From patchwork Mon Dec 5 20:12:10 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 13065062 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 683B7C4332F for ; Mon, 5 Dec 2022 20:13:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-Id:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=ruxMY8V7tqtWaiY+UKukETQhL0RPWNVu0wN4VbhDfSY=; b=uaPRUNygxXSQOB nlSIpRLtyKW18dvIqFMbBy15P7EclDXEPMO16ZsII7+he8avwvW5dguUNklg2zvAIyvyQwK5FvI95 vmC0wZkcYVf81xcsSEtXAAIg/3M9F65mh3UgDCDssIPINfkBIO03xdt0KA9c5Ea32kVQYE2NGTPeM MD0OYvpu4ZUtDAQoGbLYBgm/UV0fLmSaWOsbZllTRDrcwrzue/bcO2TQjXYdyesC/QQekwG4oOe2g WksdmpofMtRd/Xt8V4B+1msLiSAJ5WXs+nBKDb1oFBrR+CDb7JL87NDdopdE4SfjsVfAdUwyYuq2S 6wV0rMxUnJszb2IMi7qg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1p2HpV-00A57G-DD; Mon, 05 Dec 2022 20:12:45 +0000 Received: from ams.source.kernel.org ([2604:1380:4601:e00::1]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1p2HpC-00A4dc-15 for linux-arm-kernel@lists.infradead.org; Mon, 05 Dec 2022 20:12:27 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 6DEBAB81216; Mon, 5 Dec 2022 20:12:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 78E55C433D6; Mon, 5 Dec 2022 20:12:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1670271143; bh=goSU823T86J6kjDXvEC7WqXZhLUmNmBC0euU4f+9sqs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pabG0PJoEcvA1GNYvmeWie0JzlyOvvYvjlMpOv1O+MZx+Fcj0h5TkDOVLsZbJLJlF bmUD7/Ll51YvT7DtXdlBLm6bIvTZfeloy/iLOZVoHm0O3rtzL6hzqMrvsP/JP6Rexx LMisBcF0NiGJvzG2PEMN6yrcDmMwsm4RPRGLOK0zdB5rI4rnguy1DMyNjI/xlpLIZG VmaygdjHbnho7Ig/rcofsV6CDmsma7lFPjmLQcTZ2gZmsBF/4JVpsT7eWWyEWOnws7 c8BXJc1bghpSk7UGQfk2G3keMyby4JUamptIgkTQUuH/gRfU6JFJcqTv62fH8oyvNP PkNSIbNTVZIdw== From: Ard Biesheuvel To: linux-efi@vger.kernel.org Cc: linux-arm-kernel@lists.infradead.org, will@kernel.org, catalin.marinas@arm.com, mark.rutland@arm.com, Ard Biesheuvel , Sami Tolvanen , Kees Cook Subject: [PATCH 2/2] arm64: efi: Recover from synchronous exceptions occurring in firmware Date: Mon, 5 Dec 2022 21:12:10 +0100 Message-Id: <20221205201210.463781-3-ardb@kernel.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20221205201210.463781-1-ardb@kernel.org> References: <20221205201210.463781-1-ardb@kernel.org> MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=6103; i=ardb@kernel.org; h=from:subject; bh=goSU823T86J6kjDXvEC7WqXZhLUmNmBC0euU4f+9sqs=; b=owEB7QES/pANAwAKAcNPIjmS2Y8kAcsmYgBjjlCZNXpWHY902aRBpsDx0WD587MJ0qaBcvGASIqi s6a+AGyJAbMEAAEKAB0WIQT72WJ8QGnJQhU3VynDTyI5ktmPJAUCY45QmQAKCRDDTyI5ktmPJEXjDA Cxjw9Hj4lduImg48FLjV21xlNgYnwOgZqEaZ8XrxM5aQqiNus3mMMI0IjaYlc9+rv3EAhcK57e9AFJ YY8WiIHJAufFtFnAPDBIqOdNJ+Vnqs4ZLFdhpzSj++bMI+MAQkTSlixKtSQKTWuoTQ2HE6MpNfYQX1 XZyH89ZaPvHx1kQYfMacsDO6lE3smrdMKvz1AR40vf9faTQ+97h6yh0arqLJM7/H31MYu7NxhqWmm2 0/QUPwvYe5z9ABhEqAMq9ktPFB7UJsCD8Qr1tU5Ei9UPLQ8b4q7SG6ogwxyNoyvW2CtC0uyuS8eVjV fXUWel0d69VjCApES2O3OhZcHj1Cdf935AOAA3AezZ6K/ADN2Jca5Ppm2GjjzB5I/NtZ5OMZ47DnHz 3j+G9EwM0eNMOlBmFFabjXImNobST9kVMUbrKBoT0oTDJdkCUdivXU4LkSkHa3NNgyPzokMLkqPKCT uCjOKgnC5W9hVsAhw0VHPOR2rZdXAoIEloyjPfhYRlYwQ= X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20221205_121226_408121_3C20118A X-CRM114-Status: GOOD ( 21.51 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Unlike x86, which has machinery to deal with page faults that occur during the execution of EFI runtime services, arm64 has nothing like that, and a synchronous exception raised by firmware code brings down the whole system. With more EFI based systems appearing that were not built to run Linux (such as the Windows-on-ARM laptops based on Qualcomm SOCs), as well as the introduction of PRM (platform specific firmware routines that are callable just like EFI runtime services), we are more likely to run into issues of this sort, and it is much more likely that we can identify and work around such issues if they don't bring down the system entirely. Since we already use a EFI runtime services call wrapper in assembler, we can quite easily add some code that captures the execution state at the point where the call is made, allowing us to revert to this state and proceed execution if the call triggered a synchronous exception. Given that the kernel and the firmware don't share any data structures that could end up in an indeterminate state, we can happily continue running, as long as we mark the EFI runtime services as unavailable from that point on. Signed-off-by: Ard Biesheuvel Acked-by: Catalin Marinas --- arch/arm64/include/asm/efi.h | 8 +++++ arch/arm64/kernel/efi-rt-wrapper.S | 31 ++++++++++++++++---- arch/arm64/kernel/efi.c | 22 ++++++++++++++ arch/arm64/mm/fault.c | 4 +++ drivers/firmware/efi/runtime-wrappers.c | 1 + 5 files changed, 61 insertions(+), 5 deletions(-) diff --git a/arch/arm64/include/asm/efi.h b/arch/arm64/include/asm/efi.h index 1c408ec3c8b3a883..31d13a6001df49c4 100644 --- a/arch/arm64/include/asm/efi.h +++ b/arch/arm64/include/asm/efi.h @@ -14,8 +14,16 @@ #ifdef CONFIG_EFI extern void efi_init(void); + +bool efi_runtime_fixup_exception(struct pt_regs *regs, const char *msg); #else #define efi_init() + +static inline +bool efi_runtime_fixup_exception(struct pt_regs *regs, const char *msg) +{ + return false; +} #endif int efi_create_mapping(struct mm_struct *mm, efi_memory_desc_t *md); diff --git a/arch/arm64/kernel/efi-rt-wrapper.S b/arch/arm64/kernel/efi-rt-wrapper.S index b2786b968fee68dd..ee0c6c719ab573b7 100644 --- a/arch/arm64/kernel/efi-rt-wrapper.S +++ b/arch/arm64/kernel/efi-rt-wrapper.S @@ -6,7 +6,7 @@ #include SYM_FUNC_START(__efi_rt_asm_wrapper) - stp x29, x30, [sp, #-32]! + stp x29, x30, [sp, #-112]! mov x29, sp /* @@ -16,11 +16,20 @@ SYM_FUNC_START(__efi_rt_asm_wrapper) */ stp x1, x18, [sp, #16] + /* + * Preserve all callee saved registers and record the stack pointer + * value in a per-CPU variable so we can recover from synchronous + * exceptions occurring while running the firmware routines. + */ + stp x19, x20, [sp, #32] + stp x21, x22, [sp, #48] + stp x23, x24, [sp, #64] + stp x25, x26, [sp, #80] + stp x27, x28, [sp, #96] + ldr_l x16, efi_rt_stack_top mov sp, x16 -#ifdef CONFIG_SHADOW_CALL_STACK - str x18, [sp, #-16]! -#endif + stp x18, x29, [sp, #-16]! /* * We are lucky enough that no EFI runtime services take more than @@ -38,7 +47,7 @@ SYM_FUNC_START(__efi_rt_asm_wrapper) mov sp, x29 ldp x1, x2, [sp, #16] cmp x2, x18 - ldp x29, x30, [sp], #32 + ldp x29, x30, [sp], #112 b.ne 0f ret 0: @@ -56,3 +65,15 @@ SYM_FUNC_START(__efi_rt_asm_wrapper) b efi_handle_corrupted_x18 // tail call SYM_FUNC_END(__efi_rt_asm_wrapper) + +SYM_CODE_START(__efi_rt_asm_recover) + mov sp, x30 + + ldp x19, x20, [sp, #32] + ldp x21, x22, [sp, #48] + ldp x23, x24, [sp, #64] + ldp x25, x26, [sp, #80] + ldp x27, x28, [sp, #96] + ldp x29, x30, [sp], #112 + ret +SYM_CODE_END(__efi_rt_asm_recover) diff --git a/arch/arm64/kernel/efi.c b/arch/arm64/kernel/efi.c index 8cb2e005f8aca589..0169a669fde7544f 100644 --- a/arch/arm64/kernel/efi.c +++ b/arch/arm64/kernel/efi.c @@ -149,6 +149,28 @@ DEFINE_SPINLOCK(efi_rt_lock); asmlinkage u64 *efi_rt_stack_top __ro_after_init; +asmlinkage efi_status_t __efi_rt_asm_recover(void); + +bool efi_runtime_fixup_exception(struct pt_regs *regs, const char *msg) +{ + /* Check whether the exception occurred while running the firmware */ + if (current_work() != &efi_rts_work.work || regs->pc >= TASK_SIZE_64) + return false; + + pr_err(FW_BUG "Unable to handle %s in EFI runtime service\n", msg); + add_taint(TAINT_FIRMWARE_WORKAROUND, LOCKDEP_STILL_OK); + clear_bit(EFI_RUNTIME_SERVICES, &efi.flags); + + regs->regs[0] = EFI_ABORTED; + regs->regs[30] = efi_rt_stack_top[-1]; + regs->pc = (u64)__efi_rt_asm_recover; + + if (IS_ENABLED(CONFIG_SHADOW_CALL_STACK)) + regs->regs[18] = efi_rt_stack_top[-2]; + + return true; +} + /* required by the EFI spec */ static_assert(THREAD_SIZE >= SZ_8K); diff --git a/arch/arm64/mm/fault.c b/arch/arm64/mm/fault.c index 5b391490e045be91..3e9cf9826417a434 100644 --- a/arch/arm64/mm/fault.c +++ b/arch/arm64/mm/fault.c @@ -30,6 +30,7 @@ #include #include #include +#include #include #include #include @@ -391,6 +392,9 @@ static void __do_kernel_fault(unsigned long addr, unsigned long esr, msg = "paging request"; } + if (efi_runtime_fixup_exception(regs, msg)) + return; + die_kernel_fault(msg, addr, esr, regs); } diff --git a/drivers/firmware/efi/runtime-wrappers.c b/drivers/firmware/efi/runtime-wrappers.c index f3e54f6616f02475..7feee3d9c2bfbeec 100644 --- a/drivers/firmware/efi/runtime-wrappers.c +++ b/drivers/firmware/efi/runtime-wrappers.c @@ -83,6 +83,7 @@ struct efi_runtime_work efi_rts_work; else \ pr_err("Failed to queue work to efi_rts_wq.\n"); \ \ + WARN_ON_ONCE(efi_rts_work.status == EFI_ABORTED); \ exit: \ efi_rts_work.efi_rts_id = EFI_NONE; \ efi_rts_work.status; \