From: Ard Biesheuvel <ardb@kernel.org> To: linux-arm-kernel@lists.infradead.org Cc: linux-efi@vger.kernel.org, catalin.marinas@arm.com, will@kernel.org, Ard Biesheuvel <ardb@kernel.org>, Mark Rutland <mark.rutland@arm.com>, Lee Jones <lee@kernel.org> Subject: [PATCH v2 0/2] efi: Follow-up fixes for EFI runtime stack Date: Wed, 4 Jan 2023 18:44:31 +0100 [thread overview] Message-ID: <20230104174433.1259428-1-ardb@kernel.org> (raw) Commit ff7a167961d1b ("arm64: efi: Execute runtime services from a dedicated stack") introduced a dedicated stack for EFI runtime services, in an attempt to make the execution of EFI runtime services more robust, given that they execute at the same privilege level as the kernel. However, this stack needs to be declared to the stacktrace machinery, which is careful not to walk the stack when it leads into memory regions that are not known to be allocated for stack use. Also, given that the ACPI code may invoke the low-level EFI runtime call wrapper without using the dedicated kernel thread and workqueue, we should take this into account when trying to gracefully handle synchronous exceptions. Cc: Mark Rutland <mark.rutland@arm.com> Cc: Lee Jones <lee@kernel.org> Ard Biesheuvel (2): arm64: efi: Avoid workqueue to check whether EFI runtime is live arm64: efi: Account for the EFI runtime stack in stack unwinder arch/arm64/include/asm/efi.h | 10 ++++++++++ arch/arm64/include/asm/stacktrace.h | 15 +++++++++++++++ arch/arm64/kernel/efi.c | 3 ++- arch/arm64/kernel/stacktrace.c | 12 ++++++++++++ 4 files changed, 39 insertions(+), 1 deletion(-) -- 2.39.0
WARNING: multiple messages have this Message-ID (diff)
From: Ard Biesheuvel <ardb@kernel.org> To: linux-arm-kernel@lists.infradead.org Cc: linux-efi@vger.kernel.org, catalin.marinas@arm.com, will@kernel.org, Ard Biesheuvel <ardb@kernel.org>, Mark Rutland <mark.rutland@arm.com>, Lee Jones <lee@kernel.org> Subject: [PATCH v2 0/2] efi: Follow-up fixes for EFI runtime stack Date: Wed, 4 Jan 2023 18:44:31 +0100 [thread overview] Message-ID: <20230104174433.1259428-1-ardb@kernel.org> (raw) Commit ff7a167961d1b ("arm64: efi: Execute runtime services from a dedicated stack") introduced a dedicated stack for EFI runtime services, in an attempt to make the execution of EFI runtime services more robust, given that they execute at the same privilege level as the kernel. However, this stack needs to be declared to the stacktrace machinery, which is careful not to walk the stack when it leads into memory regions that are not known to be allocated for stack use. Also, given that the ACPI code may invoke the low-level EFI runtime call wrapper without using the dedicated kernel thread and workqueue, we should take this into account when trying to gracefully handle synchronous exceptions. Cc: Mark Rutland <mark.rutland@arm.com> Cc: Lee Jones <lee@kernel.org> Ard Biesheuvel (2): arm64: efi: Avoid workqueue to check whether EFI runtime is live arm64: efi: Account for the EFI runtime stack in stack unwinder arch/arm64/include/asm/efi.h | 10 ++++++++++ arch/arm64/include/asm/stacktrace.h | 15 +++++++++++++++ arch/arm64/kernel/efi.c | 3 ++- arch/arm64/kernel/stacktrace.c | 12 ++++++++++++ 4 files changed, 39 insertions(+), 1 deletion(-) -- 2.39.0 _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
next reply other threads:[~2023-01-04 17:44 UTC|newest] Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top 2023-01-04 17:44 Ard Biesheuvel [this message] 2023-01-04 17:44 ` [PATCH v2 0/2] efi: Follow-up fixes for EFI runtime stack Ard Biesheuvel 2023-01-04 17:44 ` [PATCH v2 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live Ard Biesheuvel 2023-01-04 17:44 ` Ard Biesheuvel 2023-01-05 12:45 ` Mark Rutland 2023-01-05 12:45 ` Mark Rutland 2023-01-06 15:42 ` Ard Biesheuvel 2023-01-06 15:42 ` Ard Biesheuvel 2023-01-04 17:44 ` [PATCH v2 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder Ard Biesheuvel 2023-01-04 17:44 ` Ard Biesheuvel 2023-01-05 12:47 ` Mark Rutland 2023-01-05 12:47 ` Mark Rutland
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20230104174433.1259428-1-ardb@kernel.org \ --to=ardb@kernel.org \ --cc=catalin.marinas@arm.com \ --cc=lee@kernel.org \ --cc=linux-arm-kernel@lists.infradead.org \ --cc=linux-efi@vger.kernel.org \ --cc=mark.rutland@arm.com \ --cc=will@kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.