1*4882a593Smuzhiyun /* SPDX-License-Identifier: GPL-2.0 */
2*4882a593Smuzhiyun
3*4882a593Smuzhiyun #ifndef _PKEYS_X86_H
4*4882a593Smuzhiyun #define _PKEYS_X86_H
5*4882a593Smuzhiyun
6*4882a593Smuzhiyun #ifdef __i386__
7*4882a593Smuzhiyun
8*4882a593Smuzhiyun #ifndef SYS_mprotect_key
9*4882a593Smuzhiyun # define SYS_mprotect_key 380
10*4882a593Smuzhiyun #endif
11*4882a593Smuzhiyun
12*4882a593Smuzhiyun #ifndef SYS_pkey_alloc
13*4882a593Smuzhiyun # define SYS_pkey_alloc 381
14*4882a593Smuzhiyun # define SYS_pkey_free 382
15*4882a593Smuzhiyun #endif
16*4882a593Smuzhiyun
17*4882a593Smuzhiyun #define REG_IP_IDX REG_EIP
18*4882a593Smuzhiyun #define si_pkey_offset 0x14
19*4882a593Smuzhiyun
20*4882a593Smuzhiyun #else
21*4882a593Smuzhiyun
22*4882a593Smuzhiyun #ifndef SYS_mprotect_key
23*4882a593Smuzhiyun # define SYS_mprotect_key 329
24*4882a593Smuzhiyun #endif
25*4882a593Smuzhiyun
26*4882a593Smuzhiyun #ifndef SYS_pkey_alloc
27*4882a593Smuzhiyun # define SYS_pkey_alloc 330
28*4882a593Smuzhiyun # define SYS_pkey_free 331
29*4882a593Smuzhiyun #endif
30*4882a593Smuzhiyun
31*4882a593Smuzhiyun #define REG_IP_IDX REG_RIP
32*4882a593Smuzhiyun #define si_pkey_offset 0x20
33*4882a593Smuzhiyun
34*4882a593Smuzhiyun #endif
35*4882a593Smuzhiyun
36*4882a593Smuzhiyun #ifndef PKEY_DISABLE_ACCESS
37*4882a593Smuzhiyun # define PKEY_DISABLE_ACCESS 0x1
38*4882a593Smuzhiyun #endif
39*4882a593Smuzhiyun
40*4882a593Smuzhiyun #ifndef PKEY_DISABLE_WRITE
41*4882a593Smuzhiyun # define PKEY_DISABLE_WRITE 0x2
42*4882a593Smuzhiyun #endif
43*4882a593Smuzhiyun
44*4882a593Smuzhiyun #define NR_PKEYS 16
45*4882a593Smuzhiyun #define NR_RESERVED_PKEYS 2 /* pkey-0 and exec-only-pkey */
46*4882a593Smuzhiyun #define PKEY_BITS_PER_PKEY 2
47*4882a593Smuzhiyun #define HPAGE_SIZE (1UL<<21)
48*4882a593Smuzhiyun #define PAGE_SIZE 4096
49*4882a593Smuzhiyun #define MB (1<<20)
50*4882a593Smuzhiyun
__page_o_noops(void)51*4882a593Smuzhiyun static inline void __page_o_noops(void)
52*4882a593Smuzhiyun {
53*4882a593Smuzhiyun /* 8-bytes of instruction * 512 bytes = 1 page */
54*4882a593Smuzhiyun asm(".rept 512 ; nopl 0x7eeeeeee(%eax) ; .endr");
55*4882a593Smuzhiyun }
56*4882a593Smuzhiyun
__read_pkey_reg(void)57*4882a593Smuzhiyun static inline u64 __read_pkey_reg(void)
58*4882a593Smuzhiyun {
59*4882a593Smuzhiyun unsigned int eax, edx;
60*4882a593Smuzhiyun unsigned int ecx = 0;
61*4882a593Smuzhiyun unsigned pkey_reg;
62*4882a593Smuzhiyun
63*4882a593Smuzhiyun asm volatile(".byte 0x0f,0x01,0xee\n\t"
64*4882a593Smuzhiyun : "=a" (eax), "=d" (edx)
65*4882a593Smuzhiyun : "c" (ecx));
