[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACT4Y+YO45bfyCaeaLP-xAVDOjSE8xnbXpv-Dz7t3W7C5jPd6Q@mail.gmail.com>
Date: Wed, 10 Apr 2019 13:31:41 +0200
From: Dmitry Vyukov <dvyukov@...gle.com>
To: Thomas Gleixner <tglx@...utronix.de>
Cc: LKML <linux-kernel@...r.kernel.org>,
Josh Poimboeuf <jpoimboe@...hat.com>,
"the arch/x86 maintainers" <x86@...nel.org>,
Andy Lutomirski <luto@...nel.org>,
Steven Rostedt <rostedt@...dmis.org>,
Alexander Potapenko <glider@...gle.com>,
Andrey Ryabinin <aryabinin@...tuozzo.com>,
kasan-dev <kasan-dev@...glegroups.com>,
Linux-MM <linux-mm@...ck.org>
Subject: Re: [RFC patch 13/41] mm/kasan: Remove the ULONG_MAX stack trace hackery
On Wed, Apr 10, 2019 at 1:05 PM Thomas Gleixner <tglx@...utronix.de> wrote:
>
> No architecture terminates the stack trace with ULONG_MAX anymore. Remove
> the cruft.
>
> Signed-off-by: Thomas Gleixner <tglx@...utronix.de>
> Cc: Andrey Ryabinin <aryabinin@...tuozzo.com>
> Cc: Alexander Potapenko <glider@...gle.com>
> Cc: kasan-dev@...glegroups.com
> Cc: Dmitry Vyukov <dvyukov@...gle.com>
> Cc: linux-mm@...ck.org
> ---
> mm/kasan/common.c | 3 ---
> 1 file changed, 3 deletions(-)
>
> --- a/mm/kasan/common.c
> +++ b/mm/kasan/common.c
> @@ -74,9 +74,6 @@ static inline depot_stack_handle_t save_
>
> save_stack_trace(&trace);
> filter_irq_stacks(&trace);
> - if (trace.nr_entries != 0 &&
> - trace.entries[trace.nr_entries-1] == ULONG_MAX)
> - trace.nr_entries--;
>
> return depot_save_stack(&trace, flags);
> }
Acked-by: Dmitry Vyukov <dvyukov@...gle.com>
Powered by blists - more mailing lists