crypto: api - Add crypto_request_clone and fb
authorHerbert Xu <herbert@gondor.apana.org.au>
Wed, 23 Apr 2025 09:22:28 +0000 (17:22 +0800)
committerHerbert Xu <herbert@gondor.apana.org.au>
Mon, 28 Apr 2025 11:40:54 +0000 (19:40 +0800)
Add a helper to clone crypto requests and eliminate code duplication.
Use kmemdup in the helper.

Also add an fb field to crypto_tfm.

This also happens to fix the existing implementations which were
buggy.

Reported-by: kernel test robot <lkp@intel.com>
Closes: https://lore.kernel.org/oe-kbuild-all/202504230118.1CxUaUoX-lkp@intel.com/
Reported-by: kernel test robot <lkp@intel.com>
Closes: https://lore.kernel.org/oe-kbuild-all/202504230004.c7mrY0C6-lkp@intel.com/
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
crypto/acompress.c
crypto/ahash.c
crypto/api.c
include/crypto/acompress.h
include/crypto/hash.h
include/crypto/internal/acompress.h
include/crypto/internal/hash.h
include/linux/crypto.h

index 4c665c6fb5d63102942ce4821e7c037dbaa0e97c..9dea76ed451358297133fd8da1e255204a4cc16f 100644 (file)
 #include <crypto/scatterwalk.h>
 #include <linux/cryptouser.h>
 #include <linux/cpumask.h>
-#include <linux/errno.h>
+#include <linux/err.h>
 #include <linux/kernel.h>
 #include <linux/module.h>
-#include <linux/page-flags.h>
 #include <linux/percpu.h>
 #include <linux/scatterlist.h>
 #include <linux/sched.h>
 #include <linux/seq_file.h>
-#include <linux/slab.h>
 #include <linux/smp.h>
 #include <linux/spinlock.h>
 #include <linux/string.h>
@@ -79,7 +77,7 @@ static void crypto_acomp_exit_tfm(struct crypto_tfm *tfm)
                alg->exit(acomp);
 
        if (acomp_is_async(acomp))
-               crypto_free_acomp(acomp->fb);
+               crypto_free_acomp(crypto_acomp_fb(acomp));
 }
 
 static int crypto_acomp_init_tfm(struct crypto_tfm *tfm)
@@ -89,8 +87,6 @@ static int crypto_acomp_init_tfm(struct crypto_tfm *tfm)
        struct crypto_acomp *fb = NULL;
        int err;
 
-       acomp->fb = acomp;
-
        if (tfm->__crt_alg->cra_type != &crypto_acomp_type)
                return crypto_init_scomp_ops_async(tfm);
 
@@ -104,7 +100,7 @@ static int crypto_acomp_init_tfm(struct crypto_tfm *tfm)
                if (crypto_acomp_reqsize(fb) > MAX_SYNC_COMP_REQSIZE)
                        goto out_free_fb;
 
-               acomp->fb = fb;
+               tfm->fb = crypto_acomp_tfm(fb);
        }
 
        acomp->compress = alg->compress;
@@ -570,24 +566,5 @@ int acomp_walk_virt(struct acomp_walk *__restrict walk,
 }
 EXPORT_SYMBOL_GPL(acomp_walk_virt);
 
-struct acomp_req *acomp_request_clone(struct acomp_req *req,
-                                     size_t total, gfp_t gfp)
-{
-       struct crypto_acomp *tfm = crypto_acomp_reqtfm(req);
-       struct acomp_req *nreq;
-
-       nreq = kmalloc(total, gfp);
-       if (!nreq) {
-               acomp_request_set_tfm(req, tfm->fb);
-               req->base.flags = CRYPTO_TFM_REQ_ON_STACK;
-               return req;
-       }
-
-       memcpy(nreq, req, total);
-       acomp_request_set_tfm(req, tfm);
-       return req;
-}
-EXPORT_SYMBOL_GPL(acomp_request_clone);
-
 MODULE_LICENSE("GPL");
 MODULE_DESCRIPTION("Asynchronous compression type");
index 7a74092323b9017c2e0874b2c779c117d0f39486..9b813f7b9177db910ebc3aefdf3530e78e94da22 100644 (file)
  * Copyright (c) 2008 Loc Ho <lho@amcc.com>
  */
 
-#include <crypto/scatterwalk.h>
 #include <linux/cryptouser.h>
 #include <linux/err.h>
 #include <linux/kernel.h>
 #include <linux/mm.h>
 #include <linux/module.h>
-#include <linux/sched.h>
 #include <linux/slab.h>
 #include <linux/seq_file.h>
 #include <linux/string.h>
@@ -301,7 +299,8 @@ int crypto_ahash_setkey(struct crypto_ahash *tfm, const u8 *key,
 
                err = alg->setkey(tfm, key, keylen);
                if (!err && ahash_is_async(tfm))
-                       err = crypto_ahash_setkey(tfm->fb, key, keylen);
+                       err = crypto_ahash_setkey(crypto_ahash_fb(tfm),
+                                                 key, keylen);
                if (unlikely(err)) {
                        ahash_set_needkey(tfm, alg);
                        return err;
@@ -732,7 +731,7 @@ static void crypto_ahash_exit_tfm(struct crypto_tfm *tfm)
                tfm->__crt_alg->cra_exit(tfm);
 
        if (ahash_is_async(hash))
-               crypto_free_ahash(hash->fb);
+               crypto_free_ahash(crypto_ahash_fb(hash));
 }
 
 static int crypto_ahash_init_tfm(struct crypto_tfm *tfm)
@@ -745,8 +744,6 @@ static int crypto_ahash_init_tfm(struct crypto_tfm *tfm)
        crypto_ahash_set_statesize(hash, alg->halg.statesize);
        crypto_ahash_set_reqsize(hash, crypto_tfm_alg_reqsize(tfm));
 
-       hash->fb = hash;
-
        if (tfm->__crt_alg->cra_type == &crypto_shash_type)
                return crypto_init_ahash_using_shash(tfm);
 
@@ -756,7 +753,7 @@ static int crypto_ahash_init_tfm(struct crypto_tfm *tfm)
                if (IS_ERR(fb))
                        return PTR_ERR(fb);
 
-               hash->fb = fb;
+               tfm->fb = crypto_ahash_tfm(fb);
        }
 
        ahash_set_needkey(hash, alg);
@@ -1036,7 +1033,7 @@ EXPORT_SYMBOL_GPL(ahash_request_free);
 int crypto_hash_digest(struct crypto_ahash *tfm, const u8 *data,
                       unsigned int len, u8 *out)
 {
-       HASH_REQUEST_ON_STACK(req, tfm->fb);
+       HASH_REQUEST_ON_STACK(req, crypto_ahash_fb(tfm));
        int err;
 
        ahash_request_set_callback(req, 0, NULL, NULL);
@@ -1049,24 +1046,5 @@ int crypto_hash_digest(struct crypto_ahash *tfm, const u8 *data,
 }
 EXPORT_SYMBOL_GPL(crypto_hash_digest);
 
-struct ahash_request *ahash_request_clone(struct ahash_request *req,
-                                         size_t total, gfp_t gfp)
-{
-       struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
-       struct ahash_request *nreq;
-
-       nreq = kmalloc(total, gfp);
-       if (!nreq) {
-               ahash_request_set_tfm(req, tfm->fb);
-               req->base.flags = CRYPTO_TFM_REQ_ON_STACK;
-               return req;
-       }
-
-       memcpy(nreq, req, total);
-       ahash_request_set_tfm(req, tfm);
-       return req;
-}
-EXPORT_SYMBOL_GPL(ahash_request_clone);
-
 MODULE_LICENSE("GPL");
 MODULE_DESCRIPTION("Asynchronous cryptographic hash type");
index e427cc5662b5e5552267f2b2941c796e17aa5bc4..172e82f79c69a7fb79fd5dbab24fd8904b248e75 100644 (file)
@@ -528,6 +528,7 @@ void *crypto_create_tfm_node(struct crypto_alg *alg,
                goto out;
 
        tfm = (struct crypto_tfm *)(mem + frontend->tfmsize);
+       tfm->fb = tfm;
 
        err = frontend->init_tfm(tfm);
        if (err)
@@ -712,5 +713,22 @@ void crypto_destroy_alg(struct crypto_alg *alg)
 }
 EXPORT_SYMBOL_GPL(crypto_destroy_alg);
 
+struct crypto_async_request *crypto_request_clone(
+       struct crypto_async_request *req, size_t total, gfp_t gfp)
+{
+       struct crypto_tfm *tfm = req->tfm;
+       struct crypto_async_request *nreq;
+
+       nreq = kmemdup(req, total, gfp);
+       if (!nreq) {
+               req->tfm = tfm->fb;
+               return req;
+       }
+
+       nreq->flags &= ~CRYPTO_TFM_REQ_ON_STACK;
+       return nreq;
+}
+EXPORT_SYMBOL_GPL(crypto_request_clone);
+
 MODULE_DESCRIPTION("Cryptographic core API");
 MODULE_LICENSE("GPL");
index 1b30290d63805da4fb1e6cd765252405f55df338..933c48a4855bcae0977a457b5193e3f2b012d8b7 100644 (file)
@@ -114,7 +114,6 @@ struct crypto_acomp {
        int (*compress)(struct acomp_req *req);
        int (*decompress)(struct acomp_req *req);
        unsigned int reqsize;
-       struct crypto_acomp *fb;
        struct crypto_tfm base;
 };
 
@@ -553,7 +552,11 @@ static inline struct acomp_req *acomp_request_on_stack_init(
        return req;
 }
 
