Received: by 10.223.185.116 with SMTP id b49csp5727161wrg; Tue, 27 Feb 2018 20:00:26 -0800 (PST) X-Google-Smtp-Source: AH8x226wwYrhlcESzK87m17WWUPeT2U/8Jt8s4gt81/J7hZPNQpwbAPPiz5hVHVAk8YLE/d/GwZj X-Received: by 2002:a17:902:22cc:: with SMTP id o12-v6mr16711485plg.280.1519790426859; Tue, 27 Feb 2018 20:00:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519790426; cv=none; d=google.com; s=arc-20160816; b=jgn4iqnmBlJDCtwQ/9bNg9RngmDtPPozGdbNpDMz09m4GRL25tEKwsgCuQknR0jwAn UVSoZ2r+ZNTpf0NSzIsrQYxTqgOu5A5M40mTqcob3oqUrjw82JbqVmISsptbhhWp/BV0 YvmeZRerR5fx641FodBCw+DfOrhxDa3wCGISs+xJBBtontq2CrwDqIzG62xES904UqZD McbXXkxdzOuLRKFH+tecvQ3PauMaqlhmbTLjkWXlj3TzdMY4pgfJXsvgaVaTrSVGi72i zsV/vxqHJB0Wmxt+vwC7qzrcjg5D6BeD/qfaISnfWkf6NE2B+cPCvk0dUsiVD/sXZMeU ZAOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=xF6X5uN03sAA3yMb21/xX2XvZZVdgl9P5oiG1iJTS6M=; b=N9Myj/DbnWP7c3HkIAUe2ptqUd5QjLRrRlwJThqOEw28+f2vTTkpsC1i7icANO7bJS vehJeLVHBLTzOsJwzG5OqPyBvVojfHRLcAc9neTNcFQIHehVwvZDHvuOgKMKaKHY1Uyn RfP0jsB6lQwWwlABdonqDroRzIozwJaklizCwfIwKBCU36QpztcdVScQq8tBWPoWLhrv V00No4ChyRHrsmbLfid/NIAaXxW6blVADaSLuru/7IZk08zZuwzg94RxgZa+/Oo7EV9F 1M4O4fScmvEllY9mZXqfq+rrBnsWXBV9chj0B6+tK+zxzwG05bOUllEtDdGHGWOP2uTo pZ1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=B3gaaLmT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z3-v6si585260plb.137.2018.02.27.20.00.11; Tue, 27 Feb 2018 20:00:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=B3gaaLmT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752150AbeB1D6m (ORCPT + 99 others); Tue, 27 Feb 2018 22:58:42 -0500 Received: from mail-pg0-f65.google.com ([74.125.83.65]:41934 "EHLO mail-pg0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752110AbeB1D6k (ORCPT ); Tue, 27 Feb 2018 22:58:40 -0500 Received: by mail-pg0-f65.google.com with SMTP id q27so478384pgn.8 for ; Tue, 27 Feb 2018 19:58:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=xF6X5uN03sAA3yMb21/xX2XvZZVdgl9P5oiG1iJTS6M=; b=B3gaaLmTOgRlE44IL/W74Kw5rAhKmmpE9ZtR9//Rhp4GsjAIipRjhpqXeE1wU8MAFK 9hESja0KDXfvF1JD1yH6RWfpuf4WfNApE6TF6Tfr/qwHwIll/PkEZaaG2F856IyX57Oh JcBPwX79nMfSacISM/EiC73313tZxSyfyq6lU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=xF6X5uN03sAA3yMb21/xX2XvZZVdgl9P5oiG1iJTS6M=; b=OKuRcMQl0bIzZncjKcQdWWoGwuq/BiZm+5K2BX5JLxZz88KI0FPCy75KBZBIur6uip uhcV0BIJryWov38Noz5ic0xHCmbQbqzl0xXsTcCVt4IiQn3p8vQgKnGtd8Vl7dYbV1PJ UF7EandX1ZKoPbx/4t+mq38E0i4/d/TmZMIJRB3EDcqQc4iSQp8L+Qu5JMT4lSFU8bvx 3dxxLQ9F//i2awsuTfDYNBf2/i5I5NyHhB/cK2iS/S6OuIiQ5g2eW3h0UMnTeNmpcRLk UVR7qD496ZMinxN3e89e+gATn81VmpnW1MmecKHfR//6V6+LmXxEtxokeZZkI/D5jrsc K2Sg== X-Gm-Message-State: APf1xPDjFQgmfoXTCLYvtspNayU4TXkK1vaDD5Ws/VH2I7wDd6L8Xykf 836QThVFb6PnHT3E3WRiCcIPnQ== X-Received: by 10.99.120.138 with SMTP id t132mr12978589pgc.54.1519790319443; Tue, 27 Feb 2018 19:58:39 -0800 (PST) Received: from localhost.localdomain (176.122.172.82.16clouds.com. [176.122.172.82]) by smtp.gmail.com with ESMTPSA id q17sm739911pgt.7.2018.02.27.19.58.32 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 27 Feb 2018 19:58:38 -0800 (PST) From: Alex Shi To: Marc Zyngier , Will Deacon , Ard Biesheuvel , Catalin Marinas , stable@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Cc: Alex Shi Subject: [PATCH 09/29] arm64: entry: Add exception trampoline page for exceptions from EL0 Date: Wed, 28 Feb 2018 11:56:31 +0800 Message-Id: <1519790211-16582-10-git-send-email-alex.shi@linaro.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1519790211-16582-1-git-send-email-alex.shi@linaro.org> References: <1519790211-16582-1-git-send-email-alex.shi@linaro.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Will Deacon commit c7b9adaf85f8 upstream. To allow unmapping of the kernel whilst running at EL0, we need to point the exception vectors at an entry trampoline that can map/unmap the kernel on entry/exit respectively. This patch adds the trampoline page, although it is not yet plugged into the vector table and is therefore unused. Reviewed-by: Mark Rutland Tested-by: Laura Abbott Tested-by: Shanker Donthineni Signed-off-by: Will Deacon Signed-off-by: Alex Shi Conflicts: add asm/mmu.h in entry.S for ASID marco add kernel-pgtable.h in entry.S for SWAPPER_DIR_SIZE and RESERVED_TTBR0_SIZE no SW PAN in vmlinux.lds.S --- arch/arm64/include/asm/kernel-pgtable.h | 2 + arch/arm64/kernel/entry.S | 86 +++++++++++++++++++++++++++++++++ arch/arm64/kernel/vmlinux.lds.S | 17 +++++++ 3 files changed, 105 insertions(+) diff --git a/arch/arm64/include/asm/kernel-pgtable.h b/arch/arm64/include/asm/kernel-pgtable.h index e4ddac9..135e829 100644 --- a/arch/arm64/include/asm/kernel-pgtable.h +++ b/arch/arm64/include/asm/kernel-pgtable.h @@ -54,6 +54,8 @@ #define SWAPPER_DIR_SIZE (SWAPPER_PGTABLE_LEVELS * PAGE_SIZE) #define IDMAP_DIR_SIZE (IDMAP_PGTABLE_LEVELS * PAGE_SIZE) +#define RESERVED_TTBR0_SIZE (0) /*no CONFIG_ARM64_SW_TTBR0_PAN introduced */ + /* Initial memory map size */ #if ARM64_SWAPPER_USES_SECTION_MAPS #define SWAPPER_BLOCK_SHIFT SECTION_SHIFT diff --git a/arch/arm64/kernel/entry.S b/arch/arm64/kernel/entry.S index 60b202a..f0c6b37 100644 --- a/arch/arm64/kernel/entry.S +++ b/arch/arm64/kernel/entry.S @@ -29,9 +29,11 @@ #include #include #include +#include #include #include #include +#include /* * Context tracking subsystem. Used to instrument transitions @@ -828,6 +830,90 @@ __ni_sys_trace: .popsection // .entry.text +#ifdef CONFIG_UNMAP_KERNEL_AT_EL0 +/* + * Exception vectors trampoline. + */ + .pushsection ".entry.tramp.text", "ax" + + .macro