On 5/31/2019 11:14 AM, Ard Biesheuvel wrote: > The CAAM driver currently violates an undocumented and slightly > controversial requirement imposed by the crypto stack that a buffer > referred to by the request structure via its virtual address may not > be modified while any scatterlists passed via the same request > structure are mapped for inbound DMA. > IMO this requirement developed while discussing current issue, it did not exist a priori. > This may result in errors like > > alg: aead: decryption failed on test 1 for gcm_base(ctr-aes-caam,ghash-generic): ret=74 > alg: aead: Failed to load transform for gcm(aes): -2 > > on non-cache coherent systems, due to the fact that the GCM driver > passes an IV buffer by virtual address which shares a cacheline with > the auth_tag buffer passed via a scatterlist, resulting in corruption > of the auth_tag when the IV is updated while the DMA mapping is live. > > Since the IV that is returned to the caller is only valid for CBC mode, > and given that the in-kernel users of CBC (such as CTS) don't trigger the > same issue as the GCM driver, let's just disable the output IV generation > for all modes except CBC for the time being. > > Cc: Horia Geanta <horia.geanta@xxxxxxx> > Cc: Iuliana Prodan <iuliana.prodan@xxxxxxx> > Reported-by: Sascha Hauer <s.hauer@xxxxxxxxxxxxxx> > Signed-off-by: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Link: https://lore.kernel.org/linux-crypto/1559149856-7938-1-git-send-email-iuliana.prodan@xxxxxxx/ Reviewed-by: Horia Geanta <horia.geanta@xxxxxxx> Unfortunately this does not apply cleanly to -stable, I'll send a backport once it hits mainline. Thanks, Horia