From: Maciej Wieczor-Retman <maciej.wieczor-retman@intel.com>
To: Andrey Konovalov <andreyknvl@gmail.com>
Cc: Vitaly Buka <vitalybuka@google.com>, <kees@kernel.org>,
<julian.stecklina@cyberus-technology.de>,
<kevinloughlin@google.com>, <peterz@infradead.org>,
<tglx@linutronix.de>, <justinstitt@google.com>,
<catalin.marinas@arm.com>, <wangkefeng.wang@huawei.com>,
<bhe@redhat.com>, <ryabinin.a.a@gmail.com>,
<kirill.shutemov@linux.intel.com>, <will@kernel.org>,
<ardb@kernel.org>, <jason.andryuk@amd.com>,
<dave.hansen@linux.intel.com>, <pasha.tatashin@soleen.com>,
<guoweikang.kernel@gmail.com>, <dwmw@amazon.co.uk>,
<mark.rutland@arm.com>, <broonie@kernel.org>,
<apopple@nvidia.com>, <bp@alien8.de>, <rppt@kernel.org>,
<kaleshsingh@google.com>, <richard.weiyang@gmail.com>,
<luto@kernel.org>, <glider@google.com>, <pankaj.gupta@amd.com>,
<pawan.kumar.gupta@linux.intel.com>,
<kuan-ying.lee@canonical.com>, <tony.luck@intel.com>,
<tj@kernel.org>, <jgross@suse.com>, <dvyukov@google.com>,
<baohua@kernel.org>, <samuel.holland@sifive.com>,
<dennis@kernel.org>, <akpm@linux-foundation.org>,
<thomas.weissschuh@linutronix.de>, <surenb@google.com>,
<kbingham@kernel.org>, <ankita@nvidia.com>, <nathan@kernel.org>,
<ziy@nvidia.com>, <xin@zytor.com>, <rafael.j.wysocki@intel.com>,
<andriy.shevchenko@linux.intel.com>, <cl@linux.com>,
<jhubbard@nvidia.com>, <hpa@zytor.com>,
<scott@os.amperecomputing.com>, <david@redhat.com>,
<jan.kiszka@siemens.com>, <vincenzo.frascino@arm.com>,
<corbet@lwn.net>, <maz@kernel.org>, <mingo@redhat.com>,
<arnd@arndb.de>, <ytcoode@gmail.com>, <xur@google.com>,
<morbo@google.com>, <thiago.bauermann@linaro.org>,
<linux-doc@vger.kernel.org>, <kasan-dev@googlegroups.com>,
<linux-kernel@vger.kernel.org>, <llvm@lists.linux.dev>,
<linux-mm@kvack.org>, <linux-arm-kernel@lists.infradead.org>,
<x86@kernel.org>
Subject: Re: [PATCH v2 01/14] kasan: sw_tags: Use arithmetic shift for shadow computation
Date: Fri, 28 Feb 2025 17:12:49 +0100 [thread overview]
Message-ID: <mjyjkyiyhbbxyksiycywgh72laozztzwxxwi3gi252uk4b6f7j@3zwpv7l7aisk> (raw)
In-Reply-To: <agqtypvkcpju3gdsq7pnpabikm4mnnpy4kp5efqs2pvsz6ubsl@togxtecvtb74>
On 2025-02-27 at 13:27:32 +0100, Maciej Wieczor-Retman wrote:
>On 2025-02-26 at 20:44:35 +0100, Andrey Konovalov wrote:
>>On Wed, Feb 26, 2025 at 5:43 PM Maciej Wieczor-Retman
>><maciej.wieczor-retman@intel.com> wrote:
>>
>>> >With the way the compiler works right now, for the perfectly precise
>>> >check, I think we need to check 2 ranges: [0xfe00000000000000,
>>> >0xffffffffffffffff] for when bit 63 is set (of a potentially-invalid
>>> >pointer to which memory-to-shadow mapping is to be applied) and
>>> >[0x7e00000000000000, 0x7fffffffffffffff] for when bit 63 is reset. Bit
>>> >56 ranges through [0, 1] in both cases.
