Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp2987024pxb; Tue, 12 Jan 2021 03:39:49 -0800 (PST) X-Google-Smtp-Source: ABdhPJyvzB837Yy+DqlaPf428BfmMFaecj61ffJR0tKJkibm7KDfIN7N+KxCxam56+NhEdBv1o31 X-Received: by 2002:a17:906:29cd:: with SMTP id y13mr306480eje.453.1610451589653; Tue, 12 Jan 2021 03:39:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610451589; cv=none; d=google.com; s=arc-20160816; b=eCXvE77xLUIO66dEc5NC9JCNiYYFhmjBtjJPjor+jWZN5vokWAsZUUgTOlDsEHGFOe UJGaxysxgJptf5Q3TbuBZBL9YySO/htvbdCCpsr1PBBpMmqqorvuifROD16U47mNiZiF 1EyHFrGeb+i2jiDt3WEar3sEjVW3oMEO3WWBLaXCTH1Ip7erNXjs+QeGI/oakSSk2+3N h1n7NVQ1mTJgG8pvB4p4QJURIFge9qenTao20SZMFMzJ+8kF0YNuxA6NAvfzZ3N+1bj+ hbJEEPtUFpSMx2VzPcEeVAuCnn+2POGw/8v9ZgJPzttgXyKTxYf4A332pOQB94TacFq7 XatA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=BKnokxRD1I6llLoX7662tW98pzgHQdpcOb6fgDSpfGE=; b=TcQdJeKiYSI6fP4wIjnC5rFmMCUnClPayP93muGi8hrjU+vCrN9ds1OD7XvEWr4m9S AX4FBxQfzFGzFEsH4FiGoOG4q57GxjHWzu7GcqOM6F1Hs4dDPJhLmr/wYbKtXK0s2v4U 19Fz+jXAuAOYjD46g9q48TDgOwCInPCgyoIacfwUjac043Xvo+sSI5Fpz5riADp+7fsj UP0cIoZmZ3cfdzpNdFMZE54xYs2/U1FhkZkZzxbgPrGuvaI6LqlAhzNhA/8eFHLOwmmK zSq0jDDRGBEVykMPsVyHrjcwJqQZEt8Q+UTMyEGxJnyEMcttCr2gsu1/M/GSU0k/1tRz K0qg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=CPW6waRy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a15si1252607edb.360.2021.01.12.03.39.25; Tue, 12 Jan 2021 03:39:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=CPW6waRy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732819AbhALHlg (ORCPT + 99 others); Tue, 12 Jan 2021 02:41:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33674 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730190AbhALHlf (ORCPT ); Tue, 12 Jan 2021 02:41:35 -0500 Received: from mail-qk1-x732.google.com (mail-qk1-x732.google.com [IPv6:2607:f8b0:4864:20::732]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6F48BC06179F for ; Mon, 11 Jan 2021 23:40:55 -0800 (PST) Received: by mail-qk1-x732.google.com with SMTP id p14so1122676qke.6 for ; Mon, 11 Jan 2021 23:40:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=BKnokxRD1I6llLoX7662tW98pzgHQdpcOb6fgDSpfGE=; b=CPW6waRy7HCf0fFBnkmtF16rAs1YeatzlNS9Mu/UB63AttABUkS4rlk6uf4jJmN+q6 dz25S1JgoXSJay6ZrrjWmMGqzWvw/TUAEaXHG1ryK07eG1LkS1LD39n9IQWw8fs83xP3 ccvrva9Dz165V0PkkR4iYoziBND5Vpjdf85cZebSD3K+djperjQG8ZFlBKSENHGpGIJu CDVe2xNORIwrfV/vitXk35/Vx3R9IudeY7lAN+1ScgJJaCNTJ7V6hHY83mfSAM2d2LAW f+9TFSStJzkornSFgs+GbXH9Gv23BePE9KkwI0EjtpouvGqm5TUL4bOR9U5wLfzvp+xO 0iWQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=BKnokxRD1I6llLoX7662tW98pzgHQdpcOb6fgDSpfGE=; b=lCTT9zGXRDnL+eeOWrNt2iabXIPb8PyxoMt8EJPUH8TrCSX9ywnRiMioW69VjXcvdU AvKRvAKEDa2oOjtZCxzM9cUEeWXmv0DTi8Tm3oF6YAwl28l1EUYjpLF6b2JpPD5WU3hA 3L4HKaWwg4nmricIcUS+94WqcZbUXEDscllIbKQI7dB4SSz2AZZ8jH0S525HC/sEBb4v jOE+c7vGpW3FNqh2Mu6+VtSDO6BVUjpgyQevK44QPUVpIODq7ZBXW2HEl/SLlbEdKb7W D27pd3ecafce/vL/Lko1scg2S3BWWK3IOD2VX1v9RhRE+cwp9ySlrZZNcvUFk/qZsNK3 UoJQ== X-Gm-Message-State: AOAM533EZIpEoMg0DDsF2xwukfTFR0vDYRarkn+8xS829z8Zuo/LU4V7 TC59ZDost/5XGGcqdMRmfEvRP/sW9wUZIsV/aFdnhw== X-Received: by 2002:a37:a747:: with SMTP id q68mr3196410qke.352.1610437254475; Mon, 11 Jan 2021 