forked from mirrors/linux
		
	[IPSEC]: Move state lock into x->type->input
This patch releases the lock on the state before calling x->type->input. It also adds the lock to the spots where they're currently needed. Most of those places (all except mip6) are expected to disappear with async crypto. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
		
							parent
							
								
									668dc8af31
								
							
						
					
					
						commit
						0ebea8ef35
					
				
					 6 changed files with 77 additions and 41 deletions
				
			
		| 
						 | 
					@ -169,6 +169,8 @@ static int ah_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
		if (ip_clear_mutable_options(iph, &dummy))
 | 
							if (ip_clear_mutable_options(iph, &dummy))
 | 
				
			||||||
			goto out;
 | 
								goto out;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						spin_lock(&x->lock);
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
		u8 auth_data[MAX_AH_AUTH_LEN];
 | 
							u8 auth_data[MAX_AH_AUTH_LEN];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -176,12 +178,16 @@ static int ah_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
		skb_push(skb, ihl);
 | 
							skb_push(skb, ihl);
 | 
				
			||||||
		err = ah_mac_digest(ahp, skb, ah->auth_data);
 | 
							err = ah_mac_digest(ahp, skb, ah->auth_data);
 | 
				
			||||||
		if (err)
 | 
							if (err)
 | 
				
			||||||
			goto out;
 | 
								goto unlock;
 | 
				
			||||||
		if (memcmp(ahp->work_icv, auth_data, ahp->icv_trunc_len)) {
 | 
							if (memcmp(ahp->work_icv, auth_data, ahp->icv_trunc_len))
 | 
				
			||||||
			err = -EBADMSG;
 | 
								err = -EBADMSG;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					unlock:
 | 
				
			||||||
 | 
						spin_unlock(&x->lock);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (err)
 | 
				
			||||||
		goto out;
 | 
							goto out;
 | 
				
			||||||
		}
 | 
					
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	skb->network_header += ah_hlen;
 | 
						skb->network_header += ah_hlen;
 | 
				
			||||||
	memcpy(skb_network_header(skb), work_buf, ihl);
 | 
						memcpy(skb_network_header(skb), work_buf, ihl);
 | 
				
			||||||
	skb->transport_header = skb->network_header;
 | 
						skb->transport_header = skb->network_header;
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -171,29 +171,31 @@ static int esp_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
	if (elen <= 0 || (elen & (blksize-1)))
 | 
						if (elen <= 0 || (elen & (blksize-1)))
 | 
				
			||||||
		goto out;
 | 
							goto out;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if ((err = skb_cow_data(skb, 0, &trailer)) < 0)
 | 
				
			||||||
 | 
							goto out;
 | 
				
			||||||
 | 
						nfrags = err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						skb->ip_summed = CHECKSUM_NONE;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						spin_lock(&x->lock);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* If integrity check is required, do this. */
 | 
						/* If integrity check is required, do this. */
 | 
				
			||||||
	if (esp->auth.icv_full_len) {
 | 
						if (esp->auth.icv_full_len) {
 | 
				
			||||||
		u8 sum[alen];
 | 
							u8 sum[alen];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		err = esp_mac_digest(esp, skb, 0, skb->len - alen);
 | 
							err = esp_mac_digest(esp, skb, 0, skb->len - alen);
 | 
				
			||||||
		if (err)
 | 
							if (err)
 | 
				
			||||||
			goto out;
 | 
								goto unlock;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (skb_copy_bits(skb, skb->len - alen, sum, alen))
 | 
							if (skb_copy_bits(skb, skb->len - alen, sum, alen))
 | 
				
			||||||
			BUG();
 | 
								BUG();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (unlikely(memcmp(esp->auth.work_icv, sum, alen))) {
 | 
							if (unlikely(memcmp(esp->auth.work_icv, sum, alen))) {
 | 
				
			||||||
			err = -EBADMSG;
 | 
								err = -EBADMSG;
 | 
				
			||||||
			goto out;
 | 
								goto unlock;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((err = skb_cow_data(skb, 0, &trailer)) < 0)
 | 
					 | 
				
