On Tue, May 05, 2020 at 11:32:33AM +0100, Szabolcs Nagy wrote: > The 04/21/2020 15:26, Catalin Marinas wrote: > > +PROT_MTE > > +-------- > > + > > +To access the allocation tags, a user process must enable the Tagged > > +memory attribute on an address range using a new ``prot`` flag for > > +``mmap()`` and ``mprotect()``: > > + > > +``PROT_MTE`` - Pages allow access to the MTE allocation tags. > > + > > +The allocation tag is set to 0 when such pages are first mapped in the > > +user address space and preserved on copy-on-write. ``MAP_SHARED`` is > > +supported and the allocation tags can be shared between processes. > > + > > +**Note**: ``PROT_MTE`` is only supported on ``MAP_ANONYMOUS`` and > > +RAM-based file mappings (``tmpfs``, ``memfd``). Passing it to other > > +types of mapping will result in ``-EINVAL`` returned by these system > > +calls. > > + > > +**Note**: The ``PROT_MTE`` flag (and corresponding memory type) cannot > > +be cleared by ``mprotect()``. > > i think there are some non-obvious madvise operations that may > be worth documenting too for mte specific semantics. > > e.g. MADV_DONTNEED or MADV_FREE can presumably drop tags which > means that existing pointers can no longer write to the memory > which is a change of behaviour compared to the non-mte case. > (affects most malloc implementations that will have to deal > with this when implementing heap coloring) there might be other > similar problems like MADV_WIPEONFORK that wont work as > currently expected when mte is enabled. > > if such behaviour changes cause serious problems to existing > software there may be a need to have a way to opt out from > these changes (e.g. MADV_ flag variant that only affects the > memory content but not the tags) or to make that the default > behaviour. (but i can't tell how widely these are used in > ways that can be expected to work with PROT_MTE) Thanks. I'll document this behaviour as it may not be obvious. For the record (as we discussed this internally), I think the kernel behaviour is entirely expected. On mmap(PROT_MTE), the kernel would return pages with tags set to 0. On madvise(MADV_DONTNEED), the kernel may free the pages but map them back on access using the same conditions they were previously given to the user, i.e. tags set to 0. There isn't any expectations for the kernel to preserve the tags of MADV_DONTNEED/FREE pages (which defeats the point of dontneed/free). -- Catalin