aboutsummaryrefslogtreecommitdiffstats
path: root/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/Util.py
diff options
context:
space:
mode:
authorPavel Tatashin <[email protected]>2018-07-04 00:02:53 +0000
committerLinus Torvalds <[email protected]>2018-07-04 00:32:19 +0000
commitfc36def997cfd6cbff3eda4f82853a5c311c5466 (patch)
tree30bcbc53d846d0af57df66256968458590cb7cd7 /tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/Util.py
parentARM: disable KCOV for trusted foundations code (diff)
downloadkernel-fc36def997cfd6cbff3eda4f82853a5c311c5466.tar.gz
kernel-fc36def997cfd6cbff3eda4f82853a5c311c5466.zip
mm: teach dump_page() to correctly output poisoned struct pages
If struct page is poisoned, and uninitialized access is detected via PF_POISONED_CHECK(page) dump_page() is called to output the page. But, the dump_page() itself accesses struct page to determine how to print it, and therefore gets into a recursive loop. For example: dump_page() __dump_page() PageSlab(page) PF_POISONED_CHECK(page) VM_BUG_ON_PGFLAGS(PagePoisoned(page), page) dump_page() recursion loop. Link: http://lkml.kernel.org/r/[email protected] Fixes: f165b378bbdf ("mm: uninitialized struct page poisoning sanity checking") Signed-off-by: Pavel Tatashin <[email protected]> Acked-by: Michal Hocko <[email protected]> Cc: <[email protected]> Signed-off-by: Andrew Morton <[email protected]> Signed-off-by: Linus Torvalds <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/Util.py')
0 files changed, 0 insertions, 0 deletions