Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3315520imm; Tue, 29 May 2018 05:14:43 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKEdLxNNk6pJBhDsIcLpnyB5baO53pnjY4PeUTXN8ioikhdudPpOL6Yx+5+YtfS42T3aAfH X-Received: by 2002:a63:7b1e:: with SMTP id w30-v6mr10001580pgc.402.1527596083915; Tue, 29 May 2018 05:14:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527596083; cv=none; d=google.com; s=arc-20160816; b=pLWYaIc8helxqFGLiula72nxA0p6irbKUlK3J+xyQyhr8l/zTW7rF2itEj5merINjJ QtXypP6gQtci7gnrMTmGOywfd2jLjpGfhmET0ybF/45/osl62kDVpW86meRlLgjJzwFt o5/L5z5roA/PE/+w0+a1Miq78P9nLt/eA8/srsLObNAqMqbjfiIAXnL0oqVUWPdrnzsL kFxXiQ4JGDQhUNHMlAtiRoRzX/3Uovp+W59aMfv9Z5Qrasy5ObItuXnZ+wtk7iv5aKS3 lb4htkgpzGdmu3YegMrlSrp2BGRjA8R4+/48pVA+5Ukb9IoTxMfURu15DUJYY/KGLzF7 YR6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=iamfAY5H6YgcsGPNVEx8Kr6qST9XwORKB32xqZ+kgJc=; b=V8Lh0/FQBrxW52Py9ovUui4vyHV9RWid6KjmR+qmYMD6Zk27zOBX8hCTq8XQMojQtW CaA2T8iaiXrVb61Ln7eJqxOhTVZ4X8W0DcfbcGwtoRf28F/E91Dx324mZEEcJKCt7+O3 YbLvdqR2AhfMCyD0yu7qshUFzWdQ3Gneff1i08VsFkeu3r3oGz+M0a6ImD/tEkCzNN6n Q/t0FotA5uO+hvy/nQ/9oAYaA5RrgXiafQAvjDwOF0DGsG/IdUjoYPchS1TyLdQXIftB sY2C1u2pw6MQr3hQIyAgdJ7LTPJI7HIADPzMDMslMJUQ8Tx4Z+LGX5ig5pbIZpOFwtDV z32Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h12-v6si31430740pls.278.2018.05.29.05.14.30; Tue, 29 May 2018 05:14:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933833AbeE2MMG (ORCPT + 99 others); Tue, 29 May 2018 08:12:06 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:38530 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933766AbeE2MLy (ORCPT ); Tue, 29 May 2018 08:11:54 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 04AA615BE; Tue, 29 May 2018 05:11:54 -0700 (PDT) Received: from approximate.cambridge.arm.com (approximate.cambridge.arm.com [10.1.206.75]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id A272D3F53D; Tue, 29 May 2018 05:11:51 -0700 (PDT) From: Marc Zyngier To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kvmarm@lists.cs.columbia.edu Cc: Will Deacon , Catalin Marinas , Thomas Gleixner , Andy Lutomirski , Kees Cook , Greg Kroah-Hartman , Christoffer Dall , Randy Dunlap , Dominik Brodowski , Julien Grall , Mark Rutland Subject: [PATCH v2 09/17] arm64: ssbd: Introduce thread flag to control userspace mitigation Date: Tue, 29 May 2018 13:11:13 +0100 Message-Id: <20180529121121.24927-10-marc.zyngier@arm.com> X-Mailer: git-send-email 2.14.2 In-Reply-To: <20180529121121.24927-1-marc.zyngier@arm.com> References: <20180529121121.24927-1-marc.zyngier@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In order to allow userspace to be mitigated on demand, let's introduce a new thread flag that prevents the mitigation from being turned off when exiting to userspace, and doesn't turn it on on entry into the kernel (with the assumption that the mitigation is always enabled in the kernel itself). This will be used by a prctl interface introduced in a later patch. Reviewed-by: Mark Rutland Signed-off-by: Marc Zyngier --- arch/arm64/include/asm/thread_info.h | 1 + arch/arm64/kernel/entry.S | 2 ++ 2 files changed, 3 insertions(+) diff --git a/arch/arm64/include/asm/thread_info.h b/arch/arm64/include/asm/thread_info.h index 740aa03c5f0d..cbcf11b5e637 100644 --- a/arch/arm64/include/asm/thread_info.h +++ b/arch/arm64/include/asm/thread_info.h @@ -94,6 +94,7 @@ void arch_release_task_struct(struct task_struct *tsk); #define TIF_32BIT 22 /* 32bit process */ #define TIF_SVE 23 /* Scalable Vector Extension in use */ #define TIF_SVE_VL_INHERIT 24 /* Inherit sve_vl_onexec across exec */ +#define TIF_SSBD 25 /* Wants SSB mitigation */ #define _TIF_SIGPENDING (1 << TIF_SIGPENDING) #define _TIF_NEED_RESCHED (1 << TIF_NEED_RESCHED) diff --git a/arch/arm64/kernel/entry.S b/arch/arm64/kernel/entry.S index e6f6e2339b22..28ad8799406f 100644 --- a/arch/arm64/kernel/entry.S +++ b/arch/arm64/kernel/entry.S @@ -147,6 +147,8 @@ alternative_cb arm64_enable_wa2_handling alternative_cb_end ldr_this_cpu \tmp2, arm64_ssbd_callback_required, \tmp1 cbz \tmp2, \targ + ldr \tmp2, [tsk, #TSK_TI_FLAGS] + tbnz \tmp2, #TIF_SSBD, \targ mov w0, #ARM_SMCCC_ARCH_WORKAROUND_2 mov w1, #\state alternative_cb arm64_update_smccc_conduit -- 2.14.2