xref: /openbmc/linux/mm/mprotect.c (revision 7c0f6ba682b9c7632072ffbedf8d328c8f3c42ba)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds  *  mm/mprotect.c
31da177e4SLinus Torvalds  *
41da177e4SLinus Torvalds  *  (C) Copyright 1994 Linus Torvalds
51da177e4SLinus Torvalds  *  (C) Copyright 2002 Christoph Hellwig
61da177e4SLinus Torvalds  *
7046c6884SAlan Cox  *  Address space accounting code	<alan@lxorguk.ukuu.org.uk>
81da177e4SLinus Torvalds  *  (C) Copyright 2002 Red Hat Inc, All Rights Reserved
91da177e4SLinus Torvalds  */
101da177e4SLinus Torvalds 
111da177e4SLinus Torvalds #include <linux/mm.h>
121da177e4SLinus Torvalds #include <linux/hugetlb.h>
131da177e4SLinus Torvalds #include <linux/shm.h>
141da177e4SLinus Torvalds #include <linux/mman.h>
151da177e4SLinus Torvalds #include <linux/fs.h>
161da177e4SLinus Torvalds #include <linux/highmem.h>
171da177e4SLinus Torvalds #include <linux/security.h>
181da177e4SLinus Torvalds #include <linux/mempolicy.h>
191da177e4SLinus Torvalds #include <linux/personality.h>
201da177e4SLinus Torvalds #include <linux/syscalls.h>
210697212aSChristoph Lameter #include <linux/swap.h>
220697212aSChristoph Lameter #include <linux/swapops.h>
23cddb8a5cSAndrea Arcangeli #include <linux/mmu_notifier.h>
2464cdd548SKOSAKI Motohiro #include <linux/migrate.h>
25cdd6c482SIngo Molnar #include <linux/perf_event.h>
26e8c24d3aSDave Hansen #include <linux/pkeys.h>
2764a9a34eSMel Gorman #include <linux/ksm.h>
28*7c0f6ba6SLinus Torvalds #include <linux/uaccess.h>
291da177e4SLinus Torvalds #include <asm/pgtable.h>
301da177e4SLinus Torvalds #include <asm/cacheflush.h>
31e8c24d3aSDave Hansen #include <asm/mmu_context.h>
321da177e4SLinus Torvalds #include <asm/tlbflush.h>
331da177e4SLinus Torvalds 
3436f88188SKirill A. Shutemov #include "internal.h"
3536f88188SKirill A. Shutemov 
361ad9f620SMel Gorman /*
371ad9f620SMel Gorman  * For a prot_numa update we only hold mmap_sem for read so there is a
381ad9f620SMel Gorman  * potential race with faulting where a pmd was temporarily none. This
391ad9f620SMel Gorman  * function checks for a transhuge pmd under the appropriate lock. It
401ad9f620SMel Gorman  * returns a pte if it was successfully locked or NULL if it raced with
411ad9f620SMel Gorman  * a transhuge insertion.
421ad9f620SMel Gorman  */
431ad9f620SMel Gorman static pte_t *lock_pte_protection(struct vm_area_struct *vma, pmd_t *pmd,
441ad9f620SMel Gorman 			unsigned long addr, int prot_numa, spinlock_t **ptl)
451ad9f620SMel Gorman {
461ad9f620SMel Gorman 	pte_t *pte;
471ad9f620SMel Gorman 	spinlock_t *pmdl;
481ad9f620SMel Gorman 
491ad9f620SMel Gorman 	/* !prot_numa is protected by mmap_sem held for write */
501ad9f620SMel Gorman 	if (!prot_numa)
511ad9f620SMel Gorman 		return pte_offset_map_lock(vma->vm_mm, pmd, addr, ptl);
521ad9f620SMel Gorman 
531ad9f620SMel Gorman 	pmdl = pmd_lock(vma->vm_mm, pmd);
541ad9f620SMel Gorman 	if (unlikely(pmd_trans_huge(*pmd) || pmd_none(*pmd))) {
551ad9f620SMel Gorman 		spin_unlock(pmdl);
561ad9f620SMel Gorman 		return NULL;
571ad9f620SMel Gorman 	}
581ad9f620SMel Gorman 
591ad9f620SMel Gorman 	pte = pte_offset_map_lock(vma->vm_mm, pmd, addr, ptl);
601ad9f620SMel Gorman 	spin_unlock(pmdl);
611ad9f620SMel Gorman 	return pte;
621ad9f620SMel Gorman }
631ad9f620SMel Gorman 
644b10e7d5SMel Gorman static unsigned long change_pte_range(struct vm_area_struct *vma, pmd_t *pmd,
65c1e6098bSPeter Zijlstra 		unsigned long addr, unsigned long end, pgprot_t newprot,
660f19c179SMel Gorman 		int dirty_accountable, int prot_numa)
671da177e4SLinus Torvalds {
684b10e7d5SMel Gorman 	struct mm_struct *mm = vma->vm_mm;
690697212aSChristoph Lameter 	pte_t *pte, oldpte;
70705e87c0SHugh Dickins 	spinlock_t *ptl;
717da4d641SPeter Zijlstra 	unsigned long pages = 0;
723e321587SAndi Kleen 	int target_node = NUMA_NO_NODE;
731da177e4SLinus Torvalds 
741ad9f620SMel Gorman 	pte = lock_pte_protection(vma, pmd, addr, prot_numa, &ptl);
751ad9f620SMel Gorman 	if (!pte)
761ad9f620SMel Gorman 		return 0;
771ad9f620SMel Gorman 
783e321587SAndi Kleen 	/* Get target node for single threaded private VMAs */
793e321587SAndi Kleen 	if (prot_numa && !(vma->vm_flags & VM_SHARED) &&
803e321587SAndi Kleen 	    atomic_read(&vma->vm_mm->mm_users) == 1)
813e321587SAndi Kleen 		target_node = numa_node_id();
823e321587SAndi Kleen 
836606c3e0SZachary Amsden 	arch_enter_lazy_mmu_mode();
841da177e4SLinus Torvalds 	do {
850697212aSChristoph Lameter 		oldpte = *pte;
860697212aSChristoph Lameter 		if (pte_present(oldpte)) {
871da177e4SLinus Torvalds 			pte_t ptent;
88b191f9b1SMel Gorman 			bool preserve_write = prot_numa && pte_write(oldpte);
891da177e4SLinus Torvalds 
90e944fd67SMel Gorman 			/*
91e944fd67SMel Gorman 			 * Avoid trapping faults against the zero or KSM
92e944fd67SMel Gorman 			 * pages. See similar comment in change_huge_pmd.
93e944fd67SMel Gorman 			 */
94e944fd67SMel Gorman 			if (prot_numa) {
95e944fd67SMel Gorman 				struct page *page;
96e944fd67SMel Gorman 
97e944fd67SMel Gorman 				page = vm_normal_page(vma, addr, oldpte);
98e944fd67SMel Gorman 				if (!page || PageKsm(page))
99e944fd67SMel Gorman 					continue;
10010c1045fSMel Gorman 
10110c1045fSMel Gorman 				/* Avoid TLB flush if possible */
10210c1045fSMel Gorman 				if (pte_protnone(oldpte))
10310c1045fSMel Gorman 					continue;
1043e321587SAndi Kleen 
1053e321587SAndi Kleen 				/*
1063e321587SAndi Kleen 				 * Don't mess with PTEs if page is already on the node
1073e321587SAndi Kleen 				 * a single-threaded process is running on.
1083e321587SAndi Kleen 				 */
1093e321587SAndi Kleen 				if (target_node == page_to_nid(page))
1103e321587SAndi Kleen 					continue;
111e944fd67SMel Gorman 			}
112e944fd67SMel Gorman 
1130c5f83c2SMel Gorman 			ptent = ptep_modify_prot_start(mm, addr, pte);
114c1e6098bSPeter Zijlstra 			ptent = pte_modify(ptent, newprot);
115b191f9b1SMel Gorman 			if (preserve_write)
116b191f9b1SMel Gorman 				ptent = pte_mkwrite(ptent);
1178a0516edSMel Gorman 
1188a0516edSMel Gorman 			/* Avoid taking write faults for known dirty pages */
11964e45507SPeter Feiner 			if (dirty_accountable && pte_dirty(ptent) &&
12064e45507SPeter Feiner 					(pte_soft_dirty(ptent) ||
1218a0516edSMel Gorman 					 !(vma->vm_flags & VM_SOFTDIRTY))) {
1229d85d586SAneesh Kumar K.V 				ptent = pte_mkwrite(ptent);
1238a0516edSMel Gorman 			}
1249d85d586SAneesh Kumar K.V 			ptep_modify_prot_commit(mm, addr, pte, ptent);
1254b10e7d5SMel Gorman 			pages++;
1260661a336SKirill A. Shutemov 		} else if (IS_ENABLED(CONFIG_MIGRATION)) {
1270697212aSChristoph Lameter 			swp_entry_t entry = pte_to_swp_entry(oldpte);
1280697212aSChristoph Lameter 
1290697212aSChristoph Lameter 			if (is_write_migration_entry(entry)) {
130c3d16e16SCyrill Gorcunov 				pte_t newpte;
1310697212aSChristoph Lameter 				/*
1320697212aSChristoph Lameter 				 * A protection check is difficult so
1330697212aSChristoph Lameter 				 * just be safe and disable write
1340697212aSChristoph Lameter 				 */
1350697212aSChristoph Lameter 				make_migration_entry_read(&entry);
136c3d16e16SCyrill Gorcunov 				newpte = swp_entry_to_pte(entry);
137c3d16e16SCyrill Gorcunov 				if (pte_swp_soft_dirty(oldpte))
