All of lore.kernel.org
 help / color / mirror / Atom feed
From: Dmitry Vyukov <dvyukov@google.com>
To: Mark Rutland <mark.rutland@arm.com>
Cc: Andy Lutomirski <luto@kernel.org>,
	Andrey Ryabinin <aryabinin@virtuozzo.com>,
	Alexander Potapenko <glider@google.com>,
	kasan-dev <kasan-dev@googlegroups.com>,
	LKML <linux-kernel@vger.kernel.org>, X86 ML <x86@kernel.org>
Subject: Re: Making KASAN compatible with VMAP_STACK
Date: Mon, 23 Jul 2018 13:55:49 +0200	[thread overview]
Message-ID: <CACT4Y+YMYogSo+Wq=29A7fKC9hufsc_DwLrneOKtsefZP-9h6g@mail.gmail.com> (raw)
In-Reply-To: <20180723111813.vbnsmx2k45eqzdkc@lakrids.cambridge.arm.com>

On Mon, Jul 23, 2018 at 1:18 PM, Mark Rutland <mark.rutland@arm.com> wrote:
> On Mon, Jul 23, 2018 at 09:40:36AM +0200, Dmitry Vyukov wrote:
>> On Sun, Jul 22, 2018 at 7:52 PM, Andy Lutomirski <luto@kernel.org> wrote:
>> > Hi all-
>> >
>> > It would be really nice to make KASAN compatible with VMAP_STACK.
>> > Both are valuable memory debugging features, and the fact that you
>> > can't use both is disappointing.
>> >
>> > As far as I know, there are only two problems:
>> >
>> > 1. The KASAN shadow population code is a mess, and adding *anything*
>> > to the KASAN shadow requires magical, fragile incantations.  It should
>> > be cleaned up so that ranges can be easily populated without needing
>> > to very carefully align things, call helpers in the right order, etc.
>> > The core KASAN code should figure it out by itself.
>> >
>> > 2. The vmalloc area is potentially extremely large.  It might be
>> > necessary to have a way to *depopulate* shadow space when stacks get
>> > freed or, more generally, when vmap areas are freed.  Ideally KASAN
>> > would integrate with the core vmalloc/vmap code and it would Just Work
>> > (tm).  And, as a bonus, we'd get proper KASAN protection of vmalloced
>> > memory.
>> >
>> > Any volunteers to fix this?
>>
>> Hi Andy,
>>
>> I understand that having most configs as orthogonal settings that can
>> be enabled independently is generally good in intself, but I would
>> like to understand what does VMAP_STACK add on top of KASAN in terms
>> of debugging capabilities?
>
> VMAP_STACK makes it possible to detect stack overflows reliably at the
> point of overflow.
>
> KASAN can't handle this reliably, even if it detects that an access is
> out of the stack bounds, since handling this requires stack space.
> Depending on a number of factors, this may be reported, might result in
> recursive exceptions, etc.

Interesting. Does VMAP_STACK detect task_struct smashing today? As far
as I remember, the first version didn't.
As an orthogonal measure we could add KASAN redzone between stack and
task_struct, and make KASAN instrumentation detect when the new frame
hits this redzone. We bump stack order under KASAN significantly, so
adding, say 128 byte redzone should not be a problem. Does it make any
sense?

  reply	other threads:[~2018-07-23 11:56 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-07-22 17:52 Making KASAN compatible with VMAP_STACK Andy Lutomirski
2018-07-23  7:40 ` Dmitry Vyukov
2018-07-23 11:18   ` Mark Rutland
2018-07-23 11:55     ` Dmitry Vyukov [this message]
2018-07-23 12:42       ` Mark Rutland
2018-07-23 12:51         ` Dmitry Vyukov
2018-12-17 15:10           ` Dmitry Vyukov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CACT4Y+YMYogSo+Wq=29A7fKC9hufsc_DwLrneOKtsefZP-9h6g@mail.gmail.com' \
    --to=dvyukov@google.com \
    --cc=aryabinin@virtuozzo.com \
    --cc=glider@google.com \
    --cc=kasan-dev@googlegroups.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=luto@kernel.org \
    --cc=mark.rutland@arm.com \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.