[PATCH v3] crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK
Michael Ellerman
mpe at ellerman.id.au
Tue Jan 8 19:49:14 AEDT 2019
Christophe Leroy <christophe.leroy at c-s.fr> writes:
> Le 04/01/2019 à 16:24, Horia Geanta a écrit :
>> On 1/4/2019 5:17 PM, Horia Geanta wrote:
>>> On 12/21/2018 10:07 AM, Christophe Leroy wrote:
>>> [snip]
>>>> IV cannot be on stack when CONFIG_VMAP_STACK is selected because the stack
>>>> cannot be DMA mapped anymore.
>>>> This looks better, thanks.
>>>
>>>> This patch copies the IV into the extended descriptor when iv is not
>>>> a valid linear address.
>>>>
>>> Though I am not sure the checks in place are enough.
>>>
>>>> Fixes: 4de9d0b547b9 ("crypto: talitos - Add ablkcipher algorithms")
>>>> Cc: stable at vger.kernel.org
>>>> Signed-off-by: Christophe Leroy <christophe.leroy at c-s.fr>
>>>> ---
>>>> v3: Using struct edesc buffer.
>>>>
>>>> v2: Using per-request context.
>>> [snip]
>>>> + if (ivsize && !virt_addr_valid(iv))
>>>> + alloc_len += ivsize;
>>> [snip]
>>>>
>>>> + if (ivsize && !virt_addr_valid(iv))
>>> A more precise condition would be (!is_vmalloc_addr || is_vmalloc_addr(iv))
>>>
>> Sorry for the typo, I meant:
>> (!virt_addr_valid(iv) || is_vmalloc_addr(iv))
>
> As far as I know, virt_addr_valid() means the address is in the linear
> memory space. So it cannot be a vmalloc_addr if it is a linear space
> addr, can it ?
That matches my understanding.
This is one of those historical macros that has no documentation and its
behaviour is only defined in terms of other things, so it's kind of hard
to track down.
In commit e41e53cd4fe3 ("powerpc/mm: Fix virt_addr_valid() etc. on
64-bit hash")
https://git.kernel.org/torvalds/c/e41e53cd4fe3
I said:
virt_addr_valid() is supposed to tell you if it's OK to call virt_to_page() on
an address. What this means in practice is that it should only return true for
addresses in the linear mapping which are backed by a valid PFN.
Each arch can define virt_to_page(), so presumably you *could* set
things up such that virt_to_page() worked on vmalloc addresses.
Originally virt_to_page() would basically just mask and right shift the
address and then use that as an array index to get the page. Things are
more complicated now that we have SPARSEMEM etc. but it still only works
for linear mapping addresses.
Hopefully someone who knows mm stuff can chime in and tell us if we're
missing anything :)
cheers
More information about the Linuxppc-dev
mailing list