blob: cbc718ba6d7876411a4fd0f48f5a8d8c722d9298 [file] [log] [blame]
Greg Kroah-Hartmanac41aae2017-11-24 15:00:35 +01001// SPDX-License-Identifier: GPL-2.0+
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 * flexible mmap layout support
4 *
5 * Copyright 2003-2004 Red Hat Inc., Durham, North Carolina.
6 * All Rights Reserved.
7 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07008 * Started by Ingo Molnar <mingo@elte.hu>
9 */
10
Heiko Carstensca218722016-05-07 12:15:34 +020011#include <linux/elf-randomize.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070012#include <linux/personality.h>
13#include <linux/mm.h>
Martin Schwidefsky638ad342011-10-30 15:17:13 +010014#include <linux/mman.h>
Ingo Molnar3f07c012017-02-08 18:51:30 +010015#include <linux/sched/signal.h>
Ingo Molnar01042602017-02-08 18:51:31 +010016#include <linux/sched/mm.h>
Heiko Carstensdf1ca532011-01-12 09:55:27 +010017#include <linux/random.h>
Heiko Carstens048cd4e2012-02-27 10:01:52 +010018#include <linux/compat.h>
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +010019#include <linux/security.h>
Martin Schwidefsky6252d702008-02-09 18:24:37 +010020#include <asm/pgalloc.h>
Paul Gortmakerff24b072017-02-09 15:20:24 -050021#include <asm/elf.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070022
Heiko Carstens9046e402011-01-12 09:55:22 +010023static unsigned long stack_maxrandom_size(void)
24{
25 if (!(current->flags & PF_RANDOMIZE))
26 return 0;
Heiko Carstens9046e402011-01-12 09:55:22 +010027 return STACK_RND_MASK << PAGE_SHIFT;
28}
29
Kees Cook8f2af152018-04-10 16:34:53 -070030static inline int mmap_is_legacy(struct rlimit *rlim_stack)
Heiko Carstens1060f622011-01-12 09:55:26 +010031{
32 if (current->personality & ADDR_COMPAT_LAYOUT)
33 return 1;
Kees Cook8f2af152018-04-10 16:34:53 -070034 if (rlim_stack->rlim_cur == RLIM_INFINITY)
Heiko Carstens1060f622011-01-12 09:55:26 +010035 return 1;
36 return sysctl_legacy_va_layout;
37}
38
Kees Cook2b68f6c2015-04-14 15:48:00 -070039unsigned long arch_mmap_rnd(void)
Heiko Carstensdf1ca532011-01-12 09:55:27 +010040{
Martin Schwidefskyc7e8b2c2015-11-10 12:30:28 +010041 return (get_random_int() & MMAP_RND_MASK) << PAGE_SHIFT;
Heiko Carstensdf1ca532011-01-12 09:55:27 +010042}
43
Kees Cook8e89a352015-04-14 15:47:57 -070044static unsigned long mmap_base_legacy(unsigned long rnd)
Heiko Carstens7aba8422013-11-12 15:07:55 -080045{
Kees Cook8e89a352015-04-14 15:47:57 -070046 return TASK_UNMAPPED_BASE + rnd;
Heiko Carstens7aba8422013-11-12 15:07:55 -080047}
48
Kees Cook8f2af152018-04-10 16:34:53 -070049static inline unsigned long mmap_base(unsigned long rnd,
50 struct rlimit *rlim_stack)
Linus Torvalds1da177e2005-04-16 15:20:36 -070051{
Kees Cook8f2af152018-04-10 16:34:53 -070052 unsigned long gap = rlim_stack->rlim_cur;
Martin Schwidefskya0308c12019-01-29 10:48:09 +010053 unsigned long pad = stack_maxrandom_size() + stack_guard_gap;
54 unsigned long gap_min, gap_max;
Linus Torvalds1da177e2005-04-16 15:20:36 -070055
Martin Schwidefskya0308c12019-01-29 10:48:09 +010056 /* Values close to RLIM_INFINITY can overflow. */
57 if (gap + pad > gap)
58 gap += pad;
59
60 /*
61 * Top of mmap area (just below the process stack).
62 * Leave at least a ~32 MB hole.
63 */
64 gap_min = 32 * 1024 * 1024UL;
65 gap_max = (STACK_TOP / 6) * 5;
66
67 if (gap < gap_min)
68 gap = gap_min;
69 else if (gap > gap_max)
70 gap = gap_max;
71
72 return PAGE_ALIGN(STACK_TOP - gap - rnd);
Linus Torvalds1da177e2005-04-16 15:20:36 -070073}
74
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +010075unsigned long
76arch_get_unmapped_area(struct file *filp, unsigned long addr,
77 unsigned long len, unsigned long pgoff, unsigned long flags)
78{
79 struct mm_struct *mm = current->mm;
80 struct vm_area_struct *vma;
81 struct vm_unmapped_area_info info;
Martin Schwidefsky9b11c792017-04-24 18:14:48 +020082 int rc;
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +010083
Martin Schwidefsky9b11c792017-04-24 18:14:48 +020084 if (len > TASK_SIZE - mmap_min_addr)
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +010085 return -ENOMEM;
86
87 if (flags & MAP_FIXED)
Martin Schwidefsky9b11c792017-04-24 18:14:48 +020088 goto check_asce_limit;
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +010089
90 if (addr) {
91 addr = PAGE_ALIGN(addr);
92 vma = find_vma(mm, addr);
Martin Schwidefsky9b11c792017-04-24 18:14:48 +020093 if (TASK_SIZE - len >= addr && addr >= mmap_min_addr &&
Hugh Dickins1be71072017-06-19 04:03:24 -070094 (!vma || addr + len <= vm_start_gap(vma)))
Martin Schwidefsky9b11c792017-04-24 18:14:48 +020095 goto check_asce_limit;
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +010096 }
97
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +010098 info.flags = 0;
99 info.length = len;
100 info.low_limit = mm->mmap_base;
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200101 info.high_limit = TASK_SIZE;
Martin Schwidefskyc7e8b2c2015-11-10 12:30:28 +0100102 if (filp || (flags & MAP_SHARED))
103 info.align_mask = MMAP_ALIGN_MASK << PAGE_SHIFT;
104 else
105 info.align_mask = 0;
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +0100106 info.align_offset = pgoff << PAGE_SHIFT;
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200107 addr = vm_unmapped_area(&info);
108 if (addr & ~PAGE_MASK)
109 return addr;
110
111check_asce_limit:
Martin Schwidefsky8ab867c2017-08-31 13:18:22 +0200112 if (addr + len > current->mm->context.asce_limit &&
113 addr + len <= TASK_SIZE) {
Martin Schwidefsky1aea9b32017-04-24 18:19:10 +0200114 rc = crst_table_upgrade(mm, addr + len);
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200115 if (rc)
116 return (unsigned long) rc;
117 }
118
119 return addr;
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +0100120}
121
122unsigned long
123arch_get_unmapped_area_topdown(struct file *filp, const unsigned long addr0,
124 const unsigned long len, const unsigned long pgoff,
125 const unsigned long flags)
126{
127 struct vm_area_struct *vma;
128 struct mm_struct *mm = current->mm;
129 unsigned long addr = addr0;
130 struct vm_unmapped_area_info info;
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200131 int rc;
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +0100132
133 /* requested length too big for entire address space */
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200134 if (len > TASK_SIZE - mmap_min_addr)
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +0100135 return -ENOMEM;
136
137 if (flags & MAP_FIXED)
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200138 goto check_asce_limit;
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +0100139
140 /* requesting a specific address */
141 if (addr) {
142 addr = PAGE_ALIGN(addr);
143 vma = find_vma(mm, addr);
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200144 if (TASK_SIZE - len >= addr && addr >= mmap_min_addr &&
Hugh Dickins1be71072017-06-19 04:03:24 -0700145 (!vma || addr + len <= vm_start_gap(vma)))
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200146 goto check_asce_limit;
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +0100147 }
148
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +0100149 info.flags = VM_UNMAPPED_AREA_TOPDOWN;
150 info.length = len;
151 info.low_limit = max(PAGE_SIZE, mmap_min_addr);
152 info.high_limit = mm->mmap_base;
Martin Schwidefskyc7e8b2c2015-11-10 12:30:28 +0100153 if (filp || (flags & MAP_SHARED))
154 info.align_mask = MMAP_ALIGN_MASK << PAGE_SHIFT;
155 else
156 info.align_mask = 0;
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +0100157 info.align_offset = pgoff << PAGE_SHIFT;
158 addr = vm_unmapped_area(&info);
159
160 /*
161 * A failed mmap() very likely causes application failure,
162 * so fall back to the bottom-up function here. This scenario
163 * can happen with large stack limits and large mmap()
164 * allocations.
165 */
166 if (addr & ~PAGE_MASK) {
167 VM_BUG_ON(addr != -ENOMEM);
168 info.flags = 0;
169 info.low_limit = TASK_UNMAPPED_BASE;
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200170 info.high_limit = TASK_SIZE;
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +0100171 addr = vm_unmapped_area(&info);
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200172 if (addr & ~PAGE_MASK)
173 return addr;
174 }
175
176check_asce_limit:
Martin Schwidefsky8ab867c2017-08-31 13:18:22 +0200177 if (addr + len > current->mm->context.asce_limit &&
178 addr + len <= TASK_SIZE) {
Martin Schwidefsky1aea9b32017-04-24 18:19:10 +0200179 rc = crst_table_upgrade(mm, addr + len);
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200180 if (rc)
181 return (unsigned long) rc;
Martin Schwidefsky1f6b83e2015-01-14 17:51:17 +0100182 }
183
184 return addr;
185}
186
Martin Schwidefsky6252d702008-02-09 18:24:37 +0100187/*
188 * This function, called very early during the creation of a new
189 * process VM image, sets up which VM layout function to use:
190 */
Kees Cook8f2af152018-04-10 16:34:53 -0700191void arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack)
Martin Schwidefsky6252d702008-02-09 18:24:37 +0100192{
Kees Cook8e89a352015-04-14 15:47:57 -0700193 unsigned long random_factor = 0UL;
194
195 if (current->flags & PF_RANDOMIZE)
Kees Cook2b68f6c2015-04-14 15:48:00 -0700196 random_factor = arch_mmap_rnd();
Kees Cook8e89a352015-04-14 15:47:57 -0700197
Martin Schwidefsky6252d702008-02-09 18:24:37 +0100198 /*
199 * Fall back to the standard layout if the personality
200 * bit is set, or if the expected stack growth is unlimited:
201 */
Kees Cook8f2af152018-04-10 16:34:53 -0700202 if (mmap_is_legacy(rlim_stack)) {
Kees Cook8e89a352015-04-14 15:47:57 -0700203 mm->mmap_base = mmap_base_legacy(random_factor);
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200204 mm->get_unmapped_area = arch_get_unmapped_area;
Martin Schwidefsky6252d702008-02-09 18:24:37 +0100205 } else {
Kees Cook8f2af152018-04-10 16:34:53 -0700206 mm->mmap_base = mmap_base(random_factor, rlim_stack);
Martin Schwidefsky9b11c792017-04-24 18:14:48 +0200207 mm->get_unmapped_area = arch_get_unmapped_area_topdown;
Martin Schwidefsky6252d702008-02-09 18:24:37 +0100208 }
209}