From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.8 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B245DC47082 for ; Sat, 5 Jun 2021 05:16:40 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 4A2A261028 for ; Sat, 5 Jun 2021 05:16:40 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 4A2A261028 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id C06026B0036; Sat, 5 Jun 2021 01:16:39 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id BDE126B006C; Sat, 5 Jun 2021 01:16:39 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id AA4F46B006E; Sat, 5 Jun 2021 01:16:39 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0176.hostedemail.com [216.40.44.176]) by kanga.kvack.org (Postfix) with ESMTP id 7A7B96B0036 for ; Sat, 5 Jun 2021 01:16:39 -0400 (EDT) Received: from smtpin04.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id 0DEFB9418 for ; Sat, 5 Jun 2021 05:16:39 +0000 (UTC) X-FDA: 78218510118.04.D2DD5DB Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf26.hostedemail.com (Postfix) with ESMTP id CA89242110A0 for ; Sat, 5 Jun 2021 05:16:37 +0000 (UTC) Received: by mail.kernel.org (Postfix) with ESMTPSA id 123C56023F; Fri, 4 Jun 2021 19:48:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1622836103; bh=HWYaKVYEUZc3009tRaBW9W430F4XgGOY+BwOiEeLe9A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RVkm8IOoaB9V0GKOacwL2OpkRZPJnLZTuSyg+ZyywNSmwp2CMuGj10aRIMS2zSHmp fuQLe92qikYlQjE33QnlSRTlyKV56bm45K9iFHjEshkiP4xTak7Y2aY6AQLlaUBRp3 i68V9y/nzyiTW9UGEjGfO/pr3y1IO3EAETaC+oEAd76FKvREFfhENt7sz28Ras9JhK t3Y9iNO6bT1RWRvEwOwi3sxGOcVPj1znC/x06rCTuNfrguauOkJFauPfIje20IUEFn wMdsG6AVYR/hdzSCxUAFHg9O2TE8/Efs1BwZ+IbPVkTaKKXR//6osi5xkMfp9WDGDp yjBZN/+/194Sw== From: Will Deacon To: Andrew Morton , Vincenzo Frascino , Alexander Potapenko , Peter Collingbourne , Andrey Konovalov , Jann Horn , Catalin Marinas Cc: kernel-team@android.com, Will Deacon , Evgenii Stepanov , linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org Subject: Re: [PATCH v6 0/4] arm64: improve efficiency of setting tags for user pages Date: Fri, 4 Jun 2021 20:48:16 +0100 Message-Id: <162283154196.1512616.8604192084334913847.b4-ty@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210602235230.3928842-1-pcc@google.com> References: <20210602235230.3928842-1-pcc@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" X-Rspamd-Server: rspam03 X-Rspamd-Queue-Id: CA89242110A0 Authentication-Results: imf26.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=RVkm8IOo; spf=pass (imf26.hostedemail.com: domain of will@kernel.org designates 198.145.29.99 as permitted sender) smtp.mailfrom=will@kernel.org; dmarc=pass (policy=none) header.from=kernel.org X-Stat-Signature: 4goraowabci9qe491ochr4s98j1gqzf9 X-HE-Tag: 1622870197-295523 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Wed, 2 Jun 2021 16:52:26 -0700, Peter Collingbourne wrote: > Currently we can end up touching PROT_MTE user pages twice on fault > and once on unmap. On fault, with KASAN disabled we first clear data > and then set tags to 0, and with KASAN enabled we simultaneously > clear data and set tags to the KASAN random tag, and then set tags > again to 0. On unmap, we poison the page by setting tags, but this > is less likely to find a bug than poisoning kernel pages. >=20 > [...] Applied to arm64 (for-next/mte), thanks! [1/4] mm: arch: remove indirection level in alloc_zeroed_user_highpage_mo= vable() https://git.kernel.org/arm64/c/92638b4e1b47 [2/4] kasan: use separate (un)poison implementation for integrated init https://git.kernel.org/arm64/c/7a3b83537188 [3/4] arm64: mte: handle tags zeroing at page allocation time https://git.kernel.org/arm64/c/013bb59dbb7c [4/4] kasan: disable freed user page poisoning with HW tags https://git.kernel.org/arm64/c/c275c5c6d50a Cheers, --=20 Will https://fixes.arm64.dev https://next.arm64.dev https://will.arm64.dev