Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp418718pxa; Wed, 12 Aug 2020 05:36:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwwlVoolSnjj8+nkcE4/FB6WUazo1kud65vOqh75fE2xLoBLrOrD6PI7UwKkZwjwqh/Uaf0 X-Received: by 2002:a17:907:1191:: with SMTP id uz17mr24871022ejb.184.1597235797765; Wed, 12 Aug 2020 05:36:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597235797; cv=none; d=google.com; s=arc-20160816; b=vM2I+gPxx4RNLPDjGNYLjnkcnkYX8BtImusnaCRIymjR1sy7MYz7lHBj1HD0CLm8m8 eR31DMx0OK09ukgl9rrensqU566snsAvBA3r7R9wP1kB3mh7+GSqJ8/nGlQjofHHIlwN +ADczPR0vG14up1QRVjOHyuUeXujClKQ1adwg6ACD7avnn0zvo+IZMaOLItQUQ+sENj6 VO+pDRHKJ9WGKypCjcVjwvomWSOVcy30Psk9w8Q5Pe0B1NP0I5efWKugapWg1vIaEugH TpEc2Ajbcilygm7Lkeeb82eBwlO6O3HonVoAvn+1KHpDVpjl4YsaabqtpJQ6tPmo6Y0U fPvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=UVn7Ie9HNNwts27q7BlgGt/fELkCV7gSEAeHSFDW7mw=; b=CVRIh85riuR03ZWxgfCsiQQLhcFt4Qt8rcxsVUMNKTv4Yv8PkMoij/lDwB0C5pb81h EyLCrIosr7Ahr5ZM9ip4kDZC9S8KAV5Eb0lde1nPk2U64szrHhITXfUWs43bcMjQjK+Y QOBhv1s2Z9sWq4hiQH8jjC+mxxhTnKXGk1vPhcbsTTuDTl4Z7GM0a6yGt44Y0sFqND+j mDZFr8GHQQ069HPEV2h12pM8xmgNdQWrHlED9hOeLcGuu49RwNXc89JDrtsHeet3srEe KcbGZDE3XLLUTUVqQEmEq02ERL8HwLaXhBUCcqoUI2PtF3jq5qM5G7pqAaxpSf8C4zv4 Scjg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p6si1035454ejd.617.2020.08.12.05.36.04; Wed, 12 Aug 2020 05:36:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727990AbgHLMdP (ORCPT + 99 others); Wed, 12 Aug 2020 08:33:15 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:52918 "EHLO fornost.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727055AbgHLMdO (ORCPT ); Wed, 12 Aug 2020 08:33:14 -0400 Received: from gwarestrin.arnor.me.apana.org.au ([192.168.0.7]) by fornost.hmeau.com with smtp (Exim 4.92 #5 (Debian)) id 1k5pwN-0006uu-6q; Wed, 12 Aug 2020 22:33:12 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Wed, 12 Aug 2020 22:33:11 +1000 Date: Wed, 12 Aug 2020 22:33:11 +1000 From: Herbert Xu To: Ondrej Mosnacek Cc: linux-crypto@vger.kernel.org, Stephan Mueller Subject: Re: [PATCH] crypto: af_alg - fix uninitialized ctx->init Message-ID: <20200812123311.GA21384@gondor.apana.org.au> References: <20200812092232.364991-1-omosnace@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200812092232.364991-1-omosnace@redhat.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, Aug 12, 2020 at 11:22:32AM +0200, Ondrej Mosnacek wrote: > This new member of struct af_alg_ctx was not being initialized before > use, leading to random errors. Found via libkcapi testsuite. > > Cc: Stephan Mueller > Fixes: f3c802a1f300 ("crypto: algif_aead - Only wake up when ctx->more is zero") > Signed-off-by: Ondrej Mosnacek > --- > crypto/algif_aead.c | 1 + > crypto/algif_skcipher.c | 1 + > 2 files changed, 2 insertions(+) Thanks for the patch. > diff --git a/crypto/algif_aead.c b/crypto/algif_aead.c > index d48d2156e6210..9b5bd0ff3c47d 100644 > --- a/crypto/algif_aead.c > +++ b/crypto/algif_aead.c > @@ -563,6 +563,7 @@ static int aead_accept_parent_nokey(void *private, struct sock *sk) > ctx->more = 0; > ctx->merge = 0; > ctx->enc = 0; > + ctx->init = 0; > ctx->aead_assoclen = 0; > crypto_init_wait(&ctx->wait); This isn't necessary because there is a memset on ctx already. > diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c > index a51ba22fef58f..0de035b991943 100644 > --- a/crypto/algif_skcipher.c > +++ b/crypto/algif_skcipher.c > @@ -350,6 +350,7 @@ static int skcipher_accept_parent_nokey(void *private, struct sock *sk) > ctx->more = 0; > ctx->merge = 0; > ctx->enc = 0; > + ctx->init = 0; > crypto_init_wait(&ctx->wait); We should add a memset here for skcipher and get rid of these zero assignments. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt