Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp128521ybm; Tue, 26 May 2020 12:28:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwJxSmVke7RZPSI6VUDEMOYSwy8ig1JXjSKrMTi/uIWqGL+oxxg5T6FxuvHXF0tHHmpMKNP X-Received: by 2002:a50:9312:: with SMTP id m18mr20625723eda.252.1590521336921; Tue, 26 May 2020 12:28:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590521336; cv=none; d=google.com; s=arc-20160816; b=FLMPtbD5lu0XVC9ZpfI2Aili2yYMUgPW+8RAkf4q+k6a42vOP1WeGWl79U12zQVsLn xMACmHx04bi9uvKv+OA5x4FYsn3+x0+LGXaFwRzk96Ovt5mbQjnN1J/GgiAzd+Z6yJvW XWyhTwiEYtwhfGFpBQjo2Rai50OqGKmSsPubGZVeSNaOCDhq3HBW23Mll/cqp3kxVrko uqfa5yMQ/Andk0WDCv/+tMS5JnrepDJO/gPlrNE2NFpklgeFH90pv86njPj34YkGS1AH a07kZLg7ZYwKxdP2lOfJBirU2K0rrpHJOy5Oo9UkYvjvCNg5PYcgPUKdr7Aw5Q9C171i C2Fg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=UaNebKYucO9JfYXTAQuJE3x5lIB6EdWJPsWs893oFC4=; b=UHr05mHqbDn7tmNIByV/IGXJtYDHskn0RPVaRQanPimLr648nQWwyC5cyRrp3pCjgi zwd6xOm5Ck5ACE+hFHQLl9hb7vAORDWWXv7olP2wJJYOozjQremR8FLY1Jq+Db+1sQ/O 5Zk6lfWAGcHxNlO+VORAPdC3vZnR7aCvs8U+YAf8dOF04lpW6FjUWgcxm6sxBhC3p9+6 Lrp9rZ/VgitlGlb4osXg3VE3KriUf69rwqNaZ0/bp2jIOAfD0pWnJKmIZPM9EfSzWvPI vUZx2q42YV6ONrdr4y1DFuSf3Zl6ghnNDeV0YGsjSo7w1j+kKsiYo7on387rPTF3Q/5x LCFw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nuZuJzee; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s3si558411eds.446.2020.05.26.12.28.33; Tue, 26 May 2020 12:28:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nuZuJzee; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390902AbgEZTGa (ORCPT + 99 others); Tue, 26 May 2020 15:06:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:34644 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391570AbgEZTGZ (ORCPT ); Tue, 26 May 2020 15:06:25 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 96A2220776; Tue, 26 May 2020 19:06:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590519984; bh=BJ0tO64MAidki1KuaMNtI00MVaxBlWf8j4Gm2u/+cZo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nuZuJzeegK53xgmauThOMay2cBGrJ9P9LSOOUhvrLy9jdWOzuF2+0oWJi7qHmqCpO xmgASUYZThxw6yWk4bY92MQSr/aaYmesHuF+BQeKMOpeQRn1H+ypvFe4qjkS+VrGGA IJu6qF9IOF0wubk5k0ndVjDS/vxJQnJYGhpOEyyY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Roberto Sassu , Dan Carpenter , Krzysztof Struczynski , Mimi Zohar , Sasha Levin Subject: [PATCH 5.4 013/111] evm: Fix a small race in init_desc() Date: Tue, 26 May 2020 20:52:31 +0200 Message-Id: <20200526183933.818958199@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200526183932.245016380@linuxfoundation.org> References: <20200526183932.245016380@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter [ Upstream commit 8433856947217ebb5697a8ff9c4c9cad4639a2cf ] The IS_ERR_OR_NULL() function has two conditions and if we got really unlucky we could hit a race where "ptr" started as an error pointer and then was set to NULL. Both conditions would be false even though the pointer at the end was NULL. This patch fixes the problem by ensuring that "*tfm" can only be NULL or valid. I have introduced a "tmp_tfm" variable to make that work. I also reversed a condition and pulled the code in one tab. Reported-by: Roberto Sassu Fixes: 53de3b080d5e ("evm: Check also if *tfm is an error pointer in init_desc()") Signed-off-by: Dan Carpenter Acked-by: Roberto Sassu Acked-by: Krzysztof Struczynski Signed-off-by: Mimi Zohar Signed-off-by: Sasha Levin --- security/integrity/evm/evm_crypto.c | 44 ++++++++++++++--------------- 1 file changed, 22 insertions(+), 22 deletions(-) diff --git a/security/integrity/evm/evm_crypto.c b/security/integrity/evm/evm_crypto.c index 302adeb2d37b..cc826c2767a3 100644 --- a/security/integrity/evm/evm_crypto.c +++ b/security/integrity/evm/evm_crypto.c @@ -75,7 +75,7 @@ static struct shash_desc *init_desc(char type, uint8_t hash_algo) { long rc; const char *algo; - struct crypto_shash **tfm; + struct crypto_shash **tfm, *tmp_tfm; struct shash_desc *desc; if (type == EVM_XATTR_HMAC) { @@ -93,31 +93,31 @@ static struct shash_desc *init_desc(char type, uint8_t hash_algo) algo = hash_algo_name[hash_algo]; } - if (IS_ERR_OR_NULL(*tfm)) { - mutex_lock(&mutex); - if (*tfm) - goto out; - *tfm = crypto_alloc_shash(algo, 0, CRYPTO_NOLOAD); - if (IS_ERR(*tfm)) { - rc = PTR_ERR(*tfm); - pr_err("Can not allocate %s (reason: %ld)\n", algo, rc); - *tfm = NULL; + if (*tfm) + goto alloc; + mutex_lock(&mutex); + if (*tfm) + goto unlock; + + tmp_tfm = crypto_alloc_shash(algo, 0, CRYPTO_NOLOAD); + if (IS_ERR(tmp_tfm)) { + pr_err("Can not allocate %s (reason: %ld)\n", algo, + PTR_ERR(tmp_tfm)); + mutex_unlock(&mutex); + return ERR_CAST(tmp_tfm); + } + if (type == EVM_XATTR_HMAC) { + rc = crypto_shash_setkey(tmp_tfm, evmkey, evmkey_len); + if (rc) { + crypto_free_shash(tmp_tfm); mutex_unlock(&mutex); return ERR_PTR(rc); } - if (type == EVM_XATTR_HMAC) { - rc = crypto_shash_setkey(*tfm, evmkey, evmkey_len); - if (rc) { - crypto_free_shash(*tfm); - *tfm = NULL; - mutex_unlock(&mutex); - return ERR_PTR(rc); - } - } -out: - mutex_unlock(&mutex); } - + *tfm = tmp_tfm; +unlock: + mutex_unlock(&mutex); +alloc: desc = kmalloc(sizeof(*desc) + crypto_shash_descsize(*tfm), GFP_KERNEL); if (!desc) -- 2.25.1