lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 22 Jan 2021 13:59:54 +0000 From: Vincenzo Frascino <vincenzo.frascino@....com> To: linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org, kasan-dev@...glegroups.com Cc: Vincenzo Frascino <vincenzo.frascino@....com>, Catalin Marinas <catalin.marinas@....com>, Will Deacon <will@...nel.org>, Dmitry Vyukov <dvyukov@...gle.com>, Andrey Ryabinin <aryabinin@...tuozzo.com>, Alexander Potapenko <glider@...gle.com>, Marco Elver <elver@...gle.com>, Evgenii Stepanov <eugenis@...gle.com>, Branislav Rankov <Branislav.Rankov@....com>, Andrey Konovalov <andreyknvl@...gle.com> Subject: [PATCH v6 3/4] kasan: Add report for async mode KASAN provides an asynchronous mode of execution. Add reporting functionality for this mode. Cc: Dmitry Vyukov <dvyukov@...gle.com> Cc: Andrey Ryabinin <aryabinin@...tuozzo.com> Cc: Alexander Potapenko <glider@...gle.com> Cc: Andrey Konovalov <andreyknvl@...gle.com> Reviewed-by: Andrey Konovalov <andreyknvl@...gle.com> Signed-off-by: Vincenzo Frascino <vincenzo.frascino@....com> --- include/linux/kasan.h | 2 ++ mm/kasan/report.c | 11 +++++++++++ 2 files changed, 13 insertions(+) diff --git a/include/linux/kasan.h b/include/linux/kasan.h index bb862d1f0e15..b0a1d9dfa85c 100644 --- a/include/linux/kasan.h +++ b/include/linux/kasan.h @@ -351,6 +351,8 @@ static inline void *kasan_reset_tag(const void *addr) bool kasan_report(unsigned long addr, size_t size, bool is_write, unsigned long ip); +void kasan_report_async(void); + #else /* CONFIG_KASAN_SW_TAGS || CONFIG_KASAN_HW_TAGS */ static inline void *kasan_reset_tag(const void *addr) diff --git a/mm/kasan/report.c b/mm/kasan/report.c index 234f35a84f19..2fd6845a95e9 100644 --- a/mm/kasan/report.c +++ b/mm/kasan/report.c @@ -358,6 +358,17 @@ void kasan_report_invalid_free(void *object, unsigned long ip) end_report(&flags); } +void kasan_report_async(void) +{ + unsigned long flags; + + start_report(&flags); + pr_err("BUG: KASAN: invalid-access\n"); + pr_err("Asynchronous mode enabled: no access details available\n"); + dump_stack(); + end_report(&flags); +} + static void __kasan_report(unsigned long addr, size_t size, bool is_write, unsigned long ip) { -- 2.30.0
Powered by blists - more mailing lists