powerpc/book3s64/kuep: Move KUEP related function outside radix
The next set of patches adds support for kuep with hash translation. In preparation for that rename/move kuap related functions to non radix names. Also set MMU_FTR_KUEP and add the missing isync(). Signed-off-by: Aneesh Kumar K.V <aneesh.kumar@linux.ibm.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au> Link: https://lore.kernel.org/r/20201127044424.40686-7-aneesh.kumar@linux.ibm.com
This commit is contained in:
parent
3b47b7549e
commit
57b7505aa8
|
@ -7,6 +7,7 @@
|
||||||
|
|
||||||
#define AMR_KUAP_BLOCK_READ UL(0x4000000000000000)
|
#define AMR_KUAP_BLOCK_READ UL(0x4000000000000000)
|
||||||
#define AMR_KUAP_BLOCK_WRITE UL(0x8000000000000000)
|
#define AMR_KUAP_BLOCK_WRITE UL(0x8000000000000000)
|
||||||
|
#define AMR_KUEP_BLOCKED (1UL << 62)
|
||||||
#define AMR_KUAP_BLOCKED (AMR_KUAP_BLOCK_READ | AMR_KUAP_BLOCK_WRITE)
|
#define AMR_KUAP_BLOCKED (AMR_KUAP_BLOCK_READ | AMR_KUAP_BLOCK_WRITE)
|
||||||
#define AMR_KUAP_SHIFT 62
|
#define AMR_KUAP_SHIFT 62
|
||||||
|
|
||||||
|
|
|
@ -229,6 +229,27 @@ out:
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef CONFIG_PPC_KUEP
|
||||||
|
void __init setup_kuep(bool disabled)
|
||||||
|
{
|
||||||
|
if (disabled || !early_radix_enabled())
|
||||||
|
return;
|
||||||
|
|
||||||
|
if (smp_processor_id() == boot_cpuid) {
|
||||||
|
pr_info("Activating Kernel Userspace Execution Prevention\n");
|
||||||
|
cur_cpu_spec->mmu_features |= MMU_FTR_KUEP;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Radix always uses key0 of the IAMR to determine if an access is
|
||||||
|
* allowed. We set bit 0 (IBM bit 1) of key0, to prevent instruction
|
||||||
|
* fetch.
|
||||||
|
*/
|
||||||
|
mtspr(SPRN_IAMR, AMR_KUEP_BLOCKED);
|
||||||
|
isync();
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
#ifdef CONFIG_PPC_KUAP
|
#ifdef CONFIG_PPC_KUAP
|
||||||
void __init setup_kuap(bool disabled)
|
void __init setup_kuap(bool disabled)
|
||||||
{
|
{
|
||||||
|
|
|
@ -589,26 +589,6 @@ static void radix_init_amor(void)
|
||||||
mtspr(SPRN_AMOR, (3ul << 62));
|
mtspr(SPRN_AMOR, (3ul << 62));
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifdef CONFIG_PPC_KUEP
|
|
||||||
void setup_kuep(bool disabled)
|
|
||||||
{
|
|
||||||
if (disabled || !early_radix_enabled())
|
|
||||||
return;
|
|
||||||
|
|
||||||
if (smp_processor_id() == boot_cpuid) {
|
|
||||||
pr_info("Activating Kernel Userspace Execution Prevention\n");
|
|
||||||
cur_cpu_spec->mmu_features |= MMU_FTR_KUEP;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Radix always uses key0 of the IAMR to determine if an access is
|
|
||||||
* allowed. We set bit 0 (IBM bit 1) of key0, to prevent instruction
|
|
||||||
* fetch.
|
|
||||||
*/
|
|
||||||
mtspr(SPRN_IAMR, (1ul << 62));
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
void __init radix__early_init_mmu(void)
|
void __init radix__early_init_mmu(void)
|
||||||
{
|
{
|
||||||
unsigned long lpcr;
|
unsigned long lpcr;
|
||||||
|
|
Loading…
Reference in New Issue