Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp88656pxb; Thu, 30 Sep 2021 01:36:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzutA0LjMPPyVxWFKWUbjBsNMUOShomEYVGcIyaHpA69aGuUSUGDszqmKWpPnvYYMP5qZST X-Received: by 2002:a17:907:3e03:: with SMTP id hp3mr5161341ejc.183.1632991003005; Thu, 30 Sep 2021 01:36:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632991002; cv=none; d=google.com; s=arc-20160816; b=kSVEWo6N2utHRzRjLOdhgbWhJWFgVOAiL3DlQvZ4keU01phNuuVOEY/dpkpwUS6W1n +5RA5yk4PwJhhdWbQv0RlyluFtTcY/54PSeMIa53sV1A8AfueDr3zxtxA9fG/HX3evJH Hyd/ihOEhHLhNJfOzaAjpNXn7EfcS+M3SDLzmmhDWcAYrONM4NN+7osDyfhNPTACaQNb BfgTDED583VXOymZag5VBQHvkUSZ8hBB1AU9h6w76FERo9cnBWBx+T/Qh2dW0/3Fj9Bw 8uGst4o4h8JcLHq/bp0853geNuk+4cL0MBGq//R+A+YKL0o19v/QE9tVSxXtNwXyxWHH GciQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=s2LgaT5/kOU6uf1EL+IWYOKqMveSuSaiZXtMcl7vlcU=; b=nBkikLFI0fRrXGos+ghliLo1Gy+KQRwlok1CuZZepoTGDV0N1XeVa4XxbGw4WCOSE/ N4GhokQCBrDLkCVaCrOvCqLb29GpgsKSnHTLs2+0TGsTj+W7P2skDeS3s+rhtP+kSQ6k plA7fkrJ7nO37twoyeSNkYTyfCL2A6bzHw9OuzzZ5uwbmxNJv7hUbMGbxCSjtI5NiTdn DihenFwpnxFAaz88A/zYnKEqp2t7W9M0NdUUULb2wnyGAmhbaPQyYw0XDT+W8ilh3vTb bzoMq6Qn0TOs5RUv9exNmVofOhVXLjUcX8wklfb6j39u6+HnyhGt6S+ZFXSLTUnQsUTz 3l1w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gn9si3080702ejc.550.2021.09.30.01.36.17; Thu, 30 Sep 2021 01:36:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1349049AbhI3IS3 (ORCPT + 99 others); Thu, 30 Sep 2021 04:18:29 -0400 Received: from mailgw02.mediatek.com ([210.61.82.184]:58372 "EHLO mailgw02.mediatek.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1348949AbhI3IS3 (ORCPT ); Thu, 30 Sep 2021 04:18:29 -0400 X-UUID: 6b3bd2535f0d435696d546ea4c954c89-20210930 X-UUID: 6b3bd2535f0d435696d546ea4c954c89-20210930 Received: from mtkmbs10n1.mediatek.inc [(172.21.101.34)] by mailgw02.mediatek.com (envelope-from ) (Generic MTA with TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384 256/256) with ESMTP id 1680673413; Thu, 30 Sep 2021 16:16:44 +0800 Received: from mtkcas07.mediatek.inc (172.21.101.84) by mtkmbs10n2.mediatek.inc (172.21.101.183) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Thu, 30 Sep 2021 16:16:42 +0800 Received: from mtksdccf07.mediatek.inc (172.21.84.99) by mtkcas07.mediatek.inc (172.21.101.73) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Thu, 30 Sep 2021 16:16:42 +0800 From: To: CC: , , , Yee Lee , "Matthias Brugger" , Will Deacon , "Sami Tolvanen" , "moderated list:ARM/Mediatek SoC support" , "moderated list:ARM/Mediatek SoC support" Subject: [PATCH v2] scs: Release kasan vmalloc poison in scs_free process Date: Thu, 30 Sep 2021 16:16:13 +0800 Message-ID: <20210930081619.30091-1-yee.lee@mediatek.com> X-Mailer: git-send-email 2.18.0 MIME-Version: 1.0 Content-Type: text/plain X-MTK: N Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yee Lee Since scs allocation is moved to vmalloc region, the shadow stack is protected by kasan_posion_vmalloc. However, the vfree_atomic operation needs to access its context for scs_free process and causes kasan error as the dump info below. This patch Adds kasan_unpoison_vmalloc() before vfree_atomic, which aligns to the prior flow as using kmem_cache. The vmalloc region will go back posioned in the following vumap() operations. ================================================================== BUG: KASAN: vmalloc-out-of-bounds in llist_add_batch+0x60/0xd4 Write of size 8 at addr ffff8000100b9000 by task kthreadd/2 CPU: 0 PID: 2 Comm: kthreadd Not tainted 5.15.0-rc2-11681-g92477dd1faa6-dirty #1 Hardware name: linux,dummy-virt (DT) Call trace: dump_backtrace+0x0/0x43c show_stack+0x1c/0x2c dump_stack_lvl+0x68/0x84 print_address_description+0x80/0x394 kasan_report+0x180/0x1dc __asan_report_store8_noabort+0x48/0x58 llist_add_batch+0x60/0xd4 vfree_atomic+0x60/0xe0 scs_free+0x1dc/0x1fc scs_release+0xa4/0xd4 free_task+0x30/0xe4 __put_task_struct+0x1ec/0x2e0 delayed_put_task_struct+0x5c/0xa0 rcu_do_batch+0x62c/0x8a0 rcu_core+0x60c/0xc14 rcu_core_si+0x14/0x24 __do_softirq+0x19c/0x68c irq_exit+0x118/0x2dc handle_domain_irq+0xcc/0x134 gic_handle_irq+0x7c/0x1bc call_on_irq_stack+0x40/0x70 do_interrupt_handler+0x78/0x9c el1_interrupt+0x34/0x60 el1h_64_irq_handler+0x1c/0x2c el1h_64_irq+0x78/0x7c _raw_spin_unlock_irqrestore+0x40/0xcc sched_fork+0x4f0/0xb00 copy_process+0xacc/0x3648 kernel_clone+0x168/0x534 kernel_thread+0x13c/0x1b0 kthreadd+0x2bc/0x400 ret_from_fork+0x10/0x20 Memory state around the buggy address: ffff8000100b8f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffff8000100b8f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 >ffff8000100b9000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffff8000100b9080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffff8000100b9100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ================================================================== Suggested-by: Kuan-Ying Lee Reviewd-by: Will Deacon Reviewd-by: Sami Tolvanen Signed-off-by: Yee Lee --- v2: - changed the unpoison call to be followed by vfree_atomic --- kernel/scs.c | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/scs.c b/kernel/scs.c index e2a71fc82fa0..579841be8864 100644 --- a/kernel/scs.c +++ b/kernel/scs.c @@ -78,6 +78,7 @@ void scs_free(void *s) if (this_cpu_cmpxchg(scs_cache[i], 0, s) == NULL) return; + kasan_unpoison_vmalloc(s, SCS_SIZE); vfree_atomic(s); } -- 2.18.0