All of lore.kernel.org
 help / color / mirror / Atom feed
From: Catalin Marinas <catalin.marinas@arm.com>
To: Evgenii Stepanov <eugenis@google.com>
Cc: Andrey Konovalov <andreyknvl@google.com>,
	Vincenzo Frascino <vincenzo.frascino@arm.com>,
	Dmitry Vyukov <dvyukov@google.com>,
	kasan-dev <kasan-dev@googlegroups.com>,
	Andrey Ryabinin <aryabinin@virtuozzo.com>,
	Alexander Potapenko <glider@google.com>,
	Marco Elver <elver@google.com>,
	Elena Petrova <lenaptr@google.com>,
	Branislav Rankov <Branislav.Rankov@arm.com>,
	Kevin Brodsky <kevin.brodsky@arm.com>,
	Will Deacon <will.deacon@arm.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	Linux ARM <linux-arm-kernel@lists.infradead.org>,
	Linux Memory Management List <linux-mm@kvack.org>,
	LKML <linux-kernel@vger.kernel.org>
Subject: Re: [PATCH 21/35] arm64: mte: Add in-kernel tag fault handler
Date: Fri, 28 Aug 2020 10:56:41 +0100	[thread overview]
Message-ID: <20200828095641.GD3169@gaia> (raw)
In-Reply-To: <CAFKCwrhAPrognS7WtKXV-nJN-9k6BW+RWmM56z-urvbWepTAKg@mail.gmail.com>

On Thu, Aug 27, 2020 at 12:14:26PM -0700, Evgenii Stepanov wrote:
> On Thu, Aug 27, 2020 at 7:56 AM Catalin Marinas <catalin.marinas@arm.com> wrote:
> > On Thu, Aug 27, 2020 at 03:34:42PM +0200, Andrey Konovalov wrote:
> > > On Thu, Aug 27, 2020 at 3:10 PM Catalin Marinas <catalin.marinas@arm.com> wrote:
> > > > On Thu, Aug 27, 2020 at 02:31:23PM +0200, Andrey Konovalov wrote:
> > > > > On Thu, Aug 27, 2020 at 11:54 AM Catalin Marinas
> > > > > <catalin.marinas@arm.com> wrote:
> > > > > > On Fri, Aug 14, 2020 at 07:27:03PM +0200, Andrey Konovalov wrote:
> > > > > > > +static int do_tag_recovery(unsigned long addr, unsigned int esr,
> > > > > > > +                        struct pt_regs *regs)
> > > > > > > +{
> > > > > > > +     report_tag_fault(addr, esr, regs);
> > > > > > > +
> > > > > > > +     /* Skip over the faulting instruction and continue: */
> > > > > > > +     arm64_skip_faulting_instruction(regs, AARCH64_INSN_SIZE);
> > > > > >
> > > > > > Ooooh, do we expect the kernel to still behave correctly after this? I
> > > > > > thought the recovery means disabling tag checking altogether and
> > > > > > restarting the instruction rather than skipping over it.
> > [...]
> > > > > Can we disable MTE, reexecute the instruction, and then reenable MTE,
> > > > > or something like that?
> > > >
> > > > If you want to preserve the MTE enabled, you could single-step the
> > > > instruction or execute it out of line, though it's a bit more convoluted
> > > > (we have a similar mechanism for kprobes/uprobes).
> > > >
> > > > Another option would be to attempt to set the matching tag in memory,
> > > > under the assumption that it is writable (if it's not, maybe it's fine
> > > > to panic). Not sure how this interacts with the slub allocator since,
> > > > presumably, the logical tag in the pointer is wrong rather than the
> > > > allocation one.
> > > >
> > > > Yet another option would be to change the tag in the register and
> > > > re-execute but this may confuse the compiler.
> > >
> > > Which one of these would be simpler to implement?
> >
> > Either 2 or 3 would be simpler (re-tag the memory location or the
> > pointer) with the caveats I mentioned. Also, does the slab allocator
> > need to touch the memory on free with a tagged pointer? Otherwise slab
> > may hit an MTE fault itself.
> 
> Changing the memory tag can cause faults in other threads, and that
> could be very confusing.

It could indeed trigger a chain of faults. It's not even other threads,
it could be the same thread in a different function.

