diff mbox series

kasan: fix unit tests with CONFIG_UBSAN_LOCAL_BOUNDS enabled

Message ID 20210506212025.815380-1-pcc@google.com
State Superseded
Headers show
Series kasan: fix unit tests with CONFIG_UBSAN_LOCAL_BOUNDS enabled | expand

Commit Message

Peter Collingbourne May 6, 2021, 9:20 p.m. UTC
These tests deliberately access these arrays out of bounds,
which will cause the dynamic local bounds checks inserted by
CONFIG_UBSAN_LOCAL_BOUNDS to fail and panic the kernel. To avoid this
problem, access the arrays via volatile pointers, which will prevent
the compiler from being able to determine the array bounds.

Signed-off-by: Peter Collingbourne <pcc@google.com>
Cc: stable@vger.kernel.org
Link: https://linux-review.googlesource.com/id/I90b1713fbfa1bf68ff895aef099ea77b98a7c3b9
---
 lib/test_kasan.c | 14 ++++++++------
 1 file changed, 8 insertions(+), 6 deletions(-)

Comments

Peter Collingbourne May 6, 2021, 11:47 p.m. UTC | #1
On Thu, May 6, 2021 at 3:12 PM Andrey Konovalov <andreyknvl@gmail.com> wrote:
>
> On Thu, May 6, 2021 at 11:20 PM Peter Collingbourne <pcc@google.com> wrote:
> >
> > These tests deliberately access these arrays out of bounds,
> > which will cause the dynamic local bounds checks inserted by
> > CONFIG_UBSAN_LOCAL_BOUNDS to fail and panic the kernel. To avoid this
> > problem, access the arrays via volatile pointers, which will prevent
> > the compiler from being able to determine the array bounds.
> >
> > Signed-off-by: Peter Collingbourne <pcc@google.com>
> > Cc: stable@vger.kernel.org
> > Link: https://linux-review.googlesource.com/id/I90b1713fbfa1bf68ff895aef099ea77b98a7c3b9
> > ---
> >  lib/test_kasan.c | 14 ++++++++------
> >  1 file changed, 8 insertions(+), 6 deletions(-)
> >
> > diff --git a/lib/test_kasan.c b/lib/test_kasan.c
> > index dc05cfc2d12f..2a078e8e7b8e 100644
> > --- a/lib/test_kasan.c
> > +++ b/lib/test_kasan.c
> > @@ -654,8 +654,8 @@ static char global_array[10];
> >
> >  static void kasan_global_oob(struct kunit *test)
> >  {
> > -       volatile int i = 3;
> > -       char *p = &global_array[ARRAY_SIZE(global_array) + i];
> > +       char *volatile array = global_array;
> > +       char *p = &array[ARRAY_SIZE(global_array) + 3];
>
> Nit: in the kernel, "volatile" usually comes before the pointer type.

That would refer to a different type. "volatile char *" is a pointer
to volatile char, while "char *volatile" is a volatile pointer to
char. The latter is what we want here, because we want to prevent the
compiler from inferring things about the pointer itself (i.e. its
array bounds), not the data that it refers to.

Peter
Peter Collingbourne May 7, 2021, 2:59 a.m. UTC | #2
On Thu, May 6, 2021 at 4:58 PM Andrey Konovalov <andreyknvl@gmail.com> wrote:
>

> On Fri, May 7, 2021 at 1:47 AM Peter Collingbourne <pcc@google.com> wrote:

> >

> > On Thu, May 6, 2021 at 3:12 PM Andrey Konovalov <andreyknvl@gmail.com> wrote:

> > >

> > > On Thu, May 6, 2021 at 11:20 PM Peter Collingbourne <pcc@google.com> wrote:

> > > >

> > > > These tests deliberately access these arrays out of bounds,

> > > > which will cause the dynamic local bounds checks inserted by

> > > > CONFIG_UBSAN_LOCAL_BOUNDS to fail and panic the kernel. To avoid this

> > > > problem, access the arrays via volatile pointers, which will prevent

> > > > the compiler from being able to determine the array bounds.

> > > >

> > > > Signed-off-by: Peter Collingbourne <pcc@google.com>

> > > > Cc: stable@vger.kernel.org

> > > > Link: https://linux-review.googlesource.com/id/I90b1713fbfa1bf68ff895aef099ea77b98a7c3b9

> > > > ---

> > > >  lib/test_kasan.c | 14 ++++++++------

> > > >  1 file changed, 8 insertions(+), 6 deletions(-)

> > > >

> > > > diff --git a/lib/test_kasan.c b/lib/test_kasan.c

> > > > index dc05cfc2d12f..2a078e8e7b8e 100644

> > > > --- a/lib/test_kasan.c

> > > > +++ b/lib/test_kasan.c

> > > > @@ -654,8 +654,8 @@ static char global_array[10];

> > > >

> > > >  static void kasan_global_oob(struct kunit *test)

> > > >  {

> > > > -       volatile int i = 3;

> > > > -       char *p = &global_array[ARRAY_SIZE(global_array) + i];

> > > > +       char *volatile array = global_array;

> > > > +       char *p = &array[ARRAY_SIZE(global_array) + 3];

> > >

> > > Nit: in the kernel, "volatile" usually comes before the pointer type.

