| From: Alexander Potapenko <glider@google.com> |
| Subject: kmsan: apply clang-format to files mm/kmsan/ |
| Date: Wed, 7 May 2025 18:00:08 +0200 |
| |
| KMSAN source files are expected to be formatted with clang-format, fix |
| some nits that slipped in. No functional change. |
| |
| Link: https://lkml.kernel.org/r/20250507160012.3311104-1-glider@google.com |
| Signed-off-by: Alexander Potapenko <glider@google.com> |
| Cc: Ilya Leoshkevich <iii@linux.ibm.com> |
| Cc: Bart van Assche <bvanassche@acm.org> |
| Cc: Dmitriy Vyukov <dvyukov@google.com> |
| Cc: Kent Overstreet <kent.overstreet@linux.dev> |
| Cc: Macro Elver <elver@google.com> |
| Signed-off-by: Andrew Morton <akpm@linux-foundation.org> |
| --- |
| |
| mm/kmsan/core.c | 4 ++-- |
| mm/kmsan/hooks.c | 4 +--- |
| mm/kmsan/init.c | 3 +-- |
| mm/kmsan/shadow.c | 3 +-- |
| 4 files changed, 5 insertions(+), 9 deletions(-) |
| |
| --- a/mm/kmsan/core.c~kmsan-apply-clang-format-to-files-mm-kmsan |
| +++ a/mm/kmsan/core.c |
| @@ -159,8 +159,8 @@ depot_stack_handle_t kmsan_internal_chai |
| * Make sure we have enough spare bits in @id to hold the UAF bit and |
| * the chain depth. |
| */ |
| - BUILD_BUG_ON( |
| - (1 << STACK_DEPOT_EXTRA_BITS) <= (KMSAN_MAX_ORIGIN_DEPTH << 1)); |
| + BUILD_BUG_ON((1 << STACK_DEPOT_EXTRA_BITS) <= |
| + (KMSAN_MAX_ORIGIN_DEPTH << 1)); |
| |
| extra_bits = stack_depot_get_extra_bits(id); |
| depth = kmsan_depth_from_eb(extra_bits); |
| --- a/mm/kmsan/hooks.c~kmsan-apply-clang-format-to-files-mm-kmsan |
| +++ a/mm/kmsan/hooks.c |
| @@ -114,9 +114,7 @@ void kmsan_kfree_large(const void *ptr) |
| kmsan_enter_runtime(); |
| page = virt_to_head_page((void *)ptr); |
| KMSAN_WARN_ON(ptr != page_address(page)); |
| - kmsan_internal_poison_memory((void *)ptr, |
| - page_size(page), |
| - GFP_KERNEL, |
| + kmsan_internal_poison_memory((void *)ptr, page_size(page), GFP_KERNEL, |
| KMSAN_POISON_CHECK | KMSAN_POISON_FREE); |
| kmsan_leave_runtime(); |
| } |
| --- a/mm/kmsan/init.c~kmsan-apply-clang-format-to-files-mm-kmsan |
| +++ a/mm/kmsan/init.c |
| @@ -35,8 +35,7 @@ static void __init kmsan_record_future_s |
| KMSAN_WARN_ON(future_index == NUM_FUTURE_RANGES); |
| KMSAN_WARN_ON((nstart >= nend) || |
| /* Virtual address 0 is valid on s390. */ |
| - (!IS_ENABLED(CONFIG_S390) && !nstart) || |
| - !nend); |
| + (!IS_ENABLED(CONFIG_S390) && !nstart) || !nend); |
| nstart = ALIGN_DOWN(nstart, PAGE_SIZE); |
| nend = ALIGN(nend, PAGE_SIZE); |
| |
| --- a/mm/kmsan/shadow.c~kmsan-apply-clang-format-to-files-mm-kmsan |
| +++ a/mm/kmsan/shadow.c |
| @@ -207,8 +207,7 @@ void kmsan_free_page(struct page *page, |
| if (!kmsan_enabled || kmsan_in_runtime()) |
| return; |
| kmsan_enter_runtime(); |
| - kmsan_internal_poison_memory(page_address(page), |
| - page_size(page), |
| + kmsan_internal_poison_memory(page_address(page), page_size(page), |
| GFP_KERNEL, |
| KMSAN_POISON_CHECK | KMSAN_POISON_FREE); |
| kmsan_leave_runtime(); |
| _ |