From: Dmitry Vyukov <dvyukov@google.com> To: Andrey Konovalov <andreyknvl@google.com> Cc: Catalin Marinas <catalin.marinas@arm.com>, Will Deacon <will.deacon@arm.com>, Vincenzo Frascino <vincenzo.frascino@arm.com>, Alexander Potapenko <glider@google.com>, Marco Elver <elver@google.com>, Evgenii Stepanov <eugenis@google.com>, Kostya Serebryany <kcc@google.com>, Peter Collingbourne <pcc@google.com>, Serban Constantinescu <serbanc@google.com>, Andrey Ryabinin <aryabinin@virtuozzo.com>, Elena Petrova <lenaptr@google.com>, Branislav Rankov <Branislav.Rankov@arm.com>, Kevin Brodsky <kevin.brodsky@arm.com>, Andrew Morton <akpm@linux-foundation.org>, kasan-dev <kasan-dev@googlegroups.com>, Linux ARM <linux-arm-kernel@lists.infradead.org>, Linux-MM <linux-mm@kvack.org>, LKML <linux-kernel@vger.kernel.org> Subject: Re: [PATCH RFC v2 07/21] kasan, arm64: move initialization message Date: Wed, 28 Oct 2020 11:55:57 +0100 [thread overview] Message-ID: <CACT4Y+Y6jbXh28U=9oK_1ihMhePRhZ6WP9vBwr8nVm_aU3BmNQ@mail.gmail.com> (raw) In-Reply-To: <1d87f0d5a282d9e8d14d408ac6d63462129f524c.1603372719.git.andreyknvl@google.com> On Thu, Oct 22, 2020 at 3:19 PM Andrey Konovalov <andreyknvl@google.com> wrote: > > Tag-based KASAN modes are fully initialized with kasan_init_tags(), > while the generic mode only requireds kasan_init(). Move the > initialization message for tag-based modes into kasan_init_tags(). > > Also fix pr_fmt() usage for KASAN code: generic mode doesn't need it, Why doesn't it need it? What's the difference with tag modes? > tag-based modes should use "kasan:" instead of KBUILD_MODNAME. With generic KASAN I currently see: [ 0.571473][ T0] kasan: KernelAddressSanitizer initialized So KBUILD_MODNAME somehow works. Is there some difference between files? > Signed-off-by: Andrey Konovalov <andreyknvl@google.com> > Link: https://linux-review.googlesource.com/id/Idfd1e50625ffdf42dfc3dbf7455b11bd200a0a49 > --- > arch/arm64/mm/kasan_init.c | 3 +++ > mm/kasan/generic.c | 2 -- > mm/kasan/hw_tags.c | 4 ++++ > mm/kasan/sw_tags.c | 4 +++- > 4 files changed, 10 insertions(+), 3 deletions(-) > > diff --git a/arch/arm64/mm/kasan_init.c b/arch/arm64/mm/kasan_init.c > index b6b9d55bb72e..8f17fa834b62 100644 > --- a/arch/arm64/mm/kasan_init.c > +++ b/arch/arm64/mm/kasan_init.c > @@ -290,5 +290,8 @@ void __init kasan_init(void) > { > kasan_init_shadow(); > kasan_init_depth(); > +#if defined(CONFIG_KASAN_GENERIC) > + /* CONFIG_KASAN_SW/HW_TAGS also requires kasan_init_tags(). */ A bit cleaner way may be to introduce kasan_init_early() and kasan_init_late(). Late() will do tag init and always print the message. > pr_info("KernelAddressSanitizer initialized\n"); > +#endif > } > diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c > index de6b3f03a023..d259e4c3aefd 100644 > --- a/mm/kasan/generic.c > +++ b/mm/kasan/generic.c > @@ -9,8 +9,6 @@ > * Andrey Konovalov <andreyknvl@gmail.com> > */ > > -#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt > - > #include <linux/export.h> > #include <linux/interrupt.h> > #include <linux/init.h> > diff --git a/mm/kasan/hw_tags.c b/mm/kasan/hw_tags.c > index 0128062320d5..b372421258c8 100644 > --- a/mm/kasan/hw_tags.c > +++ b/mm/kasan/hw_tags.c > @@ -6,6 +6,8 @@ > * Author: Andrey Konovalov <andreyknvl@google.com> > */ > > +#define pr_fmt(fmt) "kasan: " fmt > + > #include <linux/kasan.h> > #include <linux/kernel.h> > #include <linux/memory.h> > @@ -18,6 +20,8 @@ > void __init kasan_init_tags(void) > { > init_tags(KASAN_TAG_MAX); > + > + pr_info("KernelAddressSanitizer initialized\n"); > } > > void *kasan_reset_tag(const void *addr) > diff --git a/mm/kasan/sw_tags.c b/mm/kasan/sw_tags.c > index bf1422282bb5..099af6dc8f7e 100644 > --- a/mm/kasan/sw_tags.c > +++ b/mm/kasan/sw_tags.c > @@ -6,7 +6,7 @@ > * Author: Andrey Konovalov <andreyknvl@google.com> > */ > > -#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt > +#define pr_fmt(fmt) "kasan: " fmt > > #include <linux/export.h> > #include <linux/interrupt.h> > @@ -41,6 +41,8 @@ void __init kasan_init_tags(void) > > for_each_possible_cpu(cpu) > per_cpu(prng_state, cpu) = (u32)get_cycles(); > + > + pr_info("KernelAddressSanitizer initialized\n"); > } > > /* > -- > 2.29.0.rc1.297.gfa9743e501-goog >
WARNING: multiple messages have this Message-ID (diff)
From: Dmitry Vyukov <dvyukov@google.com> To: Andrey Konovalov <andreyknvl@google.com> Cc: Marco Elver <elver@google.com>, Elena Petrova <lenaptr@google.com>, Linux-MM <linux-mm@kvack.org>, Catalin Marinas <catalin.marinas@arm.com>, Kevin Brodsky <kevin.brodsky@arm.com>, Will Deacon <will.deacon@arm.com>, Branislav Rankov <Branislav.Rankov@arm.com>, kasan-dev <kasan-dev@googlegroups.com>, LKML <linux-kernel@vger.kernel.org>, Kostya Serebryany <kcc@google.com>, Alexander Potapenko <glider@google.com>, Linux ARM <linux-arm-kernel@lists.infradead.org>, Serban Constantinescu <serbanc@google.com>, Andrey Ryabinin <aryabinin@virtuozzo.com>, Andrew Morton <akpm@linux-foundation.org>, Vincenzo Frascino <vincenzo.frascino@arm.com>, Peter Collingbourne <pcc@google.com>, Evgenii Stepanov <eugenis@google.com> Subject: Re: [PATCH RFC v2 07/21] kasan, arm64: move initialization message Date: Wed, 28 Oct 2020 11:55:57 +0100 [thread overview] Message-ID: <CACT4Y+Y6jbXh28U=9oK_1ihMhePRhZ6WP9vBwr8nVm_aU3BmNQ@mail.gmail.com> (raw) In-Reply-To: <1d87f0d5a282d9e8d14d408ac6d63462129f524c.1603372719.git.andreyknvl@google.com> On Thu, Oct 22, 2020 at 3:19 PM Andrey Konovalov <andreyknvl@google.com> wrote: > > Tag-based KASAN modes are fully initialized with kasan_init_tags(), > while the generic mode only requireds kasan_init(). Move the > initialization message for tag-based modes into kasan_init_tags(). > > Also fix pr_fmt() usage for KASAN code: generic mode doesn't need it, Why doesn't it need it? What's the difference with tag modes? > tag-based modes should use "kasan:" instead of KBUILD_MODNAME. With generic KASAN I currently see: [ 0.571473][ T0] kasan: KernelAddressSanitizer initialized So KBUILD_MODNAME somehow works. Is there some difference between files? > Signed-off-by: Andrey Konovalov <andreyknvl@google.com> > Link: https://linux-review.googlesource.com/id/Idfd1e50625ffdf42dfc3dbf7455b11bd200a0a49 > --- > arch/arm64/mm/kasan_init.c | 3 +++ > mm/kasan/generic.c | 2 -- > mm/kasan/hw_tags.c | 4 ++++ > mm/kasan/sw_tags.c | 4 +++- > 4 files changed, 10 insertions(+), 3 deletions(-) > > diff --git a/arch/arm64/mm/kasan_init.c b/arch/arm64/mm/kasan_init.c > index b6b9d55bb72e..8f17fa834b62 100644 > --- a/arch/arm64/mm/kasan_init.c > +++ b/arch/arm64/mm/kasan_init.c > @@ -290,5 +290,8 @@ void __init kasan_init(void) > { > kasan_init_shadow(); > kasan_init_depth(); > +#if defined(CONFIG_KASAN_GENERIC) > + /* CONFIG_KASAN_SW/HW_TAGS also requires kasan_init_tags(). */ A bit cleaner way may be to introduce kasan_init_early() and kasan_init_late(). Late() will do tag init and always print the message. > pr_info("KernelAddressSanitizer initialized\n"); > +#endif > } > diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c > index de6b3f03a023..d259e4c3aefd 100644 > --- a/mm/kasan/generic.c > +++ b/mm/kasan/generic.c > @@ -9,8 +9,6 @@ > * Andrey Konovalov <andreyknvl@gmail.com> > */ > > -#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt > - > #include <linux/export.h> > #include <linux/interrupt.h> > #include <linux/init.h> > diff --git a/mm/kasan/hw_tags.c b/mm/kasan/hw_tags.c > index 0128062320d5..b372421258c8 100644 > --- a/mm/kasan/hw_tags.c > +++ b/mm/kasan/hw_tags.c > @@ -6,6 +6,8 @@ > * Author: Andrey Konovalov <andreyknvl@google.com> > */ > > +#define pr_fmt(fmt) "kasan: " fmt > + > #include <linux/kasan.h> > #include <linux/kernel.h> > #include <linux/memory.h> > @@ -18,6 +20,8 @@ > void __init kasan_init_tags(void) > { > init_tags(KASAN_TAG_MAX); > + > + pr_info("KernelAddressSanitizer initialized\n"); > } > > void *kasan_reset_tag(const void *addr) > diff --git a/mm/kasan/sw_tags.c b/mm/kasan/sw_tags.c > index bf1422282bb5..099af6dc8f7e 100644 > --- a/mm/kasan/sw_tags.c > +++ b/mm/kasan/sw_tags.c > @@ -6,7 +6,7 @@ > * Author: Andrey Konovalov <andreyknvl@google.com> > */ > > -#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt > +#define pr_fmt(fmt) "kasan: " fmt > > #include <linux/export.h> > #include <linux/interrupt.h> > @@ -41,6 +41,8 @@ void __init kasan_init_tags(void) > > for_each_possible_cpu(cpu) > per_cpu(prng_state, cpu) = (u32)get_cycles(); > + > + pr_info("KernelAddressSanitizer initialized\n"); > } > > /* > -- > 2.29.0.rc1.297.gfa9743e501-goog > _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
