Message ID | 20240419102935.1935571-13-maz@kernel.org (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | KVM/arm64: Add NV support for ERET and PAuth | expand |
Hi Marc, On 19/04/2024 11:29, Marc Zyngier wrote: > FEAT_NV has the interesting property of relying on ERET being > trapped. An added complexity is that it also traps ERETAA and > ERETAB, meaning that the Pointer Authentication aspect of these > instruction must be emulated. > > Add an emulation of Pointer Authentication, limited to ERETAx > (always using SP_EL2 as the modifier and ELR_EL2 as the pointer), > using the Generic Authentication instructions. > > The emulation, however small, is placed in its own compilation > unit so that it can be avoided if the configuration doesn't > include it (or the toolchan in not up to the task). > > Reviewed-by: Joey Gouly <joey.gouly@arm.com> > Signed-off-by: Marc Zyngier <maz@kernel.org> > --- > arch/arm64/include/asm/kvm_nested.h | 12 ++ > arch/arm64/include/asm/pgtable-hwdef.h | 1 + > arch/arm64/kvm/Makefile | 1 + > arch/arm64/kvm/pauth.c | 196 +++++++++++++++++++++++++ > 4 files changed, 210 insertions(+) > create mode 100644 arch/arm64/kvm/pauth.c > > diff --git a/arch/arm64/include/asm/kvm_nested.h b/arch/arm64/include/asm/kvm_nested.h > index dbc4e3a67356..5e0ab0596246 100644 > --- a/arch/arm64/include/asm/kvm_nested.h > +++ b/arch/arm64/include/asm/kvm_nested.h > @@ -64,4 +64,16 @@ extern bool forward_smc_trap(struct kvm_vcpu *vcpu); > > int kvm_init_nv_sysregs(struct kvm *kvm); > > +#ifdef CONFIG_ARM64_PTR_AUTH > +bool kvm_auth_eretax(struct kvm_vcpu *vcpu, u64 *elr); > +#else > +static inline bool kvm_auth_eretax(struct kvm_vcpu *vcpu, u64 *elr) > +{ > + /* We really should never execute this... */ > + WARN_ON_ONCE(1); > + *elr = 0xbad9acc0debadbad; > + return false; > +} > +#endif > + > #endif /* __ARM64_KVM_NESTED_H */ > diff --git a/arch/arm64/include/asm/pgtable-hwdef.h b/arch/arm64/include/asm/pgtable-hwdef.h > index ef207a0d4f0d..9943ff0af4c9 100644 > --- a/arch/arm64/include/asm/pgtable-hwdef.h > +++ b/arch/arm64/include/asm/pgtable-hwdef.h > @@ -297,6 +297,7 @@ > #define TCR_TBI1 (UL(1) << 38) > #define TCR_HA (UL(1) << 39) > #define TCR_HD (UL(1) << 40) > +#define TCR_TBID0 (UL(1) << 51) > #define TCR_TBID1 (UL(1) << 52) > #define TCR_NFD0 (UL(1) << 53) > #define TCR_NFD1 (UL(1) << 54) > diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile > index c0c050e53157..04882b577575 100644 > --- a/arch/arm64/kvm/Makefile > +++ b/arch/arm64/kvm/Makefile > @@ -23,6 +23,7 @@ kvm-y += arm.o mmu.o mmio.o psci.o hypercalls.o pvtime.o \ > vgic/vgic-its.o vgic/vgic-debug.o > > kvm-$(CONFIG_HW_PERF_EVENTS) += pmu-emul.o pmu.o > +kvm-$(CONFIG_ARM64_PTR_AUTH) += pauth.o > > always-y := hyp_constants.h hyp-constants.s > > diff --git a/arch/arm64/kvm/pauth.c b/arch/arm64/kvm/pauth.c > new file mode 100644 > index 000000000000..a3a5c404375b > --- /dev/null > +++ b/arch/arm64/kvm/pauth.c > @@ -0,0 +1,196 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * Copyright (C) 2024 - Google LLC > + * Author: Marc Zyngier <maz@kernel.org> > + * > + * Primitive PAuth emulation for ERETAA/ERETAB. > + * > + * This code assumes that is is run from EL2, and that it is part of > + * the emulation of ERETAx for a guest hypervisor. That's a lot of > + * baked-in assumptions and shortcuts. > + * > + * Do no reuse for anything else! > + */ > + > +#include <linux/kvm_host.h> > + > +#include <asm/kvm_emulate.h> > +#include <asm/pointer_auth.h> > + > +static u64 compute_pac(struct kvm_vcpu *vcpu, u64 ptr, > + struct ptrauth_key ikey) > +{ > + struct ptrauth_key gkey; > + u64 mod, pac = 0; > + > + preempt_disable(); > + > + if (!vcpu_get_flag(vcpu, SYSREGS_ON_CPU)) > + mod = __vcpu_sys_reg(vcpu, SP_EL2); > + else > + mod = read_sysreg(sp_el1); > + > + gkey.lo = read_sysreg_s(SYS_APGAKEYLO_EL1); > + gkey.hi = read_sysreg_s(SYS_APGAKEYHI_EL1); > + > + __ptrauth_key_install_nosync(APGA, ikey); > + isb(); > + > + asm volatile(ARM64_ASM_PREAMBLE ".arch_extension pauth\n" > + "pacga %0, %1, %2" : "=r" (pac) : "r" (ptr), "r" (mod)); > + isb(); Some of our builders currently have an older version of GCC (v6) and after this change I am seeing ... CC arch/arm64/kvm/pauth.o /tmp/ccohst0v.s: Assembler messages: /tmp/ccohst0v.s:1177: Error: unknown architectural extension `pauth' /tmp/ccohst0v.s:1177: Error: unknown mnemonic `pacga' -- `pacga x21,x22,x0' /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:244: recipe for target 'arch/arm64/kvm/pauth.o' failed make[5]: *** [arch/arm64/kvm/pauth.o] Error 1 /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:485: recipe for target 'arch/arm64/kvm' failed make[4]: *** [arch/arm64/kvm] Error 2 /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:485: recipe for target 'arch/arm64' failed make[3]: *** [arch/arm64] Error 2 I know this is pretty old now and I am trying to get these builders updated. However, the kernel docs still show that GCC v5.1 is supported [0]. Jon [0] https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/tree/Documentation/process/changes.rst
On 2024/4/23 17:22, Jon Hunter wrote: > > Some of our builders currently have an older version of GCC (v6) and > after this change I am seeing ... > > CC arch/arm64/kvm/pauth.o > /tmp/ccohst0v.s: Assembler messages: > /tmp/ccohst0v.s:1177: Error: unknown architectural extension `pauth' > /tmp/ccohst0v.s:1177: Error: unknown mnemonic `pacga' -- `pacga x21,x22,x0' > /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:244: > recipe for target 'arch/arm64/kvm/pauth.o' failed > make[5]: *** [arch/arm64/kvm/pauth.o] Error 1 > /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:485: > recipe for target 'arch/arm64/kvm' failed > make[4]: *** [arch/arm64/kvm] Error 2 > /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:485: > recipe for target 'arch/arm64' failed > make[3]: *** [arch/arm64] Error 2 > > > I know this is pretty old now and I am trying to get these builders > updated. However, the kernel docs still show that GCC v5.1 is > supported [0]. Was just looking at the discussion [1] ;-) . FYI there is already a patch on the list [2] which should be merged soon. [1] https://lore.kernel.org/r/CA+G9fYsCL5j-9JzqNH5X03kikL=O+BaCQQ8Ao3ADQvxDuZvqcg@mail.gmail.com [2] https://lore.kernel.org/r/20240422224849.2238222-1-maz@kernel.org Zenghui
On Tue, 23 Apr 2024 10:40:22 +0100, Zenghui Yu <yuzenghui@huawei.com> wrote: > > On 2024/4/23 17:22, Jon Hunter wrote: > > > > Some of our builders currently have an older version of GCC (v6) and > > after this change I am seeing ... > > > > CC arch/arm64/kvm/pauth.o > > /tmp/ccohst0v.s: Assembler messages: > > /tmp/ccohst0v.s:1177: Error: unknown architectural extension `pauth' > > /tmp/ccohst0v.s:1177: Error: unknown mnemonic `pacga' -- `pacga x21,x22,x0' > > /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:244: > > recipe for target 'arch/arm64/kvm/pauth.o' failed > > make[5]: *** [arch/arm64/kvm/pauth.o] Error 1 > > /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:485: > > recipe for target 'arch/arm64/kvm' failed > > make[4]: *** [arch/arm64/kvm] Error 2 > > /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:485: > > recipe for target 'arch/arm64' failed > > make[3]: *** [arch/arm64] Error 2 > > > > > > I know this is pretty old now and I am trying to get these builders > > updated. However, the kernel docs still show that GCC v5.1 is > > supported [0]. > > Was just looking at the discussion [1] ;-) . FYI there is already a > patch on the list [2] which should be merged soon. Indeed. -next as of today already has the fix, although I'm reworking it to take Mark's remarks into account. Jon, can you confirm that next-20240423 builds with your setup? Thanks, M.
On 23/04/2024 10:40, Zenghui Yu wrote: > On 2024/4/23 17:22, Jon Hunter wrote: >> >> Some of our builders currently have an older version of GCC (v6) and >> after this change I am seeing ... >> >> CC arch/arm64/kvm/pauth.o >> /tmp/ccohst0v.s: Assembler messages: >> /tmp/ccohst0v.s:1177: Error: unknown architectural extension `pauth' >> /tmp/ccohst0v.s:1177: Error: unknown mnemonic `pacga' -- `pacga >> x21,x22,x0' >> /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:244: >> recipe for target 'arch/arm64/kvm/pauth.o' failed >> make[5]: *** [arch/arm64/kvm/pauth.o] Error 1 >> /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:485: >> recipe for target 'arch/arm64/kvm' failed >> make[4]: *** [arch/arm64/kvm] Error 2 >> /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:485: >> recipe for target 'arch/arm64' failed >> make[3]: *** [arch/arm64] Error 2 >> >> >> I know this is pretty old now and I am trying to get these builders >> updated. However, the kernel docs still show that GCC v5.1 is >> supported [0]. > > Was just looking at the discussion [1] ;-) . FYI there is already a > patch on the list [2] which should be merged soon. > > [1] > https://lore.kernel.org/r/CA+G9fYsCL5j-9JzqNH5X03kikL=O+BaCQQ8Ao3ADQvxDuZvqcg@mail.gmail.com > [2] https://lore.kernel.org/r/20240422224849.2238222-1-maz@kernel.org Thanks for sharing! That does work for me. Cheers Jon
On 23/04/2024 12:42, Marc Zyngier wrote: > On Tue, 23 Apr 2024 10:40:22 +0100, > Zenghui Yu <yuzenghui@huawei.com> wrote: >> >> On 2024/4/23 17:22, Jon Hunter wrote: >>> >>> Some of our builders currently have an older version of GCC (v6) and >>> after this change I am seeing ... >>> >>> CC arch/arm64/kvm/pauth.o >>> /tmp/ccohst0v.s: Assembler messages: >>> /tmp/ccohst0v.s:1177: Error: unknown architectural extension `pauth' >>> /tmp/ccohst0v.s:1177: Error: unknown mnemonic `pacga' -- `pacga x21,x22,x0' >>> /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:244: >>> recipe for target 'arch/arm64/kvm/pauth.o' failed >>> make[5]: *** [arch/arm64/kvm/pauth.o] Error 1 >>> /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:485: >>> recipe for target 'arch/arm64/kvm' failed >>> make[4]: *** [arch/arm64/kvm] Error 2 >>> /local/workdir/tegra/mlt-linux_next/kernel/scripts/Makefile.build:485: >>> recipe for target 'arch/arm64' failed >>> make[3]: *** [arch/arm64] Error 2 >>> >>> >>> I know this is pretty old now and I am trying to get these builders >>> updated. However, the kernel docs still show that GCC v5.1 is >>> supported [0]. >> >> Was just looking at the discussion [1] ;-) . FYI there is already a >> patch on the list [2] which should be merged soon. > > Indeed. -next as of today already has the fix, although I'm reworking > it to take Mark's remarks into account. > > Jon, can you confirm that next-20240423 builds with your setup? Yes that is building fine today too. Thanks! Feel free to add my ... Tested-by: Jon Hunter <jonathanh@nvidia.com> Jon