66*4882a593Smuzhiyun pkey_reg = eax;
67*4882a593Smuzhiyun return pkey_reg;
68*4882a593Smuzhiyun }
69*4882a593Smuzhiyun
__write_pkey_reg(u64 pkey_reg)70*4882a593Smuzhiyun static inline void __write_pkey_reg(u64 pkey_reg)
71*4882a593Smuzhiyun {
72*4882a593Smuzhiyun unsigned int eax = pkey_reg;
73*4882a593Smuzhiyun unsigned int ecx = 0;
74*4882a593Smuzhiyun unsigned int edx = 0;
75*4882a593Smuzhiyun
76*4882a593Smuzhiyun dprintf4("%s() changing %016llx to %016llx\n", __func__,
77*4882a593Smuzhiyun __read_pkey_reg(), pkey_reg);
78*4882a593Smuzhiyun asm volatile(".byte 0x0f,0x01,0xef\n\t"
79*4882a593Smuzhiyun : : "a" (eax), "c" (ecx), "d" (edx));
80*4882a593Smuzhiyun assert(pkey_reg == __read_pkey_reg());
81*4882a593Smuzhiyun }
82*4882a593Smuzhiyun
__cpuid(unsigned int * eax,unsigned int * ebx,unsigned int * ecx,unsigned int * edx)83*4882a593Smuzhiyun static inline void __cpuid(unsigned int *eax, unsigned int *ebx,
84*4882a593Smuzhiyun unsigned int *ecx, unsigned int *edx)
85*4882a593Smuzhiyun {
86*4882a593Smuzhiyun /* ecx is often an input as well as an output. */
87*4882a593Smuzhiyun asm volatile(
88*4882a593Smuzhiyun "cpuid;"
89*4882a593Smuzhiyun : "=a" (*eax),
90*4882a593Smuzhiyun "=b" (*ebx),
91*4882a593Smuzhiyun "=c" (*ecx),
92*4882a593Smuzhiyun "=d" (*edx)
93*4882a593Smuzhiyun : "0" (*eax), "2" (*ecx));
94*4882a593Smuzhiyun }
95*4882a593Smuzhiyun
96*4882a593Smuzhiyun /* Intel-defined CPU features, CPUID level 0x00000007:0 (ecx) */
97*4882a593Smuzhiyun #define X86_FEATURE_PKU (1<<3) /* Protection Keys for Userspace */
98*4882a593Smuzhiyun #define X86_FEATURE_OSPKE (1<<4) /* OS Protection Keys Enable */
99*4882a593Smuzhiyun
cpu_has_pkeys(void)100*4882a593Smuzhiyun static inline int cpu_has_pkeys(void)
101*4882a593Smuzhiyun {
102*4882a593Smuzhiyun unsigned int eax;
103*4882a593Smuzhiyun unsigned int ebx;
104*4882a593Smuzhiyun unsigned int ecx;
105*4882a593Smuzhiyun unsigned int edx;
106*4882a593Smuzhiyun
107*4882a593Smuzhiyun eax = 0x7;
108*4882a593Smuzhiyun ecx = 0x0;
109*4882a593Smuzhiyun __cpuid(&eax, &ebx, &ecx, &edx);
110*4882a593Smuzhiyun
111*4882a593Smuzhiyun if (!(ecx & X86_FEATURE_PKU)) {
112*4882a593Smuzhiyun dprintf2("cpu does not have PKU\n");
113*4882a593Smuzhiyun return 0;
114*4882a593Smuzhiyun }
115*4882a593Smuzhiyun if (!(ecx & X86_FEATURE_OSPKE)) {
116*4882a593Smuzhiyun dprintf2("cpu does not have OSPKE\n");
117*4882a593Smuzhiyun return 0;
118*4882a593Smuzhiyun }
119*4882a593Smuzhiyun return 1;
120*4882a593Smuzhiyun }
121*4882a593Smuzhiyun
pkey_bit_position(int pkey)122*4882a593Smuzhiyun static inline u32 pkey_bit_position(int pkey)
123*4882a593Smuzhiyun {
124*4882a593Smuzhiyun return pkey * PKEY_BITS_PER_PKEY;
125*4882a593Smuzhiyun }
126*4882a593Smuzhiyun
127*4882a593Smuzhiyun #define XSTATE_PKEY_BIT (9)
128*4882a593Smuzhiyun #define XSTATE_PKEY 0x200
129*4882a593Smuzhiyun
pkey_reg_xstate_offset(void)130*4882a593Smuzhiyun int pkey_reg_xstate_offset(void)
131*4882a593Smuzhiyun {
132*4882a593Smuzhiyun unsigned int eax;
133*4882a593Smuzhiyun unsigned int ebx;
134*4882a593Smuzhiyun unsigned int ecx;
135*4882a593Smuzhiyun unsigned int edx;
136*4882a593Smuzhiyun int xstate_offset;
137*4882a593Smuzhiyun int xstate_size;
138*4882a593Smuzhiyun unsigned long XSTATE_CPUID = 0xd;
139*4882a593Smuzhiyun int leaf;
140*4882a593Smuzhiyun
141*4882a593Smuzhiyun /* assume that XSTATE_PKEY is set in XCR0 */
142*4882a593Smuzhiyun leaf = XSTATE_PKEY_BIT;
143*4882a593Smuzhiyun {
144*4882a593Smuzhiyun eax = XSTATE_CPUID;
145*4882a593Smuzhiyun ecx = leaf;
146*4882a593Smuzhiyun __cpuid(&eax, &ebx, &ecx, &edx);
147*4882a593Smuzhiyun
148*4882a593Smuzhiyun if (leaf == XSTATE_PKEY_BIT) {
149*4882a593Smuzhiyun xstate_offset = ebx;
150*4882a593Smuzhiyun xstate_size = eax;
151*4882a593Smuzhiyun }
152*4882a593Smuzhiyun }
153*4882a593Smuzhiyun
154*4882a593Smuzhiyun if (xstate_size == 0) {
155*4882a593Smuzhiyun printf("could not find size/offset of PKEY in xsave state\n");
156*4882a593Smuzhiyun return 0;
157*4882a593Smuzhiyun }
158*4882a593Smuzhiyun
159*4882a593Smuzhiyun return xstate_offset;
160*4882a593Smuzhiyun }
161*4882a593Smuzhiyun
get_arch_reserved_keys(void)162*4882a593Smuzhiyun static inline int get_arch_reserved_keys(void)
163*4882a593Smuzhiyun {
164*4882a593Smuzhiyun return NR_RESERVED_PKEYS;
165*4882a593Smuzhiyun }
166*4882a593Smuzhiyun
expect_fault_on_read_execonly_key(void * p1,int pkey)167*4882a593Smuzhiyun void expect_fault_on_read_execonly_key(void *p1, int pkey)
168*4882a593Smuzhiyun {
169*4882a593Smuzhiyun int ptr_contents;
170*4882a593Smuzhiyun
171*4882a593Smuzhiyun ptr_contents = read_ptr(p1);
172*4882a593Smuzhiyun dprintf2("ptr (%p) contents@%d: %x\n", p1, __LINE__, ptr_contents);
173*4882a593Smuzhiyun expected_pkey_fault(pkey);
174*4882a593Smuzhiyun }
175*4882a593Smuzhiyun
malloc_pkey_with_mprotect_subpage(long size,int prot,u16 pkey)176*4882a593Smuzhiyun void *malloc_pkey_with_mprotect_subpage(long size, int prot, u16 pkey)
177*4882a593Smuzhiyun {
178*4882a593Smuzhiyun return PTR_ERR_ENOTSUP;
179*4882a593Smuzhiyun }
180*4882a593Smuzhiyun
181*4882a593Smuzhiyun #endif /* _PKEYS_X86_H */
182