diff options
author | Gilad Ben-Yossef <gilad@benyossef.com> | 2017-05-18 16:29:25 +0300 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2017-05-23 12:45:11 +0800 |
commit | 82c1c5a1d244a6feddce69ba262462e1b50c3c14 (patch) | |
tree | 53082e6284edbdff4acb5770d2012f60ad12ab05 /crypto | |
parent | fbe4f68c5f4b4fc157b70217216ac44b8a01cf4e (diff) | |
download | linux-crypto-82c1c5a1d244a6feddce69ba262462e1b50c3c14.tar.gz linux-crypto-82c1c5a1d244a6feddce69ba262462e1b50c3c14.zip |
crypto: gcm - wait for crypto op not signal safe
crypto_gcm_setkey() was using wait_for_completion_interruptible() to
wait for completion of async crypto op but if a signal occurs it
may return before DMA ops of HW crypto provider finish, thus
corrupting the data buffer that is kfree'ed in this case.
Resolve this by using wait_for_completion() instead.
Reported-by: Eric Biggers <ebiggers3@gmail.com>
Signed-off-by: Gilad Ben-Yossef <gilad@benyossef.com>
CC: stable@vger.kernel.org
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to '')
-rw-r--r-- | crypto/gcm.c | 6 |
1 files changed, 2 insertions, 4 deletions
diff --git a/crypto/gcm.c b/crypto/gcm.c index b7ad808b..3841b5ea 100644 --- a/crypto/gcm.c +++ b/crypto/gcm.c @@ -152,10 +152,8 @@ static int crypto_gcm_setkey(struct crypto_aead *aead, const u8 *key, err = crypto_skcipher_encrypt(&data->req); if (err == -EINPROGRESS || err == -EBUSY) { - err = wait_for_completion_interruptible( - &data->result.completion); - if (!err) - err = data->result.err; + wait_for_completion(&data->result.completion); + err = data->result.err; } if (err) |