четверг

[Bug 2142246] [NEW] Risc-V accelerated SHA512 will now require (quick) Zicclsm

Public bug reported:

A change has been introduced through the upstream stable trees that will
require RISCV_EFFICIENT_VECTOR_UNALIGNED_ACCESS be enabled to use many
of the accelerated cryptographic functions. The default questing kernel
currently doesn't enable this option, (as far as I can tell because
RVA23 doesn't guarantee Zicclsm, let alone quick vector unaligned
access) and so this will be removed by default for riscv64.

Affected kernel options are:
- CONFIG_CRYPTO_AES_RISCV64
- CONFIG_CRYPTO_GHASH_RISCV64
- CONFIG_CRYPTO_LIB_SHA256_ARCH
- CONFIG_CRYPTO_LIB_SHA512_ARCH
- CONFIG_CRYPTO_SM3_RISCV64
- CONFIG_CRYPTO_SM4_RISCV64

If these are being actively used and are required, the required RISCV_EFFICIENT_VECTOR_UNALIGNED_ACCESS
config should be enabled on the derivative kernel.

** Affects: linux (Ubuntu)
Importance: Medium
Assignee: Alice C. Munduruca (cremfuelled)
Status: Confirmed

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2142246

Title:
Risc-V accelerated SHA512 will now require (quick) Zicclsm

Status in linux package in Ubuntu:
Confirmed

Bug description:
A change has been introduced through the upstream stable trees that
will require RISCV_EFFICIENT_VECTOR_UNALIGNED_ACCESS be enabled to use
many of the accelerated cryptographic functions. The default questing
kernel currently doesn't enable this option, (as far as I can tell
because RVA23 doesn't guarantee Zicclsm, let alone quick vector
unaligned access) and so this will be removed by default for riscv64.

Affected kernel options are:
- CONFIG_CRYPTO_AES_RISCV64
- CONFIG_CRYPTO_GHASH_RISCV64
- CONFIG_CRYPTO_LIB_SHA256_ARCH
- CONFIG_CRYPTO_LIB_SHA512_ARCH
- CONFIG_CRYPTO_SM3_RISCV64
- CONFIG_CRYPTO_SM4_RISCV64

If these are being actively used and are required, the required RISCV_EFFICIENT_VECTOR_UNALIGNED_ACCESS
config should be enabled on the derivative kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2142246/+subscriptions

Комментариев нет:

Отправить комментарий