From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id A9EFCC83F11 for ; Mon, 28 Aug 2023 09:43:17 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229685AbjH1Jmq convert rfc822-to-8bit (ORCPT ); Mon, 28 Aug 2023 05:42:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34282 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230146AbjH1Jmg (ORCPT ); Mon, 28 Aug 2023 05:42:36 -0400 Received: from us-smtp-delivery-44.mimecast.com (us-smtp-delivery-44.mimecast.com [205.139.111.44]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 00A4D100 for ; Mon, 28 Aug 2023 02:42:33 -0700 (PDT) Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-272-roygIhXMM0-hLGSViJHjJA-1; Mon, 28 Aug 2023 05:42:28 -0400 X-MC-Unique: roygIhXMM0-hLGSViJHjJA-1 Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com [10.11.54.9]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id ED3218564F0; Mon, 28 Aug 2023 09:42:27 +0000 (UTC) Received: from hog (unknown [10.45.224.12]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 199BD492C13; Mon, 28 Aug 2023 09:42:26 +0000 (UTC) Date: Mon, 28 Aug 2023 11:42:25 +0200 From: Sabrina Dubroca To: Scott Dial Cc: Jakub Kicinski , netdev@vger.kernel.org, Jonathan Corbet , linux-doc@vger.kernel.org Subject: Re: [PATCH net-next] macsec: introduce default_async_crypto sysctl Message-ID: References: <9328d206c5d9f9239cae27e62e74de40b258471d.1692279161.git.sd@queasysnail.net> <20230818184648.127b2ccf@kernel.org> <76e055e9-5b2b-75b9-b545-cbdbc6ad2112@scottdial.com> MIME-Version: 1.0 In-Reply-To: <76e055e9-5b2b-75b9-b545-cbdbc6ad2112@scottdial.com> X-Scanned-By: MIMEDefang 3.1 on 10.11.54.9 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: queasysnail.net Content-Type: text/plain; charset=UTF-8 Content-Disposition: inline Content-Transfer-Encoding: 8BIT Precedence: bulk List-ID: X-Mailing-List: linux-doc@vger.kernel.org 2023-08-24, 13:08:41 -0400, Scott Dial wrote: > On 8/24/2023 9:01 AM, Sabrina Dubroca wrote: > > 2023-08-23, 16:22:31 -0400, Scott Dial wrote: > > > AES-NI's implementation of gcm(aes) requires the FPU, so if it's busy the > > > decrypt gets stuck on the cryptd queue, but that queue is not > > > order-preserving. > > > > It should be (per CPU [*]). The queue itself is a linked list, and if we > > have requests on the queue we don't let new requests skip the queue. > > My apologies, I'll be the first to admit that I have not tracked all of the > code changes to either the macsec driver or linux-crypto since I first made > the commit. This comment that requests are queued forced me to review the > code again and it appears that the queueing issue was resolved in v5.2-rc1 > with commit 1661131a0479, so I no longer believe we need the > CRYPTO_ALG_ASYNC since v5.2 and going forward. Are you sure about this? 1661131a0479 pre-dates your patch by over a year. And AFAICT, that series only moved the existing FPU usable + cryptd_aead_queued tests from AESNI's implementation of gcm(aes) to common SIMD helpers. -- Sabrina