diff --git a/arch/arm64/include/asm/kvm_nested.h b/arch/arm64/include/asm/kvm_nested.h index dbc4e3a67356..5e0ab0596246 100644 --- a/arch/arm64/include/asm/kvm_nested.h +++ b/arch/arm64/include/asm/kvm_nested.h @@ -64,4 +64,16 @@ extern bool forward_smc_trap(struct kvm_vcpu *vcpu); int kvm_init_nv_sysregs(struct kvm *kvm); +#ifdef CONFIG_ARM64_PTR_AUTH +bool kvm_auth_eretax(struct kvm_vcpu *vcpu, u64 *elr); +#else +static inline bool kvm_auth_eretax(struct kvm_vcpu *vcpu, u64 *elr) +{ + /* We really should never execute this... */ + WARN_ON_ONCE(1); + *elr = 0xbad9acc0debadbad; + return false; +} +#endif + #endif /* __ARM64_KVM_NESTED_H */ diff --git a/arch/arm64/include/asm/pgtable-hwdef.h b/arch/arm64/include/asm/pgtable-hwdef.h index ef207a0d4f0d..9943ff0af4c9 100644 --- a/arch/arm64/include/asm/pgtable-hwdef.h +++ b/arch/arm64/include/asm/pgtable-hwdef.h @@ -297,6 +297,7 @@ #define TCR_TBI1 (UL(1) << 38) #define TCR_HA (UL(1) << 39) #define TCR_HD (UL(1) << 40) +#define TCR_TBID0 (UL(1) << 51) #define TCR_TBID1 (UL(1) << 52) #define TCR_NFD0 (UL(1) << 53) #define TCR_NFD1 (UL(1) << 54) diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile index c0c050e53157..04882b577575 100644 --- a/arch/arm64/kvm/Makefile +++ b/arch/arm64/kvm/Makefile @@ -23,6 +23,7 @@ kvm-y += arm.o mmu.o mmio.o psci.o hypercalls.o pvtime.o \ vgic/vgic-its.o vgic/vgic-debug.o kvm-$(CONFIG_HW_PERF_EVENTS) += pmu-emul.o pmu.o +kvm-$(CONFIG_ARM64_PTR_AUTH) += pauth.o always-y := hyp_constants.h hyp-constants.s diff --git a/arch/arm64/kvm/pauth.c b/arch/arm64/kvm/pauth.c new file mode 100644 index 000000000000..a3a5c404375b --- /dev/null +++ b/arch/arm64/kvm/pauth.c @@ -0,0 +1,196 @@ +// SPDX-License-Identifier: GPL-2.0-only +/* + * Copyright (C) 2024 - Google LLC + * Author: Marc Zyngier <maz@kernel.org> + * + * Primitive PAuth emulation for ERETAA/ERETAB. + * + * This code assumes that is is run from EL2, and that it is part of + * the emulation of ERETAx for a guest hypervisor. That's a lot of + * baked-in assumptions and shortcuts. + * + * Do no reuse for anything else! + */ + +#include <linux/kvm_host.h> + +#include <asm/kvm_emulate.h> +#include <asm/pointer_auth.h> + +static u64 compute_pac(struct kvm_vcpu *vcpu, u64 ptr, + struct ptrauth_key ikey) +{ + struct ptrauth_key gkey; + u64 mod, pac = 0; + + preempt_disable(); + + if (!vcpu_get_flag(vcpu, SYSREGS_ON_CPU)) + mod = __vcpu_sys_reg(vcpu, SP_EL2); + else + mod = read_sysreg(sp_el1); + + gkey.lo = read_sysreg_s(SYS_APGAKEYLO_EL1); + gkey.hi = read_sysreg_s(SYS_APGAKEYHI_EL1); + + __ptrauth_key_install_nosync(APGA, ikey); + isb(); + + asm volatile(ARM64_ASM_PREAMBLE ".arch_extension pauth\n" + "pacga %0, %1, %2" : "=r" (pac) : "r" (ptr), "r" (mod)); + isb(); + + __ptrauth_key_install_nosync(APGA, gkey); + + preempt_enable(); + + /* PAC in the top 32bits */ + return pac; +} + +static bool effective_tbi(struct kvm_vcpu *vcpu, bool bit55) +{ + u64 tcr = vcpu_read_sys_reg(vcpu, TCR_EL2); + bool tbi, tbid; + + /* + * Since we are authenticating an instruction address, we have + * to take TBID into account. If E2H==0, ignore VA[55], as + * TCR_EL2 only has a single TBI/TBID. If VA[55] was set in + * this case, this is likely a guest bug... + */ + if (!vcpu_el2_e2h_is_set(vcpu)) { + tbi = tcr & BIT(20); + tbid = tcr & BIT(29); + } else if (bit55) { + tbi = tcr & TCR_TBI1; + tbid = tcr & TCR_TBID1; + } else { + tbi = tcr & TCR_TBI0; + tbid = tcr & TCR_TBID0; + } + + return tbi && !tbid; +} + +static int compute_bottom_pac(struct kvm_vcpu *vcpu, bool bit55) +{ + static const int maxtxsz = 39; // Revisit these two values once + static const int mintxsz = 16; // (if) we support TTST/LVA/LVA2 + u64 tcr = vcpu_read_sys_reg(vcpu, TCR_EL2); + int txsz; + + if (!vcpu_el2_e2h_is_set(vcpu) || !bit55) + txsz = FIELD_GET(TCR_T0SZ_MASK, tcr); + else + txsz = FIELD_GET(TCR_T1SZ_MASK, tcr); + + return 64 - clamp(txsz, mintxsz, maxtxsz); +} + +static u64 compute_pac_mask(struct kvm_vcpu *vcpu, bool bit55) +{ + int bottom_pac; + u64 mask; + + bottom_pac = compute_bottom_pac(vcpu, bit55); + + mask = GENMASK(54, bottom_pac); + if (!effective_tbi(vcpu, bit55)) + mask |= GENMASK(63, 56); + + return mask; +} + +static u64 to_canonical_addr(struct kvm_vcpu *vcpu, u64 ptr, u64 mask) +{ + bool bit55 = !!(ptr & BIT(55)); + + if (bit55) + return ptr | mask; + + return ptr & ~mask; +} + +static u64 corrupt_addr(struct kvm_vcpu *vcpu, u64 ptr) +{ + bool bit55 = !!(ptr & BIT(55)); + u64 mask, error_code; + int shift; + + if (effective_tbi(vcpu, bit55)) { + mask = GENMASK(54, 53); + shift = 53; + } else { + mask = GENMASK(62, 61); + shift = 61; + } + + if (esr_iss_is_eretab(kvm_vcpu_get_esr(vcpu))) + error_code = 2 << shift; + else + error_code = 1 << shift; + + ptr &= ~mask; + ptr |= error_code; + + return ptr; +} + +/* + * Authenticate an ERETAA/ERETAB instruction, returning true if the + * authentication succeeded and false otherwise. In all cases, *elr + * contains the VA to ERET to. Potential exception injection is left + * to the caller. + */ +bool kvm_auth_eretax(struct kvm_vcpu *vcpu, u64 *elr) +{ + u64 sctlr = vcpu_read_sys_reg(vcpu, SCTLR_EL2); + u64 esr = kvm_vcpu_get_esr(vcpu); + u64 ptr, cptr, pac, mask; + struct ptrauth_key ikey; + + *elr = ptr = vcpu_read_sys_reg(vcpu, ELR_EL2); + + /* We assume we're already in the context of an ERETAx */ + if (esr_iss_is_eretab(esr)) { + if (!(sctlr & SCTLR_EL1_EnIB)) + return true; + + ikey.lo = __vcpu_sys_reg(vcpu, APIBKEYLO_EL1); + ikey.hi = __vcpu_sys_reg(vcpu, APIBKEYHI_EL1); + } else { + if (!(sctlr & SCTLR_EL1_EnIA)) + return true; + + ikey.lo = __vcpu_sys_reg(vcpu, APIAKEYLO_EL1); + ikey.hi = __vcpu_sys_reg(vcpu, APIAKEYHI_EL1); + } + + mask = compute_pac_mask(vcpu, !!(ptr & BIT(55))); + cptr = to_canonical_addr(vcpu, ptr, mask); + + pac = compute_pac(vcpu, cptr, ikey); + + /* + * Slightly deviate from the pseudocode: if we have a PAC + * match with the signed pointer, then it must be good. + * Anything after this point is pure error handling. + */ + if ((pac & mask) == (ptr & mask)) { + *elr = cptr; + return true; + } + + /* + * Authentication failed, corrupt the canonical address if + * PAuth2 isn't implemented, or some XORing if it is. + */ + if (!kvm_has_pauth(vcpu->kvm, PAuth2)) + cptr = corrupt_addr(vcpu, cptr); + else + cptr = ptr ^ (pac & mask); + + *elr = cptr; + return false; +}