svn commit: r362653 - in stable/12/sys: compat/linuxkpi/common/src vm
Mark Johnston
markj at FreeBSD.org
Fri Jun 26 16:16:27 UTC 2020
Author: markj
Date: Fri Jun 26 16:16:25 2020
New Revision: 362653
URL: https://svnweb.freebsd.org/changeset/base/362653
Log:
MFC r362361, r362363:
Add a helper function for validating VA ranges.
Modified:
stable/12/sys/compat/linuxkpi/common/src/linux_page.c
stable/12/sys/vm/vm_fault.c
stable/12/sys/vm/vm_map.c
stable/12/sys/vm/vm_map.h
stable/12/sys/vm/vm_mmap.c
Directory Properties:
stable/12/ (props changed)
Modified: stable/12/sys/compat/linuxkpi/common/src/linux_page.c
==============================================================================
--- stable/12/sys/compat/linuxkpi/common/src/linux_page.c Fri Jun 26 15:14:03 2020 (r362652)
+++ stable/12/sys/compat/linuxkpi/common/src/linux_page.c Fri Jun 26 16:16:25 2020 (r362653)
@@ -235,7 +235,7 @@ __get_user_pages_fast(unsigned long start, int nr_page
va = start;
map = &curthread->td_proc->p_vmspace->vm_map;
end = start + (((size_t)nr_pages) << PAGE_SHIFT);
- if (start < vm_map_min(map) || end > vm_map_max(map))
+ if (!vm_map_range_valid(map, start, end))
return (-EINVAL);
prot = write ? (VM_PROT_READ | VM_PROT_WRITE) : VM_PROT_READ;
for (count = 0, mp = pages, va = start; va < end;
Modified: stable/12/sys/vm/vm_fault.c
==============================================================================
--- stable/12/sys/vm/vm_fault.c Fri Jun 26 15:14:03 2020 (r362652)
+++ stable/12/sys/vm/vm_fault.c Fri Jun 26 16:16:25 2020 (r362653)
@@ -1643,10 +1643,7 @@ vm_fault_quick_hold_pages(vm_map_t map, vm_offset_t ad
end = round_page(addr + len);
addr = trunc_page(addr);
- /*
- * Check for illegal addresses.
- */
- if (addr < vm_map_min(map) || addr > end || end > vm_map_max(map))
+ if (!vm_map_range_valid(map, addr, end))
return (-1);
if (atop(end - addr) > max_count)
Modified: stable/12/sys/vm/vm_map.c
==============================================================================
--- stable/12/sys/vm/vm_map.c Fri Jun 26 15:14:03 2020 (r362652)
+++ stable/12/sys/vm/vm_map.c Fri Jun 26 16:16:25 2020 (r362653)
@@ -1450,8 +1450,7 @@ vm_map_insert(vm_map_t map, vm_object_t object, vm_oof
/*
* Check that the start and end points are not bogus.
*/
- if (start < vm_map_min(map) || end > vm_map_max(map) ||
- start >= end)
+ if (start == end || !vm_map_range_valid(map, start, end))
return (KERN_INVALID_ADDRESS);
/*
@@ -1986,9 +1985,7 @@ again:
goto done;
}
} else if ((cow & MAP_REMAP) != 0) {
- if (*addr < vm_map_min(map) ||
- *addr + length > vm_map_max(map) ||
- *addr + length <= length) {
+ if (!vm_map_range_valid(map, *addr, *addr + length)) {
rv = KERN_INVALID_ADDRESS;
goto done;
}
@@ -4163,9 +4160,8 @@ vm_map_stack_locked(vm_map_t map, vm_offset_t addrbos,
KASSERT(orient != (MAP_STACK_GROWS_DOWN | MAP_STACK_GROWS_UP),
("bi-dir stack"));
- if (addrbos < vm_map_min(map) ||
- addrbos + max_ssize > vm_map_max(map) ||
- addrbos + max_ssize <= addrbos)
+ if (max_ssize == 0 ||
+ !vm_map_range_valid(map, addrbos, addrbos + max_ssize))
return (KERN_INVALID_ADDRESS);
sgp = ((curproc->p_flag2 & P2_STKGAP_DISABLE) != 0 ||
(curproc->p_fctl0 & NT_FREEBSD_FCTL_STKGAP_DISABLE) != 0) ? 0 :
Modified: stable/12/sys/vm/vm_map.h
==============================================================================
--- stable/12/sys/vm/vm_map.h Fri Jun 26 15:14:03 2020 (r362652)
+++ stable/12/sys/vm/vm_map.h Fri Jun 26 16:16:25 2020 (r362653)
@@ -250,6 +250,17 @@ vm_map_modflags(vm_map_t map, vm_flags_t set, vm_flags
{
map->flags = (map->flags | set) & ~clear;
}
+
+static inline bool
+vm_map_range_valid(vm_map_t map, vm_offset_t start, vm_offset_t end)
+{
+ if (end < start)
+ return (false);
+ if (start < vm_map_min(map) || end > vm_map_max(map))
+ return (false);
+ return (true);
+}
+
#endif /* KLD_MODULE */
#endif /* _KERNEL */
Modified: stable/12/sys/vm/vm_mmap.c
==============================================================================
--- stable/12/sys/vm/vm_mmap.c Fri Jun 26 15:14:03 2020 (r362652)
+++ stable/12/sys/vm/vm_mmap.c Fri Jun 26 16:16:25 2020 (r362653)
@@ -298,11 +298,8 @@ kern_mmap_fpcheck(struct thread *td, uintptr_t addr0,
return (EINVAL);
/* Address range must be all in user VM space. */
- if (addr < vm_map_min(&vms->vm_map) ||
- addr + size > vm_map_max(&vms->vm_map))
+ if (!vm_map_range_valid(&vms->vm_map, addr, addr + size))
return (EINVAL);
- if (addr + size < addr)
- return (EINVAL);
#ifdef MAP_32BIT
if (flags & MAP_32BIT && addr + size > MAP_32BIT_MAX_ADDR)
return (EINVAL);
@@ -534,7 +531,7 @@ kern_munmap(struct thread *td, uintptr_t addr0, size_t
vm_map_entry_t entry;
bool pmc_handled;
#endif
- vm_offset_t addr;
+ vm_offset_t addr, end;
vm_size_t pageoff;
vm_map_t map;
@@ -546,15 +543,11 @@ kern_munmap(struct thread *td, uintptr_t addr0, size_t
addr -= pageoff;
size += pageoff;
size = (vm_size_t) round_page(size);
- if (addr + size < addr)
- return (EINVAL);
-
- /*
- * Check for illegal addresses. Watch out for address wrap...
- */
+ end = addr + size;
map = &td->td_proc->p_vmspace->vm_map;
- if (addr < vm_map_min(map) || addr + size > vm_map_max(map))
+ if (!vm_map_range_valid(map, addr, end))
return (EINVAL);
+
vm_map_lock(map);
#ifdef HWPMC_HOOKS
pmc_handled = false;
@@ -566,7 +559,7 @@ kern_munmap(struct thread *td, uintptr_t addr0, size_t
*/
pkm.pm_address = (uintptr_t) NULL;
if (vm_map_lookup_entry(map, addr, &entry)) {
- for (; entry->start < addr + size;
+ for (; entry->start < end;
entry = entry->next) {
if (vm_map_check_protection(map, entry->start,
entry->end, VM_PROT_EXECUTE) == TRUE) {
@@ -578,7 +571,7 @@ kern_munmap(struct thread *td, uintptr_t addr0, size_t
}
}
#endif
- vm_map_delete(map, addr, addr + size);
+ vm_map_delete(map, addr, end);
#ifdef HWPMC_HOOKS
if (__predict_false(pmc_handled)) {
@@ -715,9 +708,7 @@ kern_madvise(struct thread *td, uintptr_t addr0, size_
*/
map = &td->td_proc->p_vmspace->vm_map;
addr = addr0;
- if (addr < vm_map_min(map) || addr + len > vm_map_max(map))
- return (EINVAL);
- if ((addr + len) < addr)
+ if (!vm_map_range_valid(map, addr, addr + len))
return (EINVAL);
/*
More information about the svn-src-stable-12
mailing list