162306a36Sopenharmony_ci/* SPDX-License-Identifier: GPL-2.0-only */ 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Based on arch/arm/include/asm/uaccess.h 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 2012 ARM Ltd. 662306a36Sopenharmony_ci */ 762306a36Sopenharmony_ci#ifndef __ASM_UACCESS_H 862306a36Sopenharmony_ci#define __ASM_UACCESS_H 962306a36Sopenharmony_ci 1062306a36Sopenharmony_ci#include <asm/alternative.h> 1162306a36Sopenharmony_ci#include <asm/kernel-pgtable.h> 1262306a36Sopenharmony_ci#include <asm/sysreg.h> 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_ci/* 1562306a36Sopenharmony_ci * User space memory access functions 1662306a36Sopenharmony_ci */ 1762306a36Sopenharmony_ci#include <linux/bitops.h> 1862306a36Sopenharmony_ci#include <linux/kasan-checks.h> 1962306a36Sopenharmony_ci#include <linux/string.h> 2062306a36Sopenharmony_ci 2162306a36Sopenharmony_ci#include <asm/asm-extable.h> 2262306a36Sopenharmony_ci#include <asm/cpufeature.h> 2362306a36Sopenharmony_ci#include <asm/mmu.h> 2462306a36Sopenharmony_ci#include <asm/mte.h> 2562306a36Sopenharmony_ci#include <asm/ptrace.h> 2662306a36Sopenharmony_ci#include <asm/memory.h> 2762306a36Sopenharmony_ci#include <asm/extable.h> 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_cistatic inline int __access_ok(const void __user *ptr, unsigned long size); 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_ci/* 3262306a36Sopenharmony_ci * Test whether a block of memory is a valid user space address. 3362306a36Sopenharmony_ci * Returns 1 if the range is valid, 0 otherwise. 3462306a36Sopenharmony_ci * 3562306a36Sopenharmony_ci * This is equivalent to the following test: 3662306a36Sopenharmony_ci * (u65)addr + (u65)size <= (u65)TASK_SIZE_MAX 3762306a36Sopenharmony_ci */ 3862306a36Sopenharmony_cistatic inline int access_ok(const void __user *addr, unsigned long size) 3962306a36Sopenharmony_ci{ 4062306a36Sopenharmony_ci /* 4162306a36Sopenharmony_ci * Asynchronous I/O running in a kernel thread does not have the 4262306a36Sopenharmony_ci * TIF_TAGGED_ADDR flag of the process owning the mm, so always untag 4362306a36Sopenharmony_ci * the user address before checking. 4462306a36Sopenharmony_ci */ 4562306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_ARM64_TAGGED_ADDR_ABI) && 4662306a36Sopenharmony_ci (current->flags & PF_KTHREAD || test_thread_flag(TIF_TAGGED_ADDR))) 4762306a36Sopenharmony_ci addr = untagged_addr(addr); 4862306a36Sopenharmony_ci 4962306a36Sopenharmony_ci return likely(__access_ok(addr, size)); 5062306a36Sopenharmony_ci} 5162306a36Sopenharmony_ci#define access_ok access_ok 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_ci#include <asm-generic/access_ok.h> 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_ci/* 5662306a36Sopenharmony_ci * User access enabling/disabling. 