From patchwork Mon Aug 24 18:27:30 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Catalin Marinas X-Patchwork-Id: 11733935 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id B87CF13B1 for ; Mon, 24 Aug 2020 18:28:06 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 822CC206BE for ; Mon, 24 Aug 2020 18:28:06 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 822CC206BE Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 862E96B0006; Mon, 24 Aug 2020 14:28:04 -0400 (EDT) Delivered-To: linux-mm-outgoing@kvack.org Received: by kanga.kvack.org (Postfix, from userid 40) id 7E8CA6B0007; Mon, 24 Aug 2020 14:28:04 -0400 (EDT) X-Original-To: int-list-linux-mm@kvack.org X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 663C16B0008; Mon, 24 Aug 2020 14:28:04 -0400 (EDT) X-Original-To: linux-mm@kvack.org X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0226.hostedemail.com [216.40.44.226]) by kanga.kvack.org (Postfix) with ESMTP id 4E63F6B0006 for ; Mon, 24 Aug 2020 14:28:04 -0400 (EDT) Received: from smtpin12.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay03.hostedemail.com (Postfix) with ESMTP id 09F23824805A for ; Mon, 24 Aug 2020 18:28:04 +0000 (UTC) X-FDA: 77186296488.12.chess46_570459927055 Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin12.hostedemail.com (Postfix) with ESMTP id D29A11801288A for ; Mon, 24 Aug 2020 18:28:03 +0000 (UTC) X-Spam-Summary: 50,0,0,2991601495e3d1c8,d41d8cd98f00b204,cmainas@kernel.org,,RULES_HIT:2:41:355:379:541:800:967:973:981:988:989:1260:1311:1314:1345:1437:1515:1535:1605:1730:1747:1777:1792:1801:1981:2194:2199:2393:2525:2553:2560:2566:2682:2685:2693:2730:2859:2896:2933:2937:2939:2942:2945:2947:2951:2954:3022:3138:3139:3140:3141:3142:3865:3866:3867:3868:3870:3871:3874:3934:3936:3938:3941:3944:3947:3950:3953:3956:3959:4050:4119:4250:4321:4605:5007:6117:6119:6261:7875:9025:10004:11026:11232:11473:11658:11914:12043:12296:12297:12438:12517:12519:12555:12679:12895:12986:13161:13229:13846:13894:13972:14096:14394:14827:21080:21220:21230:21347:21433:21451:21611:21627:21795:30012:30051:30054:30055:30069:30070:30079,0,RBL:198.145.29.99:@kernel.org:.lbl8.mailshell.net-62.2.0.100 64.100.201.201;04yrz17cccnsetacg4945sdnc8po9opwy9sfw438zeo8fduwn96g4r6n697i4aw.8owq51p1wuieryjrmd13riifyzr6sr8hsd13j56ho5r4ngh83rmfajxbh1eyh66.c-lbl8.mailshell.net-223.238.255.100,CacheIP:none,Bayesian:0.5,0.5,0.5, Netcheck X-HE-Tag: chess46_570459927055 X-Filterd-Recvd-Size: 8690 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf30.hostedemail.com (Postfix) with ESMTP for ; Mon, 24 Aug 2020 18:28:03 +0000 (UTC) Received: from localhost.localdomain (unknown [95.146.230.145]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8712D206BE; Mon, 24 Aug 2020 18:28:00 +0000 (UTC) From: Catalin Marinas To: linux-arm-kernel@lists.infradead.org Cc: linux-mm@kvack.org, linux-arch@vger.kernel.org, Will Deacon , Dave P Martin , Vincenzo Frascino , Szabolcs Nagy , Kevin Brodsky , Andrey Konovalov , Peter Collingbourne , Andrew Morton Subject: [PATCH v8 00/28] arm64: Memory Tagging Extension user-space support Date: Mon, 24 Aug 2020 19:27:30 +0100 Message-Id: <20200824182758.27267-1-catalin.marinas@arm.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 X-Rspamd-Queue-Id: D29A11801288A X-Spamd-Result: default: False [0.00 / 100.00] X-Rspamd-Server: rspam01 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: This is version 8 (version 7 here [1]) of the series adding user-space support for the ARMv8.5 Memory Tagging Extension ([2], [3]). The patches are also available on this branch: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux for-next/mte There have been no further ABI changes and aiming for a 5.10 merge. While there is an ongoing discussion on allowing the prctl() to act on all threads of a process, this can be implemented separately if actually needed (I hope not). I would be grateful for acks (or naks) on the following patches: mm: [PATCH v7 06/29] mm: Add PG_arch_2 page flag [PATCH v7 07/29] mm: Preserve the PG_arch_2 flag in __split_huge_page_tail() [PATCH v7 13/29] mm: Introduce arch_calc_vm_flag_bits() fs: [PATCH v7 24/29] fs: Handle intra-page faults in copy_mount_options() arm64 KVM (small new addition in v7): [PATCH v7 02/29] arm64: mte: CPU feature detection and initial sysreg configuration Changes in this version: - Rebased onto v5.9-rc2. - The MTE initialisation (SCTLR_EL1, GCR_EL1, MAIR_EL1) is now done in __cpu_setup before the MMU is enabled. This will be needed for the subsequent in-kernel MTE support and also simplifies the CnP interaction. The "downside" is that we won't allow CPUs with mixed MTE features (which isn't really a downside). - print_pstate() now shows the TCO bit. - Updates following the regset_user_copyout() and get_user_pages_remote() changes in mainline. [1] https://lkml.kernel.org/r/20200715170844.30064-1-catalin.marinas@arm.com [2] https://community.arm.com/developer/ip-products/processors/b/processors-ip-blog/posts/enhancing-memory-safety [3] https://developer.arm.com/-/media/Arm%20Developer%20Community/PDF/Arm_Memory_Tagging_Extension_Whitepaper.pdf [4] https://sourceware.org/pipermail/libc-alpha/2020-June/115039.html Catalin Marinas (16): arm64: mte: Use Normal Tagged attributes for the linear map mm: Preserve the PG_arch_2 flag in __split_huge_page_tail() arm64: mte: Clear the tags when a page is mapped in user-space with PROT_MTE arm64: Avoid unnecessary clear_user_page() indirection arm64: mte: Tags-aware aware memcmp_pages() implementation arm64: mte: Add PROT_MTE support to mmap() and mprotect() mm: Introduce arch_validate_flags() arm64: mte: Validate the PROT_MTE request via arch_validate_flags() mm: Allow arm64 mmap(PROT_MTE) on RAM-based files arm64: mte: Allow user control of the tag check mode via prctl() arm64: mte: Allow user control of the generated random tags via prctl() arm64: mte: Restore the GCR_EL1 register after a suspend arm64: mte: Allow {set,get}_tagged_addr_ctrl() on non-current tasks arm64: mte: ptrace: Add PTRACE_{PEEK,POKE}MTETAGS support arm64: mte: ptrace: Add NT_ARM_TAGGED_ADDR_CTRL regset fs: Handle intra-page faults in copy_mount_options() Kevin Brodsky (1): mm: Introduce arch_calc_vm_flag_bits() Steven Price (4): mm: Add PG_arch_2 page flag mm: Add arch hooks for saving/restoring tags arm64: mte: Enable swap of tagged pages arm64: mte: Save tags when hibernating Vincenzo Frascino (7): arm64: mte: system register definitions arm64: mte: CPU feature detection and initial sysreg configuration arm64: mte: Add specific SIGSEGV codes arm64: mte: Handle synchronous and asynchronous tag check faults arm64: mte: Tags-aware copy_{user_,}highpage() implementations arm64: mte: Kconfig entry arm64: mte: Add Memory Tagging Extension documentation Documentation/arm64/cpu-feature-registers.rst | 2 + Documentation/arm64/elf_hwcaps.rst | 4 + Documentation/arm64/index.rst | 1 + .../arm64/memory-tagging-extension.rst | 305 ++++++++++++++++ arch/arm64/Kconfig | 31 ++ arch/arm64/include/asm/cpucaps.h | 3 +- arch/arm64/include/asm/cpufeature.h | 6 + arch/arm64/include/asm/hwcap.h | 2 +- arch/arm64/include/asm/kvm_arm.h | 3 +- arch/arm64/include/asm/memory.h | 17 +- arch/arm64/include/asm/mman.h | 56 ++- arch/arm64/include/asm/mte.h | 86 +++++ arch/arm64/include/asm/page.h | 19 +- arch/arm64/include/asm/pgtable-prot.h | 2 + arch/arm64/include/asm/pgtable.h | 46 ++- arch/arm64/include/asm/processor.h | 12 +- arch/arm64/include/asm/sysreg.h | 61 ++++ arch/arm64/include/asm/thread_info.h | 4 +- arch/arm64/include/uapi/asm/hwcap.h | 2 +- arch/arm64/include/uapi/asm/mman.h | 1 + arch/arm64/include/uapi/asm/ptrace.h | 4 + arch/arm64/kernel/Makefile | 1 + arch/arm64/kernel/cpufeature.c | 35 ++ arch/arm64/kernel/cpuinfo.c | 2 +- arch/arm64/kernel/entry.S | 37 ++ arch/arm64/kernel/hibernate.c | 118 ++++++ arch/arm64/kernel/mte.c | 336 ++++++++++++++++++ arch/arm64/kernel/process.c | 48 ++- arch/arm64/kernel/ptrace.c | 51 ++- arch/arm64/kernel/signal.c | 9 + arch/arm64/kernel/suspend.c | 4 + arch/arm64/kernel/syscall.c | 10 + arch/arm64/kvm/sys_regs.c | 2 + arch/arm64/lib/Makefile | 2 + arch/arm64/lib/mte.S | 151 ++++++++ arch/arm64/mm/Makefile | 1 + arch/arm64/mm/copypage.c | 25 +- arch/arm64/mm/dump.c | 4 + arch/arm64/mm/fault.c | 9 +- arch/arm64/mm/mmu.c | 20 +- arch/arm64/mm/mteswap.c | 83 +++++ arch/arm64/mm/proc.S | 32 +- arch/x86/kernel/signal_compat.c | 2 +- fs/namespace.c | 25 +- fs/proc/page.c | 3 + fs/proc/task_mmu.c | 4 + include/linux/kernel-page-flags.h | 1 + include/linux/mm.h | 8 + include/linux/mman.h | 23 +- include/linux/page-flags.h | 3 + include/linux/pgtable.h | 28 ++ include/trace/events/mmflags.h | 9 +- include/uapi/asm-generic/siginfo.h | 4 +- include/uapi/linux/elf.h | 1 + include/uapi/linux/prctl.h | 9 + mm/huge_memory.c | 3 + mm/mmap.c | 9 + mm/mprotect.c | 6 + mm/page_io.c | 10 + mm/shmem.c | 9 + mm/swapfile.c | 2 + mm/util.c | 2 +- tools/vm/page-types.c | 2 + 63 files changed, 1748 insertions(+), 62 deletions(-) create mode 100644 Documentation/arm64/memory-tagging-extension.rst create mode 100644 arch/arm64/include/asm/mte.h create mode 100644 arch/arm64/kernel/mte.c create mode 100644 arch/arm64/lib/mte.S create mode 100644 arch/arm64/mm/mteswap.c