lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20150209173031.GA29656@ZenIV.linux.org.uk> Date: Mon, 9 Feb 2015 17:30:31 +0000 From: Al Viro <viro@...IV.linux.org.uk> To: Stephan Mueller <smueller@...onox.de> Cc: David Miller <davem@...emloft.net>, netdev@...r.kernel.org, linux-crypto@...r.kernel.org Subject: Re: [PATCH v3 12/18] crypto: switch af_alg_make_sg() to iov_iter On Mon, Feb 09, 2015 at 02:59:40PM +0100, Stephan Mueller wrote: > Am Mittwoch, 4. Februar 2015, 06:40:03 schrieb Al Viro: > > Hi Al, > > > From: Al Viro <viro@...iv.linux.org.uk> > > > > With that, all ->sendmsg() instances are converted to iov_iter primitives > > and are agnostic wrt the kind of iov_iter they are working with. > > So's the last remaining ->recvmsg() instance that wasn't kind-agnostic yet. > > All ->sendmsg() and ->recvmsg() advance ->msg_iter by the amount actually > > copied and none of them modifies the underlying iovec, etc. > > After testing this patch with the test application by simply executing > [1]/test/test.sh, the hash and skcipher interface invocation hang in kernel > space. Though, I am not sure where the problem is. > > For individual invocations of the tests, you may look into [1]/test/kcapi- > main.c in the comments above cavs_sym or cavs_hash. > > [1] http://www.chronox.de/libkcapi.html Very interesting; I'll try to reproduce it once I get some sleep (up since yesterday, and it's past noon here ;-/) -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists