From patchwork Wed Sep 19 18:54:48 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andrey Konovalov X-Patchwork-Id: 10606251 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 9C2BD6CB for ; Wed, 19 Sep 2018 18:55:51 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 8ED2029178 for ; Wed, 19 Sep 2018 18:55:51 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 822652AF40; Wed, 19 Sep 2018 18:55:51 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.5 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE, USER_IN_DEF_DKIM_WL autolearn=unavailable version=3.3.1 Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 101B629178 for ; Wed, 19 Sep 2018 18:55:51 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 3BD5A8E000F; Wed, 19 Sep 2018 14:55:20 -0400 (EDT) Delivered-To: linux-mm-outgoing@kvack.org Received: by kanga.kvack.org (Postfix, from userid 40) id 347AD8E000A; Wed, 19 Sep 2018 14:55:20 -0400 (EDT) X-Original-To: int-list-linux-mm@kvack.org X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 173968E000F; Wed, 19 Sep 2018 14:55:20 -0400 (EDT) X-Original-To: linux-mm@kvack.org X-Delivered-To: linux-mm@kvack.org Received: from mail-wm1-f71.google.com (mail-wm1-f71.google.com [209.85.128.71]) by kanga.kvack.org (Postfix) with ESMTP id ABB4F8E000A for ; Wed, 19 Sep 2018 14:55:19 -0400 (EDT) Received: by mail-wm1-f71.google.com with SMTP id v1-v6so3851550wmh.4 for ; Wed, 19 Sep 2018 11:55:19 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:dkim-signature:from:to:cc:subject:date :message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=tRTggFtQ5Xof0bdpE6trnqe/KQMT5YATFM7eSCvBAOE=; b=ehb75zMEmNnuhGVG9P/rZPynAq2FCDeWChY77XKwcCu/4DwGZ9LtLDVBYrJQfGDOdy MfPLrsopBFWoIvYCgjVtuansGb52Pj9ljNDJXJdZ/8nfuP1oB6igMQ/C9xdsRR8qIZyy gkqvtKJaNqQGNulSSVBCfJilKD0Fd+7DiOQVMoF1M0kfQS4Zjne6jydIDbLr+Y7z9Hck NGZRPO9TdBUCN/qolxYss7sF9YRTPGRNYS+L9i99iUOUWlZ9urwmYlBuki5WyvhE4qLb LeN1M7DZ3zAPZp0vutDvBrxuPlvHVNPUFp5jjLVdzhHedSJ377PDPZQCaIm14K/QwEpT bvBw== X-Gm-Message-State: APzg51BZT/tOO1fcHhm4J6HzKkMk/jhKvbBa+wKdDATxdUZzaNQcAAP0 vLddXtGoUTmLuZBEEGE5qytpjDbyBut864qvf8oWh+qWW4u/N8IfYEfKaPfkGoXBlZTTLt2RAk2 6G33KUBG0O30K/Qt61X34X1ZLBfntmUSegC1Ddg75PFHNtGGk4Vb3PcHczmJrilCcvTywoFaB4u UN9kVlrwMa0XjzdJyJDwEjTN9mPZLgAY6aL4fUUuqC5G+RTb50urshIgMx0uY/JkfzQloOoPIEH nV2evoi7nXsVanM8Rh/zIRUvIGKWV3XOrDdyfPrNTcUqkJwEtMKwXaegZ9bAGb0kxurIkLP5/gw t6jMdZFIdGSNtYYnoB1me6mL6L/5jo781Q1mkTJUWuoGWgoiOFPLL0YRQ8xLubrAapjR4zC0JPL i X-Received: by 2002:adf:c454:: with SMTP id a20-v6mr29173277wrg.20.1537383319208; Wed, 19 Sep 2018 11:55:19 -0700 (PDT) X-Received: by 2002:adf:c454:: with SMTP id a20-v6mr29173241wrg.20.1537383318519; Wed, 19 Sep 2018 11:55:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537383318; cv=none; d=google.com; s=arc-20160816; b=IMH5rajrG1yTKzWKIr7oW2RgjCHNaXWMaSXAnMr5QlyLCQIRqYpFvzgoJ1DhP1przA x0LfN9reqOWQdmLmemBA0ynV9nOmgkzrSOw5HYaa5Cy1OjlIGlLtkb7/941IUUuYo9ur 6dD23ADMrFb1c3q9ajB5Gb2rb+Z/VW+WG+Y1oKtqQfjscoCXW5o/0heGmh7DH3P1Seqt lJQ9OQhi1vsvUovNqFO9Z3OwtOdPgnnafDrlSmblapuaCz5K3gKBBTuWbPt6F2btRF2Q BV3Ql190PUvBSCi8ceVISy3UfR/jdmRW66Ra36Y6c5PnN90IOlqOxIBh3e+Du3c71+HF EdKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:dkim-signature; bh=tRTggFtQ5Xof0bdpE6trnqe/KQMT5YATFM7eSCvBAOE=; b=lbF2GHSfUpxpRfV7jfpK0UFCqRSKJZpVkQWdeOvnd2iKqYein7GdF8aMKqH8qJKhqQ Ctog7q2KY+yn75b3bTlvpem5yy0oihJ2krCTDIVuFkZxGi5jxXEZzw/XMoWTEO2ZopWF SquSTIEBf2Ntu3cWXQGrgMX4l3X2CjN8MWIb/xdZoWbpZknc/BAReGFlH1i/MLAIweQY sRK6KUlkGKmWYH/9JIcWIUKMpTJKJLhrHNT43dnK9Gw/QPtBf75zEsnBlLq8GdH2zd7j WlcDN+YP0Bhb7zxoK4zlvIwyM67nE5T4qmJCl8i0IH1Zlj3yaoNgfGrZpuGYJ/Je+2qT z6Qg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="b/oxOrN6"; spf=pass (google.com: domain of andreyknvl@google.com designates 209.85.220.65 as permitted sender) smtp.mailfrom=andreyknvl@google.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id w14-v6sor16161120wrr.11.2018.09.19.11.55.18 for (Google Transport Security); Wed, 19 Sep 2018 11:55:18 -0700 (PDT) Received-SPF: pass (google.com: domain of andreyknvl@google.com designates 209.85.220.65 as permitted sender) client-ip=209.85.220.65; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="b/oxOrN6"; spf=pass (google.com: domain of andreyknvl@google.com designates 209.85.220.65 as permitted sender) smtp.mailfrom=andreyknvl@google.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=tRTggFtQ5Xof0bdpE6trnqe/KQMT5YATFM7eSCvBAOE=; b=b/oxOrN65ba3FkcfZ2rFk/U//pgLsJhOJqSgx6/bVZO7dAe8XpR+r9MKsZ+EhAMzd6 F8j0gHTQORVFzJ/G8j3QHlxTriBz4n6iOR9sEGqx4ykMuyqHm6wD2otk1fbcciHVRcx9 TF/WhauK2uM9LGI7Zf0HPXltws79YU1D9IHHnMbkDEqdyCcGmeKL8LKnhpU3qgBAiOOQ z3yAKeCgdq5hSYtWPyvE2e818NqwPNnSUeTDxgJcDkdSIG/aOh4l1Uxq4P0B1GLXqn6i 8sgmAvE/YejHR7OKDCAHBn1FsK3JC7WYYsCr++MTr6qDjp0Am/TaPUBEz2pxALKJtV46 TstQ== X-Google-Smtp-Source: ANB0VdYyUSbjWAVxz/tZw9sJ0Nn/OHR0lGdwfdGP/aqrt1Zlm7xgeFQykgyrZTq/UUXdEolG+C4GSw== X-Received: by 2002:a5d:63c4:: with SMTP id c4-v6mr5404693wrw.106.1537383318103; Wed, 19 Sep 2018 11:55:18 -0700 (PDT) Received: from andreyknvl0.muc.corp.google.com ([2a00:79e0:15:10:84be:a42a:826d:c530]) by smtp.gmail.com with ESMTPSA id b10-v6sm8510065wmc.28.2018.09.19.11.55.16 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 19 Sep 2018 11:55:17 -0700 (PDT) From: Andrey Konovalov To: Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , Catalin Marinas , Will Deacon , Christoph Lameter , Andrew Morton , Mark Rutland , Nick Desaulniers , Marc Zyngier , Dave Martin , Ard Biesheuvel , "Eric W . Biederman" , Ingo Molnar , Paul Lawrence , Geert Uytterhoeven , Arnd Bergmann , "Kirill A . Shutemov" , Greg Kroah-Hartman , Kate Stewart , Mike Rapoport , kasan-dev@googlegroups.com, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-sparse@vger.kernel.org, linux-mm@kvack.org, linux-kbuild@vger.kernel.org Cc: Kostya Serebryany , Evgeniy Stepanov , Lee Smith , Ramana Radhakrishnan , Jacob Bramley , Ruben Ayrapetyan , Jann Horn , Mark Brand , Chintan Pandya , Vishwath Mohan , Andrey Konovalov Subject: [PATCH v8 09/20] kasan: preassign tags to objects with ctors or SLAB_TYPESAFE_BY_RCU Date: Wed, 19 Sep 2018 20:54:48 +0200 Message-Id: X-Mailer: git-send-email 2.19.0.397.gdd90340f6a-goog In-Reply-To: References: MIME-Version: 1.0 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: X-Virus-Scanned: ClamAV using ClamSMTP An object constructor can initialize pointers within this objects based on the address of the object. Since the object address might be tagged, we need to assign a tag before calling constructor. The implemented approach is to assign tags to objects with constructors when a slab is allocated and call constructors once as usual. The downside is that such object would always have the same tag when it is reallocated, so we won't catch use-after-frees on it. Also pressign tags for objects from SLAB_TYPESAFE_BY_RCU caches, since they can be validy accessed after having been freed. Signed-off-by: Andrey Konovalov --- mm/slab.c | 2 +- mm/slub.c | 24 ++++++++++++++---------- 2 files changed, 15 insertions(+), 11 deletions(-) diff --git a/mm/slab.c b/mm/slab.c index 6fdca9ec2ea4..fe0ddf08aa2c 100644 --- a/mm/slab.c +++ b/mm/slab.c @@ -2574,7 +2574,7 @@ static void cache_init_objs(struct kmem_cache *cachep, for (i = 0; i < cachep->num; i++) { objp = index_to_obj(cachep, page, i); - kasan_init_slab_obj(cachep, objp); + objp = kasan_init_slab_obj(cachep, objp); /* constructor could break poison info */ if (DEBUG == 0 && cachep->ctor) { diff --git a/mm/slub.c b/mm/slub.c index c4d5f4442ff1..75fc76e42a1e 100644 --- a/mm/slub.c +++ b/mm/slub.c @@ -1413,16 +1413,17 @@ static inline bool slab_free_freelist_hook(struct kmem_cache *s, #endif } -static void setup_object(struct kmem_cache *s, struct page *page, +static void *setup_object(struct kmem_cache *s, struct page *page, void *object) { setup_object_debug(s, page, object); - kasan_init_slab_obj(s, object); + object = kasan_init_slab_obj(s, object); if (unlikely(s->ctor)) { kasan_unpoison_object_data(s, object); s->ctor(object); kasan_poison_object_data(s, object); } + return object; } /* @@ -1530,16 +1531,16 @@ static bool shuffle_freelist(struct kmem_cache *s, struct page *page) /* First entry is used as the base of the freelist */ cur = next_freelist_entry(s, page, &pos, start, page_limit, freelist_count); + cur = setup_object(s, page, cur); page->freelist = cur; for (idx = 1; idx < page->objects; idx++) { - setup_object(s, page, cur); next = next_freelist_entry(s, page, &pos, start, page_limit, freelist_count); + next = setup_object(s, page, next); set_freepointer(s, cur, next); cur = next; } - setup_object(s, page, cur); set_freepointer(s, cur, NULL); return true; @@ -1561,7 +1562,7 @@ static struct page *allocate_slab(struct kmem_cache *s, gfp_t flags, int node) struct page *page; struct kmem_cache_order_objects oo = s->oo; gfp_t alloc_gfp; - void *start, *p; + void *start, *p, *next; int idx, order; bool shuffle; @@ -1613,13 +1614,16 @@ static struct page *allocate_slab(struct kmem_cache *s, gfp_t flags, int node) if (!shuffle) { for_each_object_idx(p, idx, s, start, page->objects) { - setup_object(s, page, p); - if (likely(idx < page->objects)) - set_freepointer(s, p, p + s->size); - else + if (likely(idx < page->objects)) { + next = p + s->size; + next = setup_object(s, page, next); + set_freepointer(s, p, next); + } else set_freepointer(s, p, NULL); } - page->freelist = fixup_red_left(s, start); + start = fixup_red_left(s, start); + start = setup_object(s, page, start); + page->freelist = start; } page->inuse = page->objects;