<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux.git/drivers/crypto, branch v5.0.4</title>
<subtitle>Clone of https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git</subtitle>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/'/>
<entry>
<title>crypto: rockchip - update new iv to device in multiple operations</title>
<updated>2019-03-23T19:11:13+00:00</updated>
<author>
<name>Zhang Zhijie</name>
<email>zhangzj@rock-chips.com</email>
</author>
<published>2019-02-13T08:24:39+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=c2ca8161971a964531b4afe23a1a236bcec16022'/>
<id>c2ca8161971a964531b4afe23a1a236bcec16022</id>
<content type='text'>
commit c1c214adcb56d36433480c8fedf772498e7e539c upstream.

For chain mode in cipher(eg. AES-CBC/DES-CBC), the iv is continuously
updated in the operation. The new iv value should be written to device
register by software.

Reported-by: Eric Biggers &lt;ebiggers@google.com&gt;
Fixes: 433cd2c617bf ("crypto: rockchip - add crypto driver for rk3288")
Cc: &lt;stable@vger.kernel.org&gt; # v4.5+
Signed-off-by: Zhang Zhijie &lt;zhangzj@rock-chips.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit c1c214adcb56d36433480c8fedf772498e7e539c upstream.

For chain mode in cipher(eg. AES-CBC/DES-CBC), the iv is continuously
updated in the operation. The new iv value should be written to device
register by software.

Reported-by: Eric Biggers &lt;ebiggers@google.com&gt;
Fixes: 433cd2c617bf ("crypto: rockchip - add crypto driver for rk3288")
Cc: &lt;stable@vger.kernel.org&gt; # v4.5+
Signed-off-by: Zhang Zhijie &lt;zhangzj@rock-chips.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: rockchip - fix scatterlist nents error</title>
<updated>2019-03-23T19:11:13+00:00</updated>
<author>
<name>Zhang Zhijie</name>
<email>zhangzj@rock-chips.com</email>
</author>
<published>2019-02-13T08:24:38+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=e400988e1daef9f38aaf6cfe3d9d4491b43d79f2'/>
<id>e400988e1daef9f38aaf6cfe3d9d4491b43d79f2</id>
<content type='text'>
commit 4359669a087633132203c52d67dd8c31e09e7b2e upstream.

In some cases, the nents of src scatterlist is different from
dst scatterlist. So two variables are used to handle the nents
of src&amp;dst scatterlist.

Reported-by: Eric Biggers &lt;ebiggers@google.com&gt;
Fixes: 433cd2c617bf ("crypto: rockchip - add crypto driver for rk3288")
Cc: &lt;stable@vger.kernel.org&gt; # v4.5+
Signed-off-by: Zhang Zhijie &lt;zhangzj@rock-chips.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 4359669a087633132203c52d67dd8c31e09e7b2e upstream.

In some cases, the nents of src scatterlist is different from
dst scatterlist. So two variables are used to handle the nents
of src&amp;dst scatterlist.

Reported-by: Eric Biggers &lt;ebiggers@google.com&gt;
Fixes: 433cd2c617bf ("crypto: rockchip - add crypto driver for rk3288")
Cc: &lt;stable@vger.kernel.org&gt; # v4.5+
Signed-off-by: Zhang Zhijie &lt;zhangzj@rock-chips.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: ccree - don't copy zero size ciphertext</title>
<updated>2019-03-23T19:11:13+00:00</updated>
<author>
<name>Gilad Ben-Yossef</name>
<email>gilad@benyossef.com</email>
</author>
<published>2019-01-15T13:43:17+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=ded8d6308ffd691475fe2c80e7ff4f3aa3979a99'/>
<id>ded8d6308ffd691475fe2c80e7ff4f3aa3979a99</id>
<content type='text'>
commit 2b5ac17463dcb2411fed506edcf259a89bb538ba upstream.

For decryption in CBC mode we need to save the last ciphertext block
for use as the next IV. However, we were trying to do this also with
zero sized ciphertext resulting in a panic.

Fix this by only doing the copy if the ciphertext length is at least
of IV size.

Signed-off-by: Gilad Ben-Yossef &lt;gilad@benyossef.com&gt;
Cc: stable@vger.kernel.org
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 2b5ac17463dcb2411fed506edcf259a89bb538ba upstream.

For decryption in CBC mode we need to save the last ciphertext block
for use as the next IV. However, we were trying to do this also with
zero sized ciphertext resulting in a panic.

Fix this by only doing the copy if the ciphertext length is at least
of IV size.

Signed-off-by: Gilad Ben-Yossef &lt;gilad@benyossef.com&gt;
Cc: stable@vger.kernel.org
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: ccree - unmap buffer before copying IV</title>
<updated>2019-03-23T19:11:12+00:00</updated>
<author>
<name>Gilad Ben-Yossef</name>
<email>gilad@benyossef.com</email>
</author>
<published>2019-01-15T13:43:15+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=4fc9f0e1c9ffe9ae6dd8591055be95c5fc176996'/>
<id>4fc9f0e1c9ffe9ae6dd8591055be95c5fc176996</id>
<content type='text'>
commit c139c72e2beb3e3db5148910b3962b7322e24374 upstream.

We were copying the last ciphertext block into the IV field
for CBC before removing the DMA mapping of the output buffer
with the result of the buffer sometime being out-of-sync cache
wise and were getting intermittent cases of bad output IV.

Fix it by moving the DMA buffer unmapping before the copy.

Signed-off-by: Gilad Ben-Yossef &lt;gilad@benyossef.com&gt;
Fixes: 00904aa0cd59 ("crypto: ccree - fix iv handling")
Cc: &lt;stable@vger.kernel.org&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit c139c72e2beb3e3db5148910b3962b7322e24374 upstream.

We were copying the last ciphertext block into the IV field
for CBC before removing the DMA mapping of the output buffer
with the result of the buffer sometime being out-of-sync cache
wise and were getting intermittent cases of bad output IV.

Fix it by moving the DMA buffer unmapping before the copy.

Signed-off-by: Gilad Ben-Yossef &lt;gilad@benyossef.com&gt;
Fixes: 00904aa0cd59 ("crypto: ccree - fix iv handling")
Cc: &lt;stable@vger.kernel.org&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: ccree - fix free of unallocated mlli buffer</title>
<updated>2019-03-23T19:11:12+00:00</updated>
<author>
<name>Hadar Gat</name>
<email>hadar.gat@arm.com</email>
</author>
<published>2019-01-15T13:43:13+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=37ff06fd9cb5dd7dbf401a321d0cd3658e918a63'/>
<id>37ff06fd9cb5dd7dbf401a321d0cd3658e918a63</id>
<content type='text'>
commit a49411959ea6d4915a9fd2a7eb5ba220e6284e9a upstream.

In cc_unmap_aead_request(), call dma_pool_free() for mlli buffer only
if an item is allocated from the pool and not always if there is a
pool allocated.
This fixes a kernel panic when trying to free a non-allocated item.

Cc: stable@vger.kernel.org
Signed-off-by: Hadar Gat &lt;hadar.gat@arm.com&gt;
Signed-off-by: Gilad Ben-Yossef &lt;gilad@benyossef.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit a49411959ea6d4915a9fd2a7eb5ba220e6284e9a upstream.

In cc_unmap_aead_request(), call dma_pool_free() for mlli buffer only
if an item is allocated from the pool and not always if there is a
pool allocated.
This fixes a kernel panic when trying to free a non-allocated item.

Cc: stable@vger.kernel.org
Signed-off-by: Hadar Gat &lt;hadar.gat@arm.com&gt;
Signed-off-by: Gilad Ben-Yossef &lt;gilad@benyossef.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: caam - fix DMA mapping of stack memory</title>
<updated>2019-03-23T19:11:12+00:00</updated>
<author>
<name>Horia Geantă</name>
<email>horia.geanta@nxp.com</email>
</author>
<published>2019-01-26T18:02:15+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=6e905e258c50b32fdda68dff8a7686b8d2636ce7'/>
<id>6e905e258c50b32fdda68dff8a7686b8d2636ce7</id>
<content type='text'>
commit c19650d6ea99bcd903d3e55dd61860026c701339 upstream.

Roland reports the following issue and provides a root cause analysis:

"On a v4.19 i.MX6 system with IMA and CONFIG_DMA_API_DEBUG enabled, a
warning is generated when accessing files on a filesystem for which IMA
measurement is enabled:

    ------------[ cut here ]------------
    WARNING: CPU: 0 PID: 1 at kernel/dma/debug.c:1181 check_for_stack.part.9+0xd0/0x120
    caam_jr 2101000.jr0: DMA-API: device driver maps memory from stack [addr=b668049e]
    Modules linked in:
    CPU: 0 PID: 1 Comm: switch_root Not tainted 4.19.0-20181214-1 #2
    Hardware name: Freescale i.MX6 Quad/DualLite (Device Tree)
    Backtrace:
    [&lt;c010efb8&gt;] (dump_backtrace) from [&lt;c010f2d0&gt;] (show_stack+0x20/0x24)
    [&lt;c010f2b0&gt;] (show_stack) from [&lt;c08b04f4&gt;] (dump_stack+0xa0/0xcc)
    [&lt;c08b0454&gt;] (dump_stack) from [&lt;c012b610&gt;] (__warn+0xf0/0x108)
    [&lt;c012b520&gt;] (__warn) from [&lt;c012b680&gt;] (warn_slowpath_fmt+0x58/0x74)
    [&lt;c012b62c&gt;] (warn_slowpath_fmt) from [&lt;c0199acc&gt;] (check_for_stack.part.9+0xd0/0x120)
    [&lt;c01999fc&gt;] (check_for_stack.part.9) from [&lt;c019a040&gt;] (debug_dma_map_page+0x144/0x174)
    [&lt;c0199efc&gt;] (debug_dma_map_page) from [&lt;c065f7f4&gt;] (ahash_final_ctx+0x5b4/0xcf0)
    [&lt;c065f240&gt;] (ahash_final_ctx) from [&lt;c065b3c4&gt;] (ahash_final+0x1c/0x20)
    [&lt;c065b3a8&gt;] (ahash_final) from [&lt;c03fe278&gt;] (crypto_ahash_op+0x38/0x80)
    [&lt;c03fe240&gt;] (crypto_ahash_op) from [&lt;c03fe2e0&gt;] (crypto_ahash_final+0x20/0x24)
    [&lt;c03fe2c0&gt;] (crypto_ahash_final) from [&lt;c03f19a8&gt;] (ima_calc_file_hash+0x29c/0xa40)
    [&lt;c03f170c&gt;] (ima_calc_file_hash) from [&lt;c03f2b24&gt;] (ima_collect_measurement+0x1dc/0x240)
    [&lt;c03f2948&gt;] (ima_collect_measurement) from [&lt;c03f0a60&gt;] (process_measurement+0x4c4/0x6b8)
    [&lt;c03f059c&gt;] (process_measurement) from [&lt;c03f0cdc&gt;] (ima_file_check+0x88/0xa4)
    [&lt;c03f0c54&gt;] (ima_file_check) from [&lt;c02d8adc&gt;] (path_openat+0x5d8/0x1364)
    [&lt;c02d8504&gt;] (path_openat) from [&lt;c02dad24&gt;] (do_filp_open+0x84/0xf0)
    [&lt;c02daca0&gt;] (do_filp_open) from [&lt;c02cf50c&gt;] (do_open_execat+0x84/0x1b0)
    [&lt;c02cf488&gt;] (do_open_execat) from [&lt;c02d1058&gt;] (__do_execve_file+0x43c/0x890)
    [&lt;c02d0c1c&gt;] (__do_execve_file) from [&lt;c02d1770&gt;] (sys_execve+0x44/0x4c)
    [&lt;c02d172c&gt;] (sys_execve) from [&lt;c0101000&gt;] (ret_fast_syscall+0x0/0x28)
    ---[ end trace 3455789a10e3aefd ]---

The cause is that the struct ahash_request *req is created as a
stack-local variable up in the stack (presumably somewhere in the IMA
implementation), then passed down into the CAAM driver, which tries to
dma_single_map the req-&gt;result (indirectly via map_seq_out_ptr_result)
in order to make that buffer available for the CAAM to store the result
of the following hash operation.

The calling code doesn't know how req will be used by the CAAM driver,
and there could be other such occurrences where stack memory is passed
down to the CAAM driver. Therefore we should rather fix this issue in
the CAAM driver where the requirements are known."

Fix this problem by:
-instructing the crypto engine to write the final hash in state-&gt;caam_ctx
-subsequently memcpy-ing the final hash into req-&gt;result

Cc: &lt;stable@vger.kernel.org&gt; # v4.19+
Reported-by: Roland Hieber &lt;rhi@pengutronix.de&gt;
Signed-off-by: Horia Geantă &lt;horia.geanta@nxp.com&gt;
Tested-by: Roland Hieber &lt;rhi@pengutronix.de&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit c19650d6ea99bcd903d3e55dd61860026c701339 upstream.

Roland reports the following issue and provides a root cause analysis:

"On a v4.19 i.MX6 system with IMA and CONFIG_DMA_API_DEBUG enabled, a
warning is generated when accessing files on a filesystem for which IMA
measurement is enabled:

    ------------[ cut here ]------------
    WARNING: CPU: 0 PID: 1 at kernel/dma/debug.c:1181 check_for_stack.part.9+0xd0/0x120
    caam_jr 2101000.jr0: DMA-API: device driver maps memory from stack [addr=b668049e]
    Modules linked in:
    CPU: 0 PID: 1 Comm: switch_root Not tainted 4.19.0-20181214-1 #2
    Hardware name: Freescale i.MX6 Quad/DualLite (Device Tree)
    Backtrace:
    [&lt;c010efb8&gt;] (dump_backtrace) from [&lt;c010f2d0&gt;] (show_stack+0x20/0x24)
    [&lt;c010f2b0&gt;] (show_stack) from [&lt;c08b04f4&gt;] (dump_stack+0xa0/0xcc)
    [&lt;c08b0454&gt;] (dump_stack) from [&lt;c012b610&gt;] (__warn+0xf0/0x108)
    [&lt;c012b520&gt;] (__warn) from [&lt;c012b680&gt;] (warn_slowpath_fmt+0x58/0x74)
    [&lt;c012b62c&gt;] (warn_slowpath_fmt) from [&lt;c0199acc&gt;] (check_for_stack.part.9+0xd0/0x120)
    [&lt;c01999fc&gt;] (check_for_stack.part.9) from [&lt;c019a040&gt;] (debug_dma_map_page+0x144/0x174)
    [&lt;c0199efc&gt;] (debug_dma_map_page) from [&lt;c065f7f4&gt;] (ahash_final_ctx+0x5b4/0xcf0)
    [&lt;c065f240&gt;] (ahash_final_ctx) from [&lt;c065b3c4&gt;] (ahash_final+0x1c/0x20)
    [&lt;c065b3a8&gt;] (ahash_final) from [&lt;c03fe278&gt;] (crypto_ahash_op+0x38/0x80)
    [&lt;c03fe240&gt;] (crypto_ahash_op) from [&lt;c03fe2e0&gt;] (crypto_ahash_final+0x20/0x24)
    [&lt;c03fe2c0&gt;] (crypto_ahash_final) from [&lt;c03f19a8&gt;] (ima_calc_file_hash+0x29c/0xa40)
    [&lt;c03f170c&gt;] (ima_calc_file_hash) from [&lt;c03f2b24&gt;] (ima_collect_measurement+0x1dc/0x240)
    [&lt;c03f2948&gt;] (ima_collect_measurement) from [&lt;c03f0a60&gt;] (process_measurement+0x4c4/0x6b8)
    [&lt;c03f059c&gt;] (process_measurement) from [&lt;c03f0cdc&gt;] (ima_file_check+0x88/0xa4)
    [&lt;c03f0c54&gt;] (ima_file_check) from [&lt;c02d8adc&gt;] (path_openat+0x5d8/0x1364)
    [&lt;c02d8504&gt;] (path_openat) from [&lt;c02dad24&gt;] (do_filp_open+0x84/0xf0)
    [&lt;c02daca0&gt;] (do_filp_open) from [&lt;c02cf50c&gt;] (do_open_execat+0x84/0x1b0)
    [&lt;c02cf488&gt;] (do_open_execat) from [&lt;c02d1058&gt;] (__do_execve_file+0x43c/0x890)
    [&lt;c02d0c1c&gt;] (__do_execve_file) from [&lt;c02d1770&gt;] (sys_execve+0x44/0x4c)
    [&lt;c02d172c&gt;] (sys_execve) from [&lt;c0101000&gt;] (ret_fast_syscall+0x0/0x28)
    ---[ end trace 3455789a10e3aefd ]---

