On Fri, Oct 02, 2020 at 09:31PM +0200, Jann Horn wrote: [...] > > > > > > If !CONFIG_HAVE_ARCH_KFENCE_STATIC_POOL, this should probably always > > > return false if __kfence_pool is NULL, right? > > > > That's another check; we don't want to make this more expensive. > > Ah, right, I missed that this is the one piece of KFENCE that is > actually really hot code until Dmitry pointed that out. > > But actually, can't you reduce how hot this is for SLUB by moving > is_kfence_address() down into the freeing slowpath? At the moment you > use it in slab_free_freelist_hook(), which is in the super-hot > fastpath, but you should be able to at least move it down into > __slab_free()... > > Actually, you already have hooked into __slab_free(), so can't you > just get rid of the check in the slab_free_freelist_hook()? > > Also, you could do the NULL *after* the range check said "true". That > way the NULL check would be on the slowpath and have basically no > performance impact. True; let's try to do that then, and hope the few extra instructions do not hurt us. > > This should never receive a NULL, given the places it's used from, which > > should only be allocator internals where we already know we have a > > non-NULL object. If it did receive a NULL, I think something else is > > wrong. Or did we miss a place where it can legally receive a NULL? > > Well... not exactly "legally", but e.g. a kernel NULL deref (landing > in kfence_handle_page_fault()) might get weird. > > [...] > > > > + access, use-after-free, and invalid-free errors. KFENCE is designed > > > > + to have negligible cost to permit enabling it in production > > > > + environments. > > > [...] > > > > diff --git a/mm/kfence/core.c b/mm/kfence/core.c > > > [...] > > > > +module_param_named(sample_interval, kfence_sample_interval, ulong, 0600); > > > > > > This is a writable module parameter, but if the sample interval was 0 > > > or a very large value, changing this value at runtime won't actually > > > change the effective interval because the work item will never get > > > kicked off again, right? > > > > When KFENCE has been enabled, setting this to 0 actually reschedules the > > work immediately; we do not disable KFENCE once it has been enabled. > > Those are weird semantics. One value should IMO unambiguously mean one > thing, independent of when it was set. In particular, I think that if > someone decides to read the current value of kfence_sample_interval > through sysfs, and sees the value "0", that should not ambiguously > mean "either kfence triggers all the time or it is completely off". > > If you don't want to support runtime disabling, can you maybe make the > handler refuse to write 0 if kfence has already been initialized? I could live with 0 being rejected; will change it. (I personally had used piping 0 at runtime to stress test, but perhaps if it's only devs doing it we can just change the code for debugging/testing.) > [...] > > > > +#endif > > > [...] > > > > +/* Freelist with available objects. */ > > > > +static struct list_head kfence_freelist = LIST_HEAD_INIT(kfence_freelist); > > > > +static DEFINE_RAW_SPINLOCK(kfence_freelist_lock); /* Lock protecting freelist. */ > > > [...] > > > > +/* Gates the allocation, ensuring only one succeeds in a given period. */ > > > > +static atomic_t allocation_gate = ATOMIC_INIT(1); > > > > > > I don't think you need to initialize this to anything? > > > toggle_allocation_gate() will set it to zero before enabling the > > > static key, so I don't think anyone will ever see this value. > > > > Sure. But does it hurt anyone? At least this way we don't need to think > > about yet another state that only exists on initialization; who knows > > what we'll change in future. > > Well, no, it doesn't hurt. But I see this as equivalent to writing code like: > > int ret = 0; > ret = -EINVAL; > if (...) > return ret; > > where a write can never have any effect because a second write will > clobber the value before it can be read, which is IMO an antipattern. Agree fully ^ Just being defensive with global states that can potentially be read for other purposes before toggle_allocation_gate(); I think elsewhere you e.g. suggested to use allocation_gate for the IPI optimization. It's these types of changes that depend on our global states, where making the initial state non-special just saves us trouble. > But it admittedly is less clear here, so if you like it better your > way, I don't really have a problem with that. [...] > [...] > > > > +{ > > > > + unsigned long addr; > > > > + > > > > + lockdep_assert_held(&meta->lock); > > > > + > > > > + for (addr = ALIGN_DOWN(meta->addr, PAGE_SIZE); addr < meta->addr; addr++) { > > > > + if (!fn((u8 *)addr)) > > > > + break; > > > > + } > > > > + > > > > + for (addr = meta->addr + meta->size; addr < PAGE_ALIGN(meta->addr); addr++) { > > > > > > Hmm... if the object is on the left side (meaning meta->addr is > > > page-aligned) and the padding is on the right side, won't > > > PAGE_ALIGN(meta->addr)==meta->addr , and therefore none of the padding > > > will be checked? > > > > No, you're thinking of ALIGN_DOWN. PAGE_ALIGN gives us the next page. > > Hm, really? Let me go through those macros... > > > #define __AC(X,Y) (X##Y) > #define _AC(X,Y) __AC(X,Y) > #define PAGE_SHIFT 12 > #define PAGE_SIZE (_AC(1,UL) << PAGE_SHIFT) > > so: > PAGE_SIZE == (1UL << 12) == 0x1000UL > > #define __ALIGN_KERNEL_MASK(x, mask) (((x) + (mask)) & ~(mask)) > #define __ALIGN_KERNEL(x, a) __ALIGN_KERNEL_MASK(x, (typeof(x))(a) - 1) > #define ALIGN(x, a) __ALIGN_KERNEL((x), (a)) > > so (omitting casts): > ALIGN(x, a) == ((x + (a - 1)) & ~(a - 1)) > > #define PAGE_ALIGN(addr) ALIGN(addr, PAGE_SIZE) > > so (omitting casts): > PAGE_ALIGN(addr) == ((addr + (0x1000UL - 1)) & ~(0x1000UL - 1)) > == ((addr + 0xfffUL) & 0xfffffffffffff000UL) > > meaning that if we e.g. pass in 0x5000, we get: > > PAGE_ALIGN(0x5000) == ((0x5000 + 0xfffUL) & 0xfffffffffffff000UL) > == 0x5fffUL & 0xfffffffffffff000UL == 0x5000UL > > So if the object is on the left side (meaning meta->addr is > page-aligned), we won't check padding. > > > ALIGN_DOWN rounds down, while PAGE_ALIGN rounds up, but both leave the > value as-is if it is already page-aligned. Ah, yes, sorry about that; I confused myself with the comment above PAGE_ALIGN. We'll fix this. And add a test. :-) Thanks, -- Marco