Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754003AbdCFOkc (ORCPT ); Mon, 6 Mar 2017 09:40:32 -0500 Received: from mail-he1eur01on0139.outbound.protection.outlook.com ([104.47.0.139]:20944 "EHLO EUR01-HE1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753503AbdCFOjD (ORCPT ); Mon, 6 Mar 2017 09:39:03 -0500 Authentication-Results: vger.kernel.org; dkim=none (message not signed) header.d=none;vger.kernel.org; dmarc=none action=none header.from=virtuozzo.com; From: Dmitry Safonov To: CC: <0x7f454c46@gmail.com>, Dmitry Safonov , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Andy Lutomirski , Borislav Petkov , , , Cyrill Gorcunov , "Kirill A. Shutemov" Subject: [PATCHv6 3/5] x86/mm: introduce mmap_compat_base for 32-bit mmap() Date: Mon, 6 Mar 2017 17:17:19 +0300 Message-ID: <20170306141721.9188-4-dsafonov@virtuozzo.com> X-Mailer: git-send-email 2.11.1 In-Reply-To: <20170306141721.9188-1-dsafonov@virtuozzo.com> References: <20170306141721.9188-1-dsafonov@virtuozzo.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [195.214.232.6] X-ClientProxiedBy: DB6PR1001CA0021.EURPRD10.PROD.OUTLOOK.COM (10.171.79.31) To VI1PR0801MB1742.eurprd08.prod.outlook.com (10.168.67.20) X-MS-Office365-Filtering-Correlation-Id: 0a01f22e-a061-4624-8cdb-08d4649c1100 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:VI1PR0801MB1742; X-Microsoft-Exchange-Diagnostics: 1;VI1PR0801MB1742;3:YCmLiCPpN8FxJDeK7h1ppLeemKOFbtUVSE2WL3lxH9r/Yomj3GbRs9HBHtEkeCAtNgCeUgrP47e/o8JNO9UHwvUnrPLYU5IXYqsqdlIEK6Dz/XVK/soEYf/lnJUue3npN8LauahC9wslk06adToYkirgefwH5DJ0OeT4ROOxENcCD5PfagQH25/ZGyQOcPq5tZEQmERqo1l8gfjVwOvKkIEKB9gsGKDKQPwh79kR7x+48DGskU47s2UrdqACy9FhsiXNInC6OyqAI1kZs5wqZA==;25:uYMs39ASru2pha/AGtQ3yyofZathHklsXh6D/8FdXqaV6VZmvjllW6h9yOcj0NTctrh9vtqB/4lDbVqE0cQREUzLRyqE9Mn6XVa12EQdl0yYtm1QLBabq8T0wEDSMMzPO3YMx9/vLeuvCr8eKmNeafhlcUPfTtuuKb3YFru+a/PhI7EWQ8pVUaNyQhjkTRJENRpgKulR+RHySbUrO/+bQmEpiVkshD2MC/1wuhrYd58ByAtr3rVdg1LNDO6+lvqDVq82awpESmpLAVYbkvFNYqbEkaspq/iTZsD35KfgAut34bwCxZBAJObxzgbv/iScU7oqFOD/3p9bVGYcOW26+IdlTBgf9PFlE2pFqj+9BTW3dfMe22oB7aKRLz+I5F2DQuNFWqCP5JOt19SKF4h6UhEMTH80nowqCPaD/wG1PTXgfSGXytP9RRAE/9TOnJqbKrvdH3rIig2IN/Q+PN+qTw== X-Microsoft-Exchange-Diagnostics: 1;VI1PR0801MB1742;31:G3AK1F2x0xuZ2eAIk53slgHZbZtcCQIGOcDR9VsCExbjFQ6KIkOWmo5fZLMel7hquETIzkIFOiB97fKbYiZJqLpEeA7jJJkeVISMI3i7P8TT9259lg+T5RqYPF19y8fYEUuYwkyyb8yzduzD9NYkaPh8m58fbA0iw5QJKdsH3IHxKptjDfNsnFpqOEdKslgFsw6wt6AhWAQdqscDm2ff+Mv/WvRFzIE0mxGdBD1fj/M=;20:xseX0clu3Th+U7M2A9CxBUhK+x+p7BNMTqA5IW/RW7kDIGoaNJSwNQJDv2j1wn0hciZ9d2dFp3we3U77guK1PvIpT2iTwdWK9ULCgKW2ikiQuMIJFRoNu+sSheLP8M7mZKwb/69aCnh/nYxnVPXIQDE0A5FRjN7khp4cBh27UfvxQGF56zuvJPQ8zBNGrUdHfaTo8DEZ5fk6Nh62VBWj2pB1xrKjQA+fYDwwvj285SeDoaEhKLGIN5mT5i83AoGlW9ZtC6swri6N/LFQEPsf0opKGxRX7GypOidAsoZAQgjOIauTQil2ECo3DxqaXa+mIbA9tEQXzAid0WIQbS0FI2JhR9V4V2NWPXWlw/YrK/AGAZSMWN