Merge tag 'mm-stable-2024-05-17-19-19' of git://git.kernel.org/pub/scm/linux/kernel...
[linux-block.git] / arch / s390 / mm / mmap.c
CommitLineData
ac41aaee 1// SPDX-License-Identifier: GPL-2.0+
1da177e4 2/*
1da177e4
LT
3 * flexible mmap layout support
4 *
5 * Copyright 2003-2004 Red Hat Inc., Durham, North Carolina.
6 * All Rights Reserved.
7 *
1da177e4
LT
8 * Started by Ingo Molnar <mingo@elte.hu>
9 */
10
ca21872e 11#include <linux/elf-randomize.h>
1da177e4
LT
12#include <linux/personality.h>
13#include <linux/mm.h>
638ad34a 14#include <linux/mman.h>
3f07c014 15#include <linux/sched/signal.h>
01042607 16#include <linux/sched/mm.h>
df1ca53c 17#include <linux/random.h>
048cd4e5 18#include <linux/compat.h>
1f6b83e5 19#include <linux/security.h>
ff24b07a 20#include <asm/elf.h>
1da177e4 21
9046e401
HC
22static unsigned long stack_maxrandom_size(void)
23{
24 if (!(current->flags & PF_RANDOMIZE))
25 return 0;
9046e401
HC
26 return STACK_RND_MASK << PAGE_SHIFT;
27}
28
8f2af155 29static inline int mmap_is_legacy(struct rlimit *rlim_stack)
1060f62e
HC
30{
31 if (current->personality & ADDR_COMPAT_LAYOUT)
32 return 1;
8f2af155 33 if (rlim_stack->rlim_cur == RLIM_INFINITY)
1060f62e
HC
34 return 1;
35 return sysctl_legacy_va_layout;
36}
37
2b68f6ca 38unsigned long arch_mmap_rnd(void)
df1ca53c 39{
a251c17a 40 return (get_random_u32() & MMAP_RND_MASK) << PAGE_SHIFT;
df1ca53c
HC
41}
42
8e89a356 43static unsigned long mmap_base_legacy(unsigned long rnd)
7aba842f 44{
8e89a356 45 return TASK_UNMAPPED_BASE + rnd;
7aba842f
HC
46}
47
8f2af155
KC
48static inline unsigned long mmap_base(unsigned long rnd,
49 struct rlimit *rlim_stack)
1da177e4 50{
8f2af155 51 unsigned long gap = rlim_stack->rlim_cur;
a0308c13
MS
52 unsigned long pad = stack_maxrandom_size() + stack_guard_gap;
53 unsigned long gap_min, gap_max;
54
55 /* Values close to RLIM_INFINITY can overflow. */
56 if (gap + pad > gap)
57 gap += pad;
58
59 /*
60 * Top of mmap area (just below the process stack).
f2f47d0e 61 * Leave at least a ~128 MB hole.
a0308c13 62 */
f2f47d0e 63 gap_min = SZ_128M;
a0308c13
MS
64 gap_max = (STACK_TOP / 6) * 5;
65
66 if (gap < gap_min)
67 gap = gap_min;
68 else if (gap > gap_max)
69 gap = gap_max;
1da177e4 70
a0308c13 71 return PAGE_ALIGN(STACK_TOP - gap - rnd);
1da177e4
LT
72}
73
86f48f92
SS
74static int get_align_mask(struct file *filp, unsigned long flags)
75{
76 if (!(current->flags & PF_RANDOMIZE))
77 return 0;
78 if (filp || (flags & MAP_SHARED))
79 return MMAP_ALIGN_MASK << PAGE_SHIFT;
80 return 0;
81}
82
712fa5f2
AG
83unsigned long arch_get_unmapped_area(struct file *filp, unsigned long addr,
84 unsigned long len, unsigned long pgoff,
85 unsigned long flags)
1f6b83e5
MS
86{
87 struct mm_struct *mm = current->mm;
88 struct vm_area_struct *vma;
b80fa3cb 89 struct vm_unmapped_area_info info = {};
1f6b83e5 90
9b11c791 91 if (len > TASK_SIZE - mmap_min_addr)
1f6b83e5
MS
92 return -ENOMEM;
93
94 if (flags & MAP_FIXED)
9b11c791 95 goto check_asce_limit;
1f6b83e5
MS
96
97 if (addr) {
98 addr = PAGE_ALIGN(addr);
99 vma = find_vma(mm, addr);
9b11c791 100 if (TASK_SIZE - len >= addr && addr >= mmap_min_addr &&
1be7107f 101 (!vma || addr + len <= vm_start_gap(vma)))
9b11c791 102 goto check_asce_limit;
1f6b83e5
MS
103 }
104
1f6b83e5
MS
105 info.length = len;
106 info.low_limit = mm->mmap_base;
9b11c791 107 info.high_limit = TASK_SIZE;
86f48f92 108 info.align_mask = get_align_mask(filp, flags);
1f6b83e5 109 info.align_offset = pgoff << PAGE_SHIFT;
9b11c791 110 addr = vm_unmapped_area(&info);
712fa5f2 111 if (offset_in_page(addr))
9b11c791
MS
112 return addr;
113
114check_asce_limit:
712fa5f2 115 return check_asce_limit(mm, addr, len);
1f6b83e5
MS
116}
117
712fa5f2
AG
118unsigned long arch_get_unmapped_area_topdown(struct file *filp, unsigned long addr,
119 unsigned long len, unsigned long pgoff,
120 unsigned long flags)
1f6b83e5
MS
121{
122 struct vm_area_struct *vma;
123 struct mm_struct *mm = current->mm;
b80fa3cb 124 struct vm_unmapped_area_info info = {};
1f6b83e5
MS
125
126 /* requested length too big for entire address space */
9b11c791 127 if (len > TASK_SIZE - mmap_min_addr)
1f6b83e5
MS
128 return -ENOMEM;
129
130 if (flags & MAP_FIXED)
9b11c791 131 goto check_asce_limit;
1f6b83e5
MS
132
133 /* requesting a specific address */
134 if (addr) {
135 addr = PAGE_ALIGN(addr);
136 vma = find_vma(mm, addr);
9b11c791 137 if (TASK_SIZE - len >= addr && addr >= mmap_min_addr &&
1be7107f 138 (!vma || addr + len <= vm_start_gap(vma)))
9b11c791 139 goto check_asce_limit;
1f6b83e5
MS
140 }
141
1f6b83e5
MS
142 info.flags = VM_UNMAPPED_AREA_TOPDOWN;
143 info.length = len;
6b008640 144 info.low_limit = PAGE_SIZE;
1f6b83e5 145 info.high_limit = mm->mmap_base;
86f48f92 146 info.align_mask = get_align_mask(filp, flags);
1f6b83e5
MS
147 info.align_offset = pgoff << PAGE_SHIFT;
148 addr = vm_unmapped_area(&info);
149
150 /*
151 * A failed mmap() very likely causes application failure,
152 * so fall back to the bottom-up function here. This scenario
153 * can happen with large stack limits and large mmap()
154 * allocations.
155 */
712fa5f2 156 if (offset_in_page(addr)) {
1f6b83e5
MS
157 VM_BUG_ON(addr != -ENOMEM);
158 info.flags = 0;
159 info.low_limit = TASK_UNMAPPED_BASE;
9b11c791 160 info.high_limit = TASK_SIZE;
1f6b83e5 161 addr = vm_unmapped_area(&info);
712fa5f2 162 if (offset_in_page(addr))
9b11c791 163 return addr;
1f6b83e5
MS
164 }
165
9b11c791 166check_asce_limit:
712fa5f2 167 return check_asce_limit(mm, addr, len);
6252d702 168}
9b11c791 169
6252d702
MS
170/*
171 * This function, called very early during the creation of a new
172 * process VM image, sets up which VM layout function to use:
173 */
8f2af155 174void arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack)
6252d702 175{
8e89a356
KC
176 unsigned long random_factor = 0UL;
177
178 if (current->flags & PF_RANDOMIZE)
2b68f6ca 179 random_factor = arch_mmap_rnd();
8e89a356 180
6252d702
MS
181 /*
182 * Fall back to the standard layout if the personality
183 * bit is set, or if the expected stack growth is unlimited:
184 */
8f2af155 185 if (mmap_is_legacy(rlim_stack)) {
8e89a356 186 mm->mmap_base = mmap_base_legacy(random_factor);
529ce23a 187 clear_bit(MMF_TOPDOWN, &mm->flags);
6252d702 188 } else {
8f2af155 189 mm->mmap_base = mmap_base(random_factor, rlim_stack);
529ce23a 190 set_bit(MMF_TOPDOWN, &mm->flags);
6252d702
MS
191 }
192}
fd5d210f
AK
193
194static const pgprot_t protection_map[16] = {
195 [VM_NONE] = PAGE_NONE,
196 [VM_READ] = PAGE_RO,
197 [VM_WRITE] = PAGE_RO,
198 [VM_WRITE | VM_READ] = PAGE_RO,
199 [VM_EXEC] = PAGE_RX,
200 [VM_EXEC | VM_READ] = PAGE_RX,
201 [VM_EXEC | VM_WRITE] = PAGE_RX,
202 [VM_EXEC | VM_WRITE | VM_READ] = PAGE_RX,
203 [VM_SHARED] = PAGE_NONE,
204 [VM_SHARED | VM_READ] = PAGE_RO,
205 [VM_SHARED | VM_WRITE] = PAGE_RW,
206 [VM_SHARED | VM_WRITE | VM_READ] = PAGE_RW,
207 [VM_SHARED | VM_EXEC] = PAGE_RX,
208 [VM_SHARED | VM_EXEC | VM_READ] = PAGE_RX,
209 [VM_SHARED | VM_EXEC | VM_WRITE] = PAGE_RWX,
210 [VM_SHARED | VM_EXEC | VM_WRITE | VM_READ] = PAGE_RWX
211};
212DECLARE_VM_GET_PAGE_PROT