mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-14 22:44:27 +08:00
bad1e1c663
When MTE is present, the GCR_EL1 register contains the tags mask that allows to exclude tags from the random generation via the IRG instruction. With the introduction of the new Tag-Based KASAN API that provides a mechanism to reserve tags for special reasons, the MTE implementation has to make sure that the GCR_EL1 setting for the kernel does not affect the userspace processes and viceversa. Save and restore the kernel/user mask in GCR_EL1 in kernel entry and exit. Link: https://lkml.kernel.org/r/578b03294708cc7258fad0dc9c2a2e809e5a8214.1606161801.git.andreyknvl@google.com Signed-off-by: Vincenzo Frascino <vincenzo.frascino@arm.com> Co-developed-by: Andrey Konovalov <andreyknvl@google.com> Signed-off-by: Andrey Konovalov <andreyknvl@google.com> Reviewed-by: Catalin Marinas <catalin.marinas@arm.com> Tested-by: Vincenzo Frascino <vincenzo.frascino@arm.com> Cc: Alexander Potapenko <glider@google.com> Cc: Andrey Ryabinin <aryabinin@virtuozzo.com> Cc: Branislav Rankov <Branislav.Rankov@arm.com> Cc: Dmitry Vyukov <dvyukov@google.com> Cc: Evgenii Stepanov <eugenis@google.com> Cc: Kevin Brodsky <kevin.brodsky@arm.com> Cc: Marco Elver <elver@google.com> Cc: Vasily Gorbik <gor@linux.ibm.com> Cc: Will Deacon <will.deacon@arm.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
68 lines
1.2 KiB
C
68 lines
1.2 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
/*
|
|
* Copyright (C) 2020 ARM Ltd.
|
|
*/
|
|
#ifndef __ASM_MTE_KASAN_H
|
|
#define __ASM_MTE_KASAN_H
|
|
|
|
#include <asm/mte-def.h>
|
|
|
|
#ifndef __ASSEMBLY__
|
|
|
|
#include <linux/types.h>
|
|
|
|
/*
|
|
* The functions below are meant to be used only for the
|
|
* KASAN_HW_TAGS interface defined in asm/memory.h.
|
|
*/
|
|
#ifdef CONFIG_ARM64_MTE
|
|
|
|
static inline u8 mte_get_ptr_tag(void *ptr)
|
|
{
|
|
/* Note: The format of KASAN tags is 0xF<x> */
|
|
u8 tag = 0xF0 | (u8)(((u64)(ptr)) >> MTE_TAG_SHIFT);
|
|
|
|
return tag;
|
|
}
|
|
|
|
u8 mte_get_mem_tag(void *addr);
|
|
u8 mte_get_random_tag(void);
|
|
void *mte_set_mem_tag_range(void *addr, size_t size, u8 tag);
|
|
|
|
void mte_enable_kernel(void);
|
|
void mte_init_tags(u64 max_tag);
|
|
|
|
#else /* CONFIG_ARM64_MTE */
|
|
|
|
static inline u8 mte_get_ptr_tag(void *ptr)
|
|
{
|
|
return 0xFF;
|
|
}
|
|
|
|
static inline u8 mte_get_mem_tag(void *addr)
|
|
{
|
|
return 0xFF;
|
|
}
|
|
static inline u8 mte_get_random_tag(void)
|
|
{
|
|
return 0xFF;
|
|
}
|
|
static inline void *mte_set_mem_tag_range(void *addr, size_t size, u8 tag)
|
|
{
|
|
return addr;
|
|
}
|
|
|
|
static inline void mte_enable_kernel(void)
|
|
{
|
|
}
|
|
|
|
static inline void mte_init_tags(u64 max_tag)
|
|
{
|
|
}
|
|
|
|
#endif /* CONFIG_ARM64_MTE */
|
|
|
|
#endif /* __ASSEMBLY__ */
|
|
|
|
#endif /* __ASM_MTE_KASAN_H */
|