On Mon, Aug 20, 2012 at 5:59 AM, Rusty Russell <ru...@rustcorp.com.au> wrote: > On Wed, 15 Aug 2012 21:43:06 +0300, Dmitry Kasatkin > <dmitry.kasat...@intel.com> wrote: >> + } else { >> + struct { >> + struct shash_desc shash; >> + char ctx[crypto_shash_descsize(tfm)]; >> + } desc; > > Linus had a rant a while ago about using variable-sized stack vars in > the kernel (can't find a reference right now, sorry). > > The problem is that either you know there's a limit to > crypto_shash_descsize(), in which case you can just use this here, or > you don't know, in which case, this risks a stack oveflow. > > Cheers, > Rusty.
Well... descriptor size is a algo specific but constant... just sizeof(some struct). So there is no possibility to force overflow unless someone implement some algo driver which uses too big descriptor size. - Dmitry -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/