2020-03-09 09:55:36 -07:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
|
|
|
/*
|
|
|
|
* Copyright (C) 2019 SiFive
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/pagewalk.h>
|
2020-06-08 21:32:38 -07:00
|
|
|
#include <linux/pgtable.h>
|
2023-11-08 00:59:30 -07:00
|
|
|
#include <linux/vmalloc.h>
|
2020-03-09 09:55:36 -07:00
|
|
|
#include <asm/tlbflush.h>
|
|
|
|
#include <asm/bitops.h>
|
2020-07-15 23:15:27 -07:00
|
|
|
#include <asm/set_memory.h>
|
2020-03-09 09:55:36 -07:00
|
|
|
|
|
|
|
struct pageattr_masks {
|
|
|
|
pgprot_t set_mask;
|
|
|
|
pgprot_t clear_mask;
|
|
|
|
};
|
|
|
|
|
|
|
|
static unsigned long set_pageattr_masks(unsigned long val, struct mm_walk *walk)
|
|
|
|
{
|
|
|
|
struct pageattr_masks *masks = walk->private;
|
|
|
|
unsigned long new_val = val;
|
|
|
|
|
|
|
|
new_val &= ~(pgprot_val(masks->clear_mask));
|
|
|
|
new_val |= (pgprot_val(masks->set_mask));
|
|
|
|
|
|
|
|
return new_val;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int pageattr_p4d_entry(p4d_t *p4d, unsigned long addr,
|
|
|
|
unsigned long next, struct mm_walk *walk)
|
|
|
|
{
|
2023-12-13 13:30:01 -07:00
|
|
|
p4d_t val = p4dp_get(p4d);
|
2020-03-09 09:55:36 -07:00
|
|
|
|
|
|
|
if (p4d_leaf(val)) {
|
|
|
|
val = __p4d(set_pageattr_masks(p4d_val(val), walk));
|
|
|
|
set_p4d(p4d, val);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int pageattr_pud_entry(pud_t *pud, unsigned long addr,
|
|
|
|
unsigned long next, struct mm_walk *walk)
|
|
|
|
{
|
2023-12-13 13:30:01 -07:00
|
|
|
pud_t val = pudp_get(pud);
|
2020-03-09 09:55:36 -07:00
|
|
|
|
|
|
|
if (pud_leaf(val)) {
|
|
|
|
val = __pud(set_pageattr_masks(pud_val(val), walk));
|
|
|
|
set_pud(pud, val);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int pageattr_pmd_entry(pmd_t *pmd, unsigned long addr,
|
|
|
|
unsigned long next, struct mm_walk *walk)
|
|
|
|
{
|
2023-12-13 13:30:01 -07:00
|
|
|
pmd_t val = pmdp_get(pmd);
|
2020-03-09 09:55:36 -07:00
|
|
|
|
|
|
|
if (pmd_leaf(val)) {
|
|
|
|
val = __pmd(set_pageattr_masks(pmd_val(val), walk));
|
|
|
|
set_pmd(pmd, val);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int pageattr_pte_entry(pte_t *pte, unsigned long addr,
|
|
|
|
unsigned long next, struct mm_walk *walk)
|
|
|
|
{
|
2023-12-13 13:30:01 -07:00
|
|
|
pte_t val = ptep_get(pte);
|
2020-03-09 09:55:36 -07:00
|
|
|
|
|
|
|
val = __pte(set_pageattr_masks(pte_val(val), walk));
|
|
|
|
set_pte(pte, val);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int pageattr_pte_hole(unsigned long addr, unsigned long next,
|
|
|
|
int depth, struct mm_walk *walk)
|
|
|
|
{
|
|
|
|
/* Nothing to do here */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-07-15 23:15:27 -07:00
|
|
|
static const struct mm_walk_ops pageattr_ops = {
|
2020-03-09 09:55:36 -07:00
|
|
|
.p4d_entry = pageattr_p4d_entry,
|
|
|
|
.pud_entry = pageattr_pud_entry,
|
|
|
|
.pmd_entry = pageattr_pmd_entry,
|
|
|
|
.pte_entry = pageattr_pte_entry,
|
|
|
|
.pte_hole = pageattr_pte_hole,
|
2023-08-04 08:27:19 -07:00
|
|
|
.walk_lock = PGWALK_RDLOCK,
|
2020-03-09 09:55:36 -07:00
|
|
|
};
|
|
|
|
|
2023-11-08 00:59:30 -07:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
