Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp1383277pxx; Fri, 30 Oct 2020 08:45:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxwMVJ0YTP1YJukHzZJYXNSFRdOEmkGEAEWZ9vF/V/TWws97uvS+Z+zlKPj3FQgfNj3nU8R X-Received: by 2002:a50:e041:: with SMTP id g1mr3136734edl.385.1604072758828; Fri, 30 Oct 2020 08:45:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1604072758; cv=none; d=google.com; s=arc-20160816; b=NLGvBUTszqJUMEBRSzydIALzwMQ7+p5KSczlcveyatM/9OuVfuGNnJS76MJR/98Sy/ NEYmD59DGuQzYU0WYV/pBJAYm8ESm6yhbMWO6HlYT32Xh6gy0umOaNdYIYXXAMbsLm4J g2vMkVawB9v71y8RHVULaCAgf0Yq0IvxSZ70Ofbay5ep4klkHsA3LN2XvpTUWPG5NwEF i3cklcjkMpVxl2uZ4HGRXlkZX0Mq0yFaQlHXS4njoPttwItQWbmK1mFoOxrhcfuzgWb/ RG4+mmucc/lqTk2rq/cGh9EJBNe3l4My6ds1/S6ssVV9zZ4HaRCJf386pn+jEP2xfsOb ydEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=jliMwvFbMuf3FmeyCOZHebsGYCHgE565UHogT5/5F4c=; b=OVbgWzbHKApnOM5dz1ZhqwlaazVPw4uOmFRnxZ1WBXlPiQNT5KTRsMC9axWmSlNTh1 aw3BaQFP7poWnYL7rHclA9MfJTO+UVdAKczMdb8zC5Bj2TVwCf97N7qR9OiKps5xyxVs 7/Dct/WIX2iYnuSL82EEl8PH1p4v8DCqexlYRcz+0d8lmi2BN4fJGAGVvJFO1Md2HuHJ p+WRvxGIFQ2fX+I1/eS+In5etxtaQd569RfbcYf4Eg8sU9sS0Y7ZR34gm9IPifH0Adlf NL9ZhqAC5u9OIaiVtBqjZMDgZEzgs2RXrZncKLFyMB0KXpTuGszYyN+NmklIG7/VgpMI uZ/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=DTRV++Wj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r21si4650405edt.339.2020.10.30.08.45.35; Fri, 30 Oct 2020 08:45:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=DTRV++Wj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726871AbgJ3PmL (ORCPT + 99 others); Fri, 30 Oct 2020 11:42:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46028 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725939AbgJ3PmK (ORCPT ); Fri, 30 Oct 2020 11:42:10 -0400 Received: from mail-oi1-x242.google.com (mail-oi1-x242.google.com [IPv6:2607:f8b0:4864:20::242]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0CCC7C0613CF for ; Fri, 30 Oct 2020 08:42:10 -0700 (PDT) Received: by mail-oi1-x242.google.com with SMTP id j7so7026281oie.12 for ; Fri, 30 Oct 2020 08:42:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=jliMwvFbMuf3FmeyCOZHebsGYCHgE565UHogT5/5F4c=; b=DTRV++Wj97wRkgJERXq0rJLt5u61M6aqsGpPrrOnjKGZx0REQwXzkR/pMuc8yZvrEZ g2R1TVm26ePxCZVC0YEei38ODl21B1c3cWcMr2+PJorWGXwMP6J5U0Ntm+10TM2p6tJV CpCTQDAOD8oVls4YRHUrINL85+YtP9RuBxOGPHozp/ye9UomJjfrAgkI4rC1viw6jBG1 u1uT9ybUrxa3TuQUNEFsK7bR9VjHCl2kWaOmTzJSlRJDGUptBLq263qR0rJJEHAyP3Aj vpPFDPfu3rWEXImVRC/Ipfyq5ldHGwmYoQ/ppzDNpXCJDsezNiAo0JKRBtZ5i7/I6ZB9 zmgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=jliMwvFbMuf3FmeyCOZHebsGYCHgE565UHogT5/5F4c=; b=RyhSU6oXK0beVfuyBvd7HSr3THfFMowOFhFCktVt2dCZjvBlMz3QxvC9lSxNFOi6yV