162306a36Sopenharmony_ci/* SPDX-License-Identifier: GPL-2.0 */ 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Copyright (C) 2020 ARM Ltd. 462306a36Sopenharmony_ci */ 562306a36Sopenharmony_ci#ifndef __ASM_MTE_H 662306a36Sopenharmony_ci#define __ASM_MTE_H 762306a36Sopenharmony_ci 862306a36Sopenharmony_ci#include <asm/compiler.h> 962306a36Sopenharmony_ci#include <asm/mte-def.h> 1062306a36Sopenharmony_ci 1162306a36Sopenharmony_ci#ifndef __ASSEMBLY__ 1262306a36Sopenharmony_ci 1362306a36Sopenharmony_ci#include <linux/bitfield.h> 1462306a36Sopenharmony_ci#include <linux/kasan-enabled.h> 1562306a36Sopenharmony_ci#include <linux/page-flags.h> 1662306a36Sopenharmony_ci#include <linux/sched.h> 1762306a36Sopenharmony_ci#include <linux/types.h> 1862306a36Sopenharmony_ci 1962306a36Sopenharmony_ci#include <asm/pgtable-types.h> 2062306a36Sopenharmony_ci 2162306a36Sopenharmony_civoid mte_clear_page_tags(void *addr); 2262306a36Sopenharmony_ciunsigned long mte_copy_tags_from_user(void *to, const void __user *from, 2362306a36Sopenharmony_ci unsigned long n); 2462306a36Sopenharmony_ciunsigned long mte_copy_tags_to_user(void __user *to, void *from, 2562306a36Sopenharmony_ci unsigned long n); 2662306a36Sopenharmony_ciint mte_save_tags(struct page *page); 2762306a36Sopenharmony_civoid mte_save_page_tags(const void *page_addr, void *tag_storage); 2862306a36Sopenharmony_civoid mte_restore_tags(swp_entry_t entry, struct page *page); 2962306a36Sopenharmony_civoid mte_restore_page_tags(void *page_addr, const void *tag_storage); 3062306a36Sopenharmony_civoid mte_invalidate_tags(int type, pgoff_t offset); 3162306a36Sopenharmony_civoid mte_invalidate_tags_area(int type); 3262306a36Sopenharmony_civoid *mte_allocate_tag_storage(void); 3362306a36Sopenharmony_civoid mte_free_tag_storage(char *storage); 3462306a36Sopenharmony_ci 3562306a36Sopenharmony_ci#ifdef CONFIG_ARM64_MTE 3662306a36Sopenharmony_ci 3762306a36Sopenharmony_ci/* track which pages have valid allocation tags */ 3862306a36Sopenharmony_ci#define PG_mte_tagged PG_arch_2 3962306a36Sopenharmony_ci/* simple lock to avoid multiple threads tagging the same page */ 4062306a36Sopenharmony_ci#define PG_mte_lock PG_arch_3 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_cistatic inline void set_page_mte_tagged(struct page *page) 4362306a36Sopenharmony_ci{ 4462306a36Sopenharmony_ci /* 4562306a36Sopenharmony_ci * Ensure that the tags written prior to this function are visible 4662306a36Sopenharmony_ci * before the page flags update. 4762306a36Sopenharmony_ci */ 4862306a36Sopenharmony_ci smp_wmb(); 4962306a36Sopenharmony_ci set_bit(PG_mte_tagged, &page->flags); 5062306a36Sopenharmony_ci} 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_cistatic inline bool page_mte_tagged(struct page *page) 5362306a36Sopenharmony_ci{ 5462306a36Sopenharmony_ci bool ret = test_bit(PG_mte_tagged, &page->flags); 5562306a36Sopenharmony_ci 5662306a36Sopenharmony_ci /* 5762306a36Sopenharmony_ci * If the page is tagged, ensure ordering with a likely subsequent 5862306a36Sopenharmony_ci * read of the tags. 5962306a36Sopenharmony_ci */ 6062306a36Sopenharmony_ci if (ret) 6162306a36Sopenharmony_ci smp_rmb(); 6262306a36Sopenharmony_ci return ret; 6362306a36Sopenharmony_ci} 6462306a36Sopenharmony_ci 6562306a36Sopenharmony_ci/* 6662306a36Sopenharmony_ci * Lock the page for tagging and return 'true' if the page can be tagged, 6762306a36Sopenharmony_ci * 'false' if already tagged. PG_mte_tagged is never cleared and therefore the 6862306a36Sopenharmony_ci * locking only happens once for page initialisation. 6962306a36Sopenharmony_ci * 7062306a36Sopenharmony_ci * The page MTE lock state: 7162306a36Sopenharmony_ci * 7262306a36Sopenharmony_ci * Locked: PG_mte_lock && !PG_mte_tagged 7362306a36Sopenharmony_ci * Unlocked: !PG_mte_lock || PG_mte_tagged 7462306a36Sopenharmony_ci * 7562306a36Sopenharmony_ci * Acquire semantics only if the page is tagged (returning 'false'). 7662306a36Sopenharmony_ci */ 7762306a36Sopenharmony_cistatic inline bool try_page_mte_tagging(struct page *page) 7862306a36Sopenharmony_ci{ 7962306a36Sopenharmony_ci if (!test_and_set_bit(PG_mte_lock, &page->flags)) 8062306a36Sopenharmony_ci return true; 8162306a36Sopenharmony_ci 8262306a36Sopenharmony_ci /* 8362306a36Sopenharmony_ci * The tags are either being initialised or may have been initialised 8462306a36Sopenharmony_ci * already. Check if the PG_mte_tagged flag has been set or wait 8562306a36Sopenharmony_ci * otherwise. 8662306a36Sopenharmony_ci */ 8762306a36Sopenharmony_ci smp_cond_load_acquire(&page->flags, VAL & (1UL << PG_mte_tagged)); 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_ci return false; 9062306a36Sopenharmony_ci} 9162306a36Sopenharmony_ci 9262306a36Sopenharmony_civoid mte_zero_clear_page_tags(void *addr); 9362306a36Sopenharmony_civoid mte_sync_tags(pte_t pte); 9462306a36Sopenharmony_civoid mte_copy_page_tags(void *kto, const void *kfrom); 9562306a36Sopenharmony_civoid mte_thread_init_user(void); 9662306a36Sopenharmony_civoid mte_thread_switch(struct task_struct *next); 9762306a36Sopenharmony_civoid mte_cpu_setup(void); 9862306a36Sopenharmony_civoid mte_suspend_enter(void); 9962306a36Sopenharmony_civoid mte_suspend_exit(void); 10062306a36Sopenharmony_cilong set_mte_ctrl(struct task_struct *task, unsigned long arg); 10162306a36Sopenharmony_cilong get_mte_ctrl(struct task_struct *task); 10262306a36Sopenharmony_ciint mte_ptrace_copy_tags(struct task_struct *child, long request, 10362306a36Sopenharmony_ci unsigned long addr, unsigned long data); 10462306a36Sopenharmony_cisize_t mte_probe_user_range(const char __user *uaddr, size_t size); 10562306a36Sopenharmony_ci 10662306a36Sopenharmony_ci#else /* CONFIG_ARM64_MTE */ 10762306a36Sopenharmony_ci 10862306a36Sopenharmony_ci/* unused if !CONFIG_ARM64_MTE, silence the compiler */ 10962306a36Sopenharmony_ci#define PG_mte_tagged 0 11062306a36Sopenharmony_ci 11162306a36Sopenharmony_cistatic inline void set_page_mte_tagged(struct page *page) 11262306a36Sopenharmony_ci{ 11362306a36Sopenharmony_ci} 11462306a36Sopenharmony_cistatic inline bool page_mte_tagged(struct page *page) 11562306a36Sopenharmony_ci{ 11662306a36Sopenharmony_ci return false; 11762306a36Sopenharmony_ci} 11862306a36Sopenharmony_cistatic inline bool try_page_mte_tagging(struct page *page) 11962306a36Sopenharmony_ci{ 12062306a36Sopenharmony_ci return false; 12162306a36Sopenharmony_ci} 12262306a36Sopenharmony_cistatic inline void mte_zero_clear_page_tags(void *addr) 12362306a36Sopenharmony_ci{ 12462306a36Sopenharmony_ci} 12562306a36Sopenharmony_cistatic inline void mte_sync_tags(pte_t pte) 12662306a36Sopenharmony_ci{ 12762306a36Sopenharmony_ci} 12862306a36Sopenharmony_cistatic inline void mte_copy_page_tags(void *kto, const void *kfrom) 12962306a36Sopenharmony_ci{ 13062306a36Sopenharmony_ci} 13162306a36Sopenharmony_cistatic inline void mte_thread_init_user(void) 13262306a36Sopenharmony_ci{ 13362306a36Sopenharmony_ci} 13462306a36Sopenharmony_cistatic inline void mte_thread_switch(struct task_struct *next) 13562306a36Sopenharmony_ci{ 13662306a36Sopenharmony_ci} 13762306a36Sopenharmony_cistatic inline void mte_suspend_enter(void) 13862306a36Sopenharmony_ci{ 13962306a36Sopenharmony_ci} 14062306a36Sopenharmony_cistatic inline void mte_suspend_exit(void) 14162306a36Sopenharmony_ci{ 14262306a36Sopenharmony_ci} 14362306a36Sopenharmony_cistatic inline long set_mte_ctrl(struct task_struct *task, unsigned long arg) 14462306a36Sopenharmony_ci{ 14562306a36Sopenharmony_ci return 0; 14662306a36Sopenharmony_ci} 14762306a36Sopenharmony_cistatic inline long get_mte_ctrl(struct task_struct *task) 14862306a36Sopenharmony_ci{ 14962306a36Sopenharmony_ci return 0; 15062306a36Sopenharmony_ci} 15162306a36Sopenharmony_cistatic inline int mte_ptrace_copy_tags(struct task_struct *child, 15262306a36Sopenharmony_ci long request, unsigned long addr, 15362306a36Sopenharmony_ci unsigned long data) 15462306a36Sopenharmony_ci{ 15562306a36Sopenharmony_ci return -EIO; 15662306a36Sopenharmony_ci} 15762306a36Sopenharmony_ci 15862306a36Sopenharmony_ci#endif /* CONFIG_ARM64_MTE */ 15962306a36Sopenharmony_ci 16062306a36Sopenharmony_cistatic inline void mte_disable_tco_entry(struct task_struct *task) 16162306a36Sopenharmony_ci{ 16262306a36Sopenharmony_ci if (!system_supports_mte()) 16362306a36Sopenharmony_ci return; 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci /* 16662306a36Sopenharmony_ci * Re-enable tag checking (TCO set on exception entry). This is only 16762306a36Sopenharmony_ci * necessary if MTE is enabled in either the kernel or the userspace 16862306a36Sopenharmony_ci * task in synchronous or asymmetric mode (SCTLR_EL1.TCF0 bit 0 is set 16962306a36Sopenharmony_ci * for both). With MTE disabled in the kernel and disabled or 17062306a36Sopenharmony_ci * asynchronous in userspace, tag check faults (including in uaccesses) 17162306a36Sopenharmony_ci * are not reported, therefore there is no need to re-enable checking. 17262306a36Sopenharmony_ci * This is beneficial on microarchitectures where re-enabling TCO is 17362306a36Sopenharmony_ci * expensive. 17462306a36Sopenharmony_ci */ 17562306a36Sopenharmony_ci if (kasan_hw_tags_enabled() || 17662306a36Sopenharmony_ci (task->thread.sctlr_user & (1UL << SCTLR_EL1_TCF0_SHIFT))) 17762306a36Sopenharmony_ci asm volatile(SET_PSTATE_TCO(0)); 17862306a36Sopenharmony_ci} 17962306a36Sopenharmony_ci 18062306a36Sopenharmony_ci#ifdef CONFIG_KASAN_HW_TAGS 18162306a36Sopenharmony_civoid mte_check_tfsr_el1(void); 18262306a36Sopenharmony_ci 18362306a36Sopenharmony_cistatic inline void mte_check_tfsr_entry(void) 18462306a36Sopenharmony_ci{ 18562306a36Sopenharmony_ci if (!system_supports_mte()) 18662306a36Sopenharmony_ci return; 18762306a36Sopenharmony_ci 18862306a36Sopenharmony_ci mte_check_tfsr_el1(); 18962306a36Sopenharmony_ci} 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_cistatic inline void mte_check_tfsr_exit(void) 19262306a36Sopenharmony_ci{ 19362306a36Sopenharmony_ci if (!system_supports_mte()) 19462306a36Sopenharmony_ci return; 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_ci /* 19762306a36Sopenharmony_ci * The asynchronous faults are sync'ed automatically with 19862306a36Sopenharmony_ci * TFSR_EL1 on kernel entry but for exit an explicit dsb() 19962306a36Sopenharmony_ci * is required. 20062306a36Sopenharmony_ci */ 20162306a36Sopenharmony_ci dsb(nsh); 20262306a36Sopenharmony_ci isb(); 20362306a36Sopenharmony_ci 20462306a36Sopenharmony_ci mte_check_tfsr_el1(); 20562306a36Sopenharmony_ci} 20662306a36Sopenharmony_ci#else 20762306a36Sopenharmony_cistatic inline void mte_check_tfsr_el1(void) 20862306a36Sopenharmony_ci{ 20962306a36Sopenharmony_ci} 21062306a36Sopenharmony_cistatic inline void mte_check_tfsr_entry(void) 21162306a36Sopenharmony_ci{ 21262306a36Sopenharmony_ci} 21362306a36Sopenharmony_cistatic inline void mte_check_tfsr_exit(void) 21462306a36Sopenharmony_ci{ 21562306a36Sopenharmony_ci} 21662306a36Sopenharmony_ci#endif /* CONFIG_KASAN_HW_TAGS */ 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_ci#endif /* __ASSEMBLY__ */ 21962306a36Sopenharmony_ci#endif /* __ASM_MTE_H */ 220