From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id B2F88CAC581 for ; Mon, 8 Sep 2025 09:07:18 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id D53948E0008; Mon, 8 Sep 2025 05:07:17 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id D041D8E0001; Mon, 8 Sep 2025 05:07:17 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id BCAAF8E0008; Mon, 8 Sep 2025 05:07:17 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id A20E88E0001 for ; Mon, 8 Sep 2025 05:07:17 -0400 (EDT) Received: from smtpin22.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 2DFCA11B1FC for ; Mon, 8 Sep 2025 09:07:17 +0000 (UTC) X-FDA: 83865504114.22.F2DE393 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.16]) by imf12.hostedemail.com (Postfix) with ESMTP id E3D7F40006 for ; Mon, 8 Sep 2025 09:07:12 +0000 (UTC) Authentication-Results: imf12.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=cWZ0WKtP; spf=pass (imf12.hostedemail.com: domain of maciej.wieczor-retman@intel.com designates 198.175.65.16 as permitted sender) smtp.mailfrom=maciej.wieczor-retman@intel.com; dmarc=pass (policy=none) header.from=intel.com; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}") ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1757322433; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=aPksAnupSBF3NgzpsbH7EW9yGUATIpZWjv6UCpl5mZc=; b=omFmSmLgAYUZmPGCkw04ks/DTEIiEeWoRfzcVdaGCdI11AxwC6eH6iQyQL5sh44Mh5jSPU uAtjnB8A4IX30owuq1gFHl0+9bOUR4TZm8JqeSQPCxzVJzWSkQi1omMHhulcUqfai1EFWp UfCu49QdWgL8h6jOGouH/9OrcAU1O5M= ARC-Authentication-Results: i=2; imf12.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=cWZ0WKtP; spf=pass (imf12.hostedemail.com: domain of maciej.wieczor-retman@intel.com designates 198.175.65.16 as permitted sender) smtp.mailfrom=maciej.wieczor-retman@intel.com; dmarc=pass (policy=none) header.from=intel.com; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}") ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1757322433; a=rsa-sha256; cv=fail; b=Lo4jglWMz4gtVhinUW0reA+bzVOhC/RArXKuGheZ9GZMRuLs2mcY2O9rNeQGvpFPs5qk9Z I8Bp7r7giqcgJAG/ZQLOWS9F5kPiaUMP6hm+VevVbn/0E2IAxfgde4yHtKBjOfkeKY5ioP 9KkppFQ0Ck+kMiaM+Q9zQ95NiIVtsE0= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1757322433; x=1788858433; h=date:from:to:cc:subject:message-id:references: content-transfer-encoding:in-reply-to:mime-version; bh=7Wfm7plKh2ZQdh1k9bjmpxldLY2wgjunYDDNReA0euE=; b=cWZ0WKtPkdDdQaMAyx4CC29jkt3rK/Ihs3JtmsLEVC9WL1zkcz3VnMuX hoRfhXrfOVi8OXtV7bLnNrnmB3U4v7GtKkskqK69WHZC46DkywdCAH3H0 1AKg+A1JSyKLMvkSIhDNeHyF/PR76Mka9IXJ0eJchUiKMYJ0j0pFBUEqF pHjYw3oaoimJzMKCNj+pEpFlpUtCgAdB7P+rR8kJv0G0WjHL/hm59nQnV nme73XKJvMJB0okHiHsm3LTL0c7XCuLmU/AzDDHo3AT0tu4/ohvRzOVfM wy/gAQp+O6kLSXXPoOX4D9eVaWpCbij+Xz/eJr8geAHLvP+pBU4GEi74y Q==; X-CSE-ConnectionGUID: +3t484VDTBSaP0rD4N0Lrw== X-CSE-MsgGUID: yVlYs/dbR52Juxg9nNfPUw== X-IronPort-AV: E=McAfee;i="6800,10657,11546"; a="59720124" X-IronPort-AV: E=Sophos;i="6.18,248,1751266800"; d="scan'208";a="59720124" Received: from orviesa007.jf.intel.com ([10.64.159.147]) by orvoesa108.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Sep 2025 02:07:10 -0700 X-CSE-ConnectionGUID: 4oN2cMn8TsWOdLK1XeTbAg== X-CSE-MsgGUID: owyRYs/gTZipmivcWSsL+w== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.18,248,1751266800"; d="scan'208";a="172611664" Received: from fmsmsx901.amr.corp.intel.com ([10.18.126.90]) by orviesa007.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Sep 2025 02:07:09 -0700 Received: from FMSMSX902.amr.corp.intel.com (10.18.126.91) by fmsmsx901.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 8 Sep 2025 02:07:07 -0700 Received: from fmsedg903.ED.cps.intel.com (10.1.192.145) by FMSMSX902.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend Transport; Mon, 8 Sep 2025 02:07:07 -0700 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (40.107.93.78) by edgegateway.intel.com (192.55.55.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 8 Sep 2025 02:07:07 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=uVb2kXiGoNViNZ5updFUkmNPRbvFDnizL++xTY5TeA/EtOzn1IDuKmrEjNPd/YsahTSvOSbs7xJ+MnlCMiYQ2qPXqV3TUccllamRvfjAZWnSULxkIoY3KBNcgKhRFFoHsSA6RqVMdcBMpPhVPvayndDXq3xn6bY3Ea9zy3FKQvo+iTJZ9gkJ0g0wFCYMsbOZ0y3E1nFJn1Zlyd9j7Bel+fKfumncHPQ5hdZiMfMVo8+Tn/oFbeutsOkBZIZIRdxlsltyds2lrmmdTATgEyMakcwssKFzoBFphLQV1nbn8NBcl0hcFeQA8e/7q6qbswRVSRtaTJ0DVgW7lHiC+p1Qag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=aPksAnupSBF3NgzpsbH7EW9yGUATIpZWjv6UCpl5mZc=; b=Wef+alYWy/uKzID/xoRxGID3AdjqSNa8NtJhc5jEYvTv4FHtWsDtWggetxWOtfo7rd4xvQOiOl6yIBEWfMrz1GH9B1iruTE6xhC2HyBKflBOKI8DjIBosYj/qDW3f8fosQx+EBQ8U6Kc/zVjKxAUyUjEF5CWo1XTLhvHmjm27g7C/4ehhjYWiHNiiMb2vwUxMFZbuYeDD+bXVpXZAgY7nCV9vS2eR/BXJKpDuqLtBrg+WcDNmNoUy/9X+yy2/M96RNnu1iknwPkogI0HGYadcfqMyO5/Hych25wb5PaiOWyO/jIeAQyNPhUzRLfdJKTgyPKsHF36CqM/5pd6xQ0u1A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MN2PR11MB3934.namprd11.prod.outlook.com (2603:10b6:208:152::20) by DS0PR11MB7902.namprd11.prod.outlook.com (2603:10b6:8:f6::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9094.19; Mon, 8 Sep 2025 09:07:05 +0000 Received: from MN2PR11MB3934.namprd11.prod.outlook.com ([fe80::45fd:d835:38c1:f5c2]) by MN2PR11MB3934.namprd11.prod.outlook.com ([fe80::45fd:d835:38c1:f5c2%3]) with mapi id 15.20.9094.018; Mon, 8 Sep 2025 09:07:04 +0000 Date: Mon, 8 Sep 2025 11:06:47 +0200 From: Maciej Wieczor-Retman To: Andrey Konovalov CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: Re: [PATCH v5 04/19] x86: Add arch specific kasan functions Message-ID: References: <7cb9edae06aeaf8c69013a89f1fd13a9e1531d54.1756151769.git.maciej.wieczor-retman@intel.com> Content-Type: text/plain; charset="utf-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-ClientProxiedBy: DUZPR01CA0231.eurprd01.prod.exchangelabs.com (2603:10a6:10:4b4::12) To MN2PR11MB3934.namprd11.prod.outlook.com (2603:10b6:208:152::20) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR11MB3934:EE_|DS0PR11MB7902:EE_ X-MS-Office365-Filtering-Correlation-Id: d7735647-8d93-46ec-a9ac-08ddeeb7143c X-LD-Processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|366016|1800799024|376014|7416014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?UHQwOUJsWCs5OHZkbzhzaCttTGV3Z0h2bXdGYW9FbUIzYWN5YWsySDJFWW5k?= =?utf-8?B?Y0EvMW1jbytjUmU5NjRNdy9ZeExVY1VHSUgrcVFGWEVuR290V0J0Rjc4bWlH?= =?utf-8?B?RThVVloya1ZnVmsrdWQ0eHFkQTVMTkhrdERheE9mbndTd25ZU1Jlak42eEhU?= =?utf-8?B?L2Z6c0p1K2daeDNES2k1RDJRWnppMml4c2Jyck9RTGdvK29vOHN0Ykl6SDlT?= =?utf-8?B?NlJnMEFrV0p4bzE1c1g0eUR0YUYxemsyd04rYVRMdWlFRWljMzFqa2VZM0RK?= =?utf-8?B?RjF2eHZYNE1UTzJOaFlkamdrb3ROUzFTOVJ5QWQwaXhvSFFmbG9DcG15WHpp?= =?utf-8?B?ZFpObDFjbHpzTGZsUXMvL0s3VFQ5S1JSeFR5ZG53eWI0d3pDV1RHRVBEOURp?= =?utf-8?B?RzFyNnpBUW5uMUpXZ1hOSldJWWgydXhMY2lHK3d2R1RYZ0pBSkdQVEJLK28z?= =?utf-8?B?eXlyazBqbEgrVXFzS1VRM29qYUhwT3NEL0dNZkNsVmtrWVZBS3QwQi9aYWZO?= =?utf-8?B?ZUluclhDUnhRYzQ3VUZibXRzVEJRelUrK1VwTU92U0JWUCt0T0RIUTUxZWF0?= =?utf-8?B?R1hpTkV1S1l3dXAxWUxoNWFFaHF3ejBEdkEySEFVUEk2UHM1RjJvR2sxRUlF?= =?utf-8?B?T3ltNlJGdlhOeDRUZVVYNFNPcEZ6Mkk1ZjNYaDMvdTc5RGlnSWhRSC9OTXEx?= =?utf-8?B?czdrTVp6L1NpWGVUQXA3T2tES24rNng1QkkrSEFGZ25OWklqSElCY29kUnkw?= =?utf-8?B?QmE3aVhDK29ickpCb05IWXNXQWZuNzJsS1Fzd0hZQStweTFtd0ZaSGZnaTEx?= =?utf-8?B?OFhkQ3Uxalp4TGVmSEJteDdRWkpzK2E0Sjc0YXg2WGJUYkIwT0o5RFRjQXVY?= =?utf-8?B?ZTUwK25MS3I0OFZHeXkzUHdUa1cydmlqeVpKaTRMYXAzenIvWFVEQ0lwN0Vq?= =?utf-8?B?UnFpUFZ0S0xQazJiQTZJcDRZTGRLbmFFTW5ZMW81dzNpNHRNUUZiUWttY3FU?= =?utf-8?B?a0dBOGZNR0FQejgzQXlYWG5zN0wrU0dRd21MV2hra0hKR0NwYzhFT1VYcDZs?= =?utf-8?B?R3VWaTl3RDcyQ2Vvd3JCOXhBbS9EWERMZXQwalFBemFSZXExV0dOYzJaTXRV?= =?utf-8?B?RTNUc09nRitzYXIxRVNaTmoyUmw3L2k0aitUTnYxS214M1cvR0pjcVU2OEpM?= =?utf-8?B?T3E4T2lJOEY5OVJPc0krV1dSTTllbTQyck9ZSFRsc05nZHpJcUZhckl2MTN0?= =?utf-8?B?UjFaUzlrNjNjNnZSRmxhbkY0R0VuL0RvR281dS9WNTYyaGJGTk54VHFldUJr?= =?utf-8?B?Z1pnbjhqMlFjUWtvNnVNODczVXVnNHoyOXhWdHI5NG52V3pmNXdLenQ3S2da?= =?utf-8?B?NWdaWm5JTmpCV1VCMkY0b3dFc040OENwdGpjOW1aV3hReHZOcTlHMC9CS2tH?= =?utf-8?B?aTN1QnBsU012ZGc4MllBVUVkSkZsbXphZ1I4N3RpVkxGdk84SmJhdnBYOHor?= =?utf-8?B?dXdnVE00U3NnY0xla2tIZ0RMMW9odFU5bUlROWxNdi9DbVM0Q204UjM1Y2Jz?= =?utf-8?B?YTBRWU1sNEp1eGRKQ1NwU3ZkcXQ3eEt0UDVucFBJeDhMbWRGamwwQ1NCUGM5?= =?utf-8?B?c0NkcjVYOXlPN0o2V1dXdVF4V2lnUWMzR2tWSld2am5tR2NiWHlrYndvZU9y?= =?utf-8?B?OUdXTlJTUnp3RW1LR0x4ejY3Q2JRZVEvL1c5SnhUVlJ0U1IzMDhnVC9iYmEz?= =?utf-8?B?VjZxMExxaEZrZUVmak5BWkZnK0d3VTFBZ3ozRllWNk5tMmUrRHc1RjhBRFBG?= =?utf-8?B?K01nTkYwNy85NzNZSE85MSsyVG1sV3ZzZHlXQi94L1M2R2tuN0RIY3lGeGx6?= =?utf-8?B?eG0wRENLUVZwVHRkUmY5SkNSeGN2UHJMVVI4MXh0RHhXMUFxbDcyYlI4dHZn?= =?utf-8?Q?mEqHWchj/us=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR11MB3934.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(376014)(7416014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?dVI5MkViTmQ5cjBGRy9ORm5Mc1hQQ0FNVkJzV1U0c05qbUJrYldwVVVSdFRN?= =?utf-8?B?MVcwK2JTM2hRSzhKOGxKVEJVR1R4ajMzNWcyVC8vRXN0N01CN3VJZWVSc0Vi?= =?utf-8?B?N0c2QUJYUWxpRk11QlFneW1vUjhEbjZxNlQzU2tLVnovRHpmT3YrUlZBNW5G?= =?utf-8?B?SnFrNGRNRHRKcHFjS28wQ281RGJIanRYUDk1UGpHdjVsUFh1ZzBycmFySEpU?= =?utf-8?B?N1BSemZxeTFDQU1PRVBDa2gwcXNxNjd5V2lrVUF1RGVYMlhMOUQ2a1h0NVJu?= =?utf-8?B?aHpzb0dSdjlpb05TWjVqMmF1QjEvbHRVMlJXeUtvNHVLeExPK0lPVTNyalJu?= =?utf-8?B?WVBJbjZSNUY3Q2ZtV3ZQbFRMRmNRNTlGMWZIbStzRnNYTURBaVhkVEpNQ2RY?= =?utf-8?B?dFQ0MWFoNTFiR0NjL0c1ZHNtSDVYRm05TEFHeEMzUEtIOFFZSTVvYkJZR3Rs?= =?utf-8?B?TnRydi83T2J6cUQybjJ6WXI3c0xFcDBtdmVPUGdhSnU0ak9sSEpQYW1ldG5j?= =?utf-8?B?L2hIT0JqYlJ0d2tuSkVIMmFTdm1DenR5OXBFeFVxaHVFRGxzVy9uYTZLNXBN?= =?utf-8?B?ckxpUFBIZHd5d2IrK29VZk0vU01vSUxLMElUcHYxTXd0eXpFdGFTNTQrZEdu?= =?utf-8?B?ZmJGajRMNFdkUU1UVGRVMm1wMGxTNXVkQVpGaGpPQU5HaG9Xakg1bExKTmpq?= =?utf-8?B?bWN3Q0hQTFZHWUtwTlBHUXBDMXlZZjF3bHNubGZVQWFqQVEwTkowaGNadFlO?= =?utf-8?B?M3RVYW1IelplTXI4WVJ6TmVqc2J3T1o2bjA1Ry9jTkY3RTFjQU9yUkVHdnFY?= =?utf-8?B?aUxsOFBTZWU1RU5sQVF2SlJHQm9jdkJBZzZwY2lNSlZrNFozc3JyWmwwQzJW?= =?utf-8?B?SU5ETlhoZXhiYzBQYmpWbEZEWW5XU1g4b1J5WjB3eVRzaWZVeXFoQ1IrMUg3?= =?utf-8?B?QkRwOHVnVCtONHQ2VWhZRXJPR084YkJnV1JKMGxHdUE0ZGhid2JpMFZwcUEz?= =?utf-8?B?YjNRUzlrUm1oQld5dnVJQmZZRCtQR0h2ekY2TEJWWUFFQXVlTDkxOURDWENK?= =?utf-8?B?d1NmL2VNRFFkdm5yMHdwVWtUcnkwQTNLS3dHT1Z6aDRHZlJISmZzNjkwTjNH?= =?utf-8?B?TmdTMW93b3lobGdEVzRId1Z4Z0d4SWg5SkpNRzZ2ZUgwWDlKZFB0ZG5LajZx?= =?utf-8?B?REZKaVJRdGhlZ2c2bXpGcTF3d29UeklraHd6cDRnYm9qOXBrZDFWYXBMYlJF?= =?utf-8?B?eFc2ejBCWnIxTk5GcWx6bDRoU3ZMRXZpYUhSMUVkMzR0Y0dPdEJFYnZtWGF4?= =?utf-8?B?TG00elV1QXdFb01ndkdUSzkyVk5WUmhFRUxOTVBvQUdpTUd3S3p1NjJBY28r?= =?utf-8?B?VmZwZExrWlo0c2U1aE1lSlhJeGJ5V2t2MXE0OTFzWUJqQXlVZ1AxUS95OStu?= =?utf-8?B?SDFyQTJQVzFtUG1EUWtMcTV4VXkvbVBqRWRaQlBDMVgwS2JLbFpIZTlCcXBj?= =?utf-8?B?U21aLzk4OFVsbkd2UmdRYm4wTUlrNENvQXJmZlp6ZjJGVFBIQm0xY0xUYnVt?= =?utf-8?B?REVYMkhVQnNrM3lXV2ZQMHoyLy8wNFB5MVF6d0pmbG9VUXVxdHRlMkVLU2tt?= =?utf-8?B?MHVvbU1zVEgwM09IWXB6WEhzUmpzOS9jZUVKQ0RlUjhrL3NqTXZSd293djUw?= =?utf-8?B?dHFVc0NHR25NQ2FNdGdrZ0RzY2NuQTI5OWNISm1Tb213Z09sdUd3bkE1RDcw?= =?utf-8?B?eUg5ZTBidUpod1dIbnY0OFVnL3FCVnNRbktrOENlM21qcEpPeVVaUERiWXNI?= =?utf-8?B?L2hoc0ttV2krS0M3aEZ0N2JlZ1RsSTJQOXFFUGp5WVEraXF3eEJpVmQyTWJt?= =?utf-8?B?MGc5eUk2Ui9pNitvR1RlU24rUE4yMURzTlJxL3oxb3VSNTJlNEYrVkdMR1Zi?= =?utf-8?B?OHFkRGViSnErcEk0bkJRQTdKQXpQVWVuZVYrOWRnSkViWnVPUGg1S0hueVBi?= =?utf-8?B?K2pudlhpSFJuSGQ1OFJTN201aWc1RkQ2emw3SDkrQkdDQWV5UTNmdERhNEhO?= =?utf-8?B?Rlo3bTdLeExaTVJRK3BqKzhJNENUbjVUR2lmWVEwR3NVTzdyQ3BTcTVjdFh4?= =?utf-8?B?OEM3NU8veTVqUnJndlhnYWJhZ3p6Q3gzTWtQbTFFcW8rbGs0VE5ZZ1VxcXUx?= =?utf-8?Q?WwIlIA1Bn/F8Yqk9g23N7GU=3D?= X-MS-Exchange-CrossTenant-Network-Message-Id: d7735647-8d93-46ec-a9ac-08ddeeb7143c X-MS-Exchange-CrossTenant-AuthSource: MN2PR11MB3934.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Sep 2025 09:07:04.4698 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 9FGb11BdX8s78+B375+6OUBoJtpIooqDHB4UINfAK3O+UGfLCZ076VcmsmI43LWk94dJQI4ziNjfERnAJIEqj4oruhBSISwGG9V0TVYEMXc= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR11MB7902 X-OriginatorOrg: intel.com X-Rspamd-Queue-Id: E3D7F40006 X-Rspam-User: X-Stat-Signature: zn9g3bapfa44od5wpdntq8eix658ozz3 X-Rspamd-Server: rspam09 X-HE-Tag: 1757322432-308373 X-HE-Meta: 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 MgcH2bqr I8a/zs2N4Qs8AFIjOLYsZ50O4SQASULZo5halVcVRzDgIa6aI/mSTT5VbyKitkx72XCSjh7v8FLN1bEDqc0IbIGUZaBu0tncLCpLjDCveUqp3zBfnQBtvhGyHkDhiW4w9L32QOYtWv8Vl9U+SfREXSxwNULeO2xDd5bI5+xFLK3cCC4h3aIqlNlpJRbpw+15FxX559rYgLc4VyFIHM4Fyb/cU8SOafIWcW0J5yd0WU3iAIU/EsbwJdjZm1EUTSJCqwcuPkeTSOkrxDucv7JH5FTUZjjmrIg2BDpE+ME8ro419OthOMUQ75UwlqUIXM0ODImMz63M4N8wy+++QTB/5PNuQ0wVYbSVvPhDCeqoNf845HZFO7jtfT7SUfw8KdJftzDJ5pdbyVbkKFkIbUiiyz93JL8JKQGN0Sf5Za0bAhzoTuio5S5hGXBH6Fx6yuGxkaV9cRKVQE4i0/2Ckk658aWS/tNRJQlfCii3pndn+WF/X4iZU45g6ITpbac/JjC/kayO1CMiQlj3ETp7byIwjew7kf1BJu7wLuhflA1qVP4MHJQcsnRfV4Qs+5QhvIr/aQzY7TQwpnkL7S+25F/MTMyipHR19U2BrTNgMNmHXfy/kbQnBIUj9jOwStmJCfreeFBzO6vCojVhso1Q0QD5MTjKPVaks7k0rSY6p4BvLC4POKkg= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 2025-09-06 at 19:17:43 +0200, Andrey Konovalov wrote: >On Mon, Aug 25, 2025 at 10:27 PM Maciej Wieczor-Retman > wrote: >> >> KASAN's software tag-based mode needs multiple macros/functions to >> handle tag and pointer interactions - to set, retrieve and reset tags >> from the top bits of a pointer. >> >> Mimic functions currently used by arm64 but change the tag's position to >> bits [60:57] in the pointer. >> >> Signed-off-by: Maciej Wieczor-Retman >> --- >> Changelog v4: >> - Rewrite __tag_set() without pointless casts and make it more readable. >> >> Changelog v3: >> - Reorder functions so that __tag_*() etc are above the >> arch_kasan_*() ones. >> - Remove CONFIG_KASAN condition from __tag_set() >> >> arch/x86/include/asm/kasan.h | 36 ++++++++++++++++++++++++++++++++++-- >> 1 file changed, 34 insertions(+), 2 deletions(-) >> >> diff --git a/arch/x86/include/asm/kasan.h b/arch/x86/include/asm/kasan.h >> index d7e33c7f096b..1963eb2fcff3 100644 >> --- a/arch/x86/include/asm/kasan.h >> +++ b/arch/x86/include/asm/kasan.h >> @@ -3,6 +3,8 @@ >> #define _ASM_X86_KASAN_H >> >> #include >> +#include >> +#include >> #define KASAN_SHADOW_OFFSET _AC(CONFIG_KASAN_SHADOW_OFFSET, UL) >> #define KASAN_SHADOW_SCALE_SHIFT 3 >> >> @@ -24,8 +26,37 @@ >> KASAN_SHADOW_SCALE_SHIFT))) >> >> #ifndef __ASSEMBLER__ >> +#include >> +#include >> +#include >> + >> +#ifdef CONFIG_KASAN_SW_TAGS >> + > >Nit: can remove this empty line. Sure, will do, thanks. > >> +#define __tag_shifted(tag) FIELD_PREP(GENMASK_ULL(60, 57), tag) >> +#define __tag_reset(addr) (sign_extend64((u64)(addr), 56)) >> +#define __tag_get(addr) ((u8)FIELD_GET(GENMASK_ULL(60, 57), (u64)addr)) >> +#else >> +#define __tag_shifted(tag) 0UL >> +#define __tag_reset(addr) (addr) >> +#define __tag_get(addr) 0 >> +#endif /* CONFIG_KASAN_SW_TAGS */ >> + >> +static inline void *__tag_set(const void *__addr, u8 tag) >> +{ >> + u64 addr = (u64)__addr; >> + >> + addr &= ~__tag_shifted(KASAN_TAG_MASK); >> + addr |= __tag_shifted(tag); >> + >> + return (void *)addr; >> +} >> + >> +#define arch_kasan_set_tag(addr, tag) __tag_set(addr, tag) >> +#define arch_kasan_reset_tag(addr) __tag_reset(addr) >> +#define arch_kasan_get_tag(addr) __tag_get(addr) >> >> #ifdef CONFIG_KASAN >> + >> void __init kasan_early_init(void); >> void __init kasan_init(void); >> void __init kasan_populate_shadow_for_vaddr(void *va, size_t size, int nid); >> @@ -34,8 +65,9 @@ static inline void kasan_early_init(void) { } >> static inline void kasan_init(void) { } >> static inline void kasan_populate_shadow_for_vaddr(void *va, size_t size, >> int nid) { } >> -#endif >> >> -#endif >> +#endif /* CONFIG_KASAN */ >> + >> +#endif /* __ASSEMBLER__ */ >> >> #endif >> -- >> 2.50.1 >> > >Acked-by: Andrey Konovalov -- Kind regards Maciej Wieczór-Retman