From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-it0-f70.google.com (mail-it0-f70.google.com [209.85.214.70]) by kanga.kvack.org (Postfix) with ESMTP id 3EF386B000D for ; Tue, 31 Jul 2018 09:06:02 -0400 (EDT) Received: by mail-it0-f70.google.com with SMTP id a10-v6so2571489itc.9 for ; Tue, 31 Jul 2018 06:06:02 -0700 (PDT) Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id 68-v6sor864552itt.148.2018.07.31.06.06.00 for (Google Transport Security); Tue, 31 Jul 2018 06:06:00 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: <09cb5553-d84a-0e62-5174-315c14b88833@arm.com> References: <09cb5553-d84a-0e62-5174-315c14b88833@arm.com> From: Andrey Konovalov Date: Tue, 31 Jul 2018 15:05:59 +0200 Message-ID: Subject: Re: [PATCH v4 13/17] khwasan: add hooks implementation Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-mm@kvack.org List-ID: To: vincenzo.frascino@arm.com Cc: Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , Catalin Marinas , Will Deacon , Christoph Lameter , Andrew Morton , Mark Rutland , Nick Desaulniers , Marc Zyngier , Dave Martin , Ard Biesheuvel , "Eric W . Biederman" , Ingo Molnar , Paul Lawrence , Geert Uytterhoeven , Arnd Bergmann , "Kirill A . Shutemov" , Greg Kroah-Hartman , Kate Stewart , Mike Rapoport , kasan-dev , linux-doc@vger.kernel.org, LKML , Linux ARM , linux-sparse@vger.kernel.org, Linux Memory Management List , Linux Kbuild mailing list , Chintan Pandya , Jacob Bramley , Jann Horn , Ruben Ayrapetyan , Lee Smith , Kostya Serebryany , Mark Brand , Ramana Radhakrishnan , Evgeniy Stepanov On Wed, Jul 25, 2018 at 3:44 PM, Vincenzo Frascino@Foss wrote: > On 06/26/2018 02:15 PM, Andrey Konovalov wrote: > >> @@ -325,18 +341,41 @@ void kasan_init_slab_obj(struct kmem_cache *cache, >> const void *object) >> void *kasan_slab_alloc(struct kmem_cache *cache, void *object, gfp_t >> flags) >> { >> - return kasan_kmalloc(cache, object, cache->object_size, flags); >> + object = kasan_kmalloc(cache, object, cache->object_size, flags); >> + if (IS_ENABLED(CONFIG_KASAN_HW) && unlikely(cache->ctor)) { >> + /* >> + * Cache constructor might use object's pointer value to >> + * initialize some of its fields. >> + */ >> + cache->ctor(object); >> > This seams breaking the kmem_cache_create() contract: "The @ctor is run when > new pages are allocated by the cache." > (https://elixir.bootlin.com/linux/v3.7/source/mm/slab_common.c#L83) > > Since there might be preexisting code relying on it, this could lead to > global side effects. Did you verify that this is not the case? > > Another concern is performance related if we consider this solution suitable > for "near-production", since with the current implementation you call the > ctor (where present) on an object multiple times and this ends up memsetting > and repopulating the memory every time (i.e. inode.c: inode_init_once). Do > you know what is the performance impact? We can assign tags to objects with constructors when a slab is allocated and call constructors once as usual. The downside is that such object would always have the same tag when it is reallocated, so we won't catch use-after-frees. But that is probably something we'll have to deal with if we're aiming for "near-production". I'll add this change to v5, thanks!