Received: by 2002:a05:6a10:c7c6:0:0:0:0 with SMTP id h6csp3128785pxy; Wed, 4 Aug 2021 03:07:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwwboFRuGoVyObtllGdzEow+bF/qBxKxk633QxBQ9uaDRycBEeFHku3NnQMtA+vECSbbhBd X-Received: by 2002:a17:906:e089:: with SMTP id gh9mr25376951ejb.80.1628071624440; Wed, 04 Aug 2021 03:07:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628071624; cv=none; d=google.com; s=arc-20160816; b=UbvfWvUIVzw9y3iWCyLQ96eEL8KvZaDPHyKAnMf5xkURtYeze88e97Oh63j3bQ5NW7 pQHeQgKKSKpIwe036N0FA/YqrgaYdb4hHrtELuCtSq6jxSn5+ncfEOKh9/aJueMylXLA FgDSzzzDgdtKXAdxxyiZEth6t6zk+nyxaobUQOC1Um5F7PW6qi2v5OvW4PQuViZeu5CV jWbimWLNSYkgBIksN3sNxMVvVCESZlkOHzGYyFchUQwuaijq7aD0nqPop9im/GwR5kzP FsHlEo+V2wmrwTjSGaYiN/r4F4/8lzw32nLiLmshE54zTmNDTYIQBAna/izoVKpbOEwg emRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=5dKoKDhhjhDSGyfHWIa+WMFbSRbE1O37zbFp8C9LpeQ=; b=v93QgRGBjhSLjZrSZ1phddIS5OnvGKHRSmFC63k6J3Cci/7h3eaxnMCd2V1H+jxwqN YgjwcJD17U9ZJw08sOVxpwWW7AIxc8gdzmsydJ+P3jKRnHlA5BBHdRsfc1zf/zCE4obn 1ixSDf0IaEMg4E3MmU8ladNQZD3XrL5i/gaONEZd1bq3mo5+SzA138TeHfYULEcqccVm Vk4ezhwXUiZM7DGWJLoVNDajm6Ps8foTqVUE0zLkD7aG/GCPYdti0JZm3QHBpixOznDp EBeXYdOpJS6lzz+e6hemCc52f1jn70stuOuv563Z3mNDCt3xfCRX56oGiQr33ZOo83dH O8rg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hr1si2180666ejc.424.2021.08.04.03.06.39; Wed, 04 Aug 2021 03:07:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236978AbhHDJKe (ORCPT + 99 others); Wed, 4 Aug 2021 05:10:34 -0400 Received: from mailgw01.mediatek.com ([60.244.123.138]:39770 "EHLO mailgw01.mediatek.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S236991AbhHDJKd (ORCPT ); Wed, 4 Aug 2021 05:10:33 -0400 X-UUID: 37b1258cb2234a309df1b9ba8a8e64aa-20210804 X-UUID: 37b1258cb2234a309df1b9ba8a8e64aa-20210804 Received: from mtkcas10.mediatek.inc [(172.21.101.39)] by mailgw01.mediatek.com (envelope-from ) (Generic MTA with TLSv1.2 ECDHE-RSA-AES256-SHA384 256/256) with ESMTP id 21374007; Wed, 04 Aug 2021 17:10:17 +0800 Received: from mtkcas07.mediatek.inc (172.21.101.84) by mtkmbs02n2.mediatek.inc (172.21.101.101) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 4 Aug 2021 17:10:15 +0800 Received: from mtksdccf07.mediatek.inc (172.21.84.99) by mtkcas07.mediatek.inc (172.21.101.73) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Wed, 4 Aug 2021 17:10:15 +0800 From: Kuan-Ying Lee To: Nicholas Tang , Andrew Yang , Andrey Konovalov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Catalin Marinas , Chinwen Chang , Andrew Morton CC: , , , , , Kuan-Ying Lee Subject: [PATCH v3 0/2] kasan: reset tag when accessing invalid metadata Date: Wed, 4 Aug 2021 17:09:55 +0800 Message-ID: <20210804090957.12393-1-Kuan-Ying.Lee@mediatek.com> X-Mailer: git-send-email 2.18.0 MIME-Version: 1.0 Content-Type: text/plain X-MTK: N Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With hardware tag-based kasan enabled, we reset the tag when we access metadata to avoid from false alarm. Changes since v3: - Remove inappropriate suggested-by Changes since v2: - Refine the commit message in detail. - Thanks Andrey's explanation about false alarm of kmemleak. Kuan-Ying Lee (2): kasan, kmemleak: reset tags when scanning block kasan, slub: reset tag when printing address mm/kmemleak.c | 6 +++--- mm/slub.c | 4 ++-- 2 files changed, 5 insertions(+), 5 deletions(-) -- 2.18.0