Linux kernel mirror (for testing)
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel
os
linux
1/* SPDX-License-Identifier: GPL-2.0 */
2#ifndef _PKEYS_HELPER_H
3#define _PKEYS_HELPER_H
4#define _GNU_SOURCE
5#include <string.h>
6#include <stdarg.h>
7#include <stdio.h>
8#include <stdint.h>
9#include <stdbool.h>
10#include <signal.h>
11#include <assert.h>
12#include <stdlib.h>
13#include <ucontext.h>
14#include <sys/mman.h>
15
16#include "../kselftest.h"
17
18/* Define some kernel-like types */
19#define u8 __u8
20#define u16 __u16
21#define u32 __u32
22#define u64 __u64
23
24#define PTR_ERR_ENOTSUP ((void *)-ENOTSUP)
25
26#ifndef DEBUG_LEVEL
27#define DEBUG_LEVEL 0
28#endif
29#define DPRINT_IN_SIGNAL_BUF_SIZE 4096
30extern int dprint_in_signal;
31extern char dprint_in_signal_buffer[DPRINT_IN_SIGNAL_BUF_SIZE];
32
33extern int test_nr;
34extern int iteration_nr;
35
36#ifdef __GNUC__
37__printf(1, 2)
38#endif
39static inline void sigsafe_printf(const char *format, ...)
40{
41 va_list ap;
42
43 if (!dprint_in_signal) {
44 va_start(ap, format);
45 vprintf(format, ap);
46 va_end(ap);
47 } else {
48 int ret;
49 /*
50 * No printf() functions are signal-safe.
51 * They deadlock easily. Write the format
52 * string to get some output, even if
53 * incomplete.
54 */
55 ret = write(1, format, strlen(format));
56 if (ret < 0)
57 exit(1);
58 }
59}
60#define dprintf_level(level, args...) do { \
61 if (level <= DEBUG_LEVEL) \
62 sigsafe_printf(args); \
63} while (0)
64#define dprintf0(args...) dprintf_level(0, args)
65#define dprintf1(args...) dprintf_level(1, args)
66#define dprintf2(args...) dprintf_level(2, args)
67#define dprintf3(args...) dprintf_level(3, args)
68#define dprintf4(args...) dprintf_level(4, args)
69
70extern void abort_hooks(void);
71#define pkey_assert(condition) do { \
72 if (!(condition)) { \
73 dprintf0("assert() at %s::%d test_nr: %d iteration: %d\n", \
74 __FILE__, __LINE__, \
75 test_nr, iteration_nr); \
76 dprintf0("errno at assert: %d", errno); \
77 abort_hooks(); \
78 exit(__LINE__); \
79 } \
80} while (0)
81
82#define barrier() __asm__ __volatile__("": : :"memory")
83#ifndef noinline
84# define noinline __attribute__((noinline))
85#endif
86
87noinline int read_ptr(int *ptr)
88{
89 /* Keep GCC from optimizing this away somehow */
90 barrier();
91 return *ptr;
92}
93
94void expected_pkey_fault(int pkey);
95int sys_pkey_alloc(unsigned long flags, unsigned long init_val);
96int sys_pkey_free(unsigned long pkey);
97int mprotect_pkey(void *ptr, size_t size, unsigned long orig_prot,
98 unsigned long pkey);
99void record_pkey_malloc(void *ptr, long size, int prot);
100
101#if defined(__i386__) || defined(__x86_64__) /* arch */
102#include "pkey-x86.h"
103#elif defined(__powerpc64__) /* arch */
104#include "pkey-powerpc.h"
105#elif defined(__aarch64__) /* arch */
106#include "pkey-arm64.h"
107#else /* arch */
108#error Architecture not supported
109#endif /* arch */
110
111#ifndef PKEY_MASK
112#define PKEY_MASK (PKEY_DISABLE_ACCESS | PKEY_DISABLE_WRITE)
113#endif
114
115/*
116 * FIXME: Remove once the generic PKEY_UNRESTRICTED definition is merged.
