Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp112132yba; Mon, 20 May 2019 05:56:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqz9damzUvXxwyJVoZwYjJbjZ4BIUsZe50FYJAAAMqUW7cTI5lNrahIw73W2m3bbFB7gIIT2 X-Received: by 2002:a17:902:ac82:: with SMTP id h2mr16582268plr.303.1558356987142; Mon, 20 May 2019 05:56:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558356987; cv=none; d=google.com; s=arc-20160816; b=E0tUWmmQ7j2VPs/aEIyLhkuuoBWOPWBhWepu0egEkv/4Ths6+XDuKjG77zd+2KH0Ud M169SjABOVj6GaLgkrvgsnx78UODvWIcKwP0/9fo7MY8tuP0pkw81rgb51R/egnef70l 32j1s4AKBjG0WBt/z7HOV0qULMapKfD4Pje95WeWIytw+GvGLiUuTv3zkieEIpFpvQ8P IH3atCEZIjUj0u+rOp/t8zG3v3RGp3x8+lfyAxOU5BC+qDWPLeEqLqmlG8xtMJUKXCZ2 zG0PHiJXjL6QfEMf7JawNF5dXCDXMq9wk3s9rlT37YJ84OHUHja4D3vylEEBgq41OdO3 oS7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=lBivVq9dW7RTs7IAS2M+UhfISPZf406x+EDJ6/LtMSY=; b=MCjW+VOwEF6Aj7ClaLoiHR1Fd86aOgbjotdO0ZtVn9hgVTlrGoKrw/BWaJfTDzc+a6 /d4cQSuohhPs7lYxZQNeADAo4eTV+GrMblxHbINh8NpDJ3HUiX3w14CeaKGgDUE2+7bc EGTtR5SOk1zHoJwnvykmLtD4s8H0CGY2eZWXcXIK4TYkmB63jlzVnb9+EDaoLOffuFmQ lmPRRyvBGFxQtweks+STEeorh7LdDzWS7XSpp79T7MGBW02AXuThj+RHuWkActKFdnJC wk9tysIVT+DAgdqv0hqVRebdWV2EBudis2xw9+3Onf736nqbYuwfWF7o3DrJ6KS1K+ji MtfQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=I7mw9fNd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l190si18391300pga.255.2019.05.20.05.56.12; Mon, 20 May 2019 05:56:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=I7mw9fNd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387607AbfETMRi (ORCPT + 99 others); Mon, 20 May 2019 08:17:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:58624 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387577AbfETMRg (ORCPT ); Mon, 20 May 2019 08:17:36 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4F12D20815; Mon, 20 May 2019 12:17:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558354655; bh=Cfel5yTjnUCEhkPuqCBK4F11a57QG6MSXbyUCOUUVt4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=I7mw9fNdiIZ8w9uV24ggIL69Rxhhd/Rzey71apcgQpB6DE9OLAUmV0nQxnSesp/rK oV7Af13BZTxM277ML2+vbftqJqRC+FYK7gAj5rsr2QfhTdYAWoo94WCgdIzKvfOzR3 yaR3EunmRjLkmT2HjuauF9eiUNPh39LBOUzlM634= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jiri Kosina , Vlastimil Babka , Josh Snyder , Michal Hocko , Andy Lutomirski , Dave Chinner , Kevin Easton , Matthew Wilcox , Cyril Hrubis , Tejun Heo , "Kirill A. Shutemov" , Daniel Gruss , Andrew Morton , Linus Torvalds , Dominique Martinet Subject: [PATCH 4.9 22/44] mm/mincore.c: make mincore() more conservative Date: Mon, 20 May 2019 14:14:11 +0200 Message-Id: <20190520115233.417554251@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190520115230.720347034@linuxfoundation.org> References: <20190520115230.720347034@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jiri Kosina commit 134fca9063ad4851de767d1768180e5dede9a881 upstream. The semantics of what mincore() considers to be resident is not completely clear, but Linux has always (since 2.3.52, which is when mincore() was initially done) treated it as "page is available in page cache". That's potentially a problem, as that [in]directly exposes meta-information about pagecache / memory mapping state even about memory not strictly belonging to the process executing the syscall, opening possibilities for sidechannel attacks. Change the semantics of mincore() so that it only reveals pagecache information for non-anonymous mappings that belog to files that the calling process could (if it tried to) successfully open for writing; otherwise we'd be including shared non-exclusive mappings, which - is the sidechannel - is not the usecase for mincore(), as that's primarily used for data, not (shared) text [jkosina@suse.cz: v2] Link: http://lkml.kernel.org/r/20190312141708.6652-2-vbabka@suse.cz [mhocko@suse.com: restructure can_do_mincore() conditions] Link: http://lkml.kernel.org/r/nycvar.YFH.7.76.1903062342020.19912@cbobk.fhfr.pm Signed-off-by: Jiri Kosina Signed-off-by: Vlastimil Babka Acked-by: Josh Snyder Acked-by: Michal Hocko Originally-by: Linus Torvalds Originally-by: Dominique Martinet Cc: Andy Lutomirski Cc: Dave Chinner Cc: Kevin Easton Cc: Matthew Wilcox Cc: Cyril Hrubis Cc: Tejun Heo Cc: Kirill A. Shutemov Cc: Daniel Gruss Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- mm/mincore.c | 23 ++++++++++++++++++++++- 1 file changed, 22 insertions(+), 1 deletion(-) --- a/mm/mincore.c +++ b/mm/mincore.c @@ -167,6 +167,22 @@ out: return 0; } +static inline bool can_do_mincore(struct vm_area_struct *vma) +{ + if (vma_is_anonymous(vma)) + return true; + if (!vma->vm_file) + return false; + /* + * Reveal pagecache information only for non-anonymous mappings that + * correspond to the files the calling process could (if tried) open + * for writing; otherwise we'd be including shared non-exclusive + * mappings, which opens a side channel. + */ + return inode_owner_or_capable(file_inode(vma->vm_file)) || + inode_permission(file_inode(vma->vm_file), MAY_WRITE) == 0; +} + /* * Do a chunk of "sys_mincore()". We've already checked * all the arguments, we hold the mmap semaphore: we should @@ -187,8 +203,13 @@ static long do_mincore(unsigned long add vma = find_vma(current->mm, addr); if (!vma || addr < vma->vm_start) return -ENOMEM; - mincore_walk.mm = vma->vm_mm; end = min(vma->vm_end, addr + (pages << PAGE_SHIFT)); + if (!can_do_mincore(vma)) { + unsigned long pages = DIV_ROUND_UP(end - addr, PAGE_SIZE); + memset(vec, 1, pages); + return pages; + } + mincore_walk.mm = vma->vm_mm; err = walk_page_range(addr, end, &mincore_walk); if (err < 0) return err;