X-Git-Url: http://ftp.safe.ca/?a=blobdiff_plain;f=crypto%2Fxor.c;h=fc5b836f343084f74b76f516133adbe455e04ab7;hb=9b8b317d58084b9a44f6f33b355c4278d9f841fb;hp=996b6ee57d9e3fb3ff48251ea9ee01d405b648ad;hpb=bff61975b3d6c18ee31457cc5b4d73042f44915f;p=safe%2Fjmp%2Flinux-2.6 diff --git a/crypto/xor.c b/crypto/xor.c index 996b6ee..fc5b836 100644 --- a/crypto/xor.c +++ b/crypto/xor.c @@ -101,7 +101,12 @@ calibrate_xor_blocks(void) void *b1, *b2; struct xor_block_template *f, *fastest; - b1 = (void *) __get_free_pages(GFP_KERNEL, 2); + /* + * Note: Since the memory is not actually used for _anything_ but to + * test the XOR speed, we don't really want kmemcheck to warn about + * reading uninitialized bytes here. + */ + b1 = (void *) __get_free_pages(GFP_KERNEL | __GFP_NOTRACK, 2); if (!b1) { printk(KERN_WARNING "xor: Yikes! No memory available.\n"); return -ENOMEM;