[v2,3/4] arm64/entry-common: Make Aarch32 exceptions' availability depend on aarch32_enabled()
Message ID | d0484051d8ff23e0ed1f2933789cde3d390a2fa6.1698069331.git.andrea.porta@suse.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:ce89:0:b0:403:3b70:6f57 with SMTP id p9csp1345110vqx; Mon, 23 Oct 2023 07:44:25 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEtNWEIPrrUR5njPWV8GM8XhByLadjUmuIKAp2VOYlgY0GGm2TZ7pyKTuxQXNBR4uJXraJ7 X-Received: by 2002:a05:6a20:3cab:b0:152:4615:cb9d with SMTP id b43-20020a056a203cab00b001524615cb9dmr16599679pzj.12.1698072265457; Mon, 23 Oct 2023 07:44:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698072265; cv=none; d=google.com; s=arc-20160816; b=lnKiI9d+CfaRjvw9fcBUEBxTkF+VkxK9AUs1SnBdidznhTCoUk+se/ZQY6tgttKG45 Ue4j9R2XqUKa2PWJZl+dJQqgy6QrHtmlPX2p4T1UPZgf7gscBVmx61p9EdBGckSoRQy6 dBvVSBWtOApPXNoQugYJ6to2Jy/a+G9z6TBF310ZSHiRX082Hr0jn/rnRd/KMRtQ7zMx cTTHcOwXKsIt9pQSzwgM7OM2aWkBhFOhADLsszg2S2RAeKUUFNf43dl7Sqw5Cwa8QDGV T9mDXyooPfcrlXBdAwiOBapLrDsKjWudDORerR7pHY6iHHWFsrBNaZkV1wvxJgnQBz7V x6pw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=+I9ud1Xuz1QVsjjSIfjL5lCnrVLHZ6fU43dq2sdHnMY=; fh=Mt283RDXEoutdgZ0ioYgkrGAUpbBAwJ7lRTaJXIGXS8=; b=sMhlMwL1spkkGSDduq3mNpaePUoqS7g4x/VUymTwDOlVL8LUF7QtaXwK+nTsBF5HPb GGZdSnmad1GXZqfpenBbxipbUxX2WmDG9cYykf3Ykc3zl7OWFTWul86093v4y2tNns/b Z+14NeX3C9xpeGIuAuIMjYNQEqWrsKA6uKjO4UBdTWz5BkoZXHA8sL5q4Hgj/fIoDsK7 umHq/g7pdxMHbV4c2TumegndYFeWPKoTXpKYnIjZRk7dnRJglj4VcBvcviu22jb+dJdb 646c2nc3GgyJfJDoMf+PW6tlUYM2mlbZhy/MTwkSUwmiI5x095ZGxRsC/KYNd2zBo2xl vglg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=ZnpY4uBk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id o5-20020a656a45000000b00578af609d05si6758946pgu.244.2023.10.23.07.44.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 Oct 2023 07:44:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=ZnpY4uBk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 392CD80AA251; Mon, 23 Oct 2023 07:44:21 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233731AbjJWOoF (ORCPT <rfc822;aposhian.dev@gmail.com> + 27 others); Mon, 23 Oct 2023 10:44:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40952 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233693AbjJWOnq (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Mon, 23 Oct 2023 10:43:46 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [IPv6:2001:67c:2178:6::1d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 067721FD4 for <linux-kernel@vger.kernel.org>; Mon, 23 Oct 2023 07:42:28 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 548FD1FE25; Mon, 23 Oct 2023 14:42:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1698072147; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=+I9ud1Xuz1QVsjjSIfjL5lCnrVLHZ6fU43dq2sdHnMY=; b=ZnpY4uBkNksiRZIcuaIZLNFna9sII/TYaINRsWSXNc6OdlfhvABzLZ16+G+q94Tzm7blpJ PMeCt0I7PQHC2/G80z3PJUEFkVOvR8qTtss5N2SydDmRGdI871w6Ja15+iK+hQjWSXzKJn h+cGzSpnfJzOfDwOp68ksqiZVoAEzZo= Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 39BE5139C2; Mon, 23 Oct 2023 14:42:27 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id zHHgC1OGNmXFdgAAMHmgww (envelope-from <aporta@suse.de>); Mon, 23 Oct 2023 14:42:27 +0000 From: Andrea della Porta <andrea.porta@suse.com> To: Catalin Marinas <catalin.marinas@arm.com>, Will Deacon <will@kernel.org>, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Cc: nik.borisov@suse.com, arnd@arndb.de, mark.rutland@arm.com, Andrea della Porta <andrea.porta@suse.com> Subject: [PATCH v2 3/4] arm64/entry-common: Make Aarch32 exceptions' availability depend on aarch32_enabled() Date: Mon, 23 Oct 2023 16:42:22 +0200 Message-ID: <d0484051d8ff23e0ed1f2933789cde3d390a2fa6.1698069331.git.andrea.porta@suse.com> X-Mailer: git-send-email 2.41.0 In-Reply-To: <cover.1698069331.git.andrea.porta@suse.com> References: <cover.1698069331.git.andrea.porta@suse.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Authentication-Results: smtp-out2.suse.de; none X-Spam-Level: X-Spam-Score: -5.70 X-Spamd-Result: default: False [-5.70 / 50.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; BAYES_HAM(-3.00)[100.00%]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_MISSING_CHARSET(2.50)[]; MIME_GOOD(-0.10)[text/plain]; BROKEN_CONTENT_TYPE(1.50)[]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-3.00)[-1.000]; DKIM_SIGNED(0.00)[suse.com:s=susede1]; NEURAL_HAM_SHORT(-1.00)[-1.000]; RCPT_COUNT_SEVEN(0.00)[8]; MID_CONTAINS_FROM(1.00)[]; FORGED_SENDER(0.30)[andrea.porta@suse.com,aporta@suse.de]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2]; FROM_NEQ_ENVFROM(0.10)[andrea.porta@suse.com,aporta@suse.de]; RCVD_TLS_ALL(0.00)[] X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Mon, 23 Oct 2023 07:44:21 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1780557823816913098 X-GMAIL-MSGID: 1780557823816913098 |
Series |
arm64: Make Aarch32 compatibility enablement optional at boot
|
|
Commit Message
Andrea della Porta
Oct. 23, 2023, 2:42 p.m. UTC
Another major aspect of supporting running of 32bit processes is the
ability to access 32bit syscalls and exceptions. Syscalls, in
particular, can be invoked by using the svc instruction.
If Aarch32 support is disabled ensure that calling svc (or any
exceptions) from 32bit context results in the same behavior as if
CONFIG_COMPAT has not been enabled (i.e. a kernel panic).
Signed-off-by: Andrea della Porta <andrea.porta@suse.com>
---
arch/arm64/include/asm/exception.h | 7 +++++++
arch/arm64/kernel/entry-common.c | 25 ++++++++++++++++++++++---
2 files changed, 29 insertions(+), 3 deletions(-)
Comments
On Mon, Oct 23, 2023 at 04:42:22PM +0200, Andrea della Porta wrote: > Another major aspect of supporting running of 32bit processes is the > ability to access 32bit syscalls and exceptions. Syscalls, in > particular, can be invoked by using the svc instruction. > > If Aarch32 support is disabled ensure that calling svc (or any > exceptions) from 32bit context results in the same behavior as if > CONFIG_COMPAT has not been enabled (i.e. a kernel panic). > > Signed-off-by: Andrea della Porta <andrea.porta@suse.com> Just to be clear, as it stands, I don't think we should apply this patch. * There's no justficiation so far for disabling the vectors given they should be unreachable. * If we really want to do this, the behaviour should be driven by a cpucap, so as to have truly negligible impact and to be consistent with how we handle features elsewhere. That will require some preparatory rework to the way de handle detecing support for AArch32 at EL0 (some of which I think we should do anyway as a cleanup). * We should not introduce new *_ni_handler() functions. If we really want to do this, we should refactor the existing code such that we have a single el0t_32_<vector>_handler() implementation for each vector regardless of CONFIG_COMPAT, which can figure out what to do, e.g. something like: | asmlinkage void noinstr el0t_32_irq_handler(struct pt_regs *regs) | { | if (!system_suports_compat_el0()) | panic_unhandled_vector(el0t, 32, irq, regs); | | __el0_irq_handler_common(regs); | } That way the feature check only needs to test IS_ENABLED(CONFIG_COMPAT) and alternative_has_cap(whatever), and we can rely on the compiler to elide the unreachable code. That way we use the exact same code for the case that 32-bit support is disabled statically or dynamically. I had a quick go at mocking that up: https://git.kernel.org/pub/scm/linux/kernel/git/mark/linux.git/log/?h=arm64/entry/unhandled-rework ... which doesn't look too hard. > --- > arch/arm64/include/asm/exception.h | 7 +++++++ > arch/arm64/kernel/entry-common.c | 25 ++++++++++++++++++++++--- > 2 files changed, 29 insertions(+), 3 deletions(-) > > diff --git a/arch/arm64/include/asm/exception.h b/arch/arm64/include/asm/exception.h > index ad688e157c9b..ccb41ba8d86c 100644 > --- a/arch/arm64/include/asm/exception.h > +++ b/arch/arm64/include/asm/exception.h > @@ -48,6 +48,13 @@ asmlinkage void el0t_32_irq_handler(struct pt_regs *regs); > asmlinkage void el0t_32_fiq_handler(struct pt_regs *regs); > asmlinkage void el0t_32_error_handler(struct pt_regs *regs); > > +#ifdef CONFIG_COMPAT > +asmlinkage void el0t_32_sync_ni_handler(struct pt_regs *regs); > +asmlinkage void el0t_32_irq_ni_handler(struct pt_regs *regs); > +asmlinkage void el0t_32_fiq_ni_handler(struct pt_regs *regs); > +asmlinkage void el0t_32_error_ni_handler(struct pt_regs *regs); > +#endif > + > asmlinkage void call_on_irq_stack(struct pt_regs *regs, > void (*func)(struct pt_regs *)); > asmlinkage void asm_exit_to_user_mode(struct pt_regs *regs); > diff --git a/arch/arm64/kernel/entry-common.c b/arch/arm64/kernel/entry-common.c > index 69ff9b8c0bde..32761760d9dd 100644 > --- a/arch/arm64/kernel/entry-common.c > +++ b/arch/arm64/kernel/entry-common.c > @@ -802,6 +802,11 @@ asmlinkage void noinstr el0t_64_error_handler(struct pt_regs *regs) > } > > #ifdef CONFIG_COMPAT > +UNHANDLED(el0t, 32, sync_ni) > +UNHANDLED(el0t, 32, irq_ni) > +UNHANDLED(el0t, 32, fiq_ni) > +UNHANDLED(el0t, 32, error_ni) This isn't the right way to use the UNHANDLED() macro, the 'vector' argument is supposed to be the name of the exception vector, since that'll be printed out in the message. The above will result in wanings like: "Unhandled 32-bit sync_ni exception" Whereas we want: "Unhandled 32-bit sync exception" As with the code linked to above, I'd be happy to remove the UNHANDLED() macro entirely. > + > static void noinstr el0_cp15(struct pt_regs *regs, unsigned long esr) > { > enter_from_user_mode(regs); > @@ -821,6 +826,11 @@ static void noinstr el0_svc_compat(struct pt_regs *regs) > > asmlinkage void noinstr el0t_32_sync_handler(struct pt_regs *regs) > { > + if (!aarch32_enabled()) { As above, we should use a cpucap so that this can be an alternative branch rather than a load and test of a global variable. > + el0t_32_sync_ni_handler(regs); ... and similarly we shouldn't need the *_ni_handler() functions. Mark. > + return; > + } > + > unsigned long esr = read_sysreg(esr_el1); > > switch (ESR_ELx_EC(esr)) { > @@ -865,17 +875,26 @@ asmlinkage void noinstr el0t_32_sync_handler(struct pt_regs *regs) > > asmlinkage void noinstr el0t_32_irq_handler(struct pt_regs *regs) > { > - __el0_irq_handler_common(regs); > + if (!aarch32_enabled()) > + el0t_32_irq_ni_handler(regs); > + else > + __el0_irq_handler_common(regs); > } > > asmlinkage void noinstr el0t_32_fiq_handler(struct pt_regs *regs) > { > - __el0_fiq_handler_common(regs); > + if (!aarch32_enabled()) > + el0t_32_fiq_ni_handler(regs); > + else > + __el0_fiq_handler_common(regs); > } > > asmlinkage void noinstr el0t_32_error_handler(struct pt_regs *regs) > { > - __el0_error_handler_common(regs); > + if (!aarch32_enabled()) > + el0t_32_error_ni_handler(regs); > + else > + __el0_error_handler_common(regs); > } > > bool __aarch32_enabled __ro_after_init = true; > -- > 2.35.3 >
On 12:27 Wed 25 Oct , Mark Rutland wrote: > On Mon, Oct 23, 2023 at 04:42:22PM +0200, Andrea della Porta wrote: > > Another major aspect of supporting running of 32bit processes is the > > ability to access 32bit syscalls and exceptions. Syscalls, in > > particular, can be invoked by using the svc instruction. > > > > If Aarch32 support is disabled ensure that calling svc (or any > > exceptions) from 32bit context results in the same behavior as if > > CONFIG_COMPAT has not been enabled (i.e. a kernel panic). > > > > Signed-off-by: Andrea della Porta <andrea.porta@suse.com> > > Just to be clear, as it stands, I don't think we should apply this patch. > > * There's no justficiation so far for disabling the vectors given they should > be unreachable. > True, but let's see what it buys and what not: - is it really necessary to check for 32 bit enablement when you cannot run 32 bit excecutable (from binfmt loader) in teh first place? Obviously not at all, unless you find a way (of which I'm not aware right now) to switch to 32 bit mode maybe by expliting some execpotion return path. In that (admittedly unlikely, as of now) case, you would expose all 32 bit syscall to be used by userspace. - does 'redundantly' checking for 32 bit alignment in the vector handler pose some performence bottleneck? Yes, but only in the dynamic enabled case (i.e. you have enabled the 32 bit support via the proposed kernel parameter). All other cases are compiler optimized away or simply not reachable under normal circumstances, so it's redundant only in very few (and probably irrelevant) cases. > * If we really want to do this, the behaviour should be driven by a cpucap, so > as to have truly negligible impact and to be consistent with how we handle > features elsewhere. > > That will require some preparatory rework to the way de handle detecing > support for AArch32 at EL0 (some of which I think we should do anyway as a > cleanup). > > * We should not introduce new *_ni_handler() functions. If we really want to > do this, we should refactor the existing code such that we have a single > el0t_32_<vector>_handler() implementation for each vector regardless of > CONFIG_COMPAT, which can figure out what to do, e.g. something like: > > | asmlinkage void noinstr el0t_32_irq_handler(struct pt_regs *regs) > | { > | if (!system_suports_compat_el0()) > | panic_unhandled_vector(el0t, 32, irq, regs); > | > | __el0_irq_handler_common(regs); > | } > > That way the feature check only needs to test IS_ENABLED(CONFIG_COMPAT) and > alternative_has_cap(whatever), and we can rely on the compiler to elide the > unreachable code. That way we use the exact same code for the case that > 32-bit support is disabled statically or dynamically. > > I had a quick go at mocking that up: > > https://git.kernel.org/pub/scm/linux/kernel/git/mark/linux.git/log/?h=arm64/entry/unhandled-rework > > ... which doesn't look too hard. > I agree with that, so assuming we still want to proceed and elaborate further, I'd like to sort the various proposals since I'm a little bit confused about them: from one side you propose to rework the vector handler definitions and to insert the conditional logic inside them. On the other side there is the thread from you, Kees and others that eventually led to a seccomp assisted solution as the preferred way. I'm not entirely sure how seccomp can