123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986 |
- /* linuxkm_wc_port.h
- *
- * Copyright (C) 2006-2024 wolfSSL Inc.
- *
- * This file is part of wolfSSL.
- *
- * wolfSSL is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * wolfSSL is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
- */
- /* included by wolfssl/wolfcrypt/wc_port.h */
- #ifndef LINUXKM_WC_PORT_H
- #define LINUXKM_WC_PORT_H
- #include <linux/version.h>
- #if LINUX_VERSION_CODE < KERNEL_VERSION(3, 16, 0)
- #error Unsupported kernel.
- #endif
- #ifdef HAVE_CONFIG_H
- #ifndef PACKAGE_NAME
- #error wc_port.h included before config.h
- #endif
- /* config.h is autogenerated without gating, and is subject to repeat
- * inclusions, so gate it out here to keep autodetection masking
- * intact:
- */
- #undef HAVE_CONFIG_H
- #endif
- /* suppress inclusion of stdint-gcc.h to avoid conflicts with Linux native
- * include/linux/types.h:
- */
- #define _GCC_STDINT_H
- #define WC_PTR_TYPE uintptr_t
- /* needed to suppress inclusion of stdio.h in wolfssl/wolfcrypt/types.h */
- #define XSNPRINTF snprintf
- /* the rigmarole around kstrtoll() here is to accommodate its
- * warn-unused-result attribute.
- *
- * also needed to suppress inclusion of stdlib.h in
- * wolfssl/wolfcrypt/types.h.
- */
- #define XATOI(s) ({ \
- long long _xatoi_res = 0; \
- int _xatoi_ret = kstrtoll(s, 10, &_xatoi_res); \
- if (_xatoi_ret != 0) { \
- _xatoi_res = 0; \
- } \
- (int)_xatoi_res; \
- })
- /* Kbuild+gcc on x86 doesn't consistently honor the default ALIGN16 on stack
- * objects, but gives adequate alignment with "32".
- */
- #if defined(CONFIG_X86) && !defined(ALIGN16)
- #define ALIGN16 __attribute__ ( (aligned (32)))
- #endif
- /* kvmalloc()/kvfree() and friends added in linux commit a7c3e901 */
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(4, 12, 0)
- #define HAVE_KVMALLOC
- #endif
- /* kernel printf doesn't implement fp. */
- #ifndef WOLFSSL_NO_FLOAT_FMT
- #define WOLFSSL_NO_FLOAT_FMT
- #endif
- #ifdef BUILDING_WOLFSSL
- #if defined(CONFIG_MIPS) && defined(HAVE_LINUXKM_PIE_SUPPORT)
- /* __ZBOOT__ disables some unhelpful macros around the mem*() funcs in
- * legacy arch/mips/include/asm/string.h
- */
- #define __ZBOOT__
- #define memcmp __builtin_memcmp
- #define __ARCH_MEMCMP_NO_REDIRECT
- #define __ARCH_MEMCPY_NO_REDIRECT
- #define __builtin_memcpy memcpy
- extern void *memcpy(void *dest, const void *src, unsigned int n);
- #define __ARCH_MEMCPY_NO_REDIRECT
- #define __builtin_memset memset
- extern void *memset(void *dest, int c, unsigned int n);
- #endif
- _Pragma("GCC diagnostic push");
- /* we include all the needed kernel headers with these masked out. else
- * there are profuse warnings.
- */
- _Pragma("GCC diagnostic ignored \"-Wunused-parameter\"");
- _Pragma("GCC diagnostic ignored \"-Wpointer-arith\"");
- _Pragma("GCC diagnostic ignored \"-Wshadow\"");
- _Pragma("GCC diagnostic ignored \"-Wnested-externs\"");
- _Pragma("GCC diagnostic ignored \"-Wredundant-decls\"");
- _Pragma("GCC diagnostic ignored \"-Wsign-compare\"");
- _Pragma("GCC diagnostic ignored \"-Wpointer-sign\"");
- _Pragma("GCC diagnostic ignored \"-Wbad-function-cast\"");
- _Pragma("GCC diagnostic ignored \"-Wdiscarded-qualifiers\"");
- _Pragma("GCC diagnostic ignored \"-Wtype-limits\"");
- _Pragma("GCC diagnostic ignored \"-Wswitch-enum\"");
- _Pragma("GCC diagnostic ignored \"-Wcast-function-type\""); /* needed for kernel 4.14.336 */
- #include <linux/kconfig.h>
- #include <linux/kernel.h>
- #include <linux/ctype.h>
- #if defined(CONFIG_FORTIFY_SOURCE) || defined(DEBUG_LINUXKM_FORTIFY_OVERLAY)
- #ifdef __PIE__
- /* the inline definitions in fortify-string.h use non-inline
- * fortify_panic().
- */
- extern void __my_fortify_panic(const char *name) __noreturn __cold;
- #define fortify_panic __my_fortify_panic
- #endif
- /* the _FORTIFY_SOURCE macros and implementations for several string
- * functions are incompatible with libwolfssl, so just reimplement with
- * inlines and remap with macros.
- */
- #define __ARCH_STRLEN_NO_REDIRECT
- #define __ARCH_MEMCPY_NO_REDIRECT
- #define __ARCH_MEMSET_NO_REDIRECT
- #define __ARCH_MEMMOVE_NO_REDIRECT
- /* the inline definitions in fortify-string.h use non-inline
- * strlen().
- */
- static inline size_t strlen(const char *s) {
- const char *s_start = s;
- while (*s)
- ++s;
- return (size_t)((uintptr_t)s - (uintptr_t)s_start);
- }
- #include <linux/string.h>
- #undef strlen
- #define strlen(s) \
- ((__builtin_constant_p(s) && __builtin_constant_p(*(s))) ? \
- (sizeof(s) - 1) : strlen(s))
- static inline void *my_memcpy(void *dest, const void *src, size_t n) {
- if (! (((uintptr_t)dest | (uintptr_t)src | (uintptr_t)n)
- & (uintptr_t)(sizeof(uintptr_t) - 1)))
- {
- uintptr_t *src_longs = (uintptr_t *)src,
- *dest_longs = (uintptr_t *)dest,
- *endp = (uintptr_t *)((u8 *)src + n);
- while (src_longs < endp)
- *dest_longs++ = *src_longs++;
- } else {
- u8 *src_bytes = (u8 *)src,
- *dest_bytes = (u8 *)dest,
- *endp = src_bytes + n;
- while (src_bytes < endp)
- *dest_bytes++ = *src_bytes++;
- }
- return dest;
- }
- #undef memcpy
- #define memcpy my_memcpy
- static inline void *my_memset(void *dest, int c, size_t n) {
- if (! (((uintptr_t)dest | (uintptr_t)n)
- & (uintptr_t)(sizeof(uintptr_t) - 1)))
- {
- uintptr_t c_long = __builtin_choose_expr(
- sizeof(uintptr_t) == 8,
- (uintptr_t)(u8)c * 0x0101010101010101UL,
- (uintptr_t)(u8)c * 0x01010101U
- );
- uintptr_t *dest_longs = (uintptr_t *)dest,
- *endp = (uintptr_t *)((u8 *)dest_longs + n);
- while (dest_longs < endp)
- *dest_longs++ = c_long;
- } else {
- u8 *dest_bytes = (u8 *)dest, *endp = dest_bytes + n;
- while (dest_bytes < endp)
- *dest_bytes++ = (u8)c;
- }
- return dest;
- }
- #undef memset
- #define memset my_memset
- static inline void *my_memmove(void *dest, const void *src, size_t n) {
- if (! (((uintptr_t)dest | (uintptr_t)src | (uintptr_t)n)
- & (uintptr_t)(sizeof(uintptr_t) - 1)))
- {
- uintptr_t *src_longs = (uintptr_t *)src,
- *dest_longs = (uintptr_t *)dest;
- n >>= __builtin_choose_expr(
- sizeof(uintptr_t) == 8,
- 3U,
- 2U);
- if (src_longs < dest_longs) {
- uintptr_t *startp = src_longs;
- src_longs += n - 1;
- dest_longs += n - 1;
- while (src_longs >= startp)
- *dest_longs-- = *src_longs--;
- } else if (src_longs > dest_longs) {
- uintptr_t *endp = src_longs + n;
- while (src_longs < endp)
- *dest_longs++ = *src_longs++;
- }
- } else {
- u8 *src_bytes = (u8 *)src, *dest_bytes = (u8 *)dest;
- if (src_bytes < dest_bytes) {
- u8 *startp = src_bytes;
- src_bytes += n - 1;
- dest_bytes += n - 1;
- while (src_bytes >= startp)
- *dest_bytes-- = *src_bytes--;
- } else if (src_bytes > dest_bytes) {
- u8 *endp = src_bytes + n;
- while (src_bytes < endp)
- *dest_bytes++ = *src_bytes++;
- }
- }
- return dest;
- }
- #undef memmove
- #define memmove my_memmove
- #endif /* CONFIG_FORTIFY_SOURCE */
- #include <linux/init.h>
- #include <linux/module.h>
- #include <linux/delay.h>
- #ifdef __PIE__
- /* without this, mm.h brings in static, but not inline, pmd_to_page(),
- * with direct references to global vmem variables.
- */
- #undef USE_SPLIT_PMD_PTLOCKS
- #define USE_SPLIT_PMD_PTLOCKS 0
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(6, 1, 0)
- /* without this, static show_free_areas() mm.h brings in direct
- * reference to unexported __show_free_areas().
- */
- #define __show_free_areas my__show_free_areas
- void my__show_free_areas(
- unsigned int flags,
- nodemask_t *nodemask,
- int max_zone_idx);
- #endif
- #endif
- #include <linux/mm.h>
- #ifndef SINGLE_THREADED
- #include <linux/kthread.h>
- #endif
- #include <linux/net.h>
- #include <linux/slab.h>
- #ifdef LINUXKM_LKCAPI_REGISTER
- #include <linux/crypto.h>
- #include <linux/scatterlist.h>
- #include <crypto/scatterwalk.h>
- #include <crypto/internal/aead.h>
- #include <crypto/internal/skcipher.h>
- /* the LKCAPI assumes that expanded encrypt and decrypt keys will stay
- * loaded simultaneously, and the Linux in-tree implementations have two
- * AES key structs in each context, one for each direction. in
- * linuxkm/lkcapi_glue.c (used for CBC, CFB, and GCM), we do the same
- * thing with "struct km_AesCtx". however, wolfCrypt struct AesXts
- * already has two AES expanded keys, the main and tweak, and the tweak
- * is always used in the encrypt direction regardless of the main
- * direction. to avoid allocating and computing a duplicate second
- * tweak encrypt key, we set
- * WC_AES_XTS_SUPPORT_SIMULTANEOUS_ENC_AND_DEC_KEYS, which adds a second
- * Aes slot to wolfCrypt's struct AesXts, and activates support for
- * AES_ENCRYPTION_AND_DECRYPTION on AES-XTS.
- */
- #ifndef WC_AES_XTS_SUPPORT_SIMULTANEOUS_ENC_AND_DEC_KEYS
- #define WC_AES_XTS_SUPPORT_SIMULTANEOUS_ENC_AND_DEC_KEYS
- #endif
- #endif
- #if defined(WOLFSSL_AESNI) || defined(USE_INTEL_SPEEDUP) || \
- defined(WOLFSSL_SP_X86_64_ASM)
- #ifndef CONFIG_X86
- #error X86 SIMD extensions requested, but CONFIG_X86 is not set.
- #endif
- #define WOLFSSL_LINUXKM_SIMD
- #define WOLFSSL_LINUXKM_SIMD_X86
- #ifndef WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS
- #define WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS
- #endif
- #elif defined(WOLFSSL_ARMASM) || defined(WOLFSSL_SP_ARM32_ASM) || \
- defined(WOLFSSL_SP_ARM64_ASM) || defined(WOLFSSL_SP_ARM_THUMB_ASM) ||\
- defined(WOLFSSL_SP_ARM_CORTEX_M_ASM)
- #if !defined(CONFIG_ARM) && !defined(CONFIG_ARM64)
- #error ARM SIMD extensions requested, but CONFIG_ARM* is not set.
- #endif
- #define WOLFSSL_LINUXKM_SIMD
- #define WOLFSSL_LINUXKM_SIMD_ARM
- #ifndef WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS
- #define WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS
- #endif
- #else
- #ifndef WOLFSSL_NO_ASM
- #define WOLFSSL_NO_ASM
- #endif
- #endif
- /* benchmarks.c uses floating point math, so needs a working
- * SAVE_VECTOR_REGISTERS().
- */
- #if defined(WOLFSSL_LINUXKM_BENCHMARKS) && \
- !defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS)
- #define WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS
- #endif
- #if defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS) && \
- defined(CONFIG_X86)
- extern __must_check int allocate_wolfcrypt_linuxkm_fpu_states(void);
- extern void free_wolfcrypt_linuxkm_fpu_states(void);
- extern __must_check int can_save_vector_registers_x86(void);
- extern __must_check int save_vector_registers_x86(void);
- extern void restore_vector_registers_x86(void);
- #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0)
- #include <asm/i387.h>
- #else
- #include <asm/simd.h>
- #endif
- #ifndef CAN_SAVE_VECTOR_REGISTERS
- #ifdef DEBUG_VECTOR_REGISTER_ACCESS_FUZZING
- #define CAN_SAVE_VECTOR_REGISTERS() (can_save_vector_registers_x86() && (SAVE_VECTOR_REGISTERS2_fuzzer() == 0))
- #else
- #define CAN_SAVE_VECTOR_REGISTERS() can_save_vector_registers_x86()
- #endif
- #endif
- #ifndef SAVE_VECTOR_REGISTERS
- #define SAVE_VECTOR_REGISTERS(fail_clause) { \
- int _svr_ret = save_vector_registers_x86(); \
- if (_svr_ret != 0) { \
- fail_clause \
- } \
- }
- #endif
- #ifndef SAVE_VECTOR_REGISTERS2
- #ifdef DEBUG_VECTOR_REGISTER_ACCESS_FUZZING
- #define SAVE_VECTOR_REGISTERS2() ({ \
- int _fuzzer_ret = SAVE_VECTOR_REGISTERS2_fuzzer(); \
- (_fuzzer_ret == 0) ? \
- save_vector_registers_x86() : \
- _fuzzer_ret; \
- })
- #else
- #define SAVE_VECTOR_REGISTERS2() save_vector_registers_x86()
- #endif
- #endif
- #ifndef RESTORE_VECTOR_REGISTERS
- #define RESTORE_VECTOR_REGISTERS() restore_vector_registers_x86()
- #endif
- #elif defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS) && (defined(CONFIG_ARM) || defined(CONFIG_ARM64))
- #error kernel module ARM SIMD is not yet tested or usable.
- #include <asm/fpsimd.h>
- static WARN_UNUSED_RESULT inline int save_vector_registers_arm(void)
- {
- preempt_disable();
- if (! may_use_simd()) {
- preempt_enable();
- return BAD_STATE_E;
- } else {
- fpsimd_preserve_current_state();
- return 0;
- }
- }
- static inline void restore_vector_registers_arm(void)
- {
- fpsimd_restore_current_state();
- preempt_enable();
- }
- #ifndef SAVE_VECTOR_REGISTERS
- #define SAVE_VECTOR_REGISTERS(fail_clause) { int _svr_ret = save_vector_registers_arm(); if (_svr_ret != 0) { fail_clause } }
- #endif
- #ifndef SAVE_VECTOR_REGISTERS2
- #define SAVE_VECTOR_REGISTERS2() save_vector_registers_arm()
- #endif
- #ifndef CAN_SAVE_VECTOR_REGISTERS
- #define CAN_SAVE_VECTOR_REGISTERS() can_save_vector_registers_arm()
- #endif
- #ifndef RESTORE_VECTOR_REGISTERS
- #define RESTORE_VECTOR_REGISTERS() restore_vector_registers_arm()
- #endif
- #elif defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS)
- #error WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS is set for an unsupported architecture.
- #endif /* WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS */
- _Pragma("GCC diagnostic pop");
- /* avoid -Wpointer-arith, encountered when -DCONFIG_FORTIFY_SOURCE */
- #undef __is_constexpr
- #define __is_constexpr(x) __builtin_constant_p(x)
- /* the kernel uses -std=c89, but not -pedantic, and makes full use of anon
- * structs/unions, so we should too.
- */
- #define HAVE_ANONYMOUS_INLINE_AGGREGATES 1
- #define NO_THREAD_LS
- #define NO_ATTRIBUTE_CONSTRUCTOR
- #ifdef HAVE_FIPS
- extern int wolfCrypt_FIPS_first(void);
- extern int wolfCrypt_FIPS_last(void);
- #if FIPS_VERSION3_GE(6,0,0)
- extern int wolfCrypt_FIPS_AES_sanity(void);
- extern int wolfCrypt_FIPS_CMAC_sanity(void);
- extern int wolfCrypt_FIPS_DH_sanity(void);
- extern int wolfCrypt_FIPS_ECC_sanity(void);
- extern int wolfCrypt_FIPS_ED25519_sanity(void);
- extern int wolfCrypt_FIPS_ED448_sanity(void);
- extern int wolfCrypt_FIPS_HMAC_sanity(void);
- extern int wolfCrypt_FIPS_KDF_sanity(void);
- extern int wolfCrypt_FIPS_PBKDF_sanity(void);
- extern int wolfCrypt_FIPS_DRBG_sanity(void);
- extern int wolfCrypt_FIPS_RSA_sanity(void);
- extern int wolfCrypt_FIPS_SHA_sanity(void);
- extern int wolfCrypt_FIPS_SHA256_sanity(void);
- extern int wolfCrypt_FIPS_SHA512_sanity(void);
- extern int wolfCrypt_FIPS_SHA3_sanity(void);
- extern int wolfCrypt_FIPS_FT_sanity(void);
- extern int wc_RunAllCast_fips(void);
- #endif
- #endif
- #if !defined(WOLFCRYPT_ONLY) && !defined(NO_CERTS)
- /* work around backward dependency of asn.c on ssl.c. */
- struct Signer;
- struct Signer *GetCA(void *signers, unsigned char *hash);
- #ifndef NO_SKID
- struct Signer *GetCAByName(void* signers, unsigned char *hash);
- #ifdef HAVE_OCSP
- struct Signer* GetCAByKeyHash(void* vp, const unsigned char* keyHash);
- #endif /* HAVE_OCSP */
- #ifdef WOLFSSL_AKID_NAME
- struct Signer* GetCAByAKID(void* vp, const unsigned char* issuer,
- unsigned int issuerSz,
- const unsigned char* serial,
- unsigned int serialSz);
- #endif
- #endif /* NO_SKID */
- #endif /* !WOLFCRYPT_ONLY && !NO_CERTS */
- #if defined(__PIE__) && !defined(USE_WOLFSSL_LINUXKM_PIE_REDIRECT_TABLE)
- #error "compiling -fPIE requires PIE redirect table."
- #endif
- #if defined(HAVE_FIPS) && !defined(HAVE_LINUXKM_PIE_SUPPORT)
- #error "FIPS build requires PIE support."
- #endif
- #ifdef USE_WOLFSSL_LINUXKM_PIE_REDIRECT_TABLE
- #ifdef CONFIG_MIPS
- #undef __ARCH_MEMCMP_NO_REDIRECT
- #undef memcmp
- extern int memcmp(const void *s1, const void *s2, size_t n);
- #endif
- struct wolfssl_linuxkm_pie_redirect_table {
- #ifndef __ARCH_MEMCMP_NO_REDIRECT
- typeof(memcmp) *memcmp;
- #endif
- #ifndef __ARCH_MEMCPY_NO_REDIRECT
- typeof(memcpy) *memcpy;
- #endif
- #ifndef __ARCH_MEMSET_NO_REDIRECT
- typeof(memset) *memset;
- #endif
- #ifndef __ARCH_MEMMOVE_NO_REDIRECT
- typeof(memmove) *memmove;
- #endif
- #ifndef __ARCH_STRCMP_NO_REDIRECT
- typeof(strcmp) *strcmp;
- #endif
- #ifndef __ARCH_STRNCMP_NO_REDIRECT
- typeof(strncmp) *strncmp;
- #endif
- #ifndef __ARCH_STRCASECMP_NO_REDIRECT
- typeof(strcasecmp) *strcasecmp;
- #endif
- #ifndef __ARCH_STRNCASECMP_NO_REDIRECT
- typeof(strncasecmp) *strncasecmp;
- #endif
- #ifndef __ARCH_STRLEN_NO_REDIRECT
- typeof(strlen) *strlen;
- #endif
- #ifndef __ARCH_STRSTR_NO_REDIRECT
- typeof(strstr) *strstr;
- #endif
- #ifndef __ARCH_STRNCPY_NO_REDIRECT
- typeof(strncpy) *strncpy;
- #endif
- #ifndef __ARCH_STRNCAT_NO_REDIRECT
- typeof(strncat) *strncat;
- #endif
- typeof(kstrtoll) *kstrtoll;
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0)
- typeof(_printk) *_printk;
- #else
- typeof(printk) *printk;
- #endif
- #ifdef CONFIG_FORTIFY_SOURCE
- typeof(__warn_printk) *__warn_printk;
- #endif
- typeof(snprintf) *snprintf;
- const unsigned char *_ctype;
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(6, 11, 0)
- typeof(kmalloc_noprof) *kmalloc_noprof;
- typeof(krealloc_noprof) *krealloc_noprof;
- typeof(kzalloc_noprof) *kzalloc_noprof;
- typeof(__kvmalloc_node_noprof) *__kvmalloc_node_noprof;
- typeof(__kmalloc_cache_noprof) *__kmalloc_cache_noprof;
- #elif LINUX_VERSION_CODE >= KERNEL_VERSION(6, 10, 0)
- typeof(kmalloc_noprof) *kmalloc_noprof;
- typeof(krealloc_noprof) *krealloc_noprof;
- typeof(kzalloc_noprof) *kzalloc_noprof;
- typeof(kvmalloc_node_noprof) *kvmalloc_node_noprof;
- typeof(kmalloc_trace_noprof) *kmalloc_trace_noprof;
- #else /* <6.10.0 */
- typeof(kmalloc) *kmalloc;
- typeof(krealloc) *krealloc;
- #ifdef HAVE_KVMALLOC
- typeof(kvmalloc_node) *kvmalloc_node;
- #endif
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(6, 1, 0)
- typeof(kmalloc_trace) *kmalloc_trace;
- #else
- typeof(kmem_cache_alloc_trace) *kmem_cache_alloc_trace;
- typeof(kmalloc_order_trace) *kmalloc_order_trace;
- #endif
- #endif /* <6.10.0 */
- #ifdef HAVE_KVMALLOC
- typeof(kvfree) *kvfree;
- #endif
- typeof(kfree) *kfree;
- typeof(ksize) *ksize;
- typeof(is_vmalloc_addr) *is_vmalloc_addr;
- typeof(get_random_bytes) *get_random_bytes;
- #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0)
- typeof(getnstimeofday) *getnstimeofday;
- #elif LINUX_VERSION_CODE < KERNEL_VERSION(5, 0, 0)
- typeof(current_kernel_time64) *current_kernel_time64;
- #else
- typeof(ktime_get_coarse_real_ts64) *ktime_get_coarse_real_ts64;
- #endif
- struct task_struct *(*get_current)(void);
- #ifdef WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS
- #ifdef CONFIG_X86
- typeof(allocate_wolfcrypt_linuxkm_fpu_states) *allocate_wolfcrypt_linuxkm_fpu_states;
- typeof(can_save_vector_registers_x86) *can_save_vector_registers_x86;
- typeof(free_wolfcrypt_linuxkm_fpu_states) *free_wolfcrypt_linuxkm_fpu_states;
- typeof(restore_vector_registers_x86) *restore_vector_registers_x86;
- typeof(save_vector_registers_x86) *save_vector_registers_x86;
- #else /* !CONFIG_X86 */
- #error WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS is set for an unsupported architecture.
- #endif /* arch */
- #endif /* WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS */
- typeof(__mutex_init) *__mutex_init;
- #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0)
- typeof(mutex_lock_nested) *mutex_lock_nested;
- #else
- typeof(mutex_lock) *mutex_lock;
- #endif
- typeof(mutex_unlock) *mutex_unlock;
- #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0)
- typeof(mutex_destroy) *mutex_destroy;
- #endif
- #ifdef HAVE_FIPS
- typeof(wolfCrypt_FIPS_first) *wolfCrypt_FIPS_first;
- typeof(wolfCrypt_FIPS_last) *wolfCrypt_FIPS_last;
- #if FIPS_VERSION3_GE(6,0,0)
- typeof(wolfCrypt_FIPS_AES_sanity) *wolfCrypt_FIPS_AES_sanity;
- typeof(wolfCrypt_FIPS_CMAC_sanity) *wolfCrypt_FIPS_CMAC_sanity;
- typeof(wolfCrypt_FIPS_DH_sanity) *wolfCrypt_FIPS_DH_sanity;
- typeof(wolfCrypt_FIPS_ECC_sanity) *wolfCrypt_FIPS_ECC_sanity;
- typeof(wolfCrypt_FIPS_ED25519_sanity) *wolfCrypt_FIPS_ED25519_sanity;
- typeof(wolfCrypt_FIPS_ED448_sanity) *wolfCrypt_FIPS_ED448_sanity;
- typeof(wolfCrypt_FIPS_HMAC_sanity) *wolfCrypt_FIPS_HMAC_sanity;
- typeof(wolfCrypt_FIPS_KDF_sanity) *wolfCrypt_FIPS_KDF_sanity;
- typeof(wolfCrypt_FIPS_PBKDF_sanity) *wolfCrypt_FIPS_PBKDF_sanity;
- typeof(wolfCrypt_FIPS_DRBG_sanity) *wolfCrypt_FIPS_DRBG_sanity;
- typeof(wolfCrypt_FIPS_RSA_sanity) *wolfCrypt_FIPS_RSA_sanity;
- typeof(wolfCrypt_FIPS_SHA_sanity) *wolfCrypt_FIPS_SHA_sanity;
- typeof(wolfCrypt_FIPS_SHA256_sanity) *wolfCrypt_FIPS_SHA256_sanity;
- typeof(wolfCrypt_FIPS_SHA512_sanity) *wolfCrypt_FIPS_SHA512_sanity;
- typeof(wolfCrypt_FIPS_SHA3_sanity) *wolfCrypt_FIPS_SHA3_sanity;
- typeof(wolfCrypt_FIPS_FT_sanity) *wolfCrypt_FIPS_FT_sanity;
- typeof(wc_RunAllCast_fips) *wc_RunAllCast_fips;
- #endif
- #endif
- #if !defined(WOLFCRYPT_ONLY) && !defined(NO_CERTS)
- typeof(GetCA) *GetCA;
- #ifndef NO_SKID
- typeof(GetCAByName) *GetCAByName;
- #ifdef HAVE_OCSP
- typeof(GetCAByKeyHash) *GetCAByKeyHash;
- #endif /* HAVE_OCSP */
- #endif /* NO_SKID */
- #ifdef WOLFSSL_AKID_NAME
- typeof(GetCAByAKID) *GetCAByAKID;
- #endif /* WOLFSSL_AKID_NAME */
- #endif /* !WOLFCRYPT_ONLY && !NO_CERTS */
- #ifdef WOLFSSL_DEBUG_BACKTRACE_ERROR_CODES
- typeof(dump_stack) *dump_stack;
- #endif
- const void *_last_slot;
- };
- extern const struct wolfssl_linuxkm_pie_redirect_table *wolfssl_linuxkm_get_pie_redirect_table(void);
- #ifdef __PIE__
- #ifndef __ARCH_MEMCMP_NO_REDIRECT
- #define memcmp (wolfssl_linuxkm_get_pie_redirect_table()->memcmp)
- #endif
- #ifndef __ARCH_MEMCPY_NO_REDIRECT
- #define memcpy (wolfssl_linuxkm_get_pie_redirect_table()->memcpy)
- #endif
- #ifndef __ARCH_MEMSET_NO_REDIRECT
- #define memset (wolfssl_linuxkm_get_pie_redirect_table()->memset)
- #endif
- #ifndef __ARCH_MEMMOVE_NO_REDIRECT
- #define memmove (wolfssl_linuxkm_get_pie_redirect_table()->memmove)
- #endif
