From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-io0-f198.google.com (mail-io0-f198.google.com [209.85.223.198]) by kanga.kvack.org (Postfix) with ESMTP id 9E4C96B0025 for ; Tue, 20 Mar 2018 09:43:27 -0400 (EDT) Received: by mail-io0-f198.google.com with SMTP id z23so1564398iob.23 for ; Tue, 20 Mar 2018 06:43:27 -0700 (PDT) Received: from mail-sor-f41.google.com (mail-sor-f41.google.com. [209.85.220.41]) by mx.google.com with SMTPS id i78sor741161ioe.260.2018.03.20.06.43.26 for (Google Transport Security); Tue, 20 Mar 2018 06:43:26 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: References: <06a4d0c483fba8babd01fe23727fe4a79482d309.1520017438.git.andreyknvl@google.com> From: Andrey Konovalov Date: Tue, 20 Mar 2018 14:43:23 +0100 Message-ID: Subject: Re: [RFC PATCH 09/14] khwasan: add hooks implementation Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-mm@kvack.org List-ID: To: Anthony Yznaga Cc: Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , Jonathan Corbet , Catalin Marinas , Will Deacon , Theodore Ts'o , Jan Kara , Christopher Li , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton , Masahiro Yamada , Michal Marek , Mark Rutland , Ard Biesheuvel , Yury Norov , Nick Desaulniers , Marc Zyngier , Suzuki K Poulose , Kristina Martsenko , Punit Agrawal , Dave Martin , James Morse , Julien Thierry , Michael Weiser , Steve Capper , Ingo Molnar , Thomas Gleixner , Sandipan Das , Paul Lawrence , David Woodhouse , Kees Cook , Geert Uytterhoeven , Josh Poimboeuf , Arnd Bergmann , kasan-dev , linux-doc@vger.kernel.org, LKML , Linux ARM , linux-ext4@vger.kernel.org, linux-sparse@vger.kernel.org, Linux Memory Management List , Linux Kbuild mailing list , Kostya Serebryany , Evgeniy Stepanov , Lee Smith , Ramana Radhakrishnan , Jacob Bramley , Ruben Ayrapetyan , Kees Cook , Jann Horn , Mark Brand On Tue, Mar 20, 2018 at 1:44 AM, Anthony Yznaga wrote: > Hi Andrey, > > On 3/2/18 11:44 AM, Andrey Konovalov wrote: >> void kasan_poison_kfree(void *ptr, unsigned long ip) >> { >> + struct page *page; >> + >> + page = virt_to_head_page(ptr) > > An untagged addr should be passed to virt_to_head_page(), no? Hi! virt_to_head_page() relies on virt_to_phys(), and the latter will be fixed to accept tagged pointers in the next patchset. Thanks! > >> + >> + if (unlikely(!PageSlab(page))) { >> + if (reset_tag(ptr) != page_address(page)) { >> + /* Report invalid-free here */ >> + return; >> + } >> + kasan_poison_shadow(ptr, PAGE_SIZE << compound_order(page), >> + khwasan_random_tag()); >> + } else { >> + __kasan_slab_free(page->slab_cache, ptr, ip); >> + } >> } >> >> void kasan_kfree_large(void *ptr, unsigned long ip) >> { >> + struct page *page = virt_to_page(ptr); >> + struct page *head_page = virt_to_head_page(ptr); > > Same as above and for virt_to_page() as well. > > Anthony > > >> + >> + if (reset_tag(ptr) != page_address(head_page)) { >> + /* Report invalid-free here */ >> + return; >> + } >> + >> + kasan_poison_shadow(ptr, PAGE_SIZE << compound_order(page), >> + khwasan_random_tag()); >> }