From mboxrd@z Thu Jan 1 00:00:00 1970 From: Paulo Flabiano Smorigo Subject: Re: [PATCH] crypto: vmx -- disable preemption to enable vsx in aes_ctr.c Date: Mon, 23 Jan 2017 14:07:45 -0200 Message-ID: <20170123140745.43daedae@dublin> References: <1484901333.8207.11.camel@TP420> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: linux-crypto@vger.kernel.org, herbert@gondor.apana.org.au To: Li Zhong Return-path: Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:42830 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750714AbdAWQIB (ORCPT ); Mon, 23 Jan 2017 11:08:01 -0500 Received: from pps.filterd (m0098404.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.20/8.16.0.20) with SMTP id v0NG6PTJ085249 for ; Mon, 23 Jan 2017 11:07:59 -0500 Received: from e24smtp02.br.ibm.com (e24smtp02.br.ibm.com [32.104.18.86]) by mx0a-001b2d01.pphosted.com with ESMTP id 285kyskuku-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Mon, 23 Jan 2017 11:07:58 -0500 Received: from localhost by e24smtp02.br.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 23 Jan 2017 14:07:52 -0200 Received: from d24relay02.br.ibm.com (d24relay02.br.ibm.com [9.18.232.42]) by d24dlp01.br.ibm.com (Postfix) with ESMTP id F17E9352005F for ; Mon, 23 Jan 2017 11:07:18 -0500 (EST) Received: from d24av01.br.ibm.com (d24av01.br.ibm.com [9.8.31.91]) by d24relay02.br.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id v0NG7pvd25559122 for ; Mon, 23 Jan 2017 14:07:51 -0200 Received: from d24av01.br.ibm.com (localhost [127.0.0.1]) by d24av01.br.ibm.com (8.14.4/8.14.4/NCO v10.0 AVout) with ESMTP id v0NG7oZO009598 for ; Mon, 23 Jan 2017 14:07:50 -0200 In-Reply-To: <1484901333.8207.11.camel@TP420> Sender: linux-crypto-owner@vger.kernel.org List-ID: On Fri, 20 Jan 2017 16:35:33 +0800 Li Zhong wrote: > Some preemptible check warnings were reported from > enable_kernel_vsx(). This patch disables preemption in aes_ctr.c > before enabling vsx, and they are now consistent with other files in > the same directory. > > Signed-off-by: Li Zhong > --- > drivers/crypto/vmx/aes_ctr.c | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/drivers/crypto/vmx/aes_ctr.c > b/drivers/crypto/vmx/aes_ctr.c index 38ed10d..7cf6d31 100644 > --- a/drivers/crypto/vmx/aes_ctr.c > +++ b/drivers/crypto/vmx/aes_ctr.c > @@ -80,11 +80,13 @@ static int p8_aes_ctr_setkey(struct crypto_tfm > *tfm, const u8 *key, int ret; > struct p8_aes_ctr_ctx *ctx = crypto_tfm_ctx(tfm); > > + preempt_disable(); > pagefault_disable(); > enable_kernel_vsx(); > ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); > disable_kernel_vsx(); > pagefault_enable(); > + preempt_enable(); > > ret += crypto_blkcipher_setkey(ctx->fallback, key, keylen); > return ret; > @@ -99,11 +101,13 @@ static void p8_aes_ctr_final(struct > p8_aes_ctr_ctx *ctx, u8 *dst = walk->dst.virt.addr; > unsigned int nbytes = walk->nbytes; > > + preempt_disable(); > pagefault_disable(); > enable_kernel_vsx(); > aes_p8_encrypt(ctrblk, keystream, &ctx->enc_key); > disable_kernel_vsx(); > pagefault_enable(); > + preempt_enable(); > > crypto_xor(keystream, src, nbytes); > memcpy(dst, keystream, nbytes); > @@ -132,6 +136,7 @@ static int p8_aes_ctr_crypt(struct blkcipher_desc > *desc, blkcipher_walk_init(&walk, dst, src, nbytes); > ret = blkcipher_walk_virt_block(desc, &walk, > AES_BLOCK_SIZE); while ((nbytes = walk.nbytes) >= AES_BLOCK_SIZE) { > + preempt_disable(); > pagefault_disable(); > enable_kernel_vsx(); > aes_p8_ctr32_encrypt_blocks(walk.src.virt.addr, > @@ -143,6 +148,7 @@ static int p8_aes_ctr_crypt(struct blkcipher_desc > *desc, walk.iv); > disable_kernel_vsx(); > pagefault_enable(); > + preempt_enable(); > > /* We need to update IV mostly for last > bytes/round */ inc = (nbytes & AES_BLOCK_MASK) / AES_BLOCK_SIZE; > > Well observed, Thanks.