Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp297831ybp; Thu, 10 Oct 2019 18:25:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqwiGk65vzqOp3+2FvCuTwoFMLgW6UObMDPXh6BtabGIbbdjmFVgb3xBnlXzCeYsjTLq5MVE X-Received: by 2002:a17:906:1655:: with SMTP id n21mr11294309ejd.110.1570757129157; Thu, 10 Oct 2019 18:25:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570757129; cv=none; d=google.com; s=arc-20160816; b=aSRqU13A4dZzUhU5BHji4wey9lhyweogQoTTA6G0hW2DAG26Pg8THz/9zODVG+PCOE V5Y5vwBQQh6qoNW7UUxXwqY94MnP5ZEuBCiTd3FWH4G9OOLNgZBSS1xE1U+ZqZgn9YKB 5UpihMkmaKhqNrreuTZwpRhutmZ6zUFKQk6qN+jr+xJjBbysA2cKx0fuhjgglp7NtWar FOmg1AL8hSZPS2ejkWRkKGLMiKKgTsYlTgun9XRqB0ukfD7o4GQdvrxvJF315COHS1jq MgKf6eQ5JzdJjTDmG46YU0gCniyg8G/G89VCXhLXn6cBDv8Osd4dhrIVksiNaaOqWnfn FXEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=HsA49FAjairc2qJZ7Rycye1Rp6D5SMcZ1vPARhzkRr0=; b=xPEYZTq66LaI5/I+qQM+4ot3ick2aE8bdAPgK9+5RMU7XMCZpZoYpdmqa79zUmXMmS ifrJNx757J5q7K8atGGwVtSTaAD0L4s1iy7qjUg1IfCQ9RY9V+KA6lcC+6v4bUmJyPBq sQQ2y29UR3B+lropN5fqF6kfZ2xeo6U4P3cp/k3j6zNf7+QTvbyE+mgGwUyghlGJa4g1 PfVTeZBl75PWwDLlX1LLWD22d0nCrFNy3PlkcVG68WmWD0tszR6mgcHvJcwjF+piQqf1 Wunm6hHDpOl7GL+39KNgn8vNddYNQQ/cjCUQw4Mno3NR7GrRDSa+DO03SEIrK0/ydCg7 H69w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@arista.com header.s=googlenew header.b=bZoJjrvB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=REJECT dis=NONE) header.from=arista.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d35si4733073ede.440.2019.10.10.18.25.05; Thu, 10 Oct 2019 18:25:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@arista.com header.s=googlenew header.b=bZoJjrvB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=REJECT dis=NONE) header.from=arista.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728266AbfJKBY0 (ORCPT + 99 others); Thu, 10 Oct 2019 21:24:26 -0400 Received: from mail-wm1-f66.google.com ([209.85.128.66]:39405 "EHLO mail-wm1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728218AbfJKBYX (ORCPT ); Thu, 10 Oct 2019 21:24:23 -0400 Received: by mail-wm1-f66.google.com with SMTP id v17so8514376wml.4 for ; Thu, 10 Oct 2019 18:24:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arista.com; s=googlenew; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=HsA49FAjairc2qJZ7Rycye1Rp6D5SMcZ1vPARhzkRr0=; b=bZoJjrvB3n/42m49tC4IKb+nQWjCHnj14ZsTo6lQL55BwhnwcleE8WANJQIceDBNdF qJjlbc/V5JRDCAHT0y28UUUBi11lenYFjL0zQfwVxqLE4Lr5uZ6AjW7ZhnBXwY4GVYHN Sj8DOU4qUvfQo5hZe/IwH5f4n5EubpGDaK2cMHg5HkKSDiGBbAYLNHArQxvlFruLwdgw Q+fV4mNpaF0XFPPGsPvnlm7PLj60dxTxYHmvv5Uvfa0X1f6cgYi+7XqpqnvfFw/WUwVm S+DWbVTyxgzxuEKj+nLnSVWUNrar8TWF357bgCOybyIOJ+b3f8AZLK3L7e1RfO6/HsHC Ws7w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=HsA49FAjairc2qJZ7Rycye1Rp6D5SMcZ1vPARhzkRr0=; b=KpQ9IfIWEYhIqu6cYgNRMstVZMC6YPCJ8z+yhr0GdWNWlwAW1fb6JOeQ5hU6Wit3rn ivst5KCHQJDWzvQwDmsbYz0DyUK4wR+Nz5fnzejzkoYTtZ+uAEVL+eTVNelR03tewvK+ T1lon8s/+exAhMhUiFzGwhonHOWkWIwCjmCGUIUE8aXuT1jo4K6IYPBjTQPVVmlIZ0hm DLnjnJ2YOvjF9PrwwYqU95V9L18VW1izjhrvb4YqXVPOFmojMF/Wgf889h/rTO0RBl2H 3sxwyY3A43Ymc0sUSGLhlrJQDAMnzLkHjRGwFtVJRFqfBIjNjpUyEwtJpoSw9pwiAzeJ kILA== X-Gm-Message-State: APjAAAWMBhIkaV9kRnVPkzWAlMzIUcHXv7wwa07XH8/FcWm+XXkDvHBQ 8x1f+no+YewiflxjBf6WuLHxahtxe8U= X-Received: by 2002:a1c:dcd6:: with SMTP id t205mr999451wmg.10.1570757060434; Thu, 10 Oct 2019 18:24:20 -0700 (PDT) Received: from localhost.localdomain ([2a02:8084:ea2:c100:228:f8ff:fe6f:83a8]) by smtp.gmail.com with ESMTPSA id l13sm7699795wmj.25.2019.10.10.18.24.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 10 Oct 2019 18:24:19 -0700 (PDT) From: Dmitry Safonov To: linux-kernel@vger.kernel.org Cc: Dmitry Safonov <0x7f454c46@gmail.com>, Dmitry Safonov , Adrian Reber , Andrei Vagin , Andy Lutomirski , Arnd Bergmann , Christian Brauner , Cyrill Gorcunov , "Eric W. Biederman" , "H. Peter Anvin" , Ingo Molnar , Jann Horn , Jeff Dike , Oleg Nesterov , Pavel Emelyanov , Shuah Khan , Thomas Gleixner , Vincenzo Frascino , containers@lists.linux-foundation.org, criu@openvz.org, linux-api@vger.kernel.org, x86@kernel.org, Andrei Vagin Subject: [PATCHv7 23/33] x86/vdso: Handle faults on timens page Date: Fri, 11 Oct 2019 02:23:31 +0100 Message-Id: <20191011012341.846266-24-dima@arista.com> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191011012341.846266-1-dima@arista.com> References: <20191011012341.846266-1-dima@arista.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If a task belongs to a time namespace then the VVAR page which contains the system wide VDSO data is replaced with a namespace specific page which has the same layout as the VVAR page. Co-developed-by: Andrei Vagin Signed-off-by: Andrei Vagin Signed-off-by: Dmitry Safonov --- arch/x86/entry/vdso/vma.c | 53 +++++++++++++++++++++++++++++++++++++-- mm/mmap.c | 2 ++ 2 files changed, 53 insertions(+), 2 deletions(-) diff --git a/arch/x86/entry/vdso/vma.c b/arch/x86/entry/vdso/vma.c index 5dab706aca2e..f6e13ab29d94 100644 --- a/arch/x86/entry/vdso/vma.c +++ b/arch/x86/entry/vdso/vma.c @@ -14,11 +14,13 @@ #include #include #include +#include #include #include #include #include #include +#include #include #include #include @@ -107,10 +109,36 @@ static int vvar_mremap(const struct vm_special_mapping *sm, return 0; } +#ifdef CONFIG_TIME_NS +static struct page *find_timens_vvar_page(struct vm_area_struct *vma) +{ + if (likely(vma->vm_mm == current->mm)) + return current->nsproxy->time_ns->vvar_page; + + /* + * VM_PFNMAP | VM_IO protect .fault() handler from being called + * through interfaces like /proc/$pid/mem or + * process_vm_{readv,writev}() as long as there's no .access() + * in special_mapping_vmops(). + * For more details check_vma_flags() and __access_remote_vm() + */ + + WARN(1, "vvar_page accessed remotely"); + + return NULL; +} +#else +static inline struct page *find_timens_vvar_page(struct vm_area_struct *vma) +{ + return NULL; +} +#endif + static vm_fault_t vvar_fault(const struct vm_special_mapping *sm, struct vm_area_struct *vma, struct vm_fault *vmf) { const struct vdso_image *image = vma->vm_mm->context.vdso_image; + unsigned long pfn; long sym_offset; if (!image) @@ -130,8 +158,21 @@ static vm_fault_t vvar_fault(const struct vm_special_mapping *sm, return VM_FAULT_SIGBUS; if (sym_offset == image->sym_vvar_page) { - return vmf_insert_pfn(vma, vmf->address, - __pa_symbol(&__vvar_page) >> PAGE_SHIFT); + struct page *timens_page = find_timens_vvar_page(vma); + + pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT; + + /* + * If a task belongs to a time namespace then a namespace + * specific VVAR is mapped with the sym_vvar_page offset and + * the real VVAR page is mapped with the sym_timens_page + * offset. + * See also the comment near timens_setup_vdso_data(). + */ + if (timens_page) + pfn = page_to_pfn(timens_page); + + return vmf_insert_pfn(vma, vmf->address, pfn); } else if (sym_offset == image->sym_pvclock_page) { struct pvclock_vsyscall_time_info *pvti = pvclock_get_pvti_cpu0_va(); @@ -146,6 +187,14 @@ static vm_fault_t vvar_fault(const struct vm_special_mapping *sm, if (tsc_pg && vclock_was_used(VCLOCK_HVCLOCK)) return vmf_insert_pfn(vma, vmf->address, virt_to_phys(tsc_pg) >> PAGE_SHIFT); + } else if (sym_offset == image->sym_timens_page) { + struct page *timens_page = find_timens_vvar_page(vma); + + if (!timens_page) + return VM_FAULT_SIGBUS; + + pfn = __pa_symbol(&__vvar_page) >> PAGE_SHIFT; + return vmf_insert_pfn(vma, vmf->address, pfn); } return VM_FAULT_SIGBUS; diff --git a/mm/mmap.c b/mm/mmap.c index a7d8c84d19b7..af722a47db3c 100644 --- a/mm/mmap.c +++ b/mm/mmap.c @@ -3363,6 +3363,8 @@ static const struct vm_operations_struct special_mapping_vmops = { .fault = special_mapping_fault, .mremap = special_mapping_mremap, .name = special_mapping_name, + /* vDSO code relies that VVAR can't be accessed remotely */ + .access = NULL, }; static const struct vm_operations_struct legacy_special_mapping_vmops = { -- 2.23.0