123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267 |
- // SPDX-License-Identifier: GPL-2.0-only
- /*
- * Copyright (c) 2014, The Linux Foundation. All rights reserved.
- */
- #include <linux/kernel.h>
- #include <linux/mm.h>
- #include <linux/module.h>
- #include <linux/sched.h>
- #include <linux/vmalloc.h>
- #include <asm/cacheflush.h>
- #include <asm/set_memory.h>
- #include <asm/tlbflush.h>
- #include <asm/kfence.h>
- struct page_change_data {
- pgprot_t set_mask;
- pgprot_t clear_mask;
- };
- bool rodata_full __ro_after_init = IS_ENABLED(CONFIG_RODATA_FULL_DEFAULT_ENABLED);
- bool can_set_direct_map(void)
- {
- /*
- * rodata_full and DEBUG_PAGEALLOC require linear map to be
- * mapped at page granularity, so that it is possible to
- * protect/unprotect single pages.
- *
- * KFENCE pool requires page-granular mapping if initialized late.
- */
- return rodata_full || debug_pagealloc_enabled() ||
- arm64_kfence_can_set_direct_map();
- }
- static int change_page_range(pte_t *ptep, unsigned long addr, void *data)
- {
- struct page_change_data *cdata = data;
- pte_t pte = READ_ONCE(*ptep);
- pte = clear_pte_bit(pte, cdata->clear_mask);
- pte = set_pte_bit(pte, cdata->set_mask);
- set_pte(ptep, pte);
- return 0;
- }
- /*
- * This function assumes that the range is mapped with PAGE_SIZE pages.
- */
- static int __change_memory_common(unsigned long start, unsigned long size,
- pgprot_t set_mask, pgprot_t clear_mask)
- {
- struct page_change_data data;
- int ret;
- data.set_mask = set_mask;
- data.clear_mask = clear_mask;
- ret = apply_to_page_range(&init_mm, start, size, change_page_range,
- &data);
- flush_tlb_kernel_range(start, start + size);
- return ret;
- }
- static int change_memory_common(unsigned long addr, int numpages,
- pgprot_t set_mask, pgprot_t clear_mask)
- {
- unsigned long start = addr;
- unsigned long size = PAGE_SIZE * numpages;
- unsigned long end = start + size;
- struct vm_struct *area;
- int i;
- if (!PAGE_ALIGNED(addr)) {
- start &= PAGE_MASK;
- end = start + size;
- WARN_ON_ONCE(1);
- }
- /*
- * Kernel VA mappings are always live, and splitting live section
- * mappings into page mappings may cause TLB conflicts. This means
- * we have to ensure that changing the permission bits of the range
- * we are operating on does not result in such splitting.
- *
- * Let's restrict ourselves to mappings created by vmalloc (or vmap).
- * Those are guaranteed to consist entirely of page mappings, and
- * splitting is never needed.
- *
- * So check whether the [addr, addr + size) interval is entirely
- * covered by precisely one VM area that has the VM_ALLOC flag set.
- */
- area = find_vm_area((void *)addr);
- if (!area ||
- end > (unsigned long)kasan_reset_tag(area->addr) + area->size ||
- !(area->flags & VM_ALLOC))
- return -EINVAL;
- if (!numpages)
- return 0;
- /*
- * If we are manipulating read-only permissions, apply the same
- * change to the linear mapping of the pages that back this VM area.
- */
- if (rodata_full && (pgprot_val(set_mask) == PTE_RDONLY ||
- pgprot_val(clear_mask) == PTE_RDONLY)) {
- for (i = 0; i < area->nr_pages; i++) {
- __change_memory_common((u64)page_address(area->pages[i]),
- PAGE_SIZE, set_mask, clear_mask);
- }
- }
- /*
- * Get rid of potentially aliasing lazily unmapped vm areas that may
- * have permissions set that deviate from the ones we are setting here.
- */
- vm_unmap_aliases();
- return __change_memory_common(start, size, set_mask, clear_mask);
- }
- int set_memory_ro(unsigned long addr, int numpages)
- {
- return change_memory_common(addr, numpages,
- __pgprot(PTE_RDONLY),
- __pgprot(PTE_WRITE));
- }
- int set_memory_rw(unsigned long addr, int numpages)
- {
- return change_memory_common(addr, numpages,
- __pgprot(PTE_WRITE),
- __pgprot(PTE_RDONLY));
- }
- int set_memory_nx(unsigned long addr, int numpages)
- {
- return change_memory_common(addr, numpages,
- __pgprot(PTE_PXN),
- __pgprot(PTE_MAYBE_GP));
- }
- int set_memory_x(unsigned long addr, int numpages)
- {
- return change_memory_common(addr, numpages,
- __pgprot(PTE_MAYBE_GP),
- __pgprot(PTE_PXN));
- }
- int set_memory_valid(unsigned long addr, int numpages, int enable)
- {
- if (enable)
- return __change_memory_common(addr, PAGE_SIZE * numpages,
- __pgprot(PTE_VALID),
- __pgprot(0));
- else
- return __change_memory_common(addr, PAGE_SIZE * numpages,
- __pgprot(0),
- __pgprot(PTE_VALID));
- }
- /*
- * Only to be used with memory in the logical map (e.g. vmapped memory will
- * face coherency issues as we don't call vm_unmap_aliases()). Only to be used
- * whilst accesses are not ongoing to the region, as we do not follow the
- * make-before-break sequence in order to cut down the run time of this
- * function.
- */
- int arch_set_direct_map_range_uncached(unsigned long addr, unsigned long numpages)
- {
- if (!can_set_direct_map())
- return 0;
- return __change_memory_common(addr, PAGE_SIZE * numpages,
- __pgprot(PTE_ATTRINDX(MT_NORMAL_NC)),
- __pgprot(PTE_ATTRINDX_MASK));
- }
- int set_direct_map_invalid_noflush(struct page *page)
- {
- struct page_change_data data = {
- .set_mask = __pgprot(0),
- .clear_mask = __pgprot(PTE_VALID),
- };
- if (!can_set_direct_map())
- return 0;
- return apply_to_page_range(&init_mm,
- (unsigned long)page_address(page),
- PAGE_SIZE, change_page_range, &data);
- }
- int set_direct_map_default_noflush(struct page *page)
- {
- struct page_change_data data = {
- .set_mask = __pgprot(PTE_VALID | PTE_WRITE),
- .clear_mask = __pgprot(PTE_RDONLY),
- };
- if (!can_set_direct_map())
- return 0;
- return apply_to_page_range(&init_mm,
- (unsigned long)page_address(page),
- PAGE_SIZE, change_page_range, &data);
- }
- #ifdef CONFIG_DEBUG_PAGEALLOC
- void __kernel_map_pages(struct page *page, int numpages, int enable)
- {
- if (!can_set_direct_map())
- return;
- set_memory_valid((unsigned long)page_address(page), numpages, enable);
- }
- #endif /* CONFIG_DEBUG_PAGEALLOC */
- /*
- * This function is used to determine if a linear map page has been marked as
- * not-valid. Walk the page table and check the PTE_VALID bit. This is based
- * on kern_addr_valid(), which almost does what we need.
- *
- * Because this is only called on the kernel linear map, p?d_sect() implies
- * p?d_present(). When debug_pagealloc is enabled, sections mappings are
- * disabled.
- */
- bool kernel_page_present(struct page *page)
- {
- pgd_t *pgdp;
- p4d_t *p4dp;
- pud_t *pudp, pud;
- pmd_t *pmdp, pmd;
- pte_t *ptep;
- unsigned long addr = (unsigned long)page_address(page);
- if (!can_set_direct_map())
- return true;
- pgdp = pgd_offset_k(addr);
- if (pgd_none(READ_ONCE(*pgdp)))
- return false;
- p4dp = p4d_offset(pgdp, addr);
- if (p4d_none(READ_ONCE(*p4dp)))
- return false;
- pudp = pud_offset(p4dp, addr);
- pud = READ_ONCE(*pudp);
- if (pud_none(pud))
- return false;
- if (pud_sect(pud))
- return true;
- pmdp = pmd_offset(pudp, addr);
- pmd = READ_ONCE(*pmdp);
- if (pmd_none(pmd))
- return false;
- if (pmd_sect(pmd))
- return true;
- ptep = pte_offset_kernel(pmdp, addr);
- return pte_valid(READ_ONCE(*ptep));
- }
|