linux-arm-kernel.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: Ard Biesheuvel <ardb@kernel.org>
To: Linux ARM <linux-arm-kernel@lists.infradead.org>
Cc: Mark Rutland <mark.rutland@arm.com>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Will Deacon <will@kernel.org>, James Morse <james.morse@arm.com>,
	mark.brown@arm.com
Subject: Re: [PATCH] arm64/entry: deduplicate SW PAN entry/exit routines
Date: Mon, 6 Jul 2020 18:39:47 +0300	[thread overview]
Message-ID: <CAMj1kXHb5Z7wEuTaWbwCqXPxirAU6WieVgR67M7tBJFypEGUbw@mail.gmail.com> (raw)
In-Reply-To: <20200706153502.33686-1-ardb@kernel.org>

On Mon, 6 Jul 2020 at 18:35, Ard Biesheuvel <ardb@kernel.org> wrote:
>
> Factor the 12 copies of the SW PAN entry and exit code into callable
> subroutines, and use alternatives patching to either emit a 'bl'
> instruction to call them, or a NOP if h/w PAN is found to be available
> at runtime.
>
> Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
> ---
>  arch/arm64/kernel/entry.S | 96 +++++++++++++++++++--------------------
>  1 file changed, 48 insertions(+), 48 deletions(-)
>
> diff --git a/arch/arm64/kernel/entry.S b/arch/arm64/kernel/entry.S
> index 5304d193c79d..96a9fb2ed49f 100644
> --- a/arch/arm64/kernel/entry.S
> +++ b/arch/arm64/kernel/entry.S
> @@ -209,28 +209,9 @@ alternative_cb_end
>         add     x29, sp, #S_STACKFRAME
>
>  #ifdef CONFIG_ARM64_SW_TTBR0_PAN
> -       /*
> -        * Set the TTBR0 PAN bit in SPSR. When the exception is taken from
> -        * EL0, there is no need to check the state of TTBR0_EL1 since
> -        * accesses are always enabled.
> -        * Note that the meaning of this bit differs from the ARMv8.1 PAN
> -        * feature as all TTBR0_EL1 accesses are disabled, not just those to
> -        * user mappings.
> -        */
> -alternative_if ARM64_HAS_PAN
> -       b       1f                              // skip TTBR0 PAN
> +alternative_if_not ARM64_HAS_PAN
> +       bl      __swpan_entry_el\el
>  alternative_else_nop_endif
> -
> -       .if     \el != 0
> -       mrs     x21, ttbr0_el1
> -       tst     x21, #TTBR_ASID_MASK            // Check for the reserved ASID
> -       orr     x23, x23, #PSR_PAN_BIT          // Set the emulated PAN in the saved SPSR
> -       b.eq    1f                              // TTBR0 access already disabled
> -       and     x23, x23, #~PSR_PAN_BIT         // Clear the emulated PAN in the saved SPSR
> -       .endif
> -
> -       __uaccess_ttbr0_disable x21
> -1:
>  #endif
>
>         stp     x22, x23, [sp, #S_PC]
> @@ -284,34 +265,9 @@ alternative_else_nop_endif
>         .endif
>
>  #ifdef CONFIG_ARM64_SW_TTBR0_PAN
> -       /*
> -        * Restore access to TTBR0_EL1. If returning to EL0, no need for SPSR
> -        * PAN bit checking.
> -        */
> -alternative_if ARM64_HAS_PAN
> -       b       2f                              // skip TTBR0 PAN
> +alternative_if_not ARM64_HAS_PAN
> +       bl      __swpan_exit_el\el
>  alternative_else_nop_endif
> -
> -       .if     \el != 0
> -       tbnz    x22, #22, 1f                    // Skip re-enabling TTBR0 access if the PSR_PAN_BIT is set
> -       .endif
> -
> -       __uaccess_ttbr0_enable x0, x1
> -
> -       .if     \el == 0
> -       /*
> -        * Enable errata workarounds only if returning to user. The only
> -        * workaround currently required for TTBR0_EL1 changes are for the
> -        * Cavium erratum 27456 (broadcast TLBI instructions may cause I-cache
> -        * corruption).
> -        */
> -       bl      post_ttbr_update_workaround
> -       .endif
> -1:
> -       .if     \el != 0
> -       and     x22, x22, #~PSR_PAN_BIT         // ARMv8.0 CPUs do not understand this bit
> -       .endif
> -2:
>  #endif
>
>         .if     \el == 0
> @@ -391,6 +347,50 @@ alternative_insn eret, nop, ARM64_UNMAP_KERNEL_AT_EL0
>         sb
>         .endm
>
> +#ifdef CONFIG_ARM64_SW_TTBR0_PAN
> +       /*
> +        * Set the TTBR0 PAN bit in SPSR. When the exception is taken from
> +        * EL0, there is no need to check the state of TTBR0_EL1 since
> +        * accesses are always enabled.
> +        * Note that the meaning of this bit differs from the ARMv8.1 PAN
> +        * feature as all TTBR0_EL1 accesses are disabled, not just those to
> +        * user mappings.
> +        */
> +SYM_CODE_START_LOCAL(__swpan_entry_el1)
> +       mrs     x21, ttbr0_el1
> +       tst     x21, #TTBR_ASID_MASK            // Check for the reserved ASID
> +       orr     x23, x23, #PSR_PAN_BIT          // Set the emulated PAN in the saved SPSR
> +       b.eq    1f                              // TTBR0 access already disabled
> +       and     x23, x23, #~PSR_PAN_BIT         // Clear the emulated PAN in the saved SPSR
> +SYM_INNER_LABEL(__swpan_entry_el0, SYM_L_LOCAL)
> +       __uaccess_ttbr0_disable x21
> +1:     ret
> +SYM_CODE_END(__swpan_entry_el1)
> +
> +       /*
> +        * Restore access to TTBR0_EL1. If returning to EL0, no need for SPSR
> +        * PAN bit checking.
> +        */
> +SYM_CODE_START_LOCAL(__swpan_exit_el1)
> +       tbnz    x22, #22, 1f                    // Skip re-enabling TTBR0 access if the PSR_PAN_BIT is set
> +       __uaccess_ttbr0_enable x0, x1
> +1:     and     x22, x22, #~PSR_PAN_BIT         // ARMv8.0 CPUs do not understand this bit
> +       ret
> +SYM_CODE_END(__swpan_exit_el1)
> +
> +SYM_CODE_START_LOCAL(__swpan_exit_el0)
> +       __uaccess_ttbr0_enable x0, x1
> +       /*
> +        * Enable errata workarounds only if returning to user. The only
> +        * workaround currently required for TTBR0_EL1 changes are for the
> +        * Cavium erratum 27456 (broadcast TLBI instructions may cause I-cache
> +        * corruption).
> +        */
> +       bl      post_ttbr_update_workaround
> +       ret

Oops - this should be a tail call as lr is obviously clobbered at this point.

> +SYM_CODE_END(__swpan_exit_el0)
> +#endif
> +
>         .macro  irq_stack_entry
>         mov     x19, sp                 // preserve the original sp
>  #ifdef CONFIG_SHADOW_CALL_STACK
> --
> 2.20.1
>

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

      reply	other threads:[~2020-07-06 15:41 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-07-06 15:35 [PATCH] arm64/entry: deduplicate SW PAN entry/exit routines Ard Biesheuvel
2020-07-06 15:39 ` Ard Biesheuvel [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAMj1kXHb5Z7wEuTaWbwCqXPxirAU6WieVgR67M7tBJFypEGUbw@mail.gmail.com \
    --to=ardb@kernel.org \
    --cc=catalin.marinas@arm.com \
    --cc=james.morse@arm.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=mark.brown@arm.com \
    --cc=mark.rutland@arm.com \
    --cc=will@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).