> Probably the safest thing is to retag the register, single step and
> then retag it back, but be careful with the instructions that change
> the address register (like ldr x0, [x0]).

This gets complicated if you have to parse the opcode. If you can
single-step, just set PSTATE.TCO for the instruction. But the
single-step machinery gets more complicated, probably interacts badly
with kprobes.

I think the best option is to disable the MTE checks in TCF on an
_unhandled_ kernel fault, report and continue. For the KASAN tests, add
accessors similar to get_user/put_user which are able to handle the
fault and return an error. Such accessors, since they have a fixup
handler, would not lead to the MTE checks being disabled.

-- 
Catalin

WARNING: multiple messages have this Message-ID (diff)
From: Catalin Marinas <catalin.marinas@arm.com>
To: Evgenii Stepanov <eugenis@google.com>
Cc: Marco Elver <elver@google.com>,
	Elena Petrova <lenaptr@google.com>,
	Andrey Konovalov <andreyknvl@google.com>,
	Kevin Brodsky <kevin.brodsky@arm.com>,
	Will Deacon <will.deacon@arm.com>,
	Branislav Rankov <Branislav.Rankov@arm.com>,
	kasan-dev <kasan-dev@googlegroups.com>,
	LKML <linux-kernel@vger.kernel.org>,
	Linux Memory Management List <linux-mm@kvack.org>,
	Alexander Potapenko <glider@google.com>,
	Linux ARM <linux-arm-kernel@lists.infradead.org>,
	Andrey Ryabinin <aryabinin@virtuozzo.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	Vincenzo Frascino <vincenzo.frascino@arm.com>,
	Dmitry Vyukov <dvyukov@google.com>
Subject: Re: [PATCH 21/35] arm64: mte: Add in-kernel tag fault handler
Date: Fri, 28 Aug 2020 10:56:41 +0100	[thread overview]
Message-ID: <20200828095641.GD3169@gaia> (raw)
In-Reply-To: <CAFKCwrhAPrognS7WtKXV-nJN-9k6BW+RWmM56z-urvbWepTAKg@mail.gmail.com>

On Thu, Aug 27, 2020 at 12:14:26PM -0700, Evgenii Stepanov wrote:
> On Thu, Aug 27, 2020 at 7:56 AM Catalin Marinas <catalin.marinas@arm.com> wrote:
> > On Thu, Aug 27, 2020 at 03:34:42PM +0200, Andrey Konovalov wrote:
> > > On Thu, Aug 27, 2020 at 3:10 PM Catalin Marinas <catalin.marinas@arm.com> wrote:
> > > > On Thu, Aug 27, 2020 at 02:31:23PM +0200, Andrey Konovalov wrote:
> > > > > On Thu, Aug 27, 2020 at 11:54 AM Catalin Marinas
> > > > > <catalin.marinas@arm.com> wrote:
> > > > > > On Fri, Aug 14, 2020 at 07:27:03PM +0200, Andrey Konovalov wrote:
> > > > > > > +static int do_tag_recovery(unsigned long addr, unsigned int esr,
> > > > > > > +                        struct pt_regs *regs)
> > > > > > > +{
> > > > > > > +     report_tag_fault(addr, esr, regs);
> > > > > > > +
> > > > > > > +     /* Skip over the faulting instruction and continue: */
> > > > > > > +     arm64_skip_faulting_instruction(regs, AARCH64_INSN_SIZE);
> > > > > >
> > > > > > Ooooh, do we expect the kernel to still behave correctly after this? I
> > > > > > thought the recovery means disabling tag checking altogether and
> > > > > > restarting the instruction rather than skipping over it.
> > [...]
> > > > > Can we disable MTE, reexecute the instruction, and then reenable MTE,
> > > > > or something like that?
> > > >
> > > > If you want to preserve the MTE enabled, you could single-step the
> > > > instruction or execute it out of line, though it's a bit more convoluted
> > > > (we have a similar mechanism for kprobes/uprobes).
> > > >
> > > > Another option would be to attempt to set the matching tag in memory,
> > > > under the assumption that it is writable (if it's not, maybe it's fine
> > > > to panic). Not sure how this interacts with the slub allocator since,
> > > > presumably, the logical tag in the pointer is wrong rather than the
> > > > allocation one.
> > > >
> > > > Yet another option would be to change the tag in the register and
> > > > re-execute but this may confuse the compiler.
> > >
> > > Which one of these would be simpler to implement?
> >
> > Either 2 or 3 would be simpler (re-tag the memory location or the
> > pointer) with the caveats I mentioned. Also, does the slab allocator
> > need to touch the memory on free with a tagged pointer? Otherwise slab
> > may hit an MTE fault itself.
> 
> Changing the memory tag can cause faults in other threads, and that
> could be very confusing.

