summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMarco Elver <elver@google.com>2021-03-17 09:47:40 +0100
committerSung-hun Kim <sfoon.kim@samsung.com>2021-10-20 10:17:15 +0900
commit2c223d5a64a33385934963e25666aa70f81e7a86 (patch)
tree0008ce361c727243c0bb6eaa28674eea7dd55fc8
parentd16b578a2d4d09a1ff11eaf4124152c6e31a663b (diff)
downloadlinux-rpi-sandbox/sebuns2/apply_kfence.tar.gz
linux-rpi-sandbox/sebuns2/apply_kfence.tar.bz2
linux-rpi-sandbox/sebuns2/apply_kfence.zip
kfence: make compatible with kmemleaksandbox/sebuns2/apply_kfence
Because memblock allocations are registered with kmemleak, the KFENCE pool was seen by kmemleak as one large object. Later allocations through kfence_alloc() that were registered with kmemleak via slab_post_alloc_hook() would then overlap and trigger a warning. Therefore, once the pool is initialized, we can remove (free) it from kmemleak again, since it should be treated as allocator-internal and be seen as "free memory". The second problem is that kmemleak is passed the rounded size, and not the originally requested size, which is also the size of KFENCE objects. To avoid kmemleak scanning past the end of an object and trigger a KFENCE out-of-bounds error, fix the size if it is a KFENCE object. For simplicity, to avoid a call to kfence_ksize() in slab_post_alloc_hook() (and avoid new IS_ENABLED(CONFIG_DEBUG_KMEMLEAK) guard), just call kfence_ksize() in mm/kmemleak.c:create_object(). Change-Id: Id820bc92f5fa8ca766b63c64101bdc7f13f96a46 Reported-by: Luis Henriques <lhenriques@suse.de> Cc: Catalin Marinas <catalin.marinas@arm.com> Signed-off-by: Marco Elver <elver@google.com> Reviewed-by: Catalin Marinas <catalin.marinas@arm.com> Tested-by: Luis Henriques <lhenriques@suse.de>
-rw-r--r--mm/kfence/core.c9
-rw-r--r--mm/kmemleak.c3
2 files changed, 11 insertions, 1 deletions
diff --git a/mm/kfence/core.c b/mm/kfence/core.c
index e6d2e6e22d13..f2b0c008a473 100644
--- a/mm/kfence/core.c
+++ b/mm/kfence/core.c
@@ -7,6 +7,7 @@
#include <linux/debugfs.h>
#include <linux/kcsan-checks.h>
#include <linux/kfence.h>
+#include <linux/kmemleak.h>
#include <linux/list.h>
#include <linux/lockdep.h>
#include <linux/memblock.h>
@@ -476,6 +477,14 @@ static bool __init kfence_init_pool(void)
addr += 2 * PAGE_SIZE;
}
+ /*
+ * The pool is live and will never be deallocated from this point on.
+ * Remove the pool object from the kmemleak object tree, as it would
+ * otherwise overlap with allocations returned by kfence_alloc(), which
+ * are registered with kmemleak through the slab post-alloc hook.
+ */
+ kmemleak_free(__kfence_pool);
+
return true;
err:
diff --git a/mm/kmemleak.c b/mm/kmemleak.c
index c0014d3b91c1..fe6e3ae8e8c6 100644
--- a/mm/kmemleak.c
+++ b/mm/kmemleak.c
@@ -97,6 +97,7 @@
#include <linux/atomic.h>
#include <linux/kasan.h>
+#include <linux/kfence.h>
#include <linux/kmemleak.h>
#include <linux/memory_hotplug.h>
@@ -589,7 +590,7 @@ static struct kmemleak_object *create_object(unsigned long ptr, size_t size,
atomic_set(&object->use_count, 1);
object->flags = OBJECT_ALLOCATED;
object->pointer = ptr;
- object->size = size;
+ object->size = kfence_ksize((void *)ptr) ?: size;
object->excess_ref = 0;
object->min_count = min_count;
object->count = 0; /* white color initially */