Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp536142ybb; Thu, 28 Mar 2019 07:22:35 -0700 (PDT) X-Google-Smtp-Source: APXvYqyFWC2DEuZwjBOLO7krS6rPYQs+afm0vwSIGFY1Tv0ZHURUubZQH6F6UK9l2bC11+TUW5qE X-Received: by 2002:a63:66c1:: with SMTP id a184mr40313770pgc.60.1553782955440; Thu, 28 Mar 2019 07:22:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553782955; cv=none; d=google.com; s=arc-20160816; b=oKbF0kqlgFveywxUy59QqtvyPxmTmeXfL9HXSBM+BbwZkz+SMrBijKo9A/WqLw52+K N+kj7WpTcmGem7SvZ+SupS6Hslsg8r2y+RQbF9+f3R3I8vjkHF5MlbP+KrHOqwaYNZAU /0fVg4RbqksUYwVv9l742vASF4HcTeYX+CF1287N1LY0CN+TdpVrnnk8lgE1LvlAX5w5 mt6NiZxfK0XLZOcxNSNF3UAQSWOH8rUMP/4wdCx3ra06Wtqh76zHG/cVuAd+CflF++Zh +6zRZy43C6p4neRvXjXoW+5XX5S9p6SNe/UGlMtewh1w3QHHpgTr80+aK+IB/9yh8vPs h8NQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:cc:to:subject:from:message-id :dkim-signature; bh=NfUz4WNgnOooXS2IE3dB18lpfq5BCwPK3vlyIjLs8Gs=; b=lrK6QmOGK72qhpJiK8ZZqHyUibQtTG3aTFsHXaecvNioq/oOxl8qAUpDbyN5me6dWV jVvtyZhlxZbCpMWJ86QSe8qLYmLHps5Ce7HKg1QZbol6ZZ1ic9kDBAghzBwcC3a8xq8E z7/N+UBgEOOmpUM9BpWJ8/xJYn0QdWlfWQ8V3DQ+Pae2K5qo2FqKbhKBqLH7K5125cbZ KMfEU4HyWKASO/7X4UaWPrw0WKm7D1I70oHt8eo7wgEZ9o2Unnu0r3BBNJILETgtO2ad 0e8ZiLeIhGDblr4NIcMzogYHeFvX4ElLEGmOONCeeitAm7kVcIZ59EPpalLNAde1JyW2 lPrw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=JO8wmztr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g11si11565853pgs.503.2019.03.28.07.22.19; Thu, 28 Mar 2019 07:22:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=JO8wmztr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727072AbfC1OV3 (ORCPT + 99 others); Thu, 28 Mar 2019 10:21:29 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:19747 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725875AbfC1OV1 (ORCPT ); Thu, 28 Mar 2019 10:21:27 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 44VRr42VPnz9tyRF; Thu, 28 Mar 2019 15:21:24 +0100 (CET) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=JO8wmztr; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id axVLpAMYPF41; Thu, 28 Mar 2019 15:21:24 +0100 (CET) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 44VRr41MF4z9tyRD; Thu, 28 Mar 2019 15:21:24 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1553782884; bh=NfUz4WNgnOooXS2IE3dB18lpfq5BCwPK3vlyIjLs8Gs=; h=From:Subject:To:Cc:Date:From; b=JO8wmztryWTpAFzgAZz4d1FRQgE4sUxrXN+NGzKOHtG7VwjBKHbCh3dveB6GekwDC 3XKasSKTT0VtlqfPdg3C92x05B16ITo/Q8iZsn5gbNLgBEM3vFBaWVIwSlth6AaqtG JPmrRAkPoU24fY5MSBIqudWnV+uioS2nW3XyfCeM= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 9BD3B8B922; Thu, 28 Mar 2019 15:21:25 +0100 (CET) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id Wi7AIBZNvrRl; Thu, 28 Mar 2019 15:21:25 +0100 (CET) Received: from po16846vm.idsi0.si.c-s.fr (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 555C68B91C; Thu, 28 Mar 2019 15:21:25 +0100 (CET) Received: by po16846vm.idsi0.si.c-s.fr (Postfix, from userid 0) id CB72769D41; Thu, 28 Mar 2019 14:21:24 +0000 (UTC) Message-Id: <3401648225001077db54172ee87573b21e1cfa38.1553782837.git.christophe.leroy@c-s.fr> From: Christophe Leroy Subject: [RFC PATCH] powerpc/book3e: KASAN Full support for 64bit To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , dja@axtens.net Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Thu, 28 Mar 2019 14:21:24 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The KASAN shadow area is mapped into vmemmap space: 0x8000 0400 0000 0000 to 0x8000 0600 0000 0000. For this vmemmap has to be disabled. Cc: Daniel Axtens Signed-off-by: Christophe Leroy --- arch/powerpc/Kconfig | 1 + arch/powerpc/Kconfig.debug | 3 +- arch/powerpc/include/asm/kasan.h | 11 +++ arch/powerpc/kernel/Makefile | 2 + arch/powerpc/kernel/head_64.S | 3 + arch/powerpc/kernel/setup_64.c | 20 +++--- arch/powerpc/mm/kasan/Makefile | 1 + arch/powerpc/mm/kasan/kasan_init_64.c | 129 ++++++++++++++++++++++++++++++++++ 8 files changed, 159 insertions(+), 11 deletions(-) create mode 100644 arch/powerpc/mm/kasan/kasan_init_64.c diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig index 1a2fb50126b2..e0b7c45e4dc7 100644 --- a/arch/powerpc/Kconfig +++ b/arch/powerpc/Kconfig @@ -174,6 +174,7 @@ config PPC select HAVE_ARCH_AUDITSYSCALL select HAVE_ARCH_JUMP_LABEL select HAVE_ARCH_KASAN if PPC32 + select HAVE_ARCH_KASAN if PPC_BOOK3E_64 && !SPARSEMEM_VMEMMAP select HAVE_ARCH_KGDB select HAVE_ARCH_MMAP_RND_BITS select HAVE_ARCH_MMAP_RND_COMPAT_BITS if COMPAT diff --git a/arch/powerpc/Kconfig.debug b/arch/powerpc/Kconfig.debug index 61febbbdd02b..b4140dd6b4e4 100644 --- a/arch/powerpc/Kconfig.debug +++ b/arch/powerpc/Kconfig.debug @@ -370,4 +370,5 @@ config PPC_FAST_ENDIAN_SWITCH config KASAN_SHADOW_OFFSET hex depends on KASAN - default 0xe0000000 + default 0xe0000000 if PPC32 + default 0x6800040000000000 if PPC64 diff --git a/arch/powerpc/include/asm/kasan.h b/arch/powerpc/include/asm/kasan.h index 296e51c2f066..756b3d58f921 100644 --- a/arch/powerpc/include/asm/kasan.h +++ b/arch/powerpc/include/asm/kasan.h @@ -23,10 +23,21 @@ #define KASAN_SHADOW_OFFSET ASM_CONST(CONFIG_KASAN_SHADOW_OFFSET) +#ifdef CONFIG_PPC32 #define KASAN_SHADOW_END 0UL #define KASAN_SHADOW_SIZE (KASAN_SHADOW_END - KASAN_SHADOW_START) +#else + +#include + +#define KASAN_SHADOW_SIZE (KERN_VIRT_SIZE >> KASAN_SHADOW_SCALE_SHIFT) + +#define KASAN_SHADOW_END (KASAN_SHADOW_START + KASAN_SHADOW_SIZE) + +#endif /* CONFIG_PPC32 */ + #ifdef CONFIG_KASAN void kasan_early_init(void); void kasan_mmu_init(void); diff --git a/arch/powerpc/kernel/Makefile b/arch/powerpc/kernel/Makefile index 0ea6c4aa3a20..7f232c06f11d 100644 --- a/arch/powerpc/kernel/Makefile +++ b/arch/powerpc/kernel/Makefile @@ -35,6 +35,8 @@ KASAN_SANITIZE_early_32.o := n KASAN_SANITIZE_cputable.o := n KASAN_SANITIZE_prom_init.o := n KASAN_SANITIZE_btext.o := n +KASAN_SANITIZE_paca.o := n +KASAN_SANITIZE_setup_64.o := n ifdef CONFIG_KASAN CFLAGS_early_32.o += -DDISABLE_BRANCH_PROFILING diff --git a/arch/powerpc/kernel/head_64.S b/arch/powerpc/kernel/head_64.S index 3fad8d499767..80fbd8024fb2 100644 --- a/arch/powerpc/kernel/head_64.S +++ b/arch/powerpc/kernel/head_64.S @@ -966,6 +966,9 @@ start_here_multiplatform: * and SLB setup before we turn on relocation. */ +#ifdef CONFIG_KASAN + bl kasan_early_init +#endif /* Restore parameters passed from prom_init/kexec */ mr r3,r31 bl early_setup /* also sets r13 and SPRG_PACA */ diff --git a/arch/powerpc/kernel/setup_64.c b/arch/powerpc/kernel/setup_64.c index ba404dd9ce1d..d2bf860dd966 100644 --- a/arch/powerpc/kernel/setup_64.c +++ b/arch/powerpc/kernel/setup_64.c @@ -311,6 +311,16 @@ void __init early_setup(unsigned long dt_ptr) DBG(" -> early_setup(), dt_ptr: 0x%lx\n", dt_ptr); /* + * Configure exception handlers. This include setting up trampolines + * if needed, setting exception endian mode, etc... + */ + configure_exceptions(); + + /* Apply all the dynamic patching */ + apply_feature_fixups(); + setup_feature_keys(); + + /* * Do early initialization using the flattened device * tree, such as retrieving the physical memory map or * calculating/retrieving the hash table size. @@ -325,16 +335,6 @@ void __init early_setup(unsigned long dt_ptr) setup_paca(paca_ptrs[boot_cpuid]); fixup_boot_paca(); - /* - * Configure exception handlers. This include setting up trampolines - * if needed, setting exception endian mode, etc... - */ - configure_exceptions(); - - /* Apply all the dynamic patching */ - apply_feature_fixups(); - setup_feature_keys(); - /* Initialize the hash table or TLB handling */ early_init_mmu(); diff --git a/arch/powerpc/mm/kasan/Makefile b/arch/powerpc/mm/kasan/Makefile index 6577897673dd..0bfbe3892808 100644 --- a/arch/powerpc/mm/kasan/Makefile +++ b/arch/powerpc/mm/kasan/Makefile @@ -3,3 +3,4 @@ KASAN_SANITIZE := n obj-$(CONFIG_PPC32) += kasan_init_32.o +obj-$(CONFIG_PPC64) += kasan_init_64.o diff --git a/arch/powerpc/mm/kasan/kasan_init_64.c b/arch/powerpc/mm/kasan/kasan_init_64.c new file mode 100644 index 000000000000..7fd71b8e883b --- /dev/null +++ b/arch/powerpc/mm/kasan/kasan_init_64.c @@ -0,0 +1,129 @@ +// SPDX-License-Identifier: GPL-2.0 + +#define DISABLE_BRANCH_PROFILING + +#include +#include +#include +#include +#include + +static void __init kasan_populate_pte(pte_t *ptep, pgprot_t prot) +{ + unsigned long va = (unsigned long)kasan_early_shadow_page; + phys_addr_t pa = __pa(kasan_early_shadow_page); + int i; + + for (i = 0; i < PTRS_PER_PTE; i++, ptep++) + __set_pte_at(&init_mm, va, ptep, pfn_pte(PHYS_PFN(pa), prot), 0); +} + +static void __init kasan_populate_pmd(pmd_t *pmdp) +{ + int i; + + for (i = 0; i < PTRS_PER_PMD; i++) + pmd_populate_kernel(&init_mm, pmdp + i, kasan_early_shadow_pte); +} + +static void __init kasan_populate_pud(pud_t *pudp) +{ + int i; + + for (i = 0; i < PTRS_PER_PUD; i++) + pud_populate(&init_mm, pudp + i, kasan_early_shadow_pmd); +} + +static void __init *kasan_alloc_pgtable(unsigned long size) +{ + void *ptr = memblock_alloc_try_nid(size, size, MEMBLOCK_LOW_LIMIT, + __pa(MAX_DMA_ADDRESS), NUMA_NO_NODE); + + if (!ptr) + panic("%s: Failed to allocate %lu bytes align=0x%lx max_addr=%lx\n", + __func__, size, size, __pa(MAX_DMA_ADDRESS)); + + return ptr; +} + +static int __init kasan_map_page(unsigned long va, unsigned long pa, pgprot_t prot) +{ + pgd_t *pgdp = pgd_offset_k(va); + pud_t *pudp; + pmd_t *pmdp; + pte_t *ptep; + + if (pgd_none(*pgdp) || (void *)pgd_page_vaddr(*pgdp) == kasan_early_shadow_pud) { + pudp = kasan_alloc_pgtable(PUD_TABLE_SIZE); + kasan_populate_pud(pudp); + pgd_populate(&init_mm, pgdp, pudp); + } + pudp = pud_offset(pgdp, va); + if (pud_none(*pudp) || (void *)pud_page_vaddr(*pudp) == kasan_early_shadow_pmd) { + pmdp = kasan_alloc_pgtable(PMD_TABLE_SIZE); + kasan_populate_pmd(pmdp); + pud_populate(&init_mm, pudp, pmdp); + } + pmdp = pmd_offset(pudp, va); + if (!pmd_present(*pmdp) || (void *)pmd_page_vaddr(*pmdp) == kasan_early_shadow_pte) { + ptep = kasan_alloc_pgtable(PTE_TABLE_SIZE); + kasan_populate_pte(ptep, PAGE_KERNEL); + pmd_populate_kernel(&init_mm, pmdp, ptep); + } + ptep = pte_offset_kernel(pmdp, va); + + __set_pte_at(&init_mm, va, ptep, pfn_pte(pa >> PAGE_SHIFT, prot), 0); + + return 0; +} + +static void __init kasan_init_region(struct memblock_region *reg) +{ + void *start = __va(reg->base); + void *end = __va(reg->base + reg->size); + unsigned long k_start, k_end, k_cur; + + if (start >= end) + return; + + k_start = (unsigned long)kasan_mem_to_shadow(start); + k_end = (unsigned long)kasan_mem_to_shadow(end); + + for (k_cur = k_start; k_cur < k_end; k_cur += PAGE_SIZE) { + void *va = memblock_alloc(PAGE_SIZE, PAGE_SIZE); + + kasan_map_page(k_cur, __pa(va), PAGE_KERNEL); + } + flush_tlb_kernel_range(k_start, k_end); +} + +void __init kasan_init(void) +{ + struct memblock_region *reg; + + for_each_memblock(memory, reg) + kasan_init_region(reg); + + /* It's too early to use clear_page() ! */ + memset(kasan_early_shadow_page, 0, sizeof(kasan_early_shadow_page)); + + /* Enable error messages */ + init_task.kasan_depth = 0; + pr_info("KASAN init done\n"); +} + +/* The early shadow maps everything to a single page of zeroes */ +asmlinkage void __init kasan_early_init(void) +{ + unsigned long addr = KASAN_SHADOW_START; + unsigned long end = KASAN_SHADOW_END; + pgd_t *pgdp = pgd_offset_k(addr); + + kasan_populate_pte(kasan_early_shadow_pte, PAGE_KERNEL); + kasan_populate_pmd(kasan_early_shadow_pmd); + kasan_populate_pud(kasan_early_shadow_pud); + + do { + pgd_populate(&init_mm, pgdp, kasan_early_shadow_pud); + } while (pgdp++, addr = pgd_addr_end(addr, end), addr != end); +} -- 2.13.3