All of lore.kernel.org
 help / color / mirror / Atom feed
From: Alexander Potapenko <glider@google.com>
To: Marco Elver <elver@google.com>
Cc: Herbert Xu <herbert@gondor.apana.org.au>,
	"David S. Miller" <davem@davemloft.net>,
	 Vegard Nossum <vegard.nossum@oracle.com>,
	Dmitry Vyukov <dvyukov@google.com>,
	 Linux Memory Management List <linux-mm@kvack.org>,
	Al Viro <viro@zeniv.linux.org.uk>,
	 Andreas Dilger <adilger.kernel@dilger.ca>,
	Andrew Morton <akpm@linux-foundation.org>,
	 Andrey Konovalov <andreyknvl@google.com>,
	Andrey Ryabinin <aryabinin@virtuozzo.com>,
	 Andy Lutomirski <luto@kernel.org>,
	Ard Biesheuvel <ard.biesheuvel@linaro.org>,
	 Arnd Bergmann <arnd@arndb.de>,
	Christoph Hellwig <hch@infradead.org>,
	Christoph Hellwig <hch@lst.de>,
	 "Darrick J. Wong" <darrick.wong@oracle.com>,
	Dmitry Torokhov <dmitry.torokhov@gmail.com>,
	 Eric Biggers <ebiggers@google.com>,
	Eric Dumazet <edumazet@google.com>,
	 Eric Van Hensbergen <ericvh@gmail.com>,
	Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	 Harry Wentland <harry.wentland@amd.com>,
	Ilya Leoshkevich <iii@linux.ibm.com>, Ingo Molnar <mingo@elte.hu>,
	 Jason Wang <jasowang@redhat.com>, Jens Axboe <axboe@kernel.dk>,
	 Marek Szyprowski <m.szyprowski@samsung.com>,
	Mark Rutland <mark.rutland@arm.com>,
	 "Martin K. Petersen" <martin.petersen@oracle.com>,
	Martin Schwidefsky <schwidefsky@de.ibm.com>,
	 Matthew Wilcox <willy@infradead.org>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Michal Simek <monstr@monstr.eu>,  Petr Mladek <pmladek@suse.com>,
	Qian Cai <cai@lca.pw>, Randy Dunlap <rdunlap@infradead.org>,
	 Robin Murphy <robin.murphy@arm.com>,
	Sergey Senozhatsky <sergey.senozhatsky@gmail.com>,
	 Steven Rostedt <rostedt@goodmis.org>,
	Takashi Iwai <tiwai@suse.com>, "Theodore Ts'o" <tytso@mit.edu>,
	 Thomas Gleixner <tglx@linutronix.de>,
	Vasily Gorbik <gor@linux.ibm.com>,
	Wolfram Sang <wsa@the-dreams.de>
Subject: Re: [PATCH RFC v3 16/36] crypto: kmsan: disable accelerated configs under KMSAN
Date: Thu, 5 Dec 2019 15:51:02 +0100	[thread overview]
Message-ID: <CAG_fn=W25+XG0W2vO4vxa6mLmPt0peUFUusu7sf_hghcCLqFDA@mail.gmail.com> (raw)
In-Reply-To: <CANpmjNMh0FUoV82g6=40jgQPgqLopj9jR9ueJtidP-eodZUKyg@mail.gmail.com>

On Mon, Dec 2, 2019 at 2:25 PM Marco Elver <elver@google.com> wrote:
>
> On Fri, 22 Nov 2019 at 12:27, <glider@google.com> wrote:
> >
> > KMSAN is unable to understand when initialized values come from assembly.
> > Disable accelerated configs in KMSAN builds to prevent false positive
> > reports.
> >
> > Signed-off-by: Alexander Potapenko <glider@google.com>
> > To: Alexander Potapenko <glider@google.com>
> > Cc: Herbert Xu <herbert@gondor.apana.org.au>
> > Cc: "David S. Miller" <davem@davemloft.net>
> > Cc: Vegard Nossum <vegard.nossum@oracle.com>
> > Cc: Dmitry Vyukov <dvyukov@google.com>
> > Cc: linux-mm@kvack.org
> > ---
> >
> > Change-Id: Iddc71a2a27360e036d719c0940ebf15553cf8de8
> > ---
> >  crypto/Kconfig | 52 ++++++++++++++++++++++++++++++++++++++++++++++++++
> >  1 file changed, 52 insertions(+)
> >
> > diff --git a/crypto/Kconfig b/crypto/Kconfig
> > index 9e524044d312..502a75f1b597 100644
> > --- a/crypto/Kconfig
> > +++ b/crypto/Kconfig
> > @@ -309,11 +309,15 @@ config CRYPTO_AEGIS128
> >  config CRYPTO_AEGIS128_SIMD
> >         bool "Support SIMD acceleration for AEGIS-128"
> >         depends on CRYPTO_AEGIS128 && ((ARM || ARM64) && KERNEL_MODE_NEON)
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
>
> Probably fine to put this on one line:
>
>     depends on !KMSAN # avoid false positives from assembly
Done in v4.
> likewise for all below.
>
> >         default y
> >
> >  config CRYPTO_AEGIS128_AESNI_SSE2
> >         tristate "AEGIS-128 AEAD algorithm (x86_64 AESNI+SSE2 implementation)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_AEAD
> >         select CRYPTO_SIMD
> >         help
> > @@ -571,6 +575,8 @@ config CRYPTO_CRC32C
> >  config CRYPTO_CRC32C_INTEL
> >         tristate "CRC32c INTEL hardware acceleration"
> >         depends on X86
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_HASH
> >         help
> >           In Intel processor with SSE4.2 supported, the processor will
> > @@ -611,6 +617,8 @@ config CRYPTO_CRC32
> >  config CRYPTO_CRC32_PCLMUL
> >         tristate "CRC32 PCLMULQDQ hardware acceleration"
> >         depends on X86
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_HASH
> >         select CRC32
> >         help
> > @@ -649,6 +657,8 @@ config CRYPTO_CRCT10DIF
> >  config CRYPTO_CRCT10DIF_PCLMUL
> >         tristate "CRCT10DIF PCLMULQDQ hardware acceleration"
> >         depends on X86 && 64BIT && CRC_T10DIF
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_HASH
> >         help
> >           For x86_64 processors with SSE4.2 and PCLMULQDQ supported,
> > @@ -695,6 +705,8 @@ config CRYPTO_POLY1305
> >  config CRYPTO_POLY1305_X86_64
> >         tristate "Poly1305 authenticator algorithm (x86_64/SSE2/AVX2)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_POLY1305
> >         help
> >           Poly1305 authenticator algorithm, RFC7539.
> > @@ -814,6 +826,8 @@ config CRYPTO_SHA1
> >  config CRYPTO_SHA1_SSSE3
> >         tristate "SHA1 digest algorithm (SSSE3/AVX/AVX2/SHA-NI)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_SHA1
> >         select CRYPTO_HASH
> >         help
> > @@ -825,6 +839,8 @@ config CRYPTO_SHA1_SSSE3
> >  config CRYPTO_SHA256_SSSE3
> >         tristate "SHA256 digest algorithm (SSSE3/AVX/AVX2/SHA-NI)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_SHA256
> >         select CRYPTO_HASH
> >         help
> > @@ -837,6 +853,8 @@ config CRYPTO_SHA256_SSSE3
> >  config CRYPTO_SHA512_SSSE3
> >         tristate "SHA512 digest algorithm (SSSE3/AVX/AVX2)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_SHA512
> >         select CRYPTO_HASH
> >         help
> > @@ -1011,6 +1029,8 @@ config CRYPTO_WP512
> >  config CRYPTO_GHASH_CLMUL_NI_INTEL
> >         tristate "GHASH hash function (CLMUL-NI accelerated)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_CRYPTD
> >         help
> >           This is the x86_64 CLMUL-NI accelerated implementation of
