0001
0002
0003
0004
0005
0006
0007
0008
0009
0010
0011
0012
0013
0014
0015
0016
0017 #undef DEBUG
0018
0019 #include <linux/string.h>
0020 #include <linux/pgtable.h>
0021 #include <asm/pgalloc.h>
0022 #include <asm/kup.h>
0023 #include <asm/smp.h>
0024
0025 phys_addr_t memstart_addr __ro_after_init = (phys_addr_t)~0ull;
0026 EXPORT_SYMBOL_GPL(memstart_addr);
0027 phys_addr_t kernstart_addr __ro_after_init;
0028 EXPORT_SYMBOL_GPL(kernstart_addr);
0029 unsigned long kernstart_virt_addr __ro_after_init = KERNELBASE;
0030 EXPORT_SYMBOL_GPL(kernstart_virt_addr);
0031
0032 bool disable_kuep = !IS_ENABLED(CONFIG_PPC_KUEP);
0033 bool disable_kuap = !IS_ENABLED(CONFIG_PPC_KUAP);
0034
0035 static int __init parse_nosmep(char *p)
0036 {
0037 if (!IS_ENABLED(CONFIG_PPC_BOOK3S_64))
0038 return 0;
0039
0040 disable_kuep = true;
0041 pr_warn("Disabling Kernel Userspace Execution Prevention\n");
0042 return 0;
0043 }
0044 early_param("nosmep", parse_nosmep);
0045
0046 static int __init parse_nosmap(char *p)
0047 {
0048 disable_kuap = true;
0049 pr_warn("Disabling Kernel Userspace Access Protection\n");
0050 return 0;
0051 }
0052 early_param("nosmap", parse_nosmap);
0053
0054 void __weak setup_kuep(bool disabled)
0055 {
0056 if (!IS_ENABLED(CONFIG_PPC_KUEP) || disabled)
0057 return;
0058
0059 if (smp_processor_id() != boot_cpuid)
0060 return;
0061
0062 pr_info("Activating Kernel Userspace Execution Prevention\n");
0063 }
0064
0065 void setup_kup(void)
0066 {
0067 setup_kuap(disable_kuap);
0068 setup_kuep(disable_kuep);
0069 }
0070
0071 #define CTOR(shift) static void ctor_##shift(void *addr) \
0072 { \
0073 memset(addr, 0, sizeof(void *) << (shift)); \
0074 }
0075
0076 CTOR(0); CTOR(1); CTOR(2); CTOR(3); CTOR(4); CTOR(5); CTOR(6); CTOR(7);
0077 CTOR(8); CTOR(9); CTOR(10); CTOR(11); CTOR(12); CTOR(13); CTOR(14); CTOR(15);
0078
0079 static inline void (*ctor(int shift))(void *)
0080 {
0081 BUILD_BUG_ON(MAX_PGTABLE_INDEX_SIZE != 15);
0082
0083 switch (shift) {
0084 case 0: return ctor_0;
0085 case 1: return ctor_1;
0086 case 2: return ctor_2;
0087 case 3: return ctor_3;
0088 case 4: return ctor_4;
0089 case 5: return ctor_5;
0090 case 6: return ctor_6;
0091 case 7: return ctor_7;
0092 case 8: return ctor_8;
0093 case 9: return ctor_9;
0094 case 10: return ctor_10;
0095 case 11: return ctor_11;
0096 case 12: return ctor_12;
0097 case 13: return ctor_13;
0098 case 14: return ctor_14;
0099 case 15: return ctor_15;
0100 }
0101 return NULL;
0102 }
0103
0104 struct kmem_cache *pgtable_cache[MAX_PGTABLE_INDEX_SIZE + 1];
0105 EXPORT_SYMBOL_GPL(pgtable_cache);
0106
0107
0108
0109
0110
0111
0112
0113
0114 void pgtable_cache_add(unsigned int shift)
0115 {
0116 char *name;
0117 unsigned long table_size = sizeof(void *) << shift;
0118 unsigned long align = table_size;
0119
0120
0121
0122
0123
0124
0125
0126
0127 unsigned long minalign = max(MAX_PGTABLE_INDEX_SIZE + 1,
0128 HUGEPD_SHIFT_MASK + 1);
0129 struct kmem_cache *new;
0130
0131
0132
0133
0134 BUG_ON(!is_power_of_2(minalign));
0135 BUG_ON(shift > MAX_PGTABLE_INDEX_SIZE);
0136
0137 if (PGT_CACHE(shift))
0138 return;
0139
0140 align = max_t(unsigned long, align, minalign);
0141 name = kasprintf(GFP_KERNEL, "pgtable-2^%d", shift);
0142 new = kmem_cache_create(name, table_size, align, 0, ctor(shift));
0143 if (!new)
0144 panic("Could not allocate pgtable cache for order %d", shift);
0145
0146 kfree(name);
0147 pgtable_cache[shift] = new;
0148
0149 pr_debug("Allocated pgtable cache for order %d\n", shift);
0150 }
0151 EXPORT_SYMBOL_GPL(pgtable_cache_add);
0152
0153 void pgtable_cache_init(void)
0154 {
0155 pgtable_cache_add(PGD_INDEX_SIZE);
0156
0157 if (PMD_CACHE_INDEX)
0158 pgtable_cache_add(PMD_CACHE_INDEX);
0159
0160
0161
0162
0163
0164 if (PUD_CACHE_INDEX)
0165 pgtable_cache_add(PUD_CACHE_INDEX);
0166 }