On 16/11/2015 08:53, Huaitong Han wrote: > Signed-off-by: Huaitong Han <huaitong.han@xxxxxxxxx> > > diff --git a/config/config-x86-common.mak b/config/config-x86-common.mak > index c2f9908..2ef98cc 100644 > --- a/config/config-x86-common.mak > +++ b/config/config-x86-common.mak > @@ -36,7 +36,8 @@ tests-common = $(TEST_DIR)/vmexit.flat $(TEST_DIR)/tsc.flat \ > $(TEST_DIR)/kvmclock_test.flat $(TEST_DIR)/eventinj.flat \ > $(TEST_DIR)/s3.flat $(TEST_DIR)/pmu.flat \ > $(TEST_DIR)/tsc_adjust.flat $(TEST_DIR)/asyncpf.flat \ > - $(TEST_DIR)/init.flat $(TEST_DIR)/smap.flat > + $(TEST_DIR)/init.flat $(TEST_DIR)/smap.flat \ > + $(TEST_DIR)/pku.flat This needs to be in config-x86_64.mak, because the 32-bit version will have EFER.LMA=0. Otherwise looks good (and I've tested it with a quick-and-dirty implementation of pkeys in QEMU). Paolo > ifdef API > tests-common += api/api-sample > @@ -104,6 +105,8 @@ $(TEST_DIR)/pcid.elf: $(cstart.o) $(TEST_DIR)/pcid.o > > $(TEST_DIR)/smap.elf: $(cstart.o) $(TEST_DIR)/smap.o > > +$(TEST_DIR)/pku.elf: $(cstart.o) $(TEST_DIR)/pku.o > + > $(TEST_DIR)/vmx.elf: $(cstart.o) $(TEST_DIR)/vmx.o $(TEST_DIR)/vmx_tests.o > > $(TEST_DIR)/debug.elf: $(cstart.o) $(TEST_DIR)/debug.o > diff --git a/lib/x86/processor.h b/lib/x86/processor.h > index 7973879..f7aa5ec 100644 > --- a/lib/x86/processor.h > +++ b/lib/x86/processor.h > @@ -26,6 +26,7 @@ > #define X86_CR4_PAE 0x00000020 > #define X86_CR4_PCIDE 0x00020000 > #define X86_CR4_SMAP 0x00200000 > +#define X86_CR4_PKE 0x00400000 > > #define X86_IA32_EFER 0xc0000080 > #define X86_EFER_LMA (1UL << 8) > diff --git a/x86/pku.c b/x86/pku.c > new file mode 100644 > index 0000000..0e00b99 > --- /dev/null > +++ b/x86/pku.c > @@ -0,0 +1,161 @@ > +#include "libcflat.h" > +#include "x86/desc.h" > +#include "x86/processor.h" > +#include "x86/vm.h" > +#include "x86/msr.h" > + > +#define X86_FEATURE_PKU 3 > +#define CR0_WP_MASK (1UL << 16) > +#define PTE_PKEY_BIT 59 > +#define USER_BASE (1 << 24) > +#define USER_VAR(v) (*((__typeof__(&(v))) (((unsigned long)&v) + USER_BASE))) > + > +volatile int pf_count = 0; > +volatile unsigned save; > +volatile unsigned test; > + > +void set_cr0_wp(int wp) > +{ > + unsigned long cr0 = read_cr0(); > + > + cr0 &= ~CR0_WP_MASK; > + if (wp) > + cr0 |= CR0_WP_MASK; > + write_cr0(cr0); > +} > + > +static inline u32 read_pkru(void) > +{ > + unsigned int eax, edx; > + unsigned int ecx = 0; > + unsigned int pkru; > + > + asm volatile(".byte 0x0f,0x01,0xee\n\t" > + : "=a" (eax), "=d" (edx) > + : "c" (ecx)); > + pkru = eax; > + return pkru; > +} > + > +static void write_pkru(u32 pkru) > +{ > + unsigned int eax = pkru; > + unsigned int ecx = 0; > + unsigned int edx = 0; > + > + asm volatile(".byte 0x0f,0x01,0xef\n\t" > + : : "a" (eax), "c" (ecx), "d" (edx)); > +} > + > +void do_pf_tss(unsigned long error_code) > +{ > + pf_count++; > + save = test; > + write_pkru(0); > +} > + > +extern void pf_tss(void); > + > +asm ("pf_tss: \n\t" > +#ifdef __x86_64__ > + // no task on x86_64, save/restore caller-save regs > + "push %rax; push %rcx; push %rdx; push %rsi; push %rdi\n" > + "push %r8; push %r9; push %r10; push %r11\n" > +#endif > + "call do_pf_tss \n\t" > +#ifdef __x86_64__ > + "pop %r11; pop %r10; pop %r9; pop %r8\n" > + "pop %rdi; pop %rsi; pop %rdx; pop %rcx; pop %rax\n" > +#endif > + "add $"S", %"R "sp\n\t" // discard error code > + "iret"W" \n\t" > + "jmp pf_tss\n\t" > + ); > + > +static void init_test() > +{ > + pf_count = 0; > + > + invlpg(&test); > + invlpg(&USER_VAR(test)); > + write_pkru(0); > + set_cr0_wp(0); > +} > + > +int main(int ac, char **av) > +{ > + unsigned long i; > + unsigned int pkey = 0x2; > + unsigned int pkru_ad = 0x10; > + unsigned int pkru_wd = 0x20; > + > + if (!(cpuid_indexed(7, 0).c & (1 << X86_FEATURE_PKU))) { > + printf("PKU not enabled, exiting\n"); > + exit(1); > + } > + > + setup_vm(); > + setup_alt_stack(); > + set_intr_alt_stack(14, pf_tss); > + wrmsr(MSR_EFER, rdmsr(MSR_EFER) | EFER_LMA); > + > + for (i = 0; i < USER_BASE; i += PAGE_SIZE) { > + *get_pte(phys_to_virt(read_cr3()), phys_to_virt(i)) &= ~PTE_USER; > + *get_pte(phys_to_virt(read_cr3()), phys_to_virt(i)) |= ((unsigned long)pkey << PTE_PKEY_BIT); > + invlpg((void *)i); > + } > + > + for (i = USER_BASE; i < 2 * USER_BASE; i += PAGE_SIZE) { > + *get_pte(phys_to_virt(read_cr3()), phys_to_virt(i)) &= ~USER_BASE; > + *get_pte(phys_to_virt(read_cr3()), phys_to_virt(i)) |= ((unsigned long)pkey << PTE_PKEY_BIT); > + invlpg((void *)i); > + } > + > + write_cr4(read_cr4() | X86_CR4_PKE); > + write_cr3(read_cr3()); > + > + init_test(); > + set_cr0_wp(1); > + write_pkru(pkru_ad); > + test = 21; > + report("write to supervisor page when pkru is ad and wp == 1", pf_count == 0 && test == 21); > + > + init_test(); > + set_cr0_wp(0); > + write_pkru(pkru_ad); > + test = 22; > + report("write to supervisor page when pkru is ad and wp == 0", pf_count == 0 && test == 22); > + > + init_test(); > + set_cr0_wp(1); > + write_pkru(pkru_wd); > + test = 23; > + report("write to supervisor page when pkru is wd and wp == 1", pf_count == 0 && test == 23); > + > + init_test(); > + set_cr0_wp(0); > + write_pkru(pkru_wd); > + test = 24; > + report("write to supervisor page when pkru is wd and wp == 0", pf_count == 0 && test == 24); > + > + init_test(); > + write_pkru(pkru_wd); > + set_cr0_wp(0); > + USER_VAR(test) = 25; > + report("write to user page when pkru is wd and wp == 0", pf_count == 0 && test == 25); > + > + init_test(); > + write_pkru(pkru_wd); > + set_cr0_wp(1); > + USER_VAR(test) = 26; > + report("write to user page when pkru is wd and wp == 1", pf_count == 1 && test == 26 && save == 25); > + > + init_test(); > + write_pkru(pkru_ad); > + (void)USER_VAR(test); > + report("read from user page when pkru is ad", pf_count == 1 && save == 26); > + > + // TODO: implicit kernel access from ring 3 (e.g. int) > + > + return report_summary(); > +} > diff --git a/x86/unittests.cfg b/x86/unittests.cfg > index 337cc19..14e36a4 100644 > --- a/x86/unittests.cfg > +++ b/x86/unittests.cfg > @@ -72,6 +72,11 @@ groups = vmexit > file = access.flat > arch = x86_64 > > +[pku] > +file = pku.flat > +arch = x86_64 > +extra_params = -cpu host > + > #[asyncpf] > #file = asyncpf.flat > > -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html