Revision 83fd66f70a3c1463685ad0e11272fafe9f5fe06d authored by Alexander Potapenko on 20 December 2018, 16:10:15 UTC, committed by Alexander Potapenko on 08 January 2020, 14:07:57 UTC
In order to report uninitialized memory coming from heap allocations
KMSAN has to poison them unless they're created with __GFP_ZERO.

It's handy that we need KMSAN hooks in the places where
init_on_alloc/init_on_free initialization is performed.

Signed-off-by: Alexander Potapenko <glider@google.com>
To: Alexander Potapenko <glider@google.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Vegard Nossum <vegard.nossum@oracle.com>
Cc: Dmitry Vyukov <dvyukov@google.com>
Cc: Marco Elver <elver@google.com>
Cc: Andrey Konovalov <andreyknvl@google.com>
Cc: linux-mm@kvack.org
---
v3:
 - reverted unrelated whitespace changes

Change-Id: I51103b7981d3aabed747d0c85cbdc85568665871
1 parent 8c8a406
History
File Mode Size
crush
Kconfig -rw-r--r-- 1.1 KB
Makefile -rw-r--r-- 449 bytes
armor.c -rw-r--r-- 1.9 KB
auth.c -rw-r--r-- 7.9 KB
auth_none.c -rw-r--r-- 3.1 KB
auth_none.h -rw-r--r-- 502 bytes
auth_x.c -rw-r--r-- 23.1 KB
auth_x.h -rw-r--r-- 1013 bytes
auth_x_protocol.h -rw-r--r-- 1.9 KB
buffer.c -rw-r--r-- 1.2 KB
ceph_common.c -rw-r--r-- 20.1 KB
ceph_fs.c -rw-r--r-- 2.6 KB
ceph_hash.c -rw-r--r-- 2.9 KB
ceph_strings.c -rw-r--r-- 1.2 KB
cls_lock_client.c -rw-r--r-- 11.5 KB
crypto.c -rw-r--r-- 7.9 KB
crypto.h -rw-r--r-- 1.0 KB
debugfs.c -rw-r--r-- 12.2 KB
decode.c -rw-r--r-- 2.0 KB
messenger.c -rw-r--r-- 88.3 KB
mon_client.c -rw-r--r-- 33.2 KB
msgpool.c -rw-r--r-- 2.3 KB
osd_client.c -rw-r--r-- 145.9 KB
osdmap.c -rw-r--r-- 60.3 KB
pagelist.c -rw-r--r-- 4.0 KB
pagevec.c -rw-r--r-- 3.3 KB
snapshot.c -rw-r--r-- 1.6 KB
string_table.c -rw-r--r-- 2.2 KB
striper.c -rw-r--r-- 7.7 KB

back to top