117 */
118#ifndef PKEY_UNRESTRICTED
119#define PKEY_UNRESTRICTED 0x0
120#endif
121
122#ifndef set_pkey_bits
123static inline u64 set_pkey_bits(u64 reg, int pkey, u64 flags)
124{
125 u32 shift = pkey_bit_position(pkey);
126 /* mask out bits from pkey in old value */
127 reg &= ~((u64)PKEY_MASK << shift);
128 /* OR in new bits for pkey */
129 reg |= (flags & PKEY_MASK) << shift;
130 return reg;
131}
132#endif
133
134#ifndef get_pkey_bits
135static inline u64 get_pkey_bits(u64 reg, int pkey)
136{
137 u32 shift = pkey_bit_position(pkey);
138 /*
139 * shift down the relevant bits to the lowest two, then
140 * mask off all the other higher bits
141 */
142 return ((reg >> shift) & PKEY_MASK);
143}
144#endif
145
146extern u64 shadow_pkey_reg;
147
148static inline u64 _read_pkey_reg(int line)
149{
150 u64 pkey_reg = __read_pkey_reg();
151
152 dprintf4("read_pkey_reg(line=%d) pkey_reg: %016llx"
153 " shadow: %016llx\n",
154 line, pkey_reg, shadow_pkey_reg);
155 assert(pkey_reg == shadow_pkey_reg);
156
157 return pkey_reg;
158}
159
160#define read_pkey_reg() _read_pkey_reg(__LINE__)
161
162static inline void write_pkey_reg(u64 pkey_reg)
163{
164 dprintf4("%s() changing %016llx to %016llx\n", __func__,
165 __read_pkey_reg(), pkey_reg);
166 /* will do the shadow check for us: */
167 read_pkey_reg();
168 __write_pkey_reg(pkey_reg);
169 shadow_pkey_reg = pkey_reg;
170 dprintf4("%s(%016llx) pkey_reg: %016llx\n", __func__,
171 pkey_reg, __read_pkey_reg());
172}
173
174/*
175 * These are technically racy. since something could
176 * change PKEY register between the read and the write.
177 */
178static inline void __pkey_access_allow(int pkey, int do_allow)
179{
180 u64 pkey_reg = read_pkey_reg();
181 int bit = pkey * 2;
182
183 if (do_allow)
184 pkey_reg &= (1<<bit);
185 else
186 pkey_reg |= (1<<bit);
187
188 dprintf4("pkey_reg now: %016llx\n", read_pkey_reg());
189 write_pkey_reg(pkey_reg);
190}
191
192static inline void __pkey_write_allow(int pkey, int do_allow_write)
193{
194 u64 pkey_reg = read_pkey_reg();
195 int bit = pkey * 2 + 1;
196
197 if (do_allow_write)
198 pkey_reg &= (1<<bit);
199 else
200 pkey_reg |= (1<<bit);
201
202 write_pkey_reg(pkey_reg);
203 dprintf4("pkey_reg now: %016llx\n", read_pkey_reg());
204}
205
206#define ALIGN_UP(x, align_to) (((x) + ((align_to)-1)) & ~((align_to)-1))
207#define ALIGN_DOWN(x, align_to) ((x) & ~((align_to)-1))
208#define ALIGN_PTR_UP(p, ptr_align_to) \
209 ((typeof(p))ALIGN_UP((unsigned long)(p), ptr_align_to))
210#define ALIGN_PTR_DOWN(p, ptr_align_to) \
211 ((typeof(p))ALIGN_DOWN((unsigned long)(p), ptr_align_to))
212#define __stringify_1(x...) #x
213#define __stringify(x...) __stringify_1(x)
214
215static inline u32 *siginfo_get_pkey_ptr(siginfo_t *si)
216{
217#ifdef si_pkey
218 return &si->si_pkey;
219#else
220 return (u32 *)(((u8 *)si) + si_pkey_offset);
221#endif
222}
223
224static inline int kernel_has_pkeys(void)
225{
226 /* try allocating a key and see if it succeeds */
227 int ret = sys_pkey_alloc(0, 0);
228 if (ret <= 0) {
229 return 0;
230 }
231 sys_pkey_free(ret);
232 return 1;
233}
234
235static inline int is_pkeys_supported(void)
236{
237 /* check if the cpu supports pkeys */
238 if (!cpu_has_pkeys()) {
239 dprintf1("SKIP: %s: no CPU support\n", __func__);
240 return 0;
241 }
242
243 /* check if the kernel supports pkeys */
244 if (!kernel_has_pkeys()) {
245 dprintf1("SKIP: %s: no kernel support\n", __func__);
246 return 0;
247 }
248
249 return 1;
250}
251
252#endif /* _PKEYS_HELPER_H */