Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp429966pxb; Wed, 11 Nov 2020 07:14:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJzlg9lOEGHng2S4V7MLPzIe+S/E+MXb/4VK6GheCCkCxtQeTN5J5oEh3wMK/+Uhk2avKXHI X-Received: by 2002:aa7:c512:: with SMTP id o18mr24481326edq.357.1605107650229; Wed, 11 Nov 2020 07:14:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605107650; cv=none; d=google.com; s=arc-20160816; b=CQti1FZC7MXwBIYhOvyK0SHs8USQQ+B0eAzzwWnO2DAWJFg57/ziHkaRH2cBgERkVu K5Z/p5oUFYg2+qexzcekxIrI+awyUF67IgqKWdl9SmjTBoNuSvw3FDMIVb77VqgKLuHd jqQm0lMvlf4Lr0GTJ5hYaaTi2N/fSy87C1aUvQEPpdH4im849Ct1x/Mij6RWYq2YK8Ry 7aGpfKe44WWpLVpTEGc3AarX8+KZ9OakYArXabVt+Qo/Wl95NUHW9s7J8JijQl4iKD38 fJVCjo8ZiJYQk6STImLqefiFj8DuTWwasyelig1RXrTNsaC+u83wtS2jXA/zny1/ddFq L0Yg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=AP20IjKPEiFXMZmCcqvgPxuG9Q2kK77mjoFZj0OZZoQ=; b=KTuyFNwpfhynXNHjMDxeSBQtaUx/O/tvHTAL1OwJhrilkKLAgpLhDCjtDQYFUGzUH+ psIpQduU5L8P/u4hO/SZZOn8Z9MmJ2+9wHaQTwIscWBNYP7YEcEbxi+A66+7aiKTgb67 pf1jggFBTbI13WswG7uoLYC167hc/P26Y0PoGw4erYirpPgOtOsVZaI8zpeq+iV5g+sX +njVdQ69TAEavOaBtaR4cWBqbfrPMTguEimWJAxF9CmaDokkkc4aSTR43YyiPNY6WDPr vjN8HWiwyleYTPkDr93UaYhlGwYGNwMOIz04oNi3I1TcTp4qI9JjNXdx1n0T9dPkzR12 uTGQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=lW1TBKqi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id pk19si1433318ejb.413.2020.11.11.07.13.43; Wed, 11 Nov 2020 07:14:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=lW1TBKqi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726412AbgKKPJL (ORCPT + 99 others); Wed, 11 Nov 2020 10:09:11 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40634 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725908AbgKKPJI (ORCPT ); Wed, 11 Nov 2020 10:09:08 -0500 Received: from mail-qk1-x743.google.com (mail-qk1-x743.google.com [IPv6:2607:f8b0:4864:20::743]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 79CB7C0613D1 for ; Wed, 11 Nov 2020 07:09:08 -0800 (PST) Received: by mail-qk1-x743.google.com with SMTP id 11so1928334qkd.5 for ; Wed, 11 Nov 2020 07:09:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=AP20IjKPEiFXMZmCcqvgPxuG9Q2kK77mjoFZj0OZZoQ=; b=lW1TBKqiHfp1CIKpViQDUNAHCra8fhHaB43Vddd/gI2W6QjdTQ+C67NLugPEf5ywNV Hdh6WNIxkyUUkRBOFLwF7FjlqCfMB26gdW/rPHiyJT700zYb1hIW0NsgrsjiRl4aiZpe vTcUx4kFlZWPphLXajq2J0oCwnONR7VKEX10VlcSdL0ohHQnyQlLTyrU7sm8tM2wGOQb THLhNxZFSVFETbZhXdG0nEX/QBsA9QWnbB3fi4zhhe8OCIxUBGBzHxeA9bt49chsWB6E 8siXfeXF9hcTeik8luSgil6mber5Bp7rWpCq/hCmBxaJNKEmYhLgm7Im1Rl3RQp9Xotz Xd/Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=AP20IjKPEiFXMZmCcqvgPxuG9Q2kK77mjoFZj0OZZoQ=; b=dGR/5Y4nqRk90SjZr4/sPEuAWwAnHZl0x0K5wIKNCZKIqYsZn7m7EFzR5jJGrJFKLN goxYBDk3jsAWEacoDftQk5R3FvoWWYN+sUcV5uXLhJVls5HTZJUk73QW5O/BvvkVHQ0c vT7j3bu3nbFvovdPu65x8DEouGJMC8cEz/aD1+RvcJhX8cyYr11T+RE+PRwAImJouTD7 FngbZ91OOZrW8ADy4El8d66PACk963xbpK0Froavuvf1xWlZgZi4OOVaC+dV1QLQNCy0 teSouvioAQmRmDDfdagm9Vj5rEUNIRx5c/4ymfQGbnKqecehdU+dy1KBRggoA1ocrh9d eDdw== X-Gm-Message-State: AOAM5300eWb9lty5l/u/hrLsz29CcUb7wtSlxfsQs5383QrGFaBtmuVu dmrPSnPw8b/cxng8PfJdDzg6Nuq01rzIzFKuZNb/ag== X-Received: by 2002:a37:4552:: with SMTP id s79mr19382613qka.6.1605107347099; Wed, 11 Nov 2020 07:09:07 -0800 (PST) MIME-Version: 1.0 References: <49f7f2c12b0d5805f9a7b7092b986bbc2dd077a1.1605046192.git.andreyknvl@google.com> In-Reply-To: <49f7f2c12b0d5805f9a7b7092b986bbc2dd077a1.1605046192.git.andreyknvl@google.com> From: Alexander Potapenko Date: Wed, 11 Nov 2020 16:08:55 +0100 Message-ID: Subject: Re: [PATCH v9 21/44] kasan: kasan_non_canonical_hook only for software modes To: Andrey Konovalov Cc: Catalin Marinas , Will Deacon , Vincenzo Frascino , Dmitry Vyukov , Andrey Ryabinin , Marco Elver , Evgenii Stepanov , Branislav Rankov , Kevin Brodsky , Andrew Morton , kasan-dev , Linux ARM , Linux Memory Management List , LKML Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Nov 10, 2020 at 11:11 PM Andrey Konovalov w= rote: > > This is a preparatory commit for the upcoming addition of a new hardware > tag-based (MTE-based) KASAN mode. > > kasan_non_canonical_hook() is only applicable to KASAN modes that use > shadow memory, and won't be needed for hardware tag-based KASAN. > > No functional changes for software modes. > > Signed-off-by: Andrey Konovalov > Signed-off-by: Vincenzo Frascino > Reviewed-by: Marco Elver > --- > Change-Id: Icc9f5ef100a2e86f3a4214a0c3131a68266181b2 > --- > mm/kasan/report.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/mm/kasan/report.c b/mm/kasan/report.c > index 5d5733831ad7..594bad2a3a5e 100644 > --- a/mm/kasan/report.c > +++ b/mm/kasan/report.c > @@ -403,7 +403,8 @@ bool kasan_report(unsigned long addr, size_t size, bo= ol is_write, > return ret; > } > > -#ifdef CONFIG_KASAN_INLINE > +#if (defined(CONFIG_KASAN_GENERIC) || defined(CONFIG_KASAN_SW_TAGS)) && = \ > + defined(CONFIG_KASAN_INLINE) > /* > * With CONFIG_KASAN_INLINE, accesses to bogus pointers (outside the hig= h > * canonical half of the address space) cause out-of-bounds shadow memor= y reads Perhaps this comment also needs to be updated. > -- > 2.29.2.222.g5d2a92d10f8-goog > --=20 Alexander Potapenko Software Engineer Google Germany GmbH Erika-Mann-Stra=C3=9Fe, 33 80636 M=C3=BCnchen Gesch=C3=A4ftsf=C3=BChrer: Paul Manicle, Halimah DeLaine Prado Registergericht und -nummer: Hamburg, HRB 86891 Sitz der Gesellschaft: Hamburg