svn commit: r331258 - in head/sys: amd64/amd64 amd64/include x86/include x86/x86
Konstantin Belousov
kib at FreeBSD.org
Tue Mar 20 20:20:51 UTC 2018
Author: kib
Date: Tue Mar 20 20:20:49 2018
New Revision: 331258
URL: https://svnweb.freebsd.org/changeset/base/331258
Log:
Move the CR0.WP manipulation KPI to x86.
This should allow to avoid some #ifdefs in the common x86/ code.
Requested by: markj
Sponsored by: The FreeBSD Foundation
MFC after: 1 week
Modified:
head/sys/amd64/amd64/machdep.c
head/sys/amd64/include/md_var.h
head/sys/x86/include/x86_var.h
head/sys/x86/x86/cpu_machdep.c
Modified: head/sys/amd64/amd64/machdep.c
==============================================================================
--- head/sys/amd64/amd64/machdep.c Tue Mar 20 20:05:11 2018 (r331257)
+++ head/sys/amd64/amd64/machdep.c Tue Mar 20 20:20:49 2018 (r331258)
@@ -2597,31 +2597,6 @@ clear_pcb_flags(struct pcb *pcb, const u_int flags)
: "cc", "memory");
}
-/*
- * Enable and restore kernel text write permissions.
- * Callers must ensure that disable_wp()/restore_wp() are executed
- * without rescheduling on the same core.
- */
-bool
-disable_wp(void)
-{
- u_int cr0;
-
- cr0 = rcr0();
- if ((cr0 & CR0_WP) == 0)
- return (false);
- load_cr0(cr0 & ~CR0_WP);
- return (true);
-}
-
-void
-restore_wp(bool old_wp)
-{
-
- if (old_wp)
- load_cr0(rcr0() | CR0_WP);
-}
-
#ifdef KDB
/*
Modified: head/sys/amd64/include/md_var.h
==============================================================================
--- head/sys/amd64/include/md_var.h Tue Mar 20 20:05:11 2018 (r331257)
+++ head/sys/amd64/include/md_var.h Tue Mar 20 20:20:49 2018 (r331258)
@@ -53,8 +53,6 @@ void amd64_conf_fast_syscall(void);
void amd64_db_resume_dbreg(void);
void amd64_lower_shared_page(struct sysentvec *);
void amd64_syscall(struct thread *td, int traced);
-bool disable_wp(void);
-void restore_wp(bool old_wp);
void doreti_iret(void) __asm(__STRING(doreti_iret));
void doreti_iret_fault(void) __asm(__STRING(doreti_iret_fault));
void ld_ds(void) __asm(__STRING(ld_ds));
Modified: head/sys/x86/include/x86_var.h
==============================================================================
--- head/sys/x86/include/x86_var.h Tue Mar 20 20:05:11 2018 (r331257)
+++ head/sys/x86/include/x86_var.h Tue Mar 20 20:20:49 2018 (r331258)
@@ -119,6 +119,8 @@ void busdma_swi(void);
bool cpu_mwait_usable(void);
void cpu_probe_amdc1e(void);
void cpu_setregs(void);
+bool disable_wp(void);
+void restore_wp(bool old_wp);
void dump_add_page(vm_paddr_t);
void dump_drop_page(vm_paddr_t);
void finishidentcpu(void);
Modified: head/sys/x86/x86/cpu_machdep.c
==============================================================================
--- head/sys/x86/x86/cpu_machdep.c Tue Mar 20 20:05:11 2018 (r331257)
+++ head/sys/x86/x86/cpu_machdep.c Tue Mar 20 20:20:49 2018 (r331258)
@@ -621,3 +621,29 @@ hw_ibrs_disable_handler(SYSCTL_HANDLER_ARGS)
SYSCTL_PROC(_hw, OID_AUTO, ibrs_disable, CTLTYPE_INT | CTLFLAG_RWTUN |
CTLFLAG_NOFETCH | CTLFLAG_MPSAFE, NULL, 0, hw_ibrs_disable_handler, "I",
"Disable Indirect Branch Restricted Speculation");
+
+/*
+ * Enable and restore kernel text write permissions.
+ * Callers must ensure that disable_wp()/restore_wp() are executed
+ * without rescheduling on the same core.
+ */
+bool
+disable_wp(void)
+{
+ u_int cr0;
+
+ cr0 = rcr0();
+ if ((cr0 & CR0_WP) == 0)
+ return (false);
+ load_cr0(cr0 & ~CR0_WP);
+ return (true);
+}
+
+void
+restore_wp(bool old_wp)
+{
+
+ if (old_wp)
+ load_cr0(rcr0() | CR0_WP);
+}
+
More information about the svn-src-all
mailing list