Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp2645380rwb; Sun, 15 Jan 2023 19:44:22 -0800 (PST) X-Google-Smtp-Source: AMrXdXscaQxoIQzCI74gn1lMVL28aBzJLbTJR2gfntn02JGqUa40uusO/K+FZdYHVCSbvB+Z9VeB X-Received: by 2002:a17:906:6693:b0:7c1:8ba7:3182 with SMTP id z19-20020a170906669300b007c18ba73182mr85064168ejo.69.1673840661986; Sun, 15 Jan 2023 19:44:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673840661; cv=none; d=google.com; s=arc-20160816; b=ddjKr/1Qa+LjWOXAMNmiRi8UDd5F2ULLz7g3w82waKHMSmtwI1FMtwQ3SUa3RAKElJ xw2ZJ8MNIErP0Zg74CGb631CVD6VnvDBp4w6C9FVQ2vDYtGORCyJYuXH8GFkq7p0Mfjf EWDZjQevtCF/sSldHSUBAuJwG12Iso1ug1HTcTmF0UZBKvwro8VO3qEJVOmVXNP0EE2p PxBYkhvJ4VYkIps3me/ibYiHzxp6BIcw0ntstvGjRfWV1oYbxPEnJhnRtfCzgyMNNVgF LwzjeiM3LIVZfMf1GXewr5jgutUuUlRo7wd+3IcT/3uaFCPH6AP2Xukr80JnP2FdjECK Whew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=xGfCeqVOsso9NmoV67I0RTxb8sZsxJ0F8i1c4dNaKws=; b=zquFTgHcBqGxia0yowdH5aI3xGHZrH3niRilk81V3sdU8/fP0HjTdj6eQyQ8QimMtO hIL3WAo/S5EtP0quEK/oqo0o2YHzRM7liL8cXlngRGAz8xtHvUtXWIFoQROHLLOvrSF9 EiLdQSMNw3Y2ExNOVF19HbPyqTTVa4wYBoJ5xlZNjgUi8DCZRTGJ+cb3Ih+944S0kuq1 epbHUj3sDjuUTvngIAeLI6FEPuScr8/Vi0Tjgz1n0hah8gE48Zndmb8YR0PHYAVkNCn1 GNRst44+zsm6JHhdkqMN/BsTcrW4hD7Mk6rkHe1sCyWrL+kGPiaZA12Cd6VriVRYy/8s goSQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id xg3-20020a170907320300b007c4fe4301basi29012954ejb.983.2023.01.15.19.43.58; Sun, 15 Jan 2023 19:44:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231624AbjAPDdr (ORCPT + 99 others); Sun, 15 Jan 2023 22:33:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39532 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231756AbjAPDdq (ORCPT ); Sun, 15 Jan 2023 22:33:46 -0500 Received: from formenos.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 568803C34; Sun, 15 Jan 2023 19:33:45 -0800 (PST) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1pHGF9-000Mjk-F4; Mon, 16 Jan 2023 11:33:08 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Mon, 16 Jan 2023 11:33:07 +0800 Date: Mon, 16 Jan 2023 11:33:07 +0800 From: Herbert Xu To: "Elliott, Robert (Servers)" Cc: Eric Biggers , "davem@davemloft.net" , "Jason@zx2c4.com" , "ardb@kernel.org" , "ap420073@gmail.com" , "David.Laight@aculab.com" , "tim.c.chen@linux.intel.com" , "peter@n8pjl.ca" , "tglx@linutronix.de" , "mingo@redhat.com" , "bp@alien8.de" , "dave.hansen@linux.intel.com" , "linux-crypto@vger.kernel.org" , "x86@kernel.org" , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH 03/13] crypto: x86/sha - yield FPU context during long loops Message-ID: References: <20221219220223.3982176-1-elliott@hpe.com> <20221219220223.3982176-4-elliott@hpe.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, Jan 13, 2023 at 07:35:07PM +0000, Elliott, Robert (Servers) wrote: > > pkcs_digest() uses shash like this: > /* Allocate the hashing algorithm we're going to need and find out how > * big the hash operational data will be. > */ > tfm = crypto_alloc_shash(sinfo->sig->hash_algo, 0, 0); > if (IS_ERR(tfm)) > return (PTR_ERR(tfm) == -ENOENT) ? -ENOPKG : PTR_ERR(tfm); > > desc_size = crypto_shash_descsize(tfm) + sizeof(*desc); > sig->digest_size = crypto_shash_digestsize(tfm); > > ret = -ENOMEM; > sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); > if (!sig->digest) > goto error_no_desc; > > desc = kzalloc(desc_size, GFP_KERNEL); > if (!desc) > goto error_no_desc; > > desc->tfm = tfm; > > /* Digest the message [RFC2315 9.3] */ > ret = crypto_shash_digest(desc, pkcs7->data, pkcs7->data_len, > sig->digest); > if (ret < 0) > goto error; > pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); As this path is sleepable, the conversion should be fairly trivial with crypto_wait_req. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt