From nobody Sat Dec 27 01:04:08 2025 Received: from out-182.mta1.migadu.com (out-182.mta1.migadu.com [95.215.58.182]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C7149524B5 for ; Mon, 25 Dec 2023 15:19:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="W5ZZFxgU" X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1703517571; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=gtILRKJ0trYPt8tyQFLeNeQ04NHz6IkEJP80Wwo1cS0=; b=W5ZZFxgU6MSYmdopEzAXGGE5gDJPmo+ZGGRKS5J86ZPztZXzJAEQqPRhg4fyqL04jDMR/z IHOXw6OLflgQdNazumo25AwO9vVwiBAngimhVCkwhQQIUYOZ+IjO6LfImbya93vttgit5h CqIx/6co65o646yEzapsHxuwiZOyubE= From: andrey.konovalov@linux.dev To: Andrew Morton Cc: Andrey Konovalov , Marco Elver , Alexander Potapenko , Dmitry Vyukov , Andrey Ryabinin , kasan-dev@googlegroups.com, linux-mm@kvack.org, Chris Zankel , Max Filippov , linux-kernel@vger.kernel.org, Andrey Konovalov , kernel test robot Subject: [PATCH mm] xtensa, kasan: define KASAN_SHADOW_END Date: Mon, 25 Dec 2023 16:19:24 +0100 Message-Id: <20231225151924.5422-1-andrey.konovalov@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Migadu-Flow: FLOW_OUT Content-Type: text/plain; charset="utf-8" From: Andrey Konovalov Common KASAN code might rely on the definitions of the shadow mapping start, end, and size. Define KASAN_SHADOW_END in addition to KASAN_SHADOW_START and KASAN_SHADOW_SIZE. Reported-by: kernel test robot Closes: https://lore.kernel.org/oe-kbuild-all/202312240755.MqsWuTno-lkp@int= el.com/ Signed-off-by: Andrey Konovalov --- Andrew, please put this patch before "kasan: improve kasan_non_canonical_hook". --- arch/xtensa/include/asm/kasan.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/xtensa/include/asm/kasan.h b/arch/xtensa/include/asm/kasa= n.h index 216b6f32c375..8d2b4248466f 100644 --- a/arch/xtensa/include/asm/kasan.h +++ b/arch/xtensa/include/asm/kasan.h @@ -18,6 +18,8 @@ #define KASAN_SHADOW_START (XCHAL_PAGE_TABLE_VADDR + XCHAL_PAGE_TABLE_SIZE) /* Size of the shadow map */ #define KASAN_SHADOW_SIZE (-KASAN_START_VADDR >> KASAN_SHADOW_SCALE_SHIFT) +/* End of the shadow map */ +#define KASAN_SHADOW_END (KASAN_SHADOW_START + KASAN_SHADOW_SIZE) /* Offset for mem to shadow address transformation */ #define KASAN_SHADOW_OFFSET __XTENSA_UL_CONST(CONFIG_KASAN_SHADOW_OFFSET) =20 --=20 2.25.1