Re: [PATCH] kasan: record timestamp of memory allocation/free

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, May 2, 2018 at 12:58 PM, Tetsuo Handa
<penguin-kernel@xxxxxxxxxxxxxxxxxxx> wrote:
> syzbot is reporting many refcount/use-after-free bugs along with flood of
> memory allocation fault injection messages. Showing timestamp of memory
> allocation/free would help narrowing down kernel messages to examine.
>
> Revive timestamp field which was removed by commit cd11016e5f5212c1
> ("mm, kasan: stackdepot implementation. Enable stackdepot for SLAB").

Hi Tetsuo,

Header real estate is very expensive as it directly contributes to
KASAN memory overhead. We dropped time on purpose to keep header 16
bytes. This doubles it to 32 bytes per heap object. Before we start
putting more stuff  in there, we need to move free-related meta data
into object itself (as it's not used after free) as it was before.

There is also this improvement that also has plans on any spare space in header:
https://bugzilla.kernel.org/show_bug.cgi?id=198437
I would say that rcu_call stack is more important as actual free stack
is usually meaningless for async-freed objects.


> Signed-off-by: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
> Cc: Alexander Potapenko <glider@xxxxxxxxxx>
> Cc: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
> Cc: Christoph Lameter <cl@xxxxxxxxx>
> Cc: Pekka Enberg <penberg@xxxxxxxxxx>
> Cc: David Rientjes <rientjes@xxxxxxxxxx>
> Cc: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
> Cc: Andrey Konovalov <adech.fo@xxxxxxxxx>
> Cc: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
> Cc: Steven Rostedt <rostedt@xxxxxxxxxxx>
> Cc: Konstantin Serebryany <kcc@xxxxxxxxxx>
> Cc: Dmitry Chernenkov <dmitryc@xxxxxxxxxx>
> ---
>  mm/kasan/kasan.c  | 1 +
>  mm/kasan/kasan.h  | 1 +
>  mm/kasan/report.c | 3 ++-
>  3 files changed, 4 insertions(+), 1 deletion(-)
>
> diff --git a/mm/kasan/kasan.c b/mm/kasan/kasan.c
> index 135ce28..a336834 100644
> --- a/mm/kasan/kasan.c
> +++ b/mm/kasan/kasan.c
> @@ -457,6 +457,7 @@ static inline depot_stack_handle_t save_stack(gfp_t flags)
>  static inline void set_track(struct kasan_track *track, gfp_t flags)
>  {
>         track->pid = current->pid;
> +       track->when = jiffies;
>         track->stack = save_stack(flags);
>  }
>
> diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h
> index c12dcfd..0e4951b 100644
> --- a/mm/kasan/kasan.h
> +++ b/mm/kasan/kasan.h
> @@ -77,6 +77,7 @@ struct kasan_global {
>  struct kasan_track {
>         u32 pid;
>         depot_stack_handle_t stack;
> +       unsigned long when;
>  };
>
>  struct kasan_alloc_meta {
> diff --git a/mm/kasan/report.c b/mm/kasan/report.c
> index 5c169aa..062c8ae 100644
> --- a/mm/kasan/report.c
> +++ b/mm/kasan/report.c
> @@ -183,7 +183,8 @@ static void kasan_end_report(unsigned long *flags)
>
>  static void print_track(struct kasan_track *track, const char *prefix)
>  {
> -       pr_err("%s by task %u:\n", prefix, track->pid);
> +       pr_err("%s by task %u (%lu jiffies ago):\n", prefix, track->pid,
> +              jiffies - track->when);
>         if (track->stack) {
>                 struct stack_trace trace;
>
> --
> 1.8.3.1
>




[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux