From: Evgeniy Polyakov <[EMAIL PROTECTED]>
Date: Tue, 23 Sep 2008 22:18:42 +0400

> On Tue, Sep 23, 2008 at 08:06:32PM +0200, Dimitri Puzin ([EMAIL PROTECTED]) 
> wrote:
> > With this patch applied it still doesn't work as expected. The overflow
> > messages are gone however syslog shows
> > [  120.924266] hifn0: abort: c: 0, s: 1, d: 0, r: 0.
> > when doing cryptsetup luksFormat as in original e-mail. At this point
> > cryptsetup hangs and can't be killed with -SIGKILL. I've attached
> > SysRq-t dump of this condition.
> 
> Yes, I was wrong with the patch: HIFN does not support 64-bit addresses
> afaics.
> 
> Attached patch should not allow HIFN to be registered on 64-bit arch, so
> crypto layer will fallback to the software algorithms.
> 
> Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]>

Well, it will disallow HIFN on 32-bit systems using highmem too. :-)

In the end, you will need to use bouncebuffers or similar, it seems.
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to