Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933440AbdCUQlI (ORCPT ); Tue, 21 Mar 2017 12:41:08 -0400 Received: from mail-eopbgr40124.outbound.protection.outlook.com ([40.107.4.124]:21408 "EHLO EUR03-DB5-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1758221AbdCUQlF (ORCPT ); Tue, 21 Mar 2017 12:41:05 -0400 Authentication-Results: vger.kernel.org; dkim=none (message not signed) header.d=none;vger.kernel.org; dmarc=none action=none header.from=virtuozzo.com; From: Dmitry Safonov To: CC: <0x7f454c46@gmail.com>, Dmitry Safonov , Adam Borowski , , Andrei Vagin , Cyrill Gorcunov , Borislav Petkov , "Kirill A. Shutemov" , , "H. Peter Anvin" , Andy Lutomirski , Ingo Molnar , Thomas Gleixner Subject: [PATCHv2] x86/mm: set x32 syscall bit in SET_PERSONALITY() Date: Tue, 21 Mar 2017 19:37:12 +0300 Message-ID: <20170321163712.20334-1-dsafonov@virtuozzo.com> X-Mailer: git-send-email 2.12.0 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [195.214.232.6] X-ClientProxiedBy: HE1PR0802CA0014.eurprd08.prod.outlook.com (10.172.123.152) To DB6PR0801MB1735.eurprd08.prod.outlook.com (10.169.226.150) X-MS-Office365-Filtering-Correlation-Id: b050190a-e78c-4c1c-f46c-08d470790cd5 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:DB6PR0801MB1735; X-Microsoft-Exchange-Diagnostics: 1;DB6PR0801MB1735;3:RvBnW+LQuUee+2spl/YpF2Ww4Scoi8daXkUTWGUXqdgNXi9RaiJjlddGOaTHML7N+LmB0Nh8OcnvSGDeM66waaNg2+isOhfiiRMe58s+abA4mMS+SKG0qrYCDIhwoaGyDA+Z+n6bpewkePFyGiz663a02EiAvjC90f9v8No1KfzPxVrzOv1GVyCZO7WSO8oz09ZfFWI0hKRqnCew59uE90ejYtfvfSrKw0m4bG/5VnOc97sB0QAtCq6UNdPi2TVxJARkw4ywE83xsp16OErlKA==;25:rWuWe3+rorNoGHLhLijB4U9k447+CV5OtBajoSnXqC2h/3rMnsnALAcBbAIClQfsZngbq9REAU0Df+5MCTAWHiV0EpVcZ0mM6L/AzxEu8s+lS5t3XK3LVZ+i7jBnP+QZYKlkUbetZ3BC8C780fRukUFxsEYPQ2zHmQq55OOWRx19d1mjJKrrOPOgzfJZVWlKZNpGetVRc4D2QpwJ1zLjpcNQhhJgUIIqzXOiQiUngSOvch0cUUDM0nwFC5JHUN6KuGR9+ymlfWA/N+ESuK7IAZrPMaJSh6v20Kx/jCLuEUcjDEAFqQELL/fAFtmPKAYB4ixYD1/siVEjlFMHvt4PL1CiUhBhamrlY91t+y/GAYxXGiJaCur9b7EdIRI+CzrZUAPnTiIjFOgOYoRgykFtCatQ0SK/tU39lXfTmqnw6D/QQOvaNPh5VsUshYkPT/Moh/lsYR3wrrflM+vZVupVbA== X-Microsoft-Exchange-Diagnostics: 1;DB6PR0801MB1735;31:rM0vOX2+SKdAamDF52y5cR/bwgTN9D5kGA4wkxij8r+VnY0DDo2iOel9CYNh6uPBpYaChPQMEGB18rFHq++SaG8h4J0yXWea3iTmeiQqr6YK9RHkgMmuhSOvieIymLR6+vRH7obkH/159o02UunJb9Fmt/X6qRqPVBgPc83JTN1AKq0ClqqONnQTt0NKCY36oZHbtP98+KeI2VWPl7sUNyW2OFrcfKdOFON/UCzOVUlvjBYhtWS/1Tb3ry1EFAv3479sUCr7fiID5gDr1DrnFA==;20:SNWkVqK3vpSxF/kruheDnROTbvKuQ9C/JbzlQBDKE18R5ADD5pUiTiTyQuev08tflbfl3tAC4Xe/Zs7RkXfjN/cx6gBQUFqJ3s/qzEcXMBBvBwvr2dppWjEjGKRvvMNN2waMiXE7xGCINN0EPwqEcDTKBN1QvB03xHd4SE+6DVCgmljrHZvWs9J9gvqNwgJeTu/gam2cKWzGMFo7vvvnIA8iTtFwSn24ZS5X6X/bGjQQ3Xh6lzVJzbsKsHsZrPUY1Xuj5svAe8Wp0YJY4JhvSCpB/ttN0K8dEES21XxXC+7szdxY57fJ3BPtBvMCxLWLaAaD0SuAlw0nsrK7FjWHU/xIbIt1Z9th5tZxRjC4v4uAYfFv/v7UlalY5zQ+eob5Pq7FDFDMvR1spX3uSp/wHxWSXA7SsPeOW2c6owGZ4pw= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(228905959029699); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040375)(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6041248)(20161123562025)(20161123560025)(20161123564025)(20161123555025)(20161123558025)(6072148);SRVR:DB6PR0801MB1735;BCL:0;PCL:0;RULEID:;SRVR:DB6PR0801MB1735; X-Microsoft-Exchange-Diagnostics: 1;DB6PR0801MB1735;4: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 X-Forefront-PRVS: 02530BD3AA X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10019020)(4630300001)(6009001)(39830400002)(39450400003)(39410400002)(48376002)(5003940100001)(6666003)(86362001)(1076002)(189998001)(50986999)(25786009)(5660300001)(50466002)(6486002)(305945005)(7736002)(47776003)(2351001)(33646002)(66066001)(6506006)(8676002)(36756003)(54906002)(6512007)(6916009)(81166006)(7416002)(53936002)(110136004)(38730400002)(4326008)(42186005)(3846002)(6116002)(2906002)(50226002)(53416004);DIR:OUT;SFP:1102;SCL:1;SRVR:DB6PR0801MB1735;H:dsafonov.sw.ru;FPR:;SPF:None;MLV:sfv;LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1;DB6PR0801MB1735;23:71STwAWBnjuvYYic+Z1x65t01nURq6dMV4vBl4k?= =?us-ascii?Q?HcyXCQTvPTJkGzGMEWgwfMQLMDoUEVRJYZcqORcvg/nLSKHfZG2ZnfnHenDz?= =?us-ascii?Q?Qbfmk2Py9pd39L29zKrJ8OUVD7Rb7rw6QdbE0rjJWTlAH10mlUieWHcZtacp?= =?us-ascii?Q?3BLQWDpLVwW8zfF2BnBWYm2Yv0cdUb3bKkaM2EwnHMsYlkyM85BJfDr22vMm?= =?us-ascii?Q?5Py4VkaTbQNAY89KmTxz1T/JKq0ammGvOIZ9nfRqSfpZF1JiiGefoeG9MPjn?= =?us-ascii?Q?ycUpYZKk70vIv6WzovCG4WOkH+wZB4yjGrbBdCZokVp2j6pBRefgFmewoyF4?= =?us-ascii?Q?1srmtl9enmnYCm2dsDhjAz2A6s/9Sx367T8PvHzpPg67cHXDlsRd/sZu8+xk?= =?us-ascii?Q?iUnB/STKHmYPnx1fQAP702+mnY8LRSFX7f4Yror0iZXuPDnc7tKPkyEtIcuX?= =?us-ascii?Q?Zasnn+b1grsCMkASddfOIt8gLmJwhvy8QoxIICj1YHxXog5Mvqy6Bot9JmB+?= =?us-ascii?Q?uS+8MnMIbFHfLmUDWa5DLPanYgbB62gMki57HtKKQlXB1rCKbs4dRm9Cy+Zw?= =?us-ascii?Q?umK6XyPNPflZvIzfZsXlV9FBwyzFVMhUFrbH2+vlagyPFuM2+upruwNbLkBW?= =?us-ascii?Q?BO5CZGza+RWjjSVL3aDxmdgL02R0x1jZz7P5GnmOujC2DbNlPnbWhuVAzOVN?= =?us-ascii?Q?fiTsIK5DQ3OjPbZkUXOnFN3OnezXkY06xsd017pjKci2jectAIaSQFMWg86t?= =?us-ascii?Q?Ncnwb3XuLpCYN6Q/SZwHp9opM/dQdEfCKu+fCW9xlcCDafrv69vYBpZj4GU4?= =?us-ascii?Q?QI21c7i80q+86c44jh6KFie2bhfTBqBQJIt3VaGdwuo9ykR0H1yMdlHz7dBT?= =?us-ascii?Q?olko9dmiXyJj0zcd04nMk7GntO4JsskKXhhth+fp+YhtJdiMPXw2jb83MF3H?= =?us-ascii?Q?8izPcFmPkKBQ3n6kM9loxLiHMcX5+Wt6oX3Vo10meD0Pg/McbdoENK7+zfCM?= =?us-ascii?Q?PddL14IAnMRorDOKIpnGV0fMA?= X-Microsoft-Exchange-Diagnostics: 1;DB6PR0801MB1735;6:H21pj6nJls4qU0O8iFiqIjjOMP9v+Llc9vO7xFAZY8TwQ2kt83TE0wVYfjU6oxR2bMKWe0MJl+dIkylX2p0vaPQWH07Q6napvpsNJrFAhNQNn3AO8gailf7M4VWn7yt0imfYn0wjJmcohgWRRqXS6n0DindbhNCTN5zhuetY2eEiXPvjTucv5dqXNgmnNNd4lHpNAzkFC9f6H7nT4U1fF1pSyH9RXZvvtL8PyYJWnvi7AD+VQgadNh5WxFyLtYu0bsepu+/n6XuQaYQjWdI/04/LzKMFJEWlVslA+wvgr0eUHBuOGpCpeIVI0u/ee8hBarN5lkox4akL5kA9/vWgwS31xVEqzX1kJ83LRp3Me5jPqEufZ0JgS/4fY4JFk0qMBESlw9m/zGfHeN1zNxyoEA==;5:mJaBzJZBUP3l+b32Fse+gocEIC2ZCK++o8Q3XDBMNb2HmFGFw2yWm2H05nf5Le4zWrcIfhwdKLlsgwDPRCOwj7x2EbPLX2ns+iqemvfZBHM4X5GuaVRYY0CY8aoLsPXU4pjv4zxJ6gbpnqTmaYm0Sg==;24:fuTBS/RRd1WCfTpo/fk/Y5e3/rkLTg4YfOM3HeCrC1/2cMXh7g2gP1YNrMGD+LWNIQ+BJDQIYYkfqyPeEb5LpeGDo1cgA5Hen4RVmA+U2rM= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;DB6PR0801MB1735;7:sCKnCeOEFdhFsL2zm+e+GhUaMH