Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp901165ybx; Thu, 31 Oct 2019 02:41:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqw5th7q++rqUtuXV8+62syDJT1om+6gkSuH06d20ymuNrUXkWPTHWobPKSWxbl+dgQvQiOV X-Received: by 2002:a17:906:5f8a:: with SMTP id a10mr2905725eju.204.1572514916281; Thu, 31 Oct 2019 02:41:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572514916; cv=none; d=google.com; s=arc-20160816; b=RXGAupLinZLNhSY1Z6LykJMNEswUGsGekkIkTsOU3g7hLdBii54GhjAy2guT1sTrfO t05GEhamjYqo86qPxBH4EGeSvQyavUn1FEa0L9Nw2vmbXQEt6gCasy2IonU8p9q4Kozu 61UiHGDBvjMRFQzRaHEmIVWX32ZpriL7QP/uUAVytNtLYnkpB6v7w+gKM1RBHHNOUWFp dRAWOfG9/yW3bvtDU4Cnv7DPZiIrt/sO71/f6aWqyqSH+NM76L2u0Qm0bEy8wAoiM3U7 DOSC5DRupJuSs1sOWFF9WYYgWtBXSO5Uhz/uH0fFd+AgVXr653klcAKhTe+W+SBzSDlz bYoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=PPZxJ9u49e1rTbwMFrZRlJu9A0GDiffR0uj0Pjy+KKM=; b=cnyC3ZHpzoLCdTzzJ9elw2hAL2jVcu5/Jhn7Y7x9h+9cxqxpm7qQ2sKP+0yVayGi84 s/5BFT2ProUx4ojQJ+HXFapGtYKJYnqGAtyn+S9gqkFA2W3b0KPMt1qJlTWx6GRJUEx5 wqEpBZJ1h+Bs18tcEVfqVFob5pWKg//c7IQ9rZgU60WpaQwb5rqJXRifdjbhJjoXc9f2 VnMyxW6h+h/zp9tLithd3cQQ7uzh9usXRkUSRUDvUmpEtpDbtidEd3gxwceGCDg8DijW NiBCrEVIcfitL6UL6RCVKn4R/VSgPRJ3fwDncMzQYqqIa7/npGkgoMmLLrBr+86+y9tI Fwbg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@axtens.net header.s=google header.b=cNX69LQO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p5si3078442eja.141.2019.10.31.02.41.32; Thu, 31 Oct 2019 02:41:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@axtens.net header.s=google header.b=cNX69LQO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727351AbfJaJjf (ORCPT + 99 others); Thu, 31 Oct 2019 05:39:35 -0400 Received: from mail-pf1-f193.google.com ([209.85.210.193]:37355 "EHLO mail-pf1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727153AbfJaJjf (ORCPT ); Thu, 31 Oct 2019 05:39:35 -0400 Received: by mail-pf1-f193.google.com with SMTP id u9so3991407pfn.4 for ; Thu, 31 Oct 2019 02:39:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axtens.net; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=PPZxJ9u49e1rTbwMFrZRlJu9A0GDiffR0uj0Pjy+KKM=; b=cNX69LQOCELZECnYKOu5T7jfJmyq7A8jLTk/cgu/lzv+F9nZOKzRMgwfyXnqZkkHmK 9OI1ai6nubAgXXwNkjeFWcIrjdNk3aL2HvMexg/iAGww752AIqiBw4Zy0juae2GEFYoH HvNcoSFUdylybGMD0PMUe1r/XMVFa2zWRNjc8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=PPZxJ9u49e1rTbwMFrZRlJu9A0GDiffR0uj0Pjy+KKM=; b=OihRnW0BhgYh0V3t76zyfWKovu8hItIvZY4RuxAqRM/us6aFGLh01vLg9ZEQeGs+7g ohSSGXSa22ZnLNczeTJNCPVvN85tJmp7IMfAML6qEng/0pVgkQ7KwvR0QllugW7ICdvU IvAYvUWZ9ot47HbYjmq+bZk2vLxQdmkpu6wAJ/229xmnAzTAkVE2vEod1U/QcMwvA9y9 rvQxgVHraDIX8xCfgyw5YPMcaGqIx+bOZHQHZ335x7yDSOug3ikdiBks3TPvK1gZvTKh SP4traBbe9ZJ59nELq8waz6WH/WNWtjaw+//XrEc/praFa2pjap6ku9LbhSoBhno0diY +Tng== X-Gm-Message-State: APjAAAVX35R9P4XvggjN70QyKHf1TMWBVONZVZ238mddD9AowVwFgZXL 0/uGBcAeCx9dN4FbDcnw8rxlEQ== X-Received: by 2002:a63:d308:: with SMTP id b8mr5489951pgg.246.1572514773130; Thu, 31 Oct 2019 02:39:33 -0700 (PDT) Received: from localhost (2001-44b8-1113-6700-783a-2bb9-f7cb-7c3c.static.ipv6.internode.on.net. [2001:44b8:1113:6700:783a:2bb9:f7cb:7c3c]) by smtp.gmail.com with ESMTPSA id q185sm4870092pfc.153.2019.10.31.02.39.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 31 Oct 2019 02:39:32 -0700 (PDT) From: Daniel Axtens To: kasan-dev@googlegroups.com, linux-mm@kvack.org, x86@kernel.org, aryabinin@virtuozzo.com, glider@google.com, luto@kernel.org, linux-kernel@vger.kernel.org, mark.rutland@arm.com, dvyukov@google.com, christophe.leroy@c-s.fr Cc: linuxppc-dev@lists.ozlabs.org, gor@linux.ibm.com, Daniel Axtens Subject: [PATCH v11 4/4] x86/kasan: support KASAN_VMALLOC Date: Thu, 31 Oct 2019 20:39:09 +1100 Message-Id: <20191031093909.9228-5-dja@axtens.net> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20191031093909.9228-1-dja@axtens.net> References: <20191031093909.9228-1-dja@axtens.net> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In the case where KASAN directly allocates memory to back vmalloc space, don't map the early shadow page over it. We prepopulate pgds/p4ds for the range that would otherwise be empty. This is required to get it synced to hardware on boot, allowing the lower levels of the page tables to be filled dynamically. Acked-by: Dmitry Vyukov Reviewed-by: Andrey Ryabinin Signed-off-by: Daniel Axtens --- v11: use NUMA_NO_NODE, not a completely invalid value, and don't populate more real p[g4]ds than necessary - thanks Andrey. v5: fix some checkpatch CHECK warnings. There are some that remain around lines ending with '(': I have not changed these because it's consistent with the rest of the file and it's not easy to see how to fix it without creating an overlong line or lots of temporary variables. v2: move from faulting in shadow pgds to prepopulating --- arch/x86/Kconfig | 1 + arch/x86/mm/kasan_init_64.c | 61 +++++++++++++++++++++++++++++++++++++ 2 files changed, 62 insertions(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 45699e458057..d65b0fcc9bc0 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -135,6 +135,7 @@ config X86 select HAVE_ARCH_JUMP_LABEL select HAVE_ARCH_JUMP_LABEL_RELATIVE select HAVE_ARCH_KASAN if X86_64 + select HAVE_ARCH_KASAN_VMALLOC if X86_64 select HAVE_ARCH_KGDB select HAVE_ARCH_MMAP_RND_BITS if MMU select HAVE_ARCH_MMAP_RND_COMPAT_BITS if MMU && COMPAT diff --git a/arch/x86/mm/kasan_init_64.c b/arch/x86/mm/kasan_init_64.c index 296da58f3013..cf5bc37c90ac 100644 --- a/arch/x86/mm/kasan_init_64.c +++ b/arch/x86/mm/kasan_init_64.c @@ -245,6 +245,49 @@ static void __init kasan_map_early_shadow(pgd_t *pgd) } while (pgd++, addr = next, addr != end); } +static void __init kasan_shallow_populate_p4ds(pgd_t *pgd, + unsigned long addr, + unsigned long end) +{ + p4d_t *p4d; + unsigned long next; + void *p; + + p4d = p4d_offset(pgd, addr); + do { + next = p4d_addr_end(addr, end); + + if (p4d_none(*p4d)) { + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE, true); + p4d_populate(&init_mm, p4d, p); + } + } while (p4d++, addr = next, addr != end); +} + +static void __init kasan_shallow_populate_pgds(void *start, void *end) +{ + unsigned long addr, next; + pgd_t *pgd; + void *p; + + addr = (unsigned long)start; + pgd = pgd_offset_k(addr); + do { + next = pgd_addr_end(addr, (unsigned long)end); + + if (pgd_none(*pgd)) { + p = early_alloc(PAGE_SIZE, NUMA_NO_NODE, true); + pgd_populate(&init_mm, pgd, p); + } + + /* + * we need to populate p4ds to be synced when running in + * four level mode - see sync_global_pgds_l4() + */ + kasan_shallow_populate_p4ds(pgd, addr, next); + } while (pgd++, addr = next, addr != (unsigned long)end); +} + #ifdef CONFIG_KASAN_INLINE static int kasan_die_handler(struct notifier_block *self, unsigned long val, @@ -354,6 +397,24 @@ void __init kasan_init(void) kasan_populate_early_shadow( kasan_mem_to_shadow((void *)PAGE_OFFSET + MAXMEM), + kasan_mem_to_shadow((void *)VMALLOC_START)); + + /* + * If we're in full vmalloc mode, don't back vmalloc space with early + * shadow pages. Instead, prepopulate pgds/p4ds so they are synced to + * the global table and we can populate the lower levels on demand. + */ + if (IS_ENABLED(CONFIG_KASAN_VMALLOC)) + kasan_shallow_populate_pgds( + kasan_mem_to_shadow((void *)VMALLOC_START), + kasan_mem_to_shadow((void *)VMALLOC_END)); + else + kasan_populate_early_shadow( + kasan_mem_to_shadow((void *)VMALLOC_START), + kasan_mem_to_shadow((void *)VMALLOC_END)); + + kasan_populate_early_shadow( + kasan_mem_to_shadow((void *)VMALLOC_END + 1), shadow_cpu_entry_begin); kasan_populate_shadow((unsigned long)shadow_cpu_entry_begin, -- 2.20.1