All of lore.kernel.org
 help / color / mirror / Atom feed
From: Rick Edgecombe <rick.p.edgecombe@intel.com>
To: Liam.Howlett@oracle.com, akpm@linux-foundation.org,
	debug@rivosinc.com, broonie@kernel.org,
	kirill.shutemov@linux.intel.com, keescook@chromium.org,
	tglx@linutronix.de, mingo@redhat.com, bp@alien8.de,
	dave.hansen@linux.intel.com, x86@kernel.org, luto@kernel.org,
	peterz@infradead.org, hpa@zytor.com, linux-mm@kvack.org,
	linux-kernel@vger.kernel.org
Cc: rick.p.edgecombe@intel.com
Subject: [PATCH v2 3/9] mm: Use get_unmapped_area_vmflags()
Date: Mon, 26 Feb 2024 11:09:45 -0800	[thread overview]
Message-ID: <20240226190951.3240433-4-rick.p.edgecombe@intel.com> (raw)
In-Reply-To: <20240226190951.3240433-1-rick.p.edgecombe@intel.com>

When memory is being placed, mmap() will take care to respect the guard
gaps of certain types of memory (VM_SHADOWSTACK, VM_GROWSUP and
VM_GROWSDOWN). In order to ensure guard gaps between mappings, mmap()
needs to consider two things:
 1. That the new mapping isn’t placed in an any existing mappings guard
    gaps.
 2. That the new mapping isn’t placed such that any existing mappings
    are not in *its* guard gaps.

The long standing behavior of mmap() is to ensure 1, but not take any care
around 2. So for example, if there is a PAGE_SIZE free area, and a
mmap() with a PAGE_SIZE size, and a type that has a guard gap is being
placed, mmap() may place the shadow stack in the PAGE_SIZE free area. Then
the mapping that is supposed to have a guard gap will not have a gap to
the adjacent VMA.

Use mm_get_unmapped_area_vmflags() in the do_mmap() so future changes
can cause shadow stack mappings to be placed with a guard gap. Also use
the THP variant that takes vm_flags, such that THP shadow stack can get the
same treatment. Adjust the vm_flags calculation to happen earlier so that
the vm_flags can be passed into __get_unmapped_area().

Signed-off-by: Rick Edgecombe <rick.p.edgecombe@intel.com>
---
v2:
 - Make get_unmapped_area() a static inline (Kirill)
---
 include/linux/mm.h | 11 ++++++++++-
 mm/mmap.c          | 34 ++++++++++++++++------------------
 2 files changed, 26 insertions(+), 19 deletions(-)

diff --git a/include/linux/mm.h b/include/linux/mm.h
index da5219b48d52..a091181ef65a 100644
--- a/include/linux/mm.h
+++ b/include/linux/mm.h
@@ -3351,7 +3351,16 @@ extern int install_special_mapping(struct mm_struct *mm,
 unsigned long randomize_stack_top(unsigned long stack_top);
 unsigned long randomize_page(unsigned long start, unsigned long range);
 
-extern unsigned long get_unmapped_area(struct file *, unsigned long, unsigned long, unsigned long, unsigned long);
+unsigned long
+__get_unmapped_area(struct file *file, unsigned long addr, unsigned long len,
+		    unsigned long pgoff, unsigned long flags, vm_flags_t vm_flags);
+
+static inline unsigned long
+get_unmapped_area(struct file *file, unsigned long addr, unsigned long len,
+		  unsigned long pgoff, unsigned long flags)
+{
+	return __get_unmapped_area(file, addr, len, pgoff, flags, 0);
+}
 
 extern unsigned long mmap_region(struct file *file, unsigned long addr,
 	unsigned long len, vm_flags_t vm_flags, unsigned long pgoff,
diff --git a/mm/mmap.c b/mm/mmap.c
index 2021bc040e81..ac7601d05e89 100644
--- a/mm/mmap.c
+++ b/mm/mmap.c
@@ -1249,18 +1249,6 @@ unsigned long do_mmap(struct file *file, unsigned long addr,
 	if (mm->map_count > sysctl_max_map_count)
 		return -ENOMEM;
 
-	/* Obtain the address to map to. we verify (or select) it and ensure
-	 * that it represents a valid section of the address space.
-	 */
-	addr = get_unmapped_area(file, addr, len, pgoff, flags);
-	if (IS_ERR_VALUE(addr))
-		return addr;
-
-	if (flags & MAP_FIXED_NOREPLACE) {
-		if (find_vma_intersection(mm, addr, addr + len))
-			return -EEXIST;
-	}
-
 	if (prot == PROT_EXEC) {
 		pkey = execute_only_pkey(mm);
 		if (pkey < 0)
@@ -1274,6 +1262,18 @@ unsigned long do_mmap(struct file *file, unsigned long addr,
 	vm_flags |= calc_vm_prot_bits(prot, pkey) | calc_vm_flag_bits(flags) |
 			mm->def_flags | VM_MAYREAD | VM_MAYWRITE | VM_MAYEXEC;
 
+	/* Obtain the address to map to. we verify (or select) it and ensure
+	 * that it represents a valid section of the address space.
+	 */
+	addr = __get_unmapped_area(file, addr, len, pgoff, flags, vm_flags);
+	if (IS_ERR_VALUE(addr))
+		return addr;
+
+	if (flags & MAP_FIXED_NOREPLACE) {
+		if (find_vma_intersection(mm, addr, addr + len))
+			return -EEXIST;
+	}
+
 	if (flags & MAP_LOCKED)
 		if (!can_do_mlock())
 			return -EPERM;
@@ -1831,8 +1831,8 @@ unsigned long mm_get_unmapped_area_vmflags(struct mm_struct *mm, struct file *fi
 }
 
 unsigned long
-get_unmapped_area(struct file *file, unsigned long addr, unsigned long len,
-		unsigned long pgoff, unsigned long flags)
+__get_unmapped_area(struct file *file, unsigned long addr, unsigned long len,
+		unsigned long pgoff, unsigned long flags, vm_flags_t vm_flags)
 {
 	unsigned long (*get_area)(struct file *, unsigned long,
 				  unsigned long, unsigned long, unsigned long)
@@ -1865,8 +1865,8 @@ get_unmapped_area(struct file *file, unsigned long addr, unsigned long len,
 	if (get_area)
 		addr = get_area(file, addr, len, pgoff, flags);
 	else
-		addr = mm_get_unmapped_area(current->mm, file, addr, len,
-					    pgoff, flags);
+		addr = mm_get_unmapped_area_vmflags(current->mm, file, addr, len,
+						    pgoff, flags, vm_flags);
 	if (IS_ERR_VALUE(addr))
 		return addr;
 
@@ -1879,8 +1879,6 @@ get_unmapped_area(struct file *file, unsigned long addr, unsigned long len,
 	return error ? error : addr;
 }
 
-EXPORT_SYMBOL(get_unmapped_area);
-
 unsigned long
 mm_get_unmapped_area(struct mm_struct *mm, struct file *file,
 		     unsigned long addr, unsigned long len,
-- 
2.34.1


  parent reply	other threads:[~2024-02-26 19:10 UTC|newest]

Thread overview: 94+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-02-26 19:09 [PATCH v2 0/9] Cover a guard gap corner case Rick Edgecombe
2024-02-26 19:09 ` [PATCH v2 1/9] mm: Switch mm->get_unmapped_area() to a flag Rick Edgecombe
2024-02-26 19:09 ` [PATCH v2 2/9] mm: Introduce arch_get_unmapped_area_vmflags() Rick Edgecombe
2024-02-26 19:09 ` Rick Edgecombe [this message]
2024-02-26 19:09 ` [PATCH v2 4/9] thp: Add thp_get_unmapped_area_vmflags() Rick Edgecombe
2024-02-26 19:09 ` [PATCH v2 5/9] mm: Initialize struct vm_unmapped_area_info Rick Edgecombe
2024-02-26 19:09   ` Rick Edgecombe
2024-02-26 19:09   ` Rick Edgecombe
2024-02-26 19:09   ` Rick Edgecombe
2024-02-27  7:02   ` Christophe Leroy
2024-02-27  7:02     ` Christophe Leroy
2024-02-27  7:02     ` Christophe Leroy
2024-02-27  7:02     ` Christophe Leroy
2024-02-27 15:00     ` Edgecombe, Rick P
2024-02-27 15:00       ` Edgecombe, Rick P
2024-02-27 15:00       ` Edgecombe, Rick P
2024-02-27 15:00       ` Edgecombe, Rick P
2024-02-27 18:07     ` Kees Cook
2024-02-27 18:07       ` Kees Cook
2024-02-27 18:07       ` Kees Cook
2024-02-27 18:07       ` Kees Cook
2024-02-27 18:16       ` Christophe Leroy
2024-02-27 18:16         ` Christophe Leroy
2024-02-27 18:16         ` Christophe Leroy
2024-02-27 18:16         ` Christophe Leroy
2024-02-27 20:25         ` Edgecombe, Rick P
2024-02-27 20:25           ` Edgecombe, Rick P
2024-02-27 20:25           ` Edgecombe, Rick P
2024-02-27 20:25           ` Edgecombe, Rick P
2024-02-28 13:22           ` Christophe Leroy
2024-02-28 13:22             ` Christophe Leroy
2024-02-28 13:22             ` Christophe Leroy
2024-02-28 13:22             ` Christophe Leroy
2024-02-28 17:01             ` Edgecombe, Rick P
2024-02-28 17:01               ` Edgecombe, Rick P
2024-02-28 17:01               ` Edgecombe, Rick P
2024-02-28 17:01               ` Edgecombe, Rick P
2024-02-28 23:10               ` Christophe Leroy
2024-02-28 23:10                 ` Christophe Leroy
2024-02-28 23:10                 ` Christophe Leroy
2024-02-28 23:10                 ` Christophe Leroy
2024-02-28 17:21             ` Kees Cook
2024-02-28 17:21               ` Kees Cook
2024-02-28 17:21               ` Kees Cook
2024-02-28 17:21               ` Kees Cook
2024-03-02  0:47               ` Edgecombe, Rick P
2024-03-02  0:47                 ` Edgecombe, Rick P
2024-03-02  0:47                 ` Edgecombe, Rick P
2024-03-02  0:47                 ` Edgecombe, Rick P
2024-03-02  1:51                 ` Kees Cook
2024-03-02  1:51                   ` Kees Cook
2024-03-02  1:51                   ` Kees Cook
2024-03-02  1:51                   ` Kees Cook
2024-03-04 18:00                   ` Christophe Leroy
2024-03-04 18:00                     ` Christophe Leroy
2024-03-04 18:00                     ` Christophe Leroy
2024-03-04 18:00                     ` Christophe Leroy
2024-03-04 18:03                     ` Edgecombe, Rick P
2024-03-04 18:03                       ` Edgecombe, Rick P
2024-03-04 18:03                       ` Edgecombe, Rick P
2024-03-04 18:03                       ` Edgecombe, Rick P
2024-02-28 11:51   ` Kirill A. Shutemov
2024-02-28 11:51     ` Kirill A. Shutemov
2024-02-28 11:51     ` Kirill A. Shutemov
2024-02-28 11:51     ` Kirill A. Shutemov
2024-03-02  0:17   ` [RFC v2.1 01/12] ARC: Use initializer for " Rick Edgecombe
2024-03-02  0:17     ` Rick Edgecombe
2024-03-02  0:17     ` [RFC v2.1 02/12] ARM: " Rick Edgecombe
2024-03-02  0:17       ` Rick Edgecombe
2024-03-02  0:17     ` [RFC v2.1 03/12] csky: " Rick Edgecombe
2024-03-03  3:09       ` Guo Ren
2024-03-05 14:51         ` Edgecombe, Rick P
2024-03-02  0:17     ` [RFC v2.1 04/12] LoongArch: " Rick Edgecombe
2024-03-02  0:17     ` [RFC v2.1 05/12] MIPS: " Rick Edgecombe
2024-03-02  0:17     ` [RFC v2.1 06/12] parisc: " Rick Edgecombe
2024-03-02  6:35       ` Helge Deller
2024-03-05 14:51         ` Edgecombe, Rick P
2024-03-02  0:17     ` [RFC v2.1 07/12] powerpc: " Rick Edgecombe
2024-03-02  0:17       ` Rick Edgecombe
2024-03-05  0:51       ` Michael Ellerman
2024-03-05  0:51         ` Michael Ellerman
2024-03-05 14:50         ` Edgecombe, Rick P
2024-03-05 14:50           ` Edgecombe, Rick P
2024-03-02  0:17     ` [RFC v2.1 08/12] s390: " Rick Edgecombe
2024-03-02  0:17     ` [RFC v2.1 09/12] sh: " Rick Edgecombe
2024-03-02  0:17     ` [RFC v2.1 10/12] sparc: " Rick Edgecombe
2024-03-02  0:17     ` [RFC v2.1 11/12] x86/mm: " Rick Edgecombe
2024-03-02  0:17     ` [RFC v2.1 12/12] hugetlbfs: " Rick Edgecombe
2024-03-02  4:42     ` [RFC v2.1 01/12] ARC: " Vineet Gupta
2024-03-02  4:42       ` Vineet Gupta
2024-02-26 19:09 ` [PATCH v2 6/9] mm: Take placement mappings gap into account Rick Edgecombe
2024-02-26 19:09 ` [PATCH v2 7/9] x86/mm: Implement HAVE_ARCH_UNMAPPED_AREA_VMFLAGS Rick Edgecombe
2024-02-26 19:09 ` [PATCH v2 8/9] x86/mm: Care about shadow stack guard gap during placement Rick Edgecombe
2024-02-26 19:09 ` [PATCH v2 9/9] selftests/x86: Add placement guard gap test for shstk Rick Edgecombe

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240226190951.3240433-4-rick.p.edgecombe@intel.com \
    --to=rick.p.edgecombe@intel.com \
    --cc=Liam.Howlett@oracle.com \
    --cc=akpm@linux-foundation.org \
    --cc=bp@alien8.de \
    --cc=broonie@kernel.org \
    --cc=dave.hansen@linux.intel.com \
    --cc=debug@rivosinc.com \
    --cc=hpa@zytor.com \
    --cc=keescook@chromium.org \
    --cc=kirill.shutemov@linux.intel.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=luto@kernel.org \
    --cc=mingo@redhat.com \
    --cc=peterz@infradead.org \
    --cc=tglx@linutronix.de \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.