162306a36Sopenharmony_ci/* SPDX-License-Identifier: GPL-2.0 */
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * Copyright (C) 2020 ARM Ltd.
462306a36Sopenharmony_ci */
562306a36Sopenharmony_ci#ifndef __ASM_MTE_H
662306a36Sopenharmony_ci#define __ASM_MTE_H
762306a36Sopenharmony_ci
862306a36Sopenharmony_ci#include <asm/compiler.h>
962306a36Sopenharmony_ci#include <asm/mte-def.h>
1062306a36Sopenharmony_ci
1162306a36Sopenharmony_ci#ifndef __ASSEMBLY__
1262306a36Sopenharmony_ci
1362306a36Sopenharmony_ci#include <linux/bitfield.h>
1462306a36Sopenharmony_ci#include <linux/kasan-enabled.h>
1562306a36Sopenharmony_ci#include <linux/page-flags.h>
1662306a36Sopenharmony_ci#include <linux/sched.h>
1762306a36Sopenharmony_ci#include <linux/types.h>
1862306a36Sopenharmony_ci
1962306a36Sopenharmony_ci#include <asm/pgtable-types.h>
2062306a36Sopenharmony_ci
2162306a36Sopenharmony_civoid mte_clear_page_tags(void *addr);
2262306a36Sopenharmony_ciunsigned long mte_copy_tags_from_user(void *to, const void __user *from,
2362306a36Sopenharmony_ci				      unsigned long n);
2462306a36Sopenharmony_ciunsigned long mte_copy_tags_to_user(void __user *to, void *from,
2562306a36Sopenharmony_ci				    unsigned long n);
2662306a36Sopenharmony_ciint mte_save_tags(struct page *page);
2762306a36Sopenharmony_civoid mte_save_page_tags(const void *page_addr, void *tag_storage);
2862306a36Sopenharmony_civoid mte_restore_tags(swp_entry_t entry, struct page *page);
2962306a36Sopenharmony_civoid mte_restore_page_tags(void *page_addr, const void *tag_storage);
3062306a36Sopenharmony_civoid mte_invalidate_tags(int type, pgoff_t offset);
3162306a36Sopenharmony_civoid mte_invalidate_tags_area(int type);
3262306a36Sopenharmony_civoid *mte_allocate_tag_storage(void);
3362306a36Sopenharmony_civoid mte_free_tag_storage(char *storage);
3462306a36Sopenharmony_ci
3562306a36Sopenharmony_ci#ifdef CONFIG_ARM64_MTE
3662306a36Sopenharmony_ci
3762306a36Sopenharmony_ci/* track which pages have valid allocation tags */
3862306a36Sopenharmony_ci#define PG_mte_tagged	PG_arch_2
3962306a36Sopenharmony_ci/* simple lock to avoid multiple threads tagging the same page */
4062306a36Sopenharmony_ci#define PG_mte_lock	PG_arch_3
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_cistatic inline void set_page_mte_tagged(struct page *page)
4362306a36Sopenharmony_ci{
4462306a36Sopenharmony_ci	/*
4562306a36Sopenharmony_ci	 * Ensure that the tags written prior to this function are visible
4662306a36Sopenharmony_ci	 * before the page flags update.
4762306a36Sopenharmony_ci	 */
4862306a36Sopenharmony_ci	smp_wmb();
4962306a36Sopenharmony_ci	set_bit(PG_mte_tagged, &page->flags);
5062306a36Sopenharmony_ci}
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_cistatic inline bool page_mte_tagged(struct page *page)
5362306a36Sopenharmony_ci{
5462306a36Sopenharmony_ci	bool ret = test_bit(PG_mte_tagged, &page->flags);
5562306a36Sopenharmony_ci
5662306a36Sopenharmony_ci	/*
5762306a36Sopenharmony_ci	 * If the page is tagged, ensure ordering with a likely subsequent
5862306a36Sopenharmony_ci	 * read of the tags.
5962306a36Sopenharmony_ci	 */
6062306a36Sopenharmony_ci	if (ret)
6162306a36Sopenharmony_ci		smp_rmb();
6262306a36Sopenharmony_ci	return ret;
6362306a36Sopenharmony_ci}
6462306a36Sopenharmony_ci
6562306a36Sopenharmony_ci/*
6662306a36Sopenharmony_ci * Lock the page for tagging and return 'true' if the page can be tagged,
6762306a36Sopenharmony_ci * 'false' if already tagged. PG_mte_tagged is never cleared and therefore the
6862306a36Sopenharmony_ci * locking only happens once for page initialisation.
6962306a36Sopenharmony_ci *
7062306a36Sopenharmony_ci * The page MTE lock state:
7162306a36Sopenharmony_ci *
7262306a36Sopenharmony_ci *   Locked:	PG_mte_lock && !PG_mte_tagged
7362306a36Sopenharmony_ci *   Unlocked:	!PG_mte_lock || PG_mte_tagged
7462306a36Sopenharmony_ci *
7562306a36Sopenharmony_ci * Acquire semantics only if the page is tagged (returning 'false').
7662306a36Sopenharmony_ci */
7762306a36Sopenharmony_cistatic inline bool try_page_mte_tagging(struct page *page)
7862306a36Sopenharmony_ci{
7962306a36Sopenharmony_ci	if (!test_and_set_bit(PG_mte_lock, &page->flags))
8062306a36Sopenharmony_ci		return true;
8162306a36Sopenharmony_ci
8262306a36Sopenharmony_ci	/*
8362306a36Sopenharmony_ci	 * The tags are either being initialised or may have been initialised
8462306a36Sopenharmony_ci	 * already. Check if the PG_mte_tagged flag has been set or wait
8562306a36Sopenharmony_ci	 * otherwise.
8662306a36Sopenharmony_ci	 */
8762306a36Sopenharmony_ci	smp_cond_load_acquire(&page->flags, VAL & (1UL << PG_mte_tagged));
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_ci	return false;
9062306a36Sopenharmony_ci}
9162306a36Sopenharmony_ci
9262306a36Sopenharmony_civoid mte_zero_clear_page_tags(void *addr);
9362306a36Sopenharmony_civoid mte_sync_tags(pte_t pte);
9462306a36Sopenharmony_civoid mte_copy_page_tags(void *kto, const void *kfrom);
9562306a36Sopenharmony_civoid mte_thread_init_user(void);
9662306a36Sopenharmony_civoid mte_thread_switch(struct task_struct *next);
9762306a36Sopenharmony_civoid mte_cpu_setup(void);
9862306a36Sopenharmony_civoid mte_suspend_enter(void);
9962306a36Sopenharmony_civoid mte_suspend_exit(void);
10062306a36Sopenharmony_cilong set_mte_ctrl(struct task_struct *task, unsigned long arg);
10162306a36Sopenharmony_cilong get_mte_ctrl(struct task_struct *task);
10262306a36Sopenharmony_ciint mte_ptrace_copy_tags(struct task_struct *child, long request,
10362306a36Sopenharmony_ci			 unsigned long addr, unsigned long data);
10462306a36Sopenharmony_cisize_t mte_probe_user_range(const char __user *uaddr, size_t size);
10562306a36Sopenharmony_ci
10662306a36Sopenharmony_ci#else /* CONFIG_ARM64_MTE */
10762306a36Sopenharmony_ci
10862306a36Sopenharmony_ci/* unused if !CONFIG_ARM64_MTE, silence the compiler */
10962306a36Sopenharmony_ci#define PG_mte_tagged	0
11062306a36Sopenharmony_ci
11162306a36Sopenharmony_cistatic inline void set_page_mte_tagged(struct page *page)
11262306a36Sopenharmony_ci{
11362306a36Sopenharmony_ci}
11462306a36Sopenharmony_cistatic inline bool page_mte_tagged(struct page *page)
11562306a36Sopenharmony_ci{
11662306a36Sopenharmony_ci	return false;
11762306a36Sopenharmony_ci}
11862306a36Sopenharmony_cistatic inline bool try_page_mte_tagging(struct page *page)
11962306a36Sopenharmony_ci{
12062306a36Sopenharmony_ci	return false;
12162306a36Sopenharmony_ci}
12262306a36Sopenharmony_cistatic inline void mte_zero_clear_page_tags(void *addr)
12362306a36Sopenharmony_ci{
12462306a36Sopenharmony_ci}
12562306a36Sopenharmony_cistatic inline void mte_sync_tags(pte_t pte)
12662306a36Sopenharmony_ci{
12762306a36Sopenharmony_ci}
12862306a36Sopenharmony_cistatic inline void mte_copy_page_tags(void *kto, const void *kfrom)
12962306a36Sopenharmony_ci{
13062306a36Sopenharmony_ci}
13162306a36Sopenharmony_cistatic inline void mte_thread_init_user(void)
13262306a36Sopenharmony_ci{
13362306a36Sopenharmony_ci}
13462306a36Sopenharmony_cistatic inline void mte_thread_switch(struct task_struct *next)
13562306a36Sopenharmony_ci{
13662306a36Sopenharmony_ci}
13762306a36Sopenharmony_cistatic inline void mte_suspend_enter(void)
13862306a36Sopenharmony_ci{
13962306a36Sopenharmony_ci}
14062306a36Sopenharmony_cistatic inline void mte_suspend_exit(void)
14162306a36Sopenharmony_ci{
14262306a36Sopenharmony_ci}
14362306a36Sopenharmony_cistatic inline long set_mte_ctrl(struct task_struct *task, unsigned long arg)
14462306a36Sopenharmony_ci{
14562306a36Sopenharmony_ci	return 0;
14662306a36Sopenharmony_ci}
14762306a36Sopenharmony_cistatic inline long get_mte_ctrl(struct task_struct *task)
14862306a36Sopenharmony_ci{
14962306a36Sopenharmony_ci	return 0;
15062306a36Sopenharmony_ci}
15162306a36Sopenharmony_cistatic inline int mte_ptrace_copy_tags(struct task_struct *child,
15262306a36Sopenharmony_ci				       long request, unsigned long addr,
15362306a36Sopenharmony_ci				       unsigned long data)
15462306a36Sopenharmony_ci{
15562306a36Sopenharmony_ci	return -EIO;
15662306a36Sopenharmony_ci}
15762306a36Sopenharmony_ci
15862306a36Sopenharmony_ci#endif /* CONFIG_ARM64_MTE */
15962306a36Sopenharmony_ci
16062306a36Sopenharmony_cistatic inline void mte_disable_tco_entry(struct task_struct *task)
16162306a36Sopenharmony_ci{
16262306a36Sopenharmony_ci	if (!system_supports_mte())
16362306a36Sopenharmony_ci		return;
16462306a36Sopenharmony_ci
16562306a36Sopenharmony_ci	/*
16662306a36Sopenharmony_ci	 * Re-enable tag checking (TCO set on exception entry). This is only
16762306a36Sopenharmony_ci	 * necessary if MTE is enabled in either the kernel or the userspace
16862306a36Sopenharmony_ci	 * task in synchronous or asymmetric mode (SCTLR_EL1.TCF0 bit 0 is set
16962306a36Sopenharmony_ci	 * for both). With MTE disabled in the kernel and disabled or
17062306a36Sopenharmony_ci	 * asynchronous in userspace, tag check faults (including in uaccesses)
17162306a36Sopenharmony_ci	 * are not reported, therefore there is no need to re-enable checking.
17262306a36Sopenharmony_ci	 * This is beneficial on microarchitectures where re-enabling TCO is
17362306a36Sopenharmony_ci	 * expensive.
17462306a36Sopenharmony_ci	 */
17562306a36Sopenharmony_ci	if (kasan_hw_tags_enabled() ||
17662306a36Sopenharmony_ci	    (task->thread.sctlr_user & (1UL << SCTLR_EL1_TCF0_SHIFT)))
17762306a36Sopenharmony_ci		asm volatile(SET_PSTATE_TCO(0));
17862306a36Sopenharmony_ci}
17962306a36Sopenharmony_ci
18062306a36Sopenharmony_ci#ifdef CONFIG_KASAN_HW_TAGS
18162306a36Sopenharmony_civoid mte_check_tfsr_el1(void);
18262306a36Sopenharmony_ci
18362306a36Sopenharmony_cistatic inline void mte_check_tfsr_entry(void)
18462306a36Sopenharmony_ci{
18562306a36Sopenharmony_ci	if (!system_supports_mte())
18662306a36Sopenharmony_ci		return;
18762306a36Sopenharmony_ci
18862306a36Sopenharmony_ci	mte_check_tfsr_el1();
18962306a36Sopenharmony_ci}
19062306a36Sopenharmony_ci
19162306a36Sopenharmony_cistatic inline void mte_check_tfsr_exit(void)
19262306a36Sopenharmony_ci{
19362306a36Sopenharmony_ci	if (!system_supports_mte())
19462306a36Sopenharmony_ci		return;
19562306a36Sopenharmony_ci
19662306a36Sopenharmony_ci	/*
19762306a36Sopenharmony_ci	 * The asynchronous faults are sync'ed automatically with
19862306a36Sopenharmony_ci	 * TFSR_EL1 on kernel entry but for exit an explicit dsb()
19962306a36Sopenharmony_ci	 * is required.
20062306a36Sopenharmony_ci	 */
20162306a36Sopenharmony_ci	dsb(nsh);
20262306a36Sopenharmony_ci	isb();
20362306a36Sopenharmony_ci
20462306a36Sopenharmony_ci	mte_check_tfsr_el1();
20562306a36Sopenharmony_ci}
20662306a36Sopenharmony_ci#else
20762306a36Sopenharmony_cistatic inline void mte_check_tfsr_el1(void)
20862306a36Sopenharmony_ci{
20962306a36Sopenharmony_ci}
21062306a36Sopenharmony_cistatic inline void mte_check_tfsr_entry(void)
21162306a36Sopenharmony_ci{
21262306a36Sopenharmony_ci}
21362306a36Sopenharmony_cistatic inline void mte_check_tfsr_exit(void)
21462306a36Sopenharmony_ci{
21562306a36Sopenharmony_ci}
21662306a36Sopenharmony_ci#endif /* CONFIG_KASAN_HW_TAGS */
21762306a36Sopenharmony_ci
21862306a36Sopenharmony_ci#endif /* __ASSEMBLY__ */
21962306a36Sopenharmony_ci#endif /* __ASM_MTE_H  */
220