On Wed, Jul 11, 2018 at 10:36 PM, Kees Cook <keescook@xxxxxxxxxxxx> wrote: > Several uses of AHASH_REQUEST_ON_STACK() will trigger FRAME_WARN warnings > (when less than 2048) once the VLA is no longer hidden from the check: > > drivers/block/drbd/drbd_worker.c:325:1: warning: the frame size of 1112 bytes is larger than 1024 bytes [-Wframe-larger-than=] > drivers/block/drbd/drbd_worker.c:352:1: warning: the frame size of 1120 bytes is larger than 1024 bytes [-Wframe-larger-than=] > crypto/ccm.c:235:1: warning: the frame size of 1184 bytes is larger than 1024 bytes [-Wframe-larger-than=] > drivers/md/dm-crypt.c:353:1: warning: the frame size of 1096 bytes is larger than 1024 bytes [-Wframe-larger-than=] > drivers/net/ppp/ppp_mppe.c:158:1: warning: the frame size of 1168 bytes is larger than 1024 bytes [-Wframe-larger-than=] > net/wireless/lib80211_crypt_tkip.c:537:1: warning: the frame size of 1136 bytes is larger than 1024 bytes [-Wframe-larger-than=] > drivers/staging/rtl8192u/ieee80211/ieee80211_crypt_tkip.c:528:1: warning: the frame size of 1136 bytes is larger than 1024 bytes [-Wframe-larger-than=] > drivers/staging/rtl8192e/rtllib_crypt_tkip.c:531:1: warning: the frame size of 1136 bytes is larger than 1024 bytes [-Wframe-larger-than=] > > This bumps the affected objects by 20% to silence the warnings while still > providing coverage is anything grows even more. > > Signed-off-by: Kees Cook <keescook@xxxxxxxxxxxx> I think this is a dangerous precedent, I wouldn't really want any of those functions to ever take more than 1024 bytes, even that is really too much, but we can't easily lower the global limit. You are patching all users of AHASH_REQUEST_ON_STACK with the exception of arch/x86/power/hibernate_64.c here (which is always used on 64-bit and has a larger limit already), which in turn suggests that the AHASH_REQUEST_ON_STACK macro using bytes is just fundamentally broken by requiring that much space (808 bytes for the context, plus 8 pointers for struct ahash_request, plus CRYPTO_MINALIGN_ATTR). How did you come up with that 808 byte number? I see a total of 39 callers of crypto_ahash_set_reqsize(), did you check all of those individually? If 808 bytes is the worst case, what are the next 5 ones? If there are only a few of them that are badly written, maybe we can fix the drivers instead and lower that number to something more reasonable. Looking through some of the drivers, I found this interesting one: #define SHA_BUFFER_LEN (PAGE_SIZE / 16) struct atmel_sha_reqctx { ... u8 buffer[SHA_BUFFER_LEN + SHA512_BLOCK_SIZE] __aligned(sizeof(u32)); }; which would result in overrunning the kernel stack immediately if ever used with 64k PAGE_SIZE (we fortunately don't support that driver on any architectures with 64k pages yet). The other ones I looked at seem to all be well under 400 bytes (which is still a lot to put on the stack, but probably ok). Arnd -- dm-devel mailing list dm-devel@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/dm-devel