I looked at the kernelci.org output for 4.4.y and found a couple of
patches that need to be applied here:
0eca6fdb3193 ("ARC: Assume multiplier is always present")
1dec78585328 ("ARC: fix build warning in elf.h")
173a3efd3edb ("bug.h: work around GCC PR82365 in BUG()")
8535f2ba0a9b ("MIPS: math-emu: do not use bools for arithmetic")
67fc5dc8a541 ("MIPS: VDSO: Include $(ccflags-vdso) in o32,n32 .lds builds")
993dc737c099 ("mfd: omap-usb-tll: Fix register offsets")
386744425e35 ("swiotlb: Make linux/swiotlb.h standalone includible")
Further, the backport of commit 867bfa4a5fce ("fs/binfmt_flat.c: make
load_flat_shared_library() work") relies on commit bdd1d2d3d251 ("fs:
fix kernel_read prototype"). Either that gets backported as well, or
the new patch dropped or modified:
fs/binfmt_flat.c:832:35: warning: passing argument 2 of 'kernel_read'
makes integer from pointer without a cast [-Wint-conversion]
include/uapi/linux/binfmts.h:18:25: warning: passing argument 3 of
'kernel_read' makes pointer from integer without a cast
[-Wint-conversion]
fs/binfmt_flat.c:832:58: warning: passing argument 4 of 'kernel_read'
makes integer from pointer without a cast [-Wint-conversion]
Arnd
From: Eric Biggers <ebiggers(a)google.com>
Michal Suchanek reported [1] that running the pcrypt_aead01 test from
LTP [2] in a loop and holding Ctrl-C causes a NULL dereference of
alg->cra_users.next in crypto_remove_spawns(), via crypto_del_alg().
The test repeatedly uses CRYPTO_MSG_NEWALG and CRYPTO_MSG_DELALG.
The crash occurs when the instance that CRYPTO_MSG_DELALG is trying to
unregister isn't a real registered algorithm, but rather is a "test
larval", which is a special "algorithm" added to the algorithms list
while the real algorithm is still being tested. Larvals don't have
initialized cra_users, so that causes the crash. Normally pcrypt_aead01
doesn't trigger this because CRYPTO_MSG_NEWALG waits for the algorithm
to be tested; however, CRYPTO_MSG_NEWALG returns early when interrupted.
Everything else in the "crypto user configuration" API has this same bug
too, i.e. it inappropriately allows operating on larval algorithms
(though it doesn't look like the other cases can cause a crash).
Fix this by making crypto_alg_match() exclude larval algorithms.
[1] https://lkml.kernel.org/r/20190625071624.27039-1-msuchanek@suse.de
[2] https://github.com/linux-test-project/ltp/blob/20190517/testcases/kernel/cr…
Reported-by: Michal Suchanek <msuchanek(a)suse.de>
Fixes: a38f7907b926 ("crypto: Add userspace configuration API")
Cc: <stable(a)vger.kernel.org> # v3.2+
Cc: Steffen Klassert <steffen.klassert(a)secunet.com>
Signed-off-by: Eric Biggers <ebiggers(a)google.com>
---
crypto/crypto_user_base.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/crypto/crypto_user_base.c b/crypto/crypto_user_base.c
index e48da3b75c71d4..a89fcc530092a8 100644
--- a/crypto/crypto_user_base.c
+++ b/crypto/crypto_user_base.c
@@ -56,6 +56,9 @@ struct crypto_alg *crypto_alg_match(struct crypto_user_alg *p, int exact)
list_for_each_entry(q, &crypto_alg_list, cra_list) {
int match = 0;
+ if (crypto_is_larval(q))
+ continue;
+
if ((q->cra_flags ^ p->cru_type) & p->cru_mask)
continue;
--
2.22.0.410.gd8fdbe21b5-goog