Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2825426pxv; Mon, 12 Jul 2021 02:52:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy5yaGgaQFJGa2MYeLKIcSXlrzmar7EzX2ikjRLT9K9lL/RPBEaiE4qK2l9lQCIIJcAhsoE X-Received: by 2002:a5e:d80e:: with SMTP id l14mr38952293iok.79.1626083576260; Mon, 12 Jul 2021 02:52:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626083576; cv=none; d=google.com; s=arc-20160816; b=Idmy+KWNaRIkvGQMwa9bgXRLBgJ03CiKrE0uZR/XEU7ZqSKlVrCiN6BH7PfaWWK5I+ KbUsQQIru5hhEMDNuwtkDmdq+MmkWCrUhISuWxiRFuFDqdzFE4J6HXgigL9NSy5dDC8x su4dU7+IsBc7bUB3RZoDV4aQnHTTHn/YHnXW6AfmY2m+pbWv03z0f+SfDj/CUJ4v7fHE 37gArC2eKJ5WZDqs41DfqTFgnH96HCyvh2kQkdZmXgwKmHmp2oYKz5AfYgQoGo7Oarg3 bBkyXUF4Fzo088rA5TRyFsTWl0DMXXhDk+AX1c8uafSMKkczbQPYV2Ngm/bxMkFkB7op G7Eg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pLORxw8jNxcsWGjfCHKiVv0rhLg0qk+EGSj6U2+2GZI=; b=rD4kJIRSgCtj5qqtEoQasULqqWbC7YwDKANXlDk5o+IO+7/H2Ve+ydFPvRgBefRnEy 3To8sgbCVsBiQPrUGVJ/wWAwXzS44i0aN4aygGuf5W/iC9jgofx3m6yE96D3ALdenrZk nmyspGCbis6Zl7A8r51lXDD+YipDvfBPSBI2X7pNMfap1gYg4RPD1GQGanU33N1ESEKl Dc2DOJJpE52hYug+Qc8pTqH6Hx6VvS+Cg3osOxExF5ZeDdm+ih7dTnOPLcPRUOTOW+RN ZBlNr/84PfdsV3I4p/utYmrE536SPJZyax9jlAAYEdkPAk3d2gTq+QhaOQSIezc56MA4 FAVQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=WEBRmtFg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t11si952087jan.92.2021.07.12.02.52.44; Mon, 12 Jul 2021 02:52:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=WEBRmtFg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236687AbhGLGsW (ORCPT + 99 others); Mon, 12 Jul 2021 02:48:22 -0400 Received: from mail.kernel.org ([198.145.29.99]:58304 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236129AbhGLGhL (ORCPT ); Mon, 12 Jul 2021 02:37:11 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id F2ED561175; Mon, 12 Jul 2021 06:33:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626071626; bh=wDNvjMGxrpeAQg0xXJVXW97Rx7+AUJ9+PX7Q1PWNhRI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=WEBRmtFgTZQRFJSwP+QY2CW+HmFbbTMAy7asdRWhLH4vkOiKiKXr0WVraKL+5pja0 lwKSayWnROg4N+Wzj0DPZKzzl+9dOXfwmNVCJex2llpNndmZeFL6UbRvh6qxSmq6dX sd6ahJsxKfb91z4zmdf32grRZkN2k3p6jsO/Klho= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sami Tolvanen , Eric Biggers , Ard Biesheuvel , Eric Biggers , Herbert Xu , Sasha Levin Subject: [PATCH 5.10 148/593] crypto: shash - avoid comparing pointers to exported functions under CFI Date: Mon, 12 Jul 2021 08:05:08 +0200 Message-Id: <20210712060859.310678475@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210712060843.180606720@linuxfoundation.org> References: <20210712060843.180606720@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ard Biesheuvel [ Upstream commit 22ca9f4aaf431a9413dcc115dd590123307f274f ] crypto_shash_alg_has_setkey() is implemented by testing whether the .setkey() member of a struct shash_alg points to the default version, called shash_no_setkey(). As crypto_shash_alg_has_setkey() is a static inline, this requires shash_no_setkey() to be exported to modules. Unfortunately, when building with CFI, function pointers are routed via CFI stubs which are private to each module (or to the kernel proper) and so this function pointer comparison may fail spuriously. Let's fix this by turning crypto_shash_alg_has_setkey() into an out of line function. Cc: Sami Tolvanen Cc: Eric Biggers Signed-off-by: Ard Biesheuvel Reviewed-by: Eric Biggers Reviewed-by: Sami Tolvanen Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- crypto/shash.c | 18 +++++++++++++++--- include/crypto/internal/hash.h | 8 +------- 2 files changed, 16 insertions(+), 10 deletions(-) diff --git a/crypto/shash.c b/crypto/shash.c index 2e3433ad9762..0a0a50cb694f 100644 --- a/crypto/shash.c +++ b/crypto/shash.c @@ -20,12 +20,24 @@ static const struct crypto_type crypto_shash_type; -int shash_no_setkey(struct crypto_shash *tfm, const u8 *key, - unsigned int keylen) +static int shash_no_setkey(struct crypto_shash *tfm, const u8 *key, + unsigned int keylen) { return -ENOSYS; } -EXPORT_SYMBOL_GPL(shash_no_setkey); + +/* + * Check whether an shash algorithm has a setkey function. + * + * For CFI compatibility, this must not be an inline function. This is because + * when CFI is enabled, modules won't get the same address for shash_no_setkey + * (if it were exported, which inlining would require) as the core kernel will. + */ +bool crypto_shash_alg_has_setkey(struct shash_alg *alg) +{ + return alg->setkey != shash_no_setkey; +} +EXPORT_SYMBOL_GPL(crypto_shash_alg_has_setkey); static int shash_setkey_unaligned(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) diff --git a/include/crypto/internal/hash.h b/include/crypto/internal/hash.h index 0a288dddcf5b..25806141db59 100644 --- a/include/crypto/internal/hash.h +++ b/include/crypto/internal/hash.h @@ -75,13 +75,7 @@ void crypto_unregister_ahashes(struct ahash_alg *algs, int count); int ahash_register_instance(struct crypto_template *tmpl, struct ahash_instance *inst); -int shash_no_setkey(struct crypto_shash *tfm, const u8 *key, - unsigned int keylen); - -static inline bool crypto_shash_alg_has_setkey(struct shash_alg *alg) -{ - return alg->setkey != shash_no_setkey; -} +bool crypto_shash_alg_has_setkey(struct shash_alg *alg); static inline bool crypto_shash_alg_needs_key(struct shash_alg *alg) { -- 2.30.2