aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDavid Howells <dhowells@redhat.com>2009-09-24 10:13:10 -0400
committerLinus Torvalds <torvalds@linux-foundation.org>2009-09-24 20:18:38 -0400
commit645d83c5db970a1c57225e155113b4aa2451e920 (patch)
treec86d3fb382e0ebabd8b96bb7883a8258c1cfe9d7
parentc775197d59995228909957e9f0ec128de2590682 (diff)
NOMMU: Fix MAP_PRIVATE mmap() of objects where the data can be mapped directly
Fix MAP_PRIVATE mmap() of files and devices where the data in the backing store might be mapped directly. Use the BDI_CAP_MAP_DIRECT capability flag to govern whether or not we should be trying to map a file directly. This can be used to determine whether or not a region has been filled in at the point where we call do_mmap_shared() or do_mmap_private(). The BDI_CAP_MAP_DIRECT capability flag is cleared by validate_mmap_request() if there's any reason we can't use it. It's also cleared in do_mmap_pgoff() if f_op->get_unmapped_area() fails. Without this fix, attempting to run a program from a RomFS image on a non-mappable MTD partition results in a BUG as the kernel attempts XIP, and this can be caught in gdb: Program received signal SIGABRT, Aborted. 0xc005dce8 in add_nommu_region (region=<value optimized out>) at mm/nommu.c:547 (gdb) bt #0 0xc005dce8 in add_nommu_region (region=<value optimized out>) at mm/nommu.c:547 #1 0xc005f168 in do_mmap_pgoff (file=0xc31a6620, addr=<value optimized out>, len=3808, prot=3, flags=6146, pgoff=0) at mm/nommu.c:1373 #2 0xc00a96b8 in elf_fdpic_map_file (params=0xc33fbbec, file=0xc31a6620, mm=0xc31bef60, what=0xc0213144 "executable") at mm.h:1145 #3 0xc00aa8b4 in load_elf_fdpic_binary (bprm=0xc316cb00, regs=<value optimized out>) at fs/binfmt_elf_fdpic.c:343 #4 0xc006b588 in search_binary_handler (bprm=0x6, regs=0xc33fbce0) at fs/exec.c:1234 #5 0xc006c648 in do_execve (filename=<value optimized out>, argv=0xc3ad14cc, envp=0xc3ad1460, regs=0xc33fbce0) at fs/exec.c:1356 #6 0xc0008cf0 in sys_execve (name=<value optimized out>, argv=0xc3ad14cc, envp=0xc3ad1460) at arch/frv/kernel/process.c:263 #7 0xc00075dc in __syscall_call () at arch/frv/kernel/entry.S:897 Note that this fix does the following commit differently: commit a190887b58c32d19c2eee007c5eb8faa970a69ba Author: David Howells <dhowells@redhat.com> Date: Sat Sep 5 11:17:07 2009 -0700 nommu: fix error handling in do_mmap_pgoff() Reported-by: Graff Yang <graff.yang@gmail.com> Signed-off-by: David Howells <dhowells@redhat.com> Acked-by: Pekka Enberg <penberg@cs.helsinki.fi> Cc: Paul Mundt <lethal@linux-sh.org> Cc: Mel Gorman <mel@csn.ul.ie> Cc: Greg Ungerer <gerg@snapgear.com> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-rw-r--r--mm/nommu.c34
1 files changed, 12 insertions, 22 deletions
diff --git a/mm/nommu.c b/mm/nommu.c
index 56a446f05971..6a002abcb58f 100644
--- a/mm/nommu.c
+++ b/mm/nommu.c
@@ -1034,7 +1034,7 @@ static int do_mmap_shared_file(struct vm_area_struct *vma)
1034 ret = vma->vm_file->f_op->mmap(vma->vm_file, vma); 1034 ret = vma->vm_file->f_op->mmap(vma->vm_file, vma);
1035 if (ret == 0) { 1035 if (ret == 0) {
1036 vma->vm_region->vm_top = vma->vm_region->vm_end; 1036 vma->vm_region->vm_top = vma->vm_region->vm_end;
1037 return ret; 1037 return 0;
1038 } 1038 }
1039 if (ret != -ENOSYS) 1039 if (ret != -ENOSYS)
1040 return ret; 1040 return ret;
@@ -1051,7 +1051,8 @@ static int do_mmap_shared_file(struct vm_area_struct *vma)
1051 */ 1051 */
1052static int do_mmap_private(struct vm_area_struct *vma, 1052static int do_mmap_private(struct vm_area_struct *vma,
1053 struct vm_region *region, 1053 struct vm_region *region,
1054 unsigned long len) 1054 unsigned long len,
1055 unsigned long capabilities)
1055{ 1056{
1056 struct page *pages; 1057 struct page *pages;
1057 unsigned long total, point, n, rlen; 1058 unsigned long total, point, n, rlen;
@@ -1062,13 +1063,13 @@ static int do_mmap_private(struct vm_area_struct *vma,
1062 * shared mappings on devices or memory 1063 * shared mappings on devices or memory
1063 * - VM_MAYSHARE will be set if it may attempt to share 1064 * - VM_MAYSHARE will be set if it may attempt to share
1064 */ 1065 */
1065 if (vma->vm_file) { 1066 if (capabilities & BDI_CAP_MAP_DIRECT) {
1066 ret = vma->vm_file->f_op->mmap(vma->vm_file, vma); 1067 ret = vma->vm_file->f_op->mmap(vma->vm_file, vma);
1067 if (ret == 0) { 1068 if (ret == 0) {
1068 /* shouldn't return success if we're not sharing */ 1069 /* shouldn't return success if we're not sharing */
1069 BUG_ON(!(vma->vm_flags & VM_MAYSHARE)); 1070 BUG_ON(!(vma->vm_flags & VM_MAYSHARE));
1070 vma->vm_region->vm_top = vma->vm_region->vm_end; 1071 vma->vm_region->vm_top = vma->vm_region->vm_end;
1071 return ret; 1072 return 0;
1072 } 1073 }
1073 if (ret != -ENOSYS) 1074 if (ret != -ENOSYS)
1074 return ret; 1075 return ret;
@@ -1306,7 +1307,7 @@ unsigned long do_mmap_pgoff(struct file *file,
1306 * - this is the hook for quasi-memory character devices to 1307 * - this is the hook for quasi-memory character devices to
1307 * tell us the location of a shared mapping 1308 * tell us the location of a shared mapping
1308 */ 1309 */
1309 if (file && file->f_op->get_unmapped_area) { 1310 if (capabilities & BDI_CAP_MAP_DIRECT) {
1310 addr = file->f_op->get_unmapped_area(file, addr, len, 1311 addr = file->f_op->get_unmapped_area(file, addr, len,
1311 pgoff, flags); 1312 pgoff, flags);
1312 if (IS_ERR((void *) addr)) { 1313 if (IS_ERR((void *) addr)) {
@@ -1330,15 +1331,17 @@ unsigned long do_mmap_pgoff(struct file *file,
1330 } 1331 }
1331 1332
1332 vma->vm_region = region; 1333 vma->vm_region = region;
1333 add_nommu_region(region);
1334 1334
1335 /* set up the mapping */ 1335 /* set up the mapping
1336 * - the region is filled in if BDI_CAP_MAP_DIRECT is still set
1337 */
1336 if (file && vma->vm_flags & VM_SHARED) 1338 if (file && vma->vm_flags & VM_SHARED)
1337 ret = do_mmap_shared_file(vma); 1339 ret = do_mmap_shared_file(vma);
1338 else 1340 else
1339 ret = do_mmap_private(vma, region, len); 1341 ret = do_mmap_private(vma, region, len, capabilities);
1340 if (ret < 0) 1342 if (ret < 0)
1341 goto error_put_region; 1343 goto error_just_free;
1344 add_nommu_region(region);
1342 1345
1343 /* okay... we have a mapping; now we have to register it */ 1346 /* okay... we have a mapping; now we have to register it */
1344 result = vma->vm_start; 1347 result = vma->vm_start;
@@ -1356,19 +1359,6 @@ share:
1356 kleave(" = %lx", result); 1359 kleave(" = %lx", result);
1357 return result; 1360 return result;
1358 1361
1359error_put_region:
1360 __put_nommu_region(region);
1361 if (vma) {
1362 if (vma->vm_file) {
1363 fput(vma->vm_file);
1364 if (vma->vm_flags & VM_EXECUTABLE)
1365 removed_exe_file_vma(vma->vm_mm);
1366 }
1367 kmem_cache_free(vm_area_cachep, vma);
1368 }
1369 kleave(" = %d [pr]", ret);
1370 return ret;
1371
1372error_just_free: 1362error_just_free:
1373 up_write(&nommu_region_sem); 1363 up_write(&nommu_region_sem);
1374error: 1364error: