Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp2072858rdh; Sat, 28 Oct 2023 22:23:04 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEWjQNEBM5BbY10I/6YrPsJRuOQ/36bSgclT2g6tLIrO7wB3kEA06IIS5qGH6zwbNPiDKjs X-Received: by 2002:a05:6871:590:b0:1e9:8b78:899c with SMTP id u16-20020a056871059000b001e98b78899cmr9078132oan.55.1698556984049; Sat, 28 Oct 2023 22:23:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698556984; cv=none; d=google.com; s=arc-20160816; b=eLgpDpXogPHfP9PL1PZFhbpijHvsmlqA3Bos/vqZ0WEV00X2EdN5EEwk/bv5ChguLj cC6rrrgYmu08nrFJ9yswBFhqyuC8z4Fc2vrDsZW5W0bTbGxmJVwc+pMWNqI5IGKKeCSD npSLqKt5eG086Y9xNO6UiG2ANXZVgkzH5q7ebK7UtleoUCEubOkwHi07zN+7HD8oYqc8 3Mxroz/08gL5rSBFCULpLLib1GCV2B+JwaI5duwS+3c9Y29s7hl+vve0Mjx1vlG73p1k fsyVEmHXS5sijNqZMQtxs5XcoPI+9R1GPExaPdhsGsRQ5Ld9OxE9w53OqUuGClxzZbpv 5ytg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=eGw1B0nOENqPlAnKsMHK82n0RdE+jxkumxqEL9Y3bMY=; fh=9NWjS13M00RC9XR+sEZ+vs78ZUoxQot+1/HP5uzkL7A=; b=QPscW2PcA1D4vEC/7UbqcJY0wH0BWgoaRSRHlSkcyjPmcWl+oRpoexuVYNXwJaHYSy TkT56B3ZaTJsQrtj63oSGlYhcCmgBKigmg2urSsDUFNg2DH7adrZCRO/OqGcDzIEClk7 IFPW3fOxEm2EOp4L7jEmE6EcDXKQAYVorLut/ztcsiveFEruw+hZfROvMDM9WM4Aa2rC xJMTkopQs8FbiZD0PVAr0NeUojL7At8TkUhYdd54icdi1mfs1+Y54hRMIUIB6D8PJcUH HZi5JEkmVJhhEmxpflX6d4SMIECxUCDEonmeABOuPRdzuaFdkEsVE60QpoOEpxh9bg/k 5D0w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qZDaiPOB; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id bq6-20020a056a02044600b00573f94e8b83si3347079pgb.265.2023.10.28.22.23.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 Oct 2023 22:23:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qZDaiPOB; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 23ADA8087B63; Sat, 28 Oct 2023 22:22:59 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229486AbjJ2FQG (ORCPT + 99 others); Sun, 29 Oct 2023 01:16:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47026 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229446AbjJ2FQF (ORCPT ); Sun, 29 Oct 2023 01:16:05 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EC106C6 for ; Sat, 28 Oct 2023 22:16:02 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 840A5C433C9; Sun, 29 Oct 2023 05:16:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1698556562; bh=p3d3RHusl9dhI/UjgjiAh0bt3K3uBII4eYJeLQ6pnMw=; h=From:To:Cc:Subject:Date:From; b=qZDaiPOB26JR1ojNke7jiADc7I+JiXS7EiB7o50Bx8o3GgHiArSKCSqS8dpOzpjD4 XaBWgfNIsMArOr02ZU61O1AYQJY9RmLz/2Lwrq6L2ByfrRuA6CPo8xtgzjD4cAb7TH TpnuiCWxHvxobVzdgRAH8ELRvxAAuQzjD6xssYKui51Z/jJpjMIDkEodd2dkqcndO3 aECpAFhWSHeMEjtV5qJA8Kf2Mu9YZ9TOfOa80yYIGaDXyg/2510zQcjWBCZdWTk4pL Wl2c4wtORIE00YSuUiMeBhUhyyAAlkOd2NggGHzcQgcznAUt5PrWn/9VdAarfIwalP NGazSbHN6cOEQ== From: Eric Biggers To: linux-crypto@vger.kernel.org Cc: Roxana Nicolescu Subject: [PATCH] crypto: x86/sha256 - autoload if SHA-NI detected Date: Sat, 28 Oct 2023 22:15:55 -0700 Message-ID: <20231029051555.157720-1-ebiggers@kernel.org> X-Mailer: git-send-email 2.42.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Sat, 28 Oct 2023 22:22:59 -0700 (PDT) From: Eric Biggers The x86 SHA-256 module contains four implementations: SSSE3, AVX, AVX2, and SHA-NI. Commit 1c43c0f1f84a ("crypto: x86/sha - load modules based on CPU features") made the module be autoloaded when SSSE3, AVX, or AVX2 is detected. The omission of SHA-NI appears to be an oversight, perhaps because of the outdated file-level comment. This patch fixes this, though in practice this makes no difference because SSSE3 is a subset of the other three features anyway. Indeed, sha256_ni_transform() executes SSSE3 instructions such as pshufb. Cc: Roxana Nicolescu Signed-off-by: Eric Biggers --- arch/x86/crypto/sha256_ssse3_glue.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/arch/x86/crypto/sha256_ssse3_glue.c b/arch/x86/crypto/sha256_ssse3_glue.c index 4c0383a90e11..a135cf9baca3 100644 --- a/arch/x86/crypto/sha256_ssse3_glue.c +++ b/arch/x86/crypto/sha256_ssse3_glue.c @@ -1,15 +1,15 @@ /* * Cryptographic API. * - * Glue code for the SHA256 Secure Hash Algorithm assembler - * implementation using supplemental SSE3 / AVX / AVX2 instructions. + * Glue code for the SHA256 Secure Hash Algorithm assembler implementations + * using SSSE3, AVX, AVX2, and SHA-NI instructions. * * This file is based on sha256_generic.c * * Copyright (C) 2013 Intel Corporation. * * Author: * Tim Chen * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free @@ -38,20 +38,21 @@ #include #include #include #include #include asmlinkage void sha256_transform_ssse3(struct sha256_state *state, const u8 *data, int blocks); static const struct x86_cpu_id module_cpu_ids[] = { + X86_MATCH_FEATURE(X86_FEATURE_SHA_NI, NULL), X86_MATCH_FEATURE(X86_FEATURE_AVX2, NULL), X86_MATCH_FEATURE(X86_FEATURE_AVX, NULL), X86_MATCH_FEATURE(X86_FEATURE_SSSE3, NULL), {} }; MODULE_DEVICE_TABLE(x86cpu, module_cpu_ids); static int _sha256_update(struct shash_desc *desc, const u8 *data, unsigned int len, sha256_block_fn *sha256_xform) { base-commit: f2b88bab69c86d4dab2bfd25a0e741d7df411f7a -- 2.42.0