq3x9jp0ibwC827sLuE1Q=; b=n44KETBn9hXDIPlIRIclIVM1kvPfGRTMzGcL9Pyp+obqtjXFcUGAcCbNAfTnvlF5BZ M14W4EWTxJgYBkKMBLCE0thMWG0ZKVEG83/4yZzs3B+O7Pltrr70kDkLKh+qa6I3YwKJ JoU3G/htFtR50EDz9oqykv9220bNwmVW9NjE5/R1NAw8P4gQwRSE0PRXKBf2ssnjYufy UtP5sB0sg2rtDWyL70IzF+TbaBlCC287vdIjSWmp0G+Fq5sh9e7BVzM9QsEJgni5gjjE bpmURsELPtkmIYHWVgq91gSAmMmXMPQti/JrPPLZBHWI1zo+rpzaWz7Cq3LDEkUQ0lE9 x8bg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=gUwXwzNz; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id dd18-20020a1709069b9200b0078232bfe3a0si15606232ejc.331.2022.11.09.05.20.14; Wed, 09 Nov 2022 05:20:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=gUwXwzNz; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229959AbiKINRJ (ORCPT + 99 others); Wed, 9 Nov 2022 08:17:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50076 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229733AbiKINRF (ORCPT ); Wed, 9 Nov 2022 08:17:05 -0500 Received: from mail-pj1-x102a.google.com (mail-pj1-x102a.google.com [IPv6:2607:f8b0:4864:20::102a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5560E25C64 for ; Wed, 9 Nov 2022 05:17:05 -0800 (PST) Received: by mail-pj1-x102a.google.com with SMTP id r61-20020a17090a43c300b00212f4e9cccdso1794564pjg.5 for ; Wed, 09 Nov 2022 05:17:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:in-reply-to:from:content-language :references:cc:to:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=uM6sitv4Wx3WJxIss+uSEKXq3x9jp0ibwC827sLuE1Q=; b=gUwXwzNz68mEq61ULDU1yiKeVMFIQu5DSmexkMW67RNS9I1KqoBpp3S6f2OTuP2xgb ocGlfhzYm3SjU8lBY2YAfBvgIKtcXyDoRA2FIwi5bfG/mxwnAKTRTTA6wQMM9hizn7+6 zdtHaG38gPiucdGfKurQREjlQMpqT7m88PVhdLl56aPH2B2uqWuGcK7Ool2g1L559vzD 2SQCefxm4mXd7c2WDeYgwHRrc31tYVYHE6CV1fkdVUo8iLLNzu10IktDburDDEbXuAoZ AhbwFUn0u7vKXneRLO4TFuiS0/9HZNJ33V0UG+FP62wYSUNGnoXu01bOa4jjnGmme1Hg xNQQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:from:content-language :references:cc:to:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=uM6sitv4Wx3WJxIss+uSEKXq3x9jp0ibwC827sLuE1Q=; b=ZKMDVvorC+WwRZFdb3hybGY/T1zEEHVT9QAZolq0hEko6nPBfa4r8OFcmFuswj6zHU qxR5px5bOmKcxCJPYPSU5OO4HupqhZWTmY0ndUInoL7QqPOCB/rOiV9HG3QL0esT4Arr wd88zEPc5fEVpAntvyOZdnyJJSXMGcnA2WHf3qPJFauLG6MCaYH+wHkLbcOYTZIxZHQ+ GNryfVDTxb0R7lPdPexg4kEUgysN2buIxy16MSFxujPSudAsHaYwH7JS4XvdycWczbFi CljppRn6kKw1CZq8yUsZ+LVjlQPAvEuRBw+TDqgXd1Iqzu+FakeSuJrtYmHl8R/ElyKP 4POg== X-Gm-Message-State: ACrzQf2g+UIzoOSxpxLFQ5D33HpnFatcvW6ERljZhF2DL//iIo1uDCKV vdWJR8gDfHxIquy+o/r55tg= X-Received: by 2002:a17:90a:9a8f:b0:212:ea8d:dc34 with SMTP id e15-20020a17090a9a8f00b00212ea8ddc34mr82160774pjp.30.1667999824813; Wed, 09 Nov 2022 05:17:04 -0800 (PST) Received: from ?IPV6:2606:4700:110:8d19:ef92:9207:5a0d:60e7? ([2a09:bac1:3f60:98::16:12e]) by smtp.gmail.com with ESMTPSA id c17-20020a170902d49100b001754cfb5e21sm9103947plg.96.2022.11.09.05.17.00 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 09 Nov 2022 05:17:04 -0800 (PST) Message-ID: <51ed3735-24f0-eef0-0ca6-908c4581d143@gmail.com> Date: Wed, 9 Nov 2022 22:16:58 +0900 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.2.2 Subject: Re: [PATCH v3 1/4] crypto: aria: add keystream array into struct aria_ctx To: Herbert Xu Cc: linux-crypto@vger.kernel.org, davem@davemloft.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, hpa@zytor.com, kirill.shutemov@linux.intel.com, richard@nod.at, viro@zeniv.linux.org.uk, sathyanarayanan.kuppuswamy@linux.intel.com, jpoimboe@kernel.org, elliott@hpe.com, x86@kernel.org, jussi.kivilinna@iki.fi References: <20221106143627.30920-1-ap420073@gmail.com> <20221106143627.30920-2-ap420073@gmail.com> Content-Language: en-US From: Taehee Yoo In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi Herbert, On 11/7/22 17:48, Herbert Xu wrote: > On Sun, Nov 06, 2022 at 02:36:24PM +0000, Taehee Yoo wrote: >> >> struct aria_ctx { >> u32 enc_key[ARIA_MAX_RD_KEYS][ARIA_RD_KEY_WORDS]; >> u32 dec_key[ARIA_MAX_RD_KEYS][ARIA_RD_KEY_WORDS]; >> int rounds; >> int key_length; >> +#if defined(CONFIG_CRYPTO_ARIA_AESNI_AVX_X86_64) || \ >> + defined(CONFIG_CRYPTO_ARIA_AESNI_AVX_X86_64_MODULE) >> + u8 keystream[ARIA_KEYSTREAM_SIZE]; >> +#endif >> }; > > The tfm ctx is shared between all users of the tfm. You need > something that is private to the request so this needs to be > moved into the reqctx. > > Cheers, I have encountered kernel panic(stack-out-of-bounds) while using the reqctx instead of the tfm. cryptd is used when simd drivers are used. cryptd_skcipher_encrypt() internally doesn't allocate a request ctx of a child, instead, it uses stack memory with SYNC_SKCIPHER_REQUEST_ON_STACK. It retains only 384 bytes for child request ctx even if a child set a large reqsize value with crypto_skcipher_set_reqsize(). aria-avx2 needs 512 bytes and aria-avx512 needs 1024 bytes. So, stack-out-of-bounds occurs. What do you think about using the per-cpu for the keystream array? SIMD functions are called under fpu context. So, per-cpu keystream will not be used concurrently, it's safe. It also can avoid unnecessary allocation for large temporary memory. I tested the per-cpu for keystream, and it works well. If you are okay, I would like to submit v4 patch using per-cpu. Thanks, Taehee Yoo