Explorar o código

kasan: Allow kasan_check_read/write() to accept pointers to volatiles

Currently kasan_check_read/write() accept 'const void*', make them
accept 'const volatile void*'. This is required for instrumentation
of atomic operations and there is just no reason to not allow that.

Signed-off-by: Dmitry Vyukov <dvyukov@google.com>
Reviewed-by: Andrey Ryabinin <aryabinin@virtuozzo.com>
Acked-by: Mark Rutland <mark.rutland@arm.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: kasan-dev@googlegroups.com
Cc: linux-mm@kvack.org
Cc: will.deacon@arm.com
Link: http://lkml.kernel.org/r/33e5ec275c1ee89299245b2ebbccd63709c6021f.1498140838.git.dvyukov@google.com
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Dmitry Vyukov %!s(int64=8) %!d(string=hai) anos
pai
achega
f06e8c584f
Modificáronse 2 ficheiros con 8 adicións e 6 borrados
  1. 6 4
      include/linux/kasan-checks.h
  2. 2 2
      mm/kasan/kasan.c

+ 6 - 4
include/linux/kasan-checks.h

@@ -2,11 +2,13 @@
 #define _LINUX_KASAN_CHECKS_H
 #define _LINUX_KASAN_CHECKS_H
 
 
 #ifdef CONFIG_KASAN
 #ifdef CONFIG_KASAN
-void kasan_check_read(const void *p, unsigned int size);
-void kasan_check_write(const void *p, unsigned int size);
+void kasan_check_read(const volatile void *p, unsigned int size);
+void kasan_check_write(const volatile void *p, unsigned int size);
 #else
 #else
-static inline void kasan_check_read(const void *p, unsigned int size) { }
-static inline void kasan_check_write(const void *p, unsigned int size) { }
+static inline void kasan_check_read(const volatile void *p, unsigned int size)
+{ }
+static inline void kasan_check_write(const volatile void *p, unsigned int size)
+{ }
 #endif
 #endif
 
 
 #endif
 #endif

+ 2 - 2
mm/kasan/kasan.c

@@ -267,13 +267,13 @@ static void check_memory_region(unsigned long addr,
 	check_memory_region_inline(addr, size, write, ret_ip);
 	check_memory_region_inline(addr, size, write, ret_ip);
 }
 }
 
 
-void kasan_check_read(const void *p, unsigned int size)
+void kasan_check_read(const volatile void *p, unsigned int size)
 {
 {
 	check_memory_region((unsigned long)p, size, false, _RET_IP_);
 	check_memory_region((unsigned long)p, size, false, _RET_IP_);
 }
 }
 EXPORT_SYMBOL(kasan_check_read);
 EXPORT_SYMBOL(kasan_check_read);
 
 
-void kasan_check_write(const void *p, unsigned int size)
+void kasan_check_write(const volatile void *p, unsigned int size)
 {
 {
 	check_memory_region((unsigned long)p, size, true, _RET_IP_);
 	check_memory_region((unsigned long)p, size, true, _RET_IP_);
 }
 }