>>> >
>>> >However, in these patches, you use only bits [60:57]. The compiler is
>>> >not aware of this, so it still sets bits [62:57], and we end up with
>>> >the same two ranges. But in the KASAN code, you only set bits [60:57],
>>> >and thus we can end up with 8 potential ranges (2 possible values for
>>> >each of the top 3 bits), which gets complicated. So checking only one
>>> >range that covers all of them seems to be reasonable for simplicity
>>> >even though not entirely precise. And yes, [0x1e00000000000000,
>>> >0xffffffffffffffff] looks like the what we need.
>>>
>>> Aren't the 2 ranges you mentioned in the previous paragraph still valid, no
>>> matter what bits the __tag_set() function uses? I mean bits 62:57 are still
>>> reset by the compiler so bits 62:61 still won't matter. For example addresses
>>> 0x1e00000000000000 and 0x3e00000000000000 will resolve to the same thing after
>>> the compiler is done with them right?
>>
>>Ah, yes, you're right, it's the same 2 ranges.
>>
>>I was thinking about the outline instrumentation mode, where the
>>shadow address would be calculated based on resetting only bits
>>[60:57]. But then there we have a addr_has_metadata() check in
>>kasan_check_range(), so KASAN should not try to deference a bad shadow
>>address and thus should not reach kasan_non_canonical_hook() anyway.
>
>Okay, so I guess we should do the same check for both arm64 and x86 right? (and
>risc-v in the future). Just use the wider range - in this case the 2 ranges that
>x86 needs. Then it could look something like:
>
> // 0xffffffffffffffff maps just below the shadow offset
> if (addr > KASAN_SHADOW_OFFSET ||
> // and check below the most negative address
> (addr < kasan_mem_to_shadow(0xFE << 56) &&
> // biggest positive address that overflows so check both above it
> addr > kasan_mem_to_shadow(~0UL >> 1)) ||
> // smallest positive address but will overflow so check addresses below it
> addr < kasan_mem_to_shadow(0x7E << 56))
> return
>
>so first two lines deal with the first range, and the next two lines deal with
>the second one.
>
>Or do you want me to make this part of non_canonical_hook() arch specific for
>maximum accuracy?
>
I was applying your other comments to the series and came up with something like
this. What do you think?
/*
* With the default kasan_mem_to_shadow() algorithm, all addresses
* returned by the memory-to-shadow mapping (even for bogus pointers)
* must be within a certain displacement from KASAN_SHADOW_OFFSET.
*
* For Generic KASAN the displacement is unsigned so the mapping from zero
* to the last kernel address needs checking.
*/
if (IS_ENABLED(CONFIG_KASAN_GENERIC)) {
if (addr < KASAN_SHADOW_OFFSET ||
addr >= KASAN_SHADOW_OFFSET + max_shadow_size)
return;
} else {
/*
* For the tag-based mode the compiler resets tags in addresses at
* the start of kasan_mem_to_shadow(). Because of this it's not
* necessary to check a mapping of the entire address space but only
* whether a range of [0xFF00000000000000 - 0xFFFFFFFFFFFFFFFF] is a
* valid memory-to-shadow mapping. On x86, tags are located in bits
* 62:57 so the range becomes [0x7E00000000000000 - 0xFFFFFFFFFFFFFFFF].
