Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp2338663pxb; Thu, 4 Nov 2021 18:55:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwzke5PTpf/VB6T5wMwIjvQ89jEMwSasTGnwIwsxpdRG8sKe2pk1t0BilN9v/QXPUqmyXp8 X-Received: by 2002:a92:3211:: with SMTP id z17mr38155550ile.271.1636077313312; Thu, 04 Nov 2021 18:55:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1636077313; cv=none; d=google.com; s=arc-20160816; b=gXKBILUui+10YSdDx5nAPOrtAgex675p79F+4AsnQjciOkKREYnaCT2pc7PvKCYzbG EynDu/xdSSLIyY/4/fQvLqSGogxjrfjSnPS0J0SRZ/m070qaGgV8Igh//PEuLZm3ohEH bLFb8QsevRt5YQHOV3rPnQkeTWdqEWa3wncykk6wrhdnkSuqJ6LCu8GpzXcojpMLmr+y U0ZhK2rMtusVUsxu61MhOH8KYqVYXd/Mdhc2HrIu8CeMSIW/wZojD+Gh+K0TPFPE0/+M zt9pYCGxNQM7v0iMLx0asLzRKvmo645OEb8hFy6DS2eo+8wSADhJwgO4N9SqgQcQW+nF Bk7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=dNwZbIKE8lWneBjLIglBIBwD0K8M5nQ1YwG5fYxV9yQ=; b=VubP5JFYZgODtEfqMWtVDcIWNuduVvzFKSSJa1Mzn5Aekvwjwy6KAAAqMsHmz0p0IM Nl//YOW4b3ZAnoBXen3zyJikni8ANE8rP0oBHsvXYalKAaqS7oWKUQRN1nCHVfUh4TT1 FhvGQuhkoBlFtlI7N8tyo8dMhb7ix5GUadqzO0EhAEzEla71+uOaI5j3PeMpkNUVP/tx L6hd1pQ8+cN3kgCIi7sxgVYr7v1w2x/GqgxhOJdGryQdlB/7/+PbgpcxFw9J0l/N/ksh UHhlCnkGXbekZUXU7C85VyQlv9T8WH/FIIV752+0OHdcJJtRq+N1tG7w0fzVLVcBaMbm cOmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@arista.com header.s=google header.b=S6873E77; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=arista.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n4si15412072jaj.90.2021.11.04.18.55.00; Thu, 04 Nov 2021 18:55:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@arista.com header.s=google header.b=S6873E77; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=arista.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231840AbhKEBwm (ORCPT + 99 others); Thu, 4 Nov 2021 21:52:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55848 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231754AbhKEBwh (ORCPT ); Thu, 4 Nov 2021 21:52:37 -0400 Received: from mail-wm1-x336.google.com (mail-wm1-x336.google.com [IPv6:2a00:1450:4864:20::336]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E9AA6C061714 for ; Thu, 4 Nov 2021 18:49:58 -0700 (PDT) Received: by mail-wm1-x336.google.com with SMTP id b2-20020a1c8002000000b0032fb900951eso8528483wmd.4 for ; Thu, 04 Nov 2021 18:49:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arista.com; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=dNwZbIKE8lWneBjLIglBIBwD0K8M5nQ1YwG5fYxV9yQ=; b=S6873E77/TJAfAk2C/saKYt/6NEm0CteTcVWlSBIfx1IWNTD7Q8bjsrowiXO88I7S+ LEH+nrIQC8MQCABpuao3qyBTNN9A278yGM3a1irACwfOGwcc1q+uIqfLfRACZq0tiJzk ovBpHKT6QjjaXbDQVDrOPug+/QiRYxUMaM6bdh3UHjaW1FekQyY9xh4+TT6CJHnQs/zO H5mJcJFblppVgwfKrU81pamfcy160SDTTyPFBxLoMUtXfhxncvJK1zWzJuWdiBhCelIz ahUuGr5fxFkbdaBsh0NRLVDKc13euXGU3uqc4pR8j3wHmfMLsY5I/FhfMNxBYtWo42JB 0xzg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=dNwZbIKE8lWneBjLIglBIBwD0K8M5nQ1YwG5fYxV9yQ=; b=iLTWiAKtSyLr9hqbqdM27pGzc/qg5oDzpKCUvqouEBm+ijHxTknIFKgwnSd5ReXVjW b7CSkUlN2/6I+BURRrqhwl3h0A9lOHzTooSNNU11JewppIKUraLrqqybYtgCIPwa208c RitE9WmQfQGIS8YIeS17gpfCEsYr9DCqerF8mlZho0gDv3Og7BOOMPqN9qHlnu3aB/d8 V6066TNfD2fWcxPBiImXIuMl+y9ijqDKwrz3aXXVO8Oli2sy11LWVP1uzeBKNB7hP3HB 7Om+RNfNdlaA/D7AF5/GZzpxKvpIhDX1Z0k6UCjtDlKRZURqA7dsGEmATZwTcO8WGeDr 6dKQ== X-Gm-Message-State: AOAM532n1AfWWvDasOZ+YlwUiOG2R4uSxxe526JeYPogpw/LkkQ7wcdw /Sg9FVHlWo+2urLln/2NMYob/A== X-Received: by 2002:a05:600c:4f0f:: with SMTP id l15mr9170724wmq.25.1636076997577; Thu, 04 Nov 2021 18:49:57 -0700 (PDT) Received: from localhost.localdomain ([2a02:8084:e84:2480:228:f8ff:fe6f:83a8]) by smtp.gmail.com with ESMTPSA id c6sm7202421wmq.46.2021.11.04.18.49.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 04 Nov 2021 18:49:57 -0700 (PDT) From: Dmitry Safonov To: linux-kernel@vger.kernel.org Cc: Dmitry Safonov <0x7f454c46@gmail.com>, Dmitry Safonov , Andy Lutomirski , David Ahern , "David S. Miller" , Eric Dumazet , Francesco Ruggeri , Jakub Kicinski , Herbert Xu , Hideaki YOSHIFUJI , Leonard Crestez , linux-crypto@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH 2/5] tcp/md5: Don't leak ahash in OOM Date: Fri, 5 Nov 2021 01:49:50 +0000 Message-Id: <20211105014953.972946-3-dima@arista.com> X-Mailer: git-send-email 2.33.1 In-Reply-To: <20211105014953.972946-1-dima@arista.com> References: <20211105014953.972946-1-dima@arista.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org In quite unlikely scenario when __tcp_alloc_md5sig_pool() succeeded in crypto_alloc_ahash(), but later failed to allocate per-cpu request or scratch area ahash will be leaked. In theory it can happen multiple times in OOM condition for every setsockopt(TCP_MD5SIG{,_EXT}). Add a clean-up path to free ahash. Signed-off-by: Dmitry Safonov --- net/ipv4/tcp.c | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c index c0856a6af9f5..eb478028b1ea 100644 --- a/net/ipv4/tcp.c +++ b/net/ipv4/tcp.c @@ -4276,15 +4276,13 @@ static void __tcp_alloc_md5sig_pool(void) GFP_KERNEL, cpu_to_node(cpu)); if (!scratch) - return; + goto out_free; per_cpu(tcp_md5sig_pool, cpu).scratch = scratch; } - if (per_cpu(tcp_md5sig_pool, cpu).md5_req) - continue; req = ahash_request_alloc(hash, GFP_KERNEL); if (!req) - return; + goto out_free; ahash_request_set_callback(req, 0, NULL, NULL); @@ -4295,6 +4293,16 @@ static void __tcp_alloc_md5sig_pool(void) */ smp_wmb(); tcp_md5sig_pool_populated = true; + return; + +out_free: + for_each_possible_cpu(cpu) { + if (per_cpu(tcp_md5sig_pool, cpu).md5_req == NULL) + break; + ahash_request_free(per_cpu(tcp_md5sig_pool, cpu).md5_req); + per_cpu(tcp_md5sig_pool, cpu).md5_req = NULL; + } + crypto_free_ahash(hash); } bool tcp_alloc_md5sig_pool(void) -- 2.33.1