The cause is that the struct ahash_request *req is created as a
stack-local variable up in the stack (presumably somewhere in the IMA
implementation), then passed down into the CAAM driver, which tries to
dma_single_map the req-&gt;result (indirectly via map_seq_out_ptr_result)
in order to make that buffer available for the CAAM to store the result
of the following hash operation.

The calling code doesn't know how req will be used by the CAAM driver,
and there could be other such occurrences where stack memory is passed
down to the CAAM driver. Therefore we should rather fix this issue in
the CAAM driver where the requirements are known."

Fix this problem by:
-instructing the crypto engine to write the final hash in state-&gt;caam_ctx
-subsequently memcpy-ing the final hash into req-&gt;result

Cc: &lt;stable@vger.kernel.org&gt; # v4.19+
Reported-by: Roland Hieber &lt;rhi@pengutronix.de&gt;
Signed-off-by: Horia Geantă &lt;horia.geanta@nxp.com&gt;
Tested-by: Roland Hieber &lt;rhi@pengutronix.de&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: caam - fixed handling of sg list</title>
<updated>2019-03-23T19:11:12+00:00</updated>
<author>
<name>Pankaj Gupta</name>
<email>pankaj.gupta@nxp.com</email>
</author>
<published>2019-02-01T07:18:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=e86dc780320e586fb1a30536f2b017fc7a4beb9c'/>
<id>e86dc780320e586fb1a30536f2b017fc7a4beb9c</id>
<content type='text'>
commit 42e95d1f10dcf8b18b1d7f52f7068985b3dc5b79 upstream.

when the source sg contains more than 1 fragment and
destination sg contains 1 fragment, the caam driver
mishandle the buffers to be sent to caam.

Fixes: f2147b88b2b1 ("crypto: caam - Convert GCM to new AEAD interface")
Cc: &lt;stable@vger.kernel.org&gt; # 4.2+
Signed-off-by: Pankaj Gupta &lt;pankaj.gupta@nxp.com&gt;
Signed-off-by: Arun Pathak &lt;arun.pathak@nxp.com&gt;
Reviewed-by: Horia Geanta &lt;horia.geanta@nxp.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 42e95d1f10dcf8b18b1d7f52f7068985b3dc5b79 upstream.

when the source sg contains more than 1 fragment and
destination sg contains 1 fragment, the caam driver
mishandle the buffers to be sent to caam.

Fixes: f2147b88b2b1 ("crypto: caam - Convert GCM to new AEAD interface")
Cc: &lt;stable@vger.kernel.org&gt; # 4.2+
Signed-off-by: Pankaj Gupta &lt;pankaj.gupta@nxp.com&gt;
Signed-off-by: Arun Pathak &lt;arun.pathak@nxp.com&gt;
Reviewed-by: Horia Geanta &lt;horia.geanta@nxp.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: ccree - fix missing break in switch statement</title>
<updated>2019-03-23T19:11:12+00:00</updated>
<author>
<name>Gustavo A. R. Silva</name>
<email>gustavo@embeddedor.com</email>
</author>
<published>2019-02-11T18:31:31+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=4a18213573b811d1910964dae36c3b3c358c0ba2'/>
<id>4a18213573b811d1910964dae36c3b3c358c0ba2</id>
<content type='text'>
commit b5be853181a8d4a6e20f2073ccd273d6280cad88 upstream.

