Received: by 10.213.65.68 with SMTP id h4csp706824imn; Fri, 6 Apr 2018 07:35:57 -0700 (PDT) X-Google-Smtp-Source: AIpwx48MrCfaQZfRjylCiDl+mRx5mionx2WxqLEZG2VhvO/6pjiTaIiCyoljLD/2P8crx1UTqmFr X-Received: by 2002:a17:902:8d82:: with SMTP id v2-v6mr27932172plo.101.1523025357091; Fri, 06 Apr 2018 07:35:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523025357; cv=none; d=google.com; s=arc-20160816; b=Mg9OtvbusEAk/1j3plFuYq518G8PoGqXd3/rzBI1EiqgWy8uVj+KxyLcrL/D2WuOc4 d9F0s0/Qi/aHIRWxSDJLZOyntv1KkGhtlzI8Fbe6P46PRpjToLd2ChXfo6GQOumO985F /cIziXCIC89QJ70h14oerTKgWQZTvF6mKGnnab4LG25cptM5thcYHW9F+3EjXy1XTdkE 8+ZHkOC/MhdQPlKXp4jIibMwyXirm2M/3QIKnfe8DanYL0m9XfRoIAjS7+7RKcaCtlPa rBIfJLmx8UFOYjN7t/olhCXY4JhL+xomR5k56QSfWdJTTDZjvjlFzgtHVOadK7qSRHsP iWSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=Pqnl96G2SvEmTKLa0HJaFX0skUSrHtCwmwDfIsqWVBE=; b=mh8mczeXfeYhc15l9qogmIitAlpewsW9CHrAiIn5vilW+YaMT4Culj3VbLI7XYmkpv jZImMJz0DlubLiXIcbcS5xyD6njF3rDcRIGJnbf0TXEbZuqR14/PbECW4qhanYYe99bK MA+zdJEATHRag0I8VAne92FpFrFqKR4UOkXI5EaGv8wofNHS8IHIjrvH3yVxlJggPh/R dDDJqFar3NXJoQXnu0wcgUmUnZ18SSOl80Us8zaKcbUjakSAGU0V0AJOmImRHKAdfjTB UIs2uUY6CWOyKTZB4QHYlyLgkGjd6wlFZ+/ffqw/uuJIwqWBy9KrujCvTh+Mj0JCRChc qngg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u45si7296926pgn.702.2018.04.06.07.35.43; Fri, 06 Apr 2018 07:35:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756186AbeDFNgM (ORCPT + 99 others); Fri, 6 Apr 2018 09:36:12 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:59096 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756143AbeDFNgJ (ORCPT ); Fri, 6 Apr 2018 09:36:09 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 8DD6BDC8; Fri, 6 Apr 2018 13:36:08 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Greg Kroah-Hartman , Suzuki K Poulose , Will Deacon , Catalin Marinas , Greg Hackmann , Alex Shi , Mark Rutland Subject: [PATCH 4.9 067/102] arm64: Take into account ID_AA64PFR0_EL1.CSV3 Date: Fri, 6 Apr 2018 15:23:48 +0200 Message-Id: <20180406084340.929989915@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180406084331.507038179@linuxfoundation.org> References: <20180406084331.507038179@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Will Deacon commit 179a56f6f9fb upstream. For non-KASLR kernels where the KPTI behaviour has not been overridden on the command line we can use ID_AA64PFR0_EL1.CSV3 to determine whether or not we should unmap the kernel whilst running at EL0. Reviewed-by: Suzuki K Poulose Signed-off-by: Will Deacon Signed-off-by: Catalin Marinas [Alex: s/read_sanitised_ftr_reg/read_system_reg/ to match v4.9 naming] Signed-off-by: Alex Shi [v4.9 backport] [Mark: correct zero bits in ftr_id_aa64pfr0 to account for CSV3] Signed-off-by: Mark Rutland [v4.9 backport] Tested-by: Will Deacon Tested-by: Greg Hackmann Signed-off-by: Greg Kroah-Hartman --- arch/arm64/include/asm/sysreg.h | 1 + arch/arm64/kernel/cpufeature.c | 10 ++++++++-- 2 files changed, 9 insertions(+), 2 deletions(-) --- a/arch/arm64/include/asm/sysreg.h +++ b/arch/arm64/include/asm/sysreg.h @@ -117,6 +117,7 @@ #define ID_AA64ISAR0_AES_SHIFT 4 /* id_aa64pfr0 */ +#define ID_AA64PFR0_CSV3_SHIFT 60 #define ID_AA64PFR0_GIC_SHIFT 24 #define ID_AA64PFR0_ASIMD_SHIFT 20 #define ID_AA64PFR0_FP_SHIFT 16 --- a/arch/arm64/kernel/cpufeature.c +++ b/arch/arm64/kernel/cpufeature.c @@ -93,7 +93,8 @@ static const struct arm64_ftr_bits ftr_i }; static const struct arm64_ftr_bits ftr_id_aa64pfr0[] = { - ARM64_FTR_BITS(FTR_STRICT, FTR_EXACT, 32, 32, 0), + ARM64_FTR_BITS(FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_CSV3_SHIFT, 4, 0), + ARM64_FTR_BITS(FTR_STRICT, FTR_EXACT, 32, 28, 0), ARM64_FTR_BITS(FTR_STRICT, FTR_EXACT, 28, 4, 0), ARM64_FTR_BITS(FTR_STRICT, FTR_EXACT, ID_AA64PFR0_GIC_SHIFT, 4, 0), S_ARM64_FTR_BITS(FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_ASIMD_SHIFT, 4, ID_AA64PFR0_ASIMD_NI), @@ -752,6 +753,8 @@ static int __kpti_forced; /* 0: not forc static bool unmap_kernel_at_el0(const struct arm64_cpu_capabilities *entry, int __unused) { + u64 pfr0 = read_system_reg(SYS_ID_AA64PFR0_EL1); + /* Forced on command line? */ if (__kpti_forced) { pr_info_once("kernel page table isolation forced %s by command line option\n", @@ -763,7 +766,9 @@ static bool unmap_kernel_at_el0(const st if (IS_ENABLED(CONFIG_RANDOMIZE_BASE)) return true; - return false; + /* Defer to CPU feature registers */ + return !cpuid_feature_extract_unsigned_field(pfr0, + ID_AA64PFR0_CSV3_SHIFT); } static int __init parse_kpti(char *str) @@ -865,6 +870,7 @@ static const struct arm64_cpu_capabiliti }, #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 { + .desc = "Kernel page table isolation (KPTI)", .capability = ARM64_UNMAP_KERNEL_AT_EL0, .def_scope = SCOPE_SYSTEM, .matches = unmap_kernel_at_el0,