Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.1/patches/2222282/?format=api
{ "id": 2222282, "url": "http://patchwork.ozlabs.org/api/1.1/patches/2222282/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260411070637.72421-8-james.hilliard1@gmail.com/", "project": { "id": 14, "url": "http://patchwork.ozlabs.org/api/1.1/projects/14/?format=api", "name": "QEMU Development", "link_name": "qemu-devel", "list_id": "qemu-devel.nongnu.org", "list_email": "qemu-devel@nongnu.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260411070637.72421-8-james.hilliard1@gmail.com>", "date": "2026-04-11T07:06:34", "name": "[8/9] target/mips: add Octeon Camellia crypto support", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "e1e77414119279207c0b76e2cb370ae4db349902", "submitter": { "id": 66301, "url": "http://patchwork.ozlabs.org/api/1.1/people/66301/?format=api", "name": "James Hilliard", "email": "james.hilliard1@gmail.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260411070637.72421-8-james.hilliard1@gmail.com/mbox/", "series": [ { "id": 499531, "url": "http://patchwork.ozlabs.org/api/1.1/series/499531/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=499531", "date": "2026-04-11T07:06:33", "name": "[1/9] linux-user/mips, target/mips: honor MIPS_FIXADE for unaligned accesses", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/499531/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2222282/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2222282/checks/", "tags": {}, "headers": { "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=dr+Iz4PK;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from lists.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4ft4WP6Mq8z1yGb\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 11 Apr 2026 17:08:01 +1000 (AEST)", "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wBSQz-0001cN-4P; Sat, 11 Apr 2026 03:07:13 -0400", "from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <james.hilliard1@gmail.com>)\n id 1wBSQw-0001bi-W4\n for qemu-devel@nongnu.org; Sat, 11 Apr 2026 03:07:11 -0400", "from mail-oi1-x231.google.com ([2607:f8b0:4864:20::231])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.90_1) (envelope-from <james.hilliard1@gmail.com>)\n id 1wBSQv-000112-0x\n for qemu-devel@nongnu.org; Sat, 11 Apr 2026 03:07:10 -0400", "by mail-oi1-x231.google.com with SMTP id\n 5614622812f47-470145d7e6fso1122045b6e.2\n for <qemu-devel@nongnu.org>; Sat, 11 Apr 2026 00:07:08 -0700 (PDT)", "from Mac.localdomain (71-218-253-186.hlrn.qwest.net.