1. 09 8月, 2016 1 次提交
  2. 31 5月, 2016 1 次提交
    • H
      crypto: caam - handle core endianness != caam endianness · 261ea058
      Horia Geantă 提交于
      There are SoCs like LS1043A where CAAM endianness (BE) does not match
      the default endianness of the core (LE).
      Moreover, there are requirements for the driver to handle cases like
      CPU_BIG_ENDIAN=y on ARM-based SoCs.
      This requires for a complete rewrite of the I/O accessors.
      
      PPC-specific accessors - {in,out}_{le,be}XX - are replaced with
      generic ones - io{read,write}[be]XX.
      
      Endianness is detected dynamically (at runtime) to allow for
      multiplatform kernels, for e.g. running the same kernel image
      on LS1043A (BE CAAM) and LS2080A (LE CAAM) armv8-based SoCs.
      
      While here: debugfs entries need to take into consideration the
      endianness of the core when displaying data. Add the necessary
      glue code so the entries remain the same, but they are properly
      read, regardless of the core and/or SEC endianness.
      
      Note: pdb.h fixes only what is currently being used (IPsec).
      Reviewed-by: NTudor Ambarus <tudor-dan.ambarus@nxp.com>
      Signed-off-by: NHoria Geantă <horia.geanta@nxp.com>
      Signed-off-by: NAlex Porosanu <alexandru.porosanu@nxp.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      261ea058
  3. 04 12月, 2015 1 次提交
  4. 17 11月, 2015 1 次提交
  5. 20 10月, 2015 5 次提交
    • R
      crypto: caam - fix indentation of close braces · 659f313d
      Russell King 提交于
      The kernel's coding style suggests that closing braces for initialisers
      should not be aligned to the open brace column.  The CodingStyle doc
      shows how this should be done.  Remove the additional tab.
      Signed-off-by: NRussell King <rmk+kernel@arm.linux.org.uk>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      659f313d
    • R
      crypto: caam - only export the state we really need to export · 5ec90831
      Russell King 提交于
      Avoid exporting lots of state by only exporting what we really require,
      which is the buffer containing the set of pending bytes to be hashed,
      number of pending bytes, the context buffer, and the function pointer
      state.  This reduces down the exported state size to 216 bytes from
      576 bytes.
      Signed-off-by: NRussell King <rmk+kernel@arm.linux.org.uk>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      5ec90831
    • R
      crypto: caam - fix non-block aligned hash calculation · c7556ff7
      Russell King 提交于
      caam does not properly calculate the size of the retained state
      when non-block aligned hashes are requested - it uses the wrong
      buffer sizes, which results in errors such as:
      
      caam_jr 2102000.jr1: 40000501: DECO: desc idx 5: SGT Length Error. The descriptor is trying to read more data than is contained in the SGT table.
      
      We end up here with:
      
      in_len 0x46 blocksize 0x40 last_bufsize 0x0 next_bufsize 0x6
      to_hash 0x40 ctx_len 0x28 nbytes 0x20
      
      which results in a job descriptor of:
      
      jobdesc@889: ed03d918: b0861c08 3daa0080 f1400000 3d03d938
      jobdesc@889: ed03d928: 00000068 f8400000 3cde2a40 00000028
      
      where the word at 0xed03d928 is the expected data size (0x68), and a
      scatterlist containing:
      
      sg@892: ed03d938: 00000000 3cde2a40 00000028 00000000
      sg@892: ed03d948: 00000000 3d03d100 00000006 00000000
      sg@892: ed03d958: 00000000 7e8aa700 40000020 00000000
      
      0x68 comes from 0x28 (the context size) plus the "in_len" rounded down
      to a block size (0x40).  in_len comes from 0x26 bytes of unhashed data
      from the previous operation, plus the 0x20 bytes from the latest
      operation.
      
      The fixed version would create:
      
      sg@892: ed03d938: 00000000 3cde2a40 00000028 00000000
      sg@892: ed03d948: 00000000 3d03d100 00000026 00000000
      sg@892: ed03d958: 00000000 7e8aa700 40000020 00000000
      
      which replaces the 0x06 length with the correct 0x26 bytes of previously
      unhashed data.
      
      This fixes a previous commit which erroneously "fixed" this due to a
      DMA-API bug report; that commit indicates that the bug was caused via a
      test_ahash_pnum() function in the tcrypt module.  No such function has
      ever existed in the mainline kernel.  Given that the change in this
      commit has been tested with DMA API debug enabled and shows no issue,
      I can only conclude that test_ahash_pnum() was triggering that bad
      behaviour by CAAM.
      
      Fixes: 7d5196ab ("crypto: caam - Correct DMA unmap size in ahash_update_ctx()")
      Signed-off-by: NRussell King <rmk+kernel@arm.linux.org.uk>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      c7556ff7
    • R
      crypto: caam - avoid needlessly saving and restoring caam_hash_ctx · 434b4212
      Russell King 提交于
      When exporting and importing the hash state, we will only export and
      import into hashes which share the same struct crypto_ahash pointer.
      (See hash_accept->af_alg_accept->hash_accept_parent.)
      
      This means that saving the caam_hash_ctx structure on export, and
      restoring it on import is a waste of resources.  So, remove this code.
      Signed-off-by: NRussell King <rmk+kernel@arm.linux.org.uk>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      434b4212
    • R
      crypto: caam - print errno code when hash registration fails · 6ea30f0a
      Russell King 提交于
      Print the errno code when hash registration fails, so we know why the
      failure occurred.  This aids debugging.
      Signed-off-by: NRussell King <rmk+kernel@arm.linux.org.uk>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      6ea30f0a
  6. 01 10月, 2015 1 次提交
  7. 24 8月, 2015 1 次提交
  8. 13 8月, 2015 1 次提交
  9. 10 8月, 2015 4 次提交
  10. 16 6月, 2015 2 次提交
    • V
      crypto: caam - Fix incorrect size when DMA unmapping buffer · 8af7b0f8
      Victoria Milhoan 提交于
      The CAAM driver uses two data buffers to store data for a hashing operation,
      with one buffer defined as active. This change forces switching of the
      active buffer when executing a hashing operation to avoid a later DMA unmap
      using the length of the opposite buffer.
      Signed-off-by: NVictoria Milhoan <vicki.milhoan@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      8af7b0f8
    • S
      crypto: caam - improve initalization for context state saves · 6fd4b156
      Steve Cornelius 提交于
      Multiple function in asynchronous hashing use a saved-state block,
      a.k.a. struct caam_hash_state, which holds a stash of information
      between requests (init/update/final). Certain values in this state
      block are loaded for processing using an inline-if, and when this
      is done, the potential for uninitialized data can pose conflicts.
      Therefore, this patch improves initialization of state data to
      prevent false assignments using uninitialized data in the state block.
      
      This patch addresses the following traceback, originating in
      ahash_final_ctx(), although a problem like this could certainly
      exhibit other symptoms:
      
      kernel BUG at arch/arm/mm/dma-mapping.c:465!
      Unable to handle kernel NULL pointer dereference at virtual address 00000000
      pgd = 80004000
      [00000000] *pgd=00000000
      Internal error: Oops: 805 [#1] PREEMPT SMP
      Modules linked in:
      CPU: 0    Not tainted  (3.0.15-01752-gdd441b9-dirty #40)
      PC is at __bug+0x1c/0x28
      LR is at __bug+0x18/0x28
      pc : [<80043240>]    lr : [<8004323c>]    psr: 60000013
      sp : e423fd98  ip : 60000013  fp : 0000001c
      r10: e4191b84  r9 : 00000020  r8 : 00000009
      r7 : 88005038  r6 : 00000001  r5 : 2d676572  r4 : e4191a60
      r3 : 00000000  r2 : 00000001  r1 : 60000093  r0 : 00000033
      Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment kernel
      Control: 10c53c7d  Table: 1000404a  DAC: 00000015
      Process cryptomgr_test (pid: 1306, stack limit = 0xe423e2f0)
      Stack: (0xe423fd98 to 0xe4240000)
      fd80:                                                       11807fd1 80048544
      fda0: 88005000 e4191a00 e5178040 8039dda0 00000000 00000014 2d676572 e4191008
      fdc0: 88005018 e4191a60 00100100 e4191a00 00000000 8039ce0c e423fea8 00000007
      fde0: e4191a00 e4227000 e5178000 8039ce18 e419183c 80203808 80a94a44 00000006
      fe00: 00000000 80207180 00000000 00000006 e423ff08 00000000 00000007 e5178000
      fe20: e41918a4 80a949b4 8c4844e2 00000000 00000049 74227000 8c4844e2 00000e90
      fe40: 0000000e 74227e90 ffff8c58 80ac29e0 e423fed4 8006a350 8c81625c e423ff5c
      fe60: 00008576 e4002500 00000003 00030010 e4002500 00000003 e5180000 e4002500
      fe80: e5178000 800e6d24 007fffff 00000000 00000010 e4001280 e4002500 60000013
      fea0: 000000d0 804df078 00000000 00000000 00000000 00000000 00000000 00000000
      fec0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      fee0: 00000000 00000000 e4227000 e4226000 e4753000 e4752000 e40a5000 e40a4000
      ff00: e41e7000 e41e6000 00000000 00000000 00000000 e423ff14 e423ff14 00000000
      ff20: 00000400 804f9080 e5178000 e4db0b40 00000000 e4db0b80 0000047c 00000400
      ff40: 00000000 8020758c 00000400 ffffffff 0000008a 00000000 e4db0b40 80206e00
      ff60: e4049dbc 00000000 00000000 00000003 e423ffa4 80062978 e41a8bfc 00000000
      ff80: 00000000 e4049db4 00000013 e4049db0 00000013 00000000 00000000 00000000
      ffa0: e4db0b40 e4db0b40 80204cbc 00000013 00000000 00000000 00000000 80204cfc
      ffc0: e4049da0 80089544 80040a40 00000000 e4db0b40 00000000 00000000 00000000
      ffe0: e423ffe0 e423ffe0 e4049da0 800894c4 80040a40 80040a40 00000000 00000000
      [<80043240>] (__bug+0x1c/0x28) from [<80048544>] (___dma_single_dev_to_cpu+0x84)
      [<80048544>] (___dma_single_dev_to_cpu+0x84/0x94) from [<8039dda0>] (ahash_fina)
      [<8039dda0>] (ahash_final_ctx+0x180/0x428) from [<8039ce18>] (ahash_final+0xc/0)
      [<8039ce18>] (ahash_final+0xc/0x10) from [<80203808>] (crypto_ahash_op+0x28/0xc)
      [<80203808>] (crypto_ahash_op+0x28/0xc0) from [<80207180>] (test_hash+0x214/0x5)
      [<80207180>] (test_hash+0x214/0x5b8) from [<8020758c>] (alg_test_hash+0x68/0x8c)
      [<8020758c>] (alg_test_hash+0x68/0x8c) from [<80206e00>] (alg_test+0x7c/0x1b8)
      [<80206e00>] (alg_test+0x7c/0x1b8) from [<80204cfc>] (cryptomgr_test+0x40/0x48)
      [<80204cfc>] (cryptomgr_test+0x40/0x48) from [<80089544>] (kthread+0x80/0x88)
      [<80089544>] (kthread+0x80/0x88) from [<80040a40>] (kernel_thread_exit+0x0/0x8)
      Code: e59f0010 e1a01003 eb126a8d e3a03000 (e5833000)
      ---[ end trace d52a403a1d1eaa86 ]---
      
      Cc: stable@vger.kernel.org
      Signed-off-by: NSteve Cornelius <steve.cornelius@freescale.com>
      Signed-off-by: NVictoria Milhoan <vicki.milhoan@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      6fd4b156
  11. 09 3月, 2015 1 次提交
    • Y
      crypto: caam - fix uninitialized edesc->sec4_sg_bytes field · 060e234e
      Yanjiang Jin 提交于
      sec4_sg_bytes not being properly initialized causes ahash_done
      to try to free unallocated DMA memory:
      
      caam_jr ffe301000.jr: DMA-API: device driver tries to free DMA memory it has not allocated [device address=0xdeadbeefdeadbeef] [size=3735928559 bytes]
      ------------[ cut here ]------------
      WARNING: at lib/dma-debug.c:1093
      Modules linked in:
      CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.0.0-rc1+ #6
      task: e9598c00 ti: effca000 task.ti: e95a2000
      NIP: c04ef24c LR: c04ef24c CTR: c0549730
      REGS: effcbd40 TRAP: 0700   Not tainted  (4.0.0-rc1+)
      MSR: 00029002 <CE,EE,ME>  CR: 22008084  XER: 20000000
      
      GPR00: c04ef24c effcbdf0 e9598c00 00000096 c08f7424 c00ab2b0 00000000 00000001
      GPR08: c0fe7510 effca000 00000000 000001c3 22008082 00000000 c1048e77 c1050000
      GPR16: c0c36700 493c0040 0000002c e690e4a0 c1054fb4 c18bac40 00029002 c18b0788
      GPR24: 00000014 e690e480 effcbe48 00000000 c0fde128 e6ffac10 deadbeef deadbeef
      NIP [c04ef24c] check_unmap+0x93c/0xb40
      LR [c04ef24c] check_unmap+0x93c/0xb40
      Call Trace:
      [effcbdf0] [c04ef24c] check_unmap+0x93c/0xb40 (unreliable)
      [effcbe40] [c04ef4f4] debug_dma_unmap_page+0xa4/0xc0
      [effcbec0] [c070cda8] ahash_done+0x128/0x1a0
      [effcbef0] [c0700070] caam_jr_dequeue+0x1d0/0x290
      [effcbf40] [c0045f40] tasklet_action+0x110/0x1f0
      [effcbf80] [c0044bc8] __do_softirq+0x188/0x700
      [effcbfe0] [c00455d8] irq_exit+0x108/0x120
      [effcbff0] [c000f520] call_do_irq+0x24/0x3c
      [e95a3e20] [c00059b8] do_IRQ+0xc8/0x170
      [e95a3e50] [c0011bc8] ret_from_except+0x0/0x18
      Signed-off-by: NYanjiang Jin <yanjiang.jin@windriver.com>
      Acked-by: NKim Phillips <kim.phillips@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      060e234e
  12. 25 8月, 2014 2 次提交
    • C
      crypto: caam - fix addressing of struct member · 4451d494
      Cristian Stoica 提交于
      buf_0 and buf_1 in caam_hash_state are not next to each other.
      Accessing buf_1 is incorrect from &buf_0 with an offset of only
      size_of(buf_0). The same issue is also with buflen_0 and buflen_1
      
      Cc: <stable@vger.kernel.org> # 3.13+
      Signed-off-by: NCristian Stoica <cristian.stoica@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      4451d494
    • C
      crypto: caam - remove duplicated sg copy functions · 307fd543
      Cristian Stoica 提交于
      Replace equivalent (and partially incorrect) scatter-gather functions
      with ones from crypto-API.
      
      The replacement is motivated by page-faults in sg_copy_part triggered
      by successive calls to crypto_hash_update. The following fault appears
      after calling crypto_ahash_update twice, first with 13 and then
      with 285 bytes:
      
      Unable to handle kernel paging request for data at address 0x00000008
      Faulting instruction address: 0xf9bf9a8c
      Oops: Kernel access of bad area, sig: 11 [#1]
      SMP NR_CPUS=8 CoreNet Generic
      Modules linked in: tcrypt(+) caamhash caam_jr caam tls
      CPU: 6 PID: 1497 Comm: cryptomgr_test Not tainted
      3.12.19-rt30-QorIQ-SDK-V1.6+g9fda9f2 #75
      task: e9308530 ti: e700e000 task.ti: e700e000
      NIP: f9bf9a8c LR: f9bfcf28 CTR: c0019ea0
      REGS: e700fb80 TRAP: 0300   Not tainted
      (3.12.19-rt30-QorIQ-SDK-V1.6+g9fda9f2)
      MSR: 00029002 <CE,EE,ME>  CR: 44f92024  XER: 20000000
      DEAR: 00000008, ESR: 00000000
      
