linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Kees Cook <keescook@chromium.org>
To: linux-hardening@vger.kernel.org
Cc: Kees Cook <keescook@chromium.org>,
	Andrew Morton <akpm@linux-foundation.org>,
	Masahiro Yamada <masahiroy@kernel.org>,
	Nathan Chancellor <nathan@kernel.org>,
	Nicolas Schier <nicolas@fjasle.eu>,
	linux-kbuild@vger.kernel.org,
	"Gustavo A. R. Silva" <gustavoars@kernel.org>,
	Bill Wendling <morbo@google.com>,
	Justin Stitt <justinstitt@google.com>,
	linux-kernel@vger.kernel.org
Subject: [PATCH 07/82] overflow: Introduce CONFIG_UBSAN_POINTER_WRAP
Date: Mon, 22 Jan 2024 16:26:42 -0800	[thread overview]
Message-ID: <20240123002814.1396804-7-keescook@chromium.org> (raw)
In-Reply-To: <20240122235208.work.748-kees@kernel.org>

Gain coverage for pointer wrap-around checking. Adds support for
-fsanitize=pointer-overflow, and introduces the __pointer_wrap function
attribute to match the signed and unsigned attributes. Also like the
others, it is currently disabled under CONFIG_COMPILE_TEST.

Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Masahiro Yamada <masahiroy@kernel.org>
Cc: Nathan Chancellor <nathan@kernel.org>
Cc: Nicolas Schier <nicolas@fjasle.eu>
Cc: linux-kbuild@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
---
 Documentation/process/deprecated.rst |  2 +-
 include/linux/compiler_types.h       |  7 +++++-
 lib/Kconfig.ubsan                    |  8 +++++++
 lib/test_ubsan.c                     | 33 ++++++++++++++++++++++++++++
 lib/ubsan.c                          | 21 ++++++++++++++++++
 lib/ubsan.h                          |  1 +
 scripts/Makefile.ubsan               |  1 +
 7 files changed, 71 insertions(+), 2 deletions(-)

diff --git a/Documentation/process/deprecated.rst b/Documentation/process/deprecated.rst
index aebd7c6cd2fc..15e77cbd4259 100644
--- a/Documentation/process/deprecated.rst
+++ b/Documentation/process/deprecated.rst
@@ -143,7 +143,7 @@ replaced with a type max subtraction test instead::
 
 For inline helpers that are performing wrapping arithmetic, the entire
 function can be annotated as intentionally wrapping by adding the
-`__signed_wrap` or `__unsigned_wrap` function attribute.
+`__signed_wrap`, `__unsigned_wrap`, or `__pointer_wrap` function attribute.
 
 simple_strtol(), simple_strtoll(), simple_strtoul(), simple_strtoull()
 ----------------------------------------------------------------------
diff --git a/include/linux/compiler_types.h b/include/linux/compiler_types.h
index d24f43fc79c6..84cfd9d55453 100644
--- a/include/linux/compiler_types.h
+++ b/include/linux/compiler_types.h
@@ -293,12 +293,17 @@ struct ftrace_likely_data {
 #else
 # define __unsigned_wrap
 #endif
+#ifdef CONFIG_UBSAN_POINTER_WRAP
+# define __pointer_wrap __attribute__((no_sanitize("pointer-overflow")))
+#else
+# define __pointer_wrap
+#endif
 
 /* Section for code which can't be instrumented at all */
 #define __noinstr_section(section)					\
 	noinline notrace __attribute((__section__(section)))		\
 	__no_kcsan __no_sanitize_address __no_profile __no_sanitize_coverage \
-	__no_sanitize_memory __signed_wrap __unsigned_wrap
+	__no_sanitize_memory __signed_wrap __unsigned_wrap __pointer_wrap
 
 #define noinstr __noinstr_section(".noinstr.text")
 
diff --git a/lib/Kconfig.ubsan b/lib/Kconfig.ubsan
index a7003e5bd2a1..04222a6d7fd9 100644
--- a/lib/Kconfig.ubsan
+++ b/lib/Kconfig.ubsan
@@ -135,6 +135,14 @@ config UBSAN_UNSIGNED_WRAP
 	  for wrap-around of any arithmetic operations with unsigned integers. This
 	  currently causes x86 to fail to boot.
 
+config UBSAN_POINTER_WRAP
+	bool "Perform checking for pointer arithmetic wrap-around"
+	depends on !COMPILE_TEST
+	depends on $(cc-option,-fsanitize=pointer-overflow)
+	help
+	  This option enables -fsanitize=pointer-overflow which checks
+	  for wrap-around of any arithmetic operations with pointers.
+
 config UBSAN_BOOL
 	bool "Perform checking for non-boolean values used as boolean"
 	default UBSAN
diff --git a/lib/test_ubsan.c b/lib/test_ubsan.c
index 84d8092d6c32..1cc049b3ef34 100644
--- a/lib/test_ubsan.c
+++ b/lib/test_ubsan.c
@@ -56,6 +56,36 @@ static void test_ubsan_negate_overflow(void)
 	val = -val;
 }
 
+static void test_ubsan_pointer_overflow_add(void)
+{
+	volatile void *top = (void *)ULONG_MAX;
+
+	UBSAN_TEST(CONFIG_UBSAN_POINTER_WRAP);
+	top += 2;
+}
+
+static void test_ubsan_pointer_overflow_sub(void)
+{
+	volatile void *bottom = (void *)1;
+
+	UBSAN_TEST(CONFIG_UBSAN_POINTER_WRAP);
+	bottom -= 3;
+}
+
+struct ptr_wrap {
+	int a;
+	int b;
+};
+
+static void test_ubsan_pointer_overflow_mul(void)
+{
+	volatile struct ptr_wrap *half = (void *)(ULONG_MAX - 128);
+	volatile int bump = 128;
+
+	UBSAN_TEST(CONFIG_UBSAN_POINTER_WRAP);
+	half += bump;
+}
+
 static void test_ubsan_divrem_overflow(void)
 {
 	volatile int val = 16;
@@ -139,6 +169,9 @@ static const test_ubsan_fp test_ubsan_array[] = {
 	test_ubsan_sub_overflow,
 	test_ubsan_mul_overflow,
 	test_ubsan_negate_overflow,
+	test_ubsan_pointer_overflow_add,
+	test_ubsan_pointer_overflow_sub,
+	test_ubsan_pointer_overflow_mul,
 	test_ubsan_shift_out_of_bounds,
 	test_ubsan_out_of_bounds,
 	test_ubsan_load_invalid_value,
diff --git a/lib/ubsan.c b/lib/ubsan.c
index 5fc107f61934..d49580ff6aea 100644
--- a/lib/ubsan.c
+++ b/lib/ubsan.c
@@ -289,6 +289,27 @@ void __ubsan_handle_negate_overflow(void *_data, void *old_val)
 }
 EXPORT_SYMBOL(__ubsan_handle_negate_overflow);
 
+void __ubsan_handle_pointer_overflow(void *_data, void *lhs, void *rhs)
+{
+	struct overflow_data *data = _data;
+	unsigned long before = (unsigned long)lhs;
+	unsigned long after  = (unsigned long)rhs;
+
+	if (suppress_report(&data->location))
+		return;
+
+	ubsan_prologue(&data->location, "pointer-overflow");
+
+	if (after == 0)
+		pr_err("overflow wrapped to NULL\n");
+	else if (after < before)
+		pr_err("overflow wrap-around\n");
+	else
+		pr_err("underflow wrap-around\n");
+
+	ubsan_epilogue();
+}
+EXPORT_SYMBOL(__ubsan_handle_pointer_overflow);
 
 void __ubsan_handle_divrem_overflow(void *_data, void *lhs, void *rhs)
 {
diff --git a/lib/ubsan.h b/lib/ubsan.h
index 0abbbac8700d..5dd27923b78b 100644
--- a/lib/ubsan.h
+++ b/lib/ubsan.h
@@ -128,6 +128,7 @@ void __ubsan_handle_add_overflow(void *data, void *lhs, void *rhs);
 void __ubsan_handle_sub_overflow(void *data, void *lhs, void *rhs);
 void __ubsan_handle_mul_overflow(void *data, void *lhs, void *rhs);
 void __ubsan_handle_negate_overflow(void *_data, void *old_val);
+void __ubsan_handle_pointer_overflow(void *_data, void *lhs, void *rhs);
 void __ubsan_handle_divrem_overflow(void *_data, void *lhs, void *rhs);
 void __ubsan_handle_type_mismatch(struct type_mismatch_data *data, void *ptr);
 void __ubsan_handle_type_mismatch_v1(void *_data, void *ptr);
diff --git a/scripts/Makefile.ubsan b/scripts/Makefile.ubsan
index de4fc0ae448a..37e8c31dc655 100644
--- a/scripts/Makefile.ubsan
+++ b/scripts/Makefile.ubsan
@@ -10,6 +10,7 @@ ubsan-cflags-$(CONFIG_UBSAN_DIV_ZERO)		+= -fsanitize=integer-divide-by-zero
 ubsan-cflags-$(CONFIG_UBSAN_UNREACHABLE)	+= -fsanitize=unreachable
 ubsan-cflags-$(CONFIG_UBSAN_SIGNED_WRAP)	+= -fsanitize=signed-integer-overflow
 ubsan-cflags-$(CONFIG_UBSAN_UNSIGNED_WRAP)	+= -fsanitize=unsigned-integer-overflow
+ubsan-cflags-$(CONFIG_UBSAN_POINTER_WRAP)	+= -fsanitize=pointer-overflow
 ubsan-cflags-$(CONFIG_UBSAN_BOOL)		+= -fsanitize=bool
 ubsan-cflags-$(CONFIG_UBSAN_ENUM)		+= -fsanitize=enum
 ubsan-cflags-$(CONFIG_UBSAN_TRAP)		+= -fsanitize-undefined-trap-on-error
-- 
2.34.1


  parent reply	other threads:[~2024-01-23  0:28 UTC|newest]

Thread overview: 163+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-01-23  0:26 [PATCH 00/82] overflow: Refactor open-coded arithmetic wrap-around Kees Cook
2024-01-23  0:26 ` [PATCH 01/82] overflow: Expand check_add_overflow() for pointer addition Kees Cook
2024-01-26 22:52   ` Justin Stitt
2024-01-26 22:57     ` Kees Cook
2024-01-23  0:26 ` [PATCH 02/82] overflow: Introduce add_would_overflow() Kees Cook
2024-01-23  8:03   ` Rasmus Villemoes
2024-01-23 21:38     ` Kees Cook
2024-01-23  0:26 ` [PATCH 03/82] overflow: Introduce add_wrap() Kees Cook
2024-01-23  8:14   ` Rasmus Villemoes
2024-01-23 21:51     ` Kees Cook
2024-01-23  9:22   ` Mark Rutland
2024-01-23 21:52     ` Kees Cook
2024-01-23  0:26 ` [PATCH 04/82] docs: deprecated.rst: deprecate open-coded arithmetic wrap-around Kees Cook
2024-01-23  0:26 ` [PATCH 05/82] cocci: Refactor " Kees Cook
2024-01-23  0:26 ` [PATCH 06/82] overflow: Reintroduce signed and unsigned overflow sanitizers Kees Cook
2024-01-23  2:24   ` Miguel Ojeda
2024-01-23  4:45     ` Kees Cook
2024-01-23 11:20       ` Miguel Ojeda
2024-01-23  0:26 ` Kees Cook [this message]
2024-01-23  0:26 ` [PATCH 08/82] iov_iter: Avoid wrap-around instrumentation in copy_compat_iovec_from_user Kees Cook
2024-01-23  0:26 ` [PATCH 09/82] select: Avoid wrap-around instrumentation in do_sys_poll() Kees Cook
2024-01-23 18:00   ` Jan Kara
2024-01-23  0:26 ` [PATCH 10/82] locking/atomic/x86: Silence intentional wrapping addition Kees Cook
2024-01-23  9:27   ` Mark Rutland
2024-01-23 21:54     ` Kees Cook
2024-01-23  0:26 ` [PATCH 11/82] arm64: atomics: lse: " Kees Cook
2024-01-23  9:53   ` Mark Rutland
2024-01-23  0:26 ` [PATCH 12/82] ipv4: " Kees Cook
2024-01-23  0:26 ` [PATCH 13/82] btrfs: Refactor intentional wrap-around calculation Kees Cook
2024-01-23  1:45   ` David Sterba
2024-01-23  0:26 ` [PATCH 14/82] smb: client: " Kees Cook
2024-01-23  0:26 ` [PATCH 15/82] dma-buf: " Kees Cook
2024-01-23  0:26 ` [PATCH 16/82] drm/nouveau/mmu: " Kees Cook
2024-01-23  0:26 ` [PATCH 17/82] drm/vc4: " Kees Cook
2024-01-23  0:26 ` [PATCH 18/82] ext4: " Kees Cook
2024-01-23  0:26 ` [PATCH 19/82] fs: " Kees Cook
2024-01-23 18:01   ` Jan Kara
2024-01-23  0:26 ` [PATCH 20/82] fpga: dfl: " Kees Cook
2024-01-23  0:26 ` [PATCH 21/82] drivers/fsi: " Kees Cook
2024-01-23  0:26 ` [PATCH 22/82] x86/sgx: " Kees Cook
2024-01-23  9:15   ` Jarkko Sakkinen
2024-01-23  0:26 ` [PATCH 23/82] KVM: " Kees Cook
2024-01-24 16:25   ` Sean Christopherson
2024-01-23  0:26 ` [PATCH 24/82] KVM: arm64: vgic: " Kees Cook
2024-01-23 10:49   ` Marc Zyngier
2024-01-24 15:13     ` Eric Auger
2024-01-23  0:27 ` [PATCH 25/82] KVM: SVM: " Kees Cook
2024-01-24 16:15   ` Sean Christopherson
2024-01-23  0:27 ` [PATCH 26/82] buildid: " Kees Cook
2024-01-23  0:27 ` [PATCH 27/82] m68k: " Kees Cook
2024-01-23  2:29   ` Liam R. Howlett
2024-01-23  8:13   ` Geert Uytterhoeven
2024-01-23 13:29     ` Eero Tamminen
2024-01-23 13:42       ` Geert Uytterhoeven
2024-01-23  0:27 ` [PATCH 28/82] niu: " Kees Cook
2024-01-23  0:27 ` [PATCH 29/82] rds: " Kees Cook
2024-01-23  0:27 ` [PATCH 30/82] s390/kexec_file: " Kees Cook
2024-01-31 14:22   ` Alexander Gordeev
2024-01-31 14:40     ` Sven Schnelle
2024-01-23  0:27 ` [PATCH 31/82] ARC: dw2 unwind: " Kees Cook
2024-01-23  0:27 ` [PATCH 32/82] vringh: " Kees Cook
2024-01-26 19:31   ` Eugenio Perez Martin
2024-01-26 19:42     ` Kees Cook
2024-01-23  0:27 ` [PATCH 33/82] mm/vmalloc: " Kees Cook
2024-01-30 18:55   ` Lorenzo Stoakes
2024-01-30 19:54     ` Uladzislau Rezki
2024-01-30 21:57       ` Kees Cook
2024-01-31  9:44         ` Uladzislau Rezki
2024-01-23  0:27 ` [PATCH 34/82] ipc: " Kees Cook
2024-01-23  1:07   ` Linus Torvalds
2024-01-23  1:38     ` Kees Cook
2024-01-23 18:06       ` Linus Torvalds
2024-01-23 19:00         ` Kees Cook
2024-01-23  0:27 ` [PATCH 35/82] ACPI: custom_method: Refactor intentional wrap-around test Kees Cook
2024-01-24 19:52   ` Rafael J. Wysocki
2024-01-24 20:16     ` Kees Cook
2024-01-23  0:27 ` [PATCH 36/82] agp: " Kees Cook
2024-01-23  0:27 ` [PATCH 37/82] aio: " Kees Cook
2024-01-23 15:30   ` Christian Brauner
2024-01-23 18:03   ` Jan Kara
2024-01-23  0:27 ` [PATCH 38/82] arm: 3117/1: " Kees Cook
2024-01-23  9:56   ` Mark Rutland
2024-01-23 22:41     ` Kees Cook
2024-01-23  0:27 ` [PATCH 39/82] crypto: " Kees Cook
2024-01-23  0:27 ` [PATCH 40/82] arm64: stacktrace: " Kees Cook
2024-01-23  9:58   ` Mark Rutland
2024-01-23  0:27 ` [PATCH 41/82] wil6210: " Kees Cook
2024-01-23  6:36   ` Kalle Valo
2024-01-23 11:50   ` Kalle Valo
2024-01-23 22:52     ` Kees Cook
2024-01-23  0:27 ` [PATCH 42/82] bcachefs: " Kees Cook
2024-01-23  6:36   ` Kent Overstreet
2024-01-23  0:27 ` [PATCH 43/82] bpf: " Kees Cook
2024-01-23  4:00   ` Yonghong Song
2024-01-23  4:07     ` Kees Cook
2024-01-23  5:13       ` Yonghong Song
2024-01-23  0:27 ` [PATCH 44/82] btrfs: " Kees Cook
2024-01-23 18:00   ` David Sterba
2024-01-23  0:27 ` [PATCH 45/82] cifs: " Kees Cook
2024-01-23  0:27 ` [PATCH 46/82] crypto: " Kees Cook
2024-01-23  3:07   ` Eric Biggers
2024-01-23  3:29     ` Kees Cook
2024-01-23  0:27 ` [PATCH 47/82] dm verity: " Kees Cook
2024-01-30 18:58   ` Mike Snitzer
2024-01-23  0:27 ` [PATCH 48/82] drm/nouveau/mmu: " Kees Cook
2024-01-23  0:27 ` [PATCH 49/82] drm/i915: " Kees Cook
2024-01-23  0:27 ` [PATCH 50/82] drm/vc4: " Kees Cook
2024-01-23  0:27 ` [PATCH 51/82] ext4: " Kees Cook
2024-01-23  0:27 ` [PATCH 52/82] f2fs: " Kees Cook
2024-01-23  0:27 ` [PATCH 53/82] fs: " Kees Cook
2024-01-23 18:02   ` Jan Kara
2024-01-23  0:27 ` [PATCH 54/82] hpfs: " Kees Cook
2024-01-23  0:27 ` [PATCH 55/82] kasan: " Kees Cook
2024-01-25 22:35   ` Andrey Konovalov
2024-01-23  0:27 ` [PATCH 56/82] usercopy: " Kees Cook
2024-01-23  0:27 ` [PATCH 57/82] KVM: arm64: vgic-v3: " Kees Cook
2024-01-23 10:50   ` Marc Zyngier
2024-01-24 15:12   ` Eric Auger
2024-01-23  0:27 ` [PATCH 58/82] s390/mm: " Kees Cook
2024-01-23  0:27 ` [PATCH 59/82] lib/scatterlist: " Kees Cook
2024-01-23  0:27 ` [PATCH 60/82] powerpc: " Kees Cook
2024-02-12  5:38   ` Michael Ellerman
2024-01-23  0:27 ` [PATCH 61/82] scsi: mpt3sas: " Kees Cook
2024-01-23  0:27 ` [PATCH 62/82] mwifiex: pcie: " Kees Cook
2024-01-23  6:36   ` Kalle Valo
2024-01-23  0:27 ` [PATCH 63/82] mm: " Kees Cook
2024-01-23  0:27 ` [PATCH 64/82] netfilter: " Kees Cook
2024-01-23 18:03   ` Florian Westphal
2024-01-23  0:27 ` [PATCH 65/82] nios2: " Kees Cook
2024-01-23 13:15   ` Dinh Nguyen
2024-01-23  0:27 ` [PATCH 66/82] fs/ntfs3: " Kees Cook
2024-01-23  0:27 ` [PATCH 67/82] ocfs2: " Kees Cook
2024-01-23  0:27 ` [PATCH 68/82] PCI: " Kees Cook
2024-01-23  0:27 ` [PATCH 69/82] perf tools: " Kees Cook
2024-01-23  6:21   ` Adrian Hunter
2024-01-23 21:31     ` Kees Cook
2024-01-23  0:27 ` [PATCH 70/82] remoteproc: " Kees Cook
2024-02-06 18:55   ` Bjorn Andersson
2024-01-23  0:27 ` [PATCH 71/82] s390/mm: " Kees Cook
2024-01-23  0:27 ` [PATCH 72/82] scsi: sd_zbc: " Kees Cook
2024-01-23  0:27 ` [PATCH 73/82] sh: " Kees Cook
2024-01-23  7:31   ` John Paul Adrian Glaubitz
2024-01-23  0:27 ` [PATCH 74/82] ARC: dw2 unwind: " Kees Cook
2024-01-23  0:27 ` [PATCH 75/82] timekeeping: " Kees Cook
2024-01-23  1:06   ` John Stultz
2024-01-24 19:34   ` Thomas Gleixner
2024-01-23  0:27 ` [PATCH 76/82] udf: " Kees Cook
2024-01-23 17:14   ` Jan Kara
2024-01-23  0:27 ` [PATCH 77/82] virtio: " Kees Cook
2024-01-26 19:33   ` Eugenio Perez Martin
2024-01-23  0:27 ` [PATCH 78/82] mm/vmalloc: " Kees Cook
2024-01-30 18:56   ` Lorenzo Stoakes
2024-01-23  0:27 ` [PATCH 79/82] staging: vme_user: " Kees Cook
2024-01-23  0:27 ` [PATCH 80/82] xen-netback: " Kees Cook
2024-01-23  7:55   ` Jan Beulich
2024-01-23 21:32     ` Kees Cook
2024-01-23  0:27 ` [PATCH 81/82] lib: zstd: " Kees Cook
2024-01-23  0:27 ` [PATCH 82/82] mqueue: " Kees Cook
2024-01-23  2:22 ` [PATCH 00/82] overflow: Refactor open-coded arithmetic wrap-around Kent Overstreet
2024-01-23  2:51   ` Kees Cook
2024-01-23  9:46 ` Mark Rutland
2024-01-23 21:56   ` Kees Cook
2024-01-29  6:27   ` Kees Cook

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240123002814.1396804-7-keescook@chromium.org \
    --to=keescook@chromium.org \
    --cc=akpm@linux-foundation.org \
    --cc=gustavoars@kernel.org \
    --cc=justinstitt@google.com \
    --cc=linux-hardening@vger.kernel.org \
    --cc=linux-kbuild@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=masahiroy@kernel.org \
    --cc=morbo@google.com \
    --cc=nathan@kernel.org \
    --cc=nicolas@fjasle.eu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).