From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id BF835EB64DD for ; Sun, 16 Jul 2023 21:53:57 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 235D06B0083; Sun, 16 Jul 2023 17:53:57 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 1BEB16B0085; Sun, 16 Jul 2023 17:53:57 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 05F7E8D0001; Sun, 16 Jul 2023 17:53:56 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id EC4A36B0083 for ; Sun, 16 Jul 2023 17:53:56 -0400 (EDT) Received: from smtpin17.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id C9D1EA0275 for ; Sun, 16 Jul 2023 21:53:56 +0000 (UTC) X-FDA: 81018828072.17.1AF329F Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf03.hostedemail.com (Postfix) with ESMTP id 036B72000C for ; Sun, 16 Jul 2023 21:53:54 +0000 (UTC) Authentication-Results: imf03.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=fE04IcJ7; spf=pass (imf03.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1689544435; a=rsa-sha256; cv=none; b=CkYQ0ifuGLxwLKBMJJevIWYw05Fgl0LONSglnhVpwT2M9ec1BAdsfPuiiZii/UsH9+LQT9 vRTpYi6atGWVzi2F36W6wLteSiTnxqmoiC9VuGmCilOyTi0O1SbEtTxSoGLBpBeZB8RxZ7 luYr5zaViCuMSn+ZqMmdoS8sEkG7aes= ARC-Authentication-Results: i=1; imf03.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=fE04IcJ7; spf=pass (imf03.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1689544435; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=Dnc2nP1HVaiEDoBVg12zB7TbohL1GVCNMw7SaItQG9I=; b=mYrQIB2OiwFMslTIIG7pcyW3srti2mDavk2LSuJ2rIEZBrzRVfQiO6u8DhAh4TFLDBuNfk mNAjdxZZGNodvlj7ZtcgghdpN41kt4DkdQHDKmD1tL3q26X3rKgeoMPq9s8iqNvY2o+WgA qrHjaR9N3XXDx3vzHlMTR08LvbRZCMo= Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4085760EC4; Sun, 16 Jul 2023 21:53:52 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id F1959C433C8; Sun, 16 Jul 2023 21:53:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689544431; bh=BgZhQzy1ZDJ87SbUj0QMsK2M0tcAHYl7N7+4HCzYWRs=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=fE04IcJ78ZQnPaQ3Ay8Qv97lmyNvNGnu+scPqJDRUrC+f2FW8HVBB+nAVXt6SuF4n wEiNofxMv5RUBs+gGJ/29J74O/wLqMmDNeroBCueNjPZFvW8Fb4xFf/WF9B28jb6qi MmU+IdVfnXmbpses4PIle04Js9RHO2NYTDJIWnyjzG7O79o5Ms4XJR498cuPq5PFPY Hj9tTGfKREuZbiaZp0GshqhBO42hw8caAkGtRit75FB8FZaQZcN9zrLiDnID+dqhJO 5es9YsMc/nZVOHMisUM1s65ZHso3ph6f0J2f9enn1dSpHEHw9yrdsWeurL/k1UKuk1 BghW7jueDS0vA== From: Mark Brown Date: Sun, 16 Jul 2023 22:51:06 +0100 Subject: [PATCH 10/35] arm64/mm: Allocate PIE slots for EL0 guarded control stack MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20230716-arm64-gcs-v1-10-bf567f93bba6@kernel.org> References: <20230716-arm64-gcs-v1-0-bf567f93bba6@kernel.org> In-Reply-To: <20230716-arm64-gcs-v1-0-bf567f93bba6@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet , Andrew Morton , Marc Zyngier , Oliver Upton , James Morse , Suzuki K Poulose , Arnd Bergmann , Oleg Nesterov , Eric Biederman , Kees Cook , Shuah Khan , "Rick P. Edgecombe" , Deepak Gupta , Ard Biesheuvel , Szabolcs Nagy Cc: "H.J. Lu" , Paul Walmsley , Palmer Dabbelt , Albert Ou , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, Mark Brown X-Mailer: b4 0.13-dev-099c9 X-Developer-Signature: v=1; a=openpgp-sha256; l=2919; i=broonie@kernel.org; h=from:subject:message-id; bh=BgZhQzy1ZDJ87SbUj0QMsK2M0tcAHYl7N7+4HCzYWRs=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBktGaX/DeynJM1AQTo4tiA9qsSX7bFYQTdZophim53 cpiZhmKJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCZLRmlwAKCRAk1otyXVSH0FLNB/ 9VWyeSNh/ecavajLIFERLxhuP1AWliN0iMrCdq6gbiMcwO9CmD0XAbdiwUralUNgcM711Andu7rY0f YbGUReF+DooPBhY6noc45rkzMNqY2e/SwVlE0kxA3Iskf3B0dCiWSrHJwHxZ6twNdxZbeE9jsv2d29 oNXFtEEVPhRsG4ruMWG/CNdDlDwKLjCIXMc9nEA2wGjCS/nC7jvQklbYrTaTvAZhPeiI1Xs6vS7Zqb U+m0c+b/vGCsIglBljirMn5knwBxnvmKJjgaT+iBrMDZITNVDzMhc27c41jt1Pe2qcdcIVbljYjp+n d4WkF+gceF3YUsH3fRoFS/HBTDDW53 X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB X-Rspamd-Server: rspam08 X-Rspamd-Queue-Id: 036B72000C X-Stat-Signature: op7biehcqws7nwn7nci9ca395fzth9uu X-Rspam-User: X-HE-Tag: 1689544434-163095 X-HE-Meta: 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 vWOrXEsM Sj6C4ICCx3D7FQ2hUJUR54dVc7Uw9/doLQrTeaNl+5Bwo/VRawIlHYR6on3yEyRaEqqLho1k12qWNXohoOpguS86G/Z9CP7pyrPju9JxS9BXbsRaObVwcnF0lQW7veXBSB8u8S4RjwyUifF/sulMEaIYIWAgbRSj9shw8BWZt9YQk4Y0R7LQe7w9xCPCATH9ULH7axUZBku5+Fgu6beY33fvVqvg8eb7+8O8U3BN4W0f40Euy6sQGI3QbJQ9mGIkw3uZ7Tf0zzEl4ZoTYka+upywLPcEoLOAjaUG8Yf8sjG4RtH/BOlA30zQA+YGEO4eVk3UaV09j2zmdew7dXVuJb/IsUsae7BsFDno0RIaQGRmkBzklJl/0yVP/CQsmoyC1RRKj6Ca/VeTZLJXoTwSQs/r+bqo/5pEdjamGHxPBkdcaOGM= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Pages used for guarded control stacks need to be described to the hardware using the Permission Indirection Extension, GCS is not supported without PIE. In order to support copy on write for guarded stacks we allocate two values, one for active GCSs and one for GCS pages marked as read only prior to copy. Since the actual effect is defined using PIE the specific bit pattern used does not matter to the hardware but we choose two values which differ only in PTE_WRITE in order to help share code with non-PIE cases. Signed-off-by: Mark Brown --- arch/arm64/include/asm/pgtable-prot.h | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-) diff --git a/arch/arm64/include/asm/pgtable-prot.h b/arch/arm64/include/asm/pgtable-prot.h index eed814b00a38..b157ae0420ed 100644 --- a/arch/arm64/include/asm/pgtable-prot.h +++ b/arch/arm64/include/asm/pgtable-prot.h @@ -131,15 +131,23 @@ extern bool arm64_use_ng_mappings; /* 6: PTE_PXN | PTE_WRITE */ /* 7: PAGE_SHARED_EXEC PTE_PXN | PTE_WRITE | PTE_USER */ /* 8: PAGE_KERNEL_ROX PTE_UXN */ -/* 9: PTE_UXN | PTE_USER */ +/* 9: PAGE_GCS_RO PTE_UXN | PTE_USER */ /* a: PAGE_KERNEL_EXEC PTE_UXN | PTE_WRITE */ -/* b: PTE_UXN | PTE_WRITE | PTE_USER */ +/* b: PAGE_GCS PTE_UXN | PTE_WRITE | PTE_USER */ /* c: PAGE_KERNEL_RO PTE_UXN | PTE_PXN */ /* d: PAGE_READONLY PTE_UXN | PTE_PXN | PTE_USER */ /* e: PAGE_KERNEL PTE_UXN | PTE_PXN | PTE_WRITE */ /* f: PAGE_SHARED PTE_UXN | PTE_PXN | PTE_WRITE | PTE_USER */ +#define _PAGE_GCS (_PAGE_DEFAULT | PTE_UXN | PTE_WRITE | PTE_USER) +#define _PAGE_GCS_RO (_PAGE_DEFAULT | PTE_UXN | PTE_USER) + +#define PAGE_GCS __pgprot(_PAGE_GCS) +#define PAGE_GCS_RO __pgprot(_PAGE_GCS_RO) + #define PIE_E0 ( \ + PIRx_ELx_PERM(pte_pi_index(_PAGE_GCS), PIE_GCS) | \ + PIRx_ELx_PERM(pte_pi_index(_PAGE_GCS_RO), PIE_R) | \ PIRx_ELx_PERM(pte_pi_index(_PAGE_EXECONLY), PIE_X_O) | \ PIRx_ELx_PERM(pte_pi_index(_PAGE_READONLY_EXEC), PIE_RX) | \ PIRx_ELx_PERM(pte_pi_index(_PAGE_SHARED_EXEC), PIE_RWX) | \ @@ -147,6 +155,8 @@ extern bool arm64_use_ng_mappings; PIRx_ELx_PERM(pte_pi_index(_PAGE_SHARED), PIE_RW)) #define PIE_E1 ( \ + PIRx_ELx_PERM(pte_pi_index(_PAGE_GCS), PIE_RW) | \ + PIRx_ELx_PERM(pte_pi_index(_PAGE_GCS_RO), PIE_R) | \ PIRx_ELx_PERM(pte_pi_index(_PAGE_EXECONLY), PIE_NONE_O) | \ PIRx_ELx_PERM(pte_pi_index(_PAGE_READONLY_EXEC), PIE_R) | \ PIRx_ELx_PERM(pte_pi_index(_PAGE_SHARED_EXEC), PIE_RW) | \ -- 2.30.2