> >

> > That would refer to a different type. "volatile char *" is a pointer

> > to volatile char, while "char *volatile" is a volatile pointer to

> > char. The latter is what we want here, because we want to prevent the

> > compiler from inferring things about the pointer itself (i.e. its

> > array bounds), not the data that it refers to.

>

> I see. This is unusual. I'd say this needs to be explicitly explained

> in the commit message, as well as in a comment in the code.


Done in v2.

Peter
Andrew Morton May 9, 2021, 12:30 a.m. UTC | #3
On Thu,  6 May 2021 14:20:25 -0700 Peter Collingbourne <pcc@google.com> wrote:

> These tests deliberately access these arrays out of bounds,

> which will cause the dynamic local bounds checks inserted by

> CONFIG_UBSAN_LOCAL_BOUNDS to fail and panic the kernel. To avoid this

> problem, access the arrays via volatile pointers, which will prevent

> the compiler from being able to determine the array bounds.


Huh.  Is this use of volatile the official way of suppressing the
generation of the checking code or is it just something which happened
to work?  I'm wondering if this workaround should be formalized in some
fashion (presumably a wrapper) rather than mysteriously and
unexplainedly open-coding it like this.
Peter Collingbourne May 10, 2021, 5:16 p.m. UTC | #4
On Sat, May 8, 2021 at 5:30 PM Andrew Morton <akpm@linux-foundation.org> wrote:
>

> On Thu,  6 May 2021 14:20:25 -0700 Peter Collingbourne <pcc@google.com> wrote:

>

> > These tests deliberately access these arrays out of bounds,

> > which will cause the dynamic local bounds checks inserted by

> > CONFIG_UBSAN_LOCAL_BOUNDS to fail and panic the kernel. To avoid this

> > problem, access the arrays via volatile pointers, which will prevent

> > the compiler from being able to determine the array bounds.

>

> Huh.  Is this use of volatile the official way of suppressing the

> generation of the checking code or is it just something which happened

> to work?  I'm wondering if this workaround should be formalized in some

> fashion (presumably a wrapper) rather than mysteriously and

> unexplainedly open-coding it like this.


I would consider it the official way in the sense that the compiler
must assume that the pointer that it loads from the address of "array"
has an arbitrary value due to the volatile qualifier, and the array
bounds stuff follows from that. Actually I don't think the compiler is
powerful enough yet to look through the store and load of "array", but
if it were, I think that would be the right way to suppress the
analysis.

Is the comment that I added in v2 not enough here?

Peter
diff mbox series

Patch

diff --git a/lib/test_kasan.c b/lib/test_kasan.c
index dc05cfc2d12f..2a078e8e7b8e 100644
--- a/lib/test_kasan.c
+++ b/lib/test_kasan.c
@@ -654,8 +654,8 @@  static char global_array[10];
 
 static void kasan_global_oob(struct kunit *test)
 {
-	volatile int i = 3;
-	char *p = &global_array[ARRAY_SIZE(global_array) + i];
+	char *volatile array = global_array;
+	char *p = &array[ARRAY_SIZE(global_array) + 3];
 
 	/* Only generic mode instruments globals. */
 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_GENERIC);
@@ -703,8 +703,8 @@  static void ksize_uaf(struct kunit *test)
 static void kasan_stack_oob(struct kunit *test)
 {
 	char stack_array[10];
-	volatile int i = OOB_TAG_OFF;
-	char *p = &stack_array[ARRAY_SIZE(stack_array) + i];
+	char *volatile array = stack_array;
+	char *p = &array[ARRAY_SIZE(stack_array) + OOB_TAG_OFF];
 
 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_STACK);
 
@@ -715,7 +715,8 @@  static void kasan_alloca_oob_left(struct kunit *test)
 {
 	volatile int i = 10;
 	char alloca_array[i];
-	char *p = alloca_array - 1;
+	char *volatile array = alloca_array;
+	char *p = array - 1;
 
 	/* Only generic mode instruments dynamic allocas. */
 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_GENERIC);
@@ -728,7 +729,8 @@  static void kasan_alloca_oob_right(struct kunit *test)
 {
 	volatile int i = 10;
 	char alloca_array[i];
-	char *p = alloca_array + i;
+	char *volatile array = alloca_array;
+	char *p = array + i;
 
 	/* Only generic mode instruments dynamic allocas. */
 	KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_GENERIC);