Skip to content

Commit 30aa75d

Browse files
shjalaclaude
authored andcommitted
crypto: af_alg/algif_aead: fix CVE-2026-31431 splice write-to-page-cache
Backport of upstream fix fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8. Fixes: 72548b0 ("crypto: algif_aead - copy AAD from src to dst") CVE: CVE-2026-31431 Signed-off-by: Shahriyar Jalayeri <shahriyar@posteo.de> Co-authored-by: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent a6bc068 commit 30aa75d

4 files changed

Lines changed: 38 additions & 131 deletions

File tree

crypto/af_alg.c

Lines changed: 10 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -524,15 +524,13 @@ static int af_alg_alloc_tsgl(struct sock *sk)
524524
/**
525525
* af_alg_count_tsgl - Count number of TX SG entries
526526
*
527-
* The counting starts from the beginning of the SGL to @bytes. If
528-
* an @offset is provided, the counting of the SG entries starts at the @offset.
527+
* The counting starts from the beginning of the SGL to @bytes.
529528
*
530529
* @sk: socket of connection to user space
531530
* @bytes: Count the number of SG entries holding given number of bytes.
532-
* @offset: Start the counting of SG entries from the given offset.
533531
* Return: Number of TX SG entries found given the constraints
534532
*/
535-
unsigned int af_alg_count_tsgl(struct sock *sk, size_t bytes, size_t offset)
533+
unsigned int af_alg_count_tsgl(struct sock *sk, size_t bytes)
536534
{
537535
const struct alg_sock *ask = alg_sk(sk);
538536
const struct af_alg_ctx *ctx = ask->private;
@@ -547,25 +545,11 @@ unsigned int af_alg_count_tsgl(struct sock *sk, size_t bytes, size_t offset)
547545
const struct scatterlist *sg = sgl->sg;
548546

549547
for (i = 0; i < sgl->cur; i++) {
550-
size_t bytes_count;
551-
552-
/* Skip offset */
553-
if (offset >= sg[i].length) {
554-
offset -= sg[i].length;
555-
bytes -= sg[i].length;
556-
continue;
557-
}
558-
559-
bytes_count = sg[i].length - offset;
560-
561-
offset = 0;
562548
sgl_count++;
563-
564-
/* If we have seen requested number of bytes, stop */
565-
if (bytes_count >= bytes)
549+
if (sg[i].length >= bytes)
566550
return sgl_count;
567551

568-
bytes -= bytes_count;
552+
bytes -= sg[i].length;
569553
}
570554
}
571555

@@ -577,19 +561,14 @@ EXPORT_SYMBOL_GPL(af_alg_count_tsgl);
577561
* af_alg_pull_tsgl - Release the specified buffers from TX SGL
578562
*
579563
* If @dst is non-null, reassign the pages to @dst. The caller must release
580-
* the pages. If @dst_offset is given only reassign the pages to @dst starting
581-
* at the @dst_offset (byte). The caller must ensure that @dst is large
582-
* enough (e.g. by using af_alg_count_tsgl with the same offset).
564+
* the pages.
583565
*
584566
* @sk: socket of connection to user space
585567
* @used: Number of bytes to pull from TX SGL
586568
* @dst: If non-NULL, buffer is reassigned to dst SGL instead of releasing. The
587569
* caller must release the buffers in dst.
588-
* @dst_offset: Reassign the TX SGL from given offset. All buffers before
589-
* reaching the offset is released.
590570
*/
591-
void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst,
592-
size_t dst_offset)
571+
void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst)
593572
{
594573
struct alg_sock *ask = alg_sk(sk);
595574
struct af_alg_ctx *ctx = ask->private;
@@ -614,18 +593,10 @@ void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst,
614593
* SG entries in dst.
615594
*/
616595
if (dst) {
617-
if (dst_offset >= plen) {
618-
/* discard page before offset */
619-
dst_offset -= plen;
620-
} else {
621-
/* reassign page to dst after offset */
622-
get_page(page);
623-
sg_set_page(dst + j, page,
624-
plen - dst_offset,
625-
sg[i].offset + dst_offset);
626-
dst_offset = 0;
627-
j++;
628-
}
596+
/* reassign page to dst after offset */
597+
get_page(page);
598+
sg_set_page(dst + j, page, plen, sg[i].offset);
599+
j++;
629600
}
630601