\n [71.218.253.186]) by smtp.gmail.com with ESMTPSA id\n 5614622812f47-478a0f1e841sm2651091b6e.5.2026.04.11.00.07.06\n (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);\n Sat, 11 Apr 2026 00:07:06 -0700 (PDT)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=gmail.com; s=20251104; t=1775891228; x=1776496028; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=i3mqzqFktVAsD33oYdiATk+me8iVIppTrgqW8wbij8Y=;\n b=dr+Iz4PK1Rulm1d6US+ToC1TeBLNQH/CpdIW0qiYuBiJkaLor1BM46tkWS3EjWJq4Z\n tU866r3/4oV9MTNLQ3wOsHmOOSSdnudplvd4vRc99aeZ+ah3FCcfgaRtyHM4Q2oA/mTM\n eMxHN9ieowXYiVYCNF/6zwB7QO1geDaEJmuGroyeN+H8izKiGb4aVTjLc4xxi5RKsCFA\n WVs/S2ASL87NYJ0pP+0NoD1isIKDTQav3Hbx3d2ouFvyc+bi4kVIvhWAPCbMd+YDpLns\n EQJE9j5KoTS9tsCji7+mWH6ZnjI/X8bQcPVKQKeGZuYKI+o/Ud4oFR7i/ii+haKgFtiq\n k+8g==", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1775891228; x=1776496028;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=i3mqzqFktVAsD33oYdiATk+me8iVIppTrgqW8wbij8Y=;\n b=LEmcGbPwdlJoEtZjF3z3X6RIeXqqw7BotiuQCEADohl12OPqbl3jdaHZF88LC3vtPA\n PZP/vxfEchbO4m4YqC57PYSoqrayghVmn4eq5trNbff8Tm8Wq4u395vVMr3+IOJ4T6bU\n t1Ewm4nXQ38ANSHiLmJhnPeM6dpkXq8fQSXTOQi1VE50walGUh8zcGXp1IhJjKa/33H+\n Gag4S+PUOWQ0Z2SjBri9DsMKZRu470/J3Krzt9Ayef5qZ3pqKu6tBgJu2K9gE7OSOt5f\n 9nZTlOT62e2IlvhbuHt3sXVHFuLm9mq+UFjwdwS+3chzmnjweSbVG+GxWWXyqcUEz6Gr\n JW8w==", "X-Gm-Message-State": "AOJu0Yzcwa9471dVEUgdZ3MXffqzhQ/NdT1ZeVooomI7dEJO3371+dw2\n Zl1fTRmmyQvaiFsp3sRMcq3n6pWB8pbJGrTVTazWoANi4j2ptqzSHeKCO7kiuZER6YQ=", "X-Gm-Gg": "AeBDieuzIp8lLk70+G1/P2X2PcunXA5iUEP1khArzIjXp0WZBQ9O8zaZJuMfuylm1bT\n lmix9/Yku6NwC2Yw33HCEApj9mdfJXo+QOx9y/zmzcGRZcAiHN3RLUKPSoI1zjljfou0p0SMrXn\n PDvYaIEG5hLa0+xOH4yuFXvo653oeiizu50pX4raiq17Eu1lvvlHuEvWqP6pxihGp9WXY6QQTZK\n s0p5lvNZS/CF7oS8dchhR+Ewj4a83kdhoFgQ+6imRpInYUYOYI0ztJ8HcUCpu++qvrag7hcb/MM\n eB5+p7d5AQf0BTzSZGYLIeQy/E3NXdI+7eG+1qY/vL/bjCJZgQa22ZOw9LV8EPv6UJchEMghN3Y\n ZNg3QAEF8d06/RTt5xiz/sMxVcJAxPWfaaIRZ/X/Y8mtJB/QCR48DrbJUDasDz8IJLe4xE4ppkR\n zJP31T76nmeBXrn1AF6p/qTyJqWQZYXLXzV0bayOWt2ZnGi+zBTGptYk+FMwooea+8MyYMZjfMa\n lc5D3Xbg+Csox+V1krLbhoq+NUqR32cLRUM7rvN0gxOtxzAyZZMOqv5mqrSngUg07uqBzc=", "X-Received": "by 2002:a05:6808:1b10:b0:468:776:1ead with SMTP id\n 5614622812f47-4789e81b7cdmr3132863b6e.21.1775891227685;\n Sat, 11 Apr 2026 00:07:07 -0700 (PDT)", "From": "James Hilliard <james.hilliard1@gmail.com>", "To": "qemu-devel@nongnu.org", "Cc": "James Hilliard <james.hilliard1@gmail.com>,\n Laurent Vivier <laurent@vivier.eu>,\n Pierrick Bouvier <pierrick.bouvier@linaro.org>, =?utf-8?q?Philippe_Mathieu-?=\n\t=?utf-8?q?Daud=C3=A9?= <philmd@linaro.org>,\n Aurelien Jarno <aurelien@aurel32.net>, Jiaxun Yang <jiaxun.yang@flygoat.com>,\n Aleksandar Rikalo <arikalo@gmail.com>, Huacai Chen <chenhuacai@kernel.org>", "Subject": "[PATCH 8/9] target/mips: add Octeon Camellia crypto support", "Date": "Sat, 11 Apr 2026 01:06:34 -0600", "Message-ID": "<20260411070637.72421-8-james.hilliard1@gmail.com>", "X-Mailer": "git-send-email 2.53.0", "In-Reply-To": "<20260411070637.72421-1-james.hilliard1@gmail.com>", "References": "<20260411070637.72421-1-james.hilliard1@gmail.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Received-SPF": "pass client-ip=2607:f8b0:4864:20::231;\n envelope-from=james.hilliard1@gmail.com; helo=mail-oi1-x231.google.com", "X-Spam_score_int": "-17", "X-Spam_score": "-1.8", "X-Spam_bar": "-", "X-Spam_report": "(-1.