From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 643FDC32751 for ; Wed, 7 Aug 2019 15:53:45 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 3759821E73 for ; Wed, 7 Aug 2019 15:53:45 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="eKeeHUVK" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 3759821E73 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-Id:Date:Subject:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=kYdVOs5klAgnMFknfog5ydsDTOK294ZRknsTW5btWEM=; b=eKeeHUVK3LICjW EJbI+qyRCQmcsXnbVo5ANiuCRwnr9GMZYFwyGUpL7+/E5s9cphwC/crJRjsPG+hI4bis0p50hw0Aw cMIBDPeg/PT34y1FpRjcEV39Zrrv2OugykqrGv4fXzeIUF7m22erLBLetdteCjQ4/+C8wNoqm/NFp XBQhxReyHdPC92TossQ3P8BHvxbns+PKHDh9MKifqBUwn96qhV2qyUBPRIm+MwTeJ3wJjDMkNY8Sx 6bDM3AwdcnYC9gIIv4Q4lrisILY/H1zsF7UCQnyouVMEIhgnj4i7aD9FZzEXJbQogQKAyRxRB/jg8 Jil0Wo5tHZ2Pkh6KukVQ==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92 #3 (Red Hat Linux)) id 1hvOFz-0004YO-Mn; Wed, 07 Aug 2019 15:53:43 +0000 Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.92 #3 (Red Hat Linux)) id 1hvOFm-0004Nt-3s for linux-arm-kernel@lists.infradead.org; Wed, 07 Aug 2019 15:53:32 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 27BEC1570; Wed, 7 Aug 2019 08:53:28 -0700 (PDT) Received: from arrakis.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id C8DAA3F706; Wed, 7 Aug 2019 08:53:26 -0700 (PDT) From: Catalin Marinas To: linux-arm-kernel@lists.infradead.org Subject: [PATCH v7 1/2] arm64: Define Documentation/arm64/tagged-address-abi.rst Date: Wed, 7 Aug 2019 16:53:20 +0100 Message-Id: <20190807155321.9648-2-catalin.marinas@arm.com> X-Mailer: git-send-email 2.23.0.rc0 In-Reply-To: <20190807155321.9648-1-catalin.marinas@arm.com> References: <20190807155321.9648-1-catalin.marinas@arm.com> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20190807_085330_243277_ABAD7302 X-CRM114-Status: GOOD ( 20.48 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, Szabolcs Nagy , Andrey Konovalov , Kevin Brodsky , Will Deacon , Dave Hansen , Vincenzo Frascino Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org From: Vincenzo Frascino On arm64 the TCR_EL1.TBI0 bit has been always enabled hence the userspace (EL0) is allowed to set a non-zero value in the top byte but the resulting pointers are not allowed at the user-kernel syscall ABI boundary. With the relaxed ABI proposed through this document, it is now possible to pass tagged pointers to the syscalls, when these pointers are in memory ranges obtained by an anonymous (MAP_ANONYMOUS) mmap(). This change in the ABI requires a mechanism to requires the userspace to opt-in to such an option. Specify and document the way in which sysctl and prctl() can be used in combination to allow the userspace to opt-in this feature. Cc: Will Deacon Cc: Andrey Konovalov Cc: Szabolcs Nagy Cc: Kevin Brodsky Signed-off-by: Vincenzo Frascino [catalin.marinas@arm.com: some rewording, dropped MAP_PRIVATE] Signed-off-by: Catalin Marinas --- Documentation/arm64/tagged-address-abi.rst | 151 +++++++++++++++++++++ 1 file changed, 151 insertions(+) create mode 100644 Documentation/arm64/tagged-address-abi.rst diff --git a/Documentation/arm64/tagged-address-abi.rst b/Documentation/arm64/tagged-address-abi.rst new file mode 100644 index 000000000000..f91a5d2ac865 --- /dev/null +++ b/Documentation/arm64/tagged-address-abi.rst @@ -0,0 +1,151 @@ +========================== +AArch64 TAGGED ADDRESS ABI +========================== + +Author: Vincenzo Frascino + +Date: 25 July 2019 + +This document describes the usage and semantics of the Tagged Address +ABI on AArch64 Linux. + +1. Introduction +--------------- + +On AArch64 the TCR_EL1.TBI0 bit has always been enabled, allowing userspace +(EL0) to perform memory accesses through 64-bit pointers with a non-zero +top byte. Such tagged pointers, however, were not allowed at the +user-kernel syscall ABI boundary. + +This document describes the relaxation of the syscall ABI that allows +userspace to pass certain tagged pointers to kernel syscalls, as described +in section 2. + +2. AArch64 Tagged Address ABI +----------------------------- + +From the kernel syscall interface perspective and for the purposes of this +document, a "valid tagged pointer" is a pointer with a potentially non-zero +top-byte that references an address in the user process address space +obtained in one of the following ways: + +- mmap() done by the process itself (or its parent), where either: + + - flags have the **MAP_ANONYMOUS** bit set + - the file descriptor refers to a regular file (including those returned + by memfd_create()) or **/dev/zero** + +- brk() system call done by the process itself (i.e. the heap area between + the initial location of the program break at process creation and its + current location). + +- any memory mapped by the kernel in the address space of the process + during creation and with the same restrictions as for mmap() above (e.g. + data, bss, stack). + +The AArch64 Tagged Address ABI is an opt-in feature and an application can +control it via **prctl()** as follows: + +- **PR_SET_TAGGED_ADDR_CTRL**: enable or disable the AArch64 Tagged Address + ABI for the calling process. + + The (unsigned int) arg2 argument is a bit mask describing the control mode + used: + + - **PR_TAGGED_ADDR_ENABLE**: enable AArch64 Tagged Address ABI. Default + status is disabled. + + The arguments arg3, arg4, and arg5 are ignored. + +- **PR_GET_TAGGED_ADDR_CTRL**: get the status of the AArch64 Tagged Address + ABI for the calling process. + + The arguments arg2, arg3, arg4, and arg5 are ignored. + +The prctl(PR_SET_TAGGED_ADDR_CTRL, ...) will return -EINVAL if the +AArch64 Tagged Address ABI is not available +(CONFIG_ARM64_TAGGED_ADDR_ABI disabled or sysctl abi.tagged_addr=0). + +The ABI properties set by the mechanism described above are inherited by +threads of the same application and fork()'ed children but cleared by +execve(). + +Opting in (the prctl() option described above only) to or out of the +AArch64 Tagged Address ABI can be disabled globally at runtime using the +sysctl interface: + +- **abi.tagged_addr**: a new sysctl interface that can be used to prevent + applications from enabling or disabling the relaxed ABI. The sysctl + supports the following configuration options: + + - **0**: disable the prctl(PR_SET_TAGGED_ADDR_CTRL) option to + enable/disable the AArch64 Tagged Address ABI globally + + - **1** (Default): enable the prctl(PR_SET_TAGGED_ADDR_CTRL) option to + enable/disable the AArch64 Tagged Address ABI globally + + Note that this sysctl does not affect the status of the AArch64 Tagged + Address ABI of the running processes. + +When a process has successfully enabled the new ABI by invoking +prctl(PR_SET_TAGGED_ADDR_CTRL, PR_TAGGED_ADDR_ENABLE), the following +behaviours are guaranteed: + +- Every currently available syscall, except the cases mentioned in section + 3, can accept any valid tagged pointer. The same rule is applicable to + any syscall introduced in the future. + +- The syscall behaviour is undefined for non valid tagged pointers. + +- Every valid tagged pointer is expected to work as an untagged one. + +A definition of the meaning of tagged pointers on AArch64 can be found in: +Documentation/arm64/tagged-pointers.txt. + +3. AArch64 Tagged Address ABI Exceptions +----------------------------------------- + +The behaviour described in section 2, with particular reference to the +acceptance by the syscalls of any valid tagged pointer, is not applicable +to the following cases: + +- mmap() addr parameter. + +- mremap() new_address parameter. + +- prctl(PR_SET_MM, ``*``, ...) other than arg2 PR_SET_MM_MAP and + PR_SET_MM_MAP_SIZE. + +- prctl(PR_SET_MM, PR_SET_MM_MAP{,_SIZE}, ...) struct prctl_mm_map fields. + +Any attempt to use non-zero tagged pointers will lead to undefined +behaviour. + +4. Example of correct usage +--------------------------- +.. code-block:: c + + void main(void) + { + static int tbi_enabled = 0; + unsigned long tag = 0; + + char *ptr = mmap(NULL, PAGE_SIZE, PROT_READ | PROT_WRITE, + MAP_ANONYMOUS, -1, 0); + + if (prctl(PR_SET_TAGGED_ADDR_CTRL, PR_TAGGED_ADDR_ENABLE, + 0, 0, 0) == 0) + tbi_enabled = 1; + + if (ptr == (void *)-1) /* MAP_FAILED */ + return -1; + + if (tbi_enabled) + tag = rand() & 0xff; + + ptr = (char *)((unsigned long)ptr | (tag << TAG_SHIFT)); + + *ptr = 'a'; + + ... + } _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel