From: js1304@gmail.com To: Andrew Morton <akpm@linux-foundation.org> Cc: Andrey Ryabinin <aryabinin@virtuozzo.com>, Alexander Potapenko <glider@google.com>, Dmitry Vyukov <dvyukov@google.com>, kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Namhyung Kim <namhyung@kernel.org>, Wengang Wang <wen.gang.wang@oracle.com>, Joonsoo Kim <iamjoonsoo.kim@lge.com> Subject: [PATCH 01/18] mm/kasan: make some kasan functions global Date: Tue, 28 Nov 2017 16:48:36 +0900 [thread overview] Message-ID: <1511855333-3570-2-git-send-email-iamjoonsoo.kim@lge.com> (raw) In-Reply-To: <1511855333-3570-1-git-send-email-iamjoonsoo.kim@lge.com> From: Joonsoo Kim <iamjoonsoo.kim@lge.com> They will be used for the vchecker in the following patch. Make it non-static and add declairation in header files. Signed-off-by: Joonsoo Kim <iamjoonsoo.kim@lge.com> --- include/linux/kasan.h | 1 + mm/kasan/kasan.c | 2 +- mm/kasan/kasan.h | 2 ++ mm/kasan/report.c | 2 +- 4 files changed, 5 insertions(+), 2 deletions(-) diff --git a/include/linux/kasan.h b/include/linux/kasan.h index e3eb834..50f49fe 100644 --- a/include/linux/kasan.h +++ b/include/linux/kasan.h @@ -37,6 +37,7 @@ extern void kasan_enable_current(void); /* Disable reporting bugs for current task */ extern void kasan_disable_current(void); +void kasan_poison_shadow(const void *address, size_t size, u8 value); void kasan_unpoison_shadow(const void *address, size_t size); void kasan_unpoison_task_stack(struct task_struct *task); diff --git a/mm/kasan/kasan.c b/mm/kasan/kasan.c index 405bba4..2bcbdbd 100644 --- a/mm/kasan/kasan.c +++ b/mm/kasan/kasan.c @@ -54,7 +54,7 @@ void kasan_disable_current(void) * Poisons the shadow memory for 'size' bytes starting from 'addr'. * Memory addresses should be aligned to KASAN_SHADOW_SCALE_SIZE. */ -static void kasan_poison_shadow(const void *address, size_t size, u8 value) +void kasan_poison_shadow(const void *address, size_t size, u8 value) { void *shadow_start, *shadow_end; diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h index c70851a..b5d086d 100644 --- a/mm/kasan/kasan.h +++ b/mm/kasan/kasan.h @@ -99,6 +99,8 @@ static inline const void *kasan_shadow_to_mem(const void *shadow_addr) void kasan_report(unsigned long addr, size_t size, bool is_write, unsigned long ip); +void describe_object(struct kmem_cache *cache, void *object, + const void *addr); void kasan_report_double_free(struct kmem_cache *cache, void *object, void *ip); diff --git a/mm/kasan/report.c b/mm/kasan/report.c index 6bcfb01..b78735a 100644 --- a/mm/kasan/report.c +++ b/mm/kasan/report.c @@ -230,7 +230,7 @@ static void describe_object_addr(struct kmem_cache *cache, void *object, (void *)(object_addr + cache->object_size)); } -static void describe_object(struct kmem_cache *cache, void *object, +void describe_object(struct kmem_cache *cache, void *object, const void *addr) { struct kasan_alloc_meta *alloc_info = get_alloc_info(cache, object); -- 2.7.4
WARNING: multiple messages have this Message-ID (diff)
From: js1304@gmail.com To: Andrew Morton <akpm@linux-foundation.org> Cc: Andrey Ryabinin <aryabinin@virtuozzo.com>, Alexander Potapenko <glider@google.com>, Dmitry Vyukov <dvyukov@google.com>, kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Namhyung Kim <namhyung@kernel.org>, Wengang Wang <wen.gang.wang@oracle.com>, Joonsoo Kim <iamjoonsoo.kim@lge.com> Subject: [PATCH 01/18] mm/kasan: make some kasan functions global Date: Tue, 28 Nov 2017 16:48:36 +0900 [thread overview] Message-ID: <1511855333-3570-2-git-send-email-iamjoonsoo.kim@lge.com> (raw) In-Reply-To: <1511855333-3570-1-git-send-email-iamjoonsoo.kim@lge.com> From: Joonsoo Kim <iamjoonsoo.kim@lge.com> They will be used for the vchecker in the following patch. Make it non-static and add declairation in header files. Signed-off-by: Joonsoo Kim <iamjoonsoo.kim@lge.com> --- include/linux/kasan.h | 1 + mm/kasan/kasan.c | 2 +- mm/kasan/kasan.h | 2 ++ mm/kasan/report.c | 2 +- 4 files changed, 5 insertions(+), 2 deletions(-) diff --git a/include/linux/kasan.h b/include/linux/kasan.h index e3eb834..50f49fe 100644 --- a/include/linux/kasan.h +++ b/include/linux/kasan.h @@ -37,6 +37,7 @@ extern void kasan_enable_current(void); /* Disable reporting bugs for current task */ extern void kasan_disable_current(void); +void kasan_poison_shadow(const void *address, size_t size, u8 value); void kasan_unpoison_shadow(const void *address, size_t size); void kasan_unpoison_task_stack(struct task_struct *task); diff --git a/mm/kasan/kasan.c b/mm/kasan/kasan.c index 405bba4..2bcbdbd 100644 --- a/mm/kasan/kasan.c +++ b/mm/kasan/kasan.c @@ -54,7 +54,7 @@ void kasan_disable_current(void) * Poisons the shadow memory for 