diff options
| author | Alexander Potapenko <[email protected]> | 2022-11-02 11:06:11 +0000 |
|---|---|---|
| committer | Andrew Morton <[email protected]> | 2022-11-08 23:57:24 +0000 |
| commit | ba54d194f8daad8943802d6dfe06e205f882c391 (patch) | |
| tree | f0b6971ef0ef09d4a5ffa01ab24c8885d2478aa7 /tools/lib/api/fs/tracing_path.c | |
| parent | kmsan: make sure PREEMPT_RT is off (diff) | |
| download | kernel-ba54d194f8daad8943802d6dfe06e205f882c391.tar.gz kernel-ba54d194f8daad8943802d6dfe06e205f882c391.zip | |
x86/traps: avoid KMSAN bugs originating from handle_bug()
There is a case in exc_invalid_op handler that is executed outside the
irqentry_enter()/irqentry_exit() region when an UD2 instruction is used to
encode a call to __warn().
In that case the `struct pt_regs` passed to the interrupt handler is never
unpoisoned by KMSAN (this is normally done in irqentry_enter()), which
leads to false positives inside handle_bug().
Use kmsan_unpoison_entry_regs() to explicitly unpoison those registers
before using them.
Link: https://lkml.kernel.org/r/[email protected]
Signed-off-by: Alexander Potapenko <[email protected]>
Cc: Borislav Petkov <[email protected]>
Cc: Dave Hansen <[email protected]>
Cc: Ingo Molnar <[email protected]>
Cc: Thomas Gleixner <[email protected]>
Cc: Dmitry Vyukov <[email protected]>
Cc: Kees Cook <[email protected]>
Cc: Marco Elver <[email protected]>
Cc: Masahiro Yamada <[email protected]>
Cc: Nick Desaulniers <[email protected]>
Cc: Peter Zijlstra (Intel) <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Diffstat (limited to 'tools/lib/api/fs/tracing_path.c')
0 files changed, 0 insertions, 0 deletions
