Merge pull request #8912 from Ryan-Everett-arm/double-destroy-key-bugfix

Fix threading bug when multiple destroy_key calls run on the same key
This commit is contained in:
Paul Elliott 2024-03-11 12:04:04 +00:00 committed by GitHub
commit a09b01b5a8
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -1101,6 +1101,17 @@ psa_status_t psa_destroy_key(mbedtls_svc_key_id_t key)
* fully destroyed. */
PSA_THREADING_CHK_GOTO_EXIT(mbedtls_mutex_lock(
&mbedtls_threading_key_slot_mutex));
if (slot->state == PSA_SLOT_PENDING_DELETION) {
/* Another thread has destroyed the key between us locking the slot
* and us gaining the mutex. Unregister from the slot,
* and report that the key does not exist. */
status = psa_unregister_read(slot);
PSA_THREADING_CHK_RET(mbedtls_mutex_unlock(
&mbedtls_threading_key_slot_mutex));
return (status == PSA_SUCCESS) ? PSA_ERROR_INVALID_HANDLE : status;
}
#endif
/* Set the key slot containing the key description's state to
* PENDING_DELETION. This stops new operations from registering
@ -1110,10 +1121,10 @@ psa_status_t psa_destroy_key(mbedtls_svc_key_id_t key)
* If the key is persistent, we can now delete the copy of the key
* from memory. If the key is opaque, we require the driver to
* deal with the deletion. */
status = psa_key_slot_state_transition(slot, PSA_SLOT_FULL,
PSA_SLOT_PENDING_DELETION);
overall_status = psa_key_slot_state_transition(slot, PSA_SLOT_FULL,
PSA_SLOT_PENDING_DELETION);
if (status != PSA_SUCCESS) {
if (overall_status != PSA_SUCCESS) {
goto exit;
}