Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp2566647ybv; Fri, 14 Feb 2020 22:15:12 -0800 (PST) X-Google-Smtp-Source: APXvYqw4XdokcBZr1Fb5tT8IC18vPyCjOKX6BWXEkq9UQf5kiC+XO9xOZJ1Zjf74UmNCNr2Px9xE X-Received: by 2002:a9d:6a53:: with SMTP id h19mr5205563otn.120.1581747312201; Fri, 14 Feb 2020 22:15:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581747312; cv=none; d=google.com; s=arc-20160816; b=pgstr4tD1grSlMRfMgXvDmd1phAIDkGxzVD75eE+jG9KCmReee/1WK9+IRhxJQNsb5 vM1l8/gs+th9qr7qHZvw1PNOU33myzg+Llc/rd0w7ZFZ5meELHxKwzQ73lCaOcU3CFzU MZEqpGChsdO8rNQ9elBFrb61qLaYgzONbvA78CZ/nFKGCPFI/81BqFA1sU665dP+2OIt loUTJjpB2K8Nq9MQPbkoTTatSNpaRxDXOZE4zdtpm2Ryd9GTbYGSbwiaAZKcTEhp29mE n/xLVglDtiE/f9Z8OateB5XBfj2BMgiZGTRDTP3AI+dj/AixfV7tq2PTK7gkXtm9Ioug QHLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition:mime-version :message-id:subject:cc:to:from:date; bh=UrtYb+9aaKpsAjYsjrPSJY6j5gJ48xMiPi/a4wv0jT8=; b=HZW/Rb5tadeyeBtLOhYpvpfxPu/OBJ2SzbNadZbwJwIKb+aUqAWtd0JGejWk7ZxhGM 1W65IpH+vhXqmNGrXGe6HS04eHrBdLc4CK73FdTewsCI79sczNTe5sQuWBZ07CLe0OSC dm5R3hasdl0XNWiCQ3D1jaEBWf7f+pr6cOS+3txsVgFHXCTR8wypP/jSCYQ0wE8fsYVb TOnhtbtkfUxVPViMuPUMWuf4ilvAyEB3MrvuwK0jTQ6keRayDEFsRagvKfCdF//AApLm 8qadMuIst5wFbQ3gxsFNW6k2mx1bISJIjPpPvg+iFI6p2gNiyDJUexEt6OVWyiTEOYZh hFWA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u16si3923481oic.66.2020.02.14.22.14.44; Fri, 14 Feb 2020 22:15:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725953AbgBOGOT (ORCPT + 99 others); Sat, 15 Feb 2020 01:14:19 -0500 Received: from zeniv.linux.org.uk ([195.92.253.2]:56382 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725795AbgBOGOS (ORCPT ); Sat, 15 Feb 2020 01:14:18 -0500 Received: from viro by ZenIV.linux.org.uk with local (Exim 4.92.3 #3 (Red Hat Linux)) id 1j2qiW-00D3pz-L1; Sat, 15 Feb 2020 06:14:16 +0000 Date: Sat, 15 Feb 2020 06:14:16 +0000 From: Al Viro To: Atul Gupta Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC][PATCH] almost certain bug in drivers/crypto/chelsio/chcr_algo.c:create_authenc_wr() Message-ID: <20200215061416.GZ23230@ZenIV.linux.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org kctx_len = (ntohl(KEY_CONTEXT_CTX_LEN_V(aeadctx->key_ctx_hdr)) << 4) - sizeof(chcr_req->key_ctx); can't possibly be endian-safe. Look: ->key_ctx_hdr is __be32. And KEY_CONTEXT_CTX_LEN_V is "shift up by 24 bits". On little-endian hosts it sees b0 b1 b2 b3 in memory, inteprets that into b0 + (b1 << 8) + (b2 << 16) + (b3 << 24), shifts up by 24, resulting in b0 << 24, does ntohl (byteswap on l-e), gets b0 and shifts that up by 4. So we get b0 * 16 - sizeof(...). Sounds reasonable, but on b-e we get b3 + (b2 << 8) + (b1 << 16) + (b0 << 24), shift up by 24, yielding b3 << 24, do ntohl (no-op on b-e) and then shift up by 4. Resulting in b3 << 28 - sizeof(...), i.e. slightly under b3 * 256M. Then we increase it some more and pass to alloc_skb() as size. Somehow I doubt that we really want a quarter-gigabyte skb allocation here... Note that when you are building those values in #define FILL_KEY_CTX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ htonl(KEY_CONTEXT_VALID_V(1) | \ KEY_CONTEXT_CK_SIZE_V((ck_size)) | \ KEY_CONTEXT_MK_SIZE_V(mk_size) | \ KEY_CONTEXT_DUAL_CK_V((d_ck)) | \ KEY_CONTEXT_OPAD_PRESENT_V((opad)) | \ KEY_CONTEXT_SALT_PRESENT_V(1) | \ KEY_CONTEXT_CTX_LEN_V((ctx_len))) ctx_len ends up in the first octet (i.e. b0 in the above), which matches the current behaviour on l-e. If that's the intent, this thing should've been kctx_len = (KEY_CONTEXT_CTX_LEN_G(ntohl(aeadctx->key_ctx_hdr)) << 4) - sizeof(chcr_req->key_ctx); instead - fetch after ntohl() we get (b0 << 24) + (b1 << 16) + (b2 << 8) + b3, shift it down by 24 (b0), resuling in b0 * 16 - sizeof(...) both on l-e and on b-e. PS: when sparse warns you about endianness problems, it might be worth checking if there really is something wrong. And I don't mean "slap __force cast on it"... Signed-off-by: Al Viro --- diff -urN a/drivers/crypto/chelsio/chcr_algo.c b/drivers/crypto/chelsio/chcr_algo.c --- a/drivers/crypto/chelsio/chcr_algo.c +++ b/drivers/crypto/chelsio/chcr_algo.c @@ -2351,7 +2351,7 @@ static struct sk_buff *create_authenc_wr(struct aead_request *req, snents = sg_nents_xlen(req->src, req->assoclen + req->cryptlen, CHCR_SRC_SG_SIZE, 0); dst_size = get_space_for_phys_dsgl(dnents); - kctx_len = (ntohl(KEY_CONTEXT_CTX_LEN_V(aeadctx->key_ctx_hdr)) << 4) + kctx_len = (KEY_CONTEXT_CTX_LEN_G(ntohl(aeadctx->key_ctx_hdr)) << 4) - sizeof(chcr_req->key_ctx); transhdr_len = CIPHER_TRANSHDR_SIZE(kctx_len, dst_size); reqctx->imm = (transhdr_len + req->assoclen + req->cryptlen) <