* The check below tries to exclude invalid addresses by
* checking spaces between [0x7E00000000000000 - 0x7FFFFFFFFFFFFFFF]
* (which are positive and will overflow the memory-to-shadow
* mapping) and [0xFE00000000000000 - 0xFFFFFFFFFFFFFFFF]
*/
if (addr > KASAN_SHADOW_OFFSET ||
(addr < (u64)kasan_mem_to_shadow((void *)(0xFEUL << 56)) &&
addr > (u64)kasan_mem_to_shadow((void *)(~0UL >> 1))) ||
addr < (u64)kasan_mem_to_shadow((void *)(0x7EUL << 56)))
return;
}
The comment is a bit long and has a lot of hexes but maybe it's good to leave a
longer explanation so no one has to dig through the mailing archives to
understand the logic :b
--
Kind regards
Maciej Wieczór-Retman
next prev parent reply other threads:[~2025-02-28 16:13 UTC|newest]
Thread overview: 69+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-02-18 8:15 [PATCH v2 00/14] kasan: x86: arm64: KASAN tag-based mode for x86 Maciej Wieczor-Retman
2025-02-18 8:15 ` [PATCH v2 01/14] kasan: sw_tags: Use arithmetic shift for shadow computation Maciej Wieczor-Retman
2025-02-19 23:29 ` Andrey Konovalov
2025-02-21 13:11 ` Maciej Wieczor-Retman
2025-02-22 15:06 ` Andrey Konovalov
2025-02-25 17:20 ` Maciej Wieczor-Retman
2025-02-25 19:12 ` Maciej Wieczor-Retman
2025-02-25 20:12 ` Maciej Wieczor-Retman
2025-02-25 21:38 ` Andrey Konovalov
2025-02-26 16:42 ` Maciej Wieczor-Retman
2025-02-26 19:44 ` Andrey Konovalov
2025-02-27 12:27 ` Maciej Wieczor-Retman
2025-02-28 16:12 ` Maciej Wieczor-Retman [this message]
2025-03-01 0:21 ` Andrey Konovalov
2025-03-04 14:06 ` Maciej Wieczor-Retman
2025-03-07 1:10 ` Andrey Konovalov
2025-03-13 14:56 ` Maciej Wieczor-Retman
2025-03-18 15:31 ` Andrey Konovalov
2025-02-25 21:37 ` Andrey Konovalov
2025-02-27 12:33 ` Maciej Wieczor-Retman
2025-03-01 0:22 ` Andrey Konovalov
2025-03-04 12:29 ` Maciej Wieczor-Retman
2025-03-07 1:10 ` Andrey Konovalov
2025-03-14 15:57 ` Maciej Wieczor-Retman
2025-03-18 15:32 ` Andrey Konovalov
2025-02-18 8:15 ` [PATCH v2 02/14] kasan: sw_tags: Check kasan_flag_enabled at runtime Maciej Wieczor-Retman
2025-02-19 23:30 ` Andrey Konovalov
2025-02-21 14:35 ` Maciej Wieczor-Retman
2025-02-18 8:15 ` [PATCH v2 03/14] kasan: sw_tags: Support outline stack tag generation Maciej Wieczor-Retman
2025-02-19 23:30 ` Andrey Konovalov
2025-02-18 8:15 ` [PATCH v2 04/14] kasan: sw_tags: Support tag widths less than 8 bits Maciej Wieczor-Retman
2025-02-18 8:15 ` [PATCH v2 05/14] kasan: arm64: x86: Make special tags arch specific Maciej Wieczor-Retman
2025-02-18 8:15 ` [PATCH v2 06/14] x86: Add arch specific kasan functions Maciej Wieczor-Retman
2025-02-19 23:30 ` Andrey Konovalov
2025-02-21 8:40 ` Maciej Wieczor-Retman
2025-02-18 8:15 ` [PATCH v2 07/14] x86: Reset tag for virtual to physical address conversions Maciej Wieczor-Retman
2025-02-18 8:15 ` [PATCH v2 08/14] x86: Physical address comparisons in fill_p*d/pte Maciej Wieczor-Retman
2025-02-18 8:15 ` [PATCH v2 09/14] mm: Pcpu chunk address tag reset Maciej Wieczor-Retman
2025-03-20 17:39 ` Andrey Ryabinin
2025-03-20 17:47 ` Andrey Konovalov
2025-03-21 10:40 ` Maciej Wieczor-Retman
2025-02-18 8:15 ` [PATCH v2 10/14] x86: KASAN raw shadow memory PTE init Maciej Wieczor-Retman
2025-02-18 8:15 ` [PATCH v2 11/14] x86: LAM initialization Maciej Wieczor-Retman
