GIF89a; Mini Shell

Mini Shell

Direktori : /usr/lib/modules/3.10.0-1160.88.1.el7.centos.plus.x86_64/source/arch/x86/include/asm/
Upload File :
Current File : //usr/lib/modules/3.10.0-1160.88.1.el7.centos.plus.x86_64/source/arch/x86/include/asm/pgtable_64.h

#ifndef _ASM_X86_PGTABLE_64_H
#define _ASM_X86_PGTABLE_64_H

#include <linux/const.h>
#include <linux/kaiser.h>
#include <asm/pgtable_64_types.h>

#ifndef __ASSEMBLY__

/*
 * This file contains the functions and defines necessary to modify and use
 * the x86-64 page table tree.
 */
#include <asm/processor.h>
#include <linux/bitops.h>
#include <linux/threads.h>
#include <asm/mm_track.h>

extern pud_t level3_kernel_pgt[512];
extern pud_t level3_ident_pgt[512];
extern pmd_t level2_kernel_pgt[512];
extern pmd_t level2_fixmap_pgt[512];
extern pmd_t level2_ident_pgt[512];
extern pte_t level1_fixmap_pgt[512];
extern pgd_t init_level4_pgt[];

#define swapper_pg_dir init_level4_pgt

extern void paging_init(void);

#define pte_ERROR(e)					\
	pr_err("%s:%d: bad pte %p(%016lx)\n",		\
	       __FILE__, __LINE__, &(e), pte_val(e))
#define pmd_ERROR(e)					\
	pr_err("%s:%d: bad pmd %p(%016lx)\n",		\
	       __FILE__, __LINE__, &(e), pmd_val(e))
#define pud_ERROR(e)					\
	pr_err("%s:%d: bad pud %p(%016lx)\n",		\
	       __FILE__, __LINE__, &(e), pud_val(e))
#define pgd_ERROR(e)					\
	pr_err("%s:%d: bad pgd %p(%016lx)\n",		\
	       __FILE__, __LINE__, &(e), pgd_val(e))

struct mm_struct;

void set_pte_vaddr_pud(pud_t *pud_page, unsigned long vaddr, pte_t new_pte);


static inline void native_pte_clear(struct mm_struct *mm, unsigned long addr,
				    pte_t *ptep)
{
	mm_track_pte(ptep);
	*ptep = native_make_pte(0);
}

static inline void native_set_pte(pte_t *ptep, pte_t pte)
{
	mm_track_pte(ptep);
	*ptep = pte;
}

static inline void native_set_pte_atomic(pte_t *ptep, pte_t pte)
{
	native_set_pte(ptep, pte);
}

static inline void native_set_pmd(pmd_t *pmdp, pmd_t pmd)
{
	mm_track_pmd(pmdp);
	*pmdp = pmd;
}

static inline void native_pmd_clear(pmd_t *pmd)
{
	native_set_pmd(pmd, native_make_pmd(0));
}

static inline pte_t native_ptep_get_and_clear(pte_t *xp)
{
	mm_track_pte(xp);
#ifdef CONFIG_SMP
	return native_make_pte(xchg(&xp->pte, 0));
#else
	/* native_local_ptep_get_and_clear,
	   but duplicated because of cyclic dependency */
	pte_t ret = *xp;
	native_pte_clear(NULL, 0, xp);
	return ret;
#endif
}

static inline pmd_t native_pmdp_get_and_clear(pmd_t *xp)
{
	mm_track_pmd(xp);
#ifdef CONFIG_SMP
	return native_make_pmd(xchg(&xp->pmd, 0));
#else
	/* native_local_pmdp_get_and_clear,
	   but duplicated because of cyclic dependency */
	pmd_t ret = *xp;
	native_pmd_clear(xp);
	return ret;
#endif
}

static inline void native_set_pud(pud_t *pudp, pud_t pud)
{
	mm_track_pud(pudp);
	*pudp = pud;
}

