From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 0D7ECCAC581 for ; Mon, 8 Sep 2025 10:13:10 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 506436B0012; Mon, 8 Sep 2025 06:13:09 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 4DD938E0003; Mon, 8 Sep 2025 06:13:09 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3A55F8E0001; Mon, 8 Sep 2025 06:13:09 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 1B7226B0012 for ; Mon, 8 Sep 2025 06:13:09 -0400 (EDT) Received: from smtpin03.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id A58CB13C085 for ; Mon, 8 Sep 2025 10:13:08 +0000 (UTC) X-FDA: 83865670056.03.21CF55C Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.19]) by imf22.hostedemail.com (Postfix) with ESMTP id 0F739C0006 for ; Mon, 8 Sep 2025 10:13:03 +0000 (UTC) Authentication-Results: imf22.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=fV5Tim1z; spf=pass (imf22.hostedemail.com: domain of maciej.wieczor-retman@intel.com designates 192.198.163.19 as permitted sender) smtp.mailfrom=maciej.wieczor-retman@intel.com; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}"); dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1757326385; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=DvUYqL9o/y8Kfnr8mVVqHhIYQ5BX6R6wR/K6AF/Cbmo=; b=EkDuiC+1d1j6uZjyAKD6yM+SxAtGd1dZQAqd5YuFP4N2UcsPDYWbzaBaAi8buI2nU0nljA e94YEeA6GSqobe5dkF7exX0/xxrhH+yI9jErszUktoooThIfG00dK7iijd5sJAI7eyRJ4T YZKA1kBoHFlHIBja/3kFAMK/JC5Nvfc= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1757326385; a=rsa-sha256; cv=fail; b=4kzK310NwPTZ2cNbdomT201eUcmPDEmdyBoAeRhF6ecVOKIiEEyZatsMerx79b5biFWy9m PKiNXAX+0KyYGuhz0yd5gZBbleidNcv8JUk3upjAVgqqVMOKYWOkxRsS+foCDUwKbCgpu+ BOYtCWVyTbVpu9gaH+o0uwKm+cDRMzo= ARC-Authentication-Results: i=2; imf22.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=fV5Tim1z; spf=pass (imf22.hostedemail.com: domain of maciej.wieczor-retman@intel.com designates 192.198.163.19 as permitted sender) smtp.mailfrom=maciej.wieczor-retman@intel.com; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}"); dmarc=pass (policy=none) header.from=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1757326384; x=1788862384; h=date:from:to:cc:subject:message-id:references: content-transfer-encoding:in-reply-to:mime-version; bh=SzzROfrst6ymJc0ZfddjslsnjWLkzNEgWkXwkK0WV1c=; b=fV5Tim1zvRm+geBnF6p9HiqwvflihpeTp0S3UqcV/3lwZ/D883ALqISl Yt+FKWCkLsOa7O2lliR7Vxxn6SjB3rPtGkBc/4CcUruDCLjLQk1iOm8fD GZFK9+LSRaCqfx9Usb1N6GSONkjosD8Bp23TQelArzj0J9pLsfA+wgDtJ zR1UWOi0DGJjB0UMUO0EvjnV+q0bq9sq2TMg38RH4SFaivlrux1GHpxSs x3zV1blsgY3eebQ108sXcnkFiiWi0MAmtv7w/SwL2DOKD/eqHVLZ/9RIC Xs+JutbHq2BFIo0d0PUipEFLLGure839FFg2LQK/QeSkjVZ27KG1NGXyh Q==; X-CSE-ConnectionGUID: WH+btTEHT8Cz3GKO9j4Udg== X-CSE-MsgGUID: b95PkbRITvu8n0X+vypX1Q== X-IronPort-AV: E=McAfee;i="6800,10657,11546"; a="58619091" X-IronPort-AV: E=Sophos;i="6.18,248,1751266800"; d="scan'208";a="58619091" Received: from fmviesa010.fm.intel.com ([10.60.135.150]) by fmvoesa113.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Sep 2025 03:13:02 -0700 X-CSE-ConnectionGUID: szq24UfkSaq9ZdIgUrgELw== X-CSE-MsgGUID: e8yuTRAFQjWqMpM1WR7vag== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.18,248,1751266800"; d="scan'208";a="173546511" Received: from fmsmsx903.amr.corp.intel.com ([10.18.126.92]) by fmviesa010.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Sep 2025 03:13:01 -0700 Received: from FMSMSX901.amr.corp.intel.com (10.18.126.90) by fmsmsx903.amr.corp.intel.com (10.18.126.92) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 8 Sep 2025 03:13:01 -0700 Received: from fmsedg903.ED.cps.intel.com (10.1.192.145) by FMSMSX901.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend Transport; Mon, 8 Sep 2025 03:13:01 -0700 Received: from NAM02-SN1-obe.outbound.protection.outlook.com (40.107.96.53) by edgegateway.intel.com (192.55.55.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 8 Sep 2025 03:13:01 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=uQ3NsFdp2q0xRhEzj6opmKO/Bf10fsnSsZzfLiOQ3LE3jsssw0DgibdRF8Ax+XspD4zY9ISTPL2UABjPQbeV8rtulTeuPUTAvCtQJpgGalKm9QXmtA/BXk0O0h4vGyOSxvq0OkXOJNdcsknIPA6cWq1NXaxQKMnkVUXpjuqWzLMD6loT4Dn64YeJGztTOb7a9mo29nJa3rOUQC0lzESWQIWKw/uFMXdd6/xRSOdiA8S3XuF8722SA9aNg0tTZE8lX7H1Mg7Qppxj1p1fMTJVFDL2KWNEl/3H6raUoedq4BhdTOg3refkwoy18o9PfAjXQpq2xgWn1DMMdCq42zQ3uQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DvUYqL9o/y8Kfnr8mVVqHhIYQ5BX6R6wR/K6AF/Cbmo=; b=wPYoLdo7lp0AQ7wKbBJp4k+euqeCNucNS4jr38OeKUk4/IqAMvliLFdIlfnlD01S2cr5FTUkl/GtRa5rTYfXppfg/WXFEOLH3shbkLlpxbE7zHXabqHoGFgdNCmCIPIRvE5K03Pl+p7KOfKDCNcCVozgYaFKtqQ84dnbl/mFO3yoA1tPdWSQXW6BV16ko48mDuAJo+HQ4aspXDGwi1h3Z0PFIAlEOwV7ieAyzO4gm0fHN1dYGcF0bxW/Lgf8z8VonF6t0gVnVqm1wQUV3p9IZQUrOp2E70+oE2EZAa68uDJVB3tjbb35T7SYMmjW0Fl3u0d+nTYjfbeE+K6F+uouWg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MN2PR11MB3934.namprd11.prod.outlook.com (2603:10b6:208:152::20) by PH7PR11MB5795.namprd11.prod.outlook.com (2603:10b6:510:132::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9094.19; Mon, 8 Sep 2025 10:12:52 +0000 Received: from MN2PR11MB3934.namprd11.prod.outlook.com ([fe80::45fd:d835:38c1:f5c2]) by MN2PR11MB3934.namprd11.prod.outlook.com ([fe80::45fd:d835:38c1:f5c2%3]) with mapi id 15.20.9094.018; Mon, 8 Sep 2025 10:12:52 +0000 Date: Mon, 8 Sep 2025 12:12:35 +0200 From: Maciej Wieczor-Retman To: Andrey Konovalov CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: Re: [PATCH v5 05/19] kasan: arm64: x86: Make special tags arch specific Message-ID: References: <7a85ceb0918c6b204078e6d479b85fef6a6c1768.1756151769.git.maciej.wieczor-retman@intel.com> Content-Type: text/plain; charset="utf-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-ClientProxiedBy: DUZPR01CA0047.eurprd01.prod.exchangelabs.com (2603:10a6:10:469::16) To MN2PR11MB3934.namprd11.prod.outlook.com (2603:10b6:208:152::20) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR11MB3934:EE_|PH7PR11MB5795:EE_ X-MS-Office365-Filtering-Correlation-Id: af827897-fbcc-4868-1387-08ddeec04569 X-LD-Processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|7416014|376014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?Ty9RNHNzZG95TlNXaGdSUk1rV1dSaXd5bTcwUyt3OTNqQjBKdnpQRStSdkp6?= =?utf-8?B?ZzdYK3ZOWmtvNHNGelVqOHRWNkQ1UGRiaXJ3OWduMTN6T0NqSXU3Z3Q1QUYy?= =?utf-8?B?b0VxNXorR0NqQWx5eVJ0TGpwd29nTFB0OXZRVDZwV0VNY1lVRGFaajEwZ2ZG?= =?utf-8?B?a05TQmRUY3pYdXBHendlZW5oa0NoNHhHOFZQMFZTanJiQlNsUGdkS0xRSzQw?= =?utf-8?B?UHZsbTJFbVJaV2dIdzNMaUpxcnVCK0JTSEJCUmloWTRUV0U1cjVaRGp4MHFB?= =?utf-8?B?Y21Scmh6VkNyVUpEZk9kWVplWE0rb1BmZUI4Qm56MVZ0MEdDaHdTUjlSZnJP?= =?utf-8?B?ZG5CSTBrMWZRZUxuTzhCZG5WQTZoWmk2ajBQekJMRVM4emxRZ0tjemcybXd2?= =?utf-8?B?OEIvMXdHeUNWV0w1ZWs0REZKR0EyaCtacmVOWFlSVUJBanVLbzc2aHRDZks1?= =?utf-8?B?NzZuTFFQU1A0aUpKdGdFYlhkQTNnVnBqbjhacEJMcmdvR3RjNlYwSVdlUk0z?= =?utf-8?B?dkdGd2M1MUJZa3BiMFcyWmF3R1QxRWx2MnVxc1JVbXZRVzRhVTNZVDdXQjdV?= =?utf-8?B?czBteTh3VEg3OU1qZmRELytmcC9sYWwxYk9Deko5SmlJV3piL3NKZWdUVmxC?= =?utf-8?B?S1c4VGpvNHB2MmFKYUwzM1RBenhSWUwxR0U4aXFOcGliVUpFMlNmUG9JMDNI?= =?utf-8?B?d0xqRm80Yk1nOCtsY2FEQzJSYkkzNTNRUGNpQlFrZkdRUGhScDZ0Tm1wdnNa?= =?utf-8?B?ZWRXVEZGQmdmYzR6WCs0S2FRY08wVzdrWTJpT1ZhVVJleklhMFlEei9jU2dp?= =?utf-8?B?b2hieU9ZOWJxZy9seTR6a2ZkbkNDdU9zdENIaFNUZHQ4OW82eERUNXQvQXds?= =?utf-8?B?cmVsU2I2NXc4dExQQlUyamFYd2tGK0tjN0dHdUcyMTR5TXZJbmlZODMyTDBM?= =?utf-8?B?cGlKc3FJWGJtQUVoQTJ5eFhjL0RVRTVXWnIvTjUzdWZuR25MN09HRGxmMEw5?