Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp4348709pxb; Tue, 10 Nov 2020 14:15:26 -0800 (PST) X-Google-Smtp-Source: ABdhPJwkOd+Q9405+EYF3KO16cH6LEdY+mXNjSzXX3fixnBvRDVKAmOL6jsmd9VIvFE6lc3roAJP X-Received: by 2002:aa7:cb4c:: with SMTP id w12mr1637669edt.309.1605046526118; Tue, 10 Nov 2020 14:15:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605046526; cv=none; d=google.com; s=arc-20160816; b=u7yl+rAfiUnLU6CIw9A5T7e85P0+pNAk0s9KIJ1Let/0It6QRJ8LVm5S2oaO4cc1jN z+Bzq12oLpreCe+XTfYTIVFMGPm49R/56nB0OPXTySiYf1mTmHkZO2MP8ov3n+gojDBB 4h2Tspj/izUwlSXdu4DtXQjoGrEtD97Bi4/j7diAQ0azZ9mlKb9gk9Jx3IyQtaPlkKlb sWzpI19cTQgIBvym9skDIGmzMowMU0CtZ8KI9/RuBkG69QTLsJTGj7BU6KutsY1H5obF ZWwz6YDuxvAiWitTx8KHeGiuaWv7+Jt4HZTNLm6QLkEQpkSW8P3p0YEYs1YEQVbMQTYa TXzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:sender:dkim-signature; bh=0igi5mwDUPYOEUY4z2Y7rTzwQQPhibQBSH9sfTyI6b4=; b=kYjXPzOQeUclTakap2taU98L/9GrReNfYObmamaR0ZTctCimxTu8lIUdPyEUsMlkz6 sE2IgCJJqQ/MI0i4r74EbeZMPHGyI8ciydalrGhfOTm75xXifBRiB0VmQ47m+pdXvAUz FM1h93qZHTXb48egFr4LjmKep3HRIP83KHJ93j2d2zhDYUeWVQ8YX18Ldup0mjSqCnoL vfsNWziLvYy00yEeFlV1fgbXMER54XQwgUN38xNCnFQSPIsaxF06bH9iYOk4DGacsgih U4Gi9jPJsg1rXauj3CSDs7cl37a0I+YbqX7KdM8gDnoNNzINQUXIEjfkrQBVNiXCIgVY 4xRA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=UWk6LAWe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n15si50476edy.559.2020.11.10.14.15.02; Tue, 10 Nov 2020 14:15:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=UWk6LAWe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732987AbgKJWMs (ORCPT + 99 others); Tue, 10 Nov 2020 17:12:48 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48614 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733015AbgKJWMq (ORCPT ); Tue, 10 Nov 2020 17:12:46 -0500 Received: from mail-wm1-x34a.google.com (mail-wm1-x34a.google.com [IPv6:2a00:1450:4864:20::34a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 73534C0613D3 for ; Tue, 10 Nov 2020 14:12:46 -0800 (PST) Received: by mail-wm1-x34a.google.com with SMTP id 3so1850829wms.9 for ; Tue, 10 Nov 2020 14:12:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:in-reply-to:message-id:mime-version:references:subject :from:to:cc; bh=0igi5mwDUPYOEUY4z2Y7rTzwQQPhibQBSH9sfTyI6b4=; b=UWk6LAWeGFkQTbLeu5MF3njEi+IsR3rs3PtQ8Nz6cwJd1GrW2/HwnrxkbVw9AAgBM6 53g0sddrYjm+FLNVYr7C2Azf1xQwcTUOTnSNaJs/etzDEmT5M2usLzz8ZHKPwdiDFkN6 Mf7WTS3kLX348CvFVwBXvVeANYPbedt4XMXy78wmQppw/mzGIat4P5Em1dB8S1P+cLNU OxsTcCm/oMEXX/+tYTObnu32qyh9VOGh+gpfL1eAS9BTc02uX2Hp5zm8+St5ITczpCdj raesKjD67M8N5eUGqMe3XGZkmU39iwwmigL6/VAp2c0azReWaDkzMK7oVN6FdJMUbxqD 8yfg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=0igi5mwDUPYOEUY4z2Y7rTzwQQPhibQBSH9sfTyI6b4=; b=I6dgFFAHIn8B60LBdUCLwMuUdPBnn0n/rIVzSgHwWB6/6LpccQwtfUtqrImHsRShRo PKgRMeDSKdH2zkR+hY3EGJ63RWms7cWcn9NOQZR6s8rrDWrTLeq3kuHeU5WwM8V5nLfB o8uDBQ0YOSnaQ9RBiwtTcWE+OURf21ZNibBmCnPcO4Z3adUMHnz0AQXWh7lYet0LuYqn 0zFkfsQKp6YVCOgGYnBJnz0P1Fp1FCcIDOlgnc6LM2tC2pbVxlzyJDW/Z41GA+TRNgif q/XZiQeF5jvh+VeyHFJJVLlKgT5EtPzaJ3y3GFsS6R0cY/1mTSye0ZaYaFLGPDQ/Lh++ 9qEQ== X-Gm-Message-State: AOAM533HMwD9Or0uD0CZh5oiJ/IoOx67VRaw/njiN1QYYQyTWQvyoy4F AK6Cis+cGsOfbTz02Ei0CkxkTy0EkRl8Dq9Q Sender: "andreyknvl via sendgmr" X-Received: from andreyknvl3.muc.corp.google.com ([2a00:79e0:15:13:7220:84ff:fe09:7e9d]) (user=andreyknvl job=sendgmr) by 2002:a1c:8095:: with