Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   1) /* SPDX-License-Identifier: GPL-2.0 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   2) #ifndef _ASM_POWERPC_KUP_H_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   3) #define _ASM_POWERPC_KUP_H_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   4) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   5) #define KUAP_READ	1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   6) #define KUAP_WRITE	2
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   7) #define KUAP_READ_WRITE	(KUAP_READ | KUAP_WRITE)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   8) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   9)  * For prevent_user_access() only.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  10)  * Use the current saved situation instead of the to/from/size params.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  11)  * Used on book3s/32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  12)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  13) #define KUAP_CURRENT_READ	4
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  14) #define KUAP_CURRENT_WRITE	8
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  15) #define KUAP_CURRENT		(KUAP_CURRENT_READ | KUAP_CURRENT_WRITE)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  16) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  17) #ifdef CONFIG_PPC_BOOK3S_64
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  18) #include <asm/book3s/64/kup-radix.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  19) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  20) #ifdef CONFIG_PPC_8xx
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  21) #include <asm/nohash/32/kup-8xx.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  22) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  23) #ifdef CONFIG_PPC_BOOK3S_32
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  24) #include <asm/book3s/32/kup.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  25) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  26) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  27) #ifdef __ASSEMBLY__
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  28) #ifndef CONFIG_PPC_KUAP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  29) .macro kuap_save_and_lock	sp, thread, gpr1, gpr2, gpr3
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  30) .endm
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  31) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  32) .macro kuap_restore	sp, current, gpr1, gpr2, gpr3
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  33) .endm
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  34) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  35) .macro kuap_check	current, gpr
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  36) .endm
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  37) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  38) .macro kuap_check_amr	gpr1, gpr2
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  39) .endm
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  40) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  41) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  42) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  43) #else /* !__ASSEMBLY__ */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  44) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  45) #include <linux/pgtable.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  46) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  47) void setup_kup(void);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  48) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  49) #ifdef CONFIG_PPC_KUEP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  50) void setup_kuep(bool disabled);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  51) #else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  52) static inline void setup_kuep(bool disabled) { }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  53) #endif /* CONFIG_PPC_KUEP */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  54) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  55) #ifdef CONFIG_PPC_KUAP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  56) void setup_kuap(bool disabled);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  57) #else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  58) static inline void setup_kuap(bool disabled) { }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  59) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  60) static inline bool
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  61) bad_kuap_fault(struct pt_regs *regs, unsigned long address, bool is_write)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  62) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  63) 	return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  64) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  65) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  66) static inline void kuap_check_amr(void) { }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  67) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  68) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  69)  * book3s/64/kup-radix.h defines these functions for the !KUAP case to flush
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  70)  * the L1D cache after user accesses. Only include the empty stubs for other
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  71)  * platforms.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  72)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  73) #ifndef CONFIG_PPC_BOOK3S_64
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  74) static inline void allow_user_access(void __user *to, const void __user *from,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  75) 				     unsigned long size, unsigned long dir) { }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  76) static inline void prevent_user_access(void __user *to, const void __user *from,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  77) 				       unsigned long size, unsigned long dir) { }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  78) static inline unsigned long prevent_user_access_return(void) { return 0UL; }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  79) static inline void restore_user_access(unsigned long flags) { }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  80) #endif /* CONFIG_PPC_BOOK3S_64 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  81) #endif /* CONFIG_PPC_KUAP */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  82) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  83) static inline void allow_read_from_user(const void __user *from, unsigned long size)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  84) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  85) 	allow_user_access(NULL, from, size, KUAP_READ);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  86) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  87) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  88) static inline void allow_write_to_user(void __user *to, unsigned long size)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  89) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  90) 	allow_user_access(to, NULL, size, KUAP_WRITE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  91) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  92) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  93) static inline void allow_read_write_user(void __user *to, const void __user *from,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  94) 					 unsigned long size)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  95) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  96) 	allow_user_access(to, from, size, KUAP_READ_WRITE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  97) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  98) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  99) static inline void prevent_read_from_user(const void __user *from, unsigned long size)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) 	prevent_user_access(NULL, from, size, KUAP_READ);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) static inline void prevent_write_to_user(void __user *to, unsigned long size)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) 	prevent_user_access(to, NULL, size, KUAP_WRITE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) static inline void prevent_read_write_user(void __user *to, const void __user *from,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) 					   unsigned long size)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) 	prevent_user_access(to, from, size, KUAP_READ_WRITE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) static inline void prevent_current_access_user(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) 	prevent_user_access(NULL, NULL, ~0UL, KUAP_CURRENT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) static inline void prevent_current_read_from_user(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) 	prevent_user_access(NULL, NULL, ~0UL, KUAP_CURRENT_READ);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) static inline void prevent_current_write_to_user(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) 	prevent_user_access(NULL, NULL, ~0UL, KUAP_CURRENT_WRITE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130) #endif /* !__ASSEMBLY__ */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) #endif /* _ASM_POWERPC_KUAP_H_ */