Received: by 2002:a05:7412:b130:b0:e2:908c:2ebd with SMTP id az48csp1757631rdb; Sun, 19 Nov 2023 09:01:23 -0800 (PST) X-Google-Smtp-Source: AGHT+IGyhkje5YA+Wng9wf9ZBv+LML8520d6c2V5rUTzJgNBzeInfq0NuScH5QClW8x6JHEAFyYx X-Received: by 2002:a17:902:c945:b0:1c9:d7f7:486 with SMTP id i5-20020a170902c94500b001c9d7f70486mr3384422pla.59.1700413282993; Sun, 19 Nov 2023 09:01:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700413282; cv=none; d=google.com; s=arc-20160816; b=UJHPxpVytiWDk+YHeQ4w+m/QpwWMI3gYJWuOzbXhuHMqS3YKEVOsZMpGqMo4aMcn7b 1EZ4MNmsO/a3sq35J3xaKi0msdC3qJAOUPm5WTIN9PqWyV0Q/hAllTEl+TsTrvesnEza SXENWKOMAP1IRMFLECnMZ77RiId12kw3pQldwkTgzOYN8J3MXk4LBU56G3kaLsGip5xS a78rHbL4KN6AH0Cc0FPucarQM0TpIh99KmAZHShLplzC/kvL7ZXdJoLHyyadjR7S7O4Z me0o5Cn9U0uqYkr8q0p6uAMqehbZH9YANbO9lKkwZr3c2coeRqHyuGNx2p7svxOlwi9f Dvtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=73PJp88VNevjToANIe5rcUjOoPEQ0omOZVG2uCU4Qvk=; fh=ON0oQ90Z4xnjbNCGsyMgiRbLR29nyOKvbeaw6TmRihk=; b=Iytp5ffmEApX3MBzxXOS5Qz4I3ac9Q+uQKPmJHDt7RPZ6rhimwUp57zvYfiiEHl8++ pvGa8J20kn2Xs0E3EfZ4pvNEeDP4pWxDkbvfKzBsWYWxeAokrBRuDjHYmJa9X5JWyVMt /393eUjS0pSbjQ0ch0CyGwQzUQYe2uXxjxaA5AqKe4Dl8lygirLGtAxsW+qmq9Ajrt1m KfmfMYb0AGwjKyM+EuvfXOzcdeyfvDWc85VjRp3/VWSPd5hsI1LkxgYbAQie6+orNtrM 9e8bEWI/oOQ9hefU1Ba+02qFrx4Ird7VloBWmEWyJtV+eBfxfY8Wn8wmwuBcWf7ez/bI OPNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id u2-20020a170902b28200b001ca335f7147si6192441plr.57.2023.11.19.09.01.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 19 Nov 2023 09:01:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id E16398060351; Sun, 19 Nov 2023 09:00:55 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231743AbjKSQ73 (ORCPT + 99 others); Sun, 19 Nov 2023 11:59:29 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36094 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231629AbjKSQ7K (ORCPT ); Sun, 19 Nov 2023 11:59:10 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 7C8C1172D; Sun, 19 Nov 2023 08:58:53 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8E171DA7; Sun, 19 Nov 2023 08:59:39 -0800 (PST) Received: from e121798.cable.virginm.net (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 5A3EA3F6C4; Sun, 19 Nov 2023 08:58:48 -0800 (PST) From: Alexandru Elisei To: catalin.marinas@arm.com, will@kernel.org, oliver.upton@linux.dev, maz@kernel.org, james.morse@arm.com, suzuki.poulose@arm.com, yuzenghui@huawei.com, arnd@arndb.de, akpm@linux-foundation.org, mingo@redhat.com, peterz@infradead.org, juri.lelli@redhat.com, vincent.guittot@linaro.org, dietmar.eggemann@arm.com, rostedt@goodmis.org, bsegall@google.com, mgorman@suse.de, bristot@redhat.com, vschneid@redhat.com, mhiramat@kernel.org, rppt@kernel.org, hughd@google.com Cc: pcc@google.com, steven.price@arm.com, anshuman.khandual@arm.com, vincenzo.frascino@arm.com, david@redhat.com, eugenis@google.com, kcc@google.com, hyesoo.yu@samsung.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org Subject: [PATCH RFC v2 14/27] arm64: mte: Disable dynamic tag storage management if HW KASAN is enabled Date: Sun, 19 Nov 2023 16:57:08 +0000 Message-Id: <20231119165721.9849-15-alexandru.elisei@arm.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20231119165721.9849-1-alexandru.elisei@arm.com> References: <20231119165721.9849-1-alexandru.elisei@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Sun, 19 Nov 2023 09:00:56 -0800 (PST) To be able to reserve the tag storage associated with a page requires that the tag storage page can be migrated. When HW KASAN is enabled, the kernel allocates pages, which are now tagged, in non-preemptible contexts, which can make reserving the associate tag storage impossible. Keep the tag storage pages reserved if HW KASAN is enabled. Signed-off-by: Alexandru Elisei --- arch/arm64/kernel/mte_tag_storage.c | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/arch/arm64/kernel/mte_tag_storage.c b/arch/arm64/kernel/mte_tag_storage.c index 427f4f1909f3..8b9bedf7575d 100644 --- a/arch/arm64/kernel/mte_tag_storage.c +++ b/arch/arm64/kernel/mte_tag_storage.c @@ -308,6 +308,19 @@ static int __init mte_tag_storage_activate_regions(void) goto out_disabled; } + /* + * The kernel allocates memory in non-preemptible contexts, which makes + * migration impossible when reserving the associated tag storage. + * + * The check is safe to make because KASAN HW tags are enabled before + * the rest of the init functions are called, in smp_prepare_boot_cpu(). + */ + if (kasan_hw_tags_enabled()) { + pr_info("KASAN HW tags incompatible with MTE tag storage management"); + ret = 0; + goto out_disabled; + } + for (i = 0; i < num_tag_regions; i++) { tag_range = &tag_regions[i].tag_range; for (pfn = tag_range->start; pfn <= tag_range->end; pfn += pageblock_nr_pages) -- 2.42.1