1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0 21da177e4SLinus Torvalds /* 31da177e4SLinus Torvalds * mm/mprotect.c 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * (C) Copyright 1994 Linus Torvalds 61da177e4SLinus Torvalds * (C) Copyright 2002 Christoph Hellwig 71da177e4SLinus Torvalds * 8046c6884SAlan Cox * Address space accounting code <alan@lxorguk.ukuu.org.uk> 91da177e4SLinus Torvalds * (C) Copyright 2002 Red Hat Inc, All Rights Reserved 101da177e4SLinus Torvalds */ 111da177e4SLinus Torvalds 12a520110eSChristoph Hellwig #include <linux/pagewalk.h> 131da177e4SLinus Torvalds #include <linux/hugetlb.h> 141da177e4SLinus Torvalds #include <linux/shm.h> 151da177e4SLinus Torvalds #include <linux/mman.h> 161da177e4SLinus Torvalds #include <linux/fs.h> 171da177e4SLinus Torvalds #include <linux/highmem.h> 181da177e4SLinus Torvalds #include <linux/security.h> 191da177e4SLinus Torvalds #include <linux/mempolicy.h> 201da177e4SLinus Torvalds #include <linux/personality.h> 211da177e4SLinus Torvalds #include <linux/syscalls.h> 220697212aSChristoph Lameter #include <linux/swap.h> 230697212aSChristoph Lameter #include <linux/swapops.h> 24cddb8a5cSAndrea Arcangeli #include <linux/mmu_notifier.h> 2564cdd548SKOSAKI Motohiro #include <linux/migrate.h> 26cdd6c482SIngo Molnar #include <linux/perf_event.h> 27e8c24d3aSDave Hansen #include <linux/pkeys.h> 2864a9a34eSMel Gorman #include <linux/ksm.h> 297c0f6ba6SLinus Torvalds #include <linux/uaccess.h> 3009a913a7SMel Gorman #include <linux/mm_inline.h> 311da177e4SLinus Torvalds #include <asm/pgtable.h> 321da177e4SLinus Torvalds #include <asm/cacheflush.h> 33e8c24d3aSDave Hansen #include <asm/mmu_context.h> 341da177e4SLinus Torvalds #include <asm/tlbflush.h> 351da177e4SLinus Torvalds 3636f88188SKirill A. Shutemov #include "internal.h" 3736f88188SKirill A. Shutemov 384b10e7d5SMel Gorman static unsigned long change_pte_range(struct vm_area_struct *vma, pmd_t *pmd, 39c1e6098bSPeter Zijlstra unsigned long addr, unsigned long end, pgprot_t newprot, 40*58705444SPeter Xu unsigned long cp_flags) 411da177e4SLinus Torvalds { 420697212aSChristoph Lameter pte_t *pte, oldpte; 43705e87c0SHugh Dickins spinlock_t *ptl; 447da4d641SPeter Zijlstra unsigned long pages = 0; 453e321587SAndi Kleen int target_node = NUMA_NO_NODE; 46*58705444SPeter Xu bool dirty_accountable = cp_flags & MM_CP_DIRTY_ACCT; 47*58705444SPeter Xu bool prot_numa = cp_flags & MM_CP_PROT_NUMA; 481da177e4SLinus Torvalds 49175ad4f1SAndrea Arcangeli /* 50175ad4f1SAndrea Arcangeli * Can be called with only the mmap_sem for reading by 51175ad4f1SAndrea Arcangeli * prot_numa so we must check the pmd isn't constantly 52175ad4f1SAndrea Arcangeli * changing from under us from pmd_none to pmd_trans_huge 53175ad4f1SAndrea Arcangeli * and/or the other way around. 54175ad4f1SAndrea Arcangeli */ 55175ad4f1SAndrea Arcangeli if (pmd_trans_unstable(pmd)) 56175ad4f1SAndrea Arcangeli return 0; 57175ad4f1SAndrea Arcangeli 58175ad4f1SAndrea Arcangeli /* 59175ad4f1SAndrea Arcangeli * The pmd points to a regular pte so the pmd can't change 60175ad4f1SAndrea Arcangeli * from under us even if the mmap_sem is only hold for 61175ad4f1SAndrea Arcangeli * reading. 62175ad4f1SAndrea Arcangeli */ 63175ad4f1SAndrea Arcangeli pte = pte_offset_map_lock(vma->vm_mm, pmd, addr, &ptl); 641ad9f620SMel Gorman 653e321587SAndi Kleen /* Get target node for single threaded private VMAs */ 663e321587SAndi Kleen if (prot_numa && !(vma->vm_flags & VM_SHARED) && 673e321587SAndi Kleen atomic_read(&vma->vm_mm->mm_users) == 1) 683e321587SAndi Kleen target_node = numa_node_id(); 693e321587SAndi Kleen 703ea27719SMel Gorman flush_tlb_batched_pending(vma->vm_mm); 716606c3e0SZachary Amsden arch_enter_lazy_mmu_mode(); 721da177e4SLinus Torvalds do { 730697212aSChristoph Lameter oldpte = *pte; 740697212aSChristoph Lameter if (pte_present(oldpte)) { 751da177e4SLinus Torvalds pte_t ptent; 76b191f9b1SMel Gorman bool preserve_write = prot_numa && pte_write(oldpte); 771da177e4SLinus Torvalds 78e944fd67SMel Gorman /* 79e944fd67SMel Gorman * Avoid trapping faults against the zero or KSM 80e944fd67SMel