It could indeed trigger a chain of faults. It's not even other threads,
it could be the same thread in a different function.

> Probably the safest thing is to retag the register, single step and
> then retag it back, but be careful with the instructions that change
> the address register (like ldr x0, [x0]).

This gets complicated if you have to parse the opcode. If you can
single-step, just set PSTATE.TCO for the instruction. But the
single-step machinery gets more complicated, probably interacts badly
with kprobes.

I think the best option is to disable the MTE checks in TCF on an
_unhandled_ kernel fault, report and continue. For the KASAN tests, add
accessors similar to get_user/put_user which are able to handle the
fault and return an error. Such accessors, since they have a fixup
handler, would not lead to the MTE checks being disabled.

-- 
Catalin

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  reply	other threads:[~2020-08-28  9:56 UTC|newest]

Thread overview: 252+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-08-14 17:26 [PATCH 00/35] kasan: add hardware tag-based mode for arm64 Andrey Konovalov
2020-08-14 17:26 ` Andrey Konovalov
2020-08-14 17:26 ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 01/35] kasan: KASAN_VMALLOC depends on KASAN_GENERIC Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 02/35] kasan: group vmalloc code Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 03/35] kasan: shadow declarations only for software modes Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-09-18 14:55   ` Marco Elver
2020-09-18 14:55     ` Marco Elver
2020-09-18 14:56     ` Andrey Konovalov
2020-09-18 14:56       ` Andrey Konovalov
2020-09-18 14:56       ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 04/35] kasan: rename (un)poison_shadow to (un)poison_memory Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 05/35] kasan: rename KASAN_SHADOW_* to KASAN_GRANULE_* Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 06/35] kasan: only build init.c for software modes Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 07/35] kasan: split out shadow.c from common.c Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 08/35] kasan: rename generic/tags_report.c files Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 09/35] kasan: don't duplicate config dependencies Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 10/35] kasan: hide invalid free check implementation Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 11/35] kasan: decode stack frame only with KASAN_STACK_ENABLE Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 12/35] kasan, arm64: only init shadow for software modes Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 13/35] kasan, arm64: only use kasan_depth " Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 14/35] kasan: rename addr_has_shadow to addr_has_metadata Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 15/35] kasan: rename print_shadow_for_address to print_memory_metadata Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 16/35] kasan: kasan_non_canonical_hook only for software modes Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26 ` [PATCH 17/35] kasan: rename SHADOW layout macros to META Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:26   ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 18/35] kasan: separate metadata_fetch_row for each mode Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 19/35] kasan: don't allow SW_TAGS with ARM64_MTE Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-27  8:04   ` Catalin Marinas
2020-08-27  8:04     ` Catalin Marinas
2020-08-27  9:54     ` Vincenzo Frascino
2020-08-27  9:54       ` Vincenzo Frascino
2020-08-27 12:02       ` Andrey Konovalov
2020-08-27 12:02         ` Andrey Konovalov
2020-08-27 12:02         ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 20/35] arm64: mte: Add in-kernel MTE helpers Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-27  9:38   ` Catalin Marinas
