From: Evgeniy Polyakov <johnpol@xxxxxxxxxxx> Date: Tue, 23 Sep 2008 22:18:42 +0400 > On Tue, Sep 23, 2008 at 08:06:32PM +0200, Dimitri Puzin (max@xxxxxxxxxx) wrote: > > With this patch applied it still doesn't work as expected. The overflow > > messages are gone however syslog shows > > [ 120.924266] hifn0: abort: c: 0, s: 1, d: 0, r: 0. > > when doing cryptsetup luksFormat as in original e-mail. At this point > > cryptsetup hangs and can't be killed with -SIGKILL. I've attached > > SysRq-t dump of this condition. > > Yes, I was wrong with the patch: HIFN does not support 64-bit addresses > afaics. > > Attached patch should not allow HIFN to be registered on 64-bit arch, so > crypto layer will fallback to the software algorithms. > > Signed-off-by: Evgeniy Polyakov <johnpol@xxxxxxxxxxx> Well, it will disallow HIFN on 32-bit systems using highmem too. :-) In the end, you will need to use bouncebuffers or similar, it seems. -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html