Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp240997imu; Thu, 3 Jan 2019 18:38:12 -0800 (PST) X-Google-Smtp-Source: ALg8bN73UjoDvh7EZGNUtrxnG60KTV/p1hzQTlANGzNDbdHn91ZrxGkd9y2l/Sy5vKyUZvlUsIOD X-Received: by 2002:a65:6148:: with SMTP id o8mr146414pgv.451.1546569492272; Thu, 03 Jan 2019 18:38:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546569492; cv=none; d=google.com; s=arc-20160816; b=lo/sDd4Xec6d1uyxCyumbdnYS5wHnkXA4zAkA/g04dJPq+kkVulHVMTcJE3aMb3DwV mnflyX/SgUqpAKQmhsIligRiThiDjSzgCnl439ZfvoE/vOHWnFXskriTRLaFkzwl/XXG CkASwlvzJobpbR/pWufB8eLatVyL/jQa956j6dNCBudiugeA4Y8gesdbTNEHr/7XJte6 uNtTBmdu6jQUFAQ4bf7eVOam3rbAzM+ss71yA1EI35HnSUAij5tw3UvLlSP2vgQYOltk xqsNaWRMUecf/GKk+G4qlF9qLP2h8u0elW6XAj1XEZhgMM/CqOKTSBE1VjzKnPH/RXMm Zm0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=9CM4450ile60b1V1Wrtz8AISpOdoZO9SRmhG7Kb7Bgw=; b=Be9fcHp8cAHMSjvPzq9Mc7Clpk52k8d+vpgPI0TM+feKKPDs3twmrrx9k7MOowRvre KIOUno4SI6M8jXB+Zzcnb+uoCZDmHvd1xhWo0RoTOQJwDDPq2OUkem1V8fLBdvREemJR qkJNfNpLU/Vg6N/KTkYjZIITs4OlBkLxLugj5VqgoKoKZIrQjMRckK/ESF0OsZx68sXn J7DdIN2ozvW0ztreieCk4MFGDo5OM3nZl5THL/jmj8f0rYegGmBIHCDg9ahnfcByRGbz EqJLgRODCwcLG558oQy3K42gAJPHJ+FMLI8r82Scg6NgN2N4kmnkHd2AQz2cJ48JE7zJ goKg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f34si3977454ple.280.2019.01.03.18.37.30; Thu, 03 Jan 2019 18:38:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727299AbfACU3F (ORCPT + 99 others); Thu, 3 Jan 2019 15:29:05 -0500 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:51772 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726036AbfACU3F (ORCPT ); Thu, 3 Jan 2019 15:29:05 -0500 Received: by atrey.karlin.mff.cuni.cz (Postfix, from userid 512) id 3586780806; Thu, 3 Jan 2019 21:28:57 +0100 (CET) Date: Thu, 3 Jan 2019 21:29:01 +0100 From: Pavel Machek To: Kristina Martsenko Cc: linux-arm-kernel@lists.infradead.org, Adam Wallis , Amit Kachhap , Andrew Jones , Ard Biesheuvel , Catalin Marinas , Christoffer Dall , Cyrill Gorcunov , Dave P Martin , Jacob Bramley , Kees Cook , Marc Zyngier , Mark Rutland , Ramana Radhakrishnan , Richard Henderson , Suzuki K Poulose , Will Deacon , kvmarm@lists.cs.columbia.edu, linux-kernel@vger.kernel.org Subject: Re: [PATCH v6 07/13] arm64: add basic pointer authentication support Message-ID: <20190103202901.GA21564@amd> References: <20181207183931.4285-1-kristina.martsenko@arm.com> <20181207183931.4285-8-kristina.martsenko@arm.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="gKMricLos+KVdGMg" Content-Disposition: inline In-Reply-To: <20181207183931.4285-8-kristina.martsenko@arm.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --gKMricLos+KVdGMg Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri 2018-12-07 18:39:25, Kristina Martsenko wrote: > From: Mark Rutland >=20 > This patch adds basic support for pointer authentication, allowing > userspace to make use of APIAKey, APIBKey, APDAKey, APDBKey, and > APGAKey. The kernel maintains key values for each process (shared by all > threads within), which are initialised to random values at exec() time. =2E.. > +/* > + * We give each process its own keys, which are shared by all threads. T= he keys > + * are inherited upon fork(), and reinitialised upon exec*(). > + */ > +struct ptrauth_keys { > + struct ptrauth_key apia; > + struct ptrauth_key apib; > + struct ptrauth_key apda; > + struct ptrauth_key apdb; > + struct ptrauth_key apga; > +}; intstruction_a, data_a, generic_a? Should be easier to understand than "apdb" ... Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --gKMricLos+KVdGMg Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlwucI0ACgkQMOfwapXb+vKOAwCgkLvdESb50TdMC9uVVTRAt2oy JY0An30sVTzX4gQ5fTxKf5nu3+EScPPb =MRNf -----END PGP SIGNATURE----- --gKMricLos+KVdGMg--