Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp2307905imm; Wed, 16 May 2018 10:50:31 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpzLwzzGjN1ansMNTN3nqy0mQzifqkD6HFsEIzRJfznJMt/1FlF3a9w5+Ck9Jp5oUxDGdY5 X-Received: by 2002:a62:f20d:: with SMTP id m13-v6mr1948656pfh.170.1526493031629; Wed, 16 May 2018 10:50:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526493031; cv=none; d=google.com; s=arc-20160816; b=JxMqZvyAplYencA3Y3bnIkubmiwfyJMmQxDvruOFaWLyiwXuJKi79yjEqDy/eCA4vf bYDU0EvdksUUvv6QOAPk5oh20va095TO21JbQwoGWHLLmFyc0iz21cOwO+O251RH04Mc GORbpd+C6P4tSfWNeZce93RGKMngPvOPg4ZNo9wQUB4uukc0PXdGvGnh7yJpUL34eh81 Wr3E69wxN449I0SDSMYUpzMpCoWs5ga8zkv0DqfPtrMOOwXkJsw0tTRI4C//dGm2SCUP gFYM3ynFYXoyK1icKoYCfZANaQxJ15zE/BMMOD4kSUlR2VwT7WcIENjQ8ZccZBJ43Bj2 9+fg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from:dkim-signature:arc-authentication-results; bh=WWe2k/AkJ9gZsfjTQ9WTZT3cOlXi94DCq8OiLqieqLA=; b=rPOXaP5HgSPtbFE9zfhksTWde9cDkHLI1pbMOyUrlKAGmOss+jfKZ0h1107shga5Vg Fa79QiamE/QmZrC2sce6CNt+O2qhqiROzCsuvYijvfS3RfnW52DiQPTz7hzh7szzLODO zXE7BrG8cHQG+eYEH/x4sPCcZ+CRfaRoPbYdl6hLO/LwyLPsx9fkcD/SQ1GLqrprEbsH 1LF7f2wss4nJ1Iamr5Y0cMT+7rdM3hJEBJ1QJYkq+MRT19QtRKidSC/lG98+tGujdAsI pZu7xWgdo352Iia5tO7eRw45Xey3AKLbRUTla+SA1Jotm28R0LivoC+zLz3/SRMBis2E 6ryA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=HWBAWEVT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v8-v6si2991889plg.491.2018.05.16.10.50.16; Wed, 16 May 2018 10:50:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=HWBAWEVT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751665AbeEPRs6 (ORCPT + 99 others); Wed, 16 May 2018 13:48:58 -0400 Received: from mx0b-00082601.pphosted.com ([67.231.153.30]:51224 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751225AbeEPRs4 (ORCPT ); Wed, 16 May 2018 13:48:56 -0400 Received: from pps.filterd (m0001303.ppops.net [127.0.0.1]) by m0001303.ppops.net (8.16.0.22/8.16.0.22) with SMTP id w4GHfhaF022267 for ; Wed, 16 May 2018 10:48:56 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : cc : subject : date : message-id : mime-version : content-type; s=facebook; bh=WWe2k/AkJ9gZsfjTQ9WTZT3cOlXi94DCq8OiLqieqLA=; b=HWBAWEVTKFfhC3n5+eypyJ9zu4pQZzC0lh0rey/ng5YSgRQ8NaMu0J9DbMvqEcE1ACVr wrpWwZ1JajR3va5c2XbEizV9yt5fJzYSEMsNqrjs41Burw9bQGvC6r7wi+YOr7lIV5Ct dMB6POvD+vNz08a/yThruUeatzfNADI5gWE= Received: from mail.thefacebook.com ([199.201.64.23]) by m0001303.ppops.net with ESMTP id 2j0fsahhaq-3 (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT) for ; Wed, 16 May 2018 10:48:55 -0700 Received: from mx-out.facebook.com (192.168.52.123) by PRN-CHUB03.TheFacebook.com (192.168.16.13) with Microsoft SMTP Server (TLS) id 14.3.361.1; Wed, 16 May 2018 10:48:53 -0700 Received: from mmullins-1.thefacebook.com (2620:10d:c082:10e2::706) by mx-out.facebook.com (2401:db00:2120:80e1:face:0000:0029:0000) with ESMTP id 65d8a282593111e8b2a5ec0d9ac96070-29d03b18 for ; Wed, 16 May 2018 10:48:53 -0700 From: Matt Mullins To: "David S. Miller" CC: Matt Mullins , Ilya Lesokhin , Aviad Yehezkel , Dave Watson , , Subject: [PATCH net] tls: don't use stack memory in a scatterlist Date: Wed, 16 May 2018 10:48:40 -0700 Message-ID: <20180516174841.2119-1-mmullins@fb.com> X-Mailer: git-send-email 2.14.1 X-FB-Internal: Safe MIME-Version: 1.0 Content-Type: text/plain X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-05-16_09:,, signatures=0 X-Proofpoint-Spam-Reason: safe X-FB-Internal: Safe Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org scatterlist code expects virt_to_page() to work, which fails with CONFIG_VMAP_STACK=y. Fixes: c46234ebb4d1e ("tls: RX path for ktls") Signed-off-by: Matt Mullins --- include/net/tls.h | 3 +++ net/tls/tls_sw.c | 9 ++++----- 2 files changed, 7 insertions(+), 5 deletions(-) diff --git a/include/net/tls.h b/include/net/tls.h index b400d0bb7448..f5fb16da3860 100644 --- a/include/net/tls.h +++ b/include/net/tls.h @@ -97,6 +97,9 @@ struct tls_sw_context { u8 control; bool decrypted; + char rx_aad_ciphertext[TLS_AAD_SPACE_SIZE]; + char rx_aad_plaintext[TLS_AAD_SPACE_SIZE]; + /* Sending context */ char aad_space[TLS_AAD_SPACE_SIZE]; diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c index 71e79597f940..e1c93ce74e0f 100644 --- a/net/tls/tls_sw.c +++ b/net/tls/tls_sw.c @@ -680,7 +680,6 @@ static int decrypt_skb(struct sock *sk, struct sk_buff *skb, struct scatterlist *sgin = &sgin_arr[0]; struct strp_msg *rxm = strp_msg(skb); int ret, nsg = ARRAY_SIZE(sgin_arr); - char aad_recv[TLS_AAD_SPACE_SIZE]; struct sk_buff *unused; ret = skb_copy_bits(skb, rxm->offset + TLS_HEADER_SIZE, @@ -698,13 +697,13 @@ static int decrypt_skb(struct sock *sk, struct sk_buff *skb, } sg_init_table(sgin, nsg); - sg_set_buf(&sgin[0], aad_recv, sizeof(aad_recv)); + sg_set_buf(&sgin[0], ctx->rx_aad_ciphertext, TLS_AAD_SPACE_SIZE); nsg = skb_to_sgvec(skb, &sgin[1], rxm->offset + tls_ctx->rx.prepend_size, rxm->full_len - tls_ctx->rx.prepend_size); - tls_make_aad(aad_recv, + tls_make_aad(ctx->rx_aad_ciphertext, rxm->full_len - tls_ctx->rx.overhead_size, tls_ctx->rx.rec_seq, tls_ctx->rx.rec_seq_size, @@ -803,12 +802,12 @@ int tls_sw_recvmsg(struct sock *sk, if (to_copy <= len && page_count < MAX_SKB_FRAGS && likely(!(flags & MSG_PEEK))) { struct scatterlist sgin[MAX_SKB_FRAGS + 1]; - char unused[21]; int pages = 0; zc = true; sg_init_table(sgin, MAX_SKB_FRAGS + 1); - sg_set_buf(&sgin[0], unused, 13); + sg_set_buf(&sgin[0], ctx->rx_aad_plaintext, + TLS_AAD_SPACE_SIZE); err = zerocopy_from_iter(sk, &msg->msg_iter, to_copy, &pages, -- 2.14.1