Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp2514107rwi; Fri, 21 Oct 2022 04:54:42 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6bok6AJyC0F/LyWvsaxGUJR67DCkxkL753ikiFoU0IdoxL+QY9jzSZRY46dMAfFPk+KUfA X-Received: by 2002:a17:903:246:b0:179:b6d0:f8fd with SMTP id j6-20020a170903024600b00179b6d0f8fdmr19000407plh.124.1666353282681; Fri, 21 Oct 2022 04:54:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666353282; cv=none; d=google.com; s=arc-20160816; b=lUK3Onpczvb3CQ9yW4YPP5iPcdYdHl1mKKBWFic/BIpEFJM+BUkFg6e6+SLTeqT7sO 84XhE+/uKLm1mStBY6pAO04unoa0IiCDYFlPib/d7946XB7QvrO1plrfdh7s1c4icpBg 4IB6GH6QTlPEpVpVOd/xLfTRv6tyfs17epACI3G8nKneCObz7tsDGspppxqxc7jxahZZ fGZ1Yyn8iKkzIwtwBJlfNW864f3U3gBww0ntJZIkJPBw2PtNzj5EAiC/X4sTah+5YTgY 1/ObgpSg1IOccTu/8a5RkpwwqJ2W3BtuWulRvXuhGMWyJkWClCAudmUdWc8mtpciU/Z0 VV2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=59wUIvb73kBbqkUqCCcJp74zU5Ca5FYJAZhLpKiiRzo=; b=iC3Se1oGBfQyG7ApSqrjp0lgo4O3CzTMBELAfZkbOWXp3KVpdQwqHFDy0kad/WxUH6 O+/Fe3tIFM809WmwMtXi+bwIYX2rQvbwqDKb0s4sJEsEaayuiQNx01uaNOfZf0cMsXDX 5nEqE1Uh+7y0cOqLNf+O3g/IZqAEuQwlVF1qNL0OS1xgRMn1YnlH72I9rL2NnRUaKpyc ZBeSkBBpI/xkZPYnV+4oTcZN7pnqEvRrHaJzJW4YefP5jl6195Omwn56A3c1J26EG+zT l+EkEWojgX9UmCRwO7c88Kg3jG+2wwt3r5TPrLFUHSTPpLsJruRlSMh0xaqufK+l1FOT eL6Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y9-20020a655b49000000b00412607fea43si24409101pgr.617.2022.10.21.04.54.26; Fri, 21 Oct 2022 04:54:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230009AbiJULkH (ORCPT + 99 others); Fri, 21 Oct 2022 07:40:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60626 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230156AbiJULkG (ORCPT ); Fri, 21 Oct 2022 07:40:06 -0400 Received: from formenos.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 641E47B798; Fri, 21 Oct 2022 04:39:56 -0700 (PDT) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1olqMc-004e0b-3C; Fri, 21 Oct 2022 19:39:35 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Fri, 21 Oct 2022 19:39:34 +0800 Date: Fri, 21 Oct 2022 19:39:34 +0800 From: Herbert Xu To: Nathan Huckleberry Cc: ebiggers@kernel.org, ardb@kernel.org, bgoncalv@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, davem@davemloft.net, hpa@zytor.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, mingo@redhat.com, tglx@linutronix.de, x86@kernel.org Subject: Re: [PATCH v3] crypto: x86/polyval - Fix crashes when keys are not 16-byte aligned Message-ID: References: <20221018230412.886349-1-nhuck@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221018230412.886349-1-nhuck@google.com> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Oct 18, 2022 at 04:04:12PM -0700, Nathan Huckleberry wrote: > crypto_tfm::__crt_ctx is not guaranteed to be 16-byte aligned on x86-64. > This causes crashes due to movaps instructions in clmul_polyval_update. > > Add logic to align polyval_tfm_ctx to 16 bytes. > > Fixes: 34f7f6c30112 ("crypto: x86/polyval - Add PCLMULQDQ accelerated implementation of POLYVAL") > Reported-by: Bruno Goncalves > Signed-off-by: Nathan Huckleberry > --- > arch/x86/crypto/polyval-clmulni_glue.c | 19 ++++++++++++++----- > 1 file changed, 14 insertions(+), 5 deletions(-) Patch applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt