4 * (C) Copyright 1994 Linus Torvalds
5 * (C) Copyright 2002 Christoph Hellwig
7 * Address space accounting code <alan@lxorguk.ukuu.org.uk>
8 * (C) Copyright 2002 Red Hat Inc, All Rights Reserved
12 #include <linux/hugetlb.h>
13 #include <linux/shm.h>
14 #include <linux/mman.h>
16 #include <linux/highmem.h>
17 #include <linux/security.h>
18 #include <linux/mempolicy.h>
19 #include <linux/personality.h>
20 #include <linux/syscalls.h>
21 #include <linux/swap.h>
22 #include <linux/swapops.h>
23 #include <linux/mmu_notifier.h>
24 #include <linux/migrate.h>
25 #include <linux/perf_event.h>
26 #include <linux/pkeys.h>
27 #include <linux/ksm.h>
28 #include <asm/uaccess.h>
29 #include <asm/pgtable.h>
30 #include <asm/cacheflush.h>
31 #include <asm/mmu_context.h>
32 #include <asm/tlbflush.h>
37 * For a prot_numa update we only hold mmap_sem for read so there is a
38 * potential race with faulting where a pmd was temporarily none. This
39 * function checks for a transhuge pmd under the appropriate lock. It
40 * returns a pte if it was successfully locked or NULL if it raced with
41 * a transhuge insertion.
43 static pte_t
*lock_pte_protection(struct vm_area_struct
*vma
, pmd_t
*pmd
,
44 unsigned long addr
, int prot_numa
, spinlock_t
**ptl
)
49 /* !prot_numa is protected by mmap_sem held for write */
51 return pte_offset_map_lock(vma
->vm_mm
, pmd
, addr
, ptl
);
53 pmdl
= pmd_lock(vma
->vm_mm
, pmd
);
54 if (unlikely(pmd_trans_huge(*pmd
) || pmd_none(*pmd
))) {
59 pte
= pte_offset_map_lock(vma
->vm_mm
, pmd
, addr
, ptl
);
64 static unsigned long change_pte_range(struct vm_area_struct
*vma
, pmd_t
*pmd
,
65 unsigned long addr
, unsigned long end
, pgprot_t newprot
,
66 int dirty_accountable
, int prot_numa
)
68 struct mm_struct
*mm
= vma
->vm_mm
;
71 unsigned long pages
= 0;
73 pte
= lock_pte_protection(vma
, pmd
, addr
, prot_numa
, &ptl
);
77 flush_tlb_batched_pending(vma
->vm_mm
);
78 arch_enter_lazy_mmu_mode();
81 if (pte_present(oldpte
)) {
83 bool preserve_write
= prot_numa
&& pte_write(oldpte
);
86 * Avoid trapping faults against the zero or KSM
87 * pages. See similar comment in change_huge_pmd.
92 page
= vm_normal_page(vma
, addr
, oldpte
);
93 if (!page
|| PageKsm(page
))
96 /* Avoid TLB flush if possible */
97 if (pte_protnone(oldpte
))
101 ptent
= ptep_modify_prot_start(mm
, addr
, pte
);
102 ptent
= pte_modify(ptent
, newprot
);
104 ptent
= pte_mkwrite(ptent
);
106 /* Avoid taking write faults for known dirty pages */
107 if (dirty_accountable
&& pte_dirty(ptent
) &&
108 (pte_soft_dirty(ptent
) ||
109 !(vma
->vm_flags
& VM_SOFTDIRTY
))) {
110 ptent
= pte_mkwrite(ptent
);
112 ptep_modify_prot_commit(mm
, addr
, pte
, ptent
);
114 } else if (IS_ENABLED(CONFIG_MIGRATION
)) {
115 swp_entry_t entry
= pte_to_swp_entry(oldpte
);
117 if (is_write_migration_entry(entry
)) {
120 * A protection check is difficult so
121 * just be safe and disable write
123 make_migration_entry_read(&entry
);
124 newpte
= swp_entry_to_pte(entry
);
125 if (pte_swp_soft_dirty(oldpte
))
126 newpte
= pte_swp_mksoft_dirty(newpte
);
127 set_pte_at(mm
, addr
, pte
, newpte
);
132 } while (pte
++, addr
+= PAGE_SIZE
, addr
!= end
);
133 arch_leave_lazy_mmu_mode();
134 pte_unmap_unlock(pte
- 1, ptl
);
139 static inline unsigned long change_pmd_range(struct vm_area_struct
*vma
,
140 pud_t
*pud
, unsigned long addr
, unsigned long end
,
141 pgprot_t newprot
, int dirty_accountable
, int prot_numa
)
144 struct mm_struct
*mm
= vma
->vm_mm
;
146 unsigned long pages
= 0;
147 unsigned long nr_huge_updates
= 0;
148 unsigned long mni_start
= 0;
150 pmd
= pmd_offset(pud
, addr
);
152 unsigned long this_pages
;
154 next
= pmd_addr_end(addr
, end
);
155 if (!pmd_trans_huge(*pmd
) && !pmd_devmap(*pmd
)
156 && pmd_none_or_clear_bad(pmd
))
159 /* invoke the mmu notifier if the pmd is populated */
162 mmu_notifier_invalidate_range_start(mm
, mni_start
, end
);
165 if (pmd_trans_huge(*pmd
) || pmd_devmap(*pmd
)) {
166 if (next
- addr
!= HPAGE_PMD_SIZE
) {
167 split_huge_pmd(vma
, pmd
, addr
);
168 if (pmd_trans_unstable(pmd
))
171 int nr_ptes
= change_huge_pmd(vma
, pmd
, addr
,
175 if (nr_ptes
== HPAGE_PMD_NR
) {
176 pages
+= HPAGE_PMD_NR
;
180 /* huge pmd was handled */
184 /* fall through, the trans huge pmd just split */
186 this_pages
= change_pte_range(vma
, pmd
, addr
, next
, newprot
,
187 dirty_accountable
, prot_numa
);
189 } while (pmd
++, addr
= next
, addr
!= end
);
192 mmu_notifier_invalidate_range_end(mm
, mni_start
, end
);
195 count_vm_numa_events(NUMA_HUGE_PTE_UPDATES
, nr_huge_updates
);
199 static inline unsigned long change_pud_range(struct vm_area_struct
*vma
,
200 pgd_t
*pgd
, unsigned long addr
, unsigned long end
,
201 pgprot_t newprot
, int dirty_accountable
, int prot_numa
)
205 unsigned long pages
= 0;
207 pud
= pud_offset(pgd
, addr
);
209 next
= pud_addr_end(addr
, end
);
210 if (pud_none_or_clear_bad(pud
))
212 pages
+= change_pmd_range(vma
, pud
, addr
, next
, newprot
,
213 dirty_accountable
, prot_numa
);
214 } while (pud
++, addr
= next
, addr
!= end
);
219 static unsigned long change_protection_range(struct vm_area_struct
*vma
,
220 unsigned long addr
, unsigned long end
, pgprot_t newprot
,
221 int dirty_accountable
, int prot_numa
)
223 struct mm_struct
*mm
= vma
->vm_mm
;
226 unsigned long start
= addr
;
227 unsigned long pages
= 0;
230 pgd
= pgd_offset(mm
, addr
);
231 flush_cache_range(vma
, addr
, end
);
232 set_tlb_flush_pending(mm
);
234 next
= pgd_addr_end(addr
, end
);
235 if (pgd_none_or_clear_bad(pgd
))
237 pages
+= change_pud_range(vma
, pgd
, addr
, next
, newprot
,
238 dirty_accountable
, prot_numa
);
239 } while (pgd
++, addr
= next
, addr
!= end
);
241 /* Only flush the TLB if we actually modified any entries: */
243 flush_tlb_range(vma
, start
, end
);
244 clear_tlb_flush_pending(mm
);
249 unsigned long change_protection(struct vm_area_struct
*vma
, unsigned long start
,
250 unsigned long end
, pgprot_t newprot
,
251 int dirty_accountable
, int prot_numa
)
255 if (is_vm_hugetlb_page(vma
))
256 pages
= hugetlb_change_protection(vma
, start
, end
, newprot
);
258 pages
= change_protection_range(vma
, start
, end
, newprot
, dirty_accountable
, prot_numa
);
263 static int prot_none_pte_entry(pte_t
*pte
, unsigned long addr
,
264 unsigned long next
, struct mm_walk
*walk
)
266 return pfn_modify_allowed(pte_pfn(*pte
), *(pgprot_t
*)(walk
->private)) ?
270 static int prot_none_hugetlb_entry(pte_t
*pte
, unsigned long hmask
,
271 unsigned long addr
, unsigned long next
,
272 struct mm_walk
*walk
)
274 return pfn_modify_allowed(pte_pfn(*pte
), *(pgprot_t
*)(walk
->private)) ?
278 static int prot_none_test(unsigned long addr
, unsigned long next
,
279 struct mm_walk
*walk
)
284 static int prot_none_walk(struct vm_area_struct
*vma
, unsigned long start
,
285 unsigned long end
, unsigned long newflags
)
287 pgprot_t new_pgprot
= vm_get_page_prot(newflags
);
288 struct mm_walk prot_none_walk
= {
289 .pte_entry
= prot_none_pte_entry
,
290 .hugetlb_entry
= prot_none_hugetlb_entry
,
291 .test_walk
= prot_none_test
,
293 .private = &new_pgprot
,
296 return walk_page_range(start
, end
, &prot_none_walk
);
300 mprotect_fixup(struct vm_area_struct
*vma
, struct vm_area_struct
**pprev
,
301 unsigned long start
, unsigned long end
, unsigned long newflags
)
303 struct mm_struct
*mm
= vma
->vm_mm
;
304 unsigned long oldflags
= vma
->vm_flags
;
305 long nrpages
= (end
- start
) >> PAGE_SHIFT
;
306 unsigned long charged
= 0;
309 int dirty_accountable
= 0;
311 if (newflags
== oldflags
) {
317 * Do PROT_NONE PFN permission checks here when we can still
318 * bail out without undoing a lot of state. This is a rather
319 * uncommon case, so doesn't need to be very optimized.
321 if (arch_has_pfn_modify_check() &&
322 (vma
->vm_flags
& (VM_PFNMAP
|VM_MIXEDMAP
)) &&
323 (newflags
& (VM_READ
|VM_WRITE
|VM_EXEC
)) == 0) {
324 error
= prot_none_walk(vma
, start
, end
, newflags
);
330 * If we make a private mapping writable we increase our commit;
331 * but (without finer accounting) cannot reduce our commit if we
332 * make it unwritable again. hugetlb mapping were accounted for
333 * even if read-only so there is no need to account for them here
335 if (newflags
& VM_WRITE
) {
336 /* Check space limits when area turns into data. */
337 if (!may_expand_vm(mm
, newflags
, nrpages
) &&
338 may_expand_vm(mm
, oldflags
, nrpages
))
340 if (!(oldflags
& (VM_ACCOUNT
|VM_WRITE
|VM_HUGETLB
|
341 VM_SHARED
|VM_NORESERVE
))) {
343 if (security_vm_enough_memory_mm(mm
, charged
))
345 newflags
|= VM_ACCOUNT
;
350 * First try to merge with previous and/or next vma.
352 pgoff
= vma
->vm_pgoff
+ ((start
- vma
->vm_start
) >> PAGE_SHIFT
);
353 *pprev
= vma_merge(mm
, *pprev
, start
, end
, newflags
,
354 vma
->anon_vma
, vma
->vm_file
, pgoff
, vma_policy(vma
),
355 vma
->vm_userfaultfd_ctx
);
358 VM_WARN_ON((vma
->vm_flags
^ newflags
) & ~VM_SOFTDIRTY
);
364 if (start
!= vma
->vm_start
) {
365 error
= split_vma(mm
, vma
, start
, 1);
370 if (end
!= vma
->vm_end
) {
371 error
= split_vma(mm
, vma
, end
, 0);
378 * vm_flags and vm_page_prot are protected by the mmap_sem
379 * held in write mode.
