Message ID | 20230623211457.102544-11-Julia.Lawall@inria.fr |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:994d:0:b0:3d9:f83d:47d9 with SMTP id k13csp6045677vqr; Fri, 23 Jun 2023 14:17:37 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4Z0S5dv0AbUHUw0sDzETGB7OnGN2h7HJcNxd/RHDCHoUNvxI6f0HXFpw27swjKFUpLxqI2 X-Received: by 2002:a17:902:ec8c:b0:1b6:c552:f5d9 with SMTP id x12-20020a170902ec8c00b001b6c552f5d9mr388642plg.17.1687555056661; Fri, 23 Jun 2023 14:17:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687555056; cv=none; d=google.com; s=arc-20160816; b=hOUXjZd6U+NrmfvgXRFy5kuX2za/1/jf1SSQ8a+1DTSSNiYwFqfETXl8p/uE2MNXMX YSuzM8KMpYBUkVLJNOsHN9PcnuAAV8UiixwqZ1LakXjZxU4Nd95SEEHTGOxjQlD7jde3 DwtD309/AAT56aPQupCFCyKPo0sEG0FgDua4PF4L9mzCEP+Uqfjznts3GzSkvYcoujBP ONt+9kwnFLliVjIDQWnAbF+lfgvvWhwDenCexT0wpfJZmgqjG5Xyp7b8pK3rjtWG9Jno gNf4ZM07N9/BwuchBh8fgBddurjOTBN4X5GVRtC6Tg2rBDzy1tHqgoBpg6eiQ4Fm8NsQ N+Fw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=yyXUjWCAlWpegeeP3K+qGmg2LllPAIpv/xP8Xpl32WI=; fh=ZuSR092+YmLEKokmFv8CHmd1t45Me8cND1PPcjuZM2g=; b=zRWZA5Rj5BlTKMwPJ9X/vS4kOVgA77Sts87Wb2HKR9lyL+MBd0XHG2AkSPU9LcVgIl lLj2ZI3wn94iHNVFCslcJTvFT7LEFXx/L57lBNRB7oEGJe47gJS94VRd7NctZ3lQQ4hk KPWjc/hcdgeJoDVRFyonnPsXzCR8s6kGU0BOLGvBXiOuZfiejxU9i1TkRNLxam9MpT+Q T3iqs5fgtUP6nBMtenGn5Xpb3driaxYR7xcPXl+X9gYEjtkIcbvKF+PQ3GVN2+xmyCH+ 2reLPa7u9i+o7+gRsmuVBljxqTirdvcy1CUE/5747keExBhTkjkZ3BE/VzJS8zscXc+i aw9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@inria.fr header.s=dc header.b=WNpEcGRn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=inria.fr Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id je20-20020a170903265400b001aafec82436si66879plb.204.2023.06.23.14.17.23; Fri, 23 Jun 2023 14:17:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@inria.fr header.s=dc header.b=WNpEcGRn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=inria.fr Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232678AbjFWVPg (ORCPT <rfc822;maxin.john@gmail.com> + 99 others); Fri, 23 Jun 2023 17:15:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50174 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232478AbjFWVPS (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Fri, 23 Jun 2023 17:15:18 -0400 Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F37E110F2; Fri, 23 Jun 2023 14:15:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=inria.fr; s=dc; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=yyXUjWCAlWpegeeP3K+qGmg2LllPAIpv/xP8Xpl32WI=; b=WNpEcGRn571MPELqxpUAnUaAd+wthMvgWsZeSBlG9+nslQAvB0467vBy +dT+w0mrKtvGj6kEa2+EL8nuFIopX4jUrAeLrjGVqXV7Bg9MGGiQHyXqm KujHAwsBPr9y9YnvcAFACQLjPrzg424iTWmZSHchsQwA6ZG8Jt6C5nZ2g A=; Authentication-Results: mail3-relais-sop.national.inria.fr; dkim=none (message not signed) header.i=none; spf=SoftFail smtp.mailfrom=Julia.Lawall@inria.fr; dmarc=fail (p=none dis=none) d=inria.fr X-IronPort-AV: E=Sophos;i="6.01,153,1684792800"; d="scan'208";a="59686168" Received: from i80.paris.inria.fr (HELO i80.paris.inria.fr.) ([128.93.90.48]) by mail3-relais-sop.national.inria.fr with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Jun 2023 23:15:11 +0200 From: Julia Lawall <Julia.Lawall@inria.fr> To: Manivannan Sadhasivam <mani@kernel.org> Cc: keescook@chromium.org, kernel-janitors@vger.kernel.org, mhi@lists.linux.dev, linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 10/26] bus: mhi: host: use array_size Date: Fri, 23 Jun 2023 23:14:41 +0200 Message-Id: <20230623211457.102544-11-Julia.Lawall@inria.fr> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20230623211457.102544-1-Julia.Lawall@inria.fr> References: <20230623211457.102544-1-Julia.Lawall@inria.fr> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1769529731163207012?= X-GMAIL-MSGID: =?utf-8?q?1769529731163207012?= |
