From: David Laight <david.laight.linux@gmail.com>
To: Lukas Wunner <lukas@wunner.de>
Cc: Anastasia Tishchenko <sv3iry@gmail.com>,
Ignat Korchagin <ignat@linux.win>,
Stefan Berger <stefanb@linux.ibm.com>,
Herbert Xu <herbert@gondor.apana.org.au>,
"David S . Miller" <davem@davemloft.net>,
linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH] crypto : ecc - Fix carry overflow in vli multiplication
Date: Tue, 12 May 2026 16:27:26 +0100 [thread overview]
Message-ID: <20260512162726.5a7a1b52@pumpkin> (raw)
In-Reply-To: <agMvm_bA-OcDWhbc@wunner.de>
On Tue, 12 May 2026 15:48:11 +0200
Lukas Wunner <lukas@wunner.de> wrote:
> On Fri, May 08, 2026 at 02:48:44PM +0300, Anastasia Tishchenko wrote:
> > The carry flag calculation fails when r01.m_high is saturated
> > (0xFFFFFFFFFFFFFFFF) and addition of lower bits overflows.
> >
> > The condition (r01.m_high < product.m_high) doesn't handle the case
> > where r01.m_high == product.m_high and an additional carry exists
> > from lower-bit overflow.
> >
> > Add proper handling for this boundary by accounting for the carry
> > from the lower addition.
> [...]
> > +++ b/crypto/ecc.c
> > @@ -427,7 +427,10 @@ static void vli_mult(u64 *result, const u64 *left, const u64 *right,
> > product = mul_64_64(left[i], right[k - i]);
> >
> > r01 = add_128_128(r01, product);
> > - r2 += (r01.m_high < product.m_high);
> > + if (r01.m_high != product.m_high)
> > + r2 += (r01.m_high < product.m_high);
> > + else
> > + r2 += (r01.m_low < product.m_low);
> > }
> >
> > result[k] = r01.m_low;
>
> ICYMI, sashiko's AI-generated review alleges that the if-else condition
> may cause a timing side channel vis-à-vis binary arithmetic:
>
> https://sashiko.dev/#/patchset/20260508114844.29694-1-sv3iry%40gmail.com
>
> You may want to address this if/when respinning your patch. If you do,
> a code comment is probably merited to explain this subtlety.
Something like:
r2 += (r01.m_high < product.m_high);
r2 += (r01.m_high == product.m_high) & (r01.m_low < product.m_low);
would be constant time - but the compiler is very unlikely to generate
the object code you want on all (any?) architectures.
On x86 you want something like (pardon the pigeon assembler):
xor %rax,%rax
cmp r01.m_high, product.m_high
setc %al
lea r2, (r2, %rax)
sete %al
cmp r01.m_low, product.m_low
cmovnc %al, %ah
add r2, %rax
but I bet (two beers) you can't get it.
-- David
>
> Thanks,
>
> Lukas
>
next prev parent reply other threads:[~2026-05-12 15:27 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-05-08 11:48 [PATCH] crypto : ecc - Fix carry overflow in vli multiplication Anastasia Tishchenko
2026-05-08 14:36 ` Stefan Berger
2026-05-11 5:30 ` Lukas Wunner
2026-05-12 13:48 ` Lukas Wunner
2026-05-12 15:27 ` David Laight [this message]
[not found] ` <CAMtNSrhkfsGL04DtOb9M9fijHK=Xy0D-pBahiCqV+zPuJyRSLw@mail.gmail.com>
2026-05-13 8:32 ` Lukas Wunner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260512162726.5a7a1b52@pumpkin \
--to=david.laight.linux@gmail.com \
--cc=davem@davemloft.net \
--cc=herbert@gondor.apana.org.au \
--cc=ignat@linux.win \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=lukas@wunner.de \
--cc=stefanb@linux.ibm.com \
--cc=sv3iry@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.