xref: /OK3568_Linux_fs/kernel/tools/testing/selftests/vm/pkey-powerpc.h (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun /* SPDX-License-Identifier: GPL-2.0 */
2*4882a593Smuzhiyun 
3*4882a593Smuzhiyun #ifndef _PKEYS_POWERPC_H
4*4882a593Smuzhiyun #define _PKEYS_POWERPC_H
5*4882a593Smuzhiyun 
6*4882a593Smuzhiyun #ifndef SYS_mprotect_key
7*4882a593Smuzhiyun # define SYS_mprotect_key	386
8*4882a593Smuzhiyun #endif
9*4882a593Smuzhiyun #ifndef SYS_pkey_alloc
10*4882a593Smuzhiyun # define SYS_pkey_alloc		384
11*4882a593Smuzhiyun # define SYS_pkey_free		385
12*4882a593Smuzhiyun #endif
13*4882a593Smuzhiyun #define REG_IP_IDX		PT_NIP
14*4882a593Smuzhiyun #define REG_TRAPNO		PT_TRAP
15*4882a593Smuzhiyun #define gregs			gp_regs
16*4882a593Smuzhiyun #define fpregs			fp_regs
17*4882a593Smuzhiyun #define si_pkey_offset		0x20
18*4882a593Smuzhiyun 
19*4882a593Smuzhiyun #undef PKEY_DISABLE_ACCESS
20*4882a593Smuzhiyun #define PKEY_DISABLE_ACCESS	0x3  /* disable read and write */
21*4882a593Smuzhiyun 
22*4882a593Smuzhiyun #undef PKEY_DISABLE_WRITE
23*4882a593Smuzhiyun #define PKEY_DISABLE_WRITE	0x2
24*4882a593Smuzhiyun 
25*4882a593Smuzhiyun #define NR_PKEYS		32
26*4882a593Smuzhiyun #define NR_RESERVED_PKEYS_4K	27 /* pkey-0, pkey-1, exec-only-pkey
27*4882a593Smuzhiyun 				      and 24 other keys that cannot be
28*4882a593Smuzhiyun 				      represented in the PTE */
29*4882a593Smuzhiyun #define NR_RESERVED_PKEYS_64K_3KEYS	3 /* PowerNV and KVM: pkey-0,
30*4882a593Smuzhiyun 					     pkey-1 and exec-only key */
31*4882a593Smuzhiyun #define NR_RESERVED_PKEYS_64K_4KEYS	4 /* PowerVM: pkey-0, pkey-1,
32*4882a593Smuzhiyun 					     pkey-31 and exec-only key */
33*4882a593Smuzhiyun #define PKEY_BITS_PER_PKEY	2
34*4882a593Smuzhiyun #define HPAGE_SIZE		(1UL << 24)
35*4882a593Smuzhiyun #define PAGE_SIZE		sysconf(_SC_PAGESIZE)
36*4882a593Smuzhiyun 
pkey_bit_position(int pkey)37*4882a593Smuzhiyun static inline u32 pkey_bit_position(int pkey)
38*4882a593Smuzhiyun {
39*4882a593Smuzhiyun 	return (NR_PKEYS - pkey - 1) * PKEY_BITS_PER_PKEY;
40*4882a593Smuzhiyun }
41*4882a593Smuzhiyun 
__read_pkey_reg(void)42*4882a593Smuzhiyun static inline u64 __read_pkey_reg(void)
43*4882a593Smuzhiyun {
44*4882a593Smuzhiyun 	u64 pkey_reg;
45*4882a593Smuzhiyun 
46*4882a593Smuzhiyun 	asm volatile("mfspr %0, 0xd" : "=r" (pkey_reg));
47*4882a593Smuzhiyun 
48*4882a593Smuzhiyun 	return pkey_reg;
49*4882a593Smuzhiyun }
50*4882a593Smuzhiyun 
__write_pkey_reg(u64 pkey_reg)51*4882a593Smuzhiyun static inline void __write_pkey_reg(u64 pkey_reg)
52*4882a593Smuzhiyun {
53*4882a593Smuzhiyun 	u64 amr = pkey_reg;
54*4882a593Smuzhiyun 
55*4882a593Smuzhiyun 	dprintf4("%s() changing %016llx to %016llx\n",
56*4882a593Smuzhiyun 			 __func__, __read_pkey_reg(), pkey_reg);
57*4882a593Smuzhiyun 
58*4882a593Smuzhiyun 	asm volatile("isync; mtspr 0xd, %0; isync"
59*4882a593Smuzhiyun 		     : : "r" ((unsigned long)(amr)) : "memory");
60*4882a593Smuzhiyun 
61*4882a593Smuzhiyun 	dprintf4("%s() pkey register after changing %016llx to %016llx\n",
62*4882a593Smuzhiyun 			__func__, __read_pkey_reg(), pkey_reg);
63*4882a593Smuzhiyun }
64*4882a593Smuzhiyun 
cpu_has_pkeys(void)65*4882a593Smuzhiyun static inline int cpu_has_pkeys(void)
66*4882a593Smuzhiyun {
67*4882a593Smuzhiyun 	/* No simple way to determine this */
68*4882a593Smuzhiyun 	return 1;
69*4882a593Smuzhiyun }
70*4882a593Smuzhiyun 
arch_is_powervm()71*4882a593Smuzhiyun static inline bool arch_is_powervm()
72*4882a593Smuzhiyun {
73*4882a593Smuzhiyun 	struct stat buf;
74*4882a593Smuzhiyun 
75*4882a593Smuzhiyun 	if ((stat("/sys/firmware/devicetree/base/ibm,partition-name", &buf) == 0) &&
76*4882a593Smuzhiyun 	    (stat("/sys/firmware/devicetree/base/hmc-managed?", &buf) == 0) &&
77*4882a593Smuzhiyun 	    (stat("/sys/firmware/devicetree/base/chosen/qemu,graphic-width", &buf) == -1) )
78*4882a593Smuzhiyun 		return true;
79*4882a593Smuzhiyun 
80*4882a593Smuzhiyun 	return false;
81*4882a593Smuzhiyun }
82*4882a593Smuzhiyun 
get_arch_reserved_keys(void)83*4882a593Smuzhiyun static inline int get_arch_reserved_keys(void)
84*4882a593Smuzhiyun {
85*4882a593Smuzhiyun 	if (sysconf(_SC_PAGESIZE) == 4096)
86*4882a593Smuzhiyun 		return NR_RESERVED_PKEYS_4K;
87*4882a593Smuzhiyun 	else
88*4882a593Smuzhiyun 		if (arch_is_powervm())
89*4882a593Smuzhiyun 			return NR_RESERVED_PKEYS_64K_4KEYS;
90*4882a593Smuzhiyun 		else
91*4882a593Smuzhiyun 			return NR_RESERVED_PKEYS_64K_3KEYS;
92*4882a593Smuzhiyun }
93*4882a593Smuzhiyun 
expect_fault_on_read_execonly_key(void * p1,int pkey)94*4882a593Smuzhiyun void expect_fault_on_read_execonly_key(void *p1, int pkey)
95*4882a593Smuzhiyun {
96*4882a593Smuzhiyun 	/*
97*4882a593Smuzhiyun 	 * powerpc does not allow userspace to change permissions of exec-only
98*4882a593Smuzhiyun 	 * keys since those keys are not allocated by userspace. The signal
99*4882a593Smuzhiyun 	 * handler wont be able to reset the permissions, which means the code
100*4882a593Smuzhiyun 	 * will infinitely continue to segfault here.
101*4882a593Smuzhiyun 	 */
102*4882a593Smuzhiyun 	return;
103*4882a593Smuzhiyun }
104*4882a593Smuzhiyun 
105*4882a593Smuzhiyun /* 4-byte instructions * 16384 = 64K page */
106*4882a593Smuzhiyun #define __page_o_noops() asm(".rept 16384 ; nop; .endr")
107*4882a593Smuzhiyun 
malloc_pkey_with_mprotect_subpage(long size,int prot,u16 pkey)108*4882a593Smuzhiyun void *malloc_pkey_with_mprotect_subpage(long size, int prot, u16 pkey)
109*4882a593Smuzhiyun {
110*4882a593Smuzhiyun 	void *ptr;
111*4882a593Smuzhiyun 	int ret;
112*4882a593Smuzhiyun 
113*4882a593Smuzhiyun 	dprintf1("doing %s(size=%ld, prot=0x%x, pkey=%d)\n", __func__,
114*4882a593Smuzhiyun 			size, prot, pkey);
115*4882a593Smuzhiyun 	pkey_assert(pkey < NR_PKEYS);
116*4882a593Smuzhiyun 	ptr = mmap(NULL, size, prot, MAP_ANONYMOUS|MAP_PRIVATE, -1, 0);
117*4882a593Smuzhiyun 	pkey_assert(ptr != (void *)-1);
118*4882a593Smuzhiyun 
119*4882a593Smuzhiyun 	ret = syscall(__NR_subpage_prot, ptr, size, NULL);
120*4882a593Smuzhiyun 	if (ret) {
121*4882a593Smuzhiyun 		perror("subpage_perm");
122*4882a593Smuzhiyun 		return PTR_ERR_ENOTSUP;
123*4882a593Smuzhiyun 	}
124*4882a593Smuzhiyun 
125*4882a593Smuzhiyun 	ret = mprotect_pkey((void *)ptr, PAGE_SIZE, prot, pkey);
126*4882a593Smuzhiyun 	pkey_assert(!ret);
127*4882a593Smuzhiyun 	record_pkey_malloc(ptr, size, prot);
128*4882a593Smuzhiyun 
129*4882a593Smuzhiyun 	dprintf1("%s() for pkey %d @ %p\n", __func__, pkey, ptr);
130*4882a593Smuzhiyun 	return ptr;
131*4882a593Smuzhiyun }
132*4882a593Smuzhiyun 
133*4882a593Smuzhiyun #endif /* _PKEYS_POWERPC_H */
134