From patchwork Mon Jul 24 12:45:52 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Brown X-Patchwork-Id: 13324625 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 30E4AC0015E for ; Mon, 24 Jul 2023 12:47:35 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id C5B2A6B007D; Mon, 24 Jul 2023 08:47:34 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id C0B1A6B007E; Mon, 24 Jul 2023 08:47:34 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id AD3178E0001; Mon, 24 Jul 2023 08:47:34 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id A103C6B007D for ; Mon, 24 Jul 2023 08:47:34 -0400 (EDT) Received: from smtpin02.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 62ADA1609A8 for ; Mon, 24 Jul 2023 12:47:34 +0000 (UTC) X-FDA: 81046481628.02.B73E29A Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf08.hostedemail.com (Postfix) with ESMTP id 5FAB4160003 for ; Mon, 24 Jul 2023 12:47:32 +0000 (UTC) Authentication-Results: imf08.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=ZzFz0xCh; spf=pass (imf08.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1690202852; a=rsa-sha256; cv=none; b=0IQSdsIm/lM6jQlcPqKzOIlZubjKvWm4LndqPMacmCpqY2KnphrJmE220Ya1hifTN9gIBe tSbVBwxoG/vitutkVwH2SOyQIVx1iXqJUBVtNNJYToh2hpOGMaozppqbwfRFicaemMNw7o UJI86orAIalR/YGNRkJ67P6UwdZeKFs= ARC-Authentication-Results: i=1; imf08.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=ZzFz0xCh; spf=pass (imf08.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1690202852; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=f1Fjfwmv9c20XNlM3MrDH4yBU8vPb3KKbDiNXIhVRLM=; b=Nf6pqIFz0Kx2VtqEj05i+8gHhABW3yBSmNLusq9eKrXW+LAVefBl63QyAUU+/aBQBz5f+q oSYF/r7GcKizei0x8PjICGQl7OyerHjZOt9Dv9Q/aCRcX0fjuzBCYHUcr4t833ovXAgsUH JjelkF8JzwD7A8m04nHtlM86+371SIw= Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8268C61158; Mon, 24 Jul 2023 12:47:31 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1F74BC433CC; Mon, 24 Jul 2023 12:47:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1690202850; bh=k6DV13RSkbr/e436II0jx5LmEFZf9bksk2EmOe6Nllo=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=ZzFz0xChocJigRyhckWkiGbMNFfgvUZ2aTY7UJZW67aba143TsIFJnYZGFLRCzhkV p4z1OLlrd2p3/IDbsMvOIuc4G27M5eFFqNUE88mw5fCDw6nCfdOq66e55crV8yHPMD qdXW5aoB/sbGf0Vsv3kEsbdgFZLT3axGgt6mCINcTiUED8LytKlGuFxIURRm2wOuy/ i+0WGPMA/T7XNJNFl/papK8Unr+ROqOxTls7IIv3WfrJp7flvnL0vUJl3UWa9a2VAd DerxdUFxwQ6DvVXiuvvdpOmzGStGtxsFNgfoEr41kZBf8F6KeU3NWDIOqGkGuTvl4z HJdQFug7WKl3Q== From: Mark Brown Date: Mon, 24 Jul 2023 13:45:52 +0100 Subject: [PATCH v2 05/35] arm64/sysreg: Add definitions for architected GCS caps MIME-Version: 1.0 Message-Id: <20230724-arm64-gcs-v2-5-dc2c1d44c2eb@kernel.org> References: <20230724-arm64-gcs-v2-0-dc2c1d44c2eb@kernel.org> In-Reply-To: <20230724-arm64-gcs-v2-0-dc2c1d44c2eb@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet , Andrew Morton , Marc Zyngier , Oliver Upton , James Morse , Suzuki K Poulose , Arnd Bergmann , Oleg Nesterov , Eric Biederman , Kees Cook , Shuah Khan , "Rick P. Edgecombe" , Deepak Gupta , Ard Biesheuvel , Szabolcs Nagy Cc: "H.J. Lu" , Paul Walmsley , Palmer Dabbelt , Albert Ou , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, Mark Brown X-Mailer: b4 0.13-dev-099c9 X-Developer-Signature: v=1; a=openpgp-sha256; l=1361; i=broonie@kernel.org; h=from:subject:message-id; bh=k6DV13RSkbr/e436II0jx5LmEFZf9bksk2EmOe6Nllo=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBkvnKK9YFEeNnB2LPFVrbzQw3UpaZONHZ1AlyTlpQc LjIPvO2JATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCZL5yigAKCRAk1otyXVSH0C1jCA CEu8W1gxLJnyqsAHY9nrXFKaQgsN3fIBVjMqPThPyUFGK3JkKj/xjTN4FLtLOcerA0mdaK/IrRrjmq 2SzkrXRwYFqUEgiH7+P6ndrDekxsrL/RkV5zWGwh7trg3vEYRcTxwTmqr0DrWyRocEHlCoNYjobCDp /8L+FUV80oiCeVHDab84OddNNzbe/ftHHu1HuxP8iARBpXIuOXeRBi3q6OS/+uyrVZlt5K9/a6hC7h qDFgoTiBL+EdZPqbu2VswHtcc+52XtaJnVzU5olM0oazxeLuuUghx87z1CVfw0uROEuBWRvmZJBuou tDkrJHz+RhOVB1WooSjah3wTHIK4Zz X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB X-Rspamd-Server: rspam08 X-Rspamd-Queue-Id: 5FAB4160003 X-Stat-Signature: 6mihy9te8787sb3k13aeqw8uhmqzyy9j X-Rspam-User: X-HE-Tag: 1690202852-691618 X-HE-Meta: U2FsdGVkX18oE1YaFi6DSRGOXNkvu9cRJtD7KqGk4UfcVEl+p1jpSwf+jA0LPKmaoZhQkRDKCRwrVWSXtF2YvK+Bm1EqWvgHLJAZDYxTjBY2V7yWTNALJae1WlJVNnSmNkhN26eDhuMbUUJktOstyQbLbzw2cm1ZpQWturuwutSQyIp5qWqBqNRk2DktLaFmzlnCtK+CVJ2A3HixECFqmPFB8S/TTX5Guf7zT8/Ga1WfhJ2Sdu4wUVPMN/AAAyKMgH73C7mdxqD0hGtgp69xZnEqqhaAcJpQLSY56mwCfL+hH6HBwhIYgPc0mtvZw9UZ1y+RngFE+nimpMNoksmLeNKkbgjm1/u+ZGvJ0ZfKQfTNSG6Du6VmRwzF10ksWdjyAVIo7odLwa1S+XbYrxGQeg5XLsbTDRkH55up/od5pDCaU0TxpbBA+0j7148lYq0/S/MnxRYFv4hQ2BQVD0uQBKNJTMzdiBZt6ww7z5hGh9VGw6aZ2lzg1dZMd1GNcRBBPGr+qYnomylSeuzfNCwa1jfxpV/wpMfKIom4RXVbxSlr+z2MIf/UnB6LLLT7CAZWGwZRPJ58qPHHoqaNoFFfj44Vcfu6vEIB2vXDWdW++r4qROJ379IMnKuyPfGMAbwxCt95ES0aUF/FWGgjwKGoy4aGq8tMwSFezYfd5X3vxrww1e0SG/biMz9WFFadOGkO1WktG5txkhrmYr+Du5LZNHNDGZD5tuQbKYExrBOgUIg6ouHsfBXn6DZXZTvi8Wc6X9TIkclINdEP976SnN3fNuTRnRIGc7YUMNENoFYZeT2Ci42FF7AWA3pdAN2hh6cu5KvADKm/wGubr1xrFpCuN9BmFCeM3d0M69kF7F63KGBN3TWls0t5wGui3gmILiQt0GQ9XXCk+JSYbDq4hXGM56/4Cr1sJS14cNdxOL/+9S+feyD8t71DjmrHR0AmAG7sdM7YoyAlDGjSWa/xJaY 0tSC+lyj BlAJHZi6Go/pkHFYPsmxOQ/aArcKgKXsuH1okthu9yR0Z4ei0NX5aafAGhtTkIybr34u5hDf3CSzpnLMcllV2JLsdDbNalD5qzUAbdz5vb7zhXASRssre+jXExmrTRh83sMUTT2gvd8FRXY3qVWZjAUw54QTxMFeV9+BEg/nPT185uDewhLKI6C/cflnNbjM7Vyklm0B2Q1ltfjLlCrsG2yguCYMWSPMPX7eMi5cytl5Lps8CNyCpGsUEp8lc22XSl7o/r5X0dCtaHkO8FZMR6wk5gTs3/yAvQA+I5AMcWXoUE+aWTEtS9bf9WD5lkhoEyU/0UpnO7CqBD0uKFbGWCnQqWvmblsJ7Gz2pzBCgJaeD7oIPuc7Au5Sl9ZDg8TXCSTN3ERl/ei9+dXuIIUMERYNbIIEshoeZdRj6/DjwFGl20YE= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: The architecture defines a format for guarded control stack caps, used to mark the top of an unused GCS in order to limit the potential for exploitation via stack switching. Add definitions associated with these. Signed-off-by: Mark Brown --- arch/arm64/include/asm/sysreg.h | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) diff --git a/arch/arm64/include/asm/sysreg.h b/arch/arm64/include/asm/sysreg.h index b481935e9314..3d7f9b25b8fb 100644 --- a/arch/arm64/include/asm/sysreg.h +++ b/arch/arm64/include/asm/sysreg.h @@ -730,6 +730,26 @@ #define PIRx_ELx_PERM(idx, perm) ((perm) << ((idx) * 4)) +/* + * Definitions for Guarded Control Stack + */ + +#define GCS_CAP_ADDR_MASK GENMASK(63, 12) +#define GCS_CAP_ADDR_SHIFT 12 +#define GCS_CAP_ADDR_WIDTH 52 +#define GCS_CAP_ADDR(x) FIELD_GET(GCS_CAP_ADDR_MASK, x) + +#define GCS_CAP_TOKEN_MASK GENMASK(11, 0) +#define GCS_CAP_TOKEN_SHIFT 0 +#define GCS_CAP_TOKEN_WIDTH 12 +#define GCS_CAP_TOKEN(x) FIELD_GET(GCS_CAP_TOKEN_MASK, x) + +#define GCS_CAP_VALID_TOKEN 0x1 +#define GCS_CAP_IN_PROGRESS_TOKEN 0x5 + +#define GCS_CAP(x) ((((unsigned long)x) & GCS_CAP_ADDR_MASK) | \ + GCS_CAP_VALID_TOKEN) + #define ARM64_FEATURE_FIELD_BITS 4 /* Defined for compatibility only, do not add new users. */