Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp2882475imm; Wed, 3 Oct 2018 10:33:31 -0700 (PDT) X-Google-Smtp-Source: ACcGV61Gzc3VQZLfY7cbpWbCJBpvS+H+hxJTVVf899Kwd+IUZufmMce4780eUCLUiVmOzM2W1M/V X-Received: by 2002:a63:ef0b:: with SMTP id u11-v6mr2296360pgh.283.1538588011895; Wed, 03 Oct 2018 10:33:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538588011; cv=none; d=google.com; s=arc-20160816; b=yh4VPP00faDkZ2rHo4XCtlOB/DORxpRwXDEV3RBVHBJdDaFLWduAycWvbT2kQbCQWI O9IudPOfCGtFJyHeKsV5urr+zX6bGtxBfPsuHXQH0LZx9CSUToxlK2ohtdV7jq/yPGhk lMp4d9AqjD0gLNQL303RqQBrdxOp2uGp40Oes8cWyHKuB1VLlTLshBqbeaJKV18NCyaQ dRVA1Ut5jjo7OhF72MRukPVO2Lr/WKr83drtVbP8jDl5pClwhgGdmof+Cck8SsK2SN+H gOIuhmXOLYS/gVi0yqyb3VpTQMBGVbq9KKzPurPSHtjB4bZd6h8wtxliAAq/xP68RB6V cEHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=aQQfC1OlSuI1iLBk5J/mC0AvptM+boi0XuCJ+QE3768=; b=FSMKbuE5QLCah8LQL1SLT1zeiPGeSHUiXL9JbmEb8Gyb4UbZKQ+Cu31hJnjYbZG6N4 yXyJVRFMWJckVYHkaofTTOC4tRDzp64mq+Nx3nUOJQUnWjNODTcBOSx5CTX1P5UVNNs6 v3MzcJlVmfhrhRp6GmSxFD/ivFI1sq315fjmqEpUWHxEflDzOxMaTRU/syxzhQeYFIyH YDFEvQrE8yzag4elK0wEE9wp3Dbl+ypkQBxXcQstUbLHHOcU+sBbgwGuf+RzXhhF+NlT ERxTS61Mvxvxo3CHJUDJHgyybtNH630MCYACDBdBBeJWZPjWam5rt2YndQHy6SfFguRk f5Mg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 64-v6si2324958plb.262.2018.10.03.10.33.10; Wed, 03 Oct 2018 10:33:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727077AbeJDAWZ (ORCPT + 99 others); Wed, 3 Oct 2018 20:22:25 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:54456 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726851AbeJDAWZ (ORCPT ); Wed, 3 Oct 2018 20:22:25 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 260A180D; Wed, 3 Oct 2018 10:33:04 -0700 (PDT) Received: from arrakis.emea.arm.com (arrakis.emea.arm.com [10.4.12.129]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id B9E193F5B3; Wed, 3 Oct 2018 10:32:59 -0700 (PDT) Date: Wed, 3 Oct 2018 18:32:57 +0100 From: Catalin Marinas To: Andrey Konovalov Cc: Will Deacon , Mark Rutland , Robin Murphy , Kees Cook , Kate Stewart , Greg Kroah-Hartman , Andrew Morton , Ingo Molnar , "Kirill A . Shutemov" , Shuah Khan , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Chintan Pandya , Jacob Bramley , Ruben Ayrapetyan , Lee Smith , Kostya Serebryany , Dmitry Vyukov , Ramana Radhakrishnan , Luc Van Oostenryck , Evgeniy Stepanov Subject: Re: [PATCH v7 7/8] arm64: update Documentation/arm64/tagged-pointers.txt Message-ID: <20181003173256.GG12998@arrakis.emea.arm.com> References: <47a464307d4df3c0cb65f88d1fe83f9a741dd74b.1538485901.git.andreyknvl@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <47a464307d4df3c0cb65f88d1fe83f9a741dd74b.1538485901.git.andreyknvl@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 02, 2018 at 03:12:42PM +0200, Andrey Konovalov wrote: > diff --git a/Documentation/arm64/tagged-pointers.txt b/Documentation/arm64/tagged-pointers.txt > index a25a99e82bb1..ae877d185fdb 100644 > --- a/Documentation/arm64/tagged-pointers.txt > +++ b/Documentation/arm64/tagged-pointers.txt > @@ -17,13 +17,21 @@ this byte for application use. > Passing tagged addresses to the kernel > -------------------------------------- > > -All interpretation of userspace memory addresses by the kernel assumes > -an address tag of 0x00. > +Some initial work for supporting non-zero address tags passed to the > +kernel has been done. As of now, the kernel supports tags in: With my maintainer hat on, the above statement leads me to think this new ABI is work in progress, so not yet suitable for upstream. Also, how is user space supposed to know that it can now pass tagged pointers into the kernel? An ABI change (or relaxation), needs to be advertised by the kernel, usually via a new HWCAP bit (e.g. HWCAP_TBI). Once we have a HWCAP bit in place, we need to be pretty clear about which syscalls can and cannot cope with tagged pointers. The "as of now" implies potential further relaxation which, again, would need to be advertised to user in some (additional) way. > -This includes, but is not limited to, addresses found in: > + - user fault addresses While the kernel currently supports this in some way (by clearing the tag exception entry, el0_da), the above implies (at least to me) that sigcontext.fault_address would contain the tagged address. That's not the case (unless I missed it in your patches). > - - pointer arguments to system calls, including pointers in structures > - passed to system calls, > + - pointer arguments (including pointers in structures), which don't > + describe virtual memory ranges, passed to system calls I think we need to be more precise here... > +All other interpretations of userspace memory addresses by the kernel > +assume an address tag of 0x00. This includes, but is not limited to, > +addresses found in: > + > + - pointer arguments (including pointers in structures), which describe > + virtual memory ranges, passed to memory system calls (mmap, mprotect, > + etc.) ...and probably a full list here. -- Catalin