diff options
| author | Stephan Mueller <smueller@chronox.de> | 2017-11-10 07:20:55 -0500 | 
|---|---|---|
| committer | Herbert Xu <herbert@gondor.apana.org.au> | 2017-11-24 00:23:39 -0500 | 
| commit | 7d2c3f54e6f646887d019faa45f35d6fe9fe82ce (patch) | |
| tree | 216af0cc45030069ed6131e529e080718f9c57f7 /crypto/af_alg.c | |
| parent | 8e1fa89aa8bc2870009b4486644e4a58f2e2a4f5 (diff) | |
crypto: af_alg - remove locking in async callback
The code paths protected by the socket-lock do not use or modify the
socket in a non-atomic fashion. The actions pertaining the socket do not
even need to be handled as an atomic operation. Thus, the socket-lock
can be safely ignored.
This fixes a bug regarding scheduling in atomic as the callback function
may be invoked in interrupt context.
In addition, the sock_hold is moved before the AIO encrypt/decrypt
operation to ensure that the socket is always present. This avoids a
tiny race window where the socket is unprotected and yet used by the AIO
operation.
Finally, the release of resources for a crypto operation is moved into a
common function of af_alg_free_resources.
Cc: <stable@vger.kernel.org>
Fixes: e870456d8e7c8 ("crypto: algif_skcipher - overhaul memory management")
Fixes: d887c52d6ae43 ("crypto: algif_aead - overhaul memory management")
Reported-by: Romain Izard <romain.izard.pro@gmail.com>
Signed-off-by: Stephan Mueller <smueller@chronox.de>
Tested-by: Romain Izard <romain.izard.pro@gmail.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/af_alg.c')
| -rw-r--r-- | crypto/af_alg.c | 21 | 
1 files changed, 14 insertions, 7 deletions
| diff --git a/crypto/af_alg.c b/crypto/af_alg.c index 85cea9de324a..358749c38894 100644 --- a/crypto/af_alg.c +++ b/crypto/af_alg.c | |||
| @@ -1021,6 +1021,18 @@ unlock: | |||
| 1021 | EXPORT_SYMBOL_GPL(af_alg_sendpage); | 1021 | EXPORT_SYMBOL_GPL(af_alg_sendpage); | 
| 1022 | 1022 | ||
| 1023 | /** | 1023 | /** | 
| 1024 | * af_alg_free_resources - release resources required for crypto request | ||
| 1025 | */ | ||
| 1026 | void af_alg_free_resources(struct af_alg_async_req *areq) | ||
| 1027 | { | ||
| 1028 | struct sock *sk = areq->sk; | ||
| 1029 | |||
| 1030 | af_alg_free_areq_sgls(areq); | ||
| 1031 | sock_kfree_s(sk, areq, areq->areqlen); | ||
| 1032 | } | ||
| 1033 | EXPORT_SYMBOL_GPL(af_alg_free_resources); | ||
| 1034 | |||
| 1035 | /** | ||
| 1024 | * af_alg_async_cb - AIO callback handler | 1036 | * af_alg_async_cb - AIO callback handler | 
| 1025 | * | 1037 | * | 
| 1026 | * This handler cleans up the struct af_alg_async_req upon completion of the | 1038 | * This handler cleans up the struct af_alg_async_req upon completion of the | 
| @@ -1036,18 +1048,13 @@ void af_alg_async_cb(struct crypto_async_request *_req, int err) | |||
| 1036 | struct kiocb *iocb = areq->iocb; | 1048 | struct kiocb *iocb = areq->iocb; | 
| 1037 | unsigned int resultlen; | 1049 | unsigned int resultlen; | 
| 1038 | 1050 | ||
| 1039 | lock_sock(sk); | ||
| 1040 | |||
| 1041 | /* Buffer size written by crypto operation. */ | 1051 | /* Buffer size written by crypto operation. */ | 
| 1042 | resultlen = areq->outlen; | 1052 | resultlen = areq->outlen; | 
| 1043 | 1053 | ||
| 1044 | af_alg_free_areq_sgls(areq); | 1054 | af_alg_free_resources(areq); | 
| 1045 | sock_kfree_s(sk, areq, areq->areqlen); | 1055 | sock_put(sk); | 
| 1046 | __sock_put(sk); | ||
| 1047 | 1056 | ||
| 1048 | iocb->ki_complete(iocb, err ? err : resultlen, 0); | 1057 | iocb->ki_complete(iocb, err ? err : resultlen, 0); | 
| 1049 | |||
| 1050 | release_sock(sk); | ||
| 1051 | } | 1058 | } | 
| 1052 | EXPORT_SYMBOL_GPL(af_alg_async_cb); | 1059 | EXPORT_SYMBOL_GPL(af_alg_async_cb); | 
| 1053 | 1060 | ||