			||||||
		goto out;
 | 
					 | 
				
			||||||
	nfrags = err;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	skb->ip_summed = CHECKSUM_NONE;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	esph = (struct ip_esp_hdr *)skb->data;
 | 
						esph = (struct ip_esp_hdr *)skb->data;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* Get ivec. This can be wrong, check against another impls. */
 | 
						/* Get ivec. This can be wrong, check against another impls. */
 | 
				
			||||||
| 
						 | 
					@ -206,7 +208,7 @@ static int esp_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
		err = -ENOMEM;
 | 
							err = -ENOMEM;
 | 
				
			||||||
		sg = kmalloc(sizeof(struct scatterlist)*nfrags, GFP_ATOMIC);
 | 
							sg = kmalloc(sizeof(struct scatterlist)*nfrags, GFP_ATOMIC);
 | 
				
			||||||
		if (!sg)
 | 
							if (!sg)
 | 
				
			||||||
			goto out;
 | 
								goto unlock;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	sg_init_table(sg, nfrags);
 | 
						sg_init_table(sg, nfrags);
 | 
				
			||||||
	skb_to_sgvec(skb, sg,
 | 
						skb_to_sgvec(skb, sg,
 | 
				
			||||||
| 
						 | 
					@ -215,6 +217,10 @@ static int esp_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
	err = crypto_blkcipher_decrypt(&desc, sg, sg, elen);
 | 
						err = crypto_blkcipher_decrypt(&desc, sg, sg, elen);
 | 
				
			||||||
	if (unlikely(sg != &esp->sgbuf[0]))
 | 
						if (unlikely(sg != &esp->sgbuf[0]))
 | 
				
			||||||
		kfree(sg);
 | 
							kfree(sg);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					unlock:
 | 
				
			||||||
 | 
						spin_unlock(&x->lock);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (unlikely(err))
 | 
						if (unlikely(err))
 | 
				
			||||||
		goto out;
 | 
							goto out;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -370,6 +370,7 @@ static int ah6_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
	ip6h->flow_lbl[2] = 0;
 | 
						ip6h->flow_lbl[2] = 0;
 | 
				
			||||||
	ip6h->hop_limit   = 0;
 | 
						ip6h->hop_limit   = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						spin_lock(&x->lock);
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
		u8 auth_data[MAX_AH_AUTH_LEN];
 | 
							u8 auth_data[MAX_AH_AUTH_LEN];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -378,13 +379,17 @@ static int ah6_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
		skb_push(skb, hdr_len);
 | 
							skb_push(skb, hdr_len);
 | 
				
			||||||
		err = ah_mac_digest(ahp, skb, ah->auth_data);
 | 
							err = ah_mac_digest(ahp, skb, ah->auth_data);
 | 
				
			||||||
		if (err)
 | 
							if (err)
 | 
				
			||||||
			goto free_out;
 | 
								goto unlock;
 | 
				
			||||||
		if (memcmp(ahp->work_icv, auth_data, ahp->icv_trunc_len)) {
 | 
							if (memcmp(ahp->work_icv, auth_data, ahp->icv_trunc_len)) {
 | 
				
			||||||
			LIMIT_NETDEBUG(KERN_WARNING "ipsec ah authentication error\n");
 | 
								LIMIT_NETDEBUG(KERN_WARNING "ipsec ah authentication error\n");
 | 
				
			||||||
			err = -EBADMSG;
 | 
								err = -EBADMSG;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					unlock:
 | 
				
			||||||
 | 
						spin_unlock(&x->lock);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (err)
 | 
				
			||||||
		goto free_out;
 | 
							goto free_out;
 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	skb->network_header += ah_hlen;
 | 
						skb->network_header += ah_hlen;
 | 
				
			||||||
	memcpy(skb_network_header(skb), tmp_hdr, hdr_len);
 | 
						memcpy(skb_network_header(skb), tmp_hdr, hdr_len);
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -165,23 +165,6 @@ static int esp6_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
		goto out;
 | 
							goto out;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* If integrity check is required, do this. */
 | 
					 | 
				
			||||||
	if (esp->auth.icv_full_len) {
 | 
					 | 
				
			||||||
		u8 sum[alen];
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		ret = esp_mac_digest(esp, skb, 0, skb->len - alen);
 | 
					 | 
				
			||||||
		if (ret)
 | 
					 | 
				
			||||||
			goto out;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		if (skb_copy_bits(skb, skb->len - alen, sum, alen))
 | 
					 | 
				
			||||||
			BUG();
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		if (unlikely(memcmp(esp->auth.work_icv, sum, alen))) {
 | 
					 | 
				
			||||||
			ret = -EBADMSG;
 | 
					 | 
				
			||||||
			goto out;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if ((nfrags = skb_cow_data(skb, 0, &trailer)) < 0) {
 | 
						if ((nfrags = skb_cow_data(skb, 0, &trailer)) < 0) {
 | 
				
			||||||
		ret = -EINVAL;
 | 
							ret = -EINVAL;
 | 
				
			||||||
		goto out;
 | 
							goto out;
 | 
				
			||||||
| 
						 | 
					@ -189,6 +172,25 @@ static int esp6_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	skb->ip_summed = CHECKSUM_NONE;
 | 
						skb->ip_summed = CHECKSUM_NONE;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						spin_lock(&x->lock);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* If integrity check is required, do this. */
 | 
				
			||||||
 | 
						if (esp->auth.icv_full_len) {
 | 
				
			||||||
 | 
							u8 sum[alen];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							ret = esp_mac_digest(esp, skb, 0, skb->len - alen);
 | 
				
			||||||
 | 
							if (ret)
 | 
				
			||||||
 | 
								goto unlock;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (skb_copy_bits(skb, skb->len - alen, sum, alen))
 | 
				
			||||||
 | 
								BUG();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (unlikely(memcmp(esp->auth.work_icv, sum, alen))) {
 | 
				
			||||||
 | 
								ret = -EBADMSG;
 | 
				
			||||||
 | 
								goto unlock;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	esph = (struct ip_esp_hdr *)skb->data;
 | 
						esph = (struct ip_esp_hdr *)skb->data;
 | 
				
			||||||
	iph = ipv6_hdr(skb);
 | 
						iph = ipv6_hdr(skb);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -197,15 +199,13 @@ static int esp6_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
		crypto_blkcipher_set_iv(tfm, esph->enc_data, esp->conf.ivlen);
 | 
							crypto_blkcipher_set_iv(tfm, esph->enc_data, esp->conf.ivlen);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
		u8 nexthdr[2];
 | 
					 | 
				
			||||||
		struct scatterlist *sg = &esp->sgbuf[0];
 | 
							struct scatterlist *sg = &esp->sgbuf[0];
 | 
				
			||||||
		u8 padlen;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (unlikely(nfrags > ESP_NUM_FAST_SG)) {
 | 
							if (unlikely(nfrags > ESP_NUM_FAST_SG)) {
 | 
				
			||||||
			sg = kmalloc(sizeof(struct scatterlist)*nfrags, GFP_ATOMIC);
 | 
								sg = kmalloc(sizeof(struct scatterlist)*nfrags, GFP_ATOMIC);
 | 
				
			||||||
			if (!sg) {
 | 
								if (!sg) {
 | 
				
			||||||
				ret = -ENOMEM;
 | 
									ret = -ENOMEM;
 | 
				
			||||||
				goto out;
 | 
									goto unlock;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		sg_init_table(sg, nfrags);
 | 
							sg_init_table(sg, nfrags);
 | 
				
			||||||
| 
						 | 
					@ -215,9 +215,18 @@ static int esp6_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
		ret = crypto_blkcipher_decrypt(&desc, sg, sg, elen);
 | 
							ret = crypto_blkcipher_decrypt(&desc, sg, sg, elen);
 | 
				
			||||||
		if (unlikely(sg != &esp->sgbuf[0]))
 | 
							if (unlikely(sg != &esp->sgbuf[0]))
 | 
				
			||||||
			kfree(sg);
 | 
								kfree(sg);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					unlock:
 | 
				
