Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp38035259rwd; Wed, 12 Jul 2023 01:56:59 -0700 (PDT) X-Google-Smtp-Source: APBJJlEEsuo6D6lqUTERac8N69iTAUYGHG1DqXfjHdqZdKMrjZMFCrpC0R5ubk8tzC96rPgVulRU X-Received: by 2002:a05:6402:254f:b0:51e:5390:8cb8 with SMTP id l15-20020a056402254f00b0051e53908cb8mr14484635edb.2.1689152218906; Wed, 12 Jul 2023 01:56:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689152218; cv=none; d=google.com; s=arc-20160816; b=N2FrdeE9BN6lTP7M4A+yWeS6I3g3gfLv/piZ2sU6+OQQyrpltw0xrWpZ37/5ziUGeL 3e3/1pfGnusV6EO9bXc/6+NjN34IqXZyjbI/xsBwk8/gpAxkctmVqlV0iMBc8NdCEoev 94OrPKcNiJzbBi/WMJNuz/ZOkF+K4V5mSx1yHHVxQEAQGKYZ4HOCHeSYxn2KrKd2RZ9K hOpAE7TeGARVLehnck2rCG3yDgDMAY+zFacvxcXYvU0tekeGOl8SBliprcBBHGDDK0RO LTXAIdIpjf8XCXlraYKbCZz6+C8v0prZUJB+pJntqBzzPjiWlPGX9mCGRZKCuX4nnvq+ nmsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=oC+qyxbfAgsH4hJHeKoCaJaZtcxWMG8Si4Ik9TdQp1U=; fh=WeaUOvWwJDuKP9KhwGpUORxQHZzhkJChjku0draIx7o=; b=oI7TBTuWkM6T4XBUlWW0qmyzJHPAvr3bnO+S0G3Ig++VM6x1mM0+3sqCTorJ2NULw1 ipEzt/Uga1EHcQhyg0A5WZ+dKsEKKFNLBECeyugEcMsDRHTFEle7/0xxa4YKijWaEHLx 0rXmlFDKI0c/BdsazTmuFpfPSrJWbs4YclbLDExW+9h7qwi1GOohaPewvFRMvCre5Od+ HsSkJkE+lQ+SADAY1VNlOYEXCQ33Mbm75awaQywlNGpw0+l8x6hIi7lGOSWaBJh5bBQZ nKFYvgO3zYeQxFYZUH3awgfPnmJxMtTZNr8sVjyitAmm70hWT1YYmNCm1l+coOlmtn2Q zquA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bytedance.com header.s=google header.b="BNe6/5m0"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=bytedance.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b21-20020aa7c6d5000000b0051a39840146si3868138eds.464.2023.07.12.01.56.35; Wed, 12 Jul 2023 01:56:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@bytedance.com header.s=google header.b="BNe6/5m0"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=bytedance.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232342AbjGLIUW (ORCPT + 99 others); Wed, 12 Jul 2023 04:20:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46644 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232255AbjGLITp (ORCPT ); Wed, 12 Jul 2023 04:19:45 -0400 Received: from mail-pf1-x42c.google.com (mail-pf1-x42c.google.com [IPv6:2607:f8b0:4864:20::42c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 810CC30F6 for ; Wed, 12 Jul 2023 01:16:38 -0700 (PDT) Received: by mail-pf1-x42c.google.com with SMTP id d2e1a72fcca58-666edfc50deso333250b3a.0 for ; Wed, 12 Jul 2023 01:16:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance.com; s=google; t=1689149797; x=1691741797; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=oC+qyxbfAgsH4hJHeKoCaJaZtcxWMG8Si4Ik9TdQp1U=; b=BNe6/5m0eyl0GQBWqvxqvFw/modnVzyDYQ8xLML3eain/H68danKbF2pH1MKXyH1n+ QCmNZDHkctGwhxlbd8/zr4kvvNGOGiB6tXq12M2HtCauEuMeiLSsmFfsBL7ja4kHIId4 GcouPP9HbxCxqg83M2w8aNuPotIwecgdSVO1fwrM+V7RMUxNmyg6Y37gtKrYyhrpvxBs BUgTlI4y9Lpm8Q9mPcO+pwzkWSop/wVaKNcEaB3/Ni65rMKwjhk7c9+7d7tMZkNJXPCj AJyS4OW74C6oeO5AEmNlU7X3EMl/vuYqiZwu16EfkQkWzwRG9Gqqmq/uhR4Co3nWL1SR ppDQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1689149797; x=1691741797; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=oC+qyxbfAgsH4hJHeKoCaJaZtcxWMG8Si4Ik9TdQp1U=; b=PK/U7qG8tjy9eFa8kvV0H3qNPc1RUBb+erFThDq/PciB8PhK0tByxC8QVZ419AVCeR MGWPY1ZNN7gBe1GreommWkjmNmj3m2BHJRSHRigcVfhJbFUT2BY28GPah/wIFUfiO619 kln8D5akoZ8qaFCwhvPifDIemwwrR9pwVuHNK5vy3SzRT7HbJuCIXK7RbRPxQe4Ju2GW PAzyTAPNHt8cHLJdosO4Hdb78AeX9d573JGrO+k56h7EMgi4p5Jqb649aaDW0GnnGF23 