[PATCH v3 mm 08/13] kasan, mm: optimize krealloc poisoning

Andrey Konovalov andreyknvl at google.com
Tue Feb 9 08:24:38 EST 2021


On Mon, Feb 8, 2021 at 11:48 AM Marco Elver <elver at google.com> wrote:
>
> On Fri, Feb 05, 2021 at 06:34PM +0100, Andrey Konovalov wrote:
> > Currently, krealloc() always calls ksize(), which unpoisons the whole
> > object including the redzone. This is inefficient, as kasan_krealloc()
> > repoisons the redzone for objects that fit into the same buffer.
> >
> > This patch changes krealloc() instrumentation to use uninstrumented
> > __ksize() that doesn't unpoison the memory. Instead, kasan_kreallos()
> > is changed to unpoison the memory excluding the redzone.
> >
> > For objects that don't fit into the old allocation, this patch disables
> > KASAN accessibility checks when copying memory into a new object instead
> > of unpoisoning it.
> >
> > Signed-off-by: Andrey Konovalov <andreyknvl at google.com>
>
> Reviewed-by: Marco Elver <elver at google.com>
>
> Clarification below.
>
> > ---
> >  mm/kasan/common.c | 12 ++++++++++--
> >  mm/slab_common.c  | 20 ++++++++++++++------
> >  2 files changed, 24 insertions(+), 8 deletions(-)
> >
> > diff --git a/mm/kasan/common.c b/mm/kasan/common.c
> > index 7ea643f7e69c..a8a67dca5e55 100644
> > --- a/mm/kasan/common.c
> > +++ b/mm/kasan/common.c
> > @@ -476,7 +476,7 @@ static void *____kasan_kmalloc(struct kmem_cache *cache, const void *object,
> >
> >       /*
> >        * The object has already been unpoisoned by kasan_slab_alloc() for
> > -      * kmalloc() or by ksize() for krealloc().
> > +      * kmalloc() or by kasan_krealloc() for krealloc().
> >        */
> >
> >       /*
> > @@ -526,7 +526,7 @@ void * __must_check __kasan_kmalloc_large(const void *ptr, size_t size,
> >
> >       /*
> >        * The object has already been unpoisoned by kasan_alloc_pages() for
> > -      * alloc_pages() or by ksize() for krealloc().
> > +      * alloc_pages() or by kasan_krealloc() for krealloc().
> >        */
> >
> >       /*
> > @@ -554,8 +554,16 @@ void * __must_check __kasan_krealloc(const void *object, size_t size, gfp_t flag
> >       if (unlikely(object == ZERO_SIZE_PTR))
> >               return (void *)object;
> >
> > +     /*
> > +      * Unpoison the object's data.
> > +      * Part of it might already have been unpoisoned, but it's unknown
> > +      * how big that part is.
> > +      */
> > +     kasan_unpoison(object, size);
> > +
> >       page = virt_to_head_page(object);
> >
> > +     /* Piggy-back on kmalloc() instrumentation to poison the redzone. */
> >       if (unlikely(!PageSlab(page)))
> >               return __kasan_kmalloc_large(object, size, flags);
> >       else
> > diff --git a/mm/slab_common.c b/mm/slab_common.c
> > index dad70239b54c..60a2f49df6ce 100644
> > --- a/mm/slab_common.c
> > +++ b/mm/slab_common.c
> > @@ -1140,19 +1140,27 @@ static __always_inline void *__do_krealloc(const void *p, size_t new_size,
> >       void *ret;
> >       size_t ks;
> >
> > -     if (likely(!ZERO_OR_NULL_PTR(p)) && !kasan_check_byte(p))
> > -             return NULL;
> > -
> > -     ks = ksize(p);
> > +     /* Don't use instrumented ksize to allow precise KASAN poisoning. */
> > +     if (likely(!ZERO_OR_NULL_PTR(p))) {
> > +             if (!kasan_check_byte(p))
> > +                     return NULL;
>
> Just checking: Check byte returns true if the object is not tracked by KASAN, right? I.e. if it's a KFENCE object, kasan_check_byte() always returns true.

kasan_check_byte() still performs the check, but since KFENCE objects
are never poisoned, the check always passes.

Thanks!



More information about the linux-arm-kernel mailing list