Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp588821img; Fri, 22 Mar 2019 04:39:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqyoFdJ4U1xBiFo+1oF66tt8JRjywYO7fgTR/d4ZEKFcvoTtvA0Rx3D/E6yXTG5cimLlafE3 X-Received: by 2002:a63:7117:: with SMTP id m23mr1181453pgc.271.1553254751643; Fri, 22 Mar 2019 04:39:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553254751; cv=none; d=google.com; s=arc-20160816; b=PWUvLOlOYzYLafVmQOCrCiM7n/mNtwqkcNIcMOLXRstLuNutkdJPhnJZVCl0ZrWqX/ p3JO2gr/4NCruFwaTZVyhRuGs0PncOox9b7zABz/U7tRSoN5MHQSIhTlru7piGcaO9CV mz0io4riRbZNVHjyDUdNpTuF98oflojCSjFEwUWqYa4Z2DmIRwfLADGYz/KXzvBdoQJE XZaXQi9/6xrMgLIwNADMJcYp820a3Hg7bSYXzq+lvvoQsCK8MOQdMt2aD3XxWeQ1CXul ZfeTz03TK9V+WvpX6jXYVYhZ+xrIIjsjmLeg2HoUIlsNqSyin7tFjtLaIAfZ+qOFH8wh UqZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3LK0G7Z/Gs4DUm2PhC47v9x4IQRUz6qPY87l/9V6Sis=; b=fKa3QibJM9DXyOrdrAy/y73unJ7BQbxiOJjbQ00kLo3l8cR1Eoyngq1Iris1i2EqEa URTspQZYCcmBcfTDu8mu6XnosjxIxPDzE/VPY/nH1QU9X6CssWkdFANT6dM/Q2ft6dx2 Eet+hVG+BC4YmRN/zDa3/ivrl/RZXL8lH0nvwI2rSn8jCUheQlI/JIOqIVI++vcXblJZ jC6L4bDiqkzZt+t6Jgt+/66aU02fQBbdz0cdmiEnJfmuSR7STI+Vjq+g9K6PEgK8cJPs nVKb8DHBXKokZkjlQsdjPl+ndCruuPiWW3AcemuFD8NoJ2VutYPw3c56NDORS0EXoF0k 50uw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GrkRdo9I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f40si7238808plb.339.2019.03.22.04.38.56; Fri, 22 Mar 2019 04:39:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GrkRdo9I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730809AbfCVLhM (ORCPT + 99 others); Fri, 22 Mar 2019 07:37:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:38638 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730803AbfCVLhJ (ORCPT ); Fri, 22 Mar 2019 07:37:09 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 34E392183E; Fri, 22 Mar 2019 11:37:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553254628; bh=uJI99Q1i7nnGDLcP+cFhBQEvjxsTXCgOLRD5jtpGgm0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GrkRdo9IaVnnIASCOry7tn0TkBFK7SGd0jM7i1llpT6glQ7nUh11iiDMpWj8/XRnb 23srJh+PNWh4raQ71W9D7sv4MV5ONXWeD5n0Cso92kdGNLC4W3SuZd/b3lqVs7OpUt zpQdFi29XYvg02ruPnqNHdPq6o9Ebk7S4Vo4F6bU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Biggers , Ard Biesheuvel , Herbert Xu Subject: [PATCH 4.4 178/230] crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling Date: Fri, 22 Mar 2019 12:15:16 +0100 Message-Id: <20190322111249.233460922@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111236.796964179@linuxfoundation.org> References: <20190322111236.796964179@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Ard Biesheuvel commit eaf46edf6ea89675bd36245369c8de5063a0272c upstream. The NEON MAC calculation routine fails to handle the case correctly where there is some data in the buffer, and the input fills it up exactly. In this case, we enter the loop at the end with w8 == 0, while a negative value is assumed, and so the loop carries on until the increment of the 32-bit counter wraps around, which is quite obviously wrong. So omit the loop altogether in this case, and exit right away. Reported-by: Eric Biggers Fixes: a3fd82105b9d1 ("arm64/crypto: AES in CCM mode using ARMv8 Crypto ...") Cc: stable@vger.kernel.org Signed-off-by: Ard Biesheuvel Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- arch/arm64/crypto/aes-ce-ccm-core.S | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/arch/arm64/crypto/aes-ce-ccm-core.S +++ b/arch/arm64/crypto/aes-ce-ccm-core.S @@ -74,12 +74,13 @@ ENTRY(ce_aes_ccm_auth_data) beq 10f ext v0.16b, v0.16b, v0.16b, #1 /* rotate out the mac bytes */ b 7b -8: mov w7, w8 +8: cbz w8, 91f + mov w7, w8 add w8, w8, #16 9: ext v1.16b, v1.16b, v1.16b, #1 adds w7, w7, #1 bne 9b - eor v0.16b, v0.16b, v1.16b +91: eor v0.16b, v0.16b, v1.16b st1 {v0.16b}, [x0] 10: str w8, [x3] ret