Message ID | 20241001-arm64-gcs-v13-6-222b78d87eee@kernel.org (mailing list archive) |
---|---|
State | New |
Headers | show
Return-Path: <owner-linux-mm@kvack.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 297F4CF318B for <linux-mm@archiver.kernel.org>; Tue, 1 Oct 2024 23:01:10 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B1B6044014D; Tue, 1 Oct 2024 19:01:09 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id AA35668002B; Tue, 1 Oct 2024 19:01:09 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 9440D44014D; Tue, 1 Oct 2024 19:01:09 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 71D2E68002B for <linux-mm@kvack.org>; Tue, 1 Oct 2024 19:01:09 -0400 (EDT) Received: from smtpin20.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 2F95440E0D for <linux-mm@kvack.org>; Tue, 1 Oct 2024 23:01:09 +0000 (UTC) X-FDA: 82626555858.20.9EF29DE Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf14.hostedemail.com (Postfix) with ESMTP id 53DDC10001C for <linux-mm@kvack.org>; Tue, 1 Oct 2024 23:01:07 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=EwJEg0or; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf14.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1727823628; a=rsa-sha256; cv=none; b=wNE9YVzzfP8Dr9QEhfaNKEyIlb76U/yZw8K5TDNc2ds3UX00TTMrxKhmdlvrZw3MiyYpk8 uN7wKpLKD3AqMP1qpbxQbOKlJQiCMHs4cAnfAzgv/+hNweiPfx6nfXrAcDIRYzXsSu9QYn k4vTO7L/WbQuOPAQY4N2Rfsr082n9ac= ARC-Authentication-Results: i=1; imf14.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=EwJEg0or; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf14.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1727823628; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=KtmuWL5rPnJxunKis4r+zJuOmfs6tLevqw0vcnqTYxQ=; b=YnVlyepr2+x464KbKxWK6H2fWSP1qij6M1ufbduiQ72hLn6fd+BeEdpr1Wi/KP5qsinfjI Bf20lo9W4PQKdLnqMiGHjAqerFkNjMucLc1rgka6T41FFWYEdF2Xsu5TaJpeVe4jxBSPt7 fol0hop3PglN+Bsg1RH5OykNaHzyQKo= Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id 747F85C045E; Tue, 1 Oct 2024 23:01:02 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 676C2C4CEC6; Tue, 1 Oct 2024 23:00:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1727823666; bh=rOh4m4fj2wClbocRq0H+LpbzuLewpkO3M5BRFF5QA9g=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=EwJEg0ori93CigiLXfM5nzkzTLmGWgRtXKjPULKcnBgukqJz6P6ymcuAN6ht2YaRy wgamKhoUMormn2N+/htgu2VlgVf0uTQ1ITD9QDL6rB+P/kcQjVFPWhXZWaet1ichPB jwEKXZw4fQuWgLCXpPH+LjAXYH3cWDylFR4MTG95fkh3MPrYsKP06PotNeH2zId6oP uMEww4ujLpbVwMP3AsRdLcu4O2epXPKu6DVSY/UoUX6Y8yOIrjQvEpw0NYbMNA7sA2 PJO1XQACz4QGYf0EaHCYle2qPWNV7t7Ih98KnqImQyQFZMqQEiY9KEOZW9LZtwjalp KYIHKmBb8YxKg== From: Mark Brown <broonie@kernel.org> Date: Tue, 01 Oct 2024 23:58:45 +0100 Subject: [PATCH v13 06/40] arm64: Document boot requirements for Guarded Control Stacks MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20241001-arm64-gcs-v13-6-222b78d87eee@kernel.org> References: <20241001-arm64-gcs-v13-0-222b78d87eee@kernel.org> In-Reply-To: <20241001-arm64-gcs-v13-0-222b78d87eee@kernel.org> To: Catalin Marinas <catalin.marinas@arm.com>, Will Deacon <will@kernel.org>, Jonathan Corbet <corbet@lwn.net>, Andrew Morton <akpm@linux-foundation.org>, Marc Zyngier <maz@kernel.org>, Oliver Upton <oliver.upton@linux.dev>, James Morse <james.morse@arm.com>, Suzuki K Poulose <suzuki.poulose@arm.com>, Arnd Bergmann <arnd@arndb.de>, Oleg Nesterov <oleg@redhat.com>, Eric Biederman <ebiederm@xmission.com>, Shuah Khan <shuah@kernel.org>, "Rick P. Edgecombe" <rick.p.edgecombe@intel.com>, Deepak Gupta <debug@rivosinc.com>, Ard Biesheuvel <ardb@kernel.org>, Szabolcs Nagy <Szabolcs.Nagy@arm.com>, Kees Cook <kees@kernel.org> Cc: "H.J. Lu" <hjl.tools@gmail.com>, Paul Walmsley <paul.walmsley@sifive.com>, Palmer Dabbelt <palmer@dabbelt.com>, Albert Ou <aou@eecs.berkeley.edu>, Florian Weimer <fweimer@redhat.com>, Christian Brauner <brauner@kernel.org>, Thiago Jung Bauermann <thiago.bauermann@linaro.org>, Ross Burton <ross.burton@arm.com>, David Spickett <david.spickett@arm.com>, Yury Khrustalev <yury.khrustalev@arm.com>, Wilco Dijkstra <wilco.dijkstra@arm.com>, linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, Mark Brown <broonie@kernel.org> X-Mailer: b4 0.15-dev-99b12 X-Developer-Signature: v=1; a=openpgp-sha256; l=2380; i=broonie@kernel.org; h=from:subject:message-id; bh=rOh4m4fj2wClbocRq0H+LpbzuLewpkO3M5BRFF5QA9g=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBm/H7I9yk8ghsLdqny2ZV4YER/rGKDoJ0hQxESLaXj e/jW+b6JATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCZvx+yAAKCRAk1otyXVSH0PQcB/ 9/5WoMr0iRfMQ6yNpxH+5BewveQcTTMADtDGZU0k/TPNq9rE3ncWHNxGcjO5lTOdD/EjuYj9w5bEib ie+7XUaGRkJxY29dQJM2fqh9IiDAAoMvM+M9HZzbBonZb0bOU+7VmrkMeOrSR4lCJC6G4P5Ihl5IHb Mad5JNsK7tZaGyxdxnDfBJ1yX3zPURMe+mQYJosdDYot7KoZtGajfg37krRbknWsjD1onnxwYUObrb f5er9ZMlomZ3/7/BsXHsZBpV6lW/DjF7b64sbPvl06kGHxPhZ+slMQUCDMqXOnrfaJaYXc8c5z/cru 3oB24kM87Df0vSL96ajkVILRkQxWGg X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB X-Rspam-User: X-Rspamd-Queue-Id: 53DDC10001C X-Rspamd-Server: rspam01 X-Stat-Signature: 8ytzjd6nf6om6nonjs6q885hybraq171 X-HE-Tag: 1727823667-130287 X-HE-Meta: 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 yvKjl2Bb qCskAEZ4QdDifDoEHaqDLsxD+Yokfw3M3kPrd6fgfNqxJUQ9D1oUYdUVKzOIXxvBBqUv0JGjkwNcyESPJzLWBJxMEuGScf7NFv/RIIvEgRsCI2+TnvMOAx++SuphPb1i7q8hDi3XQgVjCwYF7mQYycWv+z07wGEgm9psoV9ov0czSW35Bd/5jAWTp5xpkpX5Vpr3CVMKonUnaHV+GvOuo3Gffaj/OmK7LM8Lx92quI3pGqMz/7tzmLqXsaO5IU0yD++623H9yDEiixui4J+KwoZ+baEm1UYP4CTlc6CLky5ILxpL/P5sfkdnRs+mE6Hrp+krY1439DOnghokochC5kkcrcUWdgmof8uAFmtjEg9JUMrvm1F46yBm8u5haCB0fwlWKpSoUpIxgzPSIyZwkgvH619788LBcWVGYmET9Q0sdpZFqqeJ946Kd3Q== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: <linux-mm.kvack.org> List-Subscribe: <mailto:majordomo@kvack.org> List-Unsubscribe: <mailto:majordomo@kvack.org> |
Series |
arm64/gcs: Provide support for GCS in userspace
|
expand
|
diff --git a/Documentation/arch/arm64/booting.rst b/Documentation/arch/arm64/booting.rst index b57776a68f15..aed6e9f47cf3 100644 --- a/Documentation/arch/arm64/booting.rst +++ b/Documentation/arch/arm64/booting.rst @@ -411,6 +411,38 @@ Before jumping into the kernel, the following conditions must be met: - HFGRWR_EL2.nPIRE0_EL1 (bit 57) must be initialised to 0b1. + - For CPUs with Guarded Control Stacks (FEAT_GCS): + + - GCSCR_EL1 must be initialised to 0. + + - GCSCRE0_EL1 must be initialised to 0. + + - If EL3 is present: + + - SCR_EL3.GCSEn (bit 39) must be initialised to 0b1. + + - If EL2 is present: + + - GCSCR_EL2 must be initialised to 0. + + - If the kernel is entered at EL1 and EL2 is present: + + - HCRX_EL2.GCSEn must be initialised to 0b1. + + - HFGITR_EL2.nGCSEPP (bit 59) must be initialised to 0b1. + + - HFGITR_EL2.nGCSSTR_EL1 (bit 58) must be initialised to 0b1. + + - HFGITR_EL2.nGCSPUSHM_EL1 (bit 57) must be initialised to 0b1. + + - HFGRTR_EL2.nGCS_EL1 (bit 53) must be initialised to 0b1. + + - HFGRTR_EL2.nGCS_EL0 (bit 52) must be initialised to 0b1. + + - HFGWTR_EL2.nGCS_EL1 (bit 53) must be initialised to 0b1. + + - HFGWTR_EL2.nGCS_EL0 (bit 52) must be initialised to 0b1. + The requirements described above for CPU mode, caches, MMUs, architected timers, coherency and system registers apply to all CPUs. All CPUs must enter the kernel in the same exception level. Where the values documented