Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp116915pxb; Mon, 13 Sep 2021 14:35:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzH3JFxiGpIEmrlXf6D2CqdyVbbiD02YOlw34GFMOY5qisFyucx1dXID+4rfLGtQ+TCQiIw X-Received: by 2002:a17:907:244a:: with SMTP id yw10mr5622142ejb.79.1631568917122; Mon, 13 Sep 2021 14:35:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631568917; cv=none; d=google.com; s=arc-20160816; b=LEXTpmQdy/LT5G1Kowzu7u8qBMMB0cf/P8xn6qjcdAmGDGqd7Gd0u4yWJSGbfVcfSl S3s2eV7mjg36b9Ns1U3iIU/JaixSGHV9W/RMeRx0KxRmbjFlsKyadPHGwrcLOcwDz7Eu HzbWzE2eoLCkuJ9IZ6klypiAatOHDYW/3rMH5JZ2+JmeJ6EikD9kuE2iCm0PeMUldznb z7EY0Y1AsO6kbXOKMWIWzDVb0Q9dylAVcnwG7sLgIeb0Nnw+KsII1CcC2hQrOKE1empy 0OcJxXKSLYbfiEBVNe/++E+SlnXF6w/xHKJqC9OBZzixcKOUdLJ87HIrSPgVMxZvu8vX NJEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tyyw/DhybdPgWZYUgjYnxInLKN+P/Yd99p6HClQDFyY=; b=0JufAyxcFSkTmk2AYm25++mwGDbJF9QmW1B27yygnrfKs500iOnNVfawAXzeA1+V24 3KqVEchqMz20qtxdu8dSl9Ur7rQk45DFxnX58TBX2Ma3cDGccoYsjQVQA8fX8tO1fQlA wTKHzPQ1zh9WzZuIsbVsMEUG41QQ4lsB8U0moFgE9MBgd4vyaNgOIlaRnpmh/mOrEoHG cpHD3izVDomGRS5/2eU1FbNrd1Zt+YQl4+U5s+Zx+MTnl0WhzXXnax92AltX3aqw9DX7 7vM4FUbEKDlC/DOkFxGCZNjJz2aw79XbIhPQ5YOhTiRobyGn8E3eT2upLCdyFM2JioS9 N+ag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=qzOlRFvx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m1si10520682ejj.198.2021.09.13.14.34.53; Mon, 13 Sep 2021 14:35:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=qzOlRFvx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343749AbhIMN4z (ORCPT + 99 others); Mon, 13 Sep 2021 09:56:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:60356 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244726AbhIMNxj (ORCPT ); Mon, 13 Sep 2021 09:53:39 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 596C161107; Mon, 13 Sep 2021 13:35:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1631540103; bh=zIUtON/Uqq4kJRp4uO9Wg8c/S2FX7ZCkao2ZJwC0mG0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qzOlRFvxLojK6p4u9RzaEvblwli8Y/op+i5ZSE75lqmgBkP1fEYEdRCZzhssbSUVX onQ8sBDn0qGJxN3JssG0yOOostcmOb5wB3KhUPxAS1R+Ju1t6Amavs7dEM4SfJ4Nem a2whKzfw967xQmpOdtKxo8tu6QXyq6p39+MeaPNI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Guillaume Gardet , Takashi Iwai , Mian Yousaf Kaukab , Stefan Berger , Herbert Xu , Sasha Levin Subject: [PATCH 5.13 051/300] crypto: ecc - handle unaligned input buffer in ecc_swap_digits Date: Mon, 13 Sep 2021 15:11:52 +0200 Message-Id: <20210913131111.079957249@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210913131109.253835823@linuxfoundation.org> References: <20210913131109.253835823@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mian Yousaf Kaukab [ Upstream commit 0469dede0eeeefe12a9a2fd76078f4a266513457 ] ecdsa_set_pub_key() makes an u64 pointer at 1 byte offset of the key. This results in an unaligned u64 pointer. This pointer is passed to ecc_swap_digits() which assumes natural alignment. This causes a kernel crash on an armv7 platform: [ 0.409022] Unhandled fault: alignment exception (0x001) at 0xc2a0a6a9 ... [ 0.416982] PC is at ecdsa_set_pub_key+0xdc/0x120 ... [ 0.491492] Backtrace: [ 0.492059] [] (ecdsa_set_pub_key) from [] (test_akcipher_one+0xf4/0x6c0) Handle unaligned input buffer in ecc_swap_digits() by replacing be64_to_cpu() to get_unaligned_be64(). Change type of in pointer to void to reflect it doesn’t necessarily need to be aligned. Fixes: 4e6602916bc6 ("crypto: ecdsa - Add support for ECDSA signature verification") Reported-by: Guillaume Gardet Suggested-by: Takashi Iwai Signed-off-by: Mian Yousaf Kaukab Tested-by: Stefan Berger Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- crypto/ecc.h | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/crypto/ecc.h b/crypto/ecc.h index a006132646a4..1350e8eb6ac2 100644 --- a/crypto/ecc.h +++ b/crypto/ecc.h @@ -27,6 +27,7 @@ #define _CRYPTO_ECC_H #include +#include /* One digit is u64 qword. */ #define ECC_CURVE_NIST_P192_DIGITS 3 @@ -46,13 +47,13 @@ * @out: Output array * @ndigits: Number of digits to copy */ -static inline void ecc_swap_digits(const u64 *in, u64 *out, unsigned int ndigits) +static inline void ecc_swap_digits(const void *in, u64 *out, unsigned int ndigits) { const __be64 *src = (__force __be64 *)in; int i; for (i = 0; i < ndigits; i++) - out[i] = be64_to_cpu(src[ndigits - 1 - i]); + out[i] = get_unaligned_be64(&src[ndigits - 1 - i]); } /** -- 2.30.2