1. 18 2月, 2010 1 次提交
    • C
      kmemcheck: Test the full object in kmemcheck_is_obj_initialized() · 81fc0390
      Catalin Marinas 提交于
      This is a fix for bug #14845 (bugzilla.kernel.org). The update_checksum()
      function in mm/kmemleak.c calls kmemcheck_is_obj_initialised() before scanning
      an object. When KMEMCHECK_PARTIAL_OK is enabled, this function returns true.
      However, the crc32_le() reads smaller intervals (32-bit) for which
      kmemleak_is_obj_initialised() may be false leading to a kmemcheck warning.
      
      Note that kmemcheck_is_obj_initialized() is currently only used by
      kmemleak before scanning a memory location.
      Signed-off-by: NCatalin Marinas <catalin.marinas@arm.com>
      Cc: Andrew Morton <akpm@linux-foundation.org>
      Cc: Christian Casteyde <casteyde.christian@free.fr>
      Cc: Vegard Nossum <vegardno@ifi.uio.no>
      Signed-off-by: NPekka Enberg <penberg@cs.helsinki.fi>
      81fc0390
  2. 20 9月, 2009 1 次提交
  3. 02 7月, 2009 1 次提交
  4. 15 6月, 2009 1 次提交
  5. 13 6月, 2009 2 次提交
    • R
      kmemcheck: include module.h to prevent warnings · 60e38393
      Randy Dunlap 提交于
      kmemcheck/shadow.c needs to include <linux/module.h> to prevent
      the following warnings:
      
      linux-next-20080724/arch/x86/mm/kmemcheck/shadow.c:64: warning : data definition has no type or storage class
      linux-next-20080724/arch/x86/mm/kmemcheck/shadow.c:64: warning : type defaults to 'int' in declaration of 'EXPORT_SYMBOL_GPL'
      linux-next-20080724/arch/x86/mm/kmemcheck/shadow.c:64: warning : parameter names (without types) in function declaration
      Signed-off-by: NRandy Dunlap <randy.dunlap@oracle.com>
      Cc: vegardno@ifi.uio.no
      Cc: penberg@cs.helsinki.fi
      Cc: akpm <akpm@linux-foundation.org>
      Signed-off-by: NIngo Molnar <mingo@elte.hu>
      60e38393
    • V
      kmemcheck: add the kmemcheck core · dfec072e
      Vegard Nossum 提交于
      General description: kmemcheck is a patch to the linux kernel that
      detects use of uninitialized memory. It does this by trapping every
      read and write to memory that was allocated dynamically (e.g. using
      kmalloc()). If a memory address is read that has not previously been
      written to, a message is printed to the kernel log.
      
      Thanks to Andi Kleen for the set_memory_4k() solution.
      
      Andrew Morton suggested documenting the shadow member of struct page.
      Signed-off-by: NVegard Nossum <vegardno@ifi.uio.no>
      Signed-off-by: NPekka Enberg <penberg@cs.helsinki.fi>
      
      [export kmemcheck_mark_initialized]
      [build fix for setup_max_cpus]
      Signed-off-by: NIngo Molnar <mingo@elte.hu>
      
      [rebased for mainline inclusion]
      Signed-off-by: NVegard Nossum <vegardno@ifi.uio.no>
      dfec072e