Received: by 10.213.65.68 with SMTP id h4csp2649048imn; Mon, 9 Apr 2018 06:59:02 -0700 (PDT) X-Google-Smtp-Source: AIpwx48Pewlu4zIf5VvxqNILuG99uDZQaBMgHORy919dzaqm7QayqTCPQfY88s+lWzFBwEyH6hrv X-Received: by 10.98.9.72 with SMTP id e69mr29751126pfd.197.1523282342244; Mon, 09 Apr 2018 06:59:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523282342; cv=none; d=google.com; s=arc-20160816; b=M44z8zU58VBF/8oj0y2M2NwLFDEimNfksO2kozTn8XKcjvOeGwyUx2jENdVFHlmK+Q Ncx/UWDP2LFxJS+NnNHlhvi5pKPsKFV8B8qO2733HxUivCyC5w4GHHjfsi6VsWdtc1lE LsEoXriNkeykuahaiIRful+8Y+kC5D6b3YzRR/jSYr2fngnmNgvxWXtCUS30X9X2oQAj ghjElJoibtnebEg41itX5yS3Q3a/7slOlqpruNscnzUzvVsHNptIFuHEI9/TIF6Mb1Hh 4ex49rQqm+sjKAj9I2Aoq2CLIb+dfSKbLFAmE0A8Fm+L2v8JOuR4FsEJUSU3f6I12nvU 6Mcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=YAlTGdnPdSsRn+04SbOD45FkZFw5nVfUTH5BnaTOpDI=; b=GDLCXaqLnZI1KjZEDxYN3BKUWk2+I3+JiW26UALRpV2MZ929CQ9GRwLTq1rAa2nPfK Xz7K0MXMRPGmodexmWVXOQBZg4cea4V3Tc3jr2L4+B8KxTeIWpYodRBunI10au5/dHPq IeTv9N0d+I5wA6dtIruhf6iBvGqg3HTcwaD1U+q3dq9ZqtpxUO3yAKNKsNQoqL1x+0ax kLcbWY3JdyhRPeAWI+4H81F7oi1WoUIHq4sXGEVmVkJAJ3Sx4i6TqPLj4zIo+xZ3uSbb OjWqQYQMhuJDKlF3IonId0ZqcI1rCjqo2Ca3AxGeJfkImi2NWvBkdAfe7BQPrsyPhVxa ldqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=r8Z+8gzY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r4si259752pgs.685.2018.04.09.06.58.25; Mon, 09 Apr 2018 06:59:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=r8Z+8gzY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752424AbeDINyZ (ORCPT + 99 others); Mon, 9 Apr 2018 09:54:25 -0400 Received: from mail-wm0-f66.google.com ([74.125.82.66]:40947 "EHLO mail-wm0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751367AbeDINyT (ORCPT ); Mon, 9 Apr 2018 09:54:19 -0400 Received: by mail-wm0-f66.google.com with SMTP id x4so16911032wmh.5; Mon, 09 Apr 2018 06:54:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=YAlTGdnPdSsRn+04SbOD45FkZFw5nVfUTH5BnaTOpDI=; b=r8Z+8gzYN8QLtF2tqF4LoxrQcsHAgQ1r1Uz4kPxGUDF3qX0rB+MPG38Yi3cMfwyINe syhNu4LsewcH7g5tluP1qvZxuUBgLfpm1AuiyVB7FVq7eXjU08qoW9yjMv4GnWMArdKB xs5aKPr5GghVtZE8LD93zwhMJtiKstXdpn19Vs10MK/r1UCD/81zRNSbsvMfk0x/gW2G 36IaC0XXA9dN1Z0o0VLsi6CoY4pMMpZ/Qno+iQy0K232FobzArnFpXJKv1TRI3nxjC7p eM+lODWXjaSmPGtVqpDJhg34rGMQN+3ZFC55uDyyKut1yAipEmfhYOy3pTwKRmwAQUbD e4Mg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=YAlTGdnPdSsRn+04SbOD45FkZFw5nVfUTH5BnaTOpDI=; b=jXCtqhTnhvxeYVRljDBd+EnIB7wArdsMD8dpjenhtDkNLp8h7ZW4tWcZ41BGxGyXFT wx/QzEB/KafstGnT+TEDROInsL/luSomnTdYYHNQvWlKQUoHM6bvAYwinpdGfagzn6tk KbdOp5OuGu4G9Fu+VxitLt88inS3WhcQesNHjgMTBcVjv/7H87lv/PNup14Jma6blS1t 0yKaVS4j7qDG3R1VWE34WcGfkJZAWKMsrvcP13zUUyNz/xKxTcKek0Ez9ArJ4k9BzQ2P 2+HDp0LCLSE6zyxVsasKESTbVmO298CrNtpgE3VNwB4jPOsorbJ7SbyR8vcZ2KBySfpo l94Q== X-Gm-Message-State: ALQs6tBetKpdWFPRyzB+MiJZRDrdycxWoMjB0hTrYZqA7WJMMJhJFlAI t0JEFHq/7Z8pjxweX4o1zKEHSaLN7jA= X-Received: by 10.28.87.73 with SMTP id l70mr46139wmb.123.1523282058160; Mon, 09 Apr 2018 06:54:18 -0700 (PDT) Received: from localhost ([37.177.115.186]) by smtp.gmail.com with ESMTPSA id e131sm11608725wmg.1.2018.04.09.06.54.17 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 09 Apr 2018 06:54:17 -0700 (PDT) From: Salvatore Mesoraca To: linux-kernel@vger.kernel.org Cc: kernel-hardening@lists.openwall.com, linux-crypto@vger.kernel.org, "David S. Miller" , Herbert Xu , Kees Cook , Salvatore Mesoraca , Eric Biggers , Laura Abbott Subject: [PATCH 3/6] crypto: api - avoid VLA use Date: Mon, 9 Apr 2018 15:54:01 +0200 Message-Id: <1523282044-22075-4-git-send-email-s.mesoraca16@gmail.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1523282044-22075-1-git-send-email-s.mesoraca16@gmail.com> References: <1523282044-22075-1-git-send-email-s.mesoraca16@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We avoid a VLA[1] by always allocating MAX_BLOCKSIZE + MAX_ALIGNMASK bytes. We also check the selected cipher at initialization time, if it doesn't comply with these limits, the initialization will fail. [1] http://lkml.kernel.org/r/CA+55aFzCG-zNmZwX4A2FQpadafLfEzK6CC=qPXydAacU1RqZWA@mail.gmail.com Signed-off-by: Salvatore Mesoraca --- crypto/cipher.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/crypto/cipher.c b/crypto/cipher.c index 94fa355..9cedf23 100644 --- a/crypto/cipher.c +++ b/crypto/cipher.c @@ -67,7 +67,7 @@ static void cipher_crypt_unaligned(void (*fn)(struct crypto_tfm *, u8 *, { unsigned long alignmask = crypto_tfm_alg_alignmask(tfm); unsigned int size = crypto_tfm_alg_blocksize(tfm); - u8 buffer[size + alignmask]; + u8 buffer[MAX_BLOCKSIZE + MAX_ALIGNMASK]; u8 *tmp = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); memcpy(tmp, src, size); @@ -105,9 +105,14 @@ static void cipher_decrypt_unaligned(struct crypto_tfm *tfm, int crypto_init_cipher_ops(struct crypto_tfm *tfm) { + const unsigned long alignmask = crypto_tfm_alg_alignmask(tfm); + const unsigned int size = crypto_tfm_alg_blocksize(tfm); struct cipher_tfm *ops = &tfm->crt_cipher; struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; + if (size > MAX_BLOCKSIZE || alignmask > MAX_ALIGNMASK) + return -EINVAL; + ops->cit_setkey = setkey; ops->cit_encrypt_one = crypto_tfm_alg_alignmask(tfm) ? cipher_encrypt_unaligned : cipher->cia_encrypt; -- 1.9.1