Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp186251ybi; Thu, 30 May 2019 23:14:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqxzLgUAYyK3IbOW73Xww78zhymEyJpaUFAlWhnnzsKWouK8tqtHwkXVOfQ33fnnZGUxC2dQ X-Received: by 2002:a65:534b:: with SMTP id w11mr7368185pgr.210.1559283269678; Thu, 30 May 2019 23:14:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559283269; cv=none; d=google.com; s=arc-20160816; b=cwSGVuVlmprlU0zSZLg12QnnBCSClk/Df3S3nJ1WKEo0InOIvVXePakGlOcpnmAdjf NOC/cBKnBCRkSItlOF9tdV0nyxEaOwu56dK0jAYuWM9bSOZSvrfD/lj1PoXIVLpgNdvp ksqhdHivHd9mI9vElhzIiLIc7i6xR8SaaS4xxYeHy8sPc51+3rQiG03A8dx/dSVv+P9H auZxSSirH6j9L6hJjDNfEjFQ/Q1vQnW03zVBbWNk2heQVvoUug/BOL7yVI0GiKuSH3vB Y9EZQwxfsJeTTuaVgJKBBqNhRj+TLj0BBRhCpXlZunSCq02uKWC3A56cRJX0miT2dunz yWTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=/ItvZe7RkKfnObeYHHyyEfT/jY4dCGzE7J57NSZEzMo=; b=g/sMHrrmifsIupEUrMfMtfghHK48wsq/8V+IwrXCVeaooTg88G4xpDhxRf1f+ezNyE vG8/CmyrYZAVLJ6y4Fki91nrRwTMv0NbWNKx+7DT4g1qe4Xkr/OIUXg1/I2ouLFjKTFA bdxmlukag/dSx8B1MQ3S/Jnr8FU+Qs092bPm3rsrWnXlK7J7+u4kTxV8tYsTYqbZDLKK O5RtUjyTQxDN/qyGdTe7pTTy42jpzIJ+OlalU+qtSrLfDs9QDppJcZt/xS9ApWvP3kBI qQBVL3H6RgkUK39AHGUfDWZ6wULSfHRzuPVkXjmdiRpM2bJ+m/gnwwT3MRQzRzIAlC2L cGmA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p88si4447213pjp.3.2019.05.30.23.14.13; Thu, 30 May 2019 23:14:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725963AbfEaGOM (ORCPT + 99 others); Fri, 31 May 2019 02:14:12 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:45856 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725955AbfEaGOL (ORCPT ); Fri, 31 May 2019 02:14:11 -0400 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1hWanm-00047N-Ga; Fri, 31 May 2019 14:14:06 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1hWank-00055C-3G; Fri, 31 May 2019 14:14:04 +0800 Date: Fri, 31 May 2019 14:14:04 +0800 From: Herbert Xu To: Horia Geanta Cc: Ard Biesheuvel , Eric Biggers , Iuliana Prodan , "David S. Miller" , Sascha Hauer , "linux-crypto@vger.kernel.org" , "linux-kernel@vger.kernel.org" , dl-linux-imx Subject: Re: [PATCH] crypto: gcm - fix cacheline sharing Message-ID: <20190531061403.3lzvddt3r2mrn2g2@gondor.apana.org.au> References: <1559149856-7938-1-git-send-email-iuliana.prodan@nxp.com> <20190529202728.GA35103@gmail.com> <20190530053421.keesqb54yu5w7hgk@gondor.apana.org.au> <20190530132623.4h3y2bymv4uvfnms@gondor.apana.org.au> <20190531054250.p2bc3igiu4s7dmvk@gondor.apana.org.au> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, May 31, 2019 at 06:10:51AM +0000, Horia Geanta wrote: > > Driver is not touching the DMA mapped areas, the DMA API conventions are > carefully followed. > It's touching a virtual pointer that is not DMA mapped, that just happens to be > on the same cache line with a DMA mapped buffer. Well you can't control what the users give you so you must assume that the virtual address always share a cacheline with the DMA buffer. That's why you must only operate on that virtual address either before you DMA map or after you DMA unmap. Virtual addresses that you allocate yourself (including ones on the stack) are obviously not subject to this restriction. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt