On 12/3/20 10:26 AM, Catalin Marinas wrote:
>> static inline void uaccess_enable(void)
>> {
>> +asm volatile(ALTERNATIVE("nop", SET_PSTATE_TCO(1),
>> + ARM64_MTE, CONFIG_KASAN_HW_TAGS));
>> +
>> __uaccess_enable(ARM64_HAS_PAN);
>> }
>
> I think that's
On Mon, Nov 23, 2020 at 09:07:51PM +0100, Andrey Konovalov wrote:
> diff --git a/arch/arm64/include/asm/uaccess.h
> b/arch/arm64/include/asm/uaccess.h
> index 385a189f7d39..d841a560fae7 100644
> --- a/arch/arm64/include/asm/uaccess.h
> +++ b/arch/arm64/include/asm/uaccess.h
> @@ -200,13 +200,36
From: Vincenzo Frascino
Add the implementation of the in-kernel fault handler.
When a tag fault happens on a kernel address:
* MTE is disabled on the current CPU,
* the execution continues.
When a tag fault happens on a user address:
* the kernel executes do_bad_area() and panics.
The tag
3 matches
Mail list logo