aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/af_alg.c
diff options
context:
space:
mode:
authorStephan Mueller <smueller@chronox.de>2017-11-10 07:20:55 -0500
committerHerbert Xu <herbert@gondor.apana.org.au>2017-11-24 00:23:39 -0500
commit7d2c3f54e6f646887d019faa45f35d6fe9fe82ce (patch)
tree216af0cc45030069ed6131e529e080718f9c57f7 /crypto/af_alg.c
parent8e1fa89aa8bc2870009b4486644e4a58f2e2a4f5 (diff)
crypto: af_alg - remove locking in async callback
The code paths protected by the socket-lock do not use or modify the socket in a non-atomic fashion. The actions pertaining the socket do not even need to be handled as an atomic operation. Thus, the socket-lock can be safely ignored. This fixes a bug regarding scheduling in atomic as the callback function may be invoked in interrupt context. In addition, the sock_hold is moved before the AIO encrypt/decrypt operation to ensure that the socket is always present. This avoids a tiny race window where the socket is unprotected and yet used by the AIO operation. Finally, the release of resources for a crypto operation is moved into a common function of af_alg_free_resources. Cc: <stable@vger.kernel.org> Fixes: e870456d8e7c8 ("crypto: algif_skcipher - overhaul memory management") Fixes: d887c52d6ae43 ("crypto: algif_aead - overhaul memory management") Reported-by: Romain Izard <romain.izard.pro@gmail.com> Signed-off-by: Stephan Mueller <smueller@chronox.de> Tested-by: Romain Izard <romain.izard.pro@gmail.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/af_alg.c')
-rw-r--r--crypto/af_alg.c21
1 files changed, 14 insertions, 7 deletions
diff --git a/crypto/af_alg.c b/crypto/af_alg.c
index 85cea9de324a..358749c38894 100644
--- a/crypto/af_alg.c
+++ b/crypto/af_alg.c
@@ -1021,6 +1021,18 @@ unlock:
1021EXPORT_SYMBOL_GPL(af_alg_sendpage); 1021EXPORT_SYMBOL_GPL(af_alg_sendpage);
1022 1022
1023/** 1023/**
1024 * af_alg_free_resources - release resources required for crypto request
1025 */
1026void af_alg_free_resources(struct af_alg_async_req *areq)
1027{
1028 struct sock *sk = areq->sk;
1029
1030 af_alg_free_areq_sgls(areq);
1031 sock_kfree_s(sk, areq, areq->areqlen);
1032}
1033EXPORT_SYMBOL_GPL(af_alg_free_resources);
1034
1035/**
1024 * af_alg_async_cb - AIO callback handler 1036 * af_alg_async_cb - AIO callback handler
1025 * 1037 *
1026 * This handler cleans up the struct af_alg_async_req upon completion of the 1038 * This handler cleans up the struct af_alg_async_req upon completion of the
@@ -1036,18 +1048,13 @@ void af_alg_async_cb(struct crypto_async_request *_req, int err)
1036 struct kiocb *iocb = areq->iocb; 1048 struct kiocb *iocb = areq->iocb;
1037 unsigned int resultlen; 1049 unsigned int resultlen;
1038 1050
1039 lock_sock(sk);
1040
1041 /* Buffer size written by crypto operation. */ 1051 /* Buffer size written by crypto operation. */
1042 resultlen = areq->outlen; 1052 resultlen = areq->outlen;
1043 1053
1044 af_alg_free_areq_sgls(areq); 1054 af_alg_free_resources(areq);
1045 sock_kfree_s(sk, areq, areq->areqlen); 1055 sock_put(sk);
1046 __sock_put(sk);
1047 1056
1048 iocb->ki_complete(iocb, err ? err : resultlen, 0); 1057 iocb->ki_complete(iocb, err ? err : resultlen, 0);
1049
1050 release_sock(sk);
1051} 1058}
1052EXPORT_SYMBOL_GPL(af_alg_async_cb); 1059EXPORT_SYMBOL_GPL(af_alg_async_cb);
1053 1060