Received: by 2002:a05:6a10:144:0:0:0:0 with SMTP id 4csp204658pxw; Fri, 8 Apr 2022 05:32:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx+084TcxRO2ytlU7z5F2eSSzHUf87pwE3kIik3NHsOFdlvPJcyTPclAUE91XKutzWdwgpg X-Received: by 2002:a17:90a:fc91:b0:1ca:ad65:fa98 with SMTP id ci17-20020a17090afc9100b001caad65fa98mr21748280pjb.232.1649421145325; Fri, 08 Apr 2022 05:32:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649421145; cv=none; d=google.com; s=arc-20160816; b=qwwR3VzFInOw17H4uSDRPNShQHrpHSoNiH0dt4CC4zc8TExGrDJNNv321GdDghJjYR 9F77Djeb9R9Z1RCR3fj7xPn9TrKZWY6ESgtiaIer6CmVU0pm7Lba4SKj2AfE0xxKV51R 39fmrOl3v5vnL6UJVP53Gxf24K9DPVE/MccFZ7cFUd5XU2JlJ0vSYX1S/Qv2+rWVQsya c6dunipRqID46MsU01XQA9bo4QLKvXpw7gHfpiQz2HLwWHjGwJjM0mwVEJKhSMZnZ7qB HtKK30n8JEaOYd3LJA+JLLFVCmUpdynQLgmvB/BfNV39jvxZridQZCZn0GuH/E4HHxP3 n4iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=DMcaM0BUS8LeTh2nUi9yDR5zGYAZMrs17IKHZBbwZGs=; b=TLQJWBChLBWxLkU25obapK3Cn0j0wiPuADqUNKVNVkxfXvEg07a7G6VQcsqREFvewW ImT6gr2Gw7NoidIIMvnHsXPGD33RYYRW82Mg9XuIJkU/sJCaB1ps5RgaNiU8lag2ZPVJ G3Y8W2sC+qW2KrjowQv32T9ucwlgzYNuAlCHGpjz+1lwryAoJm1flUQ7+pW+DTlMI0ag GRuIrzE00laD3HRiYA8dg9AqfOV9nHD0OmhrlXS/PjXTO0MKxpkMUzCZ09WmvsCiCHOI WnWbasgdkn3Sk5KqtLBlNKXsmtWTr83fL89eAcEROe2S5YsDrb6d9nLohNxvG0wfl++k FC9Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l10-20020a170903244a00b00153b2d16428si816379pls.48.2022.04.08.05.32.12; Fri, 08 Apr 2022 05:32:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234383AbiDHKGx (ORCPT + 99 others); Fri, 8 Apr 2022 06:06:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58690 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234401AbiDHKGj (ORCPT ); Fri, 8 Apr 2022 06:06:39 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 18B2ADB2E7 for ; Fri, 8 Apr 2022 03:04:24 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id AEA2F139F; Fri, 8 Apr 2022 03:04:01 -0700 (PDT) Received: from e119884-lin.cambridge.arm.com (e119884-lin.cambridge.arm.com [10.1.196.72]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 4002A3F73B; Fri, 8 Apr 2022 03:04:00 -0700 (PDT) From: Vincenzo Frascino To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Cc: vincenzo.frascino@arm.com, Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Andrew Morton , Catalin Marinas , Will Deacon Subject: [PATCH] kasan: Fix hw tags enablement when KUNIT tests are disabled Date: Fri, 8 Apr 2022 11:03:40 +0100 Message-Id: <20220408100340.43620-1-vincenzo.frascino@arm.com> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Kasan enables hw tags via kasan_enable_tagging() which based on the mode passed via kernel command line selects the correct hw backend. kasan_enable_tagging() is meant to be invoked indirectly via the cpu features framework of the architectures that support these backends. Currently the invocation of this function is guarded by CONFIG_KASAN_KUNIT_TEST which allows the enablement of the correct backend only when KUNIT tests are enabled in the kernel. This inconsistency was introduced in commit: f05842cfb9ae2 ("kasan, arm64: allow using KUnit tests with HW_TAGS mode") ... and prevents to enable MTE on arm64 when KUNIT tests for kasan hw_tags are disabled. Fix the issue making sure that the CONFIG_KASAN_KUNIT_TEST guard does not prevent the correct invocation of kasan_enable_tagging(). Fixes: f05842cfb9ae2 ("kasan, arm64: allow using KUnit tests with HW_TAGS mode") Cc: Andrey Ryabinin Cc: Alexander Potapenko Cc: Andrey Konovalov Cc: Dmitry Vyukov Cc: Andrew Morton Cc: Catalin Marinas Cc: Will Deacon Signed-off-by: Vincenzo Frascino --- mm/kasan/hw_tags.c | 4 ++-- mm/kasan/kasan.h | 10 ++++++---- 2 files changed, 8 insertions(+), 6 deletions(-) diff --git a/mm/kasan/hw_tags.c b/mm/kasan/hw_tags.c index 07a76c46daa5..e2677501c36e 100644 --- a/mm/kasan/hw_tags.c +++ b/mm/kasan/hw_tags.c @@ -336,8 +336,6 @@ void __kasan_poison_vmalloc(const void *start, unsigned long size) #endif -#if IS_ENABLED(CONFIG_KASAN_KUNIT_TEST) - void kasan_enable_tagging(void) { if (kasan_arg_mode == KASAN_ARG_MODE_ASYNC) @@ -349,6 +347,8 @@ void kasan_enable_tagging(void) } EXPORT_SYMBOL_GPL(kasan_enable_tagging); +#if IS_ENABLED(CONFIG_KASAN_KUNIT_TEST) + void kasan_force_async_fault(void) { hw_force_async_tag_fault(); diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h index d79b83d673b1..b01b4bbe0409 100644 --- a/mm/kasan/kasan.h +++ b/mm/kasan/kasan.h @@ -355,25 +355,27 @@ static inline const void *arch_kasan_set_tag(const void *addr, u8 tag) #define hw_set_mem_tag_range(addr, size, tag, init) \ arch_set_mem_tag_range((addr), (size), (tag), (init)) +void kasan_enable_tagging(void); + #else /* CONFIG_KASAN_HW_TAGS */ #define hw_enable_tagging_sync() #define hw_enable_tagging_async() #define hw_enable_tagging_asymm() +static inline void kasan_enable_tagging(void) { } + #endif /* CONFIG_KASAN_HW_TAGS */ #if defined(CONFIG_KASAN_HW_TAGS) && IS_ENABLED(CONFIG_KASAN_KUNIT_TEST) -void kasan_enable_tagging(void); void kasan_force_async_fault(void); -#else /* CONFIG_KASAN_HW_TAGS || CONFIG_KASAN_KUNIT_TEST */ +#else /* CONFIG_KASAN_HW_TAGS && CONFIG_KASAN_KUNIT_TEST */ -static inline void kasan_enable_tagging(void) { } static inline void kasan_force_async_fault(void) { } -#endif /* CONFIG_KASAN_HW_TAGS || CONFIG_KASAN_KUNIT_TEST */ +#endif /* CONFIG_KASAN_HW_TAGS && CONFIG_KASAN_KUNIT_TEST */ #ifdef CONFIG_KASAN_SW_TAGS u8 kasan_random_tag(void); -- 2.35.1