diff options
author | Stephan Mueller <smueller@chronox.de> | 2017-11-10 07:20:55 -0500 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2017-11-24 00:23:39 -0500 |
commit | 7d2c3f54e6f646887d019faa45f35d6fe9fe82ce (patch) | |
tree | 216af0cc45030069ed6131e529e080718f9c57f7 /crypto/algif_aead.c | |
parent | 8e1fa89aa8bc2870009b4486644e4a58f2e2a4f5 (diff) |
crypto: af_alg - remove locking in async callback
The code paths protected by the socket-lock do not use or modify the
socket in a non-atomic fashion. The actions pertaining the socket do not
even need to be handled as an atomic operation. Thus, the socket-lock
can be safely ignored.
This fixes a bug regarding scheduling in atomic as the callback function
may be invoked in interrupt context.
In addition, the sock_hold is moved before the AIO encrypt/decrypt
operation to ensure that the socket is always present. This avoids a
tiny race window where the socket is unprotected and yet used by the AIO
operation.
Finally, the release of resources for a crypto operation is moved into a
common function of af_alg_free_resources.
Cc: <stable@vger.kernel.org>
Fixes: e870456d8e7c8 ("crypto: algif_skcipher - overhaul memory management")
Fixes: d887c52d6ae43 ("crypto: algif_aead - overhaul memory management")
Reported-by: Romain Izard <romain.izard.pro@gmail.com>
Signed-off-by: Stephan Mueller <smueller@chronox.de>
Tested-by: Romain Izard <romain.izard.pro@gmail.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/algif_aead.c')
-rw-r--r-- | crypto/algif_aead.c | 23 |
1 files changed, 12 insertions, 11 deletions
diff --git a/crypto/algif_aead.c b/crypto/algif_aead.c index e2068b78993c..805f485ddf1b 100644 --- a/crypto/algif_aead.c +++ b/crypto/algif_aead.c | |||
@@ -283,12 +283,23 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg, | |||
283 | 283 | ||
284 | if (msg->msg_iocb && !is_sync_kiocb(msg->msg_iocb)) { | 284 | if (msg->msg_iocb && !is_sync_kiocb(msg->msg_iocb)) { |
285 | /* AIO operation */ | 285 | /* AIO operation */ |
286 | sock_hold(sk); | ||
286 | areq->iocb = msg->msg_iocb; | 287 | areq->iocb = msg->msg_iocb; |
287 | aead_request_set_callback(&areq->cra_u.aead_req, | 288 | aead_request_set_callback(&areq->cra_u.aead_req, |
288 | CRYPTO_TFM_REQ_MAY_BACKLOG, | 289 | CRYPTO_TFM_REQ_MAY_BACKLOG, |
289 | af_alg_async_cb, areq); | 290 | af_alg_async_cb, areq); |
290 | err = ctx->enc ? crypto_aead_encrypt(&areq->cra_u.aead_req) : | 291 | err = ctx->enc ? crypto_aead_encrypt(&areq->cra_u.aead_req) : |
291 | crypto_aead_decrypt(&areq->cra_u.aead_req); | 292 | crypto_aead_decrypt(&areq->cra_u.aead_req); |
293 | |||
294 | /* AIO operation in progress */ | ||
295 | if (err == -EINPROGRESS || err == -EBUSY) { | ||
296 | /* Remember output size that will be generated. */ | ||
297 | areq->outlen = outlen; | ||
298 | |||
299 | return -EIOCBQUEUED; | ||
300 | } | ||
301 | |||
302 | sock_put(sk); | ||
292 | } else { | 303 | } else { |
293 | /* Synchronous operation */ | 304 | /* Synchronous operation */ |
294 | aead_request_set_callback(&areq->cra_u.aead_req, | 305 | aead_request_set_callback(&areq->cra_u.aead_req, |
@@ -300,19 +311,9 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg, | |||
300 | &ctx->wait); | 311 | &ctx->wait); |
301 | } | 312 | } |
302 | 313 | ||
303 | /* AIO operation in progress */ | ||
304 | if (err == -EINPROGRESS) { | ||
305 | sock_hold(sk); | ||
306 | |||
307 | /* Remember output size that will be generated. */ | ||
308 | areq->outlen = outlen; | ||
309 | |||
310 | return -EIOCBQUEUED; | ||
311 | } | ||
312 | 314 | ||
313 | free: | 315 | free: |
314 | af_alg_free_areq_sgls(areq); | 316 | af_alg_free_resources(areq); |
315 | sock_kfree_s(sk, areq, areq->areqlen); | ||
316 | 317 | ||
317 | return err ? err : outlen; | 318 | return err ? err : outlen; |
318 | } | 319 | } |