123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210 |
- // SPDX-License-Identifier: GPL-2.0+
- /*
- * flexible mmap layout support
- *
- * Copyright 2003-2004 Red Hat Inc., Durham, North Carolina.
- * All Rights Reserved.
- *
- * Started by Ingo Molnar <[email protected]>
- */
- #include <linux/elf-randomize.h>
- #include <linux/personality.h>
- #include <linux/mm.h>
- #include <linux/mman.h>
- #include <linux/sched/signal.h>
- #include <linux/sched/mm.h>
- #include <linux/random.h>
- #include <linux/compat.h>
- #include <linux/security.h>
- #include <asm/elf.h>
- static unsigned long stack_maxrandom_size(void)
- {
- if (!(current->flags & PF_RANDOMIZE))
- return 0;
- return STACK_RND_MASK << PAGE_SHIFT;
- }
- static inline int mmap_is_legacy(struct rlimit *rlim_stack)
- {
- if (current->personality & ADDR_COMPAT_LAYOUT)
- return 1;
- if (rlim_stack->rlim_cur == RLIM_INFINITY)
- return 1;
- return sysctl_legacy_va_layout;
- }
- unsigned long arch_mmap_rnd(void)
- {
- return (get_random_u32() & MMAP_RND_MASK) << PAGE_SHIFT;
- }
- static unsigned long mmap_base_legacy(unsigned long rnd)
- {
- return TASK_UNMAPPED_BASE + rnd;
- }
- static inline unsigned long mmap_base(unsigned long rnd,
- struct rlimit *rlim_stack)
- {
- unsigned long gap = rlim_stack->rlim_cur;
- unsigned long pad = stack_maxrandom_size() + stack_guard_gap;
- unsigned long gap_min, gap_max;
- /* Values close to RLIM_INFINITY can overflow. */
- if (gap + pad > gap)
- gap += pad;
- /*
- * Top of mmap area (just below the process stack).
- * Leave at least a ~128 MB hole.
- */
- gap_min = SZ_128M;
- gap_max = (STACK_TOP / 6) * 5;
- if (gap < gap_min)
- gap = gap_min;
- else if (gap > gap_max)
- gap = gap_max;
- return PAGE_ALIGN(STACK_TOP - gap - rnd);
- }
- unsigned long arch_get_unmapped_area(struct file *filp, unsigned long addr,
- unsigned long len, unsigned long pgoff,
- unsigned long flags)
- {
- struct mm_struct *mm = current->mm;
- struct vm_area_struct *vma;
- struct vm_unmapped_area_info info;
- if (len > TASK_SIZE - mmap_min_addr)
- return -ENOMEM;
- if (flags & MAP_FIXED)
- goto check_asce_limit;
- if (addr) {
- addr = PAGE_ALIGN(addr);
- vma = find_vma(mm, addr);
- if (TASK_SIZE - len >= addr && addr >= mmap_min_addr &&
- (!vma || addr + len <= vm_start_gap(vma)))
- goto check_asce_limit;
- }
- info.flags = 0;
- info.length = len;
- info.low_limit = mm->mmap_base;
- info.high_limit = TASK_SIZE;
- if (filp || (flags & MAP_SHARED))
- info.align_mask = MMAP_ALIGN_MASK << PAGE_SHIFT;
- else
- info.align_mask = 0;
- info.align_offset = pgoff << PAGE_SHIFT;
- addr = vm_unmapped_area(&info);
- if (offset_in_page(addr))
- return addr;
- check_asce_limit:
- return check_asce_limit(mm, addr, len);
- }
- unsigned long arch_get_unmapped_area_topdown(struct file *filp, unsigned long addr,
- unsigned long len, unsigned long pgoff,
- unsigned long flags)
- {
- struct vm_area_struct *vma;
- struct mm_struct *mm = current->mm;
- struct vm_unmapped_area_info info;
- /* requested length too big for entire address space */
- if (len > TASK_SIZE - mmap_min_addr)
- return -ENOMEM;
- if (flags & MAP_FIXED)
- goto check_asce_limit;
- /* requesting a specific address */
- if (addr) {
- addr = PAGE_ALIGN(addr);
- vma = find_vma(mm, addr);
- if (TASK_SIZE - len >= addr && addr >= mmap_min_addr &&
- (!vma || addr + len <= vm_start_gap(vma)))
- goto check_asce_limit;
- }
- info.flags = VM_UNMAPPED_AREA_TOPDOWN;
- info.length = len;
- info.low_limit = max(PAGE_SIZE, mmap_min_addr);
- info.high_limit = mm->mmap_base;
- if (filp || (flags & MAP_SHARED))
- info.align_mask = MMAP_ALIGN_MASK << PAGE_SHIFT;
- else
- info.align_mask = 0;
- info.align_offset = pgoff << PAGE_SHIFT;
- addr = vm_unmapped_area(&info);
- /*
- * A failed mmap() very likely causes application failure,
- * so fall back to the bottom-up function here. This scenario
- * can happen with large stack limits and large mmap()
- * allocations.
- */
- if (offset_in_page(addr)) {
- VM_BUG_ON(addr != -ENOMEM);
- info.flags = 0;
- info.low_limit = TASK_UNMAPPED_BASE;
- info.high_limit = TASK_SIZE;
- addr = vm_unmapped_area(&info);
- if (offset_in_page(addr))
- return addr;
- }
- check_asce_limit:
- return check_asce_limit(mm, addr, len);
- }
- /*
- * This function, called very early during the creation of a new
- * process VM image, sets up which VM layout function to use:
- */
- void arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack)
- {
- unsigned long random_factor = 0UL;
- if (current->flags & PF_RANDOMIZE)
- random_factor = arch_mmap_rnd();
- /*
- * Fall back to the standard layout if the personality
- * bit is set, or if the expected stack growth is unlimited:
- */
- if (mmap_is_legacy(rlim_stack)) {
- mm->mmap_base = mmap_base_legacy(random_factor);
- mm->get_unmapped_area = arch_get_unmapped_area;
- } else {
- mm->mmap_base = mmap_base(random_factor, rlim_stack);
- mm->get_unmapped_area = arch_get_unmapped_area_topdown;
- }
- }
- static const pgprot_t protection_map[16] = {
- [VM_NONE] = PAGE_NONE,
- [VM_READ] = PAGE_RO,
- [VM_WRITE] = PAGE_RO,
- [VM_WRITE | VM_READ] = PAGE_RO,
- [VM_EXEC] = PAGE_RX,
- [VM_EXEC | VM_READ] = PAGE_RX,
- [VM_EXEC | VM_WRITE] = PAGE_RX,
- [VM_EXEC | VM_WRITE | VM_READ] = PAGE_RX,
- [VM_SHARED] = PAGE_NONE,
- [VM_SHARED | VM_READ] = PAGE_RO,
- [VM_SHARED | VM_WRITE] = PAGE_RW,
- [VM_SHARED | VM_WRITE | VM_READ] = PAGE_RW,
- [VM_SHARED | VM_EXEC] = PAGE_RX,
- [VM_SHARED | VM_EXEC | VM_READ] = PAGE_RX,
- [VM_SHARED | VM_EXEC | VM_WRITE] = PAGE_RWX,
- [VM_SHARED | VM_EXEC | VM_WRITE | VM_READ] = PAGE_RWX
- };
- DECLARE_VM_GET_PAGE_PROT
|