xref: /linux/mm/page_table_check.c (revision a58f3dcf20ea9e7e968ee8369fd782bbb53dff73)
1 // SPDX-License-Identifier: GPL-2.0
2 
3 /*
4  * Copyright (c) 2021, Google LLC.
5  * Pasha Tatashin <pasha.tatashin@soleen.com>
6  */
7 #include <linux/kstrtox.h>
8 #include <linux/mm.h>
9 #include <linux/page_table_check.h>
10 #include <linux/swap.h>
11 #include <linux/swapops.h>
12 
13 #undef pr_fmt
14 #define pr_fmt(fmt)	"page_table_check: " fmt
15 
16 struct page_table_check {
17 	atomic_t anon_map_count;
18 	atomic_t file_map_count;
19 };
20 
21 static bool __page_table_check_enabled __initdata =
22 				IS_ENABLED(CONFIG_PAGE_TABLE_CHECK_ENFORCED);
23 
24 DEFINE_STATIC_KEY_TRUE(page_table_check_disabled);
25 EXPORT_SYMBOL(page_table_check_disabled);
26 
27 static int __init early_page_table_check_param(char *buf)
28 {
29 	return kstrtobool(buf, &__page_table_check_enabled);
30 }
31 
32 early_param("page_table_check", early_page_table_check_param);
33 
34 static bool __init need_page_table_check(void)
35 {
36 	return __page_table_check_enabled;
37 }
38 
39 static void __init init_page_table_check(void)
40 {
41 	if (!__page_table_check_enabled)
42 		return;
43 	static_branch_disable(&page_table_check_disabled);
44 }
45 
46 struct page_ext_operations page_table_check_ops = {
47 	.size = sizeof(struct page_table_check),
48 	.need = need_page_table_check,
49 	.init = init_page_table_check,
50 	.need_shared_flags = false,
51 };
52 
53 static struct page_table_check *get_page_table_check(struct page_ext *page_ext)
54 {
55 	BUG_ON(!page_ext);
56 	return page_ext_data(page_ext, &page_table_check_ops);
57 }
58 
59 /*
60  * An entry is removed from the page table, decrement the counters for that page
61  * verify that it is of correct type and counters do not become negative.
62  */
63 static void page_table_check_clear(unsigned long pfn, unsigned long pgcnt)
64 {
65 	struct page_ext *page_ext;
66 	struct page *page;
67 	unsigned long i;
68 	bool anon;
69 
70 	if (!pfn_valid(pfn))
71 		return;
72 
73 	page = pfn_to_page(pfn);
74 	page_ext = page_ext_get(page);
75 
76 	if (!page_ext)
77 		return;
78 
79 	BUG_ON(PageSlab(page));
80 	anon = PageAnon(page);
81 
82 	for (i = 0; i < pgcnt; i++) {
83 		struct page_table_check *ptc = get_page_table_check(page_ext);
84 
85 		if (anon) {
86 			BUG_ON(atomic_read(&ptc->file_map_count));
87 			BUG_ON(atomic_dec_return(&ptc->anon_map_count) < 0);
88 		} else {
89 			BUG_ON(atomic_read(&ptc->anon_map_count));
90 			BUG_ON(atomic_dec_return(&ptc->file_map_count) < 0);
91 		}
92 		page_ext = page_ext_next(page_ext);
93 	}
94 	page_ext_put(page_ext);
95 }
96 
97 /*
98  * A new entry is added to the page table, increment the counters for that page
99  * verify that it is of correct type and is not being mapped with a different
100  * type to a different process.
101  */
102 static void page_table_check_set(unsigned long pfn, unsigned long pgcnt,
103 				 bool rw)
104 {
105 	struct page_ext *page_ext;
106 	struct page *page;
107 	unsigned long i;
108 	bool anon;
109 
110 	if (!pfn_valid(pfn))
111 		return;
112 
113 	page = pfn_to_page(pfn);
114 	page_ext = page_ext_get(page);
115 
116 	if (!page_ext)
117 		return;
118 
119 	BUG_ON(PageSlab(page));
120 	anon = PageAnon(page);
121 
122 	for (i = 0; i < pgcnt; i++) {
123 		struct page_table_check *ptc = get_page_table_check(page_ext);
124 
125 		if (anon) {
126 			BUG_ON(atomic_read(&ptc->file_map_count));
127 			BUG_ON(atomic_inc_return(&ptc->anon_map_count) > 1 && rw);
128 		} else {
129 			BUG_ON(atomic_read(&ptc->anon_map_count));
130 			BUG_ON(atomic_inc_return(&ptc->file_map_count) < 0);
131 		}
132 		page_ext = page_ext_next(page_ext);
133 	}
134 	page_ext_put(page_ext);
135 }
136 
137 /*
138  * page is on free list, or is being allocated, verify that counters are zeroes
139  * crash if they are not.
140  */
141 void __page_table_check_zero(struct page *page, unsigned int order)
142 {
143 	struct page_ext *page_ext;
144 	unsigned long i;
145 
146 	BUG_ON(PageSlab(page));
147 
148 	page_ext = page_ext_get(page);
149 
150 	if (!page_ext)
151 		return;
152 
153 	for (i = 0; i < (1ul << order); i++) {
154 		struct page_table_check *ptc = get_page_table_check(page_ext);
155 
156 		BUG_ON(atomic_read(&ptc->anon_map_count));
157 		BUG_ON(atomic_read(&ptc->file_map_count));
158 		page_ext = page_ext_next(page_ext);
159 	}
160 	page_ext_put(page_ext);
161 }
162 
163 void __page_table_check_pte_clear(struct mm_struct *mm, pte_t pte)
164 {
165 	if (&init_mm == mm)
166 		return;
167 
168 	if (pte_user_accessible_page(pte)) {
169 		page_table_check_clear(pte_pfn(pte), PAGE_SIZE >> PAGE_SHIFT);
170 	}
171 }
172 EXPORT_SYMBOL(__page_table_check_pte_clear);
173 
174 void __page_table_check_pmd_clear(struct mm_struct *mm, pmd_t pmd)
175 {
176 	if (&init_mm == mm)
177 		return;
178 
179 	if (pmd_user_accessible_page(pmd)) {
180 		page_table_check_clear(pmd_pfn(pmd), PMD_SIZE >> PAGE_SHIFT);
181 	}
182 }
183 EXPORT_SYMBOL(__page_table_check_pmd_clear);
184 
185 void __page_table_check_pud_clear(struct mm_struct *mm, pud_t pud)
186 {
187 	if (&init_mm == mm)
188 		return;
189 
190 	if (pud_user_accessible_page(pud)) {
191 		page_table_check_clear(pud_pfn(pud), PUD_SIZE >> PAGE_SHIFT);
192 	}
193 }
194 EXPORT_SYMBOL(__page_table_check_pud_clear);
195 
196 /* Whether the swap entry cached writable information */
197 static inline bool swap_cached_writable(swp_entry_t entry)
198 {
199 	return is_writable_device_private_entry(entry) ||
200 	       is_writable_migration_entry(entry);
201 }
202 
203 static inline void page_table_check_pte_flags(pte_t pte)
204 {
205 	if (pte_present(pte) && pte_uffd_wp(pte))
206 		WARN_ON_ONCE(pte_write(pte));
207 	else if (is_swap_pte(pte) && pte_swp_uffd_wp(pte))
208 		WARN_ON_ONCE(swap_cached_writable(pte_to_swp_entry(pte)));
209 }
210 
211 void __page_table_check_ptes_set(struct mm_struct *mm, pte_t *ptep, pte_t pte,
212 		unsigned int nr)
213 {
214 	unsigned int i;
215 
216 	if (&init_mm == mm)
217 		return;
218 
219 	page_table_check_pte_flags(pte);
220 
221 	for (i = 0; i < nr; i++)
222 		__page_table_check_pte_clear(mm, ptep_get(ptep + i));
223 	if (pte_user_accessible_page(pte))
224 		page_table_check_set(pte_pfn(pte), nr, pte_write(pte));
225 }
226 EXPORT_SYMBOL(__page_table_check_ptes_set);
227 
228 static inline void page_table_check_pmd_flags(pmd_t pmd)
229 {
230 	if (pmd_present(pmd) && pmd_uffd_wp(pmd))
231 		WARN_ON_ONCE(pmd_write(pmd));
232 	else if (is_swap_pmd(pmd) && pmd_swp_uffd_wp(pmd))
233 		WARN_ON_ONCE(swap_cached_writable(pmd_to_swp_entry(pmd)));
234 }
235 
236 void __page_table_check_pmd_set(struct mm_struct *mm, pmd_t *pmdp, pmd_t pmd)
237 {
238 	if (&init_mm == mm)
239 		return;
240 
241 	page_table_check_pmd_flags(pmd);
242 
243 	__page_table_check_pmd_clear(mm, *pmdp);
244 	if (pmd_user_accessible_page(pmd)) {
245 		page_table_check_set(pmd_pfn(pmd), PMD_SIZE >> PAGE_SHIFT,
246 				     pmd_write(pmd));
247 	}
248 }
249 EXPORT_SYMBOL(__page_table_check_pmd_set);
250 
251 void __page_table_check_pud_set(struct mm_struct *mm, pud_t *pudp, pud_t pud)
252 {
253 	if (&init_mm == mm)
254 		return;
255 
256 	__page_table_check_pud_clear(mm, *pudp);
257 	if (pud_user_accessible_page(pud)) {
258 		page_table_check_set(pud_pfn(pud), PUD_SIZE >> PAGE_SHIFT,
259 				     pud_write(pud));
260 	}
261 }
262 EXPORT_SYMBOL(__page_table_check_pud_set);
263 
264 void __page_table_check_pte_clear_range(struct mm_struct *mm,
265 					unsigned long addr,
266 					pmd_t pmd)
267 {
268 	if (&init_mm == mm)
269 		return;
270 
271 	if (!pmd_bad(pmd) && !pmd_leaf(pmd)) {
272 		pte_t *ptep = pte_offset_map(&pmd, addr);
273 		unsigned long i;
274 
275 		if (WARN_ON(!ptep))
276 			return;
277 		for (i = 0; i < PTRS_PER_PTE; i++) {
278 			__page_table_check_pte_clear(mm, ptep_get(ptep));
279 			addr += PAGE_SIZE;
280 			ptep++;
281 		}
282 		pte_unmap(ptep - PTRS_PER_PTE);
283 	}
284 }
285