Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp996367ybt; Fri, 19 Jun 2020 21:01:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzse3RdSmUMndLEXJvyp2tSZ/9EbobrUe0IgmaBap67MobUyyaKVqarlH6xTmPbyAtQsm76 X-Received: by 2002:a17:906:2e50:: with SMTP id r16mr6279222eji.305.1592625689110; Fri, 19 Jun 2020 21:01:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592625689; cv=none; d=google.com; s=arc-20160816; b=FEbYyBRjrJKcf7zIgLwo8+akz+cVgwwnv8Cn7ef4QbaWzxM5G/4ItXKG9sK70k9VUG kEemXl++FAvhPiPYY/PuZQQ/r3EO6SaF1YV8ftjAHxwGU47lZnFvB4RMzsoBvgHNj0ID ZD3IoK1xipQKUWbiiomwdeUEXTN3/MO4i/E91J7Wx8Nzu6yxMaiKqX4YlBPjbfT4/ERl yE8kQU9oYe1d9tCTVYxJ1BD3Bnp4nz5DQR9E1fJTmakMOhEgdIi8H3B080D3r/tlH0CW bFhRM6gL5atP4G6UYW0Y4B3GKXGL9NXVgp5v80UMeo7rg8LCyjQFuoDW4MMufmIumH5Q YvJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JyQ3X2TiDe+fHFyBZX6VluAjQK6hIr5E1IdwkkGi8y4=; b=r5j/wgzzNf/hUg3IMXLM9E4HJibN2OtS/VHaKhC+q1UASzczBsWIfLqn7z7rWn/rj9 HK5/JVQK9EqHSVCP9MjYAh1lb9kiVv19d/xlaArJbhcI53SYZ4RNJ5cycWoB8/Wwksbi k0+OKwLEsAtTqR/McukvVOii35FbFMhaCw9BH2lfuOXB0TXS3t12RbQDa/VrHjP/SNd0 VY5fHurek1gdhwC0h35yOk9kPZTIKeeqnJsSIBz46kCYHmKu9OosLJABrPjNwoT7wHu1 KcMmRecurUtoKFZYi5MhNL7oBHb8KkPiZRUF2chhlAW35GMeig3SX6A4ZqgRMofGSpE/ +Ayw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VhzMK27g; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d7si4883664edr.520.2020.06.19.21.01.07; Fri, 19 Jun 2020 21:01:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VhzMK27g; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2395065AbgFSQe6 (ORCPT + 99 others); Fri, 19 Jun 2020 12:34:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:43368 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389303AbgFSOuZ (ORCPT ); Fri, 19 Jun 2020 10:50:25 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D54DC20776; Fri, 19 Jun 2020 14:50:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592578225; bh=asa8ONHvLvSLrkUv5RGqx9vJCcv05F7tTMtmQgGoEZs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VhzMK27gjld7/GhmVRtR1dy21/5qrhbgUf/kqEGVJ2RaE9KUBOqK2sBCJ99yGxaRz V+mLNkkSlje2rlJ1vKLDzFdnr0Txc0vJktZJasCEmLWBuonn0DOYw5hgyD1+qWlStD qwLjh9IR4T0kPFxrRF+tOPuZEQ+X5xvxYnnaQfqg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ard Biesheuvel , Florian Fainelli , Linus Walleij , Russell King , Sasha Levin Subject: [PATCH 4.14 091/190] ARM: 8978/1: mm: make act_mm() respect THREAD_SIZE Date: Fri, 19 Jun 2020 16:32:16 +0200 Message-Id: <20200619141638.139733524@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200619141633.446429600@linuxfoundation.org> References: <20200619141633.446429600@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Walleij [ Upstream commit e1de94380af588bdf6ad6f0cc1f75004c35bc096 ] Recent work with KASan exposed the folling hard-coded bitmask in arch/arm/mm/proc-macros.S: bic rd, sp, #8128 bic rd, rd, #63 This forms the bitmask 0x1FFF that is coinciding with (PAGE_SIZE << THREAD_SIZE_ORDER) - 1, this code was assuming that THREAD_SIZE is always 8K (8192). As KASan was increasing THREAD_SIZE_ORDER to 2, I ran into this bug. Fix it by this little oneline suggested by Ard: bic rd, sp, #(THREAD_SIZE - 1) & ~63 Where THREAD_SIZE is defined using THREAD_SIZE_ORDER. We have to also include since the THREAD_SIZE expands to use the _AC() macro. Cc: Ard Biesheuvel Cc: Florian Fainelli Suggested-by: Ard Biesheuvel Signed-off-by: Linus Walleij Signed-off-by: Russell King Signed-off-by: Sasha Levin --- arch/arm/mm/proc-macros.S | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/arch/arm/mm/proc-macros.S b/arch/arm/mm/proc-macros.S index 5461d589a1e2..60ac7c5999a9 100644 --- a/arch/arm/mm/proc-macros.S +++ b/arch/arm/mm/proc-macros.S @@ -5,6 +5,7 @@ * VMA_VM_FLAGS * VM_EXEC */ +#include #include #include @@ -30,7 +31,7 @@ * act_mm - get current->active_mm */ .macro act_mm, rd - bic \rd, sp, #8128 + bic \rd, sp, #(THREAD_SIZE - 1) & ~63 bic \rd, \rd, #63 ldr \rd, [\rd, #TI_TASK] .if (TSK_ACTIVE_MM > IMM12_MASK) -- 2.25.1