5762306a36Sopenharmony_ci */ 5862306a36Sopenharmony_ci#ifdef CONFIG_ARM64_SW_TTBR0_PAN 5962306a36Sopenharmony_cistatic inline void __uaccess_ttbr0_disable(void) 6062306a36Sopenharmony_ci{ 6162306a36Sopenharmony_ci unsigned long flags, ttbr; 6262306a36Sopenharmony_ci 6362306a36Sopenharmony_ci local_irq_save(flags); 6462306a36Sopenharmony_ci ttbr = read_sysreg(ttbr1_el1); 6562306a36Sopenharmony_ci ttbr &= ~TTBR_ASID_MASK; 6662306a36Sopenharmony_ci /* reserved_pg_dir placed before swapper_pg_dir */ 6762306a36Sopenharmony_ci write_sysreg(ttbr - RESERVED_SWAPPER_OFFSET, ttbr0_el1); 6862306a36Sopenharmony_ci /* Set reserved ASID */ 6962306a36Sopenharmony_ci write_sysreg(ttbr, ttbr1_el1); 7062306a36Sopenharmony_ci isb(); 7162306a36Sopenharmony_ci local_irq_restore(flags); 7262306a36Sopenharmony_ci} 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_cistatic inline void __uaccess_ttbr0_enable(void) 7562306a36Sopenharmony_ci{ 7662306a36Sopenharmony_ci unsigned long flags, ttbr0, ttbr1; 7762306a36Sopenharmony_ci 7862306a36Sopenharmony_ci /* 7962306a36Sopenharmony_ci * Disable interrupts to avoid preemption between reading the 'ttbr0' 8062306a36Sopenharmony_ci * variable and the MSR. A context switch could trigger an ASID 8162306a36Sopenharmony_ci * roll-over and an update of 'ttbr0'. 8262306a36Sopenharmony_ci */ 8362306a36Sopenharmony_ci local_irq_save(flags); 8462306a36Sopenharmony_ci ttbr0 = READ_ONCE(current_thread_info()->ttbr0); 8562306a36Sopenharmony_ci 8662306a36Sopenharmony_ci /* Restore active ASID */ 8762306a36Sopenharmony_ci ttbr1 = read_sysreg(ttbr1_el1); 8862306a36Sopenharmony_ci ttbr1 &= ~TTBR_ASID_MASK; /* safety measure */ 8962306a36Sopenharmony_ci ttbr1 |= ttbr0 & TTBR_ASID_MASK; 9062306a36Sopenharmony_ci write_sysreg(ttbr1, ttbr1_el1); 9162306a36Sopenharmony_ci 9262306a36Sopenharmony_ci /* Restore user page table */ 9362306a36Sopenharmony_ci write_sysreg(ttbr0, ttbr0_el1); 9462306a36Sopenharmony_ci isb(); 9562306a36Sopenharmony_ci local_irq_restore(flags); 9662306a36Sopenharmony_ci} 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_cistatic inline bool uaccess_ttbr0_disable(void) 9962306a36Sopenharmony_ci{ 10062306a36Sopenharmony_ci if (!system_uses_ttbr0_pan()) 10162306a36Sopenharmony_ci return false; 10262306a36Sopenharmony_ci __uaccess_ttbr0_disable(); 10362306a36Sopenharmony_ci return true; 10462306a36Sopenharmony_ci} 10562306a36Sopenharmony_ci 10662306a36Sopenharmony_cistatic inline bool uaccess_ttbr0_enable(void) 10762306a36Sopenharmony_ci{ 10862306a36Sopenharmony_ci if (!system_uses_ttbr0_pan()) 10962306a36Sopenharmony_ci return false; 11062306a36Sopenharmony_ci __uaccess_ttbr0_enable(); 11162306a36Sopenharmony_ci return true; 11262306a36Sopenharmony_ci} 11362306a36Sopenharmony_ci#else 11462306a36Sopenharmony_cistatic inline bool uaccess_ttbr0_disable(void) 11562306a36Sopenharmony_ci{ 11662306a36Sopenharmony_ci return false; 11762306a36Sopenharmony_ci} 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_cistatic inline bool uaccess_ttbr0_enable(void) 12062306a36Sopenharmony_ci{ 12162306a36Sopenharmony_ci return false; 12262306a36Sopenharmony_ci} 12362306a36Sopenharmony_ci#endif 12462306a36Sopenharmony_ci 12562306a36Sopenharmony_cistatic inline void __uaccess_disable_hw_pan(void) 12662306a36Sopenharmony_ci{ 12762306a36Sopenharmony_ci asm(ALTERNATIVE("nop", SET_PSTATE_PAN(0), ARM64_HAS_PAN, 12862306a36Sopenharmony_ci CONFIG_ARM64_PAN)); 