
commit 124c49b1b5d947b7180c5d6cbb09ddf76ea45ea2 upstream. Support for deprecated instructions can be enabled or disabled at runtime. To handle this, the code in armv8_deprecated.c registers and unregisters undef_hooks, and makes cross CPU calls to configure HW support. This is rather complicated, and the synchronization required to make this safe ends up serializing the handling of instructions which have been trapped. This patch simplifies the deprecated instruction handling by removing the dynamic registration and unregistration, and changing the trap handling code to determine whether a handler should be invoked. This removes the need for dynamic list management, and simplifies the locking requirements, making it possible to handle trapped instructions entirely in parallel. Where changing the emulation state requires a cross-call, this is serialized by locally disabling interrupts, ensuring that the CPU is not left in an inconsistent state. To simplify sysctl management, each insn_emulation is given a separate sysctl table, permitting these to be registered separately. The core sysctl code will iterate over all of these when walking sysfs. I've tested this with userspace programs which use each of the deprecated instructions, and I've concurrently modified the support level for each of the features back-and-forth between HW and emulated to check that there are no spurious SIGILLs sent to userspace when the support level is changed. Signed-off-by: Mark Rutland <mark.rutland@arm.com> Cc: Catalin Marinas <catalin.marinas@arm.com> Cc: James Morse <james.morse@arm.com> Cc: Joey Gouly <joey.gouly@arm.com> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Will Deacon <will@kernel.org> Link: https://lore.kernel.org/r/20221019144123.612388-10-mark.rutland@arm.com Signed-off-by: Will Deacon <will@kernel.org> Signed-off-by: Jinjie Ruan <ruanjinjie@huawei.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
103 lines
2.8 KiB
C++
103 lines
2.8 KiB
C++
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* Based on arch/arm/include/asm/traps.h
|
|
*
|
|
* Copyright (C) 2012 ARM Ltd.
|
|
*/
|
|
#ifndef __ASM_TRAP_H
|
|
#define __ASM_TRAP_H
|
|
|
|
#include <linux/list.h>
|
|
#include <asm/esr.h>
|
|
#include <asm/sections.h>
|
|
|
|
struct pt_regs;
|
|
|
|
#ifdef CONFIG_ARMV8_DEPRECATED
|
|
bool try_emulate_armv8_deprecated(struct pt_regs *regs, u32 insn);
|
|
#else
|
|
static inline bool
|
|
try_emulate_armv8_deprecated(struct pt_regs *regs, u32 insn)
|
|
{
|
|
return false;
|
|
}
|
|
#endif /* CONFIG_ARMV8_DEPRECATED */
|
|
|
|
void force_signal_inject(int signal, int code, unsigned long address, unsigned int err);
|
|
void arm64_notify_segfault(unsigned long addr);
|
|
void arm64_force_sig_fault(int signo, int code, void __user *addr, const char *str);
|
|
void arm64_force_sig_mceerr(int code, void __user *addr, short lsb, const char *str);
|
|
void arm64_force_sig_ptrace_errno_trap(int errno, void __user *addr, const char *str);
|
|
|
|
/*
|
|
* Move regs->pc to next instruction and do necessary setup before it
|
|
* is executed.
|
|
*/
|
|
void arm64_skip_faulting_instruction(struct pt_regs *regs, unsigned long size);
|
|
|
|
static inline int __in_irqentry_text(unsigned long ptr)
|
|
{
|
|
return ptr >= (unsigned long)&__irqentry_text_start &&
|
|
ptr < (unsigned long)&__irqentry_text_end;
|
|
}
|
|
|
|
static inline int in_entry_text(unsigned long ptr)
|
|
{
|
|
return ptr >= (unsigned long)&__entry_text_start &&
|
|
ptr < (unsigned long)&__entry_text_end;
|
|
}
|
|
|
|
/*
|
|
* CPUs with the RAS extensions have an Implementation-Defined-Syndrome bit
|
|
* to indicate whether this ESR has a RAS encoding. CPUs without this feature
|
|
* have a ISS-Valid bit in the same position.
|
|
* If this bit is set, we know its not a RAS SError.
|
|
* If its clear, we need to know if the CPU supports RAS. Uncategorized RAS
|
|
* errors share the same encoding as an all-zeros encoding from a CPU that
|
|
* doesn't support RAS.
|
|
*/
|
|
static inline bool arm64_is_ras_serror(u32 esr)
|
|
{
|
|
WARN_ON(preemptible());
|
|
|
|
if (esr & ESR_ELx_IDS)
|
|
return false;
|
|
|
|
if (this_cpu_has_cap(ARM64_HAS_RAS_EXTN))
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
* Return the AET bits from a RAS SError's ESR.
|
|
*
|
|
* It is implementation defined whether Uncategorized errors are containable.
|
|
* We treat them as Uncontainable.
|
|
* Non-RAS SError's are reported as Uncontained/Uncategorized.
|
|
*/
|
|
static inline u32 arm64_ras_serror_get_severity(u32 esr)
|
|
{
|
|
u32 aet = esr & ESR_ELx_AET;
|
|
|
|
if (!arm64_is_ras_serror(esr)) {
|
|
/* Not a RAS error, we can't interpret the ESR. */
|
|
return ESR_ELx_AET_UC;
|
|
}
|
|
|
|
/*
|
|
* AET is RES0 if 'the value returned in the DFSC field is not
|
|
* [ESR_ELx_FSC_SERROR]'
|
|
*/
|
|
if ((esr & ESR_ELx_FSC) != ESR_ELx_FSC_SERROR) {
|
|
/* No severity information : Uncategorized */
|
|
return ESR_ELx_AET_UC;
|
|
}
|
|
|
|
return aet;
|
|
}
|
|
|
|
bool arm64_is_fatal_ras_serror(struct pt_regs *regs, unsigned int esr);
|
|
void __noreturn arm64_serror_panic(struct pt_regs *regs, u32 esr);
|
|
#endif
|