lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAFUsyfKYKsO6krUoa0YYe_hsWqVgZazRXmj7AiBN0LpkaW01NA@mail.gmail.com>
Date: Mon, 22 Jul 2024 12:57:24 +0800
From: Noah Goldstein <goldstein.w.n@...il.com>
To: David Gow <davidgow@...gle.com>
Cc: Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>, 
	Dave Hansen <dave.hansen@...ux.intel.com>, "H . Peter Anvin" <hpa@...or.com>, x86@...nel.org, 
	Geert Uytterhoeven <geert@...ux-m68k.org>, linux-kselftest@...r.kernel.org, 
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH RESEND] x86: checksum: Fix unaligned checksums on < i686

On Sat, Jul 20, 2024 at 2:40 PM David Gow <davidgow@...gle.com> wrote:
>
> The checksum_32 code was originally written to only handle 2-byte
> aligned buffers, but was later extended to support arbitrary alignment.
> However, the non-PPro variant doesn't apply the carry before jumping to
> the 2- or 4-byte aligned versions, which clear CF.
>
> This causes the new checksum_kunit test to fail, as it runs with a large
> number of different possible alignments and both with and without
> carries.
>
> For example:
> ./tools/testing/kunit/kunit.py run --arch i386 --kconfig_add CONFIG_M486=y checksum
> Gives:
>     KTAP version 1
>     # Subtest: checksum
>     1..3
>     ok 1 test_csum_fixed_random_inputs
>     # test_csum_all_carry_inputs: ASSERTION FAILED at lib/checksum_kunit.c:267
>     Expected result == expec, but
>         result == 65281 (0xff01)
>         expec == 65280 (0xff00)
>     not ok 2 test_csum_all_carry_inputs
>     # test_csum_no_carry_inputs: ASSERTION FAILED at lib/checksum_kunit.c:314
>     Expected result == expec, but
>         result == 65535 (0xffff)
>         expec == 65534 (0xfffe)
>     not ok 3 test_csum_no_carry_inputs
>
> With this patch, it passes.
>     KTAP version 1
>     # Subtest: checksum
>     1..3
>     ok 1 test_csum_fixed_random_inputs
>     ok 2 test_csum_all_carry_inputs
>     ok 3 test_csum_no_carry_inputs
>
> I also tested it on a real 486DX2, with the same results.
>
> Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
> Signed-off-by: David Gow <davidgow@...gle.com>
> ---
>
> Re-sending this from [1]. While there's an argument that the whole
> 32-bit checksum code could do with rewriting, it's:
> (a) worth fixing before someone takes the time to rewrite it, and
> (b) worth any future rewrite starting from a point where the tests pass
>
> I don't think there should be any downside to this fix: it only affects
> ancient computers, and adds a single instruction which isn't in a loop.
>
> Cheers,
> -- David
>
> [1]: https://lore.kernel.org/lkml/20230704083206.693155-2-davidgow@google.com/
>
> ---
>  arch/x86/lib/checksum_32.S | 1 +
>  1 file changed, 1 insertion(+)
>
> diff --git a/arch/x86/lib/checksum_32.S b/arch/x86/lib/checksum_32.S
> index 68f7fa3e1322..a5123b29b403 100644
> --- a/arch/x86/lib/checksum_32.S
> +++ b/arch/x86/lib/checksum_32.S
> @@ -62,6 +62,7 @@ SYM_FUNC_START(csum_partial)
>         jl 8f
>         movzbl (%esi), %ebx
>         adcl %ebx, %eax
> +       adcl $0, %eax
>         roll $8, %eax
>         inc %esi
>         testl $2, %esi
> --
> 2.45.2.1089.g2a221341d9-goog
>

I'm not maintainer but LGTM.

Reviewed-by: Noah Goldstein <goldstein.w.n@...il.com>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