= =?utf-8?B?b3FzaUZCZklLVUgyNXE1QkZZMisrR3RmRGY4Yk14dEp4RUc0OWhXN1pmMjV4?= =?utf-8?B?aStmcDRoRGE3UG4wT1A1NmZwY3N0MzBSY3ZEOWZETEt3VGl5cXFzZGtYeGJh?= =?utf-8?B?NTlUL0JqMXNtSm9yL29lSGYwSElNQ0h0bTZXWGVqUlkzZEVQMXZYTnJ3ejFK?= =?utf-8?B?ZU9lRmFZeTE5U2hBNTY4RDAvdHpQTlVNSHBkVHpoUlh6RUh2YWVFVGJiUXpS?= =?utf-8?B?UGNUeXZ4RTRCdXBTazd2THRKT1BabU8vNGFxUnoxQko5MUg1N1E4UUVaSkZs?= =?utf-8?B?eDEwbk9pbjRJTFJmdWl4V1ErOGlLWGpPTVJsMjMzOHlKT21raEg5ajduQmhM?= =?utf-8?B?TGp3TlZvclI4VlNMQ3dEcGlJRFA3UkVackhJd05yU0gzcW1rbWg2SEFaSVl6?= =?utf-8?B?cjMwTDNVMzhEZ3lYZEpDSkxaaStLMkRRL0lXWVVRVVkwOUdKNkdwTmNMU25T?= =?utf-8?B?OWpkZlJ6bW9CeDZFTTFTeWNQWFduWTBOMktkZUd1cUt2dVlOS1ZCV1JOQ1Jm?= =?utf-8?B?TFhtWjlDSGo0dFFZa3E4eWNaL0l2Z0MzZ25KMlVwclQ4MC9GeXpXR2xHNWNy?= =?utf-8?B?SC96Z1pXYkRvT00rSGVOYTdnTm1pS2xlUHNnak8rdXhyV1BUVWxoYlB2cnVr?= =?utf-8?B?TWY3TUJsOThFVWY1YTBNNkxNOWVaSkFScGNGUnA2K2drNGpGbGl5cVZsY3Vo?= =?utf-8?B?YjQ2SFVaQmxPSWlSUnBDTksxQzJ1MnFlQUErS00reFNmZ0VaMkEzV2k0V0ZQ?= =?utf-8?Q?J/H5ejuP44p8bGtbWC90Qc1F4MkIDb8qwNDnY=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR11MB3934.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(7416014)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?UkZGK1pRSjdEd3llS2J6RENYc0xvOXV4SW95MEJPT1p3eVJMREgzdWtyOXQx?= =?utf-8?B?ZzNUK3dlTkdJa2xIRUxScWM2SXpidHczYUhXWDNuNS90cHdVckhDQmxlZ3I4?= =?utf-8?B?OVN1QktvQXptdlF1eDlJZjlWTExFdWJ2akJiVmhpREZTbWZzdVdNcllaQ2JV?= =?utf-8?B?bUVSS29LdnR1SXo2cjFNVEFsa0tObzFsWHJhQWJjaGJHV0F1SkVQcXFwRSsr?= =?utf-8?B?OS9QZ0EvRXBrZk1YeVFWNXh2L1FJcndtUllQTTNwK05jeXlVcUh5ZjY2R0tX?= =?utf-8?B?UUVHbXpIc0lJbWRNUkdLajRCUUxqZ2t3a0Z5Mk5LcU9kbmtTdERENUFqNFJW?= =?utf-8?B?ckJyRjk1ZzlSbmFYZWh1cmpvbUlOM1B3ZGRIZTlYYTcrMjFPR3YrejdVbERo?= =?utf-8?B?SzA3ZFMvY1o1bFdVR2xnQlY4T04yMjVsemFQbW9MaWdydVh1SjVLeFAvNW1p?= =?utf-8?B?Y2JRdk1CaGU3RTZIWXpIdG1adnpmSEM3WS9LWWlZaDJUNDVFdEE0UVcvN3NZ?= =?utf-8?B?bHFGV2Z4TUFtVG5CeGUzQXh3S1QwNlZmY3QwZ1pIYnJRNVFwekxCRVIwZC9r?= =?utf-8?B?d3ZaSEdhMDhqZEQ2RU9FaTdtNWRhYk4wTjdoK1JNYURtclE5VDEyVWp2ZVA1?= =?utf-8?B?Y1BwRzdlSWMwSFlNZjUvc2hEKzE2REVsQjFPMi92N2NRU3YzN2tUYW05RnFD?= =?utf-8?B?VCs3UmxyOXNRR0kyWjJnZER2S2puQXRabFI0WVl1aGNtclp5SDFQU1dUM1dS?= =?utf-8?B?ZCtmQ0hLTVRaZXhmMHRuazk1bWRSVk5mR240TmV5KzdQdlpWdWEycDA2NUNG?= =?utf-8?B?eVByVUo1aTdlQ0svd3pJSEVjbVRWZCt2S29lR0ZCeC9OYnluZW9xL1VlZFJE?= =?utf-8?B?d0FSRlR4TzBCbUVmNXVYUkdNSDBpcWJoU2xub0JLSXl5TmdUOUVCeTkza1Mv?= =?utf-8?B?VmZWOVBCRzJCOHFkNXVJRGlSL3ptbDUwT1Q3eU5FQjJLYk1BOHhPUG5rR1Z5?= =?utf-8?B?UkpQQ2E4bnZSNGdQc2xZbGFxODFHa2pzb2EybjZGMmdwbnloTmhEUFlXcXlS?= =?utf-8?B?MEQvVUQ3dnJHalJnUlVTVWEzTDFwSE9Ndm9MUzQrYVF2NEJaSUFZSFFlYVo5?= =?utf-8?B?M0wzcThPejVpNS9haTB3MFF1V3lhYmhvQVh4Ymt0WFNxN05PZ2VvUCs5eW5B?= =?utf-8?B?WHhTNmdiR2wvMkpzdWRKdVE2V1FEbFZtYjN5WmgvdEtKQ2ZNeEZqaDhidFdR?= =?utf-8?B?elV5NHJwYWpyajIzbk9jZ1dWTC9kVFVycXErYjBTSk1vWEc1SjM2bW5aUEJ2?= =?utf-8?B?YmVLemxTMVRSRWkxWkxkdmRFbThTdG9LOUFlcERjYkFGalVTRTR5dGw5QVFT?= =?utf-8?B?NjN4Y3lvbTR4K3lzMTloK1RBeng0eFBkaXg1RG5aRVRra1J1ZVlTTFozT0Ex?= =?utf-8?B?SDFqaFI2R24rNW4rRmlhRlh6S2lCN3JtajliTDlzL0pzZHljNHRHZnlNOFV1?= =?utf-8?B?VVlMK01yYnhyM2w4Zk53bHUwbW43MHlqdmsrY0lwMVlIYjFLZnJsK1NFaVBi?= =?utf-8?B?allUeXg3MUpIRlplM2UyM05zeVNaVThEVzl6Zmp5Q0hCdXdSaExKWHgybHdy?= =?utf-8?B?UlBUMzlsM01Ka3Z0NzZIcmxZQlJKM2JHMFhvd2RGTzBUTHQ4VDhac3EvVXRj?= =?utf-8?B?TVJkV0ZwRE91T01sbnZBdFNHRURHVStIMUNOZGRGU1BpQ0lOVzhEMWd3Mi9j?= =?utf-8?B?bVkxZUdxSDdqUE5la1d3Mmw4aUhIeDhCZklyVU80c3FwWGRvYVR6bGpvQ0Ux?= =?utf-8?B?WWZkWHc4Z3M1WXAxUXFFWkhaa2N4eUJ5VFRZNUlJUmRYMG91M0drcUVPWWtT?= =?utf-8?B?MlN2dDNzaDBBb1QwSHg4WlR5dFpxcnQ5Uk9XYktRMlIzcnFtMmlnYXpQVEpI?= =?utf-8?B?TU05c0l2Z1FiU0k2Y2hJMHNqNTdPNGFpV2ZNNUtDQWNJVFF6dEFVWWttSWk2?= =?utf-8?B?Vzl5Z0hGSUs1Q1o1V2U4V2FpOHhtTG5zYkkvb3pRM2FkazZCQ3FIZTVEZEoz?= =?utf-8?B?bFd3c2hmdzdwbDZ3TW85ZXFNbWtlSUdrOUVkZlU1VURiUVFKMzNDWG1vaUh5?= =?utf-8?B?bnM3NjlxV0NONmRlYUpNTWZXWHo3MmxLL1FzT1NmYllwRkNlVWpKUGJGMXU4?= =?utf-8?Q?CrBH4euudSgvoXXjIf1TbI4=3D?= X-MS-Exchange-CrossTenant-Network-Message-Id: af827897-fbcc-4868-1387-08ddeec04569 X-MS-Exchange-CrossTenant-AuthSource: MN2PR11MB3934.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Sep 2025 10:12:52.4865 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: lbmhOa57ctadh/YENOffhjPokll1wVrJ4vZOoELfIIaJWgDNRXeDwd9sfN0nK1yAo3Tx++gAn8xzr2JfFnkiUNQg2fxNtCEzFL9lXX0+4Bg= X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB5795 X-OriginatorOrg: intel.com X-Rspam-User: X-Rspamd-Server: rspam11 X-Rspamd-Queue-Id: 0F739C0006 X-Stat-Signature: uznk4mbs8suggeejhbf34xk39tcukfog X-HE-Tag: 1757326383-468623 X-HE-Meta: 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 f4e2vNGS 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 2025-09-06 at 19:18:33 +0200, Andrey Konovalov wrote: >On Mon, Aug 25, 2025 at 10:27 PM Maciej Wieczor-Retman > wrote: >> >> KASAN's tag-based mode defines multiple special tag values. They're >> reserved for: >> - Native kernel value. On arm64 it's 0xFF and it causes an early return >> in the tag checking function. >> - Invalid value. 