Received: by 2002:a05:6a10:144:0:0:0:0 with SMTP id 4csp214955pxw; Fri, 8 Apr 2022 05:52:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJytta8PrELWyRMH5FVcFQuLE4Yf9EUyD4vZUlBzjNImpli/HusgzYbBfko2tZeIKr763MBC X-Received: by 2002:a17:90b:4c49:b0:1c7:d6c1:bb0f with SMTP id np9-20020a17090b4c4900b001c7d6c1bb0fmr21571383pjb.230.1649422321484; Fri, 08 Apr 2022 05:52:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649422321; cv=none; d=google.com; s=arc-20160816; b=Q7trA0i9untc2NV944f5Fc8s40hBMvMCPW+lstH4sPG5dih19C4v8SbkAJahKb1ICL glW+X1LUe4eylcg3Dx1AJjyBuvYoueGfylL9UQNMDJcFxcOYK9e9Lf8ltr6sXC2o3o8X +rwXRb1BBRM+O2DVy1ZwSVz7bJqD3om9OorTrJs3ehPuA0gdaiAt8EswvIufsYFbVf7D B7gie4Gkab1FRiWhrN8amWa7oudrGLzuf9YNDyNF411SPT/7KBV5kaY3d+D0KQSHUPqE mdFCzgGCl8pLeb2eAlIy7dIWr0ntUGw4a0jgt+QHXHuI6aSw5Eh8JirIivy82wN1DtjI DirA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=+S0fdFHbHrpV0WfWMPU0KwDEp2iLVxk2KWTOjTDn7JI=; b=wr4E/pOfBfQrzfzDWXnKMrisOD6BLgkllE9HHecfBne8xK/dRS65EOdYVlrVuzvfdi Qh2G/8HUwz9HxETIOoTOnxQaqqimhsODiHWn5PrzG3xdAh7tyk0msMoMQ+kwb/CEOzdV WAgj32NmqgHD5BjO6nxi+bI5pnBwzEqXCBVqTyme8o1XfptblCn+2qP7nCH1S3+mryqt gQ0aV5XWZDz03YyHED2YRneDZMhyTecYcOCJh1Dmj+dywpWSxClCYaFcRGy8kN2iZaVp SfnHlnKUL5TA/3F+9qrQ8AiR38raYOYe+xKkqN2/l2emebRylXy0a9v5v0dH6PZetMiN rswg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t10-20020a056a0021ca00b004fa3a8dfffesi1030919pfj.181.2022.04.08.05.51.46; Fri, 08 Apr 2022 05:52:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235595AbiDHMpi (ORCPT + 99 others); Fri, 8 Apr 2022 08:45:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35282 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235117AbiDHMph (ORCPT ); Fri, 8 Apr 2022 08:45:37 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 851B73585F for ; Fri, 8 Apr 2022 05:43:33 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 117BB113E; Fri, 8 Apr 2022 05:43:33 -0700 (PDT) Received: from e119884-lin.cambridge.arm.com (e119884-lin.cambridge.arm.com [10.1.196.72]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 9C4E73F5A1; Fri, 8 Apr 2022 05:43:31 -0700 (PDT) From: Vincenzo Frascino To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Cc: vincenzo.frascino@arm.com, Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Andrew Morton , Catalin Marinas , Will Deacon Subject: [PATCH v2] kasan: Fix hw tags enablement when KUNIT tests are disabled Date: Fri, 8 Apr 2022 13:43:23 +0100 Message-Id: <20220408124323.10028-1-vincenzo.frascino@arm.com> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Kasan enables hw tags via kasan_enable_tagging() which based on the mode passed via kernel command line selects the correct hw backend. kasan_enable_tagging() is meant to be invoked indirectly via the cpu features framework of the architectures that support these backends. Currently the invocation of this function is guarded by CONFIG_KASAN_KUNIT_TEST which allows the enablement of the correct backend only when KUNIT tests are enabled in the kernel. This inconsistency was introduced in commit: ed6d74446cbf ("kasan: test: support async (again) and asymm modes for HW_TAGS") ... and prevents to enable MTE on arm64 when KUNIT tests for kasan hw_tags are disabled. Fix the issue making sure that the CONFIG_KASAN_KUNIT_TEST guard does not prevent the correct invocation of kasan_enable_tagging(). Fixes: ed6d74446cbf ("kasan: test: support async (again) and asymm modes for HW_TAGS") Cc: Andrey Ryabinin Cc: Alexander Potapenko Cc: Andrey Konovalov Cc: Dmitry Vyukov Cc: Andrew Morton Cc: Catalin Marinas Cc: Will Deacon Signed-off-by: Vincenzo Frascino --- mm/kasan/hw_tags.c | 5 +++-- mm/kasan/kasan.h | 10 ++++++---- 2 files changed, 9 insertions(+), 6 deletions(-) diff --git a/mm/kasan/hw_tags.c b/mm/kasan/hw_tags.c index 07a76c46daa5..9e1b6544bfa8 100644 --- a/mm/kasan/hw_tags.c +++ b/mm/kasan/hw_tags.c @@ -336,8 +336,6 @@ void __kasan_poison_vmalloc(const void *start, unsigned long size) #endif -#if IS_ENABLED(CONFIG_KASAN_KUNIT_TEST) - void kasan_enable_tagging(void) { if (kasan_arg_mode == KASAN_ARG_MODE_ASYNC) @@ -347,6 +345,9 @@ void kasan_enable_tagging(void) else hw_enable_tagging_sync(); } + +#if IS_ENABLED(CONFIG_KASAN_KUNIT_TEST) + EXPORT_SYMBOL_GPL(kasan_enable_tagging); void kasan_force_async_fault(void) diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h index d79b83d673b1..b01b4bbe0409 100644 --- a/mm/kasan/kasan.h +++ b/mm/kasan/kasan.h @@ -355,25 +355,27 @@ static inline const void *arch_kasan_set_tag(const void *addr, u8 tag) #define hw_set_mem_tag_range(addr, size, tag, init) \ arch_set_mem_tag_range((addr), (size), (tag), (init)) +void kasan_enable_tagging(void); + #else /* CONFIG_KASAN_HW_TAGS */ #define hw_enable_tagging_sync() #define hw_enable_tagging_async() #define hw_enable_tagging_asymm() +static inline void kasan_enable_tagging(void) { } + #endif /* CONFIG_KASAN_HW_TAGS */ #if defined(CONFIG_KASAN_HW_TAGS) && IS_ENABLED(CONFIG_KASAN_KUNIT_TEST) -void kasan_enable_tagging(void); void kasan_force_async_fault(void); -#else /* CONFIG_KASAN_HW_TAGS || CONFIG_KASAN_KUNIT_TEST */ +#else /* CONFIG_KASAN_HW_TAGS && CONFIG_KASAN_KUNIT_TEST */ -static inline void kasan_enable_tagging(void) { } static inline void kasan_force_async_fault(void) { } -#endif /* CONFIG_KASAN_HW_TAGS || CONFIG_KASAN_KUNIT_TEST */ +#endif /* CONFIG_KASAN_HW_TAGS && CONFIG_KASAN_KUNIT_TEST */ #ifdef CONFIG_KASAN_SW_TAGS u8 kasan_random_tag(void); -- 2.35.1