Received: by 10.213.65.68 with SMTP id h4csp1419231imn; Mon, 19 Mar 2018 03:46:46 -0700 (PDT) X-Google-Smtp-Source: AG47ELsfVk2lvWGAch6HoVJQQcrkK1Y2MtZKWkdFHZA83x7iB6+dN0aNptRPYiZChzS7QFiOFQ60 X-Received: by 10.101.82.198 with SMTP id z6mr8705714pgp.41.1521456406457; Mon, 19 Mar 2018 03:46:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521456406; cv=none; d=google.com; s=arc-20160816; b=l2rAUknGtoE52uqknmZEQSfy9z1xALzvFwUeRTvFnlG36YmK5/Rnil0vOMAR7PjeIf mFSPKgr5/IUPbszwdH5jyX6k76y8sTijGAAlVwigXPqKX7Hj82l09HYiPGJExCV8dBPA NEorF1n1/byJcd4EyhqidMZ4WQg61fYLFIeNG7C1NTuKbNOZsllb8+SDIOeomPX0fLLe km371Zyn47HppwIBJRXFJZvE94eTjMf1aKUs1orz03FiAUJM0F3mLHvCWkER3LJWjl9T brkXIeWilev9UBLme4Jvk15UXceaUipIlJZu/1RcQlm4VmAdjVDl3AhY6CPkpFwMWYEH 48rA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=d+BDbftqlKEm2GYgkCVqqTBpV902ePPKsgGcJNbZ/UU=; b=vFPz4THjWoKAHhk8PEqJQVFWTF+uY2b8jpV/WA1g0WaxkXKsg5+UBD6aMTuXZRdLNU Dnt7FrtdeeSpSVk6mNDDbLISGlbDSsyhCVh1ghAVtcD1tQw0fkgPaE05zEJorWHeQDIB ZfpiWR0F7aLfn82GghlaXMYs/6F2rGX+Q0TilvESzTKXuK+ItmlWwTHR7eKNWioQZ7rq u/lf8kize0CZwkfdU9i5txKWnne9u2rRqmlOk7wm/5geCpXnz3knvUPHNH4nGcs0c5nD /Yz19edy2gVYVhBBKmdAjIHgxwRYbKqFJr8HHbaW6MZRpYUjGfz6ieDZ3ZqJixFh74+E 24yg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rsC4eBho; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u3-v6si6231168plb.593.2018.03.19.03.46.32; Mon, 19 Mar 2018 03:46:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rsC4eBho; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755483AbeCSKpR (ORCPT + 99 others); Mon, 19 Mar 2018 06:45:17 -0400 Received: from mail-lf0-f68.google.com ([209.85.215.68]:34212 "EHLO mail-lf0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755372AbeCSKpN (ORCPT ); Mon, 19 Mar 2018 06:45:13 -0400 Received: by mail-lf0-f68.google.com with SMTP id l191-v6so24686141lfe.1; Mon, 19 Mar 2018 03:45:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=d+BDbftqlKEm2GYgkCVqqTBpV902ePPKsgGcJNbZ/UU=; b=rsC4eBhoqjUAYopKuhebP64zAJQrBSYKmx95WBSFSS7m5Rrn2Dt9zsoZk2r7GuCYRL D7tRAvs1RCxbjTPds9rYRCtSpqjnxlfN3SerVPUeATAuTXSM7dqftDSzRJ4RlKXrnIx9 rutp+6xm2IF1UDBNaJa1/GlMxTJg3mPq+LZM2OHOcd0AZ8dlnAt3DWKrUdAOqZ6CgsKy BSU/Hohh4nkh2TSuOFyUTJOIPjIv088AihqmrdWkOqqhAzGjH5TI+GRkgzBPL0CC+LTB 3ZrrVU/X18as6XKAOnupNSpGH79CQA0G316p22kxlblwGvZC80dXazXOMAZzwk4qcYvr 1Rlg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=d+BDbftqlKEm2GYgkCVqqTBpV902ePPKsgGcJNbZ/UU=; b=CYZ25KCiHnpAm+HpjQVo0pKXulDRVi1SWSYgtkS3RGyThJDyDSHncNI2PSnIA/dpyb mnSEu0qgG9exrELRMADiJR+j8aDtrJuV+FVnlMRwC0+6SBsQA+JrSgzocqHyXYAG+noS l2H+MD6MCYc9c5Ha9Wkr6LV3ONkfhBrpTTkmYHGCn58hcLKnAy5Zkd7DkSFDss/3xEXt oPVnEmge5Th//fopzjvy9ernlMIpMccDAKkpf8wez/4cUmREh8MmWdPYhBPs1DCG5oOD SQ2IJa00dCdhlxj74AFryiWZ9FDS2lsDI00a1G5fPnVWLkKWxqSt3VeN/Ayym4nz1VJJ Qnag== X-Gm-Message-State: AElRT7HVAdUwaQo1d/neFlGffWARXdgPUCQEtfb29fwl3VyxG1qRBYZi 