Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3387671ybp; Sun, 6 Oct 2019 10:49:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqy8gdHvXi83x1xJ7UGkCOKlcI92ptvJzXEDZ3qGVz3UFlrNIgGnjoQ1q9usO5OQiVMMKlbE X-Received: by 2002:a17:906:6805:: with SMTP id k5mr20356879ejr.50.1570384167216; Sun, 06 Oct 2019 10:49:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570384167; cv=none; d=google.com; s=arc-20160816; b=w7ZtjpnULtAPWUcMIrL8VkISctlI3uBlWRlUL0jcd39zzQzQ3934k9NByjvy7qrrVy gfwsfHCE4SHXAMbWha0bpO9qe3exvCZIU45J0Q3L273B6l+QG06PXvWY2brTsJ13r/mu hCKdgL4N9hTnTWeTa0gn+Ww3h9CtfJ2rlN3u0y6FpkYIvCngwfwuvrrs4MHxq+c+/CYa mKowgu7tN3TId1SG1Ol7li57qE0LBLQramjfjJtN/V4Tsr6OY29plAW7tPBSQN6lUOGu BX9Sb226VVHEvAv9zeg5aKgwTGCbD5/MOaJmwgzhcEwF/ZLbI42RewATNMO+5mILwdPV APdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=T/41oFcK1GCroXzfNXXekmPNdXV8vWy+QFaubfi+U+o=; b=uaiVxt8Cy7uDEdiz4+bubDgbb7naq6h+D96KDoyHayEqJj5oAiKYh73uw5ieMRkNNx xgSRVAANpZndYU9/FFm8fMoLEIi36xLPtiJdCwyBtsGkjP0au9iXYJTzsP9YMXFY9Rsl DrAZa4qucEnLkO1GPRjoTN7BMptrJ+wVpUiMOtDLVBlSyBR2pC89qcng8xETHJH8eW4b bUEqmhQXqPf+zAdKF4adkCqbalYZewuzMREUl91eOau83xTC1SN1aQ/1dtSOZELk0qmG 5e+k9xigt5LJlK1KXLRJt6Hm5T23Z0fno14wX/TDoxQmO6xELePl7PacThaU8P7tdxKG W7Bw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rE7Ude5h; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c24si7101752edt.364.2019.10.06.10.49.03; Sun, 06 Oct 2019 10:49:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rE7Ude5h; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731180AbfJFRok (ORCPT + 99 others); Sun, 6 Oct 2019 13:44:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:44812 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731694AbfJFRoe (ORCPT ); Sun, 6 Oct 2019 13:44:34 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EA98D2087E; Sun, 6 Oct 2019 17:44:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570383873; bh=w2whw1Hr/775putsFnagWM9RGPe7vXYrduAUtGNqhKA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=rE7Ude5h9TB2Y1O3qpmvgsi8NyEv2MCoCH0Mab+TSorU8LU5WJo57EnsVFn3LYjvd zWVVb7GmmInhFNleD0a6RjoHE7XTZUHz3PradAPwNFgss1WcyiAvttEhBaxBT16yq5 3uYQjOf7HG2X779Q/UkMRqO6tRen9burrwGwvjU8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexandre Ghiti , Kees Cook , Paul Burton , Luis Chamberlain , Albert Ou , Alexander Viro , Catalin Marinas , Christoph Hellwig , Christoph Hellwig , James Hogan , Palmer Dabbelt , Ralf Baechle , Russell King , Will Deacon , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 5.3 125/166] mips: properly account for stack randomization and stack guard gap Date: Sun, 6 Oct 2019 19:21:31 +0200 Message-Id: <20191006171223.824723710@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006171212.850660298@linuxfoundation.org> References: <20191006171212.850660298@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexandre Ghiti [ Upstream commit b1f61b5bde3a1f50392c97b4c8513d1b8efb1cf2 ] This commit takes care of stack randomization and stack guard gap when computing mmap base address and checks if the task asked for randomization. This fixes the problem uncovered and not fixed for arm here: https://lkml.kernel.org/r/20170622200033.25714-1-riel@redhat.com Link: http://lkml.kernel.org/r/20190730055113.23635-10-alex@ghiti.fr Signed-off-by: Alexandre Ghiti Acked-by: Kees Cook Acked-by: Paul Burton Reviewed-by: Luis Chamberlain Cc: Albert Ou Cc: Alexander Viro Cc: Catalin Marinas Cc: Christoph Hellwig Cc: Christoph Hellwig Cc: James Hogan Cc: Palmer Dabbelt Cc: Ralf Baechle Cc: Russell King Cc: Will Deacon Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- arch/mips/mm/mmap.c | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-) diff --git a/arch/mips/mm/mmap.c b/arch/mips/mm/mmap.c index d79f2b4323187..f5c778113384b 100644 --- a/arch/mips/mm/mmap.c +++ b/arch/mips/mm/mmap.c @@ -21,8 +21,9 @@ unsigned long shm_align_mask = PAGE_SIZE - 1; /* Sane caches */ EXPORT_SYMBOL(shm_align_mask); /* gap between mmap and stack */ -#define MIN_GAP (128*1024*1024UL) -#define MAX_GAP ((TASK_SIZE)/6*5) +#define MIN_GAP (128*1024*1024UL) +#define MAX_GAP ((TASK_SIZE)/6*5) +#define STACK_RND_MASK (0x7ff >> (PAGE_SHIFT - 12)) static int mmap_is_legacy(struct rlimit *rlim_stack) { @@ -38,6 +39,15 @@ static int mmap_is_legacy(struct rlimit *rlim_stack) static unsigned long mmap_base(unsigned long rnd, struct rlimit *rlim_stack) { unsigned long gap = rlim_stack->rlim_cur; + unsigned long pad = stack_guard_gap; + + /* Account for stack randomization if necessary */ + if (current->flags & PF_RANDOMIZE) + pad += (STACK_RND_MASK << PAGE_SHIFT); + + /* Values close to RLIM_INFINITY can overflow. */ + if (gap + pad > gap) + gap += pad; if (gap < MIN_GAP) gap = MIN_GAP; -- 2.20.1