From: Herbert Xu Subject: Re: Deadlock when using crypto API for block devices Date: Fri, 24 Aug 2018 19:24:35 +0800 Message-ID: <20180824112435.ggizlqrymuibm6oo@gondor.apana.org.au> References: <20180824021010.hfar7gasp34ddrib@gondor.apana.org.au> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: "David S. Miller" , linux-crypto@vger.kernel.org, Mike Snitzer , dm-devel@redhat.com, linux-kernel@vger.kernel.org To: Mikulas Patocka Return-path: Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-crypto.vger.kernel.org On Fri, Aug 24, 2018 at 07:06:32AM -0400, Mikulas Patocka wrote: > > A quick search through the crypto code shows that ahash_save_req and > seqiv_aead_encrypt return -ENOMEM. > > Will you fix them? These only trigger for unaligned buffers. It would be much better if dm-crypt can ensure that the input/output is properly unaligned and if otherwise do the allocation in dm-crypt. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt