From patchwork Fri Jan 29 18:49:01 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vincenzo Frascino X-Patchwork-Id: 12056343 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-17.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED, USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 47471C433DB for ; Fri, 29 Jan 2021 18:50:37 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id E53C864D99 for ; Fri, 29 Jan 2021 18:50:36 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org E53C864D99 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:To:From: Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender :Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=oCNhcHYX7qw3H85XCaYVSDAsJKmXWSl2CdNMdQ3DXHU=; b=ag78MIlQ09y+WRluStPR00d4tx HbnnUzcB2lABBuWoOKsOle5MLHVuHXtsXAuOAFkAXuQTOJsl8NESSL1NRmFLfm6mbYkIh1Dj6Uxfl ZfK5ecDR9mlho2wcAfISlJwHSw/J/hpuWQziJD+0a+uDMFeEsL8sikiUiZApNUvKrPAAUtCVw4w4e bmZCKTpxFrxYIXpwD3mlZV4NdCePP/wJr0G7fVNSH7KuejUOA+Hptzyw3La0bjamobsbe/H3KGiBb g/Gdawy60+V9UqWyjnOsREB7rqttSwFZu2gv5hJPCX0b52+DMiANgIHf3LYpHtE9Z9eJxv+mqGu91 Tp5cUsWg==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1l5Ypm-0003lT-ID; Fri, 29 Jan 2021 18:49:31 +0000 Received: from foss.arm.com ([217.140.110.172]) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1l5Ypb-0003j5-NU for linux-arm-kernel@lists.infradead.org; Fri, 29 Jan 2021 18:49:21 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 5A09E13A1; Fri, 29 Jan 2021 10:49:15 -0800 (PST) Received: from e119884-lin.cambridge.arm.com (e119884-lin.cambridge.arm.com [10.1.196.72]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 8E60F3F885; Fri, 29 Jan 2021 10:49:13 -0800 (PST) From: Vincenzo Frascino To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Subject: [PATCH v10 0/4] arm64: ARMv8.5-A: MTE: Add async mode support Date: Fri, 29 Jan 2021 18:49:01 +0000 Message-Id: <20210129184905.29760-1-vincenzo.frascino@arm.com> X-Mailer: git-send-email 2.30.0 MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20210129_134919_946453_62BF007B X-CRM114-Status: GOOD ( 20.11 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Marco Elver , Catalin Marinas , Branislav Rankov , Alexander Potapenko , Evgenii Stepanov , Andrey Konovalov , Andrey Ryabinin , Andrew Morton , Vincenzo Frascino , Will Deacon , Dmitry Vyukov Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org This patchset implements the asynchronous mode support for ARMv8.5-A Memory Tagging Extension (MTE), which is a debugging feature that allows to detect with the help of the architecture the C and C++ programmatic memory errors like buffer overflow, use-after-free, use-after-return, etc. MTE is built on top of the AArch64 v8.0 virtual address tagging TBI (Top Byte Ignore) feature and allows a task to set a 4 bit tag on any subset of its address space that is multiple of a 16 bytes granule. MTE is based on a lock-key mechanism where the lock is the tag associated to the physical memory and the key is the tag associated to the virtual address. When MTE is enabled and tags are set for ranges of address space of a task, the PE will compare the tag related to the physical memory with the tag related to the virtual address (tag check operation). Access to the memory is granted only if the two tags match. In case of mismatch the PE will raise an exception. The exception can be handled synchronously or asynchronously. When the asynchronous mode is enabled: - Upon fault the PE updates the TFSR_EL1 register. - The kernel detects the change during one of the following: - Context switching - Return to user/EL0 - Kernel entry from EL1 - Kernel exit to EL1 - If the register has been updated by the PE the kernel clears it and reports the error. The series is based on linux-next/akpm. To simplify the testing a tree with the new patches on top has been made available at [1]. [1] https://git.gitlab.arm.com/linux-arm/linux-vf.git mte/v10.async.akpm Changes: -------- v10: - Rebase on the latest linux-next/akpm - Address review comments. v9: - Rebase on the latest linux-next/akpm - Address review comments. v8: - Address review comments. v7: - Fix a warning reported by kernel test robot. This time for real. v6: - Drop patches that forbid KASAN KUNIT tests when async mode is enabled. - Fix a warning reported by kernel test robot. - Address review comments. v5: - Rebase the series on linux-next/akpm. - Forbid execution for KASAN KUNIT tests when async mode is enabled. - Dropped patch to inline mte_assign_mem_tag_range(). - Address review comments. v4: - Added support for kasan.mode (sync/async) kernel command line parameter. - Addressed review comments. v3: - Exposed kasan_hw_tags_mode to convert the internal KASAN represenetation. - Added dsb() for kernel exit paths in arm64. - Addressed review comments. v2: - Fixed a compilation issue reported by krobot. - General cleanup. Cc: Andrew Morton Cc: Catalin Marinas Cc: Will Deacon Cc: Dmitry Vyukov Cc: Andrey Ryabinin Cc: Alexander Potapenko Cc: Marco Elver Cc: Evgenii Stepanov Cc: Branislav Rankov Cc: Andrey Konovalov Signed-off-by: Vincenzo Frascino Vincenzo Frascino (4): arm64: mte: Add asynchronous mode support kasan: Add KASAN mode kernel parameter kasan: Add report for async mode arm64: mte: Enable async tag check fault Documentation/dev-tools/kasan.rst | 9 +++++ arch/arm64/include/asm/memory.h | 3 +- arch/arm64/include/asm/mte-kasan.h | 9 ++++- arch/arm64/include/asm/mte.h | 32 ++++++++++++++++ arch/arm64/kernel/entry-common.c | 6 +++ arch/arm64/kernel/mte.c | 60 +++++++++++++++++++++++++++++- include/linux/kasan.h | 6 +++ lib/test_kasan.c | 2 +- mm/kasan/hw_tags.c | 32 +++++++++++++++- mm/kasan/kasan.h | 6 ++- mm/kasan/report.c | 18 ++++++++- 11 files changed, 173 insertions(+), 10 deletions(-)