Tirumala Reddy Marri wrote:
Looks like there is bug in the do_async_xor() function where" dma_addr_t
*dma_src = (dma_addr_t *) src_list;" causing corrupting source
addresses. And dma_src is being modified in the for loop. This should
be something like dma_addr_t dma_src[src_cnt].
As you can see from the comment to async_xor:
"@src_list: array of source pages (if the dest is also a source it must
be at index zero). The contents of this array may be overwritten."
...and the comment in async_xor_init:
/* To conserve stack space the input src_list (array of page pointers)
* is reused to hold the array of dma addresses passed to the driver.
* This conversion is only possible when dma_addr_t is less than the
* the size of a pointer. HIGHMEM64G is known to violate this
* assumption.
*/
...this is deliberate, not ideal, but deliberate. The reasoning is to
avoid stack overflows for arbitrarily large arrays, so we reuse the
input source list to perform address conversions. This also happens in
the non-accelerated case to perform page_address() conversions. As a
part of the raid6 work [1] this will be changed to a preallocated
'scribble' buffer to preserve in the input parameters.
--
Dan
[1] git.kernel.org/pub/scm/linux/kernel/git/djbw/async_tx.git raid6
I just noticed the documentation in
Documentation/crypto/async-tx-api.txt does not reflect this
constraint... will fix.
--
To unsubscribe from this list: send the line "unsubscribe linux-raid" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html