Searched hist:c1755c25 (Results 1 – 2 of 2) sorted by relevance
/openbmc/linux/io_uring/ |
H A D | io_uring.h | c1755c25 Wed Jan 18 09:56:30 CST 2023 Breno Leitao <leitao@debian.org> io_uring: Enable KASAN for request cache
Every io_uring request is represented by struct io_kiocb, which is cached locally by io_uring (not SLAB/SLUB) in the list called submit_state.freelist. This patch simply enabled KASAN for this free list.
This list is initially created by KMEM_CACHE, but later, managed by io_uring. This patch basically poisons the objects that are not used (i.e., they are the free list), and unpoisons it when the object is allocated/removed from the list.
Touching these poisoned objects while in the freelist will cause a KASAN warning.
Suggested-by: Jens Axboe <axboe@kernel.dk> Signed-off-by: Breno Leitao <leitao@debian.org> Reviewed-by: Pavel Begunkov <asml.silence@gmail.com> Signed-off-by: Jens Axboe <axboe@kernel.dk>
|
H A D | io_uring.c | c1755c25 Wed Jan 18 09:56:30 CST 2023 Breno Leitao <leitao@debian.org> io_uring: Enable KASAN for request cache
Every io_uring request is represented by struct io_kiocb, which is cached locally by io_uring (not SLAB/SLUB) in the list called submit_state.freelist. This patch simply enabled KASAN for this free list.
This list is initially created by KMEM_CACHE, but later, managed by io_uring. This patch basically poisons the objects that are not used (i.e., they are the free list), and unpoisons it when the object is allocated/removed from the list.
Touching these poisoned objects while in the freelist will cause a KASAN warning.
Suggested-by: Jens Axboe <axboe@kernel.dk> Signed-off-by: Breno Leitao <leitao@debian.org> Reviewed-by: Pavel Begunkov <asml.silence@gmail.com> Signed-off-by: Jens Axboe <axboe@kernel.dk>
|