blob: af0251fc85ed16b862ef0fdeaaa0b114406c847a [file] [log] [blame]
H. Peter Anvin1965aae2008-10-22 22:26:29 -07001#ifndef _ASM_X86_MMU_CONTEXT_H
2#define _ASM_X86_MMU_CONTEXT_H
Jeremy Fitzhardingec3c2fee2008-06-25 00:19:07 -04003
4#include <asm/desc.h>
Arun Sharma600634972011-07-26 16:09:06 -07005#include <linux/atomic.h>
Dave Hansend17d8f92014-07-31 08:40:59 -07006#include <linux/mm_types.h>
Dave Hansen7d06d9c2016-07-29 09:30:12 -07007#include <linux/pkeys.h>
Dave Hansend17d8f92014-07-31 08:40:59 -07008
9#include <trace/events/tlb.h>
10
Jeremy Fitzhardingec3c2fee2008-06-25 00:19:07 -040011#include <asm/pgalloc.h>
12#include <asm/tlbflush.h>
13#include <asm/paravirt.h>
Dave Hansenfe3d1972014-11-14 07:18:29 -080014#include <asm/mpx.h>
Jeremy Fitzhardingec3c2fee2008-06-25 00:19:07 -040015#ifndef CONFIG_PARAVIRT
Jeremy Fitzhardingec3c2fee2008-06-25 00:19:07 -040016static inline void paravirt_activate_mm(struct mm_struct *prev,
17 struct mm_struct *next)
18{
19}
20#endif /* !CONFIG_PARAVIRT */
21
Andy Lutomirski7911d3f2014-10-24 15:58:12 -070022#ifdef CONFIG_PERF_EVENTS
Andy Lutomirskia6673422014-10-24 15:58:13 -070023extern struct static_key rdpmc_always_available;
24
Andy Lutomirski7911d3f2014-10-24 15:58:12 -070025static inline void load_mm_cr4(struct mm_struct *mm)
26{
Peter Zijlstraa8335812015-07-09 19:23:38 +020027 if (static_key_false(&rdpmc_always_available) ||
Andy Lutomirskia6673422014-10-24 15:58:13 -070028 atomic_read(&mm->context.perf_rdpmc_allowed))
Andy Lutomirski7911d3f2014-10-24 15:58:12 -070029 cr4_set_bits(X86_CR4_PCE);
30 else
31 cr4_clear_bits(X86_CR4_PCE);
32}
33#else
34static inline void load_mm_cr4(struct mm_struct *mm) {}
35#endif
36
Andy Lutomirskia5b9e5a2015-07-30 14:31:34 -070037#ifdef CONFIG_MODIFY_LDT_SYSCALL
Jeremy Fitzhardingec3c2fee2008-06-25 00:19:07 -040038/*
Andy Lutomirski37868fe2015-07-30 14:31:32 -070039 * ldt_structs can be allocated, used, and freed, but they are never
40 * modified while live.
41 */
42struct ldt_struct {
43 /*
44 * Xen requires page-aligned LDTs with special permissions. This is
45 * needed to prevent us from installing evil descriptors such as
46 * call gates. On native, we could merge the ldt_struct and LDT
47 * allocations, but it's not worth trying to optimize.
48 */
49 struct desc_struct *entries;
50 int size;
51};
52
Andy Lutomirskia5b9e5a2015-07-30 14:31:34 -070053/*
54 * Used for LDT copy/destruction.
55 */
Dave Hansen39a05262016-02-12 13:02:34 -080056int init_new_context_ldt(struct task_struct *tsk, struct mm_struct *mm);
57void destroy_context_ldt(struct mm_struct *mm);
Andy Lutomirskia5b9e5a2015-07-30 14:31:34 -070058#else /* CONFIG_MODIFY_LDT_SYSCALL */
Dave Hansen39a05262016-02-12 13:02:34 -080059static inline int init_new_context_ldt(struct task_struct *tsk,
60 struct mm_struct *mm)
Andy Lutomirskia5b9e5a2015-07-30 14:31:34 -070061{
62 return 0;
63}
Dave Hansen39a05262016-02-12 13:02:34 -080064static inline void destroy_context_ldt(struct mm_struct *mm) {}
Andy Lutomirskia5b9e5a2015-07-30 14:31:34 -070065#endif
66
Andy Lutomirski37868fe2015-07-30 14:31:32 -070067static inline void load_mm_ldt(struct mm_struct *mm)
68{
Andy Lutomirskia5b9e5a2015-07-30 14:31:34 -070069#ifdef CONFIG_MODIFY_LDT_SYSCALL
Andy Lutomirski37868fe2015-07-30 14:31:32 -070070 struct ldt_struct *ldt;
71
72 /* lockless_dereference synchronizes with smp_store_release */
73 ldt = lockless_dereference(mm->context.ldt);
74
75 /*
76 * Any change to mm->context.ldt is followed by an IPI to all
77 * CPUs with the mm active. The LDT will not be freed until
78 * after the IPI is handled by all such CPUs. This means that,
79 * if the ldt_struct changes before we return, the values we see
80 * will be safe, and the new values will be loaded before we run
81 * any user code.
82 *
83 * NB: don't try to convert this to use RCU without extreme care.
84 * We would still need IRQs off, because we don't want to change
85 * the local LDT after an IPI loaded a newer value than the one
86 * that we can see.
87 */
88
89 if (unlikely(ldt))
90 set_ldt(ldt->entries, ldt->size);
91 else
92 clear_LDT();
Andy Lutomirskia5b9e5a2015-07-30 14:31:34 -070093#else
94 clear_LDT();
95#endif
Andy Lutomirski37868fe2015-07-30 14:31:32 -070096
97 DEBUG_LOCKS_WARN_ON(preemptible());
98}
99
Brian Gerst6826c8f2009-01-21 17:26:06 +0900100static inline void enter_lazy_tlb(struct mm_struct *mm, struct task_struct *tsk)
101{
102#ifdef CONFIG_SMP
Alex Shic6ae41e2012-05-11 15:35:27 +0800103 if (this_cpu_read(cpu_tlbstate.state) == TLBSTATE_OK)
104 this_cpu_write(cpu_tlbstate.state, TLBSTATE_LAZY);
Thomas Gleixner96a388d2007-10-11 11:20:03 +0200105#endif
Brian Gerst6826c8f2009-01-21 17:26:06 +0900106}
107
Dave Hansen39a05262016-02-12 13:02:34 -0800108static inline int init_new_context(struct task_struct *tsk,
109 struct mm_struct *mm)
110{
111 init_new_context_ldt(tsk, mm);
112 return 0;
113}
114static inline void destroy_context(struct mm_struct *mm)
115{
116 destroy_context_ldt(mm);
117}
118
Andy Lutomirski69c03192016-04-26 09:39:08 -0700119extern void switch_mm(struct mm_struct *prev, struct mm_struct *next,
120 struct task_struct *tsk);
Brian Gerst6826c8f2009-01-21 17:26:06 +0900121
Andy Lutomirski078194f2016-04-26 09:39:09 -0700122extern void switch_mm_irqs_off(struct mm_struct *prev, struct mm_struct *next,
123 struct task_struct *tsk);
124#define switch_mm_irqs_off switch_mm_irqs_off
Jeremy Fitzhardingec3c2fee2008-06-25 00:19:07 -0400125
126#define activate_mm(prev, next) \
127do { \
128 paravirt_activate_mm((prev), (next)); \
129 switch_mm((prev), (next), NULL); \
130} while (0);
131
Brian Gerst6826c8f2009-01-21 17:26:06 +0900132#ifdef CONFIG_X86_32
133#define deactivate_mm(tsk, mm) \
134do { \
Tejun Heoccbeed32009-02-09 22:17:40 +0900135 lazy_load_gs(0); \
Brian Gerst6826c8f2009-01-21 17:26:06 +0900136} while (0)
137#else
138#define deactivate_mm(tsk, mm) \
139do { \
140 load_gs_index(0); \
141 loadsegment(fs, 0); \
142} while (0)
143#endif
Jeremy Fitzhardingec3c2fee2008-06-25 00:19:07 -0400144
Dave Hansena1ea1c02014-11-18 10:23:49 -0800145static inline void arch_dup_mmap(struct mm_struct *oldmm,
146 struct mm_struct *mm)
147{
148 paravirt_arch_dup_mmap(oldmm, mm);
149}
150
151static inline void arch_exit_mmap(struct mm_struct *mm)
152{
153 paravirt_arch_exit_mmap(mm);
154}
155
Dave Hansenb0e9b092015-06-07 11:37:04 -0700156#ifdef CONFIG_X86_64
157static inline bool is_64bit_mm(struct mm_struct *mm)
158{
Masahiro Yamada97f26452016-08-03 13:45:50 -0700159 return !IS_ENABLED(CONFIG_IA32_EMULATION) ||
Dave Hansenb0e9b092015-06-07 11:37:04 -0700160 !(mm->context.ia32_compat == TIF_IA32);
161}
162#else
163static inline bool is_64bit_mm(struct mm_struct *mm)
164{
165 return false;
166}
167#endif
168
Dave Hansenfe3d1972014-11-14 07:18:29 -0800169static inline void arch_bprm_mm_init(struct mm_struct *mm,
170 struct vm_area_struct *vma)
171{
172 mpx_mm_init(mm);
173}
174
Dave Hansen1de4fa12014-11-14 07:18:31 -0800175static inline void arch_unmap(struct mm_struct *mm, struct vm_area_struct *vma,
176 unsigned long start, unsigned long end)
177{
Dave Hansenc9222282015-01-08 14:30:21 -0800178 /*
179 * mpx_notify_unmap() goes and reads a rarely-hot
180 * cacheline in the mm_struct. That can be expensive
181 * enough to be seen in profiles.
