Received: by 10.213.65.68 with SMTP id h4csp2650078imn; Mon, 9 Apr 2018 07:00:03 -0700 (PDT) X-Google-Smtp-Source: AIpwx49BYZy5hOaXISE2j/1CHVbcBtDijxYQ1BGtZs9RS2VvMhVJiTQutmnTTY/pKsilZEIetFqu X-Received: by 10.99.64.3 with SMTP id n3mr24992173pga.13.1523282403793; Mon, 09 Apr 2018 07:00:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523282403; cv=none; d=google.com; s=arc-20160816; b=Nm05XUipbOE1qAITHJYw4/zkYWD0npy4aqz7l7GINlSMpjifyxftpxnPCcO8NPxWiz tqaoPQ44SqGObkb5D6wI4CYnq+s0WMfMpmTlAC8+3Ea+AEPRzZvnBIqLhnvO0tVvq8QF kH/UjvpJRU1pPAoJ9XIh60szMgcjMYwPT/9zzQ7SkSjLCK9HDnixRLUPSg8xUXXMFZsC ku4xUZFPlg6Yjnx9plKuOt/uXNjHhVsSI9kKTmB/X9Dj6cc6ymDP7XKspRv34tsTSLU4 kQkeq2EkNSmypeaGrU2Tr+wnwQ4zxFR0V6Jr0FS/xt/oCxaZfKBfUA9g7TVuHeqW9Kv3 BWYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=hL2osvmSw3S+5hhTzGihfdv/1tHo1fUxHNZ4oL5PviA=; b=wRZHYaBGx88WpzFobZ/qhkZHfn0AMc74CXwkVHXB0wdCLJWssXwUolBLsrb5op4hAr 0we4HfBWfdPdOyjPufGX9sGocsUWTSEKoy7nhvC+1utyNfcERisp8p6OPb8fSL1+GDwp Vl3q+AzOPkpSDtahwikLYENIvuhEP65dMCJfmCUMoRdkI2lupgCq/y/DCUEdBlmwFozW CGhL+59y5a2ee99tAijyOJEG1uVAllLlNJLyKTETJ8klmOPyfTkfi0iW4c8W9Tevj6dR 0r+PFPwx74K8M20A+txdemRqbAQjjuzbWMdh9ZvCtdisYT+vA7E1Uwk80Begu1cJ16A2 qSTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KFkpUjSz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l91-v6si358178plb.301.2018.04.09.06.59.26; Mon, 09 Apr 2018 07:00:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KFkpUjSz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752611AbeDINz1 (ORCPT + 99 others); Mon, 9 Apr 2018 09:55:27 -0400 Received: from mail-wm0-f66.google.com ([74.125.82.66]:51485 "EHLO mail-wm0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752501AbeDINy7 (ORCPT ); Mon, 9 Apr 2018 09:54:59 -0400 Received: by mail-wm0-f66.google.com with SMTP id u189so19289644wmd.1; Mon, 09 Apr 2018 06:54:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=hL2osvmSw3S+5hhTzGihfdv/1tHo1fUxHNZ4oL5PviA=; b=KFkpUjSzjQgGXebvnVEPYSHDP53/vG6b443ENZ+3Ui8QCfHW3V50l8cEzNmD1VglqW sVB0XTwz9aZWvLoCLG91YdDhaiKLZr72O60+xeMNmfhD2iVOy7AVHji/kaEsLXkTSBPG W1cbNUfNafNPge51Kco95K1TeRBJL08Wk0W7ElVgcZ0NvXfyIvLHST/moNK8ZCUk1ia6 BgWQ8jJUZemBvBKP3VT+PLUMmHtPr+ELPBG2Gtx2STiSKVd95de5fLxCwVFDvdF2+ZTF uEFzErAnyrUxC78k+AxPNW1KjVFmQV37T3EFF2DAzsWK0/GgRALx+Qr2XvXedArqk8vR utvA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=hL2osvmSw3S+5hhTzGihfdv/1tHo1fUxHNZ4oL5PviA=; b=IBz3VZ3xNNkGr6+DTd3ij0SVWCeT+is1qnqilpMOW9+UlizpRuurSHu4CnQckSOQxB caLCxf52W+zQkno5GjOVolaEhHyWflICe8puxvatCKeAX6wX+N5yJn3PzEjpT8yTRGYJ T10nfowF82PGNSv4ebwm2E8DKtWGdD7OJ4Azb8mYmJ97ADbp4XfXtGJ1Fy7MggnBfmpS ZFrUPWRZlj+QG2HEJGx+Rkpm3kFnaQbb/j1TWM2xa/jCO+YRgRADnfmooXYq+FQqWJM/ oMK+eRUT4HJoyQHTqRuIl7DruIYk9BNDuMOBSmuJu8PCfvaG2sF38c+b5vPKv/LmJoVL