From: Jorgen Lundman <lundman@lundman.net>
To: unlisted-recipients:; (no To-header on input)
Cc: Jussi Kivilinna <jussi.kivilinna@mbnet.fi>, linux-crypto@vger.kernel.org
Subject: Re: Crypto causes panic in scatterwalk_done with large/multiple buffers
Date: Mon, 19 Nov 2012 09:29:22 +0900 [thread overview]
Message-ID: <50A97D62.1000604@lundman.net> (raw)
In-Reply-To: <20121118194033.20427f1141j4ic4c@www.dalek.fi>
>
> From what I now researched, you must not pass vmalloc'd memory to
> sg_set_buf() as it internally uses virt_to_page() to get page of buffer
> address. You most likely need to walk through your vmalloc'd buffer and
> pass all individual pages to scatterlist with sg_set_page().
I was told the same, so I wrote something that called vmalloc_to_page() for
each PAGE_SIZE of the vmalloced memory, with offsets, and created large
scatterlists (well, around ~120 or so).
Made no difference at all, still dies in scatterwalk_done.
Looking at blkcipher (ccm->ctr->blkcipher) and I see it has methods for
_phys(), _virt(), _virt_block(), _fast(), _slow() and _copy(). I was quite
interested in the copy() method, since that is what I am doing at the top.
No idea how I affect those types of use. phys and virt seem to be handled
internally, and virt_block() is what ctr.c uses.
This made me think the vmalloc thing isn't my problem.
Then I copied ccm.c, ctr.c and blkcipher.c to my own module, just so that I
could commend out:
static void Xscatterwalk_pagedone(struct scatter_walk *walk, int out,
unsigned int more)
{
if (out) {
struct page *page;
page = sg_page(walk->sg) + ((walk->offset - 1) >> PAGE_SHIFT);
#if 0
/*
* This call causes panic, so all these sources are just to
* avoid this call.
*
* Once this issue has been fixed, we can remove the entire
* "sun-ccm(aes)" module.
*
*/
if (!PageSlab(page))
flush_dcache_page(page);
#endif
}
if (more) {
And making the two functions, Xscatterwalk_done() and
Xscatterwalk_copychunks(), to call my version instead.
Wouldn't you know, all panics are gone. The misaligned buffer panic, gone.
Reverted back to just passing vmalloc() memory, no problems.
I have been running multi-gig bonnie++ for 24 hours (file system related
crypto). I am trusting that it is working now.
Tested with 3.2.0-0.bpo.3-amd64 and 3.5.0-17-generic.
> This is strange as crypto subsystem's internal test mechanism uses such
> offsetted buffers.
>
I'm sure it does. I run my tests about 100 times and it usually dies around
~40th.
I appreciate your help,
Lund
--
Jorgen Lundman | <lundman@lundman.net>
Unix Administrator | +81 (0)3 -5456-2687 ext 1017 (work)
Shibuya-ku, Tokyo | +81 (0)90-5578-8500 (cell)
Japan | +81 (0)3 -3375-1767 (home)
prev parent reply other threads:[~2012-11-19 0:29 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-11-15 9:03 Crypto causes panic in scatterwalk_done with large/multiple buffers Jorgen Lundman
2012-11-17 0:42 ` Jussi Kivilinna
2012-11-17 8:39 ` Jussi Kivilinna
2012-11-18 0:29 ` Jorgen Lundman
2012-11-18 2:10 ` Jorgen Lundman
2012-11-18 17:40 ` Jussi Kivilinna
2012-11-19 0:29 ` Jorgen Lundman [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=50A97D62.1000604@lundman.net \
--to=lundman@lundman.net \
--cc=jussi.kivilinna@mbnet.fi \
--cc=linux-crypto@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox