xref: /openbmc/linux/arch/arm64/include/asm/mmu.h (revision e112b032a72c78f15d0c803c5dc6be444c2e6c66)
1caab277bSThomas Gleixner /* SPDX-License-Identifier: GPL-2.0-only */
24f04d8f0SCatalin Marinas /*
34f04d8f0SCatalin Marinas  * Copyright (C) 2012 ARM Ltd.
44f04d8f0SCatalin Marinas  */
54f04d8f0SCatalin Marinas #ifndef __ASM_MMU_H
64f04d8f0SCatalin Marinas #define __ASM_MMU_H
74f04d8f0SCatalin Marinas 
8b89d82efSWill Deacon #include <asm/cputype.h>
9b89d82efSWill Deacon 
105ce93ab6SYury Norov #define MMCF_AARCH32	0x1	/* mm context flag for AArch32 executables */
1179e9aa59SJames Morse #define USER_ASID_BIT	48
1279e9aa59SJames Morse #define USER_ASID_FLAG	(UL(1) << USER_ASID_BIT)
13b519538dSWill Deacon #define TTBR_ASID_MASK	(UL(0xffff) << 48)
145ce93ab6SYury Norov 
154205a89bSMarc Zyngier #define BP_HARDEN_EL2_SLOTS 4
164205a89bSMarc Zyngier 
17fc0e1299SWill Deacon #ifndef __ASSEMBLY__
18fc0e1299SWill Deacon 
194f04d8f0SCatalin Marinas typedef struct {
205aec715dSWill Deacon 	atomic64_t	id;
214f04d8f0SCatalin Marinas 	void		*vdso;
2206beb72fSPratyush Anand 	unsigned long	flags;
234f04d8f0SCatalin Marinas } mm_context_t;
244f04d8f0SCatalin Marinas 
255aec715dSWill Deacon /*
265aec715dSWill Deacon  * This macro is only used by the TLBI code, which cannot race with an
275aec715dSWill Deacon  * ASID change and therefore doesn't need to reload the counter using
285aec715dSWill Deacon  * atomic64_read.
295aec715dSWill Deacon  */
305aec715dSWill Deacon #define ASID(mm)	((mm)->context.id.counter & 0xffff)
314f04d8f0SCatalin Marinas 
32fc0e1299SWill Deacon static inline bool arm64_kernel_unmapped_at_el0(void)
33fc0e1299SWill Deacon {
34ea1e3de8SWill Deacon 	return IS_ENABLED(CONFIG_UNMAP_KERNEL_AT_EL0) &&
35ea1e3de8SWill Deacon 	       cpus_have_const_cap(ARM64_UNMAP_KERNEL_AT_EL0);
36fc0e1299SWill Deacon }
37fc0e1299SWill Deacon 
38b89d82efSWill Deacon static inline bool arm64_kernel_use_ng_mappings(void)
39b89d82efSWill Deacon {
40b89d82efSWill Deacon 	bool tx1_bug;
41b89d82efSWill Deacon 
42b89d82efSWill Deacon 	/* What's a kpti? Use global mappings if we don't know. */
43b89d82efSWill Deacon 	if (!IS_ENABLED(CONFIG_UNMAP_KERNEL_AT_EL0))
44b89d82efSWill Deacon 		return false;
45b89d82efSWill Deacon 
46b89d82efSWill Deacon 	/*
47b89d82efSWill Deacon 	 * Note: this function is called before the CPU capabilities have
48b89d82efSWill Deacon 	 * been configured, so our early mappings will be global. If we
49b89d82efSWill Deacon 	 * later determine that kpti is required, then
50b89d82efSWill Deacon 	 * kpti_install_ng_mappings() will make them non-global.
51b89d82efSWill Deacon 	 */
522f979675SJames Morse 	if (arm64_kernel_unmapped_at_el0())
532f979675SJames Morse 		return true;
542f979675SJames Morse 
55b89d82efSWill Deacon 	if (!IS_ENABLED(CONFIG_RANDOMIZE_BASE))
562f979675SJames Morse 		return false;
57b89d82efSWill Deacon 
58b89d82efSWill Deacon 	/*
59b89d82efSWill Deacon 	 * KASLR is enabled so we're going to be enabling kpti on non-broken
60b89d82efSWill Deacon 	 * CPUs regardless of their susceptibility to Meltdown. Rather
61b89d82efSWill Deacon 	 * than force everybody to go through the G -> nG dance later on,
62b89d82efSWill Deacon 	 * just put down non-global mappings from the beginning.
63b89d82efSWill Deacon 	 */
64b89d82efSWill Deacon 	if (!IS_ENABLED(CONFIG_CAVIUM_ERRATUM_27456)) {
65b89d82efSWill Deacon 		tx1_bug = false;
66b89d82efSWill Deacon #ifndef MODULE
67b89d82efSWill Deacon 	} else if (!static_branch_likely(&arm64_const_caps_ready)) {
68b89d82efSWill Deacon 		extern const struct midr_range cavium_erratum_27456_cpus[];
69b89d82efSWill Deacon 
70b89d82efSWill Deacon 		tx1_bug = is_midr_in_range_list(read_cpuid_id(),
71b89d82efSWill Deacon 						cavium_erratum_27456_cpus);
72b89d82efSWill Deacon #endif
73b89d82efSWill Deacon 	} else {
74b89d82efSWill Deacon 		tx1_bug = __cpus_have_const_cap(ARM64_WORKAROUND_CAVIUM_27456);
75b89d82efSWill Deacon 	}
76b89d82efSWill Deacon 
77b89d82efSWill Deacon 	return !tx1_bug && kaslr_offset() > 0;
78b89d82efSWill Deacon }
79b89d82efSWill Deacon 
800f15adbbSWill Deacon typedef void (*bp_hardening_cb_t)(void);
810f15adbbSWill Deacon 
820f15adbbSWill Deacon struct bp_hardening_data {
830f15adbbSWill Deacon 	int			hyp_vectors_slot;
840f15adbbSWill Deacon 	bp_hardening_cb_t	fn;
850f15adbbSWill Deacon };
860f15adbbSWill Deacon 
87dee39247SMarc Zyngier #if (defined(CONFIG_HARDEN_BRANCH_PREDICTOR) ||	\
88dee39247SMarc Zyngier      defined(CONFIG_HARDEN_EL2_VECTORS))
890f15adbbSWill Deacon extern char __bp_harden_hyp_vecs_start[], __bp_harden_hyp_vecs_end[];
904205a89bSMarc Zyngier extern atomic_t arm64_el2_vector_last_slot;
91dee39247SMarc Zyngier #endif  /* CONFIG_HARDEN_BRANCH_PREDICTOR || CONFIG_HARDEN_EL2_VECTORS */
920f15adbbSWill Deacon 
93dee39247SMarc Zyngier #ifdef CONFIG_HARDEN_BRANCH_PREDICTOR
940f15adbbSWill Deacon DECLARE_PER_CPU_READ_MOSTLY(struct bp_hardening_data, bp_hardening_data);
950f15adbbSWill Deacon 
960f15adbbSWill Deacon static inline struct bp_hardening_data *arm64_get_bp_hardening_data(void)
970f15adbbSWill Deacon {
980f15adbbSWill Deacon 	return this_cpu_ptr(&bp_hardening_data);
990f15adbbSWill Deacon }
1000f15adbbSWill Deacon 
1010f15adbbSWill Deacon static inline void arm64_apply_bp_hardening(void)
1020f15adbbSWill Deacon {
1030f15adbbSWill Deacon 	struct bp_hardening_data *d;
1040f15adbbSWill Deacon 
1050f15adbbSWill Deacon 	if (!cpus_have_const_cap(ARM64_HARDEN_BRANCH_PREDICTOR))
1060f15adbbSWill Deacon 		return;
1070f15adbbSWill Deacon 
1080f15adbbSWill Deacon 	d = arm64_get_bp_hardening_data();
1090f15adbbSWill Deacon 	if (d->fn)
1100f15adbbSWill Deacon 		d->fn();
1110f15adbbSWill Deacon }
1120f15adbbSWill Deacon #else
1130f15adbbSWill Deacon static inline struct bp_hardening_data *arm64_get_bp_hardening_data(void)
1140f15adbbSWill Deacon {
1150f15adbbSWill Deacon 	return NULL;
1160f15adbbSWill Deacon }
1170f15adbbSWill Deacon 
1180f15adbbSWill Deacon static inline void arm64_apply_bp_hardening(void)	{ }
1190f15adbbSWill Deacon #endif	/* CONFIG_HARDEN_BRANCH_PREDICTOR */
1200f15adbbSWill Deacon 
12183504032SWill Deacon extern void arm64_memblock_init(void);
1224f04d8f0SCatalin Marinas extern void paging_init(void);
1233194ac6eSDavid Daney extern void bootmem_init(void);
1242475ff9dSCatalin Marinas extern void __iomem *early_io_map(phys_addr_t phys, unsigned long virt);
1250bf757c7SMark Salter extern void init_mem_pgprot(void);
1268ce837ceSArd Biesheuvel extern void create_pgd_mapping(struct mm_struct *mm, phys_addr_t phys,
1278ce837ceSArd Biesheuvel 			       unsigned long virt, phys_addr_t size,
128f14c66ceSArd Biesheuvel 			       pgprot_t prot, bool page_mappings_only);
129*e112b032SHsin-Yi Wang extern void *fixmap_remap_fdt(phys_addr_t dt_phys, int *size, pgprot_t prot);
1305ea5306cSArd Biesheuvel extern void mark_linear_text_alias_ro(void);
1314f04d8f0SCatalin Marinas 
1322b5548b6SJun Yao #define INIT_MM_CONTEXT(name)	\
1332b5548b6SJun Yao 	.pgd = init_pg_dir,
1342b5548b6SJun Yao 
135fc0e1299SWill Deacon #endif	/* !__ASSEMBLY__ */
1364f04d8f0SCatalin Marinas #endif
137