kmsan: apply clang-format to files mm/kmsan/
KMSAN source files are expected to be formatted with clang-format, fix some nits that slipped in. No functional change. Link: https://lkml.kernel.org/r/20250507160012.3311104-1-glider@google.com Signed-off-by: Alexander Potapenko <glider@google.com> Cc: Ilya Leoshkevich <iii@linux.ibm.com> Cc: Bart van Assche <bvanassche@acm.org> Cc: Dmitriy Vyukov <dvyukov@google.com> Cc: Kent Overstreet <kent.overstreet@linux.dev> Cc: Macro Elver <elver@google.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>pull/1253/head
parent
e341f9c3c8
commit
1c1db46706
|
|
@ -159,8 +159,8 @@ depot_stack_handle_t kmsan_internal_chain_origin(depot_stack_handle_t id)
|
||||||
* Make sure we have enough spare bits in @id to hold the UAF bit and
|
* Make sure we have enough spare bits in @id to hold the UAF bit and
|
||||||
* the chain depth.
|
* the chain depth.
|
||||||
*/
|
*/
|
||||||
BUILD_BUG_ON(
|
BUILD_BUG_ON((1 << STACK_DEPOT_EXTRA_BITS) <=
|
||||||
(1 << STACK_DEPOT_EXTRA_BITS) <= (KMSAN_MAX_ORIGIN_DEPTH << 1));
|
(KMSAN_MAX_ORIGIN_DEPTH << 1));
|
||||||
|
|
||||||
extra_bits = stack_depot_get_extra_bits(id);
|
extra_bits = stack_depot_get_extra_bits(id);
|
||||||
depth = kmsan_depth_from_eb(extra_bits);
|
depth = kmsan_depth_from_eb(extra_bits);
|
||||||
|
|
|
||||||
|
|
@ -114,9 +114,7 @@ void kmsan_kfree_large(const void *ptr)
|
||||||
kmsan_enter_runtime();
|
kmsan_enter_runtime();
|
||||||
page = virt_to_head_page((void *)ptr);
|
page = virt_to_head_page((void *)ptr);
|
||||||
KMSAN_WARN_ON(ptr != page_address(page));
|
KMSAN_WARN_ON(ptr != page_address(page));
|
||||||
kmsan_internal_poison_memory((void *)ptr,
|
kmsan_internal_poison_memory((void *)ptr, page_size(page), GFP_KERNEL,
|
||||||
page_size(page),
|
|
||||||
GFP_KERNEL,
|
|
||||||
KMSAN_POISON_CHECK | KMSAN_POISON_FREE);
|
KMSAN_POISON_CHECK | KMSAN_POISON_FREE);
|
||||||
kmsan_leave_runtime();
|
kmsan_leave_runtime();
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -35,8 +35,7 @@ static void __init kmsan_record_future_shadow_range(void *start, void *end)
|
||||||
KMSAN_WARN_ON(future_index == NUM_FUTURE_RANGES);
|
KMSAN_WARN_ON(future_index == NUM_FUTURE_RANGES);
|
||||||
KMSAN_WARN_ON((nstart >= nend) ||
|
KMSAN_WARN_ON((nstart >= nend) ||
|
||||||
/* Virtual address 0 is valid on s390. */
|
/* Virtual address 0 is valid on s390. */
|
||||||
(!IS_ENABLED(CONFIG_S390) && !nstart) ||
|
(!IS_ENABLED(CONFIG_S390) && !nstart) || !nend);
|
||||||
!nend);
|
|
||||||
nstart = ALIGN_DOWN(nstart, PAGE_SIZE);
|
nstart = ALIGN_DOWN(nstart, PAGE_SIZE);
|
||||||
nend = ALIGN(nend, PAGE_SIZE);
|
nend = ALIGN(nend, PAGE_SIZE);
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -207,8 +207,7 @@ void kmsan_free_page(struct page *page, unsigned int order)
|
||||||
if (!kmsan_enabled || kmsan_in_runtime())
|
if (!kmsan_enabled || kmsan_in_runtime())
|
||||||
return;
|
return;
|
||||||
kmsan_enter_runtime();
|
kmsan_enter_runtime();
|
||||||
kmsan_internal_poison_memory(page_address(page),
|
kmsan_internal_poison_memory(page_address(page), page_size(page),
|
||||||
page_size(page),
|
|
||||||
GFP_KERNEL,
|
GFP_KERNEL,
|
||||||
KMSAN_POISON_CHECK | KMSAN_POISON_FREE);
|
KMSAN_POISON_CHECK | KMSAN_POISON_FREE);
|
||||||
kmsan_leave_runtime();
|
kmsan_leave_runtime();
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue