Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932230Ab3D2Ukc (ORCPT ); Mon, 29 Apr 2013 16:40:32 -0400 Received: from mga09.intel.com ([134.134.136.24]:46143 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932172Ab3D2Uk3 (ORCPT ); Mon, 29 Apr 2013 16:40:29 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.87,575,1363158000"; d="scan'208";a="305198665" Subject: Re: [PATCH v2 1/4] Wrap crc_t10dif function all to use crypto transform framework From: Tim Chen To: Herbert Xu Cc: "H. Peter Anvin" , "David S. Miller" , "Martin K. Petersen" , James Bottomley , Matthew Wilcox , Jim Kukunas , Keith Busch , Erdinc Ozturk , Vinodh Gopal , James Guilford , Wajdi Feghali , Jussi Kivilinna , linux-kernel , linux-crypto@vger.kernel.org, linux-scsi@vger.kernel.org In-Reply-To: <20130428001122.GA6973@gondor.apana.org.au> References: <20130425132203.GA29501@gondor.apana.org.au> <1366910910.27102.126.camel@schen9-DESK> <20130426125224.GA4855@gondor.apana.org.au> <1366994657.27102.129.camel@schen9-DESK> <20130428001122.GA6973@gondor.apana.org.au> Content-Type: text/plain; charset="UTF-8" Date: Mon, 29 Apr 2013 13:40:30 -0700 Message-ID: <1367268030.27102.172.camel@schen9-DESK> Mime-Version: 1.0 X-Mailer: Evolution 2.32.3 (2.32.3-1.fc14) Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1464 Lines: 44 On Sun, 2013-04-28 at 08:11 +0800, Herbert Xu wrote: > On Fri, Apr 26, 2013 at 09:44:17AM -0700, Tim Chen wrote: > > > > + old_tfm = crct10dif_tfm; > > + crc_t10dif_newalg = true; > > + /* make sure new alg flag is turned on before starting to switch tfm */ > > + mb(); > > + > > + new_tfm = crypto_alloc_shash("crct10dif", 0, 0); > > + if (IS_ERR(new_tfm)) > > + goto done; > > + > > + if (old_tfm) > > + if (crypto_tfm_alg_priority(&old_tfm->base) >= > > + crypto_tfm_alg_priority(&new_tfm->base)) { > > + crypto_free_shash(new_tfm); > > + goto done; > > + } > > + crct10dif_tfm = new_tfm; > > + /* make sure update to tfm pointer is completed */ > > + mb(); > > + crypto_free_shash(old_tfm); > > This is not safe at all. You'd need to use something like RCU. > > However, I think this is an overkill. Initialising it once should > be enough. If someone really wanted to change things at run-time, > they could always build this as a module and unload/reload it. > If I allocate the transform under the mod init instead, how can I make sure that the fast version is already registered if I have it compiled in? It is not clear to me how that's done looking at the libcrc32c code. Thanks. Tim -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/