      GPR00: f9bfcf28 e700fc30 e9308530 e70b1e55 00000000 ffffffdd e70b1e54 0bebf888
      GPR08: 902c7ef5 c0e771e2 00000002 00000888 c0019ea0 00000000 00000000 c07a4154
      GPR16: c08d0000 e91a8f9c 00000001 e98fb400 00000100 e9c83028 e70b1e08 e70b1d48
      GPR24: e992ce10 e70b1dc8 f9bfe4f4 e70b1e55 ffffffdd e70b1ce0 00000000 00000000
      NIP [f9bf9a8c] sg_copy+0x1c/0x100 [caamhash]
      LR [f9bfcf28] ahash_update_no_ctx+0x628/0x660 [caamhash]
      Call Trace:
      [e700fc30] [f9bf9c50] sg_copy_part+0xe0/0x160 [caamhash] (unreliable)
      [e700fc50] [f9bfcf28] ahash_update_no_ctx+0x628/0x660 [caamhash]
      [e700fcb0] [f954e19c] crypto_tls_genicv+0x13c/0x300 [tls]
      [e700fd10] [f954e65c] crypto_tls_encrypt+0x5c/0x260 [tls]
      [e700fd40] [c02250ec] __test_aead.constprop.9+0x2bc/0xb70
      [e700fe40] [c02259f0] alg_test_aead+0x50/0xc0
      [e700fe60] [c02241e4] alg_test+0x114/0x2e0
      [e700fee0] [c022276c] cryptomgr_test+0x4c/0x60
      [e700fef0] [c004f658] kthread+0x98/0xa0
      [e700ff40] [c000fd04] ret_from_kernel_thread+0x5c/0x64
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      307fd543
  13. 23 7月, 2014 7 次提交
    • H
      crypto: caam - fix uninitialized state->buf_dma field · de0e35ec
      Horia Geanta 提交于
      state->buf_dma not being initialized can cause try_buf_map_to_sec4_sg
      to try to free unallocated DMA memory:
      
      caam_jr ffe301000.jr: DMA-API: device driver tries to free DMA memory it has not allocated [device address=0x000000002eb15068] [size=0 bytes]
      WARNING: at lib/dma-debug.c:1080
      Modules linked in: caamhash(+) [last unloaded: caamhash]
      CPU: 0 PID: 1387 Comm: cryptomgr_test Tainted: G        W     3.16.0-rc1 #23
      task: eed24e90 ti: eebd0000 task.ti: eebd0000
      NIP: c02889fc LR: c02889fc CTR: c02d7020
      REGS: eebd1a50 TRAP: 0700   Tainted: G        W      (3.16.0-rc1)
      MSR: 00029002 <CE,EE,ME>  CR: 44042082  XER: 00000000
      
      GPR00: c02889fc eebd1b00 eed24e90 0000008d c1de3478 c1de382c 00000000 00029002
      GPR08: 00000007 00000000 01660000 00000000 24042082 00000000 c07a1900 eeda2a40
      GPR16: 005d62a0 c078ad4c 00000000 eeb15068 c07e1e10 c0da1180 00029002 c0d97408
      GPR24: c62497a0 00000014 eebd1b58 00000000 c078ad4c ee130210 00000000 2eb15068
      NIP [c02889fc] check_unmap+0x8ac/0xab0
      LR [c02889fc] check_unmap+0x8ac/0xab0
      Call Trace:
      [eebd1b00] [c02889fc] check_unmap+0x8ac/0xab0 (unreliable)
      --- Exception: 0 at   (null)
          LR =   (null)
      [eebd1b50] [c0288c78] debug_dma_unmap_page+0x78/0x90 (unreliable)
      [eebd1bd0] [f956f738] ahash_final_ctx+0x6d8/0x7b0 [caamhash]
      [eebd1c30] [c022ff4c] __test_hash+0x2ac/0x6c0
      [eebd1de0] [c0230388] test_hash+0x28/0xb0
      [eebd1e00] [c02304a4] alg_test_hash+0x94/0xc0
      [eebd1e20] [c022fa94] alg_test+0x114/0x2e0
      [eebd1ea0] [c022cd1c] cryptomgr_test+0x4c/0x60
      [eebd1eb0] [c00497a4] kthread+0xc4/0xe0
      [eebd1f40] [c000f2fc] ret_from_kernel_thread+0x5c/0x64
      Instruction dump:
      41de01c8 80a9002c 2f850000 40fe0008 80a90008 80fa0018 3c60c06d 811a001c
      3863f4a4 813a0020 815a0024 4830cd01 <0fe00000> 81340048 2f890000 40feff48
      Signed-off-by: NHoria Geanta <horia.geanta@freescale.com>
      Acked-by: NKim Phillips <kim.phillips@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      de0e35ec
    • H
      crypto: caam - fix uninitialized edesc->dst_dma field · 76b99080
      Horia Geanta 提交于
      dst_dma not being properly initialized causes ahash_done_ctx_dst
      to try to free unallocated DMA memory:
      
      caam_jr ffe301000.jr: DMA-API: device driver tries to free DMA memory it has not allocated [device address=0x0000000006513340] [size=28 bytes]
      WARNING: at lib/dma-debug.c:1080
      Modules linked in: caamhash(+) [last unloaded: caamhash]
      CPU: 0 PID: 1373 Comm: cryptomgr_test Tainted: G        W     3.16.0-rc1 #23
      task: ee23e350 ti: effd2000 task.ti: ee1f6000
      NIP: c02889fc LR: c02889fc CTR: c02d7020
      REGS: effd3d50 TRAP: 0700   Tainted: G        W      (3.16.0-rc1)
      MSR: 00029002 <CE,EE,ME>  CR: 44048082  XER: 00000000
      
      GPR00: c02889fc effd3e00 ee23e350 0000008e c1de3478 c1de382c 00000000 00029002
      GPR08: 00000007 00000000 01660000 00000000 24048082 00000000 00000018 c07db080
      GPR16: 00000006 00000100 0000002c eeb4a7e0 c07e1e10 c0da1180 00029002 c0d9b3c8
      GPR24: eeb4a7c0 00000000 effd3e58 00000000 c078ad4c ee130210 00000000 06513340
      NIP [c02889fc] check_unmap+0x8ac/0xab0
      LR [c02889fc] check_unmap+0x8ac/0xab0
      Call Trace:
      [effd3e00] [c02889fc] check_unmap+0x8ac/0xab0 (unreliable)
      [effd3e50] [c0288c78] debug_dma_unmap_page+0x78/0x90
      [effd3ed0] [f94b89ec] ahash_done_ctx_dst+0x11c/0x200 [caamhash]
      [effd3f00] [c0429640] caam_jr_dequeue+0x1c0/0x280
      [effd3f50] [c002c94c] tasklet_action+0xcc/0x1a0
      [effd3f80] [c002cb30] __do_softirq+0x110/0x220
      [effd3fe0] [c002cf34] irq_exit+0xa4/0xe0
      [effd3ff0] [c000d834] call_do_irq+0x24/0x3c
      [ee1f7ae0] [c000489c] do_IRQ+0x8c/0x110
      [ee1f7b00] [c000f86c] ret_from_except+0x0/0x18
      --- Exception: 501 at _raw_spin_unlock_irq+0x30/0x50
          LR = _raw_spin_unlock_irq+0x2c/0x50
      [ee1f7bd0] [c0590158] wait_for_common+0xb8/0x170
      [ee1f7c10] [c059024c] wait_for_completion_interruptible+0x1c/0x40
      [ee1f7c20] [c022fc78] do_one_async_hash_op.isra.2.part.3+0x18/0x40
      [ee1f7c30] [c022ffb8] __test_hash+0x318/0x6c0
      [ee1f7de0] [c0230388] test_hash+0x28/0xb0
      [ee1f7e00] [c02304a4] alg_test_hash+0x94/0xc0
      [ee1f7e20] [c022fa94] alg_test+0x114/0x2e0
      [ee1f7ea0] [c022cd1c] cryptomgr_test+0x4c/0x60
      [ee1f7eb0] [c00497a4] kthread+0xc4/0xe0
      [ee1f7f40] [c000f2fc] ret_from_kernel_thread+0x5c/0x64
      Instruction dump:
      41de01c8 80a9002c 2f850000 40fe0008 80a90008 80fa0018 3c60c06d 811a001c
      3863f4a4 813a0020 815a0024 4830cd01 <0fe00000> 81340048 2f890000 40feff48
      Signed-off-by: NHoria Geanta <horia.geanta@freescale.com>
      Acked-by: NKim Phillips <kim.phillips@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      76b99080
    • H
      crypto: caam - fix uninitialized S/G table size in ahash_digest · 45e9af78
      Horia Geanta 提交于
      Not initializing edesc->sec4_sg_bytes correctly causes ahash_done
      callback to free unallocated DMA memory:
      
      caam_jr ffe301000.jr: DMA-API: device driver tries to free DMA memory it has not allocated [device address=0x300900000000b44d] [size=46158 bytes]
      WARNING: at lib/dma-debug.c:1080
      Modules linked in: caamhash(+) [last unloaded: caamhash]
      CPU: 0 PID: 1358 Comm: cryptomgr_test Tainted: G        W     3.16.0-rc1 #23
      task: eed04250 ti: effd2000 task.ti: c6046000
      NIP: c02889fc LR: c02889fc CTR: c02d7020
      REGS: effd3d50 TRAP: 0700   Tainted: G        W      (3.16.0-rc1)
      MSR: 00029002 <CE,EE,ME>  CR: 44048082  XER: 00000000
      
      GPR00: c02889fc effd3e00 eed04250 00000091 c1de3478 c1de382c 00000000 00029002
      GPR08: 00000007 00000000 01660000 00000000 22048082 00000000 00000018 c07db080
      GPR16: 00000006 00000100 0000002c ee2497e0 c07e1e10 c0da1180 00029002 c0d912c8
      GPR24: 00000014 ee2497c0 effd3e58 00000000 c078ad4c ee130210 30090000 0000b44d
      NIP [c02889fc] check_unmap+0x8ac/0xab0
      LR [c02889fc] check_unmap+0x8ac/0xab0
      Call Trace:
      [effd3e00] [c02889fc] check_unmap+0x8ac/0xab0 (unreliable)
      [effd3e50] [c0288c78] debug_dma_unmap_page+0x78/0x90
      [effd3ed0] [f9404fec] ahash_done+0x11c/0x190 [caamhash]
      [effd3f00] [c0429640] caam_jr_dequeue+0x1c0/0x280
      [effd3f50] [c002c94c] tasklet_action+0xcc/0x1a0
      [effd3f80] [c002cb30] __do_softirq+0x110/0x220
      [effd3fe0] [c002cf34] irq_exit+0xa4/0xe0
      [effd3ff0] [c000d834] call_do_irq+0x24/0x3c
      [c6047ae0] [c000489c] do_IRQ+0x8c/0x110
      [c6047b00] [c000f86c] ret_from_except+0x0/0x18
      --- Exception: 501 at _raw_spin_unlock_irq+0x30/0x50
          LR = _raw_spin_unlock_irq+0x2c/0x50
      [c6047bd0] [c0590158] wait_for_common+0xb8/0x170
      [c6047c10] [c059024c] wait_for_completion_interruptible+0x1c/0x40
      [c6047c20] [c022fc78] do_one_async_hash_op.isra.2.part.3+0x18/0x40
      [c6047c30] [c022ff98] __test_hash+0x2f8/0x6c0
      [c6047de0] [c0230388] test_hash+0x28/0xb0
      [c6047e00] [c0230458] alg_test_hash+0x48/0xc0
      [c6047e20] [c022fa94] alg_test+0x114/0x2e0
      [c6047ea0] [c022cd1c] cryptomgr_test+0x4c/0x60
      [c6047eb0] [c00497a4] kthread+0xc4/0xe0
      [c6047f40] [c000f2fc] ret_from_kernel_thread+0x5c/0x64
      Instruction dump:
      41de01c8 80a9002c 2f850000 40fe0008 80a90008 80fa0018 3c60c06d 811a001c
      3863f4a4 813a0020 815a0024 4830cd01 <0fe00000> 81340048 2f890000 40feff48
      Signed-off-by: NHoria Geanta <horia.geanta@freescale.com>
      Acked-by: NKim Phillips <kim.phillips@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      45e9af78
    • H
      crypto: caam - fix DMA direction mismatch in ahash_done_ctx_src · bc9e05f9
      Horia Geanta 提交于
      caam_jr ffe301000.jr: DMA-API: device driver frees DMA memory with different direction [device address=0x0000000006271dac] [size=28 bytes] [mapped with DMA_TO_DEVICE] [unmapped with DMA_FROM_DEVICE]
      ------------[ cut here ]------------
      WARNING: at lib/dma-debug.c:1131
      Modules linked in: caamhash(+) [last unloaded: caamhash]
      CPU: 0 PID: 0 Comm: swapper/0 Tainted: G        W     3.16.0-rc1 #23
      task: c0789380 ti: effd2000 task.ti: c07d6000
      NIP: c02885cc LR: c02885cc CTR: c02d7020
      REGS: effd3d50 TRAP: 0700   Tainted: G        W      (3.16.0-rc1)
      MSR: 00021002 <CE,ME>  CR: 44048082  XER: 00000000
      
