Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp4064661imw; Tue, 12 Jul 2022 00:32:20 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tSa0PPEG5ZTdSudLLIGkGrl3x2gb1IWkztMsSKvkWPH2HeSnvaOVpskZwXCN3v7LU2PpFz X-Received: by 2002:a05:6402:371a:b0:43a:ece9:ab8e with SMTP id ek26-20020a056402371a00b0043aece9ab8emr2355729edb.126.1657611139903; Tue, 12 Jul 2022 00:32:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657611139; cv=none; d=google.com; s=arc-20160816; b=DbarFxgQtNSq3XHy55t73sGMoO1kM7FKi7ES4we5YzmYDlRdLIpURAH3CktaUmeVqx 7a7m5wTGL2k6mTgZn23YsNNUlk41juGRSO/0Y34QoJ6151B1YKv5qXKH7ahtxy09vJaM XpO694/CtEvJXvOBgeHvkLlMDYFFH/iBUhJZyEoxw+q7ZFZY0M/DZ4XNEbKucEkKZAyr qb8Ta5fqcYSGnPjeYtalmSLjjyBBCCwuiGRZgQFYdKPGvJE+i7WCjWnzEIsJ2S414mDA al8Ea4Yc4XJZO4O8Kma/os8p9wRliepeOR9kSymeAI7siOgkdgRg7SMr3BFrIdL3Xx7Y K2rA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=0R7r/Hy7Rt2GJS2qK/u8S5JpfDweTp9wwgN4rqgmhY4=; b=zzHa9XwjwurjnICxkKrKqbUPjZmOZ2ogQ8GEyVF0BlXFcio59GurMILzD7NzXjB7n6 aIKginQygAwGyvw6tBWaQXUAEvye6aO+rhShsbG+tC9Z2HwPzQ9e+J3Z9YtEER+s2qTC 9MaP1jFWHan1xDCQ9NTRdzI6JTIoG5tYr+Fpz2sqKZHyOIBj1wX9sRL81FVZUju7Foi5 nE+0oVRdN4NAQw5K2wFacM7KzJewRk1d34JU4PcHe1ATNS7XYcJ1Gh2BDQQUcAxHlDLa E8aw5KT6ZjEb1Hcnev9WgTi1A8XIcuZBjo3uwW9rEZ2uL0NkLT3QYClyqf0i68+UMQPl XxSw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b12-20020a056402278c00b00435c7624e9esi15331450ede.617.2022.07.12.00.31.47; Tue, 12 Jul 2022 00:32:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229731AbiGLH0p (ORCPT + 99 others); Tue, 12 Jul 2022 03:26:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34544 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229670AbiGLH0n (ORCPT ); Tue, 12 Jul 2022 03:26:43 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3A85B7AB1E for ; Tue, 12 Jul 2022 00:26:42 -0700 (PDT) Received: from dggpemm500024.china.huawei.com (unknown [172.30.72.54]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4LhsfV3YRyzVfkC; Tue, 12 Jul 2022 15:22:58 +0800 (CST) Received: from [10.67.110.173] (10.67.110.173) by dggpemm500024.china.huawei.com (7.185.36.203) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Tue, 12 Jul 2022 15:26:13 +0800 Message-ID: Date: Tue, 12 Jul 2022 15:26:02 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.8.0 Subject: Re: [PATCH] arm64/crypto: poly1305 fix a read out-of-bound Content-Language: en-US To: Eric Biggers CC: , , , , , References: <20220712033215.45960-1-guozihua@huawei.com> From: "Guozihua (Scott)" In-Reply-To: Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.67.110.173] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To dggpemm500024.china.huawei.com (7.185.36.203) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 2022/7/12 15:08, Eric Biggers wrote: > On Tue, Jul 12, 2022 at 11:32:15AM +0800, GUO Zihua wrote: >> A kasan error was reported during fuzzing: >> >> BUG: KASAN: slab-out-of-bounds in neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon] >> Read of size 4 at addr ffff0010e293f010 by task syz-executor.5/1646715 >> CPU: 4 PID: 1646715 Comm: syz-executor.5 Kdump: loaded Not tainted 5.10.0.aarch64 #1 >> Hardware name: Huawei TaiShan 2280 /BC11SPCD, BIOS 1.59 01/31/2019 >> Call trace: >> dump_backtrace+0x0/0x394 >> show_stack+0x34/0x4c arch/arm64/kernel/stacktrace.c:196 >> __dump_stack lib/dump_stack.c:77 [inline] >> dump_stack+0x158/0x1e4 lib/dump_stack.c:118 >> print_address_description.constprop.0+0x68/0x204 mm/kasan/report.c:387 >> __kasan_report+0xe0/0x140 mm/kasan/report.c:547 >> kasan_report+0x44/0xe0 mm/kasan/report.c:564 >> check_memory_region_inline mm/kasan/generic.c:187 [inline] >> __asan_load4+0x94/0xd0 mm/kasan/generic.c:252 >> neon_poly1305_blocks.constprop.0+0x1b4/0x250 [poly1305_neon] >> neon_poly1305_do_update+0x6c/0x15c [poly1305_neon] >> neon_poly1305_update+0x9c/0x1c4 [poly1305_neon] >> crypto_shash_update crypto/shash.c:131 [inline] >> shash_finup_unaligned+0x84/0x15c crypto/shash.c:179 >> crypto_shash_finup+0x8c/0x140 crypto/shash.c:193 >> shash_digest_unaligned+0xb8/0xe4 crypto/shash.c:201 >> crypto_shash_digest+0xa4/0xfc crypto/shash.c:217 >> crypto_shash_tfm_digest+0xb4/0x150 crypto/shash.c:229 >> essiv_skcipher_setkey+0x164/0x200 [essiv] >> crypto_skcipher_setkey+0xb0/0x160 crypto/skcipher.c:612 >> skcipher_setkey+0x3c/0x50 crypto/algif_skcipher.c:305 >> alg_setkey+0x114/0x2a0 crypto/af_alg.c:220 >> alg_setsockopt+0x19c/0x210 crypto/af_alg.c:253 >> __sys_setsockopt+0x190/0x2e0 net/socket.c:2123 >> __do_sys_setsockopt net/socket.c:2134 [inline] >> __se_sys_setsockopt net/socket.c:2131 [inline] >> __arm64_sys_setsockopt+0x78/0x94 net/socket.c:2131 >> __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline] >> invoke_syscall+0x64/0x100 arch/arm64/kernel/syscall.c:48 >> el0_svc_common.constprop.0+0x220/0x230 arch/arm64/kernel/syscall.c:155 >> do_el0_svc+0xb4/0xd4 arch/arm64/kernel/syscall.c:217 >> el0_svc+0x24/0x3c arch/arm64/kernel/entry-common.c:353 >> el0_sync_handler+0x160/0x164 arch/arm64/kernel/entry-common.c:369 >> el0_sync+0x160/0x180 arch/arm64/kernel/entry.S:683 >> >> This error can be reproduced by the following code compiled as ko on a >> system with kasan enabled: >> >> char test_data[] = "\x00\x01\x02\x03\x04\x05\x06\x07" >> "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f" >> "\x10\x11\x12\x13\x14\x15\x16\x17" >> "\x18\x19\x1a\x1b\x1c\x1d\x1e"; >> >> int init(void) >> { >> struct crypto_shash *tfm = NULL; >> struct shash_desc *desc = NULL; >> char *data = NULL; >> >> tfm = crypto_alloc_shash("poly1305", 0, 0); >> desc = kmalloc(sizeof(*desc) + crypto_shash_descsize(tfm), GFP_KERNEL); >> desc->tfm = tfm; >> >> data = kmalloc(POLY1305_KEY_SIZE - 1, GFP_KERNEL); >> memcpy(data, test_data, POLY1305_KEY_SIZE - 1); >> crypto_shash_update(desc, data, POLY1305_KEY_SIZE - 1); >> crypto_shash_final(desc, data); >> kfree(data); >> return 0; >> } >> >> void deinit(void) >> { >> } >> >> module_init(init) >> module_exit(deinit) >> MODULE_LICENSE("GPL"); >> >> The root cause of the bug sits in neon_poly1305_blocks. The logic >> neon_poly1305_blocks() performed is that if it was called with both s[] >> and r[] uninitialized, it will first try to initialize them with the >> data from the first "block" that it believed to be 32 bytes in length. >> First 16 bytes are used as the key and the next 16 bytes for s[]. This >> would lead to the aforementioned read out-of-bound. However, after >> calling poly1305_init_arch(), only 16 bytes were deducted from the input >> and s[] is initialized yet again with the following 16 bytes. The second >> initialization of s[] is certainly redundent which indicates that the >> first initialization should be for r[] only. >> >> This patch fixes the issue by calling poly1305_init_arm64() instead of >> poly1305_init_arch(). This is also the implementation for the same >> algorithm on arm platform. >> >> Signed-off-by: GUO Zihua > > Is the special reproducer really needed? I'd expect this to be reproduced by > the existing crypto self-tests just by booting a kernel built with both > CONFIG_KASAN=y and CONFIG_CRYPTO_MANAGER_EXTRA_TESTS=y. > > Also, despite the verbosity of the commit message, it doesn't include the two > things that really matter, which are a Fixes tag and Cc stable. > > - Eric > . Hi Eric, I'll give it a try and post a v2 patch. Thanks! -- Best GUO Zihua