1. 28 4月, 2014 1 次提交
  2. 21 3月, 2014 4 次提交
  3. 10 3月, 2014 1 次提交
  4. 27 2月, 2014 1 次提交
  5. 09 2月, 2014 2 次提交
  6. 20 12月, 2013 1 次提交
  7. 28 11月, 2013 1 次提交
    • H
      crypto: caam - fix aead sglen for case 'dst != src' · bbf9c893
      Horia Geanta 提交于
      For aead case when source and destination buffers are different,
      there is an incorrect assumption that the source length includes the ICV
      length. Fix this, since it leads to an oops when using sg_count() to
      find the number of nents in the scatterlist:
      
      Unable to handle kernel paging request for data at address 0x00000004
      Faulting instruction address: 0xf91f7634
      Oops: Kernel access of bad area, sig: 11 [#1]
      SMP NR_CPUS=8 P4080 DS
      Modules linked in: caamalg(+) caam_jr caam
      CPU: 1 PID: 1053 Comm: cryptomgr_test Not tainted 3.11.0 #16
      task: eeb24ab0 ti: eeafa000 task.ti: eeafa000
      NIP: f91f7634 LR: f91f7f24 CTR: f91f7ef0
      REGS: eeafbbc0 TRAP: 0300   Not tainted  (3.11.0)
      MSR: 00029002 <CE,EE,ME>  CR: 44044044  XER: 00000000
      DEAR: 00000004, ESR: 00000000
      
      GPR00: f91f7f24 eeafbc70 eeb24ab0 00000002 ee8e0900 ee8e0800 00000024 c45c4462
      GPR08: 00000010 00000000 00000014 0c0e4000 24044044 00000000 00000000 c0691590
      GPR16: eeab0000 eeb23000 00000000 00000000 00000000 00000001 00000001 eeafbcc8
      GPR24: 000000d1 00000010 ee2d5000 ee49ea10 ee49ea10 ee46f640 ee46f640 c0691590
      NIP [f91f7634] aead_edesc_alloc.constprop.14+0x144/0x780 [caamalg]
      LR [f91f7f24] aead_encrypt+0x34/0x288 [caamalg]
      Call Trace:
      [eeafbc70] [a1004000] 0xa1004000 (unreliable)
      [eeafbcc0] [f91f7f24] aead_encrypt+0x34/0x288 [caamalg]
      [eeafbcf0] [c020d77c] __test_aead+0x3ec/0xe20
      [eeafbe20] [c020f35c] test_aead+0x6c/0xe0
      [eeafbe40] [c020f420] alg_test_aead+0x50/0xd0
      [eeafbe60] [c020e5e4] alg_test+0x114/0x2e0
      [eeafbee0] [c020bd1c] cryptomgr_test+0x4c/0x60
      [eeafbef0] [c0047058] kthread+0xa8/0xb0
      [eeafbf40] [c000eb0c] ret_from_kernel_thread+0x5c/0x64
      Instruction dump:
      69084321 7d080034 5508d97e 69080001 0f080000 81290024 552807fe 0f080000
      3a600001 5529003a 2f8a0000 40dd0028 <80e90004> 3ab50001 8109000c 70e30002
      ---[ end trace b3c3e23925c7484e ]---
      
      While here, add a tcrypt mode for making it easy to test authenc
      (needed for triggering case above).
      Signed-off-by: NHoria Geanta <horia.geanta@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      bbf9c893
  8. 26 11月, 2013 1 次提交
  9. 30 10月, 2013 3 次提交
  10. 24 10月, 2013 1 次提交
  11. 10 10月, 2013 1 次提交
  12. 24 9月, 2013 1 次提交
  13. 13 9月, 2013 7 次提交
  14. 21 8月, 2013 2 次提交
  15. 01 8月, 2013 2 次提交
  16. 10 7月, 2013 2 次提交
    • V
      crypto: caam - Moved macro DESC_JOB_IO_LEN to desc_constr.h · aa2faec1
      Vakul Garg 提交于
      DESC_JOB_IO_LEN is a generic macro which indicates the space required in
      the descriptor for placing SEQIN/OUT commands, job descriptor header,
      shared descriptor pointer. Moving it to descriptor construction file
      which can be supposedly included by different algo offload files.
      
