Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp5019026pxj; Wed, 9 Jun 2021 07:25:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz8LsXwtLr5LDDBy5AgWJeqf7xRlJhKUF+nhB6C11HIAq23ALvzKbqTaoQG4Ar97+RL4+9b X-Received: by 2002:a17:907:20da:: with SMTP id qq26mr170254ejb.42.1623248706127; Wed, 09 Jun 2021 07:25:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623248706; cv=none; d=google.com; s=arc-20160816; b=tuHBM343e11a4H9AWDMzkjVRy+A0sJxgXtwuzG5/SBvpTNO7L81VjJ/MWsLxlEWdTf GkqU05z9rc7AJFV8dzPNwyJa0sLEOMdHtt1ibEn3KeblrKokjKxxhO4tVxiRzI26xW1A 0fbCebPWiyIqfbTkQ3p37mRVIm76ML7OU6WiLNhBQ0tBpDxWj0sidltv7L2MIrlu1ku+ YRE4cc8YTcsaIOu8dS0j7sFc0OlqK6IfWfVtkLtcDl87bRFA6S9h+5wP7wdFDHYE5XCr XJcHiAOzBkmnTeIdIzPT8n8v7oQgHri6Ix2htAbvtqW0eH1gCe1sIc/OjDjcrydbOMvT 2uaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date; bh=MURu+XIRsRzG8bW1VZPYELhmn7XQpA6sGwbBAXdc/Wk=; b=S6jLTnCgMreJeCRTqw0w0jMjnJ/7VBAHPM93VaftJIpO9T1jL4Su6Q49uO/jV0PDdQ JsJfnyIW16ManMtPur/gFZqJLyOB+LzIwWdxP1dvqNOIJo8yo8O7uMGf7Ih9ZNVa6by5 uz2L7CDJrOuD7Gy1fqCD8vyoUb6hMjqr4F2tMEPvKEjVEcUcImpvaI6etS6XdVNHspsh Gs3JcqrDV6dLpRvslVHxcYfHXfra2fDMDYht7BKyQwa5S0DzdXrxHsb3M30yUbZjNmKr WFpXwPdkbap/Flc/wh7PI41bf/sm5ZuAqNfTfNR504uR0ahgwcR8p82MGWfKRU1x8/wI dG5A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i19si2485536edb.180.2021.06.09.07.24.41; Wed, 09 Jun 2021 07:25:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236635AbhFIKct (ORCPT + 99 others); Wed, 9 Jun 2021 06:32:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:40580 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236561AbhFIKcq (ORCPT ); Wed, 9 Jun 2021 06:32:46 -0400 Received: from disco-boy.misterjones.org (disco-boy.misterjones.org [51.254.78.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 81C06601FC; Wed, 9 Jun 2021 10:30:52 +0000 (UTC) Received: from 82-132-234-177.dab.02.net ([82.132.234.177] helo=why.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1lqvU2-006SNj-7g; Wed, 09 Jun 2021 11:30:50 +0100 Date: Wed, 09 Jun 2021 11:30:46 +0100 Message-ID: <875yynz5wp.wl-maz@kernel.org> From: Marc Zyngier To: Steven Price Cc: Catalin Marinas , Will Deacon , James Morse , Julien Thierry , Suzuki K Poulose , kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Dave Martin , Mark Rutland , Thomas Gleixner , qemu-devel@nongnu.org, Juan Quintela , "Dr. David Alan Gilbert" , Richard Henderson , Peter Maydell , Haibo Xu , Andrew Jones Subject: Re: [PATCH v14 1/8] arm64: mte: Handle race when synchronising tags In-Reply-To: <20210607110816.25762-2-steven.price@arm.com> References: <20210607110816.25762-1-steven.price@arm.com> <20210607110816.25762-2-steven.price@arm.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 82.132.234.177 X-SA-Exim-Rcpt-To: steven.price@arm.com, catalin.marinas@arm.com, will@kernel.org, james.morse@arm.com, julien.thierry.kdev@gmail.com, suzuki.poulose@arm.com, kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Dave.Martin@arm.com, mark.rutland@arm.com, tglx@linutronix.de, qemu-devel@nongnu.org, quintela@redhat.com, dgilbert@redhat.com, richard.henderson@linaro.org, peter.maydell@linaro.org, Haibo.Xu@arm.com, drjones@redhat.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 07 Jun 2021 12:08:09 +0100, Steven Price wrote: > > mte_sync_tags() used test_and_set_bit() to set the PG_mte_tagged flag > before restoring/zeroing the MTE tags. However if another thread were to > race and attempt to sync the tags on the same page before the first > thread had completed restoring/zeroing then it would see the flag is > already set and continue without waiting. This would potentially expose > the previous contents of the tags to user space, and cause any updates > that user space makes before the restoring/zeroing has completed to > potentially be lost. > > Since this code is run from atomic contexts we can't just lock the page > during the process. Instead implement a new (global) spinlock to protect > the mte_sync_page_tags() function. > > Fixes: 34bfeea4a9e9 ("arm64: mte: Clear the tags when a page is mapped in user-space with PROT_MTE") > Reviewed-by: Catalin Marinas > Signed-off-by: Steven Price > --- > arch/arm64/kernel/mte.c | 20 +++++++++++++++++--- > 1 file changed, 17 insertions(+), 3 deletions(-) > > diff --git a/arch/arm64/kernel/mte.c b/arch/arm64/kernel/mte.c > index 125a10e413e9..a3583a7fd400 100644 > --- a/arch/arm64/kernel/mte.c > +++ b/arch/arm64/kernel/mte.c > @@ -25,6 +25,7 @@ > u64 gcr_kernel_excl __ro_after_init; > > static bool report_fault_once = true; > +static DEFINE_SPINLOCK(tag_sync_lock); > > #ifdef CONFIG_KASAN_HW_TAGS > /* Whether the MTE asynchronous mode is enabled. */ > @@ -34,13 +35,22 @@ EXPORT_SYMBOL_GPL(mte_async_mode); > > static void mte_sync_page_tags(struct page *page, pte_t *ptep, bool check_swap) > { > + unsigned long flags; > pte_t old_pte = READ_ONCE(*ptep); > > + spin_lock_irqsave(&tag_sync_lock, flags); having though a bit more about this after an offline discussion with Catalin: why can't this lock be made per mm? We can't really share tags across processes anyway, so this is limited to threads from the same process. I'd also like it to be documented that page sharing can only reliably work with tagging if only one of the mappings is using tags. Thanks, M. -- Without deviation from the norm, progress is not possible.