12962306a36Sopenharmony_ci} 13062306a36Sopenharmony_ci 13162306a36Sopenharmony_cistatic inline void __uaccess_enable_hw_pan(void) 13262306a36Sopenharmony_ci{ 13362306a36Sopenharmony_ci asm(ALTERNATIVE("nop", SET_PSTATE_PAN(1), ARM64_HAS_PAN, 13462306a36Sopenharmony_ci CONFIG_ARM64_PAN)); 13562306a36Sopenharmony_ci} 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_cistatic inline void uaccess_disable_privileged(void) 13862306a36Sopenharmony_ci{ 13962306a36Sopenharmony_ci mte_disable_tco(); 14062306a36Sopenharmony_ci 14162306a36Sopenharmony_ci if (uaccess_ttbr0_disable()) 14262306a36Sopenharmony_ci return; 14362306a36Sopenharmony_ci 14462306a36Sopenharmony_ci __uaccess_enable_hw_pan(); 14562306a36Sopenharmony_ci} 14662306a36Sopenharmony_ci 14762306a36Sopenharmony_cistatic inline void uaccess_enable_privileged(void) 14862306a36Sopenharmony_ci{ 14962306a36Sopenharmony_ci mte_enable_tco(); 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_ci if (uaccess_ttbr0_enable()) 15262306a36Sopenharmony_ci return; 15362306a36Sopenharmony_ci 15462306a36Sopenharmony_ci __uaccess_disable_hw_pan(); 15562306a36Sopenharmony_ci} 15662306a36Sopenharmony_ci 15762306a36Sopenharmony_ci/* 15862306a36Sopenharmony_ci * Sanitize a uaccess pointer such that it cannot reach any kernel address. 15962306a36Sopenharmony_ci * 16062306a36Sopenharmony_ci * Clearing bit 55 ensures the pointer cannot address any portion of the TTBR1 16162306a36Sopenharmony_ci * address range (i.e. any kernel address), and either the pointer falls within 16262306a36Sopenharmony_ci * the TTBR0 address range or must cause a fault. 16362306a36Sopenharmony_ci */ 16462306a36Sopenharmony_ci#define uaccess_mask_ptr(ptr) (__typeof__(ptr))__uaccess_mask_ptr(ptr) 16562306a36Sopenharmony_cistatic inline void __user *__uaccess_mask_ptr(const void __user *ptr) 16662306a36Sopenharmony_ci{ 16762306a36Sopenharmony_ci void __user *safe_ptr; 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_ci asm volatile( 17062306a36Sopenharmony_ci " bic %0, %1, %2\n" 17162306a36Sopenharmony_ci : "=r" (safe_ptr) 17262306a36Sopenharmony_ci : "r" (ptr), 17362306a36Sopenharmony_ci "i" (BIT(55)) 17462306a36Sopenharmony_ci ); 17562306a36Sopenharmony_ci 17662306a36Sopenharmony_ci return safe_ptr; 17762306a36Sopenharmony_ci} 17862306a36Sopenharmony_ci 17962306a36Sopenharmony_ci/* 18062306a36Sopenharmony_ci * The "__xxx" versions of the user access functions do not verify the address 18162306a36Sopenharmony_ci * space - it must have been done previously with a separate "access_ok()" 18262306a36Sopenharmony_ci * call. 18362306a36Sopenharmony_ci * 18462306a36Sopenharmony_ci * The "__xxx_error" versions set the third argument to -EFAULT if an error 18562306a36Sopenharmony_ci * occurs, and leave it unchanged on success. 