6f8c7ff4c7
https://source.android.com/security/bulletin/2021-06-01 CVE-2020-14305 CVE-2020-14381 CVE-2021-0512 CVE-2021-3347 * tag 'ASB-2021-06-05_4.19-stable' of https://github.com/aosp-mirror/kernel_common: Linux 4.19.193 usb: core: reduce power-on-good delay time of root hub net: hns3: check the return of skb_checksum_help() drivers/net/ethernet: clean up unused assignments hugetlbfs: hugetlb_fault_mutex_hash() cleanup MIPS: ralink: export rt_sysc_membase for rt2880_wdt.c MIPS: alchemy: xxs1500: add gpio-au1000.h header file sch_dsmark: fix a NULL deref in qdisc_reset() ipv6: record frag_max_size in atomic fragments in input path scsi: libsas: Use _safe() loop in sas_resume_port() ixgbe: fix large MTU request from VF bpf: Set mac_len in bpf_skb_change_head ASoC: cs35l33: fix an error code in probe() staging: emxx_udc: fix loop in _nbu2ss_nuke() mld: fix panic in mld_newpack() net: bnx2: Fix error return code in bnx2_init_board() openvswitch: meter: fix race when getting now_ms. net: mdio: octeon: Fix some double free issues net: mdio: thunder: Fix a double free issue in the .remove function net: fec: fix the potential memory leak in fec_enet_init() net: dsa: fix error code getting shifted with 4 in dsa_slave_get_sset_count net: netcp: Fix an error message drm/amdgpu: Fix a use-after-free drm/amd/amdgpu: fix refcount leak drm/amd/display: Disconnect non-DP with no EDID SMB3: incorrect file id in requests compounded with open platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI platform/x86: hp-wireless: add AMD's hardware id to the supported list btrfs: do not BUG_ON in link_to_fixup_dir openrisc: Define memory barrier mb scsi: BusLogic: Fix 64-bit system enumeration error for Buslogic media: gspca: properly check for errors in po1030_probe() media: dvb: Add check on sp8870_readreg return ASoC: cs43130: handle errors in cs43130_probe() properly libertas: register sysfs groups properly dmaengine: qcom_hidma: comment platform_driver_register call isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io char: hpet: add checks after calling ioremap net: caif: remove BUG_ON(dev == NULL) in caif_xmit net: fujitsu: fix potential null-ptr-deref serial: max310x: unregister uart driver in case of failure and abort platform/x86: hp_accel: Avoid invoking _INI to speed up resume perf jevents: Fix getting maximum number of fds i2c: i801: Don't generate an interrupt on bus reset i2c: s3c2410: fix possible NULL pointer deref on read message after write net: dsa: fix a crash if ->get_sset_count() fails net: dsa: mt7530: fix VLAN traffic leaks tipc: skb_linearize the head skb when reassembling msgs Revert "net:tipc: Fix a double free in tipc_sk_mcast_rcv" net/mlx4: Fix EEPROM dump support drm/meson: fix shutdown crash when component not probed NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() NFS: fix an incorrect limit in filelayout_decode_layout() Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails spi: mt7621: Don't leak SPI master in probe error path spi: mt7621: Disable clock in probe error path spi: gpio: Don't leak SPI master in probe error path bpf: No need to simulate speculative domain for immediates bpf: Fix mask direction swap upon off reg sign change bpf: Wrap aux data inside bpf_sanitize_info container bpf: Fix leakage of uninitialized bpf stack under speculation bpf: Update selftests to reflect new error states bpf: Tighten speculative pointer arithmetic mask bpf: Move sanitize_val_alu out of op switch bpf: Refactor and streamline bounds check into helper bpf: Improve verifier error messages for users bpf: Rework ptr_limit into alu_limit and add common error path bpf: Ensure off_reg has no mixed signed bounds for all types bpf: Move off_reg into sanitize_ptr_alu bpf, test_verifier: switch bpf_get_stack's 0 s> r8 test bpf: Test_verifier, bpf_get_stack return value add <0 bpf: extend is_branch_taken to registers selftests/bpf: add selftest part of "bpf: improve verifier branch analysis" selftests/bpf: Test narrow loads with off > 0 in test_verifier bpf, selftests: Fix up some test_verifier cases for unprivileged bpf: fix up selftests after backports were fixed net: usb: fix memory leak in smsc75xx_bind usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() usb: dwc3: gadget: Properly track pending and queued SG USB: serial: pl2303: add device id for ADLINK ND-6530 GC USB: serial: ftdi_sio: add IDs for IDS GmbH Products USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 USB: serial: ti_usb_3410_5052: add startech.com device id serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' serial: sh-sci: Fix off-by-one error in FIFO threshold register setting USB: usbfs: Don't WARN about excessively large memory allocations USB: trancevibrator: fix control-request direction iio: adc: ad7793: Add missing error code in ad7793_setup() staging: iio: cdc: ad7746: avoid overwrite of num_channels mei: request autosuspend after sending rx flow control thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue misc/uss720: fix memory leak in uss720_probe kgdb: fix gcc-11 warnings harder dm snapshot: properly fix a crash when an origin has no snapshots ath10k: Validate first subframe of A-MSDU before processing the list mac80211: extend protection against mixed key and fragment cache attacks mac80211: do not accept/forward invalid EAPOL frames mac80211: prevent attacks on TKIP/WEP as well mac80211: check defrag PN against current frame mac80211: add fragment cache to sta_info mac80211: drop A-MSDUs on old ciphers cfg80211: mitigate A-MSDU aggregation attacks mac80211: properly handle A-MSDUs that start with an RFC 1042 header mac80211: prevent mixed key and fragment cache attacks mac80211: assure all fragments are encrypted net: hso: fix control-request directions proc: Check /proc/$pid/attr/ writes against file opener perf intel-pt: Fix transaction abort handling perf intel-pt: Fix sample instruction bytes iommu/vt-d: Fix sysfs leak in alloc_iommu() NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() cifs: set server->cipher_type to AES-128-CCM for SMB3.0 NFC: nci: fix memory leak in nci_allocate_device usb: dwc3: gadget: Enable suspend events mm, vmstat: drop zone->lock in /proc/pagetypeinfo Revert "spi: Fix use-after-free with devm_spi_alloc_*" Revert "modules: inherit TAINT_PROPRIETARY_MODULE" Linux 4.19.192 Bluetooth: SMP: Fail if remote and local public keys are identical video: hgafb: correctly handle card detect failure during probe tty: vt: always invoke vc->vc_sw->con_resize callback vt: Fix character height handling with VT_RESIZEX vgacon: Record video mode changes with VT_RESIZEX video: hgafb: fix potential NULL pointer dereference qlcnic: Add null check after calling netdev_alloc_skb leds: lp5523: check return value of lp5xx_read and jump to cleanup code net: rtlwifi: properly check for alloc_workqueue() failure scsi: ufs: handle cleanup correctly on devm_reset_control_get error net: stmicro: handle clk_prepare() failure during init ethernet: sun: niu: fix missing checks of niu_pci_eeprom_read() Revert "niu: fix missing checks of niu_pci_eeprom_read" Revert "qlcnic: Avoid potential NULL pointer dereference" Revert "rtlwifi: fix a potential NULL pointer dereference" Revert "media: rcar_drif: fix a memory disclosure" cdrom: gdrom: initialize global variable at init time cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom Revert "gdrom: fix a memory leak bug" Revert "scsi: ufs: fix a missing check of devm_reset_control_get" Revert "ecryptfs: replace BUG_ON with error handling code" Revert "video: imsttfb: fix potential NULL pointer dereferences" Revert "hwmon: (lm80) fix a missing check of bus read in lm80 probe" Revert "leds: lp5523: fix a missing check of return value of lp55xx_read" Revert "net: stmicro: fix a missing check of clk_prepare" Revert "video: hgafb: fix potential NULL pointer dereference" dm snapshot: fix crash with transient storage and zero chunk size xen-pciback: reconfigure also from backend watch handler Revert "serial: mvebu-uart: Fix to avoid a potential NULL pointer dereference" rapidio: handle create_workqueue() failure Revert "rapidio: fix a NULL pointer dereference when create_workqueue() fails" ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 ALSA: hda/realtek: reset eapd coeff to default value for alc287 Revert "ALSA: sb8: add a check for request_region" ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro ALSA: usb-audio: Validate MS endpoint descriptors ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 ALSA: line6: Fix racy initialization of LINE6 MIDI ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency cifs: fix memory leak in smb2_copychunk_range locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal nvmet: seset ns->file when open fails ptrace: make ptrace() fail if the tracee changed its pid unexpectedly platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios RDMA/mlx5: Recover from fatal event in dual port mode scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() RDMA/rxe: Clear all QP fields if creation failed openrisc: Fix a memory leak firmware: arm_scpi: Prevent the ternary sign expansion bug Linux 4.19.191 scripts: switch explicitly to Python 3 tweewide: Fix most Shebang lines KVM: arm64: Initialize VCPU mdcr_el2 before loading it iomap: fix sub-page uptodate handling ipv6: remove extra dev_hold() for fallback tunnels ip6_tunnel: sit: proper dev_{hold|put} in ndo_[un]init methods sit: proper dev_{hold|put} in ndo_[un]init methods ip6_gre: proper dev_{hold|put} in ndo_[un]init methods net: stmmac: Do not enable RX FIFO overflow interrupts lib: stackdepot: turn depot_lock spinlock to raw_spinlock block: reexpand iov_iter after read/write ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 scsi: target: tcmu: Return from tcmu_handle_completions() if cmd_id not found ceph: fix fscache invalidation riscv: Workaround mcount name prior to clang-13 scripts/recordmcount.pl: Fix RISC-V regex for clang ARM: 9075/1: kernel: Fix interrupted SMC calls um: Mark all kernel symbols as local Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices ACPI / hotplug / PCI: Fix reference count leak in enable_slot() ARM: 9066/1: ftrace: pause/unpause function graph tracer in cpu_suspend() PCI: thunder: Fix compile testing xsk: Simplify detection of empty and full rings pinctrl: ingenic: Improve unreachable code generation isdn: capi: fix mismatched prototypes cxgb4: Fix the -Wmisleading-indentation warning usb: sl811-hcd: improve misleading indentation kgdb: fix gcc-11 warning on indentation x86/msr: Fix wr/rdmsr_safe_regs_on_cpu() prototypes nvme: do not try to reconfigure APST when the controller is not live clk: exynos7: Mark aclk_fsys1_200 as critical netfilter: conntrack: Make global sysctls readonly in non-init netns kobject_uevent: remove warning in init_uevent_argv() thermal/core/fair share: Lock the thermal zone while looping over instances MIPS: Avoid handcoded DIVU in `__div64_32' altogether MIPS: Avoid DIVU in `__div64_32' is result would be zero MIPS: Reinstate platform `__div64_32' handler FDDI: defxx: Make MMIO the configuration default except for EISA KVM: x86: Cancel pvclock_gtod_work on module removal cdc-wdm: untangle a circular dependency between callback and softint iio: tsl2583: Fix division by a zero lux_val iio: gyro: mpu3050: Fix reported temperature value xhci: Add reset resume quirk for AMD xhci controller. xhci: Do not use GFP_KERNEL in (potentially) atomic context usb: dwc3: gadget: Return success always for kick transfer in ep queue usb: core: hub: fix race condition about TRSMRCY of resume usb: dwc2: Fix gadget DMA unmap direction usb: xhci: Increase timeout for HC halt usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield usb: dwc3: omap: improve extcon initialization blk-mq: Swap two calls in blk_mq_exit_queue() ACPI: scan: Fix a memory leak in an error handling path usb: fotg210-hcd: Fix an error message iio: proximity: pulsedlight: Fix rumtime PM imbalance on error drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected userfaultfd: release page in error path to avoid BUG_ON squashfs: fix divide error in calculate_skip() hfsplus: prevent corruption in shrinking truncate powerpc/64s: Fix crashes when toggling entry flush barrier powerpc/64s: Fix crashes when toggling stf barrier ARC: entry: fix off-by-one error in syscall number validation i40e: Fix use-after-free in i40e_client_subtask() netfilter: nftables: avoid overflows in nft_hash_buckets() kernel: kexec_file: fix error return code of kexec_calculate_store_digests() sched/fair: Fix unfairness caused by missing load decay netfilter: nfnetlink_osf: Fix a missing skb_header_pointer() NULL check smc: disallow TCP_ULP in smc_setsockopt() net: fix nla_strcmp to handle more then one trailing null character ksm: fix potential missing rmap_item for stable_node mm/hugeltb: handle the error case in hugetlb_fix_reserve_counts() khugepaged: fix wrong result value for trace_mm_collapse_huge_page_isolate() drm/radeon: Avoid power table parsing memory leaks drm/radeon: Fix off-by-one power_state index heap overwrite netfilter: xt_SECMARK: add new revision to fix structure layout sctp: fix a SCTP_MIB_CURRESTAB leak in sctp_sf_do_dupcook_b ethernet:enic: Fix a use after free bug in enic_hard_start_xmit sctp: do asoc update earlier in sctp_sf_do_dupcook_a net: hns3: disable phy loopback setting in hclge_mac_start_phy rtc: ds1307: Fix wday settings for rx8130 NFSv4.2 fix handling of sr_eof in SEEK's reply pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() PCI: endpoint: Fix missing destroy_workqueue() NFS: Deal correctly with attribute generation counter overflow NFSv4.2: Always flush out writes in nfs42_proc_fallocate() rpmsg: qcom_glink_native: fix error return code of qcom_glink_rx_data() ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook PCI: Release OF node in pci_scan_device()'s error path PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() f2fs: fix a redundant call to f2fs_balance_fs if an error occurs ASoC: rt286: Make RT286_SET_GPIO_* readable and writable ia64: module: fix symbolizer crash on fdescr net: ethernet: mtk_eth_soc: fix RX VLAN offload powerpc/iommu: Annotate nested lock for lockdep wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt powerpc/pseries: Stop calling printk in rtas_stop_self() samples/bpf: Fix broken tracex1 due to kprobe argument change ethtool: ioctl: Fix out-of-bounds warning in store_link_ksettings_for_user() ASoC: rt286: Generalize support for ALC3263 codec powerpc/smp: Set numa node before updating mask sctp: Fix out-of-bounds warning in sctp_process_asconf_param() kconfig: nconf: stop endless search loops selftests: Set CC to clang in lib.mk if LLVM is set cuse: prevent clone pinctrl: samsung: use 'int' for register masks in Exynos mac80211: clear the beacon's CRC after channel switch i2c: Add I2C_AQ_NO_REP_START adapter quirk ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet ip6_vti: proper dev_{hold|put} in ndo_[un]init methods Bluetooth: check for zapped sk before connecting net: bridge: when suppression is enabled exclude RARP packets Bluetooth: initialize skb_queue_head at l2cap_chan_create() Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default ALSA: rme9652: don't disable if not enabled ALSA: hdspm: don't disable if not enabled ALSA: hdsp: don't disable if not enabled i2c: bail out early when RDWR parameters are wrong net: stmmac: Set FIFO sizes for ipq806x ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF tipc: convert dest node's address to network order fs: dlm: fix debugfs dump tpm: fix error return code in tpm2_get_cc_attrs_tbl() Revert "fdt: Properly handle "no-map" field in the memory region" Revert "of/fdt: Make sure no-map does not remove already reserved regions" sctp: delay auto_asconf init until binding the first addr Revert "net/sctp: fix race condition in sctp_destroy_sock" smp: Fix smp_call_function_single_async prototype net: Only allow init netns to set default tcp cong to a restricted algo mm/memory-failure: unnecessary amount of unmapping mm/sparse: add the missing sparse_buffer_fini() in error branch kfifo: fix ternary sign extension bugs net:nfc:digital: Fix a double free in digital_tg_recv_dep_req RDMA/bnxt_re: Fix a double free in bnxt_qplib_alloc_res net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb arm64: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins for RTL8211E ARM: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins for RTL8211E bnxt_en: fix ternary sign extension bug in bnxt_show_temp() powerpc/52xx: Fix an invalid ASM expression ('addi' used instead of 'add') ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices net: davinci_emac: Fix incorrect masking of tx and rx error channel ALSA: usb: midi: don't return -ENOMEM when usb_urb_ep_type_check fails RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails vsock/vmci: log once the failed queue pair allocation mwl8k: Fix a double Free in mwl8k_probe_hw i2c: sh7760: fix IRQ error path rtlwifi: 8821ae: upgrade PHY and RF parameters powerpc/pseries: extract host bridge from pci_bus prior to bus removal MIPS: pci-legacy: stop using of_pci_range_to_resource drm/i915/gvt: Fix error code in intel_gvt_init_device() ASoC: ak5558: correct reset polarity i2c: sh7760: add IRQ check i2c: jz4780: add IRQ check i2c: emev2: add IRQ check i2c: cadence: add IRQ check RDMA/srpt: Fix error return code in srpt_cm_req_recv() net: thunderx: Fix unintentional sign extension issue IB/hfi1: Fix error return code in parse_platform_config() mt7601u: fix always true expression mac80211: bail out if cipher schemes are invalid powerpc: iommu: fix build when neither PCI or IBMVIO is set powerpc/perf: Fix PMU constraint check for EBB events powerpc/64s: Fix pte update for kernel memory on radix liquidio: Fix unintented sign extension of a left shift of a u16 ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls net: hns3: Limiting the scope of vector_ring_chain variable nfc: pn533: prevent potential memory corruption bug: Remove redundant condition check in report_bug ALSA: core: remove redundant spin_lock pair in snd_card_disconnect powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration powerpc/prom: Mark identical_pvr_fixup as __init net: lapbether: Prevent racing when checking whether the netif is running perf symbols: Fix dso__fprintf_symbols_by_name() to return the number of printed chars HID: plantronics: Workaround for double volume key presses drivers/block/null_blk/main: Fix a double free in null_init. sched/debug: Fix cgroup_path[] serialization x86/events/amd/iommu: Fix sysfs type mismatch HSI: core: fix resource leaks in hsi_add_client_from_dt() mfd: stm32-timers: Avoid clearing auto reload register scsi: ibmvfc: Fix invalid state machine BUG_ON() scsi: sni_53c710: Add IRQ check scsi: sun3x_esp: Add IRQ check scsi: jazz_esp: Add IRQ check clk: uniphier: Fix potential infinite loop clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE vfio/mdev: Do not allow a mdev_type to have a NULL parent pointer nvme: retrigger ANA log update if group descriptor isn't found ata: libahci_platform: fix IRQ check sata_mv: add IRQ checks pata_ipx4xx_cf: fix IRQ check pata_arasan_cf: fix IRQ check x86/kprobes: Fix to check non boostable prefixes correctly drm/amdkfd: fix build error with AMD_IOMMU_V2=m media: m88rs6000t: avoid potential out-of-bounds reads on arrays media: omap4iss: return error code when omap4iss_get() failed media: vivid: fix assignment of dev->fbuf_out_flags soc: aspeed: fix a ternary sign expansion bug ttyprintk: Add TTY hangup callback. usb: dwc2: Fix hibernation between host and device modes. usb: dwc2: Fix host mode hibernation exit with remote wakeup flow. Drivers: hv: vmbus: Increase wait time for VMbus unload x86/platform/uv: Fix !KEXEC build failure platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table usbip: vudc: fix missing unlock on error in usbip_sockfd_store() firmware: qcom-scm: Fix QCOM_SCM configuration tty: fix return value for unsupported ioctls tty: actually undefine superseded ASYNC flags USB: cdc-acm: fix unprivileged TIOCCSERIAL usb: gadget: r8a66597: Add missing null check on return from platform_get_resource cpufreq: armada-37xx: Fix determining base CPU frequency cpufreq: armada-37xx: Fix driver cleanup when registration failed clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz cpufreq: armada-37xx: Fix the AVS value for load L1 clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock cpufreq: armada-37xx: Fix setting TBG parent for load levels crypto: qat - Fix a double free in adf_create_ring ACPI: CPPC: Replace cppc_attr with kobj_attribute soc: qcom: mdt_loader: Detect truncated read of segments soc: qcom: mdt_loader: Validate that p_filesz < p_memsz spi: Fix use-after-free with devm_spi_alloc_* staging: greybus: uart: fix unprivileged TIOCCSERIAL staging: rtl8192u: Fix potential infinite loop irqchip/gic-v3: Fix OF_BAD_ADDR error handling mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init soundwire: stream: fix memory leak in stream config error path USB: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() usb: gadget: aspeed: fix dma map failure crypto: qat - fix error path in adf_isr_resource_alloc() phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally soundwire: bus: Fix device found flag correctly bus: qcom: Put child node before return mtd: require write permissions for locking and badblock ioctls fotg210-udc: Complete OUT requests on short packets fotg210-udc: Don't DMA more than the buffer can take fotg210-udc: Mask GRP2 interrupts we don't handle fotg210-udc: Remove a dubious condition leading to fotg210_done fotg210-udc: Fix EP0 IN requests bigger than two packets fotg210-udc: Fix DMA on EP0 for length > max packet size crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init crypto: qat - don't release uninitialized resources usb: gadget: pch_udc: Check for DMA mapping error usb: gadget: pch_udc: Check if driver is present before calling ->setup() usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() x86/microcode: Check for offline CPUs before requesting new microcode mtd: rawnand: qcom: Return actual error code instead of -ENODEV mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() regmap: set debugfs_name to NULL after it is freed usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS serial: stm32: fix tx_empty condition serial: stm32: fix incorrect characters on console ARM: dts: exynos: correct PMIC interrupt trigger level on Snow ARM: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid X/U3 family ARM: dts: exynos: correct PMIC interrupt trigger level on Midas family ARM: dts: exynos: correct MUIC interrupt trigger level on Midas family ARM: dts: exynos: correct fuel gauge interrupt trigger level on Midas family memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] usb: gadget: pch_udc: Revertd3cb25a121
completely ovl: fix missing revert_creds() on error path KVM: s390: split kvm_s390_real_to_abs KVM: s390: fix guarded storage control register handling KVM: s390: split kvm_s390_logical_to_effective x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries ALSA: hda/realtek: Re-order ALC269 HP quirk table entries ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries drm/radeon: fix copy of uninitialized variable back to userspace cfg80211: scan: drop entry from hidden_list on overflow ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() md: Fix missing unused status line of /proc/mdstat md: md_open returns -EBUSY when entering racing area md: factor out a mddev_find_locked helper from mddev_find md: split mddev_find md-cluster: fix use-after-free issue when removing rdev md/bitmap: wait for external bitmap writes to complete during tear down misc: vmw_vmci: explicitly initialize vmci_datagram payload misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct misc: lis3lv02d: Fix false-positive WARN on various HP models iio:accel:adis16201: Fix wrong axis assignment that prevents loading FDDI: defxx: Bail out gracefully with unassigned PCI resource for CSR MIPS: pci-rt2880: fix slot 0 configuration MIPS: pci-mt7620: fix PLL lock check ASoC: samsung: tm2_wm5110: check of of_parse return value net/nfc: fix use-after-free llcp_sock_bind/connect bluetooth: eliminate the potential race condition when removing the HCI controller hsr: use netdev_err() instead of WARN_ONCE() Bluetooth: verify AMP hci_chan before amp_destroy modules: inherit TAINT_PROPRIETARY_MODULE modules: return licensing information from find_symbol modules: rename the licence field in struct symsearch to license modules: unexport __module_address modules: unexport __module_text_address modules: mark each_symbol_section static modules: mark find_symbol static modules: mark ref_module static dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails dm space map common: fix division bug in sm_ll_find_free_block() dm persistent data: packed struct should have an aligned() attribute too tracing: Restructure trace_clock_global() to never block tracing: Map all PIDs to command lines rsi: Use resume_noirq for SDIO tty: fix memory leak in vc_deallocate usb: dwc2: Fix session request interrupt handler usb: dwc3: gadget: Fix START_TRANSFER link state check usb: gadget/function/f_fs string table fix for multiple languages usb: gadget: Fix double free of device descriptor pointers usb: gadget: dummy_hcd: fix gpf in gadget_setup media: dvbdev: Fix memory leak in dvb_media_device_free() ext4: fix error code in ext4_commit_super ext4: do not set SB_ACTIVE in ext4_orphan_cleanup() ext4: fix check to prevent false positive report of incorrect used inodes arm64: vdso: remove commas between macro name and arguments posix-timers: Preserve return value in clock_adjtime32() Revert337f13046f
("futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op") jffs2: check the validity of dstlen in jffs2_zlib_compress() Fix misc new gcc warnings security: commoncap: fix -Wstringop-overread warning dm raid: fix inconclusive reshape layout on fast raid4/5/6 table reload sequences md/raid1: properly indicate failure when ending a failed write request tpm: vtpm_proxy: Avoid reading host log when using a virtual device intel_th: pci: Add Alder Lake-M support powerpc: fix EDEADLOCK redefinition error in uapi/asm/errno.h powerpc/eeh: Fix EEH handling for hugepages in ioremap space. jffs2: Fix kasan slab-out-of-bounds problem NFSv4: Don't discard segments marked for return in _pnfs_return_layout() NFS: Don't discard pNFS layout segments that are marked for return ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure openvswitch: fix stack OOB read while fragmenting IPv4 packets mlxsw: spectrum_mr: Update egress RIF list before route's action f2fs: fix to avoid out-of-bounds memory access ubifs: Only check replay with inode type to judge if inode linked arm64/vdso: Discard .note.gnu.property sections in vDSO btrfs: fix race when picking most recent mod log operation for an old root ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx ALSA: usb-audio: Add dB range mapping for Sennheiser Communications Headset PC 8 ALSA: usb-audio: More constifications ALSA: usb-audio: Explicitly set up the clock selector ALSA: sb: Fix two use after free in snd_sb_qsound_build ALSA: hda/conexant: Re-order CX5066 quirk table entries ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer s390/archrandom: add parameter check for s390_arch_random_generate scsi: libfc: Fix a format specifier scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response drm/amdgpu: fix NULL pointer dereference amdgpu: avoid incorrect %hu format string drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal media: gscpa/stv06xx: fix memory leak media: dvb-usb: fix memory leak in dvb_usb_adapter_init media: i2c: adv7842: fix possible use-after-free in adv7842_remove() media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() media: adv7604: fix possible use-after-free in adv76xx_remove() media: tc358743: fix possible use-after-free in tc358743_remove() power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return media: vivid: update EDID media: em28xx: fix memory leak scsi: scsi_dh_alua: Remove check for ASC 24h in alua_rtpg() scsi: qla2xxx: Fix use after free in bsg scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f power: supply: Use IRQF_ONESHOT media: gspca/sq905.c: fix uninitialized variable media: media/saa7164: fix saa7164_encoder_register() memory leak bugs extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged power: supply: bq27xxx: fix power_avg for newer ICs media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB media: ite-cir: check for receive overflow scsi: target: pscsi: Fix warning in pscsi_complete_cmd() scsi: lpfc: Fix pt2pt connection does not recover after LOGO scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe btrfs: convert logic BUG_ON()'s in replace_path to ASSERT()'s phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() intel_th: Consistency and off-by-one fix spi: omap-100k: Fix reference leak to master spi: dln2: Fix reference leak to master xhci: fix potential array out of bounds with several interrupters xhci: check control context is valid before dereferencing it. usb: xhci-mtk: support quirk to disable usb2 lpm perf/arm_pmu_platform: Fix error handling tee: optee: do not check memref size on return from Secure World x86/build: Propagate $(CLANG_FLAGS) to $(REALMODE_FLAGS) PCI: PM: Do not read power state in pci_enable_device_flags() usb: xhci: Fix port minor revision usb: dwc3: gadget: Ignore EP queue requests during bus reset usb: gadget: f_uac1: validate input parameters genirq/matrix: Prevent allocation counter corruption usb: gadget: uvc: add bInterval checking for HS mode crypto: api - check for ERR pointers in crypto_destroy_tfm() staging: wimax/i2400m: fix byte-order issue fbdev: zero-fill colormap in fbcmap.c intel_th: pci: Add Rocket Lake CPU support btrfs: fix metadata extent leak after failure to create subvolume cifs: Return correct error code from smb2_get_enc_key erofs: add unsupported inode i_format check mmc: core: Set read only for SD cards with permanent write protect bit mmc: core: Do a power cycle when the CMD11 fails mmc: block: Issue a cache flush only when it's enabled mmc: block: Update ext_csd.cache_ctrl if it was written mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() spi: spi-ti-qspi: Free DMA resources mtd: rawnand: atmel: Update ecc_stats.corrected counter mtd: spinand: core: add missing MODULE_DEVICE_TABLE() ecryptfs: fix kernel panic with null dev_name arm64: dts: mt8173: fix property typo of 'phys' in dsi node arm64: dts: marvell: armada-37xx: add syscon compatible to NB clk node ARM: 9056/1: decompressor: fix BSS size calculation for LLVM ld.lld ftrace: Handle commands when closing set_ftrace_filter file ACPI: custom_method: fix a possible memory leak ACPI: custom_method: fix potential use-after-free issue s390/disassembler: increase ebpf disasm buffer size BACKPORT: arm64: vdso32: drop -no-integrated-as flag ANDROID: GKI: update allowed list for incrementalfs.ko ANDROID: dm-user: Drop additional reference ANDROID: FUSE OWNERS pointing to android-mainline OWNERS UPSTREAM: sched: Fix out-of-bound access in uclamp Linux 4.19.190 ovl: allow upperdir inside lowerdir platform/x86: thinkpad_acpi: Correct thermal sensor allocation USB: Add reset-resume quirk for WD19's Realtek Hub USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_gen2_enqueue_hcmd() bpf: Fix masking negation logic upon negative dst register mips: Do not include hi and lo in clobber list for R6 iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_enqueue_hcmd() net: usb: ax88179_178a: initialize local variables before use ACPI: x86: Call acpi_boot_table_init() after acpi_table_upgrade() ACPI: tables: x86: Reserve memory occupied by ACPI tables erofs: fix extended inode could cross boundary BACKPORT: FROMGIT: virt_wifi: Return micros for BSS TSF values Change-Id: I84cac05396bbdf22ad69fbdbdce8480aafb8347b Signed-off-by: UtsavBalar1231 <utsavbalar1231@gmail.com> Conflicts: drivers/mmc/core/core.h drivers/mmc/core/mmc.c drivers/mmc/core/mmc_ops.c drivers/usb/core/hub.c drivers/usb/dwc3/gadget.c
686 lines
23 KiB
C
686 lines
23 KiB
C
/*
|
|
* Symmetric key ciphers.
|
|
*
|
|
* Copyright (c) 2007-2015 Herbert Xu <herbert@gondor.apana.org.au>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License as published by the Free
|
|
* Software Foundation; either version 2 of the License, or (at your option)
|
|
* any later version.
|
|
*
|
|
*/
|
|
|
|
#ifndef _CRYPTO_SKCIPHER_H
|
|
#define _CRYPTO_SKCIPHER_H
|
|
|
|
#include <linux/crypto.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/slab.h>
|
|
|
|
/**
|
|
* struct skcipher_request - Symmetric key cipher request
|
|
* @cryptlen: Number of bytes to encrypt or decrypt
|
|
* @iv: Initialisation Vector
|
|
* @src: Source SG list
|
|
* @dst: Destination SG list
|
|
* @base: Underlying async request request
|
|
* @__ctx: Start of private context data
|
|
*/
|
|
struct skcipher_request {
|
|
unsigned int cryptlen;
|
|
|
|
u8 *iv;
|
|
|
|
struct scatterlist *src;
|
|
struct scatterlist *dst;
|
|
|
|
struct crypto_async_request base;
|
|
|
|
void *__ctx[] CRYPTO_MINALIGN_ATTR;
|
|
};
|
|
|
|
/**
|
|
* struct skcipher_givcrypt_request - Crypto request with IV generation
|
|
* @seq: Sequence number for IV generation
|
|
* @giv: Space for generated IV
|
|
* @creq: The crypto request itself
|
|
*/
|
|
struct skcipher_givcrypt_request {
|
|
u64 seq;
|
|
u8 *giv;
|
|
|
|
struct ablkcipher_request creq;
|
|
};
|
|
|
|
struct crypto_skcipher {
|
|
int (*setkey)(struct crypto_skcipher *tfm, const u8 *key,
|
|
unsigned int keylen);
|
|
int (*encrypt)(struct skcipher_request *req);
|
|
int (*decrypt)(struct skcipher_request *req);
|
|
|
|
unsigned int ivsize;
|
|
unsigned int reqsize;
|
|
unsigned int keysize;
|
|
|
|
struct crypto_tfm base;
|
|
};
|
|
|
|
struct crypto_sync_skcipher {
|
|
struct crypto_skcipher base;
|
|
};
|
|
|
|
/**
|
|
* struct skcipher_alg - symmetric key cipher definition
|
|
* @min_keysize: Minimum key size supported by the transformation. This is the
|
|
* smallest key length supported by this transformation algorithm.
|
|
* This must be set to one of the pre-defined values as this is
|
|
* not hardware specific. Possible values for this field can be
|
|
* found via git grep "_MIN_KEY_SIZE" include/crypto/
|
|
* @max_keysize: Maximum key size supported by the transformation. This is the
|
|
* largest key length supported by this transformation algorithm.
|
|
* This must be set to one of the pre-defined values as this is
|
|
* not hardware specific. Possible values for this field can be
|
|
* found via git grep "_MAX_KEY_SIZE" include/crypto/
|
|
* @setkey: Set key for the transformation. This function is used to either
|
|
* program a supplied key into the hardware or store the key in the
|
|
* transformation context for programming it later. Note that this
|
|
* function does modify the transformation context. This function can
|
|
* be called multiple times during the existence of the transformation
|
|
* object, so one must make sure the key is properly reprogrammed into
|
|
* the hardware. This function is also responsible for checking the key
|
|
* length for validity. In case a software fallback was put in place in
|
|
* the @cra_init call, this function might need to use the fallback if
|
|
* the algorithm doesn't support all of the key sizes.
|
|
* @encrypt: Encrypt a scatterlist of blocks. This function is used to encrypt
|
|
* the supplied scatterlist containing the blocks of data. The crypto
|
|
* API consumer is responsible for aligning the entries of the
|
|
* scatterlist properly and making sure the chunks are correctly
|
|
* sized. In case a software fallback was put in place in the
|
|
* @cra_init call, this function might need to use the fallback if
|
|
* the algorithm doesn't support all of the key sizes. In case the
|
|
* key was stored in transformation context, the key might need to be
|
|
* re-programmed into the hardware in this function. This function
|
|
* shall not modify the transformation context, as this function may
|
|
* be called in parallel with the same transformation object.
|
|
* @decrypt: Decrypt a single block. This is a reverse counterpart to @encrypt
|
|
* and the conditions are exactly the same.
|
|
* @init: Initialize the cryptographic transformation object. This function
|
|
* is used to initialize the cryptographic transformation object.
|
|
* This function is called only once at the instantiation time, right
|
|
* after the transformation context was allocated. In case the
|
|
* cryptographic hardware has some special requirements which need to
|
|
* be handled by software, this function shall check for the precise
|
|
* requirement of the transformation and put any software fallbacks
|
|
* in place.
|
|
* @exit: Deinitialize the cryptographic transformation object. This is a
|
|
* counterpart to @init, used to remove various changes set in
|
|
* @init.
|
|
* @ivsize: IV size applicable for transformation. The consumer must provide an
|
|
* IV of exactly that size to perform the encrypt or decrypt operation.
|
|
* @chunksize: Equal to the block size except for stream ciphers such as
|
|
* CTR where it is set to the underlying block size.
|
|
* @walksize: Equal to the chunk size except in cases where the algorithm is
|
|
* considerably more efficient if it can operate on multiple chunks
|
|
* in parallel. Should be a multiple of chunksize.
|
|
* @base: Definition of a generic crypto algorithm.
|
|
*
|
|
* All fields except @ivsize are mandatory and must be filled.
|
|
*/
|
|
struct skcipher_alg {
|
|
int (*setkey)(struct crypto_skcipher *tfm, const u8 *key,
|
|
unsigned int keylen);
|
|
int (*encrypt)(struct skcipher_request *req);
|
|
int (*decrypt)(struct skcipher_request *req);
|
|
int (*init)(struct crypto_skcipher *tfm);
|
|
void (*exit)(struct crypto_skcipher *tfm);
|
|
|
|
unsigned int min_keysize;
|
|
unsigned int max_keysize;
|
|
unsigned int ivsize;
|
|
unsigned int chunksize;
|
|
unsigned int walksize;
|
|
|
|
struct crypto_alg base;
|
|
};
|
|
|
|
#define MAX_SYNC_SKCIPHER_REQSIZE 384
|
|
/*
|
|
* This performs a type-check against the "tfm" argument to make sure
|
|
* all users have the correct skcipher tfm for doing on-stack requests.
|
|
*/
|
|
#define SYNC_SKCIPHER_REQUEST_ON_STACK(name, tfm) \
|
|
char __##name##_desc[sizeof(struct skcipher_request) + \
|
|
MAX_SYNC_SKCIPHER_REQSIZE + \
|
|
(!(sizeof((struct crypto_sync_skcipher *)1 == \
|
|
(typeof(tfm))1))) \
|
|
] CRYPTO_MINALIGN_ATTR; \
|
|
struct skcipher_request *name = (void *)__##name##_desc
|
|
|
|
/**
|
|
* DOC: Symmetric Key Cipher API
|
|
*
|
|
* Symmetric key cipher API is used with the ciphers of type
|
|
* CRYPTO_ALG_TYPE_SKCIPHER (listed as type "skcipher" in /proc/crypto).
|
|
*
|
|
* Asynchronous cipher operations imply that the function invocation for a
|
|
* cipher request returns immediately before the completion of the operation.
|
|
* The cipher request is scheduled as a separate kernel thread and therefore
|
|
* load-balanced on the different CPUs via the process scheduler. To allow
|
|
* the kernel crypto API to inform the caller about the completion of a cipher
|
|
* request, the caller must provide a callback function. That function is
|
|
* invoked with the cipher handle when the request completes.
|
|
*
|
|
* To support the asynchronous operation, additional information than just the
|
|
* cipher handle must be supplied to the kernel crypto API. That additional
|
|
* information is given by filling in the skcipher_request data structure.
|
|
*
|
|
* For the symmetric key cipher API, the state is maintained with the tfm
|
|
* cipher handle. A single tfm can be used across multiple calls and in
|
|
* parallel. For asynchronous block cipher calls, context data supplied and
|
|
* only used by the caller can be referenced the request data structure in
|
|
* addition to the IV used for the cipher request. The maintenance of such
|
|
* state information would be important for a crypto driver implementer to
|
|
* have, because when calling the callback function upon completion of the
|
|
* cipher operation, that callback function may need some information about
|
|
* which operation just finished if it invoked multiple in parallel. This
|
|
* state information is unused by the kernel crypto API.
|
|
*/
|
|
|
|
static inline struct crypto_skcipher *__crypto_skcipher_cast(
|
|
struct crypto_tfm *tfm)
|
|
{
|
|
return container_of(tfm, struct crypto_skcipher, base);
|
|
}
|
|
|
|
/**
|
|
* crypto_alloc_skcipher() - allocate symmetric key cipher handle
|
|
* @alg_name: is the cra_name / name or cra_driver_name / driver name of the
|
|
* skcipher cipher
|
|
* @type: specifies the type of the cipher
|
|
* @mask: specifies the mask for the cipher
|
|
*
|
|
* Allocate a cipher handle for an skcipher. The returned struct
|
|
* crypto_skcipher is the cipher handle that is required for any subsequent
|
|
* API invocation for that skcipher.
|
|
*
|
|
* Return: allocated cipher handle in case of success; IS_ERR() is true in case
|
|
* of an error, PTR_ERR() returns the error code.
|
|
*/
|
|
struct crypto_skcipher *crypto_alloc_skcipher(const char *alg_name,
|
|
u32 type, u32 mask);
|
|
|
|
struct crypto_sync_skcipher *crypto_alloc_sync_skcipher(const char *alg_name,
|
|
u32 type, u32 mask);
|
|
|
|
static inline struct crypto_tfm *crypto_skcipher_tfm(
|
|
struct crypto_skcipher *tfm)
|
|
{
|
|
return &tfm->base;
|
|
}
|
|
|
|
/**
|
|
* crypto_free_skcipher() - zeroize and free cipher handle
|
|
* @tfm: cipher handle to be freed
|
|
*
|
|
* If @tfm is a NULL or error pointer, this function does nothing.
|
|
*/
|
|
static inline void crypto_free_skcipher(struct crypto_skcipher *tfm)
|
|
{
|
|
crypto_destroy_tfm(tfm, crypto_skcipher_tfm(tfm));
|
|
}
|
|
|
|
static inline void crypto_free_sync_skcipher(struct crypto_sync_skcipher *tfm)
|
|
{
|
|
crypto_free_skcipher(&tfm->base);
|
|
}
|
|
|
|
/**
|
|
* crypto_has_skcipher() - Search for the availability of an skcipher.
|
|
* @alg_name: is the cra_name / name or cra_driver_name / driver name of the
|
|
* skcipher
|
|
* @type: specifies the type of the cipher
|
|
* @mask: specifies the mask for the cipher
|
|
*
|
|
* Return: true when the skcipher is known to the kernel crypto API; false
|
|
* otherwise
|
|
*/
|
|
static inline int crypto_has_skcipher(const char *alg_name, u32 type,
|
|
u32 mask)
|
|
{
|
|
return crypto_has_alg(alg_name, crypto_skcipher_type(type),
|
|
crypto_skcipher_mask(mask));
|
|
}
|
|
|
|
/**
|
|
* crypto_has_skcipher2() - Search for the availability of an skcipher.
|
|
* @alg_name: is the cra_name / name or cra_driver_name / driver name of the
|
|
* skcipher
|
|
* @type: specifies the type of the skcipher
|
|
* @mask: specifies the mask for the skcipher
|
|
*
|
|
* Return: true when the skcipher is known to the kernel crypto API; false
|
|
* otherwise
|
|
*/
|
|
int crypto_has_skcipher2(const char *alg_name, u32 type, u32 mask);
|
|
|
|
static inline const char *crypto_skcipher_driver_name(
|
|
struct crypto_skcipher *tfm)
|
|
{
|
|
return crypto_tfm_alg_driver_name(crypto_skcipher_tfm(tfm));
|
|
}
|
|
|
|
static inline struct skcipher_alg *crypto_skcipher_alg(
|
|
struct crypto_skcipher *tfm)
|
|
{
|
|
return container_of(crypto_skcipher_tfm(tfm)->__crt_alg,
|
|
struct skcipher_alg, base);
|
|
}
|
|
|
|
static inline unsigned int crypto_skcipher_alg_ivsize(struct skcipher_alg *alg)
|
|
{
|
|
if ((alg->base.cra_flags & CRYPTO_ALG_TYPE_MASK) ==
|
|
CRYPTO_ALG_TYPE_BLKCIPHER)
|
|
return alg->base.cra_blkcipher.ivsize;
|
|
|
|
if (alg->base.cra_ablkcipher.encrypt)
|
|
return alg->base.cra_ablkcipher.ivsize;
|
|
|
|
return alg->ivsize;
|
|
}
|
|
|
|
/**
|
|
* crypto_skcipher_ivsize() - obtain IV size
|
|
* @tfm: cipher handle
|
|
*
|
|
* The size of the IV for the skcipher referenced by the cipher handle is
|
|
* returned. This IV size may be zero if the cipher does not need an IV.
|
|
*
|
|
* Return: IV size in bytes
|
|
*/
|
|
static inline unsigned int crypto_skcipher_ivsize(struct crypto_skcipher *tfm)
|
|
{
|
|
return tfm->ivsize;
|
|
}
|
|
|
|
static inline unsigned int crypto_sync_skcipher_ivsize(
|
|
struct crypto_sync_skcipher *tfm)
|
|
{
|
|
return crypto_skcipher_ivsize(&tfm->base);
|
|
}
|
|
|
|
static inline unsigned int crypto_skcipher_alg_chunksize(
|
|
struct skcipher_alg *alg)
|
|
{
|
|
if ((alg->base.cra_flags & CRYPTO_ALG_TYPE_MASK) ==
|
|
CRYPTO_ALG_TYPE_BLKCIPHER)
|
|
return alg->base.cra_blocksize;
|
|
|
|
if (alg->base.cra_ablkcipher.encrypt)
|
|
return alg->base.cra_blocksize;
|
|
|
|
return alg->chunksize;
|
|
}
|
|
|
|
static inline unsigned int crypto_skcipher_alg_walksize(
|
|
struct skcipher_alg *alg)
|
|
{
|
|
if ((alg->base.cra_flags & CRYPTO_ALG_TYPE_MASK) ==
|
|
CRYPTO_ALG_TYPE_BLKCIPHER)
|
|
return alg->base.cra_blocksize;
|
|
|
|
if (alg->base.cra_ablkcipher.encrypt)
|
|
return alg->base.cra_blocksize;
|
|
|
|
return alg->walksize;
|
|
}
|
|
|
|
/**
|
|
* crypto_skcipher_chunksize() - obtain chunk size
|
|
* @tfm: cipher handle
|
|
*
|
|
* The block size is set to one for ciphers such as CTR. However,
|
|
* you still need to provide incremental updates in multiples of
|
|
* the underlying block size as the IV does not have sub-block
|
|
* granularity. This is known in this API as the chunk size.
|
|
*
|
|
* Return: chunk size in bytes
|
|
*/
|
|
static inline unsigned int crypto_skcipher_chunksize(
|
|
struct crypto_skcipher *tfm)
|
|
{
|
|
return crypto_skcipher_alg_chunksize(crypto_skcipher_alg(tfm));
|
|
}
|
|
|
|
/**
|
|
* crypto_skcipher_walksize() - obtain walk size
|
|
* @tfm: cipher handle
|
|
*
|
|
* In some cases, algorithms can only perform optimally when operating on
|
|
* multiple blocks in parallel. This is reflected by the walksize, which
|
|
* must be a multiple of the chunksize (or equal if the concern does not
|
|
* apply)
|
|
*
|
|
* Return: walk size in bytes
|
|
*/
|
|
static inline unsigned int crypto_skcipher_walksize(
|
|
struct crypto_skcipher *tfm)
|
|
{
|
|
return crypto_skcipher_alg_walksize(crypto_skcipher_alg(tfm));
|
|
}
|
|
|
|
/**
|
|
* crypto_skcipher_blocksize() - obtain block size of cipher
|
|
* @tfm: cipher handle
|
|
*
|
|
* The block size for the skcipher referenced with the cipher handle is
|
|
* returned. The caller may use that information to allocate appropriate
|
|
* memory for the data returned by the encryption or decryption operation
|
|
*
|
|
* Return: block size of cipher
|
|
*/
|
|
static inline unsigned int crypto_skcipher_blocksize(
|
|
struct crypto_skcipher *tfm)
|
|
{
|
|
return crypto_tfm_alg_blocksize(crypto_skcipher_tfm(tfm));
|
|
}
|
|
|
|
static inline unsigned int crypto_sync_skcipher_blocksize(
|
|
struct crypto_sync_skcipher *tfm)
|
|
{
|
|
return crypto_skcipher_blocksize(&tfm->base);
|
|
}
|
|
|
|
static inline unsigned int crypto_skcipher_alignmask(
|
|
struct crypto_skcipher *tfm)
|
|
{
|
|
return crypto_tfm_alg_alignmask(crypto_skcipher_tfm(tfm));
|
|
}
|
|
|
|
static inline u32 crypto_skcipher_get_flags(struct crypto_skcipher *tfm)
|
|
{
|
|
return crypto_tfm_get_flags(crypto_skcipher_tfm(tfm));
|
|
}
|
|
|
|
static inline void crypto_skcipher_set_flags(struct crypto_skcipher *tfm,
|
|
u32 flags)
|
|
{
|
|
crypto_tfm_set_flags(crypto_skcipher_tfm(tfm), flags);
|
|
}
|
|
|
|
static inline void crypto_skcipher_clear_flags(struct crypto_skcipher *tfm,
|
|
u32 flags)
|
|
{
|
|
crypto_tfm_clear_flags(crypto_skcipher_tfm(tfm), flags);
|
|
}
|
|
|
|
static inline u32 crypto_sync_skcipher_get_flags(
|
|
struct crypto_sync_skcipher *tfm)
|
|
{
|
|
return crypto_skcipher_get_flags(&tfm->base);
|
|
}
|
|
|
|
static inline void crypto_sync_skcipher_set_flags(
|
|
struct crypto_sync_skcipher *tfm, u32 flags)
|
|
{
|
|
crypto_skcipher_set_flags(&tfm->base, flags);
|
|
}
|
|
|
|
static inline void crypto_sync_skcipher_clear_flags(
|
|
struct crypto_sync_skcipher *tfm, u32 flags)
|
|
{
|
|
crypto_skcipher_clear_flags(&tfm->base, flags);
|
|
}
|
|
|
|
/**
|
|
* crypto_skcipher_setkey() - set key for cipher
|
|
* @tfm: cipher handle
|
|
* @key: buffer holding the key
|
|
* @keylen: length of the key in bytes
|
|
*
|
|
* The caller provided key is set for the skcipher referenced by the cipher
|
|
* handle.
|
|
*
|
|
* Note, the key length determines the cipher type. Many block ciphers implement
|
|
* different cipher modes depending on the key size, such as AES-128 vs AES-192
|
|
* vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128
|
|
* is performed.
|
|
*
|
|
* Return: 0 if the setting of the key was successful; < 0 if an error occurred
|
|
*/
|
|
static inline int crypto_skcipher_setkey(struct crypto_skcipher *tfm,
|
|
const u8 *key, unsigned int keylen)
|
|
{
|
|
return tfm->setkey(tfm, key, keylen);
|
|
}
|
|
|
|
static inline int crypto_sync_skcipher_setkey(struct crypto_sync_skcipher *tfm,
|
|
const u8 *key, unsigned int keylen)
|
|
{
|
|
return crypto_skcipher_setkey(&tfm->base, key, keylen);
|
|
}
|
|
|
|
static inline unsigned int crypto_skcipher_default_keysize(
|
|
struct crypto_skcipher *tfm)
|
|
{
|
|
return tfm->keysize;
|
|
}
|
|
|
|
/**
|
|
* crypto_skcipher_reqtfm() - obtain cipher handle from request
|
|
* @req: skcipher_request out of which the cipher handle is to be obtained
|
|
*
|
|
* Return the crypto_skcipher handle when furnishing an skcipher_request
|
|
* data structure.
|
|
*
|
|
* Return: crypto_skcipher handle
|
|
*/
|
|
static inline struct crypto_skcipher *crypto_skcipher_reqtfm(
|
|
struct skcipher_request *req)
|
|
{
|
|
return __crypto_skcipher_cast(req->base.tfm);
|
|
}
|
|
|
|
static inline struct crypto_sync_skcipher *crypto_sync_skcipher_reqtfm(
|
|
struct skcipher_request *req)
|
|
{
|
|
struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
|
|
|
|
return container_of(tfm, struct crypto_sync_skcipher, base);
|
|
}
|
|
|
|
/**
|
|
* crypto_skcipher_encrypt() - encrypt plaintext
|
|
* @req: reference to the skcipher_request handle that holds all information
|
|
* needed to perform the cipher operation
|
|
*
|
|
* Encrypt plaintext data using the skcipher_request handle. That data
|
|
* structure and how it is filled with data is discussed with the
|
|
* skcipher_request_* functions.
|
|
*
|
|
* Return: 0 if the cipher operation was successful; < 0 if an error occurred
|
|
*/
|
|
static inline int crypto_skcipher_encrypt(struct skcipher_request *req)
|
|
{
|
|
struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
|
|
|
|
if (crypto_skcipher_get_flags(tfm) & CRYPTO_TFM_NEED_KEY)
|
|
return -ENOKEY;
|
|
|
|
return tfm->encrypt(req);
|
|
}
|
|
|
|
/**
|
|
* crypto_skcipher_decrypt() - decrypt ciphertext
|
|
* @req: reference to the skcipher_request handle that holds all information
|
|
* needed to perform the cipher operation
|
|
*
|
|
* Decrypt ciphertext data using the skcipher_request handle. That data
|
|
* structure and how it is filled with data is discussed with the
|
|
* skcipher_request_* functions.
|
|
*
|
|
* Return: 0 if the cipher operation was successful; < 0 if an error occurred
|
|
*/
|
|
static inline int crypto_skcipher_decrypt(struct skcipher_request *req)
|
|
{
|
|
struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
|
|
|
|
if (crypto_skcipher_get_flags(tfm) & CRYPTO_TFM_NEED_KEY)
|
|
return -ENOKEY;
|
|
|
|
return tfm->decrypt(req);
|
|
}
|
|
|
|
/**
|
|
* DOC: Symmetric Key Cipher Request Handle
|
|
*
|
|
* The skcipher_request data structure contains all pointers to data
|
|
* required for the symmetric key cipher operation. This includes the cipher
|
|
* handle (which can be used by multiple skcipher_request instances), pointer
|
|
* to plaintext and ciphertext, asynchronous callback function, etc. It acts
|
|
* as a handle to the skcipher_request_* API calls in a similar way as
|
|
* skcipher handle to the crypto_skcipher_* API calls.
|
|
*/
|
|
|
|
/**
|
|
* crypto_skcipher_reqsize() - obtain size of the request data structure
|
|
* @tfm: cipher handle
|
|
*
|
|
* Return: number of bytes
|
|
*/
|
|
static inline unsigned int crypto_skcipher_reqsize(struct crypto_skcipher *tfm)
|
|
{
|
|
return tfm->reqsize;
|
|
}
|
|
|
|
/**
|
|
* skcipher_request_set_tfm() - update cipher handle reference in request
|
|
* @req: request handle to be modified
|
|
* @tfm: cipher handle that shall be added to the request handle
|
|
*
|
|
* Allow the caller to replace the existing skcipher handle in the request
|
|
* data structure with a different one.
|
|
*/
|
|
static inline void skcipher_request_set_tfm(struct skcipher_request *req,
|
|
struct crypto_skcipher *tfm)
|
|
{
|
|
req->base.tfm = crypto_skcipher_tfm(tfm);
|
|
}
|
|
|
|
static inline void skcipher_request_set_sync_tfm(struct skcipher_request *req,
|
|
struct crypto_sync_skcipher *tfm)
|
|
{
|
|
skcipher_request_set_tfm(req, &tfm->base);
|
|
}
|
|
|
|
static inline struct skcipher_request *skcipher_request_cast(
|
|
struct crypto_async_request *req)
|
|
{
|
|
return container_of(req, struct skcipher_request, base);
|
|
}
|
|
|
|
/**
|
|
* skcipher_request_alloc() - allocate request data structure
|
|
* @tfm: cipher handle to be registered with the request
|
|
* @gfp: memory allocation flag that is handed to kmalloc by the API call.
|
|
*
|
|
* Allocate the request data structure that must be used with the skcipher
|
|
* encrypt and decrypt API calls. During the allocation, the provided skcipher
|
|
* handle is registered in the request data structure.
|
|
*
|
|
* Return: allocated request handle in case of success, or NULL if out of memory
|
|
*/
|
|
static inline struct skcipher_request *skcipher_request_alloc(
|
|
struct crypto_skcipher *tfm, gfp_t gfp)
|
|
{
|
|
struct skcipher_request *req;
|
|
|
|
req = kmalloc(sizeof(struct skcipher_request) +
|
|
crypto_skcipher_reqsize(tfm), gfp);
|
|
|
|
if (likely(req))
|
|
skcipher_request_set_tfm(req, tfm);
|
|
|
|
return req;
|
|
}
|
|
|
|
/**
|
|
* skcipher_request_free() - zeroize and free request data structure
|
|
* @req: request data structure cipher handle to be freed
|
|
*/
|
|
static inline void skcipher_request_free(struct skcipher_request *req)
|
|
{
|
|
kzfree(req);
|
|
}
|
|
|
|
static inline void skcipher_request_zero(struct skcipher_request *req)
|
|
{
|
|
struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
|
|
|
|
memzero_explicit(req, sizeof(*req) + crypto_skcipher_reqsize(tfm));
|
|
}
|
|
|
|
/**
|
|
* skcipher_request_set_callback() - set asynchronous callback function
|
|
* @req: request handle
|
|
* @flags: specify zero or an ORing of the flags
|
|
* CRYPTO_TFM_REQ_MAY_BACKLOG the request queue may back log and
|
|
* increase the wait queue beyond the initial maximum size;
|
|
* CRYPTO_TFM_REQ_MAY_SLEEP the request processing may sleep
|
|
* @compl: callback function pointer to be registered with the request handle
|
|
* @data: The data pointer refers to memory that is not used by the kernel
|
|
* crypto API, but provided to the callback function for it to use. Here,
|
|
* the caller can provide a reference to memory the callback function can
|
|
* operate on. As the callback function is invoked asynchronously to the
|
|
* related functionality, it may need to access data structures of the
|
|
* related functionality which can be referenced using this pointer. The
|
|
* callback function can access the memory via the "data" field in the
|
|
* crypto_async_request data structure provided to the callback function.
|
|
*
|
|
* This function allows setting the callback function that is triggered once the
|
|
* cipher operation completes.
|
|
*
|
|
* The callback function is registered with the skcipher_request handle and
|
|
* must comply with the following template::
|
|
*
|
|
* void callback_function(struct crypto_async_request *req, int error)
|
|
*/
|
|
static inline void skcipher_request_set_callback(struct skcipher_request *req,
|
|
u32 flags,
|
|
crypto_completion_t compl,
|
|
void *data)
|
|
{
|
|
req->base.complete = compl;
|
|
req->base.data = data;
|
|
req->base.flags = flags;
|
|
}
|
|
|
|
/**
|
|
* skcipher_request_set_crypt() - set data buffers
|
|
* @req: request handle
|
|
* @src: source scatter / gather list
|
|
* @dst: destination scatter / gather list
|
|
* @cryptlen: number of bytes to process from @src
|
|
* @iv: IV for the cipher operation which must comply with the IV size defined
|
|
* by crypto_skcipher_ivsize
|
|
*
|
|
* This function allows setting of the source data and destination data
|
|
* scatter / gather lists.
|
|
*
|
|
* For encryption, the source is treated as the plaintext and the
|
|
* destination is the ciphertext. For a decryption operation, the use is
|
|
* reversed - the source is the ciphertext and the destination is the plaintext.
|
|
*/
|
|
static inline void skcipher_request_set_crypt(
|
|
struct skcipher_request *req,
|
|
struct scatterlist *src, struct scatterlist *dst,
|
|
unsigned int cryptlen, void *iv)
|
|
{
|
|
req->src = src;
|
|
req->dst = dst;
|
|
req->cryptlen = cryptlen;
|
|
req->iv = iv;
|
|
}
|
|
|
|
#endif /* _CRYPTO_SKCIPHER_H */
|
|
|