From patchwork Thu Jan 26 07:04:47 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Christophe Leroy X-Patchwork-Id: 13116702 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id C66ECC05027 for ; Thu, 26 Jan 2023 07:08:24 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id E01B36B0071; Thu, 26 Jan 2023 02:08:23 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id D8B166B0072; Thu, 26 Jan 2023 02:08:23 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C2C556B0073; Thu, 26 Jan 2023 02:08:23 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id AD9796B0071 for ; Thu, 26 Jan 2023 02:08:23 -0500 (EST) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 75C78A02D9 for ; Thu, 26 Jan 2023 07:08:23 +0000 (UTC) X-FDA: 80396071686.21.FD97864 Received: from pegase2.c-s.fr (pegase2.c-s.fr [93.17.235.10]) by imf11.hostedemail.com (Postfix) with ESMTP id 3EEBD40002 for ; Thu, 26 Jan 2023 07:08:19 +0000 (UTC) Authentication-Results: imf11.hostedemail.com; dkim=none; dmarc=pass (policy=quarantine) header.from=csgroup.eu; spf=pass (imf11.hostedemail.com: domain of christophe.leroy@csgroup.eu designates 93.17.235.10 as permitted sender) smtp.mailfrom=christophe.leroy@csgroup.eu ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1674716900; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:references; bh=NnEClH9buGlde9xoDbgRujb6/SO7GUV1JxVEplD1JL4=; b=5P5YYQlSdf5oRM69YintsMONruLfEM7e3r2+KadJ2qfHGcddforZPvQzoxo/WdrIvlvv/z Gpw5/Mwf5QD1buyUx+AIHxUOZhWv9z82G07nf3Q3VQ8Ykw/Ugw2Xrcqv0ussuuh/DhEUc0 05KJBcIBP2pAOxwbHrhTvP5JS9wiX0k= ARC-Authentication-Results: i=1; imf11.hostedemail.com; dkim=none; dmarc=pass (policy=quarantine) header.from=csgroup.eu; spf=pass (imf11.hostedemail.com: domain of christophe.leroy@csgroup.eu designates 93.17.235.10 as permitted sender) smtp.mailfrom=christophe.leroy@csgroup.eu ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1674716900; a=rsa-sha256; cv=none; b=x0OcdnsY+lbzaRHIkqUripGjz3euPWYcD2R8Ut8uyQoUPwXe/nbR2o5+YIvQckPzuuWOSL cx+6tJ4n2twQg8SaW5ZLWCz5fMAR4q7IofH2d2YQYYPenhBCTEwYMrERlaxoKzgnhszO7t OvxsO2nl8uO0rseDa4Y70+8JWjIk9sI= Received: from localhost (mailhub3.si.c-s.fr [172.26.127.67]) by localhost (Postfix) with ESMTP id 4P2WyB0M6Yz9sd7; Thu, 26 Jan 2023 08:08:18 +0100 (CET) X-Virus-Scanned: amavisd-new at c-s.fr Received: from pegase2.c-s.fr ([172.26.127.65]) by localhost (pegase2.c-s.fr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zR25zrkcDSUr; Thu, 26 Jan 2023 08:08:17 +0100 (CET) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase2.c-s.fr (Postfix) with ESMTP id 4P2Wy863Mpz9sdB; Thu, 26 Jan 2023 08:08:16 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id BF56E8B76D; Thu, 26 Jan 2023 08:08:16 +0100 (CET) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id 2SJtYN5JNx8I; Thu, 26 Jan 2023 08:08:16 +0100 (CET) Received: from PO20335.IDSI0.si.c-s.fr (unknown [192.168.5.2]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 800A48B763; Thu, 26 Jan 2023 08:08:16 +0100 (CET) Received: from PO20335.IDSI0.si.c-s.fr (localhost [127.0.0.1]) by PO20335.IDSI0.si.c-s.fr (8.17.1/8.16.1) with ESMTPS id 30Q74xEu2764291 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Thu, 26 Jan 2023 08:04:59 +0100 Received: (from chleroy@localhost) by PO20335.IDSI0.si.c-s.fr (8.17.1/8.17.1/Submit) id 30Q74uJB2764288; Thu, 26 Jan 2023 08:04:56 +0100 X-Authentication-Warning: PO20335.IDSI0.si.c-s.fr: chleroy set sender to christophe.leroy@csgroup.eu using -f From: Christophe Leroy To: Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Vincenzo Frascino , Andrew Morton Cc: Christophe Leroy , linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-mm@kvack.org, kasan-dev@googlegroups.com, Nathan Lynch , Michael Ellerman Subject: [PATCH] kasan: Fix Oops due to missing calls to kasan_arch_is_ready() Date: Thu, 26 Jan 2023 08:04:47 +0100 Message-Id: <150768c55722311699fdcf8f5379e8256749f47d.1674716617.git.christophe.leroy@csgroup.eu> X-Mailer: git-send-email 2.38.1 MIME-Version: 1.0 X-Developer-Signature: v=1; a=ed25519-sha256; t=1674716683; l=7054; s=20211009; h=from:subject:message-id; bh=GpOaHGWHkRLK3w+qELfaGMG8mIxKwVDUBSOVaCUA3e0=; b=ur0fVC6TvQtoPHkKCNrcuxg4+ha3+GW2lsw3we8TWNoDIr2bcKf4t9U+usHU28Jq1T1cwH+xi8we gQ/xU8BbDUDZD3kTNEGCjWsEj23j+wSD3T9zmXq7qSmIg6Q5Wby+ X-Developer-Key: i=christophe.leroy@csgroup.eu; a=ed25519; pk=HIzTzUj91asvincQGOFx6+ZF5AoUuP9GdOtQChs7Mm0= X-Rspam-User: X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 3EEBD40002 X-Stat-Signature: kto9cqcnytykq1ciigz68hemy6c7wii6 X-HE-Tag: 1674716899-403385 X-HE-Meta: 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 ZSVkkG4e mCgAFPxIeQziOiiQ66Wb1mrQuELBuZHx0f0VsUz7f+9lFbzj0CRNloMyYlcXyYFi1UsoNAMdXfI25B3vzvzXCjWxb9TuvZOM7KcSSVybuBBLfbUGnvoPxBnmwaAfp8bfhfz4mAdAM5wQONVr9qFt2KniR9c5C+pbWuWBQeofcVDX7J226t8EKoG10n3YPnAOM5Ht38MGku19x82gHFNR+x7U3PfyLDov1VpO1OClr5DF3u49Zes0kdiqwTeKGj1ZNGtHt95+f6fVMA0kjlUhP9JkwcaBqUs//+tg4HpxaKVkcIXblG/GNWxu2q+Hsssx17YEY4kJQYllMtjTXHsyIFcmQ9y9XCN/gMhhHK42dJxJ+gyty28+AkbGkOvqlRr2mS8VR X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On powerpc64, you can build a kernel with KASAN as soon as you build it with RADIX MMU support. However if the CPU doesn't have RADIX MMU, KASAN isn't enabled at init and the following Oops is encountered. [ 0.000000][ T0] KASAN not enabled as it requires radix! [ 4.484295][ T26] BUG: Unable to handle kernel data access at 0xc00e000000804a04 [ 4.485270][ T26] Faulting instruction address: 0xc00000000062ec6c [ 4.485748][ T26] Oops: Kernel access of bad area, sig: 11 [#1] [ 4.485920][ T26] BE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries [ 4.486259][ T26] Modules linked in: [ 4.486637][ T26] CPU: 0 PID: 26 Comm: kworker/u2:2 Not tainted 6.2.0-rc3-02590-gf8a023b0a805 #249 [ 4.486907][ T26] Hardware name: IBM pSeries (emulated by qemu) POWER9 (raw) 0x4e1200 0xf000005 of:SLOF,HEAD pSeries [ 4.487445][ T26] Workqueue: eval_map_wq .tracer_init_tracefs_work_func [ 4.488744][ T26] NIP: c00000000062ec6c LR: c00000000062bb84 CTR: c0000000002ebcd0 [ 4.488867][ T26] REGS: c0000000049175c0 TRAP: 0380 Not tainted (6.2.0-rc3-02590-gf8a023b0a805) [ 4.489028][ T26] MSR: 8000000002009032 CR: 44002808 XER: 00000000 [ 4.489584][ T26] CFAR: c00000000062bb80 IRQMASK: 0 [ 4.489584][ T26] GPR00: c0000000005624d4 c000000004917860 c000000001cfc000 1800000000804a04 [ 4.489584][ T26] GPR04: c0000000003a2650 0000000000000cc0 c00000000000d3d8 c00000000000d3d8 [ 4.489584][ T26] GPR08: c0000000049175b0 a80e000000000000 0000000000000000 0000000017d78400 [ 4.489584][ T26] GPR12: 0000000044002204 c000000003790000 c00000000435003c c0000000043f1c40 [ 4.489584][ T26] GPR16: c0000000043f1c68 c0000000043501a0 c000000002106138 c0000000043f1c08 [ 4.489584][ T26] GPR20: c0000000043f1c10 c0000000043f1c20 c000000004146c40 c000000002fdb7f8 [ 4.489584][ T26] GPR24: c000000002fdb834 c000000003685e00 c000000004025030 c000000003522e90 [ 4.489584][ T26] GPR28: 0000000000000cc0 c0000000003a2650 c000000004025020 c000000004025020 [ 4.491201][ T26] NIP [c00000000062ec6c] .kasan_byte_accessible+0xc/0x20 [ 4.491430][ T26] LR [c00000000062bb84] .__kasan_check_byte+0x24/0x90 [ 4.491767][ T26] Call Trace: [ 4.491941][ T26] [c000000004917860] [c00000000062ae70] .