Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp2827666pxt; Mon, 9 Aug 2021 09:48:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx+OcEDjLaATzVjOJbEZQoZftG59+7wqTqimD+aBXmXckdESbjGOcTGguOTAoBs2zf01vuK X-Received: by 2002:a6b:ea0b:: with SMTP id m11mr103645ioc.186.1628527695427; Mon, 09 Aug 2021 09:48:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628527695; cv=none; d=google.com; s=arc-20160816; b=BjfFLiXF/CmF9lKew5WYTh1DE0Vgh2Y/EocsWTl69b0I3BxnqurexevIJ1H85lny3M eImTYEC7OTZTHDRq/Mp9GJvMvogaGkHwuCxnZ4bTEp8dmc+Y4Pgi8BU0N4zq8mivZkMS N4g5bB1nODmV9EakPgFMJj7Jfgyd78EthNXoRENhz9vRbW1UH7BqpzJdKs9s9N2lX1Fc AOTTbQ5uQ2XutEJx19gVDH4I4+WEFxPsIbZz/3KEpMc1gP6s/LTvH/NLulF9SwcCn/fY sdn27STzTG9e0ak/dXQQWKgn55WTZXzOw8k2cqU8615DesetF+8jukTc0yogzqntlrhj kJsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=XUOqf8vqF/dog7RebfDNzatspRq8VZL8GzGgGP6c24Q=; b=gzGresyJwiWshARDjWwzeCg1aLVAatid0Xx+dl8NEZ/zTffc1zXBUwlkva9CnmAGwI K9GkknKHr/EgiNTUZpQhvul1nrG9PyviWFtGQFqEi5V3gRiALXgTno7fRmW9mohDsnMb SXfD9ShLJslEgdUhnupM2KP0HQXRbWZCeE2eC3z4vzCQp8SE6d9d62Ty+8ly6fhnaCNO YJMFI2nxAaiAAMQUeZ0jtVuFkJc/oJth6BB1H5zpRxIFpxwOGHWDafMaSTZnQ9stqhN9 atrzycW0Bpm3ISpGHrbQNGEBTszLuOkE9GPx9w/+/MdkkAqnVYp8mQDo/c7ahE3hOEkP ntcw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=YFl6VNfr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ay1si8525200jab.68.2021.08.09.09.47.53; Mon, 09 Aug 2021 09:48:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=YFl6VNfr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233403AbhHIQqa (ORCPT + 99 others); Mon, 9 Aug 2021 12:46:30 -0400 Received: from mail.skyhub.de ([5.9.137.197]:55004 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232861AbhHIQq2 (ORCPT ); Mon, 9 Aug 2021 12:46:28 -0400 Received: from zn.tnic (p200300ec2f26f300329c23fffea6a903.dip0.t-ipconnect.de [IPv6:2003:ec:2f26:f300:329c:23ff:fea6:a903]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 83DB51EC0464; Mon, 9 Aug 2021 18:46:01 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1628527561; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=XUOqf8vqF/dog7RebfDNzatspRq8VZL8GzGgGP6c24Q=; b=YFl6VNfrMwgbU+encJCbFTp5uVXnTZhWTKeoZRrz8sHdCYD50Km7numnyXlX6tcSSf2Lmc XE+GvgRwFHo3EHlF0dj7g/Prgxv5ehPMlHHNwrjWNlBlqB/+dR7XzK3Bdm9C2YzzKmfS2u Kw5HjQAZ9hceYx5fy61aD1cYtAdjKRg= Date: Mon, 9 Aug 2021 18:46:45 +0200 From: Borislav Petkov To: Yu-cheng Yu Cc: x86@kernel.org, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, Arnd Bergmann , Andy Lutomirski , Balbir Singh , Cyrill Gorcunov , Dave Hansen , Eugene Syromiatnikov , Florian Weimer , "H.J. Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , Randy Dunlap , "Ravi V. Shankar" , Vedvyas Shanbhogue , Dave Martin , Weijiang Yang , Pengfei Xu , Haitao Huang , Rick P Edgecombe Subject: Re: [PATCH v28 05/32] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states Message-ID: References: <20210722205219.7934-1-yu-cheng.yu@intel.com> <20210722205219.7934-6-yu-cheng.yu@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20210722205219.7934-6-yu-cheng.yu@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jul 22, 2021 at 01:51:52PM -0700, Yu-cheng Yu wrote: > diff --git a/arch/x86/include/asm/msr-index.h b/arch/x86/include/asm/msr-index.h > index a7c413432b33..b529f42ddaae 100644 > --- a/arch/x86/include/asm/msr-index.h > +++ b/arch/x86/include/asm/msr-index.h > @@ -939,4 +939,23 @@ > #define MSR_VM_IGNNE 0xc0010115 > #define MSR_VM_HSAVE_PA 0xc0010117 > > +/* Control-flow Enforcement Technology MSRs */ > +#define MSR_IA32_U_CET 0x000006a0 /* user mode cet setting */ > +#define MSR_IA32_S_CET 0x000006a2 /* kernel mode cet setting */ > +#define CET_SHSTK_EN BIT_ULL(0) > +#define CET_WRSS_EN BIT_ULL(1) > +#define CET_ENDBR_EN BIT_ULL(2) > +#define CET_LEG_IW_EN BIT_ULL(3) > +#define CET_NO_TRACK_EN BIT_ULL(4) > +#define CET_SUPPRESS_DISABLE BIT_ULL(5) > +#define CET_RESERVED (BIT_ULL(6) | BIT_ULL(7) | BIT_ULL(8) | BIT_ULL(9)) > +#define CET_SUPPRESS BIT_ULL(10) > +#define CET_WAIT_ENDBR BIT_ULL(11) > + > +#define MSR_IA32_PL0_SSP 0x000006a4 /* kernel shadow stack pointer */ > +#define MSR_IA32_PL1_SSP 0x000006a5 /* ring-1 shadow stack pointer */ > +#define MSR_IA32_PL2_SSP 0x000006a6 /* ring-2 shadow stack pointer */ > +#define MSR_IA32_PL3_SSP 0x000006a7 /* user shadow stack pointer */ > +#define MSR_IA32_INT_SSP_TAB 0x000006a8 /* exception shadow stack table */ > + > #endif /* _ASM_X86_MSR_INDEX_H */ Merge the following hunk ontop of yours pls: diff --git a/arch/x86/include/asm/msr-index.h b/arch/x86/include/asm/msr-index.h index b529f42ddaae..14ce136bcfa8 100644 --- a/arch/x86/include/asm/msr-index.h +++ b/arch/x86/include/asm/msr-index.h @@ -362,6 +362,26 @@ #define MSR_CORE_PERF_LIMIT_REASONS 0x00000690 + +/* Control-flow Enforcement Technology MSRs */ +#define MSR_IA32_U_CET 0x000006a0 /* user mode cet setting */ +#define MSR_IA32_S_CET 0x000006a2 /* kernel mode cet setting */ +#define CET_SHSTK_EN BIT_ULL(0) +#define CET_WRSS_EN BIT_ULL(1) +#define CET_ENDBR_EN BIT_ULL(2) +#define CET_LEG_IW_EN BIT_ULL(3) +#define CET_NO_TRACK_EN BIT_ULL(4) +#define CET_SUPPRESS_DISABLE BIT_ULL(5) +#define CET_RESERVED (BIT_ULL(6) | BIT_ULL(7) | BIT_ULL(8) | BIT_ULL(9)) +#define CET_SUPPRESS BIT_ULL(10) +#define CET_WAIT_ENDBR BIT_ULL(11) + +#define MSR_IA32_PL0_SSP 0x000006a4 /* kernel shadow stack pointer */ +#define MSR_IA32_PL1_SSP 0x000006a5 /* ring-1 shadow stack pointer */ +#define MSR_IA32_PL2_SSP 0x000006a6 /* ring-2 shadow stack pointer */ +#define MSR_IA32_PL3_SSP 0x000006a7 /* user shadow stack pointer */ +#define MSR_IA32_INT_SSP_TAB 0x000006a8 /* exception shadow stack table */ + #define MSR_GFX_PERF_LIMIT_REASONS 0x000006B0 #define MSR_RING_PERF_LIMIT_REASONS 0x000006B1 @@ -939,23 +959,4 @@ #define MSR_VM_IGNNE 0xc0010115 #define MSR_VM_HSAVE_PA 0xc0010117 -/* Control-flow Enforcement Technology MSRs */ -#define MSR_IA32_U_CET 0x000006a0 /* user mode cet setting */ -#define MSR_IA32_S_CET 0x000006a2 /* kernel mode cet setting */ -#define CET_SHSTK_EN BIT_ULL(0) -#define CET_WRSS_EN BIT_ULL(1) -#define CET_ENDBR_EN BIT_ULL(2) -#define CET_LEG_IW_EN BIT_ULL(3) -#define CET_NO_TRACK_EN BIT_ULL(4) -#define CET_SUPPRESS_DISABLE BIT_ULL(5) -#define CET_RESERVED (BIT_ULL(6) | BIT_ULL(7) | BIT_ULL(8) | BIT_ULL(9)) -#define CET_SUPPRESS BIT_ULL(10) -#define CET_WAIT_ENDBR BIT_ULL(11) - -#define MSR_IA32_PL0_SSP 0x000006a4 /* kernel shadow stack pointer */ -#define MSR_IA32_PL1_SSP 0x000006a5 /* ring-1 shadow stack pointer */ -#define MSR_IA32_PL2_SSP 0x000006a6 /* ring-2 shadow stack pointer */ -#define MSR_IA32_PL3_SSP 0x000006a7 /* user shadow stack pointer */ -#define MSR_IA32_INT_SSP_TAB 0x000006a8 /* exception shadow stack table */ - #endif /* _ASM_X86_MSR_INDEX_H */ -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette