162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * KMSAN hooks for kernel subsystems. 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * These functions handle creation of KMSAN metadata for memory allocations. 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Copyright (C) 2018-2022 Google LLC 862306a36Sopenharmony_ci * Author: Alexander Potapenko <glider@google.com> 962306a36Sopenharmony_ci * 1062306a36Sopenharmony_ci */ 1162306a36Sopenharmony_ci 1262306a36Sopenharmony_ci#include <linux/cacheflush.h> 1362306a36Sopenharmony_ci#include <linux/dma-direction.h> 1462306a36Sopenharmony_ci#include <linux/gfp.h> 1562306a36Sopenharmony_ci#include <linux/kmsan.h> 1662306a36Sopenharmony_ci#include <linux/mm.h> 1762306a36Sopenharmony_ci#include <linux/mm_types.h> 1862306a36Sopenharmony_ci#include <linux/scatterlist.h> 1962306a36Sopenharmony_ci#include <linux/slab.h> 2062306a36Sopenharmony_ci#include <linux/uaccess.h> 2162306a36Sopenharmony_ci#include <linux/usb.h> 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_ci#include "../internal.h" 2462306a36Sopenharmony_ci#include "../slab.h" 2562306a36Sopenharmony_ci#include "kmsan.h" 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_ci/* 2862306a36Sopenharmony_ci * Instrumented functions shouldn't be called under 2962306a36Sopenharmony_ci * kmsan_enter_runtime()/kmsan_leave_runtime(), because this will lead to 3062306a36Sopenharmony_ci * skipping effects of functions like memset() inside instrumented code. 3162306a36Sopenharmony_ci */ 3262306a36Sopenharmony_ci 3362306a36Sopenharmony_civoid kmsan_task_create(struct task_struct *task) 3462306a36Sopenharmony_ci{ 3562306a36Sopenharmony_ci kmsan_enter_runtime(); 3662306a36Sopenharmony_ci kmsan_internal_task_create(task); 3762306a36Sopenharmony_ci kmsan_leave_runtime(); 3862306a36Sopenharmony_ci} 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_civoid kmsan_task_exit(struct task_struct *task) 4162306a36Sopenharmony_ci{ 4262306a36Sopenharmony_ci struct kmsan_ctx *ctx = &task->kmsan_ctx; 4362306a36Sopenharmony_ci 4462306a36Sopenharmony_ci if (!kmsan_enabled || kmsan_in_runtime()) 4562306a36Sopenharmony_ci return; 4662306a36Sopenharmony_ci 4762306a36Sopenharmony_ci ctx->allow_reporting = false; 4862306a36Sopenharmony_ci} 4962306a36Sopenharmony_ci 5062306a36Sopenharmony_civoid kmsan_slab_alloc(struct kmem_cache *s, void *object, gfp_t flags) 5162306a36Sopenharmony_ci{ 5262306a36Sopenharmony_ci if (unlikely(object == NULL)) 5362306a36Sopenharmony_ci return; 5462306a36Sopenharmony_ci if (!kmsan_enabled || kmsan_in_runtime()) 5562306a36Sopenharmony_ci return; 5662306a36Sopenharmony_ci /* 5762306a36Sopenharmony_ci * There's a ctor or this is an RCU cache - do nothing. The memory 5862306a36Sopenharmony_ci * status hasn't changed since last use. 5962306a36Sopenharmony_ci */ 6062306a36Sopenharmony_ci if (s->ctor || (s->flags & SLAB_TYPESAFE_BY_RCU)) 6162306a36Sopenharmony_ci return; 6262306a36Sopenharmony_ci 6362306a36Sopenharmony_ci kmsan_enter_runtime(); 6462306a36Sopenharmony_ci if (flags & __GFP_ZERO) 6562306a36Sopenharmony_ci kmsan_internal_unpoison_memory(object, s->object_size, 6662306a36Sopenharmony_ci KMSAN_POISON_CHECK); 6762306a36Sopenharmony_ci else 6862306a36Sopenharmony_ci kmsan_internal_poison_memory(object, s->object_size, flags, 6962306a36Sopenharmony_ci KMSAN_POISON_CHECK); 7062306a36Sopenharmony_ci kmsan_leave_runtime(); 7162306a36Sopenharmony_ci} 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_civoid kmsan_slab_free(struct kmem_cache *s, void *object) 7462306a36Sopenharmony_ci{ 7562306a36Sopenharmony_ci if (!kmsan_enabled || kmsan_in_runtime()) 7662306a36Sopenharmony_ci return; 7762306a36Sopenharmony_ci 7862306a36Sopenharmony_ci /* RCU slabs could be legally used after free within the RCU period */ 7962306a36Sopenharmony_ci if (unlikely(s->flags & (SLAB_TYPESAFE_BY_RCU | SLAB_POISON))) 8062306a36Sopenharmony_ci return; 8162306a36Sopenharmony_ci /* 8262306a36Sopenharmony_ci * If there's a constructor, freed memory must remain in the same state 8362306a36Sopenharmony_ci * until the next allocation. We cannot save its state to detect 8462306a36Sopenharmony_ci * use-after-free bugs, instead we just keep it unpoisoned. 8562306a36Sopenharmony_ci */ 8662306a36Sopenharmony_ci if (s->ctor) 8762306a36Sopenharmony_ci return; 8862306a36Sopenharmony_ci kmsan_enter_runtime(); 8962306a36Sopenharmony_ci kmsan_internal_poison_memory(object, s->object_size, GFP_KERNEL, 9062306a36Sopenharmony_ci KMSAN_POISON_CHECK | KMSAN_POISON_FREE); 9162306a36Sopenharmony_ci kmsan_leave_runtime(); 9262306a36Sopenharmony_ci} 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_civoid kmsan_kmalloc_large(const void *ptr, size_t size, gfp_t flags) 9562306a36Sopenharmony_ci{ 9662306a36Sopenharmony_ci if (unlikely(ptr == NULL)) 9762306a36Sopenharmony_ci return; 9862306a36Sopenharmony_ci if (!kmsan_enabled || kmsan_in_runtime()) 9962306a36Sopenharmony_ci return; 10062306a36Sopenharmony_ci kmsan_enter_runtime(); 10162306a36Sopenharmony_ci if (flags & __GFP_ZERO) 10262306a36Sopenharmony_ci kmsan_internal_unpoison_memory((void *)ptr, size, 10362306a36Sopenharmony_ci /*checked*/ true); 10462306a36Sopenharmony_ci else 10562306a36Sopenharmony_ci kmsan_internal_poison_memory((void *)ptr, size, flags, 10662306a36Sopenharmony_ci KMSAN_POISON_CHECK); 10762306a36Sopenharmony_ci kmsan_leave_runtime(); 10862306a36Sopenharmony_ci} 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_civoid kmsan_kfree_large(const void *ptr) 11162306a36Sopenharmony_ci{ 11262306a36Sopenharmony_ci struct page *page; 11362306a36Sopenharmony_ci 11462306a36Sopenharmony_ci if (!kmsan_enabled || kmsan_in_runtime()) 11562306a36Sopenharmony_ci return; 11662306a36Sopenharmony_ci kmsan_enter_runtime(); 11762306a36Sopenharmony_ci page = virt_to_head_page((void *)ptr); 11862306a36Sopenharmony_ci KMSAN_WARN_ON(ptr != page_address(page)); 11962306a36Sopenharmony_ci kmsan_internal_poison_memory((void *)ptr, 12062306a36Sopenharmony_ci page_size(page), 12162306a36Sopenharmony_ci GFP_KERNEL, 12262306a36Sopenharmony_ci KMSAN_POISON_CHECK | KMSAN_POISON_FREE); 12362306a36Sopenharmony_ci kmsan_leave_runtime(); 12462306a36Sopenharmony_ci} 12562306a36Sopenharmony_ci 12662306a36Sopenharmony_cistatic unsigned long vmalloc_shadow(unsigned long addr) 12762306a36Sopenharmony_ci{ 12862306a36Sopenharmony_ci return (unsigned long)kmsan_get_metadata((void *)addr, 12962306a36Sopenharmony_ci KMSAN_META_SHADOW); 13062306a36Sopenharmony_ci} 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_cistatic unsigned long vmalloc_origin(unsigned long addr) 13362306a36Sopenharmony_ci{ 13462306a36Sopenharmony_ci return (unsigned long)kmsan_get_metadata((void *)addr, 13562306a36Sopenharmony_ci KMSAN_META_ORIGIN); 13662306a36Sopenharmony_ci} 13762306a36Sopenharmony_ci 13862306a36Sopenharmony_civoid kmsan_vunmap_range_noflush(unsigned long start, unsigned long end) 13962306a36Sopenharmony_ci{ 14062306a36Sopenharmony_ci __vunmap_range_noflush(vmalloc_shadow(start), vmalloc_shadow(end)); 14162306a36Sopenharmony_ci __vunmap_range_noflush(vmalloc_origin(start), vmalloc_origin(end)); 14262306a36Sopenharmony_ci flush_cache_vmap(vmalloc_shadow(start), vmalloc_shadow(end)); 14362306a36Sopenharmony_ci flush_cache_vmap(vmalloc_origin(start), vmalloc_origin(end)); 14462306a36Sopenharmony_ci} 14562306a36Sopenharmony_ci 14662306a36Sopenharmony_ci/* 14762306a36Sopenharmony_ci * This function creates new shadow/origin pages for the physical pages mapped 14862306a36Sopenharmony_ci * into the virtual memory. If those physical pages already had shadow/origin, 14962306a36Sopenharmony_ci * those are ignored. 15062306a36Sopenharmony_ci */ 15162306a36Sopenharmony_ciint kmsan_ioremap_page_range(unsigned long start, unsigned long end, 15262306a36Sopenharmony_ci phys_addr_t phys_addr, pgprot_t prot, 15362306a36Sopenharmony_ci unsigned int page_shift) 15462306a36Sopenharmony_ci{ 15562306a36Sopenharmony_ci gfp_t gfp_mask = GFP_KERNEL | __GFP_ZERO; 15662306a36Sopenharmony_ci struct page *shadow, *origin; 15762306a36Sopenharmony_ci unsigned long off = 0; 15862306a36Sopenharmony_ci int nr, err = 0, clean = 0, mapped; 15962306a36Sopenharmony_ci 16062306a36Sopenharmony_ci if (!kmsan_enabled || kmsan_in_runtime()) 16162306a36Sopenharmony_ci return 0; 16262306a36Sopenharmony_ci 16362306a36Sopenharmony_ci nr = (end - start) / PAGE_SIZE; 16462306a36Sopenharmony_ci kmsan_enter_runtime(); 16562306a36Sopenharmony_ci for (int i = 0; i < nr; i++, off += PAGE_SIZE, clean = i) { 16662306a36Sopenharmony_ci shadow = alloc_pages(gfp_mask, 1); 16762306a36Sopenharmony_ci origin = alloc_pages(gfp_mask, 1); 16862306a36Sopenharmony_ci if (!shadow || !origin) { 16962306a36Sopenharmony_ci err = -ENOMEM; 17062306a36Sopenharmony_ci goto ret; 17162306a36Sopenharmony_ci } 17262306a36Sopenharmony_ci mapped = __vmap_pages_range_noflush( 17362306a36Sopenharmony_ci vmalloc_shadow(start + off), 17462306a36Sopenharmony_ci vmalloc_shadow(start + off + PAGE_SIZE), prot, &shadow, 17562306a36Sopenharmony_ci PAGE_SHIFT); 17662306a36Sopenharmony_ci if (mapped) { 17762306a36Sopenharmony_ci err = mapped; 17862306a36Sopenharmony_ci goto ret; 17962306a36Sopenharmony_ci } 18062306a36Sopenharmony_ci shadow = NULL; 18162306a36Sopenharmony_ci mapped = __vmap_pages_range_noflush( 18262306a36Sopenharmony_ci vmalloc_origin(start + off), 18362306a36Sopenharmony_ci vmalloc_origin(start + off + PAGE_SIZE), prot, &origin, 18462306a36Sopenharmony_ci PAGE_SHIFT); 18562306a36Sopenharmony_ci if (mapped) { 18662306a36Sopenharmony_ci __vunmap_range_noflush( 