138c3d16e16SCyrill Gorcunov 					newpte = pte_swp_mksoft_dirty(newpte);
139c3d16e16SCyrill Gorcunov 				set_pte_at(mm, addr, pte, newpte);
140e920e14cSMel Gorman 
1417da4d641SPeter Zijlstra 				pages++;
1420697212aSChristoph Lameter 			}
143e920e14cSMel Gorman 		}
1441da177e4SLinus Torvalds 	} while (pte++, addr += PAGE_SIZE, addr != end);
1456606c3e0SZachary Amsden 	arch_leave_lazy_mmu_mode();
146705e87c0SHugh Dickins 	pte_unmap_unlock(pte - 1, ptl);
1477da4d641SPeter Zijlstra 
1487da4d641SPeter Zijlstra 	return pages;
1491da177e4SLinus Torvalds }
1501da177e4SLinus Torvalds 
1517d12efaeSAndrew Morton static inline unsigned long change_pmd_range(struct vm_area_struct *vma,
1527d12efaeSAndrew Morton 		pud_t *pud, unsigned long addr, unsigned long end,
1537d12efaeSAndrew Morton 		pgprot_t newprot, int dirty_accountable, int prot_numa)
1541da177e4SLinus Torvalds {
1551da177e4SLinus Torvalds 	pmd_t *pmd;
156a5338093SRik van Riel 	struct mm_struct *mm = vma->vm_mm;
1571da177e4SLinus Torvalds 	unsigned long next;
1587da4d641SPeter Zijlstra 	unsigned long pages = 0;
15972403b4aSMel Gorman 	unsigned long nr_huge_updates = 0;
160a5338093SRik van Riel 	unsigned long mni_start = 0;
1611da177e4SLinus Torvalds 
1621da177e4SLinus Torvalds 	pmd = pmd_offset(pud, addr);
1631da177e4SLinus Torvalds 	do {
16425cbbef1SMel Gorman 		unsigned long this_pages;
16525cbbef1SMel Gorman 
1661da177e4SLinus Torvalds 		next = pmd_addr_end(addr, end);
1675c7fb56eSDan Williams 		if (!pmd_trans_huge(*pmd) && !pmd_devmap(*pmd)
1685c7fb56eSDan Williams 				&& pmd_none_or_clear_bad(pmd))
16988a9ab6eSRik van Riel 			continue;
170a5338093SRik van Riel 
171a5338093SRik van Riel 		/* invoke the mmu notifier if the pmd is populated */
172a5338093SRik van Riel 		if (!mni_start) {
173a5338093SRik van Riel 			mni_start = addr;
174a5338093SRik van Riel 			mmu_notifier_invalidate_range_start(mm, mni_start, end);
175a5338093SRik van Riel 		}
176a5338093SRik van Riel 
1775c7fb56eSDan Williams 		if (pmd_trans_huge(*pmd) || pmd_devmap(*pmd)) {
1786b9116a6SKirill A. Shutemov 			if (next - addr != HPAGE_PMD_SIZE) {
179fd60775aSDavid Rientjes 				__split_huge_pmd(vma, pmd, addr, false, NULL);
180337d9abfSNaoya Horiguchi 				if (pmd_trans_unstable(pmd))
1816b9116a6SKirill A. Shutemov 					continue;
1826b9116a6SKirill A. Shutemov 			} else {
183f123d74aSMel Gorman 				int nr_ptes = change_huge_pmd(vma, pmd, addr,
184e944fd67SMel Gorman 						newprot, prot_numa);
185f123d74aSMel Gorman 
186f123d74aSMel Gorman 				if (nr_ptes) {
18772403b4aSMel Gorman 					if (nr_ptes == HPAGE_PMD_NR) {
18872403b4aSMel Gorman 						pages += HPAGE_PMD_NR;
18972403b4aSMel Gorman 						nr_huge_updates++;
19072403b4aSMel Gorman 					}
1911ad9f620SMel Gorman 
1921ad9f620SMel Gorman 					/* huge pmd was handled */
193cd7548abSJohannes Weiner 					continue;
1947da4d641SPeter Zijlstra 				}
195f123d74aSMel Gorman 			}
19688a9ab6eSRik van Riel 			/* fall through, the trans huge pmd just split */
197cd7548abSJohannes Weiner 		}
19825cbbef1SMel Gorman 		this_pages = change_pte_range(vma, pmd, addr, next, newprot,
1990f19c179SMel Gorman 				 dirty_accountable, prot_numa);
20025cbbef1SMel Gorman 		pages += this_pages;
2011da177e4SLinus Torvalds 	} while (pmd++, addr = next, addr != end);
2027da4d641SPeter Zijlstra 
203a5338093SRik van Riel 	if (mni_start)
204a5338093SRik van Riel 		mmu_notifier_invalidate_range_end(mm, mni_start, end);
205a5338093SRik van Riel 
20672403b4aSMel Gorman 	if (nr_huge_updates)
20772403b4aSMel Gorman 		count_vm_numa_events(NUMA_HUGE_PTE_UPDATES, nr_huge_updates);
2087da4d641SPeter Zijlstra 	return pages;
2091da177e4SLinus Torvalds }
2101da177e4SLinus Torvalds 
2117d12efaeSAndrew Morton static inline unsigned long change_pud_range(struct vm_area_struct *vma,
2127d12efaeSAndrew Morton 		pgd_t *pgd, unsigned long addr, unsigned long end,
2137d12efaeSAndrew Morton 		pgprot_t newprot, int dirty_accountable, int prot_numa)
2141da177e4SLinus Torvalds {
2151da177e4SLinus Torvalds 	pud_t *pud;
2161da177e4SLinus Torvalds 	unsigned long next;
2177da4d641SPeter Zijlstra 	unsigned long pages = 0;
2181da177e4SLinus Torvalds 
2191da177e4SLinus Torvalds 	pud = pud_offset(pgd, addr);
2201da177e4SLinus Torvalds 	do {
2211da177e4SLinus Torvalds 		next = pud_addr_end(addr, end);
2221da177e4SLinus Torvalds 		if (pud_none_or_clear_bad(pud))
2231da177e4SLinus Torvalds 			continue;
2247da4d641SPeter Zijlstra 		pages += change_pmd_range(vma, pud, addr, next, newprot,
2254b10e7d5SMel Gorman 				 dirty_accountable, prot_numa);
2261da177e4SLinus Torvalds 	} while (pud++, addr = next, addr != end);
2277da4d641SPeter Zijlstra 
2287da4d641SPeter Zijlstra 	return pages;
2291da177e4SLinus Torvalds }
2301da177e4SLinus Torvalds 
2317da4d641SPeter Zijlstra static unsigned long change_protection_range(struct vm_area_struct *vma,
232c1e6098bSPeter Zijlstra 		unsigned long addr, unsigned long end, pgprot_t newprot,
2334b10e7d5SMel Gorman 		int dirty_accountable, int prot_numa)
2341da177e4SLinus Torvalds {
2351da177e4SLinus Torvalds 	struct mm_struct *mm = vma->vm_mm;
2361da177e4SLinus Torvalds 	pgd_t *pgd;
2371da177e4SLinus Torvalds 	unsigned long next;
2381da177e4SLinus Torvalds 	unsigned long start = addr;
2397da4d641SPeter Zijlstra 	unsigned long pages = 0;
2401da177e4SLinus Torvalds 
2411da177e4SLinus Torvalds 	BUG_ON(addr >= end);
2421da177e4SLinus Torvalds 	pgd = pgd_offset(mm, addr);
2431da177e4SLinus Torvalds 	flush_cache_range(vma, addr, end);
24420841405SRik van Riel 	set_tlb_flush_pending(mm);
2451da177e4SLinus Torvalds 	do {
2461da177e4SLinus Torvalds 		next = pgd_addr_end(addr, end);
2471da177e4SLinus Torvalds 		if (pgd_none_or_clear_bad(pgd))
2481da177e4SLinus Torvalds 			continue;
2497da4d641SPeter Zijlstra 		pages += change_pud_range(vma, pgd, addr, next, newprot,
2504b10e7d5SMel Gorman 				 dirty_accountable, prot_numa);
2511da177e4SLinus Torvalds 	} while (pgd++, addr = next, addr != end);
2527da4d641SPeter Zijlstra 
2531233d588SIngo Molnar 	/* Only flush the TLB if we actually modified any entries: */
2541233d588SIngo Molnar 	if (pages)
2551da177e4SLinus Torvalds 		flush_tlb_range(vma, start, end);
25620841405SRik van Riel 	clear_tlb_flush_pending(mm);
2577da4d641SPeter Zijlstra 
2587da4d641SPeter Zijlstra 	return pages;
2597da4d641SPeter Zijlstra }
2607da4d641SPeter Zijlstra 
2617da4d641SPeter Zijlstra unsigned long change_protection(struct vm_area_struct *vma, unsigned long start,
2627da4d641SPeter Zijlstra 		       unsigned long end, pgprot_t newprot,
2634b10e7d5SMel Gorman 		       int dirty_accountable, int prot_numa)
2647da4d641SPeter Zijlstra {
2657da4d641SPeter Zijlstra 	unsigned long pages;
2667da4d641SPeter Zijlstra 
2677da4d641SPeter Zijlstra 	if (is_vm_hugetlb_page(vma))
2687da4d641SPeter Zijlstra 		pages = hugetlb_change_protection(vma, start, end, newprot);
2697da4d641SPeter Zijlstra 	else
2704b10e7d5SMel Gorman 		pages = change_protection_range(vma, start, end, newprot, dirty_accountable, prot_numa);
2717da4d641SPeter Zijlstra 
2727da4d641SPeter Zijlstra 	return pages;
2731da177e4SLinus Torvalds }
2741da177e4SLinus Torvalds 
275b6a2fea3SOllie Wild int
2761da177e4SLinus Torvalds mprotect_fixup(struct vm_area_struct *vma, struct vm_area_struct **pprev,
2771da177e4SLinus Torvalds 	unsigned long start, unsigned long end, unsigned long newflags)
2781da177e4SLinus Torvalds {
2791da177e4SLinus Torvalds 	struct mm_struct *mm = vma->vm_mm;
2801da177e4SLinus Torvalds 	unsigned long oldflags = vma->vm_flags;
2811da177e4SLinus Torvalds 	long nrpages = (end - start) >> PAGE_SHIFT;
2821da177e4SLinus Torvalds 	unsigned long charged = 0;
2831da177e4SLinus Torvalds 	pgoff_t pgoff;
2841da177e4SLinus Torvalds 	int error;
285c1e6098bSPeter Zijlstra 	int dirty_accountable = 0;
2861da177e4SLinus Torvalds 
2871da177e4SLinus Torvalds 	if (newflags == oldflags) {
2881da177e4SLinus Torvalds 		*pprev = vma;
2891da177e4SLinus Torvalds 		return 0;
2901da177e4SLinus Torvalds 	}
2911da177e4SLinus Torvalds 
2921da177e4SLinus Torvalds 	/*
2931da177e4SLinus Torvalds 	 * If we make a private mapping writable we increase our commit;
2941da177e4SLinus Torvalds 	 * but (without finer accounting) cannot reduce our commit if we
2955a6fe125SMel Gorman 	 * make it unwritable again. hugetlb mapping were accounted for
2965a6fe125SMel Gorman 	 * even if read-only so there is no need to account for them here
2971da177e4SLinus Torvalds 	 */
2981da177e4SLinus Torvalds 	if (newflags & VM_WRITE) {
29984638335SKonstantin Khlebnikov 		/* Check space limits when area turns into data. */
30084638335SKonstantin Khlebnikov 		if (!may_expand_vm(mm, newflags, nrpages) &&
30184638335SKonstantin Khlebnikov 				may_expand_vm(mm, oldflags, nrpages))
30284638335SKonstantin Khlebnikov 			return -ENOMEM;
3035a6fe125SMel Gorman 		if (!(oldflags & (VM_ACCOUNT|VM_WRITE|VM_HUGETLB|
304cdfd4325SAndy Whitcroft 						VM_SHARED|VM_NORESERVE))) {
3051da177e4SLinus Torvalds 			charged = nrpages;
306191c5424SAl Viro 			if (security_vm_enough_memory_mm(mm, charged))
3071da177e4SLinus Torvalds 				return -ENOMEM;
3081da177e4SLinus Torvalds 			newflags |= VM_ACCOUNT;
3091da177e4SLinus Torvalds 		}
3101da177e4SLinus Torvalds 	}
3111da177e4SLinus Torvalds 
3121da177e4SLinus Torvalds 	/*
3131da177e4SLinus Torvalds 	 * First try to merge with previous and/or next vma.
3141da177e4SLinus Torvalds 	 */
3151da177e4SLinus Torvalds 	pgoff = vma->vm_pgoff + ((start - vma->vm_start) >> PAGE_SHIFT);
3161da177e4SLinus Torvalds 	*pprev = vma_merge(mm, *pprev, start, end, newflags,
31719a809afSAndrea Arcangeli 			   vma->anon_vma, vma->vm_file, pgoff, vma_policy(vma),
31819a809afSAndrea Arcangeli 			   vma->vm_userfaultfd_ctx);
3191da177e4SLinus Torvalds 	if (*pprev) {
3201da177e4SLinus Torvalds 		vma = *pprev;
321e86f15eeSAndrea Arcangeli 		VM_WARN_ON((vma->vm_flags ^ newflags) & ~VM_SOFTDIRTY);
3221da177e4SLinus Torvalds 		goto success;
3231da177e4SLinus Torvalds 	}
3241da177e4SLinus Torvalds 
3251da177e4SLinus Torvalds 	*pprev = vma;
3261da177e4SLinus Torvalds 
3271da177e4SLinus Torvalds 	if (start != vma->vm_start) {
3281da177e4SLinus Torvalds 		error = split_vma(mm, vma, start, 1);
3291da177e4SLinus Torvalds 		if (error)
3301da177e4SLinus Torvalds 			goto fail;
3311da177e4SLinus Torvalds 	}
3321da177e4SLinus Torvalds 
3331da177e4SLinus Torvalds 	if (end != vma->vm_end) {
3341da177e4SLinus Torvalds 		error = split_vma(mm, vma, end, 0);
3351da177e4SLinus Torvalds 		if (error)
3361da177e4SLinus Torvalds 			goto fail;
3371da177e4SLinus Torvalds 	}
3381da177e4SLinus Torvalds 
3391da177e4SLinus Torvalds success:
3401da177e4SLinus Torvalds 	/*
3411da177e4SLinus Torvalds 	 * vm_flags and vm_page_prot are protected by the mmap_sem
3421da177e4SLinus Torvalds 	 * held in write mode.
3431da177e4SLinus Torvalds 	 */
3441da177e4SLinus Torvalds 	vma->vm_flags = newflags;
3456d2329f8SAndrea Arcangeli 	dirty_accountable = vma_wants_writenotify(vma, vma->vm_page_prot);
34664e45507SPeter Feiner 	vma_set_page_prot(vma);
347d08b3851SPeter Zijlstra 
3487d12efaeSAndrew Morton 	change_protection(vma, start, end, vma->vm_page_prot,
3497d12efaeSAndrew Morton 			  dirty_accountable, 0);
3507da4d641SPeter Zijlstra 
35136f88188SKirill A. Shutemov 	/*
35236f88188SKirill A. Shutemov 	 * Private VM_LOCKED VMA becoming writable: trigger COW to avoid major
35336f88188SKirill A. Shutemov 	 * fault on access.
35436f88188SKirill A. Shutemov 	 */
35536f88188SKirill A. Shutemov 	if ((oldflags & (VM_WRITE | VM_SHARED | VM_LOCKED)) == VM_LOCKED &&
35636f88188SKirill A. Shutemov 			(newflags & VM_WRITE)) {
35736f88188SKirill A. Shutemov 		populate_vma_page_range(vma, start, end, NULL);
35836f88188SKirill A. Shutemov 	}
35936f88188SKirill A. Shutemov 
36084638335SKonstantin Khlebnikov 	vm_stat_account(mm, oldflags, -nrpages);
36184638335SKonstantin Khlebnikov 	vm_stat_account(mm, newflags, nrpages);
36263bfd738SPekka Enberg 	perf_event_mmap(vma);
3631da177e4SLinus Torvalds 	return 0;
3641da177e4SLinus Torvalds 
3651da177e4SLinus Torvalds fail:
3661da177e4SLinus Torvalds 	vm_unacct_memory(charged);
3671da177e4SLinus Torvalds 	return error;
3681da177e4SLinus Torvalds }
3691da177e4SLinus Torvalds 
3707d06d9c9SDave Hansen /*
3717d06d9c9SDave Hansen  * pkey==-1 when doing a legacy mprotect()
3727d06d9c9SDave Hansen  */
3737d06d9c9SDave Hansen static int do_mprotect_pkey(unsigned long start, size_t len,
3747d06d9c9SDave Hansen 		unsigned long prot, int pkey)
3751da177e4SLinus Torvalds {
37662b5f7d0SDave Hansen 	unsigned long nstart, end, tmp, reqprot;
3771da177e4SLinus Torvalds 	struct vm_area_struct *vma, *prev;
3781da177e4SLinus Torvalds 	int error = -EINVAL;
3791da177e4SLinus Torvalds 	const int grows = prot & (PROT_GROWSDOWN|PROT_GROWSUP);
380f138556dSPiotr Kwapulinski 	const bool rier = (current->personality & READ_IMPLIES_EXEC) &&
381f138556dSPiotr Kwapulinski 				(prot & PROT_READ);
382f138556dSPiotr Kwapulinski 
3831da177e4SLinus Torvalds 	prot &= ~(PROT_GROWSDOWN|PROT_GROWSUP);
3841da177e4SLinus Torvalds 	if (grows == (PROT_GROWSDOWN|PROT_GROWSUP)) /* can't be both */
3851da177e4SLinus Torvalds 		return -EINVAL;
3861da177e4SLinus Torvalds 
3871da177e4SLinus Torvalds 	if (start & ~PAGE_MASK)
3881da177e4SLinus Torvalds 		return -EINVAL;
3891da177e4SLinus Torvalds 	if (!len)
3901da177e4SLinus Torvalds 		return 0;
3911da177e4SLinus Torvalds 	len = PAGE_ALIGN(len);
3921da177e4SLinus Torvalds 	end = start + len;
3931da177e4SLinus Torvalds 	if (end <= start)
3941da177e4SLinus Torvalds 		return -ENOMEM;
395b845f313SDave Kleikamp 	if (!arch_validate_prot(prot))
3961da177e4SLinus Torvalds 		return -EINVAL;
3971da177e4SLinus Torvalds 
3981da177e4SLinus Torvalds 	reqprot = prot;
3991da177e4SLinus Torvalds 
400dc0ef0dfSMichal Hocko 	if (down_write_killable(&current->mm->mmap_sem))
401dc0ef0dfSMichal Hocko 		return -EINTR;
4021da177e4SLinus Torvalds 
403e8c24d3aSDave Hansen 	/*
404e8c24d3aSDave Hansen 	 * If userspace did not allocate the pkey, do not let
405e8c24d3aSDave Hansen 	 * them use it here.