Series |
use array_size
|
|
Commit Message
Julia Lawall
June 23, 2023, 9:14 p.m. UTC
Use array_size to protect against multiplication overflows.
The changes were done using the following Coccinelle semantic patch:
// <smpl>
@@
expression E1, E2;
constant C1, C2;
identifier alloc = {vmalloc,vzalloc};
@@
(
alloc(C1 * C2,...)
|
alloc(
- (E1) * (E2)
+ array_size(E1, E2)
,...)
)
// </smpl>
Signed-off-by: Julia Lawall <Julia.Lawall@inria.fr>
---
drivers/bus/mhi/host/init.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
Comments
On 6/23/2023 3:14 PM, Julia Lawall wrote: > Use array_size to protect against multiplication overflows. > > The changes were done using the following Coccinelle semantic patch: > > // <smpl> > @@ > expression E1, E2; > constant C1, C2; > identifier alloc = {vmalloc,vzalloc}; > @@ > > ( > alloc(C1 * C2,...) > | > alloc( > - (E1) * (E2) > + array_size(E1, E2) > ,...) > ) > // </smpl> > > Signed-off-by: Julia Lawall <Julia.Lawall@inria.fr> > > --- > drivers/bus/mhi/host/init.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/drivers/bus/mhi/host/init.c b/drivers/bus/mhi/host/init.c > index f72fcb66f408..34a543a67068 100644 > --- a/drivers/bus/mhi/host/init.c > +++ b/drivers/bus/mhi/host/init.c > @@ -759,8 +759,8 @@ static int parse_ch_cfg(struct mhi_controller *mhi_cntrl, > * so to avoid any memory possible allocation failures, vzalloc is > * used here > */ > - mhi_cntrl->mhi_chan = vzalloc(mhi_cntrl->max_chan * > - sizeof(*mhi_cntrl->mhi_chan)); > + mhi_cntrl->mhi_chan = vzalloc(array_size(mhi_cntrl->max_chan, > + sizeof(*mhi_cntrl->mhi_chan))); > if (!mhi_cntrl->mhi_chan) > return -ENOMEM; > > > This doesn't seem like a good fix. If we've overflowed the multiplication, I don't think we should continue, and the function should return an error. array_size() is going to return SIZE_MAX, and it looks like it is possible that vzalloc() may be able to allocate that successfully in some scenarios. However, that is going to be less memory than parse_ch_cfg() expected to allocate, so later on I expect the function will still corrupt memory - basically the same result as what the unchecked overflow would do. I'm not convinced the semantic patch is bringing value as I suspect most of the code being patched is in the same situation. -Jeff
On Fri, 23 Jun 2023, Jeffrey Hugo wrote: > On 6/23/2023 3:14 PM, Julia Lawall wrote: > > Use array_size to protect against multiplication overflows. > > > > The changes were done using the following Coccinelle semantic patch: > > > > // <smpl> > > @@ > > expression E1, E2; > > constant C1, C2; > > identifier alloc = {vmalloc,vzalloc}; > > @@ > > ( > > alloc(C1 * C2,...) > > | > > alloc( > > - (E1) * (E2) > > + array_size(E1, E2) > > ,...) > > ) > > // </smpl> > > > > Signed-off-by: Julia Lawall <Julia.Lawall@inria.fr> > > > > --- > > drivers/bus/mhi/host/init.c | 4 ++-- > > 1 file changed, 2 insertions(+), 2 deletions(-) > > > > diff --git a/drivers/bus/mhi/host/init.c b/drivers/bus/mhi/host/init.c > > index f72fcb66f408..34a543a67068 100644 > > --- a/drivers/bus/mhi/host/init.c > > +++ b/drivers/bus/mhi/host/init.c > > @@ -759,8 +759,8 @@ static int parse_ch_cfg(struct mhi_controller > > *mhi_cntrl, > > * so to avoid any memory possible allocation failures, vzalloc is > > * used here > > */ > > - mhi_cntrl->mhi_chan = vzalloc(mhi_cntrl->max_chan * > > - sizeof(*mhi_cntrl->mhi_chan)); > > + mhi_cntrl->mhi_chan = vzalloc(array_size(mhi_cntrl->max_chan, > > + sizeof(*mhi_cntrl->mhi_chan))); > > if (!mhi_cntrl->mhi_chan) > > return -ENOMEM; > > > > > > This doesn't seem like a good fix. > > If we've overflowed the multiplication, I don't think we should continue, and > the function should return an error. array_size() is going to return > SIZE_MAX, and it looks like it is possible that vzalloc() may be able to > allocate that successfully in some scenarios. However, that is going to be > less memory than parse_ch_cfg() expected to allocate, so later on I expect the > function will still corrupt memory - basically the same result as what the > unchecked overflow would do. > > I'm not convinced the semantic patch is bringing value as I suspect most of > the code being patched is in the same situation. OK, this just brings the code in line with all the calls updated by Kees's original patch, cited in the cover letter, which were all the calls containing a multiplication that existed at the time. 42bc47b35320 ("treewide: Use array_size() in vmalloc()") fad953ce0b22 ("treewide: Use array_size() in vzalloc()") julia > > -Jeff >
On 6/23/2023 3:45 PM, Julia Lawall wrote: > > > On Fri, 23 Jun 2023, Jeffrey Hugo wrote: > >> On 6/23/2023 3:14 PM, Julia Lawall wrote: >>> Use array_size to protect against multiplication overflows. >>> >>> The changes were done using the following Coccinelle semantic patch: >>> >>> // <smpl> >>> @@ >>> expression E1, E2; >>> constant C1, C2; >>> identifier alloc = {vmalloc,vzalloc}; >>> @@ >>> ( >>> alloc(C1 * C2,...) >>> | >>> alloc( >>> - (E1) * (E2) >>> + array_size(E1, E2) >>> ,...) >>> ) >>> // </smpl> >>> >>> Signed-off-by: Julia Lawall <Julia.Lawall@inria.fr> >>> >>> --- >>> drivers/bus/mhi/host/init.c | 4 ++-- >>> 1 file changed, 2 insertions(+), 2 deletions(-) >>> >>> diff --git a/drivers/bus/mhi/host/init.c b/drivers/bus/mhi/host/init.c >>> index f72fcb66f408..34a543a67068 100644 >>> --- a/drivers/bus/mhi/host/init.c >>> +++ b/drivers/bus/mhi/host/init.c >>> @@ -759,8 +759,8 @@ static int parse_ch_cfg(struct mhi_controller >>> *mhi_cntrl, >>> * so to avoid any memory possible allocation failures, vzalloc is >>> * used here >>> */ >>> - mhi_cntrl->mhi_chan = vzalloc(mhi_cntrl->max_chan * >>> - sizeof(*mhi_cntrl->mhi_chan)); >>> + mhi_cntrl->mhi_chan = vzalloc(array_size(mhi_cntrl->max_chan, >>> + sizeof(*mhi_cntrl->mhi_chan))); >>> if (!mhi_cntrl->mhi_chan) >>> return -ENOMEM; >>> >>> >> >> This doesn't seem like a good fix. >> >> If we've overflowed the multiplication, I don't think we should continue, and >> the function should return an error. array_size() is going to return >> SIZE_MAX, and it looks