Add missing break statement in order to prevent the code from falling
through to case S_DIN_to_DES.

This bug was found thanks to the ongoing efforts to enable
-Wimplicit-fallthrough.

Fixes: 63ee04c8b491 ("crypto: ccree - add skcipher support")
Cc: stable@vger.kernel.org
Signed-off-by: Gustavo A. R. Silva &lt;gustavo@embeddedor.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit b5be853181a8d4a6e20f2073ccd273d6280cad88 upstream.

Add missing break statement in order to prevent the code from falling
through to case S_DIN_to_DES.

This bug was found thanks to the ongoing efforts to enable
-Wimplicit-fallthrough.

Fixes: 63ee04c8b491 ("crypto: ccree - add skcipher support")
Cc: stable@vger.kernel.org
Signed-off-by: Gustavo A. R. Silva &lt;gustavo@embeddedor.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>crypto: caam - fix hash context DMA unmap size</title>
<updated>2019-03-23T19:11:12+00:00</updated>
<author>
<name>Franck LENORMAND</name>
<email>franck.lenormand@nxp.com</email>
</author>
<published>2019-02-19T14:56:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=fce3d391401a0fd25955a02a4a4577c7eae85aeb'/>
<id>fce3d391401a0fd25955a02a4a4577c7eae85aeb</id>
<content type='text'>
commit 65055e2108847af5e577cc7ce6bde45ea136d29a upstream.

When driver started using state-&gt;caam_ctxt for storing both running hash
and final hash, it was not updated to handle different DMA unmap
lengths.

Cc: &lt;stable@vger.kernel.org&gt; # v4.19+
Fixes: c19650d6ea99 ("crypto: caam - fix DMA mapping of stack memory")
Signed-off-by: Franck LENORMAND &lt;franck.lenormand@nxp.com&gt;
Signed-off-by: Horia Geantă &lt;horia.geanta@nxp.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 65055e2108847af5e577cc7ce6bde45ea136d29a upstream.

When driver started using state-&gt;caam_ctxt for storing both running hash
and final hash, it was not updated to handle different DMA unmap
lengths.

Cc: &lt;stable@vger.kernel.org&gt; # v4.19+
Fixes: c19650d6ea99 ("crypto: caam - fix DMA mapping of stack memory")
Signed-off-by: Franck LENORMAND &lt;franck.lenormand@nxp.com&gt;
Signed-off-by: Horia Geantă &lt;horia.geanta@nxp.com&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6</title>
<updated>2019-02-28T17:05:18+00:00</updated>
<author>
<name>Linus Torvalds</name>
<email>torvalds@linux-foundation.org</email>
</author>
<published>2019-02-28T17:05:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=3f25a5990d9d32e8f77ce830b9ea6c0e4f4bea4b'/>
<id>3f25a5990d9d32e8f77ce830b9ea6c0e4f4bea4b</id>
<content type='text'>
Pull crypto fixes from Herbert Xu:
 "This fixes a compiler warning introduced by a previous fix, as well as
  two crash bugs on ARM"

* 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6:
  crypto: sha512/arm - fix crash bug in Thumb2 build
  crypto: sha256/arm - fix crash bug in Thumb2 build
  crypto: ccree - add missing inline qualifier
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Pull crypto fixes from Herbert Xu:
 "This fixes a compiler warning introduced by a previous fix, as well as
  two crash bugs on ARM"

* 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6:
  crypto: sha512/arm - fix crash bug in Thumb2 build
  crypto: sha256/arm - fix crash bug in Thumb2 build
  crypto: ccree - add missing inline qualifier
</pre>
</div>
</content>
</entry>
</feed>
