Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp253093pxb; Wed, 25 Aug 2021 02:18:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz2to6deeUnYGtQTJDBEZ5zmrYcyawJxJeWGdxCa7R/AeTCnIaXuYSLBb8rcqGDmfEPRvp1 X-Received: by 2002:a92:b711:: with SMTP id k17mr30012258ili.247.1629883104422; Wed, 25 Aug 2021 02:18:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629883104; cv=none; d=google.com; s=arc-20160816; b=s6Qp2VXRJTUw+ar+1Tfv+2n5zg/MlNi8yW+1cDmWVQEkWoPHEEl9yTSPW0mF5IN2gB OMbq+EUxY4UO4Xus5TnmzFPYrIIi6ineaTDIh+WUZ9Nyn1Ed4lbdaYGkMUrKRB8mFgIE rwzml+Ezp1YqnnFnjV2t9fiPZ3orfLqbIQ3lGP42sxGViT7MaJxKnYlFxtXM+ez2W9zc wMKgmoWBmuybSZSwSs61uFUYKCBdGDEm+ZvwLUSIuiLOxW0ene/wv34dQOYX0J5LwN5z N3A92XPJKAtF9xYK9PDWBvvn6a7vb9apNR0iX2va5v28y9xIebQKk2dgnXU2JdsCwnUs 9HqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=clP+mUPYTuOlo56YQ0SYnLs1R6FBZ6qtuz6ZMArme7g=; b=UmNvF2zCWNbpF0zXC3hY5bUJyJPQDeVasrjVCh4/uSIv61h+p0TcUNlfn1tYjfXKMs YygfPpYQ3QU9dSpy1zZbuzRhQapJO0cXngXTINUiIZCLds0rugXfkh5N019HCgOF3xmK Uc5UFp8nGz6QkIY07C0qeCCsF30PZkTqW0nWDH0tPoEcrEpXTgi0ldV4MUzYEkb2jks9 shbDkqxVWlOIiBt+CONLKBFr1A+Ou8MeW5igwhlRhspU5xNR1Br8CCWA2BIC/FEeSZm4 Vji7BUMJ4vkdDNDEms0Y7qh9zSK+PpW4NNw7mWgXEb3NaN9UO5U2KwEL5Llx6HZIMEu2 TFxA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s8si19434929jam.20.2021.08.25.02.18.13; Wed, 25 Aug 2021 02:18:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239622AbhHYJSJ (ORCPT + 99 others); Wed, 25 Aug 2021 05:18:09 -0400 Received: from szxga01-in.huawei.com ([45.249.212.187]:8771 "EHLO szxga01-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233272AbhHYJSJ (ORCPT ); Wed, 25 Aug 2021 05:18:09 -0400 Received: from dggemv711-chm.china.huawei.com (unknown [172.30.72.55]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4GvgMz2S67zYrNx; Wed, 25 Aug 2021 17:16:47 +0800 (CST) Received: from dggpemm500001.china.huawei.com (7.185.36.107) by dggemv711-chm.china.huawei.com (10.1.198.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Wed, 25 Aug 2021 17:17:20 +0800 Received: from localhost.localdomain.localdomain (10.175.113.25) by dggpemm500001.china.huawei.com (7.185.36.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Wed, 25 Aug 2021 17:17:20 +0800 From: Kefeng Wang To: Russell King , Alexander Potapenko , Marco Elver , Dmitry Vyukov , , , CC: Andrew Morton , Kefeng Wang Subject: [PATCH 0/4] ARM: Support KFENCE feature Date: Wed, 25 Aug 2021 17:21:12 +0800 Message-ID: <20210825092116.149975-1-wangkefeng.wang@huawei.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.113.25] X-ClientProxiedBy: dggems702-chm.china.huawei.com (10.3.19.179) To dggpemm500001.china.huawei.com (7.185.36.107) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The patch 1~3 is to support KFENCE feature on ARM. NOTE: The context of patch2/3 changes in arch/arm/mm/fault.c is based on link[1], which make some refactor and cleanup about page fault. kfence_test is not useful when kfence is not enabled, skip kfence test when kfence not enabled in patch4. I tested the kfence_test on ARM QEMU with or without ARM_LPAE and all passed. [1] https://lore.kernel.org/linux-arm-kernel/20210610123556.171328-1-wangkefeng.wang@huawei.com/ Kefeng Wang (4): ARM: mm: Provide set_memory_valid() ARM: mm: Provide is_write_fault() ARM: Support KFENCE for ARM mm: kfence: Only load kfence_test when kfence is enabled arch/arm/Kconfig | 1 + arch/arm/include/asm/kfence.h | 52 +++++++++++++++++++++++++++++++ arch/arm/include/asm/set_memory.h | 5 +++ arch/arm/mm/fault.c | 16 ++++++++-- arch/arm/mm/pageattr.c | 41 ++++++++++++++++++------ include/linux/kfence.h | 2 ++ mm/kfence/core.c | 8 +++++ mm/kfence/kfence_test.c | 2 ++ 8 files changed, 114 insertions(+), 13 deletions(-) create mode 100644 arch/arm/include/asm/kfence.h -- 2.26.2