Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp4055061imw; Tue, 12 Jul 2022 00:13:37 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tf3ET2xniswQ0QztGFNwjv7DaQia6+HIPgEGJjv5hsbGcLOmB7ZT7Rsmde1dIQqK09/WrG X-Received: by 2002:a65:6e8b:0:b0:416:2150:967f with SMTP id bm11-20020a656e8b000000b004162150967fmr4282720pgb.547.1657610017754; Tue, 12 Jul 2022 00:13:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657610017; cv=none; d=google.com; s=arc-20160816; b=ZZmYi7MhU+3eL2ce4DBxsTPwBJQBfXkEIFZi+WpvrQo9maZR6Wfj4YlBXchSsRYeQ/ 05Z65gO9mFaF1qexMJEgvB1zUcXQGoznp23xoLKUzCWryCuKOTlBiJDuaqt6+FU0ikos hb54Y9G7LY5nc9GhuS8AS4Qwk7C+qjV8e5huaVFgj8mT1nwIbsLHVGLdz9Jkxx2xDVYK vKe1ibAT0oO6kqb3ZifI1SG4E8q9l+C9Zby+8wGDx8FRBd85sNouMIYVyRX53i+R9xD2 ltM8e1maWfz3Xf/cyvs8LHZDblhdzuHqHsoz0cAHf0khCAPMGQshDTb6eD3NFdvLyu1h rAbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=RCFzmMSFOX20cMtvDKdQLMoAbc+mXW+JCJpaiJMaj+E=; b=fD5vTOij+74vsOsWLWP8HQSrLZiR5d5Qyn54mt/GDDNTesnHf1PYgkCYqPZwEtNMZt HpDDXUTfKqFLlPTgiqveQjSVGbXrv6t3GPaaaZy8ZO134JEjq4wxMG2qUK+/Z9c/lt+M 9S1jYpRaeY/hlWZc/tAz1dnArd/+gmqZ1cduqWOZimRhx7odrTn4jya/SfyuXBPNUZup lrfYE0PZSILp4fJvj9PknmhivhQQzNHNSS4RKFLB1AmEFMmdbfg//icEDrZNiGOr5sVC c82TpHQr9eub0ShF6e/x+32k5oCYyco/N5ngGIb4UpuqA3iqCFNPI0aFKdlDQmVBmWWA EKdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=elqDN8Lp; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u18-20020a17090abb1200b001ecd30c59c3si9416886pjr.85.2022.07.12.00.13.11; Tue, 12 Jul 2022 00:13:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=elqDN8Lp; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229476AbiGLHIp (ORCPT + 99 others); Tue, 12 Jul 2022 03:08:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49700 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230225AbiGLHIo (ORCPT ); Tue, 12 Jul 2022 03:08:44 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7D9641260B for ; Tue, 12 Jul 2022 00:08:39 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 49FD761481 for ; Tue, 12 Jul 2022 07:08:39 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7663AC3411E; Tue, 12 Jul 2022 07:08:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1657609718; bh=YZMa68X0/YMvd4KBg7/R7QIqZRO+cOlxW1GKsDYh4oU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=elqDN8Lp/455yeiaPGVQnyXE/V74g+03pX5igGomivf8AOcZgLXfQmQg2I2jnLrKt 1vQgVi9m/jnSx9pReWdDWqu+PKc40tYw3kqCXUzsGwtLprwNRoAKDcJjlsBbHgCDp5 pSfWuMhGmgdRcoYIO2zNwnSyVbiDUsrBuaDfTG86iB/kwZkUQDVMfYCYzrR0tZwWVI td7P//ZUmFgMRbS4oKY1jKOAfJ7Jx4B51UMxhGAW6YsZdOdw7Klunh77y6eWmXcuyt +fsFdaXpn0p0P633J/TYmLznI0CgT41IaCR0YmZK7n8+Uc2eLGM17EyaqsV8BHQqH3 ccnE8Jp/0o7mg== Date: Tue, 12 Jul 2022 00:08:36 -0700 From: Eric Biggers To: GUO Zihua Cc: linux-crypto@vger.kernel.org, linux-arm-kernel@lists.infradead.org, herbert@gondor.apana.org.au, davem@davemloft.net, catalin.marinas@arm.com, will@kernel.org Subject: Re: [PATCH] arm64/crypto: poly1305 fix a read out-of-bound Message-ID: References: <20220712033215.45960-1-guozihua@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220712033215.45960-1-guozihua@huawei.com> X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Jul 12, 2022 at 11:32:15AM +0800, GUO Zihua wrote: > A kasan error was reported during fuzzing: > > BUG: KASAN: slab-out-of-bounds in neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon] > Read of size 4 at addr ffff0010e293f010 by task syz-executor.5/1646715 > CPU: 4 PID: 1646715 Comm: syz-executor.5 Kdump: loaded Not tainted 5.10.0.aarch64 #1 > Hardware name: Huawei TaiShan 2280 /BC11SPCD, BIOS 1.59 01/31/2019 > Call trace: > dump_backtrace+0x0/0x394 > show_stack+0x34/0x4c arch/arm64/kernel/stacktrace.c:196 > __dump_stack lib/dump_stack.c:77 [inline] > dump_stack+0x158/0x1e4 lib/dump_stack.c:118 > print_address_description.constprop.0+0x68/0x204 mm/kasan/report.c:387 > __kasan_report+0xe0/0x140 mm/kasan/report.c:547 > kasan_report+0x44/0xe0 mm/kasan/report.c:564 > check_memory_region_inline mm/kasan/generic.c:187 [inline] > __asan_load4+0x94/0xd0 mm/kasan/generic.c:252 > neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon] > neon_poly1305_do_update+0x6c/0x15c [poly1305_neon] > neon_poly1305_update+0x9c/0x1c4 [poly1305_neon] > crypto_shash_update crypto/shash.c:131 [inline] > shash_finup_unaligned+0x84/0x15c crypto/shash.c:179 > crypto_shash_finup+0x8c/0x140 crypto/shash.c:193 > shash_digest_unaligned+0xb8/0xe4 crypto/shash.c:201 > crypto_shash_digest+0xa4/0xfc crypto/shash.c:217 > crypto_shash_tfm_digest+0xb4/0x150 crypto/shash.c:229 > essiv_skcipher_setkey+0x164/0x200 [essiv] > crypto_skcipher_setkey+0xb0/0x160 crypto/skcipher.c:612 > skcipher_setkey+0x3c/0x50 crypto/algif_skcipher.c:305 > alg_setkey+0x114/0x2a0 crypto/af_alg.c:220 > alg_setsockopt+0x19c/0x210 crypto/af_alg.c:253 > __sys_setsockopt+0x190/0x2e0 net/socket.c:2123 > __do_sys_setsockopt net/socket.c:2134 [inline] > __se_sys_setsockopt net/socket.c:2131 [inline] > __arm64_sys_setsockopt+0x78/0x94 net/socket.c:2131 > __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline] > invoke_syscall+0x64/0x100 arch/arm64/kernel/syscall.c:48 > el0_svc_common.constprop.0+0x220/0x230 arch/arm64/kernel/syscall.c:155 > do_el0_svc+0xb4/0xd4 arch/arm64/kernel/syscall.c:217 > el0_svc+0x24/0x3c arch/arm64/kernel/entry-common.c:353 > el0_sync_handler+0x160/0x164 arch/arm64/kernel/entry-common.c:369 > el0_sync+0x160/0x180 arch/arm64/kernel/entry.S:683 > > This error can be reproduced by the following code compiled as ko on a > system with kasan enabled: > > char test_data[] = "\x00\x01\x02\x03\x04\x05\x06\x07" > "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" > "\x10\x11\x12\x13\x14\x15\x16\x17" > "\x18\x19\x1a\x1b\x1c\x1d\x1e"; > > int init(void) > { > struct crypto_shash *tfm = NULL; > struct shash_desc *desc = NULL; > char *data = NULL; > > tfm = crypto_alloc_shash("poly1305", 0, 0); > desc = kmalloc(sizeof(*desc) + crypto_shash_descsize(tfm), GFP_KERNEL); > desc->tfm = tfm; > > data = kmalloc(POLY1305_KEY_SIZE - 1, GFP_KERNEL); > memcpy(data, test_data, POLY1305_KEY_SIZE - 1); > crypto_shash_update(desc, data, POLY1305_KEY_SIZE - 1); > crypto_shash_final(desc, data); > kfree(data); > return 0; > } > > void deinit(void) > { > } > > module_init(init) > module_exit(deinit) > MODULE_LICENSE("GPL"); > > The root cause of the bug sits in neon_poly1305_blocks. The logic > neon_poly1305_blocks() performed is that if it was called with both s[] > and r[] uninitialized, it will first try to initialize them with the > data from the first "block" that it believed to be 32 bytes in length. > First 16 bytes are used as the key and the next 16 bytes for s[]. This > would lead to the aforementioned read out-of-bound. However, after > calling poly1305_init_arch(), only 16 bytes were deducted from the input > and s[] is initialized yet again with the following 16 bytes. The second > initialization of s[] is certainly redundent which indicates that the > first initialization should be for r[] only. > > This patch fixes the issue by calling poly1305_init_arm64() instead of > poly1305_init_arch(). This is also the implementation for the same > algorithm on arm platform. > > Signed-off-by: GUO Zihua Is the special reproducer really needed? I'd expect this to be reproduced by the existing crypto self-tests just by booting a kernel built with both CONFIG_KASAN=y and CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=y. Also, despite the verbosity of the commit message, it doesn't include the two things that really matter, which are a Fixes tag and Cc stable. - Eric