提交 73ef73f6 编写于 作者: E Eric Biggers 提交者: Zheng Zengkai

random: fix data race on crng_node_pool

stable inclusion
from stable-v5.10.92
commit 3de9478230c3e3ae0ae599847ca2ac6b7781e780
bugzilla: 186193 https://gitee.com/openeuler/kernel/issues/I53108

Reference: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3de9478230c3e3ae0ae599847ca2ac6b7781e780

--------------------------------

commit 5d73d1e3 upstream.

extract_crng() and crng_backtrack_protect() load crng_node_pool with a
plain load, which causes undefined behavior if do_numa_crng_init()
modifies it concurrently.

Fix this by using READ_ONCE().  Note: as per the previous discussion
https://lore.kernel.org/lkml/20211219025139.31085-1-ebiggers@kernel.org/T/#u,
READ_ONCE() is believed to be sufficient here, and it was requested that
it be used here instead of smp_load_acquire().

Also change do_numa_crng_init() to set crng_node_pool using
cmpxchg_release() instead of mb() + cmpxchg(), as the former is
sufficient here but is more lightweight.

Fixes: 1e7f583a ("random: make /dev/urandom scalable for silly userspace programs")
Cc: stable@vger.kernel.org
Signed-off-by: NEric Biggers <ebiggers@google.com>
Acked-by: NPaul E. McKenney <paulmck@kernel.org>
Signed-off-by: NJason A. Donenfeld <Jason@zx2c4.com>
Signed-off-by: NGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: NChen Jun <chenjun102@huawei.com>
Signed-off-by: NZheng Zengkai <zhengzengkai@huawei.com>
Acked-by: NXie XiuQi <xiexiuqi@huawei.com>
上级 1f204b00
...@@ -853,8 +853,8 @@ static void do_numa_crng_init(struct work_struct *work) ...@@ -853,8 +853,8 @@ static void do_numa_crng_init(struct work_struct *work)
crng_initialize_secondary(crng); crng_initialize_secondary(crng);
pool[i] = crng; pool[i] = crng;
} }
mb(); /* pairs with READ_ONCE() in select_crng() */
if (cmpxchg(&crng_node_pool, NULL, pool)) { if (cmpxchg_release(&crng_node_pool, NULL, pool) != NULL) {
for_each_node(i) for_each_node(i)
kfree(pool[i]); kfree(pool[i]);
kfree(pool); kfree(pool);
...@@ -867,8 +867,26 @@ static void numa_crng_init(void) ...@@ -867,8 +867,26 @@ static void numa_crng_init(void)
{ {
schedule_work(&numa_crng_init_work); schedule_work(&numa_crng_init_work);
} }
static struct crng_state *select_crng(void)
{
struct crng_state **pool;
int nid = numa_node_id();
/* pairs with cmpxchg_release() in do_numa_crng_init() */
pool = READ_ONCE(crng_node_pool);
if (pool && pool[nid])
return pool[nid];
return &primary_crng;
}
#else #else
static void numa_crng_init(void) {} static void numa_crng_init(void) {}
static struct crng_state *select_crng(void)
{
return &primary_crng;
}
#endif #endif
/* /*
...@@ -1015,15 +1033,7 @@ static void _extract_crng(struct crng_state *crng, ...@@ -1015,15 +1033,7 @@ static void _extract_crng(struct crng_state *crng,
static void extract_crng(__u8 out[CHACHA_BLOCK_SIZE]) static void extract_crng(__u8 out[CHACHA_BLOCK_SIZE])
{ {
struct crng_state *crng = NULL; _extract_crng(select_crng(), out);
#ifdef CONFIG_NUMA
if (crng_node_pool)
crng = crng_node_pool[numa_node_id()];
if (crng == NULL)
#endif
crng = &primary_crng;
_extract_crng(crng, out);
} }
/* /*
...@@ -1052,15 +1062,7 @@ static void _crng_backtrack_protect(struct crng_state *crng, ...@@ -1052,15 +1062,7 @@ static void _crng_backtrack_protect(struct crng_state *crng,
static void crng_backtrack_protect(__u8 tmp[CHACHA_BLOCK_SIZE], int used) static void crng_backtrack_protect(__u8 tmp[CHACHA_BLOCK_SIZE], int used)
{ {
struct crng_state *crng = NULL; _crng_backtrack_protect(select_crng(), tmp, used);
#ifdef CONFIG_NUMA
if (crng_node_pool)
crng = crng_node_pool[numa_node_id()];
if (crng == NULL)
#endif
crng = &primary_crng;
_crng_backtrack_protect(crng, tmp, used);
} }
static ssize_t extract_crng_user(void __user *buf, size_t nbytes) static ssize_t extract_crng_user(void __user *buf, size_t nbytes)
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册