18662306a36Sopenharmony_ci */ 18762306a36Sopenharmony_ci#define __get_mem_asm(load, reg, x, addr, err, type) \ 18862306a36Sopenharmony_ci asm volatile( \ 18962306a36Sopenharmony_ci "1: " load " " reg "1, [%2]\n" \ 19062306a36Sopenharmony_ci "2:\n" \ 19162306a36Sopenharmony_ci _ASM_EXTABLE_##type##ACCESS_ERR_ZERO(1b, 2b, %w0, %w1) \ 19262306a36Sopenharmony_ci : "+r" (err), "=r" (x) \ 19362306a36Sopenharmony_ci : "r" (addr)) 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci#define __raw_get_mem(ldr, x, ptr, err, type) \ 19662306a36Sopenharmony_cido { \ 19762306a36Sopenharmony_ci unsigned long __gu_val; \ 19862306a36Sopenharmony_ci switch (sizeof(*(ptr))) { \ 19962306a36Sopenharmony_ci case 1: \ 20062306a36Sopenharmony_ci __get_mem_asm(ldr "b", "%w", __gu_val, (ptr), (err), type); \ 20162306a36Sopenharmony_ci break; \ 20262306a36Sopenharmony_ci case 2: \ 20362306a36Sopenharmony_ci __get_mem_asm(ldr "h", "%w", __gu_val, (ptr), (err), type); \ 20462306a36Sopenharmony_ci break; \ 20562306a36Sopenharmony_ci case 4: \ 20662306a36Sopenharmony_ci __get_mem_asm(ldr, "%w", __gu_val, (ptr), (err), type); \ 20762306a36Sopenharmony_ci break; \ 20862306a36Sopenharmony_ci case 8: \ 20962306a36Sopenharmony_ci __get_mem_asm(ldr, "%x", __gu_val, (ptr), (err), type); \ 21062306a36Sopenharmony_ci break; \ 21162306a36Sopenharmony_ci default: \ 21262306a36Sopenharmony_ci BUILD_BUG(); \ 21362306a36Sopenharmony_ci } \ 21462306a36Sopenharmony_ci (x) = (__force __typeof__(*(ptr)))__gu_val; \ 21562306a36Sopenharmony_ci} while (0) 21662306a36Sopenharmony_ci 21762306a36Sopenharmony_ci/* 21862306a36Sopenharmony_ci * We must not call into the scheduler between uaccess_ttbr0_enable() and 21962306a36Sopenharmony_ci * uaccess_ttbr0_disable(). As `x` and `ptr` could contain blocking functions, 22062306a36Sopenharmony_ci * we must evaluate these outside of the critical section. 22162306a36Sopenharmony_ci */ 22262306a36Sopenharmony_ci#define __raw_get_user(x, ptr, err) \ 22362306a36Sopenharmony_cido { \ 22462306a36Sopenharmony_ci __typeof__(*(ptr)) __user *__rgu_ptr = (ptr); \ 22562306a36Sopenharmony_ci __typeof__(x) __rgu_val; \ 22662306a36Sopenharmony_ci __chk_user_ptr(ptr); \ 22762306a36Sopenharmony_ci \ 22862306a36Sopenharmony_ci uaccess_ttbr0_enable(); \ 22962306a36Sopenharmony_ci __raw_get_mem("ldtr", __rgu_val, __rgu_ptr, err, U); \ 23062306a36Sopenharmony_ci uaccess_ttbr0_disable(); \ 23162306a36Sopenharmony_ci \ 23262306a36Sopenharmony_ci (x) = __rgu_val; \ 23362306a36Sopenharmony_ci} while (0) 23462306a36Sopenharmony_ci 23562306a36Sopenharmony_ci#define __get_user_error(x, ptr, err) \ 23662306a36Sopenharmony_cido { \ 23762306a36Sopenharmony_ci __typeof__(*(ptr)) __user *__p = (ptr); \ 23862306a36Sopenharmony_ci might_fault(); \ 23962306a36Sopenharmony_ci if (access_ok(__p, sizeof(*__p))) { \ 24062306a36Sopenharmony_ci __p = uaccess_mask_ptr(__p); \ 24162306a36Sopenharmony_ci __raw_get_user((x), __p, (err)); \ 24262306a36Sopenharmony_ci } else { \ 24362306a36Sopenharmony_ci (x) = (__force __typeof__(x))0; (err) = -EFAULT; \ 24462306a36Sopenharmony_ci } \ 24562306a36Sopenharmony_ci} while (0) 24662306a36Sopenharmony_ci 24762306a36Sopenharmony_ci#define __get_user(x, ptr) \ 24862306a36Sopenharmony_ci({ \ 24962306a36Sopenharmony_ci int __gu_err = 0; \ 25062306a36Sopenharmony_ci __get_user_error((x), (ptr), __gu_err); \ 25162306a36Sopenharmony_ci __gu_err; \ 25262306a36Sopenharmony_ci}) 25362306a36Sopenharmony_ci 25462306a36Sopenharmony_ci#define get_user __get_user 25562306a36Sopenharmony_ci 25662306a36Sopenharmony_ci/* 25762306a36Sopenharmony_ci * We must not call into the scheduler between __mte_enable_tco_async() and 25862306a36Sopenharmony_ci * __mte_disable_tco_async(). As `dst` and `src` may contain blocking 25962306a36Sopenharmony_ci * functions, we must evaluate these outside of the critical section. 26062306a36Sopenharmony_ci */ 26162306a36Sopenharmony_ci#define __get_kernel_nofault(dst, src, type, err_label) \ 26262306a36Sopenharmony_cido { \ 26362306a36Sopenharmony_ci __typeof__(dst) __gkn_dst = (dst); \ 26462306a36Sopenharmony_ci __typeof__(src) __gkn_src = (src); \ 26562306a36Sopenharmony_ci int __gkn_err = 0; \ 26662306a36Sopenharmony_ci \ 26762306a36Sopenharmony_ci __mte_enable_tco_async(); \ 26862306a36Sopenharmony_ci __raw_get_mem("ldr", *((type *)(__gkn_dst)), \ 26962306a36Sopenharmony_ci (__force type *)(__gkn_src), __gkn_err, K); \ 27062306a36Sopenharmony_ci __mte_disable_tco_async(); \ 27162306a36Sopenharmony_ci \ 27262306a36Sopenharmony_ci if (unlikely(__gkn_err)) \ 27362306a36Sopenharmony_ci goto err_label; \ 27462306a36Sopenharmony_ci} while (0) 27562306a36Sopenharmony_ci 27662306a36Sopenharmony_ci#define __put_mem_asm(store, reg, x, addr, err, type) \ 27762306a36Sopenharmony_ci asm volatile( \ 27862306a36Sopenharmony_ci "1: " store " " reg "1, [%2]\n" \ 27962306a36Sopenharmony_ci "2:\n" \ 28062306a36Sopenharmony_ci _ASM_EXTABLE_##type##ACCESS_ERR(1b, 2b, %w0) \ 28162306a36Sopenharmony_ci : "+r" (err) \ 28262306a36Sopenharmony_ci : "rZ" (x), "r" (addr)) 28362306a36Sopenharmony_ci 28462306a36Sopenharmony_ci#define __raw_put_mem(str, x, ptr, err, type) \ 28562306a36Sopenharmony_cido { \ 28662306a36Sopenharmony_ci __typeof__(*(ptr)) __pu_val = (x); \ 28762306a36Sopenharmony_ci switch (sizeof(*(ptr))) { \ 28862306a36Sopenharmony_ci case 1: \ 28962306a36Sopenharmony_ci __put_mem_asm(str "b", "%w", __pu_val, (ptr), (err), type); \ 29062306a36Sopenharmony_ci break; \ 29162306a36Sopenharmony_ci case 2: \ 29262306a36Sopenharmony_ci __put_mem_asm(str "h", "%w", __pu_val, (ptr), (err), type); \ 29362306a36Sopenharmony_ci break; \ 29462306a36Sopenharmony_ci case 4: \ 29562306a36Sopenharmony_ci __put_mem_asm(str, "%w", __pu_val, (ptr), (err), type); \ 29662306a36Sopenharmony_ci break; \ 29762306a36Sopenharmony_ci case 8: \ 29862306a36Sopenharmony_ci __put_mem_asm(str, "%x", __pu_val, (ptr), (err), type); \ 29962306a36Sopenharmony_ci break; \ 30062306a36Sopenharmony_ci default: \ 30162306a36Sopenharmony_ci BUILD_BUG(); \ 30262306a36Sopenharmony_ci } \ 30362306a36Sopenharmony_ci} while (0) 30462306a36Sopenharmony_ci 30562306a36Sopenharmony_ci/* 30662306a36Sopenharmony_ci * We must not call into the scheduler between uaccess_ttbr0_enable() and 30762306a36Sopenharmony_ci * uaccess_ttbr0_disable(). As `x` and `ptr` could contain blocking functions, 30862306a36Sopenharmony_ci * we must evaluate these outside of the critical section. 30962306a36Sopenharmony_ci */ 31062306a36Sopenharmony_ci#define __raw_put_user(x, ptr, err) \ 31162306a36Sopenharmony_cido { \ 31262306a36Sopenharmony_ci __typeof__(*(ptr)) __user *__rpu_ptr = (ptr); \ 31362306a36Sopenharmony_ci __typeof__(*(ptr)) __rpu_val = (x); \ 31462306a36Sopenharmony_ci __chk_user_ptr(__rpu_ptr); \ 31562306a36Sopenharmony_ci \ 31662306a36Sopenharmony_ci uaccess_ttbr0_enable(); \ 31762306a36Sopenharmony_ci __raw_put_mem("sttr", __rpu_val, __rpu_ptr, err, U); \ 31862306a36Sopenharmony_ci uaccess_ttbr0_disable(); \ 31962306a36Sopenharmony_ci} while (0) 32062306a36Sopenharmony_ci 32162306a36Sopenharmony_ci#define __put_user_error(x, ptr, err) \ 32262306a36Sopenharmony_cido { \ 32362306a36Sopenharmony_ci __typeof__(*(ptr)) __user *__p = (ptr); \ 32462306a36Sopenharmony_ci might_fault(); \ 32562306a36Sopenharmony_ci if (access_ok(__p, sizeof(*__p))) { \ 32662306a36Sopenharmony_ci __p = uaccess_mask_ptr(__p); \ 32762306a36Sopenharmony_ci __raw_put_user((x), __p, (err)); \ 32862306a36Sopenharmony_ci } else { \ 32962306a36Sopenharmony_ci (err) = -EFAULT; \ 33062306a36Sopenharmony_ci } \ 33162306a36Sopenharmony_ci} while (0) 33262306a36Sopenharmony_ci 33362306a36Sopenharmony_ci#define __put_user(x, ptr) \ 33462306a36Sopenharmony_ci({ \ 33562306a36Sopenharmony_ci int __pu_err = 0; \ 33662306a36Sopenharmony_ci __put_user_error((x), (ptr), __pu_err); \ 33762306a36Sopenharmony_ci __pu_err; \ 33862306a36Sopenharmony_ci}) 33962306a36Sopenharmony_ci 34062306a36Sopenharmony_ci#define put_user __put_user 34162306a36Sopenharmony_ci 34262306a36Sopenharmony_ci/* 34362306a36Sopenharmony_ci * We must not call into the scheduler between __mte_enable_tco_async() and 34462306a36Sopenharmony_ci * __mte_disable_tco_async(). As `dst` and `src` may contain blocking 34562306a36Sopenharmony_ci * functions, we must evaluate these outside of the critical section. 34662306a36Sopenharmony_ci */ 34762306a36Sopenharmony_ci#define __put_kernel_nofault(dst, src, type, err_label) \ 34862306a36Sopenharmony_cido { \ 34962306a36Sopenharmony_ci __typeof__(dst) __pkn_dst = (dst); \ 35062306a36Sopenharmony_ci __typeof__(src) __pkn_src = (src); \ 35162306a36Sopenharmony_ci int __pkn_err = 0; \ 35262306a36Sopenharmony_ci \ 35362306a36Sopenharmony_ci __mte_enable_tco_async(); \ 35462306a36Sopenharmony_ci __raw_put_mem("str", *((type *)(__pkn_src)), \ 35562306a36Sopenharmony_ci (__force type *)(__pkn_dst), __pkn_err, K); \ 35662306a36Sopenharmony_ci __mte_disable_tco_async(); \ 35762306a36Sopenharmony_ci \ 35862306a36Sopenharmony_ci if (unlikely(__pkn_err)) \ 35962306a36Sopenharmony_ci goto err_label; \ 36062306a36Sopenharmony_ci} while(0) 36162306a36Sopenharmony_ci 36262306a36Sopenharmony_ciextern unsigned long __must_check __arch_copy_from_user(void *to, const void __user *from, unsigned long n); 36362306a36Sopenharmony_ci#define raw_copy_from_user(to, from, n) \ 36462306a36Sopenharmony_ci({ \ 36562306a36Sopenharmony_ci unsigned long __acfu_ret; \ 36662306a36Sopenharmony_ci uaccess_ttbr0_enable(); \ 36762306a36Sopenharmony_ci __acfu_ret = __arch_copy_from_user((to), \ 36862306a36Sopenharmony_ci __uaccess_mask_ptr(from), (n)); \ 36962306a36Sopenharmony_ci uaccess_ttbr0_disable(); \ 37062306a36Sopenharmony_ci __acfu_ret; \ 