From: Andrey Ryabinin <ryabinin.a.a@gmail.com>
To: Catalin Marinas <catalin.marinas@arm.com>,
Will Deacon <will.deacon@arm.com>,
linux-arm-kernel@lists.infradead.org
Cc: Andrey Ryabinin <ryabinin.a.a@gmail.com>,
Arnd Bergmann <arnd@arndb.de>,
Linus Walleij <linus.walleij@linaro.org>,
David Keitel <dkeitel@codeaurora.org>,
Alexander Potapenko <glider@google.com>,
Andrew Morton <akpm@linux-foundation.org>,
Dmitry Vyukov <dvyukov@google.com>,
linux-mm@kvack.org, linux-kernel@vger.kernel.org,
Alexey Klimov <klimov.linux@gmail.com>,
Yury <yury.norov@gmail.com>,
"Aneesh Kumar K.V" <aneesh.kumar@linux.vnet.ibm.com>
Subject: [PATCH v5 0/6] KASAN for amr64
Date: Tue, 11 Aug 2015 05:18:13 +0300 [thread overview]
Message-ID: <1439259499-13913-1-git-send-email-ryabinin.a.a@gmail.com> (raw)
For git users patches are available in git:
git://github.com/aryabinin/linux.git kasan/arm64v5
Changes since v4:
- Generate KASAN_SHADOW_OFFSET using 32 bit arithmetic
- merge patches x86/kasan: switch to generic kasan_populate_zero_shadow()
and mm: introduce generic kasan_populate_zero_shadow() into one.
- remove useless check for start != 0 in clear_pgds()
- Don't generate KASAN_SHADOW_OFFSET in Makefile for x86,
assign it in Makefile.kasan if CONFIG_KASAN_SHADOW_OFFSET was defined.
Changes since v3:
- Generate KASAN_SHADOW_OFFSET in Makefile
- zero_p*_populate() functions now return void
- Switch x86 to generic kasan_populate_zero_shadow() too
- Add license headers
- fix memleak in kasan_populate_zero_shadow:
Following code could leak memory when pgd_populate() is nop:
void *p = early_alloc(PAGE_SIZE, NUMA_NO_NODE);
pgd_populate(&init_mm, pgd, p);
This was replaced by:
pgd_populate(&init_mm, pgd, early_alloc(PAGE_SIZE, NUMA_NO_NODE));
Changes since v2:
- Rebase on top of v4.2-rc3
- Address feedback from Catalin.
- Print memory assignment from Linus
- Add message about KASAN being initialized
Changes since v1:
- Address feedback from Catalin.
- Generalize some kasan init code from arch/x86/mm/kasan_init_64.c
and reuse it for arm64.
- Some bugfixes, including:
add missing arm64/include/asm/kasan.h
add tlb flush after changing ttbr1
- Add code comments.
Andrey Ryabinin (5):
x86/kasan: define KASAN_SHADOW_OFFSET per architecture
x86/kasan, mm: introduce generic kasan_populate_zero_shadow()
arm64: introduce VA_START macro - the first kernel virtual address.
arm64: move PGD_SIZE definition to pgalloc.h
arm64: add KASAN support
Linus Walleij (1):
ARM64: kasan: print memory assignment
arch/arm64/Kconfig | 1 +
arch/arm64/Makefile | 7 ++
arch/arm64/include/asm/kasan.h | 36 +++++++++
arch/arm64/include/asm/memory.h | 2 +
arch/arm64/include/asm/pgalloc.h | 1 +
arch/arm64/include/asm/pgtable.h | 9 ++-
arch/arm64/include/asm/string.h | 16 ++++
arch/arm64/kernel/arm64ksyms.c | 3 +
arch/arm64/kernel/head.S | 3 +
arch/arm64/kernel/module.c | 16 +++-
arch/arm64/kernel/setup.c | 2 +
arch/arm64/lib/memcpy.S | 3 +
arch/arm64/lib/memmove.S | 7 +-
arch/arm64/lib/memset.S | 3 +
arch/arm64/mm/Makefile | 3 +
arch/arm64/mm/init.c | 6 ++
arch/arm64/mm/kasan_init.c | 165 +++++++++++++++++++++++++++++++++++++++
arch/arm64/mm/pgd.c | 2 -
arch/x86/include/asm/kasan.h | 3 +
arch/x86/mm/kasan_init_64.c | 123 ++---------------------------
include/linux/kasan.h | 10 ++-
mm/kasan/Makefile | 2 +-
mm/kasan/kasan_init.c | 152 ++++++++++++++++++++++++++++++++++++
scripts/Makefile.kasan | 4 +-
24 files changed, 450 insertions(+), 129 deletions(-)
create mode 100644 arch/arm64/include/asm/kasan.h
create mode 100644 arch/arm64/mm/kasan_init.c
create mode 100644 mm/kasan/kasan_init.c
--
2.4.6
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next reply other threads:[~2015-08-10 22:22 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-08-11 2:18 Andrey Ryabinin [this message]
2015-08-11 2:18 ` [PATCH v5 1/6] x86/kasan: define KASAN_SHADOW_OFFSET per architecture Andrey Ryabinin
2015-08-11 2:18 ` [PATCH v5 2/6] x86/kasan, mm: introduce generic kasan_populate_zero_shadow() Andrey Ryabinin
2015-08-11 15:41 ` Catalin Marinas
2015-08-11 16:25 ` Andrey Ryabinin
2015-08-11 16:40 ` Catalin Marinas
2015-08-12 9:30 ` Andrey Ryabinin
2015-08-12 9:37 ` Will Deacon
2015-08-12 12:19 ` Andrey Ryabinin
2015-08-12 13:41 ` Will Deacon
2015-08-11 16:30 ` Andrey Ryabinin
2015-08-11 2:18 ` [PATCH v5 3/6] arm64: introduce VA_START macro - the first kernel virtual address Andrey Ryabinin
2015-08-11 2:18 ` [PATCH v5 4/6] arm64: move PGD_SIZE definition to pgalloc.h Andrey Ryabinin
2015-08-11 2:18 ` [PATCH v5 5/6] arm64: add KASAN support Andrey Ryabinin
2015-08-11 16:37 ` Catalin Marinas
2015-08-11 2:18 ` [PATCH v5 6/6] ARM64: kasan: print memory assignment Andrey Ryabinin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1439259499-13913-1-git-send-email-ryabinin.a.a@gmail.com \
--to=ryabinin.a.a@gmail.com \
--cc=akpm@linux-foundation.org \
--cc=aneesh.kumar@linux.vnet.ibm.com \
--cc=arnd@arndb.de \
--cc=catalin.marinas@arm.com \
--cc=dkeitel@codeaurora.org \
--cc=dvyukov@google.com \
--cc=glider@google.com \
--cc=klimov.linux@gmail.com \
--cc=linus.walleij@linaro.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=will.deacon@arm.com \
--cc=yury.norov@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox