diff options
author | Daniel Borkmann <dborkman@redhat.com> | 2014-11-19 11:13:11 -0500 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2014-11-25 09:50:39 -0500 |
commit | 79e886599e6416d0de26e8562e4464577d081c3d (patch) | |
tree | 83a545d589f1bb7ba5de28cc768ce549598fd0b2 /crypto | |
parent | 5d26a105b5a73e5635eae0629b42fa0a90e07b7b (diff) |
crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
Commit e1bd95bf7c25 ("crypto: algif - zeroize IV buffer") and
2a6af25befd0 ("crypto: algif - zeroize message digest buffer")
added memzero_explicit() calls on buffers that are later on
passed back to sock_kfree_s().
This is a discussed follow-up that, instead, extends the sock
API and adds sock_kzfree_s(), which internally uses kzfree()
instead of kfree() for passing the buffers back to slab.
Having sock_kzfree_s() allows to keep the changes more minimal
by just having a drop-in replacement instead of adding
memzero_explicit() calls everywhere before sock_kfree_s().
In kzfree(), the compiler is not allowed to optimize the memset()
away and thus there's no need for memzero_explicit(). Both,
sock_kfree_s() and sock_kzfree_s() are wrappers for
__sock_kfree_s() and call into kfree() resp. kzfree(); here,
__sock_kfree_s() needs to be explicitly inlined as we want the
compiler to optimize the call and condition away and thus it
produces e.g. on x86_64 the _same_ assembler output for
sock_kfree_s() before and after, and thus also allows for
avoiding code duplication.
Cc: David S. Miller <davem@davemloft.net>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/algif_hash.c | 6 | ||||
-rw-r--r-- | crypto/algif_skcipher.c | 3 |
2 files changed, 3 insertions, 6 deletions
diff --git a/crypto/algif_hash.c b/crypto/algif_hash.c index f75db4ce48bf..e6050396a3b3 100644 --- a/crypto/algif_hash.c +++ b/crypto/algif_hash.c | |||
@@ -258,10 +258,8 @@ static void hash_sock_destruct(struct sock *sk) | |||
258 | struct alg_sock *ask = alg_sk(sk); | 258 | struct alg_sock *ask = alg_sk(sk); |
259 | struct hash_ctx *ctx = ask->private; | 259 | struct hash_ctx *ctx = ask->private; |
260 | 260 | ||
261 | memzero_explicit(ctx->result, | 261 | sock_kzfree_s(sk, ctx->result, |
262 | crypto_ahash_digestsize(crypto_ahash_reqtfm(&ctx->req))); | 262 | crypto_ahash_digestsize(crypto_ahash_reqtfm(&ctx->req))); |
263 | sock_kfree_s(sk, ctx->result, | ||
264 | crypto_ahash_digestsize(crypto_ahash_reqtfm(&ctx->req))); | ||
265 | sock_kfree_s(sk, ctx, ctx->len); | 263 | sock_kfree_s(sk, ctx, ctx->len); |
266 | af_alg_release_parent(sk); | 264 | af_alg_release_parent(sk); |
267 | } | 265 | } |
diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c index 85e3bdbe214c..34389964000d 100644 --- a/crypto/algif_skcipher.c +++ b/crypto/algif_skcipher.c | |||
@@ -566,8 +566,7 @@ static void skcipher_sock_destruct(struct sock *sk) | |||
566 | struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(&ctx->req); | 566 | struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(&ctx->req); |
567 | 567 | ||
568 | skcipher_free_sgl(sk); | 568 | skcipher_free_sgl(sk); |
569 | memzero_explicit(ctx->iv, crypto_ablkcipher_ivsize(tfm)); | 569 | sock_kzfree_s(sk, ctx->iv, crypto_ablkcipher_ivsize(tfm)); |
570 | sock_kfree_s(sk, ctx->iv, crypto_ablkcipher_ivsize(tfm)); | ||
571 | sock_kfree_s(sk, ctx, ctx->len); | 570 | sock_kfree_s(sk, ctx, ctx->len); |
572 | af_alg_release_parent(sk); | 571 | af_alg_release_parent(sk); |
573 | } | 572 | } |