Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp254768pxb; Thu, 21 Apr 2022 23:18:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxX8B96IIhMv64E7B129wHrpho9luqn/d2LTDKIs/iG+R0XdQuUEpTniK0EiClDX5FOnJek X-Received: by 2002:a17:906:c110:b0:6e0:dc2a:3393 with SMTP id do16-20020a170906c11000b006e0dc2a3393mr2708771ejc.512.1650608335442; Thu, 21 Apr 2022 23:18:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650608335; cv=none; d=google.com; s=arc-20160816; b=SbKcO7kC9Q/+8pBXMYXtXpoHoe6dXlEo3vNMCXbpfQsMHV88qEi/bNnCOutn69NIPH a8sfA1wZmIAIU6Jm/+XJqnCOJGSfQFmF4IRyqjqflOBQpentJsDFVw7aus3O0g4xeeDN WmCbUWyOyQes49vhnw1gVmZNCIMYzWYm2eJvnX3BHWzxRIBkgLMOoAmafS9gasm0sny9 eFd73SyWEcvNFcGjqzQHokpe0hgPYFVe49lCn75JzplPW3HDoiuXIRUDH2wbPYkkXw7A oGdyeJPpf6+ZcmUrjxqMl5/36qfsGjdEldATXr4PG5A0FCK35Q+eT4XEJhct2Zs3zaeo cwvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=7zUWPWWo8GJ5khQhpR8YhqRSb3sgz3Aij45XsEKxXpI=; b=H/rfhAeMMny7crUJZ5leoRY2HCQpZeszQ/+S0zQ9NWuSZZ1oHJNoz2no1+eZeAzLzp 8egfawBZ8KRZQbrrDVTVxWoliJl1gDkME1DYkOfftQMsXEHZq5GfoKZZ1ZR+pNLmw5Te nN3AjWVAUO5c2yNYDNAuT5zZqE5C9YmJpx1bU4VcPRKXHdnIq+et8SgNGMgY+dNkiJ2U ClRl3Z89ZPbXrBFWYqbi9be9rTR4G1djW9J4LWC3QLzp2NXL6AdnddUJcii1veDRqsbE J6XwLrww6vSTtyMuztwHg3ErwCOtjbY232e5nB7tqU11UlYpPaKJ0HkDYsau3DUexY0E oBbQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b16-20020a0564021f1000b0041d850844f5si5390524edb.262.2022.04.21.23.18.32; Thu, 21 Apr 2022 23:18:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1377817AbiDTKxX (ORCPT + 99 others); Wed, 20 Apr 2022 06:53:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53494 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1377248AbiDTKxT (ORCPT ); Wed, 20 Apr 2022 06:53:19 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 21AF426120 for ; Wed, 20 Apr 2022 03:50:33 -0700 (PDT) Received: from kwepemi100011.china.huawei.com (unknown [172.30.72.55]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4Kjy7N1D3NzFq0Q; Wed, 20 Apr 2022 18:48:00 +0800 (CST) Received: from kwepemm600020.china.huawei.com (7.193.23.147) by kwepemi100011.china.huawei.com (7.221.188.134) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Wed, 20 Apr 2022 18:50:30 +0800 Received: from DESKTOP-E0KHRBE.china.huawei.com (10.67.111.5) by kwepemm600020.china.huawei.com (7.193.23.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Wed, 20 Apr 2022 18:50:30 +0800 From: Shaobo Huang To: , , , , , , CC: , , , , , , , Subject: [PATCH] kfence: check kfence canary in panic and reboot Date: Wed, 20 Apr 2022 18:49:27 +0800 Message-ID: <20220420104927.59056-1-huangshaobo6@huawei.com> X-Mailer: git-send-email 2.21.0.windows.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.67.111.5] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To kwepemm600020.china.huawei.com (7.193.23.147) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: huangshaobo when writing out of bounds to the red zone, it can only be detected at kfree. However, there were many scenarios before kfree that caused this out-of-bounds write to not be detected. Therefore, it is necessary to provide a method for actively detecting out-of-bounds writing to the red zone, so that users can actively detect, and can be detected in the system reboot or panic. for example, if the application memory is out of bounds and written to the red zone in the kfence object, the system suddenly panics, and the following log can be seen during system reset: BUG: KFENCE: memory corruption in atomic_notifier_call_chain+0x49/0x70 Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#59): atomic_notifier_call_chain+0x49/0x70 panic+0x134/0x278 sysrq_handle_crash+0x11/0x20 __handle_sysrq+0x99/0x160 write_sysrq_trigger+0x26/0x30 proc_reg_write+0x51/0x70 vfs_write+0xb6/0x290 ksys_write+0x9c/0xd0 __do_fast_syscall_32+0x67/0xe0 do_fast_syscall_32+0x2f/0x70 entry_SYSCALL_compat_after_hwframe+0x45/0x4d kfence-#59: 0x(____ptrval____)-0x(____ptrval____),size=100,cache=kmalloc-128 allocated by task 77 on cpu 0 at 28.018073s: 0xffffffffc007703d do_one_initcall+0x3c/0x1e0 do_init_module+0x46/0x1d8 load_module+0x2397/0x2860 __do_sys_init_module+0x160/0x190 __do_fast_syscall_32+0x67/0xe0 do_fast_syscall_32+0x2f/0x70 entry_SYSCALL_compat_after_hwframe+0x45/0x4d Suggested-by: chenzefeng Signed-off-by: huangshaobo --- mm/kfence/core.c | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) diff --git a/mm/kfence/core.c b/mm/kfence/core.c index 9b2b5f56f4ae..85cc3ca4b71c 100644 --- a/mm/kfence/core.c +++ b/mm/kfence/core.c @@ -29,6 +29,9 @@ #include #include #include +#include +#include +#include #include @@ -716,6 +719,29 @@ static const struct file_operations objects_fops = { .release = seq_release, }; +static void kfence_check_all_canary(void) +{ + int i; + + for (i = 0; i < CONFIG_KFENCE_NUM_OBJECTS; i++) { + struct kfence_metadata *meta = &kfence_metadata[i]; + + if (meta->state == KFENCE_OBJECT_ALLOCATED) + for_each_canary(meta, check_canary_byte); + } +} + +static int kfence_check_canary_callback(struct notifier_block *nb, + unsigned long reason, void *arg) +{ + kfence_check_all_canary(); + return NOTIFY_OK; +} + +static struct notifier_block kfence_check_canary_notifier = { + .notifier_call = kfence_check_canary_callback, +}; + static int __init kfence_debugfs_init(void) { struct dentry *kfence_dir = debugfs_create_dir("kfence", NULL); @@ -806,6 +832,8 @@ static void kfence_init_enable(void) WRITE_ONCE(kfence_enabled, true); queue_delayed_work(system_unbound_wq, &kfence_timer, 0); + register_reboot_notifier(&kfence_check_canary_notifier); + atomic_notifier_chain_register(&panic_notifier_list, &kfence_check_canary_notifier); pr_info("initialized - using %lu bytes for %d objects at 0x%p-0x%p\n", KFENCE_POOL_SIZE, CONFIG_KFENCE_NUM_OBJECTS, (void *)__kfence_pool, -- 2.12.3