Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp600943img; Fri, 22 Mar 2019 04:57:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqya9aG3ogg2vwOc5YR5ZggPR+kCdeIC7BLqp1gJTj9+361jWd/SiZjQJdWnQWMGKqkshje1 X-Received: by 2002:a63:f74c:: with SMTP id f12mr8450625pgk.124.1553255838873; Fri, 22 Mar 2019 04:57:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553255838; cv=none; d=google.com; s=arc-20160816; b=unlrFq+Vh+mBwfVK6CUK+eDkwsh5t71FDAklHlZMfG5Z1FN4seHv9/UBuATnfHfEk1 kf/wiPQYNVWXqGNeYA4mUxIlNWcWXQZXiFn2Krg0I69gOIqHrCb+vALDeHbtYTh63Q2v 3sdo27EIIXYPA7Szmu+6dclFczpYdsvw5NW/MGYx/bVUiPIVXcAGPMWsyQhthDF5ziLX vgeFK/BUZwocVlr+hwHaCYPC6h8D6pdVJVAw56hlrlfHIWum+m5sIX11IUinx1WnHaSz XDlFXsKxgpgspY1Jb138Q6PVuFXV5m7dSqZdwKkjg06ad0KpzbzPK1icCn3tYy2lCR0g j2iQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=UWrggXaPQVomypmSo2iZS63wZaCNv34aFK2s72QCi0Q=; b=BHpsWeQBO8wUZxHVHI+NqwgR8iVwzJGicCtlW2pB7aSQQN82dsnnmJ+THGBr6fZY9p 51fyvnQdOH4Nh1dhbE1PJhyvT506rIdQNFchnditCE3HPmt7GzYTHJVxdJS2hOObPUvI UfhR7AHpyESWjaANq7JHeE7C10jAVRMhfZSkm/CppWqHCGcRpFAocycJbNsc6bsStCXy 3eMK2llncXj2BiYI70yGUT79aQBqSx9Jtq0/RWn6DIRjDw+Dv+/cxag/Vetjkhpv72rG MCmRSAgTZY6hd3GVh8ZdlBwjrrCHsFeS0kgYK9TgEVmQrVF4VWAWy5PakVKtUInpdnXh nkmw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DtgORCXk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 24si6479134pgl.359.2019.03.22.04.57.03; Fri, 22 Mar 2019 04:57:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DtgORCXk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387537AbfCVL4d (ORCPT + 99 others); Fri, 22 Mar 2019 07:56:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:32974 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387531AbfCVL4b (ORCPT ); Fri, 22 Mar 2019 07:56:31 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BF8F321916; Fri, 22 Mar 2019 11:56:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553255791; bh=ckGJvbRgphEyTN7z4J5i8sZV3Qyk0Ow+B1mojxpwnlo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DtgORCXkoNVxd6C4OaRQlfrqB4gIKc1SrkN/KrHYobdBttR0hB4FOhzY2yzhd2ais I9//rwwekjf5miHgc4AsK7NrVnsqdMhTalglY1a2ePeA37R1nkMm9GxPhE7GwI4KYX J+rsu8i58If0NxIigG2+QMOitagV2C5Mqg0dMq0s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Gilad Ben-Yossef , Herbert Xu Subject: [PATCH 4.19 016/280] crypto: ccree - unmap buffer before copying IV Date: Fri, 22 Mar 2019 12:12:49 +0100 Message-Id: <20190322111307.218267113@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111306.356185024@linuxfoundation.org> References: <20190322111306.356185024@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Gilad Ben-Yossef commit c139c72e2beb3e3db5148910b3962b7322e24374 upstream. We were copying the last ciphertext block into the IV field for CBC before removing the DMA mapping of the output buffer with the result of the buffer sometime being out-of-sync cache wise and were getting intermittent cases of bad output IV. Fix it by moving the DMA buffer unmapping before the copy. Signed-off-by: Gilad Ben-Yossef Fixes: 00904aa0cd59 ("crypto: ccree - fix iv handling") Cc: Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/ccree/cc_cipher.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/drivers/crypto/ccree/cc_cipher.c +++ b/drivers/crypto/ccree/cc_cipher.c @@ -635,6 +635,8 @@ static void cc_cipher_complete(struct de unsigned int ivsize = crypto_skcipher_ivsize(sk_tfm); unsigned int len; + cc_unmap_cipher_request(dev, req_ctx, ivsize, src, dst); + switch (ctx_p->cipher_mode) { case DRV_CIPHER_CBC: /* @@ -664,7 +666,6 @@ static void cc_cipher_complete(struct de break; } - cc_unmap_cipher_request(dev, req_ctx, ivsize, src, dst); kzfree(req_ctx->iv); skcipher_request_complete(req, err);