diff options
author | Mike Rapoport <rppt@linux.ibm.com> | 2021-09-02 14:58:05 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2021-09-03 09:58:15 -0700 |
commit | 08678804e0b305bbbf5b756ad365373e5fe885a2 (patch) | |
tree | 2e2e22fb8d96c968b2ce3fc16e4b31b6b2030d36 /CREDITS | |
parent | c803b3c8b3b70f306ee6300bf8acdd70ffd1441a (diff) | |
download | linux-08678804e0b305bbbf5b756ad365373e5fe885a2.tar.gz linux-08678804e0b305bbbf5b756ad365373e5fe885a2.tar.bz2 linux-08678804e0b305bbbf5b756ad365373e5fe885a2.zip |
memblock: stop poisoning raw allocations
Functions memblock_alloc_exact_nid_raw() and memblock_alloc_try_nid_raw()
are intended for early memory allocation without overhead of zeroing the
allocated memory. Since these functions were used to allocate the memory
map, they have ended up with addition of a call to page_init_poison() that
poisoned the allocated memory when CONFIG_PAGE_POISON was set.
Since the memory map is allocated using a dedicated memmep_alloc()
function that takes care of the poisoning, remove page poisoning from the
memblock_alloc_*_raw() functions.
Link: https://lkml.kernel.org/r/20210714123739.16493-5-rppt@kernel.org
Signed-off-by: Mike Rapoport <rppt@linux.ibm.com>
Cc: Michal Simek <monstr@monstr.eu>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'CREDITS')
0 files changed, 0 insertions, 0 deletions