like it is possible that vzalloc() may be able to >> allocate that successfully in some scenarios. However, that is going to be >> less memory than parse_ch_cfg() expected to allocate, so later on I expect the >> function will still corrupt memory - basically the same result as what the >> unchecked overflow would do. >> >> I'm not convinced the semantic patch is bringing value as I suspect most of >> the code being patched is in the same situation. > > OK, this just brings the code in line with all the calls updated by Kees's > original patch, cited in the cover letter, which were all the > calls containing a multiplication that existed at the time. > > 42bc47b35320 ("treewide: Use array_size() in vmalloc()") > fad953ce0b22 ("treewide: Use array_size() in vzalloc()") Eh. I "git show fad953ce0b22" and it doesn't really tell me much. The commit asserts that uses of vzalloc() and multiplication need array_size(), but doesn't really explain why. This looks like a brute force automated update with no thought and I fear the result of this change is the conclusion that we've solved multiplication overflow, when it doesn't look like we've really done much. Sure, the multiplication gets capped, but can the code actually handle that? I should probably run the numbers, but with the relevant spec capping the number of channels at 256, I don't think we can realistically approach overflow, even on a 32-bit system. However, having correct code that is inherently safe seems like a good idea and so I feel this function has an issue. I just don't think this automated conversion meaningfully does anything to improve the code here. Kees, would you please chime in and educate me here? I feel like I'm missing something important here. -Jeff
On Fri, Jun 23, 2023 at 04:09:46PM -0600, Jeffrey Hugo wrote: > Kees, would you please chime in and educate me here? I feel like I'm > missing something important here. The array_size() family will saturate at SIZE_MAX (rather than potentially wrapping around). No allocator can fulfil a 18446744073709551615 byte (18 exabyte) allocation. :) So the NULL return value will (hopefully) trigger an error path.
On 6/23/2023 5:45 PM, Kees Cook wrote: > On Fri, Jun 23, 2023 at 04:09:46PM -0600, Jeffrey Hugo wrote: >> Kees, would you please chime in and educate me here? I feel like I'm >> missing something important here. > > The array_size() family will saturate at SIZE_MAX (rather than potentially > wrapping around). No allocator can fulfil a 18446744073709551615 byte > (18 exabyte) allocation. :) So the NULL return value will (hopefully) > trigger an error path. > Fair enough, that handles the 64-bit usecase. I'm guessing the assumption is that on a 32-bit usecase where size_t is ~4GB, there won't actually be 4GB to allocate and things will also fail. So far, so good. What about a 32-bit system with something like ARM's LPAE (Large Physical Address Extension) where the host is 32-bit, and so size_t would be ~4GB (as far as I can tell) but phys_addr_t is larger than that, and so we can have/access more than 4GB of resources? Lets see, ignoring that its a 13 year old feature and probably not in circulation anymore, probably still can't satisfy a 4GB allocation since you'd need to map all of it to address it, and part of the address space is surely reserved for other things. Ok, I think I'm convinced. I'm going to sleep on it, but I suspect all will still be good early next week. Thank you for the explanation. -Jeff
On Fri, Jun 23, 2023 at 03:30:36PM -0600, Jeffrey Hugo wrote: > On 6/23/2023 3:14 PM, Julia Lawall wrote: > > Use array_size to protect against multiplication overflows. > > > > The changes were done using the following Coccinelle semantic patch: > > > > // <smpl> > > @@ > > expression E1, E2; > > constant C1, C2; > > identifier alloc = {vmalloc,vzalloc}; > > @@ > > ( > > alloc(C1 * C2,...) > > | > > alloc( > > - (E1) * (E2) > > + array_size(E1, E2) > > ,...) > > ) > > // </smpl> > > > > Signed-off-by: Julia Lawall <Julia.Lawall@inria.fr> > > > > --- > > drivers/bus/mhi/host/init.c | 4 ++-- > > 1 file changed, 2 insertions(+), 2 deletions(-) > > > > diff --git a/drivers/bus/mhi/host/init.c b/drivers/bus/mhi/host/init.c > > index f72fcb66f408..34a543a67068 100644 > > --- a/drivers/bus/mhi/host/init.c > > +++ b/drivers/bus/mhi/host/init.c > > @@ -759,8 +759,8 @@ static int parse_ch_cfg(struct mhi_controller *mhi_cntrl, > > * so to avoid any memory possible allocation failures, vzalloc is > > * used here > > */ > > - mhi_cntrl->mhi_chan = vzalloc(mhi_cntrl->max_chan * > > - sizeof(*mhi_cntrl->mhi_chan)); > > + mhi_cntrl->mhi_chan = vzalloc(array_size(mhi_cntrl->max_chan, > > + sizeof(*mhi_cntrl->mhi_chan))); > > if (!mhi_cntrl->mhi_chan) > > return -ENOMEM; > > > > > > This doesn't seem like a good fix. > > If we've overflowed the multiplication, I don't think we should continue, > and the function should return an error. array_size() is going to return > SIZE_MAX, and it looks like it is possible that vzalloc() may be able to > allocate that successfully in some scenarios. Nope. You can never allocate more that size_t because that's the highest number that the kernel allocation functions can accept. Obviously on 64bit size_t is unbelievably large. If I remember right, on 32bit you didn't used to be able to allocate more than 2GB without doing all sorts of tricks. And everyone deleted those tricks when 64bit machines became super common. regards, dan carpenter
On 6/23/2023 3:14 PM, Julia Lawall wrote: > Use array_size to protect against multiplication overflows. > > The changes were done using the following Coccinelle semantic patch: > > // <smpl> > @@ > expression E1, E2; > constant C1, C2; > identifier alloc = {vmalloc,vzalloc}; > @@ > > ( > alloc(C1 * C2,...) > | > alloc( > - (E1) * (E2) > + array_size(E1, E2) > ,...) > ) > // </smpl> > > Signed-off-by: Julia Lawall <Julia.Lawall@inria.fr> > Reviewed-by: Jeffrey Hugo <quic_jhugo@quicinc.com> Tested-by: Jeffrey Hugo <quic_jhugo@quicinc.com>
diff --git a/drivers/bus/mhi/host/init.c b/drivers/bus/mhi/host/init.c index f72fcb66f408..34a543a67068 100644 --- a/drivers/bus/mhi/host/init.c +++ b/drivers/bus/mhi/host/init.c @@ -759,8 +759,8 @@ static int parse_ch_cfg(struct mhi_controller *mhi_cntrl, * so to avoid any memory possible allocation failures, vzalloc is * used here */ - mhi_cntrl->mhi_chan = vzalloc(mhi_cntrl->max_chan * - sizeof(*mhi_cntrl->mhi_chan)); + mhi_cntrl->mhi_chan = vzalloc(array_size(mhi_cntrl->max_chan, + sizeof(*mhi_cntrl->mhi_chan))); if (!mhi_cntrl->mhi_chan) return -ENOMEM;