On Tue, Nov 29, 2016 at 09:45:04AM +0100, Stephan Mueller wrote: > When using SGs, only heap memory (memory that is valid as per > virt_addr_valid) is allowed to be referenced. The CTR DRBG used to > reference the caller-provided memory directly in an SG. In case the > caller provided stack memory pointers, the SG mapping is not considered > to be valid. In some cases, this would even cause a paging fault. > > The change adds a new scratch buffer that is used unconditionally to > catch the cases where the caller-provided buffer is not suitable for > use in an SG. The crypto operation of the CTR DRBG produces its output > with that scratch buffer and finally copies the content of the > scratch buffer to the caller's buffer. > > The scratch buffer is allocated during allocation time of the CTR DRBG > as its access is protected with the DRBG mutex. > > Signed-off-by: Stephan Mueller <smueller@xxxxxxxxxx> Patch applied. Thanks. -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html