From patchwork Tue Dec 20 05:40:41 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eric Biggers X-Patchwork-Id: 13077512 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 64FD7C4167B for ; Tue, 20 Dec 2022 05:42:03 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BEA278E0003; Tue, 20 Dec 2022 00:42:02 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id B9BC18E0001; Tue, 20 Dec 2022 00:42:02 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A3AB98E0003; Tue, 20 Dec 2022 00:42:02 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 8FB7D8E0001 for ; Tue, 20 Dec 2022 00:42:02 -0500 (EST) Received: from smtpin13.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 62388A0A86 for ; Tue, 20 Dec 2022 05:42:02 +0000 (UTC) X-FDA: 80261588484.13.0C0E983 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by imf15.hostedemail.com (Postfix) with ESMTP id B8772A0006 for ; Tue, 20 Dec 2022 05:42:00 +0000 (UTC) Authentication-Results: imf15.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=b4QPIeBD; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf15.hostedemail.com: domain of ebiggers@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=ebiggers@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1671514921; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=9RW0us+nStEgHZTGP1VwlpkJJVA72mMv6v798BL7tQ8=; b=PI+JVYiRAjvH8enDcJ5UcFF7JUcNx7Bn70fRO/45t0vU+RiaOecx4QdsYaDDZK+gUsuicu MPYnlZ5XTYLPte5BCVAb0rN3ZksoZp/p0fTv7sLb2rfAt3B0KMJRgyIO8AsLuTyC5asFAW RHdx82pg2A0ZPWE2TSlo66sM+C8axhs= ARC-Authentication-Results: i=1; imf15.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=b4QPIeBD; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf15.hostedemail.com: domain of ebiggers@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=ebiggers@kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1671514921; a=rsa-sha256; cv=none; b=2R8sF0uQZkNLrkr1z48BaHUdbvbbqq6reqSBqc/5Z6gh8VXRUGxw5w173K8RJ3orPi/8vJ jHCkMks6BufWJVLO8eMaxIpRaq4jjg/igT8iF/o1LzQFwpu8dWR/u9wvG7/GdkI0aTPrND yRvsGfb3LEq5MavX73V/5WxFpr0qiqw= Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 5B064B811AC; Tue, 20 Dec 2022 05:41:59 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C8630C433D2; Tue, 20 Dec 2022 05:41:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1671514919; bh=r7CcLqy65ywV0RdmBdnF4gvrkE0V7pqcwnuVzqA286k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=b4QPIeBDySeIw45tMI1nPwu6/LnNHxYWm2KdE0KmbJJA+QQ5NSMnGSgSTskJe068B a4O19R9sThYWaWHTRdN875o8NAIGdCht29RqD8fd3R9QJl5M5nPP2k0Qz/J13j+q9R szrJdxF/p54c3WPQPSOPRTgNaRp3zI0yGR3/pWPy5cZrzPmvfYUoTj8vlTrc+KfrLo r90Npm4NnbnGF2uk5qR5byeWzPI4ZzJhJp+zuPusgSYrt/dkFyuwP14LiGBH1ZF6YB FY0+pzVMYYmqqbGAPXLoFNY7XaYJRvV9podM+CJY4nTz7ktpEaNJDoh1F1ookspoH4 H6ZBz8YDu0PEw== From: Eric Biggers To: linux-crypto@vger.kernel.org Cc: Peter Zijlstra , corbet@lwn.net, will@kernel.org, boqun.feng@gmail.com, mark.rutland@arm.com, catalin.marinas@arm.com, dennis@kernel.org, tj@kernel.org, cl@linux.com, hca@linux.ibm.com, gor@linux.ibm.com, agordeev@linux.ibm.com, borntraeger@linux.ibm.com, svens@linux.ibm.com, Herbert Xu , davem@davemloft.net, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, joro@8bytes.org, suravee.suthikulpanit@amd.com, robin.murphy@arm.com, dwmw2@infradead.org, baolu.lu@linux.intel.com, Arnd Bergmann , penberg@kernel.org, rientjes@google.com, iamjoonsoo.kim@lge.com, Andrew Morton , vbabka@suse.cz, roman.gushchin@linux.dev, 42.hyeyoo@gmail.com, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-s390@vger.kernel.org, iommu@lists.linux.dev, linux-arch@vger.kernel.org Subject: [PATCH 2/3] crypto: x86/ghash - use le128 instead of u128 Date: Mon, 19 Dec 2022 21:40:41 -0800 Message-Id: <20221220054042.188537-3-ebiggers@kernel.org> X-Mailer: git-send-email 2.39.0 In-Reply-To: <20221220054042.188537-1-ebiggers@kernel.org> References: <20221220054042.188537-1-ebiggers@kernel.org> MIME-Version: 1.0 X-Rspamd-Queue-Id: B8772A0006 X-Rspamd-Server: rspam09 X-Rspam-User: X-Stat-Signature: ysjq7kd34bkmnaqhf7r48shuw9pkitog X-HE-Tag: 1671514920-918319 X-HE-Meta: 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 5SphPPWm 4sgnDddh/iR56b7FKyY/vBpUFTQASJVIn4b3/ZMtjBrd2dC6NkGUK4FOUZZ9RosgqrGzDBySjWbIOfVsp9CC4hZ3gnWBFQTh/qJaUQ1BVD2fkCnV4nAhBLjDt9IHdygEt1qBNUQiY4zp2m48= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Eric Biggers The u128 struct type is going away, so make ghash-clmulni-intel use le128 instead. Note that the field names a and b swapped, as they were backwards with u128. (a is meant to be high-order and b low-order.) Signed-off-by: Eric Biggers --- arch/x86/crypto/ghash-clmulni-intel_asm.S | 4 ++-- arch/x86/crypto/ghash-clmulni-intel_glue.c | 12 ++++++------ 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/arch/x86/crypto/ghash-clmulni-intel_asm.S b/arch/x86/crypto/ghash-clmulni-intel_asm.S index 2bf871899920..9dfeb4d31b92 100644 --- a/arch/x86/crypto/ghash-clmulni-intel_asm.S +++ b/arch/x86/crypto/ghash-clmulni-intel_asm.S @@ -88,7 +88,7 @@ SYM_FUNC_START_LOCAL(__clmul_gf128mul_ble) RET SYM_FUNC_END(__clmul_gf128mul_ble) -/* void clmul_ghash_mul(char *dst, const u128 *shash) */ +/* void clmul_ghash_mul(char *dst, const le128 *shash) */ SYM_FUNC_START(clmul_ghash_mul) FRAME_BEGIN movups (%rdi), DATA @@ -104,7 +104,7 @@ SYM_FUNC_END(clmul_ghash_mul) /* * void clmul_ghash_update(char *dst, const char *src, unsigned int srclen, - * const u128 *shash); + * const le128 *shash); */ SYM_FUNC_START(clmul_ghash_update) FRAME_BEGIN diff --git a/arch/x86/crypto/ghash-clmulni-intel_glue.c b/arch/x86/crypto/ghash-clmulni-intel_glue.c index c0ab0ff4af65..9453b094bb3b 100644 --- a/arch/x86/crypto/ghash-clmulni-intel_glue.c +++ b/arch/x86/crypto/ghash-clmulni-intel_glue.c @@ -24,17 +24,17 @@ #define GHASH_BLOCK_SIZE 16 #define GHASH_DIGEST_SIZE 16 -void clmul_ghash_mul(char *dst, const u128 *shash); +void clmul_ghash_mul(char *dst, const le128 *shash); void clmul_ghash_update(char *dst, const char *src, unsigned int srclen, - const u128 *shash); + const le128 *shash); struct ghash_async_ctx { struct cryptd_ahash *cryptd_tfm; }; struct ghash_ctx { - u128 shash; + le128 shash; }; struct ghash_desc_ctx { @@ -64,11 +64,11 @@ static int ghash_setkey(struct crypto_shash *tfm, a = get_unaligned_be64(key); b = get_unaligned_be64(key + 8); - ctx->shash.a = (b << 1) | (a >> 63); - ctx->shash.b = (a << 1) | (b >> 63); + ctx->shash.a = cpu_to_le64((a << 1) | (b >> 63)); + ctx->shash.b = cpu_to_le64((b << 1) | (a >> 63)); if (a >> 63) - ctx->shash.b ^= ((u64)0xc2) << 56; + ctx->shash.a ^= cpu_to_le64((u64)0xc2 << 56); return 0; }