1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
|
/* SPDX-License-Identifier: GPL-2.0-only */
/*
* Supervisor Mode Access Prevention support
*
* Copyright (C) 2012 Intel Corporation
* Author: H. Peter Anvin <hpa@linux.intel.com>
*/
#ifndef _ASM_X86_SMAP_H
#define _ASM_X86_SMAP_H
#include <asm/nops.h>
#include <asm/cpufeatures.h>
#include <asm/alternative.h>
#ifdef __ASSEMBLER__
#define ASM_CLAC \
ALTERNATIVE "", "clac", X86_FEATURE_SMAP
#define ASM_STAC \
ALTERNATIVE "", "stac", X86_FEATURE_SMAP
#else /* __ASSEMBLER__ */
/*
* The CLAC/STAC instructions toggle the enforcement of
* X86_FEATURE_SMAP along with X86_FEATURE_LASS.
*
* SMAP enforcement is based on the _PAGE_BIT_USER bit in the page
* tables. The kernel is not allowed to touch pages with that bit set
* unless the AC bit is set.
*
* Use stac()/clac() when accessing userspace (_PAGE_USER) mappings,
* regardless of location.
*
* Note: a barrier is implicit in alternative().
*/
static __always_inline void clac(void)
{
alternative("", "clac", X86_FEATURE_SMAP);
}
static __always_inline void stac(void)
{
alternative("", "stac", X86_FEATURE_SMAP);
}
/*
* LASS enforcement is based on bit 63 of the virtual address. The
* kernel is not allowed to touch memory in the lower half of the
* virtual address space.
*
* Use lass_stac()/lass_clac() to toggle the AC bit for kernel data
* accesses (!_PAGE_USER) that are blocked by LASS, but not by SMAP.
*
* Even with the AC bit set, LASS will continue to block instruction
* fetches from the user half of the address space. To allow those,
* clear CR4.LASS to disable the LASS mechanism entirely.
*
* Note: a barrier is implicit in alternative().
*/
static __always_inline void lass_clac(void)
{
alternative("", "clac", X86_FEATURE_LASS);
}
static __always_inline void lass_stac(void)
{
alternative("", "stac", X86_FEATURE_LASS);
}
static __always_inline unsigned long smap_save(void)
{
unsigned long flags;
asm volatile ("# smap_save\n\t"
ALTERNATIVE(ANNOTATE_IGNORE_ALTERNATIVE
"", "pushf; pop %0; clac",
X86_FEATURE_SMAP)
: "=rm" (flags) : : "memory", "cc");
return flags;
}
static __always_inline void smap_restore(unsigned long flags)
{
asm volatile ("# smap_restore\n\t"
ALTERNATIVE(ANNOTATE_IGNORE_ALTERNATIVE
"", "push %0; popf",
X86_FEATURE_SMAP)
: : "g" (flags) : "memory", "cc");
}
/* These macros can be used in asm() statements */
#define ASM_CLAC \
ALTERNATIVE("", "clac", X86_FEATURE_SMAP)
#define ASM_STAC \
ALTERNATIVE("", "stac", X86_FEATURE_SMAP)
#define ASM_CLAC_UNSAFE \
ALTERNATIVE("", ANNOTATE_IGNORE_ALTERNATIVE "clac", X86_FEATURE_SMAP)
#define ASM_STAC_UNSAFE \
ALTERNATIVE("", ANNOTATE_IGNORE_ALTERNATIVE "stac", X86_FEATURE_SMAP)
#endif /* __ASSEMBLER__ */
#endif /* _ASM_X86_SMAP_H */
|