162306a36Sopenharmony_ci/* 262306a36Sopenharmony_ci * Xtensa KASAN shadow map initialization 362306a36Sopenharmony_ci * 462306a36Sopenharmony_ci * This file is subject to the terms and conditions of the GNU General Public 562306a36Sopenharmony_ci * License. See the file "COPYING" in the main directory of this archive 662306a36Sopenharmony_ci * for more details. 762306a36Sopenharmony_ci * 862306a36Sopenharmony_ci * Copyright (C) 2017 Cadence Design Systems Inc. 962306a36Sopenharmony_ci */ 1062306a36Sopenharmony_ci 1162306a36Sopenharmony_ci#include <linux/memblock.h> 1262306a36Sopenharmony_ci#include <linux/init_task.h> 1362306a36Sopenharmony_ci#include <linux/kasan.h> 1462306a36Sopenharmony_ci#include <linux/kernel.h> 1562306a36Sopenharmony_ci#include <asm/initialize_mmu.h> 1662306a36Sopenharmony_ci#include <asm/tlbflush.h> 1762306a36Sopenharmony_ci 1862306a36Sopenharmony_civoid __init kasan_early_init(void) 1962306a36Sopenharmony_ci{ 2062306a36Sopenharmony_ci unsigned long vaddr = KASAN_SHADOW_START; 2162306a36Sopenharmony_ci pmd_t *pmd = pmd_off_k(vaddr); 2262306a36Sopenharmony_ci int i; 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_ci for (i = 0; i < PTRS_PER_PTE; ++i) 2562306a36Sopenharmony_ci set_pte(kasan_early_shadow_pte + i, 2662306a36Sopenharmony_ci mk_pte(virt_to_page(kasan_early_shadow_page), 2762306a36Sopenharmony_ci PAGE_KERNEL)); 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_ci for (vaddr = 0; vaddr < KASAN_SHADOW_SIZE; vaddr += PMD_SIZE, ++pmd) { 3062306a36Sopenharmony_ci BUG_ON(!pmd_none(*pmd)); 3162306a36Sopenharmony_ci set_pmd(pmd, __pmd((unsigned long)kasan_early_shadow_pte)); 3262306a36Sopenharmony_ci } 3362306a36Sopenharmony_ci} 3462306a36Sopenharmony_ci 3562306a36Sopenharmony_cistatic void __init populate(void *start, void *end) 3662306a36Sopenharmony_ci{ 3762306a36Sopenharmony_ci unsigned long n_pages = (end - start) / PAGE_SIZE; 3862306a36Sopenharmony_ci unsigned long n_pmds = n_pages / PTRS_PER_PTE; 3962306a36Sopenharmony_ci unsigned long i, j; 4062306a36Sopenharmony_ci unsigned long vaddr = (unsigned long)start; 4162306a36Sopenharmony_ci pmd_t *pmd = pmd_off_k(vaddr); 4262306a36Sopenharmony_ci pte_t *pte = memblock_alloc(n_pages * sizeof(pte_t), PAGE_SIZE); 4362306a36Sopenharmony_ci 4462306a36Sopenharmony_ci if (!pte) 4562306a36Sopenharmony_ci panic("%s: Failed to allocate %lu bytes align=0x%lx\n", 4662306a36Sopenharmony_ci __func__, n_pages * sizeof(pte_t), PAGE_SIZE); 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_ci pr_debug("%s: %p - %p\n", __func__, start, end); 4962306a36Sopenharmony_ci 5062306a36Sopenharmony_ci for (i = j = 0; i < n_pmds; ++i) { 5162306a36Sopenharmony_ci int k; 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_ci for (k = 0; k < PTRS_PER_PTE; ++k, ++j) { 5462306a36Sopenharmony_ci phys_addr_t phys = 5562306a36Sopenharmony_ci memblock_phys_alloc_range(PAGE_SIZE, PAGE_SIZE, 5662306a36Sopenharmony_ci 0, 5762306a36Sopenharmony_ci MEMBLOCK_ALLOC_ANYWHERE); 5862306a36Sopenharmony_ci 5962306a36Sopenharmony_ci if (!phys) 6062306a36Sopenharmony_ci panic("Failed to allocate page table page\n"); 6162306a36Sopenharmony_ci 6262306a36Sopenharmony_ci set_pte(pte + j, pfn_pte(PHYS_PFN(phys), PAGE_KERNEL)); 6362306a36Sopenharmony_ci } 6462306a36Sopenharmony_ci } 6562306a36Sopenharmony_ci 6662306a36Sopenharmony_ci for (i = 0; i < n_pmds ; ++i, pte += PTRS_PER_PTE) 6762306a36Sopenharmony_ci set_pmd(pmd + i, __pmd((unsigned long)pte)); 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci local_flush_tlb_all(); 7062306a36Sopenharmony_ci memset(start, 0, end - start); 7162306a36Sopenharmony_ci} 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_civoid __init kasan_init(void) 7462306a36Sopenharmony_ci{ 7562306a36Sopenharmony_ci int i; 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci BUILD_BUG_ON(KASAN_SHADOW_OFFSET != KASAN_SHADOW_START - 7862306a36Sopenharmony_ci (KASAN_START_VADDR >> KASAN_SHADOW_SCALE_SHIFT)); 7962306a36Sopenharmony_ci BUILD_BUG_ON(VMALLOC_START < KASAN_START_VADDR); 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci /* 8262306a36Sopenharmony_ci * Replace shadow map pages that cover addresses from VMALLOC area 8362306a36Sopenharmony_ci * start to the end of KSEG with clean writable pages. 8462306a36Sopenharmony_ci */ 8562306a36Sopenharmony_ci populate(kasan_mem_to_shadow((void *)VMALLOC_START), 8662306a36Sopenharmony_ci kasan_mem_to_shadow((void *)XCHAL_KSEG_BYPASS_VADDR)); 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci /* 8962306a36Sopenharmony_ci * Write protect kasan_early_shadow_page and zero-initialize it again. 9062306a36Sopenharmony_ci */ 9162306a36Sopenharmony_ci for (i = 0; i < PTRS_PER_PTE; ++i) 9262306a36Sopenharmony_ci set_pte(kasan_early_shadow_pte + i, 9362306a36Sopenharmony_ci mk_pte(virt_to_page(kasan_early_shadow_page), 9462306a36Sopenharmony_ci PAGE_KERNEL_RO)); 9562306a36Sopenharmony_ci 9662306a36Sopenharmony_ci local_flush_tlb_all(); 9762306a36Sopenharmony_ci memset(kasan_early_shadow_page, 0, PAGE_SIZE); 9862306a36Sopenharmony_ci 9962306a36Sopenharmony_ci /* At this point kasan is fully initialized. Enable error messages. */ 10062306a36Sopenharmony_ci current->kasan_depth = 0; 10162306a36Sopenharmony_ci pr_info("KernelAddressSanitizer initialized\n"); 10262306a36Sopenharmony_ci} 103