Re: [lkp-robot] [x86/kconfig] 81d3871900: BUG:unable_to_handle_kernel

2017-10-13 Thread Andy Lutomirski
On Fri, Oct 13, 2017 at 12:09 PM, Linus Torvalds wrote: > On Fri, Oct 13, 2017 at 6:56 AM, Andrey Ryabinin > wrote: >> >> This could be fixed by s/vmovdqa/vmovdqu change like bellow, but maybe the >> right fix >> would be to align the data

Re: [lkp-robot] [x86/kconfig] 81d3871900: BUG:unable_to_handle_kernel

2017-10-13 Thread Linus Torvalds
On Fri, Oct 13, 2017 at 6:56 AM, Andrey Ryabinin wrote: > > This could be fixed by s/vmovdqa/vmovdqu change like bellow, but maybe the > right fix > would be to align the data properly? I suspect anything that has the SHA extensions should also do unaligned loads

Re: [lkp-robot] [x86/kconfig] 81d3871900: BUG:unable_to_handle_kernel

2017-10-13 Thread Josh Poimboeuf
On Fri, Oct 13, 2017 at 04:56:43PM +0300, Andrey Ryabinin wrote: > On 10/13/2017 07:45 AM, Josh Poimboeuf wrote: > > On Thu, Oct 12, 2017 at 12:05:04PM -0500, Christopher Lameter wrote: > >> On Wed, 11 Oct 2017, Josh Poimboeuf wrote: > >> > >>> I failed to add the slab maintainers to CC on the

Re: [Part2 PATCH v5.1 12.8/31] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command

2017-10-13 Thread Brijesh Singh
On 10/13/2017 09:53 AM, Borislav Petkov wrote: ... - if (copy_from_user(data, (void __user *)(uintptr_t)uaddr, len)) + if (copy_from_user(data, (void __user *)uaddr, len)) goto e_free; IIRC, typecast was needed for i386 build, but now we have depends on X86_64

Re: [Part2 PATCH v5.1 12.8/31] crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command

2017-10-13 Thread Borislav Petkov
On Fri, Oct 06, 2017 at 08:06:06PM -0500, Brijesh Singh wrote: > The SEV_PEK_CERT_IMPORT command can be used to import the signed PEK > certificate. The command is defined in SEV spec section 5.8. > > Cc: Paolo Bonzini > Cc: "Radim Krčmář" > Cc: Borislav

Re: [lkp-robot] [x86/kconfig] 81d3871900: BUG:unable_to_handle_kernel

2017-10-13 Thread Andrey Ryabinin
On 10/13/2017 07:45 AM, Josh Poimboeuf wrote: > On Thu, Oct 12, 2017 at 12:05:04PM -0500, Christopher Lameter wrote: >> On Wed, 11 Oct 2017, Josh Poimboeuf wrote: >> >>> I failed to add the slab maintainers to CC on the last attempt. Trying >>> again. >> >> >> Hmmm... Yea. SLOB is rarely used and

Re: [PATCH] crypto: marvell - Switch cipher algs to the skcipher interface

2017-10-13 Thread Boris Brezillon
On Fri, 13 Oct 2017 15:30:32 +0200 Boris Brezillon wrote: > crypto_alg is not supposed to be directly implemented by crypto engine > driver. Drivers should instead implement specialized interfaces like *drivers. > ahash_alg or skcipher_alg. > > Migrate to

[PATCH] crypto: marvell - Switch cipher algs to the skcipher interface

2017-10-13 Thread Boris Brezillon
crypto_alg is not supposed to be directly implemented by crypto engine driver. Drivers should instead implement specialized interfaces like ahash_alg or skcipher_alg. Migrate to all cipher algorithms to the skcipher_alg interface. While at it, get rid of all references to ablkcipher including in

[PATCH] MAINTAINERS: update caam crypto driver maintainers list

2017-10-13 Thread Horia Geantă
Dan steps down as caam maintainer, being replaced by Aymen. Signed-off-by: Horia Geantă --- MAINTAINERS | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/MAINTAINERS b/MAINTAINERS index 92df4e80a170..bb3016c2c342 100644 --- a/MAINTAINERS +++ b/MAINTAINERS

Re: [Part2 PATCH v5.1 12.7/31] crypto: ccp: Implement SEV_PEK_CSR ioctl command

2017-10-13 Thread Borislav Petkov
On Thu, Oct 12, 2017 at 11:13:44PM -0500, Brijesh Singh wrote: > As per the spec, its perfectly legal to pass input.address = 0x0 and > input.length = 0x0. If userspace wants to query CSR length then it will > fill all the fields with. In response, FW will return error > (LENGTH_TO_SMALL) and

Re: [Part2 PATCH v5.1 12.7/31] crypto: ccp: Implement SEV_PEK_CSR ioctl command

2017-10-13 Thread Borislav Petkov
On Thu, Oct 12, 2017 at 09:24:01PM -0500, Brijesh Singh wrote: > I assume you mean performing the SEV state check before allocating the > memory for the CSR blob, right ? I mean, do those first: if (copy_from_user(, (void __user *)argp->data, sizeof(input))) return