Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4231628yba; Wed, 17 Apr 2019 07:21:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqxSE7+lnLywc1akxGfe3xfcgXeYJtp27yBZKhIpeOd56mQOa2/apMzdAT6INrYOE8GidJqv X-Received: by 2002:a63:6a43:: with SMTP id f64mr50343897pgc.366.1555510903952; Wed, 17 Apr 2019 07:21:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555510903; cv=none; d=google.com; s=arc-20160816; b=XWg2o8lmUfsw2tebsIrYyzPrDfBQHAsq81PPDnmZq0nT8oI7P7Hd0FQzsygrRaqrcs 43veUTZgUUA0QdjVPhVOsVQXDnWpTjIXp4MRQPSfo9GAUzYOLj9GuukzApBZZN7tkT5Y 12QWCO/XHsrty8XIqPgze6oCPQamDDe4uHJIabMvgR2CDr0kwSDr6fAZSECunGQe5Rj8 A5A96q1TSoUIxc+STOrNyPLdFKlikBUiXSupaKrR52OFNky3yLDX8LnHhzxvnXwerl8T mJoUOHlqO47vkbKPSCW9tyfP+9UPthsEth0HJquYrX7ugKa2CrjGd5CLWDxrpN3mNxtJ Futw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:autocrypt:openpgp:from:references:cc:to :subject; bh=HG9burilZ38qyydMfuT0nQJDP1LBfvBVCTQ5XkEV38c=; b=mZZZwC4hU4+ard3Ub6sL7nDHCN9YfSYaBkib4iPky5x8Q+/OzNFNfOwqPrvRxyfe4D xjvxxkf9PUvVHxvH4p7NZKPnvc56Ph510HsKTDKds2OLNJX237tI0IHF0SFHORBWAAu8 IkTelAtLyTXnJRoLOkYyelmKIQXd3J9gS2fdjj7vtyrOPx/Ey5UW9Rh+b+/94YIz0/Og jYdT7pvzLvBUpeRwM8jpPK0zN7h77yI+553qJk9wAHQrRBFBg9EG+hp1S1qDTFuEeu71 BDThFmlVsnn9cHCpH9x2WVpvymwRK0FBU9Kg/9aSgtr9+qYuerjUHubiQr/sxdgM6jmY O/eA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b67si30613024plb.20.2019.04.17.07.21.28; Wed, 17 Apr 2019 07:21:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732505AbfDQOTT (ORCPT + 99 others); Wed, 17 Apr 2019 10:19:19 -0400 Received: from foss.arm.com ([217.140.101.70]:45542 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732007AbfDQOTS (ORCPT ); Wed, 17 Apr 2019 10:19:18 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 69D72374; Wed, 17 Apr 2019 07:19:18 -0700 (PDT) Received: from [10.1.196.92] (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 152383F557; Wed, 17 Apr 2019 07:19:13 -0700 (PDT) Subject: Re: [PATCH v9 1/5] KVM: arm64: Add a vcpu flag to control ptrauth for guest To: Amit Daniel Kachhap , linux-arm-kernel@lists.infradead.org Cc: Christoffer Dall , Catalin Marinas , Will Deacon , Andrew Jones , Dave Martin , Ramana Radhakrishnan , kvmarm@lists.cs.columbia.edu, Kristina Martsenko , linux-kernel@vger.kernel.org, Mark Rutland , James Morse , Julien Thierry References: <1555039236-10608-1-git-send-email-amit.kachhap@arm.com> <1555039236-10608-2-git-send-email-amit.kachhap@arm.com> From: Marc Zyngier Openpgp: preference=signencrypt Autocrypt: addr=marc.zyngier@arm.com; prefer-encrypt=mutual; keydata= mQINBE6Jf0UBEADLCxpix34Ch3kQKA9SNlVQroj9aHAEzzl0+V8jrvT9a9GkK+FjBOIQz4KE g+3p+lqgJH4NfwPm9H5I5e3wa+Scz9wAqWLTT772Rqb6hf6kx0kKd0P2jGv79qXSmwru28vJ t9NNsmIhEYwS5eTfCbsZZDCnR31J6qxozsDHpCGLHlYym/VbC199Uq/pN5gH+5JHZyhyZiNW ozUCjMqC4eNW42nYVKZQfbj/k4W9xFfudFaFEhAf/Vb1r6F05eBP1uopuzNkAN7vqS8XcgQH qXI357YC4ToCbmqLue4HK9+2mtf7MTdHZYGZ939OfTlOGuxFW+bhtPQzsHiW7eNe0ew0+LaL 3wdNzT5abPBscqXWVGsZWCAzBmrZato+Pd2bSCDPLInZV0j+rjt7MWiSxEAEowue3IcZA++7 ifTDIscQdpeKT8hcL+9eHLgoSDH62SlubO/y8bB1hV8JjLW/jQpLnae0oz25h39ij4ijcp8N t5slf5DNRi1NLz5+iaaLg4gaM3ywVK2VEKdBTg+JTg3dfrb3DH7ctTQquyKun9IVY8AsxMc6 lxl4HxrpLX7HgF10685GG5fFla7R1RUnW5svgQhz6YVU33yJjk5lIIrrxKI/wLlhn066mtu1 DoD9TEAjwOmpa6ofV6rHeBPehUwMZEsLqlKfLsl0PpsJwov8TQARAQABtCNNYXJjIFp5bmdp ZXIgPG1hcmMuenluZ2llckBhcm0uY29tPokCOwQTAQIAJQIbAwYLCQgHAwIGFQgCCQoLBBYC AwECHgECF4AFAk6NvYYCGQEACgkQI9DQutE9ekObww/+NcUATWXOcnoPflpYG43GZ0XjQLng LQFjBZL+CJV5+1XMDfz4ATH37cR+8gMO1UwmWPv5tOMKLHhw6uLxGG4upPAm0qxjRA/SE3LC 22kBjWiSMrkQgv5FDcwdhAcj8A+gKgcXBeyXsGBXLjo5UQOGvPTQXcqNXB9A3ZZN9vS6QUYN TXFjnUnzCJd+PVI/4jORz9EUVw1q/+kZgmA8/GhfPH3xNetTGLyJCJcQ86acom2liLZZX4+1 6Hda2x3hxpoQo7pTu+XA2YC4XyUstNDYIsE4F4NVHGi88a3N8yWE+Z7cBI2HjGvpfNxZnmKX 6bws6RQ4LHDPhy0yzWFowJXGTqM/e79c1UeqOVxKGFF3VhJJu1nMlh+5hnW4glXOoy/WmDEM UMbl9KbJUfo+GgIQGMp8mwgW0vK4HrSmevlDeMcrLdfbbFbcZLNeFFBn6KqxFZaTd+LpylIH bOPN6fy1Dxf7UZscogYw5Pt0JscgpciuO3DAZo3eXz6ffj2NrWchnbj+SpPBiH4srfFmHY+Y LBemIIOmSqIsjoSRjNEZeEObkshDVG5NncJzbAQY+V3Q3yo9og/8ZiaulVWDbcpKyUpzt7pv cdnY3baDE8ate/cymFP5jGJK++QCeA6u6JzBp7HnKbngqWa6g8qDSjPXBPCLmmRWbc5j0lvA 6ilrF8m5Ag0ETol/RQEQAM/2pdLYCWmf3rtIiP8Wj5NwyjSL6/UrChXtoX9wlY8a4h3EX6E3 64snIJVMLbyr4bwdmPKULlny7T/R8dx/mCOWu/DztrVNQiXWOTKJnd/2iQblBT+W5W8ep/nS w3qUIckKwKdplQtzSKeE+PJ+GMS+DoNDDkcrVjUnsoCEr0aK3cO6g5hLGu8IBbC1CJYSpple VVb/sADnWF3SfUvJ/l4K8Uk4B4+X90KpA7U9MhvDTCy5mJGaTsFqDLpnqp/yqaT2P7kyMG2E w+eqtVIqwwweZA0S+tuqput5xdNAcsj2PugVx9tlw/LJo39nh8NrMxAhv5aQ+JJ2I8UTiHLX QvoC0Yc/jZX/JRB5r4x4IhK34Mv5TiH/gFfZbwxd287Y1jOaD9lhnke1SX5MXF7eCT3cgyB+ hgSu42w+2xYl3+rzIhQqxXhaP232t/b3ilJO00ZZ19d4KICGcakeiL6ZBtD8TrtkRiewI3v0 o8rUBWtjcDRgg3tWx/PcJvZnw1twbmRdaNvsvnlapD2Y9Js3woRLIjSAGOijwzFXSJyC2HU1 AAuR9uo4/QkeIrQVHIxP7TJZdJ9sGEWdeGPzzPlKLHwIX2HzfbdtPejPSXm5LJ026qdtJHgz BAb3NygZG6BH6EC1NPDQ6O53EXorXS1tsSAgp5ZDSFEBklpRVT3E0NrDABEBAAGJAh8EGAEC AAkFAk6Jf0UCGwwACgkQI9DQutE9ekMLBQ//U+Mt9DtFpzMCIHFPE9nNlsCm75j22lNiw6mX mx3cUA3pl+uRGQr/zQC5inQNtjFUmwGkHqrAw+SmG5gsgnM4pSdYvraWaCWOZCQCx1lpaCOl MotrNcwMJTJLQGc4BjJyOeSH59HQDitKfKMu/yjRhzT8CXhys6R0kYMrEN0tbe1cFOJkxSbV 0GgRTDF4PKyLT+RncoKxQe8lGxuk5614aRpBQa0LPafkirwqkUtxsPnarkPUEfkBlnIhAR8L kmneYLu0AvbWjfJCUH7qfpyS/FRrQCoBq9QIEcf2v1f0AIpA27f9KCEv5MZSHXGCdNcbjKw1 39YxYZhmXaHFKDSZIC29YhQJeXWlfDEDq6nIhvurZy3mSh2OMQgaIoFexPCsBBOclH8QUtMk a3jW/qYyrV+qUq9Wf3SKPrXf7B3xB332jFCETbyZQXqmowV+2b3rJFRWn5hK5B+xwvuxKyGq qDOGjof2dKl2zBIxbFgOclV7wqCVkhxSJi/QaOj2zBqSNPXga5DWtX3ekRnJLa1+ijXxmdjz hApihi08gwvP5G9fNGKQyRETePEtEAWt0b7dOqMzYBYGRVr7uS4uT6WP7fzOwAJC4lU7ZYWZ yVshCa0IvTtp1085RtT3qhh9mobkcZ+7cQOY+Tx2RGXS9WeOh2jZjdoWUv6CevXNQyOUXMM= Organization: ARM Ltd Message-ID: <239c5d74-221e-cf8c-2c41-80db016bdc2b@arm.com> Date: Wed, 17 Apr 2019 15:19:11 +0100 User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 17/04/2019 14:08, Amit Daniel Kachhap wrote: > Hi, > > On 4/17/19 2:05 PM, Marc Zyngier wrote: >> On 12/04/2019 04:20, Amit Daniel Kachhap wrote: >>> A per vcpu flag is added to check if pointer authentication is >>> enabled for the vcpu or not. This flag may be enabled according to >>> the necessary user policies and host capabilities. >>> >>> This patch also adds a helper to check the flag. >>> >>> Signed-off-by: Amit Daniel Kachhap >>> Cc: Mark Rutland >>> Cc: Marc Zyngier >>> Cc: Christoffer Dall >>> Cc: kvmarm@lists.cs.columbia.edu >>> --- >>> >>> Changes since v8: >>> * Added a new per vcpu flag which will store Pointer Authentication enable >>> status instead of checking them again. [Dave Martin] >>> >>> arch/arm64/include/asm/kvm_host.h | 4 ++++ >>> 1 file changed, 4 insertions(+) >>> >>> diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h >>> index 9d57cf8..31dbc7c 100644 >>> --- a/arch/arm64/include/asm/kvm_host.h >>> +++ b/arch/arm64/include/asm/kvm_host.h >>> @@ -355,10 +355,14 @@ struct kvm_vcpu_arch { >>> #define KVM_ARM64_HOST_SVE_ENABLED (1 << 4) /* SVE enabled for EL0 */ >>> #define KVM_ARM64_GUEST_HAS_SVE (1 << 5) /* SVE exposed to guest */ >>> #define KVM_ARM64_VCPU_SVE_FINALIZED (1 << 6) /* SVE config completed */ >>> +#define KVM_ARM64_GUEST_HAS_PTRAUTH (1 << 7) /* PTRAUTH exposed to guest */ >>> >>> #define vcpu_has_sve(vcpu) (system_supports_sve() && \ >>> ((vcpu)->arch.flags & KVM_ARM64_GUEST_HAS_SVE)) >>> >>> +#define vcpu_has_ptrauth(vcpu) \ >>> + ((vcpu)->arch.flags & KVM_ARM64_GUEST_HAS_PTRAUTH) >>> + >> >> Just as for SVE, please first check that the system has PTRAUTH. >> Something like: >> >> (cpus_have_const_cap(ARM64_HAS_GENERIC_AUTH_ARCH) && \ >> ((vcpu)->arch.flags & KVM_ARM64_GUEST_HAS_PTRAUTH)) > > In the subsequent patches, vcpu->arch.flags is only set to > KVM_ARM64_GUEST_HAS_PTRAUTH when all host capability check conditions > matches such as system_supports_address_auth(), > system_supports_generic_auth() so doing them again is repetitive in my view. It isn't the setting of the flag I care about, but the check of that flag. Checking a flag for a feature that cannot be used on the running system should have a zero cost, which isn't the case here. Granted, the impact should be minimal and it looks like it mostly happen on the slow path, but at the very least it would be consistent. So even if you don't buy my argument about efficiency, please change it in the name of consistency. Thanks, M. -- Jazz is not dead. It just smells funny...