From patchwork Fri Jan 15 15:28:08 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steven Price X-Patchwork-Id: 12023099 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B5882C433DB for ; Fri, 15 Jan 2021 15:29:54 +0000 (UTC) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 357A123136 for ; Fri, 15 Jan 2021 15:29:54 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 357A123136 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Received: from localhost ([::1]:44904 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1l0R2u-0003ct-Uu for qemu-devel@archiver.kernel.org; Fri, 15 Jan 2021 10:29:52 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:41640) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1l0R1X-0001yS-Nq for qemu-devel@nongnu.org; Fri, 15 Jan 2021 10:28:31 -0500 Received: from foss.arm.com ([217.140.110.172]:35474) by eggs.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1l0R1U-0008K4-2B for qemu-devel@nongnu.org; Fri, 15 Jan 2021 10:28:26 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id E3CA9D6E; Fri, 15 Jan 2021 07:28:20 -0800 (PST) Received: from e112269-lin.arm.com (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id CD3513F70D; Fri, 15 Jan 2021 07:28:17 -0800 (PST) From: Steven Price To: Catalin Marinas , Marc Zyngier , Will Deacon Subject: [PATCH v7 0/3] MTE support for KVM guest Date: Fri, 15 Jan 2021 15:28:08 +0000 Message-Id: <20210115152811.8398-1-steven.price@arm.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Received-SPF: pass client-ip=217.140.110.172; envelope-from=steven.price@arm.com; helo=foss.arm.com X-Spam_score_int: -41 X-Spam_score: -4.2 X-Spam_bar: ---- X-Spam_report: (-4.2 / 5.0 requ) BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Mark Rutland , Peter Maydell , "Dr. David Alan Gilbert" , Andrew Jones , Haibo Xu , Suzuki K Poulose , qemu-devel@nongnu.org, Dave Martin , Juan Quintela , Richard Henderson , linux-kernel@vger.kernel.org, Steven Price , James Morse , Julien Thierry , Thomas Gleixner , kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: "Qemu-devel" After chasing down a bug[1] with MTE assisted KASAN and KVM, I've now been able to rebase on v5.11-rc1 and test the combination of KVM-with-MTE and KASAN. For anyone new to this series, or simply pretending 2020 didn't happen, this series adds support for Arm's Memory Tagging Extension (MTE) to KVM, allowing KVM guests to make use of it. The first patch adds definitions for the new registers and saves/restores them as necessary. The second adds a new VM feature which allows the guest access to MTE. The third patch is new and RFC for now. It adds a new ioctl allowing a VMM to easily read/write the tags in the guest's memory even if the memory isn't mapped with PROT_MTE in userspace. I'd particularly welcome feedback on this new ABI. Changes since v6[2]: * Moved the save/restore of RGSR_EL1, GCR_EL1 and TFSRE0_EL into asm * Correctly set TCO when injecting an exception to an MTE-enabled guest * Rebased on v5.11-rc1 * RFC patch for new MTE tag copy ioctl [1] https://lore.kernel.org/r/20210108161254.53674-1-steven.price@arm.com [2] https://lore.kernel.org/r/20201127152113.13099-1-steven.price@arm.com Steven Price (3): arm64: kvm: Save/restore MTE registers arm64: kvm: Introduce MTE VCPU feature KVM: arm64: ioctl to fetch/store tags in a guest arch/arm64/include/asm/kvm_emulate.h | 3 + arch/arm64/include/asm/kvm_host.h | 7 ++ arch/arm64/include/asm/kvm_mte.h | 74 ++++++++++++++++++++++ arch/arm64/include/asm/pgtable.h | 2 +- arch/arm64/include/asm/sysreg.h | 3 +- arch/arm64/include/uapi/asm/kvm.h | 13 ++++ arch/arm64/kernel/asm-offsets.c | 3 + arch/arm64/kernel/mte.c | 36 +++++++---- arch/arm64/kvm/arm.c | 68 ++++++++++++++++++++ arch/arm64/kvm/hyp/entry.S | 7 ++ arch/arm64/kvm/hyp/exception.c | 3 +- arch/arm64/kvm/hyp/include/hyp/sysreg-sr.h | 4 ++ arch/arm64/kvm/mmu.c | 16 +++++ arch/arm64/kvm/sys_regs.c | 20 ++++-- include/uapi/linux/kvm.h | 2 + 15 files changed, 239 insertions(+), 22 deletions(-) create mode 100644 arch/arm64/include/asm/kvm_mte.h