Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp515573pxf; Thu, 11 Mar 2021 08:36:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJwj/J+ngtb33gSTWv2uP4O2bNDbNphlQImQjTXWBHDA9+9opme4oZG1p5Y1E5HHADsxKyJ1 X-Received: by 2002:a05:6402:13ca:: with SMTP id a10mr9405289edx.320.1615480574231; Thu, 11 Mar 2021 08:36:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615480574; cv=none; d=google.com; s=arc-20160816; b=Hv6xeQJSmnH7Yzksp1ubnPlDCLgp6TRhY4wUVkv+ZYGnVao8/EcfMqlqb5w0S23xcb 6QADumvuLq3vMcVhwMuMsKH0GrNfUH6CowDsGIp0vLPaMbz+t/4+lFpOjTMah70ZvxNS rTUG0cWSJlqAG27QDqEqTEF2zEP4B2LC+MxN8HMI4VBynv6XDLY1sO3L4vOaVeS1wZvr Z2ts0wWeFeDC+NbKMEwl4rotBi+igaLL3EdB3jmTLl8QpRQ+edyuQX5TvdemAnX3WjtM 9yq4ZAF/2yHUR60vL8NKGjqaoLkIjKc2ytT+VNBmgxyrQ4in8NvlFN7UXdfyeBeD1K2T v/rQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=nQIwblRfTbQNALXZOJq8XnRJ6w+AUHUJ2fMZTKOlCuY=; b=Fssxn7iWLMmkXKZEPYFpqq3dJb/J46iBfTn31nUnHMGYxvaZ+f9825dAaZ3iQhSD2p c3WyMvPPjWdYWSv1uGB1VVNu2lXqQWfbTKGkICplOtiMvwpBCpa97TsWBZvFZzA5gc5F Ji7qTZo/3AEzCnFD3jWZu/McqS06/5b4cqfOUnlex6As+iizf0k2J1P2J2z3GQsKZhNB LnSCJVbWrJYlDxEA7d0Cy4wLIG0xmCvMqkMB3Z/JPvgTzi9lnyx+zfdV33awctaAK3Q8 KIG3dYK1DulwXYMb14/6vIgJ9L0MqdpBECzRHELGSHiGVow5Qi798uxrmpmwiu42aLx0 5PIw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g3si2156453edw.592.2021.03.11.08.35.51; Thu, 11 Mar 2021 08:36:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229468AbhCKQeX (ORCPT + 99 others); Thu, 11 Mar 2021 11:34:23 -0500 Received: from foss.arm.com ([217.140.110.172]:39848 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229568AbhCKQeT (ORCPT ); Thu, 11 Mar 2021 11:34:19 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 5F0EA1FB; Thu, 11 Mar 2021 08:34:18 -0800 (PST) Received: from [10.37.8.5] (unknown [10.37.8.5]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 61A193F70D; Thu, 11 Mar 2021 08:34:16 -0800 (PST) Subject: Re: [PATCH v14 8/8] kselftest/arm64: Verify that TCO is enabled in load_unaligned_zeropad() To: Catalin Marinas Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, Andrew Morton , Will Deacon , Dmitry Vyukov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Evgenii Stepanov , Branislav Rankov , Andrey Konovalov , Lorenzo Pieralisi References: <20210308161434.33424-1-vincenzo.frascino@arm.com> <20210308161434.33424-9-vincenzo.frascino@arm.com> <20210311132509.GB30821@arm.com> <20210311162820.GE30821@arm.com> From: Vincenzo Frascino Message-ID: <60c1eedb-edc7-e92f-73ed-b26f97a21b97@arm.com> Date: Thu, 11 Mar 2021 16:34:15 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20210311162820.GE30821@arm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/11/21 4:28 PM, Catalin Marinas wrote: > On Thu, Mar 11, 2021 at 03:00:26PM +0000, Vincenzo Frascino wrote: >> On 3/11/21 1:25 PM, Catalin Marinas wrote: >>> On Mon, Mar 08, 2021 at 04:14:34PM +0000, Vincenzo Frascino wrote: >>>> load_unaligned_zeropad() and __get/put_kernel_nofault() functions can >>>> read passed some buffer limits which may include some MTE granule with a >>>> different tag. >>>> >>>> When MTE async mode is enable, the load operation crosses the boundaries >>>> and the next granule has a different tag the PE sets the TFSR_EL1.TF1 >>>> bit as if an asynchronous tag fault is happened: >>>> >>>> ================================================================== >>>> BUG: KASAN: invalid-access >>>> Asynchronous mode enabled: no access details available >>>> >>>> CPU: 0 PID: 1 Comm: init Not tainted 5.12.0-rc1-ge1045c86620d-dirty #8 >>>> Hardware name: FVP Base RevC (DT) >>>> Call trace: >>>> dump_backtrace+0x0/0x1c0 >>>> show_stack+0x18/0x24 >>>> dump_stack+0xcc/0x14c >>>> kasan_report_async+0x54/0x70 >>>> mte_check_tfsr_el1+0x48/0x4c >>>> exit_to_user_mode+0x18/0x38 >>>> finish_ret_to_user+0x4/0x15c >>>> ================================================================== >>>> >>>> Verify that Tag Check Override (TCO) is enabled in these functions before >>>> the load and disable it afterwards to prevent this to happen. >>>> >>>> Note: The issue has been observed only with an MTE enabled userspace. >>> >>> The above bug is all about kernel buffers. While userspace can trigger >>> the relevant code paths, it should not matter whether the user has MTE >>> enabled or not. Can you please confirm that you can still triggered the >>> fault with kernel-mode MTE but non-MTE user-space? If not, we may have a >>> bug somewhere as the two are unrelated: load_unaligned_zeropad() only >>> acts on kernel buffers and are subject to the kernel MTE tag check fault >>> mode. >> >> I retried and you are right, it does not matter if it is a MTE or non-MTE >> user-space. The issue seems to be that this test does not trigger the problem >> all the times which probably lead me to the wrong conclusions. > > Keep the test around for some quick checks before you get the kasan > test support. > Of course, I never throw away my code. >>> I don't think we should have a user-space selftest for this. The bug is >>> not about a user-kernel interface, so an in-kernel test is more >>> appropriate. Could we instead add this to the kasan tests and calling >>> load_unaligned_zeropad() and other functions directly? >> >> I agree with you we should abandon this strategy of triggering the issue due to >> my comment above. I will investigate the option of having a kasan test and try >> to come up with one that calls the relevant functions directly. I would prefer >> though, since the rest of the series is almost ready, to post it in a future >> series. What do you think? > > That's fine by me. > -- Regards, Vincenzo