aboutsummaryrefslogtreecommitdiff
path: root/mm/memcontrol.c
diff options
context:
space:
mode:
authorGravatar Alexander Potapenko <glider@google.com> 2024-01-24 18:31:34 +0100
committerGravatar Andrew Morton <akpm@linux-foundation.org> 2024-02-22 10:24:41 -0800
commitd749cc7547bb46be73da848576ea155daf8186f3 (patch)
tree000dac1d786fef35069720ce4d55f23d65e97b99 /mm/memcontrol.c
parenthighmem: add kernel-doc for memcpy_*_folio() (diff)
downloadlinux-d749cc7547bb46be73da848576ea155daf8186f3.tar.gz
linux-d749cc7547bb46be73da848576ea155daf8186f3.tar.bz2
linux-d749cc7547bb46be73da848576ea155daf8186f3.zip
mm: kmsan: remove runtime checks from kmsan_unpoison_memory()
Similarly to what's been done in commit 85716a80c16d ("kmsan: allow using __msan_instrument_asm_store() inside runtime"), it should be safe to call kmsan_unpoison_memory() from within the runtime, as it does not allocate memory or take locks. Remove the redundant runtime checks. This should fix false positives seen with CONFIG_DEBUG_LIST=y when the non-instrumented lib/stackdepot.c failed to unpoison the memory chunks later checked by the instrumented lib/list_debug.c Also replace the implementation of kmsan_unpoison_entry_regs() with a call to kmsan_unpoison_memory(). Link: https://lkml.kernel.org/r/20240124173134.1165747-1-glider@google.com Fixes: f80be4571b19 ("kmsan: add KMSAN runtime core") Signed-off-by: Alexander Potapenko <glider@google.com> Tested-by: Marco Elver <elver@google.com> Cc: Dmitry Vyukov <dvyukov@google.com> Cc: Ilya Leoshkevich <iii@linux.ibm.com> Cc: Nicholas Miehlbradt <nicholas@linux.ibm.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Diffstat (limited to 'mm/memcontrol.c')
0 files changed, 0 insertions, 0 deletions