From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5FBCEC021B3 for ; Fri, 21 Feb 2025 14:45:44 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id D5A77280004; Fri, 21 Feb 2025 09:45:43 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id CE482280001; Fri, 21 Feb 2025 09:45:43 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id AE818280004; Fri, 21 Feb 2025 09:45:43 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 7D7D0280001 for ; Fri, 21 Feb 2025 09:45:43 -0500 (EST) Received: from smtpin16.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 21C2016138A for ; Fri, 21 Feb 2025 14:45:43 +0000 (UTC) X-FDA: 83144225766.16.92D1A25 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.17]) by imf15.hostedemail.com (Postfix) with ESMTP id F2AD5A0007 for ; Fri, 21 Feb 2025 14:45:38 +0000 (UTC) Authentication-Results: imf15.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=YOw2mWZc; spf=pass (imf15.hostedemail.com: domain of maciej.wieczor-retman@intel.com designates 192.198.163.17 as permitted sender) smtp.mailfrom=maciej.wieczor-retman@intel.com; dmarc=pass (policy=none) header.from=intel.com; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}") ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1740149139; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=6AShZNeROo825tTT7CQ07Aeq0mG3a/fPAQcXhVEWYr4=; b=M32pgO5s2oFWUfv0fAQSgyCH1qF/uEp5eW7QpUKTqtDbdwiWrsaqdzdBuQD/zyePxJL6dY xAv0Uiu//E1gtcN+EfKNqFaX81NRuKAgDtSQHxHrFdQ08Z9mBt0v8IsPOvjnMc4sIgIbGY CijbJKAEuavTmeOng694/4BpZwI4vrU= ARC-Authentication-Results: i=2; imf15.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=YOw2mWZc; spf=pass (imf15.hostedemail.com: domain of maciej.wieczor-retman@intel.com designates 192.198.163.17 as permitted sender) smtp.mailfrom=maciej.wieczor-retman@intel.com; dmarc=pass (policy=none) header.from=intel.com; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}") ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1740149139; a=rsa-sha256; cv=fail; b=PAp5Zd1BAVKdzNVLoA4tEkI4WQ5xPWgIRwOXojxX0ylFw5cq05a11YqkCw5TfZyKR8Qdzd vxcQp+fmhrw2y/iq64A2oy58fo2Kjea3aLcd8AVdJrxbwKTisg8+jiYX5RwZJ/m4qv9OG0 3jn4NzwRSILUTuSITPHcvciQjekHfb8= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1740149139; x=1771685139; h=date:from:to:cc:subject:message-id:references: content-transfer-encoding:in-reply-to:mime-version; bh=KB5K180KLaC4zw390u/d2a0B91GHQjrJB25Xvll6jbo=; b=YOw2mWZcpthtOmYLGb/Gb/GMOb+H9xzWmrl920CbFB/a93ODfeOIxU+J JJTsA+nuKobJRDMZwCH1ot1iQXd7U+qp3xGeM6/DU2v6YacfjDi2U/akm HH1T4MxCa6E2vgxa86r6h3ClwurlbWhct0BlWKTeqeTBmCNdVc1J3bfY3 2Croa4w4Bw2ksk58TxaXhMipa5mi/V8x5RjkEIxnxdEmcmUR5tTQYuy7g