Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3688752ybi; Sun, 14 Jul 2019 20:07:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqzxLPgYaZKz+0wKPh8bXv2ErxH9YsC6iBU9hw14rm75OSY8wZlmYP52cVIlt8p0LbFst2zo X-Received: by 2002:a17:90a:346c:: with SMTP id o99mr26206285pjb.20.1563160046583; Sun, 14 Jul 2019 20:07:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563160046; cv=none; d=google.com; s=arc-20160816; b=jhWb0Y5w4Z1OQMfzYnXWg5zeq+imUillXvJSiwdQBj2NqdG7NRB2L0cjr/yTOYWOzE g3CWjVyfWwBbvNpH0BUj1nooP1sNlDEhOJvWe96BV5paqO+aDBXs2/t3eHy46frEMnSz LyNvXMA5D25e34spnOPrEUMBz7vGSpNkCWKvz4uCFK8VoWvCI+uEDZ8wV6BgLconjcSL 9BG83TwE4IiHkL8DymJ9CKODftmp/O2d5sqR6FchdEOp7b+MZDP516lQEr+iFzVU0es6 W7c9ApkMcdJyki5uvtj+YR+vzAyj3siJc+kzs+R5mHYzBpKCbvyMTYbJBTs+xPpzoDrN BeHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :references:in-reply-to:date:cc:to:from:subject:message-id; bh=EjusoFySDJ4oOrd0QsyomBUcAt2tgctPtdTv2+1Q2o4=; b=ZFmhr7q7EP0Nwg62G2p/Fh5xi03kAl9QKd6VsLyyH+7TMsslmXsXnqXi69DFTZ1TCf 3kRnnU5pYJGQNJN5p7fvCTJEtYzTyLZl1cJVrelsVTPL+VEImaHPs/0FDmdGGJ+3G9SB Pvvv2iuV/QJg/e98s5szHTmXGbB7mC4YFeQ+42wzhTv4whhlqNUKk6LMVVw6REiaRmZ6 4FQU6dOfmm8Jeh8wlIFF7O9xbql40ZoN3S9zbcuL3vTfcNmaHcIkcUIVR28Yj9ngNgfV TBQYScV69rkZ848GbPDth5gHudvvgHtEjTptiU/g+19xihXY4GAwL7exyx5ekpElSuZo /GZA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x7si14801653pgf.239.2019.07.14.20.07.08; Sun, 14 Jul 2019 20:07:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728952AbfGODGt (ORCPT + 99 others); Sun, 14 Jul 2019 23:06:49 -0400 Received: from mailgw01.mediatek.com ([210.61.82.183]:59706 "EHLO mailgw01.mediatek.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1726916AbfGODGt (ORCPT ); Sun, 14 Jul 2019 23:06:49 -0400 X-UUID: d5814ede6d58453e95a0b6c0fcd31521-20190715 X-UUID: d5814ede6d58453e95a0b6c0fcd31521-20190715 Received: from mtkexhb01.mediatek.inc [(172.21.101.102)] by mailgw01.mediatek.com (envelope-from ) (mhqrelay.mediatek.com ESMTP with TLS) with ESMTP id 1205297470; Mon, 15 Jul 2019 11:06:42 +0800 Received: from mtkcas07.mediatek.inc (172.21.101.84) by mtkmbs07n1.mediatek.inc (172.21.101.16) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Mon, 15 Jul 2019 11:06:41 +0800 Received: from [172.21.84.99] (172.21.84.99) by mtkcas07.mediatek.inc (172.21.101.73) with Microsoft SMTP Server id 15.0.1395.4 via Frontend Transport; Mon, 15 Jul 2019 11:06:40 +0800 Message-ID: <1563160001.4793.4.camel@mtksdccf07> Subject: Re: [PATCH v3] kasan: add memory corruption identification for software tag-based mode From: Walter Wu To: Andrey Ryabinin CC: Dmitry Vyukov , Alexander Potapenko , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Matthias Brugger , "Martin Schwidefsky" , Arnd Bergmann , "Vasily Gorbik" , Andrey Konovalov , "Jason A . Donenfeld" , Miles Chen , kasan-dev , LKML , Linux-MM , Linux ARM , , wsd_upstream Date: Mon, 15 Jul 2019 11:06:41 +0800 In-Reply-To: <37897fb7-88c1-859a-dfcc-0a5e89a642e0@virtuozzo.com> References: <20190613081357.1360-1-walter-zh.wu@mediatek.com> <1560447999.15814.15.camel@mtksdccf07> <1560479520.15814.34.camel@mtksdccf07> <1560744017.15814.49.camel@mtksdccf07> <1560774735.15814.54.camel@mtksdccf07> <1561974995.18866.1.camel@mtksdccf07> <1562640832.9077.32.camel@mtksdccf07> <1562839579.5846.12.camel@mtksdccf07> <37897fb7-88c1-859a-dfcc-0a5e89a642e0@virtuozzo.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.2.3-0ubuntu6 Content-Transfer-Encoding: 8bit MIME-Version: 1.0 X-MTK: N Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2019-07-12 at 13:52 +0300, Andrey Ryabinin wrote: > > On 7/11/19 1:06 PM, Walter Wu wrote: > > On Wed, 2019-07-10 at 21:24 +0300, Andrey Ryabinin wrote: > >> > >> On 7/9/19 5:53 AM, Walter Wu wrote: > >>> On Mon, 2019-07-08 at 19:33 +0300, Andrey Ryabinin wrote: > >>>> > >>>> On 7/5/19 4:34 PM, Dmitry Vyukov wrote: > >>>>> On Mon, Jul 1, 2019 at 11:56 AM Walter Wu wrote: > >> > >>>>> > >>>>> Sorry for delays. I am overwhelm by some urgent work. I afraid to > >>>>> promise any dates because the next week I am on a conference, then > >>>>> again a backlog and an intern starting... > >>>>> > >>>>> Andrey, do you still have concerns re this patch? This change allows > >>>>> to print the free stack. > >>>> > >>>> I 'm not sure that quarantine is a best way to do that. Quarantine is made to delay freeing, but we don't that here. > >>>> If we want to remember more free stacks wouldn't be easier simply to remember more stacks in object itself? > >>>> Same for previously used tags for better use-after-free identification. > >>>> > >>> > >>> Hi Andrey, > >>> > >>> We ever tried to use object itself to determine use-after-free > >>> identification, but tag-based KASAN immediately released the pointer > >>> after call kfree(), the original object will be used by another > >>> pointer, if we use object itself to determine use-after-free issue, then > >>> it has many false negative cases. so we create a lite quarantine(ring > >>> buffers) to record recent free stacks in order to avoid those false > >>> negative situations. > >> > >> I'm telling that *more* than one free stack and also tags per object can be stored. > >> If object reused we would still have information about n-last usages of the object. > >> It seems like much easier and more efficient solution than patch you proposing. > >> > > To make the object reused, we must ensure that no other pointers uses it > > after kfree() release the pointer. > > Scenario: > > 1). The object reused information is valid when no another pointer uses > > it. > > 2). The object reused information is invalid when another pointer uses > > it. > > Do you mean that the object reused is scenario 1) ? > > If yes, maybe we can change the calling quarantine_put() location. It > > will be fully use that quarantine, but at scenario 2) it looks like to > > need this patch. > > If no, maybe i miss your meaning, would you tell me how to use invalid > > object information? or? > > > > > KASAN keeps information about object with the object, right after payload in the kasan_alloc_meta struct. > This information is always valid as long as slab page allocated. Currently it keeps only one last free stacktrace. > It could be extended to record more free stacktraces and also record previously used tags which will allow you > to identify use-after-free and extract right free stacktrace. Thanks for your explanation. For extend slub object, if one record is 9B (sizeof(u8)+ sizeof(struct kasan_track)) and add five records into slub object, every slub object may add 45B usage after the system runs longer. Slub object number is easy more than 1,000,000(maybe it may be more bigger), then the extending object memory usage should be 45MB, and unfortunately it is no limit. The memory usage is more bigger than our patch. We hope tag-based KASAN advantage is smaller memory usage. If it’s possible, we should spend less memory in order to identify use-after-free. Would you accept our patch after fine tune it?