static int __split_linear_mapping_pmd(pud_t *pudp,
|
|
|
|
unsigned long vaddr, unsigned long end)
|
|
|
|
{
|
|
|
|
pmd_t *pmdp;
|
|
|
|
unsigned long next;
|
|
|
|
|
|
|
|
pmdp = pmd_offset(pudp, vaddr);
|
|
|
|
|
|
|
|
do {
|
|
|
|
next = pmd_addr_end(vaddr, end);
|
|
|
|
|
|
|
|
if (next - vaddr >= PMD_SIZE &&
|
|
|
|
vaddr <= (vaddr & PMD_MASK) && end >= next)
|
|
|
|
continue;
|
|
|
|
|
2023-12-13 13:30:01 -07:00
|
|
|
if (pmd_leaf(pmdp_get(pmdp))) {
|
2023-11-08 00:59:30 -07:00
|
|
|
struct page *pte_page;
|
2023-12-13 13:30:01 -07:00
|
|
|
unsigned long pfn = _pmd_pfn(pmdp_get(pmdp));
|
|
|
|
pgprot_t prot = __pgprot(pmd_val(pmdp_get(pmdp)) & ~_PAGE_PFN_MASK);
|
2023-11-08 00:59:30 -07:00
|
|
|
pte_t *ptep_new;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
pte_page = alloc_page(GFP_KERNEL);
|
|
|
|
if (!pte_page)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
ptep_new = (pte_t *)page_address(pte_page);
|
|
|
|
for (i = 0; i < PTRS_PER_PTE; ++i, ++ptep_new)
|
|
|
|
set_pte(ptep_new, pfn_pte(pfn + i, prot));
|
|
|
|
|
|
|
|
smp_wmb();
|
|
|
|
|
|
|
|
set_pmd(pmdp, pfn_pmd(page_to_pfn(pte_page), PAGE_TABLE));
|
|
|
|
}
|
|
|
|
} while (pmdp++, vaddr = next, vaddr != end);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __split_linear_mapping_pud(p4d_t *p4dp,
|
|
|
|
unsigned long vaddr, unsigned long end)
|
|
|
|
{
|
|
|
|
pud_t *pudp;
|
|
|
|
unsigned long next;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
pudp = pud_offset(p4dp, vaddr);
|
|
|
|
|
|
|
|
do {
|
|
|
|
next = pud_addr_end(vaddr, end);
|
|
|
|
|
|
|
|
if (next - vaddr >= PUD_SIZE &&
|
|
|
|
vaddr <= (vaddr & PUD_MASK) && end >= next)
|
|
|
|
continue;
|
|
|
|
|
2023-12-13 13:30:01 -07:00
|
|
|
if (pud_leaf(pudp_get(pudp))) {
|
2023-11-08 00:59:30 -07:00
|
|
|
struct page *pmd_page;
|
2023-12-13 13:30:01 -07:00
|
|
|
unsigned long pfn = _pud_pfn(pudp_get(pudp));
|
|
|
|
pgprot_t prot = __pgprot(pud_val(pudp_get(pudp)) & ~_PAGE_PFN_MASK);
|
2023-11-08 00:59:30 -07:00
|
|
|
pmd_t *pmdp_new;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
pmd_page = alloc_page(GFP_KERNEL);
|
|
|
|
if (!pmd_page)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
pmdp_new = (pmd_t *)page_address(pmd_page);
|
|
|
|
for (i = 0; i < PTRS_PER_PMD; ++i, ++pmdp_new)
|
|
|
|
set_pmd(pmdp_new,
|
|
|
|
pfn_pmd(pfn + ((i * PMD_SIZE) >> PAGE_SHIFT), prot));
|
|
|
|
|
|
|
|
smp_wmb();
|
|
|
|
|
|
|
|
set_pud(pudp, pfn_pud(page_to_pfn(pmd_page), PAGE_TABLE));
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = __split_linear_mapping_pmd(pudp, vaddr, next);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
} while (pudp++, vaddr = next, vaddr != end);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __split_linear_mapping_p4d(pgd_t *pgdp,
|
|
|
|
unsigned long vaddr, unsigned long end)
|
|
|
|
{
|
|
|
|
p4d_t *p4dp;
|
|
|
|
unsigned long next;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
p4dp = p4d_offset(pgdp, vaddr);
|
|
|
|
|
|
|
|
do {
|
|
|
|
next = p4d_addr_end(vaddr, end);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If [vaddr; end] contains [vaddr & P4D_MASK; next], we don't
|
|
|
|
* need to split, we'll change the protections on the whole P4D.
|
|
|
|
*/
|
|
|
|
if (next - vaddr >= P4D_SIZE &&
|
|
|
|
vaddr <= (vaddr & P4D_MASK) && end >= next)
|
|
|
|
continue;
|
|
|
|
|
2023-12-13 13:30:01 -07:00
|
|
|
if (p4d_leaf(p4dp_get(p4dp))) {
|
2023-11-08 00:59:30 -07:00
|
|
|
struct page *pud_page;
|
2023-12-13 13:30:01 -07:00
|
|
|
unsigned long pfn = _p4d_pfn(p4dp_get(p4dp));
|
|
|
|
pgprot_t prot = __pgprot(p4d_val(p4dp_get(p4dp)) & ~_PAGE_PFN_MASK);
|
2023-11-08 00:59:30 -07:00
|
|
|
pud_t *pudp_new;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
pud_page = alloc_page(GFP_KERNEL);
|
|
|
|
if (!pud_page)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Fill the pud level with leaf puds that have the same
|
|
|
|
* protections as the leaf p4d.
|
|
|
|
*/
|
|
|
|
pudp_new = (pud_t *)page_address(pud_page);
|
|
|
|
for (i = 0; i < PTRS_PER_PUD; ++i, ++pudp_new)
|
|
|
|
set_pud(pudp_new,
|
|
|
|
pfn_pud(pfn + ((i * PUD_SIZE) >> PAGE_SHIFT), prot));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Make sure the pud filling is not reordered with the
|
|
|
|
* p4d store which could result in seeing a partially
|
|
|
|
* filled pud level.
|
|
|
|
*/
|
|
|
|
smp_wmb();
|
|
|
|
|
|
|
|
set_p4d(p4dp, pfn_p4d(page_to_pfn(pud_page), PAGE_TABLE));
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = __split_linear_mapping_pud(p4dp, vaddr, next);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
} while (p4dp++, vaddr = next, vaddr != end);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __split_linear_mapping_pgd(pgd_t *pgdp,
|
|
|
|
unsigned long vaddr,
|
|
|
|
unsigned long end)
|
|
|
|
{
|
|
|
|
unsigned long next;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
do {
|
|
|
|
next = pgd_addr_end(vaddr, end);
|
|
|
|
/* We never use PGD mappings for the linear mapping */
|
|
|
|
ret = __split_linear_mapping_p4d(pgdp, vaddr, next);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
} while (pgdp++, vaddr = next, vaddr != end);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int split_linear_mapping(unsigned long start, unsigned long end)
|
|
|
|
{
|
|
|
|
return __split_linear_mapping_pgd(pgd_offset_k(start), start, end);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_64BIT */
|
|
|
|
|
2020-03-09 09:55:36 -07:00
|
|
|
static int __set_memory(unsigned long addr, int numpages, pgprot_t set_mask,
|
|
|
|
pgprot_t clear_mask)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
unsigned long start = addr;
|
|
|
|
unsigned long end = start + PAGE_SIZE * numpages;
|
2023-11-08 00:59:30 -07:00
|
|
|
unsigned long __maybe_unused lm_start;
|
|
|
|
unsigned long __maybe_unused lm_end;
|
2020-03-09 09:55:36 -07:00
|
|
|
struct pageattr_masks masks = {
|
|
|
|
.set_mask = set_mask,
|
|
|
|
.clear_mask = clear_mask
|
|
|
|
};
|
|
|
|
|
|
|
|
if (!numpages)
|
|
|
|
return 0;
|
|
|
|
|
2022-09-02 04:26:12 -07:00
|
|
|
mmap_write_lock(&init_mm);
|
2023-11-08 00:59:30 -07:00
|
|
|
|
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
/*
|
|
|
|
* We are about to change the permissions of a kernel mapping, we must
|
|
|
|
* apply the same changes to its linear mapping alias, which may imply
|
|
|
|
* splitting a huge mapping.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (is_vmalloc_or_module_addr((void *)start)) {
|
|
|
|
struct vm_struct *area = NULL;
|
|
|
|
int i, page_start;
|
|
|
|
|
|
|
|
area = find_vm_area((void *)start);
|
|
|
|
page_start = (start - (unsigned long)area->addr) >> PAGE_SHIFT;
|
|
|
|
|
|
|
|
for (i = page_start; i < page_start + numpages; ++i) {
|
|
|
|
lm_start = (unsigned long)page_address(area->pages[i]);
|
|
|
|
lm_end = lm_start + PAGE_SIZE;
|
|
|
|
|
|
|
|
ret = split_linear_mapping(lm_start, lm_end);
|
|
|
|
if (ret)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
ret = walk_page_range_novma(&init_mm, lm_start, lm_end,
|
|
|
|
&pageattr_ops, NULL, &masks);
|
|
|
|
if (ret)
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
} else if (is_kernel_mapping(start) || is_linear_mapping(start)) {
|
2023-12-12 12:54:00 -07:00
|
|
|
if (is_kernel_mapping(start)) {
|
|
|
|
lm_start = (unsigned long)lm_alias(start);
|
|
|
|
lm_end = (unsigned long)lm_alias(end);
|
|
|
|
} else {
|
|
|
|
lm_start = start;
|
|
|
|
lm_end = end;
|
|
|
|
}
|
2023-11-08 00:59:30 -07:00
|
|
|
|
|
|
|
ret = split_linear_mapping(lm_start, lm_end);
|
|
|
|
if (ret)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
ret = walk_page_range_novma(&init_mm, lm_start, lm_end,
|
|
|
|
&pageattr_ops, NULL, &masks);
|
|
|
|
if (ret)
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2020-03-09 09:55:36 -07:00
|
|
|
ret = walk_page_range_novma(&init_mm, start, end, &pageattr_ops, NULL,
|
|
|
|
&masks);
|
2023-11-08 00:59:30 -07:00
|
|
|
|
|
|
|
unlock:
|
|
|
|
mmap_write_unlock(&init_mm);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We can't use flush_tlb_kernel_range() here as we may have split a
|
|
|
|
* hugepage that is larger than that, so let's flush everything.
|
|
|
|
*/
|
|
|
|
flush_tlb_all();
|
|
|
|
#else
|
|
|
|
ret = walk_page_range_novma(&init_mm, start, end, &pageattr_ops, NULL,
|
|
|
|
&masks);
|
|
|
|
|
2022-09-02 04:26:12 -07:00
|
|
|
mmap_write_unlock(&init_mm);
|
2020-03-09 09:55:36 -07:00
|
|
|
|
|
|
|
flush_tlb_kernel_range(start, end);
|
2023-11-08 00:59:30 -07:00
|
|
|
#endif
|
2020-03-09 09:55:36 -07:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-11-04 17:04:38 -07:00
|
|
|
int set_memory_rw_nx(unsigned long addr, int numpages)
|
|
|
|
{
|
|
|
|
return __set_memory(addr, numpages, __pgprot(_PAGE_READ | _PAGE_WRITE),
|
|
|
|
__pgprot(_PAGE_EXEC));
|
|
|
|
}
|
|
|
|
|
2020-03-09 09:55:36 -07:00
|
|
|
int set_memory_ro(unsigned long addr, int numpages)
|
|
|
|
{
|
|
|
|
return __set_memory(addr, numpages, __pgprot(_PAGE_READ),
|
|
|
|
__pgprot(_PAGE_WRITE));
|
|
|
|
}
|
|
|
|
|
|
|
|
int set_memory_rw(unsigned long addr, int numpages)
|
|
|
|
{
|
|
|
|
return __set_memory(addr, numpages, __pgprot(_PAGE_READ | _PAGE_WRITE),
|
|
|
|
__pgprot(0));
|
|
|
|
}
|
|
|
|
|
|
|
|
int set_memory_x(unsigned long addr, int numpages)
|
|
|
|
{
|
|
|
|
return __set_memory(addr, numpages, __pgprot(_PAGE_EXEC), __pgprot(0));
|
|
|
|
}
|
|
|
|
|
|
|
|
int set_memory_nx(unsigned long addr, int numpages)
|
|
|
|
{
|
|
|
|
return __set_memory(addr, numpages, __pgprot(0), __pgprot(_PAGE_EXEC));
|
|
|
|
}
|
2020-03-09 09:55:37 -07:00
|
|
|
|
|
|
|
int set_direct_map_invalid_noflush(struct page *page)
|
|
|
|
{
|
2023-11-08 00:59:30 -07:00
|
|
|
return __set_memory((unsigned long)page_address(page), 1,
|
|
|
|
__pgprot(0), __pgprot(_PAGE_PRESENT));
|
2020-03-09 09:55:37 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
int set_direct_map_default_noflush(struct page *page)
|
|
|
|
{
|
2023-11-08 00:59:30 -07:00
|
|
|
return __set_memory((unsigned long)page_address(page), 1,
|
2023-12-13 06:40:27 -07:00
|
|
|
PAGE_KERNEL, __pgprot(_PAGE_EXEC));
|
2020-03-09 09:55:37 -07:00
|
|
|
}
|
2020-03-09 09:55:38 -07:00
|
|
|
|
2020-12-14 20:10:30 -07:00
|
|
|
#ifdef CONFIG_DEBUG_PAGEALLOC
|
riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context
__kernel_map_pages() is a debug function which clears the valid bit in page
table entry for deallocated pages to detect illegal memory accesses to
freed pages.
This function set/clear the valid bit using __set_memory(). __set_memory()
acquires init_mm's semaphore, and this operation may sleep. This is
problematic, because __kernel_map_pages() can be called in atomic context,
and thus is illegal to sleep. An example warning that this causes:
BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1578
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2, name: kthreadd
preempt_count: 2, expected: 0
CPU: 0 PID: 2 Comm: kthreadd Not tainted 6.9.0-g1d4c6d784ef6 #37
Hardware name: riscv-virtio,qemu (DT)
Call Trace:
[<ffffffff800060dc>] dump_backtrace+0x1c/0x24
[<ffffffff8091ef6e>] show_stack+0x2c/0x38
[<ffffffff8092baf8>] dump_stack_lvl+0x5a/0x72
[<ffffffff8092bb24>] dump_stack+0x14/0x1c
[<ffffffff8003b7ac>] __might_resched+0x104/0x10e
[<ffffffff8003b7f4>] __might_sleep+0x3e/0x62
[<ffffffff8093276a>] down_write+0x20/0x72
[<ffffffff8000cf00>] __set_memory+0x82/0x2fa
[<ffffffff8000d324>] __kernel_map_pages+0x5a/0xd4
[<ffffffff80196cca>] __alloc_pages_bulk+0x3b2/0x43a
[<ffffffff8018ee82>] __vmalloc_node_range+0x196/0x6ba
[<ffffffff80011904>] copy_process+0x72c/0x17ec
[<ffffffff80012ab4>] kernel_clone+0x60/0x2fe
[<ffffffff80012f62>] kernel_thread+0x82/0xa0
[<ffffffff8003552c>] kthreadd+0x14a/0x1be
[<ffffffff809357de>] ret_from_fork+0xe/0x1c
Rewrite this function with apply_to_existing_page_range(). It is fine to
not have any locking, because __kernel_map_pages() works with pages being
allocated/deallocated and those pages are not changed by anyone else in the
meantime.
