Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v6.13-rc2 252 lines 5.9 kB view raw
1/* SPDX-License-Identifier: GPL-2.0 */ 2#ifndef _PKEYS_HELPER_H 3#define _PKEYS_HELPER_H 4#define _GNU_SOURCE 5#include <string.h> 6#include <stdarg.h> 7#include <stdio.h> 8#include <stdint.h> 9#include <stdbool.h> 10#include <signal.h> 11#include <assert.h> 12#include <stdlib.h> 13#include <ucontext.h> 14#include <sys/mman.h> 15 16#include "../kselftest.h" 17 18/* Define some kernel-like types */ 19#define u8 __u8 20#define u16 __u16 21#define u32 __u32 22#define u64 __u64 23 24#define PTR_ERR_ENOTSUP ((void *)-ENOTSUP) 25 26#ifndef DEBUG_LEVEL 27#define DEBUG_LEVEL 0 28#endif 29#define DPRINT_IN_SIGNAL_BUF_SIZE 4096 30extern int dprint_in_signal; 31extern char dprint_in_signal_buffer[DPRINT_IN_SIGNAL_BUF_SIZE]; 32 33extern int test_nr; 34extern int iteration_nr; 35 36#ifdef __GNUC__ 37__printf(1, 2) 38#endif 39static inline void sigsafe_printf(const char *format, ...) 40{ 41 va_list ap; 42 43 if (!dprint_in_signal) { 44 va_start(ap, format); 45 vprintf(format, ap); 46 va_end(ap); 47 } else { 48 int ret; 49 /* 50 * No printf() functions are signal-safe. 51 * They deadlock easily. Write the format 52 * string to get some output, even if 53 * incomplete. 54 */ 55 ret = write(1, format, strlen(format)); 56 if (ret < 0) 57 exit(1); 58 } 59} 60#define dprintf_level(level, args...) do { \ 61 if (level <= DEBUG_LEVEL) \ 62 sigsafe_printf(args); \ 63} while (0) 64#define dprintf0(args...) dprintf_level(0, args) 65#define dprintf1(args...) dprintf_level(1, args) 66#define dprintf2(args...) dprintf_level(2, args) 67#define dprintf3(args...) dprintf_level(3, args) 68#define dprintf4(args...) dprintf_level(4, args) 69 70extern void abort_hooks(void); 71#define pkey_assert(condition) do { \ 72 if (!(condition)) { \ 73 dprintf0("assert() at %s::%d test_nr: %d iteration: %d\n", \ 74 __FILE__, __LINE__, \ 75 test_nr, iteration_nr); \ 76 dprintf0("errno at assert: %d", errno); \ 77 abort_hooks(); \ 78 exit(__LINE__); \ 79 } \ 80} while (0) 81 82#define barrier() __asm__ __volatile__("": : :"memory") 83#ifndef noinline 84# define noinline __attribute__((noinline)) 85#endif 86 87noinline int read_ptr(int *ptr) 88{ 89 /* Keep GCC from optimizing this away somehow */ 90 barrier(); 91 return *ptr; 92} 93 94void expected_pkey_fault(int pkey); 95int sys_pkey_alloc(unsigned long flags, unsigned long init_val); 96int sys_pkey_free(unsigned long pkey); 97int mprotect_pkey(void *ptr, size_t size, unsigned long orig_prot, 98 unsigned long pkey); 99void record_pkey_malloc(void *ptr, long size, int prot); 100 101#if defined(__i386__) || defined(__x86_64__) /* arch */ 102#include "pkey-x86.h" 103#elif defined(__powerpc64__) /* arch */ 104#include "pkey-powerpc.h" 105#elif defined(__aarch64__) /* arch */ 106#include "pkey-arm64.h" 107#else /* arch */ 108#error Architecture not supported 109#endif /* arch */ 110 111#ifndef PKEY_MASK 112#define PKEY_MASK (PKEY_DISABLE_ACCESS | PKEY_DISABLE_WRITE) 113#endif 114 115/* 116 * FIXME: Remove once the generic PKEY_UNRESTRICTED definition is merged. 117 */ 118#ifndef PKEY_UNRESTRICTED 119#define PKEY_UNRESTRICTED 0x0 120#endif 121 122#ifndef set_pkey_bits 123static inline u64 set_pkey_bits(u64 reg, int pkey, u64 flags) 124{ 125 u32 shift = pkey_bit_position(pkey); 126 /* mask out bits from pkey in old value */ 127 reg &= ~((u64)PKEY_MASK << shift); 128 /* OR in new bits for pkey */ 129 reg |= (flags & PKEY_MASK) << shift; 130 return reg; 131} 132#endif 133 134#ifndef get_pkey_bits 135static inline u64 get_pkey_bits(u64 reg, int pkey) 136{ 137 u32 shift = pkey_bit_position(pkey); 138 /* 139 * shift down the relevant bits to the lowest two, then 140 * mask off all the other higher bits 141 */ 142 return ((reg >> shift) & PKEY_MASK); 143} 144#endif 145 146extern u64 shadow_pkey_reg; 147 148static inline u64 _read_pkey_reg(int line) 149{ 150 u64 pkey_reg = __read_pkey_reg(); 151 152 dprintf4("read_pkey_reg(line=%d) pkey_reg: %016llx" 153 " shadow: %016llx\n", 154 line, pkey_reg, shadow_pkey_reg); 155 assert(pkey_reg == shadow_pkey_reg); 156 157 return pkey_reg; 158} 159 160#define read_pkey_reg() _read_pkey_reg(__LINE__) 161 162static inline void write_pkey_reg(u64 pkey_reg) 163{ 164 dprintf4("%s() changing %016llx to %016llx\n", __func__, 165 __read_pkey_reg(), pkey_reg); 166 /* will do the shadow check for us: */ 167 read_pkey_reg(); 168 __write_pkey_reg(pkey_reg); 169 shadow_pkey_reg = pkey_reg; 170 dprintf4("%s(%016llx) pkey_reg: %016llx\n", __func__, 171 pkey_reg, __read_pkey_reg()); 172} 173 174/* 175 * These are technically racy. since something could 176 * change PKEY register between the read and the write. 177 */ 178static inline void __pkey_access_allow(int pkey, int do_allow) 179{ 180 u64 pkey_reg = read_pkey_reg(); 181 int bit = pkey * 2; 182 183 if (do_allow) 184 pkey_reg &= (1<<bit); 185 else 186 pkey_reg |= (1<<bit); 187 188 dprintf4("pkey_reg now: %016llx\n", read_pkey_reg()); 189 write_pkey_reg(pkey_reg); 190} 191 192static inline void __pkey_write_allow(int pkey, int do_allow_write) 193{ 194 u64 pkey_reg = read_pkey_reg(); 195 int bit = pkey * 2 + 1; 196 197 if (do_allow_write) 198 pkey_reg &= (1<<bit); 199 else 200 pkey_reg |= (1<<bit); 201 202 write_pkey_reg(pkey_reg); 203 dprintf4("pkey_reg now: %016llx\n", read_pkey_reg()); 204} 205 206#define ALIGN_UP(x, align_to) (((x) + ((align_to)-1)) & ~((align_to)-1)) 207#define ALIGN_DOWN(x, align_to) ((x) & ~((align_to)-1)) 208#define ALIGN_PTR_UP(p, ptr_align_to) \ 209 ((typeof(p))ALIGN_UP((unsigned long)(p), ptr_align_to)) 210#define ALIGN_PTR_DOWN(p, ptr_align_to) \ 211 ((typeof(p))ALIGN_DOWN((unsigned long)(p), ptr_align_to)) 212#define __stringify_1(x...) #x 213#define __stringify(x...) __stringify_1(x) 214 215static inline u32 *siginfo_get_pkey_ptr(siginfo_t *si) 216{ 217#ifdef si_pkey 218 return &si->si_pkey; 219#else 220 return (u32 *)(((u8 *)si) + si_pkey_offset); 221#endif 222} 223 224static inline int kernel_has_pkeys(void) 225{ 226 /* try allocating a key and see if it succeeds */ 227 int ret = sys_pkey_alloc(0, 0); 228 if (ret <= 0) { 229 return 0; 230 } 231 sys_pkey_free(ret); 232 return 1; 233} 234 235static inline int is_pkeys_supported(void) 236{ 237 /* check if the cpu supports pkeys */ 238 if (!cpu_has_pkeys()) { 239 dprintf1("SKIP: %s: no CPU support\n", __func__); 240 return 0; 241 } 242 243 /* check if the kernel supports pkeys */ 244 if (!kernel_has_pkeys()) { 245 dprintf1("SKIP: %s: no kernel support\n", __func__); 246 return 0; 247 } 248 249 return 1; 250} 251 252#endif /* _PKEYS_HELPER_H */