mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-25 23:05:23 +07:00
533b220f7b
- Branch Target Identification (BTI) * Support for ARMv8.5-BTI in both user- and kernel-space. This allows branch targets to limit the types of branch from which they can be called and additionally prevents branching to arbitrary code, although kernel support requires a very recent toolchain. * Function annotation via SYM_FUNC_START() so that assembly functions are wrapped with the relevant "landing pad" instructions. * BPF and vDSO updates to use the new instructions. * Addition of a new HWCAP and exposure of BTI capability to userspace via ID register emulation, along with ELF loader support for the BTI feature in .note.gnu.property. * Non-critical fixes to CFI unwind annotations in the sigreturn trampoline. - Shadow Call Stack (SCS) * Support for Clang's Shadow Call Stack feature, which reserves platform register x18 to point at a separate stack for each task that holds only return addresses. This protects function return control flow from buffer overruns on the main stack. * Save/restore of x18 across problematic boundaries (user-mode, hypervisor, EFI, suspend, etc). * Core support for SCS, should other architectures want to use it too. * SCS overflow checking on context-switch as part of the existing stack limit check if CONFIG_SCHED_STACK_END_CHECK=y. - CPU feature detection * Removed numerous "SANITY CHECK" errors when running on a system with mismatched AArch32 support at EL1. This is primarily a concern for KVM, which disabled support for 32-bit guests on such a system. * Addition of new ID registers and fields as the architecture has been extended. - Perf and PMU drivers * Minor fixes and cleanups to system PMU drivers. - Hardware errata * Unify KVM workarounds for VHE and nVHE configurations. * Sort vendor errata entries in Kconfig. - Secure Monitor Call Calling Convention (SMCCC) * Update to the latest specification from Arm (v1.2). * Allow PSCI code to query the SMCCC version. - Software Delegated Exception Interface (SDEI) * Unexport a bunch of unused symbols. * Minor fixes to handling of firmware data. - Pointer authentication * Add support for dumping the kernel PAC mask in vmcoreinfo so that the stack can be unwound by tools such as kdump. * Simplification of key initialisation during CPU bringup. - BPF backend * Improve immediate generation for logical and add/sub instructions. - vDSO - Minor fixes to the linker flags for consistency with other architectures and support for LLVM's unwinder. - Clean up logic to initialise and map the vDSO into userspace. - ACPI - Work around for an ambiguity in the IORT specification relating to the "num_ids" field. - Support _DMA method for all named components rather than only PCIe root complexes. - Minor other IORT-related fixes. - Miscellaneous * Initialise debug traps early for KGDB and fix KDB cacheflushing deadlock. * Minor tweaks to early boot state (documentation update, set TEXT_OFFSET to 0x0, increase alignment of PE/COFF sections). * Refactoring and cleanup -----BEGIN PGP SIGNATURE----- iQFEBAABCgAuFiEEPxTL6PPUbjXGY88ct6xw3ITBYzQFAl7U9csQHHdpbGxAa2Vy bmVsLm9yZwAKCRC3rHDchMFjNLBHCACs/YU4SM7Om5f+7QnxIKao5DBr2CnGGvdC yTfDghFDTLQVv3MufLlfno3yBe5G8sQpcZfcc+hewfcGoMzVZXu8s7LzH6VSn9T9 jmT3KjDMrg0RjSHzyumJp2McyelTk0a4FiKArSIIKsJSXUyb1uPSgm7SvKVDwEwU JGDzL9IGilmq59GiXfDzGhTZgmC37QdwRoRxDuqtqWQe5CHoRXYexg87HwBKOQxx HgU9L7ehri4MRZfpyjaDrr6quJo3TVnAAKXNBh3mZAskVS9ZrfKpEH0kYWYuqybv znKyHRecl/rrGePV8RTMtrwnSdU26zMXE/omsVVauDfG9hqzqm+Q =w3qi -----END PGP SIGNATURE----- Merge tag 'arm64-upstream' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux Pull arm64 updates from Will Deacon: "A sizeable pile of arm64 updates for 5.8. Summary below, but the big two features are support for Branch Target Identification and Clang's Shadow Call stack. The latter is currently arm64-only, but the high-level parts are all in core code so it could easily be adopted by other architectures pending toolchain support Branch Target Identification (BTI): - Support for ARMv8.5-BTI in both user- and kernel-space. This allows branch targets to limit the types of branch from which they can be called and additionally prevents branching to arbitrary code, although kernel support requires a very recent toolchain. - Function annotation via SYM_FUNC_START() so that assembly functions are wrapped with the relevant "landing pad" instructions. - BPF and vDSO updates to use the new instructions. - Addition of a new HWCAP and exposure of BTI capability to userspace via ID register emulation, along with ELF loader support for the BTI feature in .note.gnu.property. - Non-critical fixes to CFI unwind annotations in the sigreturn trampoline. Shadow Call Stack (SCS): - Support for Clang's Shadow Call Stack feature, which reserves platform register x18 to point at a separate stack for each task that holds only return addresses. This protects function return control flow from buffer overruns on the main stack. - Save/restore of x18 across problematic boundaries (user-mode, hypervisor, EFI, suspend, etc). - Core support for SCS, should other architectures want to use it too. - SCS overflow checking on context-switch as part of the existing stack limit check if CONFIG_SCHED_STACK_END_CHECK=y. CPU feature detection: - Removed numerous "SANITY CHECK" errors when running on a system with mismatched AArch32 support at EL1. This is primarily a concern for KVM, which disabled support for 32-bit guests on such a system. - Addition of new ID registers and fields as the architecture has been extended. Perf and PMU drivers: - Minor fixes and cleanups to system PMU drivers. Hardware errata: - Unify KVM workarounds for VHE and nVHE configurations. - Sort vendor errata entries in Kconfig. Secure Monitor Call Calling Convention (SMCCC): - Update to the latest specification from Arm (v1.2). - Allow PSCI code to query the SMCCC version. Software Delegated Exception Interface (SDEI): - Unexport a bunch of unused symbols. - Minor fixes to handling of firmware data. Pointer authentication: - Add support for dumping the kernel PAC mask in vmcoreinfo so that the stack can be unwound by tools such as kdump. - Simplification of key initialisation during CPU bringup. BPF backend: - Improve immediate generation for logical and add/sub instructions. vDSO: - Minor fixes to the linker flags for consistency with other architectures and support for LLVM's unwinder. - Clean up logic to initialise and map the vDSO into userspace. ACPI: - Work around for an ambiguity in the IORT specification relating to the "num_ids" field. - Support _DMA method for all named components rather than only PCIe root complexes. - Minor other IORT-related fixes. Miscellaneous: - Initialise debug traps early for KGDB and fix KDB cacheflushing deadlock. - Minor tweaks to early boot state (documentation update, set TEXT_OFFSET to 0x0, increase alignment of PE/COFF sections). - Refactoring and cleanup" * tag 'arm64-upstream' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux: (148 commits) KVM: arm64: Move __load_guest_stage2 to kvm_mmu.h KVM: arm64: Check advertised Stage-2 page size capability arm64/cpufeature: Add get_arm64_ftr_reg_nowarn() ACPI/IORT: Remove the unused __get_pci_rid() arm64/cpuinfo: Add ID_MMFR4_EL1 into the cpuinfo_arm64 context arm64/cpufeature: Add remaining feature bits in ID_AA64PFR1 register arm64/cpufeature: Add remaining feature bits in ID_AA64PFR0 register arm64/cpufeature: Add remaining feature bits in ID_AA64ISAR0 register arm64/cpufeature: Add remaining feature bits in ID_MMFR4 register arm64/cpufeature: Add remaining feature bits in ID_PFR0 register arm64/cpufeature: Introduce ID_MMFR5 CPU register arm64/cpufeature: Introduce ID_DFR1 CPU register arm64/cpufeature: Introduce ID_PFR2 CPU register arm64/cpufeature: Make doublelock a signed feature in ID_AA64DFR0 arm64/cpufeature: Drop TraceFilt feature exposure from ID_DFR0 register arm64/cpufeature: Add explicit ftr_id_isar0[] for ID_ISAR0 register arm64: mm: Add asid_gen_match() helper firmware: smccc: Fix missing prototype warning for arm_smccc_version_init arm64: vdso: Fix CFI directives in sigreturn trampoline arm64: vdso: Don't prefix sigreturn trampoline with a BTI C instruction ...
169 lines
6.2 KiB
C
169 lines
6.2 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef _ASM_X86_TRAPS_H
|
|
#define _ASM_X86_TRAPS_H
|
|
|
|
#include <linux/context_tracking_state.h>
|
|
#include <linux/kprobes.h>
|
|
|
|
#include <asm/debugreg.h>
|
|
#include <asm/siginfo.h> /* TRAP_TRACE, ... */
|
|
|
|
#define dotraplinkage __visible
|
|
|
|
asmlinkage void divide_error(void);
|
|
asmlinkage void debug(void);
|
|
asmlinkage void nmi(void);
|
|
asmlinkage void int3(void);
|
|
asmlinkage void overflow(void);
|
|
asmlinkage void bounds(void);
|
|
asmlinkage void invalid_op(void);
|
|
asmlinkage void device_not_available(void);
|
|
#ifdef CONFIG_X86_64
|
|
asmlinkage void double_fault(void);
|
|
#endif
|
|
asmlinkage void coprocessor_segment_overrun(void);
|
|
asmlinkage void invalid_TSS(void);
|
|
asmlinkage void segment_not_present(void);
|
|
asmlinkage void stack_segment(void);
|
|
asmlinkage void general_protection(void);
|
|
asmlinkage void page_fault(void);
|
|
asmlinkage void async_page_fault(void);
|
|
asmlinkage void spurious_interrupt_bug(void);
|
|
asmlinkage void coprocessor_error(void);
|
|
asmlinkage void alignment_check(void);
|
|
#ifdef CONFIG_X86_MCE
|
|
asmlinkage void machine_check(void);
|
|
#endif /* CONFIG_X86_MCE */
|
|
asmlinkage void simd_coprocessor_error(void);
|
|
|
|
#if defined(CONFIG_X86_64) && defined(CONFIG_XEN_PV)
|
|
asmlinkage void xen_divide_error(void);
|
|
asmlinkage void xen_xennmi(void);
|
|
asmlinkage void xen_xendebug(void);
|
|
asmlinkage void xen_int3(void);
|
|
asmlinkage void xen_overflow(void);
|
|
asmlinkage void xen_bounds(void);
|
|
asmlinkage void xen_invalid_op(void);
|
|
asmlinkage void xen_device_not_available(void);
|
|
asmlinkage void xen_double_fault(void);
|
|
asmlinkage void xen_coprocessor_segment_overrun(void);
|
|
asmlinkage void xen_invalid_TSS(void);
|
|
asmlinkage void xen_segment_not_present(void);
|
|
asmlinkage void xen_stack_segment(void);
|
|
asmlinkage void xen_general_protection(void);
|
|
asmlinkage void xen_page_fault(void);
|
|
asmlinkage void xen_spurious_interrupt_bug(void);
|
|
asmlinkage void xen_coprocessor_error(void);
|
|
asmlinkage void xen_alignment_check(void);
|
|
#ifdef CONFIG_X86_MCE
|
|
asmlinkage void xen_machine_check(void);
|
|
#endif /* CONFIG_X86_MCE */
|
|
asmlinkage void xen_simd_coprocessor_error(void);
|
|
#endif
|
|
|
|
dotraplinkage void do_divide_error(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_debug(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_nmi(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_int3(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_overflow(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_bounds(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_invalid_op(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_device_not_available(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_double_fault(struct pt_regs *regs, long error_code, unsigned long cr2);
|
|
dotraplinkage void do_coprocessor_segment_overrun(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_invalid_TSS(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_segment_not_present(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_stack_segment(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_general_protection(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_page_fault(struct pt_regs *regs, unsigned long error_code, unsigned long address);
