[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ZtG1V9me28OvU0Qu@zx2c4.com>
Date: Fri, 30 Aug 2024 14:04:39 +0200
From: "Jason A. Donenfeld" <Jason@...c4.com>
To: Will Deacon <will@...nel.org>
Cc: Adhemerval Zanella <adhemerval.zanella@...aro.org>,
Theodore Ts'o <tytso@....edu>, linux-kernel@...r.kernel.org,
linux-crypto@...r.kernel.org, linux-arm-kernel@...ts.infradead.org,
linux-arch@...r.kernel.org,
Catalin Marinas <catalin.marinas@....com>,
Thomas Gleixner <tglx@...utronix.de>,
Eric Biggers <ebiggers@...nel.org>,
Christophe Leroy <christophe.leroy@...roup.eu>, ardb@...nel.org
Subject: Re: [PATCH v2] aarch64: vdso: Wire up getrandom() vDSO implementation
> > +SYM_FUNC_START(__arch_chacha20_blocks_nostack)
>
> Is there any way we can reuse the existing code in
> crypto/chacha-neon-core.S for this? It looks to my untrained eye like
> this is an arbitrarily different implementation to what we already have.
Nope, it is indeed different, and not arbitrarily so. This patch is
mirroring exactly what we did on x86.
Jason
Powered by blists - more mailing lists