1 /* SPDX-License-Identifier: GPL-2.0 */
2 #ifndef _ASM_POWERPC_KUP_BOOKE_H_
3 #define _ASM_POWERPC_KUP_BOOKE_H_
4 
5 #include <asm/bug.h>
6 #include <asm/mmu.h>
7 
8 #ifdef CONFIG_PPC_KUAP
9 
10 #ifdef __ASSEMBLY__
11 
12 .macro kuap_check_amr	gpr1, gpr2
13 .endm
14 
15 #else
16 
17 #include <linux/sched.h>
18 
19 #include <asm/reg.h>
20 
__kuap_lock(void)21 static __always_inline void __kuap_lock(void)
22 {
23 	mtspr(SPRN_PID, 0);
24 	isync();
25 }
26 #define __kuap_lock __kuap_lock
27 
__kuap_save_and_lock(struct pt_regs * regs)28 static __always_inline void __kuap_save_and_lock(struct pt_regs *regs)
29 {
30 	regs->kuap = mfspr(SPRN_PID);
31 	mtspr(SPRN_PID, 0);
32 	isync();
33 }
34 #define __kuap_save_and_lock __kuap_save_and_lock
35 
kuap_user_restore(struct pt_regs * regs)36 static __always_inline void kuap_user_restore(struct pt_regs *regs)
37 {
38 	if (kuap_is_disabled())
39 		return;
40 
41 	mtspr(SPRN_PID, current->thread.pid);
42 
43 	/* Context synchronisation is performed by rfi */
44 }
45 
__kuap_kernel_restore(struct pt_regs * regs,unsigned long kuap)46 static __always_inline void __kuap_kernel_restore(struct pt_regs *regs, unsigned long kuap)
47 {
48 	if (regs->kuap)
49 		mtspr(SPRN_PID, current->thread.pid);
50 
51 	/* Context synchronisation is performed by rfi */
52 }
53 
54 #ifdef CONFIG_PPC_KUAP_DEBUG
__kuap_get_and_assert_locked(void)55 static __always_inline unsigned long __kuap_get_and_assert_locked(void)
56 {
57 	WARN_ON_ONCE(mfspr(SPRN_PID));
58 
59 	return 0;
60 }
61 #define __kuap_get_and_assert_locked __kuap_get_and_assert_locked
62 #endif
63 
uaccess_begin_booke(unsigned long val)64 static __always_inline void uaccess_begin_booke(unsigned long val)
65 {
66 	asm(ASM_MMU_FTR_IFSET("mtspr %0, %1; isync", "", %2) : :
67 	    "i"(SPRN_PID), "r"(val), "i"(MMU_FTR_KUAP) : "memory");
68 }
69 
uaccess_end_booke(void)70 static __always_inline void uaccess_end_booke(void)
71 {
72 	asm(ASM_MMU_FTR_IFSET("mtspr %0, %1; isync", "", %2) : :
73 	    "i"(SPRN_PID), "r"(0), "i"(MMU_FTR_KUAP) : "memory");
74 }
75 
allow_user_access(void __user * to,const void __user * from,unsigned long size,unsigned long dir)76 static __always_inline void allow_user_access(void __user *to, const void __user *from,
77 					      unsigned long size, unsigned long dir)
78 {
79 	uaccess_begin_booke(current->thread.pid);
80 }
81 
prevent_user_access(unsigned long dir)82 static __always_inline void prevent_user_access(unsigned long dir)
83 {
84 	uaccess_end_booke();
85 }
86 
prevent_user_access_return(void)87 static __always_inline unsigned long prevent_user_access_return(void)
88 {
89 	unsigned long flags = mfspr(SPRN_PID);
90 
91 	uaccess_end_booke();
92 
93 	return flags;
94 }
95 
restore_user_access(unsigned long flags)96 static __always_inline void restore_user_access(unsigned long flags)
97 {
98 	if (flags)
99 		uaccess_begin_booke(current->thread.pid);
100 }
101 
102 static __always_inline bool
__bad_kuap_fault(struct pt_regs * regs,unsigned long address,bool is_write)103 __bad_kuap_fault(struct pt_regs *regs, unsigned long address, bool is_write)
104 {
105 	return !regs->kuap;
106 }
107 
108 #endif /* !__ASSEMBLY__ */
109 
110 #endif /* CONFIG_PPC_KUAP */
111 
112 #endif /* _ASM_POWERPC_KUP_BOOKE_H_ */
113