Page Menu
Home
FreeBSD
Search
Configure Global Search
Log In
Files
F108202839
D38196.diff
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Flag For Later
Award Token
Size
2 KB
Referenced Files
None
Subscribers
None
D38196.diff
View Options
diff --git a/sys/arm64/arm64/exception.S b/sys/arm64/arm64/exception.S
--- a/sys/arm64/arm64/exception.S
+++ b/sys/arm64/arm64/exception.S
@@ -212,10 +212,25 @@
END(handle_el1h_irq)
ENTRY(handle_el0_sync)
+ /*
+ * Read the fault address early. The current thread structure may
+ * be transiently unmapped if it is part of a memory range being
+ * promoted or demoted to/from a superpage. As this involves a
+ * break-before-make sequence there is a short period of time where
+ * an access will raise an exception. If this happens the fault
+ * address will be changed to the kernel address so a later read of
+ * far_el1 will give the wrong value.
+ *
+ * The earliest memory access that could trigger a fault is in a
+ * function called by the save_registers macro so this is the latest
+ * we can read the userspace value.
+ */
+ mrs x19, far_el1
save_registers 0
ldr x0, [x18, #PC_CURTHREAD]
mov x1, sp
str x1, [x0, #TD_FRAME]
+ mov x2, x19
bl do_el0_sync
do_ast
restore_registers 0
diff --git a/sys/arm64/arm64/trap.c b/sys/arm64/arm64/trap.c
--- a/sys/arm64/arm64/trap.c
+++ b/sys/arm64/arm64/trap.c
@@ -76,7 +76,7 @@
/* Called from exception.S */
void do_el1h_sync(struct thread *, struct trapframe *);
-void do_el0_sync(struct thread *, struct trapframe *);
+void do_el0_sync(struct thread *, struct trapframe *, uint64_t far);
void do_el0_error(struct trapframe *);
void do_serror(struct trapframe *);
void unhandled_exception(struct trapframe *);
@@ -559,11 +559,11 @@
}
void
-do_el0_sync(struct thread *td, struct trapframe *frame)
+do_el0_sync(struct thread *td, struct trapframe *frame, uint64_t far)
{
pcpu_bp_harden bp_harden;
uint32_t exception;
- uint64_t esr, far;
+ uint64_t esr;
int dfsc;
/* Check we have a sane environment when entering from userland */
@@ -573,27 +573,15 @@
esr = frame->tf_esr;
exception = ESR_ELx_EXCEPTION(esr);
- switch (exception) {
- case EXCP_INSN_ABORT_L:
- far = READ_SPECIALREG(far_el1);
-
+ if (exception == EXCP_INSN_ABORT_L && far > VM_MAXUSER_ADDRESS) {
/*
* Userspace may be trying to train the branch predictor to
* attack the kernel. If we are on a CPU affected by this
* call the handler to clear the branch predictor state.
*/
- if (far > VM_MAXUSER_ADDRESS) {
- bp_harden = PCPU_GET(bp_harden);
- if (bp_harden != NULL)
- bp_harden();
- }
- break;
- case EXCP_UNKNOWN:
- case EXCP_DATA_ABORT_L:
- case EXCP_DATA_ABORT:
- case EXCP_WATCHPT_EL0:
- far = READ_SPECIALREG(far_el1);
- break;
+ bp_harden = PCPU_GET(bp_harden);
+ if (bp_harden != NULL)
+ bp_harden();
}
intr_enable();
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Thu, Jan 23, 2:37 PM (17 h, 56 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
16056155
Default Alt Text
D38196.diff (2 KB)
Attached To
Mode
D38196: Read the arm64 far early in el0 exceptions
Attached
Detach File
Event Timeline
Log In to Comment