mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-20 17:44:33 +08:00
baa489fabd
Rename selftets/vm to selftests/mm for being more consistent with the code, documentation, and tools directories, and won't be confused with virtual machines. [sj@kernel.org: convert missing vm->mm changes] Link: https://lkml.kernel.org/r/20230107230643.252273-1-sj@kernel.org Link: https://lkml.kernel.org/r/20230103180754.129637-5-sj@kernel.org Signed-off-by: SeongJae Park <sj@kernel.org> Cc: Jonathan Corbet <corbet@lwn.net> Cc: Shuah Khan <shuah@kernel.org> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
178 lines
3.4 KiB
C
178 lines
3.4 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
|
|
#ifndef _PKEYS_X86_H
|
|
#define _PKEYS_X86_H
|
|
|
|
#ifdef __i386__
|
|
|
|
#ifndef SYS_mprotect_key
|
|
# define SYS_mprotect_key 380
|
|
#endif
|
|
|
|
#ifndef SYS_pkey_alloc
|
|
# define SYS_pkey_alloc 381
|
|
# define SYS_pkey_free 382
|
|
#endif
|
|
|
|
#define REG_IP_IDX REG_EIP
|
|
#define si_pkey_offset 0x14
|
|
|
|
#else
|
|
|
|
#ifndef SYS_mprotect_key
|
|
# define SYS_mprotect_key 329
|
|
#endif
|
|
|
|
#ifndef SYS_pkey_alloc
|
|
# define SYS_pkey_alloc 330
|
|
# define SYS_pkey_free 331
|
|
#endif
|
|
|
|
#define REG_IP_IDX REG_RIP
|
|
#define si_pkey_offset 0x20
|
|
|
|
#endif
|
|
|
|
#ifndef PKEY_DISABLE_ACCESS
|
|
# define PKEY_DISABLE_ACCESS 0x1
|
|
#endif
|
|
|
|
#ifndef PKEY_DISABLE_WRITE
|
|
# define PKEY_DISABLE_WRITE 0x2
|
|
#endif
|
|
|
|
#define NR_PKEYS 16
|
|
#define NR_RESERVED_PKEYS 2 /* pkey-0 and exec-only-pkey */
|
|
#define PKEY_BITS_PER_PKEY 2
|
|
#define HPAGE_SIZE (1UL<<21)
|
|
#define PAGE_SIZE 4096
|
|
#define MB (1<<20)
|
|
|
|
static inline void __page_o_noops(void)
|
|
{
|
|
/* 8-bytes of instruction * 512 bytes = 1 page */
|
|
asm(".rept 512 ; nopl 0x7eeeeeee(%eax) ; .endr");
|
|
}
|
|
|
|
static inline u64 __read_pkey_reg(void)
|
|
{
|
|
unsigned int eax, edx;
|
|
unsigned int ecx = 0;
|
|
unsigned pkey_reg;
|
|
|
|
asm volatile(".byte 0x0f,0x01,0xee\n\t"
|
|
: "=a" (eax), "=d" (edx)
|
|
: "c" (ecx));
|
|
pkey_reg = eax;
|
|
return pkey_reg;
|
|
}
|
|
|
|
static inline void __write_pkey_reg(u64 pkey_reg)
|
|
{
|
|
unsigned int eax = pkey_reg;
|
|
unsigned int ecx = 0;
|
|
unsigned int edx = 0;
|
|
|
|
dprintf4("%s() changing %016llx to %016llx\n", __func__,
|
|
__read_pkey_reg(), pkey_reg);
|
|
asm volatile(".byte 0x0f,0x01,0xef\n\t"
|
|
: : "a" (eax), "c" (ecx), "d" (edx));
|
|
assert(pkey_reg == __read_pkey_reg());
|
|
}
|
|
|
|
/* Intel-defined CPU features, CPUID level 0x00000007:0 (ecx) */
|
|
#define X86_FEATURE_PKU (1<<3) /* Protection Keys for Userspace */
|
|
#define X86_FEATURE_OSPKE (1<<4) /* OS Protection Keys Enable */
|
|
|
|
static inline int cpu_has_pkeys(void)
|
|
{
|
|
unsigned int eax;
|
|
unsigned int ebx;
|
|
unsigned int ecx;
|
|
unsigned int edx;
|
|
|
|
__cpuid_count(0x7, 0x0, eax, ebx, ecx, edx);
|
|
|
|
if (!(ecx & X86_FEATURE_PKU)) {
|
|
dprintf2("cpu does not have PKU\n");
|
|
return 0;
|
|
}
|
|
if (!(ecx & X86_FEATURE_OSPKE)) {
|
|
dprintf2("cpu does not have OSPKE\n");
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
static inline int cpu_max_xsave_size(void)
|
|
{
|
|
unsigned long XSTATE_CPUID = 0xd;
|
|
unsigned int eax;
|
|
unsigned int ebx;
|
|
unsigned int ecx;
|
|
unsigned int edx;
|
|
|
|
__cpuid_count(XSTATE_CPUID, 0, eax, ebx, ecx, edx);
|
|
return ecx;
|
|
}
|
|
|
|
static inline u32 pkey_bit_position(int pkey)
|
|
{
|
|
return pkey * PKEY_BITS_PER_PKEY;
|
|
}
|
|
|
|
#define XSTATE_PKEY_BIT (9)
|
|
#define XSTATE_PKEY 0x200
|
|
#define XSTATE_BV_OFFSET 512
|
|
|
|
int pkey_reg_xstate_offset(void)
|
|
{
|
|
unsigned int eax;
|
|
unsigned int ebx;
|
|
unsigned int ecx;
|
|
unsigned int edx;
|
|
int xstate_offset;
|
|
int xstate_size;
|
|
unsigned long XSTATE_CPUID = 0xd;
|
|
int leaf;
|
|
|
|
/* assume that XSTATE_PKEY is set in XCR0 */
|
|
leaf = XSTATE_PKEY_BIT;
|
|
{
|
|
__cpuid_count(XSTATE_CPUID, leaf, eax, ebx, ecx, edx);
|
|
|
|
if (leaf == XSTATE_PKEY_BIT) {
|
|
xstate_offset = ebx;
|
|
xstate_size = eax;
|
|
}
|
|
}
|
|
|
|
if (xstate_size == 0) {
|
|
printf("could not find size/offset of PKEY in xsave state\n");
|
|
return 0;
|
|
}
|
|
|
|
return xstate_offset;
|
|
}
|
|
|
|
static inline int get_arch_reserved_keys(void)
|
|
{
|
|
return NR_RESERVED_PKEYS;
|
|
}
|
|
|
|
void expect_fault_on_read_execonly_key(void *p1, int pkey)
|
|
{
|
|
int ptr_contents;
|
|
|
|
ptr_contents = read_ptr(p1);
|
|
dprintf2("ptr (%p) contents@%d: %x\n", p1, __LINE__, ptr_contents);
|
|
expected_pkey_fault(pkey);
|
|
}
|
|
|
|
void *malloc_pkey_with_mprotect_subpage(long size, int prot, u16 pkey)
|
|
{
|
|
return PTR_ERR_ENOTSUP;
|
|
}
|
|
|
|
#endif /* _PKEYS_X86_H */
|