diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2014-11-27 22:38:12 +0800 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2014-11-28 23:33:18 +0800 |
commit | 1e104f9a251b46787c3efc2bc9c8c496dead294b (patch) | |
tree | 1fb643e0ec624eb1e2145a6411407f8d27a4e4ce /crypto/memneq.c | |
parent | 421d82f5b3e75f94e31875e37d45cdf6a557c120 (diff) | |
download | linux-1e104f9a251b46787c3efc2bc9c8c496dead294b.tar.bz2 |
crypto: algif_skcipher - Fixed blocking recvmsg
As most (all?) users of algif_skcipher are single-threaded and
therefore always write before reading from an algif_skcipher
socket, they never block and exercise that code-path.
It turns out that code path doesn't even work because we never
reload ctx->used after waking up so we never even see the new
data and immediately return an error (and a loud WARN_ON).
This patch fixes this by always reloading ctx->used.
Reported-by: Stephan Mueller <smueller@chronox.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Acked-by: Stephan Mueller <smueller@chronox.de>
Diffstat (limited to 'crypto/memneq.c')
0 files changed, 0 insertions, 0 deletions