From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.ozlabs.org (lists.ozlabs.org [112.213.38.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id CC7C4C87FD2 for ; Mon, 11 Aug 2025 05:50:39 +0000 (UTC) Received: from boromir.ozlabs.org (localhost [127.0.0.1]) by lists.ozlabs.org (Postfix) with ESMTP id 4c0kJG2G05z3cfm; Mon, 11 Aug 2025 15:50:38 +1000 (AEST) Authentication-Results: lists.ozlabs.org; arc=none smtp.remote-ip=93.17.235.10 ARC-Seal: i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1754891438; cv=none; b=DRPAnVcOm6mC0IuwCUlPl1Nfm750Ez1ILdSfYYqbZ1K16T+pMXaw5t7Ro+9mAZ2Uus/S6ZN15vq6PDLLOELOZzvBL0TkGBW1YbdJJ8jvocV50DH1jxujLRB+6wFhTf6ZUKo0Xv0cvZC+DpGRtO0MFi0UI09IV9R2cIDdcjsaC/MszXakDJsWtBijrHoTn0u6AnrOPhUozhfwCZemp1h4wYkhmNoZMDOJ88CLn/8PUEgIxUDTKg256IzMosUlt64cHeGO3Cu3MMjyujMGZ5TChu2+0v3znyqb4FudtFm8bYwTVJ0w5gvK5gFX+aggSmDwTwkr0gQFW4NsnHJ1DAORkA== ARC-Message-Signature: i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1754891438; c=relaxed/relaxed; bh=1+62RvIlGZfmQnxVgcVSsABjdaj8FSJ42aUXvVPiGuY=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=m76dPZrWymcCa/Mlpi/qC0tBl6Vb3PcnluSh3e1VDCQhDOJ8z2h4qJE4QaS9EAB6bP4ul/qSroWOPJU+V2rITFBnfHmeX6YIaJM1Cj3xTDXomc3REfrqFDZ7AcHiehsqI6qlGQVKBFvFMJY9OubtmFBBRTMc8oX741Dz6kJr7Eg1O42iGYTz2E28fVtywYIUyZBfhTH1BcF2VKtqFfmn7JQwe9re9QzxeUEsVAhHfwUfSUrYZKbJkELHdvTH+h1HB4bQLDaxlOMrY1Z6btO5BZxcHMpAsOHrBU4qqU92N6WAUhKYNZ1HXIUJn4ga+rQqTX5VDMuVkSZ40+KjbDgLxw== ARC-Authentication-Results: i=1; lists.ozlabs.org; dmarc=pass (p=quarantine dis=none) header.from=csgroup.eu; spf=pass (client-ip=93.17.235.10; helo=pegase2.c-s.fr; envelope-from=christophe.leroy@csgroup.eu; receiver=lists.ozlabs.org) smtp.mailfrom=csgroup.eu Authentication-Results: lists.ozlabs.org; dmarc=pass (p=quarantine dis=none) header.from=csgroup.eu Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=csgroup.eu (client-ip=93.17.235.10; helo=pegase2.c-s.fr; envelope-from=christophe.leroy@csgroup.eu; receiver=lists.ozlabs.org) Received: from pegase2.c-s.fr (pegase2.c-s.fr [93.17.235.10]) by lists.ozlabs.org (Postfix) with ESMTP id 4c0kJF3hFhz3cfj for ; Mon, 11 Aug 2025 15:50:36 +1000 (AEST) Received: from localhost (mailhub4.si.c-s.fr [172.26.127.67]) by localhost (Postfix) with ESMTP id 4c0k2w2kRcz9sSL; Mon, 11 Aug 2025 07:39:04 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from pegase2.c-s.fr ([172.26.127.65]) by localhost (pegase2.c-s.fr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3Mxf0H61E1tl; Mon, 11 Aug 2025 07:39:04 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase2.c-s.fr (Postfix) with ESMTP id 4c0k2w1bMnz9sSK; Mon, 11 Aug 2025 07:39:04 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 199008B764; Mon, 11 Aug 2025 07:39:04 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id bIxmuQ19phXS; Mon, 11 Aug 2025 07:39:03 +0200 (CEST) Received: from [10.25.207.160] (unknown [10.25.207.160]) by messagerie.si.c-s.fr (Postfix) with ESMTP id BAC418B763; Mon, 11 Aug 2025 07:39:03 +0200 (CEST) Message-ID: Date: Mon, 11 Aug 2025 07:39:03 +0200 X-Mailing-List: linuxppc-dev@lists.ozlabs.org List-Id: List-Help: List-Owner: List-Post: List-Archive: , List-Subscribe: , , List-Unsubscribe: Precedence: list MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v6 2/2] kasan: call kasan_init_generic in kasan_init To: Sabyrzhan Tasbolatov , ryabinin.a.a@gmail.com, bhe@redhat.com, hca@linux.ibm.com, andreyknvl@gmail.com, akpm@linux-foundation.org, zhangqing@loongson.cn, chenhuacai@loongson.cn, davidgow@google.com, glider@google.com, dvyukov@google.com, alexghiti@rivosinc.com Cc: alex@ghiti.fr, agordeev@linux.ibm.com, vincenzo.frascino@arm.com, elver@google.com, kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, loongarch@lists.linux.dev, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-um@lists.infradead.org, linux-mm@kvack.org References: <20250810125746.1105476-1-snovitoll@gmail.com> <20250810125746.1105476-3-snovitoll@gmail.com> From: Christophe Leroy Content-Language: fr-FR In-Reply-To: <20250810125746.1105476-3-snovitoll@gmail.