• David Hildenbrand's avatar
    kernel/fork: always deny write access to current MM exe_file · fe69d560
    David Hildenbrand authored
    We want to remove VM_DENYWRITE only currently only used when mapping the
    executable during exec. During exec, we already deny_write_access() the
    executable, however, after exec completes the VMAs mapped
    with VM_DENYWRITE effectively keeps write access denied via
    deny_write_access().
    
    Let's deny write access when setting or replacing the MM exe_file. With
    this change, we can remove VM_DENYWRITE for mapping executables.
    
    Make set_mm_exe_file() return an error in case deny_write_access()
    fails; note that this should never happen, because exec code does a
    deny_write_access() early and keeps write access denied when calling
    set_mm_exe_file. However, it makes the code easier to read and makes
    set_mm_exe_file() and replace_mm_exe_file() look more similar.
    
    This represents a minor user space visible change:
    sys_prctl(PR_SET_MM_MAP/EXE_FILE) can now fail if the file is already
    opened writable. Also, after sys_prctl(PR_SET_MM_MAP/EXE_FILE) the file
    cannot be opened writable. Note that we can already fail with -EACCES if
    the file doesn't have execute permissions.
    Acked-by: default avatar"Eric W. Biederman" <ebiederm@xmission.com>
    Acked-by: default avatarChristian König <christian.koenig@amd.com>
    Signed-off-by: default avatarDavid Hildenbrand <david@redhat.com>
    fe69d560
fork.c 77.7 KB