6yqQGLqMCakIx9AL3y0hI+9BQHI0k1WeNxzFV5lI6kvktXktKskXQ1cirJUIuKELsVkV /dMg== X-Gm-Message-State: ABy/qLY7r7YQ80EyuvUdhAf16JQ0L1qZNgyWBXVRPSTsBIH79TYf3V+6 MS38zKRsoeNmcOedfsOhyEbiew== X-Received: by 2002:a05:6a00:2b8d:b0:666:c1ae:3b87 with SMTP id dv13-20020a056a002b8d00b00666c1ae3b87mr1547140pfb.12.1689149797588; Wed, 12 Jul 2023 01:16:37 -0700 (PDT) Received: from GL4FX4PXWL.bytedance.net ([139.177.225.243]) by smtp.gmail.com with ESMTPSA id d7-20020aa78147000000b0063f2a5a59d1sm2988587pfn.190.2023.07.12.01.16.34 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Wed, 12 Jul 2023 01:16:37 -0700 (PDT) From: Peng Zhang To: glider@google.com, elver@google.com, dvyukov@google.com, akpm@linux-foundation.org Cc: kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, muchun.song@linux.dev, Peng Zhang Subject: [PATCH v2] mm: kfence: allocate kfence_metadata at runtime Date: Wed, 12 Jul 2023 16:16:16 +0800 Message-Id: <20230712081616.45177-1-zhangpeng.00@bytedance.com> X-Mailer: git-send-email 2.37.0 (Apple Git-136) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org kfence_metadata is currently a static array. For the purpose of allocating scalable __kfence_pool, we first change it to runtime allocation of metadata. Since the size of an object of kfence_metadata is 1160 bytes, we can save at least 72 pages (with default 256 objects) without enabling kfence. Below is the numbers obtained in qemu (with default 256 objects). before: Memory: 8134692K/8388080K available (3668K bss) after: Memory: 8136740K/8388080K available (1620K bss) More than expected, it saves 2MB memory. It can be seen that the size of the .bss section has changed, possibly because it affects the linker. Signed-off-by: Peng Zhang --- Changes since v1: - Fix a stupid problem of not being able to initialize kfence. The problem is that I slightly modified the patch before sending it out, but it has not been tested. I'm extremely sorry. - Drop kfence_alloc_metadata() and kfence_free_metadata() because they are no longer reused. - Allocate metadata from memblock during early initialization. Fixed the issue of allocating metadata size that cannot exceed the limit of the buddy system during early initialization. - Fix potential UAF in kfence_shutdown_cache(). v1: https://lore.kernel.org/lkml/20230710032714.26200-1-zhangpeng.00@bytedance.com/ include/linux/kfence.h | 5 +- mm/kfence/core.c | 124 ++++++++++++++++++++++++++++------------- mm/kfence/kfence.h | 5 +- mm/mm_init.c | 2 +- 4 files changed, 94 insertions(+), 42 deletions(-) diff --git a/include/linux/kfence.h b/include/linux/kfence.h index 726857a4b680..68e71562bfa7 100644 --- a/include/linux/kfence.h +++ b/include/linux/kfence.h @@ -59,9 +59,10 @@ static __always_inline bool is_kfence_address(const void *addr) } /** - * kfence_alloc_pool() - allocate the KFENCE pool via memblock + * kfence_alloc_pool_and_metadata() - allocate the KFENCE pool and KFENCE + * metadata via memblock */ -void __init kfence_alloc_pool(void); +void __init kfence_alloc_pool_and_metadata(void); /** * kfence_init() - perform KFENCE initialization at boot time diff --git a/mm/kfence/core.c b/mm/kfence/core.c index dad3c0eb70a0..ed0424950cf1 100644 --- a/mm/kfence/core.c +++ b/mm/kfence/core.c @@ -116,7 +116,16 @@ EXPORT_SYMBOL(__kfence_pool); /* Export for test modules. */ * backing pages (in __kfence_pool). */ static_assert(CONFIG_KFENCE_NUM_OBJECTS > 0); -struct kfence_metadata kfence_metadata[CONFIG_KFENCE_NUM_OBJECTS]; +struct kfence_metadata *kfence_metadata; + +/* + * When kfence_metadata is not NULL, it may be that kfence is being initialized + * at this time, and it may be used by kfence_shutdown_cache() during + * initialization. If the initialization fails, kfence_metadata will be released, + * causing UAF. So it is necessary to add kfence_metadata_init for initialization, + * and kfence_metadata will be visible only when initialization is successful. + */ +static struct kfence_metadata *kfence_metadata_init; /* Freelist with available objects. */ static struct list_head kfence_freelist = LIST_HEAD_INIT(kfence_freelist); @@ -591,7 +600,7 @@ static unsigned long kfence_init_pool(void) __folio_set_slab(slab_folio(slab)); #ifdef CONFIG_MEMCG - slab->memcg_data = (unsigned long)&kfence_metadata[i / 2 - 1].objcg | + slab->memcg_data = (unsigned long)&kfence_metadata_init[i / 2 - 1].objcg | MEMCG_DATA_OBJCGS; #endif } @@ -610,7 +619,7 @@ static unsigned long kfence_init_pool(void) } for (i = 0; i < CONFIG_KFENCE_NUM_OBJECTS; i++) { - struct kfence_metadata *meta = &kfence_metadata[i]; + struct kfence_metadata *meta = &kfence_metadata_init[i]; /* Initialize metadata. */ INIT_LIST_HEAD(&meta->list); @@ -626,6 +635,12 @@ static unsigned long kfence_init_pool(void) addr += 2 * PAGE_SIZE; } + /* + * Make kfence_metadata visible only when initialization is successful. + * Otherwise, if the initialization fails and kfence_metadata is + * freed, it may cause UAF in kfence_shutdown_cache(). + */ + kfence_metadata = kfence_metadata_init; return 0; reset_slab: @@ -672,26 +687,10 @@ static bool __init kfence_init_pool_early(void) */ memblock_free_late(__pa(addr), KFENCE_POOL_SIZE - (addr - (unsigned long)__kfence_pool)); __kfence_pool = NULL; - return false; -} - -static bool kfence_init_pool_late(void) -{ - unsigned long addr, free_size; - addr = kfence_init_pool(); - - if (!addr) - return true; + memblock_free_late(__pa(kfence_metadata_init), KFENCE_METADATA_SIZE); + kfence_metadata_init = NULL; - /* Same as above. */ - free_size = KFENCE_POOL_SIZE - (addr - (unsigned long)__kfence_pool); -#ifdef CONFIG_CONTIG_ALLOC - free_contig_range(page_to_pfn(virt_to_page((void *)addr)), free_size / PAGE_SIZE); -#else - free_pages_exact((void *)addr, free_size); -#endif - __kfence_pool = NULL; return false; } @@ -841,19 +840,30 @@ static void toggle_allocation_gate(struct work_struct *work) /* === Public interface ===================================================== */ -void __init kfence_alloc_pool(void) +void __init kfence_alloc_pool_and_metadata(void) { if (!kfence_sample_interval) return; - /* if the pool has already been initialized by arch, skip the below. */ - if (__kfence_pool) - return; - - __kfence_pool = memblock_alloc(KFENCE_POOL_SIZE, PAGE_SIZE); - + /* + * If the pool has already been initialized by arch, there is no need to + * re-allocate the memory pool. + */ if (!__kfence_pool) + __kfence_pool = memblock_alloc(KFENCE_POOL_SIZE, PAGE_SIZE); + + if (!