Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 28 Oct 2016 18:27:08 +0100
From: Catalin Marinas <catalin.marinas@....com>
To: linux-arm-kernel@...ts.infradead.org
Cc: Will Deacon <will.deacon@....com>,
	James Morse <james.morse@....com>,
	Kees Cook <keescook@...omium.org>,
	Mark Rutland <mark.rutland@....com>,
	Ard Biesheuvel <ard.biesheuvel@...aro.org>,
	AKASHI Takahiro <takahiro.akashi@...aro.org>,
	Sami Tolvanen <samitolvanen@...gle.com>,
	kernel-hardening@...ts.openwall.com
Subject: [PATCH v4 0/8] arm64: Privileged Access Never using TTBR0_EL1 switching

This is the fourth version of the arm64 PAN emulation using TTBR0_EL1
switching. The series does not include the empty_zero_page patch from
Ard B. as I didn't have an up to date patch, nor figured out where the
discussion was left.

The patches are available on this branch:

  git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux ttbr0-pan

Changes since v3:

- Xen hyp call now only enables TTBR0_EL1 if needed without clearing PAN

- Fix for user space cache maintenance trapping/emulation

- Simplified asm macros based on Mark R's "alternative_else_nop_endif"

- Separate patch for fixing the synchronous external abort description

- #includes clean-up

Catalin Marinas (8):
  arm64: Update the synchronous external abort fault description
  arm64: Factor out PAN enabling/disabling into separate uaccess_*
    macros
  arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm
    macro
  arm64: Introduce uaccess_{disable,enable} functionality based on
    TTBR0_EL1
  arm64: Disable TTBR0_EL1 during normal kernel execution
  arm64: Handle faults caused by inadvertent user access with PAN
    enabled
  arm64: xen: Enable user access before a privcmd hvc call
  arm64: Enable CONFIG_ARM64_SW_TTBR0_PAN

 arch/arm64/Kconfig                      |   8 ++
 arch/arm64/include/asm/assembler.h      |  29 ++++++
 arch/arm64/include/asm/cpufeature.h     |   6 ++
 arch/arm64/include/asm/efi.h            |  26 ++++-
 arch/arm64/include/asm/futex.h          |  17 ++--
 arch/arm64/include/asm/kernel-pgtable.h |   7 ++
 arch/arm64/include/asm/mmu_context.h    |  53 +++++++---
 arch/arm64/include/asm/thread_info.h    |   3 +
 arch/arm64/include/asm/uaccess.h        | 175 ++++++++++++++++++++++++++++++--
 arch/arm64/kernel/armv8_deprecated.c    |  11 +-
 arch/arm64/kernel/asm-offsets.c         |   3 +
 arch/arm64/kernel/cpufeature.c          |   1 +
 arch/arm64/kernel/entry.S               |  67 +++++++++++-
 arch/arm64/kernel/head.S                |   6 +-
 arch/arm64/kernel/setup.c               |   9 ++
 arch/arm64/kernel/traps.c               |   9 +-
 arch/arm64/kernel/vmlinux.lds.S         |   5 +
 arch/arm64/lib/clear_user.S             |  11 +-
 arch/arm64/lib/copy_from_user.S         |  11 +-
 arch/arm64/lib/copy_in_user.S           |  11 +-
 arch/arm64/lib/copy_to_user.S           |  11 +-
 arch/arm64/mm/cache.S                   |   6 +-
 arch/arm64/mm/context.c                 |   7 +-
 arch/arm64/mm/fault.c                   |  22 ++--
 arch/arm64/mm/proc.S                    |   6 +-
 arch/arm64/xen/hypercall.S              |  15 +++
 26 files changed, 437 insertions(+), 98 deletions(-)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.