631602
sg[i].length -= plen;

crypto/algif_aead.c

Lines changed: 23 additions & 86 deletions
Original file line numberDiff line numberDiff line change
@@ -96,9 +96,8 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg,
9696
struct aead_tfm *aeadc = pask->private;
9797
struct crypto_aead *tfm = aeadc->aead;
9898
struct crypto_sync_skcipher *null_tfm = aeadc->null_tfm;
99-
unsigned int i, as = crypto_aead_authsize(tfm);
99+
unsigned int as = crypto_aead_authsize(tfm);
100100
struct af_alg_async_req *areq;
101-
struct af_alg_tsgl *tsgl, *tmp;
102101
struct scatterlist *rsgl_src, *tsgl_src = NULL;
103102
int err = 0;
104103
size_t used = 0; /* [in] TX bufs to be en/decrypted */
@@ -178,23 +177,24 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg,
178177
outlen -= less;
179178
}
180179

180+
/*
181+
* Create a per request TX SGL for this request which tracks the
182+
* SG entries from the global TX SGL.
183+
*/
181184
processed = used + ctx->aead_assoclen;
182-
list_for_each_entry_safe(tsgl, tmp, &ctx->tsgl_list, list) {
183-
for (i = 0; i < tsgl->cur; i++) {
184-
struct scatterlist *process_sg = tsgl->sg + i;
185-
186-
if (!(process_sg->length) || !sg_page(process_sg))
187-
continue;
188-
tsgl_src = process_sg;
189-
break;
190-
}
191-
if (tsgl_src)
192-
break;
193-
}
194-
if (processed && !tsgl_src) {
195-
err = -EFAULT;
185+
areq->tsgl_entries = af_alg_count_tsgl(sk, processed);
186+
if (!areq->tsgl_entries)
187+
areq->tsgl_entries = 1;
188+
areq->tsgl = sock_kmalloc(sk, array_size(sizeof(*areq->tsgl),
189+
areq->tsgl_entries),
190+
GFP_KERNEL);
191+
if (!areq->tsgl) {
192+
err = -ENOMEM;
196193
goto free;
197194
}
195+
sg_init_table(areq->tsgl, areq->tsgl_entries);
196+
af_alg_pull_tsgl(sk, processed, areq->tsgl);
197+
tsgl_src = areq->tsgl;
198198

199199
/*
200200
* Copy of AAD from source to destination
@@ -203,81 +203,18 @@ static int _aead_recvmsg(struct socket *sock, struct msghdr *msg,
203203
* when user space uses an in-place cipher operation, the kernel
204204
* will copy the data as it does not see whether such in-place operation
205205
* is initiated.
206-
*
207-
* To ensure efficiency, the following implementation ensure that the
208-
* ciphers are invoked to perform a crypto operation in-place. This
209-
* is achieved by memory management specified as follows.
210206
*/
211207

212-
/* Use the RX SGL as source (and destination) for crypto op. */
208+
/* Use the RX SGL as destination; TX SGL as crypto source. */
213209
rsgl_src = areq->first_rsgl.sgl.sg;
214210

215-
if (ctx->enc) {
216-
/*
217-
* Encryption operation - The in-place cipher operation is
218-
* achieved by the following operation:
219-
*
220-
* TX SGL: AAD || PT
221-
* | |
222-
* | copy |
223-
* v v
224-
* RX SGL: AAD || PT || Tag
225-
*/
226-
err = crypto_aead_copy_sgl(null_tfm, tsgl_src,
227-
areq->first_rsgl.sgl.sg, processed);
228-
if (err)
229-
goto free;
230-
af_alg_pull_tsgl(sk, processed, NULL, 0);
231-
} else {
232-
/*
233-
* Decryption operation - To achieve an in-place cipher
234-
* operation, the following SGL structure is used:
235-
*
236-
* TX SGL: AAD || CT || Tag
237-
* | | ^
238-
* | copy | | Create SGL link.
239-
* v v |
240-
* RX SGL: AAD || CT ----+
241-
*/
242-
243-
/* Copy AAD || CT to RX SGL buffer for in-place operation. */
244-
err = crypto_aead_copy_sgl(null_tfm, tsgl_src,
245-
areq->first_rsgl.sgl.sg, outlen);
246-
if (err)
247-
goto free;
248-
249-
/* Create TX SGL for tag and chain it to RX SGL. */
250-
areq->tsgl_entries = af_alg_count_tsgl(sk, processed,
251-
processed - as);
252-
if (!areq->tsgl_entries)
253-
areq->tsgl_entries = 1;
254-
areq->tsgl = sock_kmalloc(sk, array_size(sizeof(*areq->tsgl),
255-
areq->tsgl_entries),
256-
GFP_KERNEL);
257-
if (!areq->tsgl) {
258-
err = -ENOMEM;
259-
goto free;
260-
}
261-
sg_init_table(areq->tsgl, areq->tsgl_entries);
262-
263-
/* Release TX SGL, except for tag data and reassign tag data. */
264-
af_alg_pull_tsgl(sk, processed, areq->tsgl, processed - as);
265-
266-
/* chain the areq TX SGL holding the tag with RX SGL */
267-
if (usedpages) {
268-
/* RX SGL present */
269-
struct af_alg_sgl *sgl_prev = &areq->last_rsgl->sgl;
270-
271-
sg_unmark_end(sgl_prev->sg + sgl_prev->npages - 1);
272-
sg_chain(sgl_prev->sg, sgl_prev->npages + 1,
273-
areq->tsgl);
274-
} else
275-
/* no RX SGL present (e.g. authentication only) */
276-
rsgl_src = areq->tsgl;
277-
}
211+
err = crypto_aead_copy_sgl(null_tfm, tsgl_src, rsgl_src,
212+
ctx->aead_assoclen);
213+
if (err)
214+
goto free;
278215