Gorman * pages. See similar comment in change_huge_pmd. 81e944fd67SMel Gorman */ 82e944fd67SMel Gorman if (prot_numa) { 83e944fd67SMel Gorman struct page *page; 84e944fd67SMel Gorman 85a818f536SHuang Ying /* Avoid TLB flush if possible */ 86a818f536SHuang Ying if (pte_protnone(oldpte)) 87a818f536SHuang Ying continue; 88a818f536SHuang Ying 89e944fd67SMel Gorman page = vm_normal_page(vma, addr, oldpte); 90e944fd67SMel Gorman if (!page || PageKsm(page)) 91e944fd67SMel Gorman continue; 9210c1045fSMel Gorman 93859d4adcSHenry Willard /* Also skip shared copy-on-write pages */ 94859d4adcSHenry Willard if (is_cow_mapping(vma->vm_flags) && 95859d4adcSHenry Willard page_mapcount(page) != 1) 96859d4adcSHenry Willard continue; 97859d4adcSHenry Willard 9809a913a7SMel Gorman /* 9909a913a7SMel Gorman * While migration can move some dirty pages, 10009a913a7SMel Gorman * it cannot move them all from MIGRATE_ASYNC 10109a913a7SMel Gorman * context. 10209a913a7SMel Gorman */ 1039de4f22aSHuang Ying if (page_is_file_lru(page) && PageDirty(page)) 10409a913a7SMel Gorman continue; 10509a913a7SMel Gorman 1063e321587SAndi Kleen /* 1073e321587SAndi Kleen * Don't mess with PTEs if page is already on the node 1083e321587SAndi Kleen * a single-threaded process is running on. 1093e321587SAndi Kleen */ 1103e321587SAndi Kleen if (target_node == page_to_nid(page)) 1113e321587SAndi Kleen continue; 112e944fd67SMel Gorman } 113e944fd67SMel Gorman 11404a86453SAneesh Kumar K.V oldpte = ptep_modify_prot_start(vma, addr, pte); 11504a86453SAneesh Kumar K.V ptent = pte_modify(oldpte, newprot); 116b191f9b1SMel Gorman if (preserve_write) 117288bc549SAneesh Kumar K.V ptent = pte_mk_savedwrite(ptent); 1188a0516edSMel Gorman 1198a0516edSMel Gorman /* Avoid taking write faults for known dirty pages */ 12064e45507SPeter Feiner if (dirty_accountable && pte_dirty(ptent) && 12164e45507SPeter Feiner (pte_soft_dirty(ptent) || 1228a0516edSMel Gorman !(vma->vm_flags & VM_SOFTDIRTY))) { 1239d85d586SAneesh Kumar K.V ptent = pte_mkwrite(ptent); 1248a0516edSMel Gorman } 12504a86453SAneesh Kumar K.V ptep_modify_prot_commit(vma, addr, pte, oldpte, ptent); 1264b10e7d5SMel Gorman pages++; 1270661a336SKirill A. Shutemov } else if (IS_ENABLED(CONFIG_MIGRATION)) { 1280697212aSChristoph Lameter swp_entry_t entry = pte_to_swp_entry(oldpte); 1290697212aSChristoph Lameter 1300697212aSChristoph Lameter if (is_write_migration_entry(entry)) { 131c3d16e16SCyrill Gorcunov pte_t newpte; 1320697212aSChristoph Lameter /* 1330697212aSChristoph Lameter * A protection check is difficult so 1340697212aSChristoph Lameter * just be safe and disable write 1350697212aSChristoph Lameter */ 1360697212aSChristoph Lameter make_migration_entry_read(&entry); 137c3d16e16SCyrill Gorcunov newpte = swp_entry_to_pte(entry); 138c3d16e16SCyrill Gorcunov if (pte_swp_soft_dirty(oldpte)) 139c3d16e16SCyrill Gorcunov newpte = pte_swp_mksoft_dirty(newpte); 14094393c78SMike Rapoport set_pte_at(vma->vm_mm, addr, pte, newpte); 141e920e14cSMel Gorman 1427da4d641SPeter Zijlstra pages++; 1430697212aSChristoph Lameter } 1445042db43SJérôme Glisse 1455042db43SJérôme Glisse if (is_write_device_private_entry(entry)) { 1465042db43SJérôme Glisse pte_t newpte; 1475042db43SJérôme Glisse 1485042db43SJérôme Glisse /* 1495042db43SJérôme Glisse * We do not preserve soft-dirtiness. See 1505042db43SJérôme Glisse * copy_one_pte() for explanation. 1515042db43SJérôme Glisse */ 1525042db43SJérôme Glisse make_device_private_entry_read(&entry); 1535042db43SJérôme Glisse newpte = swp_entry_to_pte(entry); 15494393c78SMike Rapoport set_pte_at(vma->vm_mm, addr, pte, newpte); 1555042db43SJérôme Glisse 1565042db43SJérôme Glisse pages++; 1575042db43SJérôme Glisse } 158e920e14cSMel Gorman } 1591da177e4SLinus Torvalds } while (pte++, addr += PAGE_SIZE, addr != end); 1606606c3e0SZachary Amsden arch_leave_lazy_mmu_mode(); 161705e87c0SHugh Dickins pte_unmap_unlock(pte - 1, ptl); 1627da4d641SPeter Zijlstra 1637da4d641SPeter Zijlstra return pages; 1641da177e4SLinus Torvalds } 1651da177e4SLinus Torvalds 1668b272b3cSMel Gorman /* 1678b272b3cSMel Gorman * Used when setting automatic NUMA hinting protection where it is 1688b272b3cSMel Gorman * critical that a numa hinting PMD is not confused with a bad PMD. 1698b272b3cSMel Gorman */ 1708b272b3cSMel Gorman static inline int pmd_none_or_clear_bad_unless_trans_huge(pmd_t *pmd) 1718b272b3cSMel Gorman { 1728b272b3cSMel Gorman pmd_t pmdval = pmd_read_atomic(pmd); 1738b272b3cSMel Gorman 1748b272b3cSMel Gorman /* See pmd_none_or_trans_huge_or_clear_bad for info on barrier */ 1758b272b3cSMel Gorman #ifdef CONFIG_TRANSPARENT_HUGEPAGE 1768b272b3cSMel Gorman barrier(); 1778b272b3cSMel Gorman #endif 1788b272b3cSMel Gorman 1798b272b3cSMel Gorman if (pmd_none(pmdval)) 1808b272b3cSMel Gorman return 1; 1818b272b3cSMel Gorman if (pmd_trans_huge(pmdval)) 1828b272b3cSMel Gorman return 0; 1838b272b3cSMel Gorman if (unlikely(pmd_bad(pmdval))) { 1848b272b3cSMel Gorman pmd_clear_bad(pmd); 1858b272b3cSMel Gorman return 1; 1868b272b3cSMel Gorman } 1878b272b3cSMel Gorman 1888b272b3cSMel Gorman return 0; 1898b272b3cSMel Gorman } 1908b272b3cSMel Gorman 1917d12efaeSAndrew Morton static inline unsigned long change_pmd_range(struct vm_area_struct *vma, 1927d12efaeSAndrew Morton pud_t *pud, unsigned long addr, unsigned long end, 193*58705444SPeter Xu pgprot_t newprot, unsigned long cp_flags) 1941da177e4SLinus Torvalds { 1951da177e4SLinus Torvalds pmd_t *pmd; 1961da177e4SLinus Torvalds unsigned long next; 1977da4d641SPeter Zijlstra unsigned long pages = 0; 19872403b4aSMel Gorman unsigned long nr_huge_updates = 0; 199ac46d4f3SJérôme Glisse struct mmu_notifier_range range; 200ac46d4f3SJérôme Glisse 201ac46d4f3SJérôme Glisse range.start = 0; 2021da177e4SLinus Torvalds 2031da177e4SLinus Torvalds pmd = pmd_offset(pud, addr); 2041da177e4SLinus Torvalds do { 20525cbbef1SMel Gorman unsigned long this_pages; 20625cbbef1SMel Gorman 2071da177e4SLinus Torvalds next = pmd_addr_end(addr, end); 2088b272b3cSMel Gorman 2098b272b3cSMel Gorman /* 2108b272b3cSMel Gorman * Automatic NUMA balancing walks the tables with mmap_sem 2118b272b3cSMel Gorman * held for read. It's possible a parallel update to occur 2128b272b3cSMel Gorman * between pmd_trans_huge() and a pmd_none_or_clear_bad() 2138b272b3cSMel Gorman * check leading to a false positive and clearing. 2148b272b3cSMel Gorman * Hence, it's necessary to atomically read the PMD value 2158b272b3cSMel Gorman * for all the checks. 2168b272b3cSMel Gorman */ 2178b272b3cSMel Gorman if (!is_swap_pmd(*pmd) && !pmd_devmap(*pmd) && 2188b272b3cSMel Gorman pmd_none_or_clear_bad_unless_trans_huge(pmd)) 2194991c09cSAnshuman Khandual goto next; 220a5338093SRik van Riel 221a5338093SRik van Riel /* invoke the mmu notifier if the pmd is populated */ 222ac46d4f3SJérôme Glisse if (!range.start) { 2237269f999SJérôme Glisse mmu_notifier_range_init(&range, 2247269f999SJérôme Glisse MMU_NOTIFY_PROTECTION_VMA, 0, 2256f4f13e8SJérôme Glisse vma, vma->vm_mm, addr, end); 226ac46d4f3SJérôme Glisse mmu_notifier_invalidate_range_start(&range); 227a5338093SRik van Riel } 228a5338093SRik van Riel 22984c3fc4eSZi Yan if (is_swap_pmd(*pmd) || pmd_trans_huge(*pmd) || pmd_devmap(*pmd)) { 2306b9116a6SKirill A. Shutemov if (next - addr != HPAGE_PMD_SIZE) { 231fd60775aSDavid Rientjes __split_huge_pmd(vma, pmd, addr, false, NULL); 2326b9116a6SKirill A. Shutemov } else { 233f123d74aSMel Gorman int nr_ptes = change_huge_pmd(vma, pmd, addr, 234*58705444SPeter Xu newprot, cp_flags); 235f123d74aSMel Gorman 236f123d74aSMel Gorman if (nr_ptes) { 23772403b4aSMel Gorman if (nr_ptes == HPAGE_PMD_NR) { 23872403b4aSMel Gorman pages += HPAGE_PMD_NR; 23972403b4aSMel Gorman nr_huge_updates++; 24072403b4aSMel Gorman } 2411ad9f620SMel Gorman 2421ad9f620SMel Gorman /* huge pmd was handled */ 2434991c09cSAnshuman Khandual goto next; 2447da4d641SPeter Zijlstra } 245f123d74aSMel Gorman } 24688a9ab6eSRik van Riel /* fall through, the trans huge pmd just split */ 247cd7548abSJohannes Weiner } 24825cbbef1SMel Gorman this_pages = change_pte_range(vma, pmd, addr, next, newprot, 249*58705444SPeter Xu cp_flags); 25025cbbef1SMel Gorman pages += this_pages; 2514991c09cSAnshuman Khandual next: 2524991c09cSAnshuman Khandual cond_resched(); 2531da177e4SLinus Torvalds } while (pmd++, addr = next, addr != end); 2547da4d641SPeter Zijlstra 255ac46d4f3SJérôme Glisse if (range.start) 256ac46d4f3SJérôme Glisse mmu_notifier_invalidate_range_end(&range); 257a5338093SRik van Riel 25872403b4aSMel Gorman if (nr_huge_updates) 25972403b4aSMel Gorman count_vm_numa_events(NUMA_HUGE_PTE_UPDATES, nr_huge_updates); 2607da4d641SPeter Zijlstra return pages; 2611da177e4SLinus Torvalds } 2621da177e4SLinus Torvalds 2637d12efaeSAndrew Morton static inline unsigned long change_pud_range(struct vm_area_struct *vma, 264c2febafcSKirill A. Shutemov p4d_t *p4d, unsigned long addr, unsigned long end, 265*58705444SPeter Xu pgprot_t newprot, unsigned long cp_flags) 2661da177e4SLinus Torvalds { 2671da177e4SLinus Torvalds pud_t *pud; 2681da177e4SLinus Torvalds unsigned long next; 2697da4d641SPeter Zijlstra unsigned long pages = 0; 2701da177e4SLinus Torvalds 271c2febafcSKirill A. Shutemov pud = pud_offset(p4d, addr); 2721da177e4SLinus Torvalds do { 2731da177e4SLinus Torvalds next = pud_addr_end(addr, end); 2741da177e4SLinus Torvalds if (pud_none_or_clear_bad(pud)) 2751da177e4SLinus Torvalds continue; 2767da4d641SPeter Zijlstra pages += change_pmd_range(vma, pud, addr, next, newprot, 277*58705444SPeter Xu cp_flags); 2781da177e4SLinus Torvalds } while (pud++, addr = next, addr != end); 2797da4d641SPeter Zijlstra 2807da4d641SPeter Zijlstra return pages; 2811da177e4SLinus Torvalds } 2821da177e4SLinus Torvalds 283c2febafcSKirill A. Shutemov static inline unsigned long change_p4d_range(struct vm_area_struct *vma, 284c2febafcSKirill A. Shutemov pgd_t *pgd, unsigned long addr, unsigned long end, 285*58705444SPeter Xu pgprot_t newprot, unsigned long cp_flags) 286c2febafcSKirill A. Shutemov { 287c2febafcSKirill A. Shutemov p4d_t *p4d; 288c2febafcSKirill A. Shutemov unsigned long next; 289c2febafcSKirill A. Shutemov unsigned long pages = 0; 290c2febafcSKirill A. Shutemov 291c2febafcSKirill A. Shutemov p4d = p4d_offset(pgd, addr); 292c2febafcSKirill A. Shutemov do { 293c2febafcSKirill A. Shutemov next = p4d_addr_end(addr, end); 294c2febafcSKirill A. Shutemov if (p4d_none_or_clear_bad(p4d)) 295c2febafcSKirill A. Shutemov continue; 296c2febafcSKirill A. Shutemov pages += change_pud_range(vma, p4d, addr, next, newprot, 297*58705444SPeter Xu cp_flags); 298c2febafcSKirill A. Shutemov } while (p4d++, addr = next, addr != end); 299c2febafcSKirill A. Shutemov 300c2febafcSKirill A. Shutemov return pages; 301c2febafcSKirill A. Shutemov } 302c2febafcSKirill A. Shutemov 3037da4d641SPeter Zijlstra static unsigned long change_protection_range(struct vm_area_struct *vma, 304c1e6098bSPeter Zijlstra unsigned long addr, unsigned long end, pgprot_t newprot, 305*58705444SPeter Xu unsigned long cp_flags) 3061da177e4SLinus Torvalds { 3071da177e4SLinus Torvalds struct mm_struct *mm = vma->vm_mm; 3081da177e4SLinus Torvalds pgd_t *pgd; 3091da177e4SLinus Torvalds unsigned long next; 3101da177e4SLinus Torvalds unsigned long start = addr; 3117da4d641SPeter Zijlstra unsigned long pages = 0; 3121da177e4SLinus Torvalds 3131da177e4SLinus Torvalds BUG_ON(addr >= end); 3141da177e4SLinus Torvalds pgd = pgd_offset(mm, addr); 3151da177e4SLinus Torvalds flush_cache_range(vma, addr, end); 31616af97dcSNadav Amit inc_tlb_flush_pending(mm); 3171da177e4SLinus Torvalds do { 3181da177e4SLinus Torvalds next = pgd_addr_end(addr, end); 3191da177e4SLinus Torvalds if (pgd_none_or_clear_bad(pgd)) 3201da177e4SLinus Torvalds continue; 321c2febafcSKirill A. Shutemov pages += change_p4d_range(vma, pgd, addr, next, newprot, 322*58705444SPeter Xu cp_flags); 3231da177e4SLinus Torvalds } while (pgd++, addr = next, addr != end); 3247da4d641SPeter Zijlstra 3251233d588SIngo Molnar /* Only flush the TLB if we actually modified any entries: */ 3261233d588SIngo Molnar if (pages) 3271da177e4SLinus Torvalds flush_tlb_range(vma, start, end); 32816af97dcSNadav Amit dec_tlb_flush_pending(mm); 3297da4d641SPeter Zijlstra 3307da4d641SPeter Zijlstra return pages; 3317da4d641SPeter Zijlstra } 3327da4d641SPeter Zijlstra 3337da4d641SPeter Zijlstra unsigned long change_protection(struct vm_area_struct *vma, unsigned long start, 3347da4d641SPeter Zijlstra unsigned long end, pgprot_t newprot, 335*58705444SPeter Xu unsigned long cp_flags) 3367da4d641SPeter Zijlstra { 3377da4d641SPeter Zijlstra unsigned long pages; 3387da4d641SPeter Zijlstra 3397da4d641SPeter Zijlstra if (is_vm_hugetlb_page(vma)) 3407da4d641SPeter Zijlstra pages = hugetlb_change_protection(vma, start, end, newprot); 3417da4d641SPeter Zijlstra else 342*58705444SPeter Xu pages = change_protection_range(vma, start, end, newprot, 343*58705444SPeter Xu cp_flags); 3447da4d641SPeter Zijlstra 3457da4d641SPeter Zijlstra return pages; 3461da177e4SLinus Torvalds } 3471da177e4SLinus Torvalds 34842e4089cSAndi Kleen static int prot_none_pte_entry(pte_t *pte, unsigned long addr, 34942e4089cSAndi Kleen unsigned long next, struct mm_walk *walk) 35042e4089cSAndi Kleen { 35142e4089cSAndi Kleen return pfn_modify_allowed(pte_pfn(*pte), *(pgprot_t *)(walk->private)) ? 35242e4089cSAndi Kleen 0 : -EACCES; 35342e4089cSAndi Kleen } 35442e4089cSAndi Kleen 35542e4089cSAndi Kleen static int prot_none_hugetlb_entry(pte_t *pte, unsigned long hmask, 35642e4089cSAndi Kleen unsigned long addr, unsigned long next, 35742e4089cSAndi Kleen struct mm_walk *walk) 35842e4089cSAndi Kleen { 35942e4089cSAndi Kleen return pfn_modify_allowed(pte_pfn(*pte), *(pgprot_t *)(walk->private)) ? 36042e4089cSAndi Kleen 0 : -EACCES; 36142e4089cSAndi Kleen } 36242e4089cSAndi Kleen 36342e4089cSAndi Kleen static int prot_none_test(unsigned long addr, unsigned long next, 36442e4089cSAndi Kleen struct mm_walk *walk) 36542e4089cSAndi Kleen { 36642e4089cSAndi Kleen return 0; 36742e4089cSAndi Kleen } 36842e4089cSAndi Kleen 3697b86ac33SChristoph Hellwig static const struct mm_walk_ops prot_none_walk_ops = { 37042e4089cSAndi Kleen .pte_entry = prot_none_pte_entry, 37142e4089cSAndi Kleen .hugetlb_entry = prot_none_hugetlb_entry, 37242e4089cSAndi Kleen .test_walk = prot_none_test, 37342e4089cSAndi Kleen }; 37442e4089cSAndi Kleen 375b6a2fea3SOllie Wild int 3761da177e4SLinus Torvalds mprotect_fixup(struct vm_area_struct *vma, struct vm_area_struct **pprev, 3771da177e4SLinus Torvalds unsigned long start, unsigned long end, unsigned long newflags) 3781da177e4SLinus Torvalds { 3791da177e4SLinus Torvalds struct mm_struct *mm = vma->vm_mm; 3801da177e4SLinus Torvalds unsigned long oldflags = vma->vm_flags; 3811da177e4SLinus Torvalds long nrpages = (end - start) >> PAGE_SHIFT; 3821da177e4SLinus Torvalds unsigned long charged = 0; 3831da177e4SLinus Torvalds pgoff_t pgoff; 3841da177e4SLinus Torvalds int error; 385c1e6098bSPeter Zijlstra int dirty_accountable = 0; 3861da177e4SLinus Torvalds 3871da177e4SLinus Torvalds if (newflags == oldflags) { 3881da177e4SLinus Torvalds *pprev = vma; 3891da177e4SLinus Torvalds return 0; 3901da177e4SLinus Torvalds } 3911da177e4SLinus Torvalds 3921da177e4SLinus Torvalds /* 39342e4089cSAndi Kleen * Do PROT_NONE PFN permission checks here when we can still 39442e4089cSAndi Kleen * bail out without undoing a lot of state. This is a rather 39542e4089cSAndi Kleen * uncommon case, so doesn't need to be very optimized. 39642e4089cSAndi Kleen */ 39742e4089cSAndi Kleen if (arch_has_pfn_modify_check() && 39842e4089cSAndi Kleen (vma->vm_flags & (VM_PFNMAP|VM_MIXEDMAP)) && 39942e4089cSAndi Kleen (newflags & (VM_READ|VM_WRITE|VM_EXEC)) == 0) { 4007b86ac33SChristoph Hellwig pgprot_t new_pgprot = vm_get_page_prot(newflags); 4017b86ac33SChristoph Hellwig 4027b86ac33SChristoph Hellwig error = walk_page_range(current->mm, start, end, 4037b86ac33SChristoph Hellwig &prot_none_walk_ops, &new_pgprot); 40442e4089cSAndi Kleen if (error) 40542e4089cSAndi Kleen return error; 40642e4089cSAndi Kleen } 40742e4089cSAndi Kleen 40842e4089cSAndi Kleen /* 4091da177e4SLinus Torvalds * If we make a private mapping writable we increase our commit; 4101da177e4SLinus Torvalds * but (without finer accounting) cannot reduce our commit if we 4115a6fe125SMel Gorman * make it unwritable again. hugetlb mapping were accounted for 4125a6fe125SMel Gorman * even if read-only so there is no need to account for them here 4131da177e4SLinus Torvalds */ 4141da177e4SLinus Torvalds if (newflags & VM_WRITE) { 41584638335SKonstantin Khlebnikov /* Check space limits when area turns into data. */ 41684638335SKonstantin Khlebnikov if (!may_expand_vm(mm, newflags, nrpages) && 41784638335SKonstantin Khlebnikov may_expand_vm(mm, oldflags, nrpages)) 41884638335SKonstantin Khlebnikov return -ENOMEM; 4195a6fe125SMel Gorman if (!