mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-05 08:07:10 +07:00
dfec072ecd
General description: kmemcheck is a patch to the linux kernel that detects use of uninitialized memory. It does this by trapping every read and write to memory that was allocated dynamically (e.g. using kmalloc()). If a memory address is read that has not previously been written to, a message is printed to the kernel log. Thanks to Andi Kleen for the set_memory_4k() solution. Andrew Morton suggested documenting the shadow member of struct page. Signed-off-by: Vegard Nossum <vegardno@ifi.uio.no> Signed-off-by: Pekka Enberg <penberg@cs.helsinki.fi> [export kmemcheck_mark_initialized] [build fix for setup_max_cpus] Signed-off-by: Ingo Molnar <mingo@elte.hu> [rebased for mainline inclusion] Signed-off-by: Vegard Nossum <vegardno@ifi.uio.no>
43 lines
847 B
C
43 lines
847 B
C
#ifndef ASM_X86_KMEMCHECK_H
|
|
#define ASM_X86_KMEMCHECK_H
|
|
|
|
#include <linux/types.h>
|
|
#include <asm/ptrace.h>
|
|
|
|
#ifdef CONFIG_KMEMCHECK
|
|
bool kmemcheck_active(struct pt_regs *regs);
|
|
|
|
void kmemcheck_show(struct pt_regs *regs);
|
|
void kmemcheck_hide(struct pt_regs *regs);
|
|
|
|
bool kmemcheck_fault(struct pt_regs *regs,
|
|
unsigned long address, unsigned long error_code);
|
|
bool kmemcheck_trap(struct pt_regs *regs);
|
|
#else
|
|
static inline bool kmemcheck_active(struct pt_regs *regs)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline void kmemcheck_show(struct pt_regs *regs)
|
|
{
|
|
}
|
|
|
|
static inline void kmemcheck_hide(struct pt_regs *regs)
|
|
{
|
|
}
|
|
|
|
static inline bool kmemcheck_fault(struct pt_regs *regs,
|
|
unsigned long address, unsigned long error_code)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline bool kmemcheck_trap(struct pt_regs *regs)
|
|
{
|
|
return false;
|
|
}
|
|
#endif /* CONFIG_KMEMCHECK */
|
|
|
|
#endif
|