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Le 10/08/2025 à 14:57, Sabyrzhan Tasbolatov a écrit : > Call kasan_init_generic() which handles Generic KASAN initialization. > For architectures that do not select ARCH_DEFER_KASAN, > this will be a no-op for the runtime flag but will > print the initialization banner. > > For SW_TAGS and HW_TAGS modes, their respective init functions will > handle the flag enabling, if they are enabled/implemented. > > Closes: https://bugzilla.kernel.org/show_bug.cgi?id=217049 > Signed-off-by: Sabyrzhan Tasbolatov > Tested-by: Alexandre Ghiti # riscv > Acked-by: Alexander Gordeev # s390 Reviewed-by: Christophe Leroy > --- > Changes in v6: > - Call kasan_init_generic() in arch/riscv _after_ local_flush_tlb_all() > --- > arch/arm/mm/kasan_init.c | 2 +- > arch/arm64/mm/kasan_init.c | 4 +--- > arch/riscv/mm/kasan_init.c | 1 + > arch/s390/kernel/early.c | 3 ++- > arch/x86/mm/kasan_init_64.c | 2 +- > arch/xtensa/mm/kasan_init.c | 2 +- > 6 files changed, 7 insertions(+), 7 deletions(-) > > diff --git a/arch/arm/mm/kasan_init.c b/arch/arm/mm/kasan_init.c > index 111d4f703136..c6625e808bf8 100644 > --- a/arch/arm/mm/kasan_init.c > +++ b/arch/arm/mm/kasan_init.c > @@ -300,6 +300,6 @@ void __init kasan_init(void) > local_flush_tlb_all(); > > memset(kasan_early_shadow_page, 0, PAGE_SIZE); > - pr_info("Kernel address sanitizer initialized\n"); > init_task.kasan_depth = 0; > + kasan_init_generic(); > } > diff --git a/arch/arm64/mm/kasan_init.c b/arch/arm64/mm/kasan_init.c > index d541ce45daeb..abeb81bf6ebd 100644 > --- a/arch/arm64/mm/kasan_init.c > +++ b/arch/arm64/mm/kasan_init.c > @@ -399,14 +399,12 @@ void __init kasan_init(void) > { > kasan_init_shadow(); > kasan_init_depth(); > -#if defined(CONFIG_KASAN_GENERIC) > + kasan_init_generic(); > /* > * Generic KASAN is now fully initialized. > * Software and Hardware Tag-Based modes still require > * kasan_init_sw_tags() and kasan_init_hw_tags() correspondingly. > */ > - pr_info("KernelAddressSanitizer initialized (generic)\n"); > -#endif > } > > #endif /* CONFIG_KASAN_GENERIC || CONFIG_KASAN_SW_TAGS */ > diff --git a/arch/riscv/mm/kasan_init.c b/arch/riscv/mm/kasan_init.c > index 41c635d6aca4..c4a2a9e5586e 100644 > --- a/arch/riscv/mm/kasan_init.c > +++ b/arch/riscv/mm/kasan_init.c > @@ -533,4 +533,5 @@ void __init kasan_init(void) > > csr_write(CSR_SATP, PFN_DOWN(__pa(swapper_pg_dir)) | satp_mode); > local_flush_tlb_all(); > + kasan_init_generic(); > } > diff --git a/arch/s390/kernel/early.c b/arch/s390/kernel/early.c > index 9adfbdd377dc..544e5403dd91 100644 > --- a/arch/s390/kernel/early.c > +++ b/arch/s390/kernel/early.c > @@ -21,6 +21,7 @@ > #include > #include > #include > +#include > #include > #include > #include > @@ -65,7 +66,7 @@ static void __init kasan_early_init(void) > { > #ifdef CONFIG_KASAN > init_task.kasan_depth = 0; > - pr_info("KernelAddressSanitizer initialized\n"); > + kasan_init_generic(); > #endif > } > > diff --git a/arch/x86/mm/kasan_init_64.c b/arch/x86/mm/kasan_init_64.c > index 0539efd0d216..998b6010d6d3 100644 > --- a/arch/x86/mm/kasan_init_64.c > +++ b/arch/x86/mm/kasan_init_64.c > @@ -451,5 +451,5 @@ void __init kasan_init(void) > __flush_tlb_all(); > > init_task.kasan_depth = 0; > - pr_info("KernelAddressSanitizer initialized\n"); > + kasan_init_generic(); > } > diff --git a/arch/xtensa/mm/kasan_init.c b/arch/xtensa/mm/kasan_init.c > index f39c4d83173a..0524b9ed5e63 100644 > --- a/arch/xtensa/mm/kasan_init.c > +++ b/arch/xtensa/mm/kasan_init.c > @@ -94,5 +94,5 @@ void __init kasan_init(void) > > /* At this point kasan is fully initialized. Enable error messages. */ > current->kasan_depth = 0; > - pr_info("KernelAddressSanitizer initialized\n"); > + kasan_init_generic(); > }