Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp5374403imm; Tue, 16 Oct 2018 09:15:47 -0700 (PDT) X-Google-Smtp-Source: ACcGV603UdTBmJKXsWUMv9fmJ2C9oqrfjOrsAKz8fZdOmrSAt/OwHj93/YBaq5DB2I7ToEP0II+D X-Received: by 2002:a62:9c8c:: with SMTP id u12-v6mr22582205pfk.162.1539706547648; Tue, 16 Oct 2018 09:15:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539706547; cv=none; d=google.com; s=arc-20160816; b=NNDbW7XSbwhDf0Ew5sebCmcJonq8jFLRFhYNRwYE9iWVwvrFXg9XO/NcA+ppeWW9C9 iF1d+XDIWDLMvYyN/oaHD6EHrizJYoU+TZt9zGjRuHHOnTx8fooeTNyRWXX90UtiivBY Ij6uTaIVJpHRNhv14xfYISQfnM35iEoWb/2GgJUnBXodgeO1uaU/PJXRUpTnV8m9A/ZZ Wdm8xjA0K7i6hQCNEloS+y7MSs6XWTvxqm9LqxW3FiaxZR2kZUo3iq4ikdRbZ8K0vd3M y2a6F+22ThKYfQSpHBgIXUSIJYbsp2ZS3V9wo2BVYErpYxclNNCfNAtW3HNvlAkqaeEL kBvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:references:cc:to:subject:from; bh=DJDZ+tMdnHOK6D2fJy0vKfeex7iE+pTL8P1l5FMVScE=; b=hG+vPZExeoWswvUMExUz9ER2nAXt28YlXRRdkBIW9vOj5sRaRt8P/8cZYveEaAnfrF 3gVxUhlpXYOqMPyW3ZrgA4kTdmrs1QQZ+gzgmgpiBYw4dEElIOy/1TKresJCZhPMB1/e ZLjTMiehXirLfgYwVWCboCg1zsSwdctx46dhGscR2ZDQVNWFRKHEwtfwUTo443A+FI4q oK0vPU3XzzXbcRPN2Jrhs9ieIpY445LXxymAOmsBvVFNDjaW8Aqar4KZF5sKK1D7eOuB zVYd2mjx9WpN6mOkFtU8AUOozAoottCBgLImIqGW18i9B8j6Wzkx/ZcNUF1HiUWBx2QT MBXQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y2-v6si13306215pfn.26.2018.10.16.09.15.30; Tue, 16 Oct 2018 09:15:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727290AbeJQAFx (ORCPT + 99 others); Tue, 16 Oct 2018 20:05:53 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:39252 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727007AbeJQAFx (ORCPT ); Tue, 16 Oct 2018 20:05:53 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A8BB3341; Tue, 16 Oct 2018 09:14:43 -0700 (PDT) Received: from [10.1.197.21] (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 956C13F71C; Tue, 16 Oct 2018 09:14:40 -0700 (PDT) From: Kristina Martsenko Subject: Re: [PATCH v5 11/17] arm64: docs: document pointer authentication To: Ramana Radhakrishnan , "linux-arm-kernel@lists.infradead.org" Cc: Adam Wallis , Amit Kachhap , Andrew Jones , Ard Biesheuvel , Arnd Bergmann , Catalin Marinas , Christoffer Dall , Dave P Martin , Jacob Bramley , Kees Cook , Marc Zyngier , Mark Rutland , Suzuki Poulose , Will Deacon , "kvmarm@lists.cs.columbia.edu" , "linux-arch@vger.kernel.org" , "linux-kernel@vger.kernel.org" References: <20181005084754.20950-1-kristina.martsenko@arm.com> <20181005084754.20950-12-kristina.martsenko@arm.com> <9acb0cd2-66b0-1c41-b1a8-7c70608e9a9b@foss.arm.com> Message-ID: <7b0de19b-45b9-f4df-25d1-c7e80fab49dc@arm.com> Date: Tue, 16 Oct 2018 17:14:39 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.0 MIME-Version: 1.0 In-Reply-To: <9acb0cd2-66b0-1c41-b1a8-7c70608e9a9b@foss.arm.com> Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/10/2018 10:04, Ramana Radhakrishnan wrote: > On 05/10/2018 09:47, Kristina Martsenko wrote: >> From: Mark Rutland >> >> Now that we've added code to support pointer authentication, add some >> documentation so that people can figure out if/how to use it. >> >> Signed-off-by: Mark Rutland >> [kristina: update cpu-feature-registers.txt] >> Signed-off-by: Kristina Martsenko >> Cc: Andrew Jones >> Cc: Catalin Marinas >> Cc: Ramana Radhakrishnan >> Cc: Will Deacon >> --- >> ? Documentation/arm64/booting.txt??????????????? |? 8 +++ >> ? Documentation/arm64/cpu-feature-registers.txt? |? 4 ++ >> ? Documentation/arm64/elf_hwcaps.txt???????????? |? 5 ++ >> ? Documentation/arm64/pointer-authentication.txt | 84 >> ++++++++++++++++++++++++++ >> ? 4 files changed, 101 insertions(+) >> ? create mode 100644 Documentation/arm64/pointer-authentication.txt >> >> diff --git a/Documentation/arm64/booting.txt >> b/Documentation/arm64/booting.txt >> index 8d0df62c3fe0..8df9f4658d6f 100644 >> --- a/Documentation/arm64/booting.txt >> +++ b/Documentation/arm64/booting.txt >> @@ -205,6 +205,14 @@ Before jumping into the kernel, the following >> conditions must be met: >> ????? ICC_SRE_EL2.SRE (bit 0) must be initialised to 0b0. >> ??? - The DT or ACPI tables must describe a GICv2 interrupt controller. >> ? +? For CPUs with pointer authentication functionality: >> +? - If EL3 is present: >> +??? SCR_EL3.APK (bit 16) must be initialised