- #ifndef __ARCH_STRCMP_NO_REDIRECT
- #define strcmp (wolfssl_linuxkm_get_pie_redirect_table()->strcmp)
- #endif
- #ifndef __ARCH_STRNCMP_NO_REDIRECT
- #define strncmp (wolfssl_linuxkm_get_pie_redirect_table()->strncmp)
- #endif
- #ifndef __ARCH_STRCASECMP_NO_REDIRECT
- #define strcasecmp (wolfssl_linuxkm_get_pie_redirect_table()->strcasecmp)
- #endif
- #ifndef __ARCH_STRNCASECMP_NO_REDIRECT
- #define strncasecmp (wolfssl_linuxkm_get_pie_redirect_table()->strncasecmp)
- #endif
- #ifndef __ARCH_STRLEN_NO_REDIRECT
- #define strlen (wolfssl_linuxkm_get_pie_redirect_table()->strlen)
- #endif
- #ifndef __ARCH_STRSTR_NO_REDIRECT
- #define strstr (wolfssl_linuxkm_get_pie_redirect_table()->strstr)
- #endif
- #ifndef __ARCH_STRNCPY_NO_REDIRECT
- #define strncpy (wolfssl_linuxkm_get_pie_redirect_table()->strncpy)
- #endif
- #ifndef __ARCH_STRNCAT_NO_REDIRECT
- #define strncat (wolfssl_linuxkm_get_pie_redirect_table()->strncat)
- #endif
- #define kstrtoll (wolfssl_linuxkm_get_pie_redirect_table()->kstrtoll)
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0)
- #define _printk (wolfssl_linuxkm_get_pie_redirect_table()->_printk)
- #else
- #define printk (wolfssl_linuxkm_get_pie_redirect_table()->printk)
- #endif
- #ifdef CONFIG_FORTIFY_SOURCE
- #define __warn_printk (wolfssl_linuxkm_get_pie_redirect_table()->__warn_printk)
- #endif
- #define snprintf (wolfssl_linuxkm_get_pie_redirect_table()->snprintf)
- #define _ctype (wolfssl_linuxkm_get_pie_redirect_table()->_ctype)
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(6, 11, 0)
- /* see include/linux/alloc_tag.h and include/linux/slab.h */
- #define kmalloc_noprof (wolfssl_linuxkm_get_pie_redirect_table()->kmalloc_noprof)
- #define krealloc_noprof (wolfssl_linuxkm_get_pie_redirect_table()->krealloc_noprof)
- #define kzalloc_noprof (wolfssl_linuxkm_get_pie_redirect_table()->kzalloc_noprof)
- #define __kvmalloc_node_noprof (wolfssl_linuxkm_get_pie_redirect_table()->__kvmalloc_node_noprof)
- #define __kmalloc_cache_noprof (wolfssl_linuxkm_get_pie_redirect_table()->__kmalloc_cache_noprof)
- #elif LINUX_VERSION_CODE >= KERNEL_VERSION(6, 10, 0)
- /* see include/linux/alloc_tag.h and include/linux/slab.h */
- #define kmalloc_noprof (wolfssl_linuxkm_get_pie_redirect_table()->kmalloc_noprof)
- #define krealloc_noprof (wolfssl_linuxkm_get_pie_redirect_table()->krealloc_noprof)
- #define kzalloc_noprof (wolfssl_linuxkm_get_pie_redirect_table()->kzalloc_noprof)
- #define kvmalloc_node_noprof (wolfssl_linuxkm_get_pie_redirect_table()->kvmalloc_node_noprof)
- #define kmalloc_trace_noprof (wolfssl_linuxkm_get_pie_redirect_table()->kmalloc_trace_noprof)
- #else /* <6.10.0 */
- #define kmalloc (wolfssl_linuxkm_get_pie_redirect_table()->kmalloc)
- #define krealloc (wolfssl_linuxkm_get_pie_redirect_table()->krealloc)
- #define kzalloc(size, flags) kmalloc(size, (flags) | __GFP_ZERO)
- #ifdef HAVE_KVMALLOC
- #define kvmalloc_node (wolfssl_linuxkm_get_pie_redirect_table()->kvmalloc_node)
- #endif
- #if LINUX_VERSION_CODE >= KERNEL_VERSION(6, 1, 0)
- #define kmalloc_trace (wolfssl_linuxkm_get_pie_redirect_table()->kmalloc_trace)
- #else
- #define kmem_cache_alloc_trace (wolfssl_linuxkm_get_pie_redirect_table()->kmem_cache_alloc_trace)
- #define kmalloc_order_trace (wolfssl_linuxkm_get_pie_redirect_table()->kmalloc_order_trace)
- #endif
- #endif /* <6.10.0 */
- #define kfree (wolfssl_linuxkm_get_pie_redirect_table()->kfree)
- #ifdef HAVE_KVMALLOC
- #define kvfree (wolfssl_linuxkm_get_pie_redirect_table()->kvfree)
- #endif
- #define ksize (wolfssl_linuxkm_get_pie_redirect_table()->ksize)
- #define is_vmalloc_addr (wolfssl_linuxkm_get_pie_redirect_table()->is_vmalloc_addr)
- #define get_random_bytes (wolfssl_linuxkm_get_pie_redirect_table()->get_random_bytes)
- #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0)
- #define getnstimeofday (wolfssl_linuxkm_get_pie_redirect_table()->getnstimeofday)
- #elif LINUX_VERSION_CODE < KERNEL_VERSION(5, 0, 0)
- #define current_kernel_time64 (wolfssl_linuxkm_get_pie_redirect_table()->current_kernel_time64)
- #else
- #define ktime_get_coarse_real_ts64 (wolfssl_linuxkm_get_pie_redirect_table()->ktime_get_coarse_real_ts64)
