/* * UWB PAL support. * * Copyright (C) 2008 Cambridge Silicon Radio Ltd. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License version * 2 as published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #include #include #include #include #include "uwb-internal.h" /** * uwb_pal_init - initialize a UWB PAL * @pal: the PAL to initialize */ void uwb_pal_init(struct uwb_pal *pal) { INIT_LIST_HEAD(&pal->node); } EXPORT_SYMBOL_GPL(uwb_pal_init); /** * uwb_pal_register - register a UWB PAL * @pal: the PAL * * The PAL must be initialized with uwb_pal_init(). */ int uwb_pal_register(struct uwb_pal *pal) { struct uwb_rc *rc = pal->rc; int ret; if (pal->device) { /* create a link to the uwb_rc in the PAL device's directory. */ ret = sysfs_create_link(&pal->device->kobj, &rc->uwb_dev.dev.kobj, "uwb_rc"); if (ret < 0) return ret; /* create a link to the PAL in the UWB device's directory. */ ret = sysfs_create_link(&rc->uwb_dev.dev.kobj, &pal->device->kobj, pal->name); if (ret < 0) { sysfs_remove_link(&pal->device->kobj, "uwb_rc"); return ret; } } pal->debugfs_dir = uwb_dbg_create_pal_dir(pal); mutex_lock(&rc->uwb_dev.mutex); list_add(&pal->node, &rc->pals); mutex_unlock(&rc->uwb_dev.mutex); return 0; } EXPORT_SYMBOL_GPL(uwb_pal_register); static int find_rc(struct device *dev, const void *data) { const struct uwb_rc *target_rc = data; struct uwb_rc *rc = dev_get_drvdata(dev); if (rc == NULL) { WARN_ON(1); return 0; } if (rc == target_rc) { if (rc->ready == 0) return 0; else return 1; } return 0; } /** * Given a radio controller descriptor see if it is registered. * * @returns false if the rc does not exist or is quiescing; true otherwise. */ static bool uwb_rc_class_device_exists(struct uwb_rc *target_rc) { struct device *dev; dev = class_find_device(&uwb_rc_class, NULL, target_rc, find_rc); put_device(dev); return (dev != NULL); } /** * uwb_pal_unregister - unregister a UWB PAL * @pal: the PAL */ void uwb_pal_unregister(struct uwb_pal *pal) { struct uwb_rc *rc = pal->rc; uwb_radio_stop(pal); mutex_lock(&rc->uwb_dev.mutex); list_del(&pal->node); mutex_unlock(&rc->uwb_dev.mutex); debugfs_remove(pal->debugfs_dir); if (pal->device) { /* remove link to the PAL in the UWB device's directory. */ if (uwb_rc_class_device_exists(rc)) sysfs_remove_link(&rc->uwb_dev.dev.kobj, pal->name); /* remove link to uwb_rc in the PAL device's directory. */ sysfs_remove_link(&pal->device->kobj, "uwb_rc"); } } EXPORT_SYMBOL_GPL(uwb_pal_unregister); /** * uwb_rc_pal_init - initialize the PAL related parts of a radio controller * @rc: the radio controller */ void uwb_rc_pal_init(struct uwb_rc *rc) { INIT_LIST_HEAD(&rc->pals); } net-next.git/commit/security/keys/encrypted-keys/encrypted.c?id=02608e02fbec04fccf2eb0cc8d8082f65c0a4286'>encrypted.c
diff options
context:
space:
mode:
authorLaura Abbott <labbott@redhat.com>2016-12-21 12:32:54 -0800
committerHerbert Xu <herbert@gondor.apana.org.au>2016-12-27 17:32:11 +0800
commit02608e02fbec04fccf2eb0cc8d8082f65c0a4286 (patch)
tree37ff0410d130cfe77185f591b07cd6403f207f0c /security/keys/encrypted-keys/encrypted.c
parent7ce7d89f48834cefece7804d38fc5d85382edf77 (diff)
crypto: testmgr - Use heap buffer for acomp test input
Christopher Covington reported a crash on aarch64 on recent Fedora kernels: kernel BUG at ./include/linux/scatterlist.h:140! Internal error: Oops - BUG: 0 [#1] PREEMPT SMP Modules linked in: CPU: 2 PID: 752 Comm: cryptomgr_test Not tainted 4.9.0-11815-ge93b1cc #162 Hardware name: linux,dummy-virt (DT) task: ffff80007c650080 task.stack: ffff800008910000 PC is at sg_init_one+0xa0/0xb8 LR is at sg_init_one+0x24/0xb8 ... [<ffff000008398db8>] sg_init_one+0xa0/0xb8 [<ffff000008350a44>] test_acomp+0x10c/0x438 [<ffff000008350e20>] alg_test_comp+0xb0/0x118 [<ffff00000834f28c>] alg_test+0x17c/0x2f0 [<ffff00000834c6a4>] cryptomgr_test+0x44/0x50 [<ffff0000080dac70>] kthread+0xf8/0x128 [<ffff000008082ec0>] ret_from_fork+0x10/0x50 The test vectors used for input are part of the kernel image. These inputs are passed as a buffer to sg_init_one which eventually blows up with BUG_ON(!virt_addr_valid(buf)). On arm64, virt_addr_valid returns false for the kernel image since virt_to_page will not return the correct page. Fix this by copying the input vectors to heap buffer before setting up the scatterlist. Reported-by: Christopher Covington <cov@codeaurora.org> Fixes: d7db7a882deb ("crypto: acomp - update testmgr with support for acomp") Signed-off-by: Laura Abbott <labbott@redhat.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'security/keys/encrypted-keys/encrypted.c')