diff options
| author | Ingo Molnar <mingo@kernel.org> | 2016-02-13 02:30:07 -0500 |
|---|---|---|
| committer | Ingo Molnar <mingo@kernel.org> | 2016-02-13 02:30:07 -0500 |
| commit | e2d6f8a5f596b1f09839990b11a3c2e0c9f0dbc2 (patch) | |
| tree | 7ccf35788cbb9def996204399f079366da251361 /lib | |
| parent | fed0764fafd8e2e629a033c0f7df4106b0dcb7f0 (diff) | |
| parent | 0cbb0b92689a1c4e0ac55f6188be563a813ac808 (diff) | |
Merge branch 'linus' into locking/core, to resolve conflicts
Conflicts:
kernel/locking/lockdep.c
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Diffstat (limited to 'lib')
| -rw-r--r-- | lib/Kconfig.debug | 15 | ||||
| -rw-r--r-- | lib/Kconfig.ubsan | 4 | ||||
| -rw-r--r-- | lib/vsprintf.c | 26 |
3 files changed, 31 insertions, 14 deletions
diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index ecb9e75614bf..8bfd1aca7a3d 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug | |||
| @@ -1400,6 +1400,21 @@ config RCU_EQS_DEBUG | |||
| 1400 | 1400 | ||
| 1401 | endmenu # "RCU Debugging" | 1401 | endmenu # "RCU Debugging" |
| 1402 | 1402 | ||
| 1403 | config DEBUG_WQ_FORCE_RR_CPU | ||
| 1404 | bool "Force round-robin CPU selection for unbound work items" | ||
| 1405 | depends on DEBUG_KERNEL | ||
| 1406 | default n | ||
| 1407 | help | ||
| 1408 | Workqueue used to implicitly guarantee that work items queued | ||
| 1409 | without explicit CPU specified are put on the local CPU. This | ||
| 1410 | guarantee is no longer true and while local CPU is still | ||
| 1411 | preferred work items may be put on foreign CPUs. Kernel | ||
| 1412 | parameter "workqueue.debug_force_rr_cpu" is added to force | ||
| 1413 | round-robin CPU selection to flush out usages which depend on the | ||
| 1414 | now broken guarantee. This config option enables the debug | ||
| 1415 | feature by default. When enabled, memory and cache locality will | ||
| 1416 | be impacted. | ||
| 1417 | |||
| 1403 | config DEBUG_BLOCK_EXT_DEVT | 1418 | config DEBUG_BLOCK_EXT_DEVT |
| 1404 | bool "Force extended block device numbers and spread them" | 1419 | bool "Force extended block device numbers and spread them" |
| 1405 | depends on DEBUG_KERNEL | 1420 | depends on DEBUG_KERNEL |
diff --git a/lib/Kconfig.ubsan b/lib/Kconfig.ubsan index 49518fb48cab..e07c1ba9ba13 100644 --- a/lib/Kconfig.ubsan +++ b/lib/Kconfig.ubsan | |||
| @@ -18,6 +18,8 @@ config UBSAN_SANITIZE_ALL | |||
| 18 | This option activates instrumentation for the entire kernel. | 18 | This option activates instrumentation for the entire kernel. |
| 19 | If you don't enable this option, you have to explicitly specify | 19 | If you don't enable this option, you have to explicitly specify |
| 20 | UBSAN_SANITIZE := y for the files/directories you want to check for UB. | 20 | UBSAN_SANITIZE := y for the files/directories you want to check for UB. |
| 21 | Enabling this option will get kernel image size increased | ||
| 22 | significantly. | ||
| 21 | 23 | ||
| 22 | config UBSAN_ALIGNMENT | 24 | config UBSAN_ALIGNMENT |
| 23 | bool "Enable checking of pointers alignment" | 25 | bool "Enable checking of pointers alignment" |
| @@ -25,5 +27,5 @@ config UBSAN_ALIGNMENT | |||
| 25 | default y if !HAVE_EFFICIENT_UNALIGNED_ACCESS | 27 | default y if !HAVE_EFFICIENT_UNALIGNED_ACCESS |
| 26 | help | 28 | help |
| 27 | This option enables detection of unaligned memory accesses. | 29 | This option enables detection of unaligned memory accesses. |
| 28 | Enabling this option on architectures that support unalligned | 30 | Enabling this option on architectures that support unaligned |
| 29 | accesses may produce a lot of false positives. | 31 | accesses may produce a lot of false positives. |
diff --git a/lib/vsprintf.c b/lib/vsprintf.c index 48ff9c36644d..f44e178e6ede 100644 --- a/lib/vsprintf.c +++ b/lib/vsprintf.c | |||
| @@ -1590,22 +1590,23 @@ char *pointer(const char *fmt, char *buf, char *end, void *ptr, | |||
| 1590 | return buf; | 1590 | return buf; |
| 1591 | } | 1591 | } |
| 1592 | case 'K': | 1592 | case 'K': |
| 1593 | /* | ||
| 1594 | * %pK cannot be used in IRQ context because its test | ||
| 1595 | * for CAP_SYSLOG would be meaningless. | ||
| 1596 | */ | ||
| 1597 | if (kptr_restrict && (in_irq() || in_serving_softirq() || | ||
| 1598 | in_nmi())) { | ||
| 1599 | if (spec.field_width == -1) | ||
| 1600 | spec.field_width = default_width; | ||
| 1601 | return string(buf, end, "pK-error", spec); | ||
| 1602 | } | ||
| 1603 | |||
| 1604 | switch (kptr_restrict) { | 1593 | switch (kptr_restrict) { |
| 1605 | case 0: | 1594 | case 0: |
| 1606 | /* Always print %pK values */ | 1595 | /* Always print %pK values */ |
| 1607 | break; | 1596 | break; |
| 1608 | case 1: { | 1597 | case 1: { |
| 1598 | const struct cred *cred; | ||
| 1599 | |||
| 1600 | /* | ||
| 1601 | * kptr_restrict==1 cannot be used in IRQ context | ||
| 1602 | * because its test for CAP_SYSLOG would be meaningless. | ||
| 1603 | */ | ||
| 1604 | if (in_irq() || in_serving_softirq() || in_nmi()) { | ||
| 1605 | if (spec.field_width == -1) | ||
| 1606 | spec.field_width = default_width; | ||
| 1607 | return string(buf, end, "pK-error", spec); | ||
| 1608 | } | ||
| 1609 | |||
| 1609 | /* | 1610 | /* |
| 1610 | * Only print the real pointer value if the current | 1611 | * Only print the real pointer value if the current |
| 1611 | * process has CAP_SYSLOG and is running with the | 1612 | * process has CAP_SYSLOG and is running with the |
| @@ -1615,8 +1616,7 @@ char *pointer(const char *fmt, char *buf, char *end, void *ptr, | |||
| 1615 | * leak pointer values if a binary opens a file using | 1616 | * leak pointer values if a binary opens a file using |
| 1616 | * %pK and then elevates privileges before reading it. | 1617 | * %pK and then elevates privileges before reading it. |
| 1617 | */ | 1618 | */ |
| 1618 | const struct cred *cred = current_cred(); | 1619 | cred = current_cred(); |
| 1619 | |||
| 1620 | if (!has_capability_noaudit(current, CAP_SYSLOG) || | 1620 | if (!has_capability_noaudit(current, CAP_SYSLOG) || |
| 1621 | !uid_eq(cred->euid, cred->uid) || | 1621 | !uid_eq(cred->euid, cred->uid) || |
| 1622 | !gid_eq(cred->egid, cred->gid)) | 1622 | !gid_eq(cred->egid, cred->gid)) |