2WI/MRLy9DhDxSlDc35MF2A= X-Received: by 10.46.135.74 with SMTP id q10mr7386389ljj.73.1521456311481; Mon, 19 Mar 2018 03:45:11 -0700 (PDT) Received: from [172.16.25.12] (msk-vpn.virtuozzo.com. [195.214.232.6]) by smtp.gmail.com with ESMTPSA id n24sm2953683ljg.22.2018.03.19.03.45.10 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 19 Mar 2018 03:45:10 -0700 (PDT) Subject: Re: [PATCH v5 2/2] Remove false-positive VLAs when using max() To: Kees Cook , Andrew Morton Cc: Linus Torvalds , Josh Poimboeuf , Rasmus Villemoes , Randy Dunlap , Miguel Ojeda , Ingo Molnar , David Laight , Ian Abbott , linux-input@vger.kernel.org, linux-btrfs@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-hardening@lists.openwall.com References: <1521174359-46392-1-git-send-email-keescook@chromium.org> <1521174359-46392-3-git-send-email-keescook@chromium.org> From: Andrey Ryabinin Message-ID: <22223483-f668-7158-336f-d3036253ea20@gmail.com> Date: Mon, 19 Mar 2018 13:45:57 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <1521174359-46392-3-git-send-email-keescook@chromium.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/16/2018 07:25 AM, Kees Cook wrote: > As part of removing VLAs from the kernel[1], we want to build with -Wvla, > but it is overly pessimistic and only accepts constant expressions for > stack array sizes, instead of also constant values. The max() macro > triggers the warning, so this refactors these uses of max() to use the > new const_max() instead. > > [1] https://lkml.org/lkml/2018/3/7/621 > > Signed-off-by: Kees Cook > --- > drivers/input/touchscreen/cyttsp4_core.c | 2 +- > fs/btrfs/tree-checker.c | 3 ++- > lib/vsprintf.c | 5 +++-- > net/ipv4/proc.c | 8 ++++---- > net/ipv6/proc.c | 11 +++++------ > 5 files changed, 15 insertions(+), 14 deletions(-) > FWIW, the patch below is alternative way to deal with these (Note, I didn't test my patch, just demonstrating the idea). It's quite simple, and should work on any gcc version. This approach wouldn't work well for CONFIG dependent max values, especially in case of single constant expression being dependent on several config options, but it seems we don't have any these. drivers/input/touchscreen/cyttsp4_core.c | 3 ++- fs/btrfs/tree-checker.c | 3 ++- lib/vsprintf.c | 6 ++++-- net/ipv4/proc.c | 4 +++- net/ipv6/proc.c | 6 ++++-- 5 files changed, 15 insertions(+), 7 deletions(-) diff --git a/drivers/input/touchscreen/cyttsp4_core.c b/drivers/input/touchscreen/cyttsp4_core.c index 727c3232517c..ce546a3fad3d 100644 --- a/drivers/input/touchscreen/cyttsp4_core.c +++ b/drivers/input/touchscreen/cyttsp4_core.c @@ -868,7 +868,8 @@ static void cyttsp4_get_mt_touches(struct cyttsp4_mt_data *md, int num_cur_tch) struct cyttsp4_touch tch; int sig; int i, j, t = 0; - int ids[max(CY_TMA1036_MAX_TCH, CY_TMA4XX_MAX_TCH)]; + int ids[CY_TMA4XX_MAX_TCH]; + BUILD_BUG_ON(CY_TMA1036_MAX_TCH > CY_TMA4XX_MAX_TCH); memset(ids, 0, si->si_ofs.tch_abs[CY_TCH_T].max * sizeof(int)); for (i = 0; i < num_cur_tch; i++) { diff --git a/fs/btrfs/tree-checker.c b/fs/btrfs/tree-checker.c index 8871286c1a91..ad4c2fea572f 100644 --- a/fs/btrfs/tree-checker.c +++ b/fs/btrfs/tree-checker.c @@ -346,7 +346,8 @@ static int check_dir_item(struct btrfs_fs_info *fs_info, */ if (key->type == BTRFS_DIR_ITEM_KEY || key->type == BTRFS_XATTR_ITEM_KEY) { - char namebuf[max(BTRFS_NAME_LEN, XATTR_NAME_MAX)]; + char namebuf[BTRFS_NAME_LEN]; + BUILD_BUG_ON(XATTR_NAME_MAX > BTRFS_NAME_LEN); read_extent_buffer(leaf, namebuf, (unsigned long)(di + 1), name_len); diff --git a/lib/vsprintf.c b/lib/vsprintf.c index 942b5234a59b..fa081d684660 100644 --- a/lib/vsprintf.c +++ b/lib/vsprintf.c @@ -754,13 +754,15 @@ char *resource_string(char *buf, char *end, struct resource *res, #define FLAG_BUF_SIZE (2 * sizeof(res->flags)) #define DECODED_BUF_SIZE sizeof("[mem - 64bit pref window disabled]") #define RAW_BUF_SIZE sizeof("[mem - flags 0x]") - char sym[max(2*RSRC_BUF_SIZE + DECODED_BUF_SIZE, - 2*RSRC_BUF_SIZE + FLAG_BUF_SIZE + RAW_BUF_SIZE)]; + char sym[2*RSRC_BUF_SIZE + DECODED_BUF_SIZE]; char *p = sym, *pend = sym + sizeof(sym); int decode = (fmt[0] == 'R') ? 1 : 0; const struct printf_spec *specp; + BUILD_BUG_ON((2*RSRC_BUF_SIZE + FLAG_BUF_SIZE + RAW_BUF_SIZE) > + (2*RSRC_BUF_SIZE + DECODED_BUF_SIZE)); + *p++ = '['; if (res->flags & IORESOURCE_IO) { p = string(p, pend, "io ", str_spec); diff --git a/net/ipv4/proc.c b/net/ipv4/proc.c index d97e83b2dd33..9d08749de8d0 100644 --- a/net/ipv4/proc.c +++ b/net/ipv4/proc.c @@ -46,7 +46,7 @@ #include #include -#define TCPUDP_MIB_MAX max_t(u32, UDP_MIB_MAX, TCP_MIB_MAX) +#define TCPUDP_MIB_MAX TCP_MIB_MAX /* * Report socket allocation statistics [mea@utu.fi] @@ -404,6 +404,8 @@ static int snmp_seq_show_tcp_udp(struct seq_file *seq, void *v) struct net *net = seq->private; int i; + BUILD_BUG_ON(UDP_MIB_MAX > TCP_MIB_MAX); + memset(buff, 0, TCPUDP_MIB_MAX * sizeof(unsigned long)); seq_puts(seq, "\nTcp:"); diff --git a/net/ipv6/proc.c b/net/ipv6/proc.c index 1678cf037688..3ad91dae7324 100644 --- a/net/ipv6/proc.c +++ b/net/ipv6/proc.c @@ -32,8 +32,7 @@ #define MAX4(a, b, c, d) \ max_t(u32, max_t(u32, a, b), max_t(u32, c, d)) -#define SNMP_MIB_MAX MAX4(UDP_MIB_MAX, TCP_MIB_MAX, \ - IPSTATS_MIB_MAX, ICMP_MIB_MAX) +#define SNMP_MIB_MAX IPSTATS_MIB_MAX static int sockstat6_seq_show(struct seq_file *seq, void *v) { @@ -198,6 +197,9 @@ static void snmp6_seq_show_item(struct seq_file *seq, void __percpu *pcpumib, unsigned long buff[SNMP_MIB_MAX]; int i; + BUILD_BUG_ON(MAX4(UDP_MIB_MAX, TCP_MIB_MAX, + IPSTATS_MIB_MAX, ICMP_MIB_MAX) > SNMP_MIB_MAX); + if (pcpumib) { memset(buff, 0, sizeof(unsigned long) * SNMP_MIB_MAX); -- 2.16.1