Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp2338702pxb; Thu, 4 Nov 2021 18:55:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxD04N+nJ7PpJc9YMczIe7AwPL+kk9oDXXCtMJUVPj3ewQMSYQZ0D7F4NpVgIL7gbyqw5ca X-Received: by 2002:a50:f157:: with SMTP id z23mr2794019edl.94.1636077317166; Thu, 04 Nov 2021 18:55:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1636077317; cv=none; d=google.com; s=arc-20160816; b=mdzCsiAPk5kGMAfG2J8PP/ws1266Kpg9muKGBPy4fm3XlYHADn/bBxotVHlTPKiz6N Knie9sp+8wuDMd4Tm709N1Kr4MWNqsR8ni4h/FehZZSHGiEBuy/q+g1qcWVuZhE3xtx9 fjENqfQ5d3KAWSAGKZlMC0DloYwJxBXU+fO/ID7lI7nbCRWGir/JNllQ9RVbmhL352jQ TVYw955P9Ws4F7ffEqIUWl3DS/HNFjaLIM0RvPVTWdqKGcHXOZf8MYIjyreN2UrRiAmD ec3jWY74IZiHoW4R1iPdD0Nsp0TIWBKr+MTgex/YH7mSQU/hoNwHvtAyUue/RRq5gIev eiOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=+ZX3pYJ1I/7ebtQwANMInsRgOc/yS6aTn3F+Fk+PiwA=; b=fxNasgOCv4T5BnEw5qOd1YNUoucHR4zpLwtt/q3qzwSlhhqf+IZG7sFU1Ya6y5ai/u L2lYfXXHI6u0Bii+wcodiXYhM21svcdXbQVBnTPvdBUucrDvYVkeCv75PZLkhjrDBEuw Zi8GI/wXX9RXtwXk5Wr8XCXkVVklILRdDCZJcviJuoypmaoOn/6M9mgq4HBvQdDz/NLL utZCVqNKol/g48EUmHc5UiNfvqIzehuqd1w6+bFtsV8LvEVHQttTGq4lODsNEXPEz1ga 1mhdG7xkukxh5gkVameBVk73AxXw0C21nOwmRJJdq9WSWNy39yU8tV8sanS5iMtGv6mX kIGw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@arista.com header.s=google header.b=GsPk6IXO; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=arista.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p23si2899724ejf.315.2021.11.04.18.54.53; Thu, 04 Nov 2021 18:55:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@arista.com header.s=google header.b=GsPk6IXO; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=arista.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231829AbhKEBwl (ORCPT + 99 others); Thu, 4 Nov 2021 21:52:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55858 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231777AbhKEBwj (ORCPT ); Thu, 4 Nov 2021 21:52:39 -0400 Received: from mail-wr1-x430.google.com (mail-wr1-x430.google.com [IPv6:2a00:1450:4864:20::430]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 256DAC06120A for ; Thu, 4 Nov 2021 18:50:00 -0700 (PDT) Received: by mail-wr1-x430.google.com with SMTP id i5so11399438wrb.2 for ; Thu, 04 Nov 2021 18:50:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arista.com; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=+ZX3pYJ1I/7ebtQwANMInsRgOc/yS6aTn3F+Fk+PiwA=; b=GsPk6IXOjNs0SPvXxuznhJg1YhpoxbWiSH6pSRXi8P/R0//AeMACHltL4qoPIRMz8P IrFp99b1IUUs5OTWeGsqg4lbJU6kkaOwjhbdS7M42pbe7et5jbVcyfJjSRJEOrwH1AeY yqfRuU3xh5UbfkIRxG3+1JCXO4+6VYi7pu+EE92plfdxuV37Eh9vRsu/AvhaUmyM9R27 Vq1tmG6Vedja2BG0lsHyvSdEoOUZaaiXg2G02JHIWrQaeaW9zL10dRKuD4/SM5moGXGn maJY1f/+RHr5ekxuV7mYJq1dC4Yd5sS6HriL/BBrMrbBWP4y+i0MmG6sgBgINbT0iw9O q4SQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=+ZX3pYJ1I/7ebtQwANMInsRgOc/yS6aTn3F+Fk+PiwA=; b=oXxJlpIrf/Jy2YGuaZ6grlybdgT3vPeuIjOBjmFhWQdbIh++NDv7doko+DL1lOHHjp mMYU4we6LAD5BZtpJzrLz1XPlzgrxNjYqoBFCD3RO3h1WYsMy45DBVthNjSonjcD0fTN gBabWZOWoct9WUP8tGJ9crra249bK2q+4k8r+OZpoIT9C+IBaaKCcAVTnIJFwmx9MPk5 kaOySwCp9ZU8jDyZmv5+TE/Ket18yjQnCxndd9740xIr8JbPy9XYX8sThJJO94V1Crtn haDVdL0Wm1esjT8WH5QLsA9BITthfV36JKZm84xTNELulVc/8Iqz3oQwsVtPpTV3HxrQ ixuQ== X-Gm-Message-State: AOAM531iUN2hToGOh80te9SP0HsTJcCE6SFTKCQN1d+jwXTl/yu7wetY 1Ilo79Nla0bEQruhJqa1v7G4SQ== X-Received: by 2002:a5d:4107:: with SMTP id l7mr51155903wrp.209.1636076998744; Thu, 04 Nov 2021 18:49:58 -0700 (PDT) Received: from localhost.localdomain ([2a02:8084:e84:2480:228:f8ff:fe6f:83a8]) by smtp.gmail.com with ESMTPSA id c6sm7202421wmq.46.2021.11.04.18.49.