Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3193038pxk; Mon, 21 Sep 2020 07:33:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzJMiQ1nsu7tULbFs+kq0X9vVNKopXsO67jvbEbnGjbM6kXhPrJrOyUFnuK9xooFKVgsDLH X-Received: by 2002:a17:907:b0c:: with SMTP id h12mr13575699ejl.115.1600698780927; Mon, 21 Sep 2020 07:33:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600698780; cv=none; d=google.com; s=arc-20160816; b=pDBLcaKe9T6f/ZM3jwtAbgmC3kEERzWp8bYShnnxy2o1XcvO86QsUgT5zH740j3rVF +Ux6ZiP5qReaLJevMe+bsrjNck6QY64uG4LfpCgfgd+4LnLepz+jYRMpSL/Jz1tmbUnd yx403OgDChX2Ua7z5FUXdUPkKF5fgbRbDY8Itbwo4zCQsbb6ZmCd0Isf6dcHpCAXo7xt DzBgaBCabrZnBV0WDUYS3uhOHrRWKJ+4uzkLF9LzwHyLiJ+m1CYnSCM7eZqqMGWQFluj n1c+3kmA4e4abwZEQodwo0k16gknfut2FAiGmNPTsXmrnAcDRUHFbZ25/uEsU3F5jjuX JsmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=Zr46E7SCC2RF+ZuHUEhPmsYZ6RfOF8h1FZN/tO9mX7U=; b=IGTd+O38K2dnzEAdfTc0s8U1rGRqXBwqJ7jYqR0g3s/DzAXVYczheXMvSiOpOwA4gE DsoL3/R/APVjr7UPnotxJboXbd50a0FrRcaT8e+BUxgJF2qLETyN0M+U1VxlT80+hdoq wk4YqVoUe8Lq04j9Kl4z2MPUA0iug/ZTW+83m2cQIm91U7pUneffHHAJ0rEvW3izyzwJ nRBCv4zJ1nQThiGAz8ALv9vduxhh9hoBCN7vzirHOddMaJ6v4K9Fvwn9Koj7Sq/s2yT+ 1qjNt3HfT7LCnBu1V+4ZuoBcggE8XHp+9zNAkvAc4IHaseXGBEnHJqv79/BuU2CcaNSj dQoA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=w1R8TSnt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p16si8152257edm.382.2020.09.21.07.32.37; Mon, 21 Sep 2020 07:33:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=w1R8TSnt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727109AbgIUObL (ORCPT + 99 others); Mon, 21 Sep 2020 10:31:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:42576 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726395AbgIUObK (ORCPT ); Mon, 21 Sep 2020 10:31:10 -0400 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 821E721D91; Mon, 21 Sep 2020 14:31:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1600698669; bh=krO8zF0GrOs00mBfRnRzTehlbc7iAKlLH4rzrtRfnqc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=w1R8TSnt2fQsxgf5LT0ZPAYzmRGdNdiwFgADCYrRTaz1wiToTEyowHYQJXNP5ZzNz JtZqlGCVDO7fXkQN9g3BMcYql263K3PntOmYEZK7IhNKAkYifPH1Sey8npLsTj/D3p nQCI8p0EgRNpuW7EaQlZVyPY9seG884bExHmNR2U= Date: Mon, 21 Sep 2020 15:31:01 +0100 From: Will Deacon To: Marco Elver Cc: akpm@linux-foundation.org, glider@google.com, hpa@zytor.com, paulmck@kernel.org, andreyknvl@google.com, aryabinin@virtuozzo.com, luto@kernel.org, bp@alien8.de, catalin.marinas@arm.com, cl@linux.com, dave.hansen@linux.intel.com, rientjes@google.com, dvyukov@google.com, edumazet@google.com, gregkh@linuxfoundation.org, hdanton@sina.com, mingo@redhat.com, jannh@google.com, Jonathan.Cameron@huawei.com, corbet@lwn.net, iamjoonsoo.kim@lge.com, keescook@chromium.org, mark.rutland@arm.com, penberg@kernel.org, peterz@infradead.org, sjpark@amazon.com, tglx@linutronix.de, vbabka@suse.cz, x86@kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org Subject: Re: [PATCH v3 03/10] arm64, kfence: enable KFENCE for ARM64 Message-ID: <20200921143059.GO2139@willie-the-truck> References: <20200921132611.1700350-1-elver@google.com> <20200921132611.1700350-4-elver@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200921132611.1700350-4-elver@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Sep 21, 2020 at 03:26:04PM +0200, Marco Elver wrote: > Add architecture specific implementation details for KFENCE and enable > KFENCE for the arm64 architecture. In particular, this implements the > required interface in . Currently, the arm64 version does > not yet use a statically allocated memory pool, at the cost of a pointer > load for each is_kfence_address(). > > Reviewed-by: Dmitry Vyukov > Co-developed-by: Alexander Potapenko > Signed-off-by: Alexander Potapenko > Signed-off-by: Marco Elver > --- > For ARM64, we would like to solicit feedback on what the best option is > to obtain a constant address for __kfence_pool. One option is to declare > a memory range in the memory layout to be dedicated to KFENCE (like is > done for KASAN), however, it is unclear if this is the best available > option. We would like to avoid touching the memory layout. Sorry for the delay on this. Given that the pool is relatively small (i.e. when compared with our virtual address space), dedicating an area of virtual space sounds like it makes the most sense here. How early do you need it to be available? An alternative approach would be to patch in the address at runtime, with something like a static key to swizzle off the direct __kfence_pool load once we're up and running. Will