From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-qt0-f197.google.com (mail-qt0-f197.google.com [209.85.216.197]) by kanga.kvack.org (Postfix) with ESMTP id 24B486B000A for ; Tue, 31 Jul 2018 10:50:12 -0400 (EDT) Received: by mail-qt0-f197.google.com with SMTP id i23-v6so13316217qtf.9 for ; Tue, 31 Jul 2018 07:50:12 -0700 (PDT) Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10115.outbound.protection.outlook.com. [40.107.1.115]) by mx.google.com with ESMTPS id a80-v6si5454094qkj.57.2018.07.31.07.50.10 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 31 Jul 2018 07:50:10 -0700 (PDT) Subject: Re: [PATCH v4 13/17] khwasan: add hooks implementation References: <09cb5553-d84a-0e62-5174-315c14b88833@arm.com> From: Andrey Ryabinin Message-ID: <8240d4f9-c8df-cfe9-119d-6e933f8b13df@virtuozzo.com> Date: Tue, 31 Jul 2018 17:50:00 +0300 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: Andrey Konovalov , vincenzo.frascino@arm.com Cc: Alexander Potapenko , Dmitry Vyukov , Catalin Marinas , Will Deacon , Christoph Lameter , Andrew Morton , Mark Rutland , Nick Desaulniers , Marc Zyngier , Dave Martin , Ard Biesheuvel , "Eric W . Biederman" , Ingo Molnar , Paul Lawrence , Geert Uytterhoeven , Arnd Bergmann , "Kirill A . Shutemov" , Greg Kroah-Hartman , Kate Stewart , Mike Rapoport , kasan-dev , linux-doc@vger.kernel.org, LKML , Linux ARM , linux-sparse@vger.kernel.org, Linux Memory Management List , Linux Kbuild mailing list , Chintan Pandya , Jacob Bramley , Jann Horn , Ruben Ayrapetyan , Lee Smith , Kostya Serebryany , Mark Brand , Ramana Radhakrishnan , Evgeniy Stepanov On 07/31/2018 04:05 PM, Andrey Konovalov wrote: > On Wed, Jul 25, 2018 at 3:44 PM, Vincenzo Frascino@Foss > wrote: >> On 06/26/2018 02:15 PM, Andrey Konovalov wrote: >> >>> @@ -325,18 +341,41 @@ void kasan_init_slab_obj(struct kmem_cache *cache, >>> const void *object) >>> void *kasan_slab_alloc(struct kmem_cache *cache, void *object, gfp_t >>> flags) >>> { >>> - return kasan_kmalloc(cache, object, cache->object_size, flags); >>> + object = kasan_kmalloc(cache, object, cache->object_size, flags); >>> + if (IS_ENABLED(CONFIG_KASAN_HW) && unlikely(cache->ctor)) { >>> + /* >>> + * Cache constructor might use object's pointer value to >>> + * initialize some of its fields. >>> + */ >>> + cache->ctor(object); >>> >> This seams breaking the kmem_cache_create() contract: "The @ctor is run when >> new pages are allocated by the cache." >> (https://elixir.bootlin.com/linux/v3.7/source/mm/slab_common.c#L83) >> >> Since there might be preexisting code relying on it, this could lead to >> global side effects. Did you verify that this is not the case? >> >> Another concern is performance related if we consider this solution suitable >> for "near-production", since with the current implementation you call the >> ctor (where present) on an object multiple times and this ends up memsetting >> and repopulating the memory every time (i.e. inode.c: inode_init_once). Do >> you know what is the performance impact? > > We can assign tags to objects with constructors when a slab is > allocated and call constructors once as usual. The downside is that > such object would always have the same tag when it is reallocated, so > we won't catch use-after-frees. Actually you should do this for SLAB_TYPESAFE_BY_RCU slabs. Usually they are with ->ctors but there are few without constructors. We can't reinitialize or even retag them. The latter will definitely cause false-positive use-after-free reports. As for non-SLAB_TYPESAFE_BY_RCU caches with constructors, it's probably ok to reinitialize and retag such objects. I don't see how could any code rely on the current ->ctor() behavior in non-SLAB_TYPESAFE_BY_RCU case, unless it does something extremely stupid or weird. But let's not do it now. If you care, you cand do it later, with a separate patch, so we could just revert it if anything goes wrong.