]> git.karo-electronics.de Git - linux-beck.git/commitdiff
x86, mm: Clean up and simplify NX enablement
authorH. Peter Anvin <hpa@zytor.com>
Fri, 13 Nov 2009 23:28:16 +0000 (15:28 -0800)
committerH. Peter Anvin <hpa@zytor.com>
Mon, 16 Nov 2009 21:44:59 +0000 (13:44 -0800)
The 32- and 64-bit code used very different mechanisms for enabling
NX, but even the 32-bit code was enabling NX in head_32.S if it is
available.  Furthermore, we had a bewildering collection of tests for
the available of NX.

This patch:

a) merges the 32-bit set_nx() and the 64-bit check_efer() function
   into a single x86_configure_nx() function.  EFER control is left
   to the head code.

b) eliminates the nx_enabled variable entirely.  Things that need to
   test for NX enablement can verify __supported_pte_mask directly,
   and cpu_has_nx gives the supported status of NX.

Signed-off-by: H. Peter Anvin <hpa@zytor.com>
Cc: Tejun Heo <tj@kernel.org>
Cc: Brian Gerst <brgerst@gmail.com>
Cc: Yinghai Lu <yinghai@kernel.org>
Cc: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Vegard Nossum <vegardno@ifi.uio.no>
Cc: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
Cc: Chris Wright <chrisw@sous-sol.org>
LKML-Reference: <1258154897-6770-5-git-send-email-hpa@zytor.com>
Acked-by: Kees Cook <kees.cook@canonical.com>
arch/x86/include/asm/proto.h
arch/x86/kernel/cpu/common.c
arch/x86/kernel/setup.c
arch/x86/mm/init.c
arch/x86/mm/setup_nx.c
arch/x86/xen/enlighten.c

index 621f56d731212748902e2ba2f3436d84985395e2..add7f18f17a754fc12c5493af3f7586aa1b125a0 100644 (file)
@@ -16,7 +16,7 @@ extern void ia32_sysenter_target(void);
 
 extern void syscall32_cpu_init(void);
 
-extern void check_efer(void);
+extern void x86_configure_nx(void);
 
 extern int reboot_force;
 
index cc25c2b4a567c2ca3e020127cefe87b2778f02ee..18346da8c5945176d67697eb527a574774ced2cd 100644 (file)
@@ -1136,7 +1136,7 @@ void __cpuinit cpu_init(void)
        wrmsrl(MSR_KERNEL_GS_BASE, 0);
        barrier();
 
-       check_efer();
+       x86_configure_nx();
        if (cpu != 0)
                enable_x2apic();
 
index 0a6e94ab8339f92ff2c6ebfbe50a7798a56f7fb8..23b7f46bf8434567b32234ddacd9f515830128ed 100644 (file)
@@ -787,21 +787,17 @@ void __init setup_arch(char **cmdline_p)
        strlcpy(command_line, boot_command_line, COMMAND_LINE_SIZE);
        *cmdline_p = command_line;
 
-#ifdef CONFIG_X86_64
        /*
         * Must call this twice: Once just to detect whether hardware doesn't
         * support NX (so that the early EHCI debug console setup can safely
         * call set_fixmap(), and then again after parsing early parameters to
         * honor the respective command line option.
         */
-       check_efer();
-#endif
+       x86_configure_nx();
 
        parse_early_param();
 
-#ifdef CONFIG_X86_64
-       check_efer();
-#endif
+       x86_configure_nx();
 
        /* Must be before kernel pagetables are setup */
        vmi_activate();
index 73ffd5536f62d1fcbdd7b0c3804415436ebe4dc1..27ec2c23fd474cf74ed3b61619098744f90df286 100644 (file)
@@ -146,8 +146,8 @@ unsigned long __init_refok init_memory_mapping(unsigned long start,
        use_gbpages = direct_gbpages;
 #endif
 
-       set_nx();
-       if (nx_enabled)
+       /* XXX: replace this with Kees' improved messages */
+       if (__supported_pte_mask & _PAGE_NX)
                printk(KERN_INFO "NX (Execute Disable) protection: active\n");
 
        /* Enable PSE if available */
index 513d8ed5d2ec193aced4b43c66f008fee859d885..355818b087b52044dfc3494813260911f9f49958 100644 (file)
@@ -3,10 +3,8 @@
 #include <linux/init.h>
 
 #include <asm/pgtable.h>
+#include <asm/proto.h>
 
-int nx_enabled;
-
-#if defined(CONFIG_X86_64) || defined(CONFIG_X86_PAE)
 static int disable_nx __cpuinitdata;
 
 /*
@@ -22,48 +20,19 @@ static int __init noexec_setup(char *str)
        if (!str)
                return -EINVAL;
        if (!strncmp(str, "on", 2)) {
-               __supported_pte_mask |= _PAGE_NX;
                disable_nx = 0;
        } else if (!strncmp(str, "off", 3)) {
                disable_nx = 1;
-               __supported_pte_mask &= ~_PAGE_NX;
        }
+       x86_configure_nx();
        return 0;
 }
 early_param("noexec", noexec_setup);
-#endif
-
-#ifdef CONFIG_X86_PAE
-void __init set_nx(void)
-{
-       unsigned int v[4], l, h;
-
-       if (cpu_has_pae && (cpuid_eax(0x80000000) > 0x80000001)) {
-               cpuid(0x80000001, &v[0], &v[1], &v[2], &v[3]);
-
-               if ((v[3] & (1 << 20)) && !disable_nx) {
-                       rdmsr(MSR_EFER, l, h);
-                       l |= EFER_NX;
-                       wrmsr(MSR_EFER, l, h);
-                       nx_enabled = 1;
-                       __supported_pte_mask |= _PAGE_NX;
-               }
-       }
-}
-#else
-void set_nx(void)
-{
-}
-#endif
 
-#ifdef CONFIG_X86_64
-void __cpuinit check_efer(void)
+void __cpuinit x86_configure_nx(void)
 {
-       unsigned long efer;
-
-       rdmsrl(MSR_EFER, efer);
-       if (!(efer & EFER_NX) || disable_nx)
+       if (cpu_has_nx && !disable_nx)
+               __supported_pte_mask |= _PAGE_NX;
+       else
                __supported_pte_mask &= ~_PAGE_NX;
 }
-#endif
-
index 3439616d69f188787a6b06f60cc901f37b69735c..c5e805d4a788fcbcd34e917e8c27b81ce9e6865b 100644 (file)
@@ -1082,10 +1082,8 @@ asmlinkage void __init xen_start_kernel(void)
 
        __supported_pte_mask |= _PAGE_IOMAP;
 
-#ifdef CONFIG_X86_64
        /* Work out if we support NX */
-       check_efer();
-#endif
+       x86_configure_nx();
 
        xen_setup_features();