diff mbox series

arm64: mm: assign PXN permission in trans_pgd

Message ID 20211111060316.12438-1-kernelfans@gmail.com (mailing list archive)
State New, archived
Headers show
Series arm64: mm: assign PXN permission in trans_pgd | expand

Commit Message

Pingfan Liu Nov. 11, 2021, 6:03 a.m. UTC
trans_pgd_create_copy() can hit "VM_BUG_ON(mm != &init_mm)" in the
function pmd_populate_kernel().

p?d_populate() helpers resort to the input parameter mm_struct to decide
the attribute: UXN or PXN. And plus the fact, either hibernation or
kexec runs in privilege mode. So the bug can be fixed by assigning
&init_mm to the callsites of these helpers.

Signed-off-by: Pingfan Liu <kernelfans@gmail.com>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Will Deacon <will@kernel.org>
Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
Cc: James Morse <james.morse@arm.com>
Cc: Matthias Brugger <mbrugger@suse.com>
To: linux-arm-kernel@lists.infradead.org
---
 arch/arm64/mm/trans_pgd.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

Comments

Catalin Marinas Nov. 11, 2021, 4:09 p.m. UTC | #1
On Thu, Nov 11, 2021 at 02:03:16PM +0800, Pingfan Liu wrote:
> trans_pgd_create_copy() can hit "VM_BUG_ON(mm != &init_mm)" in the
> function pmd_populate_kernel().

I think that's more important to fix than the PXN. You may want to
change the subject to something like "Fix VM_BUG_ON ..."

> p?d_populate() helpers resort to the input parameter mm_struct to decide
> the attribute: UXN or PXN. And plus the fact, either hibernation or
> kexec runs in privilege mode. So the bug can be fixed by assigning
> &init_mm to the callsites of these helpers.

That's the table PXN, so it's not a big deal if we miss it.

> Signed-off-by: Pingfan Liu <kernelfans@gmail.com>
> Cc: Catalin Marinas <catalin.marinas@arm.com>
> Cc: Will Deacon <will@kernel.org>
> Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
> Cc: James Morse <james.morse@arm.com>
> Cc: Matthias Brugger <mbrugger@suse.com>
> To: linux-arm-kernel@lists.infradead.org

A Fixes: tag would be nice, we just need to decide which.

> ---
>  arch/arm64/mm/trans_pgd.c | 6 +++---
>  1 file changed, 3 insertions(+), 3 deletions(-)
> 
> diff --git a/arch/arm64/mm/trans_pgd.c b/arch/arm64/mm/trans_pgd.c
> index d7da8ca40d2e..7b43d179e94d 100644
> --- a/arch/arm64/mm/trans_pgd.c
> +++ b/arch/arm64/mm/trans_pgd.c
> @@ -67,7 +67,7 @@ static int copy_pte(struct trans_pgd_info *info, pmd_t *dst_pmdp,
>  	dst_ptep = trans_alloc(info);
>  	if (!dst_ptep)
>  		return -ENOMEM;
> -	pmd_populate_kernel(NULL, dst_pmdp, dst_ptep);
> +	pmd_populate_kernel(&init_mm, dst_pmdp, dst_ptep);
>  	dst_ptep = pte_offset_kernel(dst_pmdp, start);

Commit 5de59884ac0e ("arm64: trans_pgd: pass NULL instead of init_mm to
*_populate functions") actually replaced &init_mm with NULL. Commit
59511cfd08f3 ("arm64: mm: use XN table mapping attributes for
user/kernel mappings") introduced the VM_BUG_ON.

So we either revert Pasha's trans_pgd commit (as per your patch) or we
fix Ard's commit to make it aware of a NULL mm and either skip the table
UXN altogether or treat it as init_mm.
Ard Biesheuvel Nov. 11, 2021, 4:13 p.m. UTC | #2
On Thu, 11 Nov 2021 at 17:09, Catalin Marinas <catalin.marinas@arm.com> wrote:
>
> On Thu, Nov 11, 2021 at 02:03:16PM +0800, Pingfan Liu wrote:
> > trans_pgd_create_copy() can hit "VM_BUG_ON(mm != &init_mm)" in the
> > function pmd_populate_kernel().
>
> I think that's more important to fix than the PXN. You may want to
> change the subject to something like "Fix VM_BUG_ON ..."
>
> > p?d_populate() helpers resort to the input parameter mm_struct to decide
> > the attribute: UXN or PXN. And plus the fact, either hibernation or
> > kexec runs in privilege mode. So the bug can be fixed by assigning
> > &init_mm to the callsites of these helpers.
>
> That's the table PXN, so it's not a big deal if we miss it.
>
> > Signed-off-by: Pingfan Liu <kernelfans@gmail.com>
> > Cc: Catalin Marinas <catalin.marinas@arm.com>
> > Cc: Will Deacon <will@kernel.org>
> > Cc: Pasha Tatashin <pasha.tatashin@soleen.com>
> > Cc: James Morse <james.morse@arm.com>
> > Cc: Matthias Brugger <mbrugger@suse.com>
> > To: linux-arm-kernel@lists.infradead.org
>
> A Fixes: tag would be nice, we just need to decide which.
>
> > ---
> >  arch/arm64/mm/trans_pgd.c | 6 +++---
> >  1 file changed, 3 insertions(+), 3 deletions(-)
> >
> > diff --git a/arch/arm64/mm/trans_pgd.c b/arch/arm64/mm/trans_pgd.c
> > index d7da8ca40d2e..7b43d179e94d 100644
> > --- a/arch/arm64/mm/trans_pgd.c
> > +++ b/arch/arm64/mm/trans_pgd.c
> > @@ -67,7 +67,7 @@ static int copy_pte(struct trans_pgd_info *info, pmd_t *dst_pmdp,
> >       dst_ptep = trans_alloc(info);
> >       if (!dst_ptep)
> >               return -ENOMEM;
> > -     pmd_populate_kernel(NULL, dst_pmdp, dst_ptep);
> > +     pmd_populate_kernel(&init_mm, dst_pmdp, dst_ptep);
> >       dst_ptep = pte_offset_kernel(dst_pmdp, start);
>
> Commit 5de59884ac0e ("arm64: trans_pgd: pass NULL instead of init_mm to
> *_populate functions") actually replaced &init_mm with NULL. Commit
> 59511cfd08f3 ("arm64: mm: use XN table mapping attributes for
> user/kernel mappings") introduced the VM_BUG_ON.
>
> So we either revert Pasha's trans_pgd commit (as per your patch) or we
> fix Ard's commit to make it aware of a NULL mm and either skip the table
> UXN altogether or treat it as init_mm.
>

That code in pmd_populate_kernel() does not actually *use* the mm
argument at all, it just BUGs if its value != init_mm. So we can just
relax the BUG() to disregard mm ==  NULL.
Catalin Marinas Nov. 11, 2021, 6:18 p.m. UTC | #3
On Thu, Nov 11, 2021 at 05:13:02PM +0100, Ard Biesheuvel wrote:
> On Thu, 11 Nov 2021 at 17:09, Catalin Marinas <catalin.marinas@arm.com> wrote:
> > On Thu, Nov 11, 2021 at 02:03:16PM +0800, Pingfan Liu wrote:
> > > diff --git a/arch/arm64/mm/trans_pgd.c b/arch/arm64/mm/trans_pgd.c
> > > index d7da8ca40d2e..7b43d179e94d 100644
> > > --- a/arch/arm64/mm/trans_pgd.c
> > > +++ b/arch/arm64/mm/trans_pgd.c
> > > @@ -67,7 +67,7 @@ static int copy_pte(struct trans_pgd_info *info, pmd_t *dst_pmdp,
> > >       dst_ptep = trans_alloc(info);
> > >       if (!dst_ptep)
> > >               return -ENOMEM;
> > > -     pmd_populate_kernel(NULL, dst_pmdp, dst_ptep);
> > > +     pmd_populate_kernel(&init_mm, dst_pmdp, dst_ptep);
> > >       dst_ptep = pte_offset_kernel(dst_pmdp, start);
> >
> > Commit 5de59884ac0e ("arm64: trans_pgd: pass NULL instead of init_mm to
> > *_populate functions") actually replaced &init_mm with NULL. Commit
> > 59511cfd08f3 ("arm64: mm: use XN table mapping attributes for
> > user/kernel mappings") introduced the VM_BUG_ON.
> >
> > So we either revert Pasha's trans_pgd commit (as per your patch) or we
> > fix Ard's commit to make it aware of a NULL mm and either skip the table
> > UXN altogether or treat it as init_mm.
> >
> 
> That code in pmd_populate_kernel() does not actually *use* the mm
> argument at all, it just BUGs if its value != init_mm. So we can just
> relax the BUG() to disregard mm ==  NULL.

We also have pud_populate() that ends up setting PUD_TABLE_PXN when mm
is NULL. Fortunately we don't execute anything from those mappings, they
are just a copy of the linear map.

BTW, in line with PAGE_KERNEL, pud_populate() could set both UXN and PXN
for init_mm mappings.
Catalin Marinas Nov. 11, 2021, 6:24 p.m. UTC | #4
On Thu, Nov 11, 2021 at 06:18:17PM +0000, Catalin Marinas wrote:
> BTW, in line with PAGE_KERNEL, pud_populate() could set both UXN and PXN
> for init_mm mappings.

