linux-yocto/crypto
Herbert Xu ccbb96434d crypto: seqiv - Do not use req->iv after crypto_aead_encrypt
[ Upstream commit 50fdb78b7c0bcc550910ef69c0984e751cac72fa ]

As soon as crypto_aead_encrypt is called, the underlying request
may be freed by an asynchronous completion.  Thus dereferencing
req->iv after it returns is invalid.

Instead of checking req->iv against info, create a new variable
unaligned_info and use it for that purpose instead.

Fixes: 0a270321db ("[CRYPTO] seqiv: Add Sequence Number IV Generator")
Reported-by: Xiumei Mu <xmu@redhat.com>
Reported-by: Xin Long <lucien.xin@gmail.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2026-01-08 10:14:32 +01:00
..
asymmetric_keys crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id 2025-12-18 13:54:47 +01:00
async_tx
842.c
acompress.c
adiantum.c
aead.c
aegis-neon.h
aegis.h
aegis128-core.c
aegis128-neon-inner.c
aegis128-neon.c
aes_generic.c
aes_ti.c
af_alg.c crypto: af_alg - zero initialize memory allocated via sock_kmalloc 2026-01-08 10:14:28 +01:00
ahash.c
akcipher.c
algapi.c
algboss.c
algif_aead.c
algif_hash.c crypto: af_alg - zero initialize memory allocated via sock_kmalloc 2026-01-08 10:14:28 +01:00
algif_rng.c crypto: af_alg - zero initialize memory allocated via sock_kmalloc 2026-01-08 10:14:28 +01:00
algif_skcipher.c
ansi_cprng.c
anubis.c
api.c
arc4.c
aria_generic.c
authenc.c crypto: authenc - Correctly pass EINPROGRESS back up to the caller 2025-12-18 13:54:43 +01:00
authencesn.c
blake2b_generic.c
blowfish_common.c
blowfish_generic.c
bpf_crypto_skcipher.c
camellia_generic.c
cast_common.c
cast5_generic.c
cast6_generic.c
cbc.c
ccm.c
chacha_generic.c
chacha20poly1305.c
cipher.c
cmac.c
compress.c
compress.h
crc32_generic.c
crc32c_generic.c
crc64_rocksoft_generic.c
crct10dif_common.c
crct10dif_generic.c
cryptd.c
crypto_engine.c
crypto_null.c
crypto_user.c
ctr.c
cts.c
curve25519-generic.c
deflate.c
des_generic.c
dh_helper.c
dh.c
drbg.c
ecb.c
ecc_curve_defs.h
ecc.c
ecdh_helper.c
ecdh.c
ecdsa.c
ecdsasignature.asn1
echainiv.c
ecrdsa_defs.h
ecrdsa_params.asn1
ecrdsa_pub_key.asn1
ecrdsa.c
essiv.c crypto: essiv - Check ssize for decryption and in-place encryption 2025-10-19 16:33:42 +02:00
fcrypt.c
fips.c
gcm.c
geniv.c
ghash-generic.c
hash_info.c
hash.h
hctr2.c
hmac.c
internal.h
jitterentropy-kcapi.c
jitterentropy-testing.c
jitterentropy.c
jitterentropy.h
Kconfig
kdf_sp800108.c
keywrap.c
khazad.c
kpp.c
lrw.c
lskcipher.c
lz4.c
lz4hc.c
lzo-rle.c
lzo.c
Makefile
md4.c
md5.c
michael_mic.c
nhpoly1305.c
pcbc.c
pcrypt.c
poly1305_generic.c
polyval-generic.c
proc.c
ripemd.h
rmd160.c
rng.c crypto: rng - Ensure set_ent is always present 2025-10-12 12:57:19 +02:00
rsa_helper.c
rsa-pkcs1pad.c
rsa.c
rsaprivkey.asn1
rsapubkey.asn1
scatterwalk.c
scompress.c
seed.c
seqiv.c crypto: seqiv - Do not use req->iv after crypto_aead_encrypt 2026-01-08 10:14:32 +01:00
serpent_generic.c
sha1_generic.c
sha3_generic.c
sha256_generic.c
sha512_generic.c
shash.c
sig.c
simd.c
skcipher.c
skcipher.h
sm3_generic.c
sm3.c
sm4_generic.c
sm4.c
streebog_generic.c
tcrypt.c
tcrypt.h
tea.c
testmgr.c
testmgr.h
twofish_common.c
twofish_generic.c
vmac.c
wp512.c
xcbc.c
xctr.c
xor.c
xts.c
xxhash_generic.c
zstd.c