linux-arm-kernel.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: linux@arm.linux.org.uk (Russell King - ARM Linux)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH] ARM: poison initmem when it is freed
Date: Wed, 6 Jul 2011 21:34:27 +0100	[thread overview]
Message-ID: <20110706203427.GU8286@n2100.arm.linux.org.uk> (raw)
In-Reply-To: <4E139F8F.7060809@codeaurora.org>

On Tue, Jul 05, 2011 at 04:34:39PM -0700, Stephen Boyd wrote:
> On 07/05/2011 12:48 PM, Nicolas Pitre wrote:
> > On Tue, 5 Jul 2011, Russell King - ARM Linux wrote:
> >
> >> On Tue, Jul 05, 2011 at 03:17:33PM -0400, Nicolas Pitre wrote:
> >>> On Tue, 5 Jul 2011, Russell King - ARM Linux wrote:
> >>>
> >>>> When the initmem is freed, we can no longer rely on its contents.  In
> >>>> lightly loaded systems, this memory may persist for some time, making
> >>>> it harder discover run-time issues (caused by the build warnings being
> >>>> ignored.)
> >>>>
> >>>> Poison the initmem at the point where it is freed to encourage run-time
> >>>> problems when initmem is dereferenced as an aid to finding such problems.
> >>>>
> >>>> Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
> >>> The default poison doesn't appear to be a judicious choice for ARM.
> >>>
> >>> include/linux/poison.h:#define POISON_FREE_INITMEM      0xcc
> >>>
> >>>    0:   cccccccc        stclgt  12, cr12, [ip], {204}   ; 0xcc
> >>>
> >>> So if the gt condition is false this will execute nops until it falls 
> >>> out of the initmem section.  Would be nicer if a fault could be 
> >>> generated right at the accessed address which could be looked up.
> >> Have you tried to find a byte-based poison value which would fault
> >> yet still cause a pointer dereference?  You're limited to 0xeN on
> >> ARM, of which there's almost nothing to chose from:
> >>
> >>    0:   e0e0e0e0        rsc     lr, r0, r0, ror #1
> >>    4:   e1e1e1e1        mvn     lr, r1, ror #3
> >>    8:   e2e2e2e2        rsc     lr, r2, #536870926      ; 0x2000000e
> >>    c:   e3e3e3e3        mvn     lr, #-1946157053        ; 0x8c000003
> >>   10:   e4e4e4e4        strbt   lr, [r4], #1252
> >>   14:   e5e5e5e5        strb    lr, [r5, #1509]!
> >>   18:   e6e6e6e6        strbt   lr, [r6], r6, ror #13
> >>   1c:   e7e7e7e7        strb    lr, [r7, r7, ror #15]!
> >>   20:   e8e8e8e8        stmia   r8!, {r3, r5, r6, r7, fp, sp, lr, pc}^
> >>   24:   e9e9e9e9        stmib   r9!, {r0, r3, r5, r6, r7, r8, fp, sp, lr, pc}^
> >>   28:   eaeaeaea        b       0xffababd8
> >>   2c:   ebebebeb        bl      0xffafafe0
> >>   30:   ecececec        stcl    12, cr14, [ip], #944
> >>   34:   edededed        stcl    13, cr14, [sp, #948]!
> >>   38:   eeeeeeee        cdp     14, 14, cr14, cr14, cr14, {7}
> >>   3c:   efefefef        svc     0x00efefef
> >>
> >> 0xefefefef looks to be about the best alternative.
> > Right.  Does it have to be a byte?  Having a word (or half-word if 
> > Thumb2) would be much more convenient.
> >
> >> It then brings up whether POISON_FREE_INITMEM should be changed or not,
> >> as 0xcc is the expected value for this at the moment.
> > I would think that this should be a per architecture value to actually 
> > be useful.
> >
> 
> Didn't I already post this patch about 6 months ago?
> 
> https://lkml.org/lkml/2011/1/11/1
> 
> Here it is, the only downside I see is the memset isn't really efficient
> as the assembler optimized one.

Ok, let's do it your way...

But, do we need to do it page by page?  Can we not have a function which
does the poisioning, and we just pass the __init_begin/__init_end and tcm
start/end stuff to?

  reply	other threads:[~2011-07-06 20:34 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-07-05 18:42 [PATCH] ARM: poison initmem when it is freed Russell King - ARM Linux
2011-07-05 19:17 ` Nicolas Pitre
2011-07-05 19:26   ` Russell King - ARM Linux
2011-07-05 19:48     ` Nicolas Pitre
2011-07-05 23:34       ` Stephen Boyd
2011-07-06 20:34         ` Russell King - ARM Linux [this message]
2011-07-06 20:55           ` Stephen Boyd
2011-07-06 21:01             ` Russell King - ARM Linux
2011-07-06 21:45               ` Tim Bird
2011-07-07 16:47               ` [PATCHv2] arm: mm: Poison freed init memory Stephen Boyd
2011-07-07 17:36                 ` Russell King - ARM Linux
2011-07-07 17:44                   ` Stephen Boyd
2011-07-07 17:41                 ` Nicolas Pitre
2011-07-06  9:08       ` [PATCH] ARM: poison initmem when it is freed Tixy
2011-07-06 20:35         ` Russell King - ARM Linux

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20110706203427.GU8286@n2100.arm.linux.org.uk \
    --to=linux@arm.linux.org.uk \
    --cc=linux-arm-kernel@lists.infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).