381 vma
->vm_flags
= newflags
;
382 dirty_accountable
= vma_wants_writenotify(vma
, vma
->vm_page_prot
);
383 vma_set_page_prot(vma
);
385 change_protection(vma
, start
, end
, vma
->vm_page_prot
,
386 dirty_accountable
, 0);
389 * Private VM_LOCKED VMA becoming writable: trigger COW to avoid major
392 if ((oldflags
& (VM_WRITE
| VM_SHARED
| VM_LOCKED
)) == VM_LOCKED
&&
393 (newflags
& VM_WRITE
)) {
394 populate_vma_page_range(vma
, start
, end
, NULL
);
397 vm_stat_account(mm
, oldflags
, -nrpages
);
398 vm_stat_account(mm
, newflags
, nrpages
);
399 perf_event_mmap(vma
);
403 vm_unacct_memory(charged
);
408 * pkey==-1 when doing a legacy mprotect()
410 static int do_mprotect_pkey(unsigned long start
, size_t len
,
411 unsigned long prot
, int pkey
)
413 unsigned long nstart
, end
, tmp
, reqprot
;
414 struct vm_area_struct
*vma
, *prev
;
416 const int grows
= prot
& (PROT_GROWSDOWN
|PROT_GROWSUP
);
417 const bool rier
= (current
->personality
& READ_IMPLIES_EXEC
) &&
420 prot
&= ~(PROT_GROWSDOWN
|PROT_GROWSUP
);
421 if (grows
== (PROT_GROWSDOWN
|PROT_GROWSUP
)) /* can't be both */
424 if (start
& ~PAGE_MASK
)
428 len
= PAGE_ALIGN(len
);
432 if (!arch_validate_prot(prot
))
437 if (down_write_killable(¤t
->mm
->mmap_sem
))
441 * If userspace did not allocate the pkey, do not let
445 if ((pkey
!= -1) && !mm_pkey_is_allocated(current
->mm
, pkey
))
448 vma
= find_vma(current
->mm
, start
);
453 if (unlikely(grows
& PROT_GROWSDOWN
)) {
454 if (vma
->vm_start
>= end
)
456 start
= vma
->vm_start
;
458 if (!(vma
->vm_flags
& VM_GROWSDOWN
))
461 if (vma
->vm_start
> start
)
463 if (unlikely(grows
& PROT_GROWSUP
)) {
466 if (!(vma
->vm_flags
& VM_GROWSUP
))
470 if (start
> vma
->vm_start
)
473 for (nstart
= start
; ; ) {
474 unsigned long mask_off_old_flags
;
475 unsigned long newflags
;
478 /* Here we know that vma->vm_start <= nstart < vma->vm_end. */
480 /* Does the application expect PROT_READ to imply PROT_EXEC */
481 if (rier
&& (vma
->vm_flags
& VM_MAYEXEC
))
485 * Each mprotect() call explicitly passes r/w/x permissions.
486 * If a permission is not passed to mprotect(), it must be
487 * cleared from the VMA.
489 mask_off_old_flags
= VM_READ
| VM_WRITE
| VM_EXEC
|
492 new_vma_pkey
= arch_override_mprotect_pkey(vma
, prot
, pkey
);
493 newflags
= calc_vm_prot_bits(prot
, new_vma_pkey
);
494 newflags
|= (vma
->vm_flags
& ~mask_off_old_flags
);
496 /* newflags >> 4 shift VM_MAY% in place of VM_% */
497 if ((newflags
& ~(newflags
>> 4)) & (VM_READ
| VM_WRITE
| VM_EXEC
)) {
502 error
= security_file_mprotect(vma
, reqprot
, prot
);
509 error
= mprotect_fixup(vma
, &prev
, nstart
, tmp
, newflags
);
514 if (nstart
< prev
->vm_end
)
515 nstart
= prev
->vm_end
;
520 if (!vma
|| vma
->vm_start
!= nstart
) {
527 up_write(¤t
->mm
->mmap_sem
);
531 SYSCALL_DEFINE3(mprotect
, unsigned long, start
, size_t, len
,
534 return do_mprotect_pkey(start
, len
, prot
, -1);
537 SYSCALL_DEFINE4(pkey_mprotect
, unsigned long, start
, size_t, len
,
538 unsigned long, prot
, int, pkey
)
540 return do_mprotect_pkey(start
, len
, prot
, pkey
);
543 SYSCALL_DEFINE2(pkey_alloc
, unsigned long, flags
, unsigned long, init_val
)
548 /* No flags supported yet. */
551 /* check for unsupported init values */
552 if (init_val
& ~PKEY_ACCESS_MASK
)
555 down_write(¤t
->mm
->mmap_sem
);
556 pkey
= mm_pkey_alloc(current
->mm
);
562 ret
= arch_set_user_pkey_access(current
, pkey
, init_val
);
564 mm_pkey_free(current
->mm
, pkey
);
569 up_write(¤t
->mm
->mmap_sem
);
573 SYSCALL_DEFINE1(pkey_free
, int, pkey
)
577 down_write(¤t
->mm
->mmap_sem
);
578 ret
= mm_pkey_free(current
->mm
, pkey
);
579 up_write(¤t
->mm
->mmap_sem
);
582 * We could provie warnings or errors if any VMA still
583 * has the pkey set here.