diff options
author | Stephan Mueller <smueller@chronox.de> | 2017-11-10 07:20:55 -0500 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2017-11-24 00:23:39 -0500 |
commit | 7d2c3f54e6f646887d019faa45f35d6fe9fe82ce (patch) | |
tree | 216af0cc45030069ed6131e529e080718f9c57f7 | |
parent | 8e1fa89aa8bc2870009b4486644e4a58f2e2a4f5 (diff) |
crypto: af_alg - remove locking in async callback
The code paths protected by the socket-lock do not use or modify the
socket in a non-atomic fashion. The actions pertaining the socket do not
even need to be handled as an atomic operation. Thus, the socket-lock
can be safely ignored.
This fixes a bug regarding scheduling in atomic as the callback function
may be invoked in interrupt context.
In addition, the sock_hold is moved before the AIO encrypt/decrypt
operation to ensure that the socket is always present. This avoids a
tiny race window where the socket is unprotected and yet used by the AIO
operation.
Finally, the release of resources for a crypto operation is moved into a
common function of af_alg_free_resources.
Cc: <stable@vger.kernel.org>
Fixes: e870456d8e7c8 ("crypto: algif_skcipher - overhaul memory management")
Fixes: d887c52d6ae43 ("crypto: algif_aead - overhaul memory management")
Reported-by: Romain Izard <romain.izard.pro@gmail.com>
Signed-off-by: Stephan Mueller <smueller@chronox.de>
Tested-by: Romain Izard <romain.izard.pro@gmail.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r-- | crypto/af_alg.c | 21 | ||||
-rw-r--r-- | crypto/algif_aead.c | 23 | ||||
-rw-r--r-- | crypto/algif_skcipher.c | 23 | ||||
-rw-r--r-- | include/crypto/if_alg.h | 1 |
4 files changed, 39 insertions, 29 deletions
diff --git a/crypto/af_alg.c b/crypto/af_alg.c index 85cea9de324a..358749c38894 100644 --- a/crypto/af_alg.c +++ b/crypto/af_alg.c | |||
@@ -1021,6 +1021,18 @@ unlock: | |||
1021 | EXPORT_SYMBOL_GPL(af_alg_sendpage); | 1021 | EXPORT_SYMBOL_GPL(af_alg_sendpage); |
1022 | 1022 | ||
1023 | /** | 1023 | /** |
1024 | * af_alg_free_resources - release resources required for crypto request | ||
1025 | */ | ||
1026 | void af_alg_free_resources(struct af_alg_async_req *areq) | ||
1027 | { | ||
1028 | struct sock *sk = areq->sk; | ||
1029 | |||
1030 | af_alg_free_areq_sgls(areq); | ||
1031 | sock_kfree_s(sk, areq, areq->areqlen); | ||
1032 | } | ||
1033 | EXPORT_SYMBOL_GPL(af_alg_free_resources); | ||
1034 | |||
1035 | /** | ||
1024 | * af_alg_async_cb - AIO callback handler | 1036 | * af_alg_async_cb - AIO callback handler |
1025 | * | 1037 | * |
1026 | * This handler cleans up the struct af_alg_async_req upon completion of the | 1038 | * This handler cleans up the struct af_alg_async_req upon completion of the |
@@ -1036,18 +1048,13 @@ void af_alg_async_cb(struct crypto_async_request *_req, int err) | |||
1036 | struct kiocb *iocb = areq->iocb; | 1048 | struct kiocb *iocb = areq->iocb; |
1037 | unsigned int resultlen; | 1049 | unsigned int resultlen; |
1038 | 1050 | ||
1039 | lock_sock(sk); | ||
1040 | |||
1041 | /* Buffer size written by crypto operation. */ | 1051 | /* Buffer size written by crypto operation. */ |
1042 | resultlen = areq->outlen; | 1052 | resultlen = areq->outlen; |
1043 | 1053 | ||
1044 | af_alg_free_areq_sgls(areq); | 1054 | af_alg_free_resources(areq); |
1045 | sock_kfree_s(sk, areq, areq->areqlen); | 1055 | sock_put(sk); |
1046 | __sock_put(sk); | ||
1047 | 1056 | ||
1048 | iocb->ki_complete(iocb, err ? err : resultlen, 0); | 1057 | iocb->ki_complete(iocb, err ? err : resultlen, 0); |
1049 | |||
1050 | release_sock(sk); | ||
1051 | } | 1058 | } |
1052 | EXPORT_SYMBOL_GPL(af_alg_async_cb); | 1059 | EXPORT_SYMBOL_GPL(af_alg_async_cb); |
1053 | 1060 | ||
diff --git a/crypto/algif_aead.c b/crypto/algif_aead.c index e2068b78993c..805f485ddf1b 100644 --- a/crypto/algif_aead.c +++ b/crypto/algif_aead.c | |||
@@ -283,12 +283,23 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg, | |||
283 | 283 | ||
284 | if (msg->msg_iocb && !is_sync_kiocb(msg->msg_iocb)) { | 284 | if (msg->msg_iocb && !is_sync_kiocb(msg->msg_iocb)) { |
285 | /* AIO operation */ | 285 | /* AIO operation */ |
286 | sock_hold(sk); | ||
286 | areq->iocb = msg->msg_iocb; | 287 | areq->iocb = msg->msg_iocb; |
287 | aead_request_set_callback(&areq->cra_u.aead_req, | 288 | aead_request_set_callback(&areq->cra_u.aead_req, |
288 | CRYPTO_TFM_REQ_MAY_BACKLOG, | 289 | CRYPTO_TFM_REQ_MAY_BACKLOG, |
289 | af_alg_async_cb, areq); | 290 | af_alg_async_cb, areq); |
290 | err = ctx->enc ? crypto_aead_encrypt(&areq->cra_u.aead_req) : | 291 | err = ctx->enc ? crypto_aead_encrypt(&areq->cra_u.aead_req) : |
291 | crypto_aead_decrypt(&areq->cra_u.aead_req); | 292 | crypto_aead_decrypt(&areq->cra_u.aead_req); |
293 | |||
294 | /* AIO operation in progress */ | ||
295 | if (err == -EINPROGRESS || err == -EBUSY) { | ||
296 | /* Remember output size that will be generated. */ | ||
297 | areq->outlen = outlen; | ||
298 | |||
299 | return -EIOCBQUEUED; | ||
300 | } | ||
301 | |||
302 | sock_put(sk); | ||
292 | } else { | 303 | } else { |
293 | /* Synchronous operation */ | 304 | /* Synchronous operation */ |
294 | aead_request_set_callback(&areq->cra_u.aead_req, | 305 | aead_request_set_callback(&areq->cra_u.aead_req, |
@@ -300,19 +311,9 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg, | |||
300 | &ctx->wait); | 311 | &ctx->wait); |
301 | } | 312 | } |
302 | 313 | ||
303 | /* AIO operation in progress */ | ||
304 | if (err == -EINPROGRESS) { | ||
305 | sock_hold(sk); | ||
306 | |||
307 | /* Remember output size that will be generated. */ | ||
308 | areq->outlen = outlen; | ||
309 | |||
310 | return -EIOCBQUEUED; | ||
311 | } | ||
312 | 314 | ||
313 | free: | 315 | free: |
314 | af_alg_free_areq_sgls(areq); | 316 | af_alg_free_resources(areq); |
315 | sock_kfree_s(sk, areq, areq->areqlen); | ||
316 | 317 | ||
317 | return err ? err : outlen; | 318 | return err ? err : outlen; |
318 | } | 319 | } |
diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c index 9954b078f0b9..30cff827dd8f 100644 --- a/crypto/algif_skcipher.c +++ b/crypto/algif_skcipher.c | |||
@@ -117,6 +117,7 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg, | |||
117 | 117 | ||
118 | if (msg->msg_iocb && !is_sync_kiocb(msg->msg_iocb)) { | 118 | if (msg->msg_iocb && !is_sync_kiocb(msg->msg_iocb)) { |
119 | /* AIO operation */ | 119 | /* AIO operation */ |
120 | sock_hold(sk); | ||
120 | areq->iocb = msg->msg_iocb; | 121 | areq->iocb = msg->msg_iocb; |
121 | skcipher_request_set_callback(&areq->cra_u.skcipher_req, | 122 | skcipher_request_set_callback(&areq->cra_u.skcipher_req, |
122 | CRYPTO_TFM_REQ_MAY_SLEEP, | 123 | CRYPTO_TFM_REQ_MAY_SLEEP, |
@@ -124,6 +125,16 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg, | |||
124 | err = ctx->enc ? | 125 | err = ctx->enc ? |
125 | crypto_skcipher_encrypt(&areq->cra_u.skcipher_req) : | 126 | crypto_skcipher_encrypt(&areq->cra_u.skcipher_req) : |
126 | crypto_skcipher_decrypt(&areq->cra_u.skcipher_req); | 127 | crypto_skcipher_decrypt(&areq->cra_u.skcipher_req); |
128 | |||
129 | /* AIO operation in progress */ | ||
130 | if (err == -EINPROGRESS || err == -EBUSY) { | ||
131 | /* Remember output size that will be generated. */ | ||
132 | areq->outlen = len; | ||
133 | |||
134 | return -EIOCBQUEUED; | ||
135 | } | ||
136 | |||
137 | sock_put(sk); | ||
127 | } else { | 138 | } else { |
128 | /* Synchronous operation */ | 139 | /* Synchronous operation */ |
129 | skcipher_request_set_callback(&areq->cra_u.skcipher_req, | 140 | skcipher_request_set_callback(&areq->cra_u.skcipher_req, |
@@ -136,19 +147,9 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg, | |||
136 | &ctx->wait); | 147 | &ctx->wait); |
137 | } | 148 | } |
138 | 149 | ||
139 | /* AIO operation in progress */ | ||
140 | if (err == -EINPROGRESS) { | ||
141 | sock_hold(sk); | ||
142 | |||
143 | /* Remember output size that will be generated. */ | ||
144 | areq->outlen = len; | ||
145 | |||
146 | return -EIOCBQUEUED; | ||
147 | } | ||
148 | 150 | ||
149 | free: | 151 | free: |
150 | af_alg_free_areq_sgls(areq); | 152 | af_alg_free_resources(areq); |
151 | sock_kfree_s(sk, areq, areq->areqlen); | ||
152 | 153 | ||
153 | return err ? err : len; | 154 | return err ? err : len; |
154 | } | 155 | } |
diff --git a/include/crypto/if_alg.h b/include/crypto/if_alg.h index 6abf0a3604dc..38d9c5861ed8 100644 --- a/include/crypto/if_alg.h +++ b/include/crypto/if_alg.h | |||
@@ -242,6 +242,7 @@ int af_alg_sendmsg(struct socket *sock, struct msghdr *msg, size_t size, | |||
242 | unsigned int ivsize); | 242 | unsigned int ivsize); |
243 | ssize_t af_alg_sendpage(struct socket *sock, struct page *page, | 243 | ssize_t af_alg_sendpage(struct socket *sock, struct page *page, |
244 | int offset, size_t size, int flags); | 244 | int offset, size_t size, int flags); |
245 | void af_alg_free_resources(struct af_alg_async_req *areq); | ||
245 | void af_alg_async_cb(struct crypto_async_request *_req, int err); | 246 | void af_alg_async_cb(struct crypto_async_request *_req, int err); |
246 | unsigned int af_alg_poll(struct file *file, struct socket *sock, | 247 | unsigned int af_alg_poll(struct file *file, struct socket *sock, |
247 | poll_table *wait); | 248 | poll_table *wait); |