'size' bytes starting from 'addr'. * Memory addresses should be aligned to KASAN_SHADOW_SCALE_SIZE. */ -static void kasan_poison_shadow(const void *address, size_t size, u8 value) +void kasan_poison_shadow(const void *address, size_t size, u8 value) { void *shadow_start, *shadow_end; diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h index c70851a..b5d086d 100644 --- a/mm/kasan/kasan.h +++ b/mm/kasan/kasan.h @@ -99,6 +99,8 @@ static inline const void *kasan_shadow_to_mem(const void *shadow_addr) void kasan_report(unsigned long addr, size_t size, bool is_write, unsigned long ip); +void describe_object(struct kmem_cache *cache, void *object, + const void *addr); void kasan_report_double_free(struct kmem_cache *cache, void *object, void *ip); diff --git a/mm/kasan/report.c b/mm/kasan/report.c index 6bcfb01..b78735a 100644 --- a/mm/kasan/report.c +++ b/mm/kasan/report.c @@ -230,7 +230,7 @@ static void describe_object_addr(struct kmem_cache *cache, void *object, (void *)(object_addr + cache->object_size)); } -static void describe_object(struct kmem_cache *cache, void *object, +void describe_object(struct kmem_cache *cache, void *object, const void *addr) { struct kasan_alloc_meta *alloc_info = get_alloc_info(cache, object); -- 2.7.4 -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next prev parent reply other threads:[~2017-11-28 7:49 UTC|newest] Thread overview: 55+ messages / expand[flat|nested] mbox.gz Atom feed top 2017-11-28 7:48 [PATCH 00/18] introduce a new tool, valid access checker js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` js1304 [this message] 2017-11-28 7:48 ` [PATCH 01/18] mm/kasan: make some kasan functions global js1304 2017-11-28 7:48 ` [PATCH 02/18] vchecker: introduce the valid access checker js1304 2017-11-28 7:48 ` js1304 2017-11-28 19:41 ` Andi Kleen 2017-11-28 19:41 ` Andi Kleen 2017-11-29 5:36 ` Joonsoo Kim 2017-11-29 5:36 ` Joonsoo Kim 2017-12-01 5:08 ` kbuild test robot 2017-12-01 8:01 ` Joonsoo Kim 2017-12-01 8:01 ` Joonsoo Kim 2017-11-28 7:48 ` [PATCH 03/18] vchecker: mark/unmark the shadow of the allocated objects js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 04/18] vchecker: prepare per object memory for vchecker js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 05/18] vchecker: store/report callstack of value writer js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 06/18] lib/stackdepot: Add is_new arg to depot_save_stack js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 07/18] lib/stackdepot: extend stackdepot API to support per-user stackdepot js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 08/18] vchecker: Add 'callstack' checker js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 09/18] vchecker: Support toggle on/off of callstack check js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 10/18] vchecker: Use __GFP_ATOMIC to save stacktrace js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 11/18] vchecker: consistently exclude vchecker's stacktrace js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 12/18] vchecker: fix 'remove' handling on callstack checker js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 13/18] mm/vchecker: support inline KASAN build js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 14/18] mm/vchecker: make callstack depth configurable js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 15/18] mm/vchecker: pass allocation caller address to vchecker hook js1304 2017-11-28 7:48 ` js1304 2017-12-01 2:39 ` kbuild test robot 2017-12-01 3:01 ` kbuild test robot 2017-11-28 7:48 ` [PATCH 16/18] mm/vchecker: support allocation caller filter js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 17/18] lib/vchecker_test: introduce a sample for vchecker test js1304 2017-11-28 7:48 ` js1304 2017-11-28 7:48 ` [PATCH 18/18] doc: add vchecker document js1304 2017-11-28 7:48 ` js1304 2017-11-29 9:27 ` [PATCH 00/18] introduce a new tool, valid access checker Dmitry Vyukov 2017-11-29 9:27 ` Dmitry Vyukov 2017-12-01 7:46 ` Joonsoo Kim 2017-12-01 7:46 ` Joonsoo Kim 2017-12-22 1:51 ` Joonsoo Kim 2017-12-22 1:51 ` Joonsoo Kim 2018-01-18 22:39 ` Andrew Morton 2018-01-18 22:39 ` Andrew Morton
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=1511855333-3570-2-git-send-email-iamjoonsoo.kim@lge.com \ --to=js1304@gmail.com \ --cc=akpm@linux-foundation.org \ --cc=aryabinin@virtuozzo.com \ --cc=dvyukov@google.com \ --cc=glider@google.com \ --cc=iamjoonsoo.kim@lge.com \ --cc=kasan-dev@googlegroups.com \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-mm@kvack.org \ --cc=namhyung@kernel.org \ --cc=wen.gang.wang@oracle.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.