https://github.com/google/kmsan
Revision 11aac78b03b5e12498676313d5075246f87469d2 authored by Alexander Potapenko on 10 November 2022, 08:58:00 UTC, committed by Alexander Potapenko on 19 June 2023, 08:56:03 UTC
Certain parts of the kernel may copy the same chunks of uninitialized
memory many times, hitting the limit on the depth of origin chains.

Although this may not necessarily exceed the stack depot capacity, it
may be helpful to inspect such cases, which might be causing KMSAN
slowdown.

Signed-off-by: Alexander Potapenko <glider@google.com>
1 parent 1c89178
History
Tip revision: 11aac78b03b5e12498676313d5075246f87469d2 authored by Alexander Potapenko on 10 November 2022, 08:58:00 UTC
DO-NOT-SUBMIT: kmsan: add the kmsan_exceed_max_origin_depth tracing event
Tip revision: 11aac78
File Mode Size
.allstar
Documentation
LICENSES
arch
block
certs
crypto
drivers
fs
include
init
io_uring
ipc
kernel
lib
mm
net
rust
samples
scripts
security
sound
tools
usr
virt
.clang-format -rw-r--r-- 20.1 KB
.cocciconfig -rw-r--r-- 59 bytes
.config.example -rw-r--r-- 148.6 KB
.config.extended -rw-r--r-- 133.2 KB
.get_maintainer.ignore -rw-r--r-- 151 bytes
.gitattributes -rw-r--r-- 90 bytes
.gitignore -rw-r--r-- 2.1 KB
.mailmap -rw-r--r-- 28.0 KB
.rustfmt.toml -rw-r--r-- 369 bytes
COPYING -rw-r--r-- 496 bytes
CREDITS -rw-r--r-- 100.1 KB
Kbuild -rw-r--r-- 2.5 KB
Kconfig -rw-r--r-- 555 bytes
MAINTAINERS -rw-r--r-- 694.2 KB
Makefile -rw-r--r-- 70.1 KB
README -rw-r--r-- 727 bytes
README.md -rw-r--r-- 2.4 KB
SECURITY.md -rw-r--r-- 283 bytes

README.md

back to top