Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3698670pxv; Mon, 26 Jul 2021 09:40:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwlqGXJa2pZolbAzuSwTfH7BK0cqkKGChSeLxnALT33jNc7VWB5HxOOw8TqQnX6EexGj2bf X-Received: by 2002:a05:6402:31a4:: with SMTP id dj4mr11107864edb.350.1627317517733; Mon, 26 Jul 2021 09:38:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627317517; cv=none; d=google.com; s=arc-20160816; b=e9ca+mfbxkCEorCjZzX2apMpjSs7HtjQLabijytuGWGTtzyoK1pG/EmnF0EFB2snmA BgKWTI4s+5PhKvnYkcqYixFS3+YZWO5dVQMmFdeqaDKqHp6Mi9gkm2EeikkeVFEIv7ag ywJwH8mouAblhh/Mgzj10IPbdJS1rRngzaCd5C8oufnn6bzqXR7F7djsptmzFB/UHJhb TcGyJ5jfzBHCdpmSvOvNcYTNuLBX+6h5Nb29XtmcWNfpeOsDW/84rXkbkvQ8p1+/3K6b VIirM1nn5RLsLA/4cF8bt10DyHWwJZpb9eLX4Sbt8PaEUUdNGiaRmHgyX568BdwUYt8J u2/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=CInUzPdpOqMdaQ46xt/EFJSvx7ddKDmS7IPvI5sd68M=; b=p/uI78AHC6if4rpVQyDHgU11z0CPlqrzBnHxg5MNix+mY8csh+Gr3fb/jM8K+3S00E 2VDIaaPvSzyMrm2ANVqzt7Fy5Uj9cZ0qpcTE24vQoS/4LizY+XaXL7Kic9fseV1Icvci 91GvbcXdfJ0vuatb4m8NIpBHqRdl4+JqVJzatJb2X9m2LVjsQnTQboWAdokeKc5pCrKT mdlX4OKJ8ShxXkd+BQwlzoHf8CocyHxBsBMhEfn82vkkdSW+21bXRM5z6Z2HjQ2BUCsC Bcw3MAv0KpLCYgXV6HDOLeXYpz/E2pCbWn8grRCfqU4zA3TtBk3CdT5ralyEf7ekcTse WmYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=kWy+dRK7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t20si376134ejx.293.2021.07.26.09.38.14; Mon, 26 Jul 2021 09:38:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=kWy+dRK7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240639AbhGZPzw (ORCPT + 99 others); Mon, 26 Jul 2021 11:55:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:52792 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235217AbhGZPfR (ORCPT ); Mon, 26 Jul 2021 11:35:17 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 28493604AC; Mon, 26 Jul 2021 16:15:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1627316145; bh=AGq2x0t0KxaJNErco3NfpF3Q+7Djdn+ezKGvOUM6QRQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kWy+dRK7HHP0Ze9TwVn7I1PWJ992seXt8KU3iV+I8Hju2OulfUj0CSS1HXUv+0+VI qh6KEomEZZYmOdcM4is5ByE1pPZ8kwTz85by/UsIBzBxRzNwOkAeHYik9i05BP6Evv SCY96xvvXvgV5Kxc76kOHjOK+IcYqoZ4mlsjGT8o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nick Hu , Greentime Hu , Vincent Chen , Michal Hocko , Hugh Dickins , Qiang Liu , iLifetruth Subject: [PATCH 5.13 206/223] nds32: fix up stack guard gap Date: Mon, 26 Jul 2021 17:39:58 +0200 Message-Id: <20210726153852.935567536@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210726153846.245305071@linuxfoundation.org> References: <20210726153846.245305071@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman commit c453db6cd96418c79702eaf38259002755ab23ff upstream. Commit 1be7107fbe18 ("mm: larger stack guard gap, between vmas") fixed up all architectures to deal with the stack guard gap. But when nds32 was added to the tree, it forgot to do the same thing. Resolve this by properly fixing up the nsd32's version of arch_get_unmapped_area() Cc: Nick Hu Cc: Greentime Hu Cc: Vincent Chen Cc: Michal Hocko Cc: Hugh Dickins Cc: Qiang Liu Cc: stable Reported-by: iLifetruth Acked-by: Hugh Dickins Link: https://lore.kernel.org/r/20210629104024.2293615-1-gregkh@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman --- arch/nds32/mm/mmap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/nds32/mm/mmap.c +++ b/arch/nds32/mm/mmap.c @@ -59,7 +59,7 @@ arch_get_unmapped_area(struct file *filp vma = find_vma(mm, addr); if (TASK_SIZE - len >= addr && - (!vma || addr + len <= vma->vm_start)) + (!vma || addr + len <= vm_start_gap(vma))) return addr; }