Linux Audio
Check our new training course
Embedded Linux Audio
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113
// SPDX-License-Identifier: GPL-2.0 #include <linux/compat.h> #include <linux/errno.h> #include <linux/prctl.h> #include <linux/random.h> #include <linux/sched.h> #include <asm/cpufeature.h> #include <asm/pointer_auth.h> int ptrauth_prctl_reset_keys(struct task_struct *tsk, unsigned long arg) { struct ptrauth_keys_user *keys = &tsk->thread.keys_user; unsigned long addr_key_mask = PR_PAC_APIAKEY | PR_PAC_APIBKEY | PR_PAC_APDAKEY | PR_PAC_APDBKEY; unsigned long key_mask = addr_key_mask | PR_PAC_APGAKEY; if (!system_supports_address_auth() && !system_supports_generic_auth()) return -EINVAL; if (is_compat_thread(task_thread_info(tsk))) return -EINVAL; if (!arg) { ptrauth_keys_init_user(keys); return 0; } if (arg & ~key_mask) return -EINVAL; if (((arg & addr_key_mask) && !system_supports_address_auth()) || ((arg & PR_PAC_APGAKEY) && !system_supports_generic_auth())) return -EINVAL; if (arg & PR_PAC_APIAKEY) get_random_bytes(&keys->apia, sizeof(keys->apia)); if (arg & PR_PAC_APIBKEY) get_random_bytes(&keys->apib, sizeof(keys->apib)); if (arg & PR_PAC_APDAKEY) get_random_bytes(&keys->apda, sizeof(keys->apda)); if (arg & PR_PAC_APDBKEY) get_random_bytes(&keys->apdb, sizeof(keys->apdb)); if (arg & PR_PAC_APGAKEY) get_random_bytes(&keys->apga, sizeof(keys->apga)); ptrauth_keys_install_user(keys); return 0; } static u64 arg_to_enxx_mask(unsigned long arg) { u64 sctlr_enxx_mask = 0; WARN_ON(arg & ~PR_PAC_ENABLED_KEYS_MASK); if (arg & PR_PAC_APIAKEY) sctlr_enxx_mask |= SCTLR_ELx_ENIA; if (arg & PR_PAC_APIBKEY) sctlr_enxx_mask |= SCTLR_ELx_ENIB; if (arg & PR_PAC_APDAKEY) sctlr_enxx_mask |= SCTLR_ELx_ENDA; if (arg & PR_PAC_APDBKEY) sctlr_enxx_mask |= SCTLR_ELx_ENDB; return sctlr_enxx_mask; } int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, unsigned long enabled) { u64 sctlr; if (!system_supports_address_auth()) return -EINVAL; if (is_compat_thread(task_thread_info(tsk))) return -EINVAL; if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) return -EINVAL; preempt_disable(); sctlr = tsk->thread.sctlr_user; sctlr &= ~arg_to_enxx_mask(keys); sctlr |= arg_to_enxx_mask(enabled); tsk->thread.sctlr_user = sctlr; if (tsk == current) update_sctlr_el1(sctlr); preempt_enable(); return 0; } int ptrauth_get_enabled_keys(struct task_struct *tsk) { int retval = 0; if (!system_supports_address_auth()) return -EINVAL; if (is_compat_thread(task_thread_info(tsk))) return -EINVAL; if (tsk->thread.sctlr_user & SCTLR_ELx_ENIA) retval |= PR_PAC_APIAKEY; if (tsk->thread.sctlr_user & SCTLR_ELx_ENIB) retval |= PR_PAC_APIBKEY; if (tsk->thread.sctlr_user & SCTLR_ELx_ENDA) retval |= PR_PAC_APDAKEY; if (tsk->thread.sctlr_user & SCTLR_ELx_ENDB) retval |= PR_PAC_APDBKEY; return retval; }