Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp743055ybl; Wed, 4 Dec 2019 10:07:45 -0800 (PST) X-Google-Smtp-Source: APXvYqwlyxyEIl+DACzfC1J5P7w2MsVh1MLgfQmypwofs/mM5/CrHIseL7LT5MQn0YcEYJFBeAed X-Received: by 2002:a05:6808:1c6:: with SMTP id x6mr3474788oic.49.1575482865297; Wed, 04 Dec 2019 10:07:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575482865; cv=none; d=google.com; s=arc-20160816; b=PyNPqUAww0PuAQQ0fIc8vbh8uRPrIW0xaXUc70I/vg3UQD+Z2/kYmnXEHi87lMUMin RkuHf3cKiE8lJ+Q6rtdYkGpXn5ef5lo/jRJLqsV+0IpyY7aFuHm1eRwbUwsypGaTmfGt JnIBz1woM9SMzPAIE63k9v888d6I/gwtOWoNjqzqIltkR9mkICAxgPgjRyJMHAgtX++A QVdEchxlvEve6B63d4/xtwXiGsZ8/nDiEWuzDYxZl9V3oaLOH5VMLeybwnVxDlVNlvsX PUlr6XHrVbCPj/Y3zmlNy7P3Zx9YQvJlJF2z9TzYGW5oLuEot7qSfBf/1oRgiHtL2XbQ NN/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=QwntWxteaodZmyCc4l/njhSPuJd1pfDLlGp4DLeBSPc=; b=FMwOBa+DmzdTjvY9ZHEjAT548qTflxoNiUEQ0kINhEeAh/lcT7Gmaz12+zyYUWdGu+ xhE6nd2sJsOITBS+FA5cKhf5E7YbvT/beVftEmuSVwqXzY3A9SrX7I1z8SQ3Keoq6zTa bCvkfvZiRBsQy2G0fxjX51DPPM53yXpQAwfkjxQxq7WMnTwFqabaSyYxq89ogxzFYOar EOIeG5YKNhYcM+ar5NAbAw4+xwk5MTzHctvAVVAxR+tj9Y7JmhcuiDcwUgpLTSXQbJJJ tqlpD/Jt732h5Lvpzzdn2CQC9sVq5vq7OEpMk2rpcDsnJxB2cafOjep0WsQHkkn9o35T cLwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yxJPf64P; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 7si3189861otk.79.2019.12.04.10.07.30; Wed, 04 Dec 2019 10:07:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yxJPf64P; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730310AbfLDSFB (ORCPT + 99 others); Wed, 4 Dec 2019 13:05:01 -0500 Received: from mail.kernel.org ([198.145.29.99]:50846 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730287AbfLDSE4 (ORCPT ); Wed, 4 Dec 2019 13:04:56 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B56A620659; Wed, 4 Dec 2019 18:04:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575482696; bh=5mkhHfymGmnKQldRumGWEaBlrFDgHKwBV49k8SQLJBg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yxJPf64PD/VCPkjpbgjXW9cDVT9y6NwtZLTaBXfcFm5Me4c87uGmKgOYb7e0yXnCI tRK8xNSFLwbcNP+k9OIVzN5KeOWGtpctGcOWOa9q29bR37sBDHljTzXcssAb/CUmdx 8QF2cbXqK0n+cqHIiZwJaHO3R4/LQ7iENWQF9TqQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Biggers , Herbert Xu , Sasha Levin Subject: [PATCH 4.14 045/209] crypto: user - support incremental algorithm dumps Date: Wed, 4 Dec 2019 18:54:17 +0100 Message-Id: <20191204175324.501019437@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191204175321.609072813@linuxfoundation.org> References: <20191204175321.609072813@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Biggers [ Upstream commit 0ac6b8fb23c724b015d9ca70a89126e8d1563166 ] CRYPTO_MSG_GETALG in NLM_F_DUMP mode sometimes doesn't return all registered crypto algorithms, because it doesn't support incremental dumps. crypto_dump_report() only permits itself to be called once, yet the netlink subsystem allocates at most ~64 KiB for the skb being dumped to. Thus only the first recvmsg() returns data, and it may only include a subset of the crypto algorithms even if the user buffer passed to recvmsg() is large enough to hold all of them. Fix this by using one of the arguments in the netlink_callback structure to keep track of the current position in the algorithm list. Then userspace can do multiple recvmsg() on the socket after sending the dump request. This is the way netlink dumps work elsewhere in the kernel; it's unclear why this was different (probably just an oversight). Also fix an integer overflow when calculating the dump buffer size hint. Fixes: a38f7907b926 ("crypto: Add userspace configuration API") Signed-off-by: Eric Biggers Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- crypto/crypto_user.c | 37 ++++++++++++++++++++----------------- 1 file changed, 20 insertions(+), 17 deletions(-) diff --git a/crypto/crypto_user.c b/crypto/crypto_user.c index 2b8fb8f1391e0..5e457a7dd1c92 100644 --- a/crypto/crypto_user.c +++ b/crypto/crypto_user.c @@ -296,30 +296,33 @@ drop_alg: static int crypto_dump_report(struct sk_buff *skb, struct netlink_callback *cb) { - struct crypto_alg *alg; + const size_t start_pos = cb->args[0]; + size_t pos = 0; struct crypto_dump_info info; - int err; - - if (cb->args[0]) - goto out; - - cb->args[0] = 1; + struct crypto_alg *alg; + int res; info.in_skb = cb->skb; info.out_skb = skb; info.nlmsg_seq = cb->nlh->nlmsg_seq; info.nlmsg_flags = NLM_F_MULTI; + down_read(&crypto_alg_sem); list_for_each_entry(alg, &crypto_alg_list, cra_list) { - err = crypto_report_alg(alg, &info); - if (err) - goto out_err; + if (pos >= start_pos) { + res = crypto_report_alg(alg, &info); + if (res == -EMSGSIZE) + break; + if (res) + goto out; + } + pos++; } - + cb->args[0] = pos; + res = skb->len; out: - return skb->len; -out_err: - return err; + up_read(&crypto_alg_sem); + return res; } static int crypto_dump_report_done(struct netlink_callback *cb) @@ -503,7 +506,7 @@ static int crypto_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh, if ((type == (CRYPTO_MSG_GETALG - CRYPTO_MSG_BASE) && (nlh->nlmsg_flags & NLM_F_DUMP))) { struct crypto_alg *alg; - u16 dump_alloc = 0; + unsigned long dump_alloc = 0; if (link->dump == NULL) return -EINVAL; @@ -511,16 +514,16 @@ static int crypto_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh, down_read(&crypto_alg_sem); list_for_each_entry(alg, &crypto_alg_list, cra_list) dump_alloc += CRYPTO_REPORT_MAXSIZE; + up_read(&crypto_alg_sem); { struct netlink_dump_control c = { .dump = link->dump, .done = link->done, - .min_dump_alloc = dump_alloc, + .min_dump_alloc = min(dump_alloc, 65535UL), }; err = netlink_dump_start(crypto_nlsk, skb, nlh, &c); } - up_read(&crypto_alg_sem); return err; } -- 2.20.1