0xFE marks an area as freed / unallocated. It's also >> the value that is used to initialize regions of shadow memory. >> - Max value. 0xFD is the highest value that can be randomly generated >> for a new tag. >> >> Metadata macro is also defined: >> - Tag width equal to 8. >> >> Tag-based mode on x86 is going to use 4 bit wide tags so all the above >> values need to be changed accordingly. >> >> Make native kernel tag arch specific for x86 and arm64. >> >> Replace hardcoded kernel tag value and tag width with macros in KASAN's >> non-arch specific code. >> >> Signed-off-by: Maciej Wieczor-Retman >> --- >> Changelog v5: >> - Move KASAN_TAG_MIN to the arm64 kasan-tags.h for the hardware KASAN >> mode case. >> >> Changelog v4: >> - Move KASAN_TAG_MASK to kasan-tags.h. >> >> Changelog v2: >> - Remove risc-v from the patch. >> >> MAINTAINERS | 2 +- >> arch/arm64/include/asm/kasan-tags.h | 13 +++++++++++++ >> arch/arm64/include/asm/kasan.h | 4 ---- >> arch/x86/include/asm/kasan-tags.h | 9 +++++++++ >> include/linux/kasan-tags.h | 10 +++++++++- >> include/linux/kasan.h | 4 +++- >> include/linux/mm.h | 6 +++--- >> include/linux/mmzone.h | 1 - >> include/linux/page-flags-layout.h | 9 +-------- >> 9 files changed, 39 insertions(+), 19 deletions(-) >> create mode 100644 arch/arm64/include/asm/kasan-tags.h >> create mode 100644 arch/x86/include/asm/kasan-tags.h >> >> diff --git a/MAINTAINERS b/MAINTAINERS >> index fed6cd812d79..788532771832 100644 >> --- a/MAINTAINERS >> +++ b/MAINTAINERS >> @@ -13176,7 +13176,7 @@ L: kasan-dev@googlegroups.com >> S: Maintained >> B: https://bugzilla.kernel.org/buglist.cgi?component=Sanitizers&product=Memory%20Management >> F: Documentation/dev-tools/kasan.rst >> -F: arch/*/include/asm/*kasan.h >> +F: arch/*/include/asm/*kasan*.h >> F: arch/*/mm/kasan_init* >> F: include/linux/kasan*.h >> F: lib/Kconfig.kasan >> diff --git a/arch/arm64/include/asm/kasan-tags.h b/arch/arm64/include/asm/kasan-tags.h >> new file mode 100644 >> index 000000000000..152465d03508 >> --- /dev/null >> +++ b/arch/arm64/include/asm/kasan-tags.h >> @@ -0,0 +1,13 @@ >> +/* SPDX-License-Identifier: GPL-2.0 */ >> +#ifndef __ASM_KASAN_TAGS_H >> +#define __ASM_KASAN_TAGS_H >> + >> +#define KASAN_TAG_KERNEL 0xFF /* native kernel pointers tag */ >> + >> +#define KASAN_TAG_WIDTH 8 >> + >> +#ifdef CONFIG_KASAN_HW_TAGS >> +#define KASAN_TAG_MIN 0xF0 /* minimum value for random tags */ >> +#endif >> + >> +#endif /* ASM_KASAN_TAGS_H */ >> diff --git a/arch/arm64/include/asm/kasan.h