1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0 21da177e4SLinus Torvalds /* 31da177e4SLinus Torvalds * mm/mprotect.c 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * (C) Copyright 1994 Linus Torvalds 61da177e4SLinus Torvalds * (C) Copyright 2002 Christoph Hellwig 71da177e4SLinus Torvalds * 8046c6884SAlan Cox * Address space accounting code <alan@lxorguk.ukuu.org.uk> 91da177e4SLinus Torvalds * (C) Copyright 2002 Red Hat Inc, All Rights Reserved 101da177e4SLinus Torvalds */ 111da177e4SLinus Torvalds 121da177e4SLinus Torvalds #include <linux/mm.h> 131da177e4SLinus Torvalds #include <linux/hugetlb.h> 141da177e4SLinus Torvalds #include <linux/shm.h> 151da177e4SLinus Torvalds #include <linux/mman.h> 161da177e4SLinus Torvalds #include <linux/fs.h> 171da177e4SLinus Torvalds #include <linux/highmem.h> 181da177e4SLinus Torvalds #include <linux/security.h> 191da177e4SLinus Torvalds #include <linux/mempolicy.h> 201da177e4SLinus Torvalds #include <linux/personality.h> 211da177e4SLinus Torvalds #include <linux/syscalls.h> 220697212aSChristoph Lameter #include <linux/swap.h> 230697212aSChristoph Lameter #include <linux/swapops.h> 24cddb8a5cSAndrea Arcangeli #include <linux/mmu_notifier.h> 2564cdd548SKOSAKI Motohiro #include <linux/migrate.h> 26cdd6c482SIngo Molnar #include <linux/perf_event.h> 27e8c24d3aSDave Hansen #include <linux/pkeys.h> 2864a9a34eSMel Gorman #include <linux/ksm.h> 297c0f6ba6SLinus Torvalds #include <linux/uaccess.h> 3009a913a7SMel Gorman #include <linux/mm_inline.h> 311da177e4SLinus Torvalds #include <asm/pgtable.h> 321da177e4SLinus Torvalds #include <asm/cacheflush.h> 33e8c24d3aSDave Hansen #include <asm/mmu_context.h> 341da177e4SLinus Torvalds #include <asm/tlbflush.h> 351da177e4SLinus Torvalds 3636f88188SKirill A. Shutemov #include "internal.h" 3736f88188SKirill A. Shutemov 384b10e7d5SMel Gorman static unsigned long change_pte_range(struct vm_area_struct *vma, pmd_t *pmd, 39c1e6098bSPeter Zijlstra unsigned long addr, unsigned long end, pgprot_t newprot, 400f19c179SMel Gorman int dirty_accountable, int prot_numa) 411da177e4SLinus Torvalds { 424b10e7d5SMel Gorman struct mm_struct *mm = vma->vm_mm; 430697212aSChristoph Lameter pte_t *pte, oldpte; 44705e87c0SHugh Dickins spinlock_t *ptl; 457da4d641SPeter Zijlstra unsigned long pages = 0; 463e321587SAndi Kleen int target_node = NUMA_NO_NODE; 471da177e4SLinus Torvalds 48175ad4f1SAndrea Arcangeli /* 49175ad4f1SAndrea Arcangeli * Can be called with only the mmap_sem for reading by 50175ad4f1SAndrea Arcangeli * prot_numa so we must check the pmd isn't constantly 51175ad4f1SAndrea Arcangeli * changing from under us from pmd_none to pmd_trans_huge 52175ad4f1SAndrea Arcangeli * and/or the other way around. 53175ad4f1SAndrea Arcangeli */ 54175ad4f1SAndrea Arcangeli if (pmd_trans_unstable(pmd)) 55175ad4f1SAndrea Arcangeli return 0; 56175ad4f1SAndrea Arcangeli 57175ad4f1SAndrea Arcangeli /* 58175ad4f1SAndrea Arcangeli * The pmd points to a regular pte so the pmd can't change 59175ad4f1SAndrea Arcangeli * from under us even if the mmap_sem is only hold for 60175ad4f1SAndrea Arcangeli * reading. 61175ad4f1SAndrea Arcangeli */ 62175ad4f1SAndrea Arcangeli pte = pte_offset_map_lock(vma->vm_mm, pmd, addr, &ptl); 631ad9f620SMel Gorman 643e321587SAndi Kleen /* Get target node for single threaded private VMAs */ 653e321587SAndi Kleen if (prot_numa && !