Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp2488611ybv; Mon, 24 Feb 2020 06:13:06 -0800 (PST) X-Google-Smtp-Source: APXvYqyKqBF/qowaRApCLO5mMlLdVNgazAMtm8lwGnXr23ry39pZuGxG0Y/ukf+8q4IVIhu15DNp X-Received: by 2002:a9d:d0b:: with SMTP id 11mr41690057oti.287.1582553585925; Mon, 24 Feb 2020 06:13:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582553585; cv=none; d=google.com; s=arc-20160816; b=BKyow55wNNl7BLI93SGizk8hBbMnI30dHdEGVzrT34/I71T2wYShJcplmn6QqEwulH Dlf4wy1BcY7pPpiLyRcMHSaLskp/NsSgFAlJsA3NBh8EIQB362mmD02f60N8ya77ILVi gWmwwHvTPngfCRWqKGE1r5dwJhrt9v690pTXzfrnPWMlL0df2E7lBBhdPyGW3WLlkGJi gykpKkPYjniPgCNnaz8XwT2tsuO1irUx8KnThIMMaoG0J+ymgehV5sVrP0gGp6eq8HIi Lay3g8K6eHypBlSFYXyDpGCJ/Mg+jEo5+32aKWoDs/E3g8nCCQlDV8WJgmKSRHQeKTp/ lFpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=wlyzsb+jd9qdDwCpOLlg2E+jYH45UVZOpK8Y1h5lw04=; b=Jo9UqiaQZpNsl0NMB3rJajUmp8r4h22uCNExXad++mpP6jtWdgXmMXGQAEP6kOcVK7 itUzvZKkd/nR+eka3lqVnV9YO419Uv3rvJwNRZY9iSutsxWxxvVB9zDWUjwg2mBxarfF h3Qanq83vniTFPtHgDhv2rt89/MgZOR1W9jXyLzmqde7jkFdH+gtyyMSw/iHc6O5ba45 R97+cVT5ZrIn33eUwo2JYdzNFLeAvM9DVdsRRqDKGgeMBbjtWt2Aax6WFtpLjZSU5Vpc 2ntviUHv5Ma65SZN2uUCyZFP5d7hUmYPzAGcImCNAPBQYzaVBuhW4haZaHtX3s/2QWPF MdrA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s188si4536333oia.277.2020.02.24.06.12.53; Mon, 24 Feb 2020 06:13:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727648AbgBXOMl (ORCPT + 99 others); Mon, 24 Feb 2020 09:12:41 -0500 Received: from foss.arm.com ([217.140.110.172]:37616 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727619AbgBXOMk (ORCPT ); Mon, 24 Feb 2020 09:12:40 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C192930E; Mon, 24 Feb 2020 06:12:39 -0800 (PST) Received: from e108754-lin.cambridge.arm.com (unknown [10.1.198.53]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 5CD133F534; Mon, 24 Feb 2020 06:12:37 -0800 (PST) From: Ionela Voinescu To: catalin.marinas@arm.com, will@kernel.org, mark.rutland@arm.com, maz@kernel.org, suzuki.poulose@arm.com, sudeep.holla@arm.com, lukasz.luba@arm.com, valentin.schneider@arm.com, dietmar.eggemann@arm.com, rjw@rjwysocki.net, ionela.voinescu@arm.com Cc: peterz@infradead.org, mingo@redhat.com, vincent.guittot@linaro.org, viresh.kumar@linaro.org, linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-pm@vger.kernel.org, Steve Capper Subject: [PATCH v4 2/7] arm64: trap to EL1 accesses to AMU counters from EL0 Date: Mon, 24 Feb 2020 14:11:37 +0000 Message-Id: <20200224141142.25445-3-ionela.voinescu@arm.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200224141142.25445-1-ionela.voinescu@arm.com> References: <20200224141142.25445-1-ionela.voinescu@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The activity monitors extension is an optional extension introduced by the ARMv8.4 CPU architecture. In order to access the activity monitors counters safely, if desired, the kernel should detect the presence of the extension through the feature register, and mediate the access. Therefore, disable direct accesses to activity monitors counters from EL0 (userspace) and trap them to EL1 (kernel). To be noted that the ARM64_AMU_EXTN kernel config and the disable_amu kernel parameter do not have an effect on this code. Given that the amuserenr_el0 resets to an UNKNOWN value, setting the trap of EL0 accesses to EL1 is always attempted for safety and security considerations. Therefore firmware should still ensure accesses to AMU registers are not trapped in EL2/EL3 as this code cannot be bypassed if the CPU implements the Activity Monitors Unit. Signed-off-by: Ionela Voinescu Reviewed-by: Suzuki K Poulose Reviewed-by: Valentin Schneider Cc: Catalin Marinas Cc: Will Deacon Cc: Mark Rutland Cc: Steve Capper --- arch/arm64/include/asm/assembler.h | 10 ++++++++++ arch/arm64/mm/proc.S | 3 +++ 2 files changed, 13 insertions(+) diff --git a/arch/arm64/include/asm/assembler.h b/arch/arm64/include/asm/assembler.h index 2cc0dd8bd9f7..2dc6d7b19831 100644 --- a/arch/arm64/include/asm/assembler.h +++ b/arch/arm64/include/asm/assembler.h @@ -443,6 +443,16 @@ USER(\label, ic ivau, \tmp2) // invalidate I line PoU 9000: .endm +/* + * reset_amuserenr_el0 - reset AMUSERENR_EL0 if AMUv1 present + */ + .macro reset_amuserenr_el0, tmpreg + mrs \tmpreg, id_aa64pfr0_el1 // Check ID_AA64PFR0_EL1 + ubfx \tmpreg, \tmpreg, #ID_AA64PFR0_AMU_SHIFT, #4 + cbz \tmpreg, .Lskip_\@ // Skip if no AMU present + msr_s SYS_AMUSERENR_EL0, xzr // Disable AMU access from EL0 +.Lskip_\@: + .endm /* * copy_page - copy src to dest using temp registers t1-t8 */ diff --git a/arch/arm64/mm/proc.S b/arch/arm64/mm/proc.S index a1e0592d1fbc..d8aae1152c08 100644 --- a/arch/arm64/mm/proc.S +++ b/arch/arm64/mm/proc.S @@ -124,6 +124,7 @@ alternative_endif ubfx x11, x11, #1, #1 msr oslar_el1, x11 reset_pmuserenr_el0 x0 // Disable PMU access from EL0 + reset_amuserenr_el0 x0 // Disable AMU access from EL0 alternative_if ARM64_HAS_RAS_EXTN msr_s SYS_DISR_EL1, xzr @@ -415,6 +416,8 @@ ENTRY(__cpu_setup) isb // Unmask debug exceptions now, enable_dbg // since this is per-cpu reset_pmuserenr_el0 x0 // Disable PMU access from EL0 + reset_amuserenr_el0 x0 // Disable AMU access from EL0 + /* * Memory region attributes for LPAE: * -- 2.17.1