Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp4954895rwn; Mon, 12 Sep 2022 01:49:46 -0700 (PDT) X-Google-Smtp-Source: AA6agR6neZAg2aWp/SwjZxBTALqQVhnsAl9wS3adiRxgZcwMZKB0qAd8YlPchpDBdTZ8WO+WCyWd X-Received: by 2002:a62:5b05:0:b0:53e:8615:37a2 with SMTP id p5-20020a625b05000000b0053e861537a2mr24449368pfb.71.1662972586718; Mon, 12 Sep 2022 01:49:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662972586; cv=none; d=google.com; s=arc-20160816; b=wvOqkYMFP6ggY1w6H1BI6pPSNvhmxCcr1a8JgTAZFqXsyTY3JLxKKAaLthLR+kBN/Z cDAeH8rO/8d9mJkNckDlZJD0WHY3F1jMzGyCqfMq+rX1ZjZaLhDmsLfsE4s1w3kxuD6G 0xAbN+J36kHlrXMiTk6MM68SprAyhW/ndssZ520tFLAGL6dFTqS92JwD3+NyzsTtL4Zh ZLtSDFOxMObkSyWpGvMYv2P31lJm5d7nc3QEkTmbd0zuaJGCbcE8pirNWinF1bKyk4qY Z9JLQIral0aSG1UFnGXIHzKpx+5q3FvYbbPkP7VNQWad1vHRkw2WyvFCrqIdxMzA+0SQ oreg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :organization:from:references:cc:to:content-language:subject :user-agent:mime-version:date:message-id:dkim-signature; bh=iUXVxZ0tVSdqVMm4kJRnZzMs90fpOV6KnjsDwxuVrcA=; b=hmbdMQCgbl4iiQsmLNV2pVE2Nc1LqmY54ZgsOODnRB05Ej2CL6TaFcvIeRO45PLoMJ tyIYHau4Cow2V+E7sA+1wqEjrmLmP1ZI1o+Wuoq3OGH7UhBAXkyTWeuSgmf2I4WggtOo 8I/TNyfPBXWrwjrESae3HHjupw50gy6psGl4vnlN8PlLHMugff/IuumGtqUgnavmteup VpaOVE8Pwarzz5y9srwQnfKZ3vX8d0nS6Xy8lOumXu2p5YtFolCYLq/n5cvfpI6aeaNE HlKbLOtz5BfC4nlkeOKDO5eQaZ5bBfXWQ2NzVkHFwJUMIK2GnFL4DKtxgDJZ428QXXEt CEYg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="S/XiF70f"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jb9-20020a170903258900b0016d9e2902aesi7813519plb.293.2022.09.12.01.49.35; Mon, 12 Sep 2022 01:49:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="S/XiF70f"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229607AbiILIiY (ORCPT + 99 others); Mon, 12 Sep 2022 04:38:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37690 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229597AbiILIiW (ORCPT ); Mon, 12 Sep 2022 04:38:22 -0400 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 758E46554 for ; Mon, 12 Sep 2022 01:38:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1662971901; x=1694507901; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=676Q4od556vZmd7cq9TKwuaMhlRemWp6qSXEwJjBJOc=; b=S/XiF70fxdwQ0Vrn5Y6S7nhEICjTtV5+4Vg9Xcpje7IzJ7mfCR5JRjlc PA0VgRuY3RgHItqk9lY/IcBjE3xFk+2buNHSn2p+MLLVAlGPHnY8lQJ7m HIu8m3ewW4rWFXC1i+r2buZJvFVpPAjDwijF6dibwM1jxBDYR9TZjQi8t nRQZgw4PlMWrdZEtwPzHN9NF2UE7kTM97hGiq3iLHpgX0NArNfGTk2tSY Rxwzd433Ee4J5G2hc0go4W8DsAd6nFc7SVIEQjnLK1U6ep5SKlgOzH06G iHWqVaH3l3QY5qLwbH+gWLwHty5n/eb79mhhe9Ld0AbNDKClPTgDg3hsx w==; X-IronPort-AV: E=McAfee;i="6500,9779,10467"; a="361767024" X-IronPort-AV: E=Sophos;i="5.93,308,1654585200"; d="scan'208";a="361767024" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Sep 2022 01:38:21 -0700 X-IronPort-AV: E=Sophos;i="5.93,308,1654585200"; d="scan'208";a="677998840" Received: from mwojtowi-mobl.ger.corp.intel.com (HELO [10.213.24.87]) ([10.213.24.87]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Sep 2022 01:38:16 -0700 Message-ID: Date: Mon, 12 Sep 2022 10:38:14 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0 Thunderbird/102.2.2 Subject: Re: [PATCH v10 1/9] overflow: Allow mixed type arguments Content-Language: en-US To: Gwan-gyeong Mun , intel-gfx@lists.freedesktop.org Cc: linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, mchehab@kernel.org, chris@chris-wilson.co.uk, matthew.auld@intel.com, thomas.hellstrom@linux.intel.com, jani.nikula@intel.com, nirmoy.das@intel.com, airlied@redhat.com, daniel@ffwll.ch, andi.shyti@linux.intel.com, keescook@chromium.org, mauro.chehab@linux.intel.com, linux@rasmusvillemoes.dk, vitor@massaru.org, dlatypov@google.com, ndesaulniers@google.com References: <20220909105913.752049-1-gwan-gyeong.mun@intel.com> <20220909105913.752049-2-gwan-gyeong.mun@intel.com> From: Andrzej Hajda Organization: Intel Technology Poland sp. z o.o. - ul. Slowackiego 173, 80-298 Gdansk - KRS 101882 - NIP 957-07-52-316 In-Reply-To: <20220909105913.752049-2-gwan-gyeong.mun@intel.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09.09.2022 12:59, Gwan-gyeong Mun wrote: > From: Kees Cook > > When the check_[op]_overflow() helpers were introduced, all arguments were > required to be the same type to make the fallback macros simpler. However, > now that the fallback macros have been removed[1], it is fine to allow > mixed types, which makes using the helpers much more useful, as they > can be used to test for type-based overflows (e.g. adding two large ints > but storing into a u8), as would be handy in the drm core[2]. > > Remove the restriction, and add additional self-tests that exercise some > of the mixed-type overflow cases, and double-check for accidental macro > side-effects. > > [1] https://git.kernel.org/linus/4eb6bd55cfb22ffc20652732340c4962f3ac9a91 > [2] https://lore.kernel.org/lkml/20220824084514.2261614-2-gwan-gyeong.mun@intel.com > > Cc: Rasmus Villemoes > Cc: Gwan-gyeong Mun > Cc: Andrzej Hajda > Cc: "Gustavo A. R. Silva" > Cc: Nick Desaulniers > Cc: linux-hardening@vger.kernel.org > Signed-off-by: Kees Cook Reviewed-by: Andrzej Hajda Regards Andrzej > --- > include/linux/overflow.h | 72 ++++++++++++++++------------ > lib/overflow_kunit.c | 101 ++++++++++++++++++++++++++++----------- > 2 files changed, 113 insertions(+), 60 deletions(-) > > diff --git a/include/linux/overflow.h b/include/linux/overflow.h > index 0eb3b192f07a..19dfdd74835e 100644 > --- a/include/linux/overflow.h > +++ b/include/linux/overflow.h > @@ -51,40 +51,50 @@ static inline bool __must_check __must_check_overflow(bool overflow) > return unlikely(overflow); > } > > -/* > - * For simplicity and code hygiene, the fallback code below insists on > - * a, b and *d having the same type (similar to the min() and max() > - * macros), whereas gcc's type-generic overflow checkers accept > - * different types. Hence we don't just make check_add_overflow an > - * alias for __builtin_add_overflow, but add type checks similar to > - * below. > +/** check_add_overflow() - Calculate addition with overflow checking > + * > + * @a: first addend > + * @b: second addend > + * @d: pointer to store sum > + * > + * Returns 0 on success. > + * > + * *@d holds the results of the attempted addition, but is not considered > + * "safe for use" on a non-zero return value, which indicates that the > + * sum has overflowed or been truncated. > */ > -#define check_add_overflow(a, b, d) __must_check_overflow(({ \ > - typeof(a) __a = (a); \ > - typeof(b) __b = (b); \ > - typeof(d) __d = (d); \ > - (void) (&__a == &__b); \ > - (void) (&__a == __d); \ > - __builtin_add_overflow(__a, __b, __d); \ > -})) > +#define check_add_overflow(a, b, d) \ > + __must_check_overflow(__builtin_add_overflow(a, b, d)) > > -#define check_sub_overflow(a, b, d) __must_check_overflow(({ \ > - typeof(a) __a = (a); \ > - typeof(b) __b = (b); \ > - typeof(d) __d = (d); \ > - (void) (&__a == &__b); \ > - (void) (&__a == __d); \ > - __builtin_sub_overflow(__a, __b, __d); \ > -})) > +/** check_sub_overflow() - Calculate subtraction with overflow checking > + * > + * @a: minuend; value to subtract from > + * @b: subtrahend; value to subtract from @a > + * @d: pointer to store difference > + * > + * Returns 0 on success. > + * > + * *@d holds the results of the attempted subtraction, but is not considered > + * "safe for use" on a non-zero return value, which indicates that the > + * difference has underflowed or been truncated. > + */ > +#define check_sub_overflow(a, b, d) \ > + __must_check_overflow(__builtin_sub_overflow(a, b, d)) > > -#define check_mul_overflow(a, b, d) __must_check_overflow(({ \ > - typeof(a) __a = (a); \ > - typeof(b) __b = (b); \ > - typeof(d) __d = (d); \ > - (void) (&__a == &__b); \ > - (void) (&__a == __d); \ > - __builtin_mul_overflow(__a, __b, __d); \ > -})) > +/** check_mul_overflow() - Calculate multiplication with overflow checking > + * > + * @a: first factor > + * @b: second factor > + * @d: pointer to store product > + * > + * Returns 0 on success. > + * > + * *@d holds the results of the attempted multiplication, but is not > + * considered "safe for use" on a non-zero return value, which indicates > + * that the product has overflowed or been truncated. > + */ > +#define check_mul_overflow(a, b, d) \ > + __must_check_overflow(__builtin_mul_overflow(a, b, d)) > > /** check_shl_overflow() - Calculate a left-shifted value and check overflow > * > diff --git a/lib/overflow_kunit.c b/lib/overflow_kunit.c > index 7e3e43679b73..0d98c9bc75da 100644 > --- a/lib/overflow_kunit.c > +++ b/lib/overflow_kunit.c > @@ -16,12 +16,15 @@ > #include > #include > > -#define DEFINE_TEST_ARRAY(t) \ > - static const struct test_ ## t { \ > - t a, b; \ > - t sum, diff, prod; \ > - bool s_of, d_of, p_of; \ > - } t ## _tests[] > +#define DEFINE_TEST_ARRAY_TYPED(t1, t2, t) \ > + static const struct test_ ## t1 ## _ ## t2 ## __ ## t { \ > + t1 a; \ > + t2 b; \ > + t sum, diff, prod; \ > + bool s_of, d_of, p_of; \ > + } t1 ## _ ## t2 ## __ ## t ## _tests[] > + > +#define DEFINE_TEST_ARRAY(t) DEFINE_TEST_ARRAY_TYPED(t, t, t) > > DEFINE_TEST_ARRAY(u8) = { > {0, 0, 0, 0, 0, false, false, false}, > @@ -222,21 +225,27 @@ DEFINE_TEST_ARRAY(s64) = { > }; > #endif > > -#define check_one_op(t, fmt, op, sym, a, b, r, of) do { \ > - t _r; \ > - bool _of; \ > - \ > - _of = check_ ## op ## _overflow(a, b, &_r); \ > - KUNIT_EXPECT_EQ_MSG(test, _of, of, \ > +#define check_one_op(t, fmt, op, sym, a, b, r, of) do { \ > + int _a_orig = a, _a_bump = a + 1; \ > + int _b_orig = b, _b_bump = b + 1; \ > + bool _of; \ > + t _r; \ > + \ > + _of = check_ ## op ## _overflow(a, b, &_r); \ > + KUNIT_EXPECT_EQ_MSG(test, _of, of, \ > "expected "fmt" "sym" "fmt" to%s overflow (type %s)\n", \ > - a, b, of ? "" : " not", #t); \ > - KUNIT_EXPECT_EQ_MSG(test, _r, r, \ > + a, b, of ? "" : " not", #t); \ > + KUNIT_EXPECT_EQ_MSG(test, _r, r, \ > "expected "fmt" "sym" "fmt" == "fmt", got "fmt" (type %s)\n", \ > - a, b, r, _r, #t); \ > + a, b, r, _r, #t); \ > + /* Check for internal macro side-effects. */ \ > + _of = check_ ## op ## _overflow(_a_orig++, _b_orig++, &_r); \ > + KUNIT_EXPECT_EQ_MSG(test, _a_orig, _a_bump, "Unexpected " #op " macro side-effect!\n"); \ > + KUNIT_EXPECT_EQ_MSG(test, _b_orig, _b_bump, "Unexpected " #op " macro side-effect!