Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1215668pxb; Fri, 22 Jan 2021 09:44:43 -0800 (PST) X-Google-Smtp-Source: ABdhPJwldA+OqB7Upp3QO/fQVshidUr/PBjXZOfvj56WVHZQE3cyv2VB7kxANFnO5q0mH1TcNH36 X-Received: by 2002:a17:906:52c1:: with SMTP id w1mr3870691ejn.214.1611337483334; Fri, 22 Jan 2021 09:44:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611337483; cv=none; d=google.com; s=arc-20160816; b=fvb9DOmcga8Q+VWlWW2aHTSZ5ZMDrC85nGN4+QynEplMoqWWfVantR7Vre0ukE/FAH hMbitamGj1DOteMInJ9gkh1pYUWcSd2PtqExH7+sPSv008N4fWZMgYvZtHTkbX0vduze ff2phIEX9QeNjGNuxMsPnvLxuZ9goIeRTUOE/rJlGQ5BWGEgE8L+e0z230E3u/bhl0wS dlWWqp6NwrIV+xyp9FzIgqUOw1W7NNjIRHqiZwhDvv7Vm39PlXDioolva4bQeDHv9EkH UNe59qjpcpWk4/vErL9NU5+R4i8QIb8KEP3RjMhxbXY+kxiSY+fInSWJVyX9scdaG3q6 pePg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=pjAOTjE6O0VxMDLlcowTJfJpEWsjCSxNmrRTiiutyZs=; b=cmqM2G5bwu9JKf0luk9HU1nqAuTX3J8GyH1VwN+nVxefMgV6ExTuOLqiwh7ejiRFrJ bV87e4IvlqJWI1arrPS4KSSQavxV9rnVBdCiRQkB0+9tUZcBVS9gDeFw5YvslRj98y5i njE/VfJ5jPFSKYHWrZj2JLdM565BQWaTyOF/9BVcbPLA3cjJFVc0dkouMJ6NMUJjle6X rxx1qyIEbOickO4R75miaJK5ITBxwTKRY8x9cchSyI/HxjPSJHuDwHyqJTxoKLE+hxPl eVACAP1tO6q0oLKZQeofoHMH+IqvPGdCaToaAEgvGmChjgd/2FnVoV146WuNhrnUcFvp BMbA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c4si3719613edr.176.2021.01.22.09.44.18; Fri, 22 Jan 2021 09:44:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729883AbhAVRaA (ORCPT + 99 others); Fri, 22 Jan 2021 12:30:00 -0500 Received: from foss.arm.com ([217.140.110.172]:54668 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729262AbhAVP5p (ORCPT ); Fri, 22 Jan 2021 10:57:45 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 09B041509; Fri, 22 Jan 2021 07:57:00 -0800 (PST) Received: from e119884-lin.cambridge.arm.com (e119884-lin.cambridge.arm.com [10.1.196.72]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 407123F719; Fri, 22 Jan 2021 07:56:58 -0800 (PST) From: Vincenzo Frascino To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Cc: Vincenzo Frascino , Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , Leon Romanovsky , Andrey Konovalov , Catalin Marinas , Will Deacon , Mark Rutland , "Paul E . McKenney" , Naresh Kamboju Subject: [PATCH v4 2/3] kasan: Add explicit preconditions to kasan_report() Date: Fri, 22 Jan 2021 15:56:41 +0000 Message-Id: <20210122155642.23187-3-vincenzo.frascino@arm.com> X-Mailer: git-send-email 2.30.0 In-Reply-To: <20210122155642.23187-1-vincenzo.frascino@arm.com> References: <20210122155642.23187-1-vincenzo.frascino@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With the introduction of KASAN_HW_TAGS, kasan_report() accesses the metadata only when addr_has_metadata() succeeds. Add a comment to make sure that the preconditions to the function are explicitly clarified. Cc: Andrey Ryabinin Cc: Alexander Potapenko Cc: Dmitry Vyukov Cc: Leon Romanovsky Cc: Andrey Konovalov Signed-off-by: Vincenzo Frascino --- include/linux/kasan.h | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/include/linux/kasan.h b/include/linux/kasan.h index fe1ae73ff8b5..0aea9e2a2a01 100644 --- a/include/linux/kasan.h +++ b/include/linux/kasan.h @@ -333,6 +333,13 @@ static inline void *kasan_reset_tag(const void *addr) return (void *)arch_kasan_reset_tag(addr); } +/** + * kasan_report - print a report about a bad memory access detected by KASAN + * @addr: address of the bad access + * @size: size of the bad access + * @is_write: whether the bad access is a write or a read + * @ip: instruction pointer for the accessibility check or the bad access itself + */ bool kasan_report(unsigned long addr, size_t size, bool is_write, unsigned long ip); -- 2.30.0