[Bug 275306] 14.0-RELEASE: ossl(4) causes data corruption on encrypted ZFS filesystems/volumes

From: <bugzilla-noreply_at_freebsd.org>
Date: Sat, 02 Dec 2023 19:29:25 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275306

--- Comment #18 from commit-hook@FreeBSD.org ---
A commit in branch stable/14 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=84ef0a84ecaa4f5d9bcfed3ce10c288953491e7e

commit 84ef0a84ecaa4f5d9bcfed3ce10c288953491e7e
Author:     Mark Johnston <markj@FreeBSD.org>
AuthorDate: 2023-11-29 17:51:55 +0000
Commit:     Mark Johnston <markj@FreeBSD.org>
CommitDate: 2023-12-02 19:25:42 +0000

    ossl: Keep mutable AES-GCM state on the stack

    ossl(4)'s AES-GCM implementation keeps mutable state in the session
    structure, together with the key schedule.  This was done for
    convenience, as both are initialized together.  However, some OCF
    consumers, particularly ZFS, assume that requests may be dispatched to
    the same session in parallel.  Without serialization, this results in
    incorrect output.

    Fix the problem by explicitly copying per-session state onto the stack
    at the beginning of each operation.

    PR:             275306
    Reviewed by:    jhb
    Fixes:          9a3444d91c70 ("ossl: Add a VAES-based AES-GCM
implementation for amd64")
    MFC after:      3 days
    Differential Revision:  https://reviews.freebsd.org/D42783

    (cherry picked from commit 5c0dac0b7a012f326edab06ad85aee5ad68ff120)

 sys/crypto/openssl/ossl_aes.c | 29 +++++++++++++++--------------
 1 file changed, 15 insertions(+), 14 deletions(-)

-- 
You are receiving this mail because:
You are the assignee for the bug.