Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4792681imu; Mon, 12 Nov 2018 17:41:56 -0800 (PST) X-Google-Smtp-Source: AJdET5eJPEnSa7wkocq+J4KR4WcLLeWgBCo6jiaUlRjmGvx1mmuJ+2r12/vmHfoSlK6XRn89MP0B X-Received: by 2002:a63:5026:: with SMTP id e38mr2951235pgb.123.1542073316087; Mon, 12 Nov 2018 17:41:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542073316; cv=none; d=google.com; s=arc-20160816; b=Jl0LN6qVF9uVutWNWGt5lpJ0V7FA6auuzvViWE99a7E3t767ZlSwayu+8N6vyQ81Gr b15+aabrHkRCeaah6RZjoPnMUxLKVvf7/CIzvpnYPoQ/2gLhAnLgQJvqGPZf22Qzqxac 4f3Al++Nya2GeSzTAf4v+UPBR+Ecy/4cdwiGoEID6uT0NVS64nqP4IbFgY8mAE7Q3Clq cOV4FWhWpLFIgnPiH2TGqi1L+NDrXs+i50IDm/nb/PYHYzHoAudNSicsQmY8w8sbQ8V9 D4m/T8RUORAfcjTqw41pXNh6K+lAHaD8/i+EhbxAG5EzEp20wsEcTjzB0B4pYaeS4Q6v bdAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=yjh2RPP5S80uhpFlF0vEBhIB2bxaRuEIOqqBrIgweuE=; b=GWYwebwtU2U5t995rpZ1jaCOrFblpw772FmDJuZNDiJPTNAP3hiw2neM2dyJxw5YTM ffHDnNd8LZpT/ETnB3TMvv2T/AX0nMWNuCTRecZBf8qr4KZXkeTIqB1hpY/IYq2cvIGf NVEDxaIciRo1KC7IrxeNh+FBjhYurJs9HPkKtBzLCb05qwTG1o0ppgz46tmrqNmvdiFX aC9X8WNH8suV9jz6+hOOX3eUN5Fn5kNiZRRV8qmPWjzdmWdWsslyLXUVrsb2IceEKC+V CYMrYYGOBchr9HtVDoyd/UIOYj2dCDTjmBKNv98mCuBpRpbVnuH7vW6XEWP1UaSOFzsx d53A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a93-v6si22256006pla.226.2018.11.12.17.41.40; Mon, 12 Nov 2018 17:41:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730424AbeKMLf0 (ORCPT + 99 others); Tue, 13 Nov 2018 06:35:26 -0500 Received: from foss.arm.com ([217.140.101.70]:45688 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726198AbeKMLfZ (ORCPT ); Tue, 13 Nov 2018 06:35:25 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 37D531596; Mon, 12 Nov 2018 17:39:39 -0800 (PST) Received: from mbp (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 24CB93F718; Mon, 12 Nov 2018 17:39:39 -0800 (PST) Received: from cmarinas by mbp with local (Exim 4.89) (envelope-from ) id 1gMKke-0001BP-Me; Mon, 12 Nov 2018 22:32:12 +0000 Date: Mon, 12 Nov 2018 22:32:12 +0000 From: Catalin Marinas To: Christoffer Dall Cc: Amit Daniel Kachhap , Mark Rutland , Andrew Jones , Marc Zyngier , Will Deacon , linux-kernel@vger.kernel.org, Kristina Martsenko , kvmarm@lists.cs.columbia.edu, Ramana Radhakrishnan , Dave Martin , linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH v3 2/7] arm64/kvm: context-switch ptrauth registers Message-ID: <20181112223212.5o4ipc5kt5ziuupt@localhost> References: <1539773280-4159-1-git-send-email-amit.kachhap@arm.com> <1539773280-4159-3-git-send-email-amit.kachhap@arm.com> <20181102083725.GV12057@e113682-lin.lund.arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181102083725.GV12057@e113682-lin.lund.arm.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 02, 2018 at 09:37:25AM +0100, Christoffer Dall wrote: > On Wed, Oct 17, 2018 at 04:17:55PM +0530, Amit Daniel Kachhap wrote: > > From: Mark Rutland > > > > When pointer authentication is supported, a guest may wish to use it. > > This patch adds the necessary KVM infrastructure for this to work. > > > > When we schedule a vcpu, we enable guest usage of pointer > > authentication instructions and accesses to the keys. After these are > > enabled, we allow context-switching the keys. > > > > Pointer authentication consists of address authentication and generic > > authentication, and CPUs in a system might have varied support for > > either. Where support for either feature is not uniform, it is hidden > > from guests via ID register emulation, as a result of the cpufeature > > framework in the host. > > > > Unfortunately, address authentication and generic authentication cannot > > be trapped separately, as the architecture provides a single EL2 trap > > covering both. If we wish to expose one without the other, we cannot > > prevent a (badly-written) guest from intermittently using a feature > > which is not uniformly supported (when scheduled on a physical CPU which > > supports the relevant feature). When the guest is scheduled on a > > physical CPU lacking the feature, these attempts will result in an UNDEF > > being taken by the guest. > > > > Signed-off-by: Mark Rutland > > Signed-off-by: Amit Daniel Kachhap > > Cc: Marc Zyngier > > Cc: Christoffer Dall > > Cc: kvmarm@lists.cs.columbia.edu [...] > Two questions: > > - Can we limit all ptrauth functionality to VHE systems so that we > don't need to touch the non-VHE path and so that we don't need any of > the __hyp_text stuff? I would say yes. ARMv8.3 implies v8.1, so can enable ptrauth only when VHE is built into the kernel and present in the CPU implementation. > - Can we move all the save/restore logic to vcpu load/put as long as > the host kernel itself isn't using ptrauth, and if the host kernel at > some point begins to use ptrauth, can we have a hook to save/restore > at that time (similar to what we do for FPSIMD) to avoid this > overhead on every switch? We will probably enable ptrauth for the kernel as well fairly soon, so I don't think we should base the KVM assumption on the no ptrauth in kernel use-case. -- Catalin