ZMYg== X-Gm-Message-State: ALQs6tCIgjTClt3W+sYqXjVe/WXguf5DxeyDuE4oiWvr26JtnUXKq/mm xK5U0QBesZNLZ9xndfANjVbh+vC5Qp2uMA== X-Received: by 10.28.131.2 with SMTP id f2mr50860wmd.111.1523282098235; Mon, 09 Apr 2018 06:54:58 -0700 (PDT) Received: from localhost ([37.177.115.186]) by smtp.gmail.com with ESMTPSA id y6sm1016818wmy.16.2018.04.09.06.54.57 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 09 Apr 2018 06:54:57 -0700 (PDT) From: Salvatore Mesoraca To: linux-kernel@vger.kernel.org Cc: kernel-hardening@lists.openwall.com, linux-crypto@vger.kernel.org, "David S. Miller" , Herbert Xu , Kees Cook , Salvatore Mesoraca , Eric Biggers , Laura Abbott Subject: [PATCH v2 1/2] crypto: api - laying defines and checks for statically allocated buffers Date: Mon, 9 Apr 2018 15:54:46 +0200 Message-Id: <1523282087-22128-2-git-send-email-s.mesoraca16@gmail.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1523282087-22128-1-git-send-email-s.mesoraca16@gmail.com> References: <1523282087-22128-1-git-send-email-s.mesoraca16@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation for the removal of VLAs[1] from crypto code. We create 2 new compile-time constants: all ciphers implemented in Linux have a block size less than or equal to 16 bytes and the most demanding hw require 16 bytes alignment for the block buffer. We also enforce these limits in crypto_check_alg when a new cipher is registered. [1] http://lkml.kernel.org/r/CA+55aFzCG-zNmZwX4A2FQpadafLfEzK6CC=qPXydAacU1RqZWA@mail.gmail.com Signed-off-by: Salvatore Mesoraca --- crypto/algapi.c | 10 ++++++++++ include/crypto/algapi.h | 8 ++++++++ 2 files changed, 18 insertions(+) diff --git a/crypto/algapi.c b/crypto/algapi.c index 2a0271b..c0755cf 100644 --- a/crypto/algapi.c +++ b/crypto/algapi.c @@ -10,6 +10,7 @@ * */ +#include #include #include #include @@ -59,6 +60,15 @@ static int crypto_check_alg(struct crypto_alg *alg) if (alg->cra_blocksize > PAGE_SIZE / 8) return -EINVAL; + if (!alg->cra_type && (alg->cra_flags & CRYPTO_ALG_TYPE_MASK) == + CRYPTO_ALG_TYPE_CIPHER) { + if (alg->cra_alignmask > MAX_CIPHER_ALIGNMASK) + return -EINVAL; + + if (alg->cra_blocksize > MAX_CIPHER_BLOCKSIZE) + return -EINVAL; + } + if (alg->cra_priority < 0) return -EINVAL; diff --git a/include/crypto/algapi.h b/include/crypto/algapi.h index 1aba888..bd5e8cc 100644 --- a/include/crypto/algapi.h +++ b/include/crypto/algapi.h @@ -17,6 +17,14 @@ #include #include +/* + * Maximum values for blocksize and alignmask, used to allocate + * static buffers that are big enough for any combination of + * ciphers and architectures. + */ +#define MAX_CIPHER_BLOCKSIZE 16 +#define MAX_CIPHER_ALIGNMASK 15 + struct crypto_aead; struct crypto_instance; struct module; -- 1.9.1