(vma->vm_flags & VM_SHARED) && 663e321587SAndi Kleen atomic_read(&vma->vm_mm->mm_users) == 1) 673e321587SAndi Kleen target_node = numa_node_id(); 683e321587SAndi Kleen 693ea27719SMel Gorman flush_tlb_batched_pending(vma->vm_mm); 706606c3e0SZachary Amsden arch_enter_lazy_mmu_mode(); 711da177e4SLinus Torvalds do { 720697212aSChristoph Lameter oldpte = *pte; 730697212aSChristoph Lameter if (pte_present(oldpte)) { 741da177e4SLinus Torvalds pte_t ptent; 75b191f9b1SMel Gorman bool preserve_write = prot_numa && pte_write(oldpte); 761da177e4SLinus Torvalds 77e944fd67SMel Gorman /* 78e944fd67SMel Gorman * Avoid trapping faults against the zero or KSM 79e944fd67SMel Gorman * pages. See similar comment in change_huge_pmd. 80e944fd67SMel Gorman */ 81e944fd67SMel Gorman if (prot_numa) { 82e944fd67SMel Gorman struct page *page; 83e944fd67SMel Gorman 84e944fd67SMel Gorman page = vm_normal_page(vma, addr, oldpte); 85e944fd67SMel Gorman if (!page || PageKsm(page)) 86e944fd67SMel Gorman continue; 8710c1045fSMel Gorman 88859d4adcSHenry Willard /* Also skip shared copy-on-write pages */ 89859d4adcSHenry Willard if (is_cow_mapping(vma->vm_flags) && 90859d4adcSHenry Willard page_mapcount(page) != 1) 91859d4adcSHenry Willard continue; 92859d4adcSHenry Willard 9309a913a7SMel Gorman /* 9409a913a7SMel Gorman * While migration can move some dirty pages, 9509a913a7SMel Gorman * it cannot move them all from MIGRATE_ASYNC 9609a913a7SMel Gorman * context. 9709a913a7SMel Gorman */ 9809a913a7SMel Gorman if (page_is_file_cache(page) && PageDirty(page)) 9909a913a7SMel Gorman continue; 10009a913a7SMel Gorman 10110c1045fSMel Gorman /* Avoid TLB flush if possible */ 10210c1045fSMel Gorman if (pte_protnone(oldpte)) 10310c1045fSMel Gorman continue; 1043e321587SAndi Kleen 1053e321587SAndi Kleen /* 1063e321587SAndi Kleen * Don't mess with PTEs if page is already on the node 1073e321587SAndi Kleen * a single-threaded process is running on. 1083e321587SAndi Kleen */ 1093e321587SAndi Kleen if (target_node == page_to_nid(page)) 1103e321587SAndi Kleen continue; 111e944fd67SMel Gorman } 112e944fd67SMel Gorman 113*04a86453SAneesh Kumar K.V oldpte = ptep_modify_prot_start(vma, addr, pte); 114*04a86453SAneesh Kumar K.V ptent = pte_modify(oldpte, newprot); 115b191f9b1SMel Gorman if (preserve_write) 116288bc549SAneesh Kumar K.V ptent = pte_mk_savedwrite(ptent); 1178a0516edSMel Gorman 1188a0516edSMel Gorman /* Avoid taking write faults for known dirty pages */ 11964e45507SPeter Feiner if (dirty_accountable && pte_dirty(ptent) && 12064e45507SPeter Feiner (pte_soft_dirty(ptent) || 1218a0516edSMel Gorman !(vma->vm_flags & VM_SOFTDIRTY))) { 1229d85d586SAneesh Kumar K.V ptent = pte_mkwrite(ptent); 1238a0516edSMel Gorman } 124*04a86453SAneesh Kumar K.V ptep_modify_prot_commit(vma, addr, pte, oldpte, ptent); 1254b10e7d5SMel Gorman pages++; 1260661a336SKirill A. Shutemov } else if (IS_ENABLED(CONFIG_MIGRATION)) { 1270697212aSChristoph Lameter swp_entry_t entry = pte_to_swp_entry(oldpte); 1280697212aSChristoph Lameter 1290697212aSChristoph Lameter if (is_write_migration_entry(entry)) { 130c3d16e16SCyrill Gorcunov pte_t newpte; 1310697212aSChristoph Lameter /* 1320697212aSChristoph Lameter * A protection check is difficult so 1330697212aSChristoph Lameter * just be safe and disable write 1340697212aSChristoph Lameter */ 1350697212aSChristoph Lameter make_migration_entry_read(&entry); 136c3d16e16SCyrill Gorcunov newpte = swp_entry_to_pte(entry); 137c3d16e16SCyrill Gorcunov if (pte_swp_soft_dirty(oldpte)) 138c3d16e16SCyrill Gorcunov newpte = pte_swp_mksoft_dirty(newpte); 139c3d16e16SCyrill Gorcunov set_pte_at(mm, addr, pte, newpte); 140e920e14cSMel Gorman 1417da4d641SPeter Zijlstra pages++; 1420697212aSChristoph Lameter } 1435042db43SJérôme Glisse 1445042db43SJérôme Glisse if (is_write_device_private_entry(entry)) { 1455042db43SJérôme Glisse pte_t newpte; 1465042db43SJérôme Glisse 1475042db43SJérôme Glisse /* 1485042db43SJérôme Glisse * We do not preserve soft-dirtiness. See 1495042db43SJérôme Glisse * copy_one_pte() for explanation. 1505042db43SJérôme Glisse */ 1515042db43SJérôme Glisse make_device_private_entry_read(&entry); 1525042db43SJérôme Glisse newpte = swp_entry_to_pte(entry); 1535042db43SJérôme Glisse set_pte_at(mm, addr, pte, newpte); 1545042db43SJérôme Glisse 1555042db43SJérôme Glisse pages++; 1565042db43SJérôme Glisse } 157e920e14cSMel Gorman } 1581da177e4SLinus Torvalds } while (pte++, addr += PAGE_SIZE, addr != end); 1596606c3e0SZachary Amsden arch_leave_lazy_mmu_mode(); 160705e87c0SHugh Dickins pte_unmap_unlock(pte - 1, ptl); 1617da4d641SPeter Zijlstra 1627da4d641SPeter Zijlstra return pages; 1631da177e4SLinus Torvalds } 1641da177e4SLinus Torvalds 1657d12efaeSAndrew Morton static inline unsigned long change_pmd_range(struct vm_area_struct *vma, 1667d12efaeSAndrew Morton pud_t *pud, unsigned long addr, unsigned long end, 1677d12efaeSAndrew Morton pgprot_t newprot, int dirty_accountable, int prot_numa) 1681da177e4SLinus Torvalds { 1691da177e4SLinus Torvalds pmd_t *pmd; 1701da177e4SLinus Torvalds unsigned long next; 1717da4d641SPeter Zijlstra unsigned long pages = 0; 17272403b4aSMel Gorman unsigned long nr_huge_updates = 0; 173ac46d4f3SJérôme Glisse struct mmu_notifier_range range; 174ac46d4f3SJérôme Glisse 175ac46d4f3SJérôme Glisse range.start = 0; 1761da177e4SLinus Torvalds 1771da177e4SLinus Torvalds pmd = pmd_offset(pud, addr); 1781da177e4SLinus Torvalds do { 17925cbbef1SMel Gorman unsigned long this_pages; 18025cbbef1SMel Gorman 1811da177e4SLinus Torvalds next = pmd_addr_end(addr, end); 18284c3fc4eSZi Yan if (!is_swap_pmd(*pmd) && !pmd_trans_huge(*pmd) && !pmd_devmap(*pmd) 1835c7fb56eSDan Williams && pmd_none_or_clear_bad(pmd)) 1844991c09cSAnshuman Khandual goto next; 185a5338093SRik van Riel 186a5338093SRik van Riel /* invoke the mmu notifier if the pmd is populated */ 187ac46d4f3SJérôme Glisse if (!range.start) { 188ac46d4f3SJérôme Glisse mmu_notifier_range_init(&range, vma->vm_mm, addr, end); 189ac46d4f3SJérôme Glisse mmu_notifier_invalidate_range_start(&range); 190a5338093SRik van Riel } 191a5338093SRik van Riel 19284c3fc4eSZi Yan if (is_swap_pmd(*pmd) || pmd_trans_huge(*pmd) || pmd_devmap(*pmd)) { 1936b9116a6SKirill A. Shutemov if (next - addr != HPAGE_PMD_SIZE) { 194fd60775aSDavid Rientjes __split_huge_pmd(vma, pmd, addr, false, NULL); 1956b9116a6SKirill A. Shutemov } else { 196f123d74aSMel Gorman int nr_ptes = change_huge_pmd(vma, pmd, addr, 197e944fd67SMel Gorman newprot, prot_numa); 198f123d74aSMel Gorman 199f123d74aSMel Gorman if (nr_ptes) { 20072403b4aSMel Gorman if (nr_ptes == HPAGE_PMD_NR) { 20172403b4aSMel Gorman pages += HPAGE_PMD_NR; 20272403b4aSMel Gorman nr_huge_updates++; 20372403b4aSMel Gorman } 2041ad9f620SMel Gorman 2051ad9f620SMel Gorman /* huge pmd was handled */ 2064991c09cSAnshuman Khandual goto next; 2077da4d641SPeter Zijlstra } 208f123d74aSMel Gorman } 20988a9ab6eSRik van Riel /* fall through, the trans huge pmd just split */ 210cd7548abSJohannes Weiner } 21125cbbef1SMel Gorman this_pages = change_pte_range(vma, pmd, addr, next, newprot, 2120f19c179SMel Gorman dirty_accountable, prot_numa); 21325cbbef1SMel Gorman pages += this_pages; 2144991c09cSAnshuman Khandual next: 2154991c09cSAnshuman Khandual cond_resched(); 2161da177e4SLinus Torvalds } while (pmd++, addr = next, addr != end); 2177da4d641SPeter Zijlstra 218ac46d4f3SJérôme Glisse if (range.start) 219ac46d4f3SJérôme Glisse mmu_notifier_invalidate_range_end(&range); 220a5338093SRik van Riel 22172403b4aSMel Gorman if (nr_huge_updates) 22272403b4aSMel Gorman count_vm_numa_events(NUMA_HUGE_PTE_UPDATES, nr_huge_updates); 2237da4d641SPeter Zijlstra return pages; 2241da177e4SLinus Torvalds } 2251da177e4SLinus Torvalds 2267d12efaeSAndrew Morton static inline unsigned long change_pud_range(struct vm_area_struct *vma, 227c2febafcSKirill A. Shutemov p4d_t *p4d, unsigned long addr, unsigned long end, 2287d12efaeSAndrew Morton pgprot_t newprot, int dirty_accountable, int prot_numa) 2291da177e4SLinus Torvalds { 2301da177e4SLinus Torvalds pud_t *pud; 2311da177e4SLinus Torvalds unsigned long next; 2327da4d641SPeter Zijlstra unsigned long pages = 0; 2331da177e4SLinus Torvalds 234c2febafcSKirill A. Shutemov pud = pud_offset(p4d, addr); 2351da177e4SLinus Torvalds do { 2361da177e4SLinus Torvalds next = pud_addr_end(addr, end); 2371da177e4SLinus Torvalds if (pud_none_or_clear_bad(pud)) 2381da177e4SLinus Torvalds continue; 