diff options
author | Andrey Ryabinin <a.ryabinin@samsung.com> | 2015-02-13 17:39:42 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2015-02-14 00:21:41 -0500 |
commit | 0316bec22ec95ea2faca6406437b0b5950553b7c (patch) | |
tree | 6a278e1515188e738df2b04e9ada375215b3df22 /include/linux/kasan.h | |
parent | a79316c6178ca419e35feef47d47f50b4e0ee9f2 (diff) |
mm: slub: add kernel address sanitizer support for slub allocator
With this patch kasan will be able to catch bugs in memory allocated by
slub. Initially all objects in newly allocated slab page, marked as
redzone. Later, when allocation of slub object happens, requested by
caller number of bytes marked as accessible, and the rest of the object
(including slub's metadata) marked as redzone (inaccessible).
We also mark object as accessible if ksize was called for this object.
There is some places in kernel where ksize function is called to inquire
size of really allocated area. Such callers could validly access whole
allocated memory, so it should be marked as accessible.
Code in slub.c and slab_common.c files could validly access to object's
metadata, so instrumentation for this files are disabled.
Signed-off-by: Andrey Ryabinin <a.ryabinin@samsung.com>
Signed-off-by: Dmitry Chernenkov <dmitryc@google.com>
Cc: Dmitry Vyukov <dvyukov@google.com>
Cc: Konstantin Serebryany <kcc@google.com>
Signed-off-by: Andrey Konovalov <adech.fo@gmail.com>
Cc: Yuri Gribov <tetra2005@gmail.com>
Cc: Konstantin Khlebnikov <koct9i@gmail.com>
Cc: Sasha Levin <sasha.levin@oracle.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Joonsoo Kim <iamjoonsoo.kim@lge.com>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: Andi Kleen <andi@firstfloor.org>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Pekka Enberg <penberg@kernel.org>
Cc: David Rientjes <rientjes@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'include/linux/kasan.h')
-rw-r--r-- | include/linux/kasan.h | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/include/linux/kasan.h b/include/linux/kasan.h index f00c15c41235..d5310eef3e38 100644 --- a/include/linux/kasan.h +++ b/include/linux/kasan.h | |||
@@ -37,6 +37,18 @@ void kasan_unpoison_shadow(const void *address, size_t size); | |||
37 | void kasan_alloc_pages(struct page *page, unsigned int order); | 37 | void kasan_alloc_pages(struct page *page, unsigned int order); |
38 | void kasan_free_pages(struct page *page, unsigned int order); | 38 | void kasan_free_pages(struct page *page, unsigned int order); |
39 | 39 | ||
40 | void kasan_poison_slab(struct page *page); | ||
41 | void kasan_unpoison_object_data(struct kmem_cache *cache, void *object); | ||
42 | void kasan_poison_object_data(struct kmem_cache *cache, void *object); | ||
43 | |||
44 | void kasan_kmalloc_large(const void *ptr, size_t size); | ||
45 | void kasan_kfree_large(const void *ptr); | ||
46 | void kasan_kmalloc(struct kmem_cache *s, const void *object, size_t size); | ||
47 | void kasan_krealloc(const void *object, size_t new_size); | ||
48 | |||
49 | void kasan_slab_alloc(struct kmem_cache *s, void *object); | ||
50 | void kasan_slab_free(struct kmem_cache *s, void *object); | ||
51 | |||
40 | #else /* CONFIG_KASAN */ | 52 | #else /* CONFIG_KASAN */ |
41 | 53 | ||
42 | static inline void kasan_unpoison_shadow(const void *address, size_t size) {} | 54 | static inline void kasan_unpoison_shadow(const void *address, size_t size) {} |
@@ -47,6 +59,21 @@ static inline void kasan_disable_current(void) {} | |||
47 | static inline void kasan_alloc_pages(struct page *page, unsigned int order) {} | 59 | static inline void kasan_alloc_pages(struct page *page, unsigned int order) {} |
48 | static inline void kasan_free_pages(struct page *page, unsigned int order) {} | 60 | static inline void kasan_free_pages(struct page *page, unsigned int order) {} |
49 | 61 | ||
62 | static inline void kasan_poison_slab(struct page *page) {} | ||
63 | static inline void kasan_unpoison_object_data(struct kmem_cache *cache, | ||
64 | void *object) {} | ||
65 | static inline void kasan_poison_object_data(struct kmem_cache *cache, | ||
66 | void *object) {} | ||
67 | |||
68 | static inline void kasan_kmalloc_large(void *ptr, size_t size) {} | ||
69 | static inline void kasan_kfree_large(const void *ptr) {} | ||
70 | static inline void kasan_kmalloc(struct kmem_cache *s, const void *object, | ||
71 | size_t size) {} | ||
72 | static inline void kasan_krealloc(const void *object, size_t new_size) {} | ||
73 | |||
74 | static inline void kasan_slab_alloc(struct kmem_cache *s, void *object) {} | ||
75 | static inline void kasan_slab_free(struct kmem_cache *s, void *object) {} | ||
76 | |||
50 | #endif /* CONFIG_KASAN */ | 77 | #endif /* CONFIG_KASAN */ |
51 | 78 | ||
52 | #endif /* LINUX_KASAN_H */ | 79 | #endif /* LINUX_KASAN_H */ |