23:40:54 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Alexander Potapenko Date: Tue, 12 Jan 2021 08:40:41 +0100 Message-ID: Subject: Re: [PATCH 02/11] kasan: clarify HW_TAGS impact on TBI To: Andrey Konovalov Cc: Catalin Marinas , Vincenzo Frascino , Dmitry Vyukov , Marco Elver , Andrew Morton , Will Deacon , Andrey Ryabinin , Evgenii Stepanov , Branislav Rankov , Kevin Brodsky , kasan-dev , Linux ARM , Linux Memory Management List , LKML Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 5, 2021 at 7:28 PM Andrey Konovalov wro= te: > > Mention in the documentation that enabling CONFIG_KASAN_HW_TAGS > always results in in-kernel TBI (Top Byte Ignore) being enabled. > > Also do a few minor documentation cleanups. > > Signed-off-by: Andrey Konovalov > Link: https://linux-review.googlesource.com/id/Iba2a6697e3c6304cb53f89ec6= 1dedc77fa29e3ae Reviewed-by: Alexander Potapenko > --- > Documentation/dev-tools/kasan.rst | 16 +++++++++++----- > 1 file changed, 11 insertions(+), 5 deletions(-) > > diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/= kasan.rst > index 0fc3fb1860c4..26c99852a852 100644 > --- a/Documentation/dev-tools/kasan.rst > +++ b/Documentation/dev-tools/kasan.rst > @@ -147,15 +147,14 @@ negative values to distinguish between different ki= nds of inaccessible memory > like redzones or freed memory (see mm/kasan/kasan.h). > > In the report above the arrows point to the shadow byte 03, which means = that > -the accessed address is partially accessible. > - > -For tag-based KASAN this last report section shows the memory tags aroun= d the > -accessed address (see `Implementation details`_ section). > +the accessed address is partially accessible. For tag-based KASAN modes = this > +last report section shows the memory tags around the accessed address > +(see the `Implementation details`_ section). > > Boot parameters > ~~~~~~~~~~~~~~~ > > -Hardware tag-based KASAN mode (see the section about different mode belo= w) is > +Hardware tag-based KASAN mode (see the section about various modes below= ) is > intended for use in production as a security mitigation. Therefore it su= pports > boot parameters that allow to disable KASAN competely or otherwise contr= ol > particular KASAN features. > @@ -305,6 +304,13 @@ reserved to tag freed memory regions. > Hardware tag-based KASAN currently only supports tagging of > kmem_cache_alloc/kmalloc and page_alloc memory. > > +If the hardware doesn't support MTE (pre ARMv8.5), hardware tag-based KA= SAN > +won't be enabled. In this case all boot parameters are ignored. > + > +Note, that enabling CONFIG_KASAN_HW_TAGS always results in in-kernel TBI= being > +enabled. Even when kasan.mode=3Doff is provided, or when the hardware do= esn't > +support MTE (but supports TBI). > + > What memory accesses are sanitised by KASAN? > -------------------------------------------- > > -- > 2.29.2.729.g45daf8777d-goog > --=20 Alexander Potapenko Software Engineer Google Germany GmbH Erika-Mann-Stra=C3=9Fe, 33 80636 M=C3=BCnchen Gesch=C3=A4ftsf=C3=BChrer: Paul Manicle, Halimah DeLaine Prado Registergericht und -nummer: Hamburg, HRB 86891 Sitz der Gesellschaft: Hamburg