Re: [PATCH] crypto: x86/sha512 - load based on CPU features

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2022-08-26 at 10:52 +0800, Herbert Xu wrote:
> On Fri, Aug 26, 2022 at 02:40:58AM +0000, Elliott, Robert (Servers) wrote:
> > Suggestion: please revert the sha512-x86 patch for a while.
> 
> This problem would have existed anyway if the module was built
> into the kernel.
> 
> > Do these functions need to break up their processing into smaller chunks
> > (e.g., a few Megabytes), calling kernel_fpu_end() periodically to 
> > allow the scheduler to take over the CPUs if needed? If so, what
> > chunk size would be appropriate?
> 
> Yes these should be limited to 4K each.  It appears that all the
> sha* helpers in arch/x86/crypto have the same problem.
> 

I think limiting chunk to 4K is reasonable to prevent the CPU from being hogged by
the crypto code for too long.

Tim




[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]
  Powered by Linux