tramp_map_kernel, tmp + mrs \tmp, ttbr1_el1 + sub \tmp, \tmp, #(SWAPPER_DIR_SIZE + RESERVED_TTBR0_SIZE) + bic \tmp, \tmp, #USER_ASID_FLAG + msr ttbr1_el1, \tmp + .endm + + .macro tramp_unmap_kernel, tmp + mrs \tmp, ttbr1_el1 + add \tmp, \tmp, #(SWAPPER_DIR_SIZE + RESERVED_TTBR0_SIZE) + orr \tmp, \tmp, #USER_ASID_FLAG + msr ttbr1_el1, \tmp + /* + * We avoid running the post_ttbr_update_workaround here because the + * user and kernel ASIDs don't have conflicting mappings, so any + * "blessing" as described in: + * + * http://lkml.kernel.org/r/56BB848A.6060603@caviumnetworks.com + * + * will not hurt correctness. Whilst this may partially defeat the + * point of using split ASIDs in the first place, it avoids + * the hit of invalidating the entire I-cache on every return to + * userspace. + */ + .endm + + .macro tramp_ventry, regsize = 64 + .align 7 +1: + .if \regsize == 64 + msr tpidrro_el0, x30 // Restored in kernel_ventry + .endif + tramp_map_kernel x30 + ldr x30, =vectors + prfm plil1strm, [x30, #(1b - tramp_vectors)] + msr vbar_el1, x30 + add x30, x30, #(1b - tramp_vectors) + isb + br x30 + .endm + + .macro tramp_exit, regsize = 64 + adr x30, tramp_vectors + msr vbar_el1, x30 + tramp_unmap_kernel x30 + .if \regsize == 64 + mrs x30, far_el1 + .endif + eret + .endm + + .align 11 +ENTRY(tramp_vectors) + .space 0x400 + + tramp_ventry + tramp_ventry + tramp_ventry + tramp_ventry + + tramp_ventry 32 + tramp_ventry 32 + tramp_ventry 32 + tramp_ventry 32 +END(tramp_vectors) + +ENTRY(tramp_exit_native) + tramp_exit +END(tramp_exit_native) + +ENTRY(tramp_exit_compat) + tramp_exit 32 +END(tramp_exit_compat) + + .ltorg + .popsection // .entry.tramp.text +#endif /* CONFIG_UNMAP_KERNEL_AT_EL0 */ + /* * Special system call wrappers. */ diff --git a/arch/arm64/kernel/vmlinux.lds.S b/arch/arm64/kernel/vmlinux.lds.S index 1105aab..466a43a 100644 --- a/arch/arm64/kernel/vmlinux.lds.S +++ b/arch/arm64/kernel/vmlinux.lds.S @@ -56,6 +56,17 @@ jiffies = jiffies_64; #define HIBERNATE_TEXT #endif +#ifdef CONFIG_UNMAP_KERNEL_AT_EL0 +#define TRAMP_TEXT \ + . = ALIGN(PAGE_SIZE); \ + VMLINUX_SYMBOL(__entry_tramp_text_start) = .; \ + *(.entry.tramp.text) \ + . = ALIGN(PAGE_SIZE); \ + VMLINUX_SYMBOL(__entry_tramp_text_end) = .; +#else +#define TRAMP_TEXT +#endif + /* * The size of the PE/COFF section that covers the kernel image, which * runs from stext to _edata, must be a round multiple of the PE/COFF @@ -128,6 +139,7 @@ SECTIONS HYPERVISOR_TEXT IDMAP_TEXT HIBERNATE_TEXT + TRAMP_TEXT *(.fixup) *(.gnu.warning) . = ALIGN(16); @@ -216,6 +228,11 @@ SECTIONS swapper_pg_dir = .; . += SWAPPER_DIR_SIZE; +#ifdef CONFIG_UNMAP_KERNEL_AT_EL0 + tramp_pg_dir = .; + . += PAGE_SIZE; +#endif + _end = .; STABS_DEBUG -- 2.7.4