Re: [PATCH v13 11/20] tracing, arm64: untag user pointers in seq_print_user_ip

2019-04-01 Thread Andrey Konovalov
On Fri, Mar 22, 2019 at 4:45 PM Catalin Marinas wrote: > > On Wed, Mar 20, 2019 at 03:51:25PM +0100, Andrey Konovalov wrote: > > This patch is a part of a series that extends arm64 kernel ABI to allow to > > pass tagged user pointers (with the top byte set to something else other > > than 0x00)

Re: [PATCH v13 11/20] tracing, arm64: untag user pointers in seq_print_user_ip

2019-03-22 Thread Catalin Marinas
On Wed, Mar 20, 2019 at 03:51:25PM +0100, Andrey Konovalov wrote: > This patch is a part of a series that extends arm64 kernel ABI to allow to > pass tagged user pointers (with the top byte set to something else other > than 0x00) as syscall arguments. > > seq_print_user_ip() uses provided user

[PATCH v13 11/20] tracing, arm64: untag user pointers in seq_print_user_ip

2019-03-20 Thread Andrey Konovalov
This patch is a part of a series that extends arm64 kernel ABI to allow to pass tagged user pointers (with the top byte set to something else other than 0x00) as syscall arguments. seq_print_user_ip() uses provided user pointers for vma lookups, which can only by done with untagged pointers.