Re: [PATCH v15 8/8] kasan, arm64: tests supports for HW_TAGS async mode

2021-03-12 Thread Vincenzo Frascino



On 3/12/21 2:49 PM, Andrey Konovalov wrote:
> On Fri, Mar 12, 2021 at 3:22 PM Vincenzo Frascino
>  wrote:
>>
>> From: Andrey Konovalov 
>>
>> This change adds KASAN-KUnit tests support for the async HW_TAGS mode.
>>
>> In async mode, tag fault aren't being generated synchronously when a
>> bad access happens, but are instead explicitly checked for by the kernel.
>>
>> As each KASAN-KUnit test expect a fault to happen before the test is over,
>> check for faults as a part of the test handler.
>>
>> Signed-off-by: Andrey Konovalov 
> 
> I believe this needs your Signed-off-by as well, Vincenzo.
> 

Ah yes, in case I do not need to repost:

Signed-off-by: Vincenzo Frascino 

-- 
Regards,
Vincenzo


Re: [PATCH v15 8/8] kasan, arm64: tests supports for HW_TAGS async mode

2021-03-12 Thread Andrey Konovalov
On Fri, Mar 12, 2021 at 3:22 PM Vincenzo Frascino
 wrote:
>
> From: Andrey Konovalov 
>
> This change adds KASAN-KUnit tests support for the async HW_TAGS mode.
>
> In async mode, tag fault aren't being generated synchronously when a
> bad access happens, but are instead explicitly checked for by the kernel.
>
> As each KASAN-KUnit test expect a fault to happen before the test is over,
> check for faults as a part of the test handler.
>
> Signed-off-by: Andrey Konovalov 

I believe this needs your Signed-off-by as well, Vincenzo.


[PATCH v15 8/8] kasan, arm64: tests supports for HW_TAGS async mode

2021-03-12 Thread Vincenzo Frascino
From: Andrey Konovalov 

This change adds KASAN-KUnit tests support for the async HW_TAGS mode.

In async mode, tag fault aren't being generated synchronously when a
bad access happens, but are instead explicitly checked for by the kernel.

As each KASAN-KUnit test expect a fault to happen before the test is over,
check for faults as a part of the test handler.

Signed-off-by: Andrey Konovalov 
---
 arch/arm64/include/asm/memory.h |  1 +
 lib/test_kasan.c| 17 +++--
 mm/kasan/hw_tags.c  |  6 ++
 mm/kasan/kasan.h|  6 ++
 mm/kasan/report.c   |  5 +
 5 files changed, 29 insertions(+), 6 deletions(-)

diff --git a/arch/arm64/include/asm/memory.h b/arch/arm64/include/asm/memory.h
index 8b0beaedbe1f..b943879c1c24 100644
--- a/arch/arm64/include/asm/memory.h
+++ b/arch/arm64/include/asm/memory.h
@@ -246,6 +246,7 @@ static inline const void *__tag_set(const void *addr, u8 
tag)
 #define arch_enable_tagging_sync() mte_enable_kernel_sync()
 #define arch_enable_tagging_async()mte_enable_kernel_async()
 #define arch_set_tagging_report_once(state)mte_set_report_once(state)
+#define arch_force_async_tag_fault()   mte_check_tfsr_exit()
 #define arch_init_tags(max_tag)mte_init_tags(max_tag)
 #define arch_get_random_tag()  mte_get_random_tag()
 #define arch_get_mem_tag(addr) mte_get_mem_tag(addr)
diff --git a/lib/test_kasan.c b/lib/test_kasan.c
index 479c31a5dc21..785e724ce0d8 100644
--- a/lib/test_kasan.c
+++ b/lib/test_kasan.c
@@ -69,10 +69,10 @@ static void kasan_test_exit(struct kunit *test)
  * resource named "kasan_data". Do not use this name for KUnit resources
  * outside of KASAN tests.
  *
- * For hardware tag-based KASAN, when a tag fault happens, tag checking is
- * normally auto-disabled. When this happens, this test handler reenables
- * tag checking. As tag checking can be only disabled or enabled per CPU, this
- * handler disables migration (preemption).
+ * For hardware tag-based KASAN in sync mode, when a tag fault happens, tag
+ * checking is auto-disabled. When this happens, this test handler reenables
+ * tag checking. As tag checking can be only disabled or enabled per CPU,
+ * this handler disables migration (preemption).
  *
  * Since the compiler doesn't see that the expression can change the fail_data
  * fields, it can reorder or optimize away the accesses to those fields.
@@ -80,7 +80,8 @@ static void kasan_test_exit(struct kunit *test)
  * expression to prevent that.
  */
 #define KUNIT_EXPECT_KASAN_FAIL(test, expression) do { \
-   if (IS_ENABLED(CONFIG_KASAN_HW_TAGS))   \
+   if (IS_ENABLED(CONFIG_KASAN_HW_TAGS) && \
+   !kasan_async_mode_enabled())\
migrate_disable();  \
WRITE_ONCE(fail_data.report_expected, true);\
WRITE_ONCE(fail_data.report_found, false);  \
@@ -92,10 +93,14 @@ static void kasan_test_exit(struct kunit *test)
barrier();  \
expression; \
barrier();  \
+   if (kasan_async_mode_enabled()) \
+   kasan_force_async_fault();  \
+   barrier();  \
KUNIT_EXPECT_EQ(test,   \
READ_ONCE(fail_data.report_expected),   \
READ_ONCE(fail_data.report_found)); \
-   if (IS_ENABLED(CONFIG_KASAN_HW_TAGS)) { \
+   if (IS_ENABLED(CONFIG_KASAN_HW_TAGS) && \
+   !kasan_async_mode_enabled()) {  \
if (READ_ONCE(fail_data.report_found))  \
kasan_enable_tagging_sync();\
migrate_enable();   \
diff --git a/mm/kasan/hw_tags.c b/mm/kasan/hw_tags.c
index 1df4ce803861..4004388b4e4b 100644
--- a/mm/kasan/hw_tags.c
+++ b/mm/kasan/hw_tags.c
@@ -252,4 +252,10 @@ void kasan_enable_tagging_sync(void)
 }
 EXPORT_SYMBOL_GPL(kasan_enable_tagging_sync);
 
+void kasan_force_async_fault(void)
+{
+   hw_force_async_tag_fault();
+}
+EXPORT_SYMBOL_GPL(kasan_force_async_fault);
+
 #endif
diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h
index 02957cec1a61..c1581e8a9b8e 100644
--- a/mm/kasan/kasan.h
+++ b/mm/kasan/kasan.h
@@ -304,6 +304,9 @@ static inline const void *arch_kasan_set_tag(const void 
*addr, u8 tag)
 #ifndef arch_set_tagging_report_once
 #define arch_set_tagging_report_once(state)
 #endif
+#ifndef arch_force_async_tag_fault
+#define arch_force_async_tag_fault()
+#endif
 #ifndef arch_get_random_tag
 #define arch_get_random_tag()  (0xFF)
 #endif
@@ -318,6 +321,7