be used here, whether setting up a bpf filter from inside the kernel (that enable or disable the 32 bit handler based on the kernel parameter) or from userspace (systemd, others..), so I assume we're still interested to investigate on your proposed solution. Regarding that, I propose the following: - rework the vector handler definitions as you've already mocked up, in order to get rid of the UNHANDLED declarations. - use the actual system_supports_32bit_el0() call as the conditional inside the vector handler. That routine in turn is calling id_aa64pfr0_32bit_el0() that should load the ID_AA64PFR0_EL1. We can override the EL0 nibble by leveraging the idreg-override machinery, as noted by robin.murphy. In this way we don't even need to add a new kernel parameter, maybe just a user friendly mnemonic alias to that register, such like 'arm64.no32bit-el0'. - CONFIG_COMPAT can be checked in the vector handler as you proposed in your mock up or maybe event inside system_supports_32bit_el0() - need to check whether the compiler is able to optimize away the static case even in that case. Does it sounds reasonable? Many thanks, Andrea
diff --git a/arch/arm64/include/asm/exception.h b/arch/arm64/include/asm/exception.h index ad688e157c9b..ccb41ba8d86c 100644 --- a/arch/arm64/include/asm/exception.h +++ b/arch/arm64/include/asm/exception.h @@ -48,6 +48,13 @@ asmlinkage void el0t_32_irq_handler(struct pt_regs *regs); asmlinkage void el0t_32_fiq_handler(struct pt_regs *regs); asmlinkage void el0t_32_error_handler(struct pt_regs *regs); +#ifdef CONFIG_COMPAT +asmlinkage void el0t_32_sync_ni_handler(struct pt_regs *regs); +asmlinkage void el0t_32_irq_ni_handler(struct pt_regs *regs); +asmlinkage void el0t_32_fiq_ni_handler(struct pt_regs *regs); +asmlinkage void el0t_32_error_ni_handler(struct pt_regs *regs); +#endif + asmlinkage void call_on_irq_stack(struct pt_regs *regs, void (*func)(struct pt_regs *)); asmlinkage void asm_exit_to_user_mode(struct pt_regs *regs); diff --git a/arch/arm64/kernel/entry-common.c b/arch/arm64/kernel/entry-common.c index 69ff9b8c0bde..32761760d9dd 100644 --- a/arch/arm64/kernel/entry-common.c +++ b/arch/arm64/kernel/entry-common.c @@ -802,6 +802,11 @@ asmlinkage void noinstr el0t_64_error_handler(struct pt_regs *regs) } #ifdef CONFIG_COMPAT +UNHANDLED(el0t, 32, sync_ni) +UNHANDLED(el0t, 32, irq_ni) +UNHANDLED(el0t, 32, fiq_ni) +UNHANDLED(el0t, 32, error_ni) + static void noinstr el0_cp15(struct pt_regs *regs, unsigned long esr) { enter_from_user_mode(regs); @@ -821,6 +826,11 @@ static void noinstr el0_svc_compat(struct pt_regs *regs) asmlinkage void noinstr el0t_32_sync_handler(struct pt_regs *regs) { + if (!aarch32_enabled()) { + el0t_32_sync_ni_handler(regs); + return; + } + unsigned long esr = read_sysreg(esr_el1); switch (ESR_ELx_EC(esr)) { @@ -865,17 +875,26 @@ asmlinkage void noinstr el0t_32_sync_handler(struct pt_regs *regs) asmlinkage void noinstr el0t_32_irq_handler(struct pt_regs *regs) { - __el0_irq_handler_common(regs); + if (!aarch32_enabled()) + el0t_32_irq_ni_handler(regs); + else + __el0_irq_handler_common(regs); } asmlinkage void noinstr el0t_32_fiq_handler(struct pt_regs *regs) { - __el0_fiq_handler_common(regs); + if (!aarch32_enabled()) + el0t_32_fiq_ni_handler(regs); + else + __el0_fiq_handler_common(regs); } asmlinkage void noinstr el0t_32_error_handler(struct pt_regs *regs) { - __el0_error_handler_common(regs); + if (!aarch32_enabled()) + el0t_32_error_ni_handler(regs); + else + __el0_error_handler_common(regs); } bool __aarch32_enabled __ro_after_init = true;