]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
kmsan: apply clang-format to files mm/kmsan/
authorAlexander Potapenko <glider@google.com>
Wed, 7 May 2025 16:00:08 +0000 (18:00 +0200)
committerAndrew Morton <akpm@linux-foundation.org>
Wed, 21 May 2025 16:55:15 +0000 (09:55 -0700)
KMSAN source files are expected to be formatted with clang-format, fix
some nits that slipped in.  No functional change.

Link: https://lkml.kernel.org/r/20250507160012.3311104-1-glider@google.com
Signed-off-by: Alexander Potapenko <glider@google.com>
Cc: Ilya Leoshkevich <iii@linux.ibm.com>
Cc: Bart van Assche <bvanassche@acm.org>
Cc: Dmitriy Vyukov <dvyukov@google.com>
Cc: Kent Overstreet <kent.overstreet@linux.dev>
Cc: Macro Elver <elver@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
mm/kmsan/core.c
mm/kmsan/hooks.c
mm/kmsan/init.c
mm/kmsan/shadow.c

index a495debf143632fb115ef376374e74fc12c50339..a97dc90fa6a93d3da55b7f7412554ac8de45db20 100644 (file)
@@ -159,8 +159,8 @@ depot_stack_handle_t kmsan_internal_chain_origin(depot_stack_handle_t id)
         * Make sure we have enough spare bits in @id to hold the UAF bit and
         * the chain depth.
         */
-       BUILD_BUG_ON(
-               (1 << STACK_DEPOT_EXTRA_BITS) <= (KMSAN_MAX_ORIGIN_DEPTH << 1));
+       BUILD_BUG_ON((1 << STACK_DEPOT_EXTRA_BITS) <=
+                    (KMSAN_MAX_ORIGIN_DEPTH << 1));
 
        extra_bits = stack_depot_get_extra_bits(id);
        depth = kmsan_depth_from_eb(extra_bits);
index 3df45c25c1f62f0cbbb5441103e0c67b1e683f8a..05f2faa54054598ed0d9a0ae052af483431db9ff 100644 (file)
@@ -114,9 +114,7 @@ void kmsan_kfree_large(const void *ptr)
        kmsan_enter_runtime();
        page = virt_to_head_page((void *)ptr);
        KMSAN_WARN_ON(ptr != page_address(page));
-       kmsan_internal_poison_memory((void *)ptr,
-                                    page_size(page),
-                                    GFP_KERNEL,
+       kmsan_internal_poison_memory((void *)ptr, page_size(page), GFP_KERNEL,
                                     KMSAN_POISON_CHECK | KMSAN_POISON_FREE);
        kmsan_leave_runtime();
 }
index 10f52c085e6cd99108447c5cb927f28ccd44dc70..b14ce3417e65e497e0b926e2930a8213d481242b 100644 (file)
@@ -35,8 +35,7 @@ static void __init kmsan_record_future_shadow_range(void *start, void *end)
        KMSAN_WARN_ON(future_index == NUM_FUTURE_RANGES);
        KMSAN_WARN_ON((nstart >= nend) ||
                      /* Virtual address 0 is valid on s390. */
-                     (!IS_ENABLED(CONFIG_S390) && !nstart) ||
-                     !nend);
+                     (!IS_ENABLED(CONFIG_S390) && !nstart) || !nend);
        nstart = ALIGN_DOWN(nstart, PAGE_SIZE);
        nend = ALIGN(nend, PAGE_SIZE);
 
index 1bb505a08415d5269b8ddf858db3e2072ff19dcb..6d32bfc18d6a2e9e8b705ea0f98aa9dc177d4b6a 100644 (file)
@@ -207,8 +207,7 @@ void kmsan_free_page(struct page *page, unsigned int order)
        if (!kmsan_enabled || kmsan_in_runtime())
                return;
        kmsan_enter_runtime();
-       kmsan_internal_poison_memory(page_address(page),
-                                    page_size(page),
+       kmsan_internal_poison_memory(page_address(page), page_size(page),
                                     GFP_KERNEL,
                                     KMSAN_POISON_CHECK | KMSAN_POISON_FREE);
        kmsan_leave_runtime();