[PATCH v2] arm64: allow TCR_EL1.TBID0 to be configured

Peter Collingbourne pcc at google.com
Tue Jul 27 15:00:10 PDT 2021


On Tue, Jul 27, 2021 at 9:51 AM Catalin Marinas <catalin.marinas at arm.com> wrote:
>
> Hi Peter,
>
> On Mon, Jun 21, 2021 at 10:12:04PM -0700, Peter Collingbourne wrote:
> > Introduce a command line flag that controls whether TCR_EL1.TBID0
> > is set at boot time. Since this is a change to the userspace ABI the
> > option defaults to off for now, although it seems likely that we'll
> > be able to change the default at some future point.
> >
> > Setting TCR_EL1.TBID0 increases the number of signature bits used by
> > the pointer authentication instructions for instruction addresses by 8,
> > which improves the security of pointer authentication, but it also has
> > the consequence of changing the operation of the branch instructions
> > so that they no longer ignore the top byte of the target address but
> > instead fault if they are non-zero.
>
> I'm a bit uneasy about the ABI change and not so keen on constraining
> the ABI through the kernel command line. Ideally we should make this an
> opt-in per application (prctl()) but that has some aspects to address

This doesn't necessarily need to be the end state, we can enhance this
based on need. For example, we could choose to take this patch now and
later implement the per-process opt-in where the default is controlled
by the command line. Or just implement the software-only per-process
TBID0 almost-disablement which would be much simpler than doing it in
hardware, if that is enough to satisfy future needs. Otherwise we risk
adding "unused" complexity to the kernel that we can never remove due
to API stability guarantees.

> first: (a) this bit is permitted to be cached in the TLB so we'd need
> some TLBI when setting it (and a clarification in the specs that it is
> tagged by ASID/VMID, probably fine) and (b) we'd need to context-switch
> TCR_EL1, with a small performance penalty (I don't think it's
> significant but worth testing).

So TLBI all of the CPUs on prctl() and context-switch TCR_EL1? I
thought there would be DOS concerns with the first part of that?

I hope it would be a straightforward spec clarification. Maybe Cortex
tags TBID0 by ASID/VMID but what about Apple?

If we can resolve these concerns I suppose that would work. But as
mentioned above I'm not sure we should do it straight away.

> Unfortunately, we can't turn TBID0 off dynamically when we detect a
> tagged PC since this would break authentication of already encoded
> pointers.
>
> Prior to hwasan and MTE, I doubt anyone would have noticed this change
> but once malloc() and friends started returning tagged pointers,
> programs executing code from malloc()'ed regions would fall apart with
> TBID0. I think it's a bit of stretch to argue that it's hwasan and MTE
> causing the application breakage rather than a user-kernel ABI change,
> since that's already working currently (though such programs should be
> re-written).
>
> Longer term, I'd like the TBID0 to be the default but transitioning
> without breaking the user is tricky, hence my first option would be
> per-application with an opt-in.

If we want to transition to TBID0 being the default, it seems better
to not let it be controlled by the application, if we can get away
with it. Otherwise applications may start implicitly disabling it, or
assuming it to be disabled by default. For example if we made it a bit
in tagged_addr_ctrl then a call such as:

prctl(PR_SET_TAGGED_ADDR_CTRL, PR_TAGGED_ADDR_ENABLE, 0, 0, 0);

will disable TBID0 even if the default is for it to be enabled. (So
it's a bit unfortunate that we didn't adopt the
PR_PAC_SET_ENABLED_KEYS scheme for PR_SET_TAGGED_ADDR_CTRL.)

> > diff --git a/arch/arm64/mm/fault.c b/arch/arm64/mm/fault.c
> > index 871c82ab0a30..9ee32afe121c 100644
> > --- a/arch/arm64/mm/fault.c
> > +++ b/arch/arm64/mm/fault.c
> > @@ -529,11 +529,23 @@ static int __kprobes do_page_fault(unsigned long far, unsigned int esr,
> >       vm_fault_t fault;
> >       unsigned long vm_flags;
> >       unsigned int mm_flags = FAULT_FLAG_DEFAULT;
> > -     unsigned long addr = untagged_addr(far);
> > +     unsigned long addr;
> >
> >       if (kprobe_page_fault(regs, esr))
> >               return 0;
> >
> > +     /*
> > +      * If TBID0 is set then we may get an IABT with a tagged address here as
> > +      * a result of branching to a tagged address. In this case we want to
> > +      * avoid untagging the address, let the VMA lookup fail and get a
> > +      * SIGSEGV. Leaving the address as is will also work if TBID0 is clear
> > +      * or unsupported because the tag bits of FAR_EL1 will be clear.
> > +      */
> > +     if (is_el0_instruction_abort(esr))
> > +             addr = far;
> > +     else
> > +             addr = untagged_addr(far);
>
> Should this also check for tcr_tbid0_enabled() before deciding not to
> untag the address?

No, if TBID0 is disabled then by this point the hardware would have
untagged the PC for us.

Peter



More information about the linux-arm-kernel mailing list