summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Add linux-next specific files for 20201125next-20201125Stephen Rothwell2020-11-254-0/+11907
* Merge branch 'akpm/master'Stephen Rothwell2020-11-25105-1964/+3339
|\
| * mm/gup: assert that the mmap lock is held in __get_user_pages()Jann Horn2020-11-251-0/+2
| * mmap locking API: don't check locking if the mm isn't live yetJann Horn2020-11-253-4/+30
| * kasan: update documentationAndrey Konovalov2020-11-251-70/+116
| * kasan, mm: allow cache merging with no metadataAndrey Konovalov2020-11-253-3/+32
| * kasan: sanitize objects when metadata doesn't fitAndrey Konovalov2020-11-258-77/+149
| * kasan: clarify comment in __kasan_kfree_largeAndrey Konovalov2020-11-251-1/+1
| * kasan: simplify assign_tag and set_tag callsAndrey Konovalov2020-11-251-6/+7
| * kasan: don't round_up too muchAndrey Konovalov2020-11-252-6/+3
| * kasan, mm: rename kasan_poison_kfreeAndrey Konovalov2020-11-253-26/+32
| * kasan, mm: check kasan_enabled in annotationsAndrey Konovalov2020-11-253-81/+210
| * kasan: add and integrate kasan boot parametersAndrey Konovalov2020-11-254-7/+196
| * kasan: inline (un)poison_range and check_invalid_freeAndrey Konovalov2020-11-252-35/+40
| * kasan: open-code kasan_unpoison_slabAndrey Konovalov2020-11-252-7/+1
| * kasan: inline random_tag for HW_TAGSAndrey Konovalov2020-11-252-22/+14
| * kasan: inline kasan_reset_tag for tag-based modesAndrey Konovalov2020-11-259-29/+18
| * kasan: remove __kasan_unpoison_stackAndrey Konovalov2020-11-251-9/+3
| * kasan: allow VMAP_STACK for HW_TAGS modeAndrey Konovalov2020-11-251-4/+4
| * kasan, arm64: unpoison stack only with CONFIG_KASAN_STACKAndrey Konovalov2020-11-254-6/+10
| * kasan: introduce set_alloc_infoAndrey Konovalov2020-11-251-1/+6
| * kasan: rename get_alloc/free_infoAndrey Konovalov2020-11-258-31/+31
| * kasan: simplify quarantine_put call siteAndrey Konovalov2020-11-253-5/+5
| * kselftest/arm64: check GCR_EL1 after context switchVincenzo Frascino2020-11-252-1/+156
| * kasan: add documentation for hardware tag-based modeAndrey Konovalov2020-11-251-21/+59
| * kasan, arm64: enable CONFIG_KASAN_HW_TAGSAndrey Konovalov2020-11-251-0/+1
| * kasan, mm: reset tags when accessing metadataAndrey Konovalov2020-11-253-15/+20
| * kasan, arm64: print report from tag fault handlerAndrey Konovalov2020-11-252-3/+22
| * kasan, arm64: implement HW_TAGS runtimeAndrey Konovalov2020-11-2514-26/+187
| * kasan, arm64: expand CONFIG_KASAN checksAndrey Konovalov2020-11-2516-25/+36
| * kasan, x86, s390: update undef CONFIG_KASANAndrey Konovalov2020-11-252-0/+2
| * kasan: define KASAN_GRANULE_SIZE for HW_TAGSAndrey Konovalov2020-11-251-0/+6
| * arm64: kasan: add arch layer for memory tagging helpersAndrey Konovalov2020-11-252-0/+35
| * arm64: kasan: align allocations for HW_TAGSAndrey Konovalov2020-11-251-0/+3
| * kasan, mm: untag page address in free_reserved_areaVincenzo Frascino2020-11-251-0/+5
| * arm64: mte: switch GCR_EL1 in kernel entry and exitVincenzo Frascino2020-11-256-4/+79
| * arm64: mte: convert gcr_user into an exclude maskVincenzo Frascino2020-11-252-15/+16
| * arm64: kasan: allow enabling in-kernel MTEVincenzo Frascino2020-11-253-3/+33
| * arm64: mte: add in-kernel tag fault handlerVincenzo Frascino2020-11-252-0/+68
| * arm64: mte: reset the page tag in page->flagsVincenzo Frascino2020-11-254-0/+32
| * arm64: mte: add in-kernel MTE helpersVincenzo Frascino2020-11-256-6/+150
| * arm64: enable armv8.5-a asm-arch optionVincenzo Frascino2020-11-252-0/+9
| * kasan: introduce CONFIG_KASAN_HW_TAGSAndrey Konovalov2020-11-251-17/+44
| * kasan, arm64: don't allow SW_TAGS with ARM64_MTEAndrey Konovalov2020-11-251-1/+1
| * kasan: separate metadata_fetch_row for each modeAndrey Konovalov2020-11-254-29/+45
| * kasan: rename SHADOW layout macros to METAAndrey Konovalov2020-11-251-15/+15
| * kasan: rename print_shadow_for_address to print_memory_metadataAndrey Konovalov2020-11-251-3/+3
| * kasan: rename addr_has_shadow to addr_has_metadataAndrey Konovalov2020-11-253-5/+5
| * kasan, arm64: rename kasan_init_tags and mark as __initAndrey Konovalov2020-11-254-5/+5
| * kasan, arm64: move initialization messageAndrey Konovalov2020-11-254-17/+11