From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id BAB44C43381 for ; Mon, 18 Mar 2019 17:25:11 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 8CBFC21741 for ; Mon, 18 Mar 2019 17:25:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552929911; bh=Mzz8h//XVemd9JvhWZByDGydmf26oG3B7E658agQzAE=; h=From:To:Cc:Subject:Date:List-ID:From; b=rx+kJx6cYx+L0TFXDdq37KDtuK79jyMbe80OHaJ3jWGrL46kmhUknlhEZCvyKVLH2 xV+Y+idSfkUIXtZIvt46tBhvCOCNTAXJUW2t3jJK0lc9iPUMM64op90Fwv9wMSakqd 2K6M2G1aX9Z5GcNDcDPq1ZXp/wKa9TwEuqYVyWi0= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727251AbfCRRZK (ORCPT ); Mon, 18 Mar 2019 13:25:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:44918 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726704AbfCRRZK (ORCPT ); Mon, 18 Mar 2019 13:25:10 -0400 Received: from ebiggers-linuxstation.mtv.corp.google.com (unknown [104.132.1.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EDAF920854; Mon, 18 Mar 2019 17:25:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552929910; bh=Mzz8h//XVemd9JvhWZByDGydmf26oG3B7E658agQzAE=; h=From:To:Cc:Subject:Date:From; b=v4L7n7zjF2gIWGTICf/H2ZnIaBHqfwH7Y8DrBz/lVe+RarNW9s+/6k/5b8mF1GtZh U5uiKP9WSPVSePqXsVCC5XrQ2AKjav/HBvHGUSNYdgZ080LZCALol/avT0P7i/r4N/ eUHNc3tF87Sob+QixtKh+wheScW+VUi+j4xkNthY= From: Eric Biggers To: linux-fscrypt@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org Subject: [PATCH] fscrypt: add memory barrier when loading essiv_hash_tfm Date: Mon, 18 Mar 2019 10:24:54 -0700 Message-Id: <20190318172454.240412-1-ebiggers@kernel.org> X-Mailer: git-send-email 2.21.0.225.g810b269d1ac-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-fsdevel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-fsdevel@vger.kernel.org From: Eric Biggers Load 'essiv_hash_tfm' using smp_load_acquire() to guarantee that the struct crypto_shash is seen as fully initialized before being used. Signed-off-by: Eric Biggers --- fs/crypto/keyinfo.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/crypto/keyinfo.c b/fs/crypto/keyinfo.c index ba74dafa18a3..d1f0f8369d51 100644 --- a/fs/crypto/keyinfo.c +++ b/fs/crypto/keyinfo.c @@ -379,7 +379,7 @@ fscrypt_get_master_key(const struct fscrypt_info *ci, struct fscrypt_mode *mode, static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt) { - struct crypto_shash *tfm = READ_ONCE(essiv_hash_tfm); + struct crypto_shash *tfm = smp_load_acquire(&essiv_hash_tfm); /* init hash transform on demand */ if (unlikely(!tfm)) { -- 2.21.0.225.g810b269d1ac-goog