245 строки
5.2 KiB
C
245 строки
5.2 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Early cpufeature override framework
|
|
*
|
|
* Copyright (C) 2020 Google LLC
|
|
* Author: Marc Zyngier <maz@kernel.org>
|
|
*/
|
|
|
|
#include <linux/ctype.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/libfdt.h>
|
|
|
|
#include <asm/cacheflush.h>
|
|
#include <asm/cpufeature.h>
|
|
#include <asm/setup.h>
|
|
|
|
#define FTR_DESC_NAME_LEN 20
|
|
#define FTR_DESC_FIELD_LEN 10
|
|
#define FTR_ALIAS_NAME_LEN 30
|
|
#define FTR_ALIAS_OPTION_LEN 80
|
|
|
|
struct ftr_set_desc {
|
|
char name[FTR_DESC_NAME_LEN];
|
|
struct arm64_ftr_override *override;
|
|
struct {
|
|
char name[FTR_DESC_FIELD_LEN];
|
|
u8 shift;
|
|
bool (*filter)(u64 val);
|
|
} fields[];
|
|
};
|
|
|
|
static bool __init mmfr1_vh_filter(u64 val)
|
|
{
|
|
/*
|
|
* If we ever reach this point while running VHE, we're
|
|
* guaranteed to be on one of these funky, VHE-stuck CPUs. If
|
|
* the user was trying to force nVHE on us, proceed with
|
|
* attitude adjustment.
|
|
*/
|
|
return !(is_kernel_in_hyp_mode() && val == 0);
|
|
}
|
|
|
|
static const struct ftr_set_desc mmfr1 __initconst = {
|
|
.name = "id_aa64mmfr1",
|
|
.override = &id_aa64mmfr1_override,
|
|
.fields = {
|
|
{ "vh", ID_AA64MMFR1_VHE_SHIFT, mmfr1_vh_filter },
|
|
{}
|
|
},
|
|
};
|
|
|
|
static const struct ftr_set_desc pfr1 __initconst = {
|
|
.name = "id_aa64pfr1",
|
|
.override = &id_aa64pfr1_override,
|
|
.fields = {
|
|
{ "bt", ID_AA64PFR1_BT_SHIFT },
|
|
{}
|
|
},
|
|
};
|
|
|
|
static const struct ftr_set_desc isar1 __initconst = {
|
|
.name = "id_aa64isar1",
|
|
.override = &id_aa64isar1_override,
|
|
.fields = {
|
|
{ "gpi", ID_AA64ISAR1_GPI_SHIFT },
|
|
{ "gpa", ID_AA64ISAR1_GPA_SHIFT },
|
|
{ "api", ID_AA64ISAR1_API_SHIFT },
|
|
{ "apa", ID_AA64ISAR1_APA_SHIFT },
|
|
{}
|
|
},
|
|
};
|
|
|
|
extern struct arm64_ftr_override kaslr_feature_override;
|
|
|
|
static const struct ftr_set_desc kaslr __initconst = {
|
|
.name = "kaslr",
|
|
#ifdef CONFIG_RANDOMIZE_BASE
|
|
.override = &kaslr_feature_override,
|
|
#endif
|
|
.fields = {
|
|
{ "disabled", 0 },
|
|
{}
|
|
},
|
|
};
|
|
|
|
static const struct ftr_set_desc * const regs[] __initconst = {
|
|
&mmfr1,
|
|
&pfr1,
|
|
&isar1,
|
|
&kaslr,
|
|
};
|
|
|
|
static const struct {
|
|
char alias[FTR_ALIAS_NAME_LEN];
|
|
char feature[FTR_ALIAS_OPTION_LEN];
|
|
} aliases[] __initconst = {
|
|
{ "kvm-arm.mode=nvhe", "id_aa64mmfr1.vh=0" },
|
|
{ "kvm-arm.mode=protected", "id_aa64mmfr1.vh=0" },
|
|
{ "arm64.nobti", "id_aa64pfr1.bt=0" },
|
|
{ "arm64.nopauth",
|
|
"id_aa64isar1.gpi=0 id_aa64isar1.gpa=0 "
|
|
"id_aa64isar1.api=0 id_aa64isar1.apa=0" },
|
|
{ "nokaslr", "kaslr.disabled=1" },
|
|
};
|
|
|
|
static int __init find_field(const char *cmdline,
|
|
const struct ftr_set_desc *reg, int f, u64 *v)
|
|
{
|
|
char opt[FTR_DESC_NAME_LEN + FTR_DESC_FIELD_LEN + 2];
|
|
int len;
|
|
|
|
len = snprintf(opt, ARRAY_SIZE(opt), "%s.%s=",
|
|
reg->name, reg->fields[f].name);
|
|
|
|
if (!parameqn(cmdline, opt, len))
|
|
return -1;
|
|
|
|
return kstrtou64(cmdline + len, 0, v);
|
|
}
|
|
|
|
static void __init match_options(const char *cmdline)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(regs); i++) {
|
|
int f;
|
|
|
|
if (!regs[i]->override)
|
|
continue;
|
|
|
|
for (f = 0; strlen(regs[i]->fields[f].name); f++) {
|
|
u64 shift = regs[i]->fields[f].shift;
|
|
u64 mask = 0xfUL << shift;
|
|
u64 v;
|
|
|
|
if (find_field(cmdline, regs[i], f, &v))
|
|
continue;
|
|
|
|
/*
|
|
* If an override gets filtered out, advertise
|
|
* it by setting the value to 0xf, but
|
|
* clearing the mask... Yes, this is fragile.
|
|
*/
|
|
if (regs[i]->fields[f].filter &&
|
|
!regs[i]->fields[f].filter(v)) {
|
|
regs[i]->override->val |= mask;
|
|
regs[i]->override->mask &= ~mask;
|
|
continue;
|
|
}
|
|
|
|
regs[i]->override->val &= ~mask;
|
|
regs[i]->override->val |= (v << shift) & mask;
|
|
regs[i]->override->mask |= mask;
|
|
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
static __init void __parse_cmdline(const char *cmdline, bool parse_aliases)
|
|
{
|
|
do {
|
|
char buf[256];
|
|
size_t len;
|
|
int i;
|
|
|
|
cmdline = skip_spaces(cmdline);
|
|
|
|
for (len = 0; cmdline[len] && !isspace(cmdline[len]); len++);
|
|
if (!len)
|
|
return;
|
|
|
|
len = min(len, ARRAY_SIZE(buf) - 1);
|
|
strncpy(buf, cmdline, len);
|
|
buf[len] = 0;
|
|
|
|
if (strcmp(buf, "--") == 0)
|
|
return;
|
|
|
|
cmdline += len;
|
|
|
|
match_options(buf);
|
|
|
|
for (i = 0; parse_aliases && i < ARRAY_SIZE(aliases); i++)
|
|
if (parameq(buf, aliases[i].alias))
|
|
__parse_cmdline(aliases[i].feature, false);
|
|
} while (1);
|
|
}
|
|
|
|
static __init const u8 *get_bootargs_cmdline(void)
|
|
{
|
|
const u8 *prop;
|
|
void *fdt;
|
|
int node;
|
|
|
|
fdt = get_early_fdt_ptr();
|
|
if (!fdt)
|
|
return NULL;
|
|
|
|
node = fdt_path_offset(fdt, "/chosen");
|
|
if (node < 0)
|
|
return NULL;
|
|
|
|
prop = fdt_getprop(fdt, node, "bootargs", NULL);
|
|
if (!prop)
|
|
return NULL;
|
|
|
|
return strlen(prop) ? prop : NULL;
|
|
}
|
|
|
|
static __init void parse_cmdline(void)
|
|
{
|
|
const u8 *prop = get_bootargs_cmdline();
|
|
|
|
if (IS_ENABLED(CONFIG_CMDLINE_FORCE) || !prop)
|
|
__parse_cmdline(CONFIG_CMDLINE, true);
|
|
|
|
if (!IS_ENABLED(CONFIG_CMDLINE_FORCE) && prop)
|
|
__parse_cmdline(prop, true);
|
|
}
|
|
|
|
/* Keep checkers quiet */
|
|
void init_feature_override(void);
|
|
|
|
asmlinkage void __init init_feature_override(void)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(regs); i++) {
|
|
if (regs[i]->override) {
|
|
regs[i]->override->val = 0;
|
|
regs[i]->override->mask = 0;
|
|
}
|
|
}
|
|
|
|
parse_cmdline();
|
|
|
|
for (i = 0; i < ARRAY_SIZE(regs); i++) {
|
|
if (regs[i]->override)
|
|
dcache_clean_inval_poc((unsigned long)regs[i]->override,
|
|
(unsigned long)regs[i]->override +
|
|
sizeof(*regs[i]->override));
|
|
}
|
|
}
|