aboutsummaryrefslogtreecommitdiffstats
path: root/lib/test_kasan_module.c
diff options
context:
space:
mode:
authorGuo Ren <guoren@linux.alibaba.com>2021-11-05 13:36:09 -0700
committerLinus Torvalds <torvalds@linux-foundation.org>2021-11-06 13:30:33 -0700
commit8772716f96704c67b1e2a6ba175605b4fce2a252 (patch)
tree59b6eae7f001bab45e524eaef6f153487c0e2caa /lib/test_kasan_module.c
parentmm/smaps: simplify shmem handling of pte holes (diff)
downloadlinux-dev-8772716f96704c67b1e2a6ba175605b4fce2a252.tar.xz
linux-dev-8772716f96704c67b1e2a6ba175605b4fce2a252.zip
mm: debug_vm_pgtable: don't use __P000 directly
The __Pxxx/__Sxxx macros are only for protection_map[] init. All usage of them in linux should come from protection_map array. Because a lot of architectures would re-initilize protection_map[] array, eg: x86-mem_encrypt, m68k-motorola, mips, arm, sparc. Using __P000 is not rigorous. Link: https://lkml.kernel.org/r/20210924060821.1138281-1-guoren@kernel.org Signed-off-by: Guo Ren <guoren@linux.alibaba.com> Reviewed-by: Andrew Morton <akpm@linux-foundation.org> Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com> Cc: Gavin Shan <gshan@redhat.com> Cc: Christophe Leroy <christophe.leroy@csgroup.eu> Cc: Gerald Schaefer <gerald.schaefer@linux.ibm.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'lib/test_kasan_module.c')
0 files changed, 0 insertions, 0 deletions