__kfence_pool) { pr_err("failed to allocate pool\n"); + return; + } + + /* The memory allocated by memblock has been zeroed out. */ + kfence_metadata_init = memblock_alloc(KFENCE_METADATA_SIZE, PAGE_SIZE); + if (!kfence_metadata_init) { + pr_err("failed to allocate metadata\n"); + memblock_free(__kfence_pool, KFENCE_POOL_SIZE); + __kfence_pool = NULL; + } } static void kfence_init_enable(void) @@ -895,33 +905,68 @@ void __init kfence_init(void) static int kfence_init_late(void) { - const unsigned long nr_pages = KFENCE_POOL_SIZE / PAGE_SIZE; + const unsigned long nr_pages_pool = KFENCE_POOL_SIZE / PAGE_SIZE; + const unsigned long nr_pages_meta = KFENCE_METADATA_SIZE / PAGE_SIZE; + unsigned long addr = (unsigned long)__kfence_pool; + unsigned long free_size = KFENCE_POOL_SIZE; + int err = -ENOMEM; + #ifdef CONFIG_CONTIG_ALLOC struct page *pages; - - pages = alloc_contig_pages(nr_pages, GFP_KERNEL, first_online_node, NULL); + pages = alloc_contig_pages(nr_pages_pool, GFP_KERNEL, first_online_node, + NULL); if (!pages) return -ENOMEM; + __kfence_pool = page_to_virt(pages); + pages = alloc_contig_pages(nr_pages_meta, GFP_KERNEL, first_online_node, + NULL); + if (pages) + kfence_metadata_init = page_to_virt(pages); #else - if (nr_pages > MAX_ORDER_NR_PAGES) { + if (nr_pages_pool > MAX_ORDER_NR_PAGES || + nr_pages_meta > MAX_ORDER_NR_PAGES) { pr_warn("KFENCE_NUM_OBJECTS too large for buddy allocator\n"); return -EINVAL; } + __kfence_pool = alloc_pages_exact(KFENCE_POOL_SIZE, GFP_KERNEL); if (!__kfence_pool) return -ENOMEM; + + kfence_metadata_init = alloc_pages_exact(KFENCE_METADATA_SIZE, GFP_KERNEL); #endif - if (!kfence_init_pool_late()) { - pr_err("%s failed\n", __func__); - return -EBUSY; + if (!kfence_metadata_init) + goto free_pool; + + memzero_explicit(kfence_metadata_init, KFENCE_METADATA_SIZE); + addr = kfence_init_pool(); + if (!addr) { + kfence_init_enable(); + kfence_debugfs_init(); + return 0; } - kfence_init_enable(); - kfence_debugfs_init(); + pr_err("%s failed\n", __func__); + free_size = KFENCE_POOL_SIZE - (addr - (unsigned long)__kfence_pool); + err = -EBUSY; - return 0; +#ifdef CONFIG_CONTIG_ALLOC + free_contig_range(page_to_pfn(virt_to_page((void *)kfence_metadata_init)), + nr_pages_meta); +free_pool: + free_contig_range(page_to_pfn(virt_to_page((void *)addr)), + free_size / PAGE_SIZE); +#else + free_pages_exact((void *)kfence_metadata_init, KFENCE_METADATA_SIZE); +free_pool: + free_pages_exact((void *)addr, free_size); +#endif + + kfence_metadata_init = NULL; + __kfence_pool = NULL; + return err; } static int kfence_enable_late(void) @@ -941,6 +986,9 @@ void kfence_shutdown_cache(struct kmem_cache *s) struct kfence_metadata *meta; int i; + if (!kfence_metadata) + return; + for (i = 0; i < CONFIG_KFENCE_NUM_OBJECTS; i++) { bool in_use; diff --git a/mm/kfence/kfence.h b/mm/kfence/kfence.h index 392fb273e7bd..f46fbb03062b 100644 --- a/mm/kfence/kfence.h +++ b/mm/kfence/kfence.h @@ -102,7 +102,10 @@ struct kfence_metadata { #endif }; -extern struct kfence_metadata kfence_metadata[CONFIG_KFENCE_NUM_OBJECTS]; +#define KFENCE_METADATA_SIZE PAGE_ALIGN(sizeof(struct kfence_metadata) * \ + CONFIG_KFENCE_NUM_OBJECTS) + +extern struct kfence_metadata *kfence_metadata; static inline struct kfence_metadata *addr_to_metadata(unsigned long addr) { diff --git a/mm/mm_init.c b/mm/mm_init.c index a1963c3322af..86b26d013f4b 100644 --- a/mm/mm_init.c +++ b/mm/mm_init.c @@ -2778,7 +2778,7 @@ void __init mm_core_init(void) */ page_ext_init_flatmem(); mem_debugging_and_hardening_init(); - kfence_alloc_pool(); + kfence_alloc_pool_and_metadata(); report_meminit(); kmsan_init_shadow(); stack_depot_early_init(); -- 2.20.1