[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <86ed2bsi3s.wl-maz@kernel.org>
Date: Fri, 13 Dec 2024 15:44:23 +0000
From: Marc Zyngier <maz@...nel.org>
To: wens@...nel.org
Cc: linux-arm-kernel@...ts.infradead.org,
linux-kernel@...r.kernel.org,
Mark Rutland <mark.rutland@....com>,
Thomas Gleixner <tglx@...utronix.de>,
Mark Kettenis <mark.kettenis@...all.nl>,
Chen-Yu Tsai <wenst@...omium.org>,
stable@...r.kernel.org
Subject: Re: [PATCH] irqchip/gic-v3: Work around insecure GIC integrations
On Fri, 13 Dec 2024 15:10:11 +0000,
Chen-Yu Tsai <wens@...nel.org> wrote:
>
> On Fri, Dec 13, 2024 at 10:34 PM Marc Zyngier <maz@...nel.org> wrote:
> >
> > It appears that the relatively popular RK3399 SoC has been put together
> > using a large amount of illicit substances, as experiments reveal
> > that its integration of GIC500 exposes the *secure* programming
> > interface to non-secure.
> >
> > This has some pretty bad effects on the way priorities are handled,
> > and results in a dead machine if booting with pseudo-NMI enabled
> > (irqchip.gicv3_pseudo_nmi=1) if the kernel contains 18fdb6348c480
> > ("arm64: irqchip/gic-v3: Select priorities at boot time"), which
> > relies on the priorities being programmed using the NS view.
> >
> > Let's restore some sanity by going one step further and disable
> > security altogether in this case. This is not any worse, and
> > puts us in a mode where priorities actually make some sense.
> >
> > Huge thanks to Mark Kettenis who initially identified this issue
> > on OpenBSD, and to Chen-Yu Tsai who reported the problem in
> > Linux.
> >
> > Fixes: 18fdb6348c480 ("arm64: irqchip/gic-v3: Select priorities at boot time")
> > Reported-by: Mark Kettenis <mark.kettenis@...all.nl>
> > Reported-by: Chen-Yu Tsai <wenst@...omium.org>
>
> Should be
>
> Reported-by: Chen-Yu Tsai <wens@...e.org>
>
> (I know it's confusing, I even mix up inboxes at work.)
Ah, fair enough. Given that the report was on IRC, I had just used the
first address git log gave me.
> > Signed-off-by: Marc Zyngier <maz@...nel.org>
> > Cc: stable@...r.kernel.org
>
> Tested-by: Chen-Yu Tsai <wens@...e.org>
>
> My RK3399 boots normally with pseudo NMI enabled with this patch now.
> Also tried NMI backtraces through sysrq, though I'm not sure that
> always goes through the pseudo NMI path?
Should do, according to arch/arm64/kernel/smp::ipi_setup().
Thanks for having tested it.
M.
--
Without deviation from the norm, progress is not possible.
Powered by blists - more mailing lists