static inline void native_pud_clear(pud_t *pud)
{
	native_set_pud(pud, native_make_pud(0));
}

static inline pud_t native_pudp_get_and_clear(pud_t *xp)
{
#ifdef CONFIG_SMP
	return native_make_pud(xchg(&xp->pud, 0));
#else
	/* native_local_pudp_get_and_clear,
	 * but duplicated because of cyclic dependency
	 */
	pud_t ret = *xp;

	native_pud_clear(xp);
	return ret;
#endif
}

#ifdef CONFIG_PAGE_TABLE_ISOLATION
/*
 * All top-level KAISER page tables are order-1 pages (8k-aligned
 * and 8k in size).  The kernel one is at the beginning 4k and
 * the user (shadow) one is in the last 4k.  To switch between
 * them, you just need to flip the 12th bit in their addresses.
 */
#define KAISER_PGTABLE_SWITCH_BIT	PAGE_SHIFT

/*
 * This generates better code than the inline assembly in
 * __set_bit().
 */
static inline void *ptr_set_bit(void *ptr, int bit)
{
	unsigned long __ptr = (unsigned long)ptr;

	__ptr |= (1<<bit);
	return (void *)__ptr;
}
static inline void *ptr_clear_bit(void *ptr, int bit)
{
	unsigned long __ptr = (unsigned long)ptr;

	__ptr &= ~(1<<bit);
	return (void *)__ptr;
}

static inline pgd_t *kernel_to_shadow_pgdp(pgd_t *pgdp)
{
	return ptr_set_bit(pgdp, KAISER_PGTABLE_SWITCH_BIT);
}
static inline pgd_t *shadow_to_kernel_pgdp(pgd_t *pgdp)
{
	return ptr_clear_bit(pgdp, KAISER_PGTABLE_SWITCH_BIT);
}
#endif /* CONFIG_PAGE_TABLE_ISOLATION */

/*
 * Page table pages are page-aligned.  The lower half of the top
 * level is used for userspace and the top half for the kernel.
 *
 * Returns true for parts of the PGD that map userspace and
 * false for the parts that map the kernel.
 */
static inline bool pgdp_maps_userspace(void *__ptr)
{
	unsigned long ptr = (unsigned long)__ptr;

	return (ptr & ~PAGE_MASK) < (PAGE_SIZE / 2);
}

/*
 * Does this PGD allow access from userspace?
 */
static inline bool pgd_userspace_access(pgd_t pgd)
{
	return pgd.pgd & _PAGE_USER;
}

static inline void kaiser_poison_pgd(pgd_t *pgd)
{
	if (pgd->pgd & _PAGE_PRESENT && __supported_pte_mask & _PAGE_NX)
		pgd->pgd |= _PAGE_NX;
}

static inline void kaiser_unpoison_pgd(pgd_t *pgd)
{
	if (pgd->pgd & _PAGE_PRESENT && __supported_pte_mask & _PAGE_NX)
		pgd->pgd &= ~_PAGE_NX;
}

static inline void kaiser_poison_pgd_atomic(pgd_t *pgd)
{
	BUILD_BUG_ON(_PAGE_NX == 0);
	if (pgd->pgd & _PAGE_PRESENT && __supported_pte_mask & _PAGE_NX)
		set_bit(_PAGE_BIT_NX, &pgd->pgd);
}

static inline void kaiser_unpoison_pgd_atomic(pgd_t *pgd)
{
	if (pgd->pgd & _PAGE_PRESENT && __supported_pte_mask & _PAGE_NX)
		clear_bit(_PAGE_BIT_NX, &pgd->pgd);
}

/*
 * Take a PGD location (pgdp) and a pgd value that needs
 * to be set there.  Populates the shadow and returns
 * the resulting PGD that must be set in the kernel copy
 * of the page tables.
 */
static inline pgd_t kaiser_set_shadow_pgd(pgd_t *pgdp, pgd_t pgd)
{
#ifdef CONFIG_PAGE_TABLE_ISOLATION
	if (pgd_userspace_access(pgd)) {
		if (pgdp_maps_userspace(pgdp)) {
			VM_WARN_ON_ONCE(!is_kaiser_pgd(pgdp));
			/*
			 * The user/shadow page tables get the full
			 * PGD, accessible from userspace:
			 */
			kernel_to_shadow_pgdp(pgdp)->pgd = pgd.pgd;
			/*
			 * For the copy of the pgd that the kernel
			 * uses, make it unusable to userspace.  This
			 * ensures if we get out to userspace with the
			 * wrong CR3 value, userspace will crash
			 * instead of running.
			 */
			if (kaiser_active())
				kaiser_poison_pgd(&pgd);
		}
	} else if (pgd_userspace_access(*pgdp)) {
		/*
		 * We are clearing a _PAGE_USER PGD for which we
		 * presumably populated the shadow.  We must now
		 * clear the shadow PGD entry.
		 */
		if (pgdp_maps_userspace(pgdp)) {
			VM_WARN_ON_ONCE(!is_kaiser_pgd(pgdp));
			kernel_to_shadow_pgdp(pgdp)->pgd = pgd.pgd;
		} else {
			/*
			 * Attempted to clear a _PAGE_USER PGD which
			 * is in the kernel porttion of the address
			 * space.  PGDs are pre-populated and we
			 * never clear them.
			 */
			WARN_ON_ONCE(1);
		}
	} else {
		extern struct mutex kexec_mutex;

		/*
		 * _PAGE_USER was not set in either the PGD being set
		 * or cleared.  All kernel PGDs should be
		 * pre-populated so this should never happen after
		 * boot except when kexec'ing a new kernel.
		 */
		VM_WARN_ON_ONCE(system_state == SYSTEM_RUNNING &&
				!mutex_is_locked(&kexec_mutex) &&
				is_kaiser_pgd(pgdp));
	}
#endif
	/* return the copy of the PGD we want the kernel to use: */
	return pgd;
}

static inline void native_set_pgd(pgd_t *pgdp, pgd_t pgd)
{
	mm_track_pgd(pgdp);
#ifdef CONFIG_PAGE_TABLE_ISOLATION
	*pgdp = kaiser_set_shadow_pgd(pgdp, pgd);
#else /* CONFIG_PAGE_TABLE_ISOLATION */
	*pgdp = pgd;
#endif
}

static inline void native_pgd_clear(pgd_t *pgd)
{
	native_set_pgd(pgd, native_make_pgd(0));
}

extern void sync_global_pgds(unsigned long start, unsigned long end,
			     int removed);

/*
 * Conversion functions: convert a page and protection to a page entry,
 * and a page entry and page directory to the page they refer to.
 */

/*
 * Level 4 access.
 */
static inline int pgd_large(pgd_t pgd) { return 0; }
#define mk_kernel_pgd(address) __pgd((address) | _KERNPG_TABLE)

/* PUD - Level3 access */

/* PMD  - Level 2 access */
#define pte_to_pgoff(pte) ((~pte_val((pte)) & PHYSICAL_PAGE_MASK) >> PAGE_SHIFT)
#define pgoff_to_pte(off) ((pte_t) { .pte =				\
				((~off & (PHYSICAL_PAGE_MASK>>PAGE_SHIFT)) \
				 << PAGE_SHIFT) | _PAGE_FILE })
#ifdef PTE_FILE_MAX_BITS
#error "must be undefined to activate pte_file_max_bits()"
#endif
static inline int pte_file_max_bits(void)
{
	/*
	 * Set the highest allowed nonlinear pgoff to 1 bit less than
	 * x86_phys_bits to guarantee the inversion of the highest bit
	 * in the pgoff_to_pte conversion. The lowest x86_phys_bits is
	 * 36 so x86 implementations with 36 bits will find themselves
	 * unable to keep using remap_file_pages() with file offsets
	 * above 128TiB (calculated as 1<<(36-1+PAGE_SHIFT)). More
	 * recent CPUs will retain much higher max file offset limits.
	 */
	return min(__PHYSICAL_MASK_SHIFT, boot_cpu_data.x86_phys_bits - 1);
}