next prev parent reply other threads:[~2020-10-28 22:50 UTC|newest] Thread overview: 210+ messages / expand[flat|nested] mbox.gz Atom feed top 2020-10-22 13:18 [PATCH RFC v2 00/21] kasan: hardware tag-based mode for production use on arm64 Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-22 13:18 ` [PATCH RFC v2 01/21] kasan: simplify quarantine_put call site Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-27 12:40 ` Dmitry Vyukov 2020-10-27 12:40 ` Dmitry Vyukov 2020-10-27 12:40 ` Dmitry Vyukov 2020-10-22 13:18 ` [PATCH RFC v2 02/21] kasan: rename get_alloc/free_info Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-27 12:40 ` Dmitry Vyukov 2020-10-27 12:40 ` Dmitry Vyukov 2020-10-27 12:40 ` Dmitry Vyukov 2020-10-22 13:18 ` [PATCH RFC v2 03/21] kasan: introduce set_alloc_info Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-27 12:41 ` Dmitry Vyukov 2020-10-27 12:41 ` Dmitry Vyukov 2020-10-27 12:41 ` Dmitry Vyukov 2020-10-22 13:18 ` [PATCH RFC v2 04/21] kasan: unpoison stack only with CONFIG_KASAN_STACK Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-27 12:44 ` Dmitry Vyukov 2020-10-27 12:44 ` Dmitry Vyukov 2020-10-27 12:44 ` Dmitry Vyukov 2020-10-27 12:45 ` Dmitry Vyukov 2020-10-27 12:45 ` Dmitry Vyukov 2020-10-27 12:45 ` Dmitry Vyukov 2020-10-29 19:57 ` Andrey Konovalov 2020-10-29 19:57 ` Andrey Konovalov 2020-10-29 19:57 ` Andrey Konovalov 2020-11-16 10:59 ` Dmitry Vyukov 2020-11-16 10:59 ` Dmitry Vyukov 2020-11-16 10:59 ` Dmitry Vyukov 2020-11-16 11:50 ` Marco Elver 2020-11-16 11:50 ` Marco Elver 2020-11-16 11:50 ` Marco Elver 2020-11-16 12:16 ` Catalin Marinas 2020-11-16 12:16 ` Catalin Marinas 2020-11-16 12:19 ` Dmitry Vyukov 2020-11-16 12:19 ` Dmitry Vyukov 2020-11-16 12:19 ` Dmitry Vyukov 2020-11-16 12:45 ` Vincenzo Frascino 2020-11-16 12:45 ` Vincenzo Frascino 2020-11-16 13:50 ` Andrey Konovalov 2020-11-16 13:50 ` Andrey Konovalov 2020-11-16 13:50 ` Andrey Konovalov 2020-11-16 14:50 ` Vincenzo Frascino 2020-11-16 14:50 ` Vincenzo Frascino 2020-10-22 13:18 ` [PATCH RFC v2 05/21] kasan: allow VMAP_STACK for HW_TAGS mode Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-27 12:49 ` Dmitry Vyukov 2020-10-27 12:49 ` Dmitry Vyukov 2020-10-27 12:49 ` Dmitry Vyukov 2020-10-29 20:00 ` Andrey Konovalov 2020-10-29 20:00 ` Andrey Konovalov 2020-10-29 20:00 ` Andrey Konovalov 2020-10-22 13:18 ` [PATCH RFC v2 06/21] kasan: mark kasan_init_tags as __init Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-28 10:08 ` Dmitry Vyukov 2020-10-28 10:08 ` Dmitry Vyukov 2020-10-28 10:08 ` Dmitry Vyukov 2020-10-29 20:08 ` Andrey Konovalov 2020-10-29 20:08 ` Andrey Konovalov 2020-10-29 20:08 ` Andrey Konovalov 2020-10-22 13:18 ` [PATCH RFC v2 07/21] kasan, arm64: move initialization message Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-22 13:18 ` Andrey Konovalov 2020-10-28 10:55 ` Dmitry Vyukov [this message] 2020-10-28 10:55 ` Dmitry Vyukov 2020-10-28 10:55 ` Dmitry Vyukov 2020-10-29 20:14 ` Andrey Konovalov 2020-10-29 20:14 ` Andrey Konovalov 2020-10-29 20:14 ` Andrey Konovalov 2020-11-03 15:33 ` Andrey Konovalov 2020-11-03 15:33 ` Andrey Konovalov 2020-11-03 15:33 ` Andrey Konovalov 2020-10-22 13:19 ` [PATCH RFC v2 08/21] kasan: remove __kasan_unpoison_stack Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 10:57 ` Dmitry Vyukov 2020-10-28 10:57 ` Dmitry Vyukov 2020-10-28 10:57 ` Dmitry Vyukov 2020-10-22 13:19 ` [PATCH RFC v2 09/21] kasan: inline kasan_reset_tag for tag-based modes Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 11:05 ` Dmitry Vyukov 2020-10-28 11:05 ` Dmitry Vyukov 2020-10-28 11:05 ` Dmitry Vyukov 2020-10-30 16:19 ` Andrey Konovalov 2020-10-30 16:19 ` Andrey Konovalov 2020-10-30 16:19 ` Andrey Konovalov 2020-10-22 13:19 ` [PATCH RFC v2 10/21] kasan: inline random_tag for HW_TAGS Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 11:08 ` Dmitry Vyukov 2020-10-28 11:08 ` Dmitry Vyukov 2020-10-28 11:08 ` Dmitry Vyukov 2020-10-30 15:48 ` Andrey Konovalov 2020-10-30 15:48 ` Andrey Konovalov 2020-10-30 15:48 ` Andrey Konovalov 2020-10-30 16:07 ` Andrey Konovalov 2020-10-30 16:07 ` Andrey Konovalov 2020-10-30 16:07 ` Andrey Konovalov 2020-10-22 13:19 ` [PATCH RFC v2 11/21] kasan: inline kasan_poison_memory and check_invalid_free Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 11:29 ` Dmitry Vyukov 2020-10-28 11:29 ` Dmitry Vyukov 2020-10-28 11:29 ` Dmitry Vyukov 2020-10-22 13:19 ` [PATCH RFC v2 12/21] kasan: inline and rename kasan_unpoison_memory Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 11:36 ` Dmitry Vyukov 2020-10-28 11:36 ` Dmitry Vyukov 2020-10-28 11:36 ` Dmitry Vyukov 2020-10-30 16:34 ` Andrey Konovalov 2020-10-30 16:34 ` Andrey Konovalov 2020-10-30 16:34 ` Andrey Konovalov 2020-10-30 17:46 ` Dmitry Vyukov 2020-10-30 17:46 ` Dmitry Vyukov 2020-10-30 17:46 ` Dmitry Vyukov 2020-10-22 13:19 ` [PATCH RFC v2 13/21] arm64: kasan: Add cpu_supports_tags helper Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 11:38 ` Dmitry Vyukov 2020-10-28 11:38 ` Dmitry Vyukov 2020-10-28 11:38 ` Dmitry Vyukov 2020-10-22 13:19 ` [PATCH RFC v2 14/21] kasan: add and integrate kasan boot parameters Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 18:50 ` Marco Elver 2020-10-22 18:50 ` Marco Elver 2020-10-22 18:50 ` Marco Elver 2020-10-22 20:28 ` Andrey Konovalov 2020-10-22 20:28 ` Andrey Konovalov 2020-10-22 20:28 ` Andrey Konovalov 2020-10-28 12:27 ` Dmitry Vyukov 2020-10-28 12:27 ` Dmitry Vyukov 2020-10-28 12:27 ` Dmitry Vyukov 2020-10-30 19:30 ` Andrey Konovalov 2020-10-30 19:30 ` Andrey Konovalov 2020-10-30 19:30 ` Andrey Konovalov 2020-10-30 14:45 ` Marco Elver 2020-10-30 14:45 ` Marco Elver 2020-10-30 14:45 ` Marco Elver 2020-10-30 19:30 ` Andrey Konovalov 2020-10-30 19:30 ` Andrey Konovalov 2020-10-30 19:30 ` Andrey Konovalov 2020-10-22 13:19 ` [PATCH RFC v2 15/21] kasan: check kasan_enabled in