Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3166257pxj; Mon, 7 Jun 2021 04:10:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwQVu5HmWKD+0QaE3MD+QtGGgSciNab0//soB+zL02KSmveg08m762F2GO+dJEJTVJO8AQ1 X-Received: by 2002:aa7:dc17:: with SMTP id b23mr19048772edu.359.1623064207195; Mon, 07 Jun 2021 04:10:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623064207; cv=none; d=google.com; s=arc-20160816; b=OydTWphlEgwqx6vYBU1un1OD6PdUfEw64yy4s2hPXYUch72M0W6Ncq9DVyDCxooVO4 9SLqBzna7w3Y9q63I0AnCMsgoE9hCIzkd1A6qcd3VTomzwM7QGj5+05PdxKHlHnB2VK+ LH5kJflMvrH1IiC5Jh/68m93SpNOq4WN3NnmuE4S7KC1BJs61bMaJ7qWCokw53EArGi1 9ivErBOyTrhiZrbAj6EMpkCDrUm63W66xzEAlMCe/kV9neo4AdqJEsHMtzYAyl7gjeJV SbrHhKfNcsafwyC7/ArlMjeqgAo4d7g4n4sLejKps+puixRiNFsUmD5yxAkF7QJW6gmF c3SQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=8snUiDeEvxDRf4ac5iUBOoyV0yF9v4ciI9EcHsbcJgU=; b=nU8Q16txJ/QccxZ0uzGUhXD2mLVKE2Km/xUGkWHVrE64EoqCUjzbF3DkYwz8gpjzYB yD0Vaykk0kR7x0HV5xPz0+HCrO4PQGNBT0derym7OOp2uKBqrWBIRRwiVv54v6miWMJo WyfR7KZl7DI3We5rtoYmzv5lghqDty5gY45yQY8y+C+61IguWLRq/00BAVycvo2hp9Ns Qh5g3rBhEx9iLHPa/49UsuWiWKs6coBAGF8cXCxbifyCUNlkKxvvQbeIXLg/bAzDlcwi eq3h4osG0IDjPfepX2ssw8tPgCV89MhnVp3WF+OxOBJ/S+e9BtuJ6OHk7AGTuMGkJcj/ dt8Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d2si11890792ejr.606.2021.06.07.04.09.43; Mon, 07 Jun 2021 04:10:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231209AbhFGLK3 (ORCPT + 99 others); Mon, 7 Jun 2021 07:10:29 -0400 Received: from foss.arm.com ([217.140.110.172]:58514 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230483AbhFGLK0 (ORCPT ); Mon, 7 Jun 2021 07:10:26 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 75CA511D4; Mon, 7 Jun 2021 04:08:35 -0700 (PDT) Received: from e112269-lin.arm.com (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 9B45A3F73D; Mon, 7 Jun 2021 04:08:32 -0700 (PDT) From: Steven Price To: Catalin Marinas , Marc Zyngier , Will Deacon Cc: Steven Price , James Morse , Julien Thierry , Suzuki K Poulose , kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Dave Martin , Mark Rutland , Thomas Gleixner , qemu-devel@nongnu.org, Juan Quintela , "Dr. David Alan Gilbert" , Richard Henderson , Peter Maydell , Haibo Xu , Andrew Jones Subject: [PATCH v14 1/8] arm64: mte: Handle race when synchronising tags Date: Mon, 7 Jun 2021 12:08:09 +0100 Message-Id: <20210607110816.25762-2-steven.price@arm.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210607110816.25762-1-steven.price@arm.com> References: <20210607110816.25762-1-steven.price@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org mte_sync_tags() used test_and_set_bit() to set the PG_mte_tagged flag before restoring/zeroing the MTE tags. However if another thread were to race and attempt to sync the tags on the same page before the first thread had completed restoring/zeroing then it would see the flag is already set and continue without waiting. This would potentially expose the previous contents of the tags to user space, and cause any updates that user space makes before the restoring/zeroing has completed to potentially be lost. Since this code is run from atomic contexts we can't just lock the page during the process. Instead implement a new (global) spinlock to protect the mte_sync_page_tags() function. Fixes: 34bfeea4a9e9 ("arm64: mte: Clear the tags when a page is mapped in user-space with PROT_MTE") Reviewed-by: Catalin Marinas Signed-off-by: Steven Price --- arch/arm64/kernel/mte.c | 20 +++++++++++++++++--- 1 file changed, 17 insertions(+), 3 deletions(-) diff --git a/arch/arm64/kernel/mte.c b/arch/arm64/kernel/mte.c index 125a10e413e9..a3583a7fd400 100644 --- a/arch/arm64/kernel/mte.c +++ b/arch/arm64/kernel/mte.c @@ -25,6 +25,7 @@ u64 gcr_kernel_excl __ro_after_init; static bool report_fault_once = true; +static DEFINE_SPINLOCK(tag_sync_lock); #ifdef CONFIG_KASAN_HW_TAGS /* Whether the MTE asynchronous mode is enabled. */ @@ -34,13 +35,22 @@ EXPORT_SYMBOL_GPL(mte_async_mode); static void mte_sync_page_tags(struct page *page, pte_t *ptep, bool check_swap) { + unsigned long flags; pte_t old_pte = READ_ONCE(*ptep); + spin_lock_irqsave(&tag_sync_lock, flags); + + /* Recheck with the lock held */ + if (test_bit(PG_mte_tagged, &page->flags)) + goto out; + if (check_swap && is_swap_pte(old_pte)) { swp_entry_t entry = pte_to_swp_entry(old_pte); - if (!non_swap_entry(entry) && mte_restore_tags(entry, page)) - return; + if (!non_swap_entry(entry) && mte_restore_tags(entry, page)) { + set_bit(PG_mte_tagged, &page->flags); + goto out; + } } page_kasan_tag_reset(page); @@ -53,6 +63,10 @@ static void mte_sync_page_tags(struct page *page, pte_t *ptep, bool check_swap) */ smp_wmb(); mte_clear_page_tags(page_address(page)); + set_bit(PG_mte_tagged, &page->flags); + +out: + spin_unlock_irqrestore(&tag_sync_lock, flags); } void mte_sync_tags(pte_t *ptep, pte_t pte) @@ -63,7 +77,7 @@ void mte_sync_tags(pte_t *ptep, pte_t pte) /* if PG_mte_tagged is set, tags have already been initialised */ for (i = 0; i < nr_pages; i++, page++) { - if (!test_and_set_bit(PG_mte_tagged, &page->flags)) + if (!test_bit(PG_mte_tagged, &page->flags)) mte_sync_page_tags(page, ptep, check_swap); } } -- 2.20.1