Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp92224imm; Thu, 7 Jun 2018 14:26:13 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLzqaVLolQE1riOtPHT2jOJ427B0U+56ydktNHeFf5MQRg6jvyHdecFsDZ1oP9zQ68qGT/N X-Received: by 2002:a17:902:d807:: with SMTP id a7-v6mr3626880plz.92.1528406773471; Thu, 07 Jun 2018 14:26:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528406773; cv=none; d=google.com; s=arc-20160816; b=gg/L1qe7zxpi7zYdWhVIfJYNxR9Uz2VSyauuAWo/Hr88KosjlteUX5gwRwOgw5Yw4I 9t8plZztdtVd9VOxHohg9mDkLr01qSo77U+32c9MCMHXWOgVoR1XoG5avpDnm2e5SI6R O50D2wOhN7kYi5c91aMpCbExLktD9+epGflceF9wtR4KGAU9Hbv6ugOeZQFOaHkuljQO PaigRHC6Cai4GFUcoP/2u3h6tYyPXUHmUBa8/TZhSNEXlPVTWuzP3Ch6KKkERh/iiJ68 JG9xUZfJVaM0uf9kD+JCRfWyBUhS7sgjFMNlUa3BD9Eq8zKs5lX07qETAldIUy1A5KR+ ZZ0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :arc-authentication-results; bh=QKxiWsvvCBl0WY7RwkD8yhxK8SzhapjOMAQzwluyuo4=; b=PrcR6fYX/F/OPRamcGwAS7/CP2RaGhrNXrYIaPUg6kZ/cOK8yhQgNagXxP2xEkpSYH OLAowd9m5G9CEStZyBdOQYcuruNpPh3ZJc0C0oIHorL2/tGqsh4WXBlbpD0wlyYrTfyl L2JIvWvVHXjRRihfDjThZtYUg2gfcvR9dDrxNCu5xgS3Y65HiJnq0Y1/11AsvPOjaLcX 1DyOnh7/YfXSlZbsoxoMsLR68nqkJk53Iz5cU7UWe1r+hSJQ1xBVugV+e3jUS9pUCPj8 tpkuCkgdju0gARxvhG0Vm7xoe6aTyo25LZ6TQKzvGV9lc6k+vbAJg36GN2diR6apcPOf eNrA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 64-v6si21143813ply.476.2018.06.07.14.25.28; Thu, 07 Jun 2018 14:26:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752626AbeFGVVW (ORCPT + 99 others); Thu, 7 Jun 2018 17:21:22 -0400 Received: from mga11.intel.com ([192.55.52.93]:28726 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751365AbeFGVVU (ORCPT ); Thu, 7 Jun 2018 17:21:20 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Jun 2018 14:21:20 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,488,1520924400"; d="scan'208";a="48167652" Received: from 2b52.sc.intel.com (HELO [143.183.136.51]) ([143.183.136.51]) by orsmga006.jf.intel.com with ESMTP; 07 Jun 2018 14:21:19 -0700 Message-ID: <1528406288.5794.1.camel@2b52.sc.intel.com> Subject: Re: [PATCH 09/10] mm: Prevent madvise from changing shadow stack From: Yu-cheng Yu To: Nadav Amit Cc: Linux Kernel Mailing List , linux-doc@vger.kernel.org, "open list:MEMORY MANAGEMENT" , linux-arch@vger.kernel.org, the arch/x86 maintainers , "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , "H.J. Lu" , Vedvyas Shanbhogue , "Ravi V. Shankar" , Dave Hansen , Andy Lutomirski , Jonathan Corbet , Oleg Nesterov , Arnd Bergmann , Mike Kravetz Date: Thu, 07 Jun 2018 14:18:08 -0700 In-Reply-To: References: <20180607143807.3611-1-yu-cheng.yu@intel.com> <20180607143807.3611-10-yu-cheng.yu@intel.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.10.4-0ubuntu2 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2018-06-07 at 14:09 -0700, Nadav Amit wrote: > Yu-cheng Yu wrote: > > > Signed-off-by: Yu-cheng Yu > > --- > > mm/madvise.c | 9 +++++++++ > > 1 file changed, 9 insertions(+) > > > > diff --git a/mm/madvise.c b/mm/madvise.c > > index 4d3c922ea1a1..2a6988badd6b 100644 > > --- a/mm/madvise.c > > +++ b/mm/madvise.c > > @@ -839,6 +839,14 @@ SYSCALL_DEFINE3(madvise, unsigned long, start, size_t, len_in, int, behavior) > > if (vma && start > vma->vm_start) > > prev = vma; > > > > + /* > > + * Don't do anything on shadow stack. > > + */ > > + if (vma->vm_flags & VM_SHSTK) { > > + error = -EINVAL; > > + goto out_no_plug; > > + } > > + > > blk_start_plug(&plug); > > for (;;) { > > /* Still start < end. */ > > What happens if the madvise() revolves multiple VMAs, the first one is not > VM_SHSTK, but the another one is? Shouldn’t the test be done inside the > loop, potentially in madvise_vma() ? > I will fix it. Thanks!