On Wed, Nov 11, 2020 at 9:46 AM Dave Martin <Dave.Martin@xxxxxxx> wrote: > > On Tue, Nov 10, 2020 at 02:06:21PM -0800, Peter Collingbourne wrote: > > On Tue, Nov 10, 2020 at 7:12 AM Eric W. Biederman <ebiederm@xxxxxxxxxxxx> wrote: > > > > > > Peter Collingbourne <pcc@xxxxxxxxxx> writes: > > > > > > > On Mon, Nov 9, 2020 at 5:13 PM Eric W. Biederman <ebiederm@xxxxxxxxxxxx> wrote: > > > >> > > > >> Peter Collingbourne <pcc@xxxxxxxxxx> writes: > > > >> > > > >> > The kernel currently clears the tag bits (i.e. bits 56-63) in the fault > > > >> > address exposed via siginfo.si_addr and sigcontext.fault_address. However, > > > >> > the tag bits may be needed by tools in order to accurately diagnose > > > >> > memory errors, such as HWASan [1] or future tools based on the Memory > > > >> > Tagging Extension (MTE). > > > >> > > > > >> > We should not stop clearing these bits in the existing fault address > > > >> > fields, because there may be existing userspace applications that are > > > >> > expecting the tag bits to be cleared. Instead, create a new pair of > > > >> > fields in siginfo._sigfault, and store the tag bits of FAR_EL1 there, > > > >> > together with a mask specifying which bits are valid. > > > >> > > > > >> > A flag is added to si_faultflags to allow userspace to determine whether > > > >> > the values in the fields are valid. > > > >> > > > >> I think I am missing some things: > > > >> > > > >> Today it is documented that the tag bits are cleared, and so we can't > > > >> use the highbits to hold the tag bits by default. > > > >> > > > >> Why do you need to deliver which tag bits are valid? That feels like an > > > >> implementation detail that is needed to setup the tag bits. It feels > > > >> like it would be constant per process. So I don't understand why the > > > >> siginfo needs to report information the process should already have. > > > > > > > > It isn't constant as it may vary depending on the specific type of > > > > fault being delivered. For example on arm64 the architecture only > > > > provides us with bits 56-59 of the tag for tag check faults, while all > > > > other data aborts also provide bits 60-63. Now although the user > > > > program may distinguish the two cases by checking the si_code, we > > > > would also like to allow future architecture extensions to provide > > > > bits 60-63 for tag check faults as well and allow distinguishing > > > > between "bits 60-63 were zero" and "bits 60-63 were unknown" (which is > > > > important when providing error reports). > > > > > > Does that mean that bits 60-63 are effectively unusable as tag bits > > > if the tag check fault won't report them? > > > > The hardware doesn't support tag checking on bits 60-63, only on bits > > 56-59, so in terms of hardware enforced memory tag checking they can't > > be used as tag bits. But they are still subject to address tagging aka > > top-byte-ignore so they could be used by userspace for other purposes > > (e.g. if the allocator adds entropy to all 8 bits instead of just bits > > 56-59 they could in theory be used to allow better diagnostics with > > more precise matching of an invalid access to a previous allocation). > > > > > If you can use bits 60-63 as tag bits how does that work if they aren't > > > reported? > > > > It still works but we're limited in how many allocations we can match > > accesses to (16 vs 256). > > Not matching/reporting all the bits still has some value: if all 8 bits > are random per allocation, then it is statistically likely that the > hardware will detect mismatches. Once you know there's a bug, you can > turn on software instrumentation to debug the issue further, which may > check the rest of the bits without relying on the signal mechansism, > though at a higher runtime cost. > > (I'm not saying software will definitely do things this way, but it > seems a reasonable use case.) I suppose that it's possible that you could do the tag checks in software just so that you can get the upper 4 bits, but if you're prepared to do something this elaborate then there may be a lower cost overall approach (e.g. look for GPRs whose bits 56-59 matches bits 56-59 of the fault address, then your upper 4 bits will likely be those of one of the registers where they match). > > > > I suppose that you could imagine that, if the "bits 60-63 available" > > > > extension ever comes to pass, it could be exposed via a bit in > > > > getauxval(AT_HWCAP2) (or maybe something like AT_HWCAP3 depending on > > > > how long it takes to arrive) and that would provide a way for > > > > userspace to know which bits are valid. But it seems like allowing > > > > this to vary per signal is relatively cheap, allows the information to > > > > be made available trivially architecture independently and keeps our > > > > options open for the future (because we don't know if some future > > > > architecture will actually make this a per-signal attribute). > > > > > > > > That being said, maybe we could solve this problem at the point at > > > > which we do encounter such an architecture though. > > > > > > My goal would be to extend things to the minimum extent necessary to > > > handle today's reality well. Usually architectures evolve in > > > unanticipated directions so simple and straight forward usually wins for > > > handling future evolution. As there is simply less old baggage to carry > > > around. > > > > > > However I don't understand if reporting the valid bits on a signal by > > > signal basis has a real advantage today or not. If it helps today we > > > will find room for the field. > > > > Okay, that makes sense. With the architecture as specified today I > > don't think we would need it, since you can write a function that > > operates on the siginfo and tells you what the si_addr_tag_bits_mask > > would be without it. > > > > > >> Want prevents adding a sigaction sa_flag SA_EXPOSE_TABITS that when set > > > >> causes the high bits to be set, and when clear (the default) will have > > > >> the signal delivery code clear those bits. > > > >> > > > >> That should be enough for code that wants the tag bits to ask for them. > > > >> As userspace would need to be updated to get the new bits > > > >> > > > >> Even if you have chained handlers. The chaining mechanism would need to > > > >> be updated and it could call the aware handlers first then clear the tag > > > >> bits and call the rest of the handlers. > > > >> > > > >> It feels like always passing the tag bits in the address and then > > > >> clearing them in the copy to userspace if the signal handler is > > > >> not ready for them would be easier to maintain. > > > > > > > > I think that approach might work. Although it may make life harder for > > > > callers of ptrace(PTRACE_SETSIGINFO) since they may need to know the > > > > value of the bit in order to prepare a correct siginfo structure, if > > > > we can reasonably expect them to always be delivering an exact copy of > > > > a signal that was received before then maybe that is okay. > > > > > > I think we can reasonably expect callers of PTRACE_SETSIGINFO to be able > > > to either deal the full reality of what is going on, or to only generate > > > signals that they fully understand. > > > > > > Other than the use by CRIU it is a debugging facility and it is not > > > expected for ordinary usage. The non-CRIU use case would really seem to > > > be what happens if I inject arbitrary signal X into process Y. For that > > > you need the ability to inject an arbitrary signal. > > > > > > My real sense with PTRACE_SETSIGINFO is that if we wind up with a > > > regression we can deal with it then. > > > > Okay, that works for me. > > > > > > Assuming that this is an alternative to introducing > > > > si_addr_tag_bits_mask, the userspace code would need to use the flag > > > > bit support detection protocol for SA_EXPOSE_TAGBITS in order to be > > > > able to distinguish between "no bits valid" and "some bits valid", and > > > > then use an architecture-specific mechanism to determine exactly which > > > > bits are valid. Is that okay for a generic feature? > > > > > > Unless I am mistaken setting the bits is already architecture specific > > > so having some architecture specific code in there should not be a big > > > problem. > > > > > > But I really don't understand the arm case well enough to know if we can > > > get away without si_addr_tag_bits_mask, and in turn without the flags > > > field that indicates the si_addr_tag_bits_mask is present. > > > > > > So I am asking questions so I can understand just what we get from > > > si_addr_tag_bits_mask. > > > > If we allow the derivation of the mask to be architecture-specific > > (which I'd be comfortable with) then I don't think we need it. What we > > would end up with is: > > Note, the architecture-specificness can always be hidden under > sysconf(3) or similar, so it's probably not a huge deal if there's no > generic way of reporting that at the kernel level. That makes sense, and it could also accommodate architectures like RISC-V which didn't start out with tag bits but may receive them later as a result of architecture changes. > > - The tag bits mask is constant and architecturally defined (in > > arm64's case it would be 0xff << 56). > > - The valid tag bits mask specifies which bits of the tag bits mask in > > the fault address are propagated to si_addr. It is defined in an > > architecture-specific way based on the signal handler's > > SA_EXPOSE_TAGBITS bit, the contents of siginfo and possibly global > > information such as getauxval(AT_HWCAP*). > > - on arm64 this would currently be defined as: > > - if SA_EXPOSE_TAGBITS is not set then the mask is 0xff << 56 for > > SIGTRAP/TRAP_BRKPT, 0 otherwise > > - if SA_EXPOSE_TAGBITS is set then the mask is 0xf << 56 for > > SIGSEGV/SEGV_MTESERR, 0xff << 56 otherwise > > This feels very obscure, but since the use cases are equally obscure > this may not be a big problem. I do sympathise with Eric's view that it > may be best not to over-abstract this. > > An sa_flags based mechanism still won't play nice with interposition > frameworks where library registers a proxy handler and chains the user's > handler from it -- the xflags approach is potentially better there. But > it would only be one more in a long list of existing issues. People will > only be using SA_EXPOSE_TAGBITS if they explicitly need it (i.e., > rarely). I think this is likely to work with interceptors, as long as the interceptor either stashes the sa_flags unchanged (detected by callers as an old kernel via SA_UNSUPPORTED) or passes them verbatim to the kernel (detection will be consistent with the kernel version). Both behaviors are likely to be safe (and the former is what libsigchain implements), although I suppose that an interceptor that replaces sa_sigaction but not sa_flags may now be exposed to the tag bits, but odds of the stars aligning and causing a problem this way are much less than for random userspace applications being exposed to the bits unconditionally. As I've said before "likely to work" is probably the best that we can hope for with unaware interceptors. Of course, the user program may attempt to rely on SA_EXPOSE_TAGBITS behavior without checking for support, but that's the case with or without interceptors. > > - If SA_EXPOSE_TAGBITS is set then the bits in the tag bits mask that > > are not also in the valid tag bits mask have an undefined value (this > > would e.g. allow future expansion of arm64 to expose bits 60-63 on tag > > check faults). > > - If the kernel does not support SA_EXPOSE_TAGBITS (as determined > > using the flag bit support detection protocol) then the behavior is as > > if SA_EXPOSE_TAGBITS is not set. > > > > So I think I'd be fine with dropping it but let me experiment with the > > new approach so that I can confirm that it's practical on Android and > > I'll get back to you. > > > Is the xflags mechanism still required if we follow this model? > > If not, that would be a significant simplification. No, it will not be necessary. In fact, no changes to the siginfo structure are required, the only change is to the semantics of the si_addr field. After doing some experimentation on Android (including implementing the change itself, and consequent changes to the tombstone signal handler and libsigchain) I'm happy with the new approach and I'll send a v15 with the new patches shortly. Peter