Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp412897rwn; Thu, 8 Sep 2022 03:40:45 -0700 (PDT) X-Google-Smtp-Source: AA6agR48aCzlLAwa13sMwmvW5od6WMrfDQX/oJM6zC8gRf04E+CJOgM7wmF+nW6OTlvVxMYiTF9A X-Received: by 2002:a65:6cc7:0:b0:42a:4d40:8dc1 with SMTP id g7-20020a656cc7000000b0042a4d408dc1mr7416840pgw.321.1662633645312; Thu, 08 Sep 2022 03:40:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662633645; cv=none; d=google.com; s=arc-20160816; b=VHUUEHSXvHhZ0bfj1cD2DGkkn+QF6LxVGBPXcqeVg5+Qll9laQzpWaY3Ka0xD/vdog WUEI6Nrq/zG2Bwrwo2SHZf+O8JXjw3pClhRdkru0YJSHhw8VJkCq2DTPr2vqHI/tOFUO 9IJc0tzMce/+BARYLM/4ZSCWoup9vsBLmibc1nuag9JB7m7po7ItMVz9Rs5z5O7Q+kjM +fg73k9MinJVP8g0XylB2fqg8s9NiRt7H1b9wfgH141YzV75XKZQCAW39QH0iTktiUN2 VK00GnQFEsiaOcKZxI0Hd++66WHJ8JdLb0KfehTL5WCyDJ0jBy4SSGtpFCDhehtU4YAD 27JA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=2bm6zQNRrkcJeAZA3/ff7/rB5LYV+vNeJu+3t/RMjeU=; b=eiwGhmR3z0qVqfOueTpTafjbum8CcPhkhx8orekqegElsHujRDoLoX2RmXu1Uuvlpp woZwMmFAPBM3SKF57OfSxi6mBTIu12iQmN9gy94tqAD8Wp2GIUoVPOfkdqVCmqrdsGEj TXnTzGWIBfM8orjFwl0/CeikrIRk04PX2ABRAlObL0UFJ+RqkKjjMJSWv+abDZQ4gMUJ uDrWIQeusWZKGY8uMCGYuoc2DcyqVFlRzhZ2Se/cZ+PLDQYtHR5DXR+iE68PdZyCwjO+ XlX1Q8eTlf5LECdXB+2T/1bmnk0Pl6Y+fSMJdfr/jEPWGso7G4MpV3MGfg8aUHuC5Gnq XbQw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s201-20020a632cd2000000b0042c011b9ad5si18745916pgs.871.2022.09.08.03.40.33; Thu, 08 Sep 2022 03:40:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230100AbiIHKg5 (ORCPT + 99 others); Thu, 8 Sep 2022 06:36:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39954 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229847AbiIHKgz (ORCPT ); Thu, 8 Sep 2022 06:36:55 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1E76F9D105 for ; Thu, 8 Sep 2022 03:36:54 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 29A1314BF; Thu, 8 Sep 2022 03:37:00 -0700 (PDT) Received: from [10.1.27.146] (e121487-lin.cambridge.arm.com [10.1.27.146]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 8B71C3F71A; Thu, 8 Sep 2022 03:36:52 -0700 (PDT) Message-ID: <198b1486-d402-9061-a6f0-e522a548f040@arm.com> Date: Thu, 8 Sep 2022 11:36:42 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: [PATCH v2] mte: Initialize tag storage to KASAN_TAG_INVALID Content-Language: en-US To: Vincenzo Frascino , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com Cc: Catalin Marinas , Will Deacon References: <20220907110015.11489-1-vincenzo.frascino@arm.com> From: Vladimir Murzin In-Reply-To: <20220907110015.11489-1-vincenzo.frascino@arm.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-10.1 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Vincenzo, On 9/7/22 12:00, Vincenzo Frascino wrote: > When the kernel is entered on aarch64, the MTE allocation tags are in an > UNKNOWN state. > > With MTE enabled, the tags are initialized: > - When a page is allocated and the user maps it with PROT_MTE. > - On allocation, with in-kernel MTE enabled (HW_TAGS KASAN). > > If the tag pool is zeroed by the hardware at reset, it makes it > difficult to track potential places where the initialization of the > tags was missed. > > This can be observed under QEMU for aarch64, which initializes the MTE > allocation tags to zero. > > Initialize to tag storage to KASAN_TAG_INVALID to catch potential > places where the initialization of the tags was missed. > > This is done introducing a new kernel command line parameter > "mte.tags_init" that enables the debug option. > > Note: The proposed solution should be considered a debug option because > it might have performance impact on large machines at boot. > > Cc: Catalin Marinas > Cc: Will Deacon > Signed-off-by: Vincenzo Frascino > --- > arch/arm64/kernel/mte.c | 47 +++++++++++++++++++++++++++++++++++++++++ > 1 file changed, 47 insertions(+) Nothing in Documentation/ ? > > diff --git a/arch/arm64/kernel/mte.c b/arch/arm64/kernel/mte.c > index b2b730233274..af9a8eba9be4 100644 > --- a/arch/arm64/kernel/mte.c > +++ b/arch/arm64/kernel/mte.c > @@ -6,6 +6,7 @@ > #include > #include > #include > +#include > #include > #include > #include > @@ -35,6 +36,8 @@ DEFINE_STATIC_KEY_FALSE(mte_async_or_asymm_mode); > EXPORT_SYMBOL_GPL(mte_async_or_asymm_mode); > #endif > > +static bool mte_tags_init __ro_after_init; > + > static void mte_sync_page_tags(struct page *page, pte_t old_pte, > bool check_swap, bool pte_is_tagged) > { > @@ -98,6 +101,48 @@ int memcmp_pages(struct page *page1, struct page *page2) > return ret; > } > > +/* mte.tags_init=off/on */ > +static int __init early_mte_tags_init(char *arg) > +{ > + if (!arg) > + return -EINVAL; > + > + if (!strcmp(arg, "off")) > + mte_tags_init = false; > + else if (!strcmp(arg, "on")) > + mte_tags_init = true; > + else > + return -EINVAL; > + You might want to offload parsing to kstrtobool() > + return 0; > +} > +early_param("mte.tags_init", early_mte_tags_init); > + > +static inline void __mte_tag_storage_init(void) > +{ > + static bool mte_tags_uninitialized = true; > + phys_addr_t pa_start, pa_end; > + u64 index; > + > + if (mte_tags_init && !mte_tags_uninitialized) > + return; > + > + for_each_mem_range(index, &pa_start, &pa_end) { > + void *va_start = (void *)__phys_to_virt(pa_start); > + void *va_end = (void *)__phys_to_virt(pa_end); > + size_t va_size = (u64)va_end - (u64)va_start; > + > + if (va_start >= va_end) > + break; > + > + mte_set_mem_tag_range(va_start, va_size, KASAN_TAG_INVALID, false); > + } > + > + /* Tags are now initialized to KASAN_TAG_INVALID */ > + mte_tags_uninitialized = false; > + pr_info("MTE: Tag Storage Initialized\n"); Why All Words Start With Capital Letter? :D Anyway, you might want to advertise tag value used for initialization. > +} > + > static inline void __mte_enable_kernel(const char *mode, unsigned long tcf) > { > /* Enable MTE Sync Mode for EL1. */ > @@ -105,6 +150,8 @@ static inline void __mte_enable_kernel(const char *mode, unsigned long tcf) > SYS_FIELD_PREP(SCTLR_EL1, TCF, tcf)); > isb(); > > + __mte_tag_storage_init(); > + > pr_info_once("MTE: enabled in %s mode at EL1\n", mode); > } > Cheers Vladimir