Received: by 10.192.165.148 with SMTP id m20csp569374imm; Wed, 25 Apr 2018 04:26:08 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoQ3U1Fbq07ymFBCtkxYPT44W4H4i1BgM7QqPIsZC4lR5/sJ/QR1I9nMrXGB/PmgymYy9sN X-Received: by 10.99.66.133 with SMTP id p127mr2872758pga.421.1524655568022; Wed, 25 Apr 2018 04:26:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524655567; cv=none; d=google.com; s=arc-20160816; b=OjnFDDyMBbhIx9ZSiji7/WbYS5rBT/axE29oRI5FO1HXfJzDk3T/3dOQgNPkB9fDaq B6+WNM9eTxfKazDOpe+9hq265tA6VtarIwIvzsPLylEtjaOHkp9QOjyOFXI2WiL/MWQH if9EGGaZBQEVvvTFoeOKgKjbIU2z3i7QWgJRJcv5vPvocXhgLH/2sBqyrcd5O+UjwQU0 lhSIK7NBKNpG3YsuLi9rUP8RgqjHWWQ7cG4wU0bcPVJHwE2Tow1aHd6MEUoO7Zvuv9xf CJKRHNb+XFtXIrY+K/uTrlQ4YxTfXsJ71+IkGH8s1rn4pwuWE3v/2sleUCN8qlpXO6bI 7lEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=tR5YZhFzr9E2dh0wA9pftv03BJkqYHB9NYFrmaz0zhk=; b=iOlBgtyfkep8WN/waL6Yp/jkJdezsmvkAkpR2pqEAgesRQH43wHBQR/HR0R8RSffxh SKA8Jlj3WeFlsQWVCNfz0ebGxMOWRCEaGLKxfFm3ZUNGtPGiMkew4MZKz6WortzJU3ft xNbhDS8cFeZdbi90SgBysQjM7yKVj8UvALQiGBOQU9lBsEh5efzJCFJjItvf0JSeVNJW PSbd3LmJJj2ewJTwG+WbYvpABAimxY56m7DvN0GuFQ4Lu2h7G+4woap/BMLfoYYYY6cs 7EDwo0jxdBKkl8UZD7EMWcOckJHLQLJCDS76L37wQt7gZq5WFO9aHw04fJ6edqhA0650 fjTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i1-v6si15551627pld.152.2018.04.25.04.25.53; Wed, 25 Apr 2018 04:26:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753728AbeDYLXp (ORCPT + 99 others); Wed, 25 Apr 2018 07:23:45 -0400 Received: from foss.arm.com ([217.140.101.70]:38272 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753033AbeDYLXh (ORCPT ); Wed, 25 Apr 2018 07:23:37 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0CBC51435; Wed, 25 Apr 2018 04:23:37 -0700 (PDT) Received: from armageddon.cambridge.arm.com (armageddon.cambridge.arm.com [10.1.206.84]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id A911C3F4FF; Wed, 25 Apr 2018 04:23:34 -0700 (PDT) Date: Wed, 25 Apr 2018 12:23:32 +0100 From: Catalin Marinas To: Mark Rutland Cc: linux-arm-kernel@lists.infradead.org, linux-arch@vger.kernel.org, drjones@redhat.com, cdall@kernel.org, arnd@arndb.de, suzuki.poulose@arm.com, marc.zyngier@arm.com, awallis@codeaurora.org, kernel-hardening@lists.openwall.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, ramana.radhakrishnan@arm.com, kvmarm@lists.cs.columbia.edu Subject: Re: [PATCHv3 07/11] arm64: add basic pointer authentication support Message-ID: <20180425112331.hke7afxnslyrwf3h@armageddon.cambridge.arm.com> References: <20180417183735.56985-1-mark.rutland@arm.com> <20180417183735.56985-8-mark.rutland@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180417183735.56985-8-mark.rutland@arm.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Mark, On Tue, Apr 17, 2018 at 07:37:31PM +0100, Mark Rutland wrote: > diff --git a/arch/arm64/include/asm/mmu_context.h b/arch/arm64/include/asm/mmu_context.h > index 39ec0b8a689e..caf0d3010112 100644 > --- a/arch/arm64/include/asm/mmu_context.h > +++ b/arch/arm64/include/asm/mmu_context.h > @@ -29,7 +29,6 @@ > #include > #include > #include > -#include > #include > #include > #include > @@ -168,7 +167,14 @@ static inline void cpu_replace_ttbr1(pgd_t *pgdp) > #define destroy_context(mm) do { } while(0) > void check_and_switch_context(struct mm_struct *mm, unsigned int cpu); > > -#define init_new_context(tsk,mm) ({ atomic64_set(&(mm)->context.id, 0); 0; }) > +static inline int init_new_context(struct task_struct *tsk, > + struct mm_struct *mm) > +{ > + atomic64_set(&mm->context.id, 0); > + mm_ctx_ptrauth_init(&mm->context); > + > + return 0; > +} > > #ifdef CONFIG_ARM64_SW_TTBR0_PAN > static inline void update_saved_ttbr0(struct task_struct *tsk, > @@ -216,6 +222,8 @@ static inline void __switch_mm(struct mm_struct *next) > return; > } > > + mm_ctx_ptrauth_switch(&next->context); > + > check_and_switch_context(next, cpu); > } > > @@ -241,6 +249,19 @@ switch_mm(struct mm_struct *prev, struct mm_struct *next, > void verify_cpu_asid_bits(void); > void post_ttbr_update_workaround(void); > > +static inline void arch_dup_mmap(struct mm_struct *oldmm, > + struct mm_struct *mm) > +{ > + mm_ctx_ptrauth_dup(&oldmm->context, &mm->context); > +} > +#define arch_dup_mmap arch_dup_mmap IIUC, we could skip the arch_dup_mmap() and init_new_context() here for the fork() case since the ptrauth_keys would be copied as part of the dup_mm(). There is another situation where init_new_context() is called bprm_mm_init() -> mm_alloc() -> mm_init() -> init_new_context(). However, in this case the core code also calls arch_bprm_mm_init(). So I think we only need to update the latter to get a new random key. > diff --git a/arch/arm64/include/asm/pointer_auth.h b/arch/arm64/include/asm/pointer_auth.h > new file mode 100644 > index 000000000000..a2e8fb91fdee > --- /dev/null > +++ b/arch/arm64/include/asm/pointer_auth.h > @@ -0,0 +1,89 @@ > +/* > + * Copyright (C) 2016 ARM Ltd. > + * > + * This program is free software; you can redistribute it and/or modify > + * it under the terms of the GNU General Public License version 2 as > + * published by the Free Software Foundation. > + * > + * This program is distributed in the hope that it will be useful, > + * but WITHOUT ANY WARRANTY; without even the implied warranty of > + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the > + * GNU General Public License for more details. > + * > + * You should have received a copy of the GNU General Public License > + * along with this program. If not, see . > + */ Nitpick: 2018. You could also use the SPDX header, save some lines. -- Catalin