On 4/7/2020 6:59 PM, Iuliana Prodan wrote: > For skcipher algorithms, the input, output HW S/G tables > look like this: [IV, src][dst, IV] > Now, we can have 2 conditions here: > - there is no IV; > - src and dst are equal (in-place encryption) and scattered > and the error is an "off-by-one" in the HW S/G table. > > This issue was seen with KASAN: > BUG: KASAN: slab-out-of-bounds in skcipher_edesc_alloc+0x95c/0x1018 > > Read of size 4 at addr ffff000022a02958 by task cryptomgr_test/321 > > CPU: 2 PID: 321 Comm: cryptomgr_test Not tainted > 5.6.0-rc1-00165-ge4ef8383-dirty #4 Non-public SHA1, dirty tree. Probably it's not reproducible without applying previous fixes? https://patchwork.kernel.org/project/linux-crypto/list/?series=266561 > Fixes: 334d37c9e263 ("crypto: caam - update IV using HW support") > Cc: <stable@xxxxxxxxxxxxxxx> # v5.3+ > Signed-off-by: Iuliana Prodan <iuliana.prodan@xxxxxxx> Reviewed-by: Horia Geantă <horia.geanta@xxxxxxx> Thanks, Horia