[PATCH v2] mte: Initialize tag storage to KASAN_TAG_INVALID
Andrey Konovalov
andreyknvl at gmail.com
Sat Sep 10 16:22:52 PDT 2022
On Wed, Sep 7, 2022 at 1:00 PM Vincenzo Frascino
<vincenzo.frascino at arm.com> wrote:
>
> When the kernel is entered on aarch64, the MTE allocation tags are in an
> UNKNOWN state.
>
> With MTE enabled, the tags are initialized:
> - When a page is allocated and the user maps it with PROT_MTE.
> - On allocation, with in-kernel MTE enabled (HW_TAGS KASAN).
>
> If the tag pool is zeroed by the hardware at reset, it makes it
> difficult to track potential places where the initialization of the
> tags was missed.
>
> This can be observed under QEMU for aarch64, which initializes the MTE
> allocation tags to zero.
>
> Initialize to tag storage to KASAN_TAG_INVALID to catch potential
> places where the initialization of the tags was missed.
Hi Vincenzo,
Cold you clarify what kind of places this refers to? Like the kernel
allocating memory and not setting the tags? Or is this related to
userspace applications? I'm not sure what's the user story for this
new flag is.
> This is done introducing a new kernel command line parameter
> "mte.tags_init" that enables the debug option.
Depending on the intended use, this can be extended to "mte.tags_init=<tag>".
> Note: The proposed solution should be considered a debug option because
> it might have performance impact on large machines at boot.
Thanks!
More information about the linux-arm-kernel
mailing list