37162306a36Sopenharmony_ci}) 37262306a36Sopenharmony_ci 37362306a36Sopenharmony_ciextern unsigned long __must_check __arch_copy_to_user(void __user *to, const void *from, unsigned long n); 37462306a36Sopenharmony_ci#define raw_copy_to_user(to, from, n) \ 37562306a36Sopenharmony_ci({ \ 37662306a36Sopenharmony_ci unsigned long __actu_ret; \ 37762306a36Sopenharmony_ci uaccess_ttbr0_enable(); \ 37862306a36Sopenharmony_ci __actu_ret = __arch_copy_to_user(__uaccess_mask_ptr(to), \ 37962306a36Sopenharmony_ci (from), (n)); \ 38062306a36Sopenharmony_ci uaccess_ttbr0_disable(); \ 38162306a36Sopenharmony_ci __actu_ret; \ 38262306a36Sopenharmony_ci}) 38362306a36Sopenharmony_ci 38462306a36Sopenharmony_ci#define INLINE_COPY_TO_USER 38562306a36Sopenharmony_ci#define INLINE_COPY_FROM_USER 38662306a36Sopenharmony_ci 38762306a36Sopenharmony_ciextern unsigned long __must_check __arch_clear_user(void __user *to, unsigned long n); 38862306a36Sopenharmony_cistatic inline unsigned long __must_check __clear_user(void __user *to, unsigned long n) 38962306a36Sopenharmony_ci{ 39062306a36Sopenharmony_ci if (access_ok(to, n)) { 39162306a36Sopenharmony_ci uaccess_ttbr0_enable(); 39262306a36Sopenharmony_ci n = __arch_clear_user(__uaccess_mask_ptr(to), n); 39362306a36Sopenharmony_ci uaccess_ttbr0_disable(); 39462306a36Sopenharmony_ci } 39562306a36Sopenharmony_ci return n; 39662306a36Sopenharmony_ci} 39762306a36Sopenharmony_ci#define clear_user __clear_user 39862306a36Sopenharmony_ci 39962306a36Sopenharmony_ciextern long strncpy_from_user(char *dest, const char __user *src, long count); 40062306a36Sopenharmony_ci 40162306a36Sopenharmony_ciextern __must_check long strnlen_user(const char __user *str, long n); 40262306a36Sopenharmony_ci 40362306a36Sopenharmony_ci#ifdef CONFIG_ARCH_HAS_UACCESS_FLUSHCACHE 40462306a36Sopenharmony_ciextern unsigned long __must_check __copy_user_flushcache(void *to, const void __user *from, unsigned long n); 40562306a36Sopenharmony_ci 40662306a36Sopenharmony_cistatic inline int __copy_from_user_flushcache(void *dst, const void __user *src, unsigned size) 40762306a36Sopenharmony_ci{ 40862306a36Sopenharmony_ci kasan_check_write(dst, size); 40962306a36Sopenharmony_ci return __copy_user_flushcache(dst, __uaccess_mask_ptr(src), size); 41062306a36Sopenharmony_ci} 41162306a36Sopenharmony_ci#endif 41262306a36Sopenharmony_ci 41362306a36Sopenharmony_ci#ifdef CONFIG_ARCH_HAS_SUBPAGE_FAULTS 41462306a36Sopenharmony_ci 41562306a36Sopenharmony_ci/* 41662306a36Sopenharmony_ci * Return 0 on success, the number of bytes not probed otherwise. 41762306a36Sopenharmony_ci */ 41862306a36Sopenharmony_cistatic inline size_t probe_subpage_writeable(const char __user *uaddr, 41962306a36Sopenharmony_ci size_t size) 42062306a36Sopenharmony_ci{ 42162306a36Sopenharmony_ci if (!system_supports_mte()) 42262306a36Sopenharmony_ci return 0; 42362306a36Sopenharmony_ci return mte_probe_user_range(uaddr, size); 42462306a36Sopenharmony_ci} 42562306a36Sopenharmony_ci 42662306a36Sopenharmony_ci#endif /* CONFIG_ARCH_HAS_SUBPAGE_FAULTS */ 42762306a36Sopenharmony_ci 42862306a36Sopenharmony_ci#endif /* __ASM_UACCESS_H */ 429