Linux Audio

Check our new training course

Loading...
v6.2
  1// SPDX-License-Identifier: GPL-2.0+
  2/*
  3 *  flexible mmap layout support
  4 *
  5 * Copyright 2003-2004 Red Hat Inc., Durham, North Carolina.
  6 * All Rights Reserved.
  7 *
  8 * Started by Ingo Molnar <mingo@elte.hu>
  9 */
 10
 11#include <linux/elf-randomize.h>
 12#include <linux/personality.h>
 13#include <linux/mm.h>
 14#include <linux/mman.h>
 15#include <linux/sched/signal.h>
 16#include <linux/sched/mm.h>
 17#include <linux/random.h>
 18#include <linux/compat.h>
 19#include <linux/security.h>
 
 20#include <asm/elf.h>
 21
 22static unsigned long stack_maxrandom_size(void)
 23{
 24	if (!(current->flags & PF_RANDOMIZE))
 25		return 0;
 
 
 26	return STACK_RND_MASK << PAGE_SHIFT;
 27}
 28
 
 
 
 
 
 
 
 
 29static inline int mmap_is_legacy(struct rlimit *rlim_stack)
 30{
 31	if (current->personality & ADDR_COMPAT_LAYOUT)
 32		return 1;
 33	if (rlim_stack->rlim_cur == RLIM_INFINITY)
 34		return 1;
 35	return sysctl_legacy_va_layout;
 36}
 37
 38unsigned long arch_mmap_rnd(void)
 39{
 40	return (get_random_u32() & MMAP_RND_MASK) << PAGE_SHIFT;
 41}
 42
 43static unsigned long mmap_base_legacy(unsigned long rnd)
 44{
 45	return TASK_UNMAPPED_BASE + rnd;
 46}
 47
 48static inline unsigned long mmap_base(unsigned long rnd,
 49				      struct rlimit *rlim_stack)
 50{
 51	unsigned long gap = rlim_stack->rlim_cur;
 52	unsigned long pad = stack_maxrandom_size() + stack_guard_gap;
 53	unsigned long gap_min, gap_max;
 54
 55	/* Values close to RLIM_INFINITY can overflow. */
 56	if (gap + pad > gap)
 57		gap += pad;
 58
 59	/*
 60	 * Top of mmap area (just below the process stack).
 61	 * Leave at least a ~128 MB hole.
 62	 */
 63	gap_min = SZ_128M;
 64	gap_max = (STACK_TOP / 6) * 5;
 65
 66	if (gap < gap_min)
 67		gap = gap_min;
 68	else if (gap > gap_max)
 69		gap = gap_max;
 70
 71	return PAGE_ALIGN(STACK_TOP - gap - rnd);
 
 
 
 
 
 72}
 73
 74unsigned long arch_get_unmapped_area(struct file *filp, unsigned long addr,
 75				     unsigned long len, unsigned long pgoff,
 76				     unsigned long flags)
 77{
 78	struct mm_struct *mm = current->mm;
 79	struct vm_area_struct *vma;
 80	struct vm_unmapped_area_info info;
 
 81
 82	if (len > TASK_SIZE - mmap_min_addr)
 83		return -ENOMEM;
 84
 85	if (flags & MAP_FIXED)
 86		goto check_asce_limit;
 87
 88	if (addr) {
 89		addr = PAGE_ALIGN(addr);
 90		vma = find_vma(mm, addr);
 91		if (TASK_SIZE - len >= addr && addr >= mmap_min_addr &&
 92		    (!vma || addr + len <= vm_start_gap(vma)))
 93			goto check_asce_limit;
 94	}
 95
 96	info.flags = 0;
 97	info.length = len;
 98	info.low_limit = mm->mmap_base;
 99	info.high_limit = TASK_SIZE;
100	if (filp || (flags & MAP_SHARED))
101		info.align_mask = MMAP_ALIGN_MASK << PAGE_SHIFT;
102	else
103		info.align_mask = 0;
104	info.align_offset = pgoff << PAGE_SHIFT;
105	addr = vm_unmapped_area(&info);
106	if (offset_in_page(addr))
107		return addr;
108
109check_asce_limit:
110	return check_asce_limit(mm, addr, len);
 
 
 
 
 
 
 
111}
112
113unsigned long arch_get_unmapped_area_topdown(struct file *filp, unsigned long addr,
114					     unsigned long len, unsigned long pgoff,
115					     unsigned long flags)
 
116{
117	struct vm_area_struct *vma;
118	struct mm_struct *mm = current->mm;
 
119	struct vm_unmapped_area_info info;
 
120
121	/* requested length too big for entire address space */
122	if (len > TASK_SIZE - mmap_min_addr)
123		return -ENOMEM;
124
125	if (flags & MAP_FIXED)
126		goto check_asce_limit;
127
128	/* requesting a specific address */
129	if (addr) {
130		addr = PAGE_ALIGN(addr);
131		vma = find_vma(mm, addr);
132		if (TASK_SIZE - len >= addr && addr >= mmap_min_addr &&
133				(!vma || addr + len <= vm_start_gap(vma)))
134			goto check_asce_limit;
135	}
136
137	info.flags = VM_UNMAPPED_AREA_TOPDOWN;
138	info.length = len;
139	info.low_limit = max(PAGE_SIZE, mmap_min_addr);
140	info.high_limit = mm->mmap_base;
141	if (filp || (flags & MAP_SHARED))
142		info.align_mask = MMAP_ALIGN_MASK << PAGE_SHIFT;
143	else
144		info.align_mask = 0;
145	info.align_offset = pgoff << PAGE_SHIFT;
146	addr = vm_unmapped_area(&info);
147
148	/*
149	 * A failed mmap() very likely causes application failure,
150	 * so fall back to the bottom-up function here. This scenario
151	 * can happen with large stack limits and large mmap()
152	 * allocations.
153	 */
154	if (offset_in_page(addr)) {
155		VM_BUG_ON(addr != -ENOMEM);
156		info.flags = 0;
157		info.low_limit = TASK_UNMAPPED_BASE;
158		info.high_limit = TASK_SIZE;
159		addr = vm_unmapped_area(&info);
160		if (offset_in_page(addr))
161			return addr;
162	}
163
164check_asce_limit:
165	return check_asce_limit(mm, addr, len);
 
 
 
 
 
 
 
166}
167
168/*
169 * This function, called very early during the creation of a new
170 * process VM image, sets up which VM layout function to use:
171 */
172void arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack)
173{
174	unsigned long random_factor = 0UL;
175
176	if (current->flags & PF_RANDOMIZE)
177		random_factor = arch_mmap_rnd();
178
179	/*
180	 * Fall back to the standard layout if the personality
181	 * bit is set, or if the expected stack growth is unlimited:
182	 */
183	if (mmap_is_legacy(rlim_stack)) {
184		mm->mmap_base = mmap_base_legacy(random_factor);
185		mm->get_unmapped_area = arch_get_unmapped_area;
186	} else {
187		mm->mmap_base = mmap_base(random_factor, rlim_stack);
188		mm->get_unmapped_area = arch_get_unmapped_area_topdown;
189	}
190}
191
192static const pgprot_t protection_map[16] = {
193	[VM_NONE]					= PAGE_NONE,
194	[VM_READ]					= PAGE_RO,
195	[VM_WRITE]					= PAGE_RO,
196	[VM_WRITE | VM_READ]				= PAGE_RO,
197	[VM_EXEC]					= PAGE_RX,
198	[VM_EXEC | VM_READ]				= PAGE_RX,
199	[VM_EXEC | VM_WRITE]				= PAGE_RX,
200	[VM_EXEC | VM_WRITE | VM_READ]			= PAGE_RX,
201	[VM_SHARED]					= PAGE_NONE,
202	[VM_SHARED | VM_READ]				= PAGE_RO,
203	[VM_SHARED | VM_WRITE]				= PAGE_RW,
204	[VM_SHARED | VM_WRITE | VM_READ]		= PAGE_RW,
205	[VM_SHARED | VM_EXEC]				= PAGE_RX,
206	[VM_SHARED | VM_EXEC | VM_READ]			= PAGE_RX,
207	[VM_SHARED | VM_EXEC | VM_WRITE]		= PAGE_RWX,
208	[VM_SHARED | VM_EXEC | VM_WRITE | VM_READ]	= PAGE_RWX
209};
210DECLARE_VM_GET_PAGE_PROT
v4.17
  1// SPDX-License-Identifier: GPL-2.0+
  2/*
  3 *  flexible mmap layout support
  4 *
  5 * Copyright 2003-2004 Red Hat Inc., Durham, North Carolina.
  6 * All Rights Reserved.
  7 *
  8 * Started by Ingo Molnar <mingo@elte.hu>
  9 */
 10
 11#include <linux/elf-randomize.h>
 12#include <linux/personality.h>
 13#include <linux/mm.h>
 14#include <linux/mman.h>
 15#include <linux/sched/signal.h>
 16#include <linux/sched/mm.h>
 17#include <linux/random.h>
 18#include <linux/compat.h>
 19#include <linux/security.h>
 20#include <asm/pgalloc.h>
 21#include <asm/elf.h>
 22
 23static unsigned long stack_maxrandom_size(void)
 24{
 25	if (!(current->flags & PF_RANDOMIZE))
 26		return 0;
 27	if (current->personality & ADDR_NO_RANDOMIZE)
 28		return 0;
 29	return STACK_RND_MASK << PAGE_SHIFT;
 30}
 31
 32/*
 33 * Top of mmap area (just below the process stack).
 34 *
 35 * Leave at least a ~32 MB hole.
 36 */
 37#define MIN_GAP (32*1024*1024)
 38#define MAX_GAP (STACK_TOP/6*5)
 39
 40static inline int mmap_is_legacy(struct rlimit *rlim_stack)
 41{
 42	if (current->personality & ADDR_COMPAT_LAYOUT)
 43		return 1;
 44	if (rlim_stack->rlim_cur == RLIM_INFINITY)
 45		return 1;
 46	return sysctl_legacy_va_layout;
 47}
 48
 49unsigned long arch_mmap_rnd(void)
 50{
 51	return (get_random_int() & MMAP_RND_MASK) << PAGE_SHIFT;
 52}
 53
 54static unsigned long mmap_base_legacy(unsigned long rnd)
 55{
 56	return TASK_UNMAPPED_BASE + rnd;
 57}
 58
 59static inline unsigned long mmap_base(unsigned long rnd,
 60				      struct rlimit *rlim_stack)
 61{
 62	unsigned long gap = rlim_stack->rlim_cur;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 63
 64	if (gap < MIN_GAP)
 65		gap = MIN_GAP;
 66	else if (gap > MAX_GAP)
 67		gap = MAX_GAP;
 68	gap &= PAGE_MASK;
 69	return STACK_TOP - stack_maxrandom_size() - rnd - gap;
 70}
 71
 72unsigned long
 73arch_get_unmapped_area(struct file *filp, unsigned long addr,
 74		unsigned long len, unsigned long pgoff, unsigned long flags)
 75{
 76	struct mm_struct *mm = current->mm;
 77	struct vm_area_struct *vma;
 78	struct vm_unmapped_area_info info;
 79	int rc;
 80
 81	if (len > TASK_SIZE - mmap_min_addr)
 82		return -ENOMEM;
 83
 84	if (flags & MAP_FIXED)
 85		goto check_asce_limit;
 86
 87	if (addr) {
 88		addr = PAGE_ALIGN(addr);
 89		vma = find_vma(mm, addr);
 90		if (TASK_SIZE - len >= addr && addr >= mmap_min_addr &&
 91		    (!vma || addr + len <= vm_start_gap(vma)))
 92			goto check_asce_limit;
 93	}
 94
 95	info.flags = 0;
 96	info.length = len;
 97	info.low_limit = mm->mmap_base;
 98	info.high_limit = TASK_SIZE;
 99	if (filp || (flags & MAP_SHARED))
100		info.align_mask = MMAP_ALIGN_MASK << PAGE_SHIFT;
101	else
102		info.align_mask = 0;
103	info.align_offset = pgoff << PAGE_SHIFT;
104	addr = vm_unmapped_area(&info);
105	if (addr & ~PAGE_MASK)
106		return addr;
107
108check_asce_limit:
109	if (addr + len > current->mm->context.asce_limit &&
110	    addr + len <= TASK_SIZE) {
111		rc = crst_table_upgrade(mm, addr + len);
112		if (rc)
113			return (unsigned long) rc;
114	}
115
116	return addr;
117}
118
119unsigned long
120arch_get_unmapped_area_topdown(struct file *filp, const unsigned long addr0,
121			  const unsigned long len, const unsigned long pgoff,
122			  const unsigned long flags)
123{
124	struct vm_area_struct *vma;
125	struct mm_struct *mm = current->mm;
126	unsigned long addr = addr0;
127	struct vm_unmapped_area_info info;
128	int rc;
129
130	/* requested length too big for entire address space */
131	if (len > TASK_SIZE - mmap_min_addr)
132		return -ENOMEM;
133
134	if (flags & MAP_FIXED)
135		goto check_asce_limit;
136
137	/* requesting a specific address */
138	if (addr) {
139		addr = PAGE_ALIGN(addr);
140		vma = find_vma(mm, addr);
141		if (TASK_SIZE - len >= addr && addr >= mmap_min_addr &&
142				(!vma || addr + len <= vm_start_gap(vma)))
143			goto check_asce_limit;
144	}
145
146	info.flags = VM_UNMAPPED_AREA_TOPDOWN;
147	info.length = len;
148	info.low_limit = max(PAGE_SIZE, mmap_min_addr);
149	info.high_limit = mm->mmap_base;
150	if (filp || (flags & MAP_SHARED))
151		info.align_mask = MMAP_ALIGN_MASK << PAGE_SHIFT;
152	else
153		info.align_mask = 0;
154	info.align_offset = pgoff << PAGE_SHIFT;
155	addr = vm_unmapped_area(&info);
156
157	/*
158	 * A failed mmap() very likely causes application failure,
159	 * so fall back to the bottom-up function here. This scenario
160	 * can happen with large stack limits and large mmap()
161	 * allocations.
162	 */
163	if (addr & ~PAGE_MASK) {
164		VM_BUG_ON(addr != -ENOMEM);
165		info.flags = 0;
166		info.low_limit = TASK_UNMAPPED_BASE;
167		info.high_limit = TASK_SIZE;
168		addr = vm_unmapped_area(&info);
169		if (addr & ~PAGE_MASK)
170			return addr;
171	}
172
173check_asce_limit:
174	if (addr + len > current->mm->context.asce_limit &&
175	    addr + len <= TASK_SIZE) {
176		rc = crst_table_upgrade(mm, addr + len);
177		if (rc)
178			return (unsigned long) rc;
179	}
180
181	return addr;
182}
183
184/*
185 * This function, called very early during the creation of a new
186 * process VM image, sets up which VM layout function to use:
187 */
188void arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack)
189{
190	unsigned long random_factor = 0UL;
191
192	if (current->flags & PF_RANDOMIZE)
193		random_factor = arch_mmap_rnd();
194
195	/*
196	 * Fall back to the standard layout if the personality
197	 * bit is set, or if the expected stack growth is unlimited:
198	 */
199	if (mmap_is_legacy(rlim_stack)) {
200		mm->mmap_base = mmap_base_legacy(random_factor);
201		mm->get_unmapped_area = arch_get_unmapped_area;
202	} else {
203		mm->mmap_base = mmap_base(random_factor, rlim_stack);
204		mm->get_unmapped_area = arch_get_unmapped_area_topdown;
205	}
206}