On arm32, we get warnings about high stack usage in some of the functions:

crypto/testmgr.c:2269:12: error: stack frame size of 1032 bytes in function 
'alg_test_aead' [-Werror,-Wframe-larger-than=]
static int alg_test_aead(const struct alg_test_desc *desc, const char *driver,
           ^
crypto/testmgr.c:1693:12: error: stack frame size of 1312 bytes in function 
'__alg_test_hash' [-Werror,-Wframe-larger-than=]
static int __alg_test_hash(const struct hash_testvec *vecs,
           ^

On of the larger objects on the stack here is struct testvec_config, so
change that to dynamic allocation.

Fixes: 40153b10d91c ("crypto: testmgr - fuzz AEADs against their generic 
implementation")
Fixes: d435e10e67be ("crypto: testmgr - fuzz skciphers against their generic 
implementation")
Fixes: 9a8a6b3f0950 ("crypto: testmgr - fuzz hashes against their generic 
implementation")
Signed-off-by: Arnd Bergmann <a...@arndb.de>
---
I only compile-tested this, and it's not completely trivial, so please
review carefully.
---
 crypto/testmgr.c | 61 +++++++++++++++++++++++++++++++++++-------------
 1 file changed, 45 insertions(+), 16 deletions(-)

diff --git a/crypto/testmgr.c b/crypto/testmgr.c
index 6c28055d41ca..7928296cdcb3 100644
--- a/crypto/testmgr.c
+++ b/crypto/testmgr.c
@@ -1503,13 +1503,15 @@ static int test_hash_vec(const char *driver, const 
struct hash_testvec *vec,
  * Generate a hash test vector from the given implementation.
  * Assumes the buffers in 'vec' were already allocated.
  */
-static void generate_random_hash_testvec(struct crypto_shash *tfm,
+static int generate_random_hash_testvec(struct crypto_shash *tfm,
                                         struct hash_testvec *vec,
                                         unsigned int maxkeysize,
                                         unsigned int maxdatasize,
                                         char *name, size_t max_namelen)
 {
-       SHASH_DESC_ON_STACK(desc, tfm);
+       struct shash_desc *desc = kmalloc(sizeof(*desc) + 
crypto_shash_descsize(tfm), GFP_KERNEL);
+       if (!desc)
+               return -ENOMEM;
 
        /* Data */
        vec->psize = generate_random_length(maxdatasize);
@@ -1541,6 +1543,10 @@ static void generate_random_hash_testvec(struct 
crypto_shash *tfm,
 done:
        snprintf(name, max_namelen, "\"random: psize=%u ksize=%u\"",
                 vec->psize, vec->ksize);
+
+       kfree(desc);
+
+       return 0;
 }
 
 /*
@@ -1565,7 +1571,7 @@ static int test_hash_vs_generic_impl(const char *driver,
        unsigned int i;
        struct hash_testvec vec = { 0 };
        char vec_name[64];
-       struct testvec_config cfg;
+       struct testvec_config *cfg;
        char cfgname[TESTVEC_CONFIG_NAMELEN];
        int err;
 
@@ -1595,6 +1601,12 @@ static int test_hash_vs_generic_impl(const char *driver,
                return err;
        }
 
+       cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
+       if (!cfg) {
+               err = -ENOMEM;
+               goto out;
+       }
+
        /* Check the algorithm properties for consistency. */
 
        if (digestsize != crypto_shash_digestsize(generic_tfm)) {
@@ -1626,12 +1638,14 @@ static int test_hash_vs_generic_impl(const char *driver,
        }
 
        for (i = 0; i < fuzz_iterations * 8; i++) {
-               generate_random_hash_testvec(generic_tfm, &vec,
-                                            maxkeysize, maxdatasize,
-                                            vec_name, sizeof(vec_name));
-               generate_random_testvec_config(&cfg, cfgname, sizeof(cfgname));
+               err = generate_random_hash_testvec(generic_tfm, &vec,
+                                                  maxkeysize, maxdatasize,
+                                                  vec_name, sizeof(vec_name));
+               if (err)
+                       goto out;
+               generate_random_testvec_config(cfg, cfgname, sizeof(cfgname));
 
-               err = test_hash_vec_cfg(driver, &vec, vec_name, &cfg,
+               err = test_hash_vec_cfg(driver, &vec, vec_name, cfg,
                                        req, desc, tsgl, hashstate);
                if (err)
                        goto out;
@@ -1639,6 +1653,7 @@ static int test_hash_vs_generic_impl(const char *driver,
        }
        err = 0;
 out:
+       kfree(cfg);
        kfree(vec.key);
        kfree(vec.plaintext);
        kfree(vec.digest);
@@ -2135,7 +2150,7 @@ static int test_aead_vs_generic_impl(const char *driver,
        unsigned int i;
        struct aead_testvec vec = { 0 };
        char vec_name[64];
-       struct testvec_config cfg;
+       struct testvec_config *cfg;
        char cfgname[TESTVEC_CONFIG_NAMELEN];
        int err;
 
@@ -2165,6 +2180,12 @@ static int test_aead_vs_generic_impl(const char *driver,
                return err;
        }
 
+       cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
+       if (!cfg) {
+               err = -ENOMEM;
+               goto out;
+       }
+
        generic_req = aead_request_alloc(generic_tfm, GFP_KERNEL);
        if (!generic_req) {
                err = -ENOMEM;
@@ -2219,13 +2240,13 @@ static int test_aead_vs_generic_impl(const char *driver,
                generate_random_aead_testvec(generic_req, &vec,
                                             maxkeysize, maxdatasize,
                                             vec_name, sizeof(vec_name));
-               generate_random_testvec_config(&cfg, cfgname, sizeof(cfgname));
+               generate_random_testvec_config(cfg, cfgname, sizeof(cfgname));
 
-               err = test_aead_vec_cfg(driver, ENCRYPT, &vec, vec_name, &cfg,
+               err = test_aead_vec_cfg(driver, ENCRYPT, &vec, vec_name, cfg,
                                        req, tsgls);
                if (err)
                        goto out;
-               err = test_aead_vec_cfg(driver, DECRYPT, &vec, vec_name, &cfg,
+               err = test_aead_vec_cfg(driver, DECRYPT, &vec, vec_name, cfg,
                                        req, tsgls);
                if (err)
                        goto out;
@@ -2233,6 +2254,7 @@ static int test_aead_vs_generic_impl(const char *driver,
        }
        err = 0;
 out:
+       kfree(cfg);
        kfree(vec.key);
        kfree(vec.iv);
        kfree(vec.assoc);
@@ -2682,7 +2704,7 @@ static int test_skcipher_vs_generic_impl(const char 
*driver,
        unsigned int i;
        struct cipher_testvec vec = { 0 };
        char vec_name[64];
-       struct testvec_config cfg;
+       struct testvec_config *cfg;
        char cfgname[TESTVEC_CONFIG_NAMELEN];
        int err;
 
@@ -2716,6 +2738,12 @@ static int test_skcipher_vs_generic_impl(const char 
*driver,
                return err;
        }
 
+       cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
+       if (!cfg) {
+               err = -ENOMEM;
+               goto out;
+       }
+
        generic_req = skcipher_request_alloc(generic_tfm, GFP_KERNEL);
        if (!generic_req) {
                err = -ENOMEM;
@@ -2763,20 +2791,21 @@ static int test_skcipher_vs_generic_impl(const char 
*driver,
        for (i = 0; i < fuzz_iterations * 8; i++) {
                generate_random_cipher_testvec(generic_req, &vec, maxdatasize,
                                               vec_name, sizeof(vec_name));
-               generate_random_testvec_config(&cfg, cfgname, sizeof(cfgname));
+               generate_random_testvec_config(cfg, cfgname, sizeof(cfgname));
 
                err = test_skcipher_vec_cfg(driver, ENCRYPT, &vec, vec_name,
-                                           &cfg, req, tsgls);
+                                           cfg, req, tsgls);
                if (err)
                        goto out;
                err = test_skcipher_vec_cfg(driver, DECRYPT, &vec, vec_name,
-                                           &cfg, req, tsgls);
+                                           cfg, req, tsgls);
                if (err)
                        goto out;
                cond_resched();
        }
        err = 0;
 out:
+       kfree(cfg);
        kfree(vec.key);
        kfree(vec.iv);
        kfree(vec.ptext);
-- 
2.20.0

Reply via email to