      GPR00: c02885cc effd3e00 c0789380 000000c6 c1de3478 c1de382c 00000000 00021002
      GPR08: 00000007 00000000 01660000 0000012f 84048082 00000000 00000018 c07db080
      GPR16: 00000006 00000100 0000002c c62517a0 c07e1e10 c0da1180 00029002 c0d95f88
      GPR24: c07a0000 c07a4acc effd3e58 ee322bc0 0000001c ee130210 00000000 c0d95f80
      NIP [c02885cc] check_unmap+0x47c/0xab0
      LR [c02885cc] check_unmap+0x47c/0xab0
      Call Trace:
      [effd3e00] [c02885cc] check_unmap+0x47c/0xab0 (unreliable)
      [effd3e50] [c0288c78] debug_dma_unmap_page+0x78/0x90
      [effd3ed0] [f9624d84] ahash_done_ctx_src+0xa4/0x200 [caamhash]
      [effd3f00] [c0429640] caam_jr_dequeue+0x1c0/0x280
      [effd3f50] [c002c94c] tasklet_action+0xcc/0x1a0
      [effd3f80] [c002cb30] __do_softirq+0x110/0x220
      [effd3fe0] [c002cf34] irq_exit+0xa4/0xe0
      [effd3ff0] [c000d834] call_do_irq+0x24/0x3c
      [c07d7d50] [c000489c] do_IRQ+0x8c/0x110
      [c07d7d70] [c000f86c] ret_from_except+0x0/0x18
      --- Exception: 501 at _raw_spin_unlock_irq+0x30/0x50
          LR = _raw_spin_unlock_irq+0x2c/0x50
      [c07d7e40] [c0053084] finish_task_switch+0x74/0x130
      [c07d7e60] [c058f278] __schedule+0x238/0x620
      [c07d7f70] [c058fb50] schedule_preempt_disabled+0x10/0x20
      [c07d7f80] [c00686a0] cpu_startup_entry+0x100/0x1b0
      [c07d7fb0] [c074793c] start_kernel+0x338/0x34c
      [c07d7ff0] [c00003d8] set_ivor+0x140/0x17c
      Instruction dump:
      7d495214 7d294214 806a0010 80c90010 811a001c 813a0020 815a0024 90610008
      3c60c06d 90c1000c 3863f764 4830d131 <0fe00000> 3c60c06d 3863f0f4 4830d121
      ---[ end trace db1fae088c75c280 ]---
      Mapped at:
       [<f96251bc>] ahash_final_ctx+0x14c/0x7b0 [caamhash]
       [<c022ff4c>] __test_hash+0x2ac/0x6c0
       [<c0230388>] test_hash+0x28/0xb0
       [<c02304a4>] alg_test_hash+0x94/0xc0
       [<c022fa94>] alg_test+0x114/0x2e0
      Signed-off-by: NHoria Geanta <horia.geanta@freescale.com>
      Acked-by: NKim Phillips <kim.phillips@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      bc9e05f9
    • H
      crypto: caam - fix DMA direction mismatch in ahash_done_ctx_dst · ef62b231
      Horia Geanta 提交于
      caam_jr ffe301000.jr: DMA-API: device driver frees DMA memory with different direction [device address=0x00000000062ad1ac] [size=28 bytes] [mapped with DMA_FROM_DEVICE] [unmapped with DMA_TO_DEVICE]
      ------------[ cut here ]------------
      WARNING: at lib/dma-debug.c:1131
      Modules linked in: caamhash(+) [last unloaded: caamhash]
      CPU: 0 PID: 0 Comm: swapper/0 Tainted: G        W     3.16.0-rc1 #23
      task: c0789380 ti: effd2000 task.ti: c07d6000
      NIP: c02885cc LR: c02885cc CTR: c02d7020
      REGS: effd3d50 TRAP: 0700   Tainted: G        W      (3.16.0-rc1)
      MSR: 00021002 <CE,ME>  CR: 44048082  XER: 00000000
      
