diff mbox series

lib: rsa: Fix unaligned 64-bit fdt accesses

Message ID bf67febf-ff82-dadc-32cd-ca5c26640c83@siemens.com
State New
Headers show
Series lib: rsa: Fix unaligned 64-bit fdt accesses | expand

Commit Message

Jan Kiszka May 6, 2020, 4:32 p.m. UTC
From: Jan Kiszka <jan.kiszka at siemens.com>

The fdt only provides 32-bit alignment of data. If the public_exponent
happens to be not 64-bit aligned, we can trigger an exception on certain
architectures. Seen on TI AM64x.

Note that the normal way of accessing such a number would be
fdtdec_get_number. However, this is not available for tools, and this
is one use case for lib/rsa.

Signed-off-by: Jan Kiszka <jan.kiszka at siemens.com>
---
 lib/rsa/rsa-mod-exp.c | 8 ++++++--
 1 file changed, 6 insertions(+), 2 deletions(-)

Comments

Tom Rini May 6, 2020, 8 p.m. UTC | #1
On Wed, May 06, 2020 at 06:32:03PM +0200, Jan Kiszka wrote:

> From: Jan Kiszka <jan.kiszka at siemens.com>
> 
> The fdt only provides 32-bit alignment of data. If the public_exponent
> happens to be not 64-bit aligned, we can trigger an exception on certain
> architectures. Seen on TI AM64x.
> 
> Note that the normal way of accessing such a number would be
> fdtdec_get_number. However, this is not available for tools, and this
> is one use case for lib/rsa.
> 
> Signed-off-by: Jan Kiszka <jan.kiszka at siemens.com>

This is the same as:
http://patchwork.ozlabs.org/project/uboot/patch/20200503112634.590399-1-heiko at sntech.de/
I think which I'm testing right now.  Can you please confirm and
tested-by?  Thanks!
Jan Kiszka May 7, 2020, 6:43 a.m. UTC | #2
On 06.05.20 22:00, Tom Rini wrote:
> On Wed, May 06, 2020 at 06:32:03PM +0200, Jan Kiszka wrote:
> 
>> From: Jan Kiszka <jan.kiszka at siemens.com>
>>
>> The fdt only provides 32-bit alignment of data. If the public_exponent
>> happens to be not 64-bit aligned, we can trigger an exception on certain
>> architectures. Seen on TI AM64x.
>>
>> Note that the normal way of accessing such a number would be
>> fdtdec_get_number. However, this is not available for tools, and this
>> is one use case for lib/rsa.
>>
>> Signed-off-by: Jan Kiszka <jan.kiszka at siemens.com>
> 
> This is the same as:
> http://patchwork.ozlabs.org/project/uboot/patch/20200503112634.590399-1-heiko at sntech.de/
> I think which I'm testing right now.  Can you please confirm and
> tested-by?  Thanks!
> 

Oh, I should monitor the list better (I'm lacking an nntp archive for 
it, like lore.kernel.org).

Heiko's looks nicer, will test.

Jan
diff mbox series

Patch

diff --git a/lib/rsa/rsa-mod-exp.c b/lib/rsa/rsa-mod-exp.c
index 420ab2eba0..4b9c4b1459 100644
--- a/lib/rsa/rsa-mod-exp.c
+++ b/lib/rsa/rsa-mod-exp.c
@@ -246,6 +246,11 @@  static void rsa_convert_big_endian(uint32_t *dst, const uint32_t *src, int len)
 		dst[i] = fdt32_to_cpu(src[len - 1 - i]);
 }
 
+static uint64_t fdt64_get(const uint32_t *data)
+{
+	return ((uint64_t)fdt32_to_cpu(data[0]) << 32) | fdt32_to_cpu(data[1]);
+}
+
 int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len,
 		struct key_prop *prop, uint8_t *out)
 {
@@ -262,8 +267,7 @@  int rsa_mod_exp_sw(const uint8_t *sig, uint32_t sig_len,
 	if (!prop->public_exponent)
 		key.exponent = RSA_DEFAULT_PUBEXP;
 	else
-		key.exponent =
-			fdt64_to_cpu(*((uint64_t *)(prop->public_exponent)));
+		key.exponent = fdt64_get(prop->public_exponent);
 
 	if (!key.len || !prop->modulus || !prop->rr) {
 		debug("%s: Missing RSA key info", __func__);