From patchwork Wed Dec 6 12:35:19 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Will Deacon X-Patchwork-Id: 120842 Delivered-To: patch@linaro.org Received: by 10.140.22.227 with SMTP id 90csp7003724qgn; Wed, 6 Dec 2017 04:40:44 -0800 (PST) X-Google-Smtp-Source: AGs4zMaSXq2aqwj5iiuo4ras1/83RqD4elcUDAvSQo2bSTLr9yZ9OmLT+arvDo4pt55Iyi5ERxsg X-Received: by 10.99.1.12 with SMTP id 12mr21069176pgb.257.1512564044090; Wed, 06 Dec 2017 04:40:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1512564044; cv=none; d=google.com; s=arc-20160816; b=eUf8nbviJzNKU668VKkKO70rxWcVx7mwwdUZvSRknzEJACAdY1XWoroArFMeMi8b/4 /eMw9y5kbw5rLTtyzWbQdqJl6Nw9oEQNheG73p4dzkBkniLhjdACviEhgilbFklxRkRH goM8XEsEmT5ABKUJ+FLVxyZzI5yLhhZmK0lB/ZKswke2T47WHTF2mzzEWgl57kYdE3lI 4kCYP+LM8NxGN1OKnZ2WdI+AvicxNefdpPSmri73JeANn7VnxeNmfCXWaLRWPLUH63GJ YvRTJHGPW1SDZbAJEYJUWivcWDthTpU1fvodgWIFvO0FySyso7F3hF/zvZRG5ytgaQkJ byjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:arc-authentication-results; bh=Qw2z4BVcW4dDnoUdF+86lpqNx98HDq0KQV+EAEhBwho=; b=gBYDak6w9HKwovJPtgjAn22sT6bMzXn6R8TXgJGAgpBuSEieGW8oiwF3XhBEoKKDJ3 v3FJw4tCEmTtQt2fLGY/EFdlIyzVDlSL+jCM62QdR9Ta7oKDEXxF/Qtk9pK8Y5VSFeg+ ke1/wHnBrOhag1fe0I9mokamHGV/jxNdOxO8Tid1/0j0KXj5QCtJcaERriHYktpv8tBK 3xD5E9uW38Ra2cBxGysqdnapjHX55lwfXu8T/U2Hz/XIKS/cEaqL+bEkUmMQNt1uAuvy /xloivlVY3UbWbjxQoNd9itKl0RCLmYlcihdjUQEWAS4cKpUbBvBaA8ohzCPCNXomf+U ClZg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e76si2028435pfl.60.2017.12.06.04.40.43; Wed, 06 Dec 2017 04:40:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751748AbdLFMkm (ORCPT + 28 others); Wed, 6 Dec 2017 07:40:42 -0500 Received: from foss.arm.com ([217.140.101.70]:34594 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751852AbdLFMgK (ORCPT ); Wed, 6 Dec 2017 07:36:10 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 643571529; Wed, 6 Dec 2017 04:36:10 -0800 (PST) Received: from edgewater-inn.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 348273F236; Wed, 6 Dec 2017 04:36:10 -0800 (PST) Received: by edgewater-inn.cambridge.arm.com (Postfix, from userid 1000) id CB2901AE3564; Wed, 6 Dec 2017 12:36:15 +0000 (GMT) From: Will Deacon To: linux-arm-kernel@lists.infradead.org Cc: linux-kernel@vger.kernel.org, catalin.marinas@arm.com, mark.rutland@arm.com, ard.biesheuvel@linaro.org, sboyd@codeaurora.org, dave.hansen@linux.intel.com, keescook@chromium.org, msalter@redhat.com, labbott@redhat.com, tglx@linutronix.de, Will Deacon Subject: [PATCH v3 00/20] arm64: Unmap the kernel whilst running in userspace (KPTI) Date: Wed, 6 Dec 2017 12:35:19 +0000 Message-Id: <1512563739-25239-1-git-send-email-will.deacon@arm.com> X-Mailer: git-send-email 2.1.4 MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi everybody, This is version three of the patches formerly known as KAISER (♔). v1: http://lists.infradead.org/pipermail/linux-arm-kernel/2017-November/542751.html v2: http://lists.infradead.org/pipermail/linux-arm-kernel/2017-November/544817.html Changes since v2 include: * Rename command-line option from "kaiser=" to "kpti=" for parity with x86 * Fixed Falkor erratum workaround (missing '~') * Moved vectors base from literal pool into separate data page * Added TTBR_ASID_MASK instead of open-coded constants * Added missing newline to error message * Fail to probe SPE if KPTI is enabled * Addressed minor review comments * Added tags * Based on -rc2 Patches are also pushed here: git://git.kernel.org/pub/scm/linux/kernel/git/will/linux.git kpti Feedback and testing welcome. At this point, I'd like to start thinking about getting this merged for 4.16. Cheers, Will --->8 Will Deacon (20): arm64: mm: Use non-global mappings for kernel space arm64: mm: Temporarily disable ARM64_SW_TTBR0_PAN arm64: mm: Move ASID from TTBR0 to TTBR1 arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003 arm64: mm: Rename post_ttbr0_update_workaround arm64: mm: Fix and re-enable ARM64_SW_TTBR0_PAN arm64: mm: Allocate ASIDs in pairs arm64: mm: Add arm64_kernel_unmapped_at_el0 helper arm64: mm: Invalidate both kernel and user ASIDs when performing TLBI arm64: entry: Add exception trampoline page for exceptions from EL0 arm64: mm: Map entry trampoline into trampoline and kernel page tables arm64: entry: Explicitly pass exception level to kernel_ventry macro arm64: entry: Hook up entry trampoline to exception vectors arm64: erratum: Work around Falkor erratum #E1003 in trampoline code arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks arm64: entry: Add fake CPU feature for unmapping the kernel at EL0 arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0 perf: arm_spe: Fail device probe when arm64_kernel_unmapped_at_el0() arm64: mm: Introduce TTBR_ASID_MASK for getting at the ASID in the TTBR arm64: kaslr: Put kernel vectors address in separate data page arch/arm64/Kconfig | 30 +++-- arch/arm64/include/asm/asm-uaccess.h | 26 ++-- arch/arm64/include/asm/assembler.h | 27 +---- arch/arm64/include/asm/cpucaps.h | 3 +- arch/arm64/include/asm/fixmap.h | 5 + arch/arm64/include/asm/kernel-pgtable.h | 12 +- arch/arm64/include/asm/mmu.h | 11 ++ arch/arm64/include/asm/mmu_context.h | 9 +- arch/arm64/include/asm/pgtable-hwdef.h | 1 + arch/arm64/include/asm/pgtable-prot.h | 21 +++- arch/arm64/include/asm/pgtable.h | 1 + arch/arm64/include/asm/proc-fns.h | 6 - arch/arm64/include/asm/tlbflush.h | 16 ++- arch/arm64/include/asm/uaccess.h | 21 +++- arch/arm64/kernel/asm-offsets.c | 6 +- arch/arm64/kernel/cpufeature.c | 41 +++++++ arch/arm64/kernel/entry.S | 203 +++++++++++++++++++++++++++----- arch/arm64/kernel/process.c | 12 +- arch/arm64/kernel/vmlinux.lds.S | 40 ++++++- arch/arm64/lib/clear_user.S | 2 +- arch/arm64/lib/copy_from_user.S | 2 +- arch/arm64/lib/copy_in_user.S | 2 +- arch/arm64/lib/copy_to_user.S | 2 +- arch/arm64/mm/cache.S | 2 +- arch/arm64/mm/context.c | 36 +++--- arch/arm64/mm/mmu.c | 31 +++++ arch/arm64/mm/proc.S | 12 +- arch/arm64/xen/hypercall.S | 2 +- drivers/perf/arm_spe_pmu.c | 9 ++ 29 files changed, 454 insertions(+), 137 deletions(-) -- 2.1.4 Tested-by: Laura Abbott