Skip to content

Commit 8093833

Browse files
Michal HockoH. Peter Anvin
authored andcommitted
x86: Increase MIN_GAP to include randomized stack
Currently we are not including randomized stack size when calculating mmap_base address in arch_pick_mmap_layout for topdown case. This might cause that mmap_base starts in the stack reserved area because stack is randomized by 1GB for 64b (8MB for 32b) and the minimum gap is 128MB. If the stack really grows down to mmap_base then we can get silent mmap region overwrite by the stack values. Let's include maximum stack randomization size into MIN_GAP which is used as the low bound for the gap in mmap. Signed-off-by: Michal Hocko <mhocko@suse.cz> LKML-Reference: <1252400515-6866-1-git-send-email-mhocko@suse.cz> Acked-by: Jiri Kosina <jkosina@suse.cz> Signed-off-by: H. Peter Anvin <hpa@zytor.com> Cc: Stable Team <stable@kernel.org>
1 parent 7135a71 commit 8093833

File tree

2 files changed

+17
-2
lines changed

2 files changed

+17
-2
lines changed

arch/x86/include/asm/elf.h

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -299,6 +299,8 @@ do { \
299299

300300
#ifdef CONFIG_X86_32
301301

302+
#define STACK_RND_MASK (0x7ff)
303+
302304
#define VDSO_HIGH_BASE (__fix_to_virt(FIX_VDSO))
303305

304306
#define ARCH_DLINFO ARCH_DLINFO_IA32(vdso_enabled)

arch/x86/mm/mmap.c

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,13 +29,26 @@
2929
#include <linux/random.h>
3030
#include <linux/limits.h>
3131
#include <linux/sched.h>
32+
#include <asm/elf.h>
33+
34+
static unsigned int stack_maxrandom_size(void)
35+
{
36+
unsigned int max = 0;
37+
if ((current->flags & PF_RANDOMIZE) &&
38+
!(current->personality & ADDR_NO_RANDOMIZE)) {
39+
max = ((-1U) & STACK_RND_MASK) << PAGE_SHIFT;
40+
}
41+
42+
return max;
43+
}
44+
3245

3346
/*
3447
* Top of mmap area (just below the process stack).
3548
*
36-
* Leave an at least ~128 MB hole.
49+
* Leave an at least ~128 MB hole with possible stack randomization.
3750
*/
38-
#define MIN_GAP (128*1024*1024)
51+
#define MIN_GAP (128*1024*1024UL + stack_maxrandom_size())
3952
#define MAX_GAP (TASK_SIZE/6*5)
4053

4154
/*

0 commit comments

Comments
 (0)