diff options
author | Ard Biesheuvel <ard.biesheuvel@linaro.org> | 2016-01-11 14:50:21 +0100 |
---|---|---|
committer | Will Deacon <will.deacon@arm.com> | 2016-01-25 11:09:05 +0000 |
commit | 7b1af9795773d745c2a8c7d4ca5f2936e8b6adfb (patch) | |
tree | d9c5eea9b5ce9fde24219644ee1e0b22ce8f6213 /arch/arm64/mm/kasan_init.c | |
parent | 75feee3d9d51775072d3a04f47d4a439a4c4590e (diff) | |
download | linux-stable-7b1af9795773d745c2a8c7d4ca5f2936e8b6adfb.tar.gz linux-stable-7b1af9795773d745c2a8c7d4ca5f2936e8b6adfb.tar.bz2 linux-stable-7b1af9795773d745c2a8c7d4ca5f2936e8b6adfb.zip |
arm64: kasan: ensure that the KASAN zero page is mapped read-only
When switching from the early KASAN shadow region, which maps the
entire shadow space read-write, to the permanent KASAN shadow region,
which uses a zero page to shadow regions that are not subject to
instrumentation, the lowest level table kasan_zero_pte[] may be
reused unmodified, which means that the mappings of the zero page
that it contains will still be read-write.
So update it explicitly to map the zero page read only when we
activate the permanent mapping.
Acked-by: Andrey Ryabinin <aryabinin@virtuozzo.com>
Acked-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Diffstat (limited to 'arch/arm64/mm/kasan_init.c')
-rw-r--r-- | arch/arm64/mm/kasan_init.c | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/arch/arm64/mm/kasan_init.c b/arch/arm64/mm/kasan_init.c index cf038c7d9fa9..cab7a5be40aa 100644 --- a/arch/arm64/mm/kasan_init.c +++ b/arch/arm64/mm/kasan_init.c @@ -120,6 +120,7 @@ static void __init cpu_set_ttbr1(unsigned long ttbr1) void __init kasan_init(void) { struct memblock_region *reg; + int i; /* * We are going to perform proper setup of shadow memory. @@ -155,6 +156,14 @@ void __init kasan_init(void) pfn_to_nid(virt_to_pfn(start))); } + /* + * KAsan may reuse the contents of kasan_zero_pte directly, so we + * should make sure that it maps the zero page read-only. + */ + for (i = 0; i < PTRS_PER_PTE; i++) + set_pte(&kasan_zero_pte[i], + pfn_pte(virt_to_pfn(kasan_zero_page), PAGE_KERNEL_RO)); + memset(kasan_zero_page, 0, PAGE_SIZE); cpu_set_ttbr1(__pa(swapper_pg_dir)); flush_tlb_all(); |