diff options
author | Stephan Mueller <smueller@chronox.de> | 2017-11-10 07:20:55 -0500 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2017-11-24 00:23:39 -0500 |
commit | 7d2c3f54e6f646887d019faa45f35d6fe9fe82ce (patch) | |
tree | 216af0cc45030069ed6131e529e080718f9c57f7 /crypto/algif_skcipher.c | |
parent | 8e1fa89aa8bc2870009b4486644e4a58f2e2a4f5 (diff) |
crypto: af_alg - remove locking in async callback
The code paths protected by the socket-lock do not use or modify the
socket in a non-atomic fashion. The actions pertaining the socket do not
even need to be handled as an atomic operation. Thus, the socket-lock
can be safely ignored.
This fixes a bug regarding scheduling in atomic as the callback function
may be invoked in interrupt context.
In addition, the sock_hold is moved before the AIO encrypt/decrypt
operation to ensure that the socket is always present. This avoids a
tiny race window where the socket is unprotected and yet used by the AIO
operation.
Finally, the release of resources for a crypto operation is moved into a
common function of af_alg_free_resources.
Cc: <stable@vger.kernel.org>
Fixes: e870456d8e7c8 ("crypto: algif_skcipher - overhaul memory management")
Fixes: d887c52d6ae43 ("crypto: algif_aead - overhaul memory management")
Reported-by: Romain Izard <romain.izard.pro@gmail.com>
Signed-off-by: Stephan Mueller <smueller@chronox.de>
Tested-by: Romain Izard <romain.izard.pro@gmail.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/algif_skcipher.c')
-rw-r--r-- | crypto/algif_skcipher.c | 23 |
1 files changed, 12 insertions, 11 deletions
diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c index 9954b078f0b9..30cff827dd8f 100644 --- a/crypto/algif_skcipher.c +++ b/crypto/algif_skcipher.c | |||
@@ -117,6 +117,7 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg, | |||
117 | 117 | ||
118 | if (msg->msg_iocb && !is_sync_kiocb(msg->msg_iocb)) { | 118 | if (msg->msg_iocb && !is_sync_kiocb(msg->msg_iocb)) { |
119 | /* AIO operation */ | 119 | /* AIO operation */ |
120 | sock_hold(sk); | ||
120 | areq->iocb = msg->msg_iocb; | 121 | areq->iocb = msg->msg_iocb; |
121 | skcipher_request_set_callback(&areq->cra_u.skcipher_req, | 122 | skcipher_request_set_callback(&areq->cra_u.skcipher_req, |
122 | CRYPTO_TFM_REQ_MAY_SLEEP, | 123 | CRYPTO_TFM_REQ_MAY_SLEEP, |
@@ -124,6 +125,16 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg, | |||
124 | err = ctx->enc ? | 125 | err = ctx->enc ? |
125 | crypto_skcipher_encrypt(&areq->cra_u.skcipher_req) : | 126 | crypto_skcipher_encrypt(&areq->cra_u.skcipher_req) : |
126 | crypto_skcipher_decrypt(&areq->cra_u.skcipher_req); | 127 | crypto_skcipher_decrypt(&areq->cra_u.skcipher_req); |
128 | |||
129 | /* AIO operation in progress */ | ||
130 | if (err == -EINPROGRESS || err == -EBUSY) { | ||
131 | /* Remember output size that will be generated. */ | ||
132 | areq->outlen = len; | ||
133 | |||
134 | return -EIOCBQUEUED; | ||
135 | } | ||
136 | |||
137 | sock_put(sk); | ||
127 | } else { | 138 | } else { |
128 | /* Synchronous operation */ | 139 | /* Synchronous operation */ |
129 | skcipher_request_set_callback(&areq->cra_u.skcipher_req, | 140 | skcipher_request_set_callback(&areq->cra_u.skcipher_req, |
@@ -136,19 +147,9 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg, | |||
136 | &ctx->wait); | 147 | &ctx->wait); |
137 | } | 148 | } |
138 | 149 | ||
139 | /* AIO operation in progress */ | ||
140 | if (err == -EINPROGRESS) { | ||
141 | sock_hold(sk); | ||
142 | |||
143 | /* Remember output size that will be generated. */ | ||
144 | areq->outlen = len; | ||
145 | |||
146 | return -EIOCBQUEUED; | ||
147 | } | ||
148 | 150 | ||
149 | free: | 151 | free: |
150 | af_alg_free_areq_sgls(areq); | 152 | af_alg_free_resources(areq); |
151 | sock_kfree_s(sk, areq, areq->areqlen); | ||
152 | 153 | ||
153 | return err ? err : len; | 154 | return err ? err : len; |
154 | } | 155 | } |