From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755523AbaIZP4S (ORCPT ); Fri, 26 Sep 2014 11:56:18 -0400 Received: from mail-qa0-f53.google.com ([209.85.216.53]:45088 "EHLO mail-qa0-f53.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754654AbaIZP4R (ORCPT ); Fri, 26 Sep 2014 11:56:17 -0400 MIME-Version: 1.0 In-Reply-To: References: <1404905415-9046-1-git-send-email-a.ryabinin@samsung.com> <1411562649-28231-1-git-send-email-a.ryabinin@samsung.com> <1411562649-28231-10-git-send-email-a.ryabinin@samsung.com> From: Dmitry Vyukov Date: Fri, 26 Sep 2014 08:55:55 -0700 Message-ID: Subject: Re: [PATCH v3 09/13] mm: slub: add kernel address sanitizer support for slub allocator To: Christoph Lameter Cc: Andrey Ryabinin , LKML , Konstantin Serebryany , Dmitry Chernenkov , Andrey Konovalov , Yuri Gribov , Konstantin Khlebnikov , Sasha Levin , Joonsoo Kim , Andrew Morton , Dave Hansen , Andi Kleen , Vegard Nossum , "H. Peter Anvin" , Dave Jones , x86@kernel.org, linux-mm@kvack.org, Pekka Enberg , David Rientjes Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 26, 2014 at 7:22 AM, Christoph Lameter wrote: > On Thu, 25 Sep 2014, Dmitry Vyukov wrote: > >> > + depends on SLUB_DEBUG >> >> >> What does SLUB_DEBUG do? I think that generally we don't want any >> other *heavy* debug checks to be required for kasan. > > SLUB_DEBUG includes the capabilties for debugging. It does not switch > debug on by default. SLUB_DEBUG_ON will results in a kernel that boots > with active debugging. Without SLUB_DEBUG_ON a kernel parameter activates > debugging. Ack thanks for explanation >> > +{ >> > + unsigned long size = cache->size; >> > + unsigned long rounded_up_size = round_up(size, KASAN_SHADOW_SCALE_SIZE); >> > + >> >> Add a comment saying that SLAB_DESTROY_BY_RCU objects can be "legally" >> used after free. > > Add "within the rcu period" > >> > static struct page *new_slab(struct kmem_cache *s, gfp_t flags, int node) >> > @@ -1416,8 +1426,10 @@ static struct page *new_slab(struct kmem_cache *s, gfp_t flags, int node) >> > setup_object(s, page, p); >> > if (likely(idx < page->objects)) >> > set_freepointer(s, p, p + s->size); >> >> Sorry, I don't fully follow this code, so I will just ask some questions. >> Can we have some slab padding after last object in this case as well? > > This is the free case. If poisoing is enabled then the object will be > overwritten on free. Padding is used depending on the need to align the > object and is optional. Redzoning will occur if requested. Are you asking > for redzoning? I am not asking for redzoning yet. >> kasan_mark_slab_padding poisons only up to end of the page. Can there >> be multiple pages that we need to poison? > > If there is a higher order page then only the end portion needs to be > poisoned. Objects may straddle order 0 boundaries then. >