4 * (C) Copyright 1994 Linus Torvalds
5 * (C) Copyright 2002 Christoph Hellwig
7 * Address space accounting code <alan@lxorguk.ukuu.org.uk>
8 * (C) Copyright 2002 Red Hat Inc, All Rights Reserved
12 #include <linux/hugetlb.h>
13 #include <linux/shm.h>
14 #include <linux/mman.h>
16 #include <linux/highmem.h>
17 #include <linux/security.h>
18 #include <linux/mempolicy.h>
19 #include <linux/personality.h>
20 #include <linux/syscalls.h>
21 #include <linux/swap.h>
22 #include <linux/swapops.h>
23 #include <linux/mmu_notifier.h>
24 #include <linux/migrate.h>
25 #include <linux/perf_event.h>
26 #include <linux/pkeys.h>
27 #include <linux/ksm.h>
28 #include <linux/uaccess.h>
29 #include <asm/pgtable.h>
30 #include <asm/cacheflush.h>
31 #include <asm/mmu_context.h>
32 #include <asm/tlbflush.h>
36 static unsigned long change_pte_range(struct vm_area_struct
*vma
, pmd_t
*pmd
,
37 unsigned long addr
, unsigned long end
, pgprot_t newprot
,
38 int dirty_accountable
, int prot_numa
)
40 struct mm_struct
*mm
= vma
->vm_mm
;
43 unsigned long pages
= 0;
44 int target_node
= NUMA_NO_NODE
;
47 * Can be called with only the mmap_sem for reading by
48 * prot_numa so we must check the pmd isn't constantly
49 * changing from under us from pmd_none to pmd_trans_huge
50 * and/or the other way around.
52 if (pmd_trans_unstable(pmd
))
56 * The pmd points to a regular pte so the pmd can't change
57 * from under us even if the mmap_sem is only hold for
60 pte
= pte_offset_map_lock(vma
->vm_mm
, pmd
, addr
, &ptl
);
62 /* Get target node for single threaded private VMAs */
63 if (prot_numa
&& !(vma
->vm_flags
& VM_SHARED
) &&
64 atomic_read(&vma
->vm_mm
->mm_users
) == 1)
65 target_node
= numa_node_id();
67 flush_tlb_batched_pending(vma
->vm_mm
);
68 arch_enter_lazy_mmu_mode();
71 if (pte_present(oldpte
)) {
73 bool preserve_write
= prot_numa
&& pte_write(oldpte
);
76 * Avoid trapping faults against the zero or KSM
77 * pages. See similar comment in change_huge_pmd.
82 page
= vm_normal_page(vma
, addr
, oldpte
);
83 if (!page
|| PageKsm(page
))
86 /* Avoid TLB flush if possible */
87 if (pte_protnone(oldpte
))
91 * Don't mess with PTEs if page is already on the node
92 * a single-threaded process is running on.
94 if (target_node
== page_to_nid(page
))
98 ptent
= ptep_modify_prot_start(mm
, addr
, pte
);
99 ptent
= pte_modify(ptent
, newprot
);
101 ptent
= pte_mk_savedwrite(ptent
);
103 /* Avoid taking write faults for known dirty pages */
104 if (dirty_accountable
&& pte_dirty(ptent
) &&
105 (pte_soft_dirty(ptent
) ||
106 !(vma
->vm_flags
& VM_SOFTDIRTY
))) {
107 ptent
= pte_mkwrite(ptent
);
109 ptep_modify_prot_commit(mm
, addr
, pte
, ptent
);
111 } else if (IS_ENABLED(CONFIG_MIGRATION
)) {
112 swp_entry_t entry
= pte_to_swp_entry(oldpte
);
114 if (is_write_migration_entry(entry
)) {
117 * A protection check is difficult so
118 * just be safe and disable write
120 make_migration_entry_read(&entry
);
121 newpte
= swp_entry_to_pte(entry
);
122 if (pte_swp_soft_dirty(oldpte
))
123 newpte
= pte_swp_mksoft_dirty(newpte
);
124 set_pte_at(mm
, addr
, pte
, newpte
);
129 if (is_write_device_private_entry(entry
)) {
133 * We do not preserve soft-dirtiness. See
134 * copy_one_pte() for explanation.
136 make_device_private_entry_read(&entry
);
137 newpte
= swp_entry_to_pte(entry
);
138 set_pte_at(mm
, addr
, pte
, newpte
);
143 } while (pte
++, addr
+= PAGE_SIZE
, addr
!= end
);
144 arch_leave_lazy_mmu_mode();
145 pte_unmap_unlock(pte
- 1, ptl
);
150 static inline unsigned long change_pmd_range(struct vm_area_struct
*vma
,
151 pud_t
*pud
, unsigned long addr
, unsigned long end
,
152 pgprot_t newprot
, int dirty_accountable
, int prot_numa
)
155 struct mm_struct
*mm
= vma
->vm_mm
;
157 unsigned long pages
= 0;
158 unsigned long nr_huge_updates
= 0;
159 unsigned long mni_start
= 0;
161 pmd
= pmd_offset(pud
, addr
);
163 unsigned long this_pages
;
165 next
= pmd_addr_end(addr
, end
);
166 if (!is_swap_pmd(*pmd
) && !pmd_trans_huge(*pmd
) && !pmd_devmap(*pmd
)
167 && pmd_none_or_clear_bad(pmd
))
170 /* invoke the mmu notifier if the pmd is populated */
173 mmu_notifier_invalidate_range_start(mm
, mni_start
, end
);
176 if (is_swap_pmd(*pmd
) || pmd_trans_huge(*pmd
) || pmd_devmap(*pmd
)) {
177 if (next
- addr
!= HPAGE_PMD_SIZE
) {
178 __split_huge_pmd(vma
, pmd
, addr
, false, NULL
);
180 int nr_ptes
= change_huge_pmd(vma
, pmd
, addr
,
184 if (nr_ptes
== HPAGE_PMD_NR
) {
185 pages
+= HPAGE_PMD_NR
;
189 /* huge pmd was handled */
193 /* fall through, the trans huge pmd just split */
195 this_pages
= change_pte_range(vma
, pmd
, addr
, next
, newprot
,
196 dirty_accountable
, prot_numa
);
198 } while (pmd
++, addr
= next
, addr
!= end
);
201 mmu_notifier_invalidate_range_end(mm
, mni_start
, end
);
204 count_vm_numa_events(NUMA_HUGE_PTE_UPDATES
, nr_huge_updates
);
208 static inline unsigned long change_pud_range(struct vm_area_struct
*vma
,
209 p4d_t
*p4d
, unsigned long addr
, unsigned long end
,
210 pgprot_t newprot
, int dirty_accountable
, int prot_numa
)
214 unsigned long pages
= 0;
216 pud
= pud_offset(p4d
, addr
);
218 next
= pud_addr_end(addr
, end
);
219 if (pud_none_or_clear_bad(pud
))
221 pages
+= change_pmd_range(vma
, pud
, addr
, next
, newprot
,
222 dirty_accountable
, prot_numa
);
223 } while (pud
++, addr
= next
, addr
!= end
);
228 static inline unsigned long change_p4d_range(struct vm_area_struct
*vma
,
229 pgd_t
*pgd
, unsigned long addr
, unsigned long end
,
230 pgprot_t newprot
, int dirty_accountable
, int prot_numa
)
234 unsigned long pages
= 0;
236 p4d
= p4d_offset(pgd
, addr
);
238 next
= p4d_addr_end(addr
, end
);
239 if (p4d_none_or_clear_bad(p4d
))
241 pages
+= change_pud_range(vma
, p4d
, addr
, next
, newprot
,
242 dirty_accountable
, prot_numa
);
243 } while (p4d
++, addr
= next
, addr
!= end
);
248 static unsigned long change_protection_range(struct vm_area_struct
*vma
,
249 unsigned long addr
, unsigned long end
, pgprot_t newprot
,
250 int dirty_accountable
, int prot_numa
)
252 struct mm_struct
*mm
= vma
->vm_mm
;
255 unsigned long start
= addr
;
256 unsigned long pages
= 0;
259 pgd
= pgd_offset(mm
, addr
);
260 flush_cache_range(vma
, addr
, end
);
261 inc_tlb_flush_pending(mm
);
263 next
= pgd_addr_end(addr
, end
);
264 if (pgd_none_or_clear_bad(pgd
))
266 pages
+= change_p4d_range(vma
, pgd
, addr
, next
, newprot
,
267 dirty_accountable
, prot_numa
);
268 } while (pgd
++, addr
= next
, addr
!= end
);
270 /* Only flush the TLB if we actually modified any entries: */
272 flush_tlb_range(vma
, start
, end
);
273 dec_tlb_flush_pending(mm
);
278 unsigned long change_protection(struct vm_area_struct
*vma
, unsigned long start
,
279 unsigned long end
, pgprot_t newprot
,
280 int dirty_accountable
, int prot_numa
)
284 if (is_vm_hugetlb_page(vma
))
285 pages
= hugetlb_change_protection(vma
, start
, end
, newprot
);
287 pages
= change_protection_range(vma
, start
, end
, newprot
, dirty_accountable
, prot_numa
);
293 mprotect_fixup(struct vm_area_struct
*vma
, struct vm_area_struct
**pprev
,
294 unsigned long start
, unsigned long end
, unsigned long newflags
)
296 struct mm_struct
*mm
= vma
->vm_mm
;
297 unsigned long oldflags
= vma
->vm_flags
;
298 long nrpages
= (end
- start
) >> PAGE_SHIFT
;
299 unsigned long charged
= 0;
302 int dirty_accountable
= 0;
304 if (newflags
== oldflags
) {
310 * If we make a private mapping writable we increase our commit;
311 * but (without finer accounting) cannot reduce our commit if we
312 * make it unwritable again. hugetlb mapping were accounted for
313 * even if read-only so there is no need to account for them here
315 if (newflags
& VM_WRITE
) {
316 /* Check space limits when area turns into data. */
317 if (!may_expand_vm(mm
, newflags
, nrpages
) &&
318 may_expand_vm(mm
, oldflags
, nrpages
))
320 if (!(oldflags
& (VM_ACCOUNT
|VM_WRITE
|VM_HUGETLB
|
321 VM_SHARED
|VM_NORESERVE
))) {
323 if (security_vm_enough_memory_mm(mm
, charged
))
325 newflags
|= VM_ACCOUNT
;
330 * First try to merge with previous and/or next vma.
332 pgoff
= vma
->vm_pgoff
+ ((start
- vma
->vm_start
) >> PAGE_SHIFT
);
333 *pprev
= vma_merge(mm
, *pprev
, start
, end
, newflags
,
334 vma
->anon_vma
, vma
->vm_file
, pgoff
, vma_policy(vma
),
335 vma
->vm_userfaultfd_ctx
);
338 VM_WARN_ON((vma
->vm_flags
^ newflags
) & ~VM_SOFTDIRTY
);
344 if (start
!= vma
->vm_start
) {
345 error
= split_vma(mm
, vma
, start
, 1);
350 if (end
!= vma
->vm_end
) {
351 error
= split_vma(mm
, vma
, end
, 0);
358 * vm_flags and vm_page_prot are protected by the mmap_sem
359 * held in write mode.
361 vma
->vm_flags
= newflags
;
362 dirty_accountable
= vma_wants_writenotify(vma
, vma
->vm_page_prot
);
363 vma_set_page_prot(vma
);
365 change_protection(vma
, start
, end
, vma
->vm_page_prot
,
366 dirty_accountable
, 0);
369 * Private VM_LOCKED VMA becoming writable: trigger COW to avoid major
372 if ((oldflags
& (VM_WRITE
| VM_SHARED
| VM_LOCKED
)) == VM_LOCKED
&&
373 (newflags
& VM_WRITE
)) {
374 populate_vma_page_range(vma
, start
, end
, NULL
);
377 vm_stat_account(mm
, oldflags
, -nrpages
);
378 vm_stat_account(mm
, newflags
, nrpages
);
379 perf_event_mmap(vma
);
383 vm_unacct_memory(charged
);
388 * pkey==-1 when doing a legacy mprotect()
390 static int do_mprotect_pkey(unsigned long start
, size_t len
,
391 unsigned long prot
, int pkey
)
393 unsigned long nstart
, end
, tmp
, reqprot
;
394 struct vm_area_struct
*vma
, *prev
;
396 const int grows
= prot
& (PROT_GROWSDOWN
|PROT_GROWSUP
);
397 const bool rier
= (current
->personality
& READ_IMPLIES_EXEC
) &&
400 prot
&= ~(PROT_GROWSDOWN
|PROT_GROWSUP
);
401 if (grows
== (PROT_GROWSDOWN
|PROT_GROWSUP
)) /* can't be both */
404 if (start
& ~PAGE_MASK
)
408 len
= PAGE_ALIGN(len
);
412 if (!arch_validate_prot(prot
))
417 if (down_write_killable(¤t
->mm
->mmap_sem
))
421 * If userspace did not allocate the pkey, do not let
425 if ((pkey
!= -1) && !mm_pkey_is_allocated(current
->mm
, pkey
))
428 vma
= find_vma(current
->mm
, start
);
433 if (unlikely(grows
& PROT_GROWSDOWN
)) {
434 if (vma
->vm_start
>= end
)
436 start
= vma
->vm_start
;
438 if (!(vma
->vm_flags
& VM_GROWSDOWN
))
441 if (vma
->vm_start
> start
)
443 if (unlikely(grows
& PROT_GROWSUP
)) {
446 if (!(vma
->vm_flags
& VM_GROWSUP
))
450 if (start
> vma
->vm_start
)
453 for (nstart
= start
; ; ) {
454 unsigned long mask_off_old_flags
;
455 unsigned long newflags
;
458 /* Here we know that vma->vm_start <= nstart < vma->vm_end. */
460 /* Does the application expect PROT_READ to imply PROT_EXEC */
461 if (rier
&& (vma
->vm_flags
& VM_MAYEXEC
))
465 * Each mprotect() call explicitly passes r/w/x permissions.
466 * If a permission is not passed to mprotect(), it must be
467 * cleared from the VMA.
469 mask_off_old_flags
= VM_READ
| VM_WRITE
| VM_EXEC
|
472 new_vma_pkey
= arch_override_mprotect_pkey(vma
, prot
, pkey
);
473 newflags
= calc_vm_prot_bits(prot
, new_vma_pkey
);
474 newflags
|= (vma
->vm_flags
& ~mask_off_old_flags
);
476 /* newflags >> 4 shift VM_MAY% in place of VM_% */
477 if ((newflags
& ~(newflags
>> 4)) & (VM_READ
| VM_WRITE
| VM_EXEC
)) {
482 error
= security_file_mprotect(vma
, reqprot
, prot
);
489 error
= mprotect_fixup(vma
, &prev
, nstart
, tmp
, newflags
);
494 if (nstart
< prev
->vm_end
)
495 nstart
= prev
->vm_end
;
500 if (!vma
|| vma
->vm_start
!= nstart
) {
507 up_write(¤t
->mm
->mmap_sem
);
511 SYSCALL_DEFINE3(mprotect
, unsigned long, start
, size_t, len
,
514 return do_mprotect_pkey(start
, len
, prot
, -1);
517 #ifdef CONFIG_ARCH_HAS_PKEYS
519 SYSCALL_DEFINE4(pkey_mprotect
, unsigned long, start
, size_t, len
,
520 unsigned long, prot
, int, pkey
)
522 return do_mprotect_pkey(start
, len
, prot
, pkey
);
525 SYSCALL_DEFINE2(pkey_alloc
, unsigned long, flags
, unsigned long, init_val
)
530 /* No flags supported yet. */
533 /* check for unsupported init values */
534 if (init_val
& ~PKEY_ACCESS_MASK
)
537 down_write(¤t
->mm
->mmap_sem
);
538 pkey
= mm_pkey_alloc(current
->mm
);
544 ret
= arch_set_user_pkey_access(current
, pkey
, init_val
);
546 mm_pkey_free(current
->mm
, pkey
);
551 up_write(¤t
->mm
->mmap_sem
);
555 SYSCALL_DEFINE1(pkey_free
, int, pkey
)
559 down_write(¤t
->mm
->mmap_sem
);
560 ret
= mm_pkey_free(current
->mm
, pkey
);
561 up_write(¤t
->mm
->mmap_sem
);
564 * We could provie warnings or errors if any VMA still
565 * has the pkey set here.
570 #endif /* CONFIG_ARCH_HAS_PKEYS */