aboutsummaryrefslogtreecommitdiffstats
path: root/mm/hugetlb.c
diff options
context:
space:
mode:
authorAlexander Potapenko <[email protected]>2024-05-28 10:48:06 +0000
committerAndrew Morton <[email protected]>2024-06-06 02:19:25 +0000
commit2ef3cec44c60ae171b287db7fc2aa341586d65ba (patch)
treef55c92430f01a4c594020af42344ec8dee417f2a /mm/hugetlb.c
parentvmalloc: check CONFIG_EXECMEM in is_vmalloc_or_module_addr() (diff)
downloadkernel-2ef3cec44c60ae171b287db7fc2aa341586d65ba.tar.gz
kernel-2ef3cec44c60ae171b287db7fc2aa341586d65ba.zip
kmsan: do not wipe out origin when doing partial unpoisoning
As noticed by Brian, KMSAN should not be zeroing the origin when unpoisoning parts of a four-byte uninitialized value, e.g.: char a[4]; kmsan_unpoison_memory(a, 1); This led to false negatives, as certain poisoned values could receive zero origins, preventing those values from being reported. To fix the problem, check that kmsan_internal_set_shadow_origin() writes zero origins only to slots which have zero shadow. Link: https://lkml.kernel.org/r/[email protected] Fixes: f80be4571b19 ("kmsan: add KMSAN runtime core") Signed-off-by: Alexander Potapenko <[email protected]> Reported-by: Brian Johannesmeyer <[email protected]> Link: https://lore.kernel.org/lkml/[email protected]/T/ Reviewed-by: Marco Elver <[email protected]> Tested-by: Brian Johannesmeyer <[email protected]> Cc: Dmitry Vyukov <[email protected]> Cc: Kees Cook <[email protected]> Cc: <[email protected]> Signed-off-by: Andrew Morton <[email protected]>
Diffstat (limited to 'mm/hugetlb.c')
0 files changed, 0 insertions, 0 deletions