Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp635127img; Fri, 22 Mar 2019 05:36:40 -0700 (PDT) X-Google-Smtp-Source: APXvYqxIzG4EhHXY2e0w5M9M97P1HkRobPCUUT1abVyatOn7lJtBexwGkyILDW7Rs23N3t5E+9FQ X-Received: by 2002:a63:c06:: with SMTP id b6mr8742773pgl.440.1553258200571; Fri, 22 Mar 2019 05:36:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553258200; cv=none; d=google.com; s=arc-20160816; b=AJc4GWIySfuo1SeHIRbPDycUhkWGxhhGBwLvxD1p4oWiTVzvVYKWPwkM6j14npq4tM 66ENO9A7ejrvI/reevHXsgLDDNSX8ter7MzwoUymyzIWGhRh+5FBkhx8KkOyIfz7gICa 8AuFPDyrEIH0Z8SUnW0et5qgFxiCzruoyQpwb5UxdGDm9u9Nz/JP5fgsw2w+dJwDSeq6 Wk7ZMdsbxSTRCDIUxjF3hf9HXD5QQjJAjSWNBjblkWZVNoGHSfP/dq2icBxo/yx/cRTJ e1xmCgKu2HQZODlYSRil78Tr29VAZdnYJxKpvGB+4w8Xa2L4ByAyLxfRE0M5n+1G2s7x fEjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=CtKSAXE5JW3sopP1wcfZvlcHAMKV/dt5XdcLjEZKY50=; b=DSKYC3a3kjdssQ0glOQkBkgrRis6Q2toCBBRfAnjpPoFQD9T9Tgfp6UqKYRBqJ/E1U gdqje1iARnc7l4SvNoJeXHB+zQ4tGyI4nWpjXyrxXcnvEImt4tSozBOsU+AHN2qqeH7y OM76a/PAjr9lLINfheeR9Gwg9o3raAQkTw3jzy46XYTt2eoFp7Sgd27CeCG3iRbUXSVV 9eDoWVhRScoUoJltfrE+9cMWjyet8SWctwslPqJnDXviEYKAPEuhZcoHpPKiWac5FqCR A4masrTbrqmw8vRs1eRaKsr7Z+iGi77oavZMq0vz/3nKRH5nHYquspkF4nIMqdAJ06I+ wEnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UVgMjgxS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w13si6520899pgj.177.2019.03.22.05.36.25; Fri, 22 Mar 2019 05:36:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UVgMjgxS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389562AbfCVMMB (ORCPT + 99 others); Fri, 22 Mar 2019 08:12:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:50234 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733150AbfCVMMA (ORCPT ); Fri, 22 Mar 2019 08:12:00 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 073E621929; Fri, 22 Mar 2019 12:11:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553256719; bh=LbscsWWkapzn5gVSCGhKs/TBeT5BCDK7mRgYUhxzmT4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UVgMjgxSTsrw/eRDNt7ivWVFIbiyw3RKADDndK/tM5unwtqG4hnXIYDQCAwpmkFbx RgoOdA6mDd0S/UgsJZmEMCJMvUe9jdfWIJlPSKxtRWCeeUyoYQIzHA5TcCj4exTmac zy/AKJpLURRbMtGGKPlF1fnH7DxfLFnYagkK7QOs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Gilad Ben-Yossef , Herbert Xu Subject: [PATCH 5.0 017/238] crypto: ccree - unmap buffer before copying IV Date: Fri, 22 Mar 2019 12:13:56 +0100 Message-Id: <20190322111259.200760885@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111258.383569278@linuxfoundation.org> References: <20190322111258.383569278@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ From: Gilad Ben-Yossef commit c139c72e2beb3e3db5148910b3962b7322e24374 upstream. We were copying the last ciphertext block into the IV field for CBC before removing the DMA mapping of the output buffer with the result of the buffer sometime being out-of-sync cache wise and were getting intermittent cases of bad output IV. Fix it by moving the DMA buffer unmapping before the copy. Signed-off-by: Gilad Ben-Yossef Fixes: 00904aa0cd59 ("crypto: ccree - fix iv handling") Cc: Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/ccree/cc_cipher.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/drivers/crypto/ccree/cc_cipher.c +++ b/drivers/crypto/ccree/cc_cipher.c @@ -653,6 +653,8 @@ static void cc_cipher_complete(struct de unsigned int ivsize = crypto_skcipher_ivsize(sk_tfm); unsigned int len; + cc_unmap_cipher_request(dev, req_ctx, ivsize, src, dst); + switch (ctx_p->cipher_mode) { case DRV_CIPHER_CBC: /* @@ -682,7 +684,6 @@ static void cc_cipher_complete(struct de break; } - cc_unmap_cipher_request(dev, req_ctx, ivsize, src, dst); kzfree(req_ctx->iv); skcipher_request_complete(req, err);