			||||||
 | 
						spin_unlock(&x->lock);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (unlikely(ret))
 | 
						if (unlikely(ret))
 | 
				
			||||||
		goto out;
 | 
							goto out;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							u8 nexthdr[2];
 | 
				
			||||||
 | 
							u8 padlen;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (skb_copy_bits(skb, skb->len-alen-2, nexthdr, 2))
 | 
							if (skb_copy_bits(skb, skb->len-alen-2, nexthdr, 2))
 | 
				
			||||||
			BUG();
 | 
								BUG();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -128,12 +128,15 @@ static int mip6_destopt_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	struct ipv6hdr *iph = ipv6_hdr(skb);
 | 
						struct ipv6hdr *iph = ipv6_hdr(skb);
 | 
				
			||||||
	struct ipv6_destopt_hdr *destopt = (struct ipv6_destopt_hdr *)skb->data;
 | 
						struct ipv6_destopt_hdr *destopt = (struct ipv6_destopt_hdr *)skb->data;
 | 
				
			||||||
 | 
						int err = destopt->nexthdr;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						spin_lock(&x->lock);
 | 
				
			||||||
	if (!ipv6_addr_equal(&iph->saddr, (struct in6_addr *)x->coaddr) &&
 | 
						if (!ipv6_addr_equal(&iph->saddr, (struct in6_addr *)x->coaddr) &&
 | 
				
			||||||
	    !ipv6_addr_any((struct in6_addr *)x->coaddr))
 | 
						    !ipv6_addr_any((struct in6_addr *)x->coaddr))
 | 
				
			||||||
		return -ENOENT;
 | 
							err = -ENOENT;
 | 
				
			||||||
 | 
						spin_unlock(&x->lock);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return destopt->nexthdr;
 | 
						return err;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* Destination Option Header is inserted.
 | 
					/* Destination Option Header is inserted.
 | 
				
			||||||
| 
						 | 
					@ -344,12 +347,15 @@ static struct xfrm_type mip6_destopt_type =
 | 
				
			||||||
static int mip6_rthdr_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
					static int mip6_rthdr_input(struct xfrm_state *x, struct sk_buff *skb)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	struct rt2_hdr *rt2 = (struct rt2_hdr *)skb->data;
 | 
						struct rt2_hdr *rt2 = (struct rt2_hdr *)skb->data;
 | 
				
			||||||
 | 
						int err = rt2->rt_hdr.nexthdr;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						spin_lock(&x->lock);
 | 
				
			||||||
	if (!ipv6_addr_equal(&rt2->addr, (struct in6_addr *)x->coaddr) &&
 | 
						if (!ipv6_addr_equal(&rt2->addr, (struct in6_addr *)x->coaddr) &&
 | 
				
			||||||
	    !ipv6_addr_any((struct in6_addr *)x->coaddr))
 | 
						    !ipv6_addr_any((struct in6_addr *)x->coaddr))
 | 
				
			||||||
		return -ENOENT;
 | 
							err = -ENOENT;
 | 
				
			||||||
 | 
						spin_unlock(&x->lock);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return rt2->rt_hdr.nexthdr;
 | 
						return err;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* Routing Header type 2 is inserted.
 | 
					/* Routing Header type 2 is inserted.
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -146,7 +146,11 @@ int xfrm_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type)
 | 
				
			||||||
		if (xfrm_state_check_expire(x))
 | 
							if (xfrm_state_check_expire(x))
 | 
				
			||||||
			goto drop_unlock;
 | 
								goto drop_unlock;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							spin_unlock(&x->lock);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		nexthdr = x->type->input(x, skb);
 | 
							nexthdr = x->type->input(x, skb);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							spin_lock(&x->lock);
 | 
				
			||||||
		if (nexthdr <= 0) {
 | 
							if (nexthdr <= 0) {
 | 
				
			||||||
			if (nexthdr == -EBADMSG)
 | 
								if (nexthdr == -EBADMSG)
 | 
				
			||||||
				x->stats.integrity_failed++;
 | 
									x->stats.integrity_failed++;
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in a new issue