From patchwork Fri Oct 28 15:01:12 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 13023824 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 442C8C38A02 for ; Fri, 28 Oct 2022 15:07:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=JubRf7sKdb7oPCIpPkuFL/g/+/aCv1g6OQEyjoIX7to=; b=NNY3NaR/y2eC+Q W+5nJqLMkxweNmpQQnpbeMfarIS4hlPj3Bz9gUPweod1zZCL+jIJG2ggNGm2RYUELVxtwCsL8bvHH VYAoWemc0r8cW71u0BsjcFtSVA0+Dchb0ACSWvgPFcohdTwutUJbelOpcnKvKsunlwloDZ3qvC9pr gwAQYMpMDFxEOgGBRdJvZTlPGbgEebsSLV382cFOhvWoBxEwUKWYiDXh+91kftT0RvufZKubr/b16 YV8DUkGRQxohL1MxhMFiHMiS67t9D/8ACNrKEIKBBSvErTlVD7oWGT8ARd0mxDbuZq+8iuiXIfIsp NWBFH1cEUlqfAaRBqnYg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1ooQvZ-000NzN-VX; Fri, 28 Oct 2022 15:05:46 +0000 Received: from ams.source.kernel.org ([145.40.68.75]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1ooQrR-000M3J-Vw for linux-arm-kernel@lists.infradead.org; Fri, 28 Oct 2022 15:01:32 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id A3891B82A8A; Fri, 28 Oct 2022 15:01:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A8ADBC433D7; Fri, 28 Oct 2022 15:01:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1666969284; bh=dihYPMNuXKjQgsQD/+2B9Ye3RFiW8N8piXGZu0YF3YI=; h=From:To:Cc:Subject:Date:From; b=dmYW3xrPAs4mWmWZEkbz5LpwQ88qSDDVqkoAyJRw8nP6ddflLKYdZT0IJN6RfpP3o 6ACdUuFM3kObyKFVqH7c4TahtTESqbJWXSWu6yrLcHNqfsNyjTULS88PKk7ScLpFMF RNNtezC1xI6x/NOGn1EOBA519PXLda2ubWsMpKfoRgMcV6W61N2w3Uypuz50eneX21 2ZBkiktFd1LhyvrOk4fzye0c7AJnjaxzH3VEVs1z+3fzh5kA4D+fCRSiiCLycTFU/i 3RnTWio+vpX394qZyWAWQZtCAkLCfqLvWVEUDQX5eWn1UCEOOePoZar7HcTyeMQS9b 3nZGmBsu7VoKQ== From: Ard Biesheuvel To: linux-arm-kernel@lists.infradead.org Cc: linux-efi@vger.kernel.org, catalin.marinas@arm.com, will@kernel.org, mark.rutland@arm.com, maz@kernel.org, Ard Biesheuvel Subject: [PATCH] arm64: efi: Recover from synchronous exceptions occurring in firmware Date: Fri, 28 Oct 2022 17:01:12 +0200 Message-Id: <20221028150112.2883620-1-ardb@kernel.org> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=5757; i=ardb@kernel.org; h=from:subject; bh=dihYPMNuXKjQgsQD/+2B9Ye3RFiW8N8piXGZu0YF3YI=; b=owEB7QES/pANAwAKAcNPIjmS2Y8kAcsmYgBjW+63hlnXDVKFZbZXpgkUZ/sLOYyjrFGqcOCgXRUq yaFAqdqJAbMEAAEKAB0WIQT72WJ8QGnJQhU3VynDTyI5ktmPJAUCY1vutwAKCRDDTyI5ktmPJMLEC/ 9tbDE/9/ud7od97MIaGgkoYrvW33vL9qb/2MFXsn+7KEH3Jq6GQHH+Q0XFAzfGRZ1++oJpTMKp3IzY QOxO6LC+1Qfd++5BpxTU57p581f2EMVLk8w5ZXuFAHaRzWG8BkT3nC8jlo+nMUKLeEWz1TUQrIFPf4 7ekqin9NEFUsgyBmTrPWTMWYgHQ+MJ9BZaClA+bCTt6Apn31BHBW+UuqcMK92ZEYh0HeN+Jm3CjMQe LqyAVnGlI3+HHx/eRpU812Y9Wf9a/CbMqA+1cLEOuB9K7QJePPihKhVbBQyEhrRn5e79A0GpugcAfV DQ1eTNz/lkhkFALjqFon8JimMIU2ZBxpPEgb+QcJX7PJ3bNfzUQaFMxn4uYC+bFf/3xzG0jC0CtWQH XX2/WNoDXVsNb8+Vr2yBza3gTS2rCvlC+gqwPQNRhLKYVMYeYIIBTbL3AS37jL6SQTZ3WXceOhUDbk yuwLmu6WtybLC8URCymYV5d1I0r2r+3zfYZOu9FwrStpc= X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20221028_080130_372485_34522A06 X-CRM114-Status: GOOD ( 19.48 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Unlike x86, which has machinery to deal with page faults that occur during the execution of EFI runtime services, arm64 has nothing like that, and a synchronous exception raised by firmware code brings down the whole system. With more EFI based systems appearing that were not built to run Linux (such as the Windows-on-ARM laptops based on Qualcomm SOCs), as well as the introduction of PRM (platform specific firmware routines that are callable just like EFI runtime services), we are more likely to run into issues of this sort, and it is much more likely that we can identify and work around such issues if they don't bring down the system entirely. Since we already use a EFI runtime services call wrapper in assembler, we can quite easily add some code that captures the execution state at the point where the call is made, allowing us to revert to this state and proceed execution if the call triggered a synchronous exception. Given that the kernel and the firmware don't share any data structures that could end up in an indeterminate state, we can happily continue running, as long as we mark the EFI runtime services as