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001,\n RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no", "X-Spam_action": "no action", "X-BeenThere": "qemu-devel@nongnu.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "qemu development <qemu-devel.nongnu.org>", "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>", "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>", "List-Post": "<mailto:qemu-devel@nongnu.org>", "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>", "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>", "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org", "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org" }, "content": "Add the Octeon Camellia ROUND, FL, and FLINV selectors and model the\nround engine that reuses the AES RESULT/RESINP bank.\n\nImplement the Camellia F-function and FL layers directly from RFC 3713\nso guest-managed key schedules can drive the engine through the hardware\ninterface.\n\nSigned-off-by: James Hilliard <james.hilliard1@gmail.com>\n---\n target/mips/cpu.h | 9 +++\n target/mips/tcg/octeon_crypto.c | 120 ++++++++++++++++++++++++++++++++\n target/mips/tcg/translate.c | 3 +\n 3 files changed, 132 insertions(+)", "diff": "diff --git a/target/mips/cpu.h b/target/mips/cpu.h\nindex 8249b17e8a..69f96172d8 100644\n--- a/target/mips/cpu.h\n+++ b/target/mips/cpu.h\n@@ -595,6 +595,14 @@ typedef enum MIPSOcteonCop2Sel {\n OCTEON_COP2_SEL_AES_DEC0 = 0x010e,\n OCTEON_COP2_SEL_AES_KEYLENGTH = 0x0110,\n OCTEON_COP2_SEL_AES_DAT0 = 0x0111,\n+ /*\n+ * Camellia reuses the AES RESULT/RESINP bank and adds per-round and\n+ * diffusion-layer selectors for the guest-managed key schedule.\n+ */\n+ OCTEON_COP2_SEL_CAMELLIA_RESINP0 = OCTEON_COP2_SEL_AES_RESULT0,\n+ OCTEON_COP2_SEL_CAMELLIA_RESINP1 = OCTEON_COP2_SEL_AES_RESULT1,\n+ OCTEON_COP2_SEL_CAMELLIA_FL = 0x0115,\n+ OCTEON_COP2_SEL_CAMELLIA_FLINV = 0x0116,\n /*\n * SMS4 reuses the AES result/input, IV, and key banks and only adds\n * operation selectors for ECB/CBC encrypt/decrypt.\n@@ -696,6 +704,7 @@ typedef enum MIPSOcteonCop2Sel {\n OCTEON_COP2_SEL_AES_ENC1 = 0x310b,\n OCTEON_COP2_SEL_AES_DEC_CBC1 = 0x310d,\n OCTEON_COP2_SEL_AES_DEC1 = 0x310f,\n+ OCTEON_COP2_SEL_CAMELLIA_ROUND = 0x3114,\n OCTEON_COP2_SEL_SMS4_ENC_CBC1 = 0x3119,\n OCTEON_COP2_SEL_SMS4_ENC1 = 0x311b,\n OCTEON_COP2_SEL_SMS4_DEC_CBC1 = 0x311d,\ndiff --git a/target/mips/tcg/octeon_crypto.c b/target/mips/tcg/octeon_crypto.c\nindex 317dd89cd2..70cd1ddcac 100644\n--- a/target/mips/tcg/octeon_crypto.c\n+++ b/target/mips/tcg/octeon_crypto.c\n@@ -1584,6 +1584,117 @@ static void octeon_aes_store_block(uint64_t regs[2], const uint8_t *block)\n regs[1] = ldq_be_p(block + 8);\n }\n \n+static const uint8_t octeon_camellia_sbox1[256] = {\n+ 112, 130, 44, 236, 