From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D6CC41772E for ; Wed, 7 Jun 2023 18:04:34 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CAD85C433EF; Wed, 7 Jun 2023 18:04:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1686161074; bh=FFW6jDa7fdSoZ+tjqO51729Enuonr4LdoRZ+F0LTNPU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=QVI3X/hcBMN8bx1pv/TNXM4D7/f6dPMC0TotKUH2bKW4E6lXzAO78d4tDe6qnxWn3 aKUEErJTs62C/JN1rbZ6UKD66suEQVlsclg/8/ZUS3v5IucUTFs5qCnA6QMUunGO8J /YiPplkKWWo+oRoC5hMUCYfX9lHKmD71Ud+GaG0U= Date: Wed, 7 Jun 2023 20:04:31 +0200 From: Greg Kroah-Hartman To: Ben Hutchings Cc: stable@vger.kernel.org, patches@lists.linux.dev, Sean Christopherson , Brijesh Singh , Tom Lendacky , Paolo Bonzini , Sasha Levin , Julien Cristau , 1036543@bugs.debian.org Subject: Re: [PATCH 5.10 076/529] crypto: ccp: Use the stack for small SEV command buffers Message-ID: <2023060721-magical-psychic-b19f@gregkh> References: <20230310133804.978589368@linuxfoundation.org> <20230310133808.495306749@linuxfoundation.org> <80d3ba7a1b8b7d65713f66ca3562a5ec4971c5ee.camel@decadent.org.uk> <2023051720-studied-plutonium-7fa8@gregkh> <2023051729-jumbo-uncolored-05c1@gregkh> Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Fri, May 26, 2023 at 05:36:02PM +0200, Ben Hutchings wrote: > On Wed, 2023-05-17 at 16:06 +0200, Greg Kroah-Hartman wrote: > > On Wed, May 17, 2023 at 04:02:35PM +0200, Greg Kroah-Hartman wrote: > > > On Wed, May 17, 2023 at 02:56:21PM +0200, Ben Hutchings wrote: > > > > On Fri, 2023-03-10 at 14:33 +0100, Greg Kroah-Hartman wrote: > > > > > From: Sean Christopherson > > > > > > > > > > [ Upstream commit e4a9af799e5539b0feb99571f0aaed5a3c81dc5a ] > > > > > > > > > > For commands with small input/output buffers, use the local stack to > > > > > "allocate" the structures used to communicate with the PSP. Now that > > > > > __sev_do_cmd_locked() gracefully handles vmalloc'd buffers, there's no > > > > > reason to avoid using the stack, e.g. CONFIG_VMAP_STACK=y will just work. > > > > [...] > > > > > > > > Julien Cristau reported a regression in ccp - the > > > > WARN_ON_ONCE(!virt_addr_valid(data)) is now being triggered. I believe > > > > this was introduced by the above commit, which depends on: > > > > > > > > commit 8347b99473a313be6549a5b940bc3c56a71be81c > > > > Author: Sean Christopherson > > > > Date: Tue Apr 6 15:49:48 2021 -0700 > > > > > > > > crypto: ccp: Play nice with vmalloc'd memory for SEV command structs > > > > > > > > Ben. > > > > > > > > > > Thanks for letting me know, now queued up. > > > > Nope, now dropped, it breaks the build :( > > I've now looked further and found that we need both: > > d5760dee127b crypto: ccp: Reject SEV commands with mismatching command buffer > 8347b99473a3 crypto: ccp: Play nice with vmalloc'd memory for SEV command structs > > (Not yet tested; I'll ask Julien if he can do that.) Looks sane to me, both now queued up, thanks. greg k-h