ccV6teh//8MgH5GhtKWV9mwKQGw7Q8wfdsb32I52ED2e7iSJu9TqFQTOemQ5rRWFJtao 2DX2BJqNp+B9ifWZVtGwbCPARvPldkyxmPFQp04XT023at7jRQfCddnVfTUBt1TVBDB8 XopKu/SCYm8ibea6ljQV0bIBxjQNltA5Q99AzWJNmY1YJ9cWwj/bPgI63cu0Y+MSm4IQ 1A9uWPPnf5RwyE00sFYxePYE27BLZdc0ixnQ6gCFDqO6gi2qk2fx/AeKGc30pcreuA6O QcEQ== X-Gm-Message-State: AOAM530bGgAWP78S/zdmZIaNVAOpPBw4No2wpxPgiYhddyMDkMEK+XIR Zy285hTBihhZJo8kyp2iDGS0X/Rbp9snWGmfzIsYeQ== X-Received: by 2002:aca:6206:: with SMTP id w6mr2138653oib.121.1604072528251; Fri, 30 Oct 2020 08:42:08 -0700 (PDT) MIME-Version: 1.0 References: <20201029131649.182037-1-elver@google.com> <20201029131649.182037-5-elver@google.com> In-Reply-To: From: Marco Elver Date: Fri, 30 Oct 2020 16:41:56 +0100 Message-ID: Subject: Re: [PATCH v6 4/9] mm, kfence: insert KFENCE hooks for SLAB To: Jann Horn Cc: Andrew Morton , Alexander Potapenko , "H . Peter Anvin" , "Paul E . McKenney" , Andrey Konovalov , Andrey Ryabinin , Andy Lutomirski , Borislav Petkov , Catalin Marinas , Christoph Lameter , Dave Hansen , David Rientjes , Dmitry Vyukov , Eric Dumazet , Greg Kroah-Hartman , Hillf Danton , Ingo Molnar , Jonathan Cameron , Jonathan Corbet , Joonsoo Kim , =?UTF-8?Q?J=C3=B6rn_Engel?= , Kees Cook , Mark Rutland , Pekka Enberg , Peter Zijlstra , SeongJae Park , Thomas Gleixner , Vlastimil Babka , Will Deacon , "the arch/x86 maintainers" , "open list:DOCUMENTATION" , kernel list , kasan-dev , Linux ARM , Linux-MM Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 30 Oct 2020 at 03:49, Jann Horn wrote: > On Thu, Oct 29, 2020 at 2:17 PM Marco Elver wrote: > > Inserts KFENCE hooks into the SLAB allocator. > [...] > > diff --git a/mm/slab.c b/mm/slab.c > [...] > > @@ -3416,6 +3427,11 @@ static void cache_flusharray(struct kmem_cache *cachep, struct array_cache *ac) > > static __always_inline void __cache_free(struct kmem_cache *cachep, void *objp, > > unsigned long caller) > > { > > + if (kfence_free(objp)) { > > + kmemleak_free_recursive(objp, cachep->flags); > > + return; > > + } > > This looks dodgy. Normally kmemleak is told that an object is being > freed *before* the object is actually released. I think that if this > races really badly, we'll make kmemleak stumble over this bit in > create_object(): > > kmemleak_stop("Cannot insert 0x%lx into the object search tree > (overlaps existing)\n", > ptr); Good catch. Although extremely unlikely, let's just avoid it by moving the freeing after. > > > + > > /* Put the object into the quarantine, don't touch it for now. */ > > if (kasan_slab_free(cachep, objp, _RET_IP_)) > > return;