Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp760492pxb; Wed, 25 Aug 2021 14:33:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyIkyb8I5NZISJnRZ5FkJEnC1kGf8GddKRypOtEtnAbKewkH2L+QwHWZ6/GxKRGujXDrcJm X-Received: by 2002:a05:6638:328f:: with SMTP id f15mr436425jav.111.1629927216000; Wed, 25 Aug 2021 14:33:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629927215; cv=none; d=google.com; s=arc-20160816; b=RIHfngSemXlgxMKpCkZ31I+r673sUbp+0jJHyaGxF7TpAB3WBO2O1JZ6HOwi4YPl04 MV+pI4KR4a8pGslrXa/B+NcClcA6wLVq49xnKOz+V87Zfo4f5HLALbFPB+N0lCMNNuph vXw9Z1v1wLyHDKmQby5Qdrb5qvFb6BdPewPEOXO4GYMuaqqoh5KjT9YuvbHOTc3nncei KNPjSHCL4tyxAQUqME65CfT8/B+D8ODAvPG5zuu3uAZtdzk7XLfhdzcDv4z++5LtiB5f 1Wq0pTrkNuGoOQ4UgissnIAGfCFesmcqJelioiJQ/JWmC59EGOVql+Kn0lcpO3tzE0gv MHiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=CY0qbvVPjAOFzT8qiDPpTkDYSNAZtyk57huJIJzryLM=; b=UuhI155hAJsxwQARQ7SOU430MxmZ3WtDnqT1EGG2PvejIJSheT6/e3BsVUeGJeht6V zw9Vf0yWbxeZNSyfT37qF8rvKPazYif5zWgIKiNVZ2jLmh885XxLacS1f1Q0L653/HeQ AR6N2T36a5t3vzgyENqcLnXJRdEpl1JCkx5zb/DHsOsFcDlbS4erCRiIWj4on/SFy4z8 xc2CsrZCBoYuOMYF8qU6r6ZpoKHzwFBCG+1v/e7so0f7cjMUgu371fqqmkaW1aaNX2Sf dVjiMb3AcKIyC+FOcXajIoZmeemUsij0oBDhB9ZlpPWnxwt7tjq1TWFFdzrIv5rhKhGq USqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=M9bx0SOn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u2si952761ilk.59.2021.08.25.14.33.24; Wed, 25 Aug 2021 14:33:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=M9bx0SOn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231920AbhHYVcg (ORCPT + 99 others); Wed, 25 Aug 2021 17:32:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54066 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229599AbhHYVce (ORCPT ); Wed, 25 Aug 2021 17:32:34 -0400 Received: from mail-lf1-x132.google.com (mail-lf1-x132.google.com [IPv6:2a00:1450:4864:20::132]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1BF6EC0613C1 for ; Wed, 25 Aug 2021 14:31:48 -0700 (PDT) Received: by mail-lf1-x132.google.com with SMTP id k5so1884385lfu.4 for ; Wed, 25 Aug 2021 14:31:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=CY0qbvVPjAOFzT8qiDPpTkDYSNAZtyk57huJIJzryLM=; b=M9bx0SOnsGDlg6EdWvfUJiOzp+LnJnCsliu6HetKE4lwMQsYMSjkRyiS3ej7A9NE0K DirdJBjr4GEtvvADd7Uc/jozQEKtnOFqDn0569t2NcV7iaelhyQwfhLPmCTbNgEqlliO 6BgOXWTb5RqcSy2DGb2XzxNvSx0AhAIVNmRJyzySizRH7yVnnsCUJCGzNnYAT6gh1GBg 8wIjkuqvRlbdWQs/Vzk0LX1gXpdNB/xsdOr4Z57Iqftv68a/gbamW2ZnkKJBfVJZKngN 8vnPfc/n8NDG9AcAFmH+uVPJdHEjtz7lG2+/14IWR/DSRAujCLGzTFBIvdPFCAM8AWMm h/sQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=CY0qbvVPjAOFzT8qiDPpTkDYSNAZtyk57huJIJzryLM=; b=NSxiv9+ulKrO4SYoSYIU/pcYNC27A4RtShpWHzuVeYeYdtzSkupc1guGLJjpmQVC8A TfIvRo+HDRSxAwrKui/VCtDPIT1JEaShvcg08eGnMycKPbhp1REIeW1LL4rKZKozmzU2 72UFOMq7zW7OYFjuD3By/aaTrF3SY2i3895VrGaFiZqCceAZBeCgIssJl9/6jBX50jKL BsSlVhZXElxXKJKa/MaGaYRNURl68GrNcFahJmzyLhTjQIqR3Oe1K6XfH+AvI9w9/o2i PFp+wct117vNzWJtybi+i3mID/dcz1cPOrW8JZ0wp/aGtmB/z3tAOfhsGqABGbsosjQw CVAQ== X-Gm-Message-State: AOAM533FkJ5rHcvGZaSp6q9LXchtsSfseUO6IGzU07aHKHEYyjaLDK1s YI45KVkVdF5mAt5ouNiwOmO2L53b09WoiAisyvKMmA== X-Received: by 2002:a19:7117:: with SMTP id m23mr134039lfc.73.1629927106160; Wed, 25 Aug 2021 14:31:46 -0700 (PDT) MIME-Version: 1.0 References: <20210818214021.2476230-1-keescook@chromium.org> <20210818214021.2476230-5-keescook@chromium.org> In-Reply-To: <20210818214021.2476230-5-keescook@chromium.org> From: Nick Desaulniers Date: Wed, 25 Aug 2021 14:31:34 -0700 Message-ID: Subject: Re: [PATCH v2 4/7] slab: Add __alloc_size attributes for better bounds checking To: Kees Cook Cc: linux-kernel@vger.kernel.org, Daniel Micay , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton , Vlastimil Babka , linux-mm@kvack.org, Joe Perches , Miguel Ojeda , Nathan Chancellor , Andy Whitcroft , Dwaipayan Ray , Lukas Bulwahn , Dennis Zhou , Tejun Heo , Masahiro Yamada , Michal Marek , clang-built-linux@googlegroups.com, linux-kbuild@vger.kernel.org, linux-hardening@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 18, 2021 at 2:40 PM Kees Cook wrote: > > As already done in GrapheneOS, add the __alloc_size attribute for > regular kmalloc interfaces, to provide additional hinting for better > bounds checking, assisting CONFIG_FORTIFY_SOURCE and other compiler > optimizations. > > Co-developed-by: Daniel Micay > Signed-off-by: Daniel Micay > Cc: Christoph Lameter > Cc: Pekka Enberg > Cc: David Rientjes > Cc: Joonsoo Kim > Cc: Andrew Morton > Cc: Vlastimil Babka > Cc: linux-mm@kvack.org > Signed-off-by: Kees Cook This is a good start, so Reviewed-by: Nick Desaulniers Do we also want to attribute: * __kmalloc_index * kmem_cache_free_bulk * kmem_cache_alloc_bulk * kmem_cache_alloc_trace * kmalloc_order * kmalloc_order_trace * kmalloc_large * kmalloc_node * __kmalloc_track_caller * kmalloc_array_node * __kmalloc_node_track_caller > --- > include/linux/slab.h | 20 ++++++++++++++++++-- > 1 file changed, 18 insertions(+), 2 deletions(-) > > diff --git a/include/linux/slab.h b/include/linux/slab.h > index 10fd0a8c816a..6ce826d8194d 100644 > --- a/include/linux/slab.h > +++ b/include/linux/slab.h > @@ -181,7 +181,7 @@ int kmem_cache_shrink(struct kmem_cache *s); > /* > * Common kmalloc functions provided by all allocators > */ > -__must_check > +__must_check __alloc_size(2) > void *krealloc(const void *objp, size_t new_size, gfp_t flags); > void kfree(const void *objp); > void kfree_sensitive(const void *objp); > @@ -426,6 +426,7 @@ static __always_inline unsigned int __kmalloc_index(size_t size, > #define kmalloc_index(s) __kmalloc_index(s, true) > #endif /* !CONFIG_SLOB */ > > +__alloc_size(1) > void *__kmalloc(size_t size, gfp_t flags) __assume_kmalloc_alignment __malloc; > void *kmem_cache_alloc(struct kmem_cache *s, gfp_t flags) __assume_kmalloc_alignment __malloc; > void kmem_cache_free(struct kmem_cache *s, void *objp); > @@ -450,6 +451,7 @@ static __always_inline void kfree_bulk(size_t size, void **p) > } > > #ifdef CONFIG_NUMA > +__alloc_size(1) > void *__kmalloc_node(size_t size, gfp_t flags, int node) __assume_slab_alignment __malloc; > void *kmem_cache_alloc_node(struct kmem_cache *s, gfp_t flags, int node) > __assume_slab_alignment __malloc; > @@ -574,6 +576,7 @@ static __always_inline void *kmalloc_large(size_t size, gfp_t flags) > * Try really hard to succeed the allocation but fail > * eventually. > */ > +__alloc_size(1) > static __always_inline void *kmalloc(size_t size, gfp_t flags) > { > if (__builtin_constant_p(size)) { > @@ -596,6 +599,7 @@ static __always_inline void *kmalloc(size_t size, gfp_t flags) > return __kmalloc(size, flags); > } > > +__alloc_size(1) > static __always_inline void *kmalloc_node(size_t size, gfp_t flags, int node) > { > #ifndef CONFIG_SLOB > @@ -620,6 +624,7 @@ static __always_inline void *kmalloc_node(size_t size, gfp_t flags, int node) > * @size: element size. > * @flags: the type of memory to allocate (see kmalloc). > */ > +__alloc_size(1, 2) > static inline void *kmalloc_array(size_t n, size_t size, gfp_t flags) > { > size_t bytes; > @@ -638,7 +643,7 @@ static inline void *kmalloc_array(size_t n, size_t size, gfp_t flags) > * @new_size: new size of a single member of the array > * @flags: the type of memory to allocate (see kmalloc) > */ > -__must_check > +__must_check __alloc_size(2, 3) > static inline void *krealloc_array(void *p, size_t new_n, size_t new_size, > gfp_t flags) > { > @@ -656,6 +661,7 @@ static inline void *krealloc_array(void *p, size_t new_n, size_t new_size, > * @size: element size. > * @flags: the type of memory to allocate (see kmalloc). > */ > +__alloc_size(1, 2) > static inline void *kcalloc(size_t n, size_t size, gfp_t flags) > { > return kmalloc_array(n, size, flags | __GFP_ZERO); > @@ -685,6 +691,7 @@ static inline void *kmalloc_array_node(size_t n, size_t size, gfp_t flags, > return __kmalloc_node(bytes, flags, node); > } > > +__alloc_size(1, 2) > static inline void *kcalloc_node(size_t n, size_t size, gfp_t flags, int node) > { > return kmalloc_array_node(n, size, flags | __GFP_ZERO, node); > @@ -718,6 +725,7 @@ static inline void *kmem_cache_zalloc(struct kmem_cache *k, gfp_t flags) > * @size: how many bytes of memory are required. > * @flags: the type of memory to allocate (see kmalloc). > */ > +__alloc_size(1) > static inline void *kzalloc(size_t size, gfp_t flags) > { > return kmalloc(size, flags | __GFP_ZERO); > @@ -729,25 +737,31 @@ static inline void *kzalloc(size_t size, gfp_t flags) > * @flags: the type of memory to allocate (see kmalloc). > * @node: memory node from which to allocate > */ > +__alloc_size(1) > static inline void *kzalloc_node(size_t size, gfp_t flags, int node) > { > return kmalloc_node(size, flags | __GFP_ZERO, node); > } > > +__alloc_size(1) > extern void *kvmalloc_node(size_t size, gfp_t flags, int node); > +__alloc_size(1) > static inline void *kvmalloc(size_t size, gfp_t flags) > { > return kvmalloc_node(size, flags, NUMA_NO_NODE); > } > +__alloc_size(1) > static inline void *kvzalloc_node(size_t size, gfp_t flags, int node) > { > return kvmalloc_node(size, flags | __GFP_ZERO, node); > } > +__alloc_size(1) > static inline void *kvzalloc(size_t size, gfp_t flags) > { > return kvmalloc(size, flags | __GFP_ZERO); > } > > +__alloc_size(1, 2) > static inline void *kvmalloc_array(size_t n, size_t size, gfp_t flags) > { > size_t bytes; > @@ -758,11 +772,13 @@ static inline void *kvmalloc_array(size_t n, size_t size, gfp_t flags) > return kvmalloc(bytes, flags); > } > > +__alloc_size(1, 2) > static inline void *kvcalloc(size_t n, size_t size, gfp_t flags) > { > return kvmalloc_array(n, size, flags | __GFP_ZERO); > } > > +__alloc_size(3) > extern void *kvrealloc(const void *p, size_t oldsize, size_t newsize, > gfp_t flags); > extern void kvfree(const void *addr); > -- -- Thanks, ~Nick Desaulniers