Viewing file: scs.h (1.75 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
/* SPDX-License-Identifier: GPL-2.0 */ #ifndef _ASM_SCS_H #define _ASM_SCS_H
#ifdef __ASSEMBLY__
#include <asm/asm-offsets.h> #include <asm/sysreg.h>
#ifdef CONFIG_SHADOW_CALL_STACK scs_sp .req x18
.macro scs_load_current get_current_task scs_sp ldr scs_sp, [scs_sp, #TSK_TI_SCS_SP] .endm
.macro scs_save tsk str scs_sp, [\tsk, #TSK_TI_SCS_SP] .endm #else .macro scs_load_current .endm
.macro scs_save tsk .endm #endif /* CONFIG_SHADOW_CALL_STACK */
#else
#include <linux/scs.h> #include <asm/cpufeature.h>
#ifdef CONFIG_UNWIND_PATCH_PAC_INTO_SCS static inline bool should_patch_pac_into_scs(void) { u64 reg;
/* * We only enable the shadow call stack dynamically if we are running * on a system that does not implement PAC or BTI. PAC and SCS provide * roughly the same level of protection, and BTI relies on the PACIASP * instructions serving as landing pads, preventing us from patching * those instructions into something else. */ reg = read_sysreg_s(SYS_ID_AA64ISAR1_EL1); if (SYS_FIELD_GET(ID_AA64ISAR1_EL1, APA, reg) | SYS_FIELD_GET(ID_AA64ISAR1_EL1, API, reg)) return false;
reg = read_sysreg_s(SYS_ID_AA64ISAR2_EL1); if (SYS_FIELD_GET(ID_AA64ISAR2_EL1, APA3, reg)) return false;
if (IS_ENABLED(CONFIG_ARM64_BTI_KERNEL)) { reg = read_sysreg_s(SYS_ID_AA64PFR1_EL1); if (reg & (0xf << ID_AA64PFR1_EL1_BT_SHIFT)) return false; } return true; }
static inline void dynamic_scs_init(void) { if (should_patch_pac_into_scs()) { pr_info("Enabling dynamic shadow call stack\n"); static_branch_enable(&dynamic_scs_enabled); } } #else static inline void dynamic_scs_init(void) {} #endif
int scs_patch(const u8 eh_frame[], int size); asmlinkage void scs_patch_vmlinux(void);
#endif /* __ASSEMBLY __ */
#endif /* _ASM_SCS_H */
|