From patchwork Mon Oct 4 20:22:48 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vincenzo Frascino X-Patchwork-Id: 12534767 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7412FC433EF for ; Mon, 4 Oct 2021 20:26:01 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 4141461458 for ; Mon, 4 Oct 2021 20:26:01 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 4141461458 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=e/O4ozL9nMSK7e/dSCW8jYTX2WRXKKqaZa6zFn8k6E4=; b=WivP/JUb4AqBld QYhsb+3UDwi1z+KFHjv07N+F4BTUfzE00V8VK0jG8InxxsErpeIKXfm5tYobxYQlhu3axRMKETIz6 0bU1pL38FXe+Nm1HJwXotjM+Vjq51SQXqhO1W2cyzdGGhBkFyX7Ggq43zsu2tc0FR9b6nQaGb8VJ8 MO3RR1yFubZf/xKGjlpzYhk7y5DS13bg84I7BCI+JP481zPtZfu14vgrDEoADOBiCZSf58F/oo+4m 8HawfXIFaGNJlbRLuw+By28Q7ENAPU3CdN+H4XaWGx+H8rbu0JsnyT3rfJqBA7aUjL7irSpZ/SnVZ T2E/RPwNdpiliAuoN9mA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1mXUUx-007yCk-3e; Mon, 04 Oct 2021 20:23:43 +0000 Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1mXUUT-007xxT-0w for linux-arm-kernel@lists.infradead.org; Mon, 04 Oct 2021 20:23:15 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 99E6B1FB; Mon, 4 Oct 2021 13:23:09 -0700 (PDT) Received: from e119884-lin.cambridge.arm.com (e119884-lin.cambridge.arm.com [10.1.196.72]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id B322A3F70D; Mon, 4 Oct 2021 13:23:07 -0700 (PDT) From: Vincenzo Frascino To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Cc: vincenzo.frascino@arm.com, Andrew Morton , Catalin Marinas , Will Deacon , Dmitry Vyukov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Evgenii Stepanov , Branislav Rankov , Andrey Konovalov , Lorenzo Pieralisi Subject: [PATCH v2 0/5] arm64: ARMv8.7-A: MTE: Add asymm in-kernel support Date: Mon, 4 Oct 2021 21:22:48 +0100 Message-Id: <20211004202253.27857-1-vincenzo.frascino@arm.com> X-Mailer: git-send-email 2.33.0 MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20211004_132313_201065_C47C8086 X-CRM114-Status: GOOD ( 16.32 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org This series implements the in-kernel asymmetric mode support for ARMv8.7-A Memory Tagging Extension (MTE), which is a debugging feature that allows to detect with the help of the architecture the C and C++ programmatic memory errors like buffer overflow, use-after-free, use-after-return, etc. MTE is built on top of the AArch64 v8.0 virtual address tagging TBI (Top Byte Ignore) feature and allows a task to set a 4 bit tag on any subset of its address space that is multiple of a 16 bytes granule. MTE is based on a lock-key mechanism where the lock is the tag associated to the physical memory and the key is the tag associated to the virtual address. When MTE is enabled and tags are set for ranges of address space of a task, the PE will compare the tag related to the physical memory with the tag related to the virtual address (tag check operation). Access to the memory is granted only if the two tags match. In case of mismatch the PE will raise an exception. When asymmetric mode is present, the CPU triggers a fault on a tag mismatch during a load operation and asynchronously updates a register when a tag mismatch is detected during a store operation. Note: The userspace support will be sent with a future patch series. The series is based on linux-v5.15-rc4. To simplify the testing a tree with the new patches on top has been made available at [1]. [1] https://git.gitlab.arm.com/linux-arm/linux-vf.git mte/v2.asymm Cc: Andrew Morton Cc: Catalin Marinas Cc: Will Deacon Cc: Dmitry Vyukov Cc: Andrey Ryabinin Cc: Alexander Potapenko Cc: Marco Elver Cc: Evgenii Stepanov Cc: Branislav Rankov Cc: Andrey Konovalov Cc: Lorenzo Pieralisi Signed-off-by: Vincenzo Frascino Vincenzo Frascino (5): kasan: Remove duplicate of kasan_flag_async arm64: mte: Bitfield definitions for Asymm MTE arm64: mte: CPU feature detection for Asymm MTE arm64: mte: Add asymmetric mode support kasan: Extend KASAN mode kernel parameter Documentation/dev-tools/kasan.rst | 7 +++++-- arch/arm64/include/asm/memory.h | 1 + arch/arm64/include/asm/mte-kasan.h | 5 +++++ arch/arm64/include/asm/sysreg.h | 3 +++ arch/arm64/kernel/cpufeature.c | 10 +++++++++ arch/arm64/kernel/mte.c | 33 +++++++++++++++++++++++++++++- arch/arm64/tools/cpucaps | 1 + lib/test_kasan.c | 2 +- mm/kasan/hw_tags.c | 27 +++++++++++++++++++----- mm/kasan/kasan.h | 24 +++++++++++++++++----- mm/kasan/report.c | 2 +- 11 files changed, 100 insertions(+), 15 deletions(-)