ivpWYkAIvh8rKTt2/iWYd1+vhfxpB/qFfyf/9Ic3uIqnFhOjyZvJ0NHxA hfS1AFVudx0G+9ethy5TinO7uCUFasgHEzcVMz5CR3sbemVEOesKKP2wH w==; X-CSE-ConnectionGUID: shgyCFX8QfeOg8MxiuOe+w== X-CSE-MsgGUID: PyiPI5mTTPiNuKcPRoj7Lg== X-IronPort-AV: E=McAfee;i="6700,10204,11352"; a="40846373" X-IronPort-AV: E=Sophos;i="6.13,305,1732608000"; d="scan'208";a="40846373" Received: from orviesa004.jf.intel.com ([10.64.159.144]) by fmvoesa111.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Feb 2025 06:45:37 -0800 X-CSE-ConnectionGUID: XIYZ9mytSDaRWjpiEU+4AQ== X-CSE-MsgGUID: 6W5lgCXLT+ys44JEyI2EqA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.13,305,1732608000"; d="scan'208";a="120368837" Received: from orsmsx902.amr.corp.intel.com ([10.22.229.24]) by orviesa004.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Feb 2025 06:45:36 -0800 Received: from ORSMSX901.amr.corp.intel.com (10.22.229.23) by ORSMSX902.amr.corp.intel.com (10.22.229.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14; Fri, 21 Feb 2025 06:45:36 -0800 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by ORSMSX901.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14 via Frontend Transport; Fri, 21 Feb 2025 06:45:36 -0800 Received: from NAM12-DM6-obe.outbound.protection.outlook.com (104.47.59.171) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.44; Fri, 21 Feb 2025 06:45:35 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=mKYAgA+KLTw8KRbqrL+nac5F2m0G4qao3Xo+IyhIBjq2WX4LuDEB9qTZYtZdYJxQ1JZlH48mZIl+CWZG+WWAxlTa/Y0DYfZHzv0CEjc6ZWiCSvxnHEJLg50RWuDUGNgkonMnIwHv/w4yQeOw9cDu1/7FVISb2IvARz0owHXhs7bWRSTLAmvi2moZqpqoYnez/8lYTiR+YXWcoKKTI8le8h0nIT/hgkB+t1KBNGpoUNUtwwadwLh+cmnCgqCdrmyS6wNHCs1zdJCp9t02J0cUBj7iiQle596LLexDZkhBDLpzTTv1ry0gvYDVI+EDIwaPI9hytNLzHkuA3ffU7wILLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6AShZNeROo825tTT7CQ07Aeq0mG3a/fPAQcXhVEWYr4=; b=rUgR+Nh1ZICiT87fXBmHnKwrzVGf0/ddZLNHwCymFiIPa5p45aLhyNtne5C7/sjVbMDa+kStHr0uDsrefj7CxAwisU7a/tjBetIieTDGzW+efSk+Z7/FUSyYrNcGjncH6YE+E6ZYqcfGyjXqg8rWZOUy39pTQWPq3Kq0PYmiaSCp3T9qh24uUC4Y2vmjBfNuAjX28cjgyGMe/l6KBqkDlz16b5XUJkCPWAPYPmbKcjwUOHAt/DTCVEzUU2pBx2dhVdmO6ijkvjgFVhS1TTV0a8n40Hbuuq3bF4MPYu6Wc+iyI9sukvLBqJfl91c2zQ4pH5cA5gKUNOx16qzjLA9/hw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MN0PR11MB6231.namprd11.prod.outlook.com (2603:10b6:208:3c4::15) by PH7PR11MB6521.namprd11.prod.outlook.com (2603:10b6:510:213::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8466.15; Fri, 21 Feb 2025 14:45:32 +0000 Received: from MN0PR11MB6231.namprd11.prod.outlook.com ([fe80::a137:ffd0:97a3:1db4]) by MN0PR11MB6231.namprd11.prod.outlook.com ([fe80::a137:ffd0:97a3:1db4%4]) with mapi id 15.20.8466.015; Fri, 21 Feb 2025 14:45:32 +0000 Date: Fri, 21 Feb 2025 15:44:56 +0100 From: Maciej Wieczor-Retman To: Andrey Konovalov CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: Re: [PATCH v2 14/14] x86: Make software tag-based kasan available Message-ID: References: Content-Type: text/plain; charset="utf-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-ClientProxiedBy: DUZPR01CA0316.eurprd01.prod.exchangelabs.com (2603:10a6:10:4ba::14) To MN0PR11MB6231.namprd11.prod.outlook.com (2603:10b6:208:3c4::15) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN0PR11MB6231:EE_|PH7PR11MB6521:EE_ X-MS-Office365-Filtering-Correlation-Id: a4cc087b-9f3c-453a-0f54-08dd5286647c X-LD-Processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|7416014|376014|366016|27256017; X-Microsoft-Antispam-Message-Info: =?utf-8?B?cnJma3NBRTlET09ZUlhBTmQ0Um9yU2RhKzdxRnN0Y1F1UEU5NWMyUy9zMEIz?= =?utf-8?B?TEdUdXRXZm85WjAzb2pzY1ZZV2ttcW1vTTNNTTV5MmQva0Nha3VOaUN0ei9H?= =?utf-8?B?VXQ5Z0hOOUl4a3dCQXhPbXRSK0FDU3pYWVNZenVIdDNPTmNsMndmTzZQdmZW?= =?utf-8?B?RG5QNjBPdWJKV2JiWklOMVp2VFlmenA2OGUxcFhSeU1sL1RUSUZ4QnNvU1ZF?= =?utf-8?B?Qy8veUhZbmZpUzlOaXd1TU5vWEZ5UU9pd2JrRUJRY0w1eHBiTUU2OHd2MWlQ?= =?utf-8?B?OSthK3BRRlpmaDdocmZnbFEwWnZGWE9PNDZVZjZtdE5pek5lTG5ORWVRNHo2?= =?utf-8?B?TnpOcnM0TnMxOXpEWHpHSTYxYzJHYlVSTFFLVkh1OG1oSmphbVU3UEpXOHND?= =?utf-8?B?eGJIWFZpVzVwRnFqZnIwMEtucVFtODQrZ0gyZGVDc2NQSzBXaC96SERCWjJM?= =?utf-8?B?OEhkcWNReEwwa0dMa0JHVWJYZTV2RTAzNFJzUzVHd0JJaEs3RzNWUFppZ21s?= =?utf-8?B?M2tmUkcxQzVkWnNWNzIxVWdhTkdxL2tqelE0bEdzRVJZay92dmY2aGI3MHZS?= =?utf-8?B?V1g0TVNURXBjZE02WEZTaTVJT3ZiQStwcDVyZVl3NG1QVzlKYVVVMzFtQnpS?= =?utf-8?B?bC9SNDN2U1h6VkhVZGNjZ1JQcVZHRHlra2N0NlNuNHkxWXpsV0R3THJnZGl4?= =?utf-8?B?eTRJSkVlMHE0MTlnVW1JTVFVRDZsYTgrdTNlaHp6RlJxTXhZMTVQdGRBd0Z6?= =?utf-8?B?UkxOZTZLUGpVNVFpeXJjSFRYTldJb1ZobnBBVXhoMEQ2MUEzWk8vdjBpUHNT?= =?utf-8?B?ZjBxWlMxMHRNSTlrdldwYmlFV3lqMEJlVnBKY2cxRFZxS0g2WmR4R2pxcDlQ?= =?utf-8?B?ZG5JZExXVjBBRDk4dlBUbWZaanlGQndNZ0EvWXNQTXRmbjQ3bTlndEQvWnU4?= =?utf-8?B?WmJCQk9PNGpCYUVBeUNZRW43VU8yS2lRRS9kVFBib0svOStRKzRpNU5yM1Ey?= =?utf-8?B?c2s4Z1JwbFZXR1ExTVZZd0RZZE5oVkUrSDMwb2ZhWVYraDJNK0tuUU4ybDhV?= =?utf-8?B?WDgydStIRTRuZGZ3SVZPU1pYOFdkYjNKRkdzdmliOVBGaUhNT1FIMThRZmJp?= =?utf-8?B?YXE4OHd2a1hVY2Z3RCtvQzVMK0p3MFgzaHlvNkVHbUp3SzN1Vno0V2hGdFQw?= =?utf-8?B?d0ZsRHVqTGxlUFBNZE5ObWliTXpJQlUyL3grbU5QTllOTGpWYnAxQXkvcFZn?= =?utf-8?B?bVM0NFNBZEVLbW9WT1JTcy9vemRMei9SZXcvaTVRZWhoZG9wS0Fqd3F5b09y?= =?utf-8?B?RjNRaVFEYTRORlJncS96cllRdU0vQU1LSVVtdkgySVVHUkFOQkgzSFVhZmFL?= =?utf-8?B?ZFdmQkdiaEVWSmNMZGlLZXdqMExTSmI5a2YwUFYrWW9oSEhjeFdYNVVwbVRL?= =?utf-8?B?enBTM3huYy85azlSd1hJRGk4dDZXeGkwZUd4bmpNR2ZHWk9UQndNREJhUHgx?= =?utf-8?B?SEFSNFY1Y2VPeVBJSm5tMTNiY1BReW9rM25qa2ZuT1F0bmVsRHRyVUdxVVY1?= =?utf-8?B?dzBiVWtmMjNkTjRLcTBzYnpIU3lUWjA1UldtaElpL1JEbXQ4VHVOWDJneFRy?= =?utf-8?B?Y3cvVVA4aXA5Y29CV3hXN1NxaWx1UjJmb2txTGR0QTNiMlRSeTdvd083cmpT?= =?utf-8?B?eGVGd3czQjBZVVg3blF5Y3VDejlDN3A3RGprUkYwZi93eEYwWEs4cVJSc1g3?= =?utf-8?B?bGwvVG5lclkrc0lpdGo5UU5OdkxhZFJ5V0Y3bFVaVnJyRmd6QnJFblVJaCsy?= =?utf-8?B?Qkh6YU1hTHhTUGdVcUx6QW9QSHpsaC8xTGgrODZFZDlXVTVJbDB4OVRzMUZi?= =?utf-8?B?di9veWRqaGpNMUFBbzU5cnRVOThDT1Vva2Q2TDk0YUJkUUU1VjB3USs5eHpa?= =?utf-8?Q?mEO7LB7W7/eq2XgHaNuXcd+janWBCYSW?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN0PR11MB6231.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(7416014)(376014)(366016)(27256017);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Zkl5L3pLNkJsY1MxdW1iVEFvdGszRXVlbEtVTllXRHBzOVVOSUo1ZHVZOEN2?= =?utf-8?B?c2V5RFhDMkU3d1ZYN25WTkwzQTZDbEx3aDdFR1RRbmpHK216TzZkUnQ0bnQ1?= =?utf-8?B?NDZzdEYvblRlSXNpekxSQmc4Mjh6NjVPZ0g2dE9CNnNTK0NWdm1XY1lxMlJU?= =?utf-8?B?dW9nbkg3MHk5U1dMNHZTLy9Lcm9YZzBMR1Q3REk1bklCcFFNamdzZlFKMEcv?= =?utf-8?B?QVI1a3JHZVd2ZnloMko4cUpvSjluM0FUbW1wcFpGL3A0MElWU09LM2pueU4z?= =?utf-8?B?blpkMHVhMkVwSFpCN29laGZnQlZtR1dLUzNUNnZBNUE4Z1ZyeFNiYngrcVoy?= =?utf-8?B?cmd2cDBON0FDVzV2a2tPanlYSXhjbTYrNTB3SDhWZFJaaGFSUUgzTTduN2pi?= =?utf-8?B?bjNtSXBSMGhac3lqQ290SUhpMDlNNmZCUkdldE00K1B3ZzE5Nng5dWdETmdm?= =?utf-8?B?RndTRHRENklBN212RGZ5WHU4U0dpeUlwRUx6NnBGRmRyaHVPeENNV3czY3pt?= =?utf-8?B?d2EzTVRvbWVRbFdFa2dUMGgvVFd0UDBzM0JTRXZYUHVXZWp0WjhSam9Odmlt?= =?utf-8?B?cm55QWFzVEhkWlFaSGY4SlQ5NytSZzcvNjJOMHNyUDJXWVFTdDlwN0lDZkRB?= =?utf-8?B?S3dTc0ZlN0FQbHRQODRycUQvaU1MZ2sxVmtYQS9mZ1NUUTBjOE9Bb1duZmxK?= =?utf-8?B?bjd2cFNQSHNEcktpUzR4N2lJWmFOSFRtMzhITGFWN0xwOVpHdTNIUTRweWlE?= =?utf-8?B?ZzFqc0F2c0dlRzNXNHFaWllxRmowNjhmU2hWVnF3eUFOWWxtNUNEdU9qZWI2?= =?utf-8?B?eWwyWGVZOTlyQXJPQXBqTlJ1Q2xIWGMzZkVyWEo0THN1VHdsM0ZjOHVjdExS?= =?utf-8?B?RXFBaFBsNGRZMkdwd0lEdEkreCtGTWhacFNBTWRDWUJzdXNQSXJ6clVOczl3?= =?utf-8?B?Qm1TNmNtMW94SU5VK2dXQm9KQzJkSlU2Y2dBVzBEYWVqMkxvcDJseWpmUnV2?= =?utf-8?B?L0lxQ3prZnZOOUJFRUEwTE5DSUpPN0pMVFM3Mk5wTkZLa1pML1lMZHNqbGlx?= =?utf-8?B?NFRFRjIzZVoxcGlqd3BZVjFrNmVrM1ZtVG1uZGRBb2VZa0Irb0hRYm8zeFQ0?= =?utf-8?B?YTZYL2RDUWZRQitETlBPaFMxbzNSM3pDVVVIbVMyMWF4bE42OGl5NkVGZnF4?= =?utf-8?B?N2RBOFNXdnYxOWM1eDJNRGJFaUQrWmR6TFFXcVV2a0QxcllSdFF1cmJJcG5q?= =?utf-8?B?MWlIT3MyUDlIVitOUEx4VEpLNVdNSTd1MnNwdnp5TGJjZmQ4RnJqLzJtVE5l?= =?utf-8?B?dTdFZER3Y1ZqK1ZKcDgrbitHSFF5VEhEQTBGSnRNbTJBcngyeXZZSURFcFF4?= =?utf-8?B?QlFyQ1ZaM2wrOXFTejlobUxOdzM5OEJOZU1DNldNd1RtMjgyeUpEdHZWRUxw?