From patchwork Tue Nov 8 18:21:57 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 13036685 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id CA7B9C4332F for ; Tue, 8 Nov 2022 18:23:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=gm9EuJ0wAUkCZf5YxWJMH5YtJprFqkfGdtD5GhWiMIk=; b=EprXrKmpwWVj8K KNhi/Bwn7nZq2IFB/4EUM1dL1qtUZwLAEIXpaRL+SFtHQf+1vcFQcUi7v8jZCfR/sSnZDngoB0+MD 76zSnpW7kBMr+F+jZggMauZShanz2OBX/ixmNxgfAyaPiSnd9TmQEkKQAdh9x8uskY2sevSnCwB7z Jbifh9VifdRuggmFtnFtBEalOxuMeRzPkkbPeIidYDR4GT/tjrJvUaKef8qpWvvEiyBvM7u6/VmN6 3fRVphCyuyISxlrt4egVLYULnyndz36F63QM1arvB+jCOltnjFUY/lG66m2bD9iPl1vzvEv/GHntI 1YRy+B00Q3eP/DIxGt9g==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1osTF0-007RZq-NW; Tue, 08 Nov 2022 18:22:31 +0000 Received: from sin.source.kernel.org ([145.40.73.55]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1osTEx-007RY7-4v for linux-arm-kernel@lists.infradead.org; Tue, 08 Nov 2022 18:22:28 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id 51DC1CE1C60; Tue, 8 Nov 2022 18:22:25 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id BC87DC433D6; Tue, 8 Nov 2022 18:22:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1667931743; bh=7KTOHQgQNiVS1k9MMhWHllX/ItO65TK+RnTvpa43MpM=; h=From:To:Cc:Subject:Date:From; b=oSjUmhIrBFHzTqCbkle/Uquc/h/HLjugfsMRVIApozVHZAGK45v9VGXWnhck0K0nU b6fyzG6q9mDgLvQuThwQmw3ROO5EbzPxVijtenpHQ+sjgRtSlhOyylQg4Bunkl0HsR rtigwuSmPJR602HhiAXD8VThH49WOPxkzkOecuqedpcosArPTB54k30GmlkUSCDYms nuZ9huMCYDjq14XV2o+FYiYPoo+zf7HI5qPubnbsbTFCMJLwVTlgYg6XZNDaIk44ap TN5QnJL9JPZw28z6YlYj75RgW0PkAuy2ddtMWGZJG3U79lD/sKn94FhzsUW5P+dGOl 8ovZ+D4HSc4aA== From: Ard Biesheuvel To: linux-arm-kernel@lists.infradead.org Cc: linux-efi@vger.kernel.org, keescook@chromium.org, Ard Biesheuvel , Will Deacon , Catalin Marinas , Marc Zyngier , Mark Rutland Subject: [PATCH v5 0/7] arm64: efi: leave MMU and caches on at boot Date: Tue, 8 Nov 2022 19:21:57 +0100 Message-Id: <20221108182204.2447664-1-ardb@kernel.org> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=2957; i=ardb@kernel.org; h=from:subject; bh=7KTOHQgQNiVS1k9MMhWHllX/ItO65TK+RnTvpa43MpM=; b=owEB7QES/pANAwAKAcNPIjmS2Y8kAcsmYgBjap4/7kf4dTo8ns7jXKIE3a0LqfmKE9PSUIguHZ3Z Mt4G9lyJAbMEAAEKAB0WIQT72WJ8QGnJQhU3VynDTyI5ktmPJAUCY2qePwAKCRDDTyI5ktmPJI/mC/ kBgDNf01cXFP2YZfyCk4pofdb1TfR3yHUrtpC4SAP0D1GFDcC2s7i55wXrIMGd582NGtu2vvRE7vKI u8t/Ac6+5zyP0AbUCTEg7Phz29Ddx7MOC1etbiV+oQhyrzzHYM0hdLBGw3xxeNCjVSw3y662RuBKtV I+gOoFFmWW4MU2L9xPG9YAudRZJDJhVEss+SDAGN723TFmY0OcZPvsI3aO3ERFPXdoyn8R8s25zxPf FZqz3EY1nSuZjBWSd7gBdZQtfqGb7XZ5pa8MRpTG4W1zXpM1m70dYUSbfMV8GzUrGqa2DujNGPPOhz nsOsbioroCwK96ODU173MqvuhX8tcU9n1AlDIGHrKaEJ0QLvv0TwvyKdct/W9wutGHKZG78GRCvVOB VXUgWEjmzZQW5fPYsgzrbEvL+saKMK29RRQbTAtbkDcFMsIHZOfjdNHmn7HuTjYRXs88ekLz7CSixZ OqAQz62ehoPVoNAjP5GYCQMdNTtWlIIIAIrJXOOJNgf3o= X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20221108_102227_554215_D91EA378 X-CRM114-Status: GOOD ( 18.53 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org The purpose of this series is to remove any explicit cache maintenance for coherency during early boot that becomes unnecessary if we simply retain the cacheable 1:1 mapping of all of system RAM provided by EFI, and use it to populate the ID map page tables. After setting up this preliminary ID map, we disable the MMU, drop to EL1, reprogram the MAIR, TCR and SCTLR registers as before, and proceed as usual, avoiding the need for any manipulations of memory while the MMU and caches are off. The only properties of the firmware provided 1:1 map we rely on is that it does not require any explicit cache maintenance for coherency, and that it covers the entire memory footprint of the image, including the BSS and padding at the end - all else is under control of the kernel itself, as before. Changes since v4: - add patch to align the callers of finalise_el2() - also clean HYP text to the PoC when booting at EL2 with the MMU on - add a warning and a taint when doing non-EFI boot with the MMU and caches enabled - rebase onto zboot changes in efi/next - this means that patches #6 and #7 will not apply onto arm64/for-next so a shared stable branch will be needed if we want to queue this up for v6.2 Changes since v3: - drop EFI_LOADER_CODE memory type patch that has been queued in the mean time - rebased onto [partial] series that moves efi-entry.S into the libstub/ source directory - fixed a correctness issue in patch #2 Cc: Will Deacon Cc: Catalin Marinas Cc: Marc Zyngier Cc: Mark Rutland Ard Biesheuvel (7): arm64: head: Move all finalise_el2 calls to after __enable_mmu arm64: kernel: move identity map out of .text mapping arm64: head: record the MMU state at primary entry arm64: head: avoid cache invalidation when entering with the MMU on arm64: head: Clean the ID map and the HYP text to the PoC if needed arm64: lds: reduce effective minimum image alignment to 64k efi: arm64: enter with MMU and caches enabled arch/arm64/include/asm/efi.h | 9 +- arch/arm64/kernel/head.S | 93 +++++++++++++++----- arch/arm64/kernel/image-vars.h | 5 +- arch/arm64/kernel/setup.c | 9 +- arch/arm64/kernel/sleep.S | 6 +- arch/arm64/kernel/vmlinux.lds.S | 13 ++- arch/arm64/mm/cache.S | 5 +- arch/arm64/mm/proc.S | 2 - drivers/firmware/efi/libstub/Makefile | 4 +- drivers/firmware/efi/libstub/arm64-entry.S | 67 -------------- drivers/firmware/efi/libstub/arm64-stub.c | 26 ++++-- drivers/firmware/efi/libstub/arm64.c | 41 +++++++-- include/linux/efi.h | 6 +- 13 files changed, 159 insertions(+), 127 deletions(-) delete mode 100644 drivers/firmware/efi/libstub/arm64-entry.S