2397da4d641SPeter Zijlstra pages += change_pmd_range(vma, pud, addr, next, newprot, 2404b10e7d5SMel Gorman dirty_accountable, prot_numa); 2411da177e4SLinus Torvalds } while (pud++, addr = next, addr != end); 2427da4d641SPeter Zijlstra 2437da4d641SPeter Zijlstra return pages; 2441da177e4SLinus Torvalds } 2451da177e4SLinus Torvalds 246c2febafcSKirill A. Shutemov static inline unsigned long change_p4d_range(struct vm_area_struct *vma, 247c2febafcSKirill A. Shutemov pgd_t *pgd, unsigned long addr, unsigned long end, 248c2febafcSKirill A. Shutemov pgprot_t newprot, int dirty_accountable, int prot_numa) 249c2febafcSKirill A. Shutemov { 250c2febafcSKirill A. Shutemov p4d_t *p4d; 251c2febafcSKirill A. Shutemov unsigned long next; 252c2febafcSKirill A. Shutemov unsigned long pages = 0; 253c2febafcSKirill A. Shutemov 254c2febafcSKirill A. Shutemov p4d = p4d_offset(pgd, addr); 255c2febafcSKirill A. Shutemov do { 256c2febafcSKirill A. Shutemov next = p4d_addr_end(addr, end); 257c2febafcSKirill A. Shutemov if (p4d_none_or_clear_bad(p4d)) 258c2febafcSKirill A. Shutemov continue; 259c2febafcSKirill A. Shutemov pages += change_pud_range(vma, p4d, addr, next, newprot, 260c2febafcSKirill A. Shutemov dirty_accountable, prot_numa); 261c2febafcSKirill A. Shutemov } while (p4d++, addr = next, addr != end); 262c2febafcSKirill A. Shutemov 263c2febafcSKirill A. Shutemov return pages; 264c2febafcSKirill A. Shutemov } 265c2febafcSKirill A. Shutemov 2667da4d641SPeter Zijlstra static unsigned long change_protection_range(struct vm_area_struct *vma, 267c1e6098bSPeter Zijlstra unsigned long addr, unsigned long end, pgprot_t newprot, 2684b10e7d5SMel Gorman int dirty_accountable, int prot_numa) 2691da177e4SLinus Torvalds { 2701da177e4SLinus Torvalds struct mm_struct *mm = vma->vm_mm; 2711da177e4SLinus Torvalds pgd_t *pgd; 2721da177e4SLinus Torvalds unsigned long next; 2731da177e4SLinus Torvalds unsigned long start = addr; 2747da4d641SPeter Zijlstra unsigned long pages = 0; 2751da177e4SLinus Torvalds 2761da177e4SLinus Torvalds BUG_ON(addr >= end); 2771da177e4SLinus Torvalds pgd = pgd_offset(mm, addr); 2781da177e4SLinus Torvalds flush_cache_range(vma, addr, end); 27916af97dcSNadav Amit inc_tlb_flush_pending(mm); 2801da177e4SLinus Torvalds do { 2811da177e4SLinus Torvalds next = pgd_addr_end(addr, end); 2821da177e4SLinus Torvalds if (pgd_none_or_clear_bad(pgd)) 2831da177e4SLinus Torvalds continue; 284c2febafcSKirill A. Shutemov pages += change_p4d_range(vma, pgd, addr, next, newprot, 2854b10e7d5SMel Gorman dirty_accountable, prot_numa); 2861da177e4SLinus Torvalds } while (pgd++, addr = next, addr != end); 2877da4d641SPeter Zijlstra 2881233d588SIngo Molnar /* Only flush the TLB if we actually modified any entries: */ 2891233d588SIngo Molnar if (pages) 2901da177e4SLinus Torvalds flush_tlb_range(vma, start, end); 29116af97dcSNadav Amit dec_tlb_flush_pending(mm); 2927da4d641SPeter Zijlstra 2937da4d641SPeter Zijlstra return pages; 2947da4d641SPeter Zijlstra } 2957da4d641SPeter Zijlstra 2967da4d641SPeter Zijlstra unsigned long change_protection(struct vm_area_struct *vma, unsigned long start, 2977da4d641SPeter Zijlstra unsigned long end, pgprot_t newprot, 2984b10e7d5SMel Gorman int dirty_accountable, int prot_numa) 2997da4d641SPeter Zijlstra { 3007da4d641SPeter Zijlstra unsigned long pages; 3017da4d641SPeter Zijlstra 3027da4d641SPeter Zijlstra if (is_vm_hugetlb_page(vma)) 3037da4d641SPeter Zijlstra pages = hugetlb_change_protection(vma, start, end, newprot); 3047da4d641SPeter Zijlstra else 3054b10e7d5SMel Gorman pages = change_protection_range(vma, start, end, newprot, dirty_accountable, prot_numa); 3067da4d641SPeter Zijlstra 3077da4d641SPeter Zijlstra return pages; 3081da177e4SLinus Torvalds } 3091da177e4SLinus Torvalds 31042e4089cSAndi Kleen static int prot_none_pte_entry(pte_t *pte, unsigned long addr, 31142e4089cSAndi Kleen unsigned long next, struct mm_walk *walk) 31242e4089cSAndi Kleen { 31342e4089cSAndi Kleen return pfn_modify_allowed(pte_pfn(*pte), *(pgprot_t *)(walk->private)) ? 31442e4089cSAndi Kleen 0 : -EACCES; 31542e4089cSAndi Kleen } 31642e4089cSAndi Kleen 31742e4089cSAndi Kleen static int prot_none_hugetlb_entry(pte_t *pte, unsigned long hmask, 31842e4089cSAndi Kleen unsigned long addr, unsigned long next, 31942e4089cSAndi Kleen struct mm_walk *walk) 32042e4089cSAndi Kleen { 32142e4089cSAndi Kleen return pfn_modify_allowed(pte_pfn(*pte), *(pgprot_t *)(walk->private)) ? 32242e4089cSAndi Kleen 0 : -EACCES; 32342e4089cSAndi Kleen } 32442e4089cSAndi Kleen 32542e4089cSAndi Kleen static int prot_none_test(unsigned long addr, unsigned long next, 32642e4089cSAndi Kleen struct mm_walk *walk) 32742e4089cSAndi Kleen { 32842e4089cSAndi Kleen return 0; 32942e4089cSAndi Kleen } 33042e4089cSAndi Kleen 33142e4089cSAndi Kleen static int prot_none_walk(struct vm_area_struct *vma, unsigned long start, 33242e4089cSAndi Kleen unsigned long end, unsigned long newflags) 33342e4089cSAndi Kleen { 33442e4089cSAndi Kleen pgprot_t new_pgprot = vm_get_page_prot(newflags); 33542e4089cSAndi Kleen struct mm_walk prot_none_walk = { 33642e4089cSAndi Kleen .pte_entry = prot_none_pte_entry, 33742e4089cSAndi Kleen .hugetlb_entry = prot_none_hugetlb_entry, 33842e4089cSAndi Kleen .test_walk = prot_none_test, 33942e4089cSAndi Kleen .mm = current->mm, 34042e4089cSAndi Kleen .private = &new_pgprot, 34142e4089cSAndi Kleen }; 34242e4089cSAndi Kleen 34342e4089cSAndi Kleen return walk_page_range(start, end, &prot_none_walk); 34442e4089cSAndi Kleen } 34542e4089cSAndi Kleen 346b6a2fea3SOllie Wild int 3471da177e4SLinus Torvalds mprotect_fixup(struct vm_area_struct *vma, struct vm_area_struct **pprev, 3481da177e4SLinus Torvalds unsigned long start, unsigned long end, unsigned long newflags) 3491da177e4SLinus Torvalds { 3501da177e4SLinus Torvalds struct mm_struct *mm = vma->vm_mm; 3511da177e4SLinus Torvalds unsigned long oldflags = vma->vm_flags; 3521da177e4SLinus Torvalds long nrpages = (end - start) >> PAGE_SHIFT; 3531da177e4SLinus Torvalds unsigned long charged = 0; 3541da177e4SLinus Torvalds pgoff_t pgoff; 3551da177e4SLinus Torvalds int error; 356c1e6098bSPeter Zijlstra int dirty_accountable = 0; 3571da177e4SLinus Torvalds 3581da177e4SLinus Torvalds if (newflags == oldflags) { 3591da177e4SLinus Torvalds *pprev = vma; 3601da177e4SLinus Torvalds return 0; 3611da177e4SLinus Torvalds } 3621da177e4SLinus Torvalds 3631da177e4SLinus Torvalds /* 36442e4089cSAndi Kleen * Do PROT_NONE PFN permission checks here when we can still 36542e4089cSAndi Kleen * bail out without undoing a lot of state. This is a rather 36642e4089cSAndi Kleen * uncommon case, so doesn't need to be very optimized. 36742e4089cSAndi Kleen */ 36842e4089cSAndi Kleen if (arch_has_pfn_modify_check() && 36942e4089cSAndi Kleen (vma->vm_flags & (VM_PFNMAP|VM_MIXEDMAP)) && 37042e4089cSAndi Kleen (newflags & (VM_READ|VM_WRITE|VM_EXEC)) == 0) { 37142e4089cSAndi Kleen error = prot_none_walk(vma, start, end, newflags); 37242e4089cSAndi Kleen if (error) 37342e4089cSAndi Kleen return error; 37442e4089cSAndi Kleen } 37542e4089cSAndi Kleen 37642e4089cSAndi Kleen /* 3771da177e4SLinus Torvalds * If we make a private mapping writable we increase our commit; 3781da177e4SLinus Torvalds * but (without finer accounting) cannot reduce our commit if we 3795a6fe125SMel Gorman * make it unwritable again. hugetlb mapping were accounted for 3805a6fe125SMel Gorman * even if read-only so there is no need to account for them here 3811da177e4SLinus Torvalds */ 3821da177e4SLinus Torvalds if (newflags & VM_WRITE) { 38384638335SKonstantin Khlebnikov /* Check space limits when area turns into data. */ 38484638335SKonstantin Khlebnikov if (!may_expand_vm(mm, newflags, nrpages) && 38584638335SKonstantin Khlebnikov may_expand_vm(mm, oldflags, nrpages)) 38684638335SKonstantin Khlebnikov return -ENOMEM; 3875a6fe125SMel Gorman if (!