Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6F886C64EC7 for ; Mon, 13 Feb 2023 20:10:54 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230026AbjBMUKx (ORCPT ); Mon, 13 Feb 2023 15:10:53 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46496 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229925AbjBMUKv (ORCPT ); Mon, 13 Feb 2023 15:10:51 -0500 Received: from mail-ed1-x549.google.com (mail-ed1-x549.google.com [IPv6:2a00:1450:4864:20::549]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 17C5D1E2B0 for ; Mon, 13 Feb 2023 12:10:49 -0800 (PST) Received: by mail-ed1-x549.google.com with SMTP id bq13-20020a056402214d00b004a25d8d7593so8300246edb.0 for ; Mon, 13 Feb 2023 12:10:49 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=H/B0iwxSfZGzTMto/wFUe2mHRnomv/i3ZrRWf1XIjx4=; b=nPgGXYua3QHijtL47+4sZehgs2YZ50vVDnE79BFMT2Nn3zhSJFDjy3hKgjuREuIaba xFxnoC55wwn+W29AEm5DPQCYPqlcGfsrzMNF7j6OSG/UflSXkJFc3qSzhZmqQ/eC6LvC mi37umZfjpxdVWia4v6tTxmf0W1evKcUzl0yR/+wk1q99aUOCxuQ5uSdsNhaSRGzAEn1 c6wnTa6TgStYDW+Eq8Izevyj9RyqxNSN3gSvf7BAuTom4orRwusw1+uwtym5GXVJaS6g 7xtleAGKG+pkbznmI7BzYKCqPpo/+ztobe3x4JMCvUNWih0iH1ITs8GSh37bOQA1dsAc bzNA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=H/B0iwxSfZGzTMto/wFUe2mHRnomv/i3ZrRWf1XIjx4=; b=IfEx//VnizItZ5p0fBryyW8iga22yD4E3wHHw7ucCuCoQrdzCjUII1iJVVd+7eedEc E2FXBN2feIDPffDafLctMCwZbSZzMlv74L5aFUq64Oc3x2uSj9jC9FbBNqDQjsb3U0Ok p7AqxNSL8C4ylVlage6UjGTMUebEHcfuAIOQz6P4Uf4hVh1NZVIrUcfhsayncxYr3wCN Opj/4lum0TKBNjZnErJKCSFx+rU/wCQacdvrLfsqaxKuW5mo7Wb/xm++pX3YUSzUiNO7 IqO4shoNJGtLcYvpoilJAywI/Piu1Yu6mdVGJV4q697Su41Llqu2h/6Zu6KCdJqQABnt eHCw== X-Gm-Message-State: AO0yUKUl/PhGMi+AgVof1VOT2inW6ipdR/eCFPMJt20zKd7glKtt08M4 61yaqSj2X701Y8TUQwUKfiAoka24zA== X-Google-Smtp-Source: AK7set+RgO+60b8zpnHHhXW/ujdzYUizsadRV8jk/rz/KTazF6oRv7tkA3prs7UoIFTOhCO8DovLDpoubw== X-Received: from elver.muc.corp.google.com ([2a00:79e0:9c:201:6cba:3834:3b50:a0b2]) (user=elver job=sendgmr) by 2002:a17:906:5a62:b0:877:7480:c75d with SMTP id my34-20020a1709065a6200b008777480c75dmr112334ejc.0.1676319047593; Mon, 13 Feb 2023 12:10:47 -0800 (PST) Date: Mon, 13 Feb 2023 21:10:40 +0100 Mime-Version: 1.0 X-Mailer: git-send-email 2.39.1.581.gbfd45094c4-goog Message-ID: <20230213201040.1493405-1-elver@google.com> Subject: [PATCH -tip v2] kasan: Emit different calls for instrumentable memintrinsics From: Marco Elver To: elver@google.com, Peter Zijlstra Cc: Masahiro Yamada , Nathan Chancellor , Nick Desaulniers , Nicolas Schier , Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Vincenzo Frascino , linux-kbuild@vger.kernel.org, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, Ingo Molnar , Tony Lindgren , Ulf Hansson , Jakub Jelinek , linux-toolchains@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Clang 15 will provide an option to prefix calls to memcpy/memset/memmove with __asan_ in instrumented functions: https://reviews.llvm.org/D122724 GCC will add support in future: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108777 Use it to regain KASAN instrumentation of memcpy/memset/memmove on architectures that require noinstr to be really free from instrumented mem*() functions (all GENERIC_ENTRY architectures). Fixes: 69d4c0d32186 ("entry, kasan, x86: Disallow overriding mem*() functions") Signed-off-by: Marco Elver --- v2: * Use asan-kernel-mem-intrinsic-prefix=1, so that once GCC supports the param, it also works there (it needs the =1). The Fixes tag is just there to show the dependency, and that people shouldn't apply this patch without 69d4c0d32186. --- scripts/Makefile.kasan | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/scripts/Makefile.kasan b/scripts/Makefile.kasan index b9e94c5e7097..78336b04c077 100644 --- a/scripts/Makefile.kasan +++ b/scripts/Makefile.kasan @@ -38,6 +38,13 @@ endif CFLAGS_KASAN += $(call cc-param,asan-stack=$(stack_enable)) +ifdef CONFIG_GENERIC_ENTRY +# Instrument memcpy/memset/memmove calls by using instrumented __asan_mem*() +# instead. With compilers that don't support this option, compiler-inserted +# memintrinsics won't be checked by KASAN. +CFLAGS_KASAN += $(call cc-param,asan-kernel-mem-intrinsic-prefix) +endif + endif # CONFIG_KASAN_GENERIC ifdef CONFIG_KASAN_SW_TAGS -- 2.39.1.581.gbfd45094c4-goog