Received: by 2002:a05:6520:4211:b029:f4:110d:56bc with SMTP id o17csp1611598lkv; Wed, 19 May 2021 14:02:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyqMD2TiuSXk7twBlHYgtfU8lCRS7TtMfsolzkm41arKT3W1Ty2ShLzWzB9WyrTunb77fsZ X-Received: by 2002:a05:6e02:8f2:: with SMTP id n18mr964410ilt.299.1621458175292; Wed, 19 May 2021 14:02:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621458175; cv=none; d=google.com; s=arc-20160816; b=r8/f7MRevTCeUYh4VyM+T7i75tLTb4DN04vJSmEUpKinU08izMEPGlZp1eIi/zrCXa FqJwYYpxHACODLjM4ySTBiodzeexg6B3Ng97iiX+iBtLFCE19nDUxWprLGpZmwjh3Gp3 76TG5zf1KiMmZr9jwCgd+KtSuhWDI0p3N/vULj4Ip7ATuZCmbn+PBVK7g7eBW2quUlKd RD48exFKs1e6Dbr220QoWdoy+c/xxPlDiOBZPvUaZLMFyszO7U3WHtLVIhpz+BuWU60U CpOaJqJURC6wXCmQfF8fVGQkYbV0V2Y5OoWKunzI+qwvTcWLWF2JaJQkLsNLYZMBEK7Z Z0mw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=CvtPTgT9V0A0cObCZBCFt4MiSRC91gGNm9k32gWwLjs=; b=gFCjosdlDL3zRr2n/fwyO7BNJZuE2g0848MnHFtw627BYrQSdGsGsfS/R+Co2mQlJ7 7OESHcvEUC9VMaRL18bB6NKkWdu2SVEh9TVp98lXvoLsY7268hNFdrbT9L3XfdrvlU1n AU0hJ51J3H1Psu7Rowh7Zzj4WviZ2SwlImU6HB05B0zlI7wMOoHG9DfEAyK60h6mBGK9 t1QdDjwTiPKyAUHf/LZOa0SmUvRJRSAqH79wGID1HvD6bIXZydPad1hcTzAFW74Iw8xf mubZ2gRC/GxlX9MdakxzQdwcfbi7mSXDITxNtk5MuExr5eK61HKUzVcxtqa0/zMxpJfq xbyQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f2si513070ioz.41.2021.05.19.14.02.41; Wed, 19 May 2021 14:02:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1350148AbhERPW6 (ORCPT + 99 others); Tue, 18 May 2021 11:22:58 -0400 Received: from relay3-d.mail.gandi.net ([217.70.183.195]:50873 "EHLO relay3-d.mail.gandi.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241047AbhERPW6 (ORCPT ); Tue, 18 May 2021 11:22:58 -0400 Received: (Authenticated sender: alex@ghiti.fr) by relay3-d.mail.gandi.net (Postfix) with ESMTPSA id 11C4F60002; Tue, 18 May 2021 15:21:35 +0000 (UTC) From: Alexandre Ghiti To: Paul Walmsley , Palmer Dabbelt , Albert Ou , Jisheng Zhang , Zong Li , Anup Patel , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org Cc: Alexandre Ghiti Subject: [PATCH RFC] riscv: Map the kernel with correct permissions the first time Date: Tue, 18 May 2021 17:21:34 +0200 Message-Id: <20210518152134.1772653-1-alex@ghiti.fr> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For 64b kernels, we map all the kernel with write and execute permissions and afterwards remove writability from text and executability from data. For 32b kernels, the kernel mapping resides in the linear mapping, so we map all the linear mapping as writable and executable and afterwards we remove those properties for unused memory and kernel mapping as described above. Change this behavior to directly map the kernel with correct permissions and avoid going through the whole mapping to fix the permissions. At the same time, this fixes an issue introduced by commit 2bfc6cd81bd1 ("riscv: Move kernel mapping outside of linear mapping") as reported here https://github.com/starfive-tech/linux/issues/17. Signed-off-by: Alexandre Ghiti --- This patchset was tested on: * kernel: - rv32 with CONFIG_STRICT_KERNEL_RWX: OK - rv32 without CONFIG_STRICT_KERNEL_RWX: OK - rv64 with CONFIG_STRICT_KERNEL_RWX: OK - rv64 without CONFIG_STRICT_KERNEL_RWX: OK * xipkernel: - rv32: build only - rv64: OK arch/riscv/include/asm/set_memory.h | 2 - arch/riscv/kernel/setup.c | 1 - arch/riscv/mm/init.c | 80 ++++++++++++++--------------- 3 files changed, 38 insertions(+), 45 deletions(-) diff --git a/arch/riscv/include/asm/set_memory.h b/arch/riscv/include/asm/set_memory.h index 086f757e8ba3..70154f012791 100644 --- a/arch/riscv/include/asm/set_memory.h +++ b/arch/riscv/include/asm/set_memory.h @@ -16,13 +16,11 @@ int set_memory_rw(unsigned long addr, int numpages); int set_memory_x(unsigned long addr, int numpages); int set_memory_nx(unsigned long addr, int numpages); int set_memory_rw_nx(unsigned long addr, int numpages); -void protect_kernel_text_data(void); #else static inline int set_memory_ro(unsigned long addr, int numpages) { return 0; } static inline int set_memory_rw(unsigned long addr, int numpages) { return 0; } static inline int set_memory_x(unsigned long addr, int numpages) { return 0; } static inline int set_memory_nx(unsigned long addr, int numpages) { return 0; } -static inline void protect_kernel_text_data(void) {} static inline int set_memory_rw_nx(unsigned long addr, int numpages) { return 0; } #endif diff --git a/arch/riscv/kernel/setup.c b/arch/riscv/kernel/setup.c index 03901d3a8b02..1eb50e512056 100644 --- a/arch/riscv/kernel/setup.c +++ b/arch/riscv/kernel/setup.c @@ -292,7 +292,6 @@ void __init setup_arch(char **cmdline_p) sbi_init(); if (IS_ENABLED(CONFIG_STRICT_KERNEL_RWX)) { - protect_kernel_text_data(); protect_kernel_linear_mapping_text_rodata(); } diff --git a/arch/riscv/mm/init.c b/arch/riscv/mm/init.c index 4faf8bd157ea..92b3184420a2 100644 --- a/arch/riscv/mm/init.c +++ b/arch/riscv/mm/init.c @@ -436,6 +436,36 @@ asmlinkage void __init __copy_data(void) } #endif +#ifdef CONFIG_STRICT_KERNEL_RWX +#define is_text_va(va) ({ \ + unsigned long _va = va; \ + (_va < (unsigned long)__init_data_begin && _va >= (unsigned long)_start); \ + }) + +static inline __init pgprot_t pgprot_from_kernel_va(uintptr_t va) +{ + return is_text_va(va) ? PAGE_KERNEL_READ_EXEC : PAGE_KERNEL; +} + +void mark_rodata_ro(void) +{ + unsigned long rodata_start = (unsigned long)__start_rodata; + unsigned long data_start = (unsigned long)_data; + + set_memory_ro(rodata_start, (data_start - rodata_start) >> PAGE_SHIFT); + + debug_checkwx(); +} +#else +static inline __init pgprot_t pgprot_from_kernel_va(uintptr_t va) +{ + if (IS_ENABLED(CONFIG_32BIT)) + return PAGE_KERNEL_EXEC; + + return (va < kernel_virt_addr) ? PAGE_KERNEL : PAGE_KERNEL_EXEC; +} +#endif + /* * setup_vm() is called from head.S with MMU-off. * @@ -465,7 +495,8 @@ uintptr_t xiprom, xiprom_sz; #define xiprom_sz (*((uintptr_t *)XIP_FIXUP(&xiprom_sz))) #define xiprom (*((uintptr_t *)XIP_FIXUP(&xiprom))) -static void __init create_kernel_page_table(pgd_t *pgdir, uintptr_t map_size) +static void __init create_kernel_page_table(pgd_t *pgdir, uintptr_t map_size, + __always_unused bool early) { uintptr_t va, end_va; @@ -484,7 +515,7 @@ static void __init create_kernel_page_table(pgd_t *pgdir, uintptr_t map_size) map_size, PAGE_KERNEL); } #else -static void __init create_kernel_page_table(pgd_t *pgdir, uintptr_t map_size) +static void __init create_kernel_page_table(pgd_t *pgdir, uintptr_t map_size, bool early) { uintptr_t va, end_va; @@ -492,7 +523,7 @@ static void __init create_kernel_page_table(pgd_t *pgdir, uintptr_t map_size) for (va = kernel_virt_addr; va < end_va; va += map_size) create_pgd_mapping(pgdir, va, load_pa + (va - kernel_virt_addr), - map_size, PAGE_KERNEL_EXEC); + map_size, early ? PAGE_KERNEL_EXEC : pgprot_from_kernel_va(va)); } #endif @@ -569,7 +600,7 @@ asmlinkage void __init setup_vm(uintptr_t dtb_pa) * us to reach paging_init(). We map all memory banks later * in setup_vm_final() below. */ - create_kernel_page_table(early_pg_dir, map_size); + create_kernel_page_table(early_pg_dir, map_size, true); #ifndef __PAGETABLE_PMD_FOLDED /* Setup early PMD for DTB */ @@ -693,21 +724,15 @@ static void __init setup_vm_final(void) map_size = best_map_size(start, end - start); for (pa = start; pa < end; pa += map_size) { va = (uintptr_t)__va(pa); - create_pgd_mapping(swapper_pg_dir, va, pa, - map_size, -#ifdef CONFIG_64BIT - PAGE_KERNEL -#else - PAGE_KERNEL_EXEC -#endif - ); + create_pgd_mapping(swapper_pg_dir, va, pa, map_size, + pgprot_from_kernel_va(va)); } } #ifdef CONFIG_64BIT /* Map the kernel */ - create_kernel_page_table(swapper_pg_dir, PMD_SIZE); + create_kernel_page_table(swapper_pg_dir, PMD_SIZE, false); #endif /* Clear fixmap PTE and PMD mappings */ @@ -738,35 +763,6 @@ static inline void setup_vm_final(void) } #endif /* CONFIG_MMU */ -#ifdef CONFIG_STRICT_KERNEL_RWX -void __init protect_kernel_text_data(void) -{ - unsigned long text_start = (unsigned long)_start; - unsigned long init_text_start = (unsigned long)__init_text_begin; - unsigned long init_data_start = (unsigned long)__init_data_begin; - unsigned long rodata_start = (unsigned long)__start_rodata; - unsigned long data_start = (unsigned long)_data; - unsigned long max_low = (unsigned long)(__va(PFN_PHYS(max_low_pfn))); - - set_memory_ro(text_start, (init_text_start - text_start) >> PAGE_SHIFT); - set_memory_ro(init_text_start, (init_data_start - init_text_start) >> PAGE_SHIFT); - set_memory_nx(init_data_start, (rodata_start - init_data_start) >> PAGE_SHIFT); - /* rodata section is marked readonly in mark_rodata_ro */ - set_memory_nx(rodata_start, (data_start - rodata_start) >> PAGE_SHIFT); - set_memory_nx(data_start, (max_low - data_start) >> PAGE_SHIFT); -} - -void mark_rodata_ro(void) -{ - unsigned long rodata_start = (unsigned long)__start_rodata; - unsigned long data_start = (unsigned long)_data; - - set_memory_ro(rodata_start, (data_start - rodata_start) >> PAGE_SHIFT); - - debug_checkwx(); -} -#endif - #ifdef CONFIG_KEXEC_CORE /* * reserve_crashkernel() - reserves memory for crash kernel -- 2.30.2