Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp7322797rwl; Fri, 30 Dec 2022 06:59:14 -0800 (PST) X-Google-Smtp-Source: AMrXdXuZJhwbsbkbxPpZzVg3EMk/6JUWGJZAlkF/n6grkpCTqCECNKlPap64gASix7bkD6Tnobl1 X-Received: by 2002:a05:6a20:47c6:b0:b0:1e9b:e930 with SMTP id ey6-20020a056a2047c600b000b01e9be930mr34836040pzb.57.1672412353914; Fri, 30 Dec 2022 06:59:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672412353; cv=none; d=google.com; s=arc-20160816; b=YtzZ93WCW7aU1js/FLM5jwSmTyXqtX12yWk6vX3IFiIg5vD56LLFWohqkCYUeMEjy1 jtz39Iwh3+WEDlMRfuZ60ZI6/vT/cAH6AFUxOt/e2WmLGKk2FWlF78gyCTKN66AP4QRe u/0oDpHka0aKTygL2du5n5D4LfnK5cVLK5LqcdbVPZ1FqmusggAmyizYVisPaTeaWCTh MLFJ1Gmlr0s8Mktk1CLjqkEDyTix9cVNEaQ9K2fvsOsokN6TzguLV+vRPJNYwdDiCO8v gSo/qSI8be3mEKphIsnFXbuZw02ypIsPnUlg8JjjUAprd0gdW0XY5jQyYAzC9HLg7diW ZbRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=8nzRJtSglPg3bLGNvSyVDK55vdlusvgXidp2RiNsDxU=; b=RpbpQD12+OMZYo4BrvPRhbLHnxi4qUZj27D6nPG3TVAU+XUcaOTW5y+9ESeFKDahWp 1GCWxjELzpdWrCCo2mhRr1HihpwM++BFl5lvSnuyPeVecppEKvqkxu/uONMxjE37Glnk ZK7phuxC/CQAUDMkSopASC/uPrFNvNW3msmxqHE6XFM5wBw2VlHQH4r8VhKzboqOcZBV /1b/F+Pbi4b55uMjJrx1siKYpVbdErr0PEU6YkmfaNC0OSfe+Sh2bCUvDSJuklqTaM5D bOdFDTg73mdn7bqcnqlAQe1Gx1hlci0w1N6VKvwMBXCUHGQTdlGRKEKSo/VieVKvRZsU FZdw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a10-20020a65418a000000b004786f5e24f9si21278080pgq.94.2022.12.30.06.58.52; Fri, 30 Dec 2022 06:59:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229527AbiL3OzY (ORCPT + 99 others); Fri, 30 Dec 2022 09:55:24 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37846 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229456AbiL3OzY (ORCPT ); Fri, 30 Dec 2022 09:55:24 -0500 Received: from formenos.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 74167DDC; Fri, 30 Dec 2022 06:55:22 -0800 (PST) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1pBGmu-00COQq-M2; Fri, 30 Dec 2022 22:55:13 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Fri, 30 Dec 2022 22:55:12 +0800 Date: Fri, 30 Dec 2022 22:55:12 +0800 From: Herbert Xu To: Danny Tsen Cc: linux-crypto@vger.kernel.org, leitao@debian.org, nayna@linux.ibm.com, appro@cryptogams.org, linux-kernel@vger.kernel.org, ltcgcw@linux.vnet.ibm.com Subject: Re: [PATCH v2 0/6] crypto: Accelerated AES/GCM stitched implementation Message-ID: References: <20221205003458.4182-1-dtsen@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221205003458.4182-1-dtsen@linux.ibm.com> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Sun, Dec 04, 2022 at 07:34:52PM -0500, Danny Tsen wrote: > This patch series enable an accelerated AES/GCM stitched implementation for > Power10+ CPU(ppc64le). This module supports AEAD algorithm. The stitched > implementation provides 3.5X+ better performance than the baseline. > > This patch has been tested with the kernel crypto module tcrypt.ko and has > passed the selftest. The patch is also tested with > CONFIG_CRYPTO_MANAGER_EXTRA_TESTS enabled > > Danny Tsen (6): > Patch1: Update Kconfig and Makefile. > Patch2: Glue code for AES/GCM stitched implementation. > Patch3: An accelerated AES/GCM stitched implementation. > Patch4: Supporting functions for AES. > Patch5: Supporting functions for ghash. > Patch6: A perl script to process PowerPC assembler source. > > arch/powerpc/crypto/Kconfig | 11 + > arch/powerpc/crypto/Makefile | 10 + > arch/powerpc/crypto/aesp8-ppc.pl | 3846 ++++++++++++++++++++++++ > arch/powerpc/crypto/ghashp8-ppc.pl | 370 +++ > arch/powerpc/crypto/p10-aes-gcm-glue.c | 345 +++ > arch/powerpc/crypto/p10_aes_gcm.S | 1519 ++++++++++ > arch/powerpc/crypto/ppc-xlate.pl | 229 ++ > 7 files changed, 6330 insertions(+) > create mode 100644 arch/powerpc/crypto/aesp8-ppc.pl > create mode 100644 arch/powerpc/crypto/ghashp8-ppc.pl > create mode 100644 arch/powerpc/crypto/p10-aes-gcm-glue.c > create mode 100644 arch/powerpc/crypto/p10_aes_gcm.S > create mode 100644 arch/powerpc/crypto/ppc-xlate.pl I can't build this, it fails with LD [M] arch/powerpc/crypto/p10-aes-gcm-crypto.o powerpc64le-linux-gnu-ld: arch/powerpc/crypto/p10_aes_gcm.o: ABI version 2 is not compatible with ABI version 1 output powerpc64le-linux-gnu-ld: failed to merge target specific data of file arch/powerpc/crypto/p10_aes_gcm.o Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt