summaryrefslogtreecommitdiff
path: root/arch/arm64/crypto/poly1305-core.S_shipped
diff options
context:
space:
mode:
authorArd Biesheuvel <ardb@kernel.org>2020-10-27 00:00:27 +0100
committerHerbert Xu <herbert@gondor.apana.org.au>2020-11-06 14:29:11 +1100
commit519a0d7e495a6d3ce62594e485aea2a3a4a2ca0a (patch)
treed386150e9c60b6cee7b6f506cae01da5e38207c4 /arch/arm64/crypto/poly1305-core.S_shipped
parent92eb6c3060ebe3adf381fd9899451c5b047bb14d (diff)
crypto: arm64/poly1305-neon - reorder PAC authentication with SP update
PAC pointer authentication signs the return address against the value of the stack pointer, to prevent stack overrun exploits from corrupting the control flow. However, this requires that the AUTIASP is issued with SP holding the same value as it held when the PAC value was generated. The Poly1305 NEON code got this wrong, resulting in crashes on PAC capable hardware. Fixes: f569ca164751 ("crypto: arm64/poly1305 - incorporate OpenSSL/CRYPTOGAMS ...") Signed-off-by: Ard Biesheuvel <ardb@kernel.org> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'arch/arm64/crypto/poly1305-core.S_shipped')
-rw-r--r--arch/arm64/crypto/poly1305-core.S_shipped2
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/arm64/crypto/poly1305-core.S_shipped b/arch/arm64/crypto/poly1305-core.S_shipped
index 8d1c4e420ccd..fb2822abf63a 100644
--- a/arch/arm64/crypto/poly1305-core.S_shipped
+++ b/arch/arm64/crypto/poly1305-core.S_shipped
@@ -779,7 +779,6 @@ poly1305_blocks_neon:
ldp d14,d15,[sp,#64]
addp v21.2d,v21.2d,v21.2d
ldr x30,[sp,#8]
- .inst 0xd50323bf // autiasp
////////////////////////////////////////////////////////////////
// lazy reduction, but without narrowing
@@ -821,6 +820,7 @@ poly1305_blocks_neon:
str x4,[x0,#8] // set is_base2_26
ldr x29,[sp],#80
+ .inst 0xd50323bf // autiasp
ret
.size poly1305_blocks_neon,.-poly1305_blocks_neon