linux/kernel/kcsan
Marco Elver ed95f95c86 kcsan: Fix 0-sized checks
Instrumentation of arbitrary memory-copy functions, such as user-copies,
may be called with size of 0, which could lead to false positives.

To avoid this, add a comparison in check_access() for size==0, which
will be optimized out for constant sized instrumentation
(__tsan_{read,write}N), and therefore not affect the common-case
fast-path.

Signed-off-by: Marco Elver <elver@google.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2020-03-21 09:42:42 +01:00
..
atomic.h kcsan: Prefer __always_inline for fast-path 2020-03-21 09:40:19 +01:00
core.c kcsan: Fix 0-sized checks 2020-03-21 09:42:42 +01:00
debugfs.c kcsan: Improve various small stylistic details 2019-11-20 10:47:23 +01:00
encoding.h kcsan: Prefer __always_inline for fast-path 2020-03-21 09:40:19 +01:00
kcsan.h kcsan: Show full access type in report 2020-03-21 09:40:42 +01:00
Makefile kcsan, ubsan: Make KCSAN+UBSAN work together 2020-01-07 07:47:23 -08:00
report.c kcsan: Address missing case with KCSAN_REPORT_VALUE_CHANGE_ONLY 2020-03-21 09:41:29 +01:00
test.c kcsan: Fix 0-sized checks 2020-03-21 09:42:42 +01:00