Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp1108314ybm; Tue, 21 May 2019 08:45:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqyC1pCCdeWe3qS2Fr5E4p84w/tR7vyfV4gD8ldjG7sBZTytqv3HBviiCYBsRJlMPcyKw3KN X-Received: by 2002:a63:144e:: with SMTP id 14mr65626183pgu.304.1558453518102; Tue, 21 May 2019 08:45:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558453518; cv=none; d=google.com; s=arc-20160816; b=F4VY34Q5kx/mS0gO3AWeGMKhTb2SdVKAf2Zur97/XMV/YvidJQnnAjzVyB45//0btL 9oTcyCe6OuGrMu0xZEgldYyBXzIFMShRRjwNqVvvdy2cYg8y6NWgBrEt5N3wno17ojgr 1O4I5qScmG7MOCrzzTxP32aLgTwVp1zYfkUtpiCuADuE6x3VbEZxK726tItlb+rTDd/A 2Ts/AH0Sch2zBI1ccN2NMRi4ktuxXG/eT9uW4eInFZcGgNFVU8sFPujpmEPMCgQ6nX1v 6lJK8VDNOzNekYt6dDQt1emwGFSDII4m5mZ3gRf8LG9dmIok97cWz/kjfKuCsnNfAoHh 1lug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=We2uypiPNmCU7rL3l9J/wgnfVgJk7qbDKDVJyLe1/Pk=; b=AVJfpLnaJXMScHHSU1Ucj51YD3ag2h5/pCaylso0ntYuoD4k27p2+2McchKAljdH16 XiA9lIcu4afTn0A1L1w6WWeMuUo8ZHhf19P5am8heNkW+dtMVlHExXQo9RdbEVb2NYWQ CI5tVe06KvLlMKWZ8R6+BJgiJ0klEPSS30unPIGumNVNuvXq8SjrhxdGIdaz5DBQ4Hjh 5mhCWBJ7uBI++9nZu9gvxjrb26Y732MQUEGdye1VGGjG4iXO2qVvQyJpOQplFY987ytm nl8WbWbIuGilmE6YDYAj+dd36w5IPGgmRLm/KNmk9pcv02ltudPi5QciraO6sepL5cVh a+0Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u6si15564086plq.94.2019.05.21.08.45.02; Tue, 21 May 2019 08:45:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728799AbfEUPnn (ORCPT + 99 others); Tue, 21 May 2019 11:43:43 -0400 Received: from relay.sw.ru ([185.231.240.75]:37486 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727941AbfEUPnn (ORCPT ); Tue, 21 May 2019 11:43:43 -0400 Received: from [172.16.25.12] by relay.sw.ru with esmtp (Exim 4.91) (envelope-from ) id 1hT6vS-00073c-UC; Tue, 21 May 2019 18:43:39 +0300 Subject: Re: [PATCH v2] mm/kasan: Print frame description for stack bugs To: Marco Elver , dvyukov@google.com, glider@google.com, andreyknvl@google.com, akpm@linux-foundation.org Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, kasan-dev@googlegroups.com References: <20190520154751.84763-1-elver@google.com> From: Andrey Ryabinin Message-ID: Date: Tue, 21 May 2019 18:43:54 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <20190520154751.84763-1-elver@google.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/20/19 6:47 PM, Marco Elver wrote: > +static void print_decoded_frame_descr(const char *frame_descr) > +{ > + /* > + * We need to parse the following string: > + * "n alloc_1 alloc_2 ... alloc_n" > + * where alloc_i looks like > + * "offset size len name" > + * or "offset size len name:line". > + */ > + > + char token[64]; > + unsigned long num_objects; > + > + if (!tokenize_frame_descr(&frame_descr, token, sizeof(token), > + &num_objects)) > + return; > + > + pr_err("\n"); > + pr_err("this frame has %lu %s:\n", num_objects, > + num_objects == 1 ? "object" : "objects"); > + > + while (num_objects--) { > + unsigned long offset; > + unsigned long size; > + > + /* access offset */ > + if (!tokenize_frame_descr(&frame_descr, token, sizeof(token), > + &offset)) > + return; > + /* access size */ > + if (!tokenize_frame_descr(&frame_descr, token, sizeof(token), > + &size)) > + return; > + /* name length (unused) */ > + if (!tokenize_frame_descr(&frame_descr, NULL, 0, NULL)) > + return; > + /* object name */ > + if (!tokenize_frame_descr(&frame_descr, token, sizeof(token), > + NULL)) > + return; > + > + /* Strip line number, if it exists. */ Why? > + strreplace(token, ':', '\0'); > + ... > + > + aligned_addr = round_down((unsigned long)addr, sizeof(long)); > + mem_ptr = round_down(aligned_addr, KASAN_SHADOW_SCALE_SIZE); > + shadow_ptr = kasan_mem_to_shadow((void *)aligned_addr); > + shadow_bottom = kasan_mem_to_shadow(end_of_stack(current)); > + > + while (shadow_ptr >= shadow_bottom && *shadow_ptr != KASAN_STACK_LEFT) { > + shadow_ptr--; > + mem_ptr -= KASAN_SHADOW_SCALE_SIZE; > + } > + > + while (shadow_ptr >= shadow_bottom && *shadow_ptr == KASAN_STACK_LEFT) { > + shadow_ptr--; > + mem_ptr -= KASAN_SHADOW_SCALE_SIZE; > + } > + I suppose this won't work if stack grows up, which is fine because it grows up only on parisc arch. But "BUILD_BUG_ON(IS_ENABLED(CONFIG_STACK_GROUWSUP))" somewhere wouldn't hurt.