|  | // SPDX-License-Identifier: GPL-2.0 | 
|  |  | 
|  | #include <linux/compat.h> | 
|  | #include <linux/errno.h> | 
|  | #include <linux/prctl.h> | 
|  | #include <linux/random.h> | 
|  | #include <linux/sched.h> | 
|  | #include <asm/cpufeature.h> | 
|  | #include <asm/pointer_auth.h> | 
|  |  | 
|  | int ptrauth_prctl_reset_keys(struct task_struct *tsk, unsigned long arg) | 
|  | { | 
|  | struct ptrauth_keys_user *keys = &tsk->thread.keys_user; | 
|  | unsigned long addr_key_mask = PR_PAC_APIAKEY | PR_PAC_APIBKEY | | 
|  | PR_PAC_APDAKEY | PR_PAC_APDBKEY; | 
|  | unsigned long key_mask = addr_key_mask | PR_PAC_APGAKEY; | 
|  |  | 
|  | if (!system_supports_address_auth() && !system_supports_generic_auth()) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (is_compat_thread(task_thread_info(tsk))) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (!arg) { | 
|  | ptrauth_keys_init_user(keys); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | if (arg & ~key_mask) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (((arg & addr_key_mask) && !system_supports_address_auth()) || | 
|  | ((arg & PR_PAC_APGAKEY) && !system_supports_generic_auth())) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (arg & PR_PAC_APIAKEY) | 
|  | get_random_bytes(&keys->apia, sizeof(keys->apia)); | 
|  | if (arg & PR_PAC_APIBKEY) | 
|  | get_random_bytes(&keys->apib, sizeof(keys->apib)); | 
|  | if (arg & PR_PAC_APDAKEY) | 
|  | get_random_bytes(&keys->apda, sizeof(keys->apda)); | 
|  | if (arg & PR_PAC_APDBKEY) | 
|  | get_random_bytes(&keys->apdb, sizeof(keys->apdb)); | 
|  | if (arg & PR_PAC_APGAKEY) | 
|  | get_random_bytes(&keys->apga, sizeof(keys->apga)); | 
|  | ptrauth_keys_install_user(keys); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static u64 arg_to_enxx_mask(unsigned long arg) | 
|  | { | 
|  | u64 sctlr_enxx_mask = 0; | 
|  |  | 
|  | WARN_ON(arg & ~PR_PAC_ENABLED_KEYS_MASK); | 
|  | if (arg & PR_PAC_APIAKEY) | 
|  | sctlr_enxx_mask |= SCTLR_ELx_ENIA; | 
|  | if (arg & PR_PAC_APIBKEY) | 
|  | sctlr_enxx_mask |= SCTLR_ELx_ENIB; | 
|  | if (arg & PR_PAC_APDAKEY) | 
|  | sctlr_enxx_mask |= SCTLR_ELx_ENDA; | 
|  | if (arg & PR_PAC_APDBKEY) | 
|  | sctlr_enxx_mask |= SCTLR_ELx_ENDB; | 
|  | return sctlr_enxx_mask; | 
|  | } | 
|  |  | 
|  | int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, | 
|  | unsigned long enabled) | 
|  | { | 
|  | u64 sctlr; | 
|  |  | 
|  | if (!system_supports_address_auth()) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (is_compat_thread(task_thread_info(tsk))) | 
|  | return -EINVAL; | 
|  |  | 
|  | if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) | 
|  | return -EINVAL; | 
|  |  | 
|  | preempt_disable(); | 
|  | sctlr = tsk->thread.sctlr_user; | 
|  | sctlr &= ~arg_to_enxx_mask(keys); | 
|  | sctlr |= arg_to_enxx_mask(enabled); | 
|  | tsk->thread.sctlr_user = sctlr; | 
|  | if (tsk == current) | 
|  | update_sctlr_el1(sctlr); | 
|  | preempt_enable(); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int ptrauth_get_enabled_keys(struct task_struct *tsk) | 
|  | { | 
|  | int retval = 0; | 
|  |  | 
|  | if (!system_supports_address_auth()) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (is_compat_thread(task_thread_info(tsk))) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (tsk->thread.sctlr_user & SCTLR_ELx_ENIA) | 
|  | retval |= PR_PAC_APIAKEY; | 
|  | if (tsk->thread.sctlr_user & SCTLR_ELx_ENIB) | 
|  | retval |= PR_PAC_APIBKEY; | 
|  | if (tsk->thread.sctlr_user & SCTLR_ELx_ENDA) | 
|  | retval |= PR_PAC_APDAKEY; | 
|  | if (tsk->thread.sctlr_user & SCTLR_ELx_ENDB) | 
|  | retval |= PR_PAC_APDBKEY; | 
|  |  | 
|  | return retval; | 
|  | } |