\n"); \ > } while (0) > > -#define DEFINE_TEST_FUNC(t, fmt) \ > -static void do_test_ ## t(struct kunit *test, const struct test_ ## t *p) \ > +#define DEFINE_TEST_FUNC_TYPED(n, t, fmt) \ > +static void do_test_ ## n(struct kunit *test, const struct test_ ## n *p) \ > { \ > check_one_op(t, fmt, add, "+", p->a, p->b, p->sum, p->s_of); \ > check_one_op(t, fmt, add, "+", p->b, p->a, p->sum, p->s_of); \ > @@ -245,15 +254,18 @@ static void do_test_ ## t(struct kunit *test, const struct test_ ## t *p) \ > check_one_op(t, fmt, mul, "*", p->b, p->a, p->prod, p->p_of); \ > } \ > \ > -static void t ## _overflow_test(struct kunit *test) { \ > +static void n ## _overflow_test(struct kunit *test) { \ > unsigned i; \ > \ > - for (i = 0; i < ARRAY_SIZE(t ## _tests); ++i) \ > - do_test_ ## t(test, &t ## _tests[i]); \ > + for (i = 0; i < ARRAY_SIZE(n ## _tests); ++i) \ > + do_test_ ## n(test, &n ## _tests[i]); \ > kunit_info(test, "%zu %s arithmetic tests finished\n", \ > - ARRAY_SIZE(t ## _tests), #t); \ > + ARRAY_SIZE(n ## _tests), #n); \ > } > > +#define DEFINE_TEST_FUNC(t, fmt) \ > + DEFINE_TEST_FUNC_TYPED(t ## _ ## t ## __ ## t, t, fmt) > + > DEFINE_TEST_FUNC(u8, "%d"); > DEFINE_TEST_FUNC(s8, "%d"); > DEFINE_TEST_FUNC(u16, "%d"); > @@ -265,6 +277,33 @@ DEFINE_TEST_FUNC(u64, "%llu"); > DEFINE_TEST_FUNC(s64, "%lld"); > #endif > > +DEFINE_TEST_ARRAY_TYPED(u32, u32, u8) = { > + {0, 0, 0, 0, 0, false, false, false}, > + {U8_MAX, 2, 1, U8_MAX - 2, U8_MAX - 1, true, false, true}, > + {U8_MAX + 1, 0, 0, 0, 0, true, true, false}, > +}; > +DEFINE_TEST_FUNC_TYPED(u32_u32__u8, u8, "%d"); > + > +DEFINE_TEST_ARRAY_TYPED(u32, u32, int) = { > + {0, 0, 0, 0, 0, false, false, false}, > + {U32_MAX, 0, -1, -1, 0, true, true, false}, > +}; > +DEFINE_TEST_FUNC_TYPED(u32_u32__int, int, "%d"); > + > +DEFINE_TEST_ARRAY_TYPED(u8, u8, int) = { > + {0, 0, 0, 0, 0, false, false, false}, > + {U8_MAX, U8_MAX, 2 * U8_MAX, 0, U8_MAX * U8_MAX, false, false, false}, > + {1, 2, 3, -1, 2, false, false, false}, > +}; > +DEFINE_TEST_FUNC_TYPED(u8_u8__int, int, "%d"); > + > +DEFINE_TEST_ARRAY_TYPED(int, int, u8) = { > + {0, 0, 0, 0, 0, false, false, false}, > + {1, 2, 3, U8_MAX, 2, false, true, false}, > + {-1, 0, U8_MAX, U8_MAX, 0, true, true, false}, > +}; > +DEFINE_TEST_FUNC_TYPED(int_int__u8, u8, "%d"); > + > static void overflow_shift_test(struct kunit *test) > { > int count = 0; > @@ -649,17 +688,21 @@ static void overflow_size_helpers_test(struct kunit *test) > } > > static struct kunit_case overflow_test_cases[] = { > - KUNIT_CASE(u8_overflow_test), > - KUNIT_CASE(s8_overflow_test), > - KUNIT_CASE(u16_overflow_test), > - KUNIT_CASE(s16_overflow_test), > - KUNIT_CASE(u32_overflow_test), > - KUNIT_CASE(s32_overflow_test), > + KUNIT_CASE(u8_u8__u8_overflow_test), > + KUNIT_CASE(s8_s8__s8_overflow_test), > + KUNIT_CASE(u16_u16__u16_overflow_test), > + KUNIT_CASE(s16_s16__s16_overflow_test), > + KUNIT_CASE(u32_u32__u32_overflow_test), > + KUNIT_CASE(s32_s32__s32_overflow_test), > /* Clang 13 and earlier generate unwanted libcalls on 32-bit. */ > #if BITS_PER_LONG == 64 > - KUNIT_CASE(u64_overflow_test), > - KUNIT_CASE(s64_overflow_test), > + KUNIT_CASE(u64_u64__u64_overflow_test), > + KUNIT_CASE(s64_s64__s64_overflow_test), > #endif > + KUNIT_CASE(u32_u32__u8_overflow_test), > + KUNIT_CASE(u32_u32__int_overflow_test), > + KUNIT_CASE(u8_u8__int_overflow_test), > + KUNIT_CASE(int_int__u8_overflow_test), > KUNIT_CASE(overflow_shift_test), > KUNIT_CASE(overflow_allocation_test), > KUNIT_CASE(overflow_size_helpers_test),