SMTP id b143mr230260wmd.147.1605046365189; Tue, 10 Nov 2020 14:12:45 -0800 (PST) Date: Tue, 10 Nov 2020 23:10:38 +0100 In-Reply-To: Message-Id: Mime-Version: 1.0 References: X-Mailer: git-send-email 2.29.2.222.g5d2a92d10f8-goog Subject: [PATCH v9 41/44] kasan, mm: reset tags when accessing metadata From: Andrey Konovalov To: Catalin Marinas Cc: Will Deacon , Vincenzo Frascino , Dmitry Vyukov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Evgenii Stepanov , Branislav Rankov , Kevin Brodsky , Andrew Morton , kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrey Konovalov Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Kernel allocator code accesses metadata for slab objects, that may lie out-of-bounds of the object itself, or be accessed when an object is freed. Such accesses trigger tag faults and lead to false-positive reports with hardware tag-based KASAN. Software KASAN modes disable instrumentation for allocator code via KASAN_SANITIZE Makefile macro, and rely on kasan_enable/disable_current() annotations which are used to ignore KASAN reports. With hardware tag-based KASAN neither of those options are available, as it doesn't use compiler instrumetation, no tag faults are ignored, and MTE is disabled after the first one. Instead, reset tags when accessing metadata (currently only for SLUB). Signed-off-by: Andrey Konovalov Signed-off-by: Vincenzo Frascino Acked-by: Marco Elver --- Change-Id: I39f3c4d4f29299d4fbbda039bedf230db1c746fb --- mm/page_alloc.c | 4 +++- mm/page_poison.c | 2 +- mm/slub.c | 29 ++++++++++++++++------------- 3 files changed, 20 insertions(+), 15 deletions(-) diff --git a/mm/page_alloc.c b/mm/page_alloc.c index 24b45261e2bd..f1648aee8d88 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -1195,8 +1195,10 @@ static void kernel_init_free_pages(struct page *page, int numpages) /* s390's use of memset() could override KASAN redzones. */ kasan_disable_current(); - for (i = 0; i < numpages; i++) + for (i = 0; i < numpages; i++) { + page_kasan_tag_reset(page + i); clear_highpage(page + i); + } kasan_enable_current(); } diff --git a/mm/page_poison.c b/mm/page_poison.c index ae0482cded87..e6c994af7518 100644 --- a/mm/page_poison.c +++ b/mm/page_poison.c @@ -53,7 +53,7 @@ static void poison_page(struct page *page) /* KASAN still think the page is in-use, so skip it. */ kasan_disable_current(); - memset(addr, PAGE_POISON, PAGE_SIZE); + memset(kasan_reset_tag(addr), PAGE_POISON, PAGE_SIZE); kasan_enable_current(); kunmap_atomic(addr); } diff --git a/mm/slub.c b/mm/slub.c index b30be2385d1c..df2fd5b57df1 100644 --- a/mm/slub.c +++ b/mm/slub.c @@ -249,7 +249,7 @@ static inline void *freelist_ptr(const struct kmem_cache *s, void *ptr, { #ifdef CONFIG_SLAB_FREELIST_HARDENED /* - * When CONFIG_KASAN_SW_TAGS is enabled, ptr_addr might be tagged. + * When CONFIG_KASAN_SW/HW_TAGS is enabled, ptr_addr might be tagged. * Normally, this doesn't cause any issues, as both set_freepointer() * and get_freepointer() are called with a pointer with the same tag. * However, there are some issues with CONFIG_SLUB_DEBUG code. For @@ -275,6 +275,7 @@ static inline void *freelist_dereference(const struct kmem_cache *s, static inline void *get_freepointer(struct kmem_cache *s, void *object) { + object = kasan_reset_tag(object); return freelist_dereference(s, object + s->offset); } @@ -304,6 +305,7 @@ static inline void set_freepointer(struct kmem_cache *s, void *object, void *fp) BUG_ON(object == fp); /* naive detection of double free or corruption */ #endif + freeptr_addr = (unsigned long)kasan_reset_tag((void *)freeptr_addr); *(void **)freeptr_addr = freelist_ptr(s, fp, freeptr_addr); } @@ -538,8 +540,8 @@ static void print_section(char *level, char *text, u8 *addr, unsigned int length) { metadata_access_enable(); - print_hex_dump(level, text, DUMP_PREFIX_ADDRESS, 16, 1, addr, - length, 1); + print_hex_dump(level, kasan_reset_tag(text), DUMP_PREFIX_ADDRESS, + 16, 1, addr, length, 1); metadata_access_disable(); } @@ -570,7 +572,7 @@ static struct track *get_track(struct kmem_cache *s, void *object, p = object + get_info_end(s); - return p + alloc; + return kasan_reset_tag(p + alloc); } static void set_track(struct kmem_cache *s, void *object, @@ -583,7 +585,8 @@ static void set_track(struct kmem_cache *s, void *object, unsigned int nr_entries; metadata_access_enable(); - nr_entries = stack_trace_save(p->addrs, TRACK_ADDRS_COUNT, 3); + nr_entries = stack_trace_save(kasan_reset_tag(p->addrs), + TRACK_ADDRS_COUNT, 3); metadata_access_disable(); if (nr_entries < TRACK_ADDRS_COUNT) @@ -747,7 +750,7 @@ static __printf(3, 4) void slab_err(struct kmem_cache *s, struct page *page, static void init_object(struct kmem_cache *s, void *object, u8 val) { - u8 *p = object; + u8 *p = kasan_reset_tag(object); if (s->flags & SLAB_RED_ZONE) memset(p - s->red_left_pad, val, s->red_left_pad); @@ -777,7 +780,7 @@ static int check_bytes_and_report(struct kmem_cache *s, struct page *page, u8 *addr = page_address(page); metadata_access_enable(); - fault = memchr_inv(start, value, bytes); + fault = memchr_inv(kasan_reset_tag(start), value, bytes); metadata_access_disable(); if (!fault) return 1; @@ -873,7 +876,7 @@ static int slab_pad_check(struct kmem_cache *s, struct page *page) pad = end - remainder; metadata_access_enable(); - fault = memchr_inv(pad, POISON_INUSE, remainder); + fault = memchr_inv(kasan_reset_tag(pad), POISON_INUSE, remainder); metadata_access_disable(); if (!fault) return 1; @@ -1118,7 +1121,7 @@ void setup_page_debug(struct kmem_cache *s, struct page *page, void *addr) return; metadata_access_enable(); - memset(addr, POISON_INUSE, page_size(page)); + memset(kasan_reset_tag(addr), POISON_INUSE, page_size(page)); metadata_access_disable(); } @@ -1566,10 +1569,10 @@ static inline bool slab_free_freelist_hook(struct kmem_cache *s, * Clear the object and the metadata, but don't touch * the redzone. */ - memset(object, 0, s->object_size); + memset(kasan_reset_tag(object), 0, s->object_size); rsize = (s->flags & SLAB_RED_ZONE) ? s->red_left_pad : 0; - memset((char *)object + s->inuse, 0, + memset((char *)kasan_reset_tag(object) + s->inuse, 0, s->size - s->inuse - rsize); } @@ -2883,10 +2886,10 @@ static __always_inline void *slab_alloc_node(struct kmem_cache *s, stat(s, ALLOC_FASTPATH); } - maybe_wipe_obj_freeptr(s, object); + maybe_wipe_obj_freeptr(s, kasan_reset_tag(object)); if (unlikely(slab_want_init_on_alloc(gfpflags, s)) && object) - memset(object, 0, s->object_size); + memset(kasan_reset_tag(object), 0, s->object_size); slab_post_alloc_hook(s, objcg, gfpflags, 1, &object); -- 2.29.2.222.g5d2a92d10f8-goog