Commit 19da3dd1 authored by David Rientjes's avatar David Rientjes Committed by Linus Torvalds

flex_array: poison free elements

Newly initialized flex_array's and/or flex_array_part's are now poisoned
with a new poison value, FLEX_ARRAY_FREE.  It's value is similar to
POISON_FREE used in the various slab allocators, but is different to
distinguish between flex array's poisoned kmem and slab allocator poisoned
kmem.

This will allow us to identify flex_array_part's that only contain free
elements (and free them with an addition to the flex_array API).  This
could also be extended in the future to identify `get' uses on elements
that have not been `put'.

If __GFP_ZERO is passed for a part's gfp mask, the poisoning is avoided.
These elements are considered to be in-use since they have been
initialized.
Signed-off-by: default avatarDavid Rientjes <rientjes@google.com>
Cc: Dave Hansen <dave@linux.vnet.ibm.com>
Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
parent e6de3988
...@@ -65,6 +65,9 @@ ...@@ -65,6 +65,9 @@
#define MUTEX_DEBUG_INIT 0x11 #define MUTEX_DEBUG_INIT 0x11
#define MUTEX_DEBUG_FREE 0x22 #define MUTEX_DEBUG_FREE 0x22
/********** lib/flex_array.c **********/
#define FLEX_ARRAY_FREE 0x6c /* for use-after-free poisoning */
/********** security/ **********/ /********** security/ **********/
#define KEY_DESTROY 0xbd #define KEY_DESTROY 0xbd
......
...@@ -113,6 +113,8 @@ struct flex_array *flex_array_alloc(int element_size, unsigned int total, ...@@ -113,6 +113,8 @@ struct flex_array *flex_array_alloc(int element_size, unsigned int total,
return NULL; return NULL;
ret->element_size = element_size; ret->element_size = element_size;
ret->total_nr_elements = total; ret->total_nr_elements = total;
if (elements_fit_in_base(ret) && !(flags & __GFP_ZERO))
memset(ret->parts[0], FLEX_ARRAY_FREE, bytes_left_in_base());
return ret; return ret;
} }
...@@ -159,15 +161,12 @@ __fa_get_part(struct flex_array *fa, int part_nr, gfp_t flags) ...@@ -159,15 +161,12 @@ __fa_get_part(struct flex_array *fa, int part_nr, gfp_t flags)
{ {
struct flex_array_part *part = fa->parts[part_nr]; struct flex_array_part *part = fa->parts[part_nr];
if (!part) { if (!part) {
/* part = kmalloc(sizeof(struct flex_array_part), flags);
* This leaves the part pages uninitialized
* and with potentially random data, just
* as if the user had kmalloc()'d the whole.
* __GFP_ZERO can be used to zero it.
*/
part = kmalloc(FLEX_ARRAY_PART_SIZE, flags);
if (!part) if (!part)
return NULL; return NULL;
if (!(flags & __GFP_ZERO))
memset(part, FLEX_ARRAY_FREE,
sizeof(struct flex_array_part));
fa->parts[part_nr] = part; fa->parts[part_nr] = part;
} }
return part; return part;
...@@ -228,7 +227,7 @@ int flex_array_clear(struct flex_array *fa, unsigned int element_nr) ...@@ -228,7 +227,7 @@ int flex_array_clear(struct flex_array *fa, unsigned int element_nr)
return -EINVAL; return -EINVAL;
} }
dst = &part->elements[index_inside_part(fa, element_nr)]; dst = &part->elements[index_inside_part(fa, element_nr)];
memset(dst, 0, fa->element_size); memset(dst, FLEX_ARRAY_FREE, fa->element_size);
return 0; return 0;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment