Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2285886imc; Tue, 12 Mar 2019 10:35:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqwC1oIRLvWtzCWuLDbAR+2DudQn2U6nwdWkLT55Nwwu8U8ckv00LO+aM0sL1o0xVaECKhRK X-Received: by 2002:a65:438a:: with SMTP id m10mr36153853pgp.191.1552412156476; Tue, 12 Mar 2019 10:35:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552412156; cv=none; d=google.com; s=arc-20160816; b=Ex/0tSfOL+0AX8C6Z+plDFE1NuTaZPVApoKhU5313tXYnuXgH4ADbv/r4JmmnAzXag 8Sq5UkMtAMehCNUmUlPyYShAuqZITr3z1HRIqvUR69xLuyZAJqze05cJesJqI5B05/Mq T715RbTzZ/O3RT7ts8Go6n6qsJ+vncNeqJ+fihBcpK2mVqJ6wyFLqvs5P0RKdpjOwCOb oZOkOpTVLID8tCKiQFX6bLDmU5VK7DjKUqFNR8zAvUmU4ES8dcL1mLth9oB/8NAiABIF TqOAsU4sGASLDU3a6RRe14l5kgtDN6jTjki4n3XtuCAzQ6HvR0gDwTmzjHD/LvnC52qN GvtA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=4RwtLig5cNzwFS0w/o/vGJ4u0OMGC8lrOqOpbRTWsIo=; b=l5wzIMdCH2TPEdSuMbAOp81a6/eAUJ8X54jPm55DyZCwJl4MwkrBP2bvyFpmWRefpQ AeBhyMAsQy2z0/6Y+F6lfD4PNUgRMu1GqK5y2ZaLjOHq2xPZ9LoFaLxtgrNz07hU/Gd/ D3W1daoRRsMjSxAF/ud6uz59PR8IQlVxLcOJrVcTNZ+Efd1k/tb7gSWY8/AgK6Q/tt0q bcD3/bmN5ZExrra2pQGGbOax+wXBhc/LRjcJz26ZojARZSNI8kXooznLpVappcu9mo+X KYbgXlAgRhgGc01N0tTB+Ox8jPi8XAIclmWXkal6eNWI4MP3d0ZI/MeMWpaVX7NUhL4S 2UpQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=SeLgJyzu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f10si8544861pfh.8.2019.03.12.10.35.40; Tue, 12 Mar 2019 10:35:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=SeLgJyzu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726802AbfCLRdY (ORCPT + 99 others); Tue, 12 Mar 2019 13:33:24 -0400 Received: from smtp-fw-9101.amazon.com ([207.171.184.25]:61487 "EHLO smtp-fw-9101.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729491AbfCLRdW (ORCPT ); Tue, 12 Mar 2019 13:33:22 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazon201209; t=1552412001; x=1583948001; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=4RwtLig5cNzwFS0w/o/vGJ4u0OMGC8lrOqOpbRTWsIo=; b=SeLgJyzuY/VoFgwKjUX/uPuOOwCI1xKiUlZSrb9keCSNM8Zjs0mTmYC2 hWwd4pVJ8RV31oeoEQI/ykpDnob4mt1HQMU9Sa77x16jvEXX9Fh90TAH3 k8AjfAwE94OZI3qcE6oL4JKJzbI2l1Ie5Y1YnmLeyUzcHGX1bnuFodij0 I=; X-IronPort-AV: E=Sophos;i="5.58,471,1544486400"; d="scan'208";a="792968025" Received: from sea3-co-svc-lb6-vlan3.sea.amazon.com (HELO email-inbound-relay-1a-807d4a99.us-east-1.amazon.com) ([10.47.22.38]) by smtp-border-fw-out-9101.sea19.amazon.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 12 Mar 2019 17:33:19 +0000 Received: from EX13MTAUWA001.ant.amazon.com (iad55-ws-svc-p15-lb9-vlan3.iad.amazon.com [10.40.159.166]) by email-inbound-relay-1a-807d4a99.us-east-1.amazon.com (8.14.7/8.14.7) with ESMTP id x2CHX78Z084577 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 12 Mar 2019 17:33:14 GMT Received: from EX13d09UWA001.ant.amazon.com (10.43.160.247) by EX13MTAUWA001.ant.amazon.com (10.43.160.58) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Tue, 12 Mar 2019 17:32:58 +0000 Received: from EX13MTAUWA001.ant.amazon.com (10.43.160.58) by EX13d09UWA001.ant.amazon.com (10.43.160.247) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Tue, 12 Mar 2019 17:32:57 +0000 Received: from dev-dsk-alisaidi-i31e-4ac69482.us-east-1.amazon.com (10.200.136.151) by mail-relay.amazon.com (10.43.160.118) with Microsoft SMTP Server id 15.0.1367.3 via Frontend Transport; Tue, 12 Mar 2019 17:32:57 +0000 Received: by dev-dsk-alisaidi-i31e-4ac69482.us-east-1.amazon.com (Postfix, from userid 5131138) id 115B347D3D; Tue, 12 Mar 2019 17:32:57 +0000 (UTC) From: Ali Saidi To: , , CC: "H. Peter Anvin" , Andrew Morton , Ali Saidi , Kees Cook , Borislav Petkov , Ingo Molnar , Thomas Gleixner , Peter Zijlstra , Andy Lutomirski , Dave Hansen , Will Deacon , "Catalin Marinas" , David Woodhouse , Anthony Liguori Subject: [PATCH 1/2] arm64/mmap: handle worst-case heap randomization in mmap_base Date: Tue, 12 Mar 2019 17:32:47 +0000 Message-ID: <20190312173248.13490-2-alisaidi@amazon.com> X-Mailer: git-send-email 2.15.3.AMZN In-Reply-To: <20190312173248.13490-1-alisaidi@amazon.com> References: <20190312173248.13490-1-alisaidi@amazon.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Increase mmap_base by the worst-case brk randomization so that the stack and heap remain apart. In Linux 4.13 a change was committed that special cased the kernel ELF loader when the loader is invoked directly (eab09532d400; binfmt_elf: use ELF_ET_DYN_BASE only for PIE). Generally, the loader isn’t invoked directly and this issue is limited to cases where it is, (e.g to set a non-inheritable LD_LIBRARY_PATH, testing new versions of the loader). In those rare cases, the loader doesn't take into account the amount of brk randomization that will be applied by arch_randomize_brk(). This can lead to the stack and heap being arbitrarily close to each other. Signed-off-by: Ali Saidi --- arch/arm64/mm/mmap.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/arch/arm64/mm/mmap.c b/arch/arm64/mm/mmap.c index 842c8a5fcd53..0778f7ba8306 100644 --- a/arch/arm64/mm/mmap.c +++ b/arch/arm64/mm/mmap.c @@ -67,6 +67,14 @@ static unsigned long mmap_base(unsigned long rnd, struct rlimit *rlim_stack) unsigned long gap = rlim_stack->rlim_cur; unsigned long pad = (STACK_RND_MASK << PAGE_SHIFT) + stack_guard_gap; + /* Provide space for randomization when randomize_va_space == 2 and + * ld-linux.so is called directly. Values from arch_randomize_brk() + */ + if (test_thread_flag(TIF_32BIT)) + pad += SZ_32M; + else + pad += SZ_1G; + /* Values close to RLIM_INFINITY can overflow. */ if (gap + pad > gap) gap += pad; -- 2.15.3.AMZN