(oldflags & (VM_ACCOUNT|VM_WRITE|VM_HUGETLB| 388cdfd4325SAndy Whitcroft VM_SHARED|VM_NORESERVE))) { 3891da177e4SLinus Torvalds charged = nrpages; 390191c5424SAl Viro if (security_vm_enough_memory_mm(mm, charged)) 3911da177e4SLinus Torvalds return -ENOMEM; 3921da177e4SLinus Torvalds newflags |= VM_ACCOUNT; 3931da177e4SLinus Torvalds } 3941da177e4SLinus Torvalds } 3951da177e4SLinus Torvalds 3961da177e4SLinus Torvalds /* 3971da177e4SLinus Torvalds * First try to merge with previous and/or next vma. 3981da177e4SLinus Torvalds */ 3991da177e4SLinus Torvalds pgoff = vma->vm_pgoff + ((start - vma->vm_start) >> PAGE_SHIFT); 4001da177e4SLinus Torvalds *pprev = vma_merge(mm, *pprev, start, end, newflags, 40119a809afSAndrea Arcangeli vma->anon_vma, vma->vm_file, pgoff, vma_policy(vma), 40219a809afSAndrea Arcangeli vma->vm_userfaultfd_ctx); 4031da177e4SLinus Torvalds if (*pprev) { 4041da177e4SLinus Torvalds vma = *pprev; 405e86f15eeSAndrea Arcangeli VM_WARN_ON((vma->vm_flags ^ newflags) & ~VM_SOFTDIRTY); 4061da177e4SLinus Torvalds goto success; 4071da177e4SLinus Torvalds } 4081da177e4SLinus Torvalds 4091da177e4SLinus Torvalds *pprev = vma; 4101da177e4SLinus Torvalds 4111da177e4SLinus Torvalds if (start != vma->vm_start) { 4121da177e4SLinus Torvalds error = split_vma(mm, vma, start, 1); 4131da177e4SLinus Torvalds if (error) 4141da177e4SLinus Torvalds goto fail; 4151da177e4SLinus Torvalds } 4161da177e4SLinus Torvalds 4171da177e4SLinus Torvalds if (end != vma->vm_end) { 4181da177e4SLinus Torvalds error = split_vma(mm, vma, end, 0); 4191da177e4SLinus Torvalds if (error) 4201da177e4SLinus Torvalds goto fail; 4211da177e4SLinus Torvalds } 4221da177e4SLinus Torvalds 4231da177e4SLinus Torvalds success: 4241da177e4SLinus Torvalds /* 4251da177e4SLinus Torvalds * vm_flags and vm_page_prot are protected by the mmap_sem 4261da177e4SLinus Torvalds * held in write mode. 4271da177e4SLinus Torvalds */ 4281da177e4SLinus Torvalds vma->vm_flags = newflags; 4296d2329f8SAndrea Arcangeli dirty_accountable = vma_wants_writenotify(vma, vma->vm_page_prot); 43064e45507SPeter Feiner vma_set_page_prot(vma); 431d08b3851SPeter Zijlstra 4327d12efaeSAndrew Morton change_protection(vma, start, end, vma->vm_page_prot, 4337d12efaeSAndrew Morton dirty_accountable, 0); 4347da4d641SPeter Zijlstra 43536f88188SKirill A. Shutemov /* 43636f88188SKirill A. Shutemov * Private VM_LOCKED VMA becoming writable: trigger COW to avoid major 43736f88188SKirill A. Shutemov * fault on access. 43836f88188SKirill A. Shutemov */ 43936f88188SKirill A. Shutemov if ((oldflags & (VM_WRITE | VM_SHARED | VM_LOCKED)) == VM_LOCKED && 44036f88188SKirill A. Shutemov (newflags & VM_WRITE)) { 44136f88188SKirill A. Shutemov populate_vma_page_range(vma, start, end, NULL); 44236f88188SKirill A. Shutemov } 44336f88188SKirill A. Shutemov 44484638335SKonstantin Khlebnikov vm_stat_account(mm, oldflags, -nrpages); 44584638335SKonstantin Khlebnikov vm_stat_account(mm, newflags, nrpages); 44663bfd738SPekka Enberg perf_event_mmap(vma); 4471da177e4SLinus Torvalds return 0; 4481da177e4SLinus Torvalds 4491da177e4SLinus Torvalds fail: 4501da177e4SLinus Torvalds vm_unacct_memory(charged); 4511da177e4SLinus Torvalds return error; 4521da177e4SLinus Torvalds } 4531da177e4SLinus Torvalds 4547d06d9c9SDave Hansen /* 4557d06d9c9SDave Hansen * pkey==-1 when doing a legacy mprotect() 4567d06d9c9SDave Hansen */ 4577d06d9c9SDave Hansen static int do_mprotect_pkey(unsigned long start, size_t len, 4587d06d9c9SDave Hansen unsigned long prot, int pkey) 4591da177e4SLinus Torvalds { 46062b5f7d0SDave Hansen unsigned long nstart, end, tmp, reqprot; 4611da177e4SLinus Torvalds struct vm_area_struct *vma, *prev; 4621da177e4SLinus Torvalds int error = -EINVAL; 4631da177e4SLinus Torvalds const int grows = prot & (PROT_GROWSDOWN|PROT_GROWSUP); 464f138556dSPiotr Kwapulinski const bool rier = (current->personality & READ_IMPLIES_EXEC) && 465f138556dSPiotr Kwapulinski (prot & PROT_READ); 466f138556dSPiotr Kwapulinski 4671da177e4SLinus Torvalds prot &= ~(PROT_GROWSDOWN|PROT_GROWSUP); 4681da177e4SLinus Torvalds if (grows == (PROT_GROWSDOWN|PROT_GROWSUP)) /* can't be both */ 4691da177e4SLinus Torvalds return -EINVAL; 4701da177e4SLinus Torvalds 4711da177e4SLinus Torvalds if (start & ~PAGE_MASK) 4721da177e4SLinus Torvalds return -EINVAL; 4731da177e4SLinus Torvalds if (!len) 4741da177e4SLinus Torvalds return 0; 4751da177e4SLinus Torvalds len = PAGE_ALIGN(len); 4761da177e4SLinus Torvalds end = start + len; 4771da177e4SLinus Torvalds if (end <= start) 4781da177e4SLinus Torvalds return -ENOMEM; 4799035cf9aSKhalid Aziz if (!arch_validate_prot(prot, start)) 4801da177e4SLinus Torvalds return -EINVAL; 4811da177e4SLinus Torvalds 4821da177e4SLinus Torvalds reqprot = prot; 4831da177e4SLinus Torvalds 484dc0ef0dfSMichal Hocko if (down_write_killable(¤t->mm->mmap_sem)) 485dc0ef0dfSMichal Hocko return -EINTR; 4861da177e4SLinus Torvalds 487e8c24d3aSDave Hansen /* 488e8c24d3aSDave Hansen * If userspace did not allocate the pkey, do not let 489e8c24d3aSDave Hansen * them use it here. 490e8c24d3aSDave Hansen */ 491e8c24d3aSDave Hansen error = -EINVAL; 492e8c24d3aSDave Hansen if ((pkey != -1) && !mm_pkey_is_allocated(current->mm, pkey)) 493e8c24d3aSDave Hansen goto out; 494e8c24d3aSDave Hansen 495097d5910SLinus Torvalds vma = find_vma(current->mm, start); 4961da177e4SLinus Torvalds error = -ENOMEM; 4971da177e4SLinus Torvalds if (!vma) 4981da177e4SLinus Torvalds goto out; 499097d5910SLinus Torvalds prev = vma->vm_prev; 5001da177e4SLinus Torvalds if (unlikely(grows & PROT_GROWSDOWN)) { 5011da177e4SLinus Torvalds if (vma->vm_start >= end) 5021da177e4SLinus Torvalds goto out; 5031da177e4SLinus Torvalds start = vma->vm_start; 5041da177e4SLinus Torvalds error = -EINVAL; 5051da177e4SLinus Torvalds if (!(vma->vm_flags & VM_GROWSDOWN)) 5061da177e4SLinus Torvalds goto out; 5077d12efaeSAndrew Morton } else { 5081da177e4SLinus Torvalds if (vma->vm_start > start) 5091da177e4SLinus Torvalds goto out; 5101da177e4SLinus Torvalds if (unlikely(grows & PROT_GROWSUP)) { 5111da177e4SLinus Torvalds end = vma->vm_end; 5121da177e4SLinus Torvalds error = -EINVAL; 5131da177e4SLinus Torvalds if (!(vma->vm_flags & VM_GROWSUP)) 5141da177e4SLinus Torvalds goto out; 5151da177e4SLinus Torvalds } 5161da177e4SLinus Torvalds } 5171da177e4SLinus Torvalds if (start > vma->vm_start) 5181da177e4SLinus Torvalds prev = vma; 5191da177e4SLinus Torvalds 5201da177e4SLinus Torvalds for (nstart = start ; ; ) { 521a8502b67SDave Hansen unsigned long mask_off_old_flags; 5221da177e4SLinus Torvalds unsigned long newflags; 5237d06d9c9SDave Hansen int new_vma_pkey; 5241da177e4SLinus Torvalds 5251da177e4SLinus Torvalds /* Here we know that vma->vm_start <= nstart < vma->vm_end. */ 5261da177e4SLinus Torvalds 527f138556dSPiotr Kwapulinski /* Does the application expect PROT_READ to imply PROT_EXEC */ 528f138556dSPiotr Kwapulinski if (rier && (vma->vm_flags & VM_MAYEXEC)) 529f138556dSPiotr Kwapulinski prot |= PROT_EXEC; 530f138556dSPiotr Kwapulinski 531a8502b67SDave Hansen /* 532a8502b67SDave Hansen * Each mprotect() call explicitly passes r/w/x permissions. 533a8502b67SDave Hansen * If a permission is not passed to mprotect(), it must be 534a8502b67SDave Hansen * cleared from the VMA. 535a8502b67SDave Hansen */ 536a8502b67SDave Hansen mask_off_old_flags = VM_READ | VM_WRITE | VM_EXEC | 5372c2d57b5SKhalid Aziz VM_FLAGS_CLEAR; 538a8502b67SDave Hansen 5397d06d9c9SDave Hansen new_vma_pkey = arch_override_mprotect_pkey(vma, prot, pkey); 5407d06d9c9SDave Hansen newflags = calc_vm_prot_bits(prot, new_vma_pkey); 541a8502b67SDave Hansen newflags |= (vma->vm_flags & ~mask_off_old_flags); 5421da177e4SLinus Torvalds 5437e2cff42SPaolo 'Blaisorblade' Giarrusso /* newflags >> 4 shift VM_MAY% in place of VM_% */ 5447e2cff42SPaolo 'Blaisorblade' Giarrusso if ((newflags & ~(newflags >> 4)) & (VM_READ | VM_WRITE | VM_EXEC)) { 5451da177e4SLinus Torvalds error = -EACCES; 5461da177e4SLinus Torvalds goto out; 5471da177e4SLinus Torvalds } 5481da177e4SLinus Torvalds 5491da177e4SLinus Torvalds error = security_file_mprotect(vma, reqprot, prot); 5501da177e4SLinus Torvalds if (error) 5511da177e4SLinus Torvalds goto out; 5521da177e4SLinus Torvalds 5531da177e4SLinus Torvalds tmp = vma->vm_end; 5541da177e4SLinus Torvalds if (tmp > end) 5551da177e4SLinus Torvalds tmp = end; 5561da177e4SLinus Torvalds error = mprotect_fixup(vma, &prev, nstart, tmp, newflags); 5571da177e4SLinus Torvalds if (error) 5581da177e4SLinus Torvalds goto out; 5591da177e4SLinus Torvalds nstart = tmp; 5601da177e4SLinus Torvalds 5611da177e4SLinus Torvalds if (nstart < prev->vm_end) 5621da177e4SLinus Torvalds nstart = prev->vm_end; 5631da177e4SLinus Torvalds if (nstart >= end) 5641da177e4SLinus Torvalds goto out; 5651da177e4SLinus Torvalds 5661da177e4SLinus Torvalds vma = prev->vm_next; 5671da177e4SLinus Torvalds if (!vma || vma->vm_start != nstart) { 5681da177e4SLinus Torvalds error = -ENOMEM; 5691da177e4SLinus Torvalds goto out; 5701da177e4SLinus Torvalds } 571f138556dSPiotr Kwapulinski prot = reqprot; 5721da177e4SLinus Torvalds } 5731da177e4SLinus Torvalds out: 5741da177e4SLinus Torvalds up_write(¤t->mm->mmap_sem); 5751da177e4SLinus Torvalds return error; 5761da177e4SLinus Torvalds } 5777d06d9c9SDave Hansen 5787d06d9c9SDave Hansen SYSCALL_DEFINE3(mprotect, unsigned long, start, size_t, len, 5797d06d9c9SDave Hansen unsigned long, prot) 5807d06d9c9SDave Hansen { 5817d06d9c9SDave Hansen return do_mprotect_pkey(start, len, prot, -1); 5827d06d9c9SDave Hansen } 5837d06d9c9SDave Hansen 584c7142aeaSHeiko Carstens #ifdef CONFIG_ARCH_HAS_PKEYS 585c7142aeaSHeiko Carstens 5867d06d9c9SDave Hansen SYSCALL_DEFINE4(pkey_mprotect, unsigned long, start, size_t, len, 5877d06d9c9SDave Hansen unsigned long, prot, int, pkey) 5887d06d9c9SDave Hansen { 5897d06d9c9SDave Hansen return do_mprotect_pkey(start, len, prot, pkey); 5907d06d9c9SDave Hansen } 591e8c24d3aSDave Hansen 592e8c24d3aSDave Hansen SYSCALL_DEFINE2(pkey_alloc, unsigned long, flags, unsigned long, init_val) 593e8c24d3aSDave Hansen { 594e8c24d3aSDave Hansen int pkey; 595e8c24d3aSDave Hansen int ret; 596e8c24d3aSDave Hansen 597e8c24d3aSDave Hansen /* No flags supported yet. */ 598e8c24d3aSDave Hansen if (flags) 599e8c24d3aSDave Hansen return -EINVAL; 600e8c24d3aSDave Hansen /* check for unsupported init values */ 601e8c24d3aSDave Hansen if (init_val & ~PKEY_ACCESS_MASK) 602e8c24d3aSDave Hansen return -EINVAL; 603e8c24d3aSDave Hansen 604e8c24d3aSDave Hansen down_write(¤t->mm->mmap_sem); 605e8c24d3aSDave Hansen pkey = mm_pkey_alloc(current->mm); 606e8c24d3aSDave Hansen 607e8c24d3aSDave Hansen ret = -ENOSPC; 608e8c24d3aSDave Hansen if (pkey == -1) 609e8c24d3aSDave Hansen goto out; 610e8c24d3aSDave Hansen 611e8c24d3aSDave Hansen ret = arch_set_user_pkey_access(current, pkey, init_val); 612e8c24d3aSDave Hansen if (ret) { 613e8c24d3aSDave Hansen mm_pkey_free(current->mm, pkey); 614e8c24d3aSDave Hansen goto out; 615e8c24d3aSDave Hansen } 616e8c24d3aSDave Hansen ret = pkey; 617e8c24d3aSDave Hansen out: 618e8c24d3aSDave Hansen up_write(¤t->mm->mmap_sem); 619e8c24d3aSDave Hansen return ret; 620e8c24d3aSDave Hansen } 621e8c24d3aSDave Hansen 622e8c24d3aSDave Hansen SYSCALL_DEFINE1(pkey_free, int, pkey) 623e8c24d3aSDave Hansen { 624e8c24d3aSDave Hansen int ret; 625e8c24d3aSDave Hansen 626e8c24d3aSDave Hansen down_write(¤t->mm->mmap_sem); 627e8c24d3aSDave Hansen ret = mm_pkey_free(current->mm, pkey); 628e8c24d3aSDave Hansen up_write(¤t->mm->mmap_sem); 629e8c24d3aSDave Hansen 630e8c24d3aSDave Hansen /* 631e8c24d3aSDave Hansen * We could provie warnings or errors if any VMA still 632e8c24d3aSDave Hansen * has the pkey set here. 633e8c24d3aSDave Hansen */ 634e8c24d3aSDave Hansen return ret; 635e8c24d3aSDave Hansen } 636c7142aeaSHeiko Carstens 637c7142aeaSHeiko Carstens #endif /* CONFIG_ARCH_HAS_PKEYS */ 638