to 0b1 >> +??? SCR_EL3.API (bit 17) must be initialised to 0b1 >> +? - If the kernel is entered at EL1: >> +??? HCR_EL2.APK (bit 40) must be initialised to 0b1 >> +??? HCR_EL2.API (bit 41) must be initialised to 0b1 >> + >> ? The requirements described above for CPU mode, caches, MMUs, >> architected >> ? timers, coherency and system registers apply to all CPUs.? All CPUs >> must >> ? enter the kernel in the same exception level. >> diff --git a/Documentation/arm64/cpu-feature-registers.txt >> b/Documentation/arm64/cpu-feature-registers.txt >> index 7964f03846b1..b165677ffab9 100644 >> --- a/Documentation/arm64/cpu-feature-registers.txt >> +++ b/Documentation/arm64/cpu-feature-registers.txt >> @@ -190,6 +190,10 @@ infrastructure: >> ?????? |--------------------------------------------------| >> ?????? | JSCVT??????????????????????? | [15-12] |??? y??? | >> ?????? |--------------------------------------------------| >> +???? | API????????????????????????? | [11-8]? |??? y??? | >> +???? |--------------------------------------------------| >> +???? | APA????????????????????????? | [7-4]?? |??? y??? | >> +???? |--------------------------------------------------| >> ?????? | DPB????????????????????????? | [3-0]?? |??? y??? | >> ?????? x--------------------------------------------------x >> ? diff --git a/Documentation/arm64/elf_hwcaps.txt >> b/Documentation/arm64/elf_hwcaps.txt >> index d6aff2c5e9e2..95509a7b0ffe 100644 >> --- a/Documentation/arm64/elf_hwcaps.txt >> +++ b/Documentation/arm64/elf_hwcaps.txt >> @@ -178,3 +178,8 @@ HWCAP_ILRCPC >> ? HWCAP_FLAGM >> ? ????? Functionality implied by ID_AA64ISAR0_EL1.TS == 0b0001. >> + >> +HWCAP_APIA >> + >> +??? EL0 AddPac and Auth functionality using APIAKey_EL1 is enabled, as >> +??? described by Documentation/arm64/pointer-authentication.txt. >> diff --git a/Documentation/arm64/pointer-authentication.txt >> b/Documentation/arm64/pointer-authentication.txt >> new file mode 100644 >> index 000000000000..8a9cb5713770 >> --- /dev/null >> +++ b/Documentation/arm64/pointer-authentication.txt >> @@ -0,0 +1,84 @@ >> +Pointer authentication in AArch64 Linux >> +======================================= >> + >> +Author: Mark Rutland >> +Date: 2017-07-19 >> + >> +This document briefly describes the provision of pointer authentication >> +functionality in AArch64 Linux. >> + >> + >> +Architecture overview >> +--------------------- >> + >> +The ARMv8.3 Pointer Authentication extension adds primitives that can be >> +used to mitigate certain classes of attack where an attacker can corrupt >> +the contents of some memory (e.g. the stack). >> + >> +The extension uses a Pointer Authentication Code (PAC) to determine >> +whether pointers have been modified unexpectedly. A PAC is derived from >> +a pointer, another value (such as the stack pointer), and a secret key >> +held in system registers. >> + >> +The extension adds instructions to insert a valid PAC into a pointer, >> +and to verify/remove the PAC from a pointer. The PAC occupies a number >> +of high-order bits of the pointer, which varies dependent on the >> +configured virtual address size and whether pointer tagging is in use. > > s/pointer tagging/top byte ignore unless that's the terminology in the > rest of the kernel documentation ? The rest of the kernel documentation calls them "tagged pointers", and doesn't use "top byte ignore", for example Documentation/arm64/tagged-pointers.txt: https://elixir.bootlin.com/linux/latest/source/Documentation/arm64/tagged-pointers.txt > >> + >> +A subset of these instructions have been allocated from the HINT >> +encoding space. In the absence of the extension (or when disabled), >> +these instructions behave as NOPs. Applications and libraries using >> +these instructions operate correctly regardless of the presence of the >> +extension. >> + >> + >> +Basic support >> +------------- >> + >> +When CONFIG_ARM64_PTR_AUTH is selected, and relevant HW support is >> +present, the kernel will assign a random APIAKey value to each process >> +at exec*() time. This key is shared by all threads within the process, >> +and the key is preserved across fork(). Presence of functionality using >> +APIAKey is advertised via HWCAP_APIA. >> + >> +Recent versions of GCC can compile code with APIAKey-based return >> +address protection when passed the -msign-return-address option. This >> +uses instructions in the HINT space, and such code can run on systems >> +without the pointer authentication extension. > > Just a clarification. > > This uses instructions in the hint space for architecture levels less > than armv8.3-a by default. If folks use -march=armv8.3-a you will start > seeing the combined forms of retaa appear. I'll amend this to: "This uses instructions in the HINT space (unless -march=armv8.3-a or higher is also passed), and such code can run on systems without the pointer authentication extension." > >> + >> +The remaining instruction and data keys (APIBKey, APDAKey, APDBKey) are >> +reserved for future use, and instructions using these keys must not be >> +used by software until a purpose and scope for their use has been >> +decided. To enable future software using these keys to function on >> +contemporary kernels, where possible, instructions using these keys are >> +made to behave as NOPs. >> + >> +The generic key (APGAKey) is currently unsupported. Instructions using >> +the generic key must not be used by software. >> + >> + >> +Debugging >> +--------- >> + >> +When CONFIG_ARM64_PTR_AUTH is selected, and relevant HW support is >> +present, the kernel will expose the position of TTBR0 PAC bits in the >> +NT_ARM_PAC_MASK regset (struct user_pac_mask), which userspace can >> +acqure via PTRACE_GETREGSET. >> + >> +Separate masks are exposed for data pointers and instruction pointers, >> +as the set of PAC bits can vary between the two. Debuggers should not >> +expect that HWCAP_APIA implies the presence (or non-presence) of this >> +regset -- in future the kernel may support the use of APIBKey, APDAKey, >> +and/or APBAKey, even in the absence of APIAKey. >> + >> +Note that the masks apply to TTBR0 addresses, and are not valid to apply >> +to TTBR1 addresses (e.g. kernel pointers). >> + >> + >> +Virtualization >> +-------------- >> + >> +Pointer authentication is not currently supported in KVM guests. KVM >> +will mask the feature bits from ID_AA64ISAR1_EL1, and attempted use of >> +the feature will result in an UNDEFINED exception being injected into >> +the guest. > > However applications using instructions from the hint space will > continue to work albeit without any protection (as they would just be > nops) ? Mostly, yes. If the guest leaves SCTLR_EL1.EnIA unset (and EnIB/EnDA/EnDB), then PAC* and AUT* instructions in the HINT space will execute as NOPs. If the guest sets EnIA, then PAC*/AUT* instructions will trap and KVM will inject an "Unknown reason" exception into the guest (which will cause a Linux guest to send a SIGILL to the application). In the latter case we could instead pretend the instruction was a NOP and not inject an exception, but trapping twice per every function would probably be terrible for performance. The guest shouldn't be setting EnIA anyway if ID_AA64ISAR1_EL1 reports that pointer authentication is not present (because KVM has hidden it). The other special case is the XPACLRI instruction, which is also in the HINT space. Currently it will trap and KVM will inject an exception into the guest. We should probably change this to NOP instead, as that's what applications will expect. Unfortunately there is no EnIA-like control to make it NOP. One option is for KVM to pretend the instruction was a NOP and return to the guest. But if XPACLRI gets executed frequently, then the constant trapping might hurt performance. I don't know how frequently it might get used, as I don't know of any applications currently using it. From what I understand, it may be used by userspace stack unwinders. (Also worth noting - as far as I can tell there is no easy way for KVM to know which pointer authentication instruction caused the trap, so we may have to do something unusual like use "at s12e1r" to read guest memory and check for XPACLRI.) The other option is to turn off trapping entirely. However then on a big.LITTLE system with mismatched pointer authentication support instructions will work intermittently on some CPUs but not others. Thoughts? > > Reviewed-by: Ramana Radhakrishnan? Thanks! Kristina