* + kasan-remove-kfence-leftovers.patch added to -mm tree
@ 2020-12-19 1:14 akpm
0 siblings, 0 replies; only message in thread
From: akpm @ 2020-12-19 1:14 UTC (permalink / raw)
To: mm-commits, akpm
The patch titled
Subject: kasan: remove kfence leftovers
has been added to the -mm tree. Its filename is
kasan-remove-kfence-leftovers.patch
This patch should soon appear at
https://ozlabs.org/~akpm/mmots/broken-out/kasan-remove-kfence-leftovers.patch
and later at
https://ozlabs.org/~akpm/mmotm/broken-out/kasan-remove-kfence-leftovers.patch
Before you just go and hit "reply", please:
a) Consider who else should be cc'ed
b) Prefer to cc a suitable mailing list as well
c) Ideally: find the original patch on the mailing list and do a
reply-to-all to that, adding suitable additional cc's
*** Remember to use Documentation/process/submit-checklist.rst when testing your code ***
The -mm tree is included into linux-next and is updated
there every 3-4 working days
------------------------------------------------------
From: Andrew Morton <akpm@linux-foundation.org>
Subject: kasan: remove kfence leftovers
These are remnants of patch series reordering and shouldn't have been
here.
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
---
mm/kasan/kasan.h | 9 ---------
mm/kasan/shadow.c | 13 -------------
2 files changed, 22 deletions(-)
--- a/mm/kasan/kasan.h~kasan-remove-kfence-leftovers
+++ a/mm/kasan/kasan.h
@@ -3,7 +3,6 @@
#define __MM_KASAN_KASAN_H
#include <linux/kasan.h>
-#include <linux/kfence.h>
#include <linux/stackdepot.h>
#ifdef CONFIG_KASAN_HW_TAGS
@@ -305,20 +304,12 @@ static inline u8 random_tag(void) { retu
static inline void poison_range(const void *address, size_t size, u8 value)
{
- /* Skip KFENCE memory if called explicitly outside of sl*b. */
- if (is_kfence_address(address))
- return;
-
hw_set_mem_tag_range(kasan_reset_tag(address),
round_up(size, KASAN_GRANULE_SIZE), value);
}
static inline void unpoison_range(const void *address, size_t size)
{
- /* Skip KFENCE memory if called explicitly outside of sl*b. */
- if (is_kfence_address(address))
- return;
-
hw_set_mem_tag_range(kasan_reset_tag(address),
round_up(size, KASAN_GRANULE_SIZE), get_tag(address));
}
--- a/mm/kasan/shadow.c~kasan-remove-kfence-leftovers
+++ a/mm/kasan/shadow.c
@@ -13,7 +13,6 @@
#include <linux/init.h>
#include <linux/kasan.h>
#include <linux/kernel.h>
-#include <linux/kfence.h>
#include <linux/kmemleak.h>
#include <linux/memory.h>
#include <linux/mm.h>
@@ -85,10 +84,6 @@ void poison_range(const void *address, s
address = kasan_reset_tag(address);
size = round_up(size, KASAN_GRANULE_SIZE);
- /* Skip KFENCE memory if called explicitly outside of sl*b. */
- if (is_kfence_address(address))
- return;
-
shadow_start = kasan_mem_to_shadow(address);
shadow_end = kasan_mem_to_shadow(address + size);
@@ -106,14 +101,6 @@ void unpoison_range(const void *address,
*/
address = kasan_reset_tag(address);
- /*
- * Skip KFENCE memory if called explicitly outside of sl*b. Also note
- * that calls to ksize(), where size is not a multiple of machine-word
- * size, would otherwise poison the invalid portion of the word.
- */
- if (is_kfence_address(address))
- return;
-
poison_range(address, size, tag);
if (size & KASAN_GRANULE_MASK) {
_
Patches currently in -mm which might be from akpm@linux-foundation.org are
kasan-remove-kfence-leftovers.patch
mm.patch
mm-fix-initialization-of-struct-page-for-holes-in-memory-layout-checkpatch-fixes.patch
mm-vmstat-fix-proc-sys-vm-stat_refresh-generating-false-warnings-fix-2.patch
linux-next-rejects.patch
kmap-stupid-hacks-to-make-it-compile.patch
set_memory-allow-set_direct_map__noflush-for-multiple-pages-fix.patch
arch-mm-wire-up-memfd_secret-system-call-were-relevant-fix.patch
kernel-forkc-export-kernel_thread-to-modules.patch
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2020-12-19 1:14 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-12-19 1:14 + kasan-remove-kfence-leftovers.patch added to -mm tree akpm
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.