Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp8401038ybi; Tue, 23 Jul 2019 07:57:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqwRh8JUN36QC/yUYZi0UqfarYPohMdz2JpAYaq1ZQyALFoPTZ2lFFTANjYvg0xuW6CkwoQO X-Received: by 2002:a63:d741:: with SMTP id w1mr2647259pgi.155.1563893871000; Tue, 23 Jul 2019 07:57:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563893870; cv=none; d=google.com; s=arc-20160816; b=lpG3tSZAssRHXbHTYIeWDXdTGksc5UF2dVD77v4YWY3wZT6GMmujyCHdy/k97S8Atf S7X8QrBTzXt2+gY74CJSexZ7z1U/SxbHIDHNTDwGnWAx1eoTwlx1YARz0AZ31IFb810q gv1rTBGG/tWLle19HnC9ADasG4QTqAQvdqJo8ItC6nLm/ztZWpdeuZkmHaSCAdzc7Nz+ AGHuUrVPLB4ljk2AdVO5CYTbInP4PWdHw0S0+KVEctMAGD2uDarU5fmFceqQmZJ9dSnV qK/wBS0TZA6PcGVEhu9MeUVEu4bok60VSBXMjtnAUOvRqHPuW4Iam7cBIE+vf6NgKSzd 3v6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=k7Xz7HKINwi2ffVMf/EFtJWFSDc7hqESTclfwKAt7K4=; b=z2GyH2HWooCbtv26VZ9uPAtQ03dzm0etU0NQYKJLBvteeW9Ep6Blo/IKq7ZWAdFUkQ Up+kaADfnApJPiLSnWFgMo08sYwQo10u9bpPbOXKlc2IzzHyw52o0eGLzkdr3lG5wkqv xDDh3Bet8EqcDKAEXECXyFOZefvImi2qZY+MQeg1RvC8RQ7JGFakVwmgt3TASb1vxK9k RMCPN3YShZWAmh9wkTNb3dCcDgjpvPW7pVv6PmUuadAP3YK79Gj1WMT7LW7nfoOe1woL h/c6xvNxIt7BOF6jfdSScQdUw3MCZ+5bcg6zLiMmkoeo8AHAmmpHAX9bq6fUfS262Fqt v+Ug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linbit-com.20150623.gappssmtp.com header.s=20150623 header.b="c/ZNarot"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u137si11249151pgc.349.2019.07.23.07.57.35; Tue, 23 Jul 2019 07:57:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linbit-com.20150623.gappssmtp.com header.s=20150623 header.b="c/ZNarot"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388543AbfGWHrF (ORCPT + 99 others); Tue, 23 Jul 2019 03:47:05 -0400 Received: from mail-wr1-f66.google.com ([209.85.221.66]:44780 "EHLO mail-wr1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727026AbfGWHrF (ORCPT ); Tue, 23 Jul 2019 03:47:05 -0400 Received: by mail-wr1-f66.google.com with SMTP id p17so41989260wrf.11 for ; Tue, 23 Jul 2019 00:47:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linbit-com.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=k7Xz7HKINwi2ffVMf/EFtJWFSDc7hqESTclfwKAt7K4=; b=c/ZNarot1m0Bl1tmWrYyhQmPxIX3DYs2q2Gj5GPhiIoalP+pZaR0Bxcjs+qbtQggL+ HpYpvcffxSSoQ6e3vzPC+Jr1+Y7fqOWhByZoh68dmXrg2pmNrtn6QP4yekhQWLe32Smv Lgcpdg3yij/uHiT6xRLXikibHtWQkH9y/yNWC8LWj1R9GmlW1Ow+dA4jDjhQER8wtODg P3HNoJOjAMlxmxOQEDK0kNEfxcwZj8zCoRBY1pdZmhobsS52JB4o5lYmEFTwKw9bMbYD P1FPqibH2KmI7rd/iym26Pv/u/mJxGS3RR6+vfownrLRWIsxXw7FD+oC8MyDj4OyJB3d //sw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=k7Xz7HKINwi2ffVMf/EFtJWFSDc7hqESTclfwKAt7K4=; b=l9qdzTUIeI3xuSLhur2zkdabJ/+rcOS2lF27qiet1B9DwpRf6v667c9l1EmWXvPzPB q6hrWGG4qdas7RBu24H1+n7PnLjEUP41om4bUwq9cGOHPBbMfM6CqiICz8hcH+NzsMyw 77D0DzdH82cxFgbJQ4rMcL7Qr18gEn9kmZ3wJonY4/fLeMaJ7wM0071V1ziW+RprCSxS WbEJ7s/1NLo59cq+yqptnNj6ly3UnIP4JXsAFOCMOvSPO5UsA75E8jRgUFvUTNhdQ81D zo6WozH+Dw802L7E4I3OkCXgbKaccstAzB9hDdi2jFq4NVkK68GFKinP0ig200HvWb5K gtug== X-Gm-Message-State: APjAAAV4dmk/Ko0CXE9nysLO1zRQnmvS/Ab8GhepPu55wgx842i0QAwN yOkp+oexi7iRmxoxxm/nEEfa6g== X-Received: by 2002:adf:c803:: with SMTP id d3mr4552216wrh.130.1563868022896; Tue, 23 Jul 2019 00:47:02 -0700 (PDT) Received: from localhost (static.20.139.203.116.clients.your-server.de. [116.203.139.20]) by smtp.gmail.com with ESMTPSA id c1sm89787659wrh.1.2019.07.23.00.47.01 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 23 Jul 2019 00:47:02 -0700 (PDT) Date: Tue, 23 Jul 2019 09:47:01 +0200 From: Roland Kammerer To: Arnd Bergmann Cc: Philipp Reisner , Lars Ellenberg , Jens Axboe , Roland Kammerer , Herbert Xu , Eric Biggers , Kees Cook , drbd-dev@lists.linbit.com, linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, clang-built-linux@googlegroups.com Subject: Re: [PATCH] [v2] drbd: dynamically allocate shash descriptor Message-ID: <20190723074701.fp2qjjm5dwj4i2x7@rck.sh> References: <20190722122647.351002-1-arnd@arndb.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190722122647.351002-1-arnd@arndb.de> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 22, 2019 at 02:26:34PM +0200, Arnd Bergmann wrote: > Building with clang and KASAN, we get a warning about an overly large > stack frame on 32-bit architectures: > > drivers/block/drbd/drbd_receiver.c:921:31: error: stack frame size of 1280 bytes in function 'conn_connect' > [-Werror,-Wframe-larger-than=] > > We already allocate other data dynamically in this function, so > just do the same for the shash descriptor, which makes up most of > this memory. > > Link: https://lore.kernel.org/lkml/20190617132440.2721536-1-arnd@arndb.de/ > Signed-off-by: Arnd Bergmann Reviewed-by: Roland Kammerer > --- > v2: > - don't try to zero a NULL descriptor pointer, > based on review from Roland Kammerer. > --- > drivers/block/drbd/drbd_receiver.c | 14 ++++++++++++-- > 1 file changed, 12 insertions(+), 2 deletions(-) > > diff --git a/drivers/block/drbd/drbd_receiver.c b/drivers/block/drbd/drbd_receiver.c > index 90ebfcae0ce6..2b3103c30857 100644 > --- a/drivers/block/drbd/drbd_receiver.c > +++ b/drivers/block/drbd/drbd_receiver.c > @@ -5417,7 +5417,7 @@ static int drbd_do_auth(struct drbd_connection *connection) > unsigned int key_len; > char secret[SHARED_SECRET_MAX]; /* 64 byte */ > unsigned int resp_size; > - SHASH_DESC_ON_STACK(desc, connection->cram_hmac_tfm); > + struct shash_desc *desc; > struct packet_info pi; > struct net_conf *nc; > int err, rv; > @@ -5430,6 +5430,13 @@ static int drbd_do_auth(struct drbd_connection *connection) > memcpy(secret, nc->shared_secret, key_len); > rcu_read_unlock(); > > + desc = kmalloc(sizeof(struct shash_desc) + > + crypto_shash_descsize(connection->cram_hmac_tfm), > + GFP_KERNEL); > + if (!desc) { > + rv = -1; > + goto fail; > + } > desc->tfm = connection->cram_hmac_tfm; > > rv = crypto_shash_setkey(connection->cram_hmac_tfm, (u8 *)secret, key_len); > @@ -5571,7 +5578,10 @@ static int drbd_do_auth(struct drbd_connection *connection) > kfree(peers_ch); > kfree(response); > kfree(right_response); > - shash_desc_zero(desc); > + if (desc) { > + shash_desc_zero(desc); > + kfree(desc); > + } > > return rv; > } > -- > 2.20.0 >