Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp344438ybn; Wed, 25 Sep 2019 00:23:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqwkH4qnwIrTa5YcAe8ccG4hoaopZm4LETgdhUBuNSJKYHYrb9kMVexPAHXVY4UDKs0qTy+E X-Received: by 2002:a7b:c92b:: with SMTP id h11mr5882865wml.10.1569396184327; Wed, 25 Sep 2019 00:23:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569396184; cv=none; d=google.com; s=arc-20160816; b=VtDIrqeVgsJPhfcDSDeztr6YkqQKcF8NqaPVeZMk67AyhrSB/wFp+10JHYZ7MrlMEE MzcJUeE4Biow69f7T/qEU7iHXwObna19U4f583ROPirAd+DY8C2XS/0KA3vfIm6GqvSj IBjEYovWwpnMwDlgz5Se4nuBkIswntDjt1K6AY7M8HT+cGEo/ebVDk6URTj0th555IvT Kf/qXxPvDBePLozAvvM6/N1OikPRrE97KUxXXnnRIuk3qvBxQ9Tk65kqInUrqHSHjwRK PGFoG7AmIukIZ+zmIialnTCm7fqFYi9F2C65bIPVsYq1XaJ8bN9kyqI4ohk0CTpCngcK LFSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=jdSqg+UUGVQnSY8ltldMRLzBxb5XNJ23zU+siPY55+M=; b=tA+DzxRus+jpkf3GbEV8o8U79sfPP8vtZnHege0Mgq03FFNSQAqa5XQJaSMaeyMdtH ffgPJHGYEI/EMNyWdDtnSRuSX9ItbUVTFYLcR3XIUMsorrJQ4XX8etBFtCYzVopxtNqZ MSjr15/zehW5PlS0jEvVVEXuuid8xKeUuvvLdckM506Yz/r/44s3W5sqfXstnk2cw8YF QXZTmojkJIbPxOaukUFhn3qNQ+N/etDNGfWDs7kP7H2E8qO/f/ye9BjulQfMww3IxzLd YDqdMT2SdaBRKA3bujQGuLLzJNZKGxACT4pIvtTJAKRwuRSQWEJ85Vv7VVJIhKlzvibN vpFA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a29si2768786eda.246.2019.09.25.00.22.38; Wed, 25 Sep 2019 00:23:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2437847AbfIWIVE (ORCPT + 99 others); Mon, 23 Sep 2019 04:21:04 -0400 Received: from mx2.suse.de ([195.135.220.15]:52966 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2437768AbfIWIVD (ORCPT ); Mon, 23 Sep 2019 04:21:03 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 1B798ACE3; Mon, 23 Sep 2019 08:21:01 +0000 (UTC) Subject: [PATCH] mm, debug, kasan: save and dump freeing stack trace for kasan To: Andrey Ryabinin , Walter Wu Cc: Qian Cai , Alexander Potapenko , Dmitry Vyukov , Matthias Brugger , Andrew Morton , Martin Schwidefsky , Andrey Konovalov , Arnd Bergmann , linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-arm-kernel@lists.infradead.org, linux-mediatek@lists.infradead.org, wsd_upstream@mediatek.com References: <20190911083921.4158-1-walter-zh.wu@mediatek.com> <5E358F4B-552C-4542-9655-E01C7B754F14@lca.pw> <1568297308.19040.5.camel@mtksdccf07> <613f9f23-c7f0-871f-fe13-930c35ef3105@suse.cz> <79fede05-735b-8477-c273-f34db93fd72b@virtuozzo.com> <6d58ce86-b2a4-40af-bf40-c604b457d086@suse.cz> <4e76e7ce-1d61-524a-622b-663c01d19707@virtuozzo.com> From: Vlastimil Babka Message-ID: Date: Mon, 23 Sep 2019 10:20:59 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <4e76e7ce-1d61-524a-622b-663c01d19707@virtuozzo.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/16/19 5:57 PM, Andrey Ryabinin wrote: > I'd rather keep all logic in one place, i.e. "if (!page_owner_disabled && (IS_ENABLED(CONFIG_KASAN) || debug_pagealloc_enabled())" > With this no changes in early_debug_pagealloc() required and CONFIG_DEBUG_PAGEALLOC_ENABLE_DEFAULT=y should also work correctly. OK. ----8<---- From 7437c43f02682fdde5680fa83e87029f7529e222 Mon Sep 17 00:00:00 2001 From: Vlastimil Babka Date: Mon, 16 Sep 2019 11:28:19 +0200 Subject: [PATCH] mm, debug, kasan: save and dump freeing stack trace for kasan The commit "mm, page_owner, debug_pagealloc: save and dump freeing stack trace" enhanced page_owner to also store freeing stack trace, when debug_pagealloc is also enabled. KASAN would also like to do this [1] to improve error reports to debug e.g. UAF issues. This patch therefore introduces a helper config option PAGE_OWNER_FREE_STACK, which is enabled when PAGE_OWNER and either of DEBUG_PAGEALLOC or KASAN is enabled. Boot-time, the free stack saving is enabled when booting a KASAN kernel with page_owner=on, or non-KASAN kernel with debug_pagealloc=on and page_owner=on. [1] https://bugzilla.kernel.org/show_bug.cgi?id=203967 