2XP+u6/1X6DRhab3nsjt14CW0JvnRtCrunrQ9Ot2KYt0N6dHLIGjlAQbUSufIMbkcjS9YPpXWXC3aFrdq5VBd70x/X5atb9PoxC97fR+0zfKVf5NPZsuquCiY6JafDiZE1ZVW+hdkc7wc+x+cPNpL2WJ0k7Xh4IjXt9vZwYpp1cyDGvljTMnTLNNzbwH88thxB462m7Hfhznv10B8NKfDfKsB8DN7xemqv9g7ygnHtLfycf4E4ZstP2/JlWZWxyVUngeUEuSGHsICV3kk9XMQwhzQmf7+2XJs/tmwj2NrppdmcIx9PIGSSeCV4UQ==;20:h4BRTB+qmnbqPjWj2UwMUtFSPSjh9Xki5fvjkQbrrtohv9Z2UdDYnHq4QKi6uyrjPZ92o7TMpFDB33iNmHNDzLOtPx1J6T0B0k4kF3BxSF5biW2b5ojXsmR28aYogfGZrno2CRXAruV8xrp3jDDdi8tww0M6SkU2mPlO46NdZ4Y= X-OriginatorOrg: virtuozzo.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2017 16:40:55.8681 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1735 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2618 Lines: 66 After my changes to mmap(), its code now relies on the bitness of performing syscall. According to that, it chooses the base of allocation: mmap_base for 64-bit mmap() and mmap_compat_base for 32-bit syscall. It was done by: commit 1b028f784e8c ("x86/mm: Introduce mmap_compat_base() for 32-bit mmap()"). The code afterwards relies on in_compat_syscall() returning true for 32-bit syscalls. It's usually so while we're in context of application that does 32-bit syscalls. But during exec() it is not valid for x32 ELF. The reason is that the application hasn't yet done any syscall, so x32 bit has not being set. That results in -ENOMEM for x32 ELF files as there fired BAD_ADDR() in elf_map(), that is called from do_execve()->load_elf_binary(). For i386 ELFs it works as SET_PERSONALITY() sets TS_COMPAT flag. I suggest to set x32 bit before first return to userspace, during setting personality at exec(). This way we can rely on in_compat_syscall() during exec(). Fixes: commit 1b028f784e8c ("x86/mm: Introduce mmap_compat_base() for 32-bit mmap()") Cc: 0x7f454c46@gmail.com Cc: linux-mm@kvack.org Cc: Andrei Vagin Cc: Cyrill Gorcunov Cc: Borislav Petkov Cc: "Kirill A. Shutemov" Cc: x86@kernel.org Cc: H. Peter Anvin Cc: Andy Lutomirski Cc: Ingo Molnar Cc: Thomas Gleixner Reported-by: Adam Borowski Signed-off-by: Dmitry Safonov --- v2: - specifying mmap() allocation path which failed during exec() - fix comment style arch/x86/kernel/process_64.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/process_64.c b/arch/x86/kernel/process_64.c index d6b784a5520d..d3d4d9abcaf8 100644 --- a/arch/x86/kernel/process_64.c +++ b/arch/x86/kernel/process_64.c @@ -519,8 +519,14 @@ void set_personality_ia32(bool x32) if (current->mm) current->mm->context.ia32_compat = TIF_X32; current->personality &= ~READ_IMPLIES_EXEC; - /* in_compat_syscall() uses the presence of the x32 - syscall bit flag to determine compat status */ + /* + * in_compat_syscall() uses the presence of the x32 + * syscall bit flag to determine compat status. + * On the bitness of syscall relies x86 mmap() code, + * so set x32 syscall bit right here to make + * in_compat_syscall() work during exec(). + */ + task_pt_regs(current)->orig_ax |= __X32_SYSCALL_BIT; current->thread.status &= ~TS_COMPAT; } else { set_thread_flag(TIF_IA32); -- 2.12.0