Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp2777501iob; Fri, 6 May 2022 10:08:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxuv+e5Vgabbkls5M/CommTwnGrfKwTNaKfQ17rypoe9oWdAfpdZVVzxIupFEFJ5ldyoCKW X-Received: by 2002:a63:1c1d:0:b0:39d:9a7c:593b with SMTP id c29-20020a631c1d000000b0039d9a7c593bmr3447194pgc.157.1651856925773; Fri, 06 May 2022 10:08:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651856925; cv=none; d=google.com; s=arc-20160816; b=Zimn1NiZ7KvMq5MjyjE1+DR3c41tfh3a/eRbu+yDUikRQN3oHVJQTcAaFIiM8C4rf0 c+wE94zcQ4aUJBkivFzPX+/Nr4p3DJwL92aqnAr1IA2VMZKl7F4cut0dIJVyMsqihQNq V3lavnYlDiGpQRIveRHP6wcMDxXuSd+HgVu47fuZV7J6AvM/ZMWGxaxj8rv0siSCmQ8H jDzMq8YoDSpN50yOZJ2jmVizYXIBWPySxNQ4uVSCStewpXhU3iQp1O3UnBXvyvWkRWl0 or4fgQtELIJODYQBX9GP5aHEm0IKatx8gNUhJHdI3t8qrHS5kYpNyoy+wafKsMqflvV8 48ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:organization :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=eIQJDgog19+zlB57Mz3DtY9St+deNCz5jXmalhE2BVQ=; b=0fJoxKGJPD1qRyvX0W0oCaQ+O8eudAxvnwtApXKdhfYET+e9EMjX/P3As2OvrZu238 J+87tn+PUVGmF/HlInGMfEhdK1KQHPt6MTEes+57W4PBUc3scZK1ucK8VCmLJRqSRngO fafTXs7CVrUH9r3TjbU0xMxF1Nq5HL1p4vVUJp2BaEvZ++vABWGrt9nnLxSacbJO5BxQ CLFZcEPKe/f3cnHw8pkoQc7Nwp0yOydVmIigOwTg5Qk7AanXjuuc39AgwInEYIUk9q2i wCCUumadZqBBJnlnYHMplKnBfVsZtaphiqZSNKQz1+2QuzQxAK4NYznNyehwaXzjaWz8 1LIA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=SPNRRtsl; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id na5-20020a17090b4c0500b001dc87243f72si1371006pjb.83.2022.05.06.10.08.24; Fri, 06 May 2022 10:08:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=SPNRRtsl; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1442290AbiEFOnF (ORCPT + 99 others); Fri, 6 May 2022 10:43:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35480 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1442296AbiEFOm7 (ORCPT ); Fri, 6 May 2022 10:42:59 -0400 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1C9046A42B; Fri, 6 May 2022 07:39:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1651847956; x=1683383956; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=DyfWIgo2v92FeS25yt2Fm6CFdJ2n1oBzonkJ0Ac0ttg=; b=SPNRRtslkeZktSJ1tjycmHnk2W8AXZbDxS7YbGqMUUuMTnBg/k32H+1S q5BX1ZWE05/Mk5tHiZhI76RnQCCXdgkXYboJGpB1MKNSqt/F2asaN52Q+ evYNbsX4dfsoc3rmngkbhJdF/oARB+WrhJUAnWloJQXUYqx4kOXqYPXpy 64vhQo3KG2AoikcVqrqXENRaZCL8rEcSKM0psHnOjn8XYxc+B4G0UbSea 8xDczGaZZ1CKw8OtCPHA46D1DTxFzA2FvpbMjeqZLyMgC+Iu7xWhzLqxQ WX3EUJqAcFSGEn8fd+Y9N3nm5M2hfKdCVwKQas/vxle4ytPSHQFOsreMm g==; X-IronPort-AV: E=McAfee;i="6400,9594,10339"; a="248387474" X-IronPort-AV: E=Sophos;i="5.91,203,1647327600"; d="scan'208";a="248387474" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 May 2022 07:39:15 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.91,203,1647327600"; d="scan'208";a="537914825" Received: from silpixa00400314.ir.intel.com (HELO silpixa00400314.ger.corp.intel.com) ([10.237.222.76]) by orsmga006.jf.intel.com with ESMTP; 06 May 2022 07:39:13 -0700 From: Giovanni Cabiddu To: herbert@gondor.apana.org.au Cc: linux-crypto@vger.kernel.org, qat-linux@intel.com, vdronov@redhat.com, Giovanni Cabiddu , stable@vger.kernel.org, Adam Guerin , Wojciech Ziemba Subject: [PATCH v2 04/11] crypto: qat - fix memory leak in RSA Date: Fri, 6 May 2022 15:38:56 +0100 Message-Id: <20220506143903.31776-5-giovanni.cabiddu@intel.com> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220506143903.31776-1-giovanni.cabiddu@intel.com> References: <20220506143903.31776-1-giovanni.cabiddu@intel.com> MIME-Version: 1.0 Organization: Intel Research and Development Ireland Ltd - Co. Reg. #308263 - Collinstown Industrial Park, Leixlip, County Kildare - Ireland Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-5.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org When an RSA key represented in form 2 (as defined in PKCS #1 V2.1) is used, some components of the private key persist even after the TFM is released. Replace the explicit calls to free the buffers in qat_rsa_exit_tfm() with a call to qat_rsa_clear_ctx() which frees all buffers referenced in the TFM context. Cc: stable@vger.kernel.org Fixes: 879f77e9071f ("crypto: qat - Add RSA CRT mode") Signed-off-by: Giovanni Cabiddu Reviewed-by: Adam Guerin Reviewed-by: Wojciech Ziemba --- drivers/crypto/qat/qat_common/qat_asym_algs.c | 12 +----------- 1 file changed, 1 insertion(+), 11 deletions(-) diff --git a/drivers/crypto/qat/qat_common/qat_asym_algs.c b/drivers/crypto/qat/qat_common/qat_asym_algs.c index 306219a4b00e..9be972430f11 100644 --- a/drivers/crypto/qat/qat_common/qat_asym_algs.c +++ b/drivers/crypto/qat/qat_common/qat_asym_algs.c @@ -1254,18 +1254,8 @@ static void qat_rsa_exit_tfm(struct crypto_akcipher *tfm) struct qat_rsa_ctx *ctx = akcipher_tfm_ctx(tfm); struct device *dev = &GET_DEV(ctx->inst->accel_dev); - if (ctx->n) - dma_free_coherent(dev, ctx->key_sz, ctx->n, ctx->dma_n); - if (ctx->e) - dma_free_coherent(dev, ctx->key_sz, ctx->e, ctx->dma_e); - if (ctx->d) { - memset(ctx->d, '\0', ctx->key_sz); - dma_free_coherent(dev, ctx->key_sz, ctx->d, ctx->dma_d); - } + qat_rsa_clear_ctx(dev, ctx); qat_crypto_put_instance(ctx->inst); - ctx->n = NULL; - ctx->e = NULL; - ctx->d = NULL; } static struct akcipher_alg rsa = { -- 2.35.1