1*4bc66c0fSBrooks Davis /*-
2*4bc66c0fSBrooks Davis * Copyright (c) 2019 The FreeBSD Foundation
3*4bc66c0fSBrooks Davis *
4*4bc66c0fSBrooks Davis * Portions of this software were developed by Konstantin Belousov
5*4bc66c0fSBrooks Davis * under sponsorship from the FreeBSD Foundation.
6*4bc66c0fSBrooks Davis *
7*4bc66c0fSBrooks Davis * Redistribution and use in source and binary forms, with or without
8*4bc66c0fSBrooks Davis * modification, are permitted provided that the following conditions
9*4bc66c0fSBrooks Davis * are met:
10*4bc66c0fSBrooks Davis * 1. Redistributions of source code must retain the above copyright
11*4bc66c0fSBrooks Davis * notice, this list of conditions and the following disclaimer.
12*4bc66c0fSBrooks Davis * 2. Redistributions in binary form must reproduce the above copyright
13*4bc66c0fSBrooks Davis * notice, this list of conditions and the following disclaimer in the
14*4bc66c0fSBrooks Davis * documentation and/or other materials provided with the distribution.
15*4bc66c0fSBrooks Davis *
16*4bc66c0fSBrooks Davis * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17*4bc66c0fSBrooks Davis * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18*4bc66c0fSBrooks Davis * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19*4bc66c0fSBrooks Davis * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20*4bc66c0fSBrooks Davis * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21*4bc66c0fSBrooks Davis * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22*4bc66c0fSBrooks Davis * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23*4bc66c0fSBrooks Davis * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24*4bc66c0fSBrooks Davis * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25*4bc66c0fSBrooks Davis * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26*4bc66c0fSBrooks Davis * SUCH DAMAGE.
27*4bc66c0fSBrooks Davis */
28*4bc66c0fSBrooks Davis
29*4bc66c0fSBrooks Davis #include <sys/param.h>
30*4bc66c0fSBrooks Davis #include <machine/cpufunc.h>
31*4bc66c0fSBrooks Davis #include <machine/specialreg.h>
32*4bc66c0fSBrooks Davis #include <machine/sysarch.h>
33*4bc66c0fSBrooks Davis #include <x86/ifunc.h>
34*4bc66c0fSBrooks Davis #include <errno.h>
35*4bc66c0fSBrooks Davis #include <string.h>
36*4bc66c0fSBrooks Davis
37*4bc66c0fSBrooks Davis #define MAX_PKRU_IDX 0xf
38*4bc66c0fSBrooks Davis #ifdef __i386__
39*4bc66c0fSBrooks Davis #define X86_SET_PKRU I386_SET_PKRU
40*4bc66c0fSBrooks Davis #define X86_CLEAR_PKRU I386_CLEAR_PKRU
41*4bc66c0fSBrooks Davis #else
42*4bc66c0fSBrooks Davis #define X86_SET_PKRU AMD64_SET_PKRU
43*4bc66c0fSBrooks Davis #define X86_CLEAR_PKRU AMD64_CLEAR_PKRU
44*4bc66c0fSBrooks Davis #endif
45*4bc66c0fSBrooks Davis
46*4bc66c0fSBrooks Davis static int
x86_pkru_get_perm_unsup(u_int keyidx,int * access,int * modify)47*4bc66c0fSBrooks Davis x86_pkru_get_perm_unsup(u_int keyidx, int *access, int *modify)
48*4bc66c0fSBrooks Davis {
49*4bc66c0fSBrooks Davis
50*4bc66c0fSBrooks Davis errno = EOPNOTSUPP;
51*4bc66c0fSBrooks Davis return (-1);
52*4bc66c0fSBrooks Davis }
53*4bc66c0fSBrooks Davis
54*4bc66c0fSBrooks Davis static int
x86_pkru_get_perm_hw(u_int keyidx,int * access,int * modify)55*4bc66c0fSBrooks Davis x86_pkru_get_perm_hw(u_int keyidx, int *access, int *modify)
56*4bc66c0fSBrooks Davis {
57*4bc66c0fSBrooks Davis uint32_t pkru;
58*4bc66c0fSBrooks Davis
59*4bc66c0fSBrooks Davis if (keyidx > MAX_PKRU_IDX) {
60*4bc66c0fSBrooks Davis errno = EINVAL;
61*4bc66c0fSBrooks Davis return (-1);
62*4bc66c0fSBrooks Davis }
63*4bc66c0fSBrooks Davis keyidx *= 2;
64*4bc66c0fSBrooks Davis pkru = rdpkru();
65*4bc66c0fSBrooks Davis *access = (pkru & (1 << keyidx)) == 0;
66*4bc66c0fSBrooks Davis *modify = (pkru & (2 << keyidx)) == 0;
67*4bc66c0fSBrooks Davis return (0);
68*4bc66c0fSBrooks Davis }
69*4bc66c0fSBrooks Davis
70*4bc66c0fSBrooks Davis DEFINE_UIFUNC(, int, x86_pkru_get_perm, (u_int, int *, int *))
71*4bc66c0fSBrooks Davis {
72*4bc66c0fSBrooks Davis
73*4bc66c0fSBrooks Davis return ((cpu_stdext_feature2 & CPUID_STDEXT2_OSPKE) == 0 ?
