Received: by 2002:a05:6a10:c7c6:0:0:0:0 with SMTP id h6csp3103004pxy; Wed, 4 Aug 2021 02:20:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy6abSACghys+7m+o2hECVJufam1DOYnrTN07tCm3UHv176n9Q+4L003H1i118SHcHx7P8f X-Received: by 2002:a17:906:8287:: with SMTP id h7mr24015197ejx.406.1628068849900; Wed, 04 Aug 2021 02:20:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628068849; cv=none; d=google.com; s=arc-20160816; b=bhpRziDODWe/uwnAKm7LECx+YmA35WCx09CFtrw2qLBlYt/bKMSRg6SUG8yDwfudvb ZOZ5KnxFUwPzCNPwk9UE/gW36nB6DCWFGm19UhfckY2uOB0h6/s4U0F7wzpGapl6G/cm 5pFlaoh1AAUUY0ukRdtjgUC8GcRMdX/WJnhOjtmjU3SkKn9i+BqjVdUVYNrVVKKviIWW V+MZ7XsELNAso8NVqVFw87aLavUpPISy5tjcn+PygooWd9KAK8spC7DRThnQY++6bnua B/mrGSVOZMPX3Lr4gousng0Ik4Ztu/xXU0mD6Nf5Uc+x6TDdIzlgLoFFnUxBjWGIf0yO dwHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=KFq2ECQdILbEnKxwBoUtMxJ1+JK9utaMzIzLVOAgFHM=; b=Y3qBwUkuGMl2A1K7ZpK58VgL1n8NDPZ0I1jj5dJkYJ1Kpp+2u2jXiWW3jziHzDzfUi CVk6hnhhrzp1thfHKVFSxew06LtCDlU0IoAk/miCg4OZjU59/fHRDqsfDosOr0CZVA25 Zqzk9QlX218w32EHUZap7PBEhWcf9m9Adrv6Wroui604ugt8yXwMQSQnnfdIPgiEavBE lkRC1m6pbSRNWYH5L6mX8naYBKW1Og1mT7JeHJ1YrlA3kMZLo31H2RB986t2o/O8NMzl FdMqjDRkxQpDd4603UiL8O+ZOqIsm6v9QS4A7yEVTKBqAEzfEMPceY2i/IIhuFJ93gph bT1w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v23si1704393ejw.409.2021.08.04.02.20.24; Wed, 04 Aug 2021 02:20:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236287AbhHDIXZ (ORCPT + 99 others); Wed, 4 Aug 2021 04:23:25 -0400 Received: from mailgw02.mediatek.com ([210.61.82.184]:56720 "EHLO mailgw02.mediatek.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S236279AbhHDIXY (ORCPT ); Wed, 4 Aug 2021 04:23:24 -0400 X-UUID: 9748f6851311479fac11afc7ca83a48e-20210804 X-UUID: 9748f6851311479fac11afc7ca83a48e-20210804 Received: from mtkcas06.mediatek.inc [(172.21.101.30)] by mailgw02.mediatek.com (envelope-from ) (Generic MTA with TLSv1.2 ECDHE-RSA-AES256-SHA384 256/256) with ESMTP id 1817066279; Wed, 04 Aug 2021 16:23:08 +0800 Received: from MTKCAS06.mediatek.inc (172.21.101.30) by mtkmbs02n2.mediatek.inc (172.21.101.101) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 4 Aug 2021 16:23:07 +0800 Received: from mtksdccf07.mediatek.inc (172.21.84.99) by MTKCAS06.mediatek.inc (172.21.101.73) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Wed, 4 Aug 2021 16:23:07 +0800 From: Kuan-Ying Lee To: Nicholas Tang , Andrew Yang , Andrey Konovalov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Catalin Marinas , Chinwen Chang , Andrew Morton CC: , , , , , Kuan-Ying Lee Subject: [PATCH v2 0/2] kasan: reset tag when accessing invalid data Date: Wed, 4 Aug 2021 16:22:28 +0800 Message-ID: <20210804082230.10837-1-Kuan-Ying.Lee@mediatek.com> X-Mailer: git-send-email 2.18.0 MIME-Version: 1.0 Content-Type: text/plain X-MTK: N Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With hardware tag-based kasan enabled, we reset the tag when we access metadata to avoid from false alarm. Changes since v2: - Refine the commit message in detail. - Thanks Andrey's explanation about false alarm of kmemleak. Kuan-Ying Lee (2): kasan, kmemleak: reset tags when scanning block kasan, slub: reset tag when printing address mm/kmemleak.c | 6 +++--- mm/slub.c | 4 ++-- 2 files changed, 5 insertions(+), 5 deletions(-) -- 2.18.0