> > @@ -1064,6 +1084,8 @@ config CRYPTO_AES_TI
> >  config CRYPTO_AES_NI_INTEL
> >         tristate "AES cipher algorithms (AES-NI)"
> >         depends on X86
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_AEAD
> >         select CRYPTO_LIB_AES
> >         select CRYPTO_ALGAPI
> > @@ -1190,6 +1212,8 @@ config CRYPTO_BLOWFISH_COMMON
> >  config CRYPTO_BLOWFISH_X86_64
> >         tristate "Blowfish cipher algorithm (x86_64)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_BLOWFISH_COMMON
> >         help
> > @@ -1221,6 +1245,8 @@ config CRYPTO_CAMELLIA_X86_64
> >         tristate "Camellia cipher algorithm (x86_64)"
> >         depends on X86 && 64BIT
> >         depends on CRYPTO
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_GLUE_HELPER_X86
> >         help
> > @@ -1238,6 +1264,8 @@ config CRYPTO_CAMELLIA_AESNI_AVX_X86_64
> >         tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX)"
> >         depends on X86 && 64BIT
> >         depends on CRYPTO
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_CAMELLIA_X86_64
> >         select CRYPTO_GLUE_HELPER_X86
> > @@ -1258,6 +1286,8 @@ config CRYPTO_CAMELLIA_AESNI_AVX2_X86_64
> >         tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX2)"
> >         depends on X86 && 64BIT
> >         depends on CRYPTO
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_CAMELLIA_AESNI_AVX_X86_64
> >         help
> >           Camellia cipher algorithm module (x86_64/AES-NI/AVX2).
> > @@ -1303,6 +1333,8 @@ config CRYPTO_CAST5
> >  config CRYPTO_CAST5_AVX_X86_64
> >         tristate "CAST5 (CAST-128) cipher algorithm (x86_64/AVX)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_CAST5
> >         select CRYPTO_CAST_COMMON
> > @@ -1325,6 +1357,8 @@ config CRYPTO_CAST6
> >  config CRYPTO_CAST6_AVX_X86_64
> >         tristate "CAST6 (CAST-256) cipher algorithm (x86_64/AVX)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_CAST6
> >         select CRYPTO_CAST_COMMON
> > @@ -1360,6 +1394,8 @@ config CRYPTO_DES_SPARC64
> >  config CRYPTO_DES3_EDE_X86_64
> >         tristate "Triple DES EDE cipher algorithm (x86-64)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_LIB_DES
> >         help
> > @@ -1426,6 +1462,8 @@ config CRYPTO_CHACHA20
> >  config CRYPTO_CHACHA20_X86_64
> >         tristate "ChaCha stream cipher algorithms (x86_64/SSSE3/AVX2/AVX-512VL)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_CHACHA20
> >         help
> > @@ -1462,6 +1500,8 @@ config CRYPTO_SERPENT
> >  config CRYPTO_SERPENT_SSE2_X86_64
> >         tristate "Serpent cipher algorithm (x86_64/SSE2)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_GLUE_HELPER_X86
> >         select CRYPTO_SERPENT
> > @@ -1481,6 +1521,8 @@ config CRYPTO_SERPENT_SSE2_X86_64
> >  config CRYPTO_SERPENT_SSE2_586
> >         tristate "Serpent cipher algorithm (i586/SSE2)"
> >         depends on X86 && !64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_GLUE_HELPER_X86
> >         select CRYPTO_SERPENT
> > @@ -1500,6 +1542,8 @@ config CRYPTO_SERPENT_SSE2_586
> >  config CRYPTO_SERPENT_AVX_X86_64
> >         tristate "Serpent cipher algorithm (x86_64/AVX)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_GLUE_HELPER_X86
> >         select CRYPTO_SERPENT
> > @@ -1520,6 +1564,8 @@ config CRYPTO_SERPENT_AVX_X86_64
> >  config CRYPTO_SERPENT_AVX2_X86_64
> >         tristate "Serpent cipher algorithm (x86_64/AVX2)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_SERPENT_AVX_X86_64
> >         help
> >           Serpent cipher algorithm, by Anderson, Biham & Knudsen.
> > @@ -1615,6 +1661,8 @@ config CRYPTO_TWOFISH_586
> >  config CRYPTO_TWOFISH_X86_64
> >         tristate "Twofish cipher algorithm (x86_64)"
> >         depends on (X86 || UML_X86) && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_ALGAPI
> >         select CRYPTO_TWOFISH_COMMON
> >         help
> > @@ -1631,6 +1679,8 @@ config CRYPTO_TWOFISH_X86_64
> >  config CRYPTO_TWOFISH_X86_64_3WAY
> >         tristate "Twofish cipher algorithm (x86_64, 3-way parallel)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_TWOFISH_COMMON
> >         select CRYPTO_TWOFISH_X86_64
> > @@ -1652,6 +1702,8 @@ config CRYPTO_TWOFISH_X86_64_3WAY
> >  config CRYPTO_TWOFISH_AVX_X86_64
> >         tristate "Twofish cipher algorithm (x86_64/AVX)"
> >         depends on X86 && 64BIT
> > +       # Disable under KMSAN to prevent false positives from assembly.
> > +       depends on !KMSAN
> >         select CRYPTO_BLKCIPHER
> >         select CRYPTO_GLUE_HELPER_X86
> >         select CRYPTO_SIMD
> > --
> > 2.24.0.432.g9d3f5f5b63-goog
> >



-- 
Alexander Potapenko
Software Engineer

Google Germany GmbH
Erika-Mann-Straße, 33
80636 München

Geschäftsführer: Paul Manicle, Halimah DeLaine Prado
Registergericht und -nummer: Hamburg, HRB 86891
Sitz der Gesellschaft: Hamburg


  reply	other threads:[~2019-12-05 14:51 UTC|newest]

Thread overview: 120+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-11-22 11:25 [PATCH RFC v3 00/36] Add KernelMemorySanitizer infrastructure glider
2019-11-22 11:25 ` [PATCH RFC v3 01/36] stackdepot: check depot_index before accessing the stack slab glider
2019-11-27 14:22   ` Marco Elver
2019-11-22 11:25 ` [PATCH RFC v3 02/36] stackdepot: build with -fno-builtin glider
2019-11-27 14:22   ` Marco Elver
2019-11-22 11:25 ` [PATCH RFC v3 03/36] kasan: stackdepot: move filter_irq_stacks() to stackdepot.c glider
2019-11-27 14:22   ` Marco Elver
2019-11-27 14:56     ` Alexander Potapenko
2019-11-22 11:25 ` [PATCH RFC v3 04/36] stackdepot: reserve 5 extra bits in depot_stack_handle_t glider
2019-11-27 14:23   ` Marco Elver
2019-11-22 11:25 ` [PATCH RFC v3 05/36] kmsan: add ReST documentation glider
2019-11-27 14:22   ` Marco Elver
2019-12-03 12:42     ` Alexander Potapenko
2019-11-22 11:25 ` [PATCH RFC v3 06/36] kmsan: gfp: introduce __GFP_NO_KMSAN_SHADOW glider
2019-11-27 14:48   ` Marco Elver
2019-12-03 12:57     ` Alexander Potapenko
2019-11-22 11:25 ` [PATCH RFC v3 07/36] kmsan: introduce __no_sanitize_memory and __SANITIZE_MEMORY__ glider
2019-11-28 13:13   ` Marco Elver
2019-11-29 16:09   ` Andrey Konovalov
2019-12-16 11:35     ` Alexander Potapenko
2019-11-22 11:25 ` [PATCH RFC v3 08/36] kmsan: reduce vmalloc space glider
2019-11-28 13:30   ` Marco Elver
2019-11-22 11:25 ` [PATCH RFC v3 09/36] kmsan: add KMSAN bits to struct page and struct task_struct glider
2019-11-28 13:44   ` Marco Elver
2019-11-28 14:05     ` Alexander Potapenko
2019-11-22 11:25 ` [PATCH RFC v3 10/36] kmsan: add KMSAN runtime glider
2019-11-24 19:44   ` Wolfram Sang
2019-11-25  9:14     ` Alexander Potapenko
2019-11-29 16:07   ` Marco Elver
2019-12-19 14:16     ` Alexander Potapenko
2019-12-02 15:39   ` Andrey Konovalov
2019-12-20 18:58     ` Alexander Potapenko
2019-12-03 14:34   ` Andrey Konovalov
2019-11-22 11:25 ` [PATCH RFC v3 11/36] kmsan: stackdepot: don't allocate KMSAN metadata for stackdepot glider
2019-11-29 14:52   ` Andrey Konovalov
2019-12-03 14:27     ` Alexander Potapenko
2019-11-22 11:25 ` [PATCH RFC v3 12/36] kmsan: define READ_ONCE_NOCHECK() glider
2019-12-02 10:03   ` Marco Elver
2019-12-03 12:45     ` Alexander Potapenko
2019-11-22 11:25 ` [PATCH RFC v3 13/36] kmsan: make READ_ONCE_TASK_STACK() return initialized values glider
2019-12-02 10:07   ` Marco Elver
2019-12-05 15:52     ` Alexander Potapenko
2019-11-22 11:25 ` [PATCH RFC v3 14/36] kmsan: x86: sync metadata pages on page fault glider
2019-11-22 11:26 ` [PATCH RFC v3 15/36] kmsan: add tests for KMSAN glider
2019-11-29 14:14   ` Andrey Konovalov
2019-12-05 14:30     ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 16/36] crypto: kmsan: disable accelerated configs under KMSAN glider
2019-12-02 13:25   ` Marco Elver
2019-12-05 14:51     ` Alexander Potapenko [this message]
2019-11-22 11:26 ` [PATCH RFC v3 17/36] kmsan: x86: disable UNWINDER_ORC " glider
2019-12-02 13:30   ` Marco Elver
2019-11-22 11:26 ` [PATCH RFC v3 18/36] kmsan: disable LOCK_DEBUGGING_SUPPORT glider
2019-12-02 13:33   ` Marco Elver
2019-12-03 14:34     ` Alexander Potapenko
2019-12-03 15:00       ` Qian Cai
2019-12-03 15:14         ` Alexander Potapenko
2019-12-03 18:02           ` Qian Cai
2019-12-03 18:38           ` Steven Rostedt
2019-12-04  8:41             ` Alexander Potapenko
2019-12-04 12:22               ` Petr Mladek
2019-12-04 13:12                 ` Qian Cai
2019-12-04 16:24                   ` Alexander Potapenko
2019-12-04 18:03                     ` Qian Cai
2019-11-22 11:26 ` [PATCH RFC v3 20/36] kmsan: x86: increase stack sizes in KMSAN builds glider
2019-12-02 14:31   ` Marco Elver
2019-11-22 11:26 ` [PATCH RFC v3 21/36] kmsan: disable KMSAN instrumentation for certain kernel parts glider
2019-11-29 15:07   ` Andrey Konovalov
2019-12-10 10:35     ` Alexander Potapenko
2019-12-10 12:38       ` Alexander Potapenko
2019-12-10 12:43       ` Qian Cai
2019-11-22 11:26 ` [PATCH RFC v3 22/36] kmsan: mm: call KMSAN hooks from SLUB code glider
2019-12-02 15:36   ` Marco Elver
2019-12-10 12:07     ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 23/36] kmsan: call KMSAN hooks where needed glider
2019-11-26 10:17   ` Petr Mladek
2019-11-26 10:52     ` Alexander Potapenko
2019-11-29 16:21   ` Andrey Konovalov
2019-12-16 11:30     ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 24/36] kmsan: disable instrumentation of certain functions glider
2019-11-29 14:59   ` Andrey Konovalov
2019-12-18 10:02     ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 25/36] kmsan: unpoison |tlb| in arch_tlb_gather_mmu() glider
2019-11-29 15:08   ` Andrey Konovalov
2019-12-03 14:19     ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 26/36] kmsan: use __msan_memcpy() where possible glider
2019-11-29 15:13   ` Andrey Konovalov
2019-12-05 15:46     ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 27/36] kmsan: hooks for copy_to_user() and friends glider
2019-11-29 15:34   ` Andrey Konovalov
2019-12-05 16:00     ` Alexander Potapenko
2019-12-05 16:44       ` Andrey Konovalov
2019-12-11 14:22         ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 28/36] kmsan: enable KMSAN builds glider
2019-11-29 15:55   ` Andrey Konovalov
2019-12-11 12:51     ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 29/36] kmsan: handle /dev/[u]random glider
2019-11-22 11:26 ` [PATCH RFC v3 30/36] kmsan: virtio: check/unpoison scatterlist in vring_map_one_sg() glider
2019-11-22 11:26 ` [PATCH RFC v3 31/36] kmsan: disable strscpy() optimization under KMSAN glider
2019-12-02 15:51   ` Marco Elver
2019-12-02 16:23     ` Alexander Potapenko
2019-12-03 11:19       ` Alexander Potapenko
2019-12-03 11:24         ` Marco Elver
2019-12-03 11:27           ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 32/36] kmsan: add iomap support glider
2019-12-03 12:50   ` Marco Elver
2019-12-03 14:07     ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 33/36] kmsan: dma: unpoison memory mapped by dma_direct_map_page() glider
2019-11-22 11:26 ` [PATCH RFC v3 34/36] kmsan: disable physical page merging in biovec glider
2019-12-03 12:54   ` Marco Elver
2019-12-03 13:38     ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 35/36] kmsan: ext4: skip block merging logic in ext4_mpage_readpages for KMSAN glider
2019-11-25 16:05   ` Robin Murphy
2019-11-25 17:03     ` Alexander Potapenko
2019-12-03 14:22   ` Marco Elver
2019-12-05 14:31     ` Alexander Potapenko
2019-11-22 11:26 ` [PATCH RFC v3 36/36] net: kasan: kmsan: support CONFIG_GENERIC_CSUM on x86, enable it for KASAN/KMSAN glider
2019-12-03 14:17   ` Marco Elver
2019-12-05 14:37     ` Alexander Potapenko
2019-11-29 14:39 ` [PATCH RFC v3 00/36] Add KernelMemorySanitizer infrastructure Marco Elver
2019-12-02 16:02   ` Alexander Potapenko

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAG_fn=W25+XG0W2vO4vxa6mLmPt0peUFUusu7sf_hghcCLqFDA@mail.gmail.com' \
    --to=glider@google.com \
    --cc=adilger.kernel@dilger.ca \
    --cc=akpm@linux-foundation.org \
    --cc=andreyknvl@google.com \
    --cc=ard.biesheuvel@linaro.org \
    --cc=arnd@arndb.de \
    --cc=aryabinin@virtuozzo.com \
    --cc=axboe@kernel.dk \
    --cc=cai@lca.pw \
    --cc=darrick.wong@oracle.com \
    --cc=davem@davemloft.net \
    --cc=dmitry.torokhov@gmail.com \
    --cc=dvyukov@google.com \
    --cc=ebiggers@google.com \
    --cc=edumazet@google.com \
    --cc=elver@google.com \
    --cc=ericvh@gmail.com \
    --cc=gor@linux.ibm.com \
    --cc=gregkh@linuxfoundation.org \
    --cc=harry.wentland@amd.com \
    --cc=hch@infradead.org \
    --cc=hch@lst.de \
    --cc=herbert@gondor.apana.org.au \
    --cc=iii@linux.ibm.com \
    --cc=jasowang@redhat.com \
    --cc=linux-mm@kvack.org \
    --cc=luto@kernel.org \
    --cc=m.szyprowski@samsung.com \
    --cc=mark.rutland@arm.com \
    --cc=martin.petersen@oracle.com \
    --cc=mingo@elte.hu \
    --cc=monstr@monstr.eu \
    --cc=mst@redhat.com \
    --cc=pmladek@suse.com \
    --cc=rdunlap@infradead.org \
    --cc=robin.murphy@arm.com \
    --cc=rostedt@goodmis.org \
    --cc=schwidefsky@de.ibm.com \
    --cc=sergey.senozhatsky@gmail.com \
    --cc=tglx@linutronix.de \
    --cc=tiwai@suse.com \
    --cc=tytso@mit.edu \
    --cc=vegard.nossum@oracle.com \
    --cc=viro@zeniv.linux.org.uk \
    --cc=willy@infradead.org \
    --cc=wsa@the-dreams.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.