On Wed, 8 Nov 2017, Eric Biggers wrote:
On Wed, Nov 08, 2017 at 08:17:12PM +, David Howells wrote:
Eric Biggers wrote:
This probably should be grouped with my series "crypto: dh - input validation
fixes", as this is also a fix for Diffie-Hellman. I was actually expecting
Herbert Xu to t
On Wed, Nov 08, 2017 at 08:17:12PM +, David Howells wrote:
> Eric Biggers wrote:
>
> > This probably should be grouped with my series "crypto: dh - input
> > validation
> > fixes", as this is also a fix for Diffie-Hellman. I was actually expecting
> > Herbert Xu to take these patches, as Di
Eric Biggers wrote:
> This probably should be grouped with my series "crypto: dh - input validation
> fixes", as this is also a fix for Diffie-Hellman. I was actually expecting
> Herbert Xu to take these patches, as Diffie-Hellman is now part of the crypto
> API (crypto/dh.c); none of the patche
Hi David,
On Wed, Nov 08, 2017 at 12:50:17PM +, David Howells wrote:
> Eric Biggers wrote:
>
> > On a non-preemptible kernel, if KEYCTL_DH_COMPUTE is called with the
> > largest permitted inputs (16384 bits), the kernel spends 10+ seconds
> > doing modular exponentiation in mpi_powm() withou
Eric Biggers wrote:
> On a non-preemptible kernel, if KEYCTL_DH_COMPUTE is called with the
> largest permitted inputs (16384 bits), the kernel spends 10+ seconds
> doing modular exponentiation in mpi_powm() without rescheduling. If all
> threads do it, it locks up the system. Moreover, it can c
From: Eric Biggers
On a non-preemptible kernel, if KEYCTL_DH_COMPUTE is called with the
largest permitted inputs (16384 bits), the kernel spends 10+ seconds
doing modular exponentiation in mpi_powm() without rescheduling. If all
threads do it, it locks up the system. Moreover, it can cause
rcu_