On 04/17/2015 09:39 PM, David Keitel wrote:
> On 04/15/2015 11:04 AM, Andrey Ryabinin wrote:
>> I've pushed the most fresh thing that I have in git:
>> git://github.com/aryabinin/linux.git kasan/arm64v1
>>
>> It's the same patches with two simple but important fixes on top of it.
>
> Thanks,
On 04/15/2015 11:04 AM, Andrey Ryabinin wrote:
> I've pushed the most fresh thing that I have in git:
> git://github.com/aryabinin/linux.git kasan/arm64v1
>
> It's the same patches with two simple but important fixes on top of it.
Thanks, the two commits do fix compilation issues that I've
On 04/15/2015 05:37 AM, David Keitel wrote:
+ pgd = __pgd(__pa(kasan_zero_pmd) | PAGE_KERNEL);
+#else
+ pgd = __pgd(__pa(kasan_zero_pte) | PAGE_KERNEL);
+#endif
+
+ for (i = pgd_index(start); start < end; i++) {
+ set_pgd(&pgdp[i], pgd);
+
>>> + pgd = __pgd(__pa(kasan_zero_pmd) | PAGE_KERNEL);
>>> +#else
>>> + pgd = __pgd(__pa(kasan_zero_pte) | PAGE_KERNEL);
>>> +#endif
>>> +
>>> + for (i = pgd_index(start); start < end; i++) {
>>> + set_pgd(&pgdp[i], pgd);
>>> + start += PGDIR_SIZE;
>>> + }
>>> +}
>>
>> S
On Tuesday 24 March 2015 17:49:04 Andrey Ryabinin wrote:
> arch/arm64/mm/kasan_init.c | 211
> +++
>
Just one very high-level question: as this code is clearly derived from
the x86 version and nontrivial, could we move most of it out of
arch/{x86,arm64}
On 04/01/2015 03:28 PM, Catalin Marinas wrote:
> Hi Andrey,
>
Hi Catalin,
> On Tue, Mar 24, 2015 at 05:49:04PM +0300, Andrey Ryabinin wrote:
>> diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig
>> index 4085df1..10bbd71 100644
>> --- a/arch/arm64/Kconfig
>> +++ b/arch/arm64/Kconfig
>> @@ -41,
Hi Andrey,
On Tue, Mar 24, 2015 at 05:49:04PM +0300, Andrey Ryabinin wrote:
> diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig
> index 4085df1..10bbd71 100644
> --- a/arch/arm64/Kconfig
> +++ b/arch/arm64/Kconfig
> @@ -41,6 +41,7 @@ config ARM64
> select HAVE_ARCH_AUDITSYSCALL
> se
This patch adds arch specific code for kernel address sanitizer
(see Documentation/kasan.txt).
1/8 of kernel addresses reserved for shadow memory. There was no
big enough hole for this, so virtual addresses for shadow were
stolen from vmalloc area.
At early boot stage the whole shadow region popu
8 matches
Mail list logo