mirror of https://github.com/Qortal/Brooklyn
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
192 lines
4.6 KiB
192 lines
4.6 KiB
// SPDX-License-Identifier: GPL-2.0 |
|
|
|
#define DISABLE_BRANCH_PROFILING |
|
|
|
#include <linux/kasan.h> |
|
#include <linux/printk.h> |
|
#include <linux/memblock.h> |
|
#include <linux/sched/task.h> |
|
#include <asm/pgalloc.h> |
|
#include <asm/code-patching.h> |
|
#include <mm/mmu_decl.h> |
|
|
|
static pgprot_t __init kasan_prot_ro(void) |
|
{ |
|
if (early_mmu_has_feature(MMU_FTR_HPTE_TABLE)) |
|
return PAGE_READONLY; |
|
|
|
return PAGE_KERNEL_RO; |
|
} |
|
|
|
static void __init kasan_populate_pte(pte_t *ptep, pgprot_t prot) |
|
{ |
|
unsigned long va = (unsigned long)kasan_early_shadow_page; |
|
phys_addr_t pa = __pa(kasan_early_shadow_page); |
|
int i; |
|
|
|
for (i = 0; i < PTRS_PER_PTE; i++, ptep++) |
|
__set_pte_at(&init_mm, va, ptep, pfn_pte(PHYS_PFN(pa), prot), 0); |
|
} |
|
|
|
int __init kasan_init_shadow_page_tables(unsigned long k_start, unsigned long k_end) |
|
{ |
|
pmd_t *pmd; |
|
unsigned long k_cur, k_next; |
|
|
|
pmd = pmd_off_k(k_start); |
|
|
|
for (k_cur = k_start; k_cur != k_end; k_cur = k_next, pmd++) { |
|
pte_t *new; |
|
|
|
k_next = pgd_addr_end(k_cur, k_end); |
|
if ((void *)pmd_page_vaddr(*pmd) != kasan_early_shadow_pte) |
|
continue; |
|
|
|
new = memblock_alloc(PTE_FRAG_SIZE, PTE_FRAG_SIZE); |
|
|
|
if (!new) |
|
return -ENOMEM; |
|
kasan_populate_pte(new, PAGE_KERNEL); |
|
pmd_populate_kernel(&init_mm, pmd, new); |
|
} |
|
return 0; |
|
} |
|
|
|
int __init __weak kasan_init_region(void *start, size_t size) |
|
{ |
|
unsigned long k_start = (unsigned long)kasan_mem_to_shadow(start); |
|
unsigned long k_end = (unsigned long)kasan_mem_to_shadow(start + size); |
|
unsigned long k_cur; |
|
int ret; |
|
void *block; |
|
|
|
ret = kasan_init_shadow_page_tables(k_start, k_end); |
|
if (ret) |
|
return ret; |
|
|
|
block = memblock_alloc(k_end - k_start, PAGE_SIZE); |
|
if (!block) |
|
return -ENOMEM; |
|
|
|
for (k_cur = k_start & PAGE_MASK; k_cur < k_end; k_cur += PAGE_SIZE) { |
|
pmd_t *pmd = pmd_off_k(k_cur); |
|
void *va = block + k_cur - k_start; |
|
pte_t pte = pfn_pte(PHYS_PFN(__pa(va)), PAGE_KERNEL); |
|
|
|
__set_pte_at(&init_mm, k_cur, pte_offset_kernel(pmd, k_cur), pte, 0); |
|
} |
|
flush_tlb_kernel_range(k_start, k_end); |
|
return 0; |
|
} |
|
|
|
void __init |
|
kasan_update_early_region(unsigned long k_start, unsigned long k_end, pte_t pte) |
|
{ |
|
unsigned long k_cur; |
|
phys_addr_t pa = __pa(kasan_early_shadow_page); |
|
|
|
for (k_cur = k_start; k_cur != k_end; k_cur += PAGE_SIZE) { |
|
pmd_t *pmd = pmd_off_k(k_cur); |
|
pte_t *ptep = pte_offset_kernel(pmd, k_cur); |
|
|
|
if ((pte_val(*ptep) & PTE_RPN_MASK) != pa) |
|
continue; |
|
|
|
__set_pte_at(&init_mm, k_cur, ptep, pte, 0); |
|
} |
|
|
|
flush_tlb_kernel_range(k_start, k_end); |
|
} |
|
|
|
static void __init kasan_remap_early_shadow_ro(void) |
|
{ |
|
pgprot_t prot = kasan_prot_ro(); |
|
phys_addr_t pa = __pa(kasan_early_shadow_page); |
|
|
|
kasan_populate_pte(kasan_early_shadow_pte, prot); |
|
|
|
kasan_update_early_region(KASAN_SHADOW_START, KASAN_SHADOW_END, |
|
pfn_pte(PHYS_PFN(pa), prot)); |
|
} |
|
|
|
static void __init kasan_unmap_early_shadow_vmalloc(void) |
|
{ |
|
unsigned long k_start = (unsigned long)kasan_mem_to_shadow((void *)VMALLOC_START); |
|
unsigned long k_end = (unsigned long)kasan_mem_to_shadow((void *)VMALLOC_END); |
|
|
|
kasan_update_early_region(k_start, k_end, __pte(0)); |
|
|
|
#ifdef MODULES_VADDR |
|
k_start = (unsigned long)kasan_mem_to_shadow((void *)MODULES_VADDR); |
|
k_end = (unsigned long)kasan_mem_to_shadow((void *)MODULES_END); |
|
kasan_update_early_region(k_start, k_end, __pte(0)); |
|
#endif |
|
} |
|
|
|
void __init kasan_mmu_init(void) |
|
{ |
|
int ret; |
|
|
|
if (early_mmu_has_feature(MMU_FTR_HPTE_TABLE)) { |
|
ret = kasan_init_shadow_page_tables(KASAN_SHADOW_START, KASAN_SHADOW_END); |
|
|
|
if (ret) |
|
panic("kasan: kasan_init_shadow_page_tables() failed"); |
|
} |
|
} |
|
|
|
void __init kasan_init(void) |
|
{ |
|
phys_addr_t base, end; |
|
u64 i; |
|
int ret; |
|
|
|
for_each_mem_range(i, &base, &end) { |
|
phys_addr_t top = min(end, total_lowmem); |
|
|
|
if (base >= top) |
|
continue; |
|
|
|
ret = kasan_init_region(__va(base), top - base); |
|
if (ret) |
|
panic("kasan: kasan_init_region() failed"); |
|
} |
|
|
|
if (IS_ENABLED(CONFIG_KASAN_VMALLOC)) { |
|
ret = kasan_init_shadow_page_tables(KASAN_SHADOW_START, KASAN_SHADOW_END); |
|
|
|
if (ret) |
|
panic("kasan: kasan_init_shadow_page_tables() failed"); |
|
} |
|
|
|
kasan_remap_early_shadow_ro(); |
|
|
|
clear_page(kasan_early_shadow_page); |
|
|
|
/* At this point kasan is fully initialized. Enable error messages */ |
|
init_task.kasan_depth = 0; |
|
pr_info("KASAN init done\n"); |
|
} |
|
|
|
void __init kasan_late_init(void) |
|
{ |
|
if (IS_ENABLED(CONFIG_KASAN_VMALLOC)) |
|
kasan_unmap_early_shadow_vmalloc(); |
|
} |
|
|
|
void __init kasan_early_init(void) |
|
{ |
|
unsigned long addr = KASAN_SHADOW_START; |
|
unsigned long end = KASAN_SHADOW_END; |
|
unsigned long next; |
|
pmd_t *pmd = pmd_off_k(addr); |
|
|
|
BUILD_BUG_ON(KASAN_SHADOW_START & ~PGDIR_MASK); |
|
|
|
kasan_populate_pte(kasan_early_shadow_pte, PAGE_KERNEL); |
|
|
|
do { |
|
next = pgd_addr_end(addr, end); |
|
pmd_populate_kernel(&init_mm, pmd, kasan_early_shadow_pte); |
|
} while (pmd++, addr = next, addr != end); |
|
}
|
|
|