      Change-Id: Ic8900990d465e9079827b0c7fcacc61766d7efb6
      Signed-off-by: NVakul Garg <vakul@freescale.com>
      Reviewed-by: NGeanta Neag Horia Ioan-B05471 <horia.geanta@freescale.com>
      Reviewed-by: NFleming Andrew-AFLEMING <AFLEMING@freescale.com>
      Tested-by: NFleming Andrew-AFLEMING <AFLEMING@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      aa2faec1
    • V
      crypto: caam - Fixed the memory out of bound overwrite issue · 9c23b7d3
      Vakul Garg 提交于
      When kernel is compiled with CONFIG_SLUB_DEBUG=y and
      CRYPTO_MANAGER_DISABLE_TESTS=n, during kernel bootup, the kernel
      reports error given below. The root cause is that in function
      hash_digest_key(), for allocating descriptor, insufficient memory was
      being allocated. The required number of descriptor words apart from
      input and output pointers are 8 (instead of 6).
      
      =============================================================================
      BUG dma-kmalloc-32 (Not tainted): Redzone overwritten
      -----------------------------------------------------------------------------
      
      Disabling lock debugging due to kernel taint
      INFO: 0xdec5dec0-0xdec5dec3. First byte 0x0 instead of 0xcc
      INFO: Allocated in ahash_setkey+0x60/0x594 age=7 cpu=1 pid=1257
              __kmalloc+0x154/0x1b4
              ahash_setkey+0x60/0x594
              test_hash+0x260/0x5a0
              alg_test_hash+0x48/0xb0
              alg_test+0x84/0x228
              cryptomgr_test+0x4c/0x54
              kthread+0x98/0x9c
              ret_from_kernel_thread+0x64/0x6c
      INFO: Slab 0xc0bd0ba0 objects=19 used=2 fp=0xdec5d0d0 flags=0x0081
      INFO: Object 0xdec5dea0 @offset=3744 fp=0x5c200014
      
      Bytes b4 dec5de90: 00 00 00 00 00 00 00 00 5a 5a 5a 5a 5a 5a 5a 5a
      ........ZZZZZZZZ
      Object dec5dea0: b0 80 00 0a 84 41 00 0d f0 40 00 00 00 67 3f c0
      .....A...@...g?.
      Object dec5deb0: 00 00 00 50 2c 14 00 50 f8 40 00 00 1e c5 d0 00
      ...P,..P.@......
      Redzone dec5dec0: 00 00 00 14                                      ....
      Padding dec5df68: 5a 5a 5a 5a 5a 5a 5a 5a
      ZZZZZZZZ
      Call Trace:
      [dec65b60] [c00071b4] show_stack+0x4c/0x168 (unreliable)
      [dec65ba0] [c00d4ec8] check_bytes_and_report+0xe4/0x11c
      [dec65bd0] [c00d507c] check_object+0x17c/0x23c
      [dec65bf0] [c0550a00] free_debug_processing+0xf4/0x294
      [dec65c20] [c0550bdc] __slab_free+0x3c/0x294
      [dec65c80] [c03f0744] ahash_setkey+0x4e0/0x594
      [dec65cd0] [c01ef138] test_hash+0x260/0x5a0
      [dec65e50] [c01ef4c0] alg_test_hash+0x48/0xb0
      [dec65e70] [c01eecc4] alg_test+0x84/0x228
      [dec65ee0] [c01ec640] cryptomgr_test+0x4c/0x54
      [dec65ef0] [c005adc0] kthread+0x98/0x9c
      [dec65f40] [c000e1ac] ret_from_kernel_thread+0x64/0x6c
      FIX dma-kmalloc-32: Restoring 0xdec5dec0-0xdec5dec3=0xcc
      
      Change-Id: I0c7a1048053e811025d1c3b487940f87345c8f5d
      Signed-off-by: NVakul Garg <vakul@freescale.com>
      CC: <stable@vger.kernel.org> #3.9
      Reviewed-by: NGeanta Neag Horia Ioan-B05471 <horia.geanta@freescale.com>
      Reviewed-by: NFleming Andrew-AFLEMING <AFLEMING@freescale.com>
      Tested-by: NFleming Andrew-AFLEMING <AFLEMING@freescale.com>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      9c23b7d3
  17. 28 5月, 2013 8 次提交
  18. 14 5月, 2013 1 次提交