xref: /freebsd/lib/libsys/x86/pkru.c (revision 4bc66c0f9f2c349af86cbf4e77f000b49d819fea)
1*4bc66c0fSBrooks Davis /*-
2*4bc66c0fSBrooks Davis  * Copyright (c) 2019 The FreeBSD Foundation
3*4bc66c0fSBrooks Davis  *
4*4bc66c0fSBrooks Davis  * Portions of this software were developed by Konstantin Belousov
5*4bc66c0fSBrooks Davis  * under sponsorship from the FreeBSD Foundation.
6*4bc66c0fSBrooks Davis  *
7*4bc66c0fSBrooks Davis  * Redistribution and use in source and binary forms, with or without
8*4bc66c0fSBrooks Davis  * modification, are permitted provided that the following conditions
9*4bc66c0fSBrooks Davis  * are met:
10*4bc66c0fSBrooks Davis  * 1. Redistributions of source code must retain the above copyright
11*4bc66c0fSBrooks Davis  *    notice, this list of conditions and the following disclaimer.
12*4bc66c0fSBrooks Davis  * 2. Redistributions in binary form must reproduce the above copyright
13*4bc66c0fSBrooks Davis  *    notice, this list of conditions and the following disclaimer in the
14*4bc66c0fSBrooks Davis  *    documentation and/or other materials provided with the distribution.
15*4bc66c0fSBrooks Davis  *
16*4bc66c0fSBrooks Davis  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17*4bc66c0fSBrooks Davis  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18*4bc66c0fSBrooks Davis  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19*4bc66c0fSBrooks Davis  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20*4bc66c0fSBrooks Davis  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21*4bc66c0fSBrooks Davis  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22*4bc66c0fSBrooks Davis  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23*4bc66c0fSBrooks Davis  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24*4bc66c0fSBrooks Davis  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25*4bc66c0fSBrooks Davis  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26*4bc66c0fSBrooks Davis  * SUCH DAMAGE.
27*4bc66c0fSBrooks Davis  */
28*4bc66c0fSBrooks Davis 
29*4bc66c0fSBrooks Davis #include <sys/param.h>
30*4bc66c0fSBrooks Davis #include <machine/cpufunc.h>
31*4bc66c0fSBrooks Davis #include <machine/specialreg.h>
32*4bc66c0fSBrooks Davis #include <machine/sysarch.h>
33*4bc66c0fSBrooks Davis #include <x86/ifunc.h>
34*4bc66c0fSBrooks Davis #include <errno.h>
35*4bc66c0fSBrooks Davis #include <string.h>
36*4bc66c0fSBrooks Davis 
37*4bc66c0fSBrooks Davis #define	MAX_PKRU_IDX	0xf
38*4bc66c0fSBrooks Davis #ifdef __i386__
39*4bc66c0fSBrooks Davis #define	X86_SET_PKRU	I386_SET_PKRU
40*4bc66c0fSBrooks Davis #define	X86_CLEAR_PKRU	I386_CLEAR_PKRU
41*4bc66c0fSBrooks Davis #else
42*4bc66c0fSBrooks Davis #define	X86_SET_PKRU	AMD64_SET_PKRU
43*4bc66c0fSBrooks Davis #define	X86_CLEAR_PKRU	AMD64_CLEAR_PKRU
44*4bc66c0fSBrooks Davis #endif
45*4bc66c0fSBrooks Davis 
46*4bc66c0fSBrooks Davis static int
x86_pkru_get_perm_unsup(u_int keyidx,int * access,int * modify)47*4bc66c0fSBrooks Davis x86_pkru_get_perm_unsup(u_int keyidx, int *access, int *modify)
48*4bc66c0fSBrooks Davis {
49*4bc66c0fSBrooks Davis 
50*4bc66c0fSBrooks Davis 	errno = EOPNOTSUPP;
51*4bc66c0fSBrooks Davis 	return (-1);
52*4bc66c0fSBrooks Davis }
53*4bc66c0fSBrooks Davis 
54*4bc66c0fSBrooks Davis static int
x86_pkru_get_perm_hw(u_int keyidx,int * access,int * modify)55*4bc66c0fSBrooks Davis x86_pkru_get_perm_hw(u_int keyidx, int *access, int *modify)
56*4bc66c0fSBrooks Davis {
57*4bc66c0fSBrooks Davis 	uint32_t pkru;
58*4bc66c0fSBrooks Davis 
59*4bc66c0fSBrooks Davis 	if (keyidx > MAX_PKRU_IDX) {
60*4bc66c0fSBrooks Davis 		errno = EINVAL;
61*4bc66c0fSBrooks Davis 		return (-1);
62*4bc66c0fSBrooks Davis 	}
63*4bc66c0fSBrooks Davis 	keyidx *= 2;
64*4bc66c0fSBrooks Davis 	pkru = rdpkru();
65*4bc66c0fSBrooks Davis 	*access = (pkru & (1 << keyidx)) == 0;
66*4bc66c0fSBrooks Davis 	*modify = (pkru & (2 << keyidx)) == 0;
67*4bc66c0fSBrooks Davis 	return (0);
68*4bc66c0fSBrooks Davis }
69*4bc66c0fSBrooks Davis 
70*4bc66c0fSBrooks Davis DEFINE_UIFUNC(, int, x86_pkru_get_perm, (u_int, int *, int *))
71*4bc66c0fSBrooks Davis {
72*4bc66c0fSBrooks Davis 
73*4bc66c0fSBrooks Davis 	return ((cpu_stdext_feature2 & CPUID_STDEXT2_OSPKE) == 0 ?