unavailable from that point on. Signed-off-by: Ard Biesheuvel Acked-by: Catalin Marinas --- arch/arm64/include/asm/efi.h | 8 ++++++++ arch/arm64/kernel/efi-rt-wrapper.S | 33 ++++++++++++++++++++++++++++-- arch/arm64/kernel/efi.c | 26 +++++++++++++++++++++++ arch/arm64/mm/fault.c | 4 ++++ 4 files changed, 69 insertions(+), 2 deletions(-) diff --git a/arch/arm64/include/asm/efi.h b/arch/arm64/include/asm/efi.h index 439e2bc5d5d8..d6cf535d8352 100644 --- a/arch/arm64/include/asm/efi.h +++ b/arch/arm64/include/asm/efi.h @@ -14,8 +14,16 @@ #ifdef CONFIG_EFI extern void efi_init(void); + +bool efi_runtime_fixup_exception(struct pt_regs *regs, const char *msg); #else #define efi_init() + +static inline +bool efi_runtime_fixup_exception(struct pt_regs *regs, const char *msg) +{ + return false; +} #endif int efi_create_mapping(struct mm_struct *mm, efi_memory_desc_t *md); diff --git a/arch/arm64/kernel/efi-rt-wrapper.S b/arch/arm64/kernel/efi-rt-wrapper.S index 75691a2641c1..67babd5f04c2 100644 --- a/arch/arm64/kernel/efi-rt-wrapper.S +++ b/arch/arm64/kernel/efi-rt-wrapper.S @@ -6,7 +6,7 @@ #include SYM_FUNC_START(__efi_rt_asm_wrapper) - stp x29, x30, [sp, #-32]! + stp x29, x30, [sp, #-112]! mov x29, sp /* @@ -16,6 +16,20 @@ SYM_FUNC_START(__efi_rt_asm_wrapper) */ stp x1, x18, [sp, #16] + /* + * Preserve all callee saved registers and record the stack pointer + * value in a per-CPU variable so we can recover from synchronous + * exceptions occurring while running the firmware routines. + */ + stp x19, x20, [sp, #32] + stp x21, x22, [sp, #48] + stp x23, x24, [sp, #64] + stp x25, x26, [sp, #80] + stp x27, x28, [sp, #96] + + adr_this_cpu x8, __efi_rt_asm_recover_sp, x9 + str x29, [x8] + /* * We are lucky enough that no EFI runtime services take more than * 5 arguments, so all are passed in registers rather than via the @@ -31,7 +45,7 @@ SYM_FUNC_START(__efi_rt_asm_wrapper) ldp x1, x2, [sp, #16] cmp x2, x18 - ldp x29, x30, [sp], #32 + ldp x29, x30, [sp], #112 b.ne 0f ret 0: @@ -45,3 +59,18 @@ SYM_FUNC_START(__efi_rt_asm_wrapper) mov x18, x2 b efi_handle_corrupted_x18 // tail call SYM_FUNC_END(__efi_rt_asm_wrapper) + +SYM_FUNC_START(__efi_rt_asm_recover) + ldr_this_cpu x8, __efi_rt_asm_recover_sp, x9 + mov sp, x8 + + ldp x0, x18, [sp, #16] + ldp x19, x20, [sp, #32] + ldp x21, x22, [sp, #48] + ldp x23, x24, [sp, #64] + ldp x25, x26, [sp, #80] + ldp x27, x28, [sp, #96] + ldp x29, x30, [sp], #112 + + b efi_handle_runtime_exception +SYM_FUNC_END(__efi_rt_asm_recover) diff --git a/arch/arm64/kernel/efi.c b/arch/arm64/kernel/efi.c index e1be6c429810..7c1e62a20e1e 100644 --- a/arch/arm64/kernel/efi.c +++ b/arch/arm64/kernel/efi.c @@ -9,6 +9,7 @@ #include #include +#include #include @@ -128,3 +129,28 @@ asmlinkage efi_status_t efi_handle_corrupted_x18(efi_status_t s, const char *f) pr_err_ratelimited(FW_BUG "register x18 corrupted by EFI %s\n", f); return s; } + +asmlinkage DEFINE_PER_CPU(u64, __efi_rt_asm_recover_sp); + +asmlinkage efi_status_t __efi_rt_asm_recover(void); + +asmlinkage efi_status_t efi_handle_runtime_exception(const char *f) +{ + pr_err(FW_BUG "Fault occurred in EFI runtime service %s()\n", f); + clear_bit(EFI_RUNTIME_SERVICES, &efi.flags); + return EFI_ABORTED; +} + +bool efi_runtime_fixup_exception(struct pt_regs *regs, const char *msg) +{ + /* Check whether the exception occurred while running the firmware */ + if (current_work() != &efi_rts_work.work || regs->pc >= TASK_SIZE_64) + return false; + + pr_err(FW_BUG "Unable to handle %s in EFI runtime service\n", msg); + add_taint(TAINT_FIRMWARE_WORKAROUND, LOCKDEP_STILL_OK); + dump_stack(); + + regs->pc = (u64)__efi_rt_asm_recover; + return true; +} diff --git a/arch/arm64/mm/fault.c b/arch/arm64/mm/fault.c index 5b391490e045..3e9cf9826417 100644 --- a/arch/arm64/mm/fault.c +++ b/arch/arm64/mm/fault.c @@ -30,6 +30,7 @@ #include #include #include +#include #include #include #include @@ -391,6 +392,9 @@ static void __do_kernel_fault(unsigned long addr, unsigned long esr, msg = "paging request"; } + if (efi_runtime_fixup_exception(regs, msg)) + return; + die_kernel_fault(msg, addr, esr, regs); }