https://bugzilla.kernel.org/show_bug.cgi?id=206049
--- Comment #5 from Erhard F. (erhar...@mailbox.org) --- (In reply to Michael Ellerman from comment #3) > Looks like other implementations check the size, can you try this: > > diff --git a/drivers/crypto/vmx/aes_xts.c b/drivers/crypto/vmx/aes_xts.c > index d59e736882f6..9fee1b1532a4 100644 > --- a/drivers/crypto/vmx/aes_xts.c > +++ b/drivers/crypto/vmx/aes_xts.c > @@ -84,6 +84,9 @@ static int p8_aes_xts_crypt(struct skcipher_request *req, > int enc) > u8 tweak[AES_BLOCK_SIZE]; > int ret; > > + if (req->cryptlen < AES_BLOCK_SIZE) > + return -EINVAL; > + > if (!crypto_simd_usable() || (req->cryptlen % XTS_BLOCK_SIZE) != 0) { > struct skcipher_request *subreq = skcipher_request_ctx(req); Your patch fixed it, thanks! Applied it on top of kernel 5.4.8 and the p8_aes_xts error did not show up in subsequent reboots. -- You are receiving this mail because: You are watching the assignee of the bug.