Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1319944pxk; Fri, 18 Sep 2020 09:18:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxIB+Cak9zk/dTwaG16o2nwKY1IQXaBuLD/vyCGSoCa2p71SVBZqC6X7h6z/MmeIhIRXeDz X-Received: by 2002:a05:6402:b68:: with SMTP id cb8mr39962719edb.350.1600445917457; Fri, 18 Sep 2020 09:18:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600445917; cv=none; d=google.com; s=arc-20160816; b=irAAs/i580Ol1nrMfXJhxpeEtitI5Lu6710CkMkvMOfkU5UKuvcwp0eYG6CL0aOjrL bQeHIfO/ulwJF/RVyxy9G3u7vNDp1K1bpZxpWDB/ugYUKumL2mwduo1ePaFWu2C43N9Y XNmX6LLYbG6oLieL3e0yH+xHGuI0Be0EQUihEPoE+v8Z1UfIMYuUJ4/q+FgOt3PsoUCy ztBxpmiMrmpPu8WBfoP3ON5Rz+VTxFxrkAVJ2/RtM7HZizmGUv7NX2Y7umz5z+wViMPa Cg/TCg2k9J/fc+Nye9EMt7RZBP4sF+xMfU1tFOTZcugq8LD+OpQz0Npz+6FEiJPXpZYm xGCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=IpuJ13gC5/ofmlBrhAmJmBOb9giMEiGbnUKrnYX3Kr8=; b=eJ5BRmY9VvLP/DOyQCwSfdOeIrC6RlO0n1W55GL4QuY4nsf+gN4dUoScK+flTC+j8m H/CsD1kW2+h0Y07R9JW027HR3LiOxTeqSQeR04j4qN4b5WsgmQJHGjVvEs8CgzOyIx2V dORQbUXps1UMVOZx2FV/gGJ/FXAnHXEA6x7U8GcZfS0u6hal9Bht3Uy1KaFMPuaPlVbn fDfNpbGLF82BS/pCqQrR9/7ASjxDjHAGFK+AJsuuJVuSohqjmgknDaTRJWjS/15xKOqh f8RFMxPa2or43U8NKAIAKqYX2eBXYyPOO6rf69zLCx6l4AI5S6Lqe0FVzunZ+3304bQr /SPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZUjmUb3I; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id nu23si2509462ejb.577.2020.09.18.09.18.14; Fri, 18 Sep 2020 09:18:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZUjmUb3I; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726335AbgIRQRZ (ORCPT + 99 others); Fri, 18 Sep 2020 12:17:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:59226 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726200AbgIRQRZ (ORCPT ); Fri, 18 Sep 2020 12:17:25 -0400 Received: from localhost.localdomain (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 54B1F20795; Fri, 18 Sep 2020 16:17:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1600445844; bh=5iF9yKzD7Xb2xJQE4OZeKA+iY8mdao501/QH7NziaMg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZUjmUb3IZ3odj6AJqkIopl3zQHZMcKpviI2Gtcp1f2UHFIMMJLz7INeEAN9izA2j4 NL68EYbcZNPzOIlAxrWKCvMNa6a6zPSKoNMSkpv2dVgJm+pY7N1zIBA1vBodIDp/vT ugeg5jUJ6+R9vNRLRcK6+LY8ZJcugCdaKHeHu9TI= From: Will Deacon To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, Boyan Karatotev Cc: catalin.marinas@arm.com, kernel-team@android.com, Will Deacon , Vincenzo Frascino , Shuah Khan , Shuah Khan , Amit Daniel Kachhap , Boyan Karatotev Subject: Re: [PATCH v3 0/4] kselftests/arm64: add PAuth tests Date: Fri, 18 Sep 2020 17:17:12 +0100 Message-Id: <160043444117.3782204.2915694292164930857.b4-ty@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200918104715.182310-1-boian4o1@gmail.com> References: <20200918104715.182310-1-boian4o1@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 18 Sep 2020 11:47:11 +0100, Boyan Karatotev wrote: > Pointer Authentication (PAuth) is a security feature introduced in ARMv8.3. > It introduces instructions to sign addresses and later check for potential > corruption using a second modifier value and one of a set of keys. The > signature, in the form of the Pointer Authentication Code (PAC), is stored > in some of the top unused bits of the virtual address (e.g. [54: 49] if > TBID0 is enabled and TnSZ is set to use a 48 bit VA space). A set of > controls are present to enable/disable groups of instructions (which use > certain keys) for compatibility with libraries that do not utilize the > feature. PAuth is used to verify the integrity of return addresses on the > stack with less memory than the stack canary. > > [...] Applied to arm64 (for-next/selftests), thanks! [1/4] kselftests/arm64: add a basic Pointer Authentication test https://git.kernel.org/arm64/c/e74e1d557285 [2/4] kselftests/arm64: add nop checks for PAuth tests https://git.kernel.org/arm64/c/766d95b1ed93 [3/4] kselftests/arm64: add PAuth test for whether exec() changes keys https://git.kernel.org/arm64/c/806a15b2545e [4/4] kselftests/arm64: add PAuth tests for single threaded consistency and differently initialized keys https://git.kernel.org/arm64/c/d21435e9670b Cheers, -- Will https://fixes.arm64.dev https://next.arm64.dev https://will.arm64.dev