Received: by 2002:a05:6a10:6d25:0:0:0:0 with SMTP id gq37csp1610119pxb; Mon, 13 Sep 2021 01:15:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzwY+aajAYix1TPmJXGc3yqDnOGsvQGsM+vUfmc7bPhyY7Kh8K6Ndue8wmjs3a3RGyG2Ws/ X-Received: by 2002:a02:908a:: with SMTP id x10mr8567862jaf.30.1631520942724; Mon, 13 Sep 2021 01:15:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631520942; cv=none; d=google.com; s=arc-20160816; b=SGXv49qqRWhLWw9TU2gUG3qwWivA8B88bIydftGADa94eYdERyB/16cdFAaXpaJ/Ge pgDSLkYChAK9t2Hoxw5NWkwyWwDAMT2OEzoUd1qqtFgq173Iwyozdw0aXbJuahn+smD0 3jW0CBFJkgnP7lBSCUUqdqw6sn50zLwNQ4wH3C4heb7a2uFcHTkqBBTfiLfvN3dlFFjL UorIWDhYYiFRihHf2JXE0pPWrHym3geDkIk39x+RBzsg73MNZdSTku/zOFy6vpoIGoU3 qqZtw2iZ0+5736fsne0/rXc66giiooHBqHDYpM5khoBDjWIpeOF7r8kLwV2ca6qDJv9u BiOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=B1AD/3Y7xReFmCU1cJSMLM6ARE2RzrL0fPAEo3OULJQ=; b=x1n+V8qVEAtztBvxLsbeXdaswaq4t0uDAge+l1Dk6mP3qampz1LkQEk2PQT8ZzGxUM GusVZj0d8XsJYafnMDL+FdTA5+HgA4eAcPFQKeHMeyU+vifVpr63JIz6cWhm+/1V49E6 kDWeEAfvHz6ijm66Ocf1ayZRvteS3feDZHGj5jKa25z35TfkCGDypndyIowW3GvRvRtc 2Uv9CQp0TooT065gnoiVceycoloMtqvRt6OfIA4aowcMooykxpa3s9BKaX38JP4tY5Y2 7tYKfJxnlS2o9FzD5UkvpmulZsRy9t1cV4rwCfd/aUIVpFmUU84BLNc7lbwdEoNsaK5J 2SYw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n3si6787747ioh.98.2021.09.13.01.15.30; Mon, 13 Sep 2021 01:15:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237875AbhIMIP4 (ORCPT + 99 others); Mon, 13 Sep 2021 04:15:56 -0400 Received: from foss.arm.com ([217.140.110.172]:54822 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237869AbhIMIPz (ORCPT ); Mon, 13 Sep 2021 04:15:55 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 652EF31B; Mon, 13 Sep 2021 01:14:39 -0700 (PDT) Received: from e119884-lin.cambridge.arm.com (e119884-lin.cambridge.arm.com [10.1.196.72]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 820D93F5A1; Mon, 13 Sep 2021 01:14:37 -0700 (PDT) From: Vincenzo Frascino To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Cc: vincenzo.frascino@arm.com, Andrew Morton , Catalin Marinas , Will Deacon , Dmitry Vyukov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Evgenii Stepanov , Branislav Rankov , Andrey Konovalov , Lorenzo Pieralisi Subject: [PATCH 0/5] arm64: ARMv8.7-A: MTE: Add asymm mode support Date: Mon, 13 Sep 2021 09:14:19 +0100 Message-Id: <20210913081424.48613-1-vincenzo.frascino@arm.com> X-Mailer: git-send-email 2.33.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series implements the asymmetric mode support for ARMv8.7-A Memory Tagging Extension (MTE), which is a debugging feature that allows to detect with the help of the architecture the C and C++ programmatic memory errors like buffer overflow, use-after-free, use-after-return, etc. MTE is built on top of the AArch64 v8.0 virtual address tagging TBI (Top Byte Ignore) feature and allows a task to set a 4 bit tag on any subset of its address space that is multiple of a 16 bytes granule. MTE is based on a lock-key mechanism where the lock is the tag associated to the physical memory and the key is the tag associated to the virtual address. When MTE is enabled and tags are set for ranges of address space of a task, the PE will compare the tag related to the physical memory with the tag related to the virtual address (tag check operation). Access to the memory is granted only if the two tags match. In case of mismatch the PE will raise an exception. When asymmetric mode is present, the CPU triggers a fault on a tag mismatch during a load operation and asynchronously updates a register when a tag mismatch is detected during a store operation. The series is based on linux-v5.15-rc1. To simplify the testing a tree with the new patches on top has been made available at [1]. [1] https://git.gitlab.arm.com/linux-arm/linux-vf.git mte/v1.asymm Cc: Andrew Morton Cc: Catalin Marinas Cc: Will Deacon Cc: Dmitry Vyukov Cc: Andrey Ryabinin Cc: Alexander Potapenko Cc: Marco Elver Cc: Evgenii Stepanov Cc: Branislav Rankov Cc: Andrey Konovalov Cc: Lorenzo Pieralisi Signed-off-by: Vincenzo Frascino Vincenzo Frascino (5): kasan: Remove duplicate of kasan_flag_async arm64: mte: Bitfield definitions for Asymm MTE arm64: mte: CPU feature detection for Asymm MTE arm64: mte: Add asymmetric mode support kasan: Extend KASAN mode kernel parameter Documentation/dev-tools/kasan.rst | 10 ++++++++-- arch/arm64/include/asm/memory.h | 1 + arch/arm64/include/asm/mte-kasan.h | 5 +++++ arch/arm64/include/asm/sysreg.h | 3 +++ arch/arm64/kernel/cpufeature.c | 10 ++++++++++ arch/arm64/kernel/mte.c | 26 ++++++++++++++++++++++++++ arch/arm64/tools/cpucaps | 1 + mm/kasan/hw_tags.c | 27 ++++++++++++++++++++++----- mm/kasan/kasan.h | 7 +++++-- 9 files changed, 81 insertions(+), 9 deletions(-) -- 2.33.0