Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1869223pxb; Mon, 8 Mar 2021 08:16:21 -0800 (PST) X-Google-Smtp-Source: ABdhPJw2lFuyyCbSoEyIqBQyK4GQ77m7WVFHunkB73jCj9AIq5s2w3l3/YPLn2qHlpDMI0Fs6VHh X-Received: by 2002:aa7:d287:: with SMTP id w7mr12248832edq.23.1615220181030; Mon, 08 Mar 2021 08:16:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615220181; cv=none; d=google.com; s=arc-20160816; b=YSDIX9dCi2RGvM0/Fpq9jCav9Fr/y9SFhJ8bq2VSs0xpcn+ApUS5fFqkanb0u9uzxO YxqJ+vaFbee/tJThKLIgtb/0G3TogoivLAIdbR4ZWfccp+NwyjzxbstLKJuNywUgDpjt ZC2Pxsz/AzLvdE2UBBDIzCNog/cKonYDWoL9LYdAA5+o9m3PcNZ/b1qwpHxaQcGQtifx 27+2daFvaF36Vd8qJ5ewQA67VcKVTziAJmIf4QYO6AGyPZ4AG6HcTxALCY4EUl5+Umkm fnJPDcsUQn/QUL0RJMBcCehdpFwqdENtSW9mlLbLGZ8odePjpyc++UxwEWzhuce6wGbj JVsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=+4gXhfOTcRwpXmW1T8TfYkYek32Z84QPssVvIW00keo=; b=Z/y8IdcFR5DQ5pbi6wCYst+6MwR+QB0ha+b9BafWCTeHFZ9rR9BfiMX701dLxGYgiP jvDlgGMrG0kCX1sc/W02XZaxhKZd8itJbjYCGLHECbtNJRQc1BzRO7Qea+xleW17s54u SqcyHhFVpe/GtzUnXajBBQtNKgWt2sf+UNIoNqpf2Of7ytslZ5rced0b5wU8eQAJkoAK lAOk8VT6C0lP1R7XC93JVemIcbftkLmLYNbc2nRg3QykIHd/j2AGiWq81d2teVKHRaXk +EVJSI3PUo/CJFm+zP0aak4jj+twrES5Xm3CuTjtNepCsvl39CHPxtFT4KOJ36HIMeq0 uQOA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gt5si7102906ejb.181.2021.03.08.08.15.56; Mon, 08 Mar 2021 08:16:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230126AbhCHQPB (ORCPT + 99 others); Mon, 8 Mar 2021 11:15:01 -0500 Received: from foss.arm.com ([217.140.110.172]:40182 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229650AbhCHQO5 (ORCPT ); Mon, 8 Mar 2021 11:14:57 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D8A14D6E; Mon, 8 Mar 2021 08:14:54 -0800 (PST) Received: from e119884-lin.cambridge.arm.com (e119884-lin.cambridge.arm.com [10.1.196.72]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id F0B1E3F73C; Mon, 8 Mar 2021 08:14:52 -0800 (PST) From: Vincenzo Frascino To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Cc: Vincenzo Frascino , Andrew Morton , Catalin Marinas , Will Deacon , Dmitry Vyukov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Evgenii Stepanov , Branislav Rankov , Andrey Konovalov , Lorenzo Pieralisi Subject: [PATCH v14 0/8] arm64: ARMv8.5-A: MTE: Add async mode support Date: Mon, 8 Mar 2021 16:14:26 +0000 Message-Id: <20210308161434.33424-1-vincenzo.frascino@arm.com> X-Mailer: git-send-email 2.30.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patchset implements the asynchronous mode support for ARMv8.5-A Memory Tagging Extension (MTE), which is a debugging feature that allows to detect with the help of the architecture the C and C++ programmatic memory errors like buffer overflow, use-after-free, use-after-return, etc. MTE is built on top of the AArch64 v8.0 virtual address tagging TBI (Top Byte Ignore) feature and allows a task to set a 4 bit tag on any subset of its address space that is multiple of a 16 bytes granule. MTE is based on a lock-key mechanism where the lock is the tag associated to the physical memory and the key is the tag associated to the virtual address. When MTE is enabled and tags are set for ranges of address space of a task, the PE will compare the tag related to the physical memory with the tag related to the virtual address (tag check operation). Access to the memory is granted only if the two tags match. In case of mismatch the PE will raise an exception. The exception can be handled synchronously or asynchronously. When the asynchronous mode is enabled: - Upon fault the PE updates the TFSR_EL1 register. - The kernel detects the change during one of the following: - Context switching - Return to user/EL0 - Kernel entry from EL1 - Kernel exit to EL1 - If the register has been updated by the PE the kernel clears it and reports the error. The series is based on linux-next/akpm. To simplify the testing a tree with the new patches on top has been made available at [1]. [1] https://git.gitlab.arm.com/linux-arm/linux-vf.git mte/v12.async.akpm Changes: -------- v14: - Rebase on the latest linux-next/akpm. - Address review comments. - Drop a patch that prevented to running the KUNIT tests in async mode. - Add kselftest to verify that TCO is enabled in load_unaligned_zeropad(). v13: - Rebase on the latest linux-next/akpm. - Address review comments. v12: - Fixed a bug affecting kernel functions allowed to read beyond buffer boundaries. - Added support for save/restore of TFSR_EL1 register during suspend/resume operations. - Rebased on latest linux-next/akpm. v11: - Added patch that disables KUNIT tests in async mode v10: - Rebase on the latest linux-next/akpm - Address review comments. v9: - Rebase on the latest linux-next/akpm - Address review comments. v8: - Address review comments. v7: - Fix a warning reported by kernel test robot. This time for real. v6: - Drop patches that forbid KASAN KUNIT tests when async mode is enabled. - Fix a warning reported by kernel test robot. - Address review comments. v5: - Rebase the series on linux-next/akpm. - Forbid execution for KASAN KUNIT tests when async mode is enabled. - Dropped patch to inline mte_assign_mem_tag_range(). - Address review comments. v4: - Added support for kasan.mode (sync/async) kernel command line parameter. - Addressed review comments. v3: - Exposed kasan_hw_tags_mode to convert the internal KASAN represenetation. - Added dsb() for kernel exit paths in arm64. - Addressed review comments. v2: - Fixed a compilation issue reported by krobot. - General cleanup. Cc: Andrew Morton Cc: Catalin Marinas Cc: Will Deacon Cc: Dmitry Vyukov Cc: Andrey Ryabinin Cc: Alexander Potapenko Cc: Marco Elver Cc: Evgenii Stepanov Cc: Branislav Rankov Cc: Andrey Konovalov Cc: Lorenzo Pieralisi Signed-off-by: Vincenzo Frascino Vincenzo Frascino (8): arm64: mte: Add asynchronous mode support kasan: Add KASAN mode kernel parameter arm64: mte: Drop arch_enable_tagging() kasan: Add report for async mode arm64: mte: Enable TCO in functions that can read beyond buffer limits arm64: mte: Enable async tag check fault arm64: mte: Report async tag faults before suspend kselftest/arm64: Verify that TCO is enabled in load_unaligned_zeropad() Documentation/dev-tools/kasan.rst | 9 ++ arch/arm64/include/asm/memory.h | 3 +- arch/arm64/include/asm/mte-kasan.h | 9 +- arch/arm64/include/asm/mte.h | 36 ++++++++ arch/arm64/include/asm/uaccess.h | 24 +++++ arch/arm64/include/asm/word-at-a-time.h | 4 + arch/arm64/kernel/entry-common.c | 6 ++ arch/arm64/kernel/mte.c | 90 ++++++++++++++++++- arch/arm64/kernel/suspend.c | 3 + include/linux/kasan.h | 6 ++ lib/test_kasan.c | 2 +- mm/kasan/hw_tags.c | 66 +++++++++++++- mm/kasan/kasan.h | 29 +++++- mm/kasan/report.c | 17 +++- .../arm64/mte/check_read_beyond_buffer.c | 78 ++++++++++++++++ 15 files changed, 367 insertions(+), 15 deletions(-) create mode 100644 tools/testing/selftests/arm64/mte/check_read_beyond_buffer.c -- 2.30.0