Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1734630ybz; Thu, 30 Apr 2020 04:41:36 -0700 (PDT) X-Google-Smtp-Source: APiQypK0XRL1+8bOSWV0GqkUI5pui2GCI3pVdyXOv1BgwjFU5GGC+CHZdevHZZN0Y9oTklMO0e9P X-Received: by 2002:a50:e002:: with SMTP id e2mr2240021edl.179.1588246896572; Thu, 30 Apr 2020 04:41:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588246896; cv=none; d=google.com; s=arc-20160816; b=yxQL7+TiE54fLx+CkIQwQIBxfypUCvkMu7i0IQAKLcq2t/Z2Phfdm8fCAzvmK+xKXv twT5vOpM8BmQbmj1CJ0UMZEUrAayoIOvazy/IVUZYoI+ZS+fF1xkiVh1UWc+VYJkTgh4 zXqRtsdgrpRN2mWf3Y++ZzXy7aSJOLsvqj1wRnmeHamsIiESIjnsFYl7QiTbhAXT7xtU 8xE8IswzML01EKnie94IsMNeSvOYlCPG/3yRsUdwlzkgPRHNdvSCXYzKsIgc8NWKTmJu OZp8hdzQ6niS9vZoRKNzuYeUQy9LBvh0ibnUtUteTxcHBaZkS9Ax0CusxqD8XrrpU8IJ IxEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=fr9T3vgmsXWGmasbFFa4E/xP4I8G0mJjRxlnwZr8ZpM=; b=wcWbS34MxbquSwAWTYe3+W+J0rDG5BKEVWftf3qgAIlsxmlloztSkVBscI3XBk4NpX xc8rZnYs1KaD/jYu5Omw1TwV42yUufdLuepQ5xdZfqAuM447rlymZD7+ivX2nr3hqfXi lD6KUb3RO7v1ft9leHT5zNl33mpQI80z7Id143OVCGuxY47iFJiqO9aPGobmzyepMbLl oWmY0lYfOGKRSQhHSuPmBLzAnFwCWgouKV1U2NmH+dUvbUpwrFD6z50+A8eMpIibHl/q 0BItUNS6urwlFewTlRuR1M8WKnymlXjzB/OIU6X/yR9luvc4UzHD1XxRqftvYyVG7Rzs ERUQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h24si4834599edv.469.2020.04.30.04.41.12; Thu, 30 Apr 2020 04:41:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726791AbgD3LgW (ORCPT + 99 others); Thu, 30 Apr 2020 07:36:22 -0400 Received: from foss.arm.com ([217.140.110.172]:52952 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726626AbgD3LgV (ORCPT ); Thu, 30 Apr 2020 07:36:21 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id E175731B; Thu, 30 Apr 2020 04:36:20 -0700 (PDT) Received: from [10.57.27.210] (unknown [10.57.27.210]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D2D153F305; Thu, 30 Apr 2020 04:36:17 -0700 (PDT) Subject: Re: [PATCH v2 1/2] arm64/crash_core: Export KERNELPACMASK in vmcoreinfo To: linux-arm-kernel@lists.infradead.org Cc: kexec@lists.infradead.org, linux-kernel@vger.kernel.org, Catalin Marinas , Will Deacon , Bhupesh Sharma , Vincenzo Frascino , James Morse , Mark Rutland References: <1587968702-19996-1-git-send-email-amit.kachhap@arm.com> From: Amit Kachhap Message-ID: <36929ba3-3274-6046-9a47-ed403f00fefe@arm.com> Date: Thu, 30 Apr 2020 17:05:55 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <1587968702-19996-1-git-send-email-amit.kachhap@arm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Will/Catalin, On 4/27/20 11:55 AM, Amit Daniel Kachhap wrote: > Recently arm64 linux kernel added support for Armv8.3-A Pointer > Authentication feature. If this feature is enabled in the kernel and the > hardware supports address authentication then the return addresses are > signed and stored in the stack to prevent ROP kind of attack. Kdump tool > will now dump the kernel with signed lr values in the stack. > > Any user analysis tool for this kernel dump may need the kernel pac mask > information in vmcoreinfo to generate the correct return address for > stacktrace purpose as well as to resolve the symbol name. > > This patch is similar to commit ec6e822d1a22d0eef ("arm64: expose user PAC > bit positions via ptrace") which exposes pac mask information via ptrace > interfaces. > > Cc: Catalin Marinas > Cc: Will Deacon > Cc: Mark Rutland > Signed-off-by: Amit Daniel Kachhap This patch user side changes are accepted by crash-utility maintainer [1] so I think this is in a good shape to go in. Thanks, Amit Daniel [1]: https://www.redhat.com/archives/crash-utility/2020-April/msg00099.html > --- > Changes since v1: > * Rebased to kernel 5.7-rc3. > * commit log change. > > An implementation of this new KERNELPACMASK vmcoreinfo field used by crash > tool can be found here[1]. This change is accepted by crash utility > maintainer [2]. > > [1]: https://www.redhat.com/archives/crash-utility/2020-April/msg00095.html > [2]: https://www.redhat.com/archives/crash-utility/2020-April/msg00099.html > > arch/arm64/include/asm/compiler.h | 3 +++ > arch/arm64/kernel/crash_core.c | 4 ++++ > 2 files changed, 7 insertions(+) > > diff --git a/arch/arm64/include/asm/compiler.h b/arch/arm64/include/asm/compiler.h > index eece20d..32d5900 100644 > --- a/arch/arm64/include/asm/compiler.h > +++ b/arch/arm64/include/asm/compiler.h > @@ -19,6 +19,9 @@ > #define __builtin_return_address(val) \ > (void *)(ptrauth_clear_pac((unsigned long)__builtin_return_address(val))) > > +#else /* !CONFIG_ARM64_PTR_AUTH */ > +#define ptrauth_user_pac_mask() 0ULL > +#define ptrauth_kernel_pac_mask() 0ULL > #endif /* CONFIG_ARM64_PTR_AUTH */ > > #endif /* __ASM_COMPILER_H */ > diff --git a/arch/arm64/kernel/crash_core.c b/arch/arm64/kernel/crash_core.c > index ca4c3e1..25cf2ce 100644 > --- a/arch/arm64/kernel/crash_core.c > +++ b/arch/arm64/kernel/crash_core.c > @@ -6,6 +6,7 @@ > > #include > #include > +#include > > void arch_crash_save_vmcoreinfo(void) > { > @@ -16,4 +17,7 @@ void arch_crash_save_vmcoreinfo(void) > vmcoreinfo_append_str("NUMBER(PHYS_OFFSET)=0x%llx\n", > PHYS_OFFSET); > vmcoreinfo_append_str("KERNELOFFSET=%lx\n", kaslr_offset()); > + vmcoreinfo_append_str("NUMBER(KERNELPACMASK)=0x%llx\n", > + system_supports_address_auth() ? > + ptrauth_kernel_pac_mask() : 0); > } >