From: "Jason A. Donenfeld" <Jason@zx2c4.com>
To: Eric Biggers <ebiggers@kernel.org>
Cc: linux-kernel@vger.kernel.org, patches@lists.linux.dev,
tglx@linutronix.de, linux-crypto@vger.kernel.org,
linux-api@vger.kernel.org, x86@kernel.org,
Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
Adhemerval Zanella Netto <adhemerval.zanella@linaro.org>,
Carlos O'Donell <carlos@redhat.com>,
Florian Weimer <fweimer@redhat.com>,
Arnd Bergmann <arnd@arndb.de>, Jann Horn <jannh@google.com>,
Christian Brauner <brauner@kernel.org>,
David Hildenbrand <dhildenb@redhat.com>,
Samuel Neves <sneves@dei.uc.pt>
Subject: Re: [PATCH v16 5/5] x86: vdso: Wire up getrandom() vDSO implementation
Date: Fri, 7 Jun 2024 17:27:45 +0200 [thread overview]
Message-ID: <ZmMm8Z5vx5HvME5M@zx2c4.com> (raw)
In-Reply-To: <20240531033816.GC6505@sol.localdomain>
On Thu, May 30, 2024 at 08:38:16PM -0700, Eric Biggers wrote:
> On Tue, May 28, 2024 at 02:19:54PM +0200, Jason A. Donenfeld wrote:
> > diff --git a/arch/x86/entry/vdso/vgetrandom-chacha.S b/arch/x86/entry/vdso/vgetrandom-chacha.S
> > new file mode 100644
> > index 000000000000..d79e2bd97598
> > --- /dev/null
> > +++ b/arch/x86/entry/vdso/vgetrandom-chacha.S
> > @@ -0,0 +1,178 @@
> > +// SPDX-License-Identifier: GPL-2.0
> > +/*
> > + * Copyright (C) 2022 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
> > + */
> > +
> > +#include <linux/linkage.h>
> > +#include <asm/frame.h>
> > +
> > +.section .rodata, "a"
> > +.align 16
> > +CONSTANTS: .octa 0x6b20657479622d323320646e61707865
> > +.text
> > +
> > +/*
> > + * Very basic SSE2 implementation of ChaCha20. Produces a given positive number
> > + * of blocks of output with a nonce of 0, taking an input key and 8-byte
> > + * counter. Importantly does not spill to the stack. Its arguments are:
> > + *
> > + * rdi: output bytes
> > + * rsi: 32-byte key input
> > + * rdx: 8-byte counter input/output
> > + * rcx: number of 64-byte blocks to write to output
> > + */
> > +SYM_FUNC_START(__arch_chacha20_blocks_nostack)
> > +
> > +.set output, %rdi
> > +.set key, %rsi
> > +.set counter, %rdx
> > +.set nblocks, %rcx
> > +.set i, %al
> > +/* xmm registers are *not* callee-save. */
> > +.set state0, %xmm0
> > +.set state1, %xmm1
> > +.set state2, %xmm2
> > +.set state3, %xmm3
> > +.set copy0, %xmm4
> > +.set copy1, %xmm5
> > +.set copy2, %xmm6
> > +.set copy3, %xmm7
> > +.set temp, %xmm8
> > +.set one, %xmm9
>
> An "interesting" x86_64 quirk: in SSE instructions, registers xmm0-xmm7 take
> fewer bytes to encode than xmm8-xmm15.
>
> Since 'temp' is used frequently, moving it into the lower range (and moving one
> of the 'copy' registers, which isn't used as frequently, into the higher range)
> decreases the code size of __arch_chacha20_blocks_nostack() by 5%.
That's a nice trick. Thank you very much for it.
Jason
next prev parent reply other threads:[~2024-06-07 15:27 UTC|newest]
Thread overview: 44+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-05-28 12:19 [PATCH v16 0/5] implement getrandom() in vDSO Jason A. Donenfeld
2024-05-28 12:19 ` [PATCH v16 1/5] mm: add VM_DROPPABLE for designating always lazily freeable mappings Jason A. Donenfeld
2024-05-28 20:41 ` Frank van der Linden
2024-05-28 20:51 ` Jason A. Donenfeld
2024-05-31 10:48 ` Jann Horn
2024-05-31 12:13 ` Jason A. Donenfeld
2024-05-31 13:00 ` Jann Horn
2024-06-07 14:35 ` Jason A. Donenfeld
2024-06-07 15:12 ` Jann Horn
2024-06-07 15:50 ` Jann Horn
2024-06-10 12:00 ` Michal Hocko
2024-06-14 18:35 ` Jason A. Donenfeld
2024-06-07 18:40 ` Andy Lutomirski
2024-05-28 12:19 ` [PATCH v16 2/5] random: add vgetrandom_alloc() syscall Jason A. Donenfeld
2024-05-31 3:59 ` Eric Biggers
2024-06-01 10:56 ` Jason A. Donenfeld
2024-06-04 17:22 ` Eric Biggers
2024-06-07 14:41 ` Jason A. Donenfeld
2024-06-07 14:45 ` Jason A. Donenfeld
2024-05-28 12:19 ` [PATCH v16 3/5] arch: allocate vgetrandom_alloc() syscall number Jason A. Donenfeld
2024-05-28 13:08 ` Geert Uytterhoeven
2024-05-28 13:10 ` Jason A. Donenfeld
2024-05-28 13:28 ` Jason A. Donenfeld
2024-05-31 2:26 ` Eric Biggers
2024-06-01 10:58 ` Jason A. Donenfeld
2024-05-28 12:19 ` [PATCH v16 4/5] random: introduce generic vDSO getrandom() implementation Jason A. Donenfeld
2024-05-31 19:12 ` Randy Dunlap
2024-05-31 19:15 ` Randy Dunlap
2024-06-07 15:37 ` Jason A. Donenfeld
2024-05-31 23:06 ` Andy Lutomirski
2024-06-07 15:52 ` Jason A. Donenfeld
2024-06-05 21:03 ` Thomas Gleixner
2024-06-05 22:10 ` Thomas Gleixner
2024-06-07 15:59 ` Jason A. Donenfeld
2024-06-07 16:32 ` Jason A. Donenfeld
2024-06-07 18:39 ` Andy Lutomirski
2024-05-28 12:19 ` [PATCH v16 5/5] x86: vdso: Wire up getrandom() vDSO implementation Jason A. Donenfeld
2024-05-31 3:38 ` Eric Biggers
2024-06-07 15:27 ` Jason A. Donenfeld [this message]
2024-05-31 19:16 ` Randy Dunlap
2024-06-07 15:30 ` Jason A. Donenfeld
2024-06-05 21:41 ` Thomas Gleixner
2024-06-07 15:32 ` Jason A. Donenfeld
2024-05-28 14:46 ` [PATCH v16 0/5] implement getrandom() in vDSO Jason A. Donenfeld
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ZmMm8Z5vx5HvME5M@zx2c4.com \
--to=jason@zx2c4.com \
--cc=adhemerval.zanella@linaro.org \
--cc=arnd@arndb.de \
--cc=brauner@kernel.org \
--cc=carlos@redhat.com \
--cc=dhildenb@redhat.com \
--cc=ebiggers@kernel.org \
--cc=fweimer@redhat.com \
--cc=gregkh@linuxfoundation.org \
--cc=jannh@google.com \
--cc=linux-api@vger.kernel.org \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=patches@lists.linux.dev \
--cc=sneves@dei.uc.pt \
--cc=tglx@linutronix.de \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).