Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp633745img; Fri, 22 Mar 2019 05:35:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqwO/uG9l74kNqWZAIj9sKjAlhmCfITc084AV42rB10ARW0Lgn0ugV0ULQoPL+grs0w6WPgB X-Received: by 2002:a17:902:32b:: with SMTP id 40mr8957599pld.122.1553258101887; Fri, 22 Mar 2019 05:35:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553258101; cv=none; d=google.com; s=arc-20160816; b=PEO4DN1i4deB24GfypgBH1uxMBIYKhO9iWDfiG4IzN/Nu/QJa4xlt4ihzgAUxI2dxW a03+yOYneCIweIdkuehmMtrvLQZqJyTmjHQXBti/4KpNionVF+xbPFOqeGipKCv/5jCH PEPtgtFe63UEVS2nnndF/wRivRL3dqdVyaD+BZE/+VWKKRfXeVcaXHpIBoIfT3Q2H313 rwzcK1Wjif1Sfgyr3OvAw854a9EyHlUhaYUdsK4iUZltk8+eRPbif1/I4MJEgkvwEr+f Uxnr/A5GcKemP9GgLGWw9OFT9VwD75wVfpjWPzD6CLflmP7Iksdq+UtD5nnCvv3Kbaby Vngg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=729nHoWPixC0+MWmqMEkC5RZwL0AKY+vCCUuSS1sx4U=; b=Pmsc6KSURXti5oEuI5R7suiwHdCRSybTdKZgFJLCdfIxT6Mq5VGSaqcOoKVV60aD2N f9W2kV/2kIC/c4nA2sjQcYo43HFSbXsmpLyoI4jmpHkG41N9Mkg8d/EwwnmxbB1InjxB dlLaLiCP3T5Rzmp+B4Jzq5B4nohu5WtuSc2iCviOipv1sULN8701JWrfoSD5u8Z3II/3 rkpSUhxEX9RBO5j/nRZc13AEG9Fvy1LnERBlL4kWia9vERy6ufxKeLSgo6eTT3NBHnYg 3PFRh37OHaiHSEgviYxFa0NjNhUxTM9OmbztQSZNH4Xwt7xyWDGBclG76R1TU77yJFzM YOFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HdbCGO0O; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d12si5862952pgj.416.2019.03.22.05.34.43; Fri, 22 Mar 2019 05:35:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HdbCGO0O; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389836AbfCVMN7 (ORCPT + 99 others); Fri, 22 Mar 2019 08:13:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:52136 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389827AbfCVMNw (ORCPT ); Fri, 22 Mar 2019 08:13:52 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8065420830; Fri, 22 Mar 2019 12:13:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553256832; bh=GbgIjC8+0X2SIo2Y02LstKsPVcS2DuQKT46R7hod5iI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HdbCGO0Op/4poN3iqjxC6QSAMjEqxcpA6E/3ydHaLrp4+3Fp7wdqE+7Fhu4G5VzRd iyakgSocgQnqBOGOYWc/QhsJTsR1c91AugR4nGbE3tPrpsOWX8vcIobjazKv3ps8RU N/VitJYHQpdmkqna8dF0NHPZKMfUYA3WGWjW2UA8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Biggers , Ard Biesheuvel , Herbert Xu Subject: [PATCH 5.0 049/238] crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling Date: Fri, 22 Mar 2019 12:14:28 +0100 Message-Id: <20190322111301.298077615@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111258.383569278@linuxfoundation.org> References: <20190322111258.383569278@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ From: Ard Biesheuvel commit eaf46edf6ea89675bd36245369c8de5063a0272c upstream. The NEON MAC calculation routine fails to handle the case correctly where there is some data in the buffer, and the input fills it up exactly. In this case, we enter the loop at the end with w8 == 0, while a negative value is assumed, and so the loop carries on until the increment of the 32-bit counter wraps around, which is quite obviously wrong. So omit the loop altogether in this case, and exit right away. Reported-by: Eric Biggers Fixes: a3fd82105b9d1 ("arm64/crypto: AES in CCM mode using ARMv8 Crypto ...") Cc: stable@vger.kernel.org Signed-off-by: Ard Biesheuvel Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- arch/arm64/crypto/aes-ce-ccm-core.S | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/arch/arm64/crypto/aes-ce-ccm-core.S +++ b/arch/arm64/crypto/aes-ce-ccm-core.S @@ -74,12 +74,13 @@ ENTRY(ce_aes_ccm_auth_data) beq 10f ext v0.16b, v0.16b, v0.16b, #1 /* rotate out the mac bytes */ b 7b -8: mov w7, w8 +8: cbz w8, 91f + mov w7, w8 add w8, w8, #16 9: ext v1.16b, v1.16b, v1.16b, #1 adds w7, w7, #1 bne 9b - eor v0.16b, v0.16b, v1.16b +91: eor v0.16b, v0.16b, v1.16b st1 {v0.16b}, [x0] 10: str w8, [x3] ret