Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp804079rwb; Thu, 15 Dec 2022 02:39:36 -0800 (PST) X-Google-Smtp-Source: AA0mqf6DcOH/xI30IYa9huIwOTWxJ5Q14Dkr6raLZ4S7eb4VpusdMaKjntl/A24vf+J2FT7QhUea X-Received: by 2002:a05:6a21:9006:b0:a7:92f2:9b65 with SMTP id tq6-20020a056a21900600b000a792f29b65mr35111441pzb.59.1671100776110; Thu, 15 Dec 2022 02:39:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671100776; cv=none; d=google.com; s=arc-20160816; b=LGEPZm9aUm4a2rkV6gdHnVr1ypj+g7SWJ8/24wltySAc4Qb/Ng76ICz51Y17BAdruF AaG4gvwCVOzG6wDzCs3WzLWOd8EQc5TUHU7Rxx4exjKu3O6ankwHf7ls6eQaf++XxqMG 60xY6gtlZU1Rgv6ojLTX31O5J7JkvKONv8awIZO88/lJ70Bq3RU91+pbkqZHje6++4gf L5ic94VSC4qMnk/Rnx4uk1e04p+/VFibRmYVX6CRRh+mUgqmPuBHavemUWxZWPSq5jz3 X3IUlIqQEqXYVzUtip+jCSpAOCNXTduEolCvWwfVPb4GUp7DNQNgh/C1A7z5Hsc2ms8C cjxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=YwZEBKJYU5V3a+h6ICUOLLs2RtIW5lrP2U9zp6ekoJA=; b=RjsraMMxyDLhSmoQrfSHbdtzLNHFSQJpxLt+2Oo3RmNswi6RP0FQvYO+q9Mi3djIk1 /l7M1YzcgHIsgF3IHweYclF957Kx6A7tHa3S3zNRfbdlpAwWJHtPqNTejtPcRQ1VAIyT VploJmGcJ4he4rweSwG60z2dBV9WI5B1BC2YkAz4LKLIAfKgJrL5q8zTRpGzHJDawDxY 2oO6WdQ5ZbnVvStuqaVADlUsMfG5YC3IAOtaz0Iw0fRD9MHJLiN7wYJ1+ZBN8d1dxw6h o8QA40QNQapD6ARKgT4g3UtuyjWCfmlwMoalmmXthhb1mMv5IGKWWqZXaEeK7eKrmqB5 6HJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="RrZ/geVH"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v25-20020a637a19000000b00480a937f894si2649503pgc.766.2022.12.15.02.39.23; Thu, 15 Dec 2022 02:39:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="RrZ/geVH"; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229752AbiLOK1O (ORCPT + 99 others); Thu, 15 Dec 2022 05:27:14 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41038 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229820AbiLOK1M (ORCPT ); Thu, 15 Dec 2022 05:27:12 -0500 Received: from mail-yb1-xb2c.google.com (mail-yb1-xb2c.google.com [IPv6:2607:f8b0:4864:20::b2c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A8F83F17 for ; Thu, 15 Dec 2022 02:27:10 -0800 (PST) Received: by mail-yb1-xb2c.google.com with SMTP id o127so2951373yba.5 for ; Thu, 15 Dec 2022 02:27:10 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=YwZEBKJYU5V3a+h6ICUOLLs2RtIW5lrP2U9zp6ekoJA=; b=RrZ/geVHSY940Y7h265mobeJD3vYyklAaA9ScqHScMJgG9pTV9tS2YJ1VfIC+idjEk p1hi48WgQBKl6uO4L59b6Or6bSri5WVv6ua53dxeTTiwhajOvof28TGg1YGtdRBi9c8L qvgA0OPuSI9ggmbnrsqWQTFKFL/mxgs41h50UHQYqFic3QGHxwvPUIRvUa+L3LZLLEV5 2HBt059b/D5Qv0gVJRz9sgO+HVVaEmODpt/Hl5V/yM2VF02iB3EUWjRR76bQqXIDtvG+ DToBURSsKp9yJY5Wu+px/pB+/oUjAJLwrlfTQNfNkVd+II5BFC1zirMLm/T7FF3DtUZi m56w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=YwZEBKJYU5V3a+h6ICUOLLs2RtIW5lrP2U9zp6ekoJA=; b=GZrjqX8zp3eddCJSZj8IqsCu6qNqv9vrSXKr2cmt+2F4lyyr8I4PohCVkZRmPtOQNm M4K4RsP7aVmms4F90vx20eA3HCsjGIo8qlNbpJKmQxOKqYUxyZ4fLh5sbHtn7LuEa/Hn GrSIXc4rEQ8nqsEAlJ0TxWGIoOMGSxDj+KEknXV44J075f+85U2tBd6Hej7efFHrcP2O mQN+Adnzt4OmNYpS20HZf31WD2V1SAeBpIlv9mZvabG4YXvmLdq+FdfG+wgEIvyof+Ch GT1v9IsfWS6Rc60nImlPPIqkuJgPS7xL6oILQb4CUIsgXBlQlIlGCwwfy8KOtSOeqNdW WkOA== X-Gm-Message-State: ANoB5pnvifd0h5o6AJxJwLJDBirRzE1OeuHbWxu8faR3moxMKyrXO9zy Sc8U8HvND2EErxDFRipBA1aXvhX1aAyA0MZPTsdcVw== X-Received: by 2002:a25:d2ce:0:b0:710:f2e2:eb92 with SMTP id j197-20020a25d2ce000000b00710f2e2eb92mr3670381ybg.304.1671100029903; Thu, 15 Dec 2022 02:27:09 -0800 (PST) MIME-Version: 1.0 References: <20221207103936.2198407-1-ardb@kernel.org> <20221207103936.2198407-3-ardb@kernel.org> In-Reply-To: <20221207103936.2198407-3-ardb@kernel.org> From: Linus Walleij Date: Thu, 15 Dec 2022 11:26:58 +0100 Message-ID: Subject: Re: [PATCH v2 2/2] ARM: permit non-nested kernel mode NEON in softirq context To: Ard Biesheuvel Cc: linux-arm-kernel@lists.infradead.org, linux@armlinux.org.uk, linux-crypto@vger.kernel.org, Arnd Bergmann Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, Dec 7, 2022 at 11:39 AM Ard Biesheuvel wrote: > We currently only permit kernel mode NEON in process context, to avoid > the need to preserve/restore the NEON register file when taking an > exception while running in the kernel. > > Like we did on arm64, we can relax this restriction substantially, by > permitting kernel mode NEON from softirq context, while ensuring that > softirq processing is disabled when the NEON is being used in task > context. This guarantees that only NEON context belonging to user space > needs to be preserved and restored, which is already taken care of. > > This is especially relevant for network encryption, where incoming > frames are typically handled in softirq context, and deferring software > decryption to a kernel thread or falling back to C code are both > undesirable from a performance PoV. > > Signed-off-by: Ard Biesheuvel So boosting WireGuard as primary SW network encryption user? This is really neat, BTW: Reviewed-by: Linus Walleij Yours, Linus Walleij