/* SPDX-License-Identifier: GPL-2.0 */ #ifndef _PKEYS_POWERPC_H #define _PKEYS_POWERPC_H #ifndef SYS_mprotect_key # define SYS_mprotect_key 386 #endif #ifndef SYS_pkey_alloc # define SYS_pkey_alloc 384 # define SYS_pkey_free 385 #endif #define REG_IP_IDX PT_NIP #define REG_TRAPNO PT_TRAP #define gregs gp_regs #define fpregs fp_regs #define si_pkey_offset 0x20 #undef PKEY_DISABLE_ACCESS #define PKEY_DISABLE_ACCESS 0x3 /* disable read and write */ #undef PKEY_DISABLE_WRITE #define PKEY_DISABLE_WRITE 0x2 #define NR_PKEYS 32 #define NR_RESERVED_PKEYS_4K 27 /* pkey-0, pkey-1, exec-only-pkey and 24 other keys that cannot be represented in the PTE */ #define NR_RESERVED_PKEYS_64K_3KEYS 3 /* PowerNV and KVM: pkey-0, pkey-1 and exec-only key */ #define NR_RESERVED_PKEYS_64K_4KEYS 4 /* PowerVM: pkey-0, pkey-1, pkey-31 and exec-only key */ #define PKEY_BITS_PER_PKEY 2 #define HPAGE_SIZE (1UL << 24) #define PAGE_SIZE sysconf(_SC_PAGESIZE) static inline u32 pkey_bit_position(int pkey) { return (NR_PKEYS - pkey - 1) * PKEY_BITS_PER_PKEY; } static inline u64 __read_pkey_reg(void) { u64 pkey_reg; asm volatile("mfspr %0, 0xd" : "=r" (pkey_reg)); return pkey_reg; } static inline void __write_pkey_reg(u64 pkey_reg) { u64 amr = pkey_reg; dprintf4("%s() changing %016llx to %016llx\n", __func__, __read_pkey_reg(), pkey_reg); asm volatile("isync; mtspr 0xd, %0; isync" : : "r" ((unsigned long)(amr)) : "memory"); dprintf4("%s() pkey register after changing %016llx to %016llx\n", __func__, __read_pkey_reg(), pkey_reg); } static inline int cpu_has_pkeys(void) { /* No simple way to determine this */ return 1; } static inline bool arch_is_powervm() { struct stat buf; if ((stat("/sys/firmware/devicetree/base/ibm,partition-name", &buf) == 0) && (stat("/sys/firmware/devicetree/base/hmc-managed?", &buf) == 0) && (stat("/sys/firmware/devicetree/base/chosen/qemu,graphic-width", &buf) == -1) ) return true; return false; } static inline int get_arch_reserved_keys(void) { if (sysconf(_SC_PAGESIZE) == 4096) return NR_RESERVED_PKEYS_4K; else if (arch_is_powervm()) return NR_RESERVED_PKEYS_64K_4KEYS; else return NR_RESERVED_PKEYS_64K_3KEYS; } void expect_fault_on_read_execonly_key(void *p1, int pkey) { /* * powerpc does not allow userspace to change permissions of exec-only * keys since those keys are not allocated by userspace. The signal * handler wont be able to reset the permissions, which means the code * will infinitely continue to segfault here. */ return; } /* 4-byte instructions * 16384 = 64K page */ #define __page_o_noops() asm(".rept 16384 ; nop; .endr") void *malloc_pkey_with_mprotect_subpage(long size, int prot, u16 pkey) { void *ptr; int ret; dprintf1("doing %s(size=%ld, prot=0x%x, pkey=%d)\n", __func__, size, prot, pkey); pkey_assert(pkey < NR_PKEYS); ptr = mmap(NULL, size, prot, MAP_ANONYMOUS|MAP_PRIVATE, -1, 0); pkey_assert(ptr != (void *)-1); ret = syscall(__NR_subpage_prot, ptr, size, NULL); if (ret) { perror("subpage_perm"); return PTR_ERR_ENOTSUP; } ret = mprotect_pkey((void *)ptr, PAGE_SIZE, prot, pkey); pkey_assert(!ret); record_pkey_malloc(ptr, size, prot); dprintf1("%s() for pkey %d @ %p\n", __func__, pkey, ptr); return ptr; } #endif /* _PKEYS_POWERPC_H */