Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp574348rwb; Wed, 9 Nov 2022 06:18:57 -0800 (PST) X-Google-Smtp-Source: AMsMyM5OoirWzUk58dUu2POg/0ciZNMILjvLr453IVXBBe3K0ttAc5r2LMtrOM/I1uKlKtOeCPxK X-Received: by 2002:a17:902:d2c4:b0:187:a4e:f9c1 with SMTP id n4-20020a170902d2c400b001870a4ef9c1mr57547734plc.168.1668003537486; Wed, 09 Nov 2022 06:18:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668003537; cv=none; d=google.com; s=arc-20160816; b=sICmXZfZFdRGHv4B4gWOntrBO4Z/Xj/I6xPJ3JHbIJ44cwrPzlYZM3fiW+cFOBusyf CCLKBwv6yio/FwQXGE4tXyYdGjNlnjsLQthn2JmX89fGDyvktdVbgTRJb7CCBeRncloo 9aLFnN36+Kf7Wkj/d0Kb5/d5uNHCbTKX7eSXRN/1gcUcXqfVfaXX6gAvjPs4YQZE14Ut fo6ihVN4iAV6de1DVQtvvQq+9x/vy7xm7p6HxZt2zwQGdeSwxMIFAoRzywIKbiHgs1Na IDF8/YVEpbOmoYwx4pywgH3j1n8dwnUWHzqmKmZdud0fZxxcNlnki0u7Odn5JK1Hw1GH zx5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:organization :from:references:cc:to:subject:dkim-signature:dkim-filter; bh=FBHBhgV1tXeJt+97ihyhJHhV0BTOZuXNbqRaUQ3d1IE=; b=Bfe/4/u+ZNKjZsgmW+lNyEZxnX1Lm+grFp7ZuZf0RoSZZ3Xa+Wm0jsenMNQDC9CGVh NpzwtvnYA1KijtCQjKJJlgvXcfbYPQ3JJZxIx9r6tEHWLRwkDN+TDLfraoZHNZ/YbKp9 Nb/adWrhxeSCE93nAZpY5EE2ZkkPd/ajiL3xCSYOnh7c2bEkoRdk7ajq0zVVkzXRR/ST NKvtwmsovMp8yPAfUhNl376S1xcPZQcTHgWH25OoNgQiHlII4x5RUQe6qeBnlIwhkOFx 1cSQAEYOvS3fl0b3wBSi5zWAfJCbshDFdcwoYT0VwjYNtBvbK3fnw1XZPunRWcVEfEuZ QMgQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@candelatech.com header.s=default header.b=JwWO4ZuP; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=candelatech.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r22-20020a635d16000000b0046edf48affcsi16700561pgb.399.2022.11.09.06.18.37; Wed, 09 Nov 2022 06:18:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@candelatech.com header.s=default header.b=JwWO4ZuP; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=candelatech.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229611AbiKIOMl (ORCPT + 99 others); Wed, 9 Nov 2022 09:12:41 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54862 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229509AbiKIOMj (ORCPT ); Wed, 9 Nov 2022 09:12:39 -0500 Received: from dispatch1-us1.ppe-hosted.com (dispatch1-us1.ppe-hosted.com [148.163.129.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B2C66A47B for ; Wed, 9 Nov 2022 06:12:38 -0800 (PST) X-Virus-Scanned: Proofpoint Essentials engine Received: from mx1-us1.ppe-hosted.com (unknown [10.7.67.129]) by mx1-us1.ppe-hosted.com (PPE Hosted ESMTP Server) with ESMTPS id 052B11C0083; Wed, 9 Nov 2022 14:12:37 +0000 (UTC) Received: from mail3.candelatech.com (mail2.candelatech.com [208.74.158.173]) by mx1-us1.ppe-hosted.com (PPE Hosted ESMTP Server) with ESMTP id A447C50007A; Wed, 9 Nov 2022 14:12:36 +0000 (UTC) Received: from [192.168.1.115] (unknown [98.97.40.112]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail3.candelatech.com (Postfix) with ESMTPSA id BC79C13C2B0; Wed, 9 Nov 2022 06:12:35 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 mail3.candelatech.com BC79C13C2B0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=candelatech.com; s=default; t=1668003156; bh=fTOMhfucBpNfnPFWb9/TY08euH6Xo0fFf7OGQlGSj4c=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=JwWO4ZuPnLIFaQZ7Kipx85TBkjb8Q90XyCIKozCUoKVqfz9l90WrKBN73HUDDyILI MT28tN91wur5YJT5s/ehjAXdkEkjUxhO3SV+Tth/U843VHevlW7PYCsge5jhc8V15P JNkY7kwjvkS/qVkWzgeaHHUhVL/L70sPG3rk52mk= Subject: Re: [PATCH v2] crypto: aesni - add ccm(aes) algorithm implementation To: Ard Biesheuvel , Herbert Xu Cc: Linux Crypto Mailing List , Eric Biggers References: <20201210024342.GA26428@gondor.apana.org.au> <20201210111427.GA28014@gondor.apana.org.au> <20201210121627.GB28441@gondor.apana.org.au> <20201215091902.GA21455@gondor.apana.org.au> <062a2258-fad4-2c6f-0054-b0f41786ff85@candelatech.com> From: Ben Greear Organization: Candela Technologies Message-ID: <7dd866a1-e05b-347f-0058-d5a622bbf39e@candelatech.com> Date: Wed, 9 Nov 2022 06:12:30 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.10.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-MW Content-Transfer-Encoding: 7bit X-MDID: 1668003157-rTOnciQPLg0O X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 11/9/22 2:05 AM, Ard Biesheuvel wrote: > On Wed, 9 Nov 2022 at 04:52, Herbert Xu wrote: >> >> On Tue, Nov 08, 2022 at 10:50:48AM -0800, Ben Greear wrote: >>> >>> While rebasing my patches onto 6.1-rc4, I noticed my aesni for ccm(aes) patch didn't apply cleanly, >>> and I found this patch described below is applied now. Does this upstream patch mean that aesni is already >>> supported upstream now? Or is it specific to whatever xctr is? If so, >>> any chance the patch is wanted upstream now? >> >> AFAICS the xctr patch has nothing to do with what you were trying >> to achieve with wireless. My objection still stands with regards >> to wireless, we should patch wireless to use the async crypto >> interface and not hack around it in the Crypto API. >> > > Indeed. Those are just add/add conflicts because both patches > introduce new code into the same set of files. The resolution is > generally to keep both sides. > > As for Herbert's objection: I will note here that in the meantime, > arm64 now has gotten rid of the scalar fallbacks entirely in AEAD and > skipcher implementations, because those are only callable in task or > softirq context, and the arm64 SIMD wrappers now disable softirq > processing. This means that the condition that results in the fallback > being needed can no longer occur, making the SIMD helper dead code on > arm64. > > I suppose we might do the same thing on x86, but since the kernel mode > SIMD handling is highly arch specific, you'd really need to raise this > with the x86 maintainers. Wifi stack is unlikely to ever change in this regard, so I hope that it does not become too much more trouble to keep this patch alive. I made an attempt at the merge, but the error path clean up looks tangled to me, I'll post a patch for review once I get my tree cleaned up a bit from the rebase. Thanks, Ben -- Ben Greear Candela Technologies Inc http://www.candelatech.com