74*4bc66c0fSBrooks Davis 	    x86_pkru_get_perm_unsup : x86_pkru_get_perm_hw);
75*4bc66c0fSBrooks Davis }
76*4bc66c0fSBrooks Davis 
77*4bc66c0fSBrooks Davis static int
x86_pkru_set_perm_unsup(u_int keyidx,int access,int modify)78*4bc66c0fSBrooks Davis x86_pkru_set_perm_unsup(u_int keyidx, int access, int modify)
79*4bc66c0fSBrooks Davis {
80*4bc66c0fSBrooks Davis 
81*4bc66c0fSBrooks Davis 	errno = EOPNOTSUPP;
82*4bc66c0fSBrooks Davis 	return (-1);
83*4bc66c0fSBrooks Davis }
84*4bc66c0fSBrooks Davis 
85*4bc66c0fSBrooks Davis static int
x86_pkru_set_perm_hw(u_int keyidx,int access,int modify)86*4bc66c0fSBrooks Davis x86_pkru_set_perm_hw(u_int keyidx, int access, int modify)
87*4bc66c0fSBrooks Davis {
88*4bc66c0fSBrooks Davis 	uint32_t pkru;
89*4bc66c0fSBrooks Davis 
90*4bc66c0fSBrooks Davis 	if (keyidx > MAX_PKRU_IDX) {
91*4bc66c0fSBrooks Davis 		errno = EINVAL;
92*4bc66c0fSBrooks Davis 		return (-1);
93*4bc66c0fSBrooks Davis 	}
94*4bc66c0fSBrooks Davis 	keyidx *= 2;
95*4bc66c0fSBrooks Davis 	pkru = rdpkru();
96*4bc66c0fSBrooks Davis 	pkru &= ~(3 << keyidx);
97*4bc66c0fSBrooks Davis 	if (!access)
98*4bc66c0fSBrooks Davis 		pkru |= 1 << keyidx;
99*4bc66c0fSBrooks Davis 	if (!modify)
100*4bc66c0fSBrooks Davis 		pkru |= 2 << keyidx;
101*4bc66c0fSBrooks Davis 	wrpkru(pkru);
102*4bc66c0fSBrooks Davis 	return (0);
103*4bc66c0fSBrooks Davis }
104*4bc66c0fSBrooks Davis 
105*4bc66c0fSBrooks Davis DEFINE_UIFUNC(, int, x86_pkru_set_perm, (u_int, int, int))
106*4bc66c0fSBrooks Davis {
107*4bc66c0fSBrooks Davis 
108*4bc66c0fSBrooks Davis 	return ((cpu_stdext_feature2 & CPUID_STDEXT2_OSPKE) == 0 ?
109*4bc66c0fSBrooks Davis 	    x86_pkru_set_perm_unsup : x86_pkru_set_perm_hw);
110*4bc66c0fSBrooks Davis }
111*4bc66c0fSBrooks Davis 
112*4bc66c0fSBrooks Davis int
x86_pkru_protect_range(void * addr,unsigned long len,u_int keyidx,int flags)113*4bc66c0fSBrooks Davis x86_pkru_protect_range(void *addr, unsigned long len, u_int keyidx, int flags)
114*4bc66c0fSBrooks Davis {
115*4bc66c0fSBrooks Davis 	struct amd64_set_pkru a64pkru;
116*4bc66c0fSBrooks Davis 
117*4bc66c0fSBrooks Davis 	memset(&a64pkru, 0, sizeof(a64pkru));
118*4bc66c0fSBrooks Davis 	a64pkru.addr = addr;
119*4bc66c0fSBrooks Davis 	a64pkru.len = len;
120*4bc66c0fSBrooks Davis 	a64pkru.keyidx = keyidx;
121*4bc66c0fSBrooks Davis 	a64pkru.flags = flags;
122*4bc66c0fSBrooks Davis 	return (sysarch(X86_SET_PKRU, &a64pkru));
123*4bc66c0fSBrooks Davis }
124*4bc66c0fSBrooks Davis 
125*4bc66c0fSBrooks Davis int
x86_pkru_unprotect_range(void * addr,unsigned long len)126*4bc66c0fSBrooks Davis x86_pkru_unprotect_range(void *addr, unsigned long len)
127*4bc66c0fSBrooks Davis {
128*4bc66c0fSBrooks Davis 	struct amd64_set_pkru a64pkru;
129*4bc66c0fSBrooks Davis 
130*4bc66c0fSBrooks Davis 	memset(&a64pkru, 0, sizeof(a64pkru));
131*4bc66c0fSBrooks Davis 	a64pkru.addr = addr;
132*4bc66c0fSBrooks Davis 	a64pkru.len = len;
133*4bc66c0fSBrooks Davis 	return (sysarch(X86_CLEAR_PKRU, &a64pkru));
134*4bc66c0fSBrooks Davis }
135