mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-29 14:05:19 +08:00
d2e0d8f974
In the next patch, we will start reading sctlr_user from mte_update_sctlr_user and subsequently writing a new value based on the task's TCF setting and potentially the per-CPU TCF preference. This means that we need to be careful to disable preemption around any code sequences that read from sctlr_user and subsequently write to sctlr_user and/or SCTLR_EL1, so that we don't end up writing a stale value (based on the previous CPU's TCF preference) to either of them. We currently have four such sequences, in the prctl handlers for PR_SET_TAGGED_ADDR_CTRL and PR_PAC_SET_ENABLED_KEYS, as well as in the task initialization code that resets the prctl settings. Change the prctl handlers to disable preemption in the handlers themselves rather than the functions that they call, and change the task initialization code to call the respective prctl handlers instead of setting sctlr_user directly. As a result of this change, we no longer need the helper function set_task_sctlr_el1, nor does its behavior make sense any more, so remove it. Signed-off-by: Peter Collingbourne <pcc@google.com> Link: https://linux-review.googlesource.com/id/Ic0e8a0c00bb47d786c1e8011df0b7fe99bee4bb5 Link: https://lore.kernel.org/r/20210727205300.2554659-4-pcc@google.com Acked-by: Will Deacon <will@kernel.org> Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
114 lines
2.8 KiB
C
114 lines
2.8 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
#include <linux/compat.h>
|
|
#include <linux/errno.h>
|
|
#include <linux/prctl.h>
|
|
#include <linux/random.h>
|
|
#include <linux/sched.h>
|
|
#include <asm/cpufeature.h>
|
|
#include <asm/pointer_auth.h>
|
|
|
|
int ptrauth_prctl_reset_keys(struct task_struct *tsk, unsigned long arg)
|
|
{
|
|
struct ptrauth_keys_user *keys = &tsk->thread.keys_user;
|
|
unsigned long addr_key_mask = PR_PAC_APIAKEY | PR_PAC_APIBKEY |
|
|
PR_PAC_APDAKEY | PR_PAC_APDBKEY;
|
|
unsigned long key_mask = addr_key_mask | PR_PAC_APGAKEY;
|
|
|
|
if (!system_supports_address_auth() && !system_supports_generic_auth())
|
|
return -EINVAL;
|
|
|
|
if (is_compat_thread(task_thread_info(tsk)))
|
|
return -EINVAL;
|
|
|
|
if (!arg) {
|
|
ptrauth_keys_init_user(keys);
|
|
return 0;
|
|
}
|
|
|
|
if (arg & ~key_mask)
|
|
return -EINVAL;
|
|
|
|
if (((arg & addr_key_mask) && !system_supports_address_auth()) ||
|
|
((arg & PR_PAC_APGAKEY) && !system_supports_generic_auth()))
|
|
return -EINVAL;
|
|
|
|
if (arg & PR_PAC_APIAKEY)
|
|
get_random_bytes(&keys->apia, sizeof(keys->apia));
|
|
if (arg & PR_PAC_APIBKEY)
|
|
get_random_bytes(&keys->apib, sizeof(keys->apib));
|
|
if (arg & PR_PAC_APDAKEY)
|
|
get_random_bytes(&keys->apda, sizeof(keys->apda));
|
|
if (arg & PR_PAC_APDBKEY)
|
|
get_random_bytes(&keys->apdb, sizeof(keys->apdb));
|
|
if (arg & PR_PAC_APGAKEY)
|
|
get_random_bytes(&keys->apga, sizeof(keys->apga));
|
|
ptrauth_keys_install_user(keys);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static u64 arg_to_enxx_mask(unsigned long arg)
|
|
{
|
|
u64 sctlr_enxx_mask = 0;
|
|
|
|
WARN_ON(arg & ~PR_PAC_ENABLED_KEYS_MASK);
|
|
if (arg & PR_PAC_APIAKEY)
|
|
sctlr_enxx_mask |= SCTLR_ELx_ENIA;
|
|
if (arg & PR_PAC_APIBKEY)
|
|
sctlr_enxx_mask |= SCTLR_ELx_ENIB;
|
|
if (arg & PR_PAC_APDAKEY)
|
|
sctlr_enxx_mask |= SCTLR_ELx_ENDA;
|
|
if (arg & PR_PAC_APDBKEY)
|
|
sctlr_enxx_mask |= SCTLR_ELx_ENDB;
|
|
return sctlr_enxx_mask;
|
|
}
|
|
|
|
int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys,
|
|
unsigned long enabled)
|
|
{
|
|
u64 sctlr;
|
|
|
|
if (!system_supports_address_auth())
|
|
return -EINVAL;
|
|
|
|
if (is_compat_thread(task_thread_info(tsk)))
|
|
return -EINVAL;
|
|
|
|
if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys))
|
|
return -EINVAL;
|
|
|
|
preempt_disable();
|
|
sctlr = tsk->thread.sctlr_user;
|
|
sctlr &= ~arg_to_enxx_mask(keys);
|
|
sctlr |= arg_to_enxx_mask(enabled);
|
|
tsk->thread.sctlr_user = sctlr;
|
|
if (tsk == current)
|
|
update_sctlr_el1(sctlr);
|
|
preempt_enable();
|
|
|
|
return 0;
|
|
}
|
|
|
|
int ptrauth_get_enabled_keys(struct task_struct *tsk)
|
|
{
|
|
int retval = 0;
|
|
|
|
if (!system_supports_address_auth())
|
|
return -EINVAL;
|
|
|
|
if (is_compat_thread(task_thread_info(tsk)))
|
|
return -EINVAL;
|
|
|
|
if (tsk->thread.sctlr_user & SCTLR_ELx_ENIA)
|
|
retval |= PR_PAC_APIAKEY;
|
|
if (tsk->thread.sctlr_user & SCTLR_ELx_ENIB)
|
|
retval |= PR_PAC_APIBKEY;
|
|
if (tsk->thread.sctlr_user & SCTLR_ELx_ENDA)
|
|
retval |= PR_PAC_APDAKEY;
|
|
if (tsk->thread.sctlr_user & SCTLR_ELx_ENDB)
|
|
retval |= PR_PAC_APDBKEY;
|
|
|
|
return retval;
|
|
}
|