annotations Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 16:47 ` Dmitry Vyukov 2020-10-28 16:47 ` Dmitry Vyukov 2020-10-28 16:47 ` Dmitry Vyukov 2020-10-30 19:47 ` Andrey Konovalov 2020-10-30 19:47 ` Andrey Konovalov 2020-10-30 19:47 ` Andrey Konovalov 2020-10-22 13:19 ` [PATCH RFC v2 16/21] kasan: optimize poisoning in kmalloc and krealloc Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 16:55 ` Dmitry Vyukov 2020-10-28 16:55 ` Dmitry Vyukov 2020-10-28 16:55 ` Dmitry Vyukov 2020-11-02 15:17 ` Andrey Konovalov 2020-11-02 15:17 ` Andrey Konovalov 2020-11-02 15:17 ` Andrey Konovalov 2020-10-22 13:19 ` [PATCH RFC v2 17/21] kasan: simplify kasan_poison_kfree Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 16:57 ` Dmitry Vyukov 2020-10-28 16:57 ` Dmitry Vyukov 2020-10-28 16:57 ` Dmitry Vyukov 2020-10-22 13:19 ` [PATCH RFC v2 18/21] kasan: rename kasan_poison_kfree Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 16:58 ` Dmitry Vyukov 2020-10-28 16:58 ` Dmitry Vyukov 2020-10-28 16:58 ` Dmitry Vyukov 2020-10-22 13:19 ` [PATCH RFC v2 19/21] kasan: don't round_up too much Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 17:01 ` Dmitry Vyukov 2020-10-28 17:01 ` Dmitry Vyukov 2020-10-28 17:01 ` Dmitry Vyukov 2020-10-22 13:19 ` [PATCH RFC v2 20/21] kasan: simplify assign_tag and set_tag calls Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 17:03 ` Dmitry Vyukov 2020-10-28 17:03 ` Dmitry Vyukov 2020-10-28 17:03 ` Dmitry Vyukov 2020-10-22 13:19 ` [PATCH RFC v2 21/21] kasan: clarify comment in __kasan_kfree_large Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-22 13:19 ` Andrey Konovalov 2020-10-28 17:04 ` Dmitry Vyukov 2020-10-28 17:04 ` Dmitry Vyukov 2020-10-28 17:04 ` Dmitry Vyukov 2020-10-22 15:15 ` [PATCH RFC v2 00/21] kasan: hardware tag-based mode for production use on arm64 Dmitry Vyukov 2020-10-22 15:15 ` Dmitry Vyukov 2020-10-22 15:15 ` Dmitry Vyukov 2020-10-22 17:00 ` Andrey Konovalov 2020-10-22 17:00 ` Andrey Konovalov 2020-10-22 17:00 ` Andrey Konovalov 2020-10-22 18:29 ` Kostya Serebryany 2020-10-22 18:29 ` Kostya Serebryany 2020-10-22 18:29 ` Kostya Serebryany
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to='CACT4Y+Y6jbXh28U=9oK_1ihMhePRhZ6WP9vBwr8nVm_aU3BmNQ@mail.gmail.com' \ --to=dvyukov@google.com \ --cc=Branislav.Rankov@arm.com \ --cc=akpm@linux-foundation.org \ --cc=andreyknvl@google.com \ --cc=aryabinin@virtuozzo.com \ --cc=catalin.marinas@arm.com \ --cc=elver@google.com \ --cc=eugenis@google.com \ --cc=glider@google.com \ --cc=kasan-dev@googlegroups.com \ --cc=kcc@google.com \ --cc=kevin.brodsky@arm.com \ --cc=lenaptr@google.com \ --cc=linux-arm-kernel@lists.infradead.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-mm@kvack.org \ --cc=pcc@google.com \ --cc=serbanc@google.com \ --cc=vincenzo.frascino@arm.com \ --cc=will.deacon@arm.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.