From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-24.8 required=3.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_SANE_1,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B329EC433E0 for ; Mon, 8 Mar 2021 11:23:29 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 646D1650F2 for ; Mon, 8 Mar 2021 11:23:29 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231933AbhCHLXB (ORCPT ); Mon, 8 Mar 2021 06:23:01 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44262 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231922AbhCHLWe (ORCPT ); Mon, 8 Mar 2021 06:22:34 -0500 Received: from mail-wr1-x436.google.com (mail-wr1-x436.google.com [IPv6:2a00:1450:4864:20::436]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 670D4C06174A for ; Mon, 8 Mar 2021 03:22:34 -0800 (PST) Received: by mail-wr1-x436.google.com with SMTP id 7so11058104wrz.0 for ; Mon, 08 Mar 2021 03:22:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=jdrzG39EB3vDtExSyNYnnHyOb0pzwYrAbQOXS4G/YIk=; b=fXimUib1Ki2jO88koiRaev0dqaJ0It6tg5HCP3ZN0skF7qCZmeFFo/uDZrxJgH4oyQ UZ9vWu6xNZOtNg5hmqUNkVroXkZlLl5fWwaMFXdUmSwS6A+rHav9abrQPa5rTDzDonBU KkFzcImxLdkjFevnExlCcdtgC0nJEuL+K26+p5/vbMggQ3qy+alN6+5Hoj7msSAjVQ+5 G1W2PHNWFUaehVz9Nt/vwz0+TLSttv32PZVYwsl8zgfKJurpsq2UxKPL33cNi4smR3LQ m6UIFM6KlsC1ORvKUhi4oixsULQOjXTadSO8CBr1sdb86d2T+ZwkW1dvw7nJSMOUrbl6 +GQw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=jdrzG39EB3vDtExSyNYnnHyOb0pzwYrAbQOXS4G/YIk=; b=igzIszvbJ5ku1CMDI1+o8XHUsm43ygnUKBjypnqhq0xvy9H1FdqqWNDcgAXvCZwJO7 Hbk4zs6XdEvAb0IlgiHwM9xAWCr2xI8ahfuozUl42BzM0IM9Q3A1KUxzBMsf204/GN7k s4AOI9zsbU3pQog+m1KMT781xOwCw8hNx+bFf4KPwfo29Gs22hxCC42xnk3Bmv2UzsWg vBYHEYuyLEUBbx/mBa/3ItymM1+CtZK3PKWPCCFieJm0XnUQBNlS+a94YaIQzZ2COMoT DyY41ntKEXngiTcl0h6YbsFCcMBhWyW9gbYqsMUD1dcL5nRGJsx3eDyS6tlzO+MjJzPl Uk8A== X-Gm-Message-State: AOAM530wuyGRYwh5sAIzv6K6AR4Ty9CR4Ef5Kdrdp7BMWeYOz+azqPK1 GwM+BAB9/VyvZc7+dMeIgMJ/pw== X-Google-Smtp-Source: ABdhPJyAHOwiac02DfQVZeu4oKIh/d5exFaAdX6QWnq/RGwetm++k7rofI4cTn6OxX4UbgwL9TChcw== X-Received: by 2002:a5d:6446:: with SMTP id d6mr22094155wrw.328.1615202553053; Mon, 08 Mar 2021 03:22:33 -0800 (PST) Received: from elver.google.com ([2a00:79e0:15:13:9d1d:b6a0:d116:531b]) by smtp.gmail.com with ESMTPSA id u63sm17942821wmg.24.2021.03.08.03.22.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 08 Mar 2021 03:22:31 -0800 (PST) Date: Mon, 8 Mar 2021 12:22:25 +0100 From: Marco Elver To: Andrey Konovalov Cc: Alexander Potapenko , Andrew Morton , Catalin Marinas , Will Deacon , Vincenzo Frascino , Dmitry Vyukov , Andrey Ryabinin , Peter Collingbourne , Evgenii Stepanov , Branislav Rankov , Kevin Brodsky , kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 1/5] arm64: kasan: allow to init memory when setting tags Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/2.0.5 (2021-01-21) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Mar 06, 2021 at 01:15AM +0100, Andrey Konovalov wrote: > This change adds an argument to mte_set_mem_tag_range() that allows > to enable memory initialization when settinh the allocation tags. > The implementation uses stzg instruction instead of stg when this > argument indicates to initialize memory. > > Combining setting allocation tags with memory initialization will > improve HW_TAGS KASAN performance when init_on_alloc/free is enabled. > > This change doesn't integrate memory initialization with KASAN, > this is done is subsequent patches in this series. > > Signed-off-by: Andrey Konovalov Acked-by: Marco Elver > --- > arch/arm64/include/asm/memory.h | 4 ++-- > arch/arm64/include/asm/mte-kasan.h | 20 ++++++++++++++------ > mm/kasan/kasan.h | 9 +++++---- > 3 files changed, 21 insertions(+), 12 deletions(-) > > diff --git a/arch/arm64/include/asm/memory.h b/arch/arm64/include/asm/memory.h > index c759faf7a1ff..f1ba48b4347d 100644 > --- a/arch/arm64/include/asm/memory.h > +++ b/arch/arm64/include/asm/memory.h > @@ -248,8 +248,8 @@ static inline const void *__tag_set(const void *addr, u8 tag) > #define arch_init_tags(max_tag) mte_init_tags(max_tag) > #define arch_get_random_tag() mte_get_random_tag() > #define arch_get_mem_tag(addr) mte_get_mem_tag(addr) > -#define arch_set_mem_tag_range(addr, size, tag) \ > - mte_set_mem_tag_range((addr), (size), (tag)) > +#define arch_set_mem_tag_range(addr, size, tag, init) \ > + mte_set_mem_tag_range((addr), (size), (tag), (init)) > #endif /* CONFIG_KASAN_HW_TAGS */ > > /* > diff --git a/arch/arm64/include/asm/mte-kasan.h b/arch/arm64/include/asm/mte-kasan.h > index 7ab500e2ad17..35fe549f7ea4 100644 > --- a/arch/arm64/include/asm/mte-kasan.h > +++ b/arch/arm64/include/asm/mte-kasan.h > @@ -53,7 +53,8 @@ static inline u8 mte_get_random_tag(void) > * Note: The address must be non-NULL and MTE_GRANULE_SIZE aligned and > * size must be non-zero and MTE_GRANULE_SIZE aligned. > */ > -static inline void mte_set_mem_tag_range(void *addr, size_t size, u8 tag) > +static inline void mte_set_mem_tag_range(void *addr, size_t size, > + u8 tag, bool init) > { > u64 curr, end; > > @@ -68,10 +69,16 @@ static inline void mte_set_mem_tag_range(void *addr, size_t size, u8 tag) > * 'asm volatile' is required to prevent the compiler to move > * the statement outside of the loop. > */ > - asm volatile(__MTE_PREAMBLE "stg %0, [%0]" > - : > - : "r" (curr) > - : "memory"); > + if (init) > + asm volatile(__MTE_PREAMBLE "stzg %0, [%0]" > + : > + : "r" (curr) > + : "memory"); > + else > + asm volatile(__MTE_PREAMBLE "stg %0, [%0]" > + : > + : "r" (curr) > + : "memory"); > > curr += MTE_GRANULE_SIZE; > } while (curr != end); > @@ -100,7 +107,8 @@ static inline u8 mte_get_random_tag(void) > return 0xFF; > } > > -static inline void mte_set_mem_tag_range(void *addr, size_t size, u8 tag) > +static inline void mte_set_mem_tag_range(void *addr, size_t size, > + u8 tag, bool init) > { > } > > diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h > index 8c55634d6edd..7fbb32234414 100644 > --- a/mm/kasan/kasan.h > +++ b/mm/kasan/kasan.h > @@ -291,7 +291,7 @@ static inline const void *arch_kasan_set_tag(const void *addr, u8 tag) > #define arch_get_mem_tag(addr) (0xFF) > #endif > #ifndef arch_set_mem_tag_range > -#define arch_set_mem_tag_range(addr, size, tag) ((void *)(addr)) > +#define arch_set_mem_tag_range(addr, size, tag, init) ((void *)(addr)) > #endif > > #define hw_enable_tagging() arch_enable_tagging() > @@ -299,7 +299,8 @@ static inline const void *arch_kasan_set_tag(const void *addr, u8 