Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757895AbdCUP7k (ORCPT ); Tue, 21 Mar 2017 11:59:40 -0400 Received: from mail-eopbgr50125.outbound.protection.outlook.com ([40.107.5.125]:55453 "EHLO EUR03-VE1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1757127AbdCUP7M (ORCPT ); Tue, 21 Mar 2017 11:59:12 -0400 Authentication-Results: vger.kernel.org; dkim=none (message not signed) header.d=none;vger.kernel.org; dmarc=none action=none header.from=virtuozzo.com; From: Dmitry Safonov To: CC: <0x7f454c46@gmail.com>, Dmitry Safonov , Adam Borowski , , Cyrill Gorcunov , Borislav Petkov , "Kirill A. Shutemov" , , "H. Peter Anvin" , Andy Lutomirski , Ingo Molnar , Thomas Gleixner Subject: [PATCH] x86/mm: set x32 syscall bit in SET_PERSONALITY() Date: Tue, 21 Mar 2017 18:55:25 +0300 Message-ID: <20170321155525.12220-1-dsafonov@virtuozzo.com> X-Mailer: git-send-email 2.12.0 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [195.214.232.6] X-ClientProxiedBy: VI1P194CA0006.EURP194.PROD.OUTLOOK.COM (10.175.178.16) To AM5PR0801MB1732.eurprd08.prod.outlook.com (10.169.247.10) X-MS-Office365-Filtering-Correlation-Id: edd507ff-fbd0-4a72-1284-08d4707335d2 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:AM5PR0801MB1732; X-Microsoft-Exchange-Diagnostics: 1;AM5PR0801MB1732;3:Ag0FLRFXsdqzdvB22DmlgSEED2jr4aC1IUJ8JUFe+hySyGKPjr5Cq1HpivRW2pEa2MndX85WSAvNhR4YUp2F9+bjDOSLkfnukmoQrMhW8rM4SRSc/AcK6zq00olTzaBgz7Q2PLddJSWN1417DPTa1seMfSL/qFJ/kS6TXk8LFCuGKYMkBqgQYN4sqeuNcZQwllPM49fZidnbeBTWdpkDmyry+MNn38fe/EFgZA9gkC1vtQX7P50OC07lHj5x3+yscCNo687y6l1c+PE2AhDgBA==;25:qj5H5nifoJyW7hqTx04wilpN9QrMA9FNfUDy0HCNsyhehHWtGUekMs2QpKralET2tzo9DJtS0V1gWxHA1w1MC2m+S554ULwLwH/6Z3+9B9SMAR/EBryisIHUSCAksu7xx9hVceIYoNb7NFMYMGNhOmWR6+6BkEm89vEP4khut5LtR4R3QzYyOUwPGdxBY41MNfyekKZZSzdd+ucs7xVieV/S66IUBC1xSUdVqHbEtb/QMBIZEirh+zmM7gxCIEH2d1TeL9SiHBGwusq3Yq5T6nYkzOFQxVtNanKkj285WEdC2WfpnyYlEPVpRlPtd8yKl09CsLfYh1l45Jt7X63IBQCVwvl5odqQGsq+GYd6paOshM9tHdnkzYy5kS0EojEnA2tR52oFj7eBd5YE6pjLFxOKIr6LVwYhYoWxU4ZudHHKTYBcjcYLJm+9xG84qiBJXXgbyv2V2XXQsef6wa7vDg== X-Microsoft-Exchange-Diagnostics: 1;AM5PR0801MB1732;31:Ixdt8jwLtTnejWWbHHELVR2EGxWx/f70SwqJDqfZzYSW2Xo0BXz7bKxES1ePoJBhuyzJ7hmCyRCfCMYFDWmJALiruqcABR9dC6C/nzat43Hm38ZYU+vmqSNOSzwOcOFG3Jyu84OJv9UwYiTaKThhRrZNVlCvrYsQkw3M3uhxNRWr2+KAQZ1sJbsVAPZHaFTH9UTduIRT4cfk2abvwzItSMlFH/SZwifSwXN6oMbDIPJ7YgkkyrMFBa7AzvZgr+3/;20:apYaQgL2qb1TgfGFAHwjQxL091WSFZQzlc7RRxQo25SoHEMJbikIQc9XAx+mKUm9v4RrVOpqcsjCvNidF52bDWRZBv9rMTvhWocelGwLRB4IkqkSQFUh/oGDOYi2wz/damph3iBIebpu+P6QhWKBmgdE/kHCIEXv8S3N2S0UcjxhCmMQz7rPo8aS9MBJUEJ/Tpe+IX29uNqrib4GMck3Hkqv3sxR5k1XWpdqQfotFDhfP8n1QhIbG4ZH911QVi/apDZTLBHzPox1q4ce+Oe6+w5IPRlrr8eCZDKWI6ubqemRWH7GuulgmczJ0E4Egh0K/hfY3HVoA8RAKrJQEJnXBZmW5safnJvbaO0CSJOG/kyUCTMAz1B4P0a4ceUTNDIspKc5S1O/vI5PPQM6m3zjBBdVyAE/qh+kZjYvgR+ntqw= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(228905959029699); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040375)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6041248)(20161123560025)(20161123564025)(20161123558025)(20161123562025)(20161123555025)(6072148);SRVR:AM5PR0801MB1732;BCL:0;PCL:0;RULEID:;SRVR:AM5PR0801MB1732; X-Microsoft-Exchange-Diagnostics: 1;AM5PR0801MB1732;4:5PBq2aazz6AEKJfMPTl3jCKoRTQE21aCCLN9Lg/ttPMfVRr78CFhYFWCU9yuSehu74862Dp4iUCiMyKKPH7zOvmvynHhr8hfhRvyvRyN92yAF1TlJt0iw9WwWaGDeOL9o/FNFhDI8nzBLsqqExVGIghsmpDScr5kgBN5thNOMhEmfAEOAuaPR2SWVm6YuQxwlvB886pp8i6gtXQsXz2005C39KGf0ivZ9XQ2L0H4sD7Z4TfA5i5iX59Ie5CqVk/5S9WoH7a3eB0D9+4U8pWy65ZUf91vVqby7mBV+Ahk1unT5O7ML65WxoY618JYzfHtDfEAC14f+2BDTTZcWHHf8f2JMP911lzACoVpFlC91s50OmHc7LbJqR7RokCdz7GRuKffIa5tmELUNXLZ2aRmBrpI7hTly2HEfiDyGaRG7CAZfXG416gxqR5fh4XUZk2ipn6VgUybltxPWd2yS5j4drxvOZCzEIYn6u/NIlWPq6UtMwQ5vIVZlAaMFAZELH+Qp6WGek9L0imUFcNU//BGtUn88N9pG/kHIpTlySgLQbYbFMRUvDhhajwHj9SbUR7WZvvNGmKkjAWSD7dF5SUVXe1NkugbKUYX6wstDAFp2RA//1nouWdZZO+FAhP9l3HMemye3cYGFnsPJIyS1LWOqA== X-Forefront-PRVS: 02530BD3AA X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10019020)(4630300001)(6009001)(39450400003)(50986999)(81166006)(110136004)(47776003)(53936002)(5003940100001)(36756003)(6506006)(50226002)(3846002)(8676002)(66066001)(50466002)(6486002)(48376002)(33646002)(25786008)(6116002)(86362001)(4326008)(6512007)(7736002)(42186005)(6666003)(2906002)(38730400002)(5660300001)(53416004)(6916009)(7416002)(2351001)(1076002)(189998001)(54906002)(305945005);DIR:OUT;SFP:1102;SCL:1;SRVR:AM5PR0801MB1732;H:dsafonov.sw.ru;FPR:;SPF:None;MLV:sfv;LANG:en; X-Microsoft-Exchange-Diagnostics: 1;AM5PR0801MB1732;23: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 X-Microsoft-Exchange-Diagnostics: 1;AM5PR0801MB1732;6:mTeNFhBg9X0rdwf8ERQxBLp5Ag9XhpTy9Puw4x05nndOdynIRakMxzK+sKskhnO7r/IwcG+xfUJTnfqa7kCmLzo/y10E5knnluv8ok2ZtNI/RofOowO3Y/nNGaSm+CJCkDd5QYfB9MG9owV7yBqaqaT4RJ/wgvSrmImcmd2hOGJEjdewaLonNiIhHvnfI6Ynys1RMkKjwYFcKu1DclLR4HX+DVv4ev7WqR596Nj6lPIF2JtXuK8GsIgBPL/R2iLTCfIfv0obTbHxvZGWKsdiuKW7pymDWTPdhSx4EHlZ1TVz0gcqHBUrYgnv6unVWXPYh2UAEoIAJODrWA43sQr9bxFemksIRazhiZF2IGss3TWc0GDM1y2WwVfVp18wWMhdmX+XoD5xxWR5LGc6HpHxEQ==;5:j0SsK+gB7lQAKS5RrzmGjNw7jiSS3nmc1/R7+FesSW1BtvNPkWY/JkXQpiGrI1DWWs2gEhanA98jhgq9K1DuGXaQJvbwbOOhrA9KOw8VQ9NAQNExD1IimQkBoyvg7fUfVTQwJYrmIhIijJHbJv6EWQ==;24:Z5gj9FrmejGdgCUfkRDhZVWQ8nmKSRYdEM6jEYiRrMBln7LYEsD5ine3o2Gbvais+KxBXtWnf2xsjCUZp88O8LpWYPzYDVagIL9O+8PDltY= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;AM5PR0801MB1732;7:WCaITy8VuJjH8A+5GAodw3UFLbx63Xsgfra/CQwUdLMTNMau+//PAelb5RW+36VOIr75XsVzn+abPePjBsMGijcDqUcEByraGUyQ9TjBx8ziXKEiEaG5Byj22HbFwTWDo+rTvr+jZlufu2CzTWJHW/t0zT6rvUquSGZzTQaVXXJ66gO9sLv6jGvyCfBlJhhF4n3KWRRqyOsR5a2p+xobDvCK9HKpAH4Pz+CVOTKQAuJK6sfjQJvpYnwvkh8gzs1ZC9aTCydljVkklkkX/Cv+b+PH34t74lwYGY7nd3TyHqhq588l8BLfyRPpKgXQTHCkby2unRUT7RHKUoQMdahUwA==;20:fVnt3At5TvQAuHFoCZlqCnddAhVOpIKLmASEiUkigMkb2TYxtKNGz8zFCqlluhnRUbLvE7RJZ4gop/kH4/APiPGUS4oHub09pcQNTrV9OPix6eEwBe1A3jTOQ3IGsmiqAOoz55ylD/vdAAs7dbaP+XMwaEVkTeqZUXxHUcixl1U= X-OriginatorOrg: virtuozzo.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2017 15:59:08.0612 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0801MB1732 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2274 Lines: 56 After my changes to mmap(), its code now relies on the bitness of performing syscall. According to that, it chooses the base of allocation: mmap_base for 64-bit mmap() and mmap_compat_base for 32-bit syscall. It was done by: commit 1b028f784e8c ("x86/mm: Introduce mmap_compat_base() for 32-bit mmap()"). The code afterwards relies on in_compat_syscall() returning true for 32-bit syscalls. It's usually so while we're in context of application that does 32-bit syscalls. But during exec() it is not valid for x32 ELF. The reason is that the application hasn't yet done any syscall, so x32 bit has not being set. For i386 ELFs it works as SET_PERSONALITY() sets TS_COMPAT flag. I suggest to set x32 bit before first return to userspace, during setting personality at exec(). This way we can rely on in_compat_syscall() during exec(). Fixes: commit 1b028f784e8c ("x86/mm: Introduce mmap_compat_base() for 32-bit mmap()") Cc: 0x7f454c46@gmail.com Cc: linux-mm@kvack.org Cc: Cyrill Gorcunov Cc: Borislav Petkov Cc: "Kirill A. Shutemov" Cc: x86@kernel.org Cc: H. Peter Anvin Cc: Andy Lutomirski Cc: Ingo Molnar Cc: Thomas Gleixner Reported-by: Adam Borowski Signed-off-by: Dmitry Safonov --- arch/x86/kernel/process_64.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/arch/x86/kernel/process_64.c b/arch/x86/kernel/process_64.c index d6b784a5520d..88d99d35a699 100644 --- a/arch/x86/kernel/process_64.c +++ b/arch/x86/kernel/process_64.c @@ -520,7 +520,12 @@ void set_personality_ia32(bool x32) current->mm->context.ia32_compat = TIF_X32; current->personality &= ~READ_IMPLIES_EXEC; /* in_compat_syscall() uses the presence of the x32 - syscall bit flag to determine compat status */ + syscall bit flag to determine compat status. + On the bitness of syscall relies x86 mmap() code, + so set x32 syscall bit right here to make + in_compat_syscall() work during exec(). + */ + task_pt_regs(current)->orig_ax |= __X32_SYSCALL_BIT; current->thread.status &= ~TS_COMPAT; } else { set_thread_flag(TIF_IA32); -- 2.12.0