- #endif
- #undef get_current
- #define get_current (wolfssl_linuxkm_get_pie_redirect_table()->get_current)
- #if defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS) && defined(CONFIG_X86)
- #define allocate_wolfcrypt_linuxkm_fpu_states (wolfssl_linuxkm_get_pie_redirect_table()->allocate_wolfcrypt_linuxkm_fpu_states)
- #define can_save_vector_registers_x86 (wolfssl_linuxkm_get_pie_redirect_table()->can_save_vector_registers_x86)
- #define free_wolfcrypt_linuxkm_fpu_states (wolfssl_linuxkm_get_pie_redirect_table()->free_wolfcrypt_linuxkm_fpu_states)
- #define restore_vector_registers_x86 (wolfssl_linuxkm_get_pie_redirect_table()->restore_vector_registers_x86)
- #define save_vector_registers_x86 (wolfssl_linuxkm_get_pie_redirect_table()->save_vector_registers_x86)
- #elif defined(WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS)
- #error WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS is set for an unsupported architecture.
- #endif /* WOLFSSL_LINUXKM_USE_SAVE_VECTOR_REGISTERS */
- #define __mutex_init (wolfssl_linuxkm_get_pie_redirect_table()->__mutex_init)
- #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0)
- #define mutex_lock_nested (wolfssl_linuxkm_get_pie_redirect_table()->mutex_lock_nested)
- #else
- #define mutex_lock (wolfssl_linuxkm_get_pie_redirect_table()->mutex_lock)
- #endif
- #define mutex_unlock (wolfssl_linuxkm_get_pie_redirect_table()->mutex_unlock)
- #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0)
- #define mutex_destroy (wolfssl_linuxkm_get_pie_redirect_table()->mutex_destroy)
- #endif
- /* per linux/ctype.h, tolower() and toupper() are macros bound to static inlines
- * that use macros that bring in the _ctype global. for __PIE__, this needs to
- * be masked out.
- */
- #undef tolower
- #undef toupper
- #define tolower(c) (islower(c) ? (c) : ((c) + ('a'-'A')))
- #define toupper(c) (isupper(c) ? (c) : ((c) - ('a'-'A')))
- #if !defined(WOLFCRYPT_ONLY) && !defined(NO_CERTS)
- #define GetCA (wolfssl_linuxkm_get_pie_redirect_table()->GetCA)
- #ifndef NO_SKID
- #define GetCAByName (wolfssl_linuxkm_get_pie_redirect_table()->GetCAByName)
- #ifdef HAVE_OCSP
- #define GetCAByKeyHash (wolfssl_linuxkm_get_pie_redirect_table()->GetCAByKeyHash)
- #endif /* HAVE_OCSP */
- #endif /* NO_SKID */
- #ifdef WOLFSSL_AKID_NAME
- #define GetCAByAKID (wolfssl_linuxkm_get_pie_redirect_table()->GetCAByAKID)
- #endif
- #endif /* !WOLFCRYPT_ONLY && !NO_CERTS */
- #ifdef WOLFSSL_DEBUG_BACKTRACE_ERROR_CODES
- #define dump_stack (wolfssl_linuxkm_get_pie_redirect_table()->dump_stack)
- #endif
- #endif /* __PIE__ */
- #endif /* USE_WOLFSSL_LINUXKM_PIE_REDIRECT_TABLE */
- /* remove this multifariously conflicting macro, picked up from
- * Linux arch/<arch>/include/asm/current.h.
- */
- #ifndef WOLFSSL_NEED_LINUX_CURRENT
- #undef current
- #endif
- /* min() and max() in linux/kernel.h over-aggressively type-check, producing
- * myriad spurious -Werrors throughout the codebase.
- */
- #undef min
- #undef max
- /* work around namespace conflict between wolfssl/internal.h (enum HandShakeType)
- * and linux/key.h (extern int()).
- */
- #define key_update wc_key_update
- #define lkm_printf(format, args...) printk(KERN_INFO "wolfssl: %s(): " format, __func__, ## args)
- #define printf(...) lkm_printf(__VA_ARGS__)
- #ifdef HAVE_FIPS
- extern void fipsEntry(void);
- #endif
- /* suppress false-positive "writing 1 byte into a region of size 0" warnings
- * building old kernels with new gcc:
- */
- #if LINUX_VERSION_CODE < KERNEL_VERSION(4, 0, 0)
- _Pragma("GCC diagnostic ignored \"-Wstringop-overflow\"");
- #endif
- /* includes are all above, with incompatible warnings masked out. */
- #if LINUX_VERSION_CODE < KERNEL_VERSION(5, 5, 0)
- typedef __kernel_time_t time_t;
- #else
- typedef __kernel_time64_t time_t;
- #endif
- extern time_t time(time_t * timer);
- #define XTIME time
- #define WOLFSSL_GMTIME
- #define XGMTIME(c, t) gmtime(c)
- #define NO_TIMEVAL 1
- #endif /* BUILDING_WOLFSSL */
- /* if BUILDING_WOLFSSL, mutex.h will have already been included recursively
- * above, with the bevy of warnings suppressed, and the below include will
- * be a redundant no-op.
- */
- #include <linux/mutex.h>
- typedef struct mutex wolfSSL_Mutex;
- #define WOLFSSL_MUTEX_INITIALIZER(lockname) __MUTEX_INITIALIZER(lockname)
- /* prevent gcc's mm_malloc.h from being included, since it unconditionally
- * includes stdlib.h, which is kernel-incompatible.
- */
- #define _MM_MALLOC_H_INCLUDED
- /* fun fact: since linux commit 59bb47985c, kmalloc with power-of-2 size is
- * aligned to the size.
- */
- #define WC_LINUXKM_ROUND_UP_P_OF_2(x) ( \
- { \
- size_t _alloc_sz = (x); \
- if (_alloc_sz < 8192) \
- _alloc_sz = 1UL << \
- ((sizeof(_alloc_sz) * 8UL) - __builtin_clzl(_alloc_sz - 1)); \
- _alloc_sz; \
- })
- #ifdef HAVE_KVMALLOC
- #define malloc(size) kvmalloc_node(WC_LINUXKM_ROUND_UP_P_OF_2(size), GFP_KERNEL, NUMA_NO_NODE)
- #define free(ptr) kvfree(ptr)
- void *lkm_realloc(void *ptr, size_t newsize);
- #define realloc(ptr, newsize) lkm_realloc(ptr, WC_LINUXKM_ROUND_UP_P_OF_2(newsize))
- #else
- #define malloc(size) kmalloc(WC_LINUXKM_ROUND_UP_P_OF_2(size), GFP_KERNEL)
- #define free(ptr) kfree(ptr)
- #define realloc(ptr, newsize) krealloc(ptr, WC_LINUXKM_ROUND_UP_P_OF_2(newsize), GFP_KERNEL)
- #endif
- #ifndef static_assert
- #define static_assert(expr, ...) __static_assert(expr, ##__VA_ARGS__, #expr)
- #define __static_assert(expr, msg, ...) _Static_assert(expr, msg)
- #endif
- #include <wolfssl/wolfcrypt/memory.h>
- #ifdef WOLFSSL_TRACK_MEMORY
- #define XMALLOC(s, h, t) ({(void)(h); (void)(t); wolfSSL_Malloc(s);})
- #ifdef WOLFSSL_XFREE_NO_NULLNESS_CHECK
- #define XFREE(p, h, t) ({(void)(h); (void)(t); wolfSSL_Free(p);})
- #else
- #define XFREE(p, h, t) ({void* _xp; (void)(h); _xp = (p); if(_xp) wolfSSL_Free(_xp);})
- #endif
- #define XREALLOC(p, n, h, t) ({(void)(h); (void)(t); wolfSSL_Realloc(p, n);})
- #else
- #define XMALLOC(s, h, t) ({(void)(h); (void)(t); malloc(s);})
- #ifdef WOLFSSL_XFREE_NO_NULLNESS_CHECK
- #define XFREE(p, h, t) ({(void)(h); (void)(t); free(p);})
- #else
- #define XFREE(p, h, t) ({void* _xp; (void)(h); (void)(t); _xp = (p); if(_xp) free(_xp);})
- #endif
- #define XREALLOC(p, n, h, t) ({(void)(h); (void)(t); realloc(p, n);})
- #endif
- #include <linux/limits.h>
- #ifndef INT32_MAX
- #define INT32_MAX INT_MAX
- #endif
- #ifndef UINT32_MAX
- #define UINT32_MAX UINT_MAX
- #endif
- /* Linux headers define these using C expressions, but we need
- * them to be evaluable by the preprocessor, for use in sp_int.h.
- */
- #if BITS_PER_LONG == 64
- static_assert(sizeof(ULONG_MAX) == 8,
- "BITS_PER_LONG is 64, but ULONG_MAX is not.");
- #undef UCHAR_MAX
- #define UCHAR_MAX 255
- #undef USHRT_MAX
- #define USHRT_MAX 65535
- #undef UINT_MAX
- #define UINT_MAX 4294967295U
- #undef ULONG_MAX
- #define ULONG_MAX 18446744073709551615UL
- #undef ULLONG_MAX
- #define ULLONG_MAX ULONG_MAX
- #undef INT_MAX
- #define INT_MAX 2147483647
- #undef LONG_MAX
- #define LONG_MAX 9223372036854775807L
- #undef LLONG_MAX
- #define LLONG_MAX LONG_MAX
- #elif BITS_PER_LONG == 32
- static_assert(sizeof(ULONG_MAX) == 4,
- "BITS_PER_LONG is 32, but ULONG_MAX is not.");
- #undef UCHAR_MAX
- #define UCHAR_MAX 255
- #undef USHRT_MAX
- #define USHRT_MAX 65535
- #undef UINT_MAX
- #define UINT_MAX 4294967295U
- #undef ULONG_MAX
- #define ULONG_MAX 4294967295UL
- #undef INT_MAX
- #define INT_MAX 2147483647
- #undef LONG_MAX
- #define LONG_MAX 2147483647L
- #undef ULLONG_MAX
- #undef LLONG_MAX
- #if BITS_PER_LONG_LONG == 64
- #define ULLONG_MAX 18446744073709551615UL
- #define LLONG_MAX 9223372036854775807L
- #else
- #undef NO_64BIT
- #define NO_64BIT
- #define ULLONG_MAX ULONG_MAX
- #define LLONG_MAX LONG_MAX
- #endif
- #else
- #error unexpected BITS_PER_LONG value.
- #endif
- #endif /* LINUXKM_WC_PORT_H */
|