tag) > #define hw_set_tagging_report_once(state) arch_set_tagging_report_once(state) > #define hw_get_random_tag() arch_get_random_tag() > #define hw_get_mem_tag(addr) arch_get_mem_tag(addr) > -#define hw_set_mem_tag_range(addr, size, tag) arch_set_mem_tag_range((addr), (size), (tag)) > +#define hw_set_mem_tag_range(addr, size, tag, init) \ > + arch_set_mem_tag_range((addr), (size), (tag), (init)) > > #else /* CONFIG_KASAN_HW_TAGS */ > > @@ -343,7 +344,7 @@ static inline void kasan_poison(const void *addr, size_t size, u8 value) > if (WARN_ON(size & KASAN_GRANULE_MASK)) > return; > > - hw_set_mem_tag_range((void *)addr, size, value); > + hw_set_mem_tag_range((void *)addr, size, value, false); > } > > static inline void kasan_unpoison(const void *addr, size_t size) > @@ -360,7 +361,7 @@ static inline void kasan_unpoison(const void *addr, size_t size) > return; > size = round_up(size, KASAN_GRANULE_SIZE); > > - hw_set_mem_tag_range((void *)addr, size, tag); > + hw_set_mem_tag_range((void *)addr, size, tag, false); > } > > static inline bool kasan_byte_accessible(const void *addr) > -- > 2.30.1.766.gb4fecdf3b7-goog > From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-15.5 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_ADSP_CUSTOM_MED,DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 96A2AC433E0 for ; Mon, 8 Mar 2021 11:24:08 +0000 (UTC) Received: from desiato.infradead.org (desiato.infradead.org [90.155.92.199]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id EF03C651C9 for ; Mon, 8 Mar 2021 11:24:07 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org EF03C651C9 Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=desiato.20200630; h=Sender:Content-Transfer-Encoding :Content-Type:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References:Message-ID: Subject:Cc:To:From:Date:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=hLORVI3tia1FzBOB5mJ9c0pwZ0KAYjK7ehArsfdERAk=; b=ogEm1aFaVJJ3blxLaeY6DyZ93 hDQPo9BkvOQ63IqfGqCZ7pVZkCsEP1EsexYvMZ8gYLOrBrv/ZHpnK5T/gs3Wow4ju8VXeMQlnfXnt 9EE5UJwIO1jH3RqIUhuiw2Z08qppA6sZ03kC4oPf1omeiFNGSsUBhfQ67W7377RopaYdjyTPiAWQq 4BLqjieLaX7c9C9zNofjg05DSdw07MKEBFbjyvWjXFTqDPQULh8sy3tVYXLWr9HFqLIslZcmTAJkX jbvwaNkE+vtSMT+ct4hKgiqbpXWE8YFpAl30W6wd/xD1xCuiDxBi/4FU+GudIFqPVnu6yNYatdFR6 AG3uml2MQ==; Received: from localhost ([::1] helo=desiato.infradead.org) by desiato.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1lJDyD-00Gj11-2B; Mon, 08 Mar 2021 11:22:41 +0000 Received: from mail-wr1-x435.google.com ([2a00:1450:4864:20::435]) by desiato.infradead.org with esmtps (Exim 4.94 #2 (Red Hat Linux)) id 1lJDy7-00Gixq-UH for linux-arm-kernel@lists.infradead.org; Mon, 08 Mar 2021 11:22:38 +0000 Received: by mail-wr1-x435.google.com with SMTP id l11so7628195wrp.7 for ; Mon, 08 Mar 2021 03:22:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=jdrzG39EB3vDtExSyNYnnHyOb0pzwYrAbQOXS4G/YIk=; b=fXimUib1Ki2jO88koiRaev0dqaJ0It6tg5HCP3ZN0skF7qCZmeFFo/uDZrxJgH4oyQ UZ9vWu6xNZOtNg5hmqUNkVroXkZlLl5fWwaMFXdUmSwS6A+rHav9abrQPa5rTDzDonBU KkFzcImxLdkjFevnExlCcdtgC0nJEuL+K26+p5/vbMggQ3qy+alN6+5Hoj7msSAjVQ+5 G1W2PHNWFUaehVz9Nt/vwz0+TLSttv32PZVYwsl8zgfKJurpsq2UxKPL33cNi4smR3LQ m6UIFM6KlsC1ORvKUhi4oixsULQOjXTadSO8CBr1sdb86d2T+ZwkW1dvw7nJSMOUrbl6 +GQw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=jdrzG39EB3vDtExSyNYnnHyOb0pzwYrAbQOXS4G/YIk=; b=hWQnOF0zBCXA6g+r+/L87Jm66fXaE/W6cNEJyPYonnpvYzv+G3jBNAWwyzoMkRcZgu Xy9JIiVPM84M3ngCnF9rTwe8EgHoCemcqKeKh+SFITPhHk7U4DLKlrXhncU0km4PFzvP iOiKJwIbdbbL7kfAgpkCo/cMZZrIRyXFDzGSh7TyfOfi5mnC4dA3ADFYGLE6TmDIj3l6 C15qh96/zgmg5D/0t1aZn7LSQMvFoAY4SLyo/dvUR0+f09l5sLd+CBNHSpjfncVOZo/5 JqtdQMzzfzHL3jbhVYHRHTzUIiHHV3Z90s3MivV/S+mtNtPbLSfdMd5GbTcwI72vwb3U bsrQ== X-Gm-Message-State: AOAM533AdyB3PEFLjVXcsO+WDoKC8bwiFTIsfkYnuBGd8Vm1fKpnftIH schySxkgNGuygDyR+B00Ckg+ow== X-Google-Smtp-Source: ABdhPJyAHOwiac02DfQVZeu4oKIh/d5exFaAdX6QWnq/RGwetm++k7rofI4cTn6OxX4UbgwL9TChcw== X-Received: by 2002:a5d:6446:: with SMTP id d6mr22094155wrw.328.1615202553053; Mon, 08 Mar 2021 03:22:33 -0800 (PST) Received: from elver.google.com ([2a00:79e0:15:13:9d1d:b6a0:d116:531b]) by smtp.gmail.com with ESMTPSA id u63sm17942821wmg.24.2021.03.08.03.22.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 08 Mar 2021 03:22:31 -0800 (PST) Date: Mon, 8 Mar 2021 12:22:25 +0100 From: Marco Elver To: Andrey Konovalov Cc: Alexander Potapenko , Andrew Morton , Catalin Marinas , Will Deacon , Vincenzo Frascino , Dmitry Vyukov , Andrey Ryabinin , Peter Collingbourne , Evgenii Stepanov , Branislav Rankov , Kevin Brodsky , kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 1/5] arm64: kasan: allow to init memory when setting tags Message-ID: References: MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/2.0.5 (2021-01-21) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20210308_112237_149613_32280B76 X-CRM114-Status: GOOD ( 25.19 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Sat, Mar 06, 2021 at 01:15AM +0100, Andrey Konovalov wrote: > This change adds an argument to mte_set_mem_tag_range() that allows > to enable memory initialization when settinh the allocation tags. > The implementation uses stzg instruction instead of stg when this > argument indicates to initialize memory. > > Combining setting allocation tags with memory initialization will > improve HW_TAGS KASAN performance when init_on_alloc/free is enabled. > > This change doesn't integrate memory initialization with KASAN, > this is done is subsequent patches in this series. > > Signed-off-by: Andrey Konovalov Acked-by: Marco Elver > --- > arch/arm64/include/asm/memory.h | 4 ++-- > arch/arm64/include/asm/mte-kasan.h | 20 ++++++++++++++------ > mm/kasan/kasan.h | 9 +++++---- > 3 files changed, 21 insertions(+), 12 deletions(-) > > diff --git a/arch/arm64/include/asm/memory.h b/arch/arm64/include/asm/memory.h > index c759faf7a1ff..f1ba48b4347d 100644 > --- a/arch/arm64/include/asm/memory.h > +++ b/arch/arm64/include/asm/memory.h > @@ -248,8 +248,8 @@ static inline const void *__tag_set(const void *addr, u8 tag) > #define arch_init_tags(max_tag) mte_init_tags(max_tag) > #define arch_get_random_tag() mte_get_random_tag() > #define arch_get_mem_tag(addr) mte_get_mem_tag(addr) > -#define arch_set_mem_tag_range(addr, size, tag) \ > - mte_set_mem_tag_range((addr), (size), (tag)) > +#define arch_set_mem_tag_range(addr, size, tag, init) \ > + mte_set_mem_tag_range((addr), (size), (tag), (init)) > #endif /* CONFIG_KASAN_HW_TAGS */ > > /* > diff --git a/arch/arm64/include/asm/mte-kasan.h b/arch/arm64/include/asm/mte-kasan.h > index 7ab500e2ad17..35fe549f7ea4 100644 > --- a/arch/arm64/include/asm/mte-kasan.h > +++ b/arch/arm64/include/asm/mte-kasan.h > @@ -53,7 +53,8 @@ static inline u8 mte_get_random_tag(void) > * Note: The address must be non-NULL and MTE_GRANULE_SIZE aligned and > * size must be non-zero and MTE_GRANULE_SIZE aligned. > */ > -static inline void mte_set_mem_tag_range(void *addr, size_t size, u8 tag) > +static inline void mte_set_mem_tag_range(void *addr, size_t size, > + u8 tag, bool init) > { > u64 curr, end; > > @@ -68,10 +69,16 @@ static inline void mte_set_mem_tag_range(void *addr, size_t size, u8 tag) > * 'asm volatile' is required to prevent the compiler to move > * the statement outside of the loop. > */ > - asm volatile(__MTE_PREAMBLE "stg %0, [%0]" > - : > - : "r" (curr) > - : "memory"); > + if (init) > + asm volatile(__MTE_PREAMBLE "stzg %0, [%0]" > + : > + : "r" (curr) > + : "memory"); > + else > + asm volatile(__MTE_PREAMBLE "stg %0, [%0]" > + : > + : "r" (curr) > + : "memory"); > > curr += MTE_GRANULE_SIZE; > } while (curr != end); > @@ -100,7 +107,8 @@ static inline u8 mte_get_random_tag(void) > return 0xFF; > } > > -static inline void mte_set_mem_tag_range(void *addr, size_t size, u8 tag) > +static inline void mte_set_mem_tag_range(void *addr, size_t size, > + u8 tag, bool init) > { > } > > diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h > index 8c55634d6edd..7fbb32234414 100644 > --- a/mm/kasan/kasan.h > +++ b/mm/kasan/kasan.h > @@ -291,7 +291,7 @@ static inline const void *arch_kasan_set_tag(const void *addr, u8 tag) > #define arch_get_mem_tag(addr) (0xFF) > #endif > #ifndef arch_set_mem_tag_range > -#define arch_set_mem_tag_range(addr, size, tag) ((void *)(addr)) > +#define arch_set_mem_tag_range(addr, size, tag, init) ((void *)(addr)) > #endif > > #define hw_enable_tagging() arch_enable_tagging() > @@ -299,7 +299,8 @@ static inline const void *arch_kasan_set_tag(const void *addr, u8 tag) > #define hw_set_tagging_report_once(state) arch_set_tagging_report_once(state) > #define hw_get_random_tag() arch_get_random_tag() > #define hw_get_mem_tag(addr) arch_get_mem_tag(addr) > -#define hw_set_mem_tag_range(addr, size, tag) arch_set_mem_tag_range((addr), (size), (tag)) > +#define hw_set_mem_tag_range(addr, size, tag, init) \ > + arch_set_mem_tag_range((addr), (size), (tag), (init)) > > #else /* CONFIG_KASAN_HW_TAGS */ > > @@ -343,7 +344,7 @@ static inline void kasan_poison(const void *addr, size_t size, u8 value) > if (WARN_ON(size & KASAN_GRANULE_MASK)) > return; > > - hw_set_mem_tag_range((void *)addr, size, value); > + hw_set_mem_tag_range((void *)addr, size, value, false); > } > > static inline void kasan_unpoison(const void *addr, size_t size) > @@ -360,7 +361,7 @@ static inline void kasan_unpoison(const void *addr, size_t size) > return; > size = round_up(size, KASAN_GRANULE_SIZE); > > - hw_set_mem_tag_range((void *)addr, size, tag); > + hw_set_mem_tag_range((void *)addr, size, tag, false); > } > > static inline bool kasan_byte_accessible(const void *addr) > -- > 2.30.1.766.gb4fecdf3b7-goog > _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel