Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp317396imm; Thu, 27 Sep 2018 22:09:21 -0700 (PDT) X-Google-Smtp-Source: ACcGV61EygCQP38212TCMqycP9kCbzFyFIMV9QqBznzFZIHc6Uv9FqW5ucayefVEJ+tBQdCp86Oq X-Received: by 2002:a65:4242:: with SMTP id d2-v6mr13211436pgq.265.1538111361133; Thu, 27 Sep 2018 22:09:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538111361; cv=none; d=google.com; s=arc-20160816; b=WuHmQ69mdS4ZvfpCH5IrccFS8m6gebZ+qq2o5RGmo2A2pnzKEnQCRqHTkA6YGvH/AW CBwvh3rqKTKWW3fvh4kN9gchJbVNCKYKJZ+HXmh+L+g5PMvVDN/7QfG/6tYlRrd+tmam qbF+VSykzH5Ow4R4gqXtK2godKXck2lxlwbdoNq4TLr5upFUCiniG1kSzVABIxi5uetf lKioJS/LGoerqLvbphO4Qshm9zfx/G8GjOlR7T2jZQNMHEY0QsOwF+5GBY6+jnHQmvk0 deAzWLMnE/dtfT/okCEQbfmKzxmT1+tOHLODq/RRGBDl3OvxbLq5ygdMM3BZt0cjrACZ q8Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=HF46CzgcbcymPPAukeRDeE3OqI+4h8KcsE742H67uQU=; b=na8n1Hls4yFj8+PRFn0WEzMPOQMKUaRpZDqXiF8kv908bFHXedPTEwNCVm2QjXNTDt AfPyHmjntF4Yl7OpGoxuETLzNuF94153t7SWoHaY/J6V6N7IFN1kMyvAo6YOHzQSdlnE jFcrrRghX9hqrq91nCZSzY8ZCqRr2Uv9sYOUHPJ+AYRotr8/IdMNKCHQcGbeVqBYaIQE SVy+HTmKxOJChYnCuDB9+HsOxe5rZv+BItqSF+klRnPaS8MNWY/ZjqE/r+v3tWIXGJcp 5esjqxtBnRYs6ODe97lBfaUoxXlbJF+fBKWQaXPzh1+ID3GpaZssNmb/Ui7fniBF6pbB 0w2w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h8-v6si1724654pgj.352.2018.09.27.22.09.04; Thu, 27 Sep 2018 22:09:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728709AbeI1La0 (ORCPT + 99 others); Fri, 28 Sep 2018 07:30:26 -0400 Received: from orcrist.hmeau.com ([104.223.48.154]:42528 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726060AbeI1LaZ (ORCPT ); Fri, 28 Sep 2018 07:30:25 -0400 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1g5l0q-0008VY-Ri; Fri, 28 Sep 2018 13:08:24 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1g5l0p-0005wW-4h; Fri, 28 Sep 2018 13:08:23 +0800 Date: Fri, 28 Sep 2018 13:08:23 +0800 From: Herbert Xu To: Kees Cook Cc: Ard Biesheuvel , Eric Biggers , linux-crypto , Linux Kernel Mailing List Subject: Re: [PATCH crypto-next 00/23] crypto: skcipher - Remove VLA usage Message-ID: <20180928050823.pggznhgv47wu4pd4@gondor.apana.org.au> References: <20180919021100.3380-1-keescook@chromium.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180919021100.3380-1-keescook@chromium.org> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 18, 2018 at 07:10:37PM -0700, Kees Cook wrote: > This is the full follow-up to earlier discussions[1] that suggested > adding a new struct crypto_sync_skcipher to handle the VLA removal from > SKCIPHER_REQUEST_ON_STACK. > > This series is effectively a no-op change: everything is a wrapper > around struct crypto_skcipher, but provides compile-time enforcement > for not putting an ASYNC skcipher on the stack, which allows us to > declare the on-stack requests with a fixed stack size. > > [1] https://lkml.kernel.org/r/CAGXu5j+bpLK=EQ9LHkO8V=sdaQwt==6fbGhgn2Vi1E9_WxSGRQ@mail.gmail.com > > -Kees > > Kees Cook (23): > crypto: skcipher - Introduce crypto_sync_skcipher > gss_krb5: Remove VLA usage of skcipher > lib80211: Remove VLA usage of skcipher > mac802154: Remove VLA usage of skcipher > s390/crypto: Remove VLA usage of skcipher > x86/fpu: Remove VLA usage of skcipher > block: cryptoloop: Remove VLA usage of skcipher > libceph: Remove VLA usage of skcipher > ppp: mppe: Remove VLA usage of skcipher > rxrpc: Remove VLA usage of skcipher > wusb: Remove VLA usage of skcipher > crypto: ccp - Remove VLA usage of skcipher > crypto: vmx - Remove VLA usage of skcipher > crypto: null - Remove VLA usage of skcipher > crypto: cryptd - Remove VLA usage of skcipher > crypto: sahara - Remove VLA usage of skcipher > crypto: qce - Remove VLA usage of skcipher > crypto: artpec6 - Remove VLA usage of skcipher > crypto: chelsio - Remove VLA usage of skcipher > crypto: mxs-dcp - Remove VLA usage of skcipher > crypto: omap-aes - Remove VLA usage of skcipher > crypto: picoxcell - Remove VLA usage of skcipher > crypto: skcipher - Remove SKCIPHER_REQUEST_ON_STACK() > > arch/s390/crypto/aes_s390.c | 48 +++++----- > arch/x86/crypto/fpu.c | 30 ++++--- > crypto/algif_aead.c | 12 +-- > crypto/authenc.c | 8 +- > crypto/authencesn.c | 8 +- > crypto/cryptd.c | 32 +++---- > crypto/crypto_null.c | 11 ++- > crypto/echainiv.c | 4 +- > crypto/gcm.c | 8 +- > crypto/seqiv.c | 4 +- > crypto/skcipher.c | 24 +++++ > drivers/block/cryptoloop.c | 22 ++--- > drivers/crypto/axis/artpec6_crypto.c | 19 ++-- > drivers/crypto/ccp/ccp-crypto-aes-xts.c | 13 +-- > drivers/crypto/ccp/ccp-crypto.h | 2 +- > drivers/crypto/chelsio/chcr_algo.c | 27 +++--- > drivers/crypto/chelsio/chcr_crypto.h | 2 +- > drivers/crypto/mxs-dcp.c | 21 +++-- > drivers/crypto/omap-aes.c | 17 ++-- > drivers/crypto/omap-aes.h | 2 +- > drivers/crypto/picoxcell_crypto.c | 21 +++-- > drivers/crypto/qce/ablkcipher.c | 13 ++- > drivers/crypto/qce/cipher.h | 2 +- > drivers/crypto/sahara.c | 31 ++++--- > drivers/crypto/vmx/aes_cbc.c | 22 ++--- > drivers/crypto/vmx/aes_ctr.c | 18 ++-- > drivers/crypto/vmx/aes_xts.c | 18 ++-- > drivers/net/ppp/ppp_mppe.c | 27 +++--- > drivers/staging/rtl8192e/rtllib_crypt_tkip.c | 34 ++++---- > drivers/staging/rtl8192e/rtllib_crypt_wep.c | 28 +++--- > .../rtl8192u/ieee80211/ieee80211_crypt_tkip.c | 34 ++++---- > .../rtl8192u/ieee80211/ieee80211_crypt_wep.c | 26 +++--- > drivers/usb/wusbcore/crypto.c | 16 ++-- > include/crypto/internal/geniv.h | 2 +- > include/crypto/null.h | 2 +- > include/crypto/skcipher.h | 74 +++++++++++++++- > include/linux/sunrpc/gss_krb5.h | 30 +++---- > net/ceph/crypto.c | 12 +-- > net/ceph/crypto.h | 2 +- > net/mac802154/llsec.c | 16 ++-- > net/mac802154/llsec.h | 2 +- > net/rxrpc/ar-internal.h | 2 +- > net/rxrpc/rxkad.c | 44 +++++----- > net/sunrpc/auth_gss/gss_krb5_crypto.c | 87 ++++++++++--------- > net/sunrpc/auth_gss/gss_krb5_keys.c | 9 +- > net/sunrpc/auth_gss/gss_krb5_mech.c | 53 ++++++----- > net/sunrpc/auth_gss/gss_krb5_seqnum.c | 18 ++-- > net/sunrpc/auth_gss/gss_krb5_wrap.c | 20 ++--- > net/wireless/lib80211_crypt_tkip.c | 34 ++++---- > net/wireless/lib80211_crypt_wep.c | 28 +++--- > 50 files changed, 563 insertions(+), 476 deletions(-) All applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt