From: Dave Martin <Dave.Martin@arm.com>
To: Kevin Brodsky <kevin.brodsky@arm.com>
Cc: linux-arch@vger.kernel.org, Will Deacon <will@kernel.org>,
Szabolcs Nagy <szabolcs.nagy@arm.com>,
Catalin Marinas <catalin.marinas@arm.com>,
linux-mm@kvack.org, Andrey Konovalov <andreyknvl@google.com>,
Andrew Morton <akpm@linux-foundation.org>,
Vincenzo Frascino <vincenzo.frascino@arm.com>,
Peter Collingbourne <pcc@google.com>,
linux-arm-kernel@lists.infradead.org
Subject: Re: [PATCH v7 18/29] arm64: mte: Allow user control of the tag check mode via prctl()
Date: Mon, 20 Jul 2020 18:00:50 +0100 [thread overview]
Message-ID: <20200720170050.GJ30452@arm.com> (raw)
In-Reply-To: <e9feb87e-41a8-17e6-eeba-4038da3bdde2@arm.com>
On Mon, Jul 20, 2020 at 04:30:35PM +0100, Kevin Brodsky wrote:
> On 15/07/2020 18:08, Catalin Marinas wrote:
> >By default, even if PROT_MTE is set on a memory range, there is no tag
> >check fault reporting (SIGSEGV). Introduce a set of option to the
> >exiting prctl(PR_SET_TAGGED_ADDR_CTRL) to allow user control of the tag
> >check fault mode:
> >
> > PR_MTE_TCF_NONE - no reporting (default)
> > PR_MTE_TCF_SYNC - synchronous tag check fault reporting
> > PR_MTE_TCF_ASYNC - asynchronous tag check fault reporting
> >
> >These options translate into the corresponding SCTLR_EL1.TCF0 bitfield,
> >context-switched by the kernel. Note that uaccess done by the kernel is
> >not checked and cannot be configured by the user.
> >
> >Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
> >Cc: Will Deacon <will@kernel.org>
> >---
> >
> >Notes:
> > v3:
> > - Use SCTLR_EL1_TCF0_NONE instead of 0 for consistency.
> > - Move mte_thread_switch() in this patch from an earlier one. In
> > addition, it is called after the dsb() in __switch_to() so that any
> > asynchronous tag check faults have been registered in the TFSR_EL1
> > registers (to be added with the in-kernel MTE support.
> > v2:
> > - Handle SCTLR_EL1_TCF0_NONE explicitly for consistency with PR_MTE_TCF_NONE.
> > - Fix SCTLR_EL1 register setting in flush_mte_state() (thanks to Peter
> > Collingbourne).
> > - Added ISB to update_sctlr_el1_tcf0() since, with the latest
> > architecture update/fix, the TCF0 field is used by the uaccess
> > routines.
[...]
> >diff --git a/arch/arm64/kernel/mte.c b/arch/arm64/kernel/mte.c
[...]
> >+void mte_thread_switch(struct task_struct *next)
> >+{
> >+ if (!system_supports_mte())
> >+ return;
> >+
> >+ /* avoid expensive SCTLR_EL1 accesses if no change */
> >+ if (current->thread.sctlr_tcf0 != next->thread.sctlr_tcf0)
>
> I think this could be improved by checking whether `next` is a kernel
> thread, in which case thread.sctlr_tcf0 is 0 but there is no point in
> setting SCTLR_EL1.TCF0, since there should not be any access via TTBR0.
Out of interest, do we have a nice way of testing for a kernel thread
now?
I remember fpsimd_thread_switch() used to check for task->mm, but we
seem to have got rid of that at some point. set_mm() can defeat this,
and anyway the heavy lifting for FPSIMD is now deferred until returning
to userspace.
Cheers
---Dave
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
next prev parent reply other threads:[~2020-07-20 17:02 UTC|newest]
Thread overview: 23+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20200715170844.30064-1-catalin.marinas@arm.com>
[not found] ` <20200715170844.30064-19-catalin.marinas@arm.com>
2020-07-20 15:30 ` [PATCH v7 18/29] arm64: mte: Allow user control of the tag check mode via prctl() Kevin Brodsky
2020-07-20 17:00 ` Dave Martin [this message]
2020-07-22 10:28 ` Catalin Marinas
2020-07-23 19:33 ` Kevin Brodsky
2020-07-22 11:09 ` Catalin Marinas
2020-08-04 19:34 ` Kevin Brodsky
2020-08-05 9:24 ` Catalin Marinas
[not found] ` <20200715170844.30064-30-catalin.marinas@arm.com>
2020-07-27 16:36 ` [PATCH v7 29/29] arm64: mte: Add Memory Tagging Extension documentation Szabolcs Nagy
2020-07-28 11:08 ` Dave Martin
2020-07-28 14:53 ` Szabolcs Nagy
2020-07-28 19:59 ` Catalin Marinas
2020-08-03 12:43 ` Szabolcs Nagy
2020-08-07 15:19 ` Catalin Marinas
2020-08-10 14:13 ` Szabolcs Nagy
2020-08-11 17:20 ` Catalin Marinas
2020-08-12 12:45 ` Szabolcs Nagy
2020-08-19 9:54 ` Catalin Marinas
2020-08-20 16:43 ` Szabolcs Nagy
2020-08-20 17:27 ` Paul Eggert
2020-08-22 11:31 ` Catalin Marinas
2020-08-22 11:28 ` Catalin Marinas
[not found] ` <20200715170844.30064-23-catalin.marinas@arm.com>
2020-08-13 14:01 ` [PATCH v7 22/29] arm64: mte: ptrace: Add PTRACE_{PEEK,POKE}MTETAGS support Luis Machado
2020-08-22 10:56 ` Catalin Marinas
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200720170050.GJ30452@arm.com \
--to=dave.martin@arm.com \
--cc=akpm@linux-foundation.org \
--cc=andreyknvl@google.com \
--cc=catalin.marinas@arm.com \
--cc=kevin.brodsky@arm.com \
--cc=linux-arch@vger.kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-mm@kvack.org \
--cc=pcc@google.com \
--cc=szabolcs.nagy@arm.com \
--cc=vincenzo.frascino@arm.com \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).