Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp10635653imu; Thu, 6 Dec 2018 04:29:09 -0800 (PST) X-Google-Smtp-Source: AFSGD/UAkn2cZX4qCQKI1tGzefK2K26rnB1OEI7Ki8V7gjAsmafdtVCnzMORLcLMna0gkk84IcRa X-Received: by 2002:a63:a002:: with SMTP id r2mr23497967pge.212.1544099348952; Thu, 06 Dec 2018 04:29:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544099348; cv=none; d=google.com; s=arc-20160816; b=N0cf0pqS2ctoofrTvrxYVnT1skpdAIpMHMbnUidUIMgw+wlJwyyC5zIqxsHMmvP8jh z02oN+i4CiHRvLtCbvQA6CdXG/0zwwh+Rt4kttaU1JYDw1KgRTxPHL+bTAUKfeuOSosy wfzgtpV/naglk9CkVMGNjRSQcSZb0CwRUn7KrhB7d/6H6FCChTm2BmPR1orDT6+1R8j6 Nv9/b7JSp58vx0oeIe/gOLC2WhUuZKRKEJuZF9zX7vtDB823WEs7AUWgBHRKS5hMXjFT TzP2pvXcuypIPDC/x1TUNqPNUJ9qzzH3nG0CvUrame/jYQH7yB8sldQului2/RkacXCP lfkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=G5Ka/D9ThH8pnE4eoPJ0OLfzNTsBwnEIL720J8sMTz0=; b=ir9W9l4da/nnpXd/uM0AoVn6oxqn3aOh3faZalQULNDd8nJYUR+HSdJxpam9CmZ4eW aHpaF3BJ1IQKPn5zhaO/6LHU6iIj8Aha0wYJV2N4GldaMyy5e67wi/H3X3ln46L37X2T xCJkz7kfh//IAIbmyFWAISuo3INzS1EUEAGV5KqIxxODnkIA2HQz1zbut4cZGuPZPa76 0BttfTUEKMGeBCwg1YiHhyqF3H0Wux6m1bWGHrOGoqSSzENBzVTzblSKWTc1C70D7dOV tdi2NfPOIJiwKXohdOOoIi09E7yeRxXVBQ+RY8kkcn/FgzpYAh2qXetbwESM3fD2HWpM S7oA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=dhrVAvtp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c2si181255plb.152.2018.12.06.04.28.53; Thu, 06 Dec 2018 04:29:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=dhrVAvtp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729655AbeLFMZG (ORCPT + 99 others); Thu, 6 Dec 2018 07:25:06 -0500 Received: from mail-wm1-f65.google.com ([209.85.128.65]:37705 "EHLO mail-wm1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729620AbeLFMZD (ORCPT ); Thu, 6 Dec 2018 07:25:03 -0500 Received: by mail-wm1-f65.google.com with SMTP id g67so833994wmd.2 for ; Thu, 06 Dec 2018 04:25:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=G5Ka/D9ThH8pnE4eoPJ0OLfzNTsBwnEIL720J8sMTz0=; b=dhrVAvtpao4EYg7FPVcAkM1wtgiCBBI9ASJhoyX/vv+zvJ5zk95ov0eIQZZadClZMy C9GuvdBwcXqwqHElxuDXEIz889yekq6iNXAe7oMkWsjIBsJ9rt8EwF02GzX729gCYrKI ynUxvY44E8YwCyPeGFjutDX/Ka4dGW+JpBDkXy6pmjwo/Rq5KY/j3JJ5r3kwmG4hQNSM 4stTjLLbbsYQYnRqF3a4u1Q0q/jojd03Tl+wDvTna6jK/WpUnbO2YeYOwxaFWZG0Yj1N LhSyyeYMWO8CsVUWLNmXcxBL3cZLwTNssIUkFccRsslhrLDvpgG3oyko66ErTK7fQUUV ZqYw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=G5Ka/D9ThH8pnE4eoPJ0OLfzNTsBwnEIL720J8sMTz0=; b=Vv/YIbLhKY7D7TGiaeChDeAeU8q5/zm9WXkjtFTqKzMC4yc9V/ZfBYT2OcfNEapS5h Wd8ZT/ZsrIu6oyKjKsMaim3v615cpVhzO8heILTFxaq+9SCax17dcT0T/i420nUrAi3C xUVX8L9bUiDPyE5K7/p1xYtjBc15okoBxYYumH6U1vnCqRRpe/ewmBR5G/nXcpsfpc+f jIEyqrJ+xKXcBI+KWHlQItfGCUUQ1OftG5hEQJr8Usq38dI6Yg/DYgIKQh57K4Pleks6 3KWEAYRFEbd+FyQjdLuHU4C62onk6kNNs1AhRn+el3zjEe7R3pAG3z2C/KixCf6BUQ1L faNg== X-Gm-Message-State: AA+aEWZV5yHNZdsqWAWudcFaF5OFUagNb+BTKXuRM+vKtxkw1QqpIeSm PQSIcLPy7jpWP+mF77JXkAPGsQ== X-Received: by 2002:a1c:8d49:: with SMTP id p70mr1774408wmd.68.1544099101009; Thu, 06 Dec 2018 04:25:01 -0800 (PST) Received: from andreyknvl0.muc.corp.google.com ([2a00:79e0:15:10:3180:41f8:3010:ff61]) by smtp.gmail.com with ESMTPSA id j8sm339988wrt.40.2018.12.06.04.24.59 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 06 Dec 2018 04:25:00 -0800 (PST) From: Andrey Konovalov To: Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , Catalin Marinas , Will Deacon , Christoph Lameter , Andrew Morton , Mark Rutland , Nick Desaulniers , Marc Zyngier , Dave Martin , Ard Biesheuvel , "Eric W . Biederman" , Ingo Molnar , Paul Lawrence , Geert Uytterhoeven , Arnd Bergmann , "Kirill A . Shutemov" , Greg Kroah-Hartman , Kate Stewart , Mike Rapoport , kasan-dev@googlegroups.com, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-sparse@vger.kernel.org, linux-mm@kvack.org, linux-kbuild@vger.kernel.org Cc: Kostya Serebryany , Evgeniy Stepanov , Lee Smith , Ramana Radhakrishnan , Jacob Bramley , Ruben Ayrapetyan , Jann Horn , Mark Brand , Chintan Pandya , Vishwath Mohan , Andrey Konovalov Subject: [PATCH v13 08/25] kasan: initialize shadow to 0xff for tag-based mode Date: Thu, 6 Dec 2018 13:24:26 +0100 Message-Id: <5cc1b789aad7c99cf4f3ec5b328b147ad53edb40.1544099024.git.andreyknvl@google.com> X-Mailer: git-send-email 2.20.0.rc1.387.gf8505762e3-goog In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org A tag-based KASAN shadow memory cell contains a memory tag, that corresponds to the tag in the top byte of the pointer, that points to that memory. The native top byte value of kernel pointers is 0xff, so with tag-based KASAN we need to initialize shadow memory to 0xff. Reviewed-by: Andrey Ryabinin Reviewed-by: Dmitry Vyukov Signed-off-by: Andrey Konovalov --- arch/arm64/mm/kasan_init.c | 15 +++++++++++++-- include/linux/kasan.h | 8 ++++++++ mm/kasan/common.c | 3 ++- 3 files changed, 23 insertions(+), 3 deletions(-) diff --git a/arch/arm64/mm/kasan_init.c b/arch/arm64/mm/kasan_init.c index 4ebc19422931..7a4a0904cac8 100644 --- a/arch/arm64/mm/kasan_init.c +++ b/arch/arm64/mm/kasan_init.c @@ -43,6 +43,15 @@ static phys_addr_t __init kasan_alloc_zeroed_page(int node) return __pa(p); } +static phys_addr_t __init kasan_alloc_raw_page(int node) +{ + void *p = memblock_alloc_try_nid_raw(PAGE_SIZE, PAGE_SIZE, + __pa(MAX_DMA_ADDRESS), + MEMBLOCK_ALLOC_ACCESSIBLE, + node); + return __pa(p); +} + static pte_t *__init kasan_pte_offset(pmd_t *pmdp, unsigned long addr, int node, bool early) { @@ -92,7 +101,9 @@ static void __init kasan_pte_populate(pmd_t *pmdp, unsigned long addr, do { phys_addr_t page_phys = early ? __pa_symbol(kasan_early_shadow_page) - : kasan_alloc_zeroed_page(node); + : kasan_alloc_raw_page(node); + if (!early) + memset(__va(page_phys), KASAN_SHADOW_INIT, PAGE_SIZE); next = addr + PAGE_SIZE; set_pte(ptep, pfn_pte(__phys_to_pfn(page_phys), PAGE_KERNEL)); } while (ptep++, addr = next, addr != end && pte_none(READ_ONCE(*ptep))); @@ -239,7 +250,7 @@ void __init kasan_init(void) pfn_pte(sym_to_pfn(kasan_early_shadow_page), PAGE_KERNEL_RO)); - memset(kasan_early_shadow_page, 0, PAGE_SIZE); + memset(kasan_early_shadow_page, KASAN_SHADOW_INIT, PAGE_SIZE); cpu_replace_ttbr1(lm_alias(swapper_pg_dir)); /* At this point kasan is fully initialized. Enable error messages */ diff --git a/include/linux/kasan.h b/include/linux/kasan.h index ec22d548d0d7..c56af24bd3e7 100644 --- a/include/linux/kasan.h +++ b/include/linux/kasan.h @@ -153,6 +153,8 @@ static inline size_t kasan_metadata_size(struct kmem_cache *cache) { return 0; } #ifdef CONFIG_KASAN_GENERIC +#define KASAN_SHADOW_INIT 0 + void kasan_cache_shrink(struct kmem_cache *cache); void kasan_cache_shutdown(struct kmem_cache *cache); @@ -163,4 +165,10 @@ static inline void kasan_cache_shutdown(struct kmem_cache *cache) {} #endif /* CONFIG_KASAN_GENERIC */ +#ifdef CONFIG_KASAN_SW_TAGS + +#define KASAN_SHADOW_INIT 0xFF + +#endif /* CONFIG_KASAN_SW_TAGS */ + #endif /* LINUX_KASAN_H */ diff --git a/mm/kasan/common.c b/mm/kasan/common.c index 5f68c93734ba..7134e75447ff 100644 --- a/mm/kasan/common.c +++ b/mm/kasan/common.c @@ -473,11 +473,12 @@ int kasan_module_alloc(void *addr, size_t size) ret = __vmalloc_node_range(shadow_size, 1, shadow_start, shadow_start + shadow_size, - GFP_KERNEL | __GFP_ZERO, + GFP_KERNEL, PAGE_KERNEL, VM_NO_GUARD, NUMA_NO_NODE, __builtin_return_address(0)); if (ret) { + __memset(ret, KASAN_SHADOW_INIT, shadow_size); find_vm_area(addr)->flags |= VM_KASAN; kmemleak_ignore(ret); return 0; -- 2.20.0.rc1.387.gf8505762e3-goog