Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp3430885ybg; Mon, 28 Oct 2019 12:42:35 -0700 (PDT) X-Google-Smtp-Source: APXvYqz9Z36xfIqECgRVJUXav5hz2+iL6hFdq+LxraWlpNHfIcURjiEma2XgdTrYfnPAyUWUWFve X-Received: by 2002:aa7:ca59:: with SMTP id j25mr16238382edt.196.1572291755607; Mon, 28 Oct 2019 12:42:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572291755; cv=none; d=google.com; s=arc-20160816; b=Ao68BXLjaCsIOT02cZHmsusuYTnfRpxlhYS0UdWAfkibJUu27VTmOKYA1EDDLLK+wV 3yOa8cr1zYcMLGWdXVmBrR50gDVkDVXpNEFg/S7gN66XWx1ND9Wj3lWyWLVMlSs7m4Yw c0nnyaJte7L5B32h5MS5RTswIQZ4xOVfyI/VSWIip1ZdU4ttiesNV6PX7lO7ewBj7X7v f6aQKADRuYGyO9nzGG9zPba8YiRp2B2n9cJgz/jODZVLWBrPgv0jV+L+3oivHK9kImam Jk5GT6xMmqHlyXY3G/w9lp7p240p6iWk4MCihW1/kJspXKZiZ4ZequCPS3YGiv6led+D goug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=CkktF4NAbt0+QaAe/+XEmO6xRyETWYPJidqV/UaYi4g=; b=j5uODJtcJhJvy31moEa8GgUYiSgejgsasqcMeFQoXIAmBp/kl4hS/bOvaijVzjw12E IfOCf7UHo4b3HD3HgCy6wLsF3g0HkcXH3V7PgoHhgq7tnZVTiy++aoHCfAZZWBb8/d+N NxDl4aG5z0LfYGlIhmxYTb3g2TEc+Eg6RObjlf1TPrD9UVSzdUvOwM/1usAu1/5s7Ijg OYvG1/tukWAku5R8qCIeVrmLjdJEkMxV1xJXBmahrjZE0Wrd6AyyQ6g+16Az7ZQuizFt DAC7m+o5ByTR9a1WxNFYy80nrd5IYd64pOZojmMwH81MV843CisIY+Few4nfGkRKnW9G O/eQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=gQ5p3n8u; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id pv15si6253743ejb.346.2019.10.28.12.42.09; Mon, 28 Oct 2019 12:42:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=gQ5p3n8u; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732888AbfJ1Kg6 (ORCPT + 99 others); Mon, 28 Oct 2019 06:36:58 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:30930 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732821AbfJ1Kg6 (ORCPT ); Mon, 28 Oct 2019 06:36:58 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 471rkC5P31zB09ZS; Mon, 28 Oct 2019 11:36:51 +0100 (CET) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=gQ5p3n8u; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id HtoiVrcFoKSO; Mon, 28 Oct 2019 11:36:51 +0100 (CET) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 471rkC4Gd4zB09Zg; Mon, 28 Oct 2019 11:36:51 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1572259011; bh=CkktF4NAbt0+QaAe/+XEmO6xRyETWYPJidqV/UaYi4g=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=gQ5p3n8uwGbqZg4yJM7VCNWatvChUwMheC1RCkmkEL471TZDLxL7+d7vA8wWRpiaD iaOYuqy2tZSHICNYfZ9Xv8dQd2ZJhNfz+1TiSwAOSf+zNAJqEK99daMykGftWPCa3b E2BFESaoJop5kNaSE5I0Xpa4PsXZJVqJG2rAJDH4= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 6AE428B80E; Mon, 28 Oct 2019 11:36:56 +0100 (CET) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id Z42IZMl3TysI; Mon, 28 Oct 2019 11:36:56 +0100 (CET) Received: from [192.168.4.90] (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id D4F168B809; Mon, 28 Oct 2019 11:36:55 +0100 (CET) Subject: Re: [PATCH v2 24/27] crypto: talitos - switch to skcipher API To: Ard Biesheuvel Cc: "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" , Herbert Xu , "David S. Miller" , Eric Biggers , linux-arm-kernel References: <20191024132345.5236-1-ard.biesheuvel@linaro.org> <20191024132345.5236-25-ard.biesheuvel@linaro.org> <74d5c30d-d842-5bdb-ebb8-2aa47ffb5e8d@c-s.fr> From: Christophe Leroy Message-ID: <63c941df-ae15-733f-3b0b-35fc0ce6af51@c-s.fr> Date: Mon, 28 Oct 2019 11:36:55 +0100 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: fr Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Le 28/10/2019 à 07:20, Ard Biesheuvel a écrit : > On Sun, 27 Oct 2019 at 14:05, Christophe Leroy wrote: >> >> >> >> Le 27/10/2019 à 12:05, Ard Biesheuvel a écrit : >>> On Sun, 27 Oct 2019 at 11:45, Christophe Leroy wrote: >>>> >>>> >>>> >>>> Le 24/10/2019 à 15:23, Ard Biesheuvel a écrit : >>>>> Commit 7a7ffe65c8c5 ("crypto: skcipher - Add top-level skcipher interface") >>>>> dated 20 august 2015 introduced the new skcipher API which is supposed to >>>>> replace both blkcipher and ablkcipher. While all consumers of the API have >>>>> been converted long ago, some producers of the ablkcipher remain, forcing >>>>> us to keep the ablkcipher support routines alive, along with the matching >>>>> code to expose [a]blkciphers via the skcipher API. >>>>> >>>>> So switch this driver to the skcipher API, allowing us to finally drop the >>>>> blkcipher code in the near future. >>>>> >>>>> Signed-off-by: Ard Biesheuvel >>>> >>>> With this series, I get the following Oops at boot: >>>> >>> >>> Thanks for the report. >>> >>> Given that the series only modifies ablkcipher implementations, it is >>> rather curious that the crash occurs in ahash_init(). Can you confirm >>> that the crash does not occur with this patch reverted? >> >> Yes I confirm. >> >> You changed talitos_cra_init_ahash(). talitos_init_common() is not >> called anymore. I think that's the reason. >> > > Thanks a lot for digging into this > > Does this fix things for you? Yes it does. Thanks. Christophe > > index c29f8c02ea05..d71d65846e47 100644 > --- a/drivers/crypto/talitos.c > +++ b/drivers/crypto/talitos.c > @@ -3053,7 +3053,7 @@ static int talitos_cra_init_ahash(struct crypto_tfm *tfm) > crypto_ahash_set_reqsize(__crypto_ahash_cast(tfm), > sizeof(struct talitos_ahash_req_ctx)); > > - return 0; > + return talitos_init_common(ctx, talitos_alg); > } > > static void talitos_cra_exit(struct crypto_tfm *tfm) >