/* PTE - Level 1 access. */

/* x86-64 always has all page tables mapped. */
#define pte_offset_map(dir, address) pte_offset_kernel((dir), (address))
#define pte_unmap(pte) ((void)(pte))/* NOP */

/* Encode and de-code a swap entry */
#if _PAGE_BIT_FILE > _PAGE_BIT_PROTNONE
#error unsupported PTE bit arrangement
#endif

/*
 * Encode and de-code a swap entry
 *
 * |     ...            | 11| 10|  9|8|7|6|5| 4| 3|2|1|0| <- bit number
 * |     ...            |SW3|SW2|SW1|G|L|D|A|CD|WT|U|W|P| <- bit names
 * | TYPE (59-63) | ~OFFSET (9-58)  |0|X|X|X| X| X|X|X|0| <- swp entry
 *
 * G (8) is aliased and used as a PROT_NONE indicator for
 * !present ptes.  We need to start storing swap entries above
 * there.  We also need to avoid using A and D because of an
 * erratum where they can be incorrectly set by hardware on
 * non-present PTEs.
 *
 * The offset is inverted by a binary not operation to make the high
 * physical bits set.
 */
#define SWP_TYPE_BITS		5

#define SWP_OFFSET_FIRST_BIT	(_PAGE_BIT_PROTNONE + 1)

/* We always extract/encode the offset by shifting it all the way up, and then down again */
#define SWP_OFFSET_SHIFT	(SWP_OFFSET_FIRST_BIT+SWP_TYPE_BITS)

#define MAX_SWAPFILES_CHECK() BUILD_BUG_ON(MAX_SWAPFILES_SHIFT > SWP_TYPE_BITS)

/* Extract the high bits for type */
#define __swp_type(x) ((x).val >> (64 - SWP_TYPE_BITS))

/* Shift up (to get rid of type), then down to get value */
#define __swp_offset(x) (~(x).val << SWP_TYPE_BITS >> SWP_OFFSET_SHIFT)

/*
 * Shift the offset up "too far" by TYPE bits, then down again
 * The offset is inverted by a binary not operation to make the high
 * physical bits set.
 */
#define __swp_entry(type, offset) ((swp_entry_t) { \
	(~(unsigned long)(offset) << SWP_OFFSET_SHIFT >> SWP_TYPE_BITS) \
	| ((unsigned long)(type) << (64-SWP_TYPE_BITS)) })

#define __pte_to_swp_entry(pte)		((swp_entry_t) { pte_val((pte)) })
#define __swp_entry_to_pte(x)		((pte_t) { .pte = (x).val })

extern int kern_addr_valid(unsigned long addr);
extern void cleanup_highmap(void);

#define HAVE_ARCH_UNMAPPED_AREA
#define HAVE_ARCH_UNMAPPED_AREA_TOPDOWN

#define pgtable_cache_init()   do { } while (0)
#define check_pgt_cache()      do { } while (0)

#define PAGE_AGP    PAGE_KERNEL_NOCACHE
#define HAVE_PAGE_AGP 1

/* fs/proc/kcore.c */
#define	kc_vaddr_to_offset(v) ((v) & __VIRTUAL_MASK)
#define	kc_offset_to_vaddr(o) ((o) | ~__VIRTUAL_MASK)

#define __HAVE_ARCH_PTE_SAME

#define vmemmap ((struct page *)VMEMMAP_START)

extern void init_extra_mapping_uc(unsigned long phys, unsigned long size);
extern void init_extra_mapping_wb(unsigned long phys, unsigned long size);

#include <asm/pgtable-invert.h>

#endif /* !__ASSEMBLY__ */

#endif /* _ASM_X86_PGTABLE_64_H */

./BlackJoker Mini Shell 1.0