0rT+aqgOQBkliOX3JVlFMgfRX3ie/cD7vEBScFvbegvf20DeTYBk1OQCQ= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(278428928389397); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040375)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6041248)(20161123560025)(20161123562025)(20161123555025)(20161123564025)(20161123558025)(6072148);SRVR:VI1PR0801MB1742;BCL:0;PCL:0;RULEID:;SRVR:VI1PR0801MB1742; X-Microsoft-Exchange-Diagnostics: 1;VI1PR0801MB1742;4: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 X-Forefront-PRVS: 0238AEEDB0 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10019020)(4630300001)(6009001)(7916002)(39450400003)(2906002)(110136004)(6916009)(2950100002)(305945005)(8676002)(53416004)(38730400002)(81166006)(6512007)(50466002)(42186005)(7416002)(1076002)(7736002)(5660300001)(53936002)(5003940100001)(76176999)(50986999)(48376002)(25786008)(66066001)(575784001)(54906002)(86362001)(92566002)(189998001)(50226002)(2351001)(3846002)(4326008)(47776003)(33646002)(36756003)(6116002)(6506006)(6486002);DIR:OUT;SFP:1102;SCL:1;SRVR:VI1PR0801MB1742;H:dsafonov.sw.ru;FPR:;SPF:None;MLV:sfv;LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1;VI1PR0801MB1742;23:0B72xjjIVaQgd6831Wv5X/NKfUSzFxqy5+KqFG2?= =?us-ascii?Q?ytyXUsdfXmgonoio8WxgJhdl30LlIHRUAHPH2bmdXevPvKf33QbdTI5W15Qq?= =?us-ascii?Q?wg3eCMxOByrj5akWx+ViN3zDZTA650ZfeFOhdj9C+BZy5auQFEhTzbcWI+Pu?= =?us-ascii?Q?gYrUdAMaTVhGTGxRF+xdCEzirwhKtoNsXQEgmZKURkonCxHY/qrizUc6kksN?= =?us-ascii?Q?PYS5+JfQhrTdZTmJkEzH51lWED+vFTXzlDd08V1wGt2ie2Uezt76xy5igUJf?= =?us-ascii?Q?qketvfwAr4pWqdiQR7OWhxioTzXe0CyudpR8nYj/o2fOSueEhbQRmeLAM8/y?= =?us-ascii?Q?SSj9Zjye7xyZNH7AhJ7CpGnfi4BhPQOqzvTE459jdHWh6YYjCrKIbpOYUHZG?= =?us-ascii?Q?Uz1cixnmJKib8ODAOktQHBhY3BQBxvUBTEn1jpPcKxYQXDBq2zEi7dH6bXNd?= =?us-ascii?Q?/7M0F3g/laJY+j5LDbNnPXx7QhfGm3D4dluquIGka2GeDfoHQz+t1i1YleUJ?= =?us-ascii?Q?VdCd98IOzT8wDHfbxwTpqtvqHaZZcmCEIwbeuR5GLD1GhaNg04wQx4zWJwW1?= =?us-ascii?Q?U1LNuZZF8EoFceGV1BqUEp4v3ea+W5oQFwgzEgrxQpPytezUnUO/5/Pq6zZl?= =?us-ascii?Q?m2BZUM3W7GFfO2oO32WdXx0VUrEI/tAjnnazbdtq3UqD3K6Ip3fPy92RR5GZ?= =?us-ascii?Q?9KrwaJlUJMueRBawAt6dbVGGlk3gTE9J0s2Zhsxi27ZgfcjRPhC16bYxWn5N?= =?us-ascii?Q?bh/VlHzjaVli3pbGj/F2VMOlU5jLZ8CYBU7TgL97sOVlZGdWNSpnLKucLaim?= =?us-ascii?Q?SWLXuuCDyP7Sdx1MMs6WPWfr6PPbmfzVy/hXEFCemwaS0zgQfq1jvz2jn/xf?= =?us-ascii?Q?RJJKX6o0xgIeGas0OMi7Se3U4ZUT+4hKHaeGWzbQao+CYObAfHqKAbGcf0Dv?= =?us-ascii?Q?8WJr+14Z9QtLaRDpVQW/STlTsKxqxUlMdbHE0Tn2pEHcF/7SW2NIeO4GFVOn?