179, 39, 192, 229, 228, 133, 87, 53, 234, 12,\n+ 174, 65, 35, 239, 107, 147, 69, 25, 165, 33, 237, 14, 79, 78,\n+ 29, 101, 146, 189, 134, 184, 175, 143, 124, 235, 31, 206, 62, 48,\n+ 220, 95, 94, 197, 11, 26, 166, 225, 57, 202, 213, 71, 93, 61,\n+ 217, 1, 90, 214, 81, 86, 108, 77, 139, 13, 154, 102, 251, 204,\n+ 176, 45, 116, 18, 43, 32, 240, 177, 132, 153, 223, 76, 203, 194,\n+ 52, 126, 118, 5, 109, 183, 169, 49, 209, 23, 4, 215, 20, 88,\n+ 58, 97, 222, 27, 17, 28, 50, 15, 156, 22, 83, 24, 242, 34,\n+ 254, 68, 207, 178, 195, 181, 122, 145, 36, 8, 232, 168, 96, 252,\n+ 105, 80, 170, 208, 160, 125, 161, 137, 98, 151, 84, 91, 30, 149,\n+ 224, 255, 100, 210, 16, 196, 0, 72, 163, 247, 117, 219, 138, 3,\n+ 230, 218, 9, 63, 221, 148, 135, 92, 131, 2, 205, 74, 144, 51,\n+ 115, 103, 246, 243, 157, 127, 191, 226, 82, 155, 216, 38, 200, 55,\n+ 198, 59, 129, 150, 111, 75, 19, 190, 99, 46, 233, 121, 167, 140,\n+ 159, 110, 188, 142, 41, 245, 249, 182, 47, 253, 180, 89, 120, 152,\n+ 6, 106, 231, 70, 113, 186, 212, 37, 171, 66, 136, 162, 141, 250,\n+ 114, 7, 185, 85, 248, 238, 172, 10, 54, 73, 42, 104, 60, 56,\n+ 241, 164, 64, 40, 211, 123, 187, 201, 67, 193, 21, 227, 173, 244,\n+ 119, 199, 128, 158,\n+};\n+\n+static inline uint8_t octeon_camellia_rotl8(uint8_t v, unsigned int shift)\n+{\n+ return (v << shift) | (v >> (8 - shift));\n+}\n+\n+static inline uint8_t octeon_camellia_sbox2(uint8_t x)\n+{\n+ return octeon_camellia_rotl8(octeon_camellia_sbox1[x], 1);\n+}\n+\n+static inline uint8_t octeon_camellia_sbox3(uint8_t x)\n+{\n+ return octeon_camellia_rotl8(octeon_camellia_sbox1[x], 7);\n+}\n+\n+static inline uint8_t octeon_camellia_sbox4(uint8_t x)\n+{\n+ return octeon_camellia_sbox1[octeon_camellia_rotl8(x, 1)];\n+}\n+\n+static uint64_t octeon_camellia_f(uint64_t input, uint64_t key)\n+{\n+ uint64_t x = input ^ key;\n+ uint8_t t1 = octeon_camellia_sbox1[x >> 56];\n+ uint8_t t2 = octeon_camellia_sbox2((x >> 48) & 0xff);\n+ uint8_t t3 = octeon_camellia_sbox3((x >> 40) & 0xff);\n+ uint8_t t4 = octeon_camellia_sbox4((x >> 32) & 0xff);\n+ uint8_t t5 = octeon_camellia_sbox2((x >> 24) & 0xff);\n+ uint8_t t6 = octeon_camellia_sbox3((x >> 16) & 0xff);\n+ uint8_t t7 = octeon_camellia_sbox4((x >> 8) & 0xff);\n+ uint8_t t8 = octeon_camellia_sbox1[x & 0xff];\n+ uint8_t y1 = t1 ^ t3 ^ t4 ^ t6 ^ t7 ^ t8;\n+ uint8_t y2 = t1 ^ t2 ^ t4 ^ t5 ^ t7 ^ t8;\n+ uint8_t y3 = t1 ^ t2 ^ t3 ^ t5 ^ t6 ^ t8;\n+ uint8_t y4 = t2 ^ t3 ^ t4 ^ t5 ^ t6 ^ t7;\n+ uint8_t y5 = t1 ^ t2 ^ t6 ^ t7 ^ t8;\n+ uint8_t y6 = t2 ^ t3 ^ t5 ^ t7 ^ t8;\n+ uint8_t y7 = t3 ^ t4 ^ t5 ^ t6 ^ t8;\n+ uint8_t y8 = t1 ^ t4 ^ t5 ^ t6 ^ t7;\n+\n+ return ((uint64_t)y1 << 56) | ((uint64_t)y2 << 48) |\n+ ((uint64_t)y3 << 40) | ((uint64_t)y4 << 32) |\n+ ((uint64_t)y5 << 24) | ((uint64_t)y6 << 16) |\n+ ((uint64_t)y7 << 8) | y8;\n+}\n+\n+static uint64_t octeon_camellia_fl(uint64_t input, uint64_t key)\n+{\n+ uint32_t x1 = input >> 32;\n+ uint32_t x2 = input;\n+ uint32_t k1 = key >> 32;\n+ uint32_t k2 = key;\n+\n+ x2 ^= rol32(x1 & k1, 1);\n+ x1 ^= x2 | k2;\n+ return ((uint64_t)x1 << 32) | x2;\n+}\n+\n+static uint64_t octeon_camellia_flinv(uint64_t input, uint64_t key)\n+{\n+ uint32_t y1 = input >> 32;\n+ uint32_t y2 = input;\n+ uint32_t k1 = key >> 32;\n+ uint32_t k2 = key;\n+\n+ y1 ^= y2 | k2;\n+ y2 ^= rol32(y1 & k1, 1);\n+ return ((uint64_t)y1 << 32) | y2;\n+}\n+\n+static void octeon_camellia_round(MIPSOcteonCryptoState *crypto, uint64_t key)\n+{\n+ uint64_t left = crypto->aes_result[0];\n+ uint64_t right = crypto->aes_result[1];\n+\n+ crypto->aes_result[0] = right ^ octeon_camellia_f(left, key);\n+ crypto->aes_result[1] = left;\n+}\n+\n+static void octeon_camellia_fl_layer(MIPSOcteonCryptoState *crypto,\n+ uint64_t key, bool inverse)\n+{\n+ uint64_t state = crypto->aes_result[inverse ? 1 : 0];\n+\n+ crypto->aes_result[inverse ? 1 : 0] = inverse ?\n+ octeon_camellia_flinv(state, key) :\n+ octeon_camellia_fl(state, key);\n+}\n+\n static void octeon_sms4_crypt_common(MIPSOcteonCryptoState *crypto,\n bool encrypt, bool cbc)\n {\n@@ -1977,6 +2088,12 @@ void helper_octeon_cop2_dmtc2(CPUMIPSState *env, target_ulong value,\n case OCTEON_COP2_SEL_AES_KEYLENGTH:\n crypto->aes_keylen = q;\n break;\n+ case OCTEON_COP2_SEL_CAMELLIA_FL:\n+ octeon_camellia_fl_layer(crypto, q, false);\n+ break;\n+ case OCTEON_COP2_SEL_CAMELLIA_FLINV:\n+ octeon_camellia_fl_layer(crypto, q, true);\n+ break;\n case OCTEON_COP2_SEL_CRC_WRITE_POLYNOMIAL:\n case OCTEON_COP2_SEL_CRC_WRITE_POLYNOMIAL_REFLECT:\n crypto->crc_poly = q;\n@@ -2164,6 +2281,9 @@ void helper_octeon_cop2_dmtc2(CPUMIPSState *env, target_ulong value,\n crypto->aes_input[1] = q;\n octeon_aes_decrypt_common(crypto, false);\n break;\n+ case OCTEON_COP2_SEL_CAMELLIA_ROUND:\n+ octeon_camellia_round(crypto, q);\n+ break;\n case OCTEON_COP2_SEL_SMS4_ENC_CBC1:\n crypto->aes_input[1] = q;\n octeon_sms4_crypt_common(crypto, true, true);\ndiff --git a/target/mips/tcg/translate.c b/target/mips/tcg/translate.c\nindex 39fad07adc..625faae9d1 100644\n--- a/target/mips/tcg/translate.c\n+++ b/target/mips/tcg/translate.c\n@@ -9218,6 +9218,8 @@ static bool octeon_cop2_is_supported_dmtc2(uint16_t sel)\n case OCTEON_COP2_SEL_AES_DEC_CBC0:\n case OCTEON_COP2_SEL_AES_DEC0:\n case OCTEON_COP2_SEL_AES_KEYLENGTH:\n+ case OCTEON_COP2_SEL_CAMELLIA_FL:\n+ case OCTEON_COP2_SEL_CAMELLIA_FLINV:\n case OCTEON_COP2_SEL_CRC_WRITE_POLYNOMIAL:\n case OCTEON_COP2_SEL_CRC_IV:\n case OCTEON_COP2_SEL_CRC_WRITE_LEN:\n@@ -9313,6 +9315,7 @@ static bool octeon_cop2_is_supported_dmtc2(uint16_t sel)\n case OCTEON_COP2_SEL_AES_ENC1:\n case OCTEON_COP2_SEL_AES_DEC_CBC1:\n case OCTEON_COP2_SEL_AES_DEC1:\n+ case OCTEON_COP2_SEL_CAMELLIA_ROUND:\n case OCTEON_COP2_SEL_SMS4_ENC_CBC1:\n case OCTEON_COP2_SEL_SMS4_ENC1:\n case OCTEON_COP2_SEL_SMS4_DEC_CBC1:\n", "prefixes": [ "8/9" ] }