Skip to content

Commit 5d1ba31

Browse files
ftang1tehcaster
authored andcommitted
mm: kasan: Extend kasan_metadata_size() to also cover in-object size
When kasan is enabled for slab/slub, it may save kasan' free_meta data in the former part of slab object data area in slab object's free path, which works fine. There is ongoing effort to extend slub's debug function which will redzone the latter part of kmalloc object area, and when both of the debug are enabled, there is possible conflict, especially when the kmalloc object has small size, as caught by 0Day bot [1]. To solve it, slub code needs to know the in-object kasan's meta data size. Currently, there is existing kasan_metadata_size() which returns the kasan's metadata size inside slub's metadata area, so extend it to also cover the in-object meta size by adding a boolean flag 'in_object'. There is no functional change to existing code logic. [1]. https://lore.kernel.org/lkml/YuYm3dWwpZwH58Hu@xsang-OptiPlex-9020/ Reported-by: kernel test robot <oliver.sang@intel.com> Suggested-by: Andrey Konovalov <andreyknvl@gmail.com> Signed-off-by: Feng Tang <feng.tang@intel.com> Reviewed-by: Andrey Konovalov <andreyknvl@gmail.com> Cc: Andrey Ryabinin <ryabinin.a.a@gmail.com> Cc: Alexander Potapenko <glider@google.com> Cc: Dmitry Vyukov <dvyukov@google.com> Cc: Vincenzo Frascino <vincenzo.frascino@arm.com> Signed-off-by: Vlastimil Babka <vbabka@suse.cz>
1 parent 9ce6739 commit 5d1ba31

File tree

3 files changed

+18
-10
lines changed

3 files changed

+18
-10
lines changed

include/linux/kasan.h

+3-2
Original file line numberDiff line numberDiff line change
@@ -302,7 +302,7 @@ static inline void kasan_unpoison_task_stack(struct task_struct *task) {}
302302

303303
#ifdef CONFIG_KASAN_GENERIC
304304

305-
size_t kasan_metadata_size(struct kmem_cache *cache);
305+
size_t kasan_metadata_size(struct kmem_cache *cache, bool in_object);
306306
slab_flags_t kasan_never_merge(void);
307307
void kasan_cache_create(struct kmem_cache *cache, unsigned int *size,
308308
slab_flags_t *flags);
@@ -315,7 +315,8 @@ void kasan_record_aux_stack_noalloc(void *ptr);
315315
#else /* CONFIG_KASAN_GENERIC */
316316

317317
/* Tag-based KASAN modes do not use per-object metadata. */
318-
static inline size_t kasan_metadata_size(struct kmem_cache *cache)
318+
static inline size_t kasan_metadata_size(struct kmem_cache *cache,
319+
bool in_object)
319320
{
320321
return 0;
321322
}

mm/kasan/generic.c

+13-6
Original file line numberDiff line numberDiff line change
@@ -450,15 +450,22 @@ void kasan_init_object_meta(struct kmem_cache *cache, const void *object)
450450
__memset(alloc_meta, 0, sizeof(*alloc_meta));
451451
}
452452

453-
size_t kasan_metadata_size(struct kmem_cache *cache)
453+
size_t kasan_metadata_size(struct kmem_cache *cache, bool in_object)
454454
{
455+
struct kasan_cache *info = &cache->kasan_info;
456+
455457
if (!kasan_requires_meta())
456458
return 0;
457-
return (cache->kasan_info.alloc_meta_offset ?
458-
sizeof(struct kasan_alloc_meta) : 0) +
459-
((cache->kasan_info.free_meta_offset &&
460-
cache->kasan_info.free_meta_offset != KASAN_NO_FREE_META) ?
461-
sizeof(struct kasan_free_meta) : 0);
459+
460+
if (in_object)
461+
return (info->free_meta_offset ?
462+
0 : sizeof(struct kasan_free_meta));
463+
else
464+
return (info->alloc_meta_offset ?
465+
sizeof(struct kasan_alloc_meta) : 0) +
466+
((info->free_meta_offset &&
467+
info->free_meta_offset != KASAN_NO_FREE_META) ?
468+
sizeof(struct kasan_free_meta) : 0);
462469
}
463470

464471
static void __kasan_record_aux_stack(void *addr, bool can_alloc)

mm/slub.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -910,7 +910,7 @@ static void print_trailer(struct kmem_cache *s, struct slab *slab, u8 *p)
910910
if (slub_debug_orig_size(s))
911911
off += sizeof(unsigned int);
912912

913-
off += kasan_metadata_size(s);
913+
off += kasan_metadata_size(s, false);
914914

915915
if (off != size_from_object(s))
916916
/* Beginning of the filler is the free pointer */
@@ -1070,7 +1070,7 @@ static int check_pad_bytes(struct kmem_cache *s, struct slab *slab, u8 *p)
10701070
off += sizeof(unsigned int);
10711071
}
10721072

1073-
off += kasan_metadata_size(s);
1073+
off += kasan_metadata_size(s, false);
10741074

10751075
if (size_from_object(s) == off)
10761076
return 1;

0 commit comments

Comments
 (0)