Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3778845ybb; Mon, 6 Apr 2020 15:48:13 -0700 (PDT) X-Google-Smtp-Source: APiQypJpJx6GFZmUyhXyrT4yu/hiXDaaFYUW1nFBOdUUeV/SB0fFQDkHnYHu0lu7LDT3vNuPcYOd X-Received: by 2002:a05:6830:148c:: with SMTP id s12mr18042125otq.147.1586213293069; Mon, 06 Apr 2020 15:48:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586213293; cv=none; d=google.com; s=arc-20160816; b=cyUQE8ejpWhjD+RqMZBta//x2IN5Bon9rEB4zSRuXXRYZAiXpuj4c+1PSnpWQTfE7a yJQ6vCGlgM0Kch67/YUbMZQ9ifb7AkV/PRn/P9SqnjUbl1ZWn6GaeCknO7YzB9YVqSMT aBN1KKoZfta0DvQJS9R5LvLC095otEJRWfGZrEtvGM6ysEV0/aAl+83MzAQ2EVjtgEeM T+pUgGbS0B5nKwKWi00/z5YgodiDmM++utmK8kqW1TfJF0K1ZRV0RBWOIHs4hOser0/p 02mk2Vs2+FnuA69S7yq4/Hg9aVxffoIzM7e4RdyKFbMnq1CpespK55VhmJ/sdyhepprg Oc2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=BdWhOMLEpBYg0d8EdLcpsymrhjrkIpGy/r9adaDmkI8=; b=jAFgGTqBm6yQAYTdwo4j/1UPMHA9kOPyyRGgEyKUIR7UZ/OyfsGPhz8WoffPZVxywP f7r/3WeTL/fvC/9+o8MvQGJ6AA6Vkrpt2lTbaaAaSbYnltQ0K4yIM6RYM7SaOfOGaVz6 fDl/CIhz0BsAVoRQY85ITsCfiyU6wZvryhqjDV/v7R1ZufA5vwUkXS8rxlPDwsrHXjLA cfGAy/H/1XEE3xxUO20Ld9NkwOndeAT8EUTiySfu3J7CpSkF1Lvfu8RMWLbyDx4dzH7G JjQws80Z94/t0BWqUXsrvHR6V5d+7VZfWelt0dPyfVIXcVvpwm8mxwGKL9YxN3xbW7M0 DP3Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z11si7468154oih.253.2020.04.06.15.47.48; Mon, 06 Apr 2020 15:48:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726230AbgDFWrh (ORCPT + 99 others); Mon, 6 Apr 2020 18:47:37 -0400 Received: from inva021.nxp.com ([92.121.34.21]:60976 "EHLO inva021.nxp.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726225AbgDFWrh (ORCPT ); Mon, 6 Apr 2020 18:47:37 -0400 Received: from inva021.nxp.com (localhost [127.0.0.1]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id CB6B520073C; Tue, 7 Apr 2020 00:47:35 +0200 (CEST) Received: from inva024.eu-rdc02.nxp.com (inva024.eu-rdc02.nxp.com [134.27.226.22]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id BF251200220; Tue, 7 Apr 2020 00:47:35 +0200 (CEST) Received: from lorenz.ea.freescale.net (lorenz.ea.freescale.net [10.171.71.5]) by inva024.eu-rdc02.nxp.com (Postfix) with ESMTP id 1F049205A5; Tue, 7 Apr 2020 00:47:35 +0200 (CEST) From: Iuliana Prodan To: Herbert Xu , Horia Geanta , Aymen Sghaier Cc: "David S. Miller" , Silvano Di Ninno , Franck Lenormand , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linux-imx , Iuliana Prodan Subject: [PATCH v2 0/4] crypto: caam - fix use-after-free KASAN issue Date: Tue, 7 Apr 2020 01:47:24 +0300 Message-Id: <1586213248-4230-1-git-send-email-iuliana.prodan@nxp.com> X-Mailer: git-send-email 2.1.0 X-Virus-Scanned: ClamAV using ClamSMTP Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This series fixes a use-after-free KASAN issue that was introduce by CAAM backlogging support[1]. This is fixed for SKCIPHER, HASH, RSA and AEAD algorithms. [1] https://patchwork.kernel.org/cover/11378941/ --- Changes since V1: - update commit messages by adding the complete KASAN report; - keep resource freeing before request completion callback; - added stable tag. Iuliana Prodan (4): crypto: caam - fix use-after-free KASAN issue for SKCIPHER algorithms crypto: caam - fix use-after-free KASAN issue for AEAD algorithms crypto: caam - fix use-after-free KASAN issue for HASH algorithms crypto: caam - fix use-after-free KASAN issue for RSA algorithms drivers/crypto/caam/caamalg.c | 8 ++++++-- drivers/crypto/caam/caamhash.c | 8 ++++++-- drivers/crypto/caam/caampkc.c | 8 ++++++-- 3 files changed, 18 insertions(+), 6 deletions(-) -- 2.1.0