Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp661037pxb; Tue, 2 Feb 2021 14:43:50 -0800 (PST) X-Google-Smtp-Source: ABdhPJyk7MkWM4U/R/xbTzl+bwVX8nHQCDqCIErkP0v4Hs5t/3LvaUSCzBmNJRZ5ecbFbvBfg8MK X-Received: by 2002:a05:6402:149a:: with SMTP id e26mr312654edv.254.1612305830134; Tue, 02 Feb 2021 14:43:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612305830; cv=none; d=google.com; s=arc-20160816; b=GLt4SMEXsd95c/eNeDekJ0ihMo6txXNzBOcTBKXzUHRahHMLNxo7xKEe7lhDeZkoBl XmOBr3SjAWp63gFGlUypjvTEUcruvSnaq+gErZ62viD4xtcwCWbp+oQfkF3pUjgpErS3 4uP774D5u5IGn6cOAdcn+l7CLPTU3o9Gpzd8Xyl2felAd86YvLQOXVn/O5ccwWxl1AX4 3mJvvrSQEhYVKs+7TFOQvsT8n9PljkF4GjRaIl+FWZ1cuJGsjCByOCBnXdQSxwVP7Y9M BAMGgfjalq8rvNbphEakudmHkr0gtc5wDqbKr6a0WinT1eOHul+a8fS92i97tgO3JNxZ 6k2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=HRMHSeSB4EsKMZWQxXI/w1Azj1+afQ0bxrhrIMhv1dM=; b=k28Ou4T4+f9eaVwkxWkn4UW2uPCXkW8E+vpD0hj51+wUv3nCP5w1NPc3FYf4oMhwhp 2HCpWzSl1jFvAAMMNL0Ev/mCDSqneW3zIHrwJn+Qb4FqU1NVTX4UzT8li4uCCdZo0gl2 APFbPDbzicyg+FRpuu2mfHqa+/62fM26jvq+9XLIYSlBnPNOzN5slvfJaYPtO/JgaSBe uAWv3C/RH75dh7wagMimGIJME2NMI88WLWuLt5+uev5f4oMwayETaWSSWPxGZnWWDE6d M5hrPui47h/QsKRiLz/teEZKjscaqCQB0F+S/YnB6QSIgFO4B1rZQup2C4fnvYakdnIC FH3A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g17si58690edm.532.2021.02.02.14.43.24; Tue, 02 Feb 2021 14:43:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235705AbhBBPnh (ORCPT + 99 others); Tue, 2 Feb 2021 10:43:37 -0500 Received: from mail.kernel.org ([198.145.29.99]:46134 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235752AbhBBPmr (ORCPT ); Tue, 2 Feb 2021 10:42:47 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id F04BF64F4B; Tue, 2 Feb 2021 15:42:03 +0000 (UTC) Date: Tue, 2 Feb 2021 15:42:01 +0000 From: Catalin Marinas To: Andrey Konovalov Cc: Vincenzo Frascino , Dmitry Vyukov , Alexander Potapenko , Marco Elver , Andrew Morton , Will Deacon , Andrey Ryabinin , Peter Collingbourne , Evgenii Stepanov , Branislav Rankov , Kevin Brodsky , kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 10/12] arm64: kasan: simplify and inline MTE functions Message-ID: <20210202154200.GC26895@gaia> References: <17d6bef698d193f5fe0d8baee0e232a351e23a32.1612208222.git.andreyknvl@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <17d6bef698d193f5fe0d8baee0e232a351e23a32.1612208222.git.andreyknvl@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Feb 01, 2021 at 08:43:34PM +0100, Andrey Konovalov wrote: > +/* > + * Assign allocation tags for a region of memory based on the pointer tag. > + * Note: The address must be non-NULL and MTE_GRANULE_SIZE aligned and > + * size must be non-zero and MTE_GRANULE_SIZE aligned. > + */ OK, so we rely on the caller to sanity-check the range. Fine by me but I can see (un)poison_range() only doing this for the size. Do we guarantee that the start address is aligned? > +static __always_inline void mte_set_mem_tag_range(void *addr, size_t size, u8 tag) > +{ > + u64 curr, end; > + > + if (!size) > + return; > + > + curr = (u64)__tag_set(addr, tag); > + end = curr + size; > + > + do { > + /* > + * 'asm volatile' is required to prevent the compiler to move > + * the statement outside of the loop. > + */ > + asm volatile(__MTE_PREAMBLE "stg %0, [%0]" > + : > + : "r" (curr) > + : "memory"); > + > + curr += MTE_GRANULE_SIZE; > + } while (curr != end); > +} > > void mte_enable_kernel_sync(void); > void mte_enable_kernel_async(void); > @@ -47,10 +95,12 @@ static inline u8 mte_get_mem_tag(void *addr) > { > return 0xFF; > } > + > static inline u8 mte_get_random_tag(void) > { > return 0xFF; > } > + > static inline void *mte_set_mem_tag_range(void *addr, size_t size, u8 tag) This function used to return a pointer and that's what the dummy static inline does here. However, the new mte_set_mem_tag_range() doesn't return anything. We should have consistency between the two (the new static void definition is fine by me). Otherwise the patch looks fine. Reviewed-by: Catalin Marinas