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 04 Nov 2021 18:49:58 -0700 (PDT) From: Dmitry Safonov To: linux-kernel@vger.kernel.org Cc: Dmitry Safonov <0x7f454c46@gmail.com>, Dmitry Safonov , Andy Lutomirski , David Ahern , "David S. Miller" , Eric Dumazet , Francesco Ruggeri , Jakub Kicinski , Herbert Xu , Hideaki YOSHIFUJI , Leonard Crestez , linux-crypto@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH 3/5] tcp/md5: Alloc tcp_md5sig_pool only in setsockopt() Date: Fri, 5 Nov 2021 01:49:51 +0000 Message-Id: <20211105014953.972946-4-dima@arista.com> X-Mailer: git-send-email 2.33.1 In-Reply-To: <20211105014953.972946-1-dima@arista.com> References: <20211105014953.972946-1-dima@arista.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Besides setsockopt() tcp_md5_do_add() can be called from tcp_v4_syn_recv_sock()/tcp_v6_syn_recv_sock(). If it is called from there, tcp_md5_do_lookup() has succeeded, which means that md5 static key is enabled. Which makes this tcp_alloc_md5sig_pool() call to be nop for any caller, but tcp_v4_parse_md5_keys()/tcp_v6_parse_md5_keys(). tcp_alloc_md5sig_pool() can sleep if tcp_md5sig_pool hasn't been populated, so if anything changes tcp_md5_do_add() may start sleeping in atomic context. Let's leave the check for tcp_md5sig_pool in tcp_md5_do_add(), but intentionally call tcp_alloc_md5sig_pool() only from sleepable setsockopt() syscall context. Signed-off-by: Dmitry Safonov --- net/ipv4/tcp_ipv4.c | 5 ++++- net/ipv6/tcp_ipv6.c | 3 +++ 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c index 13d868c43284..6a8ff9ab1cbc 100644 --- a/net/ipv4/tcp_ipv4.c +++ b/net/ipv4/tcp_ipv4.c @@ -1190,7 +1190,7 @@ int tcp_md5_do_add(struct sock *sk, const union tcp_md5_addr *addr, key = sock_kmalloc(sk, sizeof(*key), gfp | __GFP_ZERO); if (!key) return -ENOMEM; - if (!tcp_alloc_md5sig_pool()) { + if (WARN_ON_ONCE(!tcp_md5sig_pool_ready())) { sock_kfree_s(sk, key, sizeof(*key)); return -ENOMEM; } @@ -1294,6 +1294,9 @@ static int tcp_v4_parse_md5_keys(struct sock *sk, int optname, if (cmd.tcpm_keylen > TCP_MD5SIG_MAXKEYLEN) return -EINVAL; + if (!tcp_alloc_md5sig_pool()) + return -ENOMEM; + return tcp_md5_do_add(sk, addr, AF_INET, prefixlen, l3index, flags, cmd.tcpm_key, cmd.tcpm_keylen, GFP_KERNEL); } diff --git a/net/ipv6/tcp_ipv6.c b/net/ipv6/tcp_ipv6.c index 2cc9b0e53ad1..3af13bd6fed0 100644 --- a/net/ipv6/tcp_ipv6.c +++ b/net/ipv6/tcp_ipv6.c @@ -654,6 +654,9 @@ static int tcp_v6_parse_md5_keys(struct sock *sk, int optname, if (cmd.tcpm_keylen > TCP_MD5SIG_MAXKEYLEN) return -EINVAL; + if (!tcp_alloc_md5sig_pool()) + return -ENOMEM; + if (ipv6_addr_v4mapped(&sin6->sin6_addr)) return tcp_md5_do_add(sk, (union tcp_md5_addr *)&sin6->sin6_addr.s6_addr32[3], AF_INET, prefixlen, l3index, flags, -- 2.33.1