linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO
@ 2024-07-30 19:42 Danilo Krummrich
  2024-07-30 19:42 ` [PATCH 2/2] mm: krealloc: clarify valid usage of __GFP_ZERO Danilo Krummrich
                   ` (3 more replies)
  0 siblings, 4 replies; 10+ messages in thread
From: Danilo Krummrich @ 2024-07-30 19:42 UTC (permalink / raw)
  To: akpm, cl, penberg, rientjes, iamjoonsoo.kim, vbabka,
	roman.gushchin, 42.hyeyoo
  Cc: linux-kernel, linux-mm, Danilo Krummrich

As long as krealloc() is called with __GFP_ZERO consistently, starting
with the initial memory allocation, __GFP_ZERO should be fully honored.

However, if for an existing allocation krealloc() is called with a
decreased size, it is not ensured that the spare portion the allocation
is zeroed. Thus, if krealloc() is subsequently called with a larger size
again, __GFP_ZERO can't be fully honored, since we don't know the
previous size, but only the bucket size.

Example:

	buf = kzalloc(64, GFP_KERNEL);
	memset(buf, 0xff, 64);

	buf = krealloc(buf, 48, GFP_KERNEL | __GFP_ZERO);

	/* After this call the last 16 bytes are still 0xff. */
	buf = krealloc(buf, 64, GFP_KERNEL | __GFP_ZERO);

Fix this, by explicitly setting spare memory to zero, when shrinking an
allocation with __GFP_ZERO flag set or init_on_alloc enabled.

Signed-off-by: Danilo Krummrich <dakr@kernel.org>
---
 mm/slab_common.c | 7 +++++++
 1 file changed, 7 insertions(+)

diff --git a/mm/slab_common.c b/mm/slab_common.c
index 40b582a014b8..cff602cedf8e 100644
--- a/mm/slab_common.c
+++ b/mm/slab_common.c
@@ -1273,6 +1273,13 @@ __do_krealloc(const void *p, size_t new_size, gfp_t flags)
 
 	/* If the object still fits, repoison it precisely. */
 	if (ks >= new_size) {
+		/* Zero out spare memory. */
+		if (want_init_on_alloc(flags)) {
+			kasan_disable_current();
+			memset((void *)p + new_size, 0, ks - new_size);
+			kasan_enable_current();
+		}
+
 		p = kasan_krealloc((void *)p, new_size, flags);
 		return (void *)p;
 	}

base-commit: 7c3dd6d99f2df6a9d7944ee8505b195ba51c9b68
-- 
2.45.2



^ permalink raw reply	[flat|nested] 10+ messages in thread

* [PATCH 2/2] mm: krealloc: clarify valid usage of __GFP_ZERO
  2024-07-30 19:42 [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO Danilo Krummrich
@ 2024-07-30 19:42 ` Danilo Krummrich
  2024-07-30 20:35   ` Andrew Morton
  2024-07-30 20:31 ` [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO Andrew Morton
                   ` (2 subsequent siblings)
  3 siblings, 1 reply; 10+ messages in thread
From: Danilo Krummrich @ 2024-07-30 19:42 UTC (permalink / raw)
  To: akpm, cl, penberg, rientjes, iamjoonsoo.kim, vbabka,
	roman.gushchin, 42.hyeyoo
  Cc: linux-kernel, linux-mm, Danilo Krummrich

Properly document that if __GFP_ZERO logic is requested, callers must
ensure that, starting with the initial memory allocation, every
subsequent call to this API for the same memory allocation is flagged
with __GFP_ZERO. Otherwise, it is possible that __GFP_ZERO is not fully
honored by this API.

Signed-off-by: Danilo Krummrich <dakr@kernel.org>
---
 include/linux/slab.h |  8 ++++++++
 mm/slab_common.c     | 10 ++++++++--
 2 files changed, 16 insertions(+), 2 deletions(-)

diff --git a/include/linux/slab.h b/include/linux/slab.h
index c9cb42203183..26f14c04000a 100644
--- a/include/linux/slab.h
+++ b/include/linux/slab.h
@@ -733,6 +733,14 @@ static inline __alloc_size(1, 2) void *kmalloc_array_noprof(size_t n, size_t siz
  * @new_n: new number of elements to alloc
  * @new_size: new size of a single member of the array
  * @flags: the type of memory to allocate (see kmalloc)
+ *
+ * If __GFP_ZERO logic is requested, callers must ensure that, starting with the
+ * initial memory allocation, every subsequent call to this API for the same
+ * memory allocation is flagged with __GFP_ZERO. Otherwise, it is possible that
+ * __GFP_ZERO is not fully honored by this API.
+ *
+ * In any case, the contents of the object pointed to are preserved up to the
+ * lesser of the new and old sizes.
  */
 static inline __realloc_size(2, 3) void * __must_check krealloc_array_noprof(void *p,
 								       size_t new_n,
diff --git a/mm/slab_common.c b/mm/slab_common.c
index cff602cedf8e..faa13f42b111 100644
--- a/mm/slab_common.c
+++ b/mm/slab_common.c
@@ -1301,11 +1301,17 @@ __do_krealloc(const void *p, size_t new_size, gfp_t flags)
  * @new_size: how many bytes of memory are required.
  * @flags: the type of memory to allocate.
  *
- * The contents of the object pointed to are preserved up to the
- * lesser of the new and old sizes (__GFP_ZERO flag is effectively ignored).
  * If @p is %NULL, krealloc() behaves exactly like kmalloc().  If @new_size
  * is 0 and @p is not a %NULL pointer, the object pointed to is freed.
  *
+ * If __GFP_ZERO logic is requested, callers must ensure that, starting with the
+ * initial memory allocation, every subsequent call to this API for the same
+ * memory allocation is flagged with __GFP_ZERO. Otherwise, it is possible that
+ * __GFP_ZERO is not fully honored by this API.
+ *
+ * In any case, the contents of the object pointed to are preserved up to the
+ * lesser of the new and old sizes.
+ *
  * Return: pointer to the allocated memory or %NULL in case of error
  */
 void *krealloc_noprof(const void *p, size_t new_size, gfp_t flags)
-- 
2.45.2



^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO
  2024-07-30 19:42 [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO Danilo Krummrich
  2024-07-30 19:42 ` [PATCH 2/2] mm: krealloc: clarify valid usage of __GFP_ZERO Danilo Krummrich
@ 2024-07-30 20:31 ` Andrew Morton
  2024-07-30 21:06   ` Vlastimil Babka
  2024-07-30 21:14 ` Vlastimil Babka
  2024-07-31 14:31 ` Vlastimil Babka
  3 siblings, 1 reply; 10+ messages in thread
From: Andrew Morton @ 2024-07-30 20:31 UTC (permalink / raw)
  To: Danilo Krummrich
  Cc: cl, penberg, rientjes, iamjoonsoo.kim, vbabka, roman.gushchin,
	42.hyeyoo, linux-kernel, linux-mm

On Tue, 30 Jul 2024 21:42:05 +0200 Danilo Krummrich <dakr@kernel.org> wrote:

> As long as krealloc() is called with __GFP_ZERO consistently, starting
> with the initial memory allocation, __GFP_ZERO should be fully honored.
> 
> However, if for an existing allocation krealloc() is called with a
> decreased size, it is not ensured that the spare portion the allocation
> is zeroed. Thus, if krealloc() is subsequently called with a larger size
> again, __GFP_ZERO can't be fully honored, since we don't know the
> previous size, but only the bucket size.

Well that's bad.

> Example:
> 
> 	buf = kzalloc(64, GFP_KERNEL);

If this was kmalloc()

> 	memset(buf, 0xff, 64);
> 
> 	buf = krealloc(buf, 48, GFP_KERNEL | __GFP_ZERO);
> 
> 	/* After this call the last 16 bytes are still 0xff. */
> 	buf = krealloc(buf, 64, GFP_KERNEL | __GFP_ZERO);

then this would expose uninitialized kernel memory to kernel code, with
a risk that the kernel code will expose that to userspace, yes?

This does seem rather a trap, and I wonder whether krealloc() should
just zero out any such data by default.

> Fix this, by explicitly setting spare memory to zero, when shrinking an
> allocation with __GFP_ZERO flag set or init_on_alloc enabled.
> 
> --- a/mm/slab_common.c
> +++ b/mm/slab_common.c
> @@ -1273,6 +1273,13 @@ __do_krealloc(const void *p, size_t new_size, gfp_t flags)
>  
>  	/* If the object still fits, repoison it precisely. */
>  	if (ks >= new_size) {
> +		/* Zero out spare memory. */
> +		if (want_init_on_alloc(flags)) {
> +			kasan_disable_current();
> +			memset((void *)p + new_size, 0, ks - new_size);

Casting away the constness of `*p'.  This is just misleading everyone,
really.  It would be better to make argument `p' have type "void *".

