Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp7488464ybi; Mon, 22 Jul 2019 14:16:05 -0700 (PDT) X-Google-Smtp-Source: APXvYqzFSkl11XLB+Gc3tiQRAw7A56gxBSAZpd15t6tWPTYI4kHulsE+xS8tBcIv/kn74ArhN6B9 X-Received: by 2002:a65:5c02:: with SMTP id u2mr3671368pgr.367.1563830165256; Mon, 22 Jul 2019 14:16:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563830165; cv=none; d=google.com; s=arc-20160816; b=BKS6htGi24X7OKqzqLLPFWREGvLru+XCNTC9/ia65ZP8/a3lJ7ObsnRKOgP79Ki8Jx RoU5dsk8q9IFEXXYBmnL8DTCNC4dReIqbIVdRq5MtEjM8qqxi2GS2BH4XXW4K1DoKJs4 P149bguk2YNESCqnI/JdnP2NOYY4cvR0dpBRHutXTrIsYBFIat2b/0aTnUb0wqCL4UIW dx3e5kafUbu/xYbBI716hSbN9PAYm+HJ+ef/NLurFiRWkkFBrCI6Unxp/IF/uxJ2wv4a fHdnyc6enwcRGkjgu3f6DC/Tt9uT4BVUyaatQlFt8fgLOz22pLi/o0TsiFtuhcTZc+5O 8ZUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=D5i5eeVRTyq7Qm2OPmoZkgOgQ/VLsd39M3tEbxvABCE=; b=AO3p2GcoLuzIdAm80DIM33slIxDQ0xmBjUXUIZMA0ZAuVo4A3YzEKhn7f8kq7YHGmt TkPAvEZjthc0D5l0uWcOKXVzKswweK68ijDrR9fzV5Id/m6FpRgvPE6jqEbI93RKJDcX bLQD8XTS0IHJLCLBDmo9Y2L/oiV7W2MxHdovncOyTYNekCKyzOBWQDQimCjayCkeKs1+ OtdqSuY3Vk6R7lRmU5tJF/Oz4J7EMrdgVexE2m1fZFXjaLvDG7AvfqaXMG13XYb8pNea 3CZ0SJblGVYAjVUgIrr8tpjEoc7dPqsM55tReNIPjrY7tdPw4wFWBqazMXx25iHmmesf LkmA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=lMVKoC32; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i95si11171520plb.106.2019.07.22.14.15.49; Mon, 22 Jul 2019 14:16:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=lMVKoC32; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730804AbfGVQwf (ORCPT + 99 others); Mon, 22 Jul 2019 12:52:35 -0400 Received: from mail-pg1-f194.google.com ([209.85.215.194]:38671 "EHLO mail-pg1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730740AbfGVQwc (ORCPT ); Mon, 22 Jul 2019 12:52:32 -0400 Received: by mail-pg1-f194.google.com with SMTP id f5so9112882pgu.5 for ; Mon, 22 Jul 2019 09:52:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=D5i5eeVRTyq7Qm2OPmoZkgOgQ/VLsd39M3tEbxvABCE=; b=lMVKoC32q6jdc5s52CXFaKProF9HEK95pIIg8BJ02KRdMo2T+G1UQFwnI3hhGF8+qU sA+I2b5X4bmmD3l4DMPwDW82vI93F3KlS+ABw8rfpPxwGuJjlU4ikbVcjw+QJS8Ok0+k NfKpy3LGpTZr6M9s+RV94qzCTTn8uIg1TOEHY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=D5i5eeVRTyq7Qm2OPmoZkgOgQ/VLsd39M3tEbxvABCE=; b=iXpB4/7p6fD+Om9j99UgrtoKdn7ABQQ/RaNKuwWSQpmFWi7lWCCForUPdULZDs3w72 RmVbdWltkU16gcSJlPgvWwnVP0sHP1dQSk04srq47b8ELrrAj8FBIep9VPFy04wx659T t/7n6dREAVPWknH25xMxncpru+jYrJQQ/S53YjfNfJxW9GwjimesajMyomtOfEMAsENn e1fmtxfg1Hjmx9mlTzPQ0NPZBqEUl5obSeiDNm8zXVFlqGqAKipmviTquK9mqbt99SnJ 4u3Y98Ub43wkt1bBbvBgImKfHFmcPP4zvnQokNnJ3tYXj9UDbZHRsnZ91QnDnJXJ3JUt 27cg== X-Gm-Message-State: APjAAAXSzfq7ng0ScwsfgpEZ4wCVvd4FMRGVlSBGgA+L0WIYPD4nYq3b q8ruOXvivb0ztvfEEmCTb8fVdw== X-Received: by 2002:a63:7b4d:: with SMTP id k13mr70901703pgn.182.1563814351931; Mon, 22 Jul 2019 09:52:31 -0700 (PDT) Received: from www.outflux.net (smtp.outflux.net. [198.145.64.163]) by smtp.gmail.com with ESMTPSA id d8sm36678029pgh.45.2019.07.22.09.52.30 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 22 Jul 2019 09:52:31 -0700 (PDT) Date: Mon, 22 Jul 2019 09:52:30 -0700 From: Kees Cook To: Arnd Bergmann Cc: Philipp Reisner , Lars Ellenberg , Jens Axboe , Roland Kammerer , Herbert Xu , Eric Biggers , drbd-dev@lists.linbit.com, linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, clang-built-linux@googlegroups.com Subject: Re: [PATCH] [v2] drbd: dynamically allocate shash descriptor Message-ID: <201907220952.EA05EEE9FC@keescook> References: <20190722122647.351002-1-arnd@arndb.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190722122647.351002-1-arnd@arndb.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 22, 2019 at 02:26:34PM +0200, Arnd Bergmann wrote: > Building with clang and KASAN, we get a warning about an overly large > stack frame on 32-bit architectures: > > drivers/block/drbd/drbd_receiver.c:921:31: error: stack frame size of 1280 bytes in function 'conn_connect' > [-Werror,-Wframe-larger-than=] > > We already allocate other data dynamically in this function, so > just do the same for the shash descriptor, which makes up most of > this memory. > > Link: https://lore.kernel.org/lkml/20190617132440.2721536-1-arnd@arndb.de/ > Signed-off-by: Arnd Bergmann Reviewed-by: Kees Cook -Kees > --- > v2: > - don't try to zero a NULL descriptor pointer, > based on review from Roland Kammerer. > --- > drivers/block/drbd/drbd_receiver.c | 14 ++++++++++++-- > 1 file changed, 12 insertions(+), 2 deletions(-) > > diff --git a/drivers/block/drbd/drbd_receiver.c b/drivers/block/drbd/drbd_receiver.c > index 90ebfcae0ce6..2b3103c30857 100644 > --- a/drivers/block/drbd/drbd_receiver.c > +++ b/drivers/block/drbd/drbd_receiver.c > @@ -5417,7 +5417,7 @@ static int drbd_do_auth(struct drbd_connection *connection) > unsigned int key_len; > char secret[SHARED_SECRET_MAX]; /* 64 byte */ > unsigned int resp_size; > - SHASH_DESC_ON_STACK(desc, connection->cram_hmac_tfm); > + struct shash_desc *desc; > struct packet_info pi; > struct net_conf *nc; > int err, rv; > @@ -5430,6 +5430,13 @@ static int drbd_do_auth(struct drbd_connection *connection) > memcpy(secret, nc->shared_secret, key_len); > rcu_read_unlock(); > > + desc = kmalloc(sizeof(struct shash_desc) + > + crypto_shash_descsize(connection->cram_hmac_tfm), > + GFP_KERNEL); > + if (!desc) { > + rv = -1; > + goto fail; > + } > desc->tfm = connection->cram_hmac_tfm; > > rv = crypto_shash_setkey(connection->cram_hmac_tfm, (u8 *)secret, key_len); > @@ -5571,7 +5578,10 @@ static int drbd_do_auth(struct drbd_connection *connection) > kfree(peers_ch); > kfree(response); > kfree(right_response); > - shash_desc_zero(desc); > + if (desc) { > + shash_desc_zero(desc); > + kfree(desc); > + } > > return rv; > } > -- > 2.20.0 > -- Kees Cook