__kasan_kmalloc+0xc0/0x110 (unreliable) [ 4.492270][ T26] [c0000000049178f0] [c0000000005624d4] .krealloc+0x54/0x1c0 [ 4.492453][ T26] [c000000004917990] [c0000000003a2650] .create_trace_option_files+0x280/0x530 [ 4.492613][ T26] [c000000004917a90] [c000000002050d90] .tracer_init_tracefs_work_func+0x274/0x2c0 [ 4.492771][ T26] [c000000004917b40] [c0000000001f9948] .process_one_work+0x578/0x9f0 [ 4.492927][ T26] [c000000004917c30] [c0000000001f9ebc] .worker_thread+0xfc/0x950 [ 4.493084][ T26] [c000000004917d60] [c00000000020be84] .kthread+0x1a4/0x1b0 [ 4.493232][ T26] [c000000004917e10] [c00000000000d3d8] .ret_from_kernel_thread+0x58/0x60 [ 4.495642][ T26] Code: 60000000 7cc802a6 38a00000 4bfffc78 60000000 7cc802a6 38a00001 4bfffc68 60000000 3d20a80e 7863e8c2 792907c6 <7c6348ae> 20630007 78630fe0 68630001 [ 4.496704][ T26] ---[ end trace 0000000000000000 ]--- The Oops is due to kasan_byte_accessible() not checking the readiness of KASAN. Add missing call to kasan_arch_is_ready() and bail out when not ready. The same problem is observed with ____kasan_kfree_large() so fix it the same. Also, as KASAN is not available and no shadow area is allocated for linear memory mapping, there is no point in allocating shadow mem for vmalloc memory as shown below in /sys/kernel/debug/kernel_page_tables ---[ kasan shadow mem start ]--- 0xc00f000000000000-0xc00f00000006ffff 0x00000000040f0000 448K r w pte valid present dirty accessed 0xc00f000000860000-0xc00f00000086ffff 0x000000000ac10000 64K r w pte valid present dirty accessed 0xc00f3ffffffe0000-0xc00f3fffffffffff 0x0000000004d10000 128K r w pte valid present dirty accessed ---[ kasan shadow mem end ]--- So, also verify KASAN readiness before allocating and poisoning shadow mem for VMAs. Reported-by: Nathan Lynch Suggested-by: Michael Ellerman Signed-off-by: Christophe Leroy --- mm/kasan/common.c | 3 +++ mm/kasan/generic.c | 7 ++++++- mm/kasan/shadow.c | 12 ++++++++++++ 3 files changed, 21 insertions(+), 1 deletion(-) diff --git a/mm/kasan/common.c b/mm/kasan/common.c index 833bf2cfd2a3..21e66d7f261d 100644 --- a/mm/kasan/common.c +++ b/mm/kasan/common.c @@ -246,6 +246,9 @@ bool __kasan_slab_free(struct kmem_cache *cache, void *object, static inline bool ____kasan_kfree_large(void *ptr, unsigned long ip) { + if (!kasan_arch_is_ready()) + return false; + if (ptr != page_address(virt_to_head_page(ptr))) { kasan_report_invalid_free(ptr, ip, KASAN_REPORT_INVALID_FREE); return true; diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c index b076f597a378..cb762982c8ba 100644 --- a/mm/kasan/generic.c +++ b/mm/kasan/generic.c @@ -191,7 +191,12 @@ bool kasan_check_range(unsigned long addr, size_t size, bool write, bool kasan_byte_accessible(const void *addr) { - s8 shadow_byte = READ_ONCE(*(s8 *)kasan_mem_to_shadow(addr)); + s8 shadow_byte; + + if (!kasan_arch_is_ready()) + return true; + + shadow_byte = READ_ONCE(*(s8 *)kasan_mem_to_shadow(addr)); return shadow_byte >= 0 && shadow_byte < KASAN_GRANULE_SIZE; } diff --git a/mm/kasan/shadow.c b/mm/kasan/shadow.c index 2fba1f51f042..15cfb34d16a1 100644 --- a/mm/kasan/shadow.c +++ b/mm/kasan/shadow.c @@ -291,6 +291,9 @@ int kasan_populate_vmalloc(unsigned long addr, unsigned long size) unsigned long shadow_start, shadow_end; int ret; + if (!kasan_arch_is_ready()) + return 0; + if (!is_vmalloc_or_module_addr((void *)addr)) return 0; @@ -459,6 +462,9 @@ void kasan_release_vmalloc(unsigned long start, unsigned long end, unsigned long region_start, region_end; unsigned long size; + if (!kasan_arch_is_ready()) + return; + region_start = ALIGN(start, KASAN_MEMORY_PER_SHADOW_PAGE); region_end = ALIGN_DOWN(end, KASAN_MEMORY_PER_SHADOW_PAGE); @@ -502,6 +508,9 @@ void *__kasan_unpoison_vmalloc(const void *start, unsigned long size, * with setting memory tags, so the KASAN_VMALLOC_INIT flag is ignored. */ + if (!kasan_arch_is_ready()) + return (void *)start; + if (!is_vmalloc_or_module_addr(start)) return (void *)start; @@ -524,6 +533,9 @@ void *__kasan_unpoison_vmalloc(const void *start, unsigned long size, */ void __kasan_poison_vmalloc(const void *start, unsigned long size) { + if (!kasan_arch_is_ready()) + return; + if (!is_vmalloc_or_module_addr(start)) return;