forked from torvalds/linux
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
With kmemcheck enabled, the slab allocator needs to do this: 1. Tell kmemcheck to allocate the shadow memory which stores the status of each byte in the allocation proper, e.g. whether it is initialized or uninitialized. 2. Tell kmemcheck which parts of memory that should be marked uninitialized. There are actually a few more states, such as "not yet allocated" and "recently freed". If a slab cache is set up using the SLAB_NOTRACK flag, it will never return memory that can take page faults because of kmemcheck. If a slab cache is NOT set up using the SLAB_NOTRACK flag, callers can still request memory with the __GFP_NOTRACK flag. This does not prevent the page faults from occuring, however, but marks the object in question as being initialized so that no warnings will ever be produced for this object. In addition to (and in contrast to) __GFP_NOTRACK, the __GFP_NOTRACK_FALSE_POSITIVE flag indicates that the allocation should not be tracked _because_ it would produce a false positive. Their values are identical, but need not be so in the future (for example, we could now enable/disable false positives with a config option). Parts of this patch were contributed by Pekka Enberg but merged for atomicity. Signed-off-by: Vegard Nossum <[email protected]> Signed-off-by: Pekka Enberg <[email protected]> Signed-off-by: Ingo Molnar <[email protected]> [rebased for mainline inclusion] Signed-off-by: Vegard Nossum <[email protected]>
- Loading branch information
Showing
7 changed files
with
174 additions
and
9 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,103 @@ | ||
#include <linux/mm_types.h> | ||
#include <linux/mm.h> | ||
#include <linux/slab.h> | ||
#include <linux/kmemcheck.h> | ||
|
||
void kmemcheck_alloc_shadow(struct kmem_cache *s, gfp_t flags, int node, | ||
struct page *page, int order) | ||
{ | ||
struct page *shadow; | ||
int pages; | ||
int i; | ||
|
||
pages = 1 << order; | ||
|
||
/* | ||
* With kmemcheck enabled, we need to allocate a memory area for the | ||
* shadow bits as well. | ||
*/ | ||
shadow = alloc_pages_node(node, flags, order); | ||
if (!shadow) { | ||
if (printk_ratelimit()) | ||
printk(KERN_ERR "kmemcheck: failed to allocate " | ||
"shadow bitmap\n"); | ||
return; | ||
} | ||
|
||
for(i = 0; i < pages; ++i) | ||
page[i].shadow = page_address(&shadow[i]); | ||
|
||
/* | ||
* Mark it as non-present for the MMU so that our accesses to | ||
* this memory will trigger a page fault and let us analyze | ||
* the memory accesses. | ||
*/ | ||
kmemcheck_hide_pages(page, pages); | ||
|
||
/* | ||
* Objects from caches that have a constructor don't get | ||
* cleared when they're allocated, so we need to do it here. | ||
*/ | ||
if (s->ctor) | ||
kmemcheck_mark_uninitialized_pages(page, pages); | ||
else | ||
kmemcheck_mark_unallocated_pages(page, pages); | ||
} | ||
|
||
void kmemcheck_free_shadow(struct kmem_cache *s, struct page *page, int order) | ||
{ | ||
struct page *shadow; | ||
int pages; | ||
int i; | ||
|
||
pages = 1 << order; | ||
|
||
kmemcheck_show_pages(page, pages); | ||
|
||
shadow = virt_to_page(page[0].shadow); | ||
|
||
for(i = 0; i < pages; ++i) | ||
page[i].shadow = NULL; | ||
|
||
__free_pages(shadow, order); | ||
} | ||
|
||
void kmemcheck_slab_alloc(struct kmem_cache *s, gfp_t gfpflags, void *object, | ||
size_t size) | ||
{ | ||
/* | ||
* Has already been memset(), which initializes the shadow for us | ||
* as well. | ||
*/ | ||
if (gfpflags & __GFP_ZERO) | ||
return; | ||
|
||
/* No need to initialize the shadow of a non-tracked slab. */ | ||
if (s->flags & SLAB_NOTRACK) | ||
return; | ||
|
||
if (!kmemcheck_enabled || gfpflags & __GFP_NOTRACK) { | ||
/* | ||
* Allow notracked objects to be allocated from | ||
* tracked caches. Note however that these objects | ||
* will still get page faults on access, they just | ||
* won't ever be flagged as uninitialized. If page | ||
* faults are not acceptable, the slab cache itself | ||
* should be marked NOTRACK. | ||
*/ | ||
kmemcheck_mark_initialized(object, size); | ||
} else if (!s->ctor) { | ||
/* | ||
* New objects should be marked uninitialized before | ||
* they're returned to the called. | ||
*/ | ||
kmemcheck_mark_uninitialized(object, size); | ||
} | ||
} | ||
|
||
void kmemcheck_slab_free(struct kmem_cache *s, void *object, size_t size) | ||
{ | ||
/* TODO: RCU freeing is unsupported for now; hide false positives. */ | ||
if (!s->ctor && !(s->flags & SLAB_DESTROY_BY_RCU)) | ||
kmemcheck_mark_freed(object, size); | ||
} |