Fixes: 5fde3db5eb02 ("riscv: add ARCH_SUPPORTS_DEBUG_PAGEALLOC support")
Signed-off-by: Nam Cao <namcao@linutronix.de>
Cc: stable@vger.kernel.org
Reviewed-by: Alexandre Ghiti <alexghiti@rivosinc.com>
Link: https://lore.kernel.org/r/1289ecba9606a19917bc12b6c27da8aa23e1e5ae.1715750938.git.namcao@linutronix.de
Signed-off-by: Palmer Dabbelt <palmer@rivosinc.com>
2024-05-14 22:50:40 -07:00
|
|
|
static int debug_pagealloc_set_page(pte_t *pte, unsigned long addr, void *data)
|
|
|
|
{
|
|
|
|
int enable = *(int *)data;
|
|
|
|
|
|
|
|
unsigned long val = pte_val(ptep_get(pte));
|
|
|
|
|
|
|
|
if (enable)
|
|
|
|
val |= _PAGE_PRESENT;
|
|
|
|
else
|
|
|
|
val &= ~_PAGE_PRESENT;
|
|
|
|
|
|
|
|
set_pte(pte, __pte(val));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-03-09 09:55:38 -07:00
|
|
|
void __kernel_map_pages(struct page *page, int numpages, int enable)
|
|
|
|
{
|
|
|
|
if (!debug_pagealloc_enabled())
|
|
|
|
return;
|
|
|
|
|
riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context
__kernel_map_pages() is a debug function which clears the valid bit in page
table entry for deallocated pages to detect illegal memory accesses to
freed pages.
This function set/clear the valid bit using __set_memory(). __set_memory()
acquires init_mm's semaphore, and this operation may sleep. This is
problematic, because __kernel_map_pages() can be called in atomic context,
and thus is illegal to sleep. An example warning that this causes:
BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1578
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2, name: kthreadd
preempt_count: 2, expected: 0
CPU: 0 PID: 2 Comm: kthreadd Not tainted 6.9.0-g1d4c6d784ef6 #37
Hardware name: riscv-virtio,qemu (DT)
Call Trace:
[<ffffffff800060dc>] dump_backtrace+0x1c/0x24
[<ffffffff8091ef6e>] show_stack+0x2c/0x38
[<ffffffff8092baf8>] dump_stack_lvl+0x5a/0x72
[<ffffffff8092bb24>] dump_stack+0x14/0x1c
[<ffffffff8003b7ac>] __might_resched+0x104/0x10e
[<ffffffff8003b7f4>] __might_sleep+0x3e/0x62
[<ffffffff8093276a>] down_write+0x20/0x72
[<ffffffff8000cf00>] __set_memory+0x82/0x2fa
[<ffffffff8000d324>] __kernel_map_pages+0x5a/0xd4
[<ffffffff80196cca>] __alloc_pages_bulk+0x3b2/0x43a
[<ffffffff8018ee82>] __vmalloc_node_range+0x196/0x6ba
[<ffffffff80011904>] copy_process+0x72c/0x17ec
[<ffffffff80012ab4>] kernel_clone+0x60/0x2fe
[<ffffffff80012f62>] kernel_thread+0x82/0xa0
[<ffffffff8003552c>] kthreadd+0x14a/0x1be
[<ffffffff809357de>] ret_from_fork+0xe/0x1c
Rewrite this function with apply_to_existing_page_range(). It is fine to
not have any locking, because __kernel_map_pages() works with pages being
allocated/deallocated and those pages are not changed by anyone else in the
meantime.
Fixes: 5fde3db5eb02 ("riscv: add ARCH_SUPPORTS_DEBUG_PAGEALLOC support")
Signed-off-by: Nam Cao <namcao@linutronix.de>
Cc: stable@vger.kernel.org
Reviewed-by: Alexandre Ghiti <alexghiti@rivosinc.com>
Link: https://lore.kernel.org/r/1289ecba9606a19917bc12b6c27da8aa23e1e5ae.1715750938.git.namcao@linutronix.de
Signed-off-by: Palmer Dabbelt <palmer@rivosinc.com>
2024-05-14 22:50:40 -07:00
|
|
|
unsigned long start = (unsigned long)page_address(page);
|
|
|
|
unsigned long size = PAGE_SIZE * numpages;
|
|
|
|
|
|
|
|
apply_to_existing_page_range(&init_mm, start, size, debug_pagealloc_set_page, &enable);
|
|
|
|
|
|
|
|
flush_tlb_kernel_range(start, start + size);
|
2020-03-09 09:55:38 -07:00
|
|
|
}
|
2020-12-14 20:10:30 -07:00
|
|
|
#endif
|
2020-12-14 20:10:35 -07:00
|
|
|
|
|
|
|
bool kernel_page_present(struct page *page)
|
|
|
|
{
|
|
|
|
unsigned long addr = (unsigned long)page_address(page);
|
|
|
|
pgd_t *pgd;
|
|
|
|
pud_t *pud;
|
|
|
|
p4d_t *p4d;
|
|
|
|
pmd_t *pmd;
|
|
|
|
pte_t *pte;
|
|
|
|
|
|
|
|
pgd = pgd_offset_k(addr);
|
2023-12-13 13:30:01 -07:00
|
|
|
if (!pgd_present(pgdp_get(pgd)))
|
2020-12-14 20:10:35 -07:00
|
|
|
return false;
|
2023-12-13 13:30:01 -07:00
|
|
|
if (pgd_leaf(pgdp_get(pgd)))
|
2023-03-29 23:43:20 -07:00
|
|
|
return true;
|
2020-12-14 20:10:35 -07:00
|
|
|
|
|
|
|
p4d = p4d_offset(pgd, addr);
|
2023-12-13 13:30:01 -07:00
|
|
|
if (!p4d_present(p4dp_get(p4d)))
|
2020-12-14 20:10:35 -07:00
|
|
|
return false;
|
2023-12-13 13:30:01 -07:00
|
|
|
if (p4d_leaf(p4dp_get(p4d)))
|
2023-03-29 23:43:20 -07:00
|
|
|
return true;
|
2020-12-14 20:10:35 -07:00
|
|
|
|
|
|
|
pud = pud_offset(p4d, addr);
|
2023-12-13 13:30:01 -07:00
|
|
|
if (!pud_present(pudp_get(pud)))
|
2020-12-14 20:10:35 -07:00
|
|
|
return false;
|
2023-12-13 13:30:01 -07:00
|
|
|
if (pud_leaf(pudp_get(pud)))
|
2023-03-29 23:43:20 -07:00
|
|
|
return true;
|
2020-12-14 20:10:35 -07:00
|
|
|
|
|
|
|
pmd = pmd_offset(pud, addr);
|
2023-12-13 13:30:01 -07:00
|
|
|
if (!pmd_present(pmdp_get(pmd)))
|
2020-12-14 20:10:35 -07:00
|
|
|
return false;
|
2023-12-13 13:30:01 -07:00
|
|
|
if (pmd_leaf(pmdp_get(pmd)))
|
2023-03-29 23:43:20 -07:00
|
|
|
return true;
|
2020-12-14 20:10:35 -07:00
|
|
|
|
|
|
|
pte = pte_offset_kernel(pmd, addr);
|
2023-12-13 13:30:01 -07:00
|
|
|
return pte_present(ptep_get(pte));
|
2020-12-14 20:10:35 -07:00
|
|
|
}
|