182 *
183 * The mpx_notify_unmap() call and its contents have been
184 * observed to affect munmap() performance on hardware
185 * where MPX is not present.
186 *
187 * The unlikely() optimizes for the fast case: no MPX
188 * in the CPU, or no MPX use in the process. Even if
189 * we get this wrong (in the unlikely event that MPX
190 * is widely enabled on some system) the overhead of
191 * MPX itself (reading bounds tables) is expected to
192 * overwhelm the overhead of getting this unlikely()
193 * consistently wrong.
194 */
195 if (unlikely(cpu_feature_enabled(X86_FEATURE_MPX)))
196 mpx_notify_unmap(mm, vma, start, end);
Dave Hansen1de4fa12014-11-14 07:18:31 -0800197}
198
Dave Hansen7d06d9c2016-07-29 09:30:12 -0700199#ifdef CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS
Dave Hansen8f62c882016-02-12 13:02:10 -0800200static inline int vma_pkey(struct vm_area_struct *vma)
201{
Dave Hansen8f62c882016-02-12 13:02:10 -0800202 unsigned long vma_pkey_mask = VM_PKEY_BIT0 | VM_PKEY_BIT1 |
203 VM_PKEY_BIT2 | VM_PKEY_BIT3;
Dave Hansen7d06d9c2016-07-29 09:30:12 -0700204
205 return (vma->vm_flags & vma_pkey_mask) >> VM_PKEY_SHIFT;
Dave Hansen8f62c882016-02-12 13:02:10 -0800206}
Dave Hansen7d06d9c2016-07-29 09:30:12 -0700207#else
208static inline int vma_pkey(struct vm_area_struct *vma)
209{
210 return 0;
211}
212#endif
Dave Hansen8f62c882016-02-12 13:02:10 -0800213
Dave Hansen33a709b2016-02-12 13:02:19 -0800214static inline bool __pkru_allows_pkey(u16 pkey, bool write)
215{
216 u32 pkru = read_pkru();
217
218 if (!__pkru_allows_read(pkru, pkey))
219 return false;
220 if (write && !__pkru_allows_write(pkru, pkey))
221 return false;
222
223 return true;
224}
225
226/*
227 * We only want to enforce protection keys on the current process
228 * because we effectively have no access to PKRU for other
229 * processes or any way to tell *which * PKRU in a threaded
230 * process we could use.
231 *
232 * So do not enforce things if the VMA is not from the current
233 * mm, or if we are in a kernel thread.
234 */
235static inline bool vma_is_foreign(struct vm_area_struct *vma)
236{
237 if (!current->mm)
238 return true;
239 /*
240 * Should PKRU be enforced on the access to this VMA? If
241 * the VMA is from another process, then PKRU has no
242 * relevance and should not be enforced.
243 */
244 if (current->mm != vma->vm_mm)
245 return true;
246
247 return false;
248}
249
Dave Hansen1b2ee122016-02-12 13:02:21 -0800250static inline bool arch_vma_access_permitted(struct vm_area_struct *vma,
Dave Hansend61172b2016-02-12 13:02:24 -0800251 bool write, bool execute, bool foreign)
Dave Hansen33a709b2016-02-12 13:02:19 -0800252{
Dave Hansend61172b2016-02-12 13:02:24 -0800253 /* pkeys never affect instruction fetches */
254 if (execute)
255 return true;
Dave Hansen33a709b2016-02-12 13:02:19 -0800256 /* allow access if the VMA is not one from this process */
Dave Hansen1b2ee122016-02-12 13:02:21 -0800257 if (foreign || vma_is_foreign(vma))
Dave Hansen33a709b2016-02-12 13:02:19 -0800258 return true;
259 return __pkru_allows_pkey(vma_pkey(vma), write);
260}
261
262static inline bool arch_pte_access_permitted(pte_t pte, bool write)
263{
264 return __pkru_allows_pkey(pte_flags_pkey(pte_flags(pte)), write);
265}
266
H. Peter Anvin1965aae2008-10-22 22:26:29 -0700267#endif /* _ASM_X86_MMU_CONTEXT_H */