= =?us-ascii?Q?7b8DPhsLxzJkD3h5Ukg6qUe0LGUptXno4Q62GaEEbuzPt2A=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1;VI1PR0801MB1742;6:QYNrdYKE7PbW9bH9P6ykN1aHQ8/HsxOr+DrUk/loC2s9SKTQj5+6VGOOp4DE7KEvtknUayZ9qXyg6JPiHbpFYfS3SUFUkFoXw17Yt5qXs865vawctQQW23XTy1Vw4z/JW26YlCSK/dHtXQwKNlUYGDdNsB+N0dkS3f13YtOhpEliLj2bZvMFlOO7EBqApozGB+pss0yhAQOAwSjIOYkAXODqm82jjpTvDPrHW7TjgScaq6PLd3bxk5K3I+vkbCg/NLOU9y1zaUO7pxTmP6mAmr6XVKN+SfsLbmEBCp9z1DGCCyBkDtpetAAnSMGBDZRJ3bVyXpksolIqUkoJkY276kxVb4czid0hlML5Scx5OK7s/DKMdWo9HaUNtbJyFTSbNHL/SGa7y8juKtrVvids+A==;5:9S51X2TVi4yjKyU38Pb6n9rHEBZsZHIX0cTC5Qz9Q1ET3phNjUwpdXgwEqEOGGRXMJkAXg3XT78sp7OkBlfy1zk4Ab6M6IhuYmvtg4Y3UpxUNQAWUYBDzk9GxodwxxtVYlGg6oYUvfg5oX4s1wh8kw==;24:zCixCmeRhsAQlXmS9uNDb/V4lK+2tGxdnBaHUMA7cdR7mytnyaZnNdpzki5SOxyQTCtGJJDYfdP1BZ3PwgovZiMMIksPR6HCU6/EEkK6ero= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;VI1PR0801MB1742;7:t6HMTMh8/UxAx/BQgqm/ytMOpJKGY1poOkuZoNzfAZ66JvdVlwI2ivW82M0t24VOQF4v14cx323aJfVD2TPn5jw5Sf2KkGGJy2zHDITfAm25dRkdwfLMRBH6JsWg7q5RNJHtCC1Rdhar2mOdYqFjm9hI9Lz4iGSLuHMa0wD7+vHIX7KeHbM8LHD3ewcqvbUsb13XJY9gfXq4mMX/TYd3Au9DfHjbb4VPZQECz34yyy/xGc4nA/RZI9lrmVB4Vi89oRGMAPiBgkEUF0fN/GMSi+tlSta6n1N1rv1S5BK7bfaUUvxuPSYjygo9dkioS1bf70348k4jtbORD28tGki3Zg==;20:aW40r4/Wj8cfWGO285OA1hmGkWd2Dkq9RBsnh3oLkByG/1ygfzQz44rjX19ay9BNgk7JMGf/GZ27PxvXneIZlP+VgKgJ6jbIrtE1vis4Q2+zhRYXlAM4GnCQXM8oZe1rUvpJawUqZLZMjF1MMS8yI1SiZrKDInA2nFd9P15leYQ= X-OriginatorOrg: virtuozzo.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Mar 2017 14:21:21.5305 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1742 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 7568 Lines: 223 mmap() uses base address, from which it starts to look for a free space for allocation. At this moment there is one mm->mmap_base, which is calculated during exec(). The address depends on task's size, set rlimit for stack, ASLR randomization. As task size and number of random bits differ between 64 and 32 bit applications, calculated mmap_base will be valid only for the same bitness. That means e.g., that calculated mmap_base for ELF64 lies upper than 4Gb, which results in bug that 32-bit mmap() syscall will start to search for a free address over 32-bit address space and returns only lower 4-bytes of allocated mapping. As 64-bit applications can do 32-bit syscalls and vice-versa, we need to correctly chose mmap_base address for syscalls of different bitness. For this purpose introduce mmap_compat_base and mmap_compat_legacy_base, use them accordingly in top-down and bottom-up allocations in 32-bit syscalls, use existed bases mmap_base and mmap_legacy_base for 64-bit syscalls. That means that each application on x86_64 will have now two bases (or four if count legacy bases also) which are calculated on application exec(). I guess we can relax the calculation of bases until first mmap() call, but don't think it's worth. Signed-off-by: Dmitry Safonov --- arch/Kconfig | 7 +++++++ arch/x86/Kconfig | 1 + arch/x86/include/asm/elf.h | 3 +++ arch/x86/kernel/sys_x86_64.c | 23 +++++++++++++++++++---- arch/x86/mm/mmap.c | 41 ++++++++++++++++++++++++++++------------- include/linux/mm_types.h | 5 +++++ 6 files changed, 63 insertions(+), 17 deletions(-) diff --git a/arch/Kconfig b/arch/Kconfig index cd211a14a88f..c4d6833aacd9 100644 --- a/arch/Kconfig +++ b/arch/Kconfig @@ -700,6 +700,13 @@ config ARCH_MMAP_RND_COMPAT_BITS This value can be changed after boot using the /proc/sys/vm/mmap_rnd_compat_bits tunable +config HAVE_ARCH_COMPAT_MMAP_BASES + bool + help + This allows 64bit applications to invoke 32-bit mmap() syscall + and vice-versa 32-bit applications to call 64-bit mmap(). + Required for applications doing different bitness syscalls. + config HAVE_COPY_THREAD_TLS bool help diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index cc98d5a294ee..2bab9d093b51 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -106,6 +106,7 @@ config X86 select HAVE_ARCH_KMEMCHECK select HAVE_ARCH_MMAP_RND_BITS if MMU select HAVE_ARCH_MMAP_RND_COMPAT_BITS if MMU && COMPAT + select HAVE_ARCH_COMPAT_MMAP_BASES if MMU && COMPAT select HAVE_ARCH_SECCOMP_FILTER select HAVE_ARCH_TRACEHOOK select HAVE_ARCH_TRANSPARENT_HUGEPAGE diff --git a/arch/x86/include/asm/elf.h b/arch/x86/include/asm/elf.h index b908141cf0c4..ac5be5ba8527 100644 --- a/arch/x86/include/asm/elf.h +++ b/arch/x86/include/asm/elf.h @@ -303,6 +303,9 @@ static inline int mmap_is_ia32(void) test_thread_flag(TIF_ADDR32)); } +extern unsigned long tasksize_32bit(void); +extern unsigned long tasksize_64bit(void); + #ifdef CONFIG_X86_32 #define __STACK_RND_MASK(is32bit) (0x7ff) diff --git a/arch/x86/kernel/sys_x86_64.c b/arch/x86/kernel/sys_x86_64.c index 50215a4b9347..c54817baabc7 100644 --- a/arch/x86/kernel/sys_x86_64.c +++ b/arch/x86/kernel/sys_x86_64.c @@ -17,6 +17,8 @@ #include #include +#include +#include #include #include @@ -98,6 +100,18 @@ SYSCALL_DEFINE6(mmap, unsigned long, addr, unsigned long, len, return error; } +static unsigned long get_mmap_base(int is_legacy) +{ + struct mm_struct *mm = current->mm; + +#ifdef CONFIG_HAVE_ARCH_COMPAT_MMAP_BASES + if (in_compat_syscall()) + return is_legacy ? mm->mmap_compat_legacy_base + : mm->mmap_compat_base; +#endif + return is_legacy ? mm->mmap_legacy_base : mm->mmap_base; +} + static void find_start_end(unsigned long flags, unsigned long *begin, unsigned long *end) { @@ -114,10 +128,11 @@ static void find_start_end(unsigned long flags, unsigned long *begin, if (current->flags & PF_RANDOMIZE) { *begin = randomize_page(*begin, 0x02000000); } - } else { - *begin = current->mm->mmap_legacy_base; - *end = TASK_SIZE; + return; } + + *begin = get_mmap_base(1); + *end = in_compat_syscall() ? tasksize_32bit() : tasksize_64bit(); } unsigned long @@ -191,7 +206,7 @@ arch_get_unmapped_area_topdown(struct file *filp, const unsigned long addr0, info.flags = VM_UNMAPPED_AREA_TOPDOWN; info.length = len; info.low_limit = PAGE_SIZE; - info.high_limit = mm->mmap_base; + info.high_limit = get_mmap_base(0); info.align_mask = 0; info.align_offset = pgoff << PAGE_SHIFT; if (filp) { diff --git a/arch/x86/mm/mmap.c b/arch/x86/mm/mmap.c index 1e9cb945dca1..84a0ffc550fe 100644 --- a/arch/x86/mm/mmap.c +++ b/arch/x86/mm/mmap.c @@ -36,11 +36,16 @@ struct va_alignment __read_mostly va_align = { .flags = -1, }; -static inline unsigned long tasksize_32bit(void) +unsigned long tasksize_32bit(void) { return IA32_PAGE_OFFSET; } +unsigned long tasksize_64bit(void) +{ + return TASK_SIZE_MAX; +} + static unsigned long stack_maxrandom_size(unsigned long task_size) { unsigned long max = 0; @@ -81,6 +86,8 @@ static unsigned long arch_rnd(unsigned int rndbits) unsigned long arch_mmap_rnd(void) { + if (!(current->flags & PF_RANDOMIZE)) + return 0; return arch_rnd(mmap_is_ia32() ? mmap32_rnd_bits : mmap64_rnd_bits); } @@ -114,22 +121,30 @@ static unsigned long mmap_legacy_base(unsigned long rnd, * This function, called very early during the creation of a new * process VM image, sets up which VM layout function to use: */ -void arch_pick_mmap_layout(struct mm_struct *mm) +static void arch_pick_mmap_base(unsigned long *base, unsigned long *legacy_base, + unsigned long random_factor, unsigned long task_size) { - unsigned long random_factor = 0UL; - - if (current->flags & PF_RANDOMIZE) - random_factor = arch_mmap_rnd(); - - mm->mmap_legacy_base = mmap_legacy_base(random_factor, TASK_SIZE); + *legacy_base = mmap_legacy_base(random_factor, task_size); + if (mmap_is_legacy()) + *base = *legacy_base; + else + *base = mmap_base(random_factor, task_size); +} - if (mmap_is_legacy()) { - mm->mmap_base = mm->mmap_legacy_base; +void arch_pick_mmap_layout(struct mm_struct *mm) +{ + if (mmap_is_legacy()) mm->get_unmapped_area = arch_get_unmapped_area; - } else { - mm->mmap_base = mmap_base(random_factor, TASK_SIZE); + else mm->get_unmapped_area = arch_get_unmapped_area_topdown; - } + + arch_pick_mmap_base(&mm->mmap_base, &mm->mmap_legacy_base, + arch_rnd(mmap64_rnd_bits), tasksize_64bit()); + +#ifdef CONFIG_HAVE_ARCH_COMPAT_MMAP_BASES + arch_pick_mmap_base(&mm->mmap_compat_base, &mm->mmap_compat_legacy_base, + arch_rnd(mmap32_rnd_bits), tasksize_32bit()); +#endif } const char *arch_vma_name(struct vm_area_struct *vma) diff --git a/include/linux/mm_types.h b/include/linux/mm_types.h index f60f45fe226f..45cdb27791a3 100644 --- a/include/linux/mm_types.h +++ b/include/linux/mm_types.h @@ -367,6 +367,11 @@ struct mm_struct { #endif unsigned long mmap_base; /* base of mmap area */ unsigned long mmap_legacy_base; /* base of mmap area in bottom-up allocations */ +#ifdef CONFIG_HAVE_ARCH_COMPAT_MMAP_BASES + /* Base adresses for compatible mmap() */ + unsigned long mmap_compat_base; + unsigned long mmap_compat_legacy_base; +#endif unsigned long task_size; /* size of task vm space */ unsigned long highest_vm_end; /* highest vma end address */ pgd_t * pgd; -- 2.11.1