kmsan: core: kmsan_in_runtime() should return true in NMI context

Without that, every call to __msan_poison_alloca() in NMI may end up
allocating memory, which is NMI-unsafe.

Link: https://lkml.kernel.org/r/20221102110611.1085175-1-glider@google.com
Link: https://lore.kernel.org/lkml/20221025221755.3810809-1-glider@google.com/
Signed-off-by: Alexander Potapenko <glider@google.com>
Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Cc: Dmitry Vyukov <dvyukov@google.com>
Cc: Marco Elver <elver@google.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Kees Cook <keescook@chromium.org>
Cc: Masahiro Yamada <masahiroy@kernel.org>
Cc: Nick Desaulniers <ndesaulniers@google.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
This commit is contained in:
Alexander Potapenko 2022-11-02 12:06:07 +01:00 коммит произвёл Andrew Morton
Родитель db5e8d8431
Коммит cbadaf71f7
1 изменённых файлов: 2 добавлений и 0 удалений

Просмотреть файл

@ -124,6 +124,8 @@ static __always_inline bool kmsan_in_runtime(void)
{ {
if ((hardirq_count() >> HARDIRQ_SHIFT) > 1) if ((hardirq_count() >> HARDIRQ_SHIFT) > 1)
return true; return true;
if (in_nmi())
return true;
return kmsan_get_context()->kmsan_in_runtime; return kmsan_get_context()->kmsan_in_runtime;
} }