      GPR00: c02885cc effd3e00 c0789380 000000c6 c1de3478 c1de382c 00000000 00021002
      GPR08: 00000007 00000000 01660000 0000012f 84048082 00000000 00000018 c07db080
      GPR16: 00000006 00000100 0000002c eee567e0 c07e1e10 c0da1180 00029002 c0d96708
      GPR24: c07a0000 c07a4acc effd3e58 ee29b140 0000001c ee130210 00000000 c0d96700
      NIP [c02885cc] check_unmap+0x47c/0xab0
      LR [c02885cc] check_unmap+0x47c/0xab0
      Call Trace:
      [effd3e00] [c02885cc] check_unmap+0x47c/0xab0 (unreliable)
      [effd3e50] [c0288c78] debug_dma_unmap_page+0x78/0x90
      [effd3ed0] [f9350974] ahash_done_ctx_dst+0xa4/0x200 [caamhash]
      [effd3f00] [c0429640] caam_jr_dequeue+0x1c0/0x280
      [effd3f50] [c002c94c] tasklet_action+0xcc/0x1a0
      [effd3f80] [c002cb30] __do_softirq+0x110/0x220
      [effd3fe0] [c002cf34] irq_exit+0xa4/0xe0
      [effd3ff0] [c000d834] call_do_irq+0x24/0x3c
      [c07d7d50] [c000489c] do_IRQ+0x8c/0x110
      [c07d7d70] [c000f86c] ret_from_except+0x0/0x18
      --- Exception: 501 at _raw_spin_unlock_irq+0x30/0x50
          LR = _raw_spin_unlock_irq+0x2c/0x50
      [c07d7e40] [c0053084] finish_task_switch+0x74/0x130
      [c07d7e60] [c058f278] __schedule+0x238/0x620
      [c07d7f70] [c058fb50] schedule_preempt_disabled+0x10/0x20
      [c07d7f80] [c00686a0] cpu_startup_entry+0x100/0x1b0
      [c07d7fb0] [c074793c] start_kernel+0x338/0x34c
      [c07d7ff0] [c00003d8] set_ivor+0x140/0x17c
      Instruction dump:
      7d495214 7d294214 806a0010 80c90010 811a001c 813a0020 815a0024 90610008
      3c60c06d 90c1000c 3863f764 4830d131 <0fe00000> 3c60c06d 3863f0f4 4830d121
      ---[ end trace db1fae088c75c270 ]---
      Mapped at:
       [<f9352454>] ahash_update_first+0x5b4/0xba0 [caamhash]
       [<c022ff28>] __test_hash+0x288/0x6c0
       [<c0230388>] test_hash+0x28/0xb0
       [<c02304a4>] alg_test_hash+0x94/0xc0
       [<c022fa94>] alg_test+0x114/0x2e0
      Signed-off-by: NHoria Geanta <horia.geanta@freescale.com>
      Acked-by: NKim Phillips <kim.phillips@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      ef62b231
    • H
      crypto: caam - fix DMA unmapping error in hash_digest_key · e11aa9f1
      Horia Geanta 提交于
      Key being hashed is unmapped using the digest size instead of
      initial length:
      
      caam_jr ffe301000.jr: DMA-API: device driver frees DMA memory with different size [device address=0x000000002eeedac0] [map size=80 bytes] [unmap size=20 bytes]
      ------------[ cut here ]------------
      WARNING: at lib/dma-debug.c:1090
      Modules linked in: caamhash(+)
      CPU: 0 PID: 1327 Comm: cryptomgr_test Not tainted 3.16.0-rc1 #23
      task: eebda5d0 ti: ee26a000 task.ti: ee26a000
      NIP: c0288790 LR: c0288790 CTR: c02d7020
      REGS: ee26ba30 TRAP: 0700   Not tainted  (3.16.0-rc1)
      MSR: 00021002 <CE,ME>  CR: 44022082  XER: 00000000
      
      GPR00: c0288790 ee26bae0 eebda5d0 0000009f c1de3478 c1de382c 00000000 00021002
      GPR08: 00000007 00000000 01660000 0000012f 82022082 00000000 c07a1900 eeda29c0
      GPR16: 00000000 c61deea0 000c49a0 00000260 c07e1e10 c0da1180 00029002 c0d9ef08
      GPR24: c07a0000 c07a4acc ee26bb38 ee2765c0 00000014 ee130210 00000000 00000014
      NIP [c0288790] check_unmap+0x640/0xab0
      LR [c0288790] check_unmap+0x640/0xab0
      Call Trace:
      [ee26bae0] [c0288790] check_unmap+0x640/0xab0 (unreliable)
      [ee26bb30] [c0288c78] debug_dma_unmap_page+0x78/0x90
      [ee26bbb0] [f929c3d4] ahash_setkey+0x374/0x720 [caamhash]
      [ee26bc30] [c022fec8] __test_hash+0x228/0x6c0
      [ee26bde0] [c0230388] test_hash+0x28/0xb0
      [ee26be00] [c0230458] alg_test_hash+0x48/0xc0
      [ee26be20] [c022fa94] alg_test+0x114/0x2e0
      [ee26bea0] [c022cd1c] cryptomgr_test+0x4c/0x60
      [ee26beb0] [c00497a4] kthread+0xc4/0xe0
      [ee26bf40] [c000f2fc] ret_from_kernel_thread+0x5c/0x64
      Instruction dump:
      41de03e8 83da0020 3c60c06d 83fa0024 3863f520 813b0020 815b0024 80fa0018
      811a001c 93c10008 93e1000c 4830cf6d <0fe00000> 3c60c06d 3863f0f4 4830cf5d
      ---[ end trace db1fae088c75c26c ]---
      Mapped at:
       [<f929c15c>] ahash_setkey+0xfc/0x720 [caamhash]
       [<c022fec8>] __test_hash+0x228/0x6c0
       [<c0230388>] test_hash+0x28/0xb0
       [<c0230458>] alg_test_hash+0x48/0xc0
       [<c022fa94>] alg_test+0x114/0x2e0
      Signed-off-by: NHoria Geanta <horia.geanta@freescale.com>
      Acked-by: NKim Phillips <kim.phillips@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      e11aa9f1
    • H
      crypto: caam - fix "failed to check map error" DMA warnings · ce572085
      Horia Geanta 提交于
      Use dma_mapping_error for every dma_map_single / dma_map_page.
      Signed-off-by: NHoria Geanta <horia.geanta@freescale.com>
      Acked-by: NKim Phillips <kim.phillips@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      ce572085
  14. 10 7月, 2014 1 次提交
  15. 25 6月, 2014 1 次提交
  16. 08 5月, 2014 1 次提交
  17. 28 4月, 2014 1 次提交
  18. 30 10月, 2013 2 次提交
  19. 13 9月, 2013 1 次提交
  20. 21 8月, 2013 1 次提交
  21. 10 7月, 2013 2 次提交
    • V
      crypto: caam - Moved macro DESC_JOB_IO_LEN to desc_constr.h · aa2faec1
      Vakul Garg 提交于
      DESC_JOB_IO_LEN is a generic macro which indicates the space required in
      the descriptor for placing SEQIN/OUT commands, job descriptor header,
      shared descriptor pointer. Moving it to descriptor construction file
      which can be supposedly included by different algo offload files.
      
      Change-Id: Ic8900990d465e9079827b0c7fcacc61766d7efb6
      Signed-off-by: NVakul Garg <vakul@freescale.com>
      Reviewed-by: NGeanta Neag Horia Ioan-B05471 <horia.geanta@freescale.com>
      Reviewed-by: NFleming Andrew-AFLEMING <AFLEMING@freescale.com>
      Tested-by: NFleming Andrew-AFLEMING <AFLEMING@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      aa2faec1
    • V
      crypto: caam - Fixed the memory out of bound overwrite issue · 9c23b7d3
      Vakul Garg 提交于
      When kernel is compiled with CONFIG_SLUB_DEBUG=y and
      CRYPTO_MANAGER_DISABLE_TESTS=n, during kernel bootup, the kernel
      reports error given below. The root cause is that in function
      hash_digest_key(), for allocating descriptor, insufficient memory was
      being allocated. The required number of descriptor words apart from
      input and output pointers are 8 (instead of 6).
      
      =============================================================================
      BUG dma-kmalloc-32 (Not tainted): Redzone overwritten
      -----------------------------------------------------------------------------
      
      Disabling lock debugging due to kernel taint
      INFO: 0xdec5dec0-0xdec5dec3. First byte 0x0 instead of 0xcc
      INFO: Allocated in ahash_setkey+0x60/0x594 age=7 cpu=1 pid=1257
              __kmalloc+0x154/0x1b4
              ahash_setkey+0x60/0x594
              test_hash+0x260/0x5a0
              alg_test_hash+0x48/0xb0
              alg_test+0x84/0x228
              cryptomgr_test+0x4c/0x54
              kthread+0x98/0x9c
              ret_from_kernel_thread+0x64/0x6c
      INFO: Slab 0xc0bd0ba0 objects=19 used=2 fp=0xdec5d0d0 flags=0x0081
      INFO: Object 0xdec5dea0 @offset=3744 fp=0x5c200014
      
      Bytes b4 dec5de90: 00 00 00 00 00 00 00 00 5a 5a 5a 5a 5a 5a 5a 5a
      ........ZZZZZZZZ
      Object dec5dea0: b0 80 00 0a 84 41 00 0d f0 40 00 00 00 67 3f c0
      .....A...@...g?.
      Object dec5deb0: 00 00 00 50 2c 14 00 50 f8 40 00 00 1e c5 d0 00
      ...P,..P.@......
      Redzone dec5dec0: 00 00 00 14                                      ....
      Padding dec5df68: 5a 5a 5a 5a 5a 5a 5a 5a
      ZZZZZZZZ
      Call Trace:
      [dec65b60] [c00071b4] show_stack+0x4c/0x168 (unreliable)
      [dec65ba0] [c00d4ec8] check_bytes_and_report+0xe4/0x11c
      [dec65bd0] [c00d507c] check_object+0x17c/0x23c
      [dec65bf0] [c0550a00] free_debug_processing+0xf4/0x294
      [dec65c20] [c0550bdc] __slab_free+0x3c/0x294
      [dec65c80] [c03f0744] ahash_setkey+0x4e0/0x594
      [dec65cd0] [c01ef138] test_hash+0x260/0x5a0
      [dec65e50] [c01ef4c0] alg_test_hash+0x48/0xb0
      [dec65e70] [c01eecc4] alg_test+0x84/0x228
      [dec65ee0] [c01ec640] cryptomgr_test+0x4c/0x54
      [dec65ef0] [c005adc0] kthread+0x98/0x9c
      [dec65f40] [c000e1ac] ret_from_kernel_thread+0x64/0x6c
      FIX dma-kmalloc-32: Restoring 0xdec5dec0-0xdec5dec3=0xcc
      
      Change-Id: I0c7a1048053e811025d1c3b487940f87345c8f5d
      Signed-off-by: NVakul Garg <vakul@freescale.com>
      CC: <stable@vger.kernel.org> #3.9
      Reviewed-by: NGeanta Neag Horia Ioan-B05471 <horia.geanta@freescale.com>
      Reviewed-by: NFleming Andrew-AFLEMING <AFLEMING@freescale.com>
      Tested-by: NFleming Andrew-AFLEMING <AFLEMING@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      9c23b7d3
  22. 25 4月, 2013 1 次提交
  23. 07 9月, 2012 1 次提交