18762306a36Sopenharmony_ci vmalloc_shadow(start + off), 18862306a36Sopenharmony_ci vmalloc_shadow(start + off + PAGE_SIZE)); 18962306a36Sopenharmony_ci err = mapped; 19062306a36Sopenharmony_ci goto ret; 19162306a36Sopenharmony_ci } 19262306a36Sopenharmony_ci origin = NULL; 19362306a36Sopenharmony_ci } 19462306a36Sopenharmony_ci /* Page mapping loop finished normally, nothing to clean up. */ 19562306a36Sopenharmony_ci clean = 0; 19662306a36Sopenharmony_ci 19762306a36Sopenharmony_ciret: 19862306a36Sopenharmony_ci if (clean > 0) { 19962306a36Sopenharmony_ci /* 20062306a36Sopenharmony_ci * Something went wrong. Clean up shadow/origin pages allocated 20162306a36Sopenharmony_ci * on the last loop iteration, then delete mappings created 20262306a36Sopenharmony_ci * during the previous iterations. 20362306a36Sopenharmony_ci */ 20462306a36Sopenharmony_ci if (shadow) 20562306a36Sopenharmony_ci __free_pages(shadow, 1); 20662306a36Sopenharmony_ci if (origin) 20762306a36Sopenharmony_ci __free_pages(origin, 1); 20862306a36Sopenharmony_ci __vunmap_range_noflush( 20962306a36Sopenharmony_ci vmalloc_shadow(start), 21062306a36Sopenharmony_ci vmalloc_shadow(start + clean * PAGE_SIZE)); 21162306a36Sopenharmony_ci __vunmap_range_noflush( 21262306a36Sopenharmony_ci vmalloc_origin(start), 21362306a36Sopenharmony_ci vmalloc_origin(start + clean * PAGE_SIZE)); 21462306a36Sopenharmony_ci } 21562306a36Sopenharmony_ci flush_cache_vmap(vmalloc_shadow(start), vmalloc_shadow(end)); 21662306a36Sopenharmony_ci flush_cache_vmap(vmalloc_origin(start), vmalloc_origin(end)); 21762306a36Sopenharmony_ci kmsan_leave_runtime(); 21862306a36Sopenharmony_ci return err; 21962306a36Sopenharmony_ci} 22062306a36Sopenharmony_ci 22162306a36Sopenharmony_civoid kmsan_iounmap_page_range(unsigned long start, unsigned long end) 22262306a36Sopenharmony_ci{ 22362306a36Sopenharmony_ci unsigned long v_shadow, v_origin; 22462306a36Sopenharmony_ci struct page *shadow, *origin; 22562306a36Sopenharmony_ci int nr; 22662306a36Sopenharmony_ci 22762306a36Sopenharmony_ci if (!kmsan_enabled || kmsan_in_runtime()) 22862306a36Sopenharmony_ci return; 22962306a36Sopenharmony_ci 23062306a36Sopenharmony_ci nr = (end - start) / PAGE_SIZE; 23162306a36Sopenharmony_ci kmsan_enter_runtime(); 23262306a36Sopenharmony_ci v_shadow = (unsigned long)vmalloc_shadow(start); 23362306a36Sopenharmony_ci v_origin = (unsigned long)vmalloc_origin(start); 23462306a36Sopenharmony_ci for (int i = 0; i < nr; 23562306a36Sopenharmony_ci i++, v_shadow += PAGE_SIZE, v_origin += PAGE_SIZE) { 23662306a36Sopenharmony_ci shadow = kmsan_vmalloc_to_page_or_null((void *)v_shadow); 23762306a36Sopenharmony_ci origin = kmsan_vmalloc_to_page_or_null((void *)v_origin); 23862306a36Sopenharmony_ci __vunmap_range_noflush(v_shadow, vmalloc_shadow(end)); 23962306a36Sopenharmony_ci __vunmap_range_noflush(v_origin, vmalloc_origin(end)); 24062306a36Sopenharmony_ci if (shadow) 24162306a36Sopenharmony_ci __free_pages(shadow, 1); 24262306a36Sopenharmony_ci if (origin) 24362306a36Sopenharmony_ci __free_pages(origin, 1); 24462306a36Sopenharmony_ci } 24562306a36Sopenharmony_ci flush_cache_vmap(vmalloc_shadow(start), vmalloc_shadow(end)); 24662306a36Sopenharmony_ci flush_cache_vmap(vmalloc_origin(start), vmalloc_origin(end)); 24762306a36Sopenharmony_ci kmsan_leave_runtime(); 24862306a36Sopenharmony_ci} 24962306a36Sopenharmony_ci 25062306a36Sopenharmony_civoid kmsan_copy_to_user(void __user *to, const void *from, size_t to_copy, 25162306a36Sopenharmony_ci size_t left) 25262306a36Sopenharmony_ci{ 25362306a36Sopenharmony_ci unsigned long ua_flags; 25462306a36Sopenharmony_ci 25562306a36Sopenharmony_ci if (!kmsan_enabled || kmsan_in_runtime()) 25662306a36Sopenharmony_ci return; 25762306a36Sopenharmony_ci /* 25862306a36Sopenharmony_ci * At this point we've copied the memory already. It's hard to check it 25962306a36Sopenharmony_ci * before copying, as the size of actually copied buffer is unknown. 26062306a36Sopenharmony_ci */ 26162306a36Sopenharmony_ci 26262306a36Sopenharmony_ci /* copy_to_user() may copy zero bytes. No need to check. */ 26362306a36Sopenharmony_ci if (!to_copy) 26462306a36Sopenharmony_ci return; 26562306a36Sopenharmony_ci /* Or maybe copy_to_user() failed to copy anything. */ 26662306a36Sopenharmony_ci if (to_copy <= left) 26762306a36Sopenharmony_ci return; 26862306a36Sopenharmony_ci 26962306a36Sopenharmony_ci ua_flags = user_access_save(); 27062306a36Sopenharmony_ci if ((u64)to < TASK_SIZE) { 27162306a36Sopenharmony_ci /* This is a user memory access, check it. */ 27262306a36Sopenharmony_ci kmsan_internal_check_memory((void *)from, to_copy - left, to, 27362306a36Sopenharmony_ci REASON_COPY_TO_USER); 27462306a36Sopenharmony_ci } else { 27562306a36Sopenharmony_ci /* Otherwise this is a kernel memory access. This happens when a 27662306a36Sopenharmony_ci * compat syscall passes an argument allocated on the kernel 27762306a36Sopenharmony_ci * stack to a real syscall. 27862306a36Sopenharmony_ci * Don't check anything, just copy the shadow of the copied 27962306a36Sopenharmony_ci * bytes. 28062306a36Sopenharmony_ci */ 28162306a36Sopenharmony_ci kmsan_internal_memmove_metadata((void *)to, (void *)from, 28262306a36Sopenharmony_ci to_copy - left); 28362306a36Sopenharmony_ci } 28462306a36Sopenharmony_ci user_access_restore(ua_flags); 28562306a36Sopenharmony_ci} 28662306a36Sopenharmony_ciEXPORT_SYMBOL(kmsan_copy_to_user); 28762306a36Sopenharmony_ci 28862306a36Sopenharmony_ci/* Helper function to check an URB. */ 28962306a36Sopenharmony_civoid kmsan_handle_urb(const struct urb *urb, bool is_out) 29062306a36Sopenharmony_ci{ 29162306a36Sopenharmony_ci if (!urb) 29262306a36Sopenharmony_ci return; 29362306a36Sopenharmony_ci if (is_out) 29462306a36Sopenharmony_ci kmsan_internal_check_memory(urb->transfer_buffer, 29562306a36Sopenharmony_ci urb->transfer_buffer_length, 29662306a36Sopenharmony_ci /*user_addr*/ 0, REASON_SUBMIT_URB); 29762306a36Sopenharmony_ci else 29862306a36Sopenharmony_ci kmsan_internal_unpoison_memory(urb->transfer_buffer, 29962306a36Sopenharmony_ci urb->transfer_buffer_length, 30062306a36Sopenharmony_ci /*checked*/ false); 30162306a36Sopenharmony_ci} 30262306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(kmsan_handle_urb); 30362306a36Sopenharmony_ci 30462306a36Sopenharmony_cistatic void kmsan_handle_dma_page(const void *addr, size_t size, 30562306a36Sopenharmony_ci enum dma_data_direction dir) 30662306a36Sopenharmony_ci{ 30762306a36Sopenharmony_ci switch (dir) { 30862306a36Sopenharmony_ci case DMA_BIDIRECTIONAL: 30962306a36Sopenharmony_ci kmsan_internal_check_memory((void *)addr, size, /*user_addr*/ 0, 31062306a36Sopenharmony_ci REASON_ANY); 31162306a36Sopenharmony_ci kmsan_internal_unpoison_memory((void *)addr, size, 31262306a36Sopenharmony_ci /*checked*/ false); 31362306a36Sopenharmony_ci break; 31462306a36Sopenharmony_ci case DMA_TO_DEVICE: 31562306a36Sopenharmony_ci kmsan_internal_check_memory((void *)addr, size, /*user_addr*/ 0, 31662306a36Sopenharmony_ci REASON_ANY); 31762306a36Sopenharmony_ci break; 31862306a36Sopenharmony_ci case DMA_FROM_DEVICE: 31962306a36Sopenharmony_ci kmsan_internal_unpoison_memory((void *)addr, size, 32062306a36Sopenharmony_ci /*checked*/ false); 32162306a36Sopenharmony_ci break; 32262306a36Sopenharmony_ci case DMA_NONE: 32362306a36Sopenharmony_ci break; 32462306a36Sopenharmony_ci } 32562306a36Sopenharmony_ci} 32662306a36Sopenharmony_ci 32762306a36Sopenharmony_ci/* Helper function to handle DMA data transfers. */ 32862306a36Sopenharmony_civoid kmsan_handle_dma(struct page *page, size_t offset, size_t size, 32962306a36Sopenharmony_ci enum dma_data_direction dir) 33062306a36Sopenharmony_ci{ 33162306a36Sopenharmony_ci u64 page_offset, to_go, addr; 33262306a36Sopenharmony_ci 33362306a36Sopenharmony_ci if (PageHighMem(page)) 33462306a36Sopenharmony_ci return; 33562306a36Sopenharmony_ci addr = (u64)page_address(page) + offset; 33662306a36Sopenharmony_ci /* 33762306a36Sopenharmony_ci * The kernel may occasionally give us adjacent DMA pages not belonging 33862306a36Sopenharmony_ci * to the same allocation. Process them separately to avoid triggering 33962306a36Sopenharmony_ci * internal KMSAN checks. 34062306a36Sopenharmony_ci */ 34162306a36Sopenharmony_ci while (size > 0) { 34262306a36Sopenharmony_ci page_offset = offset_in_page(addr); 34362306a36Sopenharmony_ci to_go = min(PAGE_SIZE - page_offset, (u64)size); 34462306a36Sopenharmony_ci kmsan_handle_dma_page((void *)addr, to_go, dir); 34562306a36Sopenharmony_ci addr += to_go; 34662306a36Sopenharmony_ci size -= to_go; 34762306a36Sopenharmony_ci } 34862306a36Sopenharmony_ci} 34962306a36Sopenharmony_ci 35062306a36Sopenharmony_civoid kmsan_handle_dma_sg(struct scatterlist *sg, int nents, 35162306a36Sopenharmony_ci enum dma_data_direction dir) 35262306a36Sopenharmony_ci{ 35362306a36Sopenharmony_ci struct scatterlist *item; 35462306a36Sopenharmony_ci int i; 35562306a36Sopenharmony_ci 35662306a36Sopenharmony_ci for_each_sg(sg, item, nents, i) 35762306a36Sopenharmony_ci kmsan_handle_dma(sg_page(item), item->offset, item->length, 35862306a36Sopenharmony_ci dir); 35962306a36Sopenharmony_ci} 36062306a36Sopenharmony_ci 36162306a36Sopenharmony_ci/* Functions from kmsan-checks.h follow. */ 36262306a36Sopenharmony_civoid kmsan_poison_memory(const void *address, size_t size, gfp_t flags) 36362306a36Sopenharmony_ci{ 36462306a36Sopenharmony_ci if (!kmsan_enabled || kmsan_in_runtime()) 36562306a36Sopenharmony_ci return; 36662306a36Sopenharmony_ci kmsan_enter_runtime(); 36762306a36Sopenharmony_ci /* The users may want to