Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp498464imm; Wed, 17 Oct 2018 03:50:47 -0700 (PDT) X-Google-Smtp-Source: ACcGV60Igp64Q5r3UhHq7p38+Dr/Ao+JKfsdoxOGe0HcfCl0H0Fh53+7XW4a1tm08h6Wl0lVXSJM X-Received: by 2002:a17:902:8f90:: with SMTP id z16-v6mr25561142plo.214.1539773447191; Wed, 17 Oct 2018 03:50:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539773447; cv=none; d=google.com; s=arc-20160816; b=H5tWyB1zADL2lN52Aq1P1+zd25TkFe5sGDJrcMHTagDNDPADTgo+DWh/sF6WTgBTOu t26x14yPFSkI9NliJ27j8k7HsRWrZmTVukln25U8C+Y53OhjebOKFJQn2zl17qnDUJ2E 4DIZrbcRYUorPDZn+Fw/mI7VVSDxGtQVPufVyUGJOo+iFOlOTNkdhrAssbx7khW6sq1G cyR/sEbMKLOE1Eo5lcof9kxpAm5D5/ItZUcr109Y/rVJHZienKR0LjyEO4MOE+11kZYT e1TlSoRPaMCWm5SHNottKahke7bxTWZVIxiRCCzUh6GUoMxnYDCRqADiHijqjqBui2W1 zyMA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=m8BbG06nenxZlZ/XbnHvniIwGZtxFOsL2BzuBjWn+DM=; b=XtKKj11VEv5+voSvRYYhg6qVvaM2Ue9TK4qz7nE/IKOu2oJAGT9kCpVEXVWLIoy5MT DdMqs+f19ek5VUoo8Y414e9N7WssENz5nFRX+gUdGxxGntgU2xUppbVK7MSRxdjvc1Mh owsJkjTP/gzSXAo1M8O1OAwexg2yaaMPreRCuEJsz6FSxL7atppFuJB0ItdKIs45EN44 eylsZ0zxs5X3PmICbuENR6Lw8myylCmZmNcw4AJJeN6FzHUC1m/DAjUC8Do9d6EupKz3 wrrtocpmY1PTG3STnBTLnqC7EUi8X692a0cCT0Qw6rmgnr5Jfs9ghPIkeH9hKWHwz4Dz p2dA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u192-v6si17524576pgu.449.2018.10.17.03.50.31; Wed, 17 Oct 2018 03:50:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727288AbeJQSo0 (ORCPT + 99 others); Wed, 17 Oct 2018 14:44:26 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:49674 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726868AbeJQSo0 (ORCPT ); Wed, 17 Oct 2018 14:44:26 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A5D561682; Wed, 17 Oct 2018 03:49:18 -0700 (PDT) Received: from a75553-lin.blr.arm.com (unknown [10.162.0.175]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id B50B33F71D; Wed, 17 Oct 2018 03:49:14 -0700 (PDT) From: Amit Daniel Kachhap To: linux-arm-kernel@lists.infradead.org Cc: Christoffer Dall , Marc Zyngier , Catalin Marinas , Will Deacon , Andrew Jones , Dave Martin , Ramana Radhakrishnan , kvmarm@lists.cs.columbia.edu, Kristina Martsenko , linux-kernel@vger.kernel.org, Amit Daniel Kachhap , Mark Rutland Subject: [PATCH v3 6/7] arm64: docs: document KVM support of pointer authentication Date: Wed, 17 Oct 2018 16:17:59 +0530 Message-Id: <1539773280-4159-7-git-send-email-amit.kachhap@arm.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1539773280-4159-1-git-send-email-amit.kachhap@arm.com> References: <1539773280-4159-1-git-send-email-amit.kachhap@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The documentation is updated to help in using pointer authentication for KVM guests. Signed-off-by: Amit Daniel Kachhap Cc: Mark Rutland Cc: Christoffer Dall Cc: Marc Zyngier Cc: kvmarm@lists.cs.columbia.edu --- Documentation/arm64/pointer-authentication.txt | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/Documentation/arm64/pointer-authentication.txt b/Documentation/arm64/pointer-authentication.txt index 8a9cb57..b00d735 100644 --- a/Documentation/arm64/pointer-authentication.txt +++ b/Documentation/arm64/pointer-authentication.txt @@ -78,7 +78,13 @@ to TTBR1 addresses (e.g. kernel pointers). Virtualization -------------- -Pointer authentication is not currently supported in KVM guests. KVM +Pointer authentication is enabled in KVM guest when virtual machine is +created by passing a flag requesting this feature to be enabled. Without +this flag, pointer authentication is not enabled in KVM guests and KVM will mask the feature bits from ID_AA64ISAR1_EL1, and attempted use of the feature will result in an UNDEFINED exception being injected into the guest. + +The flag to enable this feature is KVM_ARM_VCPU_PTRAUTH and should be +used in KVM API KVM_ARM_VCPU_INIT. The pointer authentication key +registers are hidden from userspace if this feature is not enabled. -- 2.7.4