Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Dave Hansen | 778 | 99.87% | 3 | 75.00% |
Greg Kroah-Hartman | 1 | 0.13% | 1 | 25.00% |
Total | 779 | 4 |
/* SPDX-License-Identifier: GPL-2.0 */ #ifndef _PKEYS_HELPER_H #define _PKEYS_HELPER_H #define _GNU_SOURCE #include <string.h> #include <stdarg.h> #include <stdio.h> #include <stdint.h> #include <stdbool.h> #include <signal.h> #include <assert.h> #include <stdlib.h> #include <ucontext.h> #include <sys/mman.h> #define NR_PKEYS 16 #define PKRU_BITS_PER_PKEY 2 #ifndef DEBUG_LEVEL #define DEBUG_LEVEL 0 #endif #define DPRINT_IN_SIGNAL_BUF_SIZE 4096 extern int dprint_in_signal; extern char dprint_in_signal_buffer[DPRINT_IN_SIGNAL_BUF_SIZE]; static inline void sigsafe_printf(const char *format, ...) { va_list ap; if (!dprint_in_signal) { va_start(ap, format); vprintf(format, ap); va_end(ap); } else { int ret; /* * No printf() functions are signal-safe. * They deadlock easily. Write the format * string to get some output, even if * incomplete. */ ret = write(1, format, strlen(format)); if (ret < 0) exit(1); } } #define dprintf_level(level, args...) do { \ if (level <= DEBUG_LEVEL) \ sigsafe_printf(args); \ } while (0) #define dprintf0(args...) dprintf_level(0, args) #define dprintf1(args...) dprintf_level(1, args) #define dprintf2(args...) dprintf_level(2, args) #define dprintf3(args...) dprintf_level(3, args) #define dprintf4(args...) dprintf_level(4, args) extern unsigned int shadow_pkru; static inline unsigned int __rdpkru(void) { unsigned int eax, edx; unsigned int ecx = 0; unsigned int pkru; asm volatile(".byte 0x0f,0x01,0xee\n\t" : "=a" (eax), "=d" (edx) : "c" (ecx)); pkru = eax; return pkru; } static inline unsigned int _rdpkru(int line) { unsigned int pkru = __rdpkru(); dprintf4("rdpkru(line=%d) pkru: %x shadow: %x\n", line, pkru, shadow_pkru); assert(pkru == shadow_pkru); return pkru; } #define rdpkru() _rdpkru(__LINE__) static inline void __wrpkru(unsigned int pkru) { unsigned int eax = pkru; unsigned int ecx = 0; unsigned int edx = 0; dprintf4("%s() changing %08x to %08x\n", __func__, __rdpkru(), pkru); asm volatile(".byte 0x0f,0x01,0xef\n\t" : : "a" (eax), "c" (ecx), "d" (edx)); assert(pkru == __rdpkru()); } static inline void wrpkru(unsigned int pkru) { dprintf4("%s() changing %08x to %08x\n", __func__, __rdpkru(), pkru); /* will do the shadow check for us: */ rdpkru(); __wrpkru(pkru); shadow_pkru = pkru; dprintf4("%s(%08x) pkru: %08x\n", __func__, pkru, __rdpkru()); } /* * These are technically racy. since something could * change PKRU between the read and the write. */ static inline void __pkey_access_allow(int pkey, int do_allow) { unsigned int pkru = rdpkru(); int bit = pkey * 2; if (do_allow) pkru &= (1<<bit); else pkru |= (1<<bit); dprintf4("pkru now: %08x\n", rdpkru()); wrpkru(pkru); } static inline void __pkey_write_allow(int pkey, int do_allow_write) { long pkru = rdpkru(); int bit = pkey * 2 + 1; if (do_allow_write) pkru &= (1<<bit); else pkru |= (1<<bit); wrpkru(pkru); dprintf4("pkru now: %08x\n", rdpkru()); } #define PROT_PKEY0 0x10 /* protection key value (bit 0) */ #define PROT_PKEY1 0x20 /* protection key value (bit 1) */ #define PROT_PKEY2 0x40 /* protection key value (bit 2) */ #define PROT_PKEY3 0x80 /* protection key value (bit 3) */ #define PAGE_SIZE 4096 #define MB (1<<20) static inline void __cpuid(unsigned int *eax, unsigned int *ebx, unsigned int *ecx, unsigned int *edx) { /* ecx is often an input as well as an output. */ asm volatile( "cpuid;" : "=a" (*eax), "=b" (*ebx), "=c" (*ecx), "=d" (*edx) : "0" (*eax), "2" (*ecx)); } /* Intel-defined CPU features, CPUID level 0x00000007:0 (ecx) */ #define X86_FEATURE_PKU (1<<3) /* Protection Keys for Userspace */ #define X86_FEATURE_OSPKE (1<<4) /* OS Protection Keys Enable */ static inline int cpu_has_pku(void) { unsigned int eax; unsigned int ebx; unsigned int ecx; unsigned int edx; eax = 0x7; ecx = 0x0; __cpuid(&eax, &ebx, &ecx, &edx); if (!(ecx & X86_FEATURE_PKU)) { dprintf2("cpu does not have PKU\n"); return 0; } if (!(ecx & X86_FEATURE_OSPKE)) { dprintf2("cpu does not have OSPKE\n"); return 0; } return 1; } #define XSTATE_PKRU_BIT (9) #define XSTATE_PKRU 0x200 int pkru_xstate_offset(void) { unsigned int eax; unsigned int ebx; unsigned int ecx; unsigned int edx; int xstate_offset; int xstate_size; unsigned long XSTATE_CPUID = 0xd; int leaf; /* assume that XSTATE_PKRU is set in XCR0 */ leaf = XSTATE_PKRU_BIT; { eax = XSTATE_CPUID; ecx = leaf; __cpuid(&eax, &ebx, &ecx, &edx); if (leaf == XSTATE_PKRU_BIT) { xstate_offset = ebx; xstate_size = eax; } } if (xstate_size == 0) { printf("could not find size/offset of PKRU in xsave state\n"); return 0; } return xstate_offset; } #endif /* _PKEYS_HELPER_H */
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1