2020-08-27  9:38     ` Catalin Marinas
2020-08-27 10:31     ` Vincenzo Frascino
2020-08-27 10:31       ` Vincenzo Frascino
2020-08-27 11:10       ` Catalin Marinas
2020-08-27 11:10         ` Catalin Marinas
2020-08-27 11:24         ` Vincenzo Frascino
2020-08-27 11:24           ` Vincenzo Frascino
2020-08-27 12:46     ` Andrey Konovalov
2020-08-27 12:46       ` Andrey Konovalov
2020-08-27 12:46       ` Andrey Konovalov
2020-09-08 13:23     ` Andrey Konovalov
2020-09-08 13:23       ` Andrey Konovalov
2020-09-08 13:23       ` Andrey Konovalov
2020-09-08 14:50       ` Catalin Marinas
2020-09-08 14:50         ` Catalin Marinas
2020-08-14 17:27 ` [PATCH 21/35] arm64: mte: Add in-kernel tag fault handler Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-27  9:54   ` Catalin Marinas
2020-08-27  9:54     ` Catalin Marinas
2020-08-27 10:44     ` Vincenzo Frascino
2020-08-27 10:44       ` Vincenzo Frascino
2020-08-27 12:31     ` Andrey Konovalov
2020-08-27 12:31       ` Andrey Konovalov
2020-08-27 12:31       ` Andrey Konovalov
2020-08-27 13:10       ` Catalin Marinas
2020-08-27 13:10         ` Catalin Marinas
2020-08-27 13:34         ` Andrey Konovalov
2020-08-27 13:34           ` Andrey Konovalov
2020-08-27 13:34           ` Andrey Konovalov
2020-08-27 14:56           ` Catalin Marinas
2020-08-27 14:56             ` Catalin Marinas
2020-08-27 19:14             ` Evgenii Stepanov
2020-08-27 19:14               ` Evgenii Stepanov
2020-08-27 19:14               ` Evgenii Stepanov
2020-08-28  9:56               ` Catalin Marinas [this message]
2020-08-28  9:56                 ` Catalin Marinas
2020-08-14 17:27 ` [PATCH 22/35] arm64: mte: Enable in-kernel MTE Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-27 10:01   ` Catalin Marinas
2020-08-27 10:01     ` Catalin Marinas
2020-08-27 10:46     ` Vincenzo Frascino
2020-08-27 10:46       ` Vincenzo Frascino
2020-09-08 14:39   ` Andrey Konovalov
2020-09-08 14:39     ` Andrey Konovalov
2020-09-08 14:39     ` Andrey Konovalov
2020-09-08 14:52     ` Catalin Marinas
2020-09-08 14:52       ` Catalin Marinas
2020-08-14 17:27 ` [PATCH 23/35] arm64: mte: Convert gcr_user into an exclude mask Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 24/35] arm64: mte: Switch GCR_EL1 in kernel entry and exit Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-27 10:38   ` Catalin Marinas
2020-08-27 10:38     ` Catalin Marinas
2020-08-27 10:56     ` Vincenzo Frascino
2020-08-27 10:56       ` Vincenzo Frascino
2020-08-27 12:16       ` Catalin Marinas
2020-08-27 12:16         ` Catalin Marinas
2020-09-08 14:02         ` Andrey Konovalov
2020-09-08 14:02           ` Andrey Konovalov
2020-09-08 14:02           ` Andrey Konovalov
2020-09-08 14:53           ` Andrey Konovalov
2020-09-08 14:53             ` Andrey Konovalov
2020-09-08 14:53             ` Andrey Konovalov
2020-09-08 15:39           ` Catalin Marinas
2020-09-08 15:39             ` Catalin Marinas
2020-09-08 19:41             ` Derrick McKee
2020-09-08 19:41               ` Derrick McKee
2020-09-08 19:41               ` Derrick McKee
2020-09-08 13:58     ` Andrey Konovalov
2020-09-08 13:58       ` Andrey Konovalov
2020-09-08 13:58       ` Andrey Konovalov
2020-09-08 15:16       ` Catalin Marinas
2020-09-08 15:16         ` Catalin Marinas
2020-08-14 17:27 ` [PATCH 25/35] kasan: introduce CONFIG_KASAN_HW_TAGS Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-27 11:33   ` Vincenzo Frascino
2020-08-27 11:33     ` Vincenzo Frascino
2020-08-27 12:22     ` Andrey Konovalov
2020-08-27 12:22       ` Andrey Konovalov
2020-08-27 12:22       ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 26/35] kasan, arm64: Enable TBI EL1 Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-27 10:40   ` Catalin Marinas
2020-08-27 10:40     ` Catalin Marinas
2020-08-27 11:05     ` Vincenzo Frascino
2020-08-27 11:05       ` Vincenzo Frascino
2020-08-27 11:13       ` Catalin Marinas
2020-08-27 11:13         ` Catalin Marinas
2020-08-27 11:17         ` Vincenzo Frascino
2020-08-27 11:17           ` Vincenzo Frascino