> +			kasan_enable_current();
> +		}
> +
>  		p = kasan_krealloc((void *)p, new_size, flags);



^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH 2/2] mm: krealloc: clarify valid usage of __GFP_ZERO
  2024-07-30 19:42 ` [PATCH 2/2] mm: krealloc: clarify valid usage of __GFP_ZERO Danilo Krummrich
@ 2024-07-30 20:35   ` Andrew Morton
  2024-07-31  0:02     ` Danilo Krummrich
  0 siblings, 1 reply; 10+ messages in thread
From: Andrew Morton @ 2024-07-30 20:35 UTC (permalink / raw)
  To: Danilo Krummrich
  Cc: cl, penberg, rientjes, iamjoonsoo.kim, vbabka, roman.gushchin,
	42.hyeyoo, linux-kernel, linux-mm

On Tue, 30 Jul 2024 21:42:06 +0200 Danilo Krummrich <dakr@kernel.org> wrote:

> Properly document that if __GFP_ZERO logic is requested, callers must
> ensure that, starting with the initial memory allocation, every
> subsequent call to this API for the same memory allocation is flagged
> with __GFP_ZERO. Otherwise, it is possible that __GFP_ZERO is not fully
> honored by this API.
> 
> ...
>
> --- a/include/linux/slab.h
> +++ b/include/linux/slab.h
> @@ -733,6 +733,14 @@ static inline __alloc_size(1, 2) void *kmalloc_array_noprof(size_t n, size_t siz
>   * @new_n: new number of elements to alloc
>   * @new_size: new size of a single member of the array
>   * @flags: the type of memory to allocate (see kmalloc)
> + *
> + * If __GFP_ZERO logic is requested, callers must ensure that, starting with the
> + * initial memory allocation, every subsequent call to this API for the same
> + * memory allocation is flagged with __GFP_ZERO. Otherwise, it is possible that
> + * __GFP_ZERO is not fully honored by this API.
> + *
> + * In any case, the contents of the object pointed to are preserved up to the
> + * lesser of the new and old sizes.
>   */
>  static inline __realloc_size(2, 3) void * __must_check krealloc_array_noprof(void *p,
>  								       size_t new_n,
> diff --git a/mm/slab_common.c b/mm/slab_common.c
> index cff602cedf8e..faa13f42b111 100644
> --- a/mm/slab_common.c
> +++ b/mm/slab_common.c
> @@ -1301,11 +1301,17 @@ __do_krealloc(const void *p, size_t new_size, gfp_t flags)
>   * @new_size: how many bytes of memory are required.
>   * @flags: the type of memory to allocate.
>   *
> - * The contents of the object pointed to are preserved up to the
> - * lesser of the new and old sizes (__GFP_ZERO flag is effectively ignored).
>   * If @p is %NULL, krealloc() behaves exactly like kmalloc().  If @new_size
>   * is 0 and @p is not a %NULL pointer, the object pointed to is freed.
>   *
> + * If __GFP_ZERO logic is requested, callers must ensure that, starting with the
> + * initial memory allocation, every subsequent call to this API for the same
> + * memory allocation is flagged with __GFP_ZERO. Otherwise, it is possible that
> + * __GFP_ZERO is not fully honored by this API.
> + *
> + * In any case, the contents of the object pointed to are preserved up to the
> + * lesser of the new and old sizes.
> + *
>   * Return: pointer to the allocated memory or %NULL in case of error
>   */
>  void *krealloc_noprof(const void *p, size_t new_size, gfp_t flags)

In both cases, we're saying "callers should do X".  I think it would be
better to say "this implementation does A, hence callers should do X". 
Tell people what's going on.

eg, "if krealloc is expanding an existing allocation, the newly-added
memory will be uninitialized unless the caller used __GFP_ZERO".  Or
something like that.

I assume that if the caller actually touches the uninitialized memory,
KASAN will warn?


^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO
  2024-07-30 20:31 ` [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO Andrew Morton
@ 2024-07-30 21:06   ` Vlastimil Babka
  0 siblings, 0 replies; 10+ messages in thread
From: Vlastimil Babka @ 2024-07-30 21:06 UTC (permalink / raw)
  To: Andrew Morton, Danilo Krummrich
  Cc: cl, penberg, rientjes, iamjoonsoo.kim, roman.gushchin, 42.hyeyoo,
	linux-kernel, linux-mm

On 7/30/24 10:31 PM, Andrew Morton wrote:
> On Tue, 30 Jul 2024 21:42:05 +0200 Danilo Krummrich <dakr@kernel.org> wrote:
> 
>> As long as krealloc() is called with __GFP_ZERO consistently, starting
>> with the initial memory allocation, __GFP_ZERO should be fully honored.
>> 
>> However, if for an existing allocation krealloc() is called with a
>> decreased size, it is not ensured that the spare portion the allocation
>> is zeroed. Thus, if krealloc() is subsequently called with a larger size
>> again, __GFP_ZERO can't be fully honored, since we don't know the
>> previous size, but only the bucket size.
> 
> Well that's bad.
> 
>> Example:
>> 
>> 	buf = kzalloc(64, GFP_KERNEL);
> 
> If this was kmalloc()

Then already here we have unitialized kernel memory that a buggy user could
expose, no?

>> 	memset(buf, 0xff, 64);
>> 
>> 	buf = krealloc(buf, 48, GFP_KERNEL | __GFP_ZERO);
>> 
>> 	/* After this call the last 16 bytes are still 0xff. */
>> 	buf = krealloc(buf, 64, GFP_KERNEL | __GFP_ZERO);
> 
> then this would expose uninitialized kernel memory to kernel code, with
> a risk that the kernel code will expose that to userspace, yes?
> 
> This does seem rather a trap, and I wonder whether krealloc() should
> just zero out any such data by default.

So unless I'm missing how this differs from plain kmalloc(), relying on
want_init_on_alloc() seems the right way how to opt-in harden against this
potential exposure.

>> Fix this, by explicitly setting spare memory to zero, when shrinking an
>> allocation with __GFP_ZERO flag set or init_on_alloc enabled.
>> 
>> --- a/mm/slab_common.c
>> +++ b/mm/slab_common.c
>> @@ -1273,6 +1273,13 @@ __do_krealloc(const void *p, size_t new_size, gfp_t flags)
>>  
>>  	/* If the object still fits, repoison it precisely. */
>>  	if (ks >= new_size) {
>> +		/* Zero out spare memory. */
>> +		if (want_init_on_alloc(flags)) {
>> +			kasan_disable_current();
>> +			memset((void *)p + new_size, 0, ks - new_size);
> 
> Casting away the constness of `*p'.  This is just misleading everyone,
> really.  It would be better to make argument `p' have type "void *".
> 
>> +			kasan_enable_current();
>> +		}
>> +
>>  		p = kasan_krealloc((void *)p, new_size, flags);
> 



^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO
  2024-07-30 19:42 [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO Danilo Krummrich
  2024-07-30 19:42 ` [PATCH 2/2] mm: krealloc: clarify valid usage of __GFP_ZERO Danilo Krummrich
  2024-07-30 20:31 ` [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO Andrew Morton
@ 2024-07-30 21:14 ` Vlastimil Babka
  2024-07-30 23:54   ` Danilo Krummrich
  2024-07-31 14:31 ` Vlastimil Babka
  3 siblings, 1 reply; 10+ messages in thread
From: Vlastimil Babka @ 2024-07-30 21:14 UTC (permalink / raw)
  To: Danilo Krummrich, akpm, cl, penberg, rientjes, iamjoonsoo.kim,
	roman.gushchin, 42.hyeyoo
  Cc: linux-kernel, linux-mm, kasan-dev

On 7/30/24 9:42 PM, Danilo Krummrich wrote:
> As long as krealloc() is called with __GFP_ZERO consistently, starting
> with the initial memory allocation, __GFP_ZERO should be fully honored.
> 
> However, if for an existing allocation krealloc() is called with a
> decreased size, it is not ensured that the spare portion the allocation
> is zeroed. Thus, if krealloc() is subsequently called with a larger size
> again, __GFP_ZERO can't be fully honored, since we don't know the
> previous size, but only the bucket size.
> 
> Example:
> 
> 	buf = kzalloc(64, GFP_KERNEL);
> 	memset(buf, 0xff, 64);
> 
> 	buf = krealloc(buf, 48, GFP_KERNEL | __GFP_ZERO);
> 
> 	/* After this call the last 16 bytes are still 0xff. */
> 	buf = krealloc(buf, 64, GFP_KERNEL | __GFP_ZERO);
> 
> Fix this, by explicitly setting spare memory to zero, when shrinking an
> allocation with __GFP_ZERO flag set or init_on_alloc enabled.
> 
> Signed-off-by: Danilo Krummrich <dakr@kernel.org>
> ---
>  mm/slab_common.c | 7 +++++++
>  1 file changed, 7 insertions(+)
> 
> diff --git a/mm/slab_common.c b/mm/slab_common.c
> index 40b582a014b8..cff602cedf8e 100644
> --- a/mm/slab_common.c
> +++ b/mm/slab_common.c
> @@ -1273,6 +1273,13 @@ __do_krealloc(const void *p, size_t new_size, gfp_t flags)
>  
>  	/* If the object still fits, repoison it precisely. */
>  	if (ks >= new_size) {
> +		/* Zero out spare memory. */
> +		if (want_init_on_alloc(flags)) {
> +			kasan_disable_current();
> +			memset((void *)p + new_size, 0, ks - new_size);
> +			kasan_enable_current();

If we do kasan_krealloc() first, shouldn't the memset then be legal
afterwards without the disable/enable dance?

> +		}
> +
>  		p = kasan_krealloc((void *)p, new_size, flags);
>  		return (void *)p;
>  	}
> 
> base-commit: 7c3dd6d99f2df6a9d7944ee8505b195ba51c9b68



^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO
  2024-07-30 21:14 ` Vlastimil Babka
@ 2024-07-30 23:54   ` Danilo Krummrich
  2024-07-31 14:30     ` Vlastimil Babka
  0 siblings, 1 reply; 10+ messages in thread
From: Danilo Krummrich @ 2024-07-30 23:54 UTC (permalink / raw)
  To: Vlastimil Babka
  Cc: akpm, cl, penberg, rientjes, iamjoonsoo.kim, roman.gushchin,
	42.hyeyoo, linux-kernel, linux-mm, kasan-dev

On Tue, Jul 30, 2024 at 11:14:16PM +0200, Vlastimil Babka wrote:
> On 7/30/24 9:42 PM, Danilo Krummrich wrote:
> > As long as krealloc() is called with __GFP_ZERO consistently, starting
> > with the initial memory allocation, __GFP_ZERO should be fully honored.
> > 
> > However, if for an existing allocation krealloc() is called with a
> > decreased size, it is not ensured that the spare portion the allocation
> > is zeroed. Thus, if krealloc() is subsequently called with a larger size
> > again, __GFP_ZERO can't be fully honored, since we don't know the
> > previous size, but only the bucket size.
> > 
> > Example:
> > 
> > 	buf = kzalloc(64, GFP_KERNEL);
> > 	memset(buf, 0xff, 64);
> > 
> > 	buf = krealloc(buf, 48, GFP_KERNEL | __GFP_ZERO);
> > 
> > 	/* After this call the last 16 bytes are still 0xff. */
> > 	buf = krealloc(buf, 64, GFP_KERNEL | __GFP_ZERO);
> > 
> > Fix this, by explicitly setting spare memory to zero, when shrinking an
> > allocation with __GFP_ZERO flag set or init_on_alloc enabled.
> > 
> > Signed-off-by: Danilo Krummrich <dakr@kernel.org>
> > ---
> >  mm/slab_common.c | 7 +++++++
> >  1 file changed, 7 insertions(+)
> > 
> > diff --git a/mm/slab_common.c b/mm/slab_common.c
> > index 40b582a014b8..cff602cedf8e 100644
> > --- a/mm/slab_common.c
> > +++ b/mm/slab_common.c
> > @@ -1273,6 +1273,13 @@ __do_krealloc(const void *p, size_t new_size, gfp_t flags)
> >  
> >  	/* If the object still fits, repoison it precisely. */
> >  	if (ks >= new_size) {
> > +		/* Zero out spare memory. */
> > +		if (want_init_on_alloc(flags)) {
> > +			kasan_disable_current();
> > +			memset((void *)p + new_size, 0, ks - new_size);
> > +			kasan_enable_current();
> 
> If we do kasan_krealloc() first, shouldn't the memset then be legal
> afterwards without the disable/enable dance?

No, we always write into the poisoned area. The following tables show what we do
in the particular case:

Shrink
------
          new        old
0         size       size        ks
|----------|----------|----------|
|   keep   |        poison       |  <- poison
|--------------------------------|
|   keep   |         zero        |  <- data


Poison and zero things between old size and ks is not necessary, but we don't
know old size, hence we have do it between new size and ks.

Grow
----
          old        new
0         size       size        ks
|----------|----------|----------|
|       unpoison      |   keep   | <- poison
|--------------------------------|
|         keep        |   zero   | <- data

Zeroing between new_size and ks in not necessary in this case, since it must be
zero already. But without knowing the old size we don't know whether we shrink
and actually need to do something, or if we grow and don't need to do anything.

Analogously, we also unpoison things between 0 and old size for the same reason.

> 
> > +		}
> > +
> >  		p = kasan_krealloc((void *)p, new_size, flags);
> >  		return (void *)p;
> >  	}
> > 
> > base-commit: 7c3dd6d99f2df6a9d7944ee8505b195ba51c9b68
> 


^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH 2/2] mm: krealloc: clarify valid usage of __GFP_ZERO
  2024-07-30 20:35   ` Andrew Morton
@ 2024-07-31  0:02     ` Danilo Krummrich
  0 siblings, 0 replies; 10+ messages in thread
From: Danilo Krummrich @ 2024-07-31  0:02 UTC (permalink / raw)
  To: Andrew Morton
  Cc: cl, penberg, rientjes, iamjoonsoo.kim, vbabka, roman.gushchin,
	42.hyeyoo, linux-kernel, linux-mm

On Tue, Jul 30, 2024 at 01:35:40PM -0700, Andrew Morton wrote:
> On Tue, 30 Jul 2024 21:42:06 +0200 Danilo Krummrich <dakr@kernel.org> wrote:
> 
> > Properly document that if __GFP_ZERO logic is requested, callers must
> > ensure that, starting with the initial memory allocation, every
> > subsequent call to this API for the same memory allocation is flagged
> > with __GFP_ZERO. Otherwise, it is possible that __GFP_ZERO is not fully
> > honored by this API.
> > 
> > ...
> >
> > --- a/include/linux/slab.h
> > +++ b/include/linux/slab.h
> > @@ -733,6 +733,14 @@ static inline __alloc_size(1, 2) void *kmalloc_array_noprof(size_t n, size_t siz
> >   * @new_n: new number of elements to alloc
> >   * @new_size: new size of a single member of the array
> >   * @flags: the type of memory to allocate (see kmalloc)
> > + *
> > + * If __GFP_ZERO logic is requested, callers must ensure that, starting with the
> > + * initial memory allocation, every subsequent call to this API for the same
> > + * memory allocation is flagged with __GFP_ZERO. Otherwise, it is possible that
> > + * __GFP_ZERO is not fully honored by this API.
> > + *
> > + * In any case, the contents of the object pointed to are preserved up to the
> > + * lesser of the new and old sizes.
> >   */
> >  static inline __realloc_size(2, 3) void * __must_check krealloc_array_noprof(void *p,
> >  								       size_t new_n,
> > diff --git a/mm/slab_common.c b/mm/slab_common.c
> > index cff602cedf8e..faa13f42b111 100644
> > --- a/mm/slab_common.c
> > +++ b/mm/slab_common.c
> > @@ -1301,11 +1301,17 @@ __do_krealloc(const void *p, size_t new_size, gfp_t flags)
> >   * @new_size: how many bytes of memory are required.
> >   * @flags: the type of memory to allocate.
> >   *
> > - * The contents of the object pointed to are preserved up to the
> > - * lesser of the new and old sizes (__GFP_ZERO flag is effectively ignored).
> >   * If @p is %NULL, krealloc() behaves exactly like kmalloc().  If @new_size
> >   * is 0 and @p is not a %NULL pointer, the object pointed to is freed.
> >   *
> > + * If __GFP_ZERO logic is requested, callers must ensure that, starting with the
> > + * initial memory allocation, every subsequent call to this API for the same
> > + * memory allocation is flagged with __GFP_ZERO. Otherwise, it is possible that
> > + * __GFP_ZERO is not fully honored by this API.
> > + *
> > + * In any case, the contents of the object pointed to are preserved up to the
> > + * lesser of the new and old sizes.
> > + *
> >   * Return: pointer to the allocated memory or %NULL in case of error
> >   */
> >  void *krealloc_noprof(const void *p, size_t new_size, gfp_t flags)
> 
> In both cases, we're saying "callers should do X".  I think it would be
> better to say "this implementation does A, hence callers should do X". 
> Tell people what's going on.

Sounds reasonable, I'll add an explanation here and in the fixup series for
vrealloc() / kvrealloc().

> 
> eg, "if krealloc is expanding an existing allocation, the newly-added
> memory will be uninitialized unless the caller used __GFP_ZERO".  Or
> something like that.
> 
> I assume that if the caller actually touches the uninitialized memory,
> KASAN will warn?

For the case that is fixed in patch 1 of this series, no. KASAN can't detect
this.

As you say, the memory is just uninitialized (not poisoned), where it should
have been zeroed instead.


^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO
  2024-07-30 23:54   ` Danilo Krummrich
@ 2024-07-31 14:30     ` Vlastimil Babka
  0 siblings, 0 replies; 10+ messages in thread
From: Vlastimil Babka @ 2024-07-31 14:30 UTC (permalink / raw)
  To: Danilo Krummrich
  Cc: akpm, cl, penberg, rientjes, iamjoonsoo.kim, roman.gushchin,
	42.hyeyoo, linux-kernel, linux-mm, kasan-dev

On 7/31/24 1:54 AM, Danilo Krummrich wrote:
> On Tue, Jul 30, 2024 at 11:14:16PM +0200, Vlastimil Babka wrote:
>> On 7/30/24 9:42 PM, Danilo Krummrich wrote:
>> > As long as krealloc() is called with __GFP_ZERO consistently, starting
>> > with the initial memory allocation, __GFP_ZERO should be fully honored.
>> > 
>> > However, if for an existing allocation krealloc() is called with a
>> > decreased size, it is not ensured that the spare portion the allocation
>> > is zeroed. Thus, if krealloc() is subsequently called with a larger size
>> > again, __GFP_ZERO can't be fully honored, since we don't know the
>> > previous size, but only the bucket size.
>> > 
>> > Example:
>> > 
>> > 	buf = kzalloc(64, GFP_KERNEL);
>> > 	memset(buf, 0xff, 64);
>> > 
>> > 	buf = krealloc(buf, 48, GFP_KERNEL | __GFP_ZERO);
>> > 
>> > 	/* After this call the last 16 bytes are still 0xff. */
>> > 	buf = krealloc(buf, 64, GFP_KERNEL | __GFP_ZERO);
>> > 
>> > Fix this, by explicitly setting spare memory to zero, when shrinking an
>> > allocation with __GFP_ZERO flag set or init_on_alloc enabled.
>> > 
>> > Signed-off-by: Danilo Krummrich <dakr@kernel.org>
>> > ---
>> >  mm/slab_common.c | 7 +++++++
>> >  1 file changed, 7 insertions(+)
>> > 
>> > diff --git a/mm/slab_common.c b/mm/slab_common.c
>> > index 40b582a014b8..cff602cedf8e 100644
>> > --- a/mm/slab_common.c
>> > +++ b/mm/slab_common.c
>> > @@ -1273,6 +1273,13 @@ __do_krealloc(const void *p, size_t new_size, gfp_t flags)
>> >  
>> >  	/* If the object still fits, repoison it precisely. */
>> >  	if (ks >= new_size) {
>> > +		/* Zero out spare memory. */
>> > +		if (want_init_on_alloc(flags)) {
>> > +			kasan_disable_current();
>> > +			memset((void *)p + new_size, 0, ks - new_size);
>> > +			kasan_enable_current();
>> 
>> If we do kasan_krealloc() first, shouldn't the memset then be legal
>> afterwards without the disable/enable dance?
> 
> No, we always write into the poisoned area. The following tables show what we do
> in the particular case:
> 
> Shrink
> ------
>           new        old
> 0         size       size        ks
> |----------|----------|----------|
> |   keep   |        poison       |  <- poison
> |--------------------------------|
> |   keep   |         zero        |  <- data
> 
> 
> Poison and zero things between old size and ks is not necessary, but we don't
> know old size, hence we have do it between new size and ks.
> 
> Grow
> ----
>           old        new
> 0         size       size        ks
> |----------|----------|----------|
> |       unpoison      |   keep   | <- poison
> |--------------------------------|
> |         keep        |   zero   | <- data
> 
> Zeroing between new_size and ks in not necessary in this case, since it must be
> zero already. But without knowing the old size we don't know whether we shrink
> and actually need to do something, or if we grow and don't need to do anything.
> 
> Analogously, we also unpoison things between 0 and old size for the same reason.

Thanks, you're right!

>> 
>> > +		}
>> > +
>> >  		p = kasan_krealloc((void *)p, new_size, flags);
>> >  		return (void *)p;
>> >  	}
>> > 
>> > base-commit: 7c3dd6d99f2df6a9d7944ee8505b195ba51c9b68
>> 



^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO
  2024-07-30 19:42 [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO Danilo Krummrich
                   ` (2 preceding siblings ...)
  2024-07-30 21:14 ` Vlastimil Babka
@ 2024-07-31 14:31 ` Vlastimil Babka
  3 siblings, 0 replies; 10+ messages in thread
From: Vlastimil Babka @ 2024-07-31 14:31 UTC (permalink / raw)
  To: Danilo Krummrich, akpm, cl, penberg, rientjes, iamjoonsoo.kim,
	roman.gushchin, 42.hyeyoo
  Cc: linux-kernel, linux-mm

On 7/30/24 9:42 PM, Danilo Krummrich wrote:
> As long as krealloc() is called with __GFP_ZERO consistently, starting
> with the initial memory allocation, __GFP_ZERO should be fully honored.
> 
> However, if for an existing allocation krealloc() is called with a
> decreased size, it is not ensured that the spare portion the allocation
> is zeroed. Thus, if krealloc() is subsequently called with a larger size
> again, __GFP_ZERO can't be fully honored, since we don't know the
> previous size, but only the bucket size.
> 
> Example:
> 
> 	buf = kzalloc(64, GFP_KERNEL);
> 	memset(buf, 0xff, 64);
> 
> 	buf = krealloc(buf, 48, GFP_KERNEL | __GFP_ZERO);
> 
> 	/* After this call the last 16 bytes are still 0xff. */
> 	buf = krealloc(buf, 64, GFP_KERNEL | __GFP_ZERO);
> 
> Fix this, by explicitly setting spare memory to zero, when shrinking an
> allocation with __GFP_ZERO flag set or init_on_alloc enabled.
> 
> Signed-off-by: Danilo Krummrich <dakr@kernel.org>

Acked-by: Vlastimil Babka <vbabka@suse.cz>

> ---
>  mm/slab_common.c | 7 +++++++
>  1 file changed, 7 insertions(+)
> 
> diff --git a/mm/slab_common.c b/mm/slab_common.c
> index 40b582a014b8..cff602cedf8e 100644
> --- a/mm/slab_common.c
> +++ b/mm/slab_common.c
> @@ -1273,6 +1273,13 @@ __do_krealloc(const void *p, size_t new_size, gfp_t flags)
>  
>  	/* If the object still fits, repoison it precisely. */
>  	if (ks >= new_size) {
> +		/* Zero out spare memory. */
> +		if (want_init_on_alloc(flags)) {
> +			kasan_disable_current();
> +			memset((void *)p + new_size, 0, ks - new_size);
> +			kasan_enable_current();
> +		}
> +
>  		p = kasan_krealloc((void *)p, new_size, flags);
>  		return (void *)p;
>  	}
> 
> base-commit: 7c3dd6d99f2df6a9d7944ee8505b195ba51c9b68



^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2024-07-31 14:31 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-07-30 19:42 [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO Danilo Krummrich
2024-07-30 19:42 ` [PATCH 2/2] mm: krealloc: clarify valid usage of __GFP_ZERO Danilo Krummrich
2024-07-30 20:35   ` Andrew Morton
2024-07-31  0:02     ` Danilo Krummrich
2024-07-30 20:31 ` [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO Andrew Morton
2024-07-30 21:06   ` Vlastimil Babka
2024-07-30 21:14 ` Vlastimil Babka
2024-07-30 23:54   ` Danilo Krummrich
2024-07-31 14:30     ` Vlastimil Babka
2024-07-31 14:31 ` Vlastimil Babka

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox