From patchwork Thu Oct 29 19:25:21 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andrey Konovalov X-Patchwork-Id: 11867173 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 629C0697 for ; Thu, 29 Oct 2020 19:26:12 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id D4F2221534 for ; Thu, 29 Oct 2020 19:26:11 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=google.com header.i=@google.com header.b="JH1POZ22" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org D4F2221534 Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id AB2686B005C; Thu, 29 Oct 2020 15:26:10 -0400 (EDT) Delivered-To: linux-mm-outgoing@kvack.org Received: by kanga.kvack.org (Postfix, from userid 40) id A3A876B0062; Thu, 29 Oct 2020 15:26:10 -0400 (EDT) X-Original-To: int-list-linux-mm@kvack.org X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 901626B0068; Thu, 29 Oct 2020 15:26:10 -0400 (EDT) X-Original-To: linux-mm@kvack.org X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0111.hostedemail.com [216.40.44.111]) by kanga.kvack.org (Postfix) with ESMTP id 4F7E66B005C for ; Thu, 29 Oct 2020 15:26:10 -0400 (EDT) Received: from smtpin26.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id BAEFB1EE6 for ; Thu, 29 Oct 2020 19:26:09 +0000 (UTC) X-FDA: 77425943658.26.leaf37_171002a2728f Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin26.hostedemail.com (Postfix) with ESMTP id 8B20A1804B65C for ; Thu, 29 Oct 2020 19:26:09 +0000 (UTC) X-Spam-Summary: 50,0,0,417c4f83a20090a0,d41d8cd98f00b204,3txebxwokcowobrfsmybjzuccuzs.qcazwbil-aayjoqy.cfu@flex--andreyknvl.bounces.google.com,,RULES_HIT:4:41:69:152:355:379:541:800:960:966:967:968:973:982:988:989:1042:1260:1277:1313:1314:1345:1431:1437:1516:1518:1593:1594:1605:1730:1747:1777:1792:1801:1981:2194:2196:2198:2199:2200:2201:2393:2525:2568:2627:2682:2685:2693:2731:2859:2895:2901:2911:2915:2924:2926:2933:2937:2939:2942:2945:2947:2951:2954:3022:3138:3139:3140:3141:3142:3152:3743:3865:3866:3867:3868:3870:3871:3872:3874:3934:3936:3938:3941:3944:3947:3950:3953:3956:3959:4250:4321:4385:4425:4605:5007:6117:6119:6261:6653:6742:7875:7903:7974:8531:8603:8660:8784:8957:9025:9969:10004:11026:11232:11473:11657:11658:11914:12043:12219:12296:12297:12438:12555:12663:12679:12698:12737:12895:13053:13148:13161:13180:13229:13230:13548:13845:13972:14096:14097:14196:14394:14659:21080:21220:21325:21347:21365:21433:21444:21451:21627:21740:21772:21795:21939:21966:21990:30003:30012:30034:3 0051:300 X-HE-Tag: leaf37_171002a2728f X-Filterd-Recvd-Size: 18799 Received: from mail-wm1-f74.google.com (mail-wm1-f74.google.com [209.85.128.74]) by imf03.hostedemail.com (Postfix) with ESMTP for ; Thu, 29 Oct 2020 19:26:08 +0000 (UTC) Received: by mail-wm1-f74.google.com with SMTP id r19so295793wmh.9 for ; Thu, 29 Oct 2020 12:26:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:message-id:mime-version:subject:from:to:cc; bh=Cm6ll+lqz6eapm3MnEkxQHRHXHy02DA4hi2HZebBSFc=; b=JH1POZ22Fp263N7TobuZCtB4ebXTbDxsxrdX0ZFbTl3PedY+kB7g7uQT9ekoNMoGbH Va9sn9HBHijIaAhTVVoQ9aYiwmwfQQQnl1oXuQHePwQ396oihrb4og58O92Q4TfEgm63 RhwRJ++Pcr6xtgwxLjTCNXK0+S0UzUq5bfNEhKkgqNIJ/8KxrRP1vm7r4+ejtLpqVg16 FNv+yqhP5ojBMgcv5wBYclBuCizTn2KECPqB1yhtcNHEVG1ZJh0gL/CMmBmcEGAFtSid QUmXzAdnLYG0cwqS0Y8oCfmByeoJ3IPiedZDvDpV9wYRXOIipNDgxQUk6gc9sBinl2XE K13g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:message-id:mime-version:subject:from :to:cc; bh=Cm6ll+lqz6eapm3MnEkxQHRHXHy02DA4hi2HZebBSFc=; b=I2pqI9pAmpBD7R1OpGVOPtju5hRqXj4w6YpcWbraBKB44wcwWCXpqXpRiorJiXmfF6 OmlqZJGNMRfy/WIxf//B61QOirMU0am0j0kfO03sUpZBu3rbc59R7Flr9gCjyANcUyLV JW4CQCLxuwuGl8F1iAljYDafsSBwMHzvHLx0c1bs5E+N3gKGDPdxRDCrLdzaJ/oQzNlx jN/0YpwamUXRV7M6e+/1eGFHmH3VBo91+ieDz73U5wgyaeAg5BrjvtOFXhzkbfUmRcPa DXJIMw1Y7kpxgzJs7l/V09dFC7Y9OeALwMuGixrjIk6FAze3npb8VYK5naw3mRNN6vGy cSiw== X-Gm-Message-State: AOAM530XOqVGC8YlAIc6h4xeImDJwkm94Us4ddFbDu8tOFdaL5f9dzKp cL8HoVnhO66im95yo31327nTmDizHM1id9AZ X-Google-Smtp-Source: ABdhPJyzjHCB+MNSB/gJ1Y6BG5lWgVuS5ZZxBjUqkBmx1LCvq13g5+G/vYWJM6NgWx7ubtj8d0rWGlO/Habb514Z X-Received: from andreyknvl3.muc.corp.google.com ([2a00:79e0:15:13:7220:84ff:fe09:7e9d]) (user=andreyknvl job=sendgmr) by 2002:a05:600c:21d3:: with SMTP id x19mr761255wmj.170.1603999567233; Thu, 29 Oct 2020 12:26:07 -0700 (PDT) Date: Thu, 29 Oct 2020 20:25:21 +0100 Message-Id: Mime-Version: 1.0 X-Mailer: git-send-email 2.29.1.341.ge80a0c044ae-goog Subject: [PATCH v6 00/40] kasan: add hardware tag-based mode for arm64 From: Andrey Konovalov To: Catalin Marinas , Will Deacon Cc: Vincenzo Frascino , kasan-dev@googlegroups.com, Dmitry Vyukov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Evgenii Stepanov , Elena Petrova , Branislav Rankov , Kevin Brodsky , Andrew Morton , linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrey Konovalov X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: This patchset adds a new hardware tag-based mode to KASAN [1]. The new mode is similar to the existing software tag-based KASAN, but relies on arm64 Memory Tagging Extension (MTE) [2] to perform memory and pointer tagging (instead of shadow memory and compiler instrumentation). This patchset is co-developed by Vincenzo Frascino . This patchset is available here: https://github.com/xairy/linux/tree/up-kasan-mte-v6 and has also been uploaded to the Linux kernel Gerrit instance: https://linux-review.googlesource.com/c/linux/kernel/git/torvalds/linux/+/3319 For testing in QEMU hardware tag-based KASAN requires: 1. QEMU built from master [4] (use "-machine virt,mte=on -cpu max" arguments to run). 2. GCC version 10. [1] https://www.kernel.org/doc/html/latest/dev-tools/kasan.html [2] https://community.arm.com/developer/ip-products/processors/b/processors-ip-blog/posts/enhancing-memory-safety [3] git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux for-next/mte [4] https://github.com/qemu/qemu ====== Overview The underlying ideas of the approach used by hardware tag-based KASAN are: 1. By relying on the Top Byte Ignore (TBI) arm64 CPU feature, pointer tags are stored in the top byte of each kernel pointer. 2. With the Memory Tagging Extension (MTE) arm64 CPU feature, memory tags for kernel memory allocations are stored in a dedicated memory not accessible via normal instuctions. 3. On each memory allocation, a random tag is generated, embedded it into the returned pointer, and the corresponding memory is tagged with the same tag value. 4. With MTE the CPU performs a check on each memory access to make sure that the pointer tag matches the memory tag. 5. On a tag mismatch the CPU generates a tag fault, and a KASAN report is printed. Same as other KASAN modes, hardware tag-based KASAN is intended as a debugging feature at this point. ====== Rationale There are two main reasons for this new hardware tag-based mode: 1. Previously implemented software tag-based KASAN is being successfully used on dogfood testing devices due to its low memory overhead (as initially planned). The new hardware mode keeps the same low memory overhead, and is expected to have significantly lower performance impact, due to the tag checks being performed by the hardware. Therefore the new mode can be used as a better alternative in dogfood testing for hardware that supports MTE. 2. The new mode lays the groundwork for the planned in-kernel MTE-based memory corruption mitigation to be used in production. ====== Technical details From the implementation perspective, hardware tag-based KASAN is almost identical to the software mode. The key difference is using MTE for assigning and checking tags. Compared to the software mode, the hardware mode uses 4 bits per tag, as dictated by MTE. Pointer tags are stored in bits [56:60), the top 4 bits have the normal value 0xF. Having less distict tags increases the probablity of false negatives (from ~1/256 to ~1/16) in certain cases. Only synchronous exceptions are set up and used by hardware tag-based KASAN. ====== Benchmarks Note: all measurements have been performed with software emulation of Memory Tagging Extension, performance numbers for hardware tag-based KASAN on the actual hardware are expected to be better. Boot time [1]: * 2.8 sec for clean kernel * 5.7 sec for hardware tag-based KASAN * 11.8 sec for software tag-based KASAN * 11.6 sec for generic KASAN Slab memory usage after boot [2]: * 7.0 kb for clean kernel * 9.7 kb for hardware tag-based KASAN * 9.7 kb for software tag-based KASAN * 41.3 kb for generic KASAN Measurements have been performed with: * defconfig-based configs * Manually built QEMU master * QEMU arguments: -machine virt,mte=on -cpu max * CONFIG_KASAN_STACK_ENABLE disabled * CONFIG_KASAN_INLINE enabled * clang-10 as the compiler and gcc-10 as the assembler [1] Time before the ext4 driver is initialized. [2] Measured as `cat /proc/meminfo | grep Slab`. ====== Notes The cover letter for software tag-based KASAN patchset can be found here: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0116523cfffa62aeb5aa3b85ce7419f3dae0c1b8 ====== History Changes v5->v6: (Vincenzo:) - Re-based on 5.10-rc1. - Modified the flow of the mte fault handler in order to address an issue with word at a time routines that would affect Android init process. - Dropped Reviewed-by from the involved patches. (Andrey:) - Properly use #if CONFIG_KASAN_STACK instead of #ifdef CONFIG_KASAN_STACK_ENABLE. - Expand CONFIG_KASAN checks in arch/arm64/kernel/kaslr.c and arch/arm64/kernel/module.c. - Don't select CONFIG_CONSTRUCTORS for HW_TAGS mode. - Check PageSlab() in addr_has_metadata(). Changes v4->v5: (Vincenzo:) - Reset the tag associated by the kernel to a page when this is changed by the user. - Add a kselftest to verify that GCR_EL1 is preserved during context switch. - Squashed the TBI patch. - Addressed some review comments. - Verified the series with LTP. (Andrey:) - Put core arm64 patches first as requested by Catalin. Changes v3->v4: (Vincenzo:) - Introduced mte-def.h that contains MTE definitions. - Moved __MTE_PREAMBLE in mte.h. - Clarified which API is part of mte-kasan.h. - Removed tsk argument from mte_set_kernel_gcr(). - Addressed several nitpicks pointed out during review. (Andrey:) - Move include in include/linux/kasan.h to avoid build failures. - Don't move "select SLUB_DEBUG if SLUB" back and forth between patches in KASAN Kconfig. - Add arm64 prefix to "kasan: don't allow SW_TAGS with ARM64_MTE" commit. - Don't add braces when defining KASAN_GRANULE_SIZE. - Make KASAN_HW_TAGS compatible with init_on_alloc/free. Changes v2->v3: (Vincenzo:) - Use ARM64_ASM_PREAMBLE for asm macros. - Rename mte-helper.h to mte-kasan.h. The new header is meant to contain only macros and prototypes directly used in KASAN. The rest is defined in mte.h. - Update mte_get_mem_tag()/mte_get_random_tag() to used directly asm volatile() macros instead of calling library functions. - Harden mte_assign_mem_tag_range() to prevent an infinite loop in case of unaligned size. - Made sure that report_tag_fault() is executed only once. - Simplify the mte code in __cpu_setup. - Remove kprobes.h from mte.c includes. - General cleanup of the code. (Andrey:) - Use READ/WRITE_ONCE when accessing reported in do_tag_recovery(). - Move .unreq mte_tcr under CONFIG_ARM64_MTE to avoid build errors when MTE is not enabled. - Improve mm/kasan/shadow.c comment header. - Clarify what is a memory granule in "kasan: rename KASAN_SHADOW_* to KASAN_GRANULE_" commit description. - Rename (report_)tags_sw/hw.c to to (report_)sw/hw_tags.c and drop unnecessary rename commit. - Adopt 100 lines limit for some mm/kasan/ changes. - Align arguments for stack_trace_save() call in mm/slub.c. - Restore comment before kasan_init_tags(). - Remove GNU headers from all mm/kasan/ files. - Simplify check_invalid_free() implementation tag-based modes. - Drop subsequently removed report_tag_fault() implementation. - Add KASAN_GRANULE_PAGE and use instead of PAGE_SIZE * KASAN_GRANULE_SIZE. - Move kasan_enable/disable_current() declarations to simplify include/linux/kasan.h. - Drop dependency on CONFIG_SLUB_DEBUG. - Clarify the purpose of CONFIG_STACKTRACE in KASAN Kconfig. Changes v1->v2: - Rebase onto v10 of the user MTE patchset. - Only enable in-kernel MTE when KASAN_HW_TAGS is enabled. - Add a layer of arch-level indirection, so KASAN doesn't call MTE helpers directly (this will be useful in case more architectures will add support for HW_TAGS). - Don't do arm64_skip_faulting_instruction() on MTE fault, disable MTE instead. - Don't allow software tags with MTE via arch/arm64/Kconfig instead of lib/Kconfig.kasan. - Rename mm/kasan/tags.c to tags_sw.c and mte.c to tags_hw.c, and do the same for report_*.c files. - Reword HW_TAGS Kconfig help text to make it less MTE specific. - Reword and clarify Documentation. - Drop unnecessary is_el1_mte_sync_tag_check_fault(). - Change report_tag_fault() to only call kasan_report() once HW_TAGS is introduced. - Rename arch/arm64/include/asm/mte_asm.h to mte-helpers.h and move all MTE-related defines and some helper functions there. - Change mm/kasan/kasan.h to include mte-def.h instead of mte.h. - Add WARN_ON() on unaligned size to mte_set_mem_tag_range(). - Implement ldg/irg MTE routines as inline assembly. - Remove smp_wmb() from mte_set_mem_tag_range(). - Drop __must_check from mte_set_mem_tag_range() as KASAN has no use for the return value. - Drop zero size check from mte_assign_mem_tag_range(). - Drop unnecessary include from low-level arm64 code. - Move enabling TBI1 into __cpu_setup(). - Drop stale comment about callee-saved register from arch/arm64/kernel/entry.S. - Mark gcr_kernel_excl as __ro_after_init. - Use GENMASK() in mte_init_tags(). Andrey Konovalov (32): arm64: kasan: Add arch layer for memory tagging helpers arm64: kasan: Align allocations for HW_TAGS kasan: drop unnecessary GPL text from comment headers kasan: KASAN_VMALLOC depends on KASAN_GENERIC kasan: group vmalloc code kasan: shadow declarations only for software modes kasan: rename (un)poison_shadow to (un)poison_memory kasan: rename KASAN_SHADOW_* to KASAN_GRANULE_* kasan: only build init.c for software modes kasan: split out shadow.c from common.c kasan: define KASAN_GRANULE_PAGE kasan: rename report and tags files kasan: don't duplicate config dependencies kasan: hide invalid free check implementation kasan: decode stack frame only with KASAN_STACK_ENABLE kasan, arm64: only init shadow for software modes kasan, arm64: only use kasan_depth for software modes kasan: rename addr_has_shadow to addr_has_metadata kasan: rename print_shadow_for_address to print_memory_metadata kasan: kasan_non_canonical_hook only for software modes kasan: rename SHADOW layout macros to META kasan: separate metadata_fetch_row for each mode kasan, arm64: don't allow SW_TAGS with ARM64_MTE kasan: introduce CONFIG_KASAN_HW_TAGS kasan: define KASAN_GRANULE_SIZE for HW_TAGS kasan, x86, s390: update undef CONFIG_KASAN kasan, arm64: expand CONFIG_KASAN checks kasan, arm64: implement HW_TAGS runtime kasan, arm64: print report from tag fault handler kasan, mm: reset tags when accessing metadata kasan, arm64: enable CONFIG_KASAN_HW_TAGS kasan: add documentation for hardware tag-based mode Vincenzo Frascino (8): arm64: Enable armv8.5-a asm-arch option arm64: mte: Add in-kernel MTE helpers arm64: mte: Reset the page tag in page->flags arm64: mte: Add in-kernel tag fault handler arm64: kasan: Enable in-kernel MTE arm64: mte: Convert gcr_user into an exclude mask arm64: mte: Switch GCR_EL1 in kernel entry and exit kselftest/arm64: Check GCR_EL1 after context switch Documentation/dev-tools/kasan.rst | 80 ++- arch/arm64/Kconfig | 9 +- arch/arm64/Makefile | 7 +- arch/arm64/include/asm/assembler.h | 2 +- arch/arm64/include/asm/cache.h | 3 + arch/arm64/include/asm/esr.h | 1 + arch/arm64/include/asm/kasan.h | 8 +- arch/arm64/include/asm/memory.h | 14 +- arch/arm64/include/asm/mte-def.h | 14 + arch/arm64/include/asm/mte-kasan.h | 62 ++ arch/arm64/include/asm/mte.h | 22 +- arch/arm64/include/asm/processor.h | 2 +- arch/arm64/include/asm/string.h | 5 +- arch/arm64/include/asm/uaccess.h | 23 + arch/arm64/kernel/asm-offsets.c | 3 + arch/arm64/kernel/cpufeature.c | 10 + arch/arm64/kernel/entry.S | 41 ++ arch/arm64/kernel/head.S | 2 +- arch/arm64/kernel/image-vars.h | 2 +- arch/arm64/kernel/kaslr.c | 3 +- arch/arm64/kernel/module.c | 6 +- arch/arm64/kernel/mte.c | 94 ++- arch/arm64/kernel/setup.c | 5 +- arch/arm64/lib/mte.S | 16 + arch/arm64/mm/copypage.c | 1 + arch/arm64/mm/fault.c | 59 ++ arch/arm64/mm/kasan_init.c | 22 +- arch/arm64/mm/mteswap.c | 1 + arch/arm64/mm/proc.S | 23 +- arch/arm64/mm/ptdump.c | 6 +- arch/s390/boot/string.c | 1 + arch/x86/boot/compressed/misc.h | 1 + include/linux/kasan-checks.h | 2 +- include/linux/kasan.h | 105 ++-- include/linux/mm.h | 2 +- include/linux/moduleloader.h | 3 +- include/linux/page-flags-layout.h | 2 +- include/linux/sched.h | 2 +- include/linux/string.h | 2 +- init/init_task.c | 2 +- kernel/fork.c | 4 +- lib/Kconfig.kasan | 62 +- lib/test_kasan.c | 2 +- mm/kasan/Makefile | 25 +- mm/kasan/common.c | 560 +----------------- mm/kasan/generic.c | 38 +- mm/kasan/generic_report.c | 165 ------ mm/kasan/hw_tags.c | 70 +++ mm/kasan/init.c | 17 +- mm/kasan/kasan.h | 64 +- mm/kasan/quarantine.c | 10 - mm/kasan/report.c | 259 ++------ mm/kasan/report_generic.c | 326 ++++++++++ mm/kasan/report_hw_tags.c | 42 ++ mm/kasan/{tags_report.c => report_sw_tags.c} | 14 +- mm/kasan/shadow.c | 503 ++++++++++++++++ mm/kasan/{tags.c => sw_tags.c} | 18 +- mm/page_alloc.c | 4 +- mm/page_poison.c | 2 +- mm/ptdump.c | 13 +- mm/slab_common.c | 2 +- mm/slub.c | 29 +- scripts/Makefile.lib | 2 + tools/testing/selftests/arm64/mte/Makefile | 2 +- .../arm64/mte/check_gcr_el1_cswitch.c | 152 +++++ 65 files changed, 1914 insertions(+), 1139 deletions(-) create mode 100644 arch/arm64/include/asm/mte-def.h create mode 100644 arch/arm64/include/asm/mte-kasan.h delete mode 100644 mm/kasan/generic_report.c create mode 100644 mm/kasan/hw_tags.c create mode 100644 mm/kasan/report_generic.c create mode 100644 mm/kasan/report_hw_tags.c rename mm/kasan/{tags_report.c => report_sw_tags.c} (87%) create mode 100644 mm/kasan/shadow.c rename mm/kasan/{tags.c => sw_tags.c} (94%) create mode 100644 tools/testing/selftests/arm64/mte/check_gcr_el1_cswitch.c