Received: by 10.223.176.5 with SMTP id f5csp2410360wra; Thu, 8 Feb 2018 13:39:56 -0800 (PST) X-Google-Smtp-Source: AH8x225lNtjIW9B6PzjV29IwiWxBhNzzG+Q2a3f0I4b6FI7asNCF0A8JKb5ez+G6JGJCsru5IUFb X-Received: by 10.98.65.220 with SMTP id g89mr453512pfd.124.1518125996842; Thu, 08 Feb 2018 13:39:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518125996; cv=none; d=google.com; s=arc-20160816; b=qmDQunwVXiemqa6C1VnOy7i+eKAeXEIvFiD9VMq2fOQIyWIvWTl/p4JU9EB0SBzxc9 Z7oH/jmUK3YSicbhDVcspMCck9OBGRTq8o6J9cKqq8lIW8ZTi7rd6Zqp+865Vt+dF2Ba P1PcRWCHPGvmku1q7Dst/Ggegf04Na/eUAJZJZUDQXj0BFkWJA3qUaKccQpzmi0s69CO Z1z6t0NRNBUIvRtApULEp4jr8jq2CLL2opKV7jJMI41j3HYzQGdlbdOEaSwjFKfxRKWj wgZq7w8ZCiORISxF282NUHfjbZ9QYoijH+vAqE+mo9J1er27V3IEK0rt60G9ItTbPP47 Mpww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=BfQOMMOu6KzUdHWxvbsoLT+xKufQsPS7BbY7wjQnAeI=; b=UtXrwxSx8bYOMBvZtqy0iIfmnx062JtbLI6cYYGF3Kk8c6lJr8McbkpMVLQlToGiyG W3ATnk+nN6sDHiO7vwyKspFhYztoV6xu/2i3hZ2nAO3Oh8Lay6dRJMuYoaqGND33JHP8 X7Dt8/Hzqg/Xg0+qNQzEOHH9Gc9/OaoPFnQ999C2X/q6P66XkOqGNMbk4Ehkzdm16XQS NeIjPLK9aQwuOTI3VNA9BGEZPGODReTOHBWXR+BCmeLizkOUqknbHIOED+opvaIx3Qoi 17Gr7vekyfgjHt2O97aKYocjIOuvXIlDTCzr6AZvdbtdIs9f0lDCQKGLOM4KEUSpRe7w /ICg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=UCV8Z94+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d13si444909pgf.26.2018.02.08.13.39.40; Thu, 08 Feb 2018 13:39:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=UCV8Z94+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752387AbeBHVhr (ORCPT + 99 others); Thu, 8 Feb 2018 16:37:47 -0500 Received: from bombadil.infradead.org ([65.50.211.133]:53655 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752054AbeBHVhq (ORCPT ); Thu, 8 Feb 2018 16:37:46 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=In-Reply-To:Content-Type:MIME-Version :References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=BfQOMMOu6KzUdHWxvbsoLT+xKufQsPS7BbY7wjQnAeI=; b=UCV8Z94+HOrb7410uODel81FL lmvVG8vN5b+cNkv09ik1ahLvgRDxf+YktDCFSNTV64ldDqsd9VgCErszdS8xAWyn68FDCOo5Wo3tI Q0fDKnjbNv9kWnRdmR+QRdlGmvFUGAi6w6bAF0IOtHLY+7u2dtw7M0bA1JiyAkYIGez9ZGjtTs8no jfGB61OBXeyg00G0m2EHaClwN+VntmuOSKUpsekstWf2KqCBGKXgWN7IMWI673E/sSBu3DBWoU0qz hozjUAfykOy80F5HvbqWqZu5cSLpliBSHkQjLfOctGgDUPQ7pDwsSFbohUDR1Q/0Pkelu3nQw8CKR 7JajSn5vA==; Received: from willy by bombadil.infradead.org with local (Exim 4.89 #1 (Red Hat Linux)) id 1ejtt1-00078Q-J7; Thu, 08 Feb 2018 21:37:43 +0000 Date: Thu, 8 Feb 2018 13:37:43 -0800 From: Matthew Wilcox To: Daniel Micay Cc: Jann Horn , linux-mm@kvack.org, Kernel Hardening , kernel list , "Kirill A. Shutemov" Subject: [RFC] Limit mappings to ten per page per process Message-ID: <20180208213743.GC3424@bombadil.infradead.org> References: <20180208021112.GB14918@bombadil.infradead.org> <20180208185648.GB9524@bombadil.infradead.org> <20180208194235.GA3424@bombadil.infradead.org> <20180208202100.GB3424@bombadil.infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180208202100.GB3424@bombadil.infradead.org> User-Agent: Mutt/1.9.1 (2017-09-22) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 08, 2018 at 12:21:00PM -0800, Matthew Wilcox wrote: > Now that I think about it, though, perhaps the simplest solution is not > to worry about checking whether _mapcount has saturated, and instead when > adding a new mmap, check whether this task already has it mapped 10 times. > If so, refuse the mapping. That turns out to be quite easy. Comments on this approach? diff --git a/mm/mmap.c b/mm/mmap.c index 9efdc021ad22..fd64ff662117 100644 --- a/mm/mmap.c +++ b/mm/mmap.c @@ -1615,6 +1615,34 @@ static inline int accountable_mapping(struct file *file, vm_flags_t vm_flags) return (vm_flags & (VM_NORESERVE | VM_SHARED | VM_WRITE)) == VM_WRITE; } +/** + * mmap_max_overlaps - Check the process has not exceeded its quota of mappings. + * @mm: The memory map for the process creating the mapping. + * @file: The file the mapping is coming from. + * @pgoff: The start of the mapping in the file. + * @count: The number of pages to map. + * + * Return: %true if this region of the file has too many overlapping mappings + * by this process. + */ +bool mmap_max_overlaps(struct mm_struct *mm, struct file *file, + pgoff_t pgoff, pgoff_t count) +{ + unsigned int overlaps = 0; + struct vm_area_struct *vma; + + if (!file) + return false; + + vma_interval_tree_foreach(vma, &file->f_mapping->i_mmap, + pgoff, pgoff + count) { + if (vma->vm_mm == mm) + overlaps++; + } + + return overlaps > 9; +} + unsigned long mmap_region(struct file *file, unsigned long addr, unsigned long len, vm_flags_t vm_flags, unsigned long pgoff, struct list_head *uf) @@ -1640,6 +1668,9 @@ unsigned long mmap_region(struct file *file, unsigned long addr, return -ENOMEM; } + if (mmap_max_overlaps(mm, file, pgoff, len >> PAGE_SHIFT)) + return -ENOMEM; + /* Clear old maps */ while (find_vma_links(mm, addr, addr + len, &prev, &rb_link, &rb_parent)) { diff --git a/mm/mremap.c b/mm/mremap.c index 049470aa1e3e..27cf5cf9fc0f 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -430,6 +430,10 @@ static struct vm_area_struct *vma_to_resize(unsigned long addr, (new_len - old_len) >> PAGE_SHIFT)) return ERR_PTR(-ENOMEM); + if (mmap_max_overlaps(mm, vma->vm_file, pgoff, + (new_len - old_len) >> PAGE_SHIFT)) + return ERR_PTR(-ENOMEM); + if (vma->vm_flags & VM_ACCOUNT) { unsigned long charged = (new_len - old_len) >> PAGE_SHIFT; if (security_vm_enough_memory_mm(mm, charged))