Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751534AbZGIX0y (ORCPT ); Thu, 9 Jul 2009 19:26:54 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1750751AbZGIX0o (ORCPT ); Thu, 9 Jul 2009 19:26:44 -0400 Received: from mail128.messagelabs.com ([216.82.250.131]:29092 "EHLO mail128.messagelabs.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750744AbZGIX0n (ORCPT ); Thu, 9 Jul 2009 19:26:43 -0400 X-VirusChecked: Checked X-Env-Sender: yuan-bo.ye@motorola.com X-Msg-Ref: server-14.tower-128.messagelabs.com!1247181990!24082355!1 X-StarScan-Version: 6.0.0; banners=-,-,- X-Originating-IP: [136.182.1.15] Subject: [RFC][PATCH] Check write to slab memory which freed already using mudflap v2 From: Janboe Ye To: linux-arm-kernel@lists.arm.linux.org.uk, linux-kernel Cc: vegard.nossum@gmail.com, penberg@cs.helsinki.fi, graydon@redhat.com, fche@redhat.com, mingo@elte.hu Content-Type: text/plain Content-Transfer-Encoding: 7bit Date: Thu, 09 Jul 2009 18:26:05 -0500 Message-Id: <1247181965.8967.10.camel@debian-nb> Mime-Version: 1.0 X-Mailer: Evolution 2.26.2 X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 12019 Lines: 387 Hi slab debug detects the corruption when it allocates and frees the slab. But if someone write to slab memory when it already freed, slab debug could only report its last free point when slab allocates the same block. This information is not enough for debugging when system has complex memory usage. gcc mudflap could insert some check point when a memory is writing and it is helpful to check if the address is writing freed. Because most codes of kernel are drivers, it is most possible that drivers have such problem. So I use mudflap to compile all drivers. kmemcheck is also helpful to check same issue, and it triggers trap every reading and writing, and it need to analysis the instruct which trigger the trap to get the memory address. This heavy depends on the cpu capability. arm has no single-step like x86, so kmemcheck is too heavy to run on real arm system. mudflap way is lighter than kmemcheck for this purpose. As stack allocation is useless for checking slab, kernel mudflap does not implement alloc which is required by gcc mudflap when codes use variable array. So variable array, such as array[i] which i could not determined by compiler, is not supported. Note: gcc 4.1.2 generates a wrong code in kbd_init of drivers/char/keyboard.c when use mudflap flag. Version 4.2 and 4.3 are ok. mudflap link: http://gcc.gnu.org/wiki/Mudflap_Pointer_Debugging Changeslong: V2: add slub support according to Pekka Enberg comments V1: add mudflap core and slab support Thanks a lot for comments! Signed-off-by: janboe arch/arm/include/asm/elf.h | 1 + arch/arm/kernel/module.c | 1 + drivers/Makefile | 4 +- include/mf-runtime.h | 49 ++++++++++++++++ kernel/Makefile | 2 +- kernel/mudflap.c | 132 ++++++++++++++++++++++++++++++++++++++++++++ lib/Kconfig.debug | 7 ++ mm/slab.c | 38 +++++++++++++ mm/slub.c | 29 ++++++++++ 9 files changed, 261 insertions(+), 2 deletions(-) diff --git a/arch/arm/include/asm/elf.h b/arch/arm/include/asm/elf.h index c207504..30cb4b7 100644 --- a/arch/arm/include/asm/elf.h +++ b/arch/arm/include/asm/elf.h @@ -50,6 +50,7 @@ typedef struct user_fp elf_fpregset_t; #define R_ARM_ABS32 2 #define R_ARM_CALL 28 #define R_ARM_JUMP24 29 +#define R_ARM_TARGET1 38 #define R_ARM_V4BX 40 #define R_ARM_PREL31 42 #define R_ARM_MOVW_ABS_NC 43 diff --git a/arch/arm/kernel/module.c b/arch/arm/kernel/module.c index bac03c8..8cfe5f5 100644 --- a/arch/arm/kernel/module.c +++ b/arch/arm/kernel/module.c @@ -128,6 +128,7 @@ apply_relocate(Elf32_Shdr *sechdrs, const char *strtab, unsigned int symindex, break; case R_ARM_ABS32: + case R_ARM_TARGET1: *(u32 *)loc += sym->st_value; break; diff --git a/drivers/Makefile b/drivers/Makefile index bc4205d..d5e5063 100644 --- a/drivers/Makefile +++ b/drivers/Makefile @@ -4,7 +4,9 @@ # 15 Sep 2000, Christoph Hellwig # Rewritten to use lists instead of if-statements. # - +ifdef CONFIG_MUDFLAP +subdir-ccflags-y += -fmudflap -fmudflapir +endif obj-y += gpio/ obj-$(CONFIG_PCI) += pci/ obj-$(CONFIG_PARISC) += parisc/ diff --git a/include/mf-runtime.h b/include/mf-runtime.h new file mode 100644 index 0000000..0456703 --- /dev/null +++ b/include/mf-runtime.h @@ -0,0 +1,49 @@ +#ifndef _LINUX_MF_RUNTIME +#define _LINUX_MF_RUNTIME +/* + * Copyright (C) 2009 Motorola Inc. + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. + * + */ + +#include + +#define LOOKUP_CACHE_MASK_DFL 1023 +#define LOOKUP_CACHE_SIZE_MAX 65536 /* Allows max CACHE_MASK 0xFFFF */ +#define LOOKUP_CACHE_SHIFT_DFL 2 + +typedef void *__mf_ptr_t; +typedef unsigned int __mf_uintptr_t; +struct __mf_cache { __mf_uintptr_t low; __mf_uintptr_t high; }; + +void __mf_check(void *ptr, unsigned int sz, int type, const char *location); +void __mf_register(void *ptr, size_t sz, int type, const char *name); +void __mf_init(void); +void __mf_unregister(void *ptr, size_t sz, int type); + +#ifdef _MUDFLAP +#pragma redefine_extname memcpy __mfwrap_memcpy +#pragma redefine_extname memset __mfwrap_memset +#pragma redefine_extname strcpy __mfwrap_strcpy +#pragma redefine_extname strncpy __mfwrap_strncpy + +#ifdef CONFIG_ARM +#pragma redefine_extname __memzero __mfwrap_memzero +#endif + +#endif /* _MUDFLAP */ + +#endif diff --git a/kernel/Makefile b/kernel/Makefile index 2093a69..c4c2402 100644 --- a/kernel/Makefile +++ b/kernel/Makefile @@ -22,7 +22,7 @@ CFLAGS_REMOVE_rtmutex-debug.o = -pg CFLAGS_REMOVE_cgroup-debug.o = -pg CFLAGS_REMOVE_sched_clock.o = -pg endif - +obj-$(CONFIG_MUDFLAP) += mudflap.o obj-$(CONFIG_FREEZER) += freezer.o obj-$(CONFIG_PROFILING) += profile.o obj-$(CONFIG_SYSCTL_SYSCALL_CHECK) += sysctl_check.o diff --git a/kernel/mudflap.c b/kernel/mudflap.c new file mode 100644 index 0000000..5734dff --- /dev/null +++ b/kernel/mudflap.c @@ -0,0 +1,132 @@ +/* + * kernel/mudflap.c + * + * Copyright (C) 2009 Motorola Inc. + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * General Public License for more details. + */ + +#include +#include +#include +#include +#undef DEBUG + +#ifdef DEBUG +#define DPRINTK(fmt, args...) printk(fmt, ## args) +#else +#define DPRINTK(fmt, args...) +#endif + +/* Codes to describe the type of access to check */ +#define __MF_CHECK_READ 0 +#define __MF_CHECK_WRITE 1 + +typedef void *__mf_ptr_t; +typedef unsigned int __mf_uintptr_t; +struct __mf_cache { __mf_uintptr_t low; __mf_uintptr_t high; }; + +#define LOOKUP_CACHE_MASK_DFL 1023 +#define LOOKUP_CACHE_SIZE_MAX 65536 /* Allows max CACHE_MASK 0xFFFF */ +#define LOOKUP_CACHE_SHIFT_DFL 2 + +struct __mf_cache __mf_lookup_cache[LOOKUP_CACHE_SIZE_MAX]; +EXPORT_SYMBOL(__mf_lookup_cache); + +uintptr_t __mf_lc_mask = LOOKUP_CACHE_MASK_DFL; +EXPORT_SYMBOL(__mf_lc_mask); + +unsigned char __mf_lc_shift = LOOKUP_CACHE_SHIFT_DFL; +EXPORT_SYMBOL(__mf_lc_shift); + +void check_slab_write(void *ptr, unsigned int sz, const char *location); + +static inline int verify_ptr(unsigned long ptr) +{ + if (ptr < PAGE_OFFSET || + (ptr > (unsigned long)high_memory && high_memory != 0)) + return -EFAULT; + + return 0; +} + +void __mf_check(void *ptr, unsigned int sz, int type, const char *location) +{ + if (verify_ptr((unsigned long)ptr)) + return; + if (type) /* write */ + check_slab_write(ptr, sz, location); +} +EXPORT_SYMBOL(__mf_check); + +void *__mfwrap_memset(void *s, int c, size_t count) +{ + __mf_check(s, count, __MF_CHECK_WRITE, "memset dest"); + return memset(s, c, count); +} +EXPORT_SYMBOL(__mfwrap_memset); + +void *__mfwrap_memcpy(void *dest, const void *src, size_t count) +{ + __mf_check(dest, count, __MF_CHECK_WRITE, "memcpy dest"); + return memcpy(dest, src, count); +} +EXPORT_SYMBOL(__mfwrap_memcpy); + +char *__mfwrap_strcpy(char *dest, const char *src) +{ + size_t n = strlen(src); + __mf_check(dest, n, __MF_CHECK_WRITE, "strcpy dest"); + return strcpy(dest, src); +} +EXPORT_SYMBOL(__mfwrap_strcpy); + +void *__mfwrap_strncpy(char *dest, const char *src, size_t count) +{ + size_t len = strnlen(src, count); + __mf_check(dest, len, __MF_CHECK_WRITE, "strncpy dest"); + return strncpy(dest, src, count); +} +EXPORT_SYMBOL(__mfwrap_strncpy); + +#ifdef CONFIG_ARM +void __mfwrap_memzero(void *ptr, __kernel_size_t n) +{ + __mf_check(ptr, n, __MF_CHECK_WRITE, "memzero dest"); + return __memzero(ptr, n); +} +EXPORT_SYMBOL(__mfwrap_memzero); +#endif + +void +__mf_register(void *ptr, size_t sz, int type, const char *name) +{ + DPRINTK("ptr: %p, sz: %d, type: %d, %s\n", ptr, sz, type, name); +} +EXPORT_SYMBOL(__mf_register); + +void +__mf_unregister(void *ptr, size_t sz, int type) +{ + DPRINTK("ptr: %p, sz: %d, type: %d\n", ptr, sz, type); +} +EXPORT_SYMBOL(__mf_unregister); + +void __mf_init(void) +{ +} +EXPORT_SYMBOL(__mf_init); + +int +__mf_set_options(const char *optstr) +{ + return 0; +} +EXPORT_SYMBOL(__mf_set_options); diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index 12327b2..5e1f7ff 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -35,6 +35,13 @@ config FRAME_WARN Setting this too low will cause a lot of warnings. Setting it to 0 disables the warning. Requires gcc 4.4 +config MUDFLAP + bool "Enable mudflap to check slab write after free" + depends on DEBUG_SLAB_LEAK || SLUB_DEBUG_ON + help + This uses mudflap which introduced by gcc4 to check slab corruption + which is caused by writing after free. + This is smaller and faster than kmemcheck. config MAGIC_SYSRQ bool "Magic SysRq key" diff --git a/mm/slab.c b/mm/slab.c index 7b5d4de..f4433d4 100644 --- a/mm/slab.c +++ b/mm/slab.c @@ -4503,3 +4503,41 @@ size_t ksize(const void *objp) return obj_size(virt_to_cache(objp)); } EXPORT_SYMBOL(ksize); + +#ifdef CONFIG_MUDFLAP +void check_slab_write(void *ptr, unsigned int sz, const char *location) +{ + struct page *page; + struct kmem_cache *cachep; + struct slab *slabp; + char *realobj; + void *objp; + int objnr, size; + + page = virt_to_head_page(ptr); + if (!PageSlab(page)) + return; + + cachep = page_get_cache(page); + slabp = page_get_slab(page); + objnr = (unsigned)(ptr - slabp->s_mem) / cachep->buffer_size; + objp = index_to_obj(cachep, slabp, objnr); + realobj = (char *)objp + obj_offset(cachep); + size = obj_size(cachep); + if (slab_bufctl(slabp)[objnr] == BUFCTL_FREE) { + printk(KERN_ERR "ptr: %p, sz: %d, location: %s\n", + ptr, sz, location); + printk(KERN_ERR "write to freed object, size %d\n", + size); + if (cachep->flags & SLAB_STORE_USER) { + printk(KERN_ERR "Last user: [<%p>]", + *dbg_userword(cachep, objp)); + print_symbol("(%s)", + (unsigned long)*dbg_userword(cachep, objp)); + printk("\n"); + } + + dump_stack(); + } +} +#endif diff --git a/mm/slub.c b/mm/slub.c index a9201d8..b3fdd93 100644 --- a/mm/slub.c +++ b/mm/slub.c @@ -4729,3 +4729,32 @@ static int __init slab_proc_init(void) } module_init(slab_proc_init); #endif /* CONFIG_SLABINFO */ + +#ifdef CONFIG_MUDFLAP +void check_slab_write(void *ptr, unsigned int sz, const char *location) +{ + struct page *page; + struct kmem_cache *cachep; + struct slab *slabp; + char *realobj; + void *objp, *start; + int objnr, size; + + page = virt_to_head_page(ptr); + if (!PageSlab(page)) + return; + + cachep = page->slab; + start = page_address(page); + objnr = (unsigned)(ptr - start) / cachep->size; + objp = start + cachep->size * objnr; + if (on_freelist(cachep, page, objp)) { + printk(KERN_ERR "ptr: %p, sz: %d, location: %s\n", + ptr, sz, location); + printk(KERN_ERR "write to freed object, size %d\n", + cachep->size); + print_tracking(cachep, objp); + dump_stack(); + } +} +#endif -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/