Received: by 2002:a05:7412:8521:b0:e2:908c:2ebd with SMTP id t33csp2557632rdf; Mon, 6 Nov 2023 19:37:12 -0800 (PST) X-Google-Smtp-Source: AGHT+IFxbAv4Fubva+cV6d7xwyZwgPdKlXFd7+LYZUj3dInWOaUbaO7aiY1ZDnU4xe2Fy13ylEuu X-Received: by 2002:a05:6870:f298:b0:1e9:da9a:f2d6 with SMTP id u24-20020a056870f29800b001e9da9af2d6mr1739271oap.40.1699328232119; Mon, 06 Nov 2023 19:37:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1699328232; cv=none; d=google.com; s=arc-20160816; b=cM+hDa/AxzOWfTNpIAHPa2fLvy0rubyML81rrNgJTgKAClY823/Q0hc4s666GyHyQs 9V1moK6BeBudnE4Uz0k56R3bCr9gisUn/wlwCTrnJSWkCwh2oUEXklvN92uM8yF1dcIh TgeBwvIhG1gCrNbtvDPv0AjJR8eIRlkD81TTHhg9XWnQlzySJuPVKemJ55b1wGz0uYBD aCHqdTQFRzl88IoLlN96MhfeTqiHeePzaYG7YwYuBi/htg1SgVt4YZixWqur4U4JbzlS CeMYC9EbzNSaM+pTPCar6A8qrew/+Ebs+PX4YNtyVPS9XiP2FVBR/Vi5Vdas+nSX2uv6 tR/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=QoSk3SOOvDBa3euJing900HxXHvLE/KoB1w8uismMdg=; fh=TcWvJULIUnOmiN/X5n1bSbxZd2tloFCyx4Yn/X08+Qs=; b=fuXwPhyBV5+rYF9Gr1CFIBu56hNj64C2QetmzJSnjjNJNPgH/wpmVPbzDUxEFwhyPa 5vGgUBkG+lQcw+E58K3du9cioe28kmy9zZLdhwfMhnN941UxDBG8y3Zt9ZHhSzEaUWP3 g+0NgPCXo9WeSpl3fFNMjRh+jhMdmvhREdFOpdgsjB70ZteizAaecxL0uUBxfLg196bO oiLJGT3N4NUUkkzgl0f7+NSoKcXJGCmU2vz5urkvwp18Nl/A8QTDNjPLdwhWcOB6eW/9 3Gv8RJqpJwrRh9EI31f4ZEMzGEfKJfpymhwuIooKDUWRjBqYKsPZzoT+TZcJJH8XkSjA h0LQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=J+3VVanl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id w16-20020a63d750000000b00578bea3c10esi1005919pgi.756.2023.11.06.19.37.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 Nov 2023 19:37:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=J+3VVanl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 6972780BB22D; Mon, 6 Nov 2023 19:37:09 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233287AbjKGDhA (ORCPT + 99 others); Mon, 6 Nov 2023 22:37:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55710 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230248AbjKGDg7 (ORCPT ); Mon, 6 Nov 2023 22:36:59 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2024A10C for ; Mon, 6 Nov 2023 19:36:57 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4D9E5C433C8; Tue, 7 Nov 2023 03:36:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1699328216; bh=59DDA5/X+gHR+FD5lsDMEoEPfq9TmWUwF/QRhzLwqpk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=J+3VVanlFVCYp6RM8U+gyTEsXBho0Ya5epT6rMWvCFFDbxH+NPUZOLCqxafKTziIc j4v5S+arn3Kcbgp62tk9+EAMhp5WJ0mGKJmJspg+ILijVSHPYP52v6Z42XbUHoND/O acSFgiL2cp2z6dvGXkNZg8Mf59as3C68VccaxwOulBM9pw6Z78Gb8jJSsVm/rksHTg hSWp1fW2Xih+m41jDsvLnF3SfATDy2kTl9N9udWF62OszZw0yyBQOgaqKoTwQAIUuP 2zqIybdk8JHAkITSys6am7JNgV+0zQ3dGki33rne2JW6780WrsZ9GVYdl2IU0/Mi/G yo2Vc1wKwNlEw== Date: Mon, 6 Nov 2023 19:36:54 -0800 From: Eric Biggers To: Dmitry Safonov Cc: Herbert Xu , linux-kernel@vger.kernel.org, David Ahern , "David S. Miller" , Dmitry Safonov <0x7f454c46@gmail.com>, Eric Dumazet , Francesco Ruggeri , Jakub Kicinski , Paolo Abeni , Salam Noureddine , netdev@vger.kernel.org, linux-crypto@vger.kernel.org Subject: Re: [PATCH] crypto: ahash - Set using_shash for cloned ahash wrapper over shash Message-ID: <20231107033654.GA938@sol.localdomain> References: <20231107023717.820093-1-dima@arista.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231107023717.820093-1-dima@arista.com> X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Mon, 06 Nov 2023 19:37:09 -0800 (PST) On Tue, Nov 07, 2023 at 02:37:17AM +0000, Dmitry Safonov wrote: > The cloned child of ahash that uses shash under the hood should use > shash helpers (like crypto_shash_setkey()). > > The following panic may be observed on TCP-AO selftests: > > > ================================================================== > > BUG: KASAN: wild-memory-access in crypto_mod_get+0x1b/0x60 > > Write of size 4 at addr 5d5be0ff5c415e14 by task connect_ipv4/1397 > > > > CPU: 0 PID: 1397 Comm: connect_ipv4 Tainted: G W 6.6.0+ #47 > > Call Trace: > > > > dump_stack_lvl+0x46/0x70 > > kasan_report+0xc3/0xf0 > > kasan_check_range+0xec/0x190 > > crypto_mod_get+0x1b/0x60 > > crypto_spawn_alg+0x53/0x140 > > crypto_spawn_tfm2+0x13/0x60 > > hmac_init_tfm+0x25/0x60 > > crypto_ahash_setkey+0x8b/0x100 > > tcp_ao_add_cmd+0xe7a/0x1120 > > do_tcp_setsockopt+0x5ed/0x12a0 > > do_sock_setsockopt+0x82/0x100 > > __sys_setsockopt+0xe9/0x160 > > __x64_sys_setsockopt+0x60/0x70 > > do_syscall_64+0x3c/0xe0 > > entry_SYSCALL_64_after_hwframe+0x46/0x4e > > ================================================================== > > general protection fault, probably for non-canonical address 0x5d5be0ff5c415e14: 0000 [#1] PREEMPT SMP KASAN > > CPU: 0 PID: 1397 Comm: connect_ipv4 Tainted: G B W 6.6.0+ #47 > > Call Trace: > > > > ? die_addr+0x3c/0xa0 > > ? exc_general_protection+0x144/0x210 > > ? asm_exc_general_protection+0x22/0x30 > > ? add_taint+0x26/0x90 > > ? crypto_mod_get+0x20/0x60 > > ? crypto_mod_get+0x1b/0x60 > > ? ahash_def_finup_done1+0x58/0x80 > > crypto_spawn_alg+0x53/0x140 > > crypto_spawn_tfm2+0x13/0x60 > > hmac_init_tfm+0x25/0x60 > > crypto_ahash_setkey+0x8b/0x100 > > tcp_ao_add_cmd+0xe7a/0x1120 > > do_tcp_setsockopt+0x5ed/0x12a0 > > do_sock_setsockopt+0x82/0x100 > > __sys_setsockopt+0xe9/0x160 > > __x64_sys_setsockopt+0x60/0x70 > > do_syscall_64+0x3c/0xe0 > > entry_SYSCALL_64_after_hwframe+0x46/0x4e > > > > RIP: 0010:crypto_mod_get+0x20/0x60 > > Make sure that the child/clone has using_shash set when parent is > an shash user. > > Fixes: 2f1f34c1bf7b ("crypto: ahash - optimize performance when wrapping shash") > Cc: David Ahern > Cc: "David S. Miller" > Cc: Dmitry Safonov <0x7f454c46@gmail.com> > Cc: Eric Biggers > Cc: Eric Dumazet > Cc: Francesco Ruggeri > To: Herbert Xu > Cc: Jakub Kicinski > Cc: Paolo Abeni > Cc: Salam Noureddine > Cc: netdev@vger.kernel.org > Cc: linux-crypto@vger.kernel.org > Cc: linux-kernel@vger.kernel.org > Signed-off-by: Dmitry Safonov > --- > crypto/ahash.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/crypto/ahash.c b/crypto/ahash.c > index deee55f939dc..80c3e5354711 100644 > --- a/crypto/ahash.c > +++ b/crypto/ahash.c > @@ -651,6 +651,7 @@ struct crypto_ahash *crypto_clone_ahash(struct crypto_ahash *hash) > err = PTR_ERR(shash); > goto out_free_nhash; > } > + nhash->using_shash = true; > *nctx = shash; > return nhash; > } > > base-commit: be3ca57cfb777ad820c6659d52e60bbdd36bf5ff Thanks: Reviewed-by: Eric Biggers Note that this bug would have been prevented if crypto_clone_*() were covered by the crypto self-tests. - Eric