= =?utf-8?B?KzlMTitsekRJQ2hDSHZIaVRVeWpVTlVFQzVXaW12TmZ0KzAzRjcyb3piOFVV?= =?utf-8?B?d3NSMXpiL0V2L0ljMHpLeEhIZHRETW1KUXE4b0VkRWlqSXNOWUVZRjUzL3RU?= =?utf-8?B?STRIeWs0bVBzODMxWGNqZTlzQzV3ZTIwcUVEUHVUUVFvOUp5dEpNc09xMi9x?= =?utf-8?B?TXNkTm5sMHJnT01EaHl4Um5DaVR4VWM4bm02TU1RVndHdUhRbkZjOVF6Mnly?= =?utf-8?B?YmZmWWdHVFMvUnNtb21CV1F1V05nNGkxUXFEdlBpaExPSUxKeGNDNmR6S25I?= =?utf-8?B?M2d6M3Zxdml3bVVtblZLeksyUTRYM1BYNTg4c3ZwS1Q4ZnBCZldNNVBxVmZn?= =?utf-8?B?dFVHNFZSS0Y3eFRjWDdQczlrcWJhSWdJS1hJc05NYWNFWWt4V2ZBV1I5SERl?= =?utf-8?B?dndxSkZPOVF4bnlSQ0lEVHJPVE42WDZMcll1NTFDcmovOUl4ZFBqUjhDb2x2?= =?utf-8?B?dEt3Wm40dkNWbG5BUGkyZXZLaUJmZ09HMHVWVzZ1VHByQTZvV2Q3T2VpaUxo?= =?utf-8?B?bi9lT3JaUDlEU3d0Q3dSZmhhV2JwcWtjaFM1Zi9EMjJ4bDQ0bU9FV3JBQ2Qw?= =?utf-8?B?UUZsZmJEa04rSzUyaWJXQ1FwK2psanBIVWttRkNCSEZZR0NxUStDaVNmaFI0?= =?utf-8?B?YXJYUStsNDQ5Q214S2lza2xPMlk4QlFtODNBYnJraWJBc1EzZ3oyVC9ETnBH?= =?utf-8?Q?ycHwb+3JSOQPMnQp2fX3470=3D?= X-MS-Exchange-CrossTenant-Network-Message-Id: a4cc087b-9f3c-453a-0f54-08dd5286647c X-MS-Exchange-CrossTenant-AuthSource: MN0PR11MB6231.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Feb 2025 14:45:32.3840 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 2AVJDYMZJyoVrHFyeL/leD3q3xuIG3T2VDwLwQOk5GbvsOg/86q24CzZxQE3SB1yqpEihwm2U5GKpHg1CXLrw2+9it//jzuG+4YwJQ90zPc= X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB6521 X-OriginatorOrg: intel.com X-Rspam-User: X-Rspamd-Server: rspam11 X-Rspamd-Queue-Id: F2AD5A0007 X-Stat-Signature: 6y1zzcywjb74xh5mmx9r6brk48fogpuq X-HE-Tag: 1740149138-955487 X-HE-Meta: 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 kjeJDS+p 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 2025-02-20 at 00:31:26 +0100, Andrey Konovalov wrote: >On Tue, Feb 18, 2025 at 9:20 AM Maciej Wieczor-Retman > wrote: >> >> Make CONFIG_KASAN_SW_TAGS available for x86 machines if they have >> ADDRESS_MASKING enabled (LAM) as that works similarly to Top-Byte Ignore >> (TBI) that allows the software tag-based mode on arm64 platform. >> >> Set scale macro based on KASAN mode: in software tag-based mode 32 bytes >> of memory map to one shadow byte and 16 in generic mode. > >These should be 16 and 8. Thanks, I thought I got all the dense mode stuff from this series. > >> >> Signed-off-by: Maciej Wieczor-Retman >> --- >> Changelog v2: >> - Remove KASAN dense code. >> >> arch/x86/Kconfig | 6 ++++++ >> arch/x86/boot/compressed/misc.h | 1 + >> arch/x86/include/asm/kasan.h | 2 +- >> arch/x86/kernel/setup.c | 2 ++ >> 4 files changed, 10 insertions(+), 1 deletion(-) >> >> diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig >> index f4ef64bf824a..dc48eb5b664f 100644 >> --- a/arch/x86/Kconfig >> +++ b/arch/x86/Kconfig >> @@ -195,6 +195,7 @@ config X86 >> select HAVE_ARCH_JUMP_LABEL_RELATIVE >> select HAVE_ARCH_KASAN if X86_64 >> select HAVE_ARCH_KASAN_VMALLOC if X86_64 >> + select HAVE_ARCH_KASAN_SW_TAGS if ADDRESS_MASKING >> select HAVE_ARCH_KFENCE >> select HAVE_ARCH_KMSAN if X86_64 >> select HAVE_ARCH_KGDB >> @@ -402,6 +403,11 @@ config KASAN_SHADOW_OFFSET >> hex >> default 0xdffffc0000000000 if KASAN_GENERIC >> >> +config KASAN_SHADOW_SCALE_SHIFT >> + int >> + default 4 if KASAN_SW_TAGS >> + default 3 > >What's the purpose of this config option? I think we can just change >the value of the KASAN_SHADOW_SCALE_SHIFT define when KASAN_SW_TAGS is >enabled. Well, I was aiming at later adding the "default 5 if KASAN_SW_TAGS_DENSE", and this way it would look much cleaner than the: if KASAN_SW_TAGS if KASAN_SW_TAGS_DENSE KASAN_SHADOW_SCALE_SHIFT = 5 else KASAN_SHADOW_SCALE_SHIFT = 4 else KASAN_SHADOW_SCALE_SHIFT = 3 But now that I think of it, it should be possible to overwrite the KASAN_SHADOW_SCALE_SHIFT from non-arch code if dense mode is enabled. That's a topic for the next series but I'd imagine all architectures would normally use the 16 memory bytes / shadow byte and if they'd care for the dense mode they'd go for 32 memory bytes / shadow byte. Or do you think that's a faulty assumption? > >> + >> config HAVE_INTEL_TXT >> def_bool y >> depends on INTEL_IOMMU && ACPI >> diff --git a/arch/x86/boot/compressed/misc.h b/arch/x86/boot/compressed/misc.h >> index dd8d1a85f671..f6a87e9ad200 100644 >> --- a/arch/x86/boot/compressed/misc.h >> +++ b/arch/x86/boot/compressed/misc.h >> @@ -13,6 +13,7 @@ >> #undef CONFIG_PARAVIRT_SPINLOCKS >> #undef CONFIG_KASAN >> #undef CONFIG_KASAN_GENERIC >> +#undef CONFIG_KASAN_SW_TAGS >> >> #define __NO_FORTIFY >> >> diff --git a/arch/x86/include/asm/kasan.h b/arch/x86/include/asm/kasan.h >> index 4bfd3641af84..cfc31e4a2f70 100644 >> --- a/arch/x86/include/asm/kasan.h >> +++ b/arch/x86/include/asm/kasan.h >> @@ -6,7 +6,7 @@ >> #include >> #include >> >> -#define KASAN_SHADOW_SCALE_SHIFT 3 >> +#define KASAN_SHADOW_SCALE_SHIFT CONFIG_KASAN_SHADOW_SCALE_SHIFT >> >> /* >> * Compiler uses shadow offset assuming that addresses start >> diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c >> index cebee310e200..768990c573ea 100644 >> --- a/arch/x86/kernel/setup.c >> +++ b/arch/x86/kernel/setup.c >> @@ -1124,6 +1124,8 @@ void __init setup_arch(char **cmdline_p) >> >> kasan_init(); >> >> + kasan_init_sw_tags(); >> + >> /* >> * Sync back kernel address range. >> * >> -- >> 2.47.1 >> -- Kind regards Maciej Wieczór-Retman