Re: [PATCH v17 04/15] mm, arm64: untag user pointers passed to memory syscalls

2019-06-24 Thread Andrey Konovalov
On Wed, Jun 19, 2019 at 6:46 PM Khalid Aziz wrote: > > On 6/19/19 9:55 AM, Khalid Aziz wrote: > > On 6/12/19 5:43 AM, Andrey Konovalov wrote: > >> This patch is a part of a series that extends arm64 kernel ABI to allow to > >> pass tagged user pointers (with the top byte set to something else

Re: [PATCH v17 04/15] mm, arm64: untag user pointers passed to memory syscalls

2019-06-19 Thread Khalid Aziz
On 6/19/19 9:55 AM, Khalid Aziz wrote: > On 6/12/19 5:43 AM, Andrey Konovalov wrote: >> This patch is a part of a series that extends arm64 kernel ABI to allow to >> pass tagged user pointers (with the top byte set to something else other >> than 0x00) as syscall arguments. >> >> This patch allows

Re: [PATCH v17 04/15] mm, arm64: untag user pointers passed to memory syscalls

2019-06-19 Thread Khalid Aziz
On 6/12/19 5:43 AM, Andrey Konovalov wrote: > This patch is a part of a series that extends arm64 kernel ABI to allow to > pass tagged user pointers (with the top byte set to something else other > than 0x00) as syscall arguments. > > This patch allows tagged pointers to be passed to the

Re: [PATCH v17 04/15] mm, arm64: untag user pointers passed to memory syscalls

2019-06-12 Thread Vincenzo Frascino
On 12/06/2019 12:43, Andrey Konovalov wrote: > This patch is a part of a series that extends arm64 kernel ABI to allow to > pass tagged user pointers (with the top byte set to something else other > than 0x00) as syscall arguments. > > This patch allows tagged pointers to be passed to the

[PATCH v17 04/15] mm, arm64: untag user pointers passed to memory syscalls

2019-06-12 Thread Andrey Konovalov
This patch is a part of a series that extends arm64 kernel ABI to allow to pass tagged user pointers (with the top byte set to something else other than 0x00) as syscall arguments. This patch allows tagged pointers to be passed to the following memory syscalls: get_mempolicy, madvise, mbind,