Re: Linux 2.6.28 and AEAD initialization

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Herbert,

your patch fixes the initialization problem!

Thanks

Andreas

Herbert Xu wrote:
> On Wed, Jan 21, 2009 at 02:29:48AM +0000, Andreas Steffen wrote:
>> Because of type=nivaead
>>
>>     if (alg->cra_type == &crypto_aead_type)
>>         return alg;
>>
>> crypto_lookup_aead() does not return the algorithm and falls through
>> to the statement
>>
>>     return ERR_PTR(crypto_nivaead_default(alg, type, mask));
>>
>> which makes another call to algapi.c;__crypto_register_alg().
>> Because the driver has already been installed
>>
>>     ret = -EEXIST;
>>     ...
>>
>> 	if (crypto_is_larval(q)) {
>> 	    if (!strcmp(alg->cra_driver_name, q->cra_driver_name))
>> 	        goto err;
>> 	    continue;
>> 	}
>>
>> __crypto_register_alg() exits with the EEXIST error code.
> 
> This can only happen if we find a larval q with a matching driver
> name, i.e., there is still an outstanding test on this driver.
> 
> Actually I see where the problem is.  When we complete the test
> we're notifying everyone of the completion before we take the
> test larval off the list.  So if one of the notified parties tries
> to register another driver with the same name, then we hit this
> error.  This is exactly what aead and givcipher tries to do.
> 
> Does this patch help?
> 
> crypto: api - Fix algorithm test race that broke aead initialisation
> 
> When we complete a test we'll notify everyone waiting on it, drop
> the mutex, and then remove the test larval (after reacquiring the
> mutex).  If one of the notified parties tries to register another
> algorithm with the same driver name prior to the removal of the
> test larval, they will fail with EEXIST as only one algorithm of
> a given name can be tested at any time.
> 
> This broke the initialisation of aead and givcipher algorithms as
> they will register two algorithms with the same driver name, in
> sequence.
> 
> This patch fixes the problem by marking the larval as dead before
> we drop the mutex, and also ignoring all dead or dying algorithms
> on the registration path.
> 
> Signed-off-by: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
> 
> diff --git a/crypto/algapi.c b/crypto/algapi.c
> index 7c41e74..56c62e2 100644
> --- a/crypto/algapi.c
> +++ b/crypto/algapi.c
> @@ -149,6 +149,9 @@ static struct crypto_larval *__crypto_register_alg(struct crypto_alg *alg)
>  		if (q == alg)
>  			goto err;
>  
> +		if (crypto_is_moribund(q))
> +			continue;
> +
>  		if (crypto_is_larval(q)) {
>  			if (!strcmp(alg->cra_driver_name, q->cra_driver_name))
>  				goto err;
> @@ -197,7 +200,7 @@ void crypto_alg_tested(const char *name, int err)
>  
>  	down_write(&crypto_alg_sem);
>  	list_for_each_entry(q, &crypto_alg_list, cra_list) {
> -		if (!crypto_is_larval(q))
> +		if (crypto_is_moribund(q) || !crypto_is_larval(q))
>  			continue;
>  
>  		test = (struct crypto_larval *)q;
> @@ -210,6 +213,7 @@ void crypto_alg_tested(const char *name, int err)
>  	goto unlock;
>  
>  found:
> +	q->cra_flags |= CRYPTO_ALG_DEAD;
>  	alg = test->adult;
>  	if (err || list_empty(&alg->cra_list))
>  		goto complete;
> 
> Thanks,

======================================================================
Andreas Steffen                         andreas.steffen@xxxxxxxxxxxxxx
strongSwan - the Linux VPN Solution!                www.strongswan.org

Institute for Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==

--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux