From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id B41CDC02194 for ; Thu, 6 Feb 2025 15:40:41 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 4E54E6B0085; Thu, 6 Feb 2025 10:40:41 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 494E66B0088; Thu, 6 Feb 2025 10:40:41 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2E7B26B0089; Thu, 6 Feb 2025 10:40:41 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 0A2E76B0085 for ; Thu, 6 Feb 2025 10:40:41 -0500 (EST) Received: from smtpin11.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 0797A14024F for ; Thu, 6 Feb 2025 15:40:40 +0000 (UTC) X-FDA: 83089932240.11.9C12269 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) by imf14.hostedemail.com (Postfix) with ESMTP id 85E51100018 for ; Thu, 6 Feb 2025 15:40:35 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=Hx3GwWz+; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}"); spf=pass (imf14.hostedemail.com: domain of maciej.wieczor-retman@intel.com designates 192.198.163.16 as permitted sender) smtp.mailfrom=maciej.wieczor-retman@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1738856436; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=iKvFsTeewNxNzJvrw2sa3fNT8JGOeNE3CWB1C5VFBvE=; b=q+PAFPy7czuncAg6ip/dGPrpuRSg170sbLEh3wcjaAD5bZLIHwSfcYe3VdpVg5krZVDtcT QJJnZuQTk+sOJX7s+5ITSzWT3rNekybfz9Koi5bZnA/bp9xepyOKGxkY1MHR5T4F3Jp6vk D3k+sSRBY6xKReYjklajlQ6Eeh3H6CA= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1738856436; a=rsa-sha256; cv=fail; b=C8ZpfMzjhv/vbEa250lwcOx3WDLEBlQl8VNyIU2HylpNM9SXepa0nCJypVJRQzAKKFgtK/ 4BMaPmkqkyyWv5rUHO7r4/wor32TAe8mGP8CdGyZgH3ViEEqrnMA5j8kD0rGfSL6M80exV eV/mV9h3JWJOkBmgbqYdLO+J5RMLVjM= ARC-Authentication-Results: i=2; imf14.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=Hx3GwWz+; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}"); spf=pass (imf14.hostedemail.com: domain of maciej.wieczor-retman@intel.com designates 192.198.163.16 as permitted sender) smtp.mailfrom=maciej.wieczor-retman@intel.com; dmarc=pass (policy=none) header.from=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1738856435; x=1770392435; h=date:from:to:cc:subject:message-id:references: content-transfer-encoding:in-reply-to:mime-version; bh=FezyVjYZE8m9uhd5ZcpfOJRqXMGVrGh2veYjh3QLe64=; b=Hx3GwWz+PplQttKu79wHJoh4YzOPDdZdfuRrs3zGzgX2bkovVIV+rQ5S sBT9jVL5tN2ZlgrK0PaomSMZqyP8T6iomN4nWV4x2igapKte5aTXy1huh I/PAGnuM1jfcKyyLDT1nNKQ9OafyvDwCsIiM9lxbQnRTuPW7Bq6zY1Bn+ Meaox4sLlKhgEfFW9CmpFAcKAc/9HKv60UwRYquT5U6nW2OvT8L8EY3Xi z+n/yScMEVcWHz6ipbZBbpWvOpbG0xR5ZebKwEg036Yn0bi3PKVjSfjx9 yW0jUHzHyf/dWcSs11E8bs4kuif5w5aHSlcR2RRNbn8tY4e1ZtZysX6XV A==; X-CSE-ConnectionGUID: 1A677G3CROOEzaawcORUMg== X-CSE-MsgGUID: R7mWiQNaQZyzPayHBr++7g== X-IronPort-AV: E=McAfee;i="6700,10204,11336"; a="27068082" X-IronPort-AV: E=Sophos;i="6.13,264,1732608000"; d="scan'208";a="27068082" Received: from fmviesa010.fm.intel.com ([10.60.135.150]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Feb 2025 07:40:33 -0800 X-CSE-ConnectionGUID: ACae1aZrQLeGkz96wlm2gw== X-CSE-MsgGUID: JrbY9Z7+RSSD9psRSyAs3A== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.13,264,1732608000"; d="scan'208";a="111771443" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by fmviesa010.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 06 Feb 2025 07:40:32 -0800 Received: from orsmsx601.amr.corp.intel.com (10.22.229.14) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.44; Thu, 6 Feb 2025 07:40:30 -0800 Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx601.amr.corp.intel.com (10.22.229.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.44 via Frontend Transport; Thu, 6 Feb 2025 07:40:30 -0800 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (104.47.66.46) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.44; Thu, 6 Feb 2025 07:40:29 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=HzBTjieDyrgIBQmCD0seEwfCtt4AY4pyNFytrSP01wJ3y6T7U9QYoLRI5MTpWKPwaCbomh/MYAcRDxFLAi5055RhpmnMf9CSPaSqpX0IUtNiaf7/kWgz0CENpJ8xsQZR+mLAGOWzuPGcDU8NKpGoV3tEd8A78DMeadBC5Gv4Dyo74fDJY0++mQG6i3LQrWIGLcHYT+Oqk8QlIe3RpouyXembrEziJNqawZqZiIS3tUurEGslQ+nzd4INXPLdJYUiv7U8AvaQ3LgD8xzzeq2I2VNvFFro2PWvVJ0TlEbDenu04OVCJhZuFq7tZvotJqhT4rpWXlggpBMz/dI8p/rtrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=iKvFsTeewNxNzJvrw2sa3fNT8JGOeNE3CWB1C5VFBvE=; b=xQDELHugtb0ycYmkIyPiErAfZD7r9OIa9Y1ot4h3aUpV5wK2wHTl3PgV2ql9QeLUpENq1qepbcw2hKpsifvNaVtNGYa5ff053JMy26ikZ3roVYVXPRlbIgl8xBxHGDl/tEixWcfErhLr3w+vHbcL8kvAzXWLRtIyeJ0y7JHBZ4uXLHs8dz2Ag8mZPIUe3vt/hWn/fkXN/KsCxLpHmKX5tPxWn0G1R/yylvonJPK2MKzUIw0sXc3jt2F+q+f8lXO/bGErRT7XUOx9v8vLfYToTX+XR2YoDMijdCCSwEmT084+9FQQ3v/ejwPBlbC9l+224Uov5HCJGE8Ow19zdvv9dg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from DM4PR11MB6239.namprd11.prod.outlook.com (2603:10b6:8:a7::20) by DM4PR11MB7352.namprd11.prod.outlook.com (2603:10b6:8:103::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8422.12; Thu, 6 Feb 2025 15:40:10 +0000 Received: from DM4PR11MB6239.namprd11.prod.outlook.com ([fe80::244e:154d:1b0b:5eb5]) by DM4PR11MB6239.namprd11.prod.outlook.com ([fe80::244e:154d:1b0b:5eb5%4]) with mapi id 15.20.8398.021; Thu, 6 Feb 2025 15:40:10 +0000 Date: Thu, 6 Feb 2025 16:39:57 +0100 From: Maciej Wieczor-Retman To: Andrey Konovalov CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: Re: [PATCH 10/15] x86: KASAN raw shadow memory PTE init Message-ID: References: <28ddfb1694b19278405b4934f37d398794409749.1738686764.git.maciej.wieczor-retman@intel.com> Content-Type: text/plain; charset="utf-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-ClientProxiedBy: DB9PR05CA0014.eurprd05.prod.outlook.com (2603:10a6:10:1da::19) To DM4PR11MB6239.namprd11.prod.outlook.com (2603:10b6:8:a7::20) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR11MB6239:EE_|DM4PR11MB7352:EE_ X-MS-Office365-Filtering-Correlation-Id: 6692f986-8089-41ec-94a8-08dd46c489d4 X-LD-Processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|7416014|366016; X-Microsoft-Antispam-Message-Info: =?utf-8?B?Nm83MVlXS1BML2pTR0ZiMk9FSEl0dDFXcHJHZjV3QW9ZYlNubThLVkowREpp?= =?utf-8?B?WlAyc3V2OXdieWQ0MmRBMy91a0RMV0NWKzZ3d3FwNXE2cElrMWJoaWJOWitK?= =?utf-8?B?bEdFWkFhM2lEVHdhTWxOZ3JIM2ZndjRGaEJGcnJISnJxVU9lU1NyNThJQ1FW?= =?utf-8?B?MFZVZkozcm90LzFTR3FxczhqN2tIVG5ORkRQQ2xZYTBEYlhJWXhGc01jR2g4?= =?utf-8?B?Q3hyZTJBZHFOWTVvR2ZmWU1sanBXOTRJaExRamRrR1h3c1F2R1VHQzZPTEFD?= =?utf-8?B?K1BoOHN4RHJOb0tOYThaK2g1VDl6d1V6U21WU3JxdTU4VDJHV041WXlwa3lS?= =?utf-8?B?ZW00Uy9RbzNaOWlmeHRYNEx2ejVzaFJzbmtFWUJ1WGxyMDFhUEFUakpWeFFk?= =?utf-8?B?QkNzRTJ4bkp2QzMxQm5xMFZ3V25xN3J6T1AyMWhjTjBOZXFEMmhGR2FHZ2c5?= =?utf-8?B?ZzgwQkdkcjM1RE1WMTU1MmV3REQvUHBoRnBiR2ZEenUxeXF5WDZxUU4yTmtO?= =?utf-8?B?Rzd6UE56dHovU2djSFN6MXZqM0RtMzhCcjZEYm9Ib3piRGltQ29xcmhCT3Y4?= =?utf-8?B?MzNGMGNQMjhvNVpXM2xIaHpQREhPdW9Nd1gzWmJ5K0IwRVUxbjJSVjRFalhO?= =?utf-8?B?ZTNyV0JtNWQ1TURTNktLbGlCQU9PVzN2eXU4YmNwbEJqZC9zdXBscHg5K092?= =?utf-8?B?Zy9ZaFVnWTR2S3pYc3JWOG9BZC8zTmVtazBtQ1JWMHdsc3RXQzZmWUNoelI4?= =?utf-8?B?SkFIN0FkL3dJWmxzb3orMm1Qb2lsaVBIQ3ZBSTV3emNlU2ZsTzNHbm1ibFIy?= =?utf-8?B?VTAxT2RNL1lJNEpJU0E2eVIyWkQxczVUZHNCaExSYTZPaW96NEU0Sm5RYU5k?= =?utf-8?B?T1NOUUhJc0VoUGpxaWFrZEMySVB0SmNESHN5eERyaDIwaWpmc1lmY1RWV3g0?= =?utf-8?B?ZGE0N2pHa2p3YWhoRUUrME9OalZqUWhsU0tKUjliTnRNcGl4OWZZc1V2cEhJ?= =?utf-8?B?Ym9oY1FwZkZGck9tWjZaYkxCbC9sc2pJWEZEbjlpdzd3bGRMcFVVTHQ2R1Ar?= =?utf-8?B?MVU1dnNQV0REb3hVRW4wb0dsMCtaTk1XZUM5dmVLc1BVUjRQU1hmbVFST055?= =?utf-8?B?UGhzN3EwZ1JkTDFzREdPVjVBcDNEVngvVGNyMEJDRGRtV1l0a25pcStoV1Ny?= =?utf-8?B?aS9CMUlUZWdocnR6Rmw2dXIvNzY2ajdBYmxSUEF3Y09GL3lzRUtyU3dzYitD?= =?utf-8?B?YnZhM21Yd0J3c25TWm94REw5QWlqcmZWdVFITU44MDN6VmZCQ0xCYlA4TExa?= =?utf-8?B?UXpVc1hMUGRia2hQQUlkcWZPMGY2TGluTGI3ZHk1ZTNNVFc1aW95TWJqWWxo?= =?utf-8?B?MUJHQXNWRDFPbXlDRExTN0poQVJnd1k0VHd6N1lGR29CTkZhdlFGeGNZbkUw?= =?utf-8?B?eXZRZ1oraUdqQjYxeWE1VGViYk93cGRJS2krQ01RWTJ0aFlMZVpMbC9ZdVV4?= =?utf-8?B?Q0RUeHplN013b21JZHdHZCticVJpVkw0d0Z0b3BITmlSOUFIamNicmRTQ3RD?= =?utf-8?B?b1dmU2Q4V3ZYdnVmeHowYVg1UldxdEI5WkdiQ1ZzSjVDZXZTYVVXYjVNUGZu?= =?utf-8?B?SHVwSmRZNHR3UGZHcEJmVjUxWWRzY2MwTVVjVmtFVmNpZkx0RWMxOE9pbURh?= =?utf-8?B?QWdnSGp5dXBlNzZWZWxvb1M1VGxGQ0FpdUlRRjYzMTlpd2x1WGpkSnVjbyts?= =?utf-8?B?akRGMWFIWFowMWRPR05Fa2ttWE4xUHkyRnAyQVBLSjh5d1BiK1ZOSzlhcEZI?= =?utf-8?B?WCsraTNENkQ1R1hkUndVZz09?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR11MB6239.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(7416014)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TFE3QitIcWswa0hBbjJkU3gySGxBTWl1NDJtVERHaEwxbXpWb2lXajNXVmJ6?= =?utf-8?B?c09nUzRQRDJYUCtZeGRWU3QxOTJ3dWpvakI3d1NmbDVHbk9henlja29VcXJ6?= =?utf-8?B?U1FvWWFteUhTUWI1ZjBSS1B0eEUzNlNXWnV2eUJwT3ZQZGF3dFpIRUw0cGxl?= =?utf-8?B?ZWZNcXpydXNRbVQvZzErblFZZFRBeloxNVlPcHlhVm1jdXFFUCtYOHh3NUFI?= =?utf-8?B?aFZUYnd1cWt0ZHBLZ3lUREllaVd4MTdrSHhjNXFhT013T2ZTTVdiRldpdi9U?= =?utf-8?B?TnB4RlY5LzhoM1dDbVdHcXZTWllsQVAyRjVITU1aWGFSUERJS3FibmZ2Y0Vj?= =?utf-8?B?TnZpaHNDUHhZdjZuNE9TaHRNTWxGYXh3dnk1Q2xMTEVpVEZGa0lERkk2RHRR?= =?utf-8?B?K0xsb3pkRE41VkxsSUhzaVFQa2wvVXhJMldlNW5tUHQwcHlHT1dsZHIwckZo?= =?utf-8?B?cWtrN1Z3NHBuRjRQem0rUlE5cWppM1doeWJ2MTU3MEphMVlXZU56RDc5NXVK?= =?utf-8?B?T2NOMHlqdCsvblFRMDJvNTUvOW5pUDJVQXZ6YkdQVTh0amlTQlE5RENTaWpl?= =?utf-8?B?MXk0Vk9aL1BOQmZYUjFDSkhnelpnbm9qWnp1ZERYR3dlT2ZTbGJFS2F3dGpX?= =?utf-8?B?RDYyU2JOdXBrUTJvYndCMjRDK3l3ak9Da3FhUlE5cW9BTmhnTEJlekNseWpz?= =?utf-8?B?ZHFjckZmNndtRG5wSzJzelVwS3l2VXVCcXpaeHk2YkR4WkNmT1NtbUVhM1Vq?= =?utf-8?B?UXBpWDd2WllKYi9YRGJsRVkyNXJlSVJ4TFAzTUZ0Sm56bTNOUTRNU0pqZXV1?= =?utf-8?B?NkpZcjJoazVzZ0Q0WDNqdUdpY2EzVnI5N09PV0ZjbERLL0R4dWI5U0lvamwv?= =?utf-8?B?bVplN21iWWVEeWtQS3NPVndkT2dhRG5idFd0NVpVcno0Tm0yQUUvU2tyaHNE?= =?utf-8?B?TmtvSlNTcWZyUzhiU0UxV0wvUGRoNi90S3lIN1RRWGRPNXVFZVQ2ZDU1SjZ6?= =?utf-8?B?dkV0ejUwZ0M5TUZ0b1dObnlpWGhZVDd4MFhVem0wNjF0QjFlUDJ2VDkyTkF4?= =?utf-8?B?UTZJTW1iK0YrR3dYdThQbmhYNThvcDR5S1FBbUNmL1AvM0dZZ0NYRzQ0OElN?= =?utf-8?B?YVF0K1lpZVRudzA2b1hRR1NJRmF5cTBZd2FBUWR2YllrL1dPc3Q2REd0NWtF?= =?utf-8?B?SkJMc1N5OW1qb0tvWGlwMHY1NXBWaUhjN1FIdktDTHRpZHpZNURYOUV0Nm5v?= =?utf-8?B?SjluWFk2MTJvbG1ySlFJMHdjVm9DOWwrZVIyM05ucFRCSC9LMC9mRFc2ekEz?= =?utf-8?B?YURHelA5L3hDWmdyTWphVG1ON0RxbmhUTGtHOGh2NUVNUGpDQ3hjTVlKenpw?= =?utf-8?B?MmZkS3VpZ0plZ09lUWQzK0k3MG5uN3RwY1FvUXR5SVRPRjJ1N2xINHhWTTVU?= =?utf-8?B?ZGtaNHE3dXBLQldmL2ZURkNLdDZhNGFLb0dDSVFTMzcxaEZCa203NnZGbE5T?= =?utf-8?B?K25UMUNMWVpYZlBROUlRL2NQbGxjTGw1NDJreE1GVGNFWDF0a1ZCNmp3aDNi?= =?utf-8?B?ZUFtUDN2MU1wSTFzMm5LSThvWWswNXhZajRLUC81SndnRERuV2YzcXFmeTI5?= =?utf-8?B?aWZUellPNHVpeEJyYVZEU2ZwRElWV2xmWG1rbERyOGJwWEZBUnhDZzJaMk5X?= =?utf-8?B?VDBHOUs1bUpZYXp1VEg5bmZob3VXcnFqcFJRcENRR044K1F3V2FvQksxcWE4?= =?utf-8?B?bkpXSHVFbGZIV0w4M3kyNW51KzBDd1BDNWRycTR3cGlOMjJNamNhK2tZUnNI?= =?utf-8?B?N2ZkMTNHelA3M0s4dlNYQWtORkZKeDRFbTV3eTY2U21zaGtvOWhpd3FBZGs1?= =?utf-8?B?TGluRjlQeTdqWlNha2NZakRZSUdBelV4V2l6TlRhS1NXajczcy9XODRtNUhG?= =?utf-8?B?SC80VzhXOUlSTXYzUVJtQ00vRHE1SVJFb0gzNFl0ZEV2cWJnOTl0b0Vzc0Fl?= =?utf-8?B?UnozYWJnQWUvRExRR2VaZzdBSGkybkpLeWdZUG5pZUJ1dS8ycThWWGQzSzJW?= =?utf-8?B?V0w4WjM4eDZvYUs5SnlFTUs1aUJwQ2xwN3RYZXR6Q21jTmV4WW5vZHJyWENM?= =?utf-8?B?eXVZdUV1MmtQdXROZUh4eDhTQXZKZTM1Ui96OXBHTWJGVkpVcmhteDNGUDZX?= =?utf-8?Q?bIPMvOOYA13hg0M60p8IWmk=3D?= X-MS-Exchange-CrossTenant-Network-Message-Id: 6692f986-8089-41ec-94a8-08dd46c489d4 X-MS-Exchange-CrossTenant-AuthSource: DM4PR11MB6239.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Feb 2025 15:40:09.8986 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: aXEZsErCCoeRP3nMAmMiM0WRq3vk1drKMueS60Qu1j3sSmWV7Z/CLkMJWdMHUMcZ6mzomMum/bfC/R02JT8CUnFL+D3ycYUaqElZMvaLpNU= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB7352 X-OriginatorOrg: intel.com X-Rspam-User: X-Rspamd-Queue-Id: 85E51100018 X-Rspamd-Server: rspam07 X-Stat-Signature: xer7rtwtd83yrbnmisc5dfogg3hwansw X-HE-Tag: 1738856435-729756 X-HE-Meta: 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 rJ7GCi8P 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 2025-02-06 at 00:45:49 +0100, Andrey Konovalov wrote: >On Tue, Feb 4, 2025 at 6:36 PM Maciej Wieczor-Retman > wrote: >> >> In KASAN's generic mode the default value in shadow memory is zero. >> During initialization of shadow memory pages they are allocated and >> zeroed. >> >> In KASAN's tag-based mode the default tag for the arm64 architecture is >> 0xFE which corresponds to any memory that should not be accessed. On x86 >> (where tags are 4-bit wide instead of 8-bit wide) that tag is 0xE so >> during the initializations all the bytes in shadow memory pages should >> be filled with 0xE or 0xEE if two tags should be packed in one shadow >> byte. >> >> Use memblock_alloc_try_nid_raw() instead of memblock_alloc_try_nid() to >> avoid zeroing out the memory so it can be set with the KASAN invalid >> tag. >> >> Signed-off-by: Maciej Wieczor-Retman >> --- >> arch/x86/mm/kasan_init_64.c | 19 ++++++++++++++++--- >> include/linux/kasan.h | 25 +++++++++++++++++++++++++ >> mm/kasan/kasan.h | 19 ------------------- >> 3 files changed, 41 insertions(+), 22 deletions(-) >> >> diff --git a/arch/x86/mm/kasan_init_64.c b/arch/x86/mm/kasan_init_64.c >> index 9dddf19a5571..55d468d83682 100644 >> --- a/arch/x86/mm/kasan_init_64.c >> +++ b/arch/x86/mm/kasan_init_64.c >> @@ -35,6 +35,18 @@ static __init void *early_alloc(size_t size, int nid, bool should_panic) >> return ptr; >> } >> >> +static __init void *early_raw_alloc(size_t size, int nid, bool should_panic) >> +{ >> + void *ptr = memblock_alloc_try_nid_raw(size, size, >> + __pa(MAX_DMA_ADDRESS), MEMBLOCK_ALLOC_ACCESSIBLE, nid); >> + >> + if (!ptr && should_panic) >> + panic("%pS: Failed to allocate page, nid=%d from=%lx\n", >> + (void *)_RET_IP_, nid, __pa(MAX_DMA_ADDRESS)); >> + >> + return ptr; >> +} >> + >> static void __init kasan_populate_pmd(pmd_t *pmd, unsigned long addr, >> unsigned long end, int nid) >> { >> @@ -64,8 +76,9 @@ static void __init kasan_populate_pmd(pmd_t *pmd, unsigned long addr, >> if (!pte_none(*pte)) >> continue; >> >> - p = early_alloc(PAGE_SIZE, nid, true); >> - entry = pfn_pte(PFN_DOWN(__pa(p)), PAGE_KERNEL); >> + p = early_raw_alloc(PAGE_SIZE, nid, true); >> + memset(p, PAGE_SIZE, kasan_dense_tag(KASAN_SHADOW_INIT)); >> + entry = pfn_pte(PFN_DOWN(__pa_nodebug(p)), PAGE_KERNEL); >> set_pte_at(&init_mm, addr, pte, entry); >> } while (pte++, addr += PAGE_SIZE, addr != end); >> } >> @@ -437,7 +450,7 @@ void __init kasan_init(void) >> * it may contain some garbage. Now we can clear and write protect it, >> * since after the TLB flush no one should write to it. >> */ >> - memset(kasan_early_shadow_page, 0, PAGE_SIZE); >> + kasan_poison(kasan_early_shadow_page, PAGE_SIZE, KASAN_SHADOW_INIT, false); >> for (i = 0; i < PTRS_PER_PTE; i++) { >> pte_t pte; >> pgprot_t prot; >> diff --git a/include/linux/kasan.h b/include/linux/kasan.h >> index 83146367170a..af8272c74409 100644 >> --- a/include/linux/kasan.h >> +++ b/include/linux/kasan.h >> @@ -151,6 +151,31 @@ static __always_inline void kasan_unpoison_range(const void *addr, size_t size) >> __kasan_unpoison_range(addr, size); >> } >> >> +#ifdef CONFIG_KASAN_HW_TAGS >> + >> +static inline void kasan_poison(const void *addr, size_t size, u8 value, bool init) >> +{ >> + if (WARN_ON((unsigned long)addr & KASAN_GRANULE_MASK)) >> + return; >> + if (WARN_ON(size & KASAN_GRANULE_MASK)) >> + return; >> + >> + hw_set_mem_tag_range(kasan_reset_tag(addr), size, value, init); >> +} >> + >> +#else /* CONFIG_KASAN_HW_TAGS */ >> + >> +/** >> + * kasan_poison - mark the memory range as inaccessible >> + * @addr - range start address, must be aligned to KASAN_GRANULE_SIZE >> + * @size - range size, must be aligned to KASAN_GRANULE_SIZE >> + * @value - value that's written to metadata for the range >> + * @init - whether to initialize the memory range (only for hardware tag-based) >> + */ >> +void kasan_poison(const void *addr, size_t size, u8 value, bool init); >> + >> +#endif /* CONFIG_KASAN_HW_TAGS */ > >Please keep kasan_poison() and kasan_unpoison() in mm/kasan/kasan.h: >these are intended as internal-only functions (perhaps, we should add >this into the comment). Instead, add a purpose-specific wrapper >similar to the ones in include/linux/kasan.h. > Okay, got it, I'll pass it through a wrapper. > >_______________________________________________ >linux-riscv mailing list >linux-riscv@lists.infradead.org >http://lists.infradead.org/mailman/listinfo/linux-riscv -- Kind regards Maciej Wieczór-Retman