summaryrefslogtreecommitdiffstats
path: root/include/linux/kasan.h
diff options
context:
space:
mode:
authorAlexander Potapenko <glider@google.com>2016-05-20 19:59:11 -0400
committerLinus Torvalds <torvalds@linux-foundation.org>2016-05-20 20:58:30 -0400
commit55834c59098d0c5a97b0f3247e55832b67facdcf (patch)
tree1fc63661f51c68e9b0aac76cb8ae6be3bea85133 /include/linux/kasan.h
parentb8f1a75d61d8405a753380c6fb17ba84a5603cd4 (diff)
mm: kasan: initial memory quarantine implementation
Quarantine isolates freed objects in a separate queue. The objects are returned to the allocator later, which helps to detect use-after-free errors. When the object is freed, its state changes from KASAN_STATE_ALLOC to KASAN_STATE_QUARANTINE. The object is poisoned and put into quarantine instead of being returned to the allocator, therefore every subsequent access to that object triggers a KASAN error, and the error handler is able to say where the object has been allocated and deallocated. When it's time for the object to leave quarantine, its state becomes KASAN_STATE_FREE and it's returned to the allocator. From now on the allocator may reuse it for another allocation. Before that happens, it's still possible to detect a use-after free on that object (it retains the allocation/deallocation stacks). When the allocator reuses this object, the shadow is unpoisoned and old allocation/deallocation stacks are wiped. Therefore a use of this object, even an incorrect one, won't trigger ASan warning. Without the quarantine, it's not guaranteed that the objects aren't reused immediately, that's why the probability of catching a use-after-free is lower than with quarantine in place. Quarantine isolates freed objects in a separate queue. The objects are returned to the allocator later, which helps to detect use-after-free errors. Freed objects are first added to per-cpu quarantine queues. When a cache is destroyed or memory shrinking is requested, the objects are moved into the global quarantine queue. Whenever a kmalloc call allows memory reclaiming, the oldest objects are popped out of the global queue until the total size of objects in quarantine is less than 3/4 of the maximum quarantine size (which is a fraction of installed physical memory). As long as an object remains in the quarantine, KASAN is able to report accesses to it, so the chance of reporting a use-after-free is increased. Once the object leaves quarantine, the allocator may reuse it, in which case the object is unpoisoned and KASAN can't detect incorrect accesses to it. Right now quarantine support is only enabled in SLAB allocator. Unification of KASAN features in SLAB and SLUB will be done later. This patch is based on the "mm: kasan: quarantine" patch originally prepared by Dmitry Chernenkov. A number of improvements have been suggested by Andrey Ryabinin. [glider@google.com: v9] Link: http://lkml.kernel.org/r/1462987130-144092-1-git-send-email-glider@google.com Signed-off-by: Alexander Potapenko <glider@google.com> Cc: Christoph Lameter <cl@linux.com> Cc: Pekka Enberg <penberg@kernel.org> Cc: David Rientjes <rientjes@google.com> Cc: Joonsoo Kim <iamjoonsoo.kim@lge.com> Cc: Andrey Konovalov <adech.fo@gmail.com> Cc: Dmitry Vyukov <dvyukov@google.com> Cc: Andrey Ryabinin <ryabinin.a.a@gmail.com> Cc: Steven Rostedt <rostedt@goodmis.org> Cc: Konstantin Serebryany <kcc@google.com> Cc: Dmitry Chernenkov <dmitryc@google.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'include/linux/kasan.h')
-rw-r--r--include/linux/kasan.h13
1 files changed, 11 insertions, 2 deletions
diff --git a/include/linux/kasan.h b/include/linux/kasan.h
index 737371b56044..611927f5870d 100644
--- a/include/linux/kasan.h
+++ b/include/linux/kasan.h
@@ -50,6 +50,8 @@ void kasan_free_pages(struct page *page, unsigned int order);
50 50
51void kasan_cache_create(struct kmem_cache *cache, size_t *size, 51void kasan_cache_create(struct kmem_cache *cache, size_t *size,
52 unsigned long *flags); 52 unsigned long *flags);
53void kasan_cache_shrink(struct kmem_cache *cache);
54void kasan_cache_destroy(struct kmem_cache *cache);
53 55
54void kasan_poison_slab(struct page *page); 56void kasan_poison_slab(struct page *page);
55void kasan_unpoison_object_data(struct kmem_cache *cache, void *object); 57void kasan_unpoison_object_data(struct kmem_cache *cache, void *object);
@@ -63,7 +65,8 @@ void kasan_kmalloc(struct kmem_cache *s, const void *object, size_t size,
63void kasan_krealloc(const void *object, size_t new_size, gfp_t flags); 65void kasan_krealloc(const void *object, size_t new_size, gfp_t flags);
64 66
65void kasan_slab_alloc(struct kmem_cache *s, void *object, gfp_t flags); 67void kasan_slab_alloc(struct kmem_cache *s, void *object, gfp_t flags);
66void kasan_slab_free(struct kmem_cache *s, void *object); 68bool kasan_slab_free(struct kmem_cache *s, void *object);
69void kasan_poison_slab_free(struct kmem_cache *s, void *object);
67 70
68struct kasan_cache { 71struct kasan_cache {
69 int alloc_meta_offset; 72 int alloc_meta_offset;
@@ -88,6 +91,8 @@ static inline void kasan_free_pages(struct page *page, unsigned int order) {}
88static inline void kasan_cache_create(struct kmem_cache *cache, 91static inline void kasan_cache_create(struct kmem_cache *cache,
89 size_t *size, 92 size_t *size,
90 unsigned long *flags) {} 93 unsigned long *flags) {}
94static inline void kasan_cache_shrink(struct kmem_cache *cache) {}
95static inline void kasan_cache_destroy(struct kmem_cache *cache) {}
91 96
92static inline void kasan_poison_slab(struct page *page) {} 97static inline void kasan_poison_slab(struct page *page) {}
93static inline void kasan_unpoison_object_data(struct kmem_cache *cache, 98static inline void kasan_unpoison_object_data(struct kmem_cache *cache,
@@ -105,7 +110,11 @@ static inline void kasan_krealloc(const void *object, size_t new_size,
105 110
106static inline void kasan_slab_alloc(struct kmem_cache *s, void *object, 111static inline void kasan_slab_alloc(struct kmem_cache *s, void *object,
107 gfp_t flags) {} 112 gfp_t flags) {}
108static inline void kasan_slab_free(struct kmem_cache *s, void *object) {} 113static inline bool kasan_slab_free(struct kmem_cache *s, void *object)
114{
115 return false;
116}
117static inline void kasan_poison_slab_free(struct kmem_cache *s, void *object) {}
109 118
110static inline int kasan_module_alloc(void *addr, size_t size) { return 0; } 119static inline int kasan_module_alloc(void *addr, size_t size) { return 0; }
111static inline void kasan_free_shadow(const struct vm_struct *vm) {} 120static inline void kasan_free_shadow(const struct vm_struct *vm) {}