406e8c24d3aSDave Hansen 	 */
407e8c24d3aSDave Hansen 	error = -EINVAL;
408e8c24d3aSDave Hansen 	if ((pkey != -1) && !mm_pkey_is_allocated(current->mm, pkey))
409e8c24d3aSDave Hansen 		goto out;
410e8c24d3aSDave Hansen 
411097d5910SLinus Torvalds 	vma = find_vma(current->mm, start);
4121da177e4SLinus Torvalds 	error = -ENOMEM;
4131da177e4SLinus Torvalds 	if (!vma)
4141da177e4SLinus Torvalds 		goto out;
415097d5910SLinus Torvalds 	prev = vma->vm_prev;
4161da177e4SLinus Torvalds 	if (unlikely(grows & PROT_GROWSDOWN)) {
4171da177e4SLinus Torvalds 		if (vma->vm_start >= end)
4181da177e4SLinus Torvalds 			goto out;
4191da177e4SLinus Torvalds 		start = vma->vm_start;
4201da177e4SLinus Torvalds 		error = -EINVAL;
4211da177e4SLinus Torvalds 		if (!(vma->vm_flags & VM_GROWSDOWN))
4221da177e4SLinus Torvalds 			goto out;
4237d12efaeSAndrew Morton 	} else {
4241da177e4SLinus Torvalds 		if (vma->vm_start > start)
4251da177e4SLinus Torvalds 			goto out;
4261da177e4SLinus Torvalds 		if (unlikely(grows & PROT_GROWSUP)) {
4271da177e4SLinus Torvalds 			end = vma->vm_end;
4281da177e4SLinus Torvalds 			error = -EINVAL;
4291da177e4SLinus Torvalds 			if (!(vma->vm_flags & VM_GROWSUP))
4301da177e4SLinus Torvalds 				goto out;
4311da177e4SLinus Torvalds 		}
4321da177e4SLinus Torvalds 	}
4331da177e4SLinus Torvalds 	if (start > vma->vm_start)
4341da177e4SLinus Torvalds 		prev = vma;
4351da177e4SLinus Torvalds 
4361da177e4SLinus Torvalds 	for (nstart = start ; ; ) {
437a8502b67SDave Hansen 		unsigned long mask_off_old_flags;
4381da177e4SLinus Torvalds 		unsigned long newflags;
4397d06d9c9SDave Hansen 		int new_vma_pkey;
4401da177e4SLinus Torvalds 
4411da177e4SLinus Torvalds 		/* Here we know that vma->vm_start <= nstart < vma->vm_end. */
4421da177e4SLinus Torvalds 
443f138556dSPiotr Kwapulinski 		/* Does the application expect PROT_READ to imply PROT_EXEC */
444f138556dSPiotr Kwapulinski 		if (rier && (vma->vm_flags & VM_MAYEXEC))
445f138556dSPiotr Kwapulinski 			prot |= PROT_EXEC;
446f138556dSPiotr Kwapulinski 
447a8502b67SDave Hansen 		/*
448a8502b67SDave Hansen 		 * Each mprotect() call explicitly passes r/w/x permissions.
449a8502b67SDave Hansen 		 * If a permission is not passed to mprotect(), it must be
450a8502b67SDave Hansen 		 * cleared from the VMA.
451a8502b67SDave Hansen 		 */
452a8502b67SDave Hansen 		mask_off_old_flags = VM_READ | VM_WRITE | VM_EXEC |
453a8502b67SDave Hansen 					ARCH_VM_PKEY_FLAGS;
454a8502b67SDave Hansen 
4557d06d9c9SDave Hansen 		new_vma_pkey = arch_override_mprotect_pkey(vma, prot, pkey);
4567d06d9c9SDave Hansen 		newflags = calc_vm_prot_bits(prot, new_vma_pkey);
457a8502b67SDave Hansen 		newflags |= (vma->vm_flags & ~mask_off_old_flags);
4581da177e4SLinus Torvalds 
4597e2cff42SPaolo 'Blaisorblade' Giarrusso 		/* newflags >> 4 shift VM_MAY% in place of VM_% */
4607e2cff42SPaolo 'Blaisorblade' Giarrusso 		if ((newflags & ~(newflags >> 4)) & (VM_READ | VM_WRITE | VM_EXEC)) {
4611da177e4SLinus Torvalds 			error = -EACCES;
4621da177e4SLinus Torvalds 			goto out;
4631da177e4SLinus Torvalds 		}
4641da177e4SLinus Torvalds 
4651da177e4SLinus Torvalds 		error = security_file_mprotect(vma, reqprot, prot);
4661da177e4SLinus Torvalds 		if (error)
4671da177e4SLinus Torvalds 			goto out;
4681da177e4SLinus Torvalds 
4691da177e4SLinus Torvalds 		tmp = vma->vm_end;
4701da177e4SLinus Torvalds 		if (tmp > end)
4711da177e4SLinus Torvalds 			tmp = end;
4721da177e4SLinus Torvalds 		error = mprotect_fixup(vma, &prev, nstart, tmp, newflags);
