From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pf1-f200.google.com (mail-pf1-f200.google.com [209.85.210.200]) by kanga.kvack.org (Postfix) with ESMTP id F11B26B0005 for ; Tue, 31 Jul 2018 11:04:10 -0400 (EDT) Received: by mail-pf1-f200.google.com with SMTP id t26-v6so4901863pfh.0 for ; Tue, 31 Jul 2018 08:04:10 -0700 (PDT) Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id q19-v6sor3525205pgg.56.2018.07.31.08.04.09 for (Google Transport Security); Tue, 31 Jul 2018 08:04:09 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: <8240d4f9-c8df-cfe9-119d-6e933f8b13df@virtuozzo.com> References: <09cb5553-d84a-0e62-5174-315c14b88833@arm.com> <8240d4f9-c8df-cfe9-119d-6e933f8b13df@virtuozzo.com> From: Dmitry Vyukov Date: Tue, 31 Jul 2018 17:03:48 +0200 Message-ID: Subject: Re: [PATCH v4 13/17] khwasan: add hooks implementation Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-mm@kvack.org List-ID: To: Andrey Ryabinin Cc: Andrey Konovalov , vincenzo.frascino@arm.com, Alexander Potapenko , Catalin Marinas , Will Deacon , Christoph Lameter , Andrew Morton , Mark Rutland , Nick Desaulniers , Marc Zyngier , Dave Martin , Ard Biesheuvel , "Eric W . Biederman" , Ingo Molnar , Paul Lawrence , Geert Uytterhoeven , Arnd Bergmann , "Kirill A . Shutemov" , Greg Kroah-Hartman , Kate Stewart , Mike Rapoport , kasan-dev , linux-doc@vger.kernel.org, LKML , Linux ARM , linux-sparse@vger.kernel.org, Linux Memory Management List , Linux Kbuild mailing list , Chintan Pandya , Jacob Bramley , Jann Horn , Ruben Ayrapetyan , Lee Smith , Kostya Serebryany , Mark Brand , Ramana Radhakrishnan , Evgeniy Stepanov On Tue, Jul 31, 2018 at 4:50 PM, Andrey Ryabinin wrote: > > > On 07/31/2018 04:05 PM, Andrey Konovalov wrote: >> On Wed, Jul 25, 2018 at 3:44 PM, Vincenzo Frascino@Foss >> wrote: >>> On 06/26/2018 02:15 PM, Andrey Konovalov wrote: >>> >>>> @@ -325,18 +341,41 @@ void kasan_init_slab_obj(struct kmem_cache *cache, >>>> const void *object) >>>> void *kasan_slab_alloc(struct kmem_cache *cache, void *object, gfp_t >>>> flags) >>>> { >>>> - return kasan_kmalloc(cache, object, cache->object_size, flags); >>>> + object = kasan_kmalloc(cache, object, cache->object_size, flags); >>>> + if (IS_ENABLED(CONFIG_KASAN_HW) && unlikely(cache->ctor)) { >>>> + /* >>>> + * Cache constructor might use object's pointer value to >>>> + * initialize some of its fields. >>>> + */ >>>> + cache->ctor(object); >>>> >>> This seams breaking the kmem_cache_create() contract: "The @ctor is run when >>> new pages are allocated by the cache." >>> (https://elixir.bootlin.com/linux/v3.7/source/mm/slab_common.c#L83) >>> >>> Since there might be preexisting code relying on it, this could lead to >>> global side effects. Did you verify that this is not the case? >>> >>> Another concern is performance related if we consider this solution suitable >>> for "near-production", since with the current implementation you call the >>> ctor (where present) on an object multiple times and this ends up memsetting >>> and repopulating the memory every time (i.e. inode.c: inode_init_once). Do >>> you know what is the performance impact? >> >> We can assign tags to objects with constructors when a slab is >> allocated and call constructors once as usual. The downside is that >> such object would always have the same tag when it is reallocated, so >> we won't catch use-after-frees. > > Actually you should do this for SLAB_TYPESAFE_BY_RCU slabs. Usually they are with ->ctors but there > are few without constructors. > We can't reinitialize or even retag them. The latter will definitely cause false-positive use-after-free reports. Somewhat offtopic, but I can't understand how SLAB_TYPESAFE_BY_RCU slabs can be useful without ctors or at least memset(0). Objects in such slabs need to be type-stable, but I can't understand how it's possible to establish type stability without a ctor... Are these bugs? Or I am missing something subtle? What would be a canonical usage of SLAB_TYPESAFE_BY_RCU slab without a ctor?