Ignore this, I got confused. The UXN/PXN choice is correct as it is.
Pingfan Liu Nov. 12, 2021, 5:18 a.m. UTC | #5
On Thu, Nov 11, 2021 at 06:18:17PM +0000, Catalin Marinas wrote:
> On Thu, Nov 11, 2021 at 05:13:02PM +0100, Ard Biesheuvel wrote:
> > On Thu, 11 Nov 2021 at 17:09, Catalin Marinas <catalin.marinas@arm.com> wrote:
> > > On Thu, Nov 11, 2021 at 02:03:16PM +0800, Pingfan Liu wrote:
> > > > diff --git a/arch/arm64/mm/trans_pgd.c b/arch/arm64/mm/trans_pgd.c
> > > > index d7da8ca40d2e..7b43d179e94d 100644
> > > > --- a/arch/arm64/mm/trans_pgd.c
> > > > +++ b/arch/arm64/mm/trans_pgd.c
> > > > @@ -67,7 +67,7 @@ static int copy_pte(struct trans_pgd_info *info, pmd_t *dst_pmdp,
> > > >       dst_ptep = trans_alloc(info);
> > > >       if (!dst_ptep)
> > > >               return -ENOMEM;
> > > > -     pmd_populate_kernel(NULL, dst_pmdp, dst_ptep);
> > > > +     pmd_populate_kernel(&init_mm, dst_pmdp, dst_ptep);
> > > >       dst_ptep = pte_offset_kernel(dst_pmdp, start);
> > >
> > > Commit 5de59884ac0e ("arm64: trans_pgd: pass NULL instead of init_mm to
> > > *_populate functions") actually replaced &init_mm with NULL. Commit
> > > 59511cfd08f3 ("arm64: mm: use XN table mapping attributes for
> > > user/kernel mappings") introduced the VM_BUG_ON.

I will include this history in V2.
> > >
> > > So we either revert Pasha's trans_pgd commit (as per your patch) or we
> > > fix Ard's commit to make it aware of a NULL mm and either skip the table
> > > UXN altogether or treat it as init_mm.
> > >
> > 
> > That code in pmd_populate_kernel() does not actually *use* the mm
> > argument at all, it just BUGs if its value != init_mm. So we can just
> > relax the BUG() to disregard mm ==  NULL.

This seems to be more reasonable solution than my V1.
> 
> We also have pud_populate() that ends up setting PUD_TABLE_PXN when mm
> is NULL. Fortunately we don't execute anything from those mappings, they
> are just a copy of the linear map.
> 
Also included to V2.

Thank both of you for kindly review.

Regards,

	Pingfan
> BTW, in line with PAGE_KERNEL, pud_populate() could set both UXN and PXN
> for init_mm mappings.
> 
> -- 
> Catalin
> 
> _______________________________________________
> linux-arm-kernel mailing list
> linux-arm-kernel@lists.infradead.org
> http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
diff mbox series

Patch

diff --git a/arch/arm64/mm/trans_pgd.c b/arch/arm64/mm/trans_pgd.c
index d7da8ca40d2e..7b43d179e94d 100644
--- a/arch/arm64/mm/trans_pgd.c
+++ b/arch/arm64/mm/trans_pgd.c
@@ -67,7 +67,7 @@  static int copy_pte(struct trans_pgd_info *info, pmd_t *dst_pmdp,
 	dst_ptep = trans_alloc(info);
 	if (!dst_ptep)
 		return -ENOMEM;
-	pmd_populate_kernel(NULL, dst_pmdp, dst_ptep);
+	pmd_populate_kernel(&init_mm, dst_pmdp, dst_ptep);
 	dst_ptep = pte_offset_kernel(dst_pmdp, start);
 
 	src_ptep = pte_offset_kernel(src_pmdp, start);
@@ -90,7 +90,7 @@  static int copy_pmd(struct trans_pgd_info *info, pud_t *dst_pudp,
 		dst_pmdp = trans_alloc(info);
 		if (!dst_pmdp)
 			return -ENOMEM;
-		pud_populate(NULL, dst_pudp, dst_pmdp);
+		pud_populate(&init_mm, dst_pudp, dst_pmdp);
 	}
 	dst_pmdp = pmd_offset(dst_pudp, start);
 
@@ -126,7 +126,7 @@  static int copy_pud(struct trans_pgd_info *info, p4d_t *dst_p4dp,
 		dst_pudp = trans_alloc(info);
 		if (!dst_pudp)
 			return -ENOMEM;
-		p4d_populate(NULL, dst_p4dp, dst_pudp);
+		p4d_populate(&init_mm, dst_p4dp, dst_pudp);
 	}
 	dst_pudp = pud_offset(dst_p4dp, start);