Received: by 2002:a05:6358:f14:b0:e5:3b68:ec04 with SMTP id b20csp3487476rwj; Mon, 19 Dec 2022 19:59:13 -0800 (PST) X-Google-Smtp-Source: AA0mqf7jGNJjg8a/53hkcGWxpjLERWTk3umY/ZF0ijNGUAoHo8TLTbpQMEyGbgr85e1hCsDsjl4I X-Received: by 2002:a17:906:5e07:b0:7c1:22a6:818e with SMTP id n7-20020a1709065e0700b007c122a6818emr35795803eju.24.1671508753692; Mon, 19 Dec 2022 19:59:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671508753; cv=none; d=google.com; s=arc-20160816; b=thUKIPGqyAc+7R/qOKps5pMMMDoYG3YuYEwWUeZOCUY7TX9qwK8hNDGprxkP/LuI1k /ic3KtZiIXiYHcmSLV/EkthbrvzcEL7b/2Og29hYlrEru2S0A5VliATN5ZIQeJqGC5xN iywgyZPtPlB2ihHqxMiwLMOOw+JRZk/6BA07iGt9i7dd9A9PTTJZQYGrMBFPGU5o2li+ 79JkK1sIyjedwiUS6TNLqHvZBUEGiZtUbO0b5G32CSut85rAHB/ioxxrVkWKyJM20Jvg Xkv9ddo+wAYywdqJhYXPHFBWOILkM5bx0kU2EQsEt2J9niQWULR25/NoDtBc67BS2IL6 4AGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=Gs+1quz3E/ghzFaluDn9y57xI+O8Ws7K49UHR4608Qs=; b=eEAH6IztKBq5KKSDd8li+tN7srgWDwcNvSnKPLhSq7dXL2buKZrDmSzpU9ikIkA+7C 25H6Ca9UrQtzL/fbagRegbfJ/yB+Xa7LuKZm48paCtcHTLMfG8J4ADkbSsF44MpF6NLa aiug9/Q6QXDWLbrZ3r76FDLV3sCQSTn78WJzSccXFbLXgTtPDQUfBJsTLls2PUOB5Nh8 fVTW8Kg2MrWBfdRdXNNtzu1clj4954+sC4OkvEHIXDAuQN+goI54nZ7FiwvKNE9SAE3t 3r8uFeSZ9HTax7gMGUzk94AxtKXjK1bOgly4SGbLeIstspXw3xy3ZHy/S0SH97rEetKw iLFA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hw20-20020a170907a0d400b00781d82a6fc9si8749274ejc.264.2022.12.19.19.58.49; Mon, 19 Dec 2022 19:59:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229746AbiLTD6e (ORCPT + 99 others); Mon, 19 Dec 2022 22:58:34 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34300 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229489AbiLTD6e (ORCPT ); Mon, 19 Dec 2022 22:58:34 -0500 Received: from formenos.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE907632B; Mon, 19 Dec 2022 19:58:32 -0800 (PST) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1p7TlG-008kIf-61; Tue, 20 Dec 2022 11:57:51 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Tue, 20 Dec 2022 11:57:50 +0800 Date: Tue, 20 Dec 2022 11:57:50 +0800 From: Herbert Xu To: Robert Elliott Cc: davem@davemloft.net, Jason@zx2c4.com, ardb@kernel.org, ap420073@gmail.com, David.Laight@aculab.com, ebiggers@kernel.org, tim.c.chen@linux.intel.com, peter@n8pjl.ca, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 03/13] crypto: x86/sha - yield FPU context during long loops Message-ID: References: <20221219220223.3982176-1-elliott@hpe.com> <20221219220223.3982176-4-elliott@hpe.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221219220223.3982176-4-elliott@hpe.com> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Dec 19, 2022 at 04:02:13PM -0600, Robert Elliott wrote: > > +void __sha1_transform_ssse3(struct sha1_state *state, const u8 *data, int blocks) > +{ > + if (blocks <= 0) > + return; > + > + kernel_fpu_begin(); > + for (;;) { > + const int chunks = min(blocks, 4096 / SHA1_BLOCK_SIZE); > + > + sha1_transform_ssse3(state->state, data, chunks); > + data += chunks * SHA1_BLOCK_SIZE; > + blocks -= chunks; > + > + if (blocks <= 0) > + break; > + > + kernel_fpu_yield(); Shouldn't this check the MAY_SLEEP flag? Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt