that alignment. Unaligned vmovdqa will
generate GP fault.
Fix this by replacing vmovdqa with vmovdqu which doesn't have alignment
requirements.
Fixes: a377c6b1876e ("crypto: sha256-mb - submit/flush routines for AVX2")
Reported-by: Josh Poimboeuf <jpoim...@redhat.com>
Signed-off-by:
. Unaligned vmovdqa will
generate GP fault.
Fix this by replacing vmovdqa with vmovdqu which doesn't have alignment
requirements.
Fixes: 2249cbb53ead ("crypto: sha-mb - SHA1 multibuffer submit and flush
routines for AVX2")
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.
On 10/13/2017 07:45 AM, Josh Poimboeuf wrote:
> On Thu, Oct 12, 2017 at 12:05:04PM -0500, Christopher Lameter wrote:
>> On Wed, 11 Oct 2017, Josh Poimboeuf wrote:
>>
>>> I failed to add the slab maintainers to CC on the last attempt. Trying
>>> again.
>>
>>
>> Hmmm... Yea. SLOB is rarely used and
/fulldisclosure/2016/Nov/76
[2]
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=patch;h=6e1adb05d290aeeb1c230c763970695f4a538526
Fixes: cdec9cb5167a ("crypto: GnuPG based MPI lib - source files (part 1)")
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
Cc: <sta
/0x2a0
[] entry_SYSCALL_64_fastpath+0x1e/0xad
Fixes: db6c43bd2132 ("crypto: KEYS: convert public key and digsig asym to the
akcipher api")
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
Cc: <sta...@vger.kernel.org>
---
crypto/asymmetric_keys/x509_cert_parser.c | 1 -
1 file change
()
Cc: sta...@vger.kernel.org
Signed-off-by: Ard Biesheuvel <ard.biesheu...@linaro.org>
Signed-off-by: Herbert Xu <herb...@gondor.apana.org.au>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/cryptd.c | 9 +++--
1 file changed, 7 insertions(+), 2 deletions
ockets have references to the tfm
object which bind(2) will destroy.
Cc: sta...@vger.kernel.org
Signed-off-by: Herbert Xu <herb...@gondor.apana.org.au>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/af_alg.c | 16 +++-
1 file changed, 7 insertions(+), 9
hat we return
-ENOKEY instead of proceeding.
This patch also adds a compatibility path to support old applications
that do acept(2) before setkey.
Cc: sta...@vger.kernel.org
Signed-off-by: Herbert Xu <herb...@gondor.apana.org.au>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.c
While fuzzing our 3.10 based kernel we observed some crashes, e.g:
http://lkml.kernel.org/r/
It appears that 3.10-stable lacks some crypto related fixes. Here is my attempt
to backport them.
Many patches didn't apply
<herb...@gondor.apana.org.au>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/algif_skcipher.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c
index db5f0f0..4677a45 100644
--- a/crypto/algif_skcip
<herb...@gondor.apana.org.au>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/algif_skcipher.c | 43 +++
1 file changed, 3 insertions(+), 40 deletions(-)
diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c
index 4677a
el.org
Reported-by: Dmitry Vyukov <dvyu...@google.com>
Signed-off-by: Herbert Xu <herb...@gondor.apana.org.au>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/af_alg.c | 35 ---
include/crypto/if_alg.h | 8 +++-
2 file
hash - Add crypto_ahash_has_setkey")
Cc: sta...@vger.kernel.org
Reported-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Herbert Xu <herb...@gondor.apana.org.au>
Tested-by: Stephan Mueller <smuel...@chronox.de>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.co
: Herbert Xu <herb...@gondor.apana.org.au>
Tested-by: Dmitry Vyukov <dvyu...@google.com>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/algif_skcipher.c | 14 +++---
1 file changed, 7 insertions(+), 7 deletions(-)
diff --git a/crypto/algif_skciph
na.org.au>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/ahash.c| 5 -
crypto/shash.c| 4 +++-
include/crypto/hash.h | 6 ++
3 files changed, 13 insertions(+), 2 deletions(-)
diff --git a/crypto/ahash.c b/crypto/ahash.c
index bcd5efc..781a8a7 1
<herb...@gondor.apana.org.au>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/algif_hash.c | 43 +++
1 file changed, 3 insertions(+), 40 deletions(-)
diff --git a/crypto/algif_hash.c b/crypto/algif_hash.c
index 7bc3f89..512aa36 1
;
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/ablkcipher.c| 2 ++
crypto/blkcipher.c | 1 +
include/linux/crypto.h | 8
3 files changed, 11 insertions(+)
diff --git a/crypto/ablkcipher.c b/crypto/ablkcipher.c
index ebcec74..2b6dd74 100644
--- a/crypto/
;
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/algif_skcipher.c | 149 ++--
1 file changed, 144 insertions(+), 5 deletions(-)
diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c
index c4c121a..db5f0f0 1
xiakaixu <xiaka...@huawei.com>
Reported-by: Ard Biesheuvel <ard.biesheu...@linaro.org>
Signed-off-by: Herbert Xu <herb...@gondor.apana.org.au>
Tested-by: Ard Biesheuvel <ard.biesheu...@linaro.org>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/blk
<herb...@gondor.apana.org.au>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/algif_skcipher.c | 9 ++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c
index a7800b7..13fd26e 100644
--- a/crypt
From: Herbert Xu <herb...@gondor.apana.org.au>
commit 6a935170a980024dd29199e9dbb5c4da4767a1b9 upstream.
This patch allows af_alg_release_parent to be called even for
nokey sockets.
Cc: sta...@vger.kernel.org
Signed-off-by: Herbert Xu <herb...@gondor.apana.org.au>
Signed-off-by: And
<herb...@gondor.apana.org.au>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/algif_hash.c | 9 ++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/crypto/algif_hash.c b/crypto/algif_hash.c
index 512aa36..d11d431 100644
--- a/crypto/algif_h
t been
done on the socket yet.
Cc: sta...@vger.kernel.org
Reported-by: Dmitry Vyukov <dvyu...@google.com>
Signed-off-by: Herbert Xu <herb...@gondor.apana.org.au>
Tested-by: Dmitry Vyukov <dvyu...@google.com>
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
;
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/af_alg.c | 13 -
include/crypto/if_alg.h | 2 ++
2 files changed, 14 insertions(+), 1 deletion(-)
diff --git a/crypto/af_alg.c b/crypto/af_alg.c
index 0ca108f..de130c2 100644
--- a/crypto/af_alg.c
+++
While the destination buffer 'iv' is MAX_IVLEN size,
the source 'template[i].iv' could be smaller, thus
memcpy may read read invalid memory.
Use crypto_skcipher_ivsize() to get real ivsize
and pass it to memcpy.
Signed-off-by: Andrey Ryabinin <aryabi...@virtuozzo.com>
---
crypto/testmgr
On 09/03/2015 04:20 PM, Herbert Xu wrote:
> On Thu, Sep 03, 2015 at 02:32:00PM +0300, Andrey Ryabinin wrote:
>> While the destination buffer 'iv' is MAX_IVLEN size,
>> the source 'template[i].iv' could be smaller. Thus
>> copying it via memcpy() leads to invalid memory a
While the destination buffer 'iv' is MAX_IVLEN size,
the source 'template[i].iv' could be smaller. Thus
copying it via memcpy() leads to invalid memory access.
Use strlcpy() instead.
Signed-off-by: Andrey Ryabinin <aryabi...@odin.com>
---
crypto/testmgr.c | 4 ++--
1 file changed, 2 inse
Currently context size (cra_ctxsize) doesn't specified for
ghash_async_alg. Which means it's zero. Thus crypto_create_tfm()
doesn't allocate needed space for ghash_async_ctx, so any
read/write to ctx (e.g. in ghash_async_init_tfm()) is not valid.
Signed-off-by: Andrey Ryabinin <aryabi...@odin.
own 'libsanitzer' in kernel.
So I'm a little bit bitter about this, as you can see. :)
--
Best regards,
Andrey Ryabinin
--
To unsubscribe from this list: send the line unsubscribe linux-crypto in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org
x86_match_cpu() expects array of x86_cpu_ids terminated
with empty element.
Signed-off-by: Andrey Ryabinin a.ryabi...@samsung.com
---
drivers/crypto/ccp/ccp-dev.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/crypto/ccp/ccp-dev.c b/drivers/crypto/ccp/ccp-dev.c
index c6e6171
30 matches
Mail list logo