279216
/* Initialize the crypto operation */
280-
aead_request_set_crypt(&areq->cra_u.aead_req, rsgl_src,
217+
aead_request_set_crypt(&areq->cra_u.aead_req, tsgl_src,
281218
areq->first_rsgl.sgl.sg, used, ctx->iv);
282219
aead_request_set_ad(&areq->cra_u.aead_req, ctx->aead_assoclen);
283220
aead_request_set_tfm(&areq->cra_u.aead_req, tfm);
@@ -526,7 +463,7 @@ static void aead_sock_destruct(struct sock *sk)
526463
struct crypto_aead *tfm = aeadc->aead;
527464
unsigned int ivlen = crypto_aead_ivsize(tfm);
528465

529-
af_alg_pull_tsgl(sk, ctx->used, NULL, 0);
466+
af_alg_pull_tsgl(sk, ctx->used, NULL);
530467
sock_kzfree_s(sk, ctx->iv, ivlen);
531468
sock_kfree_s(sk, ctx, ctx->len);
532469
af_alg_release_parent(sk);

crypto/algif_skcipher.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg,
8989
* Create a per request TX SGL for this request which tracks the
9090
* SG entries from the global TX SGL.
9191
*/
92-
areq->tsgl_entries = af_alg_count_tsgl(sk, len, 0);
92+
areq->tsgl_entries = af_alg_count_tsgl(sk, len);
9393
if (!areq->tsgl_entries)
9494
areq->tsgl_entries = 1;
9595
areq->tsgl = sock_kmalloc(sk, array_size(sizeof(*areq->tsgl),
@@ -100,7 +100,7 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg,
100100
goto free;
101101
}
102102
sg_init_table(areq->tsgl, areq->tsgl_entries);
103-
af_alg_pull_tsgl(sk, len, areq->tsgl, 0);
103+
af_alg_pull_tsgl(sk, len, areq->tsgl);
104104

105105
/* Initialize the crypto operation */
106106
skcipher_request_set_tfm(&areq->cra_u.skcipher_req, tfm);
@@ -313,7 +313,7 @@ static void skcipher_sock_destruct(struct sock *sk)
313313
struct alg_sock *pask = alg_sk(psk);
314314
struct crypto_skcipher *tfm = pask->private;
315315

316-
af_alg_pull_tsgl(sk, ctx->used, NULL, 0);
316+
af_alg_pull_tsgl(sk, ctx->used, NULL);
317317
sock_kzfree_s(sk, ctx->iv, crypto_skcipher_ivsize(tfm));
318318
sock_kfree_s(sk, ctx, ctx->len);
319319
af_alg_release_parent(sk);

include/crypto/if_alg.h

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -228,9 +228,8 @@ static inline bool af_alg_readable(struct sock *sk)
228228
return PAGE_SIZE <= af_alg_rcvbuf(sk);
229229
}
230230

231-
unsigned int af_alg_count_tsgl(struct sock *sk, size_t bytes, size_t offset);
232-
void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst,
233-
size_t dst_offset);
231+
unsigned int af_alg_count_tsgl(struct sock *sk, size_t bytes);
232+
void af_alg_pull_tsgl(struct sock *sk, size_t used, struct scatterlist *dst);
234233
void af_alg_wmem_wakeup(struct sock *sk);
235234
int af_alg_wait_for_data(struct sock *sk, unsigned flags, unsigned min);
236235
int af_alg_sendmsg(struct socket *sock, struct msghdr *msg, size_t size,

0 commit comments

Comments
 (0)