/* * The Tag Check Flag (TCF) mode for MTE is per EL, hence TCF0 * affects EL0 and TCF affects EL1 irrespective of which TTBR is * used. * The kernel accesses TTBR0 usually with LDTR/STTR instructions * when UAO is available, so these would act as EL0 accesses using * TCF0. * However futex.h code uses exclusives which would be executed as * EL1, this can potentially cause a tag check fault even if the * user disables TCF0. * * To address the problem we set the PSTATE.TCO bit in uaccess_enable() * and reset it in uaccess_disable(). * * The Tag check override (TCO) bit disables temporarily the tag checking * preventing the issue.
*/ staticinlinevoid mte_disable_tco(void)
{ asmvolatile(ALTERNATIVE("nop", SET_PSTATE_TCO(0),
ARM64_MTE, CONFIG_KASAN_HW_TAGS));
}
/* * These functions disable tag checking only if in MTE async mode * since the sync mode generates exceptions synchronously and the * nofault or load_unaligned_zeropad can handle them.
*/ staticinlinevoid __mte_disable_tco_async(void)
{ if (system_uses_mte_async_or_asymm_mode())
mte_disable_tco();
}
staticinlinevoid __mte_enable_tco_async(void)
{ if (system_uses_mte_async_or_asymm_mode())
mte_enable_tco();
}
/* * These functions are meant to be only used from KASAN runtime through * the arch_*() interface defined in asm/memory.h. * These functions don't include system_supports_mte() checks, * as KASAN only calls them when MTE is supported and enabled.
*/
staticinline u8 mte_get_ptr_tag(void *ptr)
{ /* Note: The format of KASAN tags is 0xF<x> */
u8 tag = 0xF0 | (u8)(((u64)(ptr)) >> MTE_TAG_SHIFT);
return tag;
}
/* Get allocation tag for the address. */ staticinline u8 mte_get_mem_tag(void *addr)
{ asm(__MTE_PREAMBLE "ldg %0, [%0]"
: "+r" (addr));
return mte_get_ptr_tag(addr);
}
/* Generate a random tag. */ staticinline u8 mte_get_random_tag(void)
{ void *addr;
/* * Assign allocation tags for a region of memory based on the pointer tag. * Note: The address must be non-NULL and MTE_GRANULE_SIZE aligned and * size must be MTE_GRANULE_SIZE aligned.
*/ staticinlinevoid mte_set_mem_tag_range(void *addr, size_t size, u8 tag, bool init)
{
u64 curr, mask, dczid, dczid_bs, dczid_dzp, end1, end2, end3;
/* Read DC G(Z)VA block size from the system register. */
dczid = read_cpuid(DCZID_EL0);
dczid_bs = 4ul << (dczid & 0xf);
dczid_dzp = (dczid >> 4) & 1;
curr = (u64)__tag_set(addr, tag);
mask = dczid_bs - 1; /* STG/STZG up to the end of the first block. */
end1 = curr | mask;
end3 = curr + size; /* DC GVA / GZVA in [end1, end2) */
end2 = end3 & ~mask;
/* * The following code uses STG on the first DC GVA block even if the * start address is aligned - it appears to be faster than an alignment * check + conditional branch. Also, if the range size is at least 2 DC * GVA blocks, the first two loops can use post-condition to save one * branch each.
*/ #define SET_MEMTAG_RANGE(stg_post, dc_gva) \ do { \ if (!dczid_dzp && size >= 2 * dczid_bs) {\ do { \
curr = stg_post(curr); \
} while (curr < end1); \
\ do { \
dc_gva(curr); \
curr += dczid_bs; \
} while (curr < end2); \
} \
\ while (curr < end3) \
curr = stg_post(curr); \
} while (0)
if (init)
SET_MEMTAG_RANGE(__stzg_post, __dc_gzva); else
SET_MEMTAG_RANGE(__stg_post, __dc_gva); #undef SET_MEMTAG_RANGE
}
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.