kup.h 3.2 KB
Newer Older
1 2 3 4
/* SPDX-License-Identifier: GPL-2.0 */
#ifndef _ASM_POWERPC_KUP_H_
#define _ASM_POWERPC_KUP_H_

5 6 7
#define KUAP_READ	1
#define KUAP_WRITE	2
#define KUAP_READ_WRITE	(KUAP_READ | KUAP_WRITE)
8 9 10 11 12
/*
 * For prevent_user_access() only.
 * Use the current saved situation instead of the to/from/size params.
 * Used on book3s/32
 */
13 14 15
#define KUAP_CURRENT_READ	4
#define KUAP_CURRENT_WRITE	8
#define KUAP_CURRENT		(KUAP_CURRENT_READ | KUAP_CURRENT_WRITE)
16

17 18 19
#ifdef CONFIG_PPC64
#include <asm/book3s/64/kup-radix.h>
#endif
20 21 22
#ifdef CONFIG_PPC_8xx
#include <asm/nohash/32/kup-8xx.h>
#endif
23 24 25
#ifdef CONFIG_PPC_BOOK3S_32
#include <asm/book3s/32/kup.h>
#endif
26

27 28 29 30 31 32 33 34 35 36 37 38 39 40
#ifdef __ASSEMBLY__
#ifndef CONFIG_PPC_KUAP
.macro kuap_save_and_lock	sp, thread, gpr1, gpr2, gpr3
.endm

.macro kuap_restore	sp, current, gpr1, gpr2, gpr3
.endm

.macro kuap_check	current, gpr
.endm

#endif

#else /* !__ASSEMBLY__ */
41

42
#include <linux/pgtable.h>
43

44 45
void setup_kup(void);

46 47 48 49 50 51
#ifdef CONFIG_PPC_KUEP
void setup_kuep(bool disabled);
#else
static inline void setup_kuep(bool disabled) { }
#endif /* CONFIG_PPC_KUEP */

52 53 54 55
#ifdef CONFIG_PPC_KUAP
void setup_kuap(bool disabled);
#else
static inline void setup_kuap(bool disabled) { }
56 57 58 59 60 61 62 63 64 65 66 67 68

static inline bool
bad_kuap_fault(struct pt_regs *regs, unsigned long address, bool is_write)
{
	return false;
}

/*
 * book3s/64/kup-radix.h defines these functions for the !KUAP case to flush
 * the L1D cache after user accesses. Only include the empty stubs for other
 * platforms.
 */
#ifndef CONFIG_PPC64
69
static inline void allow_user_access(void __user *to, const void __user *from,
70
				     unsigned long size, unsigned long dir) { }
71
static inline void prevent_user_access(void __user *to, const void __user *from,
72
				       unsigned long size, unsigned long dir) { }
73 74
static inline unsigned long prevent_user_access_return(void) { return 0UL; }
static inline void restore_user_access(unsigned long flags) { }
75
#endif /* CONFIG_PPC64 */
76 77 78 79
#endif /* CONFIG_PPC_KUAP */

static inline void allow_read_from_user(const void __user *from, unsigned long size)
{
80
	allow_user_access(NULL, from, size, KUAP_READ);
81 82 83 84
}

static inline void allow_write_to_user(void __user *to, unsigned long size)
{
85 86 87 88 89 90 91
	allow_user_access(to, NULL, size, KUAP_WRITE);
}

static inline void allow_read_write_user(void __user *to, const void __user *from,
					 unsigned long size)
{
	allow_user_access(to, from, size, KUAP_READ_WRITE);
92 93 94 95
}

static inline void prevent_read_from_user(const void __user *from, unsigned long size)
{
96
	prevent_user_access(NULL, from, size, KUAP_READ);
97 98 99 100
}

static inline void prevent_write_to_user(void __user *to, unsigned long size)
{
101 102 103 104 105 106 107
	prevent_user_access(to, NULL, size, KUAP_WRITE);
}

static inline void prevent_read_write_user(void __user *to, const void __user *from,
					   unsigned long size)
{
	prevent_user_access(to, from, size, KUAP_READ_WRITE);
108 109
}

110 111 112 113 114
static inline void prevent_current_access_user(void)
{
	prevent_user_access(NULL, NULL, ~0UL, KUAP_CURRENT);
}

115 116 117 118 119 120 121 122 123 124
static inline void prevent_current_read_from_user(void)
{
	prevent_user_access(NULL, NULL, ~0UL, KUAP_CURRENT_READ);
}

static inline void prevent_current_write_to_user(void)
{
	prevent_user_access(NULL, NULL, ~0UL, KUAP_CURRENT_WRITE);
}

125 126
#endif /* !__ASSEMBLY__ */

127
#endif /* _ASM_POWERPC_KUAP_H_ */