74*4bc66c0fSBrooks Davis x86_pkru_get_perm_unsup : x86_pkru_get_perm_hw);
75*4bc66c0fSBrooks Davis }
76*4bc66c0fSBrooks Davis
77*4bc66c0fSBrooks Davis static int
x86_pkru_set_perm_unsup(u_int keyidx,int access,int modify)78*4bc66c0fSBrooks Davis x86_pkru_set_perm_unsup(u_int keyidx, int access, int modify)
79*4bc66c0fSBrooks Davis {
80*4bc66c0fSBrooks Davis
81*4bc66c0fSBrooks Davis errno = EOPNOTSUPP;
82*4bc66c0fSBrooks Davis return (-1);
83*4bc66c0fSBrooks Davis }
84*4bc66c0fSBrooks Davis
85*4bc66c0fSBrooks Davis static int
x86_pkru_set_perm_hw(u_int keyidx,int access,int modify)86*4bc66c0fSBrooks Davis x86_pkru_set_perm_hw(u_int keyidx, int access, int modify)
87*4bc66c0fSBrooks Davis {
88*4bc66c0fSBrooks Davis uint32_t pkru;
89*4bc66c0fSBrooks Davis
90*4bc66c0fSBrooks Davis if (keyidx > MAX_PKRU_IDX) {
91*4bc66c0fSBrooks Davis errno = EINVAL;
92*4bc66c0fSBrooks Davis return (-1);
93*4bc66c0fSBrooks Davis }
94*4bc66c0fSBrooks Davis keyidx *= 2;
95*4bc66c0fSBrooks Davis pkru = rdpkru();
96*4bc66c0fSBrooks Davis pkru &= ~(3 << keyidx);
97*4bc66c0fSBrooks Davis if (!access)
98*4bc66c0fSBrooks Davis pkru |= 1 << keyidx;
99*4bc66c0fSBrooks Davis if (!modify)
100*4bc66c0fSBrooks Davis pkru |= 2 << keyidx;
101*4bc66c0fSBrooks Davis wrpkru(pkru);
102*4bc66c0fSBrooks Davis return (0);
103*4bc66c0fSBrooks Davis }
104*4bc66c0fSBrooks Davis
105*4bc66c0fSBrooks Davis DEFINE_UIFUNC(, int, x86_pkru_set_perm, (u_int, int, int))
106*4bc66c0fSBrooks Davis {
107*4bc66c0fSBrooks Davis
108*4bc66c0fSBrooks Davis return ((cpu_stdext_feature2 & CPUID_STDEXT2_OSPKE) == 0 ?
109*4bc66c0fSBrooks Davis x86_pkru_set_perm_unsup : x86_pkru_set_perm_hw);
110*4bc66c0fSBrooks Davis }
111*4bc66c0fSBrooks Davis
112*4bc66c0fSBrooks Davis int
x86_pkru_protect_range(void * addr,unsigned long len,u_int keyidx,int flags)113*4bc66c0fSBrooks Davis x86_pkru_protect_range(void *addr, unsigned long len, u_int keyidx, int flags)
114*4bc66c0fSBrooks Davis {
115*4bc66c0fSBrooks Davis struct amd64_set_pkru a64pkru;
116*4bc66c0fSBrooks Davis
117*4bc66c0fSBrooks Davis memset(&a64pkru, 0, sizeof(a64pkru));
118*4bc66c0fSBrooks Davis a64pkru.addr = addr;
119*4bc66c0fSBrooks Davis a64pkru.len = len;
120*4bc66c0fSBrooks Davis a64pkru.keyidx = keyidx;
121*4bc66c0fSBrooks Davis a64pkru.flags = flags;
122*4bc66c0fSBrooks Davis return (sysarch(X86_SET_PKRU, &a64pkru));
123*4bc66c0fSBrooks Davis }
124*4bc66c0fSBrooks Davis
125*4bc66c0fSBrooks Davis int
x86_pkru_unprotect_range(void * addr,unsigned long len)126*4bc66c0fSBrooks Davis x86_pkru_unprotect_range(void *addr, unsigned long len)
127*4bc66c0fSBrooks Davis {
128*4bc66c0fSBrooks Davis struct amd64_set_pkru a64pkru;
129*4bc66c0fSBrooks Davis
130*4bc66c0fSBrooks Davis memset(&a64pkru, 0, sizeof(a64pkru));
131*4bc66c0fSBrooks Davis a64pkru.addr = addr;
132*4bc66c0fSBrooks Davis a64pkru.len = len;
133*4bc66c0fSBrooks Davis return (sysarch(X86_CLEAR_PKRU, &a64pkru));
134*4bc66c0fSBrooks Davis }
135