b/arch/arm64/include/asm/kasan.h >> index 4ab419df8b93..d2841e0fb908 100644 >> --- a/arch/arm64/include/asm/kasan.h >> +++ b/arch/arm64/include/asm/kasan.h >> @@ -7,10 +7,6 @@ >> #include >> #include >> >> -#ifdef CONFIG_KASAN_HW_TAGS >> -#define KASAN_TAG_MIN 0xF0 /* minimum value for random tags */ >> -#endif >> - >> #define arch_kasan_set_tag(addr, tag) __tag_set(addr, tag) >> #define arch_kasan_reset_tag(addr) __tag_reset(addr) >> #define arch_kasan_get_tag(addr) __tag_get(addr) >> diff --git a/arch/x86/include/asm/kasan-tags.h b/arch/x86/include/asm/kasan-tags.h >> new file mode 100644 >> index 000000000000..68ba385bc75c >> --- /dev/null >> +++ b/arch/x86/include/asm/kasan-tags.h >> @@ -0,0 +1,9 @@ >> +/* SPDX-License-Identifier: GPL-2.0 */ >> +#ifndef __ASM_KASAN_TAGS_H >> +#define __ASM_KASAN_TAGS_H >> + >> +#define KASAN_TAG_KERNEL 0xF /* native kernel pointers tag */ >> + >> +#define KASAN_TAG_WIDTH 4 >> + >> +#endif /* ASM_KASAN_TAGS_H */ >> diff --git a/include/linux/kasan-tags.h b/include/linux/kasan-tags.h >> index e07c896f95d3..fe80fa8f3315 100644 >> --- a/include/linux/kasan-tags.h >> +++ b/include/linux/kasan-tags.h >> @@ -2,7 +2,15 @@ >> #ifndef _LINUX_KASAN_TAGS_H >> #define _LINUX_KASAN_TAGS_H >> >> -#include >> +#if defined(CONFIG_KASAN_SW_TAGS) || defined(CONFIG_KASAN_HW_TAGS) >> +#include >> +#endif >> + >> +#ifndef KASAN_TAG_WIDTH >> +#define KASAN_TAG_WIDTH 0 >> +#endif >> + >> +#define KASAN_TAG_MASK ((1UL << KASAN_TAG_WIDTH) - 1) >> >> #ifndef KASAN_TAG_KERNEL >> #define KASAN_TAG_KERNEL 0xFF /* native kernel pointers tag */ >> diff --git a/include/linux/kasan.h b/include/linux/kasan.h >> index b396feca714f..54481f8c30c5 100644 >> --- a/include/linux/kasan.h >> +++ b/include/linux/kasan.h >> @@ -40,7 +40,9 @@ typedef unsigned int __bitwise kasan_vmalloc_flags_t; >> >> #ifdef CONFIG_KASAN_SW_TAGS >> /* This matches KASAN_TAG_INVALID. */ >> -#define KASAN_SHADOW_INIT 0xFE >> +#ifndef KASAN_SHADOW_INIT > >Do we need this ifndef? I just checked and you're right, it's not needed. I think it might have been a leftover of my dense mode code. > >> +#define KASAN_SHADOW_INIT KASAN_TAG_INVALID >> +#endif >> #else >> #define KASAN_SHADOW_INIT 0 >> #endif >> diff --git a/include/linux/mm.h b/include/linux/mm.h >> index 1ae97a0b8ec7..bb494cb1d5af 100644 >> --- a/include/linux/mm.h >> +++ b/include/linux/mm.h >> @@ -1692,7 +1692,7 @@ static inline u8 page_kasan_tag(const struct page *page) >> >> if (kasan_enabled()) { >> tag = (page->flags >> KASAN_TAG_PGSHIFT) & KASAN_TAG_MASK; >> - tag ^= 0xff; >> + tag ^= KASAN_TAG_KERNEL; >> } >> >> return tag; >> @@ -1705,7 +1705,7 @@ static inline void page_kasan_tag_set(struct page *page, u8 tag) >> if (!kasan_enabled()) >> return; >> >> - tag ^= 0xff; >> + tag ^= KASAN_TAG_KERNEL; >> old_flags = READ_ONCE(page->flags); >> do { >> flags = old_flags; >> @@ -1724,7 +1724,7 @@ static inline void page_kasan_tag_reset(struct page *page) >> >> static inline u8 page_kasan_tag(const struct page *page) >> { >> - return 0xff; >> + return KASAN_TAG_KERNEL; >> } >> >> static inline void page_kasan_tag_set(struct page *page, u8 tag) { } >> diff --git a/include/linux/mmzone.h b/include/linux/mmzone.h >> index 0c5da9141983..c139fb3d862d 100644 >> --- a/include/linux/mmzone.h >> +++ b/include/linux/mmzone.h >> @@ -1166,7 +1166,6 @@ static inline bool zone_is_empty(struct zone *zone) >> #define NODES_MASK ((1UL << NODES_WIDTH) - 1) >> #define SECTIONS_MASK ((1UL << SECTIONS_WIDTH) - 1) >> #define LAST_CPUPID_MASK ((1UL << LAST_CPUPID_SHIFT) - 1) >> -#define KASAN_TAG_MASK ((1UL << KASAN_TAG_WIDTH) - 1) > >So we cannot define this here because of include dependencies? Having >this value defined here would look cleaner. > >Otherwise, let's add a comment here with a reference to where this >value is defined. I'll retest with a couple of configs but I removed this change and everything compile fine. Thanks for noticing that > >> #define ZONEID_MASK ((1UL << ZONEID_SHIFT) - 1) >> >> static inline enum zone_type page_zonenum(const struct page *page) >> diff --git a/include/linux/page-flags-layout.h b/include/linux/page-flags-layout.h >> index 760006b1c480..b2cc4cb870e0 100644 >> --- a/include/linux/page-flags-layout.h >> +++ b/include/linux/page-flags-layout.h >> @@ -3,6 +3,7 @@ >> #define PAGE_FLAGS_LAYOUT_H >> >> #include >> +#include >> #include >> >> /* >> @@ -72,14 +73,6 @@ >> #define NODE_NOT_IN_PAGE_FLAGS 1 >> #endif >> >> -#if defined(CONFIG_KASAN_SW_TAGS) >> -#define KASAN_TAG_WIDTH 8 >> -#elif defined(CONFIG_KASAN_HW_TAGS) >> -#define KASAN_TAG_WIDTH 4 > >This case is removed here but not added to arch/arm64/include/asm/kasan-tags.h. Right, I'll correct that. > > >> -#else >> -#define KASAN_TAG_WIDTH 0 >> -#endif >> - >> #ifdef CONFIG_NUMA_BALANCING >> #define LAST__PID_SHIFT 8 >> #define LAST__PID_MASK ((1 << LAST__PID_SHIFT)-1) >> -- >> 2.50.1 >> -- Kind regards Maciej Wieczór-Retman