2020-08-27 12:43           ` Andrey Konovalov
2020-08-27 12:43             ` Andrey Konovalov
2020-08-27 12:43             ` Andrey Konovalov
2020-08-27 13:45             ` Vincenzo Frascino
2020-08-27 13:45               ` Vincenzo Frascino
2020-08-27 14:36               ` Andrey Konovalov
2020-08-27 14:36                 ` Andrey Konovalov
2020-08-27 14:36                 ` Andrey Konovalov
2020-09-08 13:18     ` Andrey Konovalov
2020-09-08 13:18       ` Andrey Konovalov
2020-09-08 13:18       ` Andrey Konovalov
2020-09-08 14:06       ` Catalin Marinas
2020-09-08 14:06         ` Catalin Marinas
2020-09-08 14:12         ` Andrey Konovalov
2020-09-08 14:12           ` Andrey Konovalov
2020-09-08 14:12           ` Andrey Konovalov
2020-09-08 14:41           ` Catalin Marinas
2020-09-08 14:41             ` Catalin Marinas
2020-08-14 17:27 ` [PATCH 27/35] kasan, arm64: align allocations for HW_TAGS Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 28/35] kasan: define KASAN_GRANULE_SIZE " Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-27 10:41   ` Catalin Marinas
2020-08-27 10:41     ` Catalin Marinas
2020-08-27 11:07     ` Vincenzo Frascino
2020-08-27 11:07       ` Vincenzo Frascino
2020-08-27 12:05       ` Andrey Konovalov
2020-08-27 12:05         ` Andrey Konovalov
2020-08-27 12:05         ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 29/35] kasan, x86, s390: update undef CONFIG_KASAN Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 30/35] kasan, arm64: expand CONFIG_KASAN checks Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 31/35] kasan, arm64: implement HW_TAGS runtime Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-27 10:45   ` Catalin Marinas
2020-08-27 10:45     ` Catalin Marinas
2020-08-27 11:35     ` Vincenzo Frascino
2020-08-27 11:35       ` Vincenzo Frascino
2020-08-27 12:37     ` Andrey Konovalov
2020-08-27 12:37       ` Andrey Konovalov
2020-08-27 12:37       ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 32/35] kasan, arm64: print report from tag fault handler Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-27 10:48   ` Catalin Marinas
2020-08-27 10:48     ` Catalin Marinas
2020-08-27 12:11     ` Vincenzo Frascino
2020-08-27 12:11       ` Vincenzo Frascino
2020-08-27 12:34     ` Andrey Konovalov
2020-08-27 12:34       ` Andrey Konovalov
2020-08-27 12:34       ` Andrey Konovalov
2020-08-27 14:21       ` Catalin Marinas
2020-08-27 14:21         ` Catalin Marinas
2020-08-14 17:27 ` [PATCH 33/35] kasan, slub: reset tags when accessing metadata Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 34/35] kasan, arm64: enable CONFIG_KASAN_HW_TAGS Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27 ` [PATCH 35/35] kasan: add documentation for hardware tag-based mode Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-14 17:27   ` Andrey Konovalov
2020-08-28 11:12   ` Marco Elver
2020-08-28 11:12     ` Marco Elver
2020-08-28 12:28     ` Andrey Konovalov
2020-08-28 12:28       ` Andrey Konovalov
2020-08-28 12:28       ` Andrey Konovalov
2020-09-14 19:06 ` [PATCH 00/35] kasan: add hardware tag-based mode for arm64 Derrick McKee
2020-09-14 20:04   ` Andrey Konovalov
2020-09-14 21:36     ` Derrick McKee
2020-09-14 22:41       ` Derrick McKee
2020-09-14 22:50         ` Andrey Konovalov
2020-09-15  9:46           ` Derrick McKee
2020-09-15 17:51             ` Derrick McKee

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20200828095641.GD3169@gaia \
    --to=catalin.marinas@arm.com \
    --cc=Branislav.Rankov@arm.com \
    --cc=akpm@linux-foundation.org \
    --cc=andreyknvl@google.com \
    --cc=aryabinin@virtuozzo.com \
    --cc=dvyukov@google.com \
    --cc=elver@google.com \
    --cc=eugenis@google.com \
    --cc=glider@google.com \
    --cc=kasan-dev@googlegroups.com \
    --cc=kevin.brodsky@arm.com \
    --cc=lenaptr@google.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=vincenzo.frascino@arm.com \
    --cc=will.deacon@arm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.