(oldflags & (VM_ACCOUNT|VM_WRITE|VM_HUGETLB| 420cdfd4325SAndy Whitcroft VM_SHARED|VM_NORESERVE))) { 4211da177e4SLinus Torvalds charged = nrpages; 422191c5424SAl Viro if (security_vm_enough_memory_mm(mm, charged)) 4231da177e4SLinus Torvalds return -ENOMEM; 4241da177e4SLinus Torvalds newflags |= VM_ACCOUNT; 4251da177e4SLinus Torvalds } 4261da177e4SLinus Torvalds } 4271da177e4SLinus Torvalds 4281da177e4SLinus Torvalds /* 4291da177e4SLinus Torvalds * First try to merge with previous and/or next vma. 4301da177e4SLinus Torvalds */ 4311da177e4SLinus Torvalds pgoff = vma->vm_pgoff + ((start - vma->vm_start) >> PAGE_SHIFT); 4321da177e4SLinus Torvalds *pprev = vma_merge(mm, *pprev, start, end, newflags, 43319a809afSAndrea Arcangeli vma->anon_vma, vma->vm_file, pgoff, vma_policy(vma), 43419a809afSAndrea Arcangeli vma->vm_userfaultfd_ctx); 4351da177e4SLinus Torvalds if (*pprev) { 4361da177e4SLinus Torvalds vma = *pprev; 437e86f15eeSAndrea Arcangeli VM_WARN_ON((vma->vm_flags ^ newflags) & ~VM_SOFTDIRTY); 4381da177e4SLinus Torvalds goto success; 4391da177e4SLinus Torvalds } 4401da177e4SLinus Torvalds 4411da177e4SLinus Torvalds *pprev = vma; 4421da177e4SLinus Torvalds 4431da177e4SLinus Torvalds if (start != vma->vm_start) { 4441da177e4SLinus Torvalds error = split_vma(mm, vma, start, 1); 4451da177e4SLinus Torvalds if (error) 4461da177e4SLinus Torvalds goto fail; 4471da177e4SLinus Torvalds } 4481da177e4SLinus Torvalds 4491da177e4SLinus Torvalds if (end != vma->vm_end) { 4501da177e4SLinus Torvalds error = split_vma(mm, vma, end, 0); 4511da177e4SLinus Torvalds if (error) 4521da177e4SLinus Torvalds goto fail; 4531da177e4SLinus Torvalds } 4541da177e4SLinus Torvalds 4551da177e4SLinus Torvalds success: 4561da177e4SLinus Torvalds /* 4571da177e4SLinus Torvalds * vm_flags and vm_page_prot are protected by the mmap_sem 4581da177e4SLinus Torvalds * held in write mode. 4591da177e4SLinus Torvalds */ 4601da177e4SLinus Torvalds vma->vm_flags = newflags; 4616d2329f8SAndrea Arcangeli dirty_accountable = vma_wants_writenotify(vma, vma->vm_page_prot); 46264e45507SPeter Feiner vma_set_page_prot(vma); 463d08b3851SPeter Zijlstra 4647d12efaeSAndrew Morton change_protection(vma, start, end, vma->vm_page_prot, 465*58705444SPeter Xu dirty_accountable ? MM_CP_DIRTY_ACCT : 0); 4667da4d641SPeter Zijlstra 46736f88188SKirill A. Shutemov /* 46836f88188SKirill A. Shutemov * Private VM_LOCKED VMA becoming writable: trigger COW to avoid major 46936f88188SKirill A. Shutemov * fault on access. 47036f88188SKirill A. Shutemov */ 47136f88188SKirill A. Shutemov if ((oldflags & (VM_WRITE | VM_SHARED | VM_LOCKED)) == VM_LOCKED && 47236f88188SKirill A. Shutemov (newflags & VM_WRITE)) { 47336f88188SKirill A. Shutemov populate_vma_page_range(vma, start, end, NULL); 47436f88188SKirill A. Shutemov } 47536f88188SKirill A. Shutemov 47684638335SKonstantin Khlebnikov vm_stat_account(mm, oldflags, -nrpages); 47784638335SKonstantin Khlebnikov vm_stat_account(mm, newflags, nrpages); 47863bfd738SPekka Enberg perf_event_mmap(vma); 4791da177e4SLinus Torvalds return 0; 4801da177e4SLinus Torvalds 4811da177e4SLinus Torvalds fail: 4821da177e4SLinus Torvalds vm_unacct_memory(charged); 4831da177e4SLinus Torvalds return error; 4841da177e4SLinus Torvalds } 4851da177e4SLinus Torvalds 4867d06d9c9SDave Hansen /* 4877d06d9c9SDave Hansen * pkey==-1 when doing a legacy mprotect() 4887d06d9c9SDave Hansen */ 4897d06d9c9SDave Hansen static int do_mprotect_pkey(unsigned long start, size_t len, 4907d06d9c9SDave Hansen unsigned long prot, int pkey) 4911da177e4SLinus Torvalds { 49262b5f7d0SDave Hansen unsigned long nstart, end, tmp, reqprot; 4931da177e4SLinus Torvalds struct vm_area_struct *vma, *prev; 4941da177e4SLinus Torvalds int error = -EINVAL; 4951da177e4SLinus Torvalds const int grows = prot & (PROT_GROWSDOWN|PROT_GROWSUP); 496f138556dSPiotr Kwapulinski const bool rier = (current->personality & READ_IMPLIES_EXEC) && 497f138556dSPiotr Kwapulinski (prot & PROT_READ); 498f138556dSPiotr Kwapulinski 499057d3389SAndrey Konovalov start = untagged_addr(start); 500057d3389SAndrey Konovalov 5011da177e4SLinus Torvalds prot &= ~(PROT_GROWSDOWN|PROT_GROWSUP); 5021da177e4SLinus Torvalds if (grows == (PROT_GROWSDOWN|PROT_GROWSUP)) /* can't be both */ 5031da177e4SLinus Torvalds return -EINVAL; 5041da177e4SLinus Torvalds 5051da177e4SLinus Torvalds if (start & ~PAGE_MASK) 5061da177e4SLinus Torvalds return -EINVAL; 5071da177e4SLinus Torvalds if (!len) 5081da177e4SLinus Torvalds return 0; 5091da177e4SLinus Torvalds len = PAGE_ALIGN(len); 5101da177e4SLinus Torvalds end = start + len; 5111da177e4SLinus Torvalds if (end <= start) 5121da177e4SLinus Torvalds return -ENOMEM; 5139035cf9aSKhalid Aziz if (!arch_validate_prot(prot, start)) 5141da177e4SLinus Torvalds return -EINVAL; 5151da177e4SLinus Torvalds 5161da177e4SLinus Torvalds reqprot = prot; 5171da177e4SLinus Torvalds 518dc0ef0dfSMichal Hocko if (down_write_killable(¤t->mm->mmap_sem)) 519dc0ef0dfSMichal Hocko return -EINTR; 5201da177e4SLinus Torvalds 521e8c24d3aSDave Hansen /* 522e8c24d3aSDave Hansen * If userspace did not allocate the pkey, do not let 523e8c24d3aSDave Hansen * them use it here. 524e8c24d3aSDave Hansen */ 525e8c24d3aSDave Hansen error = -EINVAL; 526e8c24d3aSDave Hansen if ((pkey != -1) && !mm_pkey_is_allocated(current->mm, pkey)) 527e8c24d3aSDave Hansen goto out; 528e8c24d3aSDave Hansen 529097d5910SLinus Torvalds vma = find_vma(current->mm, start); 5301da177e4SLinus Torvalds error = -ENOMEM; 5311da177e4SLinus Torvalds if (!vma) 5321da177e4SLinus Torvalds goto out; 533097d5910SLinus Torvalds prev = vma->vm_prev; 5341da177e4SLinus Torvalds if (unlikely(grows & PROT_GROWSDOWN)) { 5351da177e4SLinus Torvalds if (vma->vm_start >= end) 5361da177e4SLinus Torvalds goto out; 5371da177e4SLinus Torvalds start = vma->vm_start; 5381da177e4SLinus Torvalds error = -EINVAL; 5391da177e4SLinus Torvalds if (!(vma->vm_flags & VM_GROWSDOWN)) 5401da177e4SLinus Torvalds goto out; 5417d12efaeSAndrew Morton } else { 5421da177e4SLinus Torvalds if (vma->vm_start > start) 5431da177e4SLinus Torvalds goto out; 5441da177e4SLinus Torvalds if (unlikely(grows & PROT_GROWSUP)) { 5451da177e4SLinus Torvalds end = vma->vm_end; 5461da177e4SLinus Torvalds error = -EINVAL; 5471da177e4SLinus Torvalds if (!(vma->vm_flags & VM_GROWSUP)) 5481da177e4SLinus Torvalds goto out; 5491da177e4SLinus Torvalds } 5501da177e4SLinus Torvalds } 5511da177e4SLinus Torvalds if (start > vma->vm_start) 5521da177e4SLinus Torvalds prev = vma; 5531da177e4SLinus Torvalds 5541da177e4SLinus Torvalds for (nstart = start ; ; ) { 555a8502b67SDave Hansen unsigned long mask_off_old_flags; 5561da177e4SLinus Torvalds unsigned long newflags; 5577d06d9c9SDave Hansen int new_vma_pkey; 5581da177e4SLinus Torvalds 5591da177e4SLinus Torvalds /* Here we know that vma->vm_start <= nstart < vma->vm_end. */ 5601da177e4SLinus Torvalds 561f138556dSPiotr Kwapulinski /* Does the application expect PROT_READ to imply PROT_EXEC */ 562f138556dSPiotr Kwapulinski if (rier && (vma->vm_flags & VM_MAYEXEC)) 563f138556dSPiotr Kwapulinski prot |= PROT_EXEC; 564f138556dSPiotr Kwapulinski 565a8502b67SDave Hansen /* 566a8502b67SDave Hansen * Each mprotect() call explicitly passes r/w/x permissions. 567a8502b67SDave Hansen * If a permission is not passed to mprotect(), it must be 568a8502b67SDave Hansen * cleared from the VMA. 569a8502b67SDave Hansen */ 570a8502b67SDave Hansen mask_off_old_flags = VM_READ | VM_WRITE | VM_EXEC | 5712c2d57b5SKhalid Aziz VM_FLAGS_CLEAR; 572a8502b67SDave Hansen 5737d06d9c9SDave Hansen new_vma_pkey = arch_override_mprotect_pkey(vma, prot, pkey); 5747d06d9c9SDave Hansen newflags = calc_vm_prot_bits(prot, new_vma_pkey); 575a8502b67SDave Hansen newflags |= (vma->vm_flags & ~mask_off_old_flags); 5761da177e4SLinus Torvalds 5777e2cff42SPaolo 'Blaisorblade' Giarrusso /* newflags >> 4 shift VM_MAY% in place of VM_% */ 5787e2cff42SPaolo 'Blaisorblade' Giarrusso if ((newflags & ~(newflags >> 4)) & (VM_READ | VM_WRITE | VM_EXEC)) { 5791da177e4SLinus Torvalds error = -EACCES; 5801da177e4SLinus Torvalds goto out; 5811da177e4SLinus Torvalds } 5821da177e4SLinus Torvalds 5831da177e4SLinus Torvalds error = security_file_mprotect(vma, reqprot, prot); 5841da177e4SLinus Torvalds if (error) 5851da177e4SLinus Torvalds goto out; 5861da177e4SLinus Torvalds 5871da177e4SLinus Torvalds tmp = vma->vm_end; 5881da177e4SLinus Torvalds if (tmp > end) 5891da177e4SLinus Torvalds tmp = end; 5901da177e4SLinus Torvalds error = mprotect_fixup(vma, &prev, nstart, tmp, newflags); 5911da177e4SLinus Torvalds if (error) 5921da177e4SLinus Torvalds goto out; 5931da177e4SLinus Torvalds nstart = tmp; 5941da177e4SLinus Torvalds 5951da177e4SLinus Torvalds if (nstart < prev->vm_end) 5961da177e4SLinus Torvalds nstart = prev->vm_end; 5971da177e4SLinus Torvalds if (nstart >= end) 5981da177e4SLinus Torvalds goto out; 5991da177e4SLinus Torvalds 6001da177e4SLinus Torvalds vma = prev->vm_next; 6011da177e4SLinus Torvalds if (!vma || vma->vm_start != nstart) { 6021da177e4SLinus Torvalds error = -ENOMEM; 6031da177e4SLinus Torvalds goto out; 6041da177e4SLinus Torvalds } 605f138556dSPiotr Kwapulinski prot = reqprot; 6061da177e4SLinus Torvalds } 6071da177e4SLinus Torvalds out: 6081da177e4SLinus Torvalds up_write(¤t->mm->mmap_sem); 6091da177e4SLinus Torvalds return error; 6101da177e4SLinus Torvalds } 6117d06d9c9SDave Hansen 6127d06d9c9SDave Hansen SYSCALL_DEFINE3(mprotect, unsigned long, start, size_t, len, 6137d06d9c9SDave Hansen unsigned long, prot) 6147d06d9c9SDave Hansen { 6157d06d9c9SDave Hansen return do_mprotect_pkey(start, len, prot, -1); 6167d06d9c9SDave Hansen } 6177d06d9c9SDave Hansen 618c7142aeaSHeiko Carstens #ifdef CONFIG_ARCH_HAS_PKEYS 619c7142aeaSHeiko Carstens 6207d06d9c9SDave Hansen SYSCALL_DEFINE4(pkey_mprotect, unsigned long, start, size_t, len, 6217d06d9c9SDave Hansen unsigned long, prot, int, pkey) 6227d06d9c9SDave Hansen { 6237d06d9c9SDave Hansen return do_mprotect_pkey(start, len, prot, pkey); 6247d06d9c9SDave Hansen } 625e8c24d3aSDave Hansen 626e8c24d3aSDave Hansen SYSCALL_DEFINE2(pkey_alloc, unsigned long, flags, unsigned long, init_val) 627e8c24d3aSDave Hansen { 628e8c24d3aSDave Hansen int pkey; 629e8c24d3aSDave Hansen int ret; 630e8c24d3aSDave Hansen 631e8c24d3aSDave Hansen /* No flags supported yet. */ 632e8c24d3aSDave Hansen if (flags) 633e8c24d3aSDave Hansen return -EINVAL; 634e8c24d3aSDave Hansen /* check for unsupported init values */ 635e8c24d3aSDave Hansen if (init_val & ~PKEY_ACCESS_MASK) 636e8c24d3aSDave Hansen return -EINVAL; 637e8c24d3aSDave Hansen 638e8c24d3aSDave Hansen down_write(¤t->mm->mmap_sem); 639e8c24d3aSDave Hansen pkey = mm_pkey_alloc(current->mm); 640e8c24d3aSDave Hansen 641e8c24d3aSDave Hansen ret = -ENOSPC; 642e8c24d3aSDave Hansen if (pkey == -1) 643e8c24d3aSDave Hansen goto out; 644e8c24d3aSDave Hansen 645e8c24d3aSDave Hansen ret = arch_set_user_pkey_access(current, pkey, init_val); 646e8c24d3aSDave Hansen if (ret) { 647e8c24d3aSDave Hansen mm_pkey_free(current->mm, pkey); 648e8c24d3aSDave Hansen goto out; 649e8c24d3aSDave Hansen } 650e8c24d3aSDave Hansen ret = pkey; 651e8c24d3aSDave Hansen out: 652e8c24d3aSDave Hansen up_write(¤t->mm->mmap_sem); 653e8c24d3aSDave Hansen return ret; 654e8c24d3aSDave Hansen } 655e8c24d3aSDave Hansen 656e8c24d3aSDave Hansen SYSCALL_DEFINE1(pkey_free, int, pkey) 657e8c24d3aSDave Hansen { 658e8c24d3aSDave Hansen int ret; 659e8c24d3aSDave Hansen 660e8c24d3aSDave Hansen down_write(¤t->mm->mmap_sem); 661e8c24d3aSDave Hansen ret = mm_pkey_free(current->mm, pkey); 662e8c24d3aSDave Hansen up_write(¤t->mm->mmap_sem); 663e8c24d3aSDave Hansen 664e8c24d3aSDave Hansen /* 665e8c24d3aSDave Hansen * We could provie warnings or errors if any VMA still 666e8c24d3aSDave Hansen * has the pkey set here. 667e8c24d3aSDave Hansen */ 668e8c24d3aSDave Hansen return ret; 669e8c24d3aSDave Hansen } 670c7142aeaSHeiko Carstens 671c7142aeaSHeiko Carstens #endif /* CONFIG_ARCH_HAS_PKEYS */ 672