From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.5 required=3.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED,DKIM_INVALID,DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2F136C433DB for ; Fri, 12 Feb 2021 20:09:00 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id CD98564DB2 for ; Fri, 12 Feb 2021 20:08:59 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org CD98564DB2 Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 41C6D8D0087; Fri, 12 Feb 2021 15:08:59 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 3CC9A8D0060; Fri, 12 Feb 2021 15:08:59 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2E1C08D0087; Fri, 12 Feb 2021 15:08:59 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0020.hostedemail.com [216.40.44.20]) by kanga.kvack.org (Postfix) with ESMTP id 189F48D0060 for ; Fri, 12 Feb 2021 15:08:59 -0500 (EST) Received: from smtpin09.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay01.hostedemail.com (Postfix) with ESMTP id D11CD183D2A1E for ; Fri, 12 Feb 2021 20:08:58 +0000 (UTC) X-FDA: 77810704356.09.DF1AE4C Received: from mail-wm1-f73.google.com (mail-wm1-f73.google.com [209.85.128.73]) by imf24.hostedemail.com (Postfix) with ESMTP id 3DAABA0009CD for ; Fri, 12 Feb 2021 20:08:57 +0000 (UTC) Received: by mail-wm1-f73.google.com with SMTP id s131so469445wme.7 for ; Fri, 12 Feb 2021 12:08:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:message-id:mime-version:subject:from:to:cc; bh=Yt8QroauzMxSaO8dfOJkOemr7RXc+gc/JDflCqQTAVk=; b=ri92KeJxTQmZDYwPc9CI1JAo1D1ryQFfgFIYBWpGFyAFqMNYOwh0bVZZOtPBYCHINt JXq4uovQhwEBqXp4m8r22GMI+KUzbMp8Y6em6kYTTic5PPM9dub7i9oEcNJg03qdaq1y rZkB1N85zdJ2cXshg3MTsu6LH141DL+75izXKKm5zhrJNEtD47qXcIkCkiwz/V5XYVHS WdVc/9cKFurKK/3wO6ckHf472nbQJbhXXDeOLDPSaXO9q96LV65Q0SFPY9aDjJWe7C8x jW3i6gT2DM5ik1XqbZEeq/gILY+Rx9FKfkd0yl26m1c18hXQoVvczc8tOxmxQhVzjntb U8ng== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:message-id:mime-version:subject:from :to:cc; bh=Yt8QroauzMxSaO8dfOJkOemr7RXc+gc/JDflCqQTAVk=; b=IP2ff3uLSqd9FeCS7Yp3c807H+ze43syiQGus4yemqNy1I75gtMUOHk7LtUIn5+Huf YvufjFnMlw+2YQIu1WsyVsg/ZsfSJ5AeyBChePAaExQVdouoVf+AelgXDs3jK+KO2+Rm EUUIc6Ty8V/jJawAzBi60TeAMYZnTbUJN5fwZEfuWXyU8BCV9l7peVeKrWd77BuHdfQ3 GaDuMEm5stbHTCysyCKa/mtoNbRmKMbgv9i8mDiwrOxrEzFeCslsCJmTMjdmL+U1tBYe kMGB11efcbSra7JZfIBDIhClDemEzgM0kJDUBAmfK/gKggj6e4RDelSmoIke460e2b0A b23Q== X-Gm-Message-State: AOAM533dCrKDRO1ZcOOtX9Ebnzig2/fUQxC6+Vi6G5dNOFElTs4yT/Yu Lp4rJujmYjjLnERf6BXfvD3rqAAvpVcV5+3G X-Google-Smtp-Source: ABdhPJzE2cAe228eOqgK3Bsnp2vYCX8C+miv+96QZ9bSkzK8DaWHuZTD+wNAnyJPdbflLU6JRbQ5zCku4iMbjMUW X-Received: from andreyknvl3.muc.corp.google.com ([2a00:79e0:15:13:19dd:6137:bedc:2fae]) (user=andreyknvl job=sendgmr) by 2002:a1c:3546:: with SMTP id c67mr2778wma.1.1613160536016; Fri, 12 Feb 2021 12:08:56 -0800 (PST) Date: Fri, 12 Feb 2021 21:08:52 +0100 Message-Id: Mime-Version: 1.0 X-Mailer: git-send-email 2.30.0.478.g8a0d178c01-goog Subject: [PATCH mm] kasan: export HW_TAGS symbols for KUnit tests From: Andrey Konovalov To: Andrew Morton , Catalin Marinas , Vincenzo Frascino Cc: Will Deacon , Dmitry Vyukov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Peter Collingbourne , Evgenii Stepanov , Branislav Rankov , Kevin Brodsky , Christoph Hellwig , kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrey Konovalov Content-Type: text/plain; charset="UTF-8" X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 3DAABA0009CD X-Stat-Signature: 3gfj94wfq6fjw4k3irabeo6x338jkbw5 Received-SPF: none (flex--andreyknvl.bounces.google.com>: No applicable sender policy available) receiver=imf24; identity=mailfrom; envelope-from="<3WOAmYAoKCLsboesfzlowmhpphmf.dpnmjovy-nnlwbdl.psh@flex--andreyknvl.bounces.google.com>"; helo=mail-wm1-f73.google.com; client-ip=209.85.128.73 X-HE-DKIM-Result: pass/pass X-HE-Tag: 1613160537-595322 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Currently, building KASAN-KUnit tests as a module fails with: ERROR: modpost: "mte_enable_kernel" [lib/test_kasan.ko] undefined! ERROR: modpost: "mte_set_report_once" [lib/test_kasan.ko] undefined! This change adds KASAN wrappers for mte_enable_kernel() and mte_set_report_once() and only defines and exports them when KASAN-KUnit tests are enabled. The wrappers aren't defined when tests aren't enabled to avoid misuse. The mte_() functions aren't exported directly to avoid having low-level KASAN ifdefs in the arch code. Signed-off-by: Andrey Konovalov --- Changes v1->v2: - Add wrappers instead of exporting MTE symbols directly. - Only define and export wrappers when KASAN-KUnit tests are enabled. --- lib/test_kasan.c | 6 +++--- mm/kasan/hw_tags.c | 16 ++++++++++++++++ mm/kasan/kasan.h | 12 ++++++++++++ 3 files changed, 31 insertions(+), 3 deletions(-) diff --git a/lib/test_kasan.c b/lib/test_kasan.c index 1328c468fdb5..e5647d147b35 100644 --- a/lib/test_kasan.c +++ b/lib/test_kasan.c @@ -53,13 +53,13 @@ static int kasan_test_init(struct kunit *test) } multishot = kasan_save_enable_multi_shot(); - hw_set_tagging_report_once(false); + kasan_set_tagging_report_once(false); return 0; } static void kasan_test_exit(struct kunit *test) { - hw_set_tagging_report_once(true); + kasan_set_tagging_report_once(true); kasan_restore_multi_shot(multishot); } @@ -97,7 +97,7 @@ static void kasan_test_exit(struct kunit *test) READ_ONCE(fail_data.report_found)); \ if (IS_ENABLED(CONFIG_KASAN_HW_TAGS)) { \ if (READ_ONCE(fail_data.report_found)) \ - hw_enable_tagging(); \ + kasan_enable_tagging(); \ migrate_enable(); \ } \ } while (0) diff --git a/mm/kasan/hw_tags.c b/mm/kasan/hw_tags.c index 1dfe4f62a89e..2aad21fda156 100644 --- a/mm/kasan/hw_tags.c +++ b/mm/kasan/hw_tags.c @@ -185,3 +185,19 @@ struct kasan_track *kasan_get_free_track(struct kmem_cache *cache, return &alloc_meta->free_track[0]; } + +#if IS_ENABLED(CONFIG_KASAN_KUNIT_TEST) + +void kasan_set_tagging_report_once(bool state) +{ + hw_set_tagging_report_once(state); +} +EXPORT_SYMBOL_GPL(kasan_set_tagging_report_once); + +void kasan_enable_tagging(void) +{ + hw_enable_tagging(); +} +EXPORT_SYMBOL_GPL(kasan_enable_tagging); + +#endif diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h index cc787ba47e1b..3436c6bf7c0c 100644 --- a/mm/kasan/kasan.h +++ b/mm/kasan/kasan.h @@ -308,6 +308,18 @@ static inline const void *arch_kasan_set_tag(const void *addr, u8 tag) #endif /* CONFIG_KASAN_HW_TAGS */ +#if defined(CONFIG_KASAN_HW_TAGS) && IS_ENABLED(CONFIG_KASAN_KUNIT_TEST) + +void kasan_set_tagging_report_once(bool state); +void kasan_enable_tagging(void); + +#else /* CONFIG_KASAN_HW_TAGS || CONFIG_KASAN_KUNIT_TEST */ + +static inline void kasan_set_tagging_report_once(bool state) { } +static inline void kasan_enable_tagging(void) { } + +#endif /* CONFIG_KASAN_HW_TAGS || CONFIG_KASAN_KUNIT_TEST */ + #ifdef CONFIG_KASAN_SW_TAGS u8 kasan_random_tag(void); #elif defined(CONFIG_KASAN_HW_TAGS) -- 2.30.0.478.g8a0d178c01-goog