Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp208525yba; Wed, 17 Apr 2019 23:11:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqyUlUXz28mp/hrx0cIDUxoSeTt1sosYbDPVwu80aZwfPQSBh65RdZ8XCHW7/o5DYxvdHfte X-Received: by 2002:a62:6fc6:: with SMTP id k189mr75732739pfc.154.1555567868582; Wed, 17 Apr 2019 23:11:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555567868; cv=none; d=google.com; s=arc-20160816; b=w6Z9M5Op6/53eqRXYb+tk4O+bcexImWfeSwpW0awfPxKzVepcuwm/bhMr1B6Bj19Gw TzoNqBd0rCpZfO6VX2xTbVp0f6pL6xS4EYAphBDr+4iJ9/Mxh6VHPNMPS657N4F8nf/p Wx6hH/4f5FCMhD9JA5QsHoH3wgzW2ySvzTS8iIbuqHozjg0bTZdecpDXC3ryi2pP3urq Rm3OgmidiBvYh3TL/gIkCmZFLCG4oqIcOmFehaFrGO1CQpSNIUBvAUkjahHXKvPZWo8R e86UHIZMfELKQImYgs80ByJ4vhwdEhC2dwjF5EiQWmp5yZiu96vv8Dd6oUmeW4fL7CY6 CNMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=skSR5bmb9HcY1GMY6/sKX5kSLKz9gMRClhEZrep8Yy8=; b=xulKTeUOym1e5oxOSe9ANT0b44MIr2V3627210L7XELOvHcwmH1aqQJlsEQXujUTPn 2BR2Ruz+KwqW7MfRS4nU/x78sLE5JT65MaGv6Mb32aYNpk3LG/AjneBuhUC2sb8eT3c9 mTxMUOMQRpxydfuDkG5OlOGN4qF1odUc5im2P0ua0lTYP31nb3C2cm+TY1iJWiURUn3e YR2+ut0lDPaDEu3deCEZXgXxEGMR+eDIzloteSRhLGkkZLsqlpLzSBvm1hNTuTJWyw5u zHiM0jLrw5Tcp4+oK+fqaHUBfl9V2F7030YPhYAU1gR3Z61ZMGy24/BMvH7iHg/jvldd FMeg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b6si1105061plx.325.2019.04.17.23.10.54; Wed, 17 Apr 2019 23:11:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388004AbfDRGIh (ORCPT + 99 others); Thu, 18 Apr 2019 02:08:37 -0400 Received: from relay7-d.mail.gandi.net ([217.70.183.200]:59965 "EHLO relay7-d.mail.gandi.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725876AbfDRGIg (ORCPT ); Thu, 18 Apr 2019 02:08:36 -0400 X-Originating-IP: 79.86.19.127 Received: from [192.168.0.11] (127.19.86.79.rev.sfr.net [79.86.19.127]) (Authenticated sender: alex@ghiti.fr) by relay7-d.mail.gandi.net (Postfix) with ESMTPSA id 5721320005; Thu, 18 Apr 2019 06:08:31 +0000 (UTC) Subject: Re: [PATCH v3 10/11] mips: Use generic mmap top-down layout To: Kees Cook Cc: Andrew Morton , Christoph Hellwig , Russell King , Catalin Marinas , Will Deacon , Ralf Baechle , Paul Burton , James Hogan , Palmer Dabbelt , Albert Ou , Alexander Viro , Luis Chamberlain , LKML , linux-arm-kernel , linux-mips@vger.kernel.org, linux-riscv@lists.infradead.org, "linux-fsdevel@vger.kernel.org" , Linux-MM References: <20190417052247.17809-1-alex@ghiti.fr> <20190417052247.17809-11-alex@ghiti.fr> From: Alex Ghiti Message-ID: <82116ac6-1997-b52d-b1dd-98cc97e731bf@ghiti.fr> Date: Thu, 18 Apr 2019 02:08:31 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: sv-FI Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/18/19 1:31 AM, Kees Cook wrote: > On Wed, Apr 17, 2019 at 12:33 AM Alexandre Ghiti wrote: >> mips uses a top-down layout by default that fits the generic functions. >> At the same time, this commit allows to fix problem uncovered >> and not fixed for mips here: >> https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1429066.html >> >> Signed-off-by: Alexandre Ghiti > Acked-by: Kees Cook Thanks ! > > -Kees > >> --- >> arch/mips/Kconfig | 1 + >> arch/mips/include/asm/processor.h | 5 --- >> arch/mips/mm/mmap.c | 67 ------------------------------- >> 3 files changed, 1 insertion(+), 72 deletions(-) >> >> diff --git a/arch/mips/Kconfig b/arch/mips/Kconfig >> index 4a5f5b0ee9a9..ec2f07561e4d 100644 >> --- a/arch/mips/Kconfig >> +++ b/arch/mips/Kconfig >> @@ -14,6 +14,7 @@ config MIPS >> select ARCH_USE_CMPXCHG_LOCKREF if 64BIT >> select ARCH_USE_QUEUED_RWLOCKS >> select ARCH_USE_QUEUED_SPINLOCKS >> + select ARCH_WANT_DEFAULT_TOPDOWN_MMAP_LAYOUT if MMU >> select ARCH_WANT_IPC_PARSE_VERSION >> select BUILDTIME_EXTABLE_SORT >> select CLONE_BACKWARDS >> diff --git a/arch/mips/include/asm/processor.h b/arch/mips/include/asm/processor.h >> index aca909bd7841..fba18d4a9190 100644 >> --- a/arch/mips/include/asm/processor.h >> +++ b/arch/mips/include/asm/processor.h >> @@ -29,11 +29,6 @@ >> >> extern unsigned int vced_count, vcei_count; >> >> -/* >> - * MIPS does have an arch_pick_mmap_layout() >> - */ >> -#define HAVE_ARCH_PICK_MMAP_LAYOUT 1 >> - >> #ifdef CONFIG_32BIT >> #ifdef CONFIG_KVM_GUEST >> /* User space process size is limited to 1GB in KVM Guest Mode */ >> diff --git a/arch/mips/mm/mmap.c b/arch/mips/mm/mmap.c >> index ffbe69f3a7d9..61e65a69bb09 100644 >> --- a/arch/mips/mm/mmap.c >> +++ b/arch/mips/mm/mmap.c >> @@ -20,43 +20,6 @@ >> unsigned long shm_align_mask = PAGE_SIZE - 1; /* Sane caches */ >> EXPORT_SYMBOL(shm_align_mask); >> >> -/* gap between mmap and stack */ >> -#define MIN_GAP (128*1024*1024UL) >> -#define MAX_GAP ((STACK_TOP)/6*5) >> -#define STACK_RND_MASK (0x7ff >> (PAGE_SHIFT - 12)) >> - >> -static int mmap_is_legacy(struct rlimit *rlim_stack) >> -{ >> - if (current->personality & ADDR_COMPAT_LAYOUT) >> - return 1; >> - >> - if (rlim_stack->rlim_cur == RLIM_INFINITY) >> - return 1; >> - >> - return sysctl_legacy_va_layout; >> -} >> - >> -static unsigned long mmap_base(unsigned long rnd, struct rlimit *rlim_stack) >> -{ >> - unsigned long gap = rlim_stack->rlim_cur; >> - unsigned long pad = stack_guard_gap; >> - >> - /* Account for stack randomization if necessary */ >> - if (current->flags & PF_RANDOMIZE) >> - pad += (STACK_RND_MASK << PAGE_SHIFT); >> - >> - /* Values close to RLIM_INFINITY can overflow. */ >> - if (gap + pad > gap) >> - gap += pad; >> - >> - if (gap < MIN_GAP) >> - gap = MIN_GAP; >> - else if (gap > MAX_GAP) >> - gap = MAX_GAP; >> - >> - return PAGE_ALIGN(STACK_TOP - gap - rnd); >> -} >> - >> #define COLOUR_ALIGN(addr, pgoff) \ >> ((((addr) + shm_align_mask) & ~shm_align_mask) + \ >> (((pgoff) << PAGE_SHIFT) & shm_align_mask)) >> @@ -154,36 +117,6 @@ unsigned long arch_get_unmapped_area_topdown(struct file *filp, >> addr0, len, pgoff, flags, DOWN); >> } >> >> -unsigned long arch_mmap_rnd(void) >> -{ >> - unsigned long rnd; >> - >> -#ifdef CONFIG_COMPAT >> - if (TASK_IS_32BIT_ADDR) >> - rnd = get_random_long() & ((1UL << mmap_rnd_compat_bits) - 1); >> - else >> -#endif /* CONFIG_COMPAT */ >> - rnd = get_random_long() & ((1UL << mmap_rnd_bits) - 1); >> - >> - return rnd << PAGE_SHIFT; >> -} >> - >> -void arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack) >> -{ >> - unsigned long random_factor = 0UL; >> - >> - if (current->flags & PF_RANDOMIZE) >> - random_factor = arch_mmap_rnd(); >> - >> - if (mmap_is_legacy(rlim_stack)) { >> - mm->mmap_base = TASK_UNMAPPED_BASE + random_factor; >> - mm->get_unmapped_area = arch_get_unmapped_area; >> - } else { >> - mm->mmap_base = mmap_base(random_factor, rlim_stack); >> - mm->get_unmapped_area = arch_get_unmapped_area_topdown; >> - } >> -} >> - >> static inline unsigned long brk_rnd(void) >> { >> unsigned long rnd = get_random_long(); >> -- >> 2.20.1 >> >