[PATCH 06/11] nvme: Implement In-Band authentication
Hannes Reinecke
hare at suse.de
Tue Jun 21 22:43:56 PDT 2022
On 6/21/22 16:50, Sagi Grimberg wrote:
>
>
> On 6/21/22 17:26, Hannes Reinecke wrote:
>> On 6/21/22 16:24, Sagi Grimberg wrote:
>>> This one doesn't compile against nvme-5.20.
>>>
>>>> + ret = __nvme_submit_sync_cmd(q, &cmd, NULL, data, data_len, 0,
>>>> + qid == 0 ? NVME_QID_ANY : qid,
>>>> + 0, flags);
>>>
>>> here ^^^^^^^
>>
>> Sheesh. I've compiled it against nvme-5.19, where it works perfectly.
>> Alright, once more unto the breach ...
>
> Looks like if I pass a malformed ctrl key to nvme connect I am able to
> crash the system:
> --
> [ 84.793307] Workqueue: nvme-wq __nvme_auth_work [nvme_core]
> [ 84.794790] RIP: 0010:nvme_auth_transform_key+0x19/0x1f0 [nvme_common]
> [ 84.796468] Code: bc f4 ff ff ff eb bf e8 f5 2f e1 ee 0f 1f 44 00 00
> 0f 1f 44 00 00 41 57 41 56 41 55 49 89 f5 41 54 55 53 48 89 fb 48 83 ec
> 08 <0f> b6 7f 10 e8 ce f9 ff ff 48 89 c7 0f b6 43 10 84 c0 0f 84 4c 01
> [ 84.800112] RSP: 0018:ffffae5f8047bc78 EFLAGS: 00010296
> [ 84.801048] RAX: ffff973b854ca0c0 RBX: 0000000000000000 RCX:
> 0000000000000000
> [ 84.802289] RDX: ffff973b8355b000 RSI: ffff973b84f568a0 RDI:
> 0000000000000000
> [ 84.803447] RBP: ffff973b842dd6b9 R08: 0000000000000003 R09:
> ffff973bbec308a8
> [ 84.804638] R10: 0000000000000147 R11: 0000000000000000 R12:
> ffff973b842dd600
> [ 84.805767] R13: ffff973b84f568a0 R14: 0000000000000000 R15:
> ffff973b9e94250d
> [ 84.806929] FS: 0000000000000000(0000) GS:ffff973bbec00000(0000)
> knlGS:0000000000000000
> [ 84.808220] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [ 84.809178] CR2: 0000000000000010 CR3: 00000000061ac003 CR4:
> 0000000000370ef0
> [ 84.810337] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
> 0000000000000000
> [ 84.811432] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
> 0000000000000400
> [ 84.812527] Call Trace:
> [ 84.812974] <TASK>
> [ 84.813372] nvme_auth_dhchap_setup_ctrl_response+0x4b/0x3b0 [nvme_core]
> [ 84.814355] ? preempt_count_add+0x68/0xa0
> [ 84.815080] ? _raw_spin_unlock_irq+0x16/0x28
> [ 84.815840] ? __wait_for_common+0x19f/0x1d0
> [ 84.816587] ? firmware_map_remove+0x87/0x87
> [ 84.817333] ? blk_mq_hctx_has_pending+0x38/0x70
> [ 84.818123] ? blk_mq_run_hw_queue+0x7d/0xe0
> [ 84.818784] ? __blk_mq_free_request+0x9b/0xa0
> [ 84.819482] ? blk_queue_exit+0xe/0x40
> [ 84.820124] ? __nvme_submit_sync_cmd+0xe8/0x160 [nvme_core]
> [ 84.821096] ? nvme_auth_submit+0x8f/0xd0 [nvme_core]
> [ 84.821970] __nvme_auth_work+0x1fb/0x480 [nvme_core]
> [ 84.822869] process_one_work+0x1e5/0x3b0
> [ 84.823608] worker_thread+0x1c4/0x3a0
> [ 84.824343] ? rescuer_thread+0x390/0x390
> [ 84.825044] kthread+0xe8/0x110
> --
Malformed exactly how?
We should've captured any malformed key during nvme_auth_extract_key().
Can you share an example of your malformed key?
Cheers,
Hannes
--
Dr. Hannes Reinecke Kernel Storage Architect
hare at suse.de +49 911 74053 688
SUSE Software Solutions GmbH, Maxfeldstr. 5, 90409 Nürnberg
HRB 36809 (AG Nürnberg), Geschäftsführer: Ivo Totev, Andrew
Myers, Andrew McDonald, Martje Boudien Moerman
More information about the Linux-nvme
mailing list