On Fri, Apr 21, 2023 at 09:45:54AM -0400, Yang Weijiang wrote:
Implementation:Yeah, at the time I had to hack up kernel IBT guest support, because the
--------------------------------------------------------------------------
Historically, the early KVM patches can support both user SHSTK and IBT,
and most of the early patches are carried forward with changes by this new
series. Then with kernel IBT feature merged in 5.18, a new patch was added
to support the feature for guest. The last patch is introduced to support
platform I had to use (tgl-nuc) didn't have serial and so I had to use
KVM :/
supervisor SHSTK but the feature is not enabled on Intel platform for now,I've on ideas about cloud stuff, but there is fundamentally no relation
the main purpose of this patch is to facilitate AMD folks to enable the
feature.
In summary, this new series enables CET user SHSTK/IBT and kernel IBT, but
doesn't fully support CET supervisor SHSTK, the enabling work is left for
the future.
Supported CET sub-features:
|
User SHSTK | User IBT (user mode)
--------------------------------------------------
s-SHSTK (X) | Kernel IBT (kernel mode)
|
The user SHSTK/IBT relies on host side XSAVES support(XSS[bit 11]) for user
mode CET states. The kernel IBT doesn't have dependency on host XSAVES.
The supervisor SHSTK relies on host side XSAVES support(XSS[bit 12]) for
supervisor mode CET states.
This version removed unnecessary checks for host CET enabling status before
enabling guest CET support, making guest CET support apart from that of host.
By doing so, it's expected to be more friendly to cloud computing scenarios.
bewteen the host making use of IBT/SHSTK and a guest doing so, so there
should be no dependency there.
To run user shadow stack test and kernel IBT test in VM, you need an CETWhy does the host kernel require a CET capable toolchain if the host
capable platform, e.g., Sapphire Rapids server, and follow below steps to
build host/guest kernel properly:
1. Buld host kernel. Patch this series to kernel tree and build kernel
with CET capable gcc version(e.g., >=8.5.0).
kernel does not in fact need to make use of these features in order to
provide them to the guest?