|
|
dotraplinkage void do_spurious_interrupt_bug(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_coprocessor_error(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_alignment_check(struct pt_regs *regs, long error_code);
|
|
dotraplinkage void do_simd_coprocessor_error(struct pt_regs *regs, long error_code);
|
|
#ifdef CONFIG_X86_32
|
|
dotraplinkage void do_iret_error(struct pt_regs *regs, long error_code);
|
|
#endif
|
|
dotraplinkage void do_mce(struct pt_regs *regs, long error_code);
|
|
|
|
#ifdef CONFIG_X86_64
|
|
asmlinkage __visible notrace struct pt_regs *sync_regs(struct pt_regs *eregs);
|
|
asmlinkage __visible notrace
|
|
struct bad_iret_stack *fixup_bad_iret(struct bad_iret_stack *s);
|
|
void __init trap_init(void);
|
|
#endif
|
|
|
|
static inline int get_si_code(unsigned long condition)
|
|
{
|
|
if (condition & DR_STEP)
|
|
return TRAP_TRACE;
|
|
else if (condition & (DR_TRAP0|DR_TRAP1|DR_TRAP2|DR_TRAP3))
|
|
return TRAP_HWBKPT;
|
|
else
|
|
return TRAP_BRKPT;
|
|
}
|
|
|
|
extern int panic_on_unrecovered_nmi;
|
|
|
|
void math_emulate(struct math_emu_info *);
|
|
#ifndef CONFIG_X86_32
|
|
asmlinkage void smp_thermal_interrupt(struct pt_regs *regs);
|
|
asmlinkage void smp_threshold_interrupt(struct pt_regs *regs);
|
|
asmlinkage void smp_deferred_error_interrupt(struct pt_regs *regs);
|
|
#endif
|
|
|
|
void smp_apic_timer_interrupt(struct pt_regs *regs);
|
|
void smp_spurious_interrupt(struct pt_regs *regs);
|
|
void smp_error_interrupt(struct pt_regs *regs);
|
|
asmlinkage void smp_irq_move_cleanup_interrupt(void);
|
|
|
|
#ifdef CONFIG_VMAP_STACK
|
|
void __noreturn handle_stack_overflow(const char *message,
|
|
struct pt_regs *regs,
|
|
unsigned long fault_address);
|
|
#endif
|
|
|
|
/* Interrupts/Exceptions */
|
|
enum {
|
|
X86_TRAP_DE = 0, /* 0, Divide-by-zero */
|
|
X86_TRAP_DB, /* 1, Debug */
|
|
X86_TRAP_NMI, /* 2, Non-maskable Interrupt */
|
|
X86_TRAP_BP, /* 3, Breakpoint */
|
|
X86_TRAP_OF, /* 4, Overflow */
|
|
X86_TRAP_BR, /* 5, Bound Range Exceeded */
|
|
X86_TRAP_UD, /* 6, Invalid Opcode */
|
|
X86_TRAP_NM, /* 7, Device Not Available */
|
|
X86_TRAP_DF, /* 8, Double Fault */
|
|
X86_TRAP_OLD_MF, /* 9, Coprocessor Segment Overrun */
|
|
X86_TRAP_TS, /* 10, Invalid TSS */
|
|
X86_TRAP_NP, /* 11, Segment Not Present */
|
|
X86_TRAP_SS, /* 12, Stack Segment Fault */
|
|
X86_TRAP_GP, /* 13, General Protection Fault */
|
|
X86_TRAP_PF, /* 14, Page Fault */
|
|
X86_TRAP_SPURIOUS, /* 15, Spurious Interrupt */
|
|
X86_TRAP_MF, /* 16, x87 Floating-Point Exception */
|
|
X86_TRAP_AC, /* 17, Alignment Check */
|
|
X86_TRAP_MC, /* 18, Machine Check */
|
|
X86_TRAP_XF, /* 19, SIMD Floating-Point Exception */
|
|
X86_TRAP_IRET = 32, /* 32, IRET Exception */
|
|
};
|
|
|
|
/*
|
|
* Page fault error code bits:
|
|
*
|
|
* bit 0 == 0: no page found 1: protection fault
|
|
* bit 1 == 0: read access 1: write access
|
|
* bit 2 == 0: kernel-mode access 1: user-mode access
|
|
* bit 3 == 1: use of reserved bit detected
|
|
* bit 4 == 1: fault was an instruction fetch
|
|
* bit 5 == 1: protection keys block access
|
|
*/
|
|
enum x86_pf_error_code {
|
|
X86_PF_PROT = 1 << 0,
|
|
X86_PF_WRITE = 1 << 1,
|
|
X86_PF_USER = 1 << 2,
|
|
X86_PF_RSVD = 1 << 3,
|
|
X86_PF_INSTR = 1 << 4,
|
|
X86_PF_PK = 1 << 5,
|
|
};
|
|
#endif /* _ASM_X86_TRAPS_H */
|