Re: Bug in gss_krb5_crypto.c

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2012-03-12 at 11:13 -0400, Kevin Coffman wrote:
> On Sun, Mar 11, 2012 at 7:02 PM, Dr James Bruce Fields
> <bfields@xxxxxxxxxxxx> wrote:
> > On Sun, Mar 11, 2012 at 10:14:44PM +0000, Myklebust, Trond wrote:
> >> Hi Kevin & Bruce,
> >>
> >> When running sparse on the sunrpc code, I'm seeing the following error
> >> message:
> >> "net/sunrpc/auth_gss/gss_krb5_crypto.c:603:52: error: bad constant
> >> expression"
> >>
> >> This boils down to the line:
> >>         u8 data[crypto_blkcipher_blocksize(cipher) * 2];
> >
> > Oops.
> >
> >> which is using a GNU Cc-ism in order to do dynamic allocation on the
> >> stack. This is not acceptable in kernel code, and really needs to be
> >> changed. How should we move forward with this? Is there an upper limit
> >> on the value of crypto_blkcipher_blocksize(cipher) that we can use?
> >
> > I think it's always either 8 or 16.
> >
> > --b.
> >
> 
> Yes, I think 16 is currently the upper blocksize limit.  I was
> thinking there was a constant defined in a header for the
> maxblocksize, but I'm not able to get to my machine to grep for it
> right now.

I can't see an absolute maximum for the blocksize. The biggest blocksize
that I can find in the sources now is SHA512_BLOCK_SIZE, with the value
128. That looks a little large to be using in a stack variable.

-- 
Trond Myklebust
Linux NFS client maintainer

NetApp
Trond.Myklebust@xxxxxxxxxx
www.netapp.com

��.n��������+%������w��{.n�����{��w���jg��������ݢj����G�������j:+v���w�m������w�������h�����٥



[Index of Archives]     [Linux Filesystem Development]     [Linux USB Development]     [Linux Media Development]     [Video for Linux]     [Linux NILFS]     [Linux Audio Users]     [Yosemite Info]     [Linux SCSI]

  Powered by Linux