[PATCH v9 6/6] arm64: expose FAR_EL1 tag bits in siginfo

Peter Collingbourne pcc at google.com
Mon Aug 24 22:18:19 EDT 2020


On Mon, Aug 24, 2020 at 7:23 AM Dave Martin <Dave.Martin at arm.com> wrote:
>
> On Wed, Aug 19, 2020 at 06:49:01PM -0700, Peter Collingbourne wrote:
> > On Wed, Aug 19, 2020 at 8:56 AM Dave Martin <Dave.Martin at arm.com> wrote:
> > >
> > > On Mon, Aug 17, 2020 at 08:33:51PM -0700, Peter Collingbourne wrote:
> > > > The kernel currently clears the tag bits (i.e. bits 56-63) in the fault
> > > > address exposed via siginfo.si_addr and sigcontext.fault_address. However,
> > > > the tag bits may be needed by tools in order to accurately diagnose
> > > > memory errors, such as HWASan [1] or future tools based on the Memory
> > > > Tagging Extension (MTE).
> > > >
> > > > We should not stop clearing these bits in the existing fault address
> > > > fields, because there may be existing userspace applications that are
> > > > expecting the tag bits to be cleared. Instead, create a new pair of
> > > > union fields in siginfo._sigfault, and store the tag bits of FAR_EL1
> > > > there, together with a mask specifying which bits are valid.
> > > >
> > > > A flag is added to si_xflags to allow userspace to determine whether
> > > > the values in the fields are valid.
> > > >
> > > > [1] http://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html
> > > >
> > > > Signed-off-by: Peter Collingbourne <pcc at google.com>
> > > > ---
>
> [...]
>
> > > > diff --git a/kernel/signal.c b/kernel/signal.c
> > > > index 72182eed1b8d..1f1e42adc57d 100644
> > > > --- a/kernel/signal.c
> > > > +++ b/kernel/signal.c
>
> [...]
>
> > > > @@ -1706,7 +1722,9 @@ int send_sig_fault(int sig, int code, void __user *addr
> > > >       return send_sig_info(info.si_signo, &info, t);
> > > >  }
> > > >
> > > > -int force_sig_mceerr(int code, void __user *addr, short lsb)
> > > > +int force_sig_mceerr(int code, void __user *addr, short lsb,
> > > > +                  unsigned long addr_ignored_bits,
> > > > +                  unsigned long addr_ignored_bits_mask)
> > >
> > > Rather than having to pass these extra arguments all over the place, can
> > > we just pass the far for addr, and have an arch-specific hook for
> > > splitting the ignored from non-ignored bits.  For now at least, I expect
> > > that ignored bits mask to be constant for a given platform and kernel.
> >
> > That sounds like a good idea. I think that for MTE we will want to
> > make it conditional on the si_code (so SEGV_MTESERR would get 0xf <<
> > 56 while everything else would get 0xff << 56) so I can hook that up
> > at the same time.
>
> OK, I think that's reasonable.
>
> Mind you, we seem to have 3 kinds of bits here, so I'm starting to
> wonder whether this is really sufficient:
>
>         1) address bits used in the faulted access
>         2) attribute/permission bits used in the faulted access
>         3) unavailable bits.
>
> si_addr contains (1).
>
> si_addr_ignored_bits contains (2).
>
> The tag bits from non-MTE faults seem to fall under case (3).  Code that
> looks for these bits in si_addr_ignored_bits won't find them.

I'm reasonably sure that the tag bits are available for non-MTE
faults. From https://developer.arm.com/docs/ddi0595/h/aarch64-system-registers/far_el1
:
"For a Data Abort or Watchpoint exception, if address tagging is
enabled for the address accessed by the data access that caused the
exception, then this field includes the tag."

This language applies to non-tag-check-fault data aborts but is
superseded by the following paragraph for tag check faults:
"For a synchronous Tag Check Fault abort, bits[63:60] are UNKNOWN."

> So perhaps it would make sense to amend the design a bit.  We'd have
>
>         si_addr = address bits only
>         si_attr = attribute bits only
>         si_attr_mask = mask of valid bits in si_addr
>
> Thinking about it, I've just shortened/changed some named and changed
> the meaning of the mask, so it's very similar to what you already have.

Did you mean "si_attr_mask = mask of valid bits in si_attr"? I assume
so because below you talk about si_addr_mask also being the mask of
valid bits in si_addr, but I don't think this is a change in meaning
for the mask field as I specified it. Maybe, given your claim above
that the tag bits are unavailable for non-tag check faults, you
misunderstood why I am setting si_addr_ignored_bits_mask to 0xf << 56
for tag check faults and 0xff << 56 for non-tag check faults?

That being said, maybe we can make the names shorter with something
like your suggestion.

> The mask of valid bits in si_addr is decided by architectural
> convention (i.e., ~0xffUL << 56), but we could also expose
>
>         si_addr_mask = mask of valid bits in si_addr
>
> This is a bit redundant though.  I think people would already assume
> that all bits required for classifying the faulting location accurately
> must already be provided there.

I think it's fine for this to be an architectural convention. If we
really wanted to expose something like this to userspace then I think
we should expose TASK_SIZE (this is something that I've wanted in the
past). But that's really a separate discussion.

Peter



More information about the linux-arm-kernel mailing list