From: Mark Rutland <mark.rutland@arm.com> To: Dave Martin <Dave.Martin@arm.com> Cc: linux-arm-kernel@lists.infradead.org, linux-arch@vger.kernel.org, arnd@arndb.de, jiong.wang@arm.com, marc.zyngier@arm.com, catalin.marinas@arm.com, suzuki.poulose@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, kvmarm@lists.cs.columbia.edu, christoffer.dall@linaro.org Subject: Re: [RFC 7/9] arm64: expose PAC bit positions via ptrace Date: Tue, 25 Jul 2017 15:59:04 +0100 [thread overview] Message-ID: <20170725145903.GA20857@leverpostej> (raw) In-Reply-To: <20170725121145.GB6321@e103592.cambridge.arm.com> On Tue, Jul 25, 2017 at 01:11:48PM +0100, Dave Martin wrote: > On Mon, Apr 03, 2017 at 04:19:23PM +0100, Mark Rutland wrote: > > +/* > > + * The pointer bits used by a pointer authentication code. > > + * If we were to use tagged pointers, bits 63:56 would also apply. > > + */ > > +#define ptrauth_pac_mask() GENMASK(54, VA_BITS) > > Tagged pointers _are_ enabled for userspace by default, no? Yes; I'd meant s/tagged/untagged/. I've corrected this to: /* * The EL0 pointer bits used by a pointer authentication code. * This is dependent on TBI0 being enabled, or bits 63:56 would also apply. */ > > diff --git a/include/uapi/linux/elf.h b/include/uapi/linux/elf.h > > index b59ee07..cae3d1e 100644 > > --- a/include/uapi/linux/elf.h > > +++ b/include/uapi/linux/elf.h > > @@ -414,6 +414,7 @@ > > #define NT_ARM_HW_BREAK 0x402 /* ARM hardware breakpoint registers */ > > #define NT_ARM_HW_WATCH 0x403 /* ARM hardware watchpoint registers */ > > #define NT_ARM_SYSTEM_CALL 0x404 /* ARM system call number */ > > +#define NT_ARM_PAC_MASK 0x405 /* ARM pointer authentication code masks */ > > The is the value tentatively assigned to NT_ARM_SVE. I must've generated this patch before I corrected this; my local branch (and kernel.org) have 0x406 here. Sorry about that. Mark.
WARNING: multiple messages have this Message-ID (diff)
From: mark.rutland@arm.com (Mark Rutland) To: linux-arm-kernel@lists.infradead.org Subject: [RFC 7/9] arm64: expose PAC bit positions via ptrace Date: Tue, 25 Jul 2017 15:59:04 +0100 [thread overview] Message-ID: <20170725145903.GA20857@leverpostej> (raw) In-Reply-To: <20170725121145.GB6321@e103592.cambridge.arm.com> On Tue, Jul 25, 2017 at 01:11:48PM +0100, Dave Martin wrote: > On Mon, Apr 03, 2017 at 04:19:23PM +0100, Mark Rutland wrote: > > +/* > > + * The pointer bits used by a pointer authentication code. > > + * If we were to use tagged pointers, bits 63:56 would also apply. > > + */ > > +#define ptrauth_pac_mask() GENMASK(54, VA_BITS) > > Tagged pointers _are_ enabled for userspace by default, no? Yes; I'd meant s/tagged/untagged/. I've corrected this to: /* * The EL0 pointer bits used by a pointer authentication code. * This is dependent on TBI0 being enabled, or bits 63:56 would also apply. */ > > diff --git a/include/uapi/linux/elf.h b/include/uapi/linux/elf.h > > index b59ee07..cae3d1e 100644 > > --- a/include/uapi/linux/elf.h > > +++ b/include/uapi/linux/elf.h > > @@ -414,6 +414,7 @@ > > #define NT_ARM_HW_BREAK 0x402 /* ARM hardware breakpoint registers */ > > #define NT_ARM_HW_WATCH 0x403 /* ARM hardware watchpoint registers */ > > #define NT_ARM_SYSTEM_CALL 0x404 /* ARM system call number */ > > +#define NT_ARM_PAC_MASK 0x405 /* ARM pointer authentication code masks */ > > The is the value tentatively assigned to NT_ARM_SVE. I must've generated this patch before I corrected this; my local branch (and kernel.org) have 0x406 here. Sorry about that. Mark.
next prev parent reply other threads:[~2017-07-25 15:00 UTC|newest] Thread overview: 40+ messages / expand[flat|nested] mbox.gz Atom feed top 2017-04-03 15:19 [RFC 0/9] ARMv8.3 pointer authentication userspace support Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` [RFC 1/9] asm-generic: mm_hooks: allow hooks to be overridden individually Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` [RFC 2/9] arm64: add pointer authentication register bits Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` [RFC 3/9] arm64/cpufeature: add ARMv8.3 id_aa64isar1 bits Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` [RFC 4/9] arm64/cpufeature: detect pointer authentication Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` [RFC 5/9] arm64: Don't trap host pointer auth use to EL2 Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` [RFC 6/9] arm64: add basic pointer authentication support Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` [RFC 7/9] arm64: expose PAC bit positions via ptrace Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-07-25 12:11 ` Dave Martin 2017-07-25 12:11 ` Dave Martin 2017-07-25 14:59 ` Mark Rutland [this message] 2017-07-25 14:59 ` Mark Rutland 2017-07-25 15:06 ` Dave Martin 2017-07-25 15:06 ` Dave Martin 2017-04-03 15:19 ` [RFC 8/9] arm64/kvm: context-switch PAC registers Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-07 15:41 ` Marc Zyngier 2017-04-07 15:41 ` Marc Zyngier 2017-04-03 15:19 ` [RFC 9/9] arm64: docs: document pointer authentication Mark Rutland 2017-04-03 15:19 ` Mark Rutland 2017-04-07 15:09 ` [RFC 0/9] ARMv8.3 pointer authentication userspace support Adam Wallis 2017-04-07 15:09 ` Adam Wallis
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20170725145903.GA20857@leverpostej \ --to=mark.rutland@arm.com \ --cc=Dave.Martin@arm.com \ --cc=arnd@arndb.de \ --cc=catalin.marinas@arm.com \ --cc=christoffer.dall@linaro.org \ --cc=jiong.wang@arm.com \ --cc=kvmarm@lists.cs.columbia.edu \ --cc=linux-arch@vger.kernel.org \ --cc=linux-arm-kernel@lists.infradead.org \ --cc=linux-kernel@vger.kernel.org \ --cc=marc.zyngier@arm.com \ --cc=suzuki.poulose@arm.com \ --cc=will.deacon@arm.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.