From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0BB27C4828D for ; Mon, 5 Feb 2024 16:31:21 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 5FDE36B007B; Mon, 5 Feb 2024 11:31:21 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 586766B007D; Mon, 5 Feb 2024 11:31:21 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3B1636B007E; Mon, 5 Feb 2024 11:31:21 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 232AE6B007B for ; Mon, 5 Feb 2024 11:31:21 -0500 (EST) Received: from smtpin04.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id DAFF0A1EE3 for ; Mon, 5 Feb 2024 16:31:20 +0000 (UTC) X-FDA: 81758290320.04.51983DE Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-he1eur04on2081.outbound.protection.outlook.com [40.107.7.81]) by imf13.hostedemail.com (Postfix) with ESMTP id 8A2DF2001F for ; Mon, 5 Feb 2024 16:31:15 +0000 (UTC) Authentication-Results: imf13.hostedemail.com; dkim=pass header.d=armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=eGkemGGq; dkim=pass header.d=armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=eGkemGGq; dmarc=pass (policy=none) header.from=arm.com; spf=pass (imf13.hostedemail.com: domain of Alexandru.Elisei@arm.com designates 40.107.7.81 as permitted sender) smtp.mailfrom=Alexandru.Elisei@arm.com; arc=pass ("microsoft.com:s=arcselector9901:i=2") ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1707150676; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=VKFJxZ2+kCIPS11EhpwNvCR59jz94fC2Zn1gD1Ogz8I=; b=Cfz+FJO/mXtlIGiL1bux5RNse0fr8kMuuxoAH0uP9khNnraPNAviLfBn4IWUSLuZ2l/f/O AlhEjxOgSxRT/K1l4bxpmJbuAIG9kvcqjNt0PqCiP6K6vyONXKuFBKTz6+zoTIP6Eh5hDu p/g8QBiwS4PSfunQB/hJp+kMqZanDQY= ARC-Authentication-Results: i=3; imf13.hostedemail.com; dkim=pass header.d=armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=eGkemGGq; dkim=pass header.d=armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=eGkemGGq; dmarc=pass (policy=none) header.from=arm.com; spf=pass (imf13.hostedemail.com: domain of Alexandru.Elisei@arm.com designates 40.107.7.81 as permitted sender) smtp.mailfrom=Alexandru.Elisei@arm.com; arc=pass ("microsoft.com:s=arcselector9901:i=2") ARC-Seal: i=3; s=arc-20220608; d=hostedemail.com; t=1707150676; a=rsa-sha256; cv=pass; b=pCY0esXBi/XMYsUyBBfavZnD77rFOEi45+1sGtrThwAOaHJCga957ghLlyhUetTz6mNIFJ IimmfckZyuVIj1LVkzKOAnrgCgaMnmXe/tsvm/wkRqfyHMkoQ3+9z1vhnsStLOfWR9n4A5 G29sTZ+/HRoKJ2ts49oFq5sF9Z72HzE= ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=OSGJbFyf4WQhTXteR5tNYqbkWDUZL69sKayso64wSDcE0/F/Hcut8qEXylfCQrqvKJLZBJdFZZ/S9BuMTZjLU0t9zTiU7Q/j4EDRRdsrBtoPstJBJaU4XOWpfD2zCEmsJAXsXQibeRKWGgGOQi2rsyWEZgGlMNS29Z4AGY1ko4XRl2gmHgSJ+vwIQOP9oHMh7WHuX3mAL+Ovw1LtSdgoz+qqt/ERy+tdxnBdjNrQ+/ohdVzIVu2RLKGcECKUvO+V5f1p+BnwnAkUqycoN40TfsSPK5CALT8WmsLc3guGC/wNpPhO5dOJFxdas4niXADPcOuc3UaYXFgZnEOKu+IeLw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=VKFJxZ2+kCIPS11EhpwNvCR59jz94fC2Zn1gD1Ogz8I=; b=gzhJl7I4StQLNNQA78d13yh5iXQKCJCkMvOEgVgJcOHJMK21q91orohVGoieH0WfptYjWND9loxFb/vTh0NWN5yPYXdirJxd3QhdI0Lk+Gy72Rd6ptfBkLS1Z/+mx/wN1x5z7vq7gmfPkcFjloB1FS7nYlsjsSUbVNI9EztJ2MxfdQiZovx4MPC3nhDz8DnOMhlh7WXQaBlvMVS1UdvGotA8VEQUbxAtO9hNbWF6BWxDk5sduE7KbTIvyw72oDDMYRlwnBr/dLfwSEUA7sI4WgaNyhSkGfNMCHy8XC+9LcS/oa9fVsljHWQxEiYJTzzpCcE9RxLhCdMf9IfW0xKWvA== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=kvack.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VKFJxZ2+kCIPS11EhpwNvCR59jz94fC2Zn1gD1Ogz8I=; b=eGkemGGqA4ziRNcBHlW3YoF8/bc8AQo8s45SQXbmSM5VYEh1MsGTASz3Etaqj5A75UCxBS6y6I8hxAekXXXrHLx8tW41dUCHzhRwcTd5lRiUWpmzs0lParmZGe6p+FuTCSmsehhjoY7rWvHyYjXITxMPb84XDDuTk99KD4wwrz4= Received: from DU7PR01CA0003.eurprd01.prod.exchangelabs.com (2603:10a6:10:50f::17) by DB4PR08MB9357.eurprd08.prod.outlook.com (2603:10a6:10:3f3::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7249.34; Mon, 5 Feb 2024 16:30:41 +0000 Received: from DU2PEPF00028D01.eurprd03.prod.outlook.com (2603:10a6:10:50f:cafe::15) by DU7PR01CA0003.outlook.office365.com (2603:10a6:10:50f::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7249.34 via Frontend Transport; Mon, 5 Feb 2024 16:30:41 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DU2PEPF00028D01.mail.protection.outlook.com (10.167.242.185) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7249.19 via Frontend Transport; Mon, 5 Feb 2024 16:30:35 +0000 Received: ("Tessian outbound 31df1b57f90c:v228"); Mon, 05 Feb 2024 16:30:28 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 3413c311706102e9 X-CR-MTA-TID: 64aa7808 Received: from a84e53a11534.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id E4E84FE5-8F84-428C-ACB9-145F11205B65.1; Mon, 05 Feb 2024 16:30:21 +0000 Received: from EUR01-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id a84e53a11534.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Mon, 05 Feb 2024 16:30:21 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EpFqAKwzxcQm2w7zqIWAFyG836slqrHazQhe9fflhFDWGFrIzILnCg+mdV4EFwAX/j/cf5OGXOc3f3uSgmSBQk2BpbNS5JQ1PnQtQaZRAIkXoj1gxhxefkv4OoR8i4tZ/GLrXGHC/xbE56CNAxcri4TwFMVnTGudDhiN/HkgwP4OQKzwthiRCmcViQyxTayZ1sL+PtwyTG2Z9ZO7/zfUm3od0kyl4l6kpWNptJzX8rJq6Smn5UUZN0Wfv/+MQx+Bkde8KQhJ7OdJqBfIUVjpFpWl84JS38iajgj8cPao8NyhcyXCUCUY0l9vDMXqk+kKewdhPkP758OJ820EuQXYNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=VKFJxZ2+kCIPS11EhpwNvCR59jz94fC2Zn1gD1Ogz8I=; b=QeWjlujpd79364d5x0pKDQS1BtAGV/B58aS5yUid7oVWXitGW4+pEmFU4Lb3h5FT4JWixdhX9c6wivP1yqlsA6wwR2U3zm4Q/hLHmtVMShDYKHyymW5Md4kqvYmRcc2sB+dvnfG1gjlK0Q/pdeqWk2UAUBWD4Vanp1zMz4mKab7tX6rowLIXT1PeMZ4FOglIDYq7U0drrxYUIOihlgLFVu2G4Y3RHlE8XCwApsIkjdoO+kFDw6l5+DGqJbgoKlCh4RZ/GJAVpWxodHg7uyFTToMKwHqXNvo8J4pwoRTXCDFSZvZiiQGZh/egbvuG70XOYrdKfDfjYs79myxRRm6X/A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VKFJxZ2+kCIPS11EhpwNvCR59jz94fC2Zn1gD1Ogz8I=; b=eGkemGGqA4ziRNcBHlW3YoF8/bc8AQo8s45SQXbmSM5VYEh1MsGTASz3Etaqj5A75UCxBS6y6I8hxAekXXXrHLx8tW41dUCHzhRwcTd5lRiUWpmzs0lParmZGe6p+FuTCSmsehhjoY7rWvHyYjXITxMPb84XDDuTk99KD4wwrz4= Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; Received: from DU0PR08MB8640.eurprd08.prod.outlook.com (2603:10a6:10:400::17) by DB9PR08MB7493.eurprd08.prod.outlook.com (2603:10a6:10:36e::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7249.34; Mon, 5 Feb 2024 16:30:19 +0000 Received: from DU0PR08MB8640.eurprd08.prod.outlook.com ([fe80::5334:4a53:f0af:e0b1]) by DU0PR08MB8640.eurprd08.prod.outlook.com ([fe80::5334:4a53:f0af:e0b1%4]) with mapi id 15.20.7249.032; Mon, 5 Feb 2024 16:30:19 +0000 Date: Mon, 5 Feb 2024 16:30:17 +0000 From: Alexandru Elisei To: Evgenii Stepanov Cc: catalin.marinas@arm.com, will@kernel.org, oliver.upton@linux.dev, maz@kernel.org, james.morse@arm.com, suzuki.poulose@arm.com, yuzenghui@huawei.com, arnd@arndb.de, akpm@linux-foundation.org, mingo@redhat.com, peterz@infradead.org, juri.lelli@redhat.com, vincent.guittot@linaro.org, dietmar.eggemann@arm.com, rostedt@goodmis.org, bsegall@google.com, mgorman@suse.de, bristot@redhat.com, vschneid@redhat.com, mhiramat@kernel.org, rppt@kernel.org, hughd@google.com, pcc@google.com, steven.price@arm.com, anshuman.khandual@arm.com, vincenzo.frascino@arm.com, david@redhat.com, kcc@google.com, hyesoo.yu@samsung.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org Subject: Re: [PATCH RFC v3 22/35] arm64: mte: Enable tag storage if CMA areas have been activated Message-ID: References: <20240125164256.4147-1-alexandru.elisei@arm.com> <20240125164256.4147-23-alexandru.elisei@arm.com> Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-ClientProxiedBy: LO2P265CA0403.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:f::31) To DU0PR08MB8640.eurprd08.prod.outlook.com (2603:10a6:10:400::17) MIME-Version: 1.0 X-MS-TrafficTypeDiagnostic: DU0PR08MB8640:EE_|DB9PR08MB7493:EE_|DU2PEPF00028D01:EE_|DB4PR08MB9357:EE_ X-MS-Office365-Filtering-Correlation-Id: a933f5a2-7d73-407f-8cbb-08dc2667c85f x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU0PR08MB8640.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(376002)(39860400002)(136003)(396003)(346002)(366004)(230273577357003)(230922051799003)(186009)(451199024)(1800799012)(64100799003)(83380400001)(26005)(44832011)(66476007)(7416002)(6916009)(5660300002)(66946007)(86362001)(66556008)(316002)(2906002)(7406005)(38100700002)(478600001)(6512007)(53546011)(2616005)(6506007)(41300700001)(8676002)(4326008)(6486002)(36756003)(8936002);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB7493 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DU2PEPF00028D01.eurprd03.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 8196798e-9e5a-4316-65a9-08dc2667be34 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230031)(4636009)(136003)(396003)(346002)(376002)(39850400004)(230273577357003)(230922051799003)(186009)(64100799003)(1800799012)(82310400011)(451199024)(36840700001)(46966006)(40480700001)(86362001)(41300700001)(107886003)(26005)(2906002)(53546011)(6512007)(44832011)(36756003)(6506007)(83380400001)(47076005)(81166007)(82740400003)(70206006)(36860700001)(316002)(6486002)(8936002)(356005)(2616005)(478600001)(336012)(70586007)(6862004)(5660300002)(4326008)(8676002);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Feb 2024 16:30:35.4491 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: a933f5a2-7d73-407f-8cbb-08dc2667c85f X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DU2PEPF00028D01.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB4PR08MB9357 X-Rspamd-Queue-Id: 8A2DF2001F X-Rspam-User: X-Rspamd-Server: rspam04 X-Stat-Signature: we6r7gr8rwmo4cxunc1tcg8617zzymuy X-HE-Tag: 1707150675-27373 X-HE-Meta: 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 N4qTN2P2 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Evgenii, On Fri, Feb 02, 2024 at 02:30:00PM -0800, Evgenii Stepanov wrote: > On Thu, Jan 25, 2024 at 8:44 AM Alexandru Elisei > wrote: > > > > Before enabling MTE tag storage management, make sure that the CMA areas > > have been successfully activated. If a CMA area fails activation, the pages > > are kept as reserved. Reserved pages are never used by the page allocator. > > > > If this happens, the kernel would have to manage tag storage only for some > > of the memory, but not for all memory, and that would make the code > > unreasonably complicated. > > > > Choose to disable tag storage management altogether if a CMA area fails to > > be activated. > > > > Signed-off-by: Alexandru Elisei > > --- > > > > Changes since v2: > > > > * New patch. > > > > arch/arm64/include/asm/mte_tag_storage.h | 12 ++++++ > > arch/arm64/kernel/mte_tag_storage.c | 50 ++++++++++++++++++++++++ > > 2 files changed, 62 insertions(+) > > > > diff --git a/arch/arm64/include/asm/mte_tag_storage.h b/arch/arm64/include/asm/mte_tag_storage.h > > index 3c2cd29e053e..7b3f6bff8e6f 100644 > > --- a/arch/arm64/include/asm/mte_tag_storage.h > > +++ b/arch/arm64/include/asm/mte_tag_storage.h > > @@ -6,8 +6,20 @@ > > #define __ASM_MTE_TAG_STORAGE_H > > > > #ifdef CONFIG_ARM64_MTE_TAG_STORAGE > > + > > +DECLARE_STATIC_KEY_FALSE(tag_storage_enabled_key); > > + > > +static inline bool tag_storage_enabled(void) > > +{ > > + return static_branch_likely(&tag_storage_enabled_key); > > +} > > + > > void mte_init_tag_storage(void); > > #else > > +static inline bool tag_storage_enabled(void) > > +{ > > + return false; > > +} > > static inline void mte_init_tag_storage(void) > > { > > } > > diff --git a/arch/arm64/kernel/mte_tag_storage.c b/arch/arm64/kernel/mte_tag_storage.c > > index 9a1a8a45171e..d58c68b4a849 100644 > > --- a/arch/arm64/kernel/mte_tag_storage.c > > +++ b/arch/arm64/kernel/mte_tag_storage.c > > @@ -19,6 +19,8 @@ > > > > #include > > > > +__ro_after_init DEFINE_STATIC_KEY_FALSE(tag_storage_enabled_key); > > + > > struct tag_region { > > struct range mem_range; /* Memory associated with the tag storage, in PFNs. */ > > struct range tag_range; /* Tag storage memory, in PFNs. */ > > @@ -314,3 +316,51 @@ void __init mte_init_tag_storage(void) > > num_tag_regions = 0; > > pr_info("MTE tag storage region management disabled"); > > } > > + > > +static int __init mte_enable_tag_storage(void) > > +{ > > + struct range *tag_range; > > + struct cma *cma; > > + int i, ret; > > + > > + if (num_tag_regions == 0) > > + return 0; > > + > > + for (i = 0; i < num_tag_regions; i++) { > > + tag_range = &tag_regions[i].tag_range; > > + cma = tag_regions[i].cma; > > + /* > > + * CMA will keep the pages as reserved when the region fails > > + * activation. > > + */ > > + if (PageReserved(pfn_to_page(tag_range->start))) > > + goto out_disabled; > > + } > > + > > + static_branch_enable(&tag_storage_enabled_key); > > + pr_info("MTE tag storage region management enabled"); > > + > > + return 0; > > + > > +out_disabled: > > + for (i = 0; i < num_tag_regions; i++) { > > + tag_range = &tag_regions[i].tag_range; > > + cma = tag_regions[i].cma; > > + > > + if (PageReserved(pfn_to_page(tag_range->start))) > > + continue; > > + > > + /* Try really hard to reserve the tag storage. */ > > + ret = cma_alloc(cma, range_len(tag_range), 8, true); > > + /* > > + * Tag storage is still in use for data, memory and/or tag > > + * corruption will ensue. > > + */ > > + WARN_ON_ONCE(ret); > > cma_alloc returns (page *), so this condition needs to be inverted, > and the type of `ret` changed. > Not sure how it slipped through, this is a compile error with clang. Checked just now, it's a warning with gcc, I must have missed it. Will fix. Thanks, Alex > > > + } > > + num_tag_regions = 0; > > + pr_info("MTE tag storage region management disabled"); > > + > > + return -EINVAL; > > +} > > +arch_initcall(mte_enable_tag_storage); > > -- > > 2.43.0 > >