~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/arch/arm64/include/asm/pointer_auth.h

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 /* SPDX-License-Identifier: GPL-2.0 */
  2 #ifndef __ASM_POINTER_AUTH_H
  3 #define __ASM_POINTER_AUTH_H
  4 
  5 #include <linux/bitops.h>
  6 #include <linux/prctl.h>
  7 #include <linux/random.h>
  8 
  9 #include <asm/cpufeature.h>
 10 #include <asm/memory.h>
 11 #include <asm/sysreg.h>
 12 
 13 /*
 14  * The EL0/EL1 pointer bits used by a pointer authentication code.
 15  * This is dependent on TBI0/TBI1 being enabled, or bits 63:56 would also apply.
 16  */
 17 #define ptrauth_user_pac_mask()         GENMASK_ULL(54, vabits_actual)
 18 #define ptrauth_kernel_pac_mask()       GENMASK_ULL(63, vabits_actual)
 19 
 20 #define PR_PAC_ENABLED_KEYS_MASK                                               \
 21         (PR_PAC_APIAKEY | PR_PAC_APIBKEY | PR_PAC_APDAKEY | PR_PAC_APDBKEY)
 22 
 23 #ifdef CONFIG_ARM64_PTR_AUTH
 24 /*
 25  * Each key is a 128-bit quantity which is split across a pair of 64-bit
 26  * registers (Lo and Hi).
 27  */
 28 struct ptrauth_key {
 29         unsigned long lo, hi;
 30 };
 31 
 32 /*
 33  * We give each process its own keys, which are shared by all threads. The keys
 34  * are inherited upon fork(), and reinitialised upon exec*().
 35  */
 36 struct ptrauth_keys_user {
 37         struct ptrauth_key apia;
 38         struct ptrauth_key apib;
 39         struct ptrauth_key apda;
 40         struct ptrauth_key apdb;
 41         struct ptrauth_key apga;
 42 };
 43 
 44 #define __ptrauth_key_install_nosync(k, v)                      \
 45 do {                                                            \
 46         struct ptrauth_key __pki_v = (v);                       \
 47         write_sysreg_s(__pki_v.lo, SYS_ ## k ## KEYLO_EL1);     \
 48         write_sysreg_s(__pki_v.hi, SYS_ ## k ## KEYHI_EL1);     \
 49 } while (0)
 50 
 51 #ifdef CONFIG_ARM64_PTR_AUTH_KERNEL
 52 
 53 struct ptrauth_keys_kernel {
 54         struct ptrauth_key apia;
 55 };
 56 
 57 static __always_inline void ptrauth_keys_init_kernel(struct ptrauth_keys_kernel *keys)
 58 {
 59         if (system_supports_address_auth())
 60                 get_random_bytes(&keys->apia, sizeof(keys->apia));
 61 }
 62 
 63 static __always_inline void ptrauth_keys_switch_kernel(struct ptrauth_keys_kernel *keys)
 64 {
 65         if (!system_supports_address_auth())
 66                 return;
 67 
 68         __ptrauth_key_install_nosync(APIA, keys->apia);
 69         isb();
 70 }
 71 
 72 #endif /* CONFIG_ARM64_PTR_AUTH_KERNEL */
 73 
 74 static inline void ptrauth_keys_install_user(struct ptrauth_keys_user *keys)
 75 {
 76         if (system_supports_address_auth()) {
 77                 __ptrauth_key_install_nosync(APIB, keys->apib);
 78                 __ptrauth_key_install_nosync(APDA, keys->apda);
 79                 __ptrauth_key_install_nosync(APDB, keys->apdb);
 80         }
 81 
 82         if (system_supports_generic_auth())
 83                 __ptrauth_key_install_nosync(APGA, keys->apga);
 84 }
 85 
 86 static inline void ptrauth_keys_init_user(struct ptrauth_keys_user *keys)
 87 {
 88         if (system_supports_address_auth()) {
 89                 get_random_bytes(&keys->apia, sizeof(keys->apia));
 90                 get_random_bytes(&keys->apib, sizeof(keys->apib));
 91                 get_random_bytes(&keys->apda, sizeof(keys->apda));
 92                 get_random_bytes(&keys->apdb, sizeof(keys->apdb));
 93         }
 94 
 95         if (system_supports_generic_auth())
 96                 get_random_bytes(&keys->apga, sizeof(keys->apga));
 97 
 98         ptrauth_keys_install_user(keys);
 99 }
100 
101 extern int ptrauth_prctl_reset_keys(struct task_struct *tsk, unsigned long arg);
102 
103 extern int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys,
104                                     unsigned long enabled);
105 extern int ptrauth_get_enabled_keys(struct task_struct *tsk);
106 
107 static __always_inline void ptrauth_enable(void)
108 {
109         if (!system_supports_address_auth())
110                 return;
111         sysreg_clear_set(sctlr_el1, 0, (SCTLR_ELx_ENIA | SCTLR_ELx_ENIB |
112                                         SCTLR_ELx_ENDA | SCTLR_ELx_ENDB));
113         isb();
114 }
115 
116 #define ptrauth_suspend_exit()                                                 \
117         ptrauth_keys_install_user(&current->thread.keys_user)
118 
119 #define ptrauth_thread_init_user()                                             \
120         do {                                                                   \
121                 ptrauth_keys_init_user(&current->thread.keys_user);            \
122                                                                                \
123                 /* enable all keys */                                          \
124                 if (system_supports_address_auth())                            \
125                         ptrauth_set_enabled_keys(current,                      \
126                                                  PR_PAC_ENABLED_KEYS_MASK,     \
127                                                  PR_PAC_ENABLED_KEYS_MASK);    \
128         } while (0)
129 
130 #define ptrauth_thread_switch_user(tsk)                                        \
131         ptrauth_keys_install_user(&(tsk)->thread.keys_user)
132 
133 #else /* CONFIG_ARM64_PTR_AUTH */
134 #define ptrauth_enable()
135 #define ptrauth_prctl_reset_keys(tsk, arg)      (-EINVAL)
136 #define ptrauth_set_enabled_keys(tsk, keys, enabled)    (-EINVAL)
137 #define ptrauth_get_enabled_keys(tsk)   (-EINVAL)
138 #define ptrauth_suspend_exit()
139 #define ptrauth_thread_init_user()
140 #define ptrauth_thread_switch_user(tsk)
141 #endif /* CONFIG_ARM64_PTR_AUTH */
142 
143 #ifdef CONFIG_ARM64_PTR_AUTH_KERNEL
144 #define ptrauth_thread_init_kernel(tsk)                                 \
145         ptrauth_keys_init_kernel(&(tsk)->thread.keys_kernel)
146 #define ptrauth_thread_switch_kernel(tsk)                               \
147         ptrauth_keys_switch_kernel(&(tsk)->thread.keys_kernel)
148 #else
149 #define ptrauth_thread_init_kernel(tsk)
150 #define ptrauth_thread_switch_kernel(tsk)
151 #endif /* CONFIG_ARM64_PTR_AUTH_KERNEL */
152 
153 #endif /* __ASM_POINTER_AUTH_H */
154 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php