-struct acomp_req *acomp_request_clone(struct acomp_req *req,
-                                     size_t total, gfp_t gfp);
+static inline struct acomp_req *acomp_request_clone(struct acomp_req *req,
+                                                   size_t total, gfp_t gfp)
+{
+       return container_of(crypto_request_clone(&req->base, total, gfp),
+                           struct acomp_req, base);
+}
 
 #endif
index 5f87d1040a7c78da6c518459882009afd95af024..68813a83443bcd21cf2990440f21a47fd7159189 100644 (file)
@@ -246,7 +246,6 @@ struct crypto_ahash {
        bool using_shash; /* Underlying algorithm is shash, not ahash */
        unsigned int statesize;
        unsigned int reqsize;
-       struct crypto_ahash *fb;
        struct crypto_tfm base;
 };
 
@@ -1035,7 +1034,11 @@ static inline struct ahash_request *ahash_request_on_stack_init(
        return req;
 }
 
-struct ahash_request *ahash_request_clone(struct ahash_request *req,
-                                         size_t total, gfp_t gfp);
+static inline struct ahash_request *ahash_request_clone(
+       struct ahash_request *req, size_t total, gfp_t gfp)
+{
+       return container_of(crypto_request_clone(&req->base, total, gfp),
+                           struct ahash_request, base);
+}
 
 #endif /* _CRYPTO_HASH_H */
index 7eda3261902444180fdafc3a7a35d9da73784318..6550dad18e0fbbd7bdcf3b058c6cdc0f54ce1b54 100644 (file)
@@ -220,13 +220,18 @@ static inline u32 acomp_request_flags(struct acomp_req *req)
        return crypto_request_flags(&req->base) & ~CRYPTO_ACOMP_REQ_PRIVATE;
 }
 
+static inline struct crypto_acomp *crypto_acomp_fb(struct crypto_acomp *tfm)
+{
+       return __crypto_acomp_tfm(crypto_acomp_tfm(tfm)->fb);
+}
+
 static inline struct acomp_req *acomp_fbreq_on_stack_init(
        char *buf, struct acomp_req *old)
 {
        struct crypto_acomp *tfm = crypto_acomp_reqtfm(old);
        struct acomp_req *req = (void *)buf;
 
-       acomp_request_set_tfm(req, tfm->fb);
+       acomp_request_set_tfm(req, crypto_acomp_fb(tfm));
        req->base.flags = CRYPTO_TFM_REQ_ON_STACK;
        acomp_request_set_callback(req, acomp_request_flags(old), NULL, NULL);
        req->base.flags &= ~CRYPTO_ACOMP_REQ_PRIVATE;
index 1e80dd084a231a2a79ea73864fccc1767d8d6493..0bc0fefc9b3c7384828abd1016addae53f86d88c 100644 (file)
@@ -272,13 +272,18 @@ static inline bool crypto_ahash_req_chain(struct crypto_ahash *tfm)
        return crypto_tfm_req_chain(&tfm->base);
 }
 
+static inline struct crypto_ahash *crypto_ahash_fb(struct crypto_ahash *tfm)
+{
+       return __crypto_ahash_cast(crypto_ahash_tfm(tfm)->fb);
+}
+
 static inline struct ahash_request *ahash_fbreq_on_stack_init(
        char *buf, struct ahash_request *old)
 {
        struct crypto_ahash *tfm = crypto_ahash_reqtfm(old);
        struct ahash_request *req = (void *)buf;
 
-       ahash_request_set_tfm(req, tfm->fb);
+       ahash_request_set_tfm(req, crypto_ahash_fb(tfm));
        req->base.flags = CRYPTO_TFM_REQ_ON_STACK;
        ahash_request_set_callback(req, ahash_request_flags(old), NULL, NULL);
        req->base.flags &= ~CRYPTO_AHASH_REQ_PRIVATE;
index f691ce01745eeb868bb1a97aa8eb87d1a4e58520..fe75320ff9a35c5be28395538b97ecc55e839fc6 100644 (file)
@@ -14,7 +14,7 @@
 
 #include <linux/completion.h>
 #include <linux/errno.h>
-#include <linux/refcount.h>
+#include <linux/refcount_types.h>
 #include <linux/slab.h>
 #include <linux/types.h>
 
@@ -411,9 +411,11 @@ struct crypto_tfm {
        u32 crt_flags;
 
        int node;
-       
+
+       struct crypto_tfm *fb;
+
        void (*exit)(struct crypto_tfm *tfm);
-       
+
        struct crypto_alg *__crt_alg;
 
        void *__crt_ctx[] CRYPTO_MINALIGN_ATTR;
@@ -509,5 +511,8 @@ static inline void crypto_request_set_tfm(struct crypto_async_request *req,
        req->flags &= ~CRYPTO_TFM_REQ_ON_STACK;
 }
 
+struct crypto_async_request *crypto_request_clone(
+       struct crypto_async_request *req, size_t total, gfp_t gfp);
+
 #endif /* _LINUX_CRYPTO_H */