2025-02-18 8:15 ` [PATCH v2 12/14] x86: Minimal SLAB alignment Maciej Wieczor-Retman
2025-02-19 23:30 ` Andrey Konovalov
2025-02-21 7:24 ` Maciej Wieczor-Retman
2025-02-18 8:15 ` [PATCH v2 13/14] x86: runtime_const used for KASAN_SHADOW_END Maciej Wieczor-Retman
2025-02-19 23:31 ` Andrey Konovalov
2025-02-21 15:10 ` Maciej Wieczor-Retman
2025-02-21 15:27 ` Maciej Wieczor-Retman
2025-02-22 15:08 ` Andrey Konovalov
2025-02-22 15:07 ` Andrey Konovalov
2025-02-25 17:15 ` Maciej Wieczor-Retman
2025-02-25 21:37 ` Andrey Konovalov
2025-02-26 11:52 ` Maciej Wieczor-Retman
2025-02-26 15:24 ` Andrey Konovalov
2025-02-26 17:03 ` Maciej Wieczor-Retman
2025-03-21 19:20 ` Maciej Wieczor-Retman
2025-03-21 20:16 ` Andrey Konovalov
2025-03-24 10:43 ` Maciej Wieczor-Retman
2025-03-24 10:50 ` Maciej Wieczor-Retman
2025-03-24 21:58 ` Andrey Konovalov
2025-02-18 8:15 ` [PATCH v2 14/14] x86: Make software tag-based kasan available Maciej Wieczor-Retman
2025-02-19 23:31 ` Andrey Konovalov
2025-02-20 16:32 ` Andrey Konovalov
2025-02-21 14:44 ` Maciej Wieczor-Retman
2025-02-22 15:06 ` Andrey Konovalov
2025-02-25 15:39 ` Maciej Wieczor-Retman
2025-02-20 2:49 ` kernel test robot
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=mjyjkyiyhbbxyksiycywgh72laozztzwxxwi3gi252uk4b6f7j@3zwpv7l7aisk \
--to=maciej.wieczor-retman@intel.com \
--cc=akpm@linux-foundation.org \
--cc=andreyknvl@gmail.com \
--cc=andriy.shevchenko@linux.intel.com \
--cc=ankita@nvidia.com \
--cc=apopple@nvidia.com \
--cc=ardb@kernel.org \
--cc=arnd@arndb.de \
--cc=baohua@kernel.org \
--cc=bhe@redhat.com \
--cc=bp@alien8.de \
--cc=broonie@kernel.org \
--cc=catalin.marinas@arm.com \
--cc=cl@linux.com \
--cc=corbet@lwn.net \
--cc=dave.hansen@linux.intel.com \
--cc=david@redhat.com \
--cc=dennis@kernel.org \
--cc=dvyukov@google.com \
--cc=dwmw@amazon.co.uk \
--cc=glider@google.com \
--cc=guoweikang.kernel@gmail.com \
--cc=hpa@zytor.com \
--cc=jan.kiszka@siemens.com \
--cc=jason.andryuk@amd.com \
--cc=jgross@suse.com \
--cc=jhubbard@nvidia.com \
--cc=julian.stecklina@cyberus-technology.de \
--cc=justinstitt@google.com \
--cc=kaleshsingh@google.com \
--cc=kasan-dev@googlegroups.com \
--cc=kbingham@kernel.org \
--cc=kees@kernel.org \
--cc=kevinloughlin@google.com \
--cc=kirill.shutemov@linux.intel.com \
--cc=kuan-ying.lee@canonical.com \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=llvm@lists.linux.dev \
--cc=luto@kernel.org \
--cc=mark.rutland@arm.com \
--cc=maz@kernel.org \
--cc=mingo@redhat.com \
--cc=morbo@google.com \
--cc=nathan@kernel.org \
--cc=pankaj.gupta@amd.com \
--cc=pasha.tatashin@soleen.com \
--cc=pawan.kumar.gupta@linux.intel.com \
--cc=peterz@infradead.org \
--cc=rafael.j.wysocki@intel.com \
--cc=richard.weiyang@gmail.com \
--cc=rppt@kernel.org \
--cc=ryabinin.a.a@gmail.com \
--cc=samuel.holland@sifive.com \
--cc=scott@os.amperecomputing.com \
--cc=surenb@google.com \
--cc=tglx@linutronix.de \
--cc=thiago.bauermann@linaro.org \
--cc=thomas.weissschuh@linutronix.de \
--cc=tj@kernel.org \
--cc=tony.luck@intel.com \
--cc=vincenzo.frascino@arm.com \
--cc=vitalybuka@google.com \
--cc=wangkefeng.wang@huawei.com \
--cc=will@kernel.org \
--cc=x86@kernel.org \
--cc=xin@zytor.com \
--cc=xur@google.com \
--cc=ytcoode@gmail.com \
--cc=ziy@nvidia.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox