Message ID | 20230822-arm64-gcs-v5-3-9ef181dd6324@kernel.org (mailing list archive) |
---|---|
State | New |
Headers | show
Return-Path: <owner-linux-mm@kvack.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id A1DC8EE4993 for <linux-mm@archiver.kernel.org>; Tue, 22 Aug 2023 14:03:26 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id ED88828000E; Tue, 22 Aug 2023 10:03:25 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id EAF49900011; Tue, 22 Aug 2023 10:03:25 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id D294228000E; Tue, 22 Aug 2023 10:03:25 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id C200E900011 for <linux-mm@kvack.org>; Tue, 22 Aug 2023 10:03:25 -0400 (EDT) Received: from smtpin08.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 8ADECC037B for <linux-mm@kvack.org>; Tue, 22 Aug 2023 14:03:25 +0000 (UTC) X-FDA: 81151907970.08.F2B966B Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf04.hostedemail.com (Postfix) with ESMTP id 2E24440028 for <linux-mm@kvack.org>; Tue, 22 Aug 2023 14:03:22 +0000 (UTC) Authentication-Results: imf04.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=eHReH606; spf=pass (imf04.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1692713003; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=9EiokGlVijer87hj8YWJ1OH7aG1LYVUNBq6hLY0xJSc=; b=cqJkX4H2BMypBIk5ruYMo2Ntx/TlmJzyNfI3MbZP+XZiPZ/DWepAmdtFfHTemkcwWZr2vI 0V0WmzT10j078uDSI+9ri67YcuOBw6wE9NYfENmJqbquNR737PlIfJ3iiwahj83DBOKRDV Yk9TLW1WdF5PVwkFpbbodWqbgzL3p5c= ARC-Authentication-Results: i=1; imf04.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=eHReH606; spf=pass (imf04.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1692713003; a=rsa-sha256; cv=none; b=ACBNgzYhj3loHB5A8XJE3z0jCRwaeMb3zSuDkOPRFta6eWp27THxXmwQ4T8f9f2s0aUIb0 ORN7hkyCIA1HMqX3op9uJxdVtWAFQiCrg1bLIMjm2DsWeTL5xgVHB/k/hVAZOwQJWyKueN rISlEvDakej1b7fB7PAKgssUIwRo/vA= Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 522C065771; Tue, 22 Aug 2023 14:03:22 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id BE1C6C433BF; Tue, 22 Aug 2023 14:03:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1692713001; bh=Z3injfV8td0LqFLeGew+/6AX1Y4kpAJIpTs5MPlZTRs=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=eHReH606MpLs9WboH5th6rKpbf9I9vL5tswCQ5jkPZnrlZ7AfdBkZEkS27jO3R7bx 5ZhSqlGdPSJC1AnUBS7MXVB902vrcrbLcJb8Zs00juzWs8U2B9uroKHIOE2XLazJDB 9ztduMXB5WfJbuLkda4t+vqiMs7BW+1AzIAJmtbbCEjhJ0TTXVgUnX82gXhvfugmLm YI9QkNM8qRtoaHYJqpkc7ABdPfR/gXMZbXBjqgEQIIX2LUdiXLiA8unGNzfoXHuHgi JH9+It5iDHuis7w58rDW2X1NLSxdWaeHDoEPPNhW6w1o7G0KyABEoe6bevzgq1yKgc 4gymJqKuXWHFQ== From: Mark Brown <broonie@kernel.org> Date: Tue, 22 Aug 2023 14:56:36 +0100 Subject: [PATCH v5 03/37] arm64: Document boot requirements for Guarded Control Stacks MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20230822-arm64-gcs-v5-3-9ef181dd6324@kernel.org> References: <20230822-arm64-gcs-v5-0-9ef181dd6324@kernel.org> In-Reply-To: <20230822-arm64-gcs-v5-0-9ef181dd6324@kernel.org> To: Catalin Marinas <catalin.marinas@arm.com>, Will Deacon <will@kernel.org>, Jonathan Corbet <corbet@lwn.net>, Andrew Morton <akpm@linux-foundation.org>, Marc Zyngier <maz@kernel.org>, Oliver Upton <oliver.upton@linux.dev>, James Morse <james.morse@arm.com>, Suzuki K Poulose <suzuki.poulose@arm.com>, Arnd Bergmann <arnd@arndb.de>, Oleg Nesterov <oleg@redhat.com>, Eric Biederman <ebiederm@xmission.com>, Kees Cook <keescook@chromium.org>, Shuah Khan <shuah@kernel.org>, "Rick P. Edgecombe" <rick.p.edgecombe@intel.com>, Deepak Gupta <debug@rivosinc.com>, Ard Biesheuvel <ardb@kernel.org>, Szabolcs Nagy <Szabolcs.Nagy@arm.com> Cc: "H.J. Lu" <hjl.tools@gmail.com>, Paul Walmsley <paul.walmsley@sifive.com>, Palmer Dabbelt <palmer@dabbelt.com>, Albert Ou <aou@eecs.berkeley.edu>, linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, Mark Brown <broonie@kernel.org> X-Mailer: b4 0.13-dev-034f2 X-Developer-Signature: v=1; a=openpgp-sha256; l=1640; i=broonie@kernel.org; h=from:subject:message-id; bh=Z3injfV8td0LqFLeGew+/6AX1Y4kpAJIpTs5MPlZTRs=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBk5L/y2wEbbpTgwviy3ePcPDlfAKr3otxFttaAJqc3 Tzt7CWaJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCZOS/8gAKCRAk1otyXVSH0B2qB/ 4qKUbrZgSkHAikeSJ1Q2Qe1JgckUv+ylVkQAlJsM1vP5WJ/a19okUM0dEMBFMGSGk3GgdMvYp0/VLz TCQvGYwMn/AVD/JLwjPUxPaqP9vTmCgGF11MYh/GcBQEQmxOws0ARr0ENRppRs5aWzbv6t4VnX9Ua/ 8Qdd6hJmWNLCq5c/j3w2ac+x5kgbxD/Nfi3tQZDxYWNSI9wl/EizR/OsLEl+/3QHhujqe5uICYT7Do bbkKtzB5gZ799TXD+6mIE+hNkWybR2WWc60wzSw29JJNl/QY7MjwD8MYb6RTZj8PlOmK/HL1dngSgU GWNFr6ziyz/26uENbCyBe8KQYcV+BV X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB X-Rspamd-Queue-Id: 2E24440028 X-Rspam-User: X-Stat-Signature: awbniqo63wjapntfseafojf48b1b99ju X-Rspamd-Server: rspam01 X-HE-Tag: 1692713002-572287 X-HE-Meta: U2FsdGVkX1/opFTwSgIZxlDtI44GOmrInT+dyinje421X0xjnLeLroJR3F5obxvDpgYaYzG63VbGv53BYCmes0CffEAT0MBmdsIRWWR6yjqvqmv1kz0cKp04jTeDEnV+gVCMUqHFpkuL5FdahKnxVHuFVdUSxbWkyiteZOgPGnRJ44OftTra5qYY6+1biEX1Zy2wDUhy+UNtaOb6hba0lAOK1htr03IfeH83tDoxiqWvfHXv1gc6Nj/9f1fPlz40FeNsl5K/hIvHiw6g/t7ZC+8FNwA6za/Y6pnHt42/agG9KgLzdHB/RuXbmgJ23vzA/9KCSKI7/mXnGZIhDaYy+oGLFha5wdardgLfA/DGYrBuAh7EZTb4FqTnw45lCcSYNzm7iKqxGGUCNHTomEAGqh+xCxAjydZEkiH5Dm6Wniy7GyDktE4RSLgdKYnEfJLMYKSL1rW2I0Z/gPc1ejzhoton8Y11CV43Xy4H8vacpSGl0BaH8cY4cqkjBUj+2+6LsYcKOEaTctR20j76PB8oHK7VqyHW2dFWJQb4kRJnOTsag1XwaT3w5BXyGlews/vSbneeSxpl4Z8Olpfuc2yNfPhMSyBKk4t8UNr3hKYbGTA8Yj1ZgGfqD9DcSQJZzt0IUuTm0SB6AwWQoQ9AGW5MHPrQBHfJ9iuPD18S8E5yPj99axauvNNcR7WfdQnTt8W3xhSl3OERbE4iVpYaUKa8ZKt3u4ZCy0XH/AgiZpcX4Entm7CSdU3UfDIsDnrceeqqPwG41wzjnlr1KO/r9h+j7s+ZfbXeKQOHTef+WQnAM3VXUkrN8gYPmkaWPnh3cakWurtCQtjXuINuNxd+5B29AgZDCZDTffJHQNotbyCXVIGHStkZw26igdM7rsZ2vrhHk6xtZJ/tuOAAh3r3O+npU5CMlKgUkFFN0tg74cuB/afRc/39YLJ24tEFEL7hSp+qtGe3sW68EqYGgBEc4Hv 2nPwwewl jwdl4lux9WDSJVBSUvbw3hWNBBnuYTD26WFCnfhskTz9wrG0NioAPGfbBjsojilztahtWr8tXPJiiRk7fJzqI2iWeUgubbT3QmNQ+/CVoWbIQbaQElnA8f46+ycfzfBGIXvYQ6WdPqnehYFBYCf5/a2yf4cfQAt2ShVEDaZh55vj3amh/VVo5mojUfj6BssUQMxYzzsOzawNGrsvxJ3xMByTTl7tFHK4ekn7D7nYMR7AN2jnvAodSYOCVAnyhTXTOeZ7RC17lLnKweB8ka8GkFRVDSgldmTvAieK6dGwd40SFrHEZ0tZNXTDi009ojcc6rNQQdVTPMXL5CAH14ExH+sfF/D2F4Xb6PXfqcsUiOmZETrkTbkuEETAHSW1Axw6t+aPGW71EI/GKIFrEdPsjWGfnfeP3+uWKP0eA3kzMJat7gU4= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: <linux-mm.kvack.org> |
Series |
arm64/gcs: Provide support for GCS in userspace
|
expand
|
diff --git a/Documentation/arch/arm64/booting.rst b/Documentation/arch/arm64/booting.rst index b57776a68f15..de3679770c64 100644 --- a/Documentation/arch/arm64/booting.rst +++ b/Documentation/arch/arm64/booting.rst @@ -411,6 +411,28 @@ Before jumping into the kernel, the following conditions must be met: - HFGRWR_EL2.nPIRE0_EL1 (bit 57) must be initialised to 0b1. + - For features with Guarded Control Stacks (FEAT_GCS): + + - If EL3 is present: + + - SCR_EL3.GCSEn (bit 39) must be initialised to 0b1. + + - If the kernel is entered at EL1 and EL2 is present: + + - HFGITR_EL2.nGCSEPP (bit 59) must be initialised to 0b1. + + - HFGITR_EL2.nGCSSTR_EL1 (bit 58) must be initialised to 0b1. + + - HFGITR_EL2.nGCSPUSHM_EL1 (bit 57) must be initialised to 0b1. + + - HFGRTR_EL2.nGCS_EL1 (bit 53) must be initialised to 0b1. + + - HFGRTR_EL2.nGCS_EL0 (bit 52) must be initialised to 0b1. + + - HFGWTR_EL2.nGCS_EL1 (bit 53) must be initialised to 0b1. + + - HFGWTR_EL2.nGCS_EL0 (bit 52) must be initialised to 0b1. + The requirements described above for CPU mode, caches, MMUs, architected timers, coherency and system registers apply to all CPUs. All CPUs must enter the kernel in the same exception level. Where the values documented
FEAT_GCS introduces a number of new system registers, we require that access to these registers is not trapped when we identify that the feature is detected. Signed-off-by: Mark Brown <broonie@kernel.org> --- Documentation/arch/arm64/booting.rst | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+)