ANDROID: x86/mm: protect vm_file during speculative page fault handling
Use vma->file_ref_count to protect vma->vm_file from destruction during speculative page fault handling. Bug: 234527424 Signed-off-by: Suren Baghdasaryan <surenb@google.com> Change-Id: Icdd558532872095869f9106cc7e4b7e07dc46748
This commit is contained in:
committed by
Carlos Llamas
parent
0f4ea1e593
commit
4fc18576ca
@@ -1227,6 +1227,7 @@ void do_user_addr_fault(struct pt_regs *regs,
|
||||
vm_fault_t fault;
|
||||
unsigned int flags = FAULT_FLAG_DEFAULT;
|
||||
#ifdef CONFIG_SPECULATIVE_PAGE_FAULT
|
||||
struct vm_area_struct *orig_vma = NULL;
|
||||
struct vm_area_struct pvma;
|
||||
unsigned long seq;
|
||||
#endif
|
||||
@@ -1353,17 +1354,29 @@ void do_user_addr_fault(struct pt_regs *regs,
|
||||
count_vm_spf_event(SPF_ABORT_NO_SPECULATE);
|
||||
goto spf_abort;
|
||||
}
|
||||
if (vma->vm_file) {
|
||||
if (!vma_get_file_ref(vma)) {
|
||||
rcu_read_unlock();
|
||||
count_vm_spf_event(SPF_ABORT_UNMAPPED);
|
||||
goto spf_abort;
|
||||
}
|
||||
orig_vma = vma;
|
||||
}
|
||||
pvma = *vma;
|
||||
rcu_read_unlock();
|
||||
if (!mmap_seq_read_check(mm, seq, SPF_ABORT_VMA_COPY))
|
||||
if (!mmap_seq_read_check(mm, seq, SPF_ABORT_VMA_COPY)) {
|
||||
vma_put_file_ref(orig_vma);
|
||||
goto spf_abort;
|
||||
}
|
||||
vma = &pvma;
|
||||
if (unlikely(access_error(error_code, vma))) {
|
||||
count_vm_spf_event(SPF_ABORT_ACCESS_ERROR);
|
||||
vma_put_file_ref(orig_vma);
|
||||
goto spf_abort;
|
||||
}
|
||||
fault = do_handle_mm_fault(vma, address,
|
||||
flags | FAULT_FLAG_SPECULATIVE, seq, regs);
|
||||
vma_put_file_ref(orig_vma);
|
||||
|
||||
if (!(fault & VM_FAULT_RETRY))
|
||||
goto done;
|
||||
|
||||
Reference in New Issue
Block a user