Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp125513pxv; Thu, 24 Jun 2021 04:28:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyTr3t2z5rgR1RX46ZcC+xRPqJ+Re8o/t7CbIrSGtKmdUuvnzQQ4j02UvMQD1Ny99i7sM/j X-Received: by 2002:a05:6402:176f:: with SMTP id da15mr6348832edb.334.1624534107239; Thu, 24 Jun 2021 04:28:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624534107; cv=none; d=google.com; s=arc-20160816; b=fnqucF1SQNAquIPdEMbUkm6PpV90QUOYcTvvjwsj68QagivCZgVIMrzl4XMtV1d7I2 FqQyIxz8B4sUiBxQmZhG0E92TaVqvc61J9UFfPVrxFLpgte8sJ+pxuznC0wCk8dDzVg/ I0saQK/2Ww25SqTVUvKorQCnPNtvCXjlHvmiv9qq82hYaFFs4/sSZ6wFZPGIxv8nDCzv zh5/6TfZjPZEG8sAecqnQCEJLSpZJMj+L2wnZfHVDmyBkrm6GX1014g2gG+th8W3HCT3 iOpgjNK6S8AiSsNXNG7EVqgCORi2o2NKW3S2yw77OuScpl4rAIrmVNfrO1+m+98AJHOZ Zv1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=LqO86/L2SZVOotrOOINBTDmZjeXook4jMNlRWBO1lFc=; b=ss27yj68FNYqazdx+R5Gy68S4Mg7uhW2K9Drxe/2AIevyTnfZyQ69KUZWbJgODJ1WG imABh8ZPEzLAueJoD2HcjzJuMR8T6Ct9qnT7R+jwRKsZbQHm7P/N9uyymrQvUkH1e3Pk gUTLaIyC6lrtqT/KRxssvnPdoti1FLxSZoM2QZiJz0BErOLOZFK4JeohGWehip12hR4p JS5mWYXWKggCeTZs77cj5oqQhDygC2lVFFfIIOz7Z0H6v2VYFQuAyOaz06tVYQTFdnn+ zyGOPBTkQHq6fNbwA4YpVnVhvLsoaCtFjoD4WH4ABLExupYOHNSq+2n46C+S3nCZ1R8F cONA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id lz19si3331147ejb.86.2021.06.24.04.28.04; Thu, 24 Jun 2021 04:28:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232395AbhFXL3R (ORCPT + 99 others); Thu, 24 Jun 2021 07:29:17 -0400 Received: from mailgw02.mediatek.com ([210.61.82.184]:50802 "EHLO mailgw02.mediatek.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S232274AbhFXL3Q (ORCPT ); Thu, 24 Jun 2021 07:29:16 -0400 X-UUID: 0ce6463091c0444ab97f96ae2ebd7c3d-20210624 X-UUID: 0ce6463091c0444ab97f96ae2ebd7c3d-20210624 Received: from mtkcas07.mediatek.inc [(172.21.101.84)] by mailgw02.mediatek.com (envelope-from ) (Generic MTA with TLSv1.2 ECDHE-RSA-AES256-SHA384 256/256) with ESMTP id 967540757; Thu, 24 Jun 2021 19:26:54 +0800 Received: from mtkcas10.mediatek.inc (172.21.101.39) by mtkmbs01n1.mediatek.inc (172.21.101.68) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 24 Jun 2021 19:26:53 +0800 Received: from mtksdccf07.mediatek.inc (172.21.84.99) by mtkcas10.mediatek.inc (172.21.101.73) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Thu, 24 Jun 2021 19:26:53 +0800 From: To: CC: , Yee Lee , Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , Andrew Morton , Matthias Brugger , "open list:KASAN" , "open list:MEMORY MANAGEMENT" , open list , "moderated list:ARM/Mediatek SoC support" , "moderated list:ARM/Mediatek SoC support" Subject: [PATCH v2 1/1] kasan: Add memzero init for unaligned size under SLUB debug Date: Thu, 24 Jun 2021 19:26:21 +0800 Message-ID: <20210624112624.31215-2-yee.lee@mediatek.com> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20210624112624.31215-1-yee.lee@mediatek.com> References: <20210624112624.31215-1-yee.lee@mediatek.com> MIME-Version: 1.0 Content-Type: text/plain X-MTK: N Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yee Lee Issue: when SLUB debug is on, hwtag kasan_unpoison() would overwrite the redzone of object with unaligned size. An additional memzero_explicit() path is added to replacing init by hwtag instruction for those unaligned size at SLUB debug mode. Signed-off-by: Yee Lee --- mm/kasan/kasan.h | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h index 8f450bc28045..d1054f35838f 100644 --- a/mm/kasan/kasan.h +++ b/mm/kasan/kasan.h @@ -387,6 +387,12 @@ static inline void kasan_unpoison(const void *addr, size_t size, bool init) if (WARN_ON((unsigned long)addr & KASAN_GRANULE_MASK)) return; +#if IS_ENABLED(CONFIG_SLUB_DEBUG) + if (init && ((unsigned long)size & KASAN_GRANULE_MASK)) { + init = false; + memzero_explicit((void *)addr, size); + } +#endif size = round_up(size, KASAN_GRANULE_SIZE); hw_set_mem_tag_range((void *)addr, size, tag, init); -- 2.18.0