4731da177e4SLinus Torvalds 		if (error)
4741da177e4SLinus Torvalds 			goto out;
4751da177e4SLinus Torvalds 		nstart = tmp;
4761da177e4SLinus Torvalds 
4771da177e4SLinus Torvalds 		if (nstart < prev->vm_end)
4781da177e4SLinus Torvalds 			nstart = prev->vm_end;
4791da177e4SLinus Torvalds 		if (nstart >= end)
4801da177e4SLinus Torvalds 			goto out;
4811da177e4SLinus Torvalds 
4821da177e4SLinus Torvalds 		vma = prev->vm_next;
4831da177e4SLinus Torvalds 		if (!vma || vma->vm_start != nstart) {
4841da177e4SLinus Torvalds 			error = -ENOMEM;
4851da177e4SLinus Torvalds 			goto out;
4861da177e4SLinus Torvalds 		}
487f138556dSPiotr Kwapulinski 		prot = reqprot;
4881da177e4SLinus Torvalds 	}
4891da177e4SLinus Torvalds out:
4901da177e4SLinus Torvalds 	up_write(&current->mm->mmap_sem);
4911da177e4SLinus Torvalds 	return error;
4921da177e4SLinus Torvalds }
4937d06d9c9SDave Hansen 
4947d06d9c9SDave Hansen SYSCALL_DEFINE3(mprotect, unsigned long, start, size_t, len,
4957d06d9c9SDave Hansen 		unsigned long, prot)
4967d06d9c9SDave Hansen {
4977d06d9c9SDave Hansen 	return do_mprotect_pkey(start, len, prot, -1);
4987d06d9c9SDave Hansen }
4997d06d9c9SDave Hansen 
500c7142aeaSHeiko Carstens #ifdef CONFIG_ARCH_HAS_PKEYS
501c7142aeaSHeiko Carstens 
5027d06d9c9SDave Hansen SYSCALL_DEFINE4(pkey_mprotect, unsigned long, start, size_t, len,
5037d06d9c9SDave Hansen 		unsigned long, prot, int, pkey)
5047d06d9c9SDave Hansen {
5057d06d9c9SDave Hansen 	return do_mprotect_pkey(start, len, prot, pkey);
5067d06d9c9SDave Hansen }
507e8c24d3aSDave Hansen 
508e8c24d3aSDave Hansen SYSCALL_DEFINE2(pkey_alloc, unsigned long, flags, unsigned long, init_val)
509e8c24d3aSDave Hansen {
510e8c24d3aSDave Hansen 	int pkey;
511e8c24d3aSDave Hansen 	int ret;
512e8c24d3aSDave Hansen 
513e8c24d3aSDave Hansen 	/* No flags supported yet. */
514e8c24d3aSDave Hansen 	if (flags)
515e8c24d3aSDave Hansen 		return -EINVAL;
516e8c24d3aSDave Hansen 	/* check for unsupported init values */
517e8c24d3aSDave Hansen 	if (init_val & ~PKEY_ACCESS_MASK)
518e8c24d3aSDave Hansen 		return -EINVAL;
519e8c24d3aSDave Hansen 
520e8c24d3aSDave Hansen 	down_write(&current->mm->mmap_sem);
521e8c24d3aSDave Hansen 	pkey = mm_pkey_alloc(current->mm);
522e8c24d3aSDave Hansen 
523e8c24d3aSDave Hansen 	ret = -ENOSPC;
524e8c24d3aSDave Hansen 	if (pkey == -1)
525e8c24d3aSDave Hansen 		goto out;
526e8c24d3aSDave Hansen 
527e8c24d3aSDave Hansen 	ret = arch_set_user_pkey_access(current, pkey, init_val);
528e8c24d3aSDave Hansen 	if (ret) {
529e8c24d3aSDave Hansen 		mm_pkey_free(current->mm, pkey);
530e8c24d3aSDave Hansen 		goto out;
531e8c24d3aSDave Hansen 	}
532e8c24d3aSDave Hansen 	ret = pkey;
533e8c24d3aSDave Hansen out:
534e8c24d3aSDave Hansen 	up_write(&current->mm->mmap_sem);
535e8c24d3aSDave Hansen 	return ret;
536e8c24d3aSDave Hansen }
537e8c24d3aSDave Hansen 
538e8c24d3aSDave Hansen SYSCALL_DEFINE1(pkey_free, int, pkey)
539e8c24d3aSDave Hansen {
540e8c24d3aSDave Hansen 	int ret;
541e8c24d3aSDave Hansen 
542e8c24d3aSDave Hansen 	down_write(&current->mm->mmap_sem);
543e8c24d3aSDave Hansen 	ret = mm_pkey_free(current->mm, pkey);
544e8c24d3aSDave Hansen 	up_write(&current->mm->mmap_sem);
545e8c24d3aSDave Hansen 
546e8c24d3aSDave Hansen 	/*
547e8c24d3aSDave Hansen 	 * We could provie warnings or errors if any VMA still
548e8c24d3aSDave Hansen 	 * has the pkey set here.
549e8c24d3aSDave Hansen 	 */
550e8c24d3aSDave Hansen 	return ret;
551e8c24d3aSDave Hansen }
552c7142aeaSHeiko Carstens 
553c7142aeaSHeiko Carstens #endif /* CONFIG_ARCH_HAS_PKEYS */
554