poison/unpoison random memory. */ 36862306a36Sopenharmony_ci kmsan_internal_poison_memory((void *)address, size, flags, 36962306a36Sopenharmony_ci KMSAN_POISON_NOCHECK); 37062306a36Sopenharmony_ci kmsan_leave_runtime(); 37162306a36Sopenharmony_ci} 37262306a36Sopenharmony_ciEXPORT_SYMBOL(kmsan_poison_memory); 37362306a36Sopenharmony_ci 37462306a36Sopenharmony_civoid kmsan_unpoison_memory(const void *address, size_t size) 37562306a36Sopenharmony_ci{ 37662306a36Sopenharmony_ci unsigned long ua_flags; 37762306a36Sopenharmony_ci 37862306a36Sopenharmony_ci if (!kmsan_enabled || kmsan_in_runtime()) 37962306a36Sopenharmony_ci return; 38062306a36Sopenharmony_ci 38162306a36Sopenharmony_ci ua_flags = user_access_save(); 38262306a36Sopenharmony_ci kmsan_enter_runtime(); 38362306a36Sopenharmony_ci /* The users may want to poison/unpoison random memory. */ 38462306a36Sopenharmony_ci kmsan_internal_unpoison_memory((void *)address, size, 38562306a36Sopenharmony_ci KMSAN_POISON_NOCHECK); 38662306a36Sopenharmony_ci kmsan_leave_runtime(); 38762306a36Sopenharmony_ci user_access_restore(ua_flags); 38862306a36Sopenharmony_ci} 38962306a36Sopenharmony_ciEXPORT_SYMBOL(kmsan_unpoison_memory); 39062306a36Sopenharmony_ci 39162306a36Sopenharmony_ci/* 39262306a36Sopenharmony_ci * Version of kmsan_unpoison_memory() that can be called from within the KMSAN 39362306a36Sopenharmony_ci * runtime. 39462306a36Sopenharmony_ci * 39562306a36Sopenharmony_ci * Non-instrumented IRQ entry functions receive struct pt_regs from assembly 39662306a36Sopenharmony_ci * code. Those regs need to be unpoisoned, otherwise using them will result in 39762306a36Sopenharmony_ci * false positives. 39862306a36Sopenharmony_ci * Using kmsan_unpoison_memory() is not an option in entry code, because the 39962306a36Sopenharmony_ci * return value of in_task() is inconsistent - as a result, certain calls to 40062306a36Sopenharmony_ci * kmsan_unpoison_memory() are ignored. kmsan_unpoison_entry_regs() ensures that 40162306a36Sopenharmony_ci * the registers are unpoisoned even if kmsan_in_runtime() is true in the early 40262306a36Sopenharmony_ci * entry code. 40362306a36Sopenharmony_ci */ 40462306a36Sopenharmony_civoid kmsan_unpoison_entry_regs(const struct pt_regs *regs) 40562306a36Sopenharmony_ci{ 40662306a36Sopenharmony_ci unsigned long ua_flags; 40762306a36Sopenharmony_ci 40862306a36Sopenharmony_ci if (!kmsan_enabled) 40962306a36Sopenharmony_ci return; 41062306a36Sopenharmony_ci 41162306a36Sopenharmony_ci ua_flags = user_access_save(); 41262306a36Sopenharmony_ci kmsan_internal_unpoison_memory((void *)regs, sizeof(*regs), 41362306a36Sopenharmony_ci KMSAN_POISON_NOCHECK); 41462306a36Sopenharmony_ci user_access_restore(ua_flags); 41562306a36Sopenharmony_ci} 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_civoid kmsan_check_memory(const void *addr, size_t size) 41862306a36Sopenharmony_ci{ 41962306a36Sopenharmony_ci if (!kmsan_enabled) 42062306a36Sopenharmony_ci return; 42162306a36Sopenharmony_ci return kmsan_internal_check_memory((void *)addr, size, /*user_addr*/ 0, 42262306a36Sopenharmony_ci REASON_ANY); 42362306a36Sopenharmony_ci} 42462306a36Sopenharmony_ciEXPORT_SYMBOL(kmsan_check_memory); 425