From: Andrey Konovalov <andreyknvl@google.com>
To: Catalin Marinas <catalin.marinas@arm.com>
Cc: Linux Memory Management List <linux-mm@kvack.org>,
Linux ARM <linux-arm-kernel@lists.infradead.org>,
Szabolcs Nagy <szabolcs.nagy@arm.com>,
Will Deacon <will@kernel.org>,
Andrew Morton <akpm@linux-foundation.org>,
Florian Weimer <fweimer@redhat.com>,
Victor Stinner <vstinner@redhat.com>,
Evgenii Stepanov <eugenis@google.com>
Subject: Re: [PATCH] mm: Avoid creating virtual address aliases in brk()/mmap()/mremap()
Date: Wed, 19 Feb 2020 13:18:44 +0100 [thread overview]
Message-ID: <CAAeHK+xNm1vv6EdfAYFbJkyh_3-hVNeWT=m14sYsNwtOLByF2A@mail.gmail.com> (raw)
In-Reply-To: <20200218122310.72710-1-catalin.marinas@arm.com>
On Tue, Feb 18, 2020 at 1:23 PM Catalin Marinas <catalin.marinas@arm.com> wrote:
>
> Currently the arm64 kernel ignores the top address byte passed to brk(),
> mmap() and mremap(). When the user is not aware of the 56-bit address
> limit or relies on the kernel to return an error, untagging such
> pointers has the potential to create address aliases in user-space.
> Passing a tagged address to munmap(), madvise() is permitted since the
> tagged pointer is expected to be inside an existing mapping.
>
> Remove untagging in the above functions by partially reverting commit
> ce18d171cb73 ("mm: untag user pointers in mmap/munmap/mremap/brk"). In
> addition, update the arm64 tagged-address-abi.rst document accordingly.
>
> Fixes: ce18d171cb73 ("mm: untag user pointers in mmap/munmap/mremap/brk")
> Cc: <stable@vger.kernel.org> # 5.4.x-
> Cc: Andrey Konovalov <andreyknvl@google.com>
> Cc: Will Deacon <will@kernel.org>
> Cc: Andrew Morton <akpm@linux-foundation.org>
> Cc: Florian Weimer <fweimer@redhat.com>
> Reported-by: Victor Stinner <vstinner@redhat.com>
> Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Acked-by: Andrey Konovalov <andreyknvl@google.com>
> ---
> Documentation/arm64/tagged-address-abi.rst | 7 +++++--
> mm/mmap.c | 4 ----
> mm/mremap.c | 1 -
> 3 files changed, 5 insertions(+), 7 deletions(-)
>
> diff --git a/Documentation/arm64/tagged-address-abi.rst b/Documentation/arm64/tagged-address-abi.rst
> index d4a85d535bf9..1771a8b5712e 100644
> --- a/Documentation/arm64/tagged-address-abi.rst
> +++ b/Documentation/arm64/tagged-address-abi.rst
> @@ -44,8 +44,11 @@ The AArch64 Tagged Address ABI has two stages of relaxation depending
> how the user addresses are used by the kernel:
>
> 1. User addresses not accessed by the kernel but used for address space
> - management (e.g. ``mmap()``, ``mprotect()``, ``madvise()``). The use
> - of valid tagged pointers in this context is always allowed.
> + management (e.g. ``mprotect()``, ``madvise()``). The use of valid
> + tagged pointers in this context is allowed with the exception of
> + ``brk()``, ``mmap()`` and the ``new_address`` argument to
> + ``mremap()`` as these have the potential of aliasing with existing
> + user addresses.
>
> 2. User addresses accessed by the kernel (e.g. ``write()``). This ABI
> relaxation is disabled by default and the application thread needs to
> diff --git a/mm/mmap.c b/mm/mmap.c
> index 6756b8bb0033..d681a20eb4ea 100644
> --- a/mm/mmap.c
> +++ b/mm/mmap.c
> @@ -195,8 +195,6 @@ SYSCALL_DEFINE1(brk, unsigned long, brk)
> bool downgraded = false;
> LIST_HEAD(uf);
>
> - brk = untagged_addr(brk);
> -
> if (down_write_killable(&mm->mmap_sem))
> return -EINTR;
>
> @@ -1557,8 +1555,6 @@ unsigned long ksys_mmap_pgoff(unsigned long addr, unsigned long len,
> struct file *file = NULL;
> unsigned long retval;
>
> - addr = untagged_addr(addr);
> -
> if (!(flags & MAP_ANONYMOUS)) {
> audit_mmap_fd(fd, flags);
> file = fget(fd);
> diff --git a/mm/mremap.c b/mm/mremap.c
> index 122938dcec15..af363063ea23 100644
> --- a/mm/mremap.c
> +++ b/mm/mremap.c
> @@ -607,7 +607,6 @@ SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len,
> LIST_HEAD(uf_unmap);
>
> addr = untagged_addr(addr);
> - new_addr = untagged_addr(new_addr);
>
> if (flags & ~(MREMAP_FIXED | MREMAP_MAYMOVE))
> return ret;
prev parent reply other threads:[~2020-02-19 12:18 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-02-18 12:23 [PATCH] mm: Avoid creating virtual address aliases in brk()/mmap()/mremap() Catalin Marinas
2020-02-18 12:34 ` Will Deacon
2020-02-18 13:06 ` Andrey Konovalov
2020-02-18 13:07 ` Andrey Konovalov
2020-02-18 21:05 ` Evgenii Stepanov
2020-02-19 10:39 ` Will Deacon
2020-02-19 12:18 ` Andrey Konovalov [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CAAeHK+xNm1vv6EdfAYFbJkyh_3-hVNeWT=m14sYsNwtOLByF2A@mail.gmail.com' \
--to=andreyknvl@google.com \
--cc=akpm@linux-foundation.org \
--cc=catalin.marinas@arm.com \
--cc=eugenis@google.com \
--cc=fweimer@redhat.com \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-mm@kvack.org \
--cc=szabolcs.nagy@arm.com \
--cc=vstinner@redhat.com \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).