| /* SPDX-License-Identifier: GPL-2.0 */ |
| |
| #ifndef _PKEYS_X86_H |
| #define _PKEYS_X86_H |
| |
| #ifdef __i386__ |
| |
| #define REG_IP_IDX REG_EIP |
| #define si_pkey_offset 0x14 |
| |
| #else |
| |
| #define REG_IP_IDX REG_RIP |
| #define si_pkey_offset 0x20 |
| |
| #endif |
| |
| #ifndef PKEY_DISABLE_ACCESS |
| # define PKEY_DISABLE_ACCESS 0x1 |
| #endif |
| |
| #ifndef PKEY_DISABLE_WRITE |
| # define PKEY_DISABLE_WRITE 0x2 |
| #endif |
| |
| #define NR_PKEYS 16 |
| #define NR_RESERVED_PKEYS 2 /* pkey-0 and exec-only-pkey */ |
| #define PKEY_BITS_PER_PKEY 2 |
| #define HPAGE_SIZE (1UL<<21) |
| #define PAGE_SIZE 4096 |
| #define MB (1<<20) |
| |
| static inline void __page_o_noops(void) |
| { |
| /* 8-bytes of instruction * 512 bytes = 1 page */ |
| asm(".rept 512 ; nopl 0x7eeeeeee(%eax) ; .endr"); |
| } |
| |
| static inline u64 __read_pkey_reg(void) |
| { |
| unsigned int eax, edx; |
| unsigned int ecx = 0; |
| unsigned pkey_reg; |
| |
| asm volatile(".byte 0x0f,0x01,0xee\n\t" |
| : "=a" (eax), "=d" (edx) |
| : "c" (ecx)); |
| pkey_reg = eax; |
| return pkey_reg; |
| } |
| |
| static inline void __write_pkey_reg(u64 pkey_reg) |
| { |
| unsigned int eax = pkey_reg; |
| unsigned int ecx = 0; |
| unsigned int edx = 0; |
| |
| dprintf4("%s() changing %016llx to %016llx\n", __func__, |
| __read_pkey_reg(), pkey_reg); |
| asm volatile(".byte 0x0f,0x01,0xef\n\t" |
| : : "a" (eax), "c" (ecx), "d" (edx)); |
| assert(pkey_reg == __read_pkey_reg()); |
| } |
| |
| /* Intel-defined CPU features, CPUID level 0x00000007:0 (ecx) */ |
| #define X86_FEATURE_PKU (1<<3) /* Protection Keys for Userspace */ |
| #define X86_FEATURE_OSPKE (1<<4) /* OS Protection Keys Enable */ |
| |
| static inline int cpu_has_pkeys(void) |
| { |
| unsigned int eax; |
| unsigned int ebx; |
| unsigned int ecx; |
| unsigned int edx; |
| |
| __cpuid_count(0x7, 0x0, eax, ebx, ecx, edx); |
| |
| if (!(ecx & X86_FEATURE_PKU)) { |
| dprintf2("cpu does not have PKU\n"); |
| return 0; |
| } |
| if (!(ecx & X86_FEATURE_OSPKE)) { |
| dprintf2("cpu does not have OSPKE\n"); |
| return 0; |
| } |
| return 1; |
| } |
| |
| static inline int cpu_max_xsave_size(void) |
| { |
| unsigned long XSTATE_CPUID = 0xd; |
| unsigned int eax; |
| unsigned int ebx; |
| unsigned int ecx; |
| unsigned int edx; |
| |
| __cpuid_count(XSTATE_CPUID, 0, eax, ebx, ecx, edx); |
| return ecx; |
| } |
| |
| static inline u32 pkey_bit_position(int pkey) |
| { |
| return pkey * PKEY_BITS_PER_PKEY; |
| } |
| |
| #define XSTATE_PKEY_BIT (9) |
| #define XSTATE_PKEY 0x200 |
| #define XSTATE_BV_OFFSET 512 |
| |
| int pkey_reg_xstate_offset(void) |
| { |
| unsigned int eax; |
| unsigned int ebx; |
| unsigned int ecx; |
| unsigned int edx; |
| int xstate_offset; |
| int xstate_size = 0; |
| unsigned long XSTATE_CPUID = 0xd; |
| int leaf; |
| |
| /* assume that XSTATE_PKEY is set in XCR0 */ |
| leaf = XSTATE_PKEY_BIT; |
| { |
| __cpuid_count(XSTATE_CPUID, leaf, eax, ebx, ecx, edx); |
| |
| if (leaf == XSTATE_PKEY_BIT) { |
| xstate_offset = ebx; |
| xstate_size = eax; |
| } |
| } |
| |
| if (xstate_size == 0) { |
| printf("could not find size/offset of PKEY in xsave state\n"); |
| return 0; |
| } |
| |
| return xstate_offset; |
| } |
| |
| static inline int get_arch_reserved_keys(void) |
| { |
| return NR_RESERVED_PKEYS; |
| } |
| |
| void expect_fault_on_read_execonly_key(void *p1, int pkey) |
| { |
| int ptr_contents; |
| |
| ptr_contents = read_ptr(p1); |
| dprintf2("ptr (%p) contents@%d: %x\n", p1, __LINE__, ptr_contents); |
| expected_pkey_fault(pkey); |
| } |
| |
| void *malloc_pkey_with_mprotect_subpage(long size, int prot, u16 pkey) |
| { |
| return PTR_ERR_ENOTSUP; |
| } |
| |
| #endif /* _PKEYS_X86_H */ |