Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp413980pxb; Thu, 23 Sep 2021 02:58:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxVg31YfcTwwC6GFJej4PxD/C0xCbcxD7SJFg3Olvbi44MAbXSIWM5Y/VoDnu+vsA8xzPPj X-Received: by 2002:a50:d989:: with SMTP id w9mr4437268edj.99.1632391129019; Thu, 23 Sep 2021 02:58:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632391129; cv=none; d=google.com; s=arc-20160816; b=TbzZXsDS5CUL1Puj0AzH1YJ4hoAOTaKLkLa/noG0owFdqH68HXmJSQ2V5f3j8Axh7N yt7guFglzCsHbl9eVjk1VMnBBQVFmJphwsK3w3pmE7gvgYRygDnsVMDRwXGbfCKX//IO +iV9oTXYXb/OZu04qBPU0arJHHsVM3+0+A5Q8aVg+rRwdZpFLKAvq66C9Diu5S/KBuJ7 x3PtMlcPeJyA8W4EdCp7lnk8wZgDhJ872w6lQSM6EdODFRdv9PrrnHnzBwdchb9SeNl0 5luP3KOxRGQHC5j6vEIL+eZFsDJxs01NYnaoheWL/gAuPlRVFLIXirhroEMvp5VwA67/ 5v+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=ZIgh4qWe3i75pOeOBO5NXCp1UjHZYpV0UxwwwVfQKHA=; b=gQNyHcAMp7mvihBaZmnbQ/iBNFgRQuHIWgHWN4u7NQbnZ8sdE3HTDtBO/gWsp58+GQ fTiF0BGOulsb2TM8oi833sV9mgiG58QpgxzHA9VXNvpyJQfMc2EIZy+VyMTKZH9jlwgn habxsAqj1YC6jqaQbXFoUhNiFoElZbqpJLV2z3O8yMvQ0w4kjIJsRhl4KbTppohHuYrj cP5wO0vdYT2+0MpG7mGN5Pn1jzyTlwjQgd7E+F3yNMkL7Zizwn6jz16lbbv2oveMPwSd SHw1jL6h69FVvoXzUOKQELkrRPOpD6vgcK5T7G/xc5sUXxA/7+NdtXA9Q4OBLGua1zsU sRqw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b5si5511699edz.206.2021.09.23.02.58.24; Thu, 23 Sep 2021 02:58:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240278AbhIWJz2 (ORCPT + 99 others); Thu, 23 Sep 2021 05:55:28 -0400 Received: from mailgw02.mediatek.com ([210.61.82.184]:46536 "EHLO mailgw02.mediatek.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S240277AbhIWJz2 (ORCPT ); Thu, 23 Sep 2021 05:55:28 -0400 X-UUID: 368697881e6b494085181473db9362c9-20210923 X-UUID: 368697881e6b494085181473db9362c9-20210923 Received: from mtkexhb02.mediatek.inc [(172.21.101.103)] by mailgw02.mediatek.com (envelope-from ) (Generic MTA with TLSv1.2 ECDHE-RSA-AES256-SHA384 256/256) with ESMTP id 207152649; Thu, 23 Sep 2021 17:53:54 +0800 Received: from mtkcas11.mediatek.inc (172.21.101.40) by mtkmbs10n1.mediatek.inc (172.21.101.34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.15; Thu, 23 Sep 2021 17:53:52 +0800 Received: from mtksdccf07.mediatek.inc (172.21.84.99) by mtkcas11.mediatek.inc (172.21.101.73) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Thu, 23 Sep 2021 17:53:52 +0800 From: To: CC: , , , Yee Lee , "Matthias Brugger" , Will Deacon , "Sami Tolvanen" , "moderated list:ARM/Mediatek SoC support" , "moderated list:ARM/Mediatek SoC support" Subject: [PATCH] scs: Release kasan vmalloc poison in scs_free process Date: Thu, 23 Sep 2021 17:53:12 +0800 Message-ID: <20210923095316.13867-1-yee.lee@mediatek.com> X-Mailer: git-send-email 2.18.0 MIME-Version: 1.0 Content-Type: text/plain X-MTK: N Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yee Lee Since scs allocation has been moved to vmalloc region, the shadow stack is protected by kasan_posion_vmalloc. However, the vfree_atomic operation needs to access its context for scs_free process and causes kasan error as the dump info below. This patch Adds kasan_unpoison_vmalloc() before vfree_atomic, which aligns to the prior flow as using kmem_cache. The vmalloc region will go back posioned in the following vumap() operations. ================================================================== BUG: KASAN: vmalloc-out-of-bounds in llist_add_batch+0x60/0xd4 Write of size 8 at addr ffff8000100b9000 by task kthreadd/2 CPU: 0 PID: 2 Comm: kthreadd Not tainted 5.15.0-rc2-11681-(skip) Hardware name: linux,dummy-virt (DT) Call trace: dump_backtrace+0x0/0x43c show_stack+0x1c/0x2c dump_stack_lvl+0x68/0x84 print_address_description+0x80/0x394 kasan_report+0x180/0x1dc __asan_report_store8_noabort+0x48/0x58 llist_add_batch+0x60/0xd4 vfree_atomic+0x60/0xe0 scs_free+0x1dc/0x1fc scs_release+0xa4/0xd4 free_task+0x30/0xe4 __put_task_struct+0x1ec/0x2e0 delayed_put_task_struct+0x5c/0xa0 rcu_do_batch+0x62c/0x8a0 rcu_core+0x60c/0xc14 rcu_core_si+0x14/0x24 __do_softirq+0x19c/0x68c irq_exit+0x118/0x2dc handle_domain_irq+0xcc/0x134 gic_handle_irq+0x7c/0x1bc call_on_irq_stack+0x40/0x70 do_interrupt_handler+0x78/0x9c el1_interrupt+0x34/0x60 el1h_64_irq_handler+0x1c/0x2c el1h_64_irq+0x78/0x7c _raw_spin_unlock_irqrestore+0x40/0xcc sched_fork+0x4f0/0xb00 copy_process+0xacc/0x3648 kernel_clone+0x168/0x534 kernel_thread+0x13c/0x1b0 kthreadd+0x2bc/0x400 ret_from_fork+0x10/0x20 Memory state around the buggy address: ffff8000100b8f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffff8000100b8f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 >ffff8000100b9000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffff8000100b9080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffff8000100b9100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ================================================================== CC: Matthias Brugger CC: Will Deacon CC: Sami Tolvanen Signed-off-by: Yee Lee --- kernel/scs.c | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/scs.c b/kernel/scs.c index e2a71fc82fa0..25c0d8e416e6 100644 --- a/kernel/scs.c +++ b/kernel/scs.c @@ -68,6 +68,7 @@ void scs_free(void *s) __scs_account(s, -1); + kasan_unpoison_vmalloc(s, SCS_SIZE); /* * We cannot sleep as this can be called in interrupt context, * so use this_cpu_cmpxchg to update the cache, and vfree_atomic -- 2.18.0