Suggested-by: Dmitry Vyukov Suggested-by: Walter Wu Suggested-by: Andrey Ryabinin Signed-off-by: Vlastimil Babka --- Documentation/dev-tools/kasan.rst | 4 ++++ mm/Kconfig.debug | 4 ++++ mm/page_owner.c | 31 ++++++++++++++++++------------- 3 files changed, 26 insertions(+), 13 deletions(-) diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst index b72d07d70239..434e605030e9 100644 --- a/Documentation/dev-tools/kasan.rst +++ b/Documentation/dev-tools/kasan.rst @@ -41,6 +41,10 @@ smaller binary while the latter is 1.1 - 2 times faster. Both KASAN modes work with both SLUB and SLAB memory allocators. For better bug detection and nicer reporting, enable CONFIG_STACKTRACE. +To augment reports with last allocation and freeing stack of the physical +page, it is recommended to configure kernel also with CONFIG_PAGE_OWNER = y +and boot with page_owner=on. + To disable instrumentation for specific files or directories, add a line similar to the following to the respective kernel Makefile: diff --git a/mm/Kconfig.debug b/mm/Kconfig.debug index 327b3ebf23bf..1ea247da3322 100644 --- a/mm/Kconfig.debug +++ b/mm/Kconfig.debug @@ -62,6 +62,10 @@ config PAGE_OWNER If unsure, say N. +config PAGE_OWNER_FREE_STACK + def_bool KASAN || DEBUG_PAGEALLOC + depends on PAGE_OWNER + config PAGE_POISONING bool "Poison pages after freeing" select PAGE_POISONING_NO_SANITY if HIBERNATION diff --git a/mm/page_owner.c b/mm/page_owner.c index dee931184788..8b6b05676158 100644 --- a/mm/page_owner.c +++ b/mm/page_owner.c @@ -24,13 +24,14 @@ struct page_owner { short last_migrate_reason; gfp_t gfp_mask; depot_stack_handle_t handle; -#ifdef CONFIG_DEBUG_PAGEALLOC +#ifdef CONFIG_PAGE_OWNER_FREE_STACK depot_stack_handle_t free_handle; #endif }; static bool page_owner_disabled = true; DEFINE_STATIC_KEY_FALSE(page_owner_inited); +static DEFINE_STATIC_KEY_FALSE(page_owner_free_stack); static depot_stack_handle_t dummy_handle; static depot_stack_handle_t failure_handle; @@ -91,6 +92,8 @@ static void init_page_owner(void) register_failure_stack(); register_early_stack(); static_branch_enable(&page_owner_inited); + if (IS_ENABLED(CONFIG_KASAN) || debug_pagealloc_enabled()) + static_branch_enable(&page_owner_free_stack); init_early_allocated_pages(); } @@ -148,11 +151,11 @@ void __reset_page_owner(struct page *page, unsigned int order) { int i; struct page_ext *page_ext; -#ifdef CONFIG_DEBUG_PAGEALLOC +#ifdef CONFIG_PAGE_OWNER_FREE_STACK depot_stack_handle_t handle = 0; struct page_owner *page_owner; - if (debug_pagealloc_enabled()) + if (static_branch_unlikely(&page_owner_free_stack)) handle = save_stack(GFP_NOWAIT | __GFP_NOWARN); #endif @@ -161,8 +164,8 @@ void __reset_page_owner(struct page *page, unsigned int order) if (unlikely(!page_ext)) continue; __clear_bit(PAGE_EXT_OWNER_ACTIVE, &page_ext->flags); -#ifdef CONFIG_DEBUG_PAGEALLOC - if (debug_pagealloc_enabled()) { +#ifdef CONFIG_PAGE_OWNER_FREE_STACK + if (static_branch_unlikely(&page_owner_free_stack)) { page_owner = get_page_owner(page_ext); page_owner->free_handle = handle; } @@ -451,14 +454,16 @@ void __dump_page_owner(struct page *page) stack_trace_print(entries, nr_entries, 0); } -#ifdef CONFIG_DEBUG_PAGEALLOC - handle = READ_ONCE(page_owner->free_handle); - if (!handle) { - pr_alert("page_owner free stack trace missing\n"); - } else { - nr_entries = stack_depot_fetch(handle, &entries); - pr_alert("page last free stack trace:\n"); - stack_trace_print(entries, nr_entries, 0); +#ifdef CONFIG_PAGE_OWNER_FREE_STACK + if (static_branch_unlikely(&page_owner_free_stack)) { + handle = READ_ONCE(page_owner->free_handle); + if (!handle) { + pr_alert("page_owner free stack trace missing\n"); + } else { + nr_entries = stack_depot_fetch(handle, &entries); + pr_alert("page last free stack trace:\n"); + stack_trace_print(entries, nr_entries, 0); + } } #endif -- 2.23.0