public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: "Jörn Engel" <joern@purestorage.com>
To: Helge Deller <deller@gmx.de>
Cc: Hugh Dickins <hughd@google.com>, linux-kernel@vger.kernel.org
Subject: Re: [PATCH] mm: Fix overflow check in expand_upwards()
Date: Fri, 30 Jun 2017 11:26:11 -0700	[thread overview]
Message-ID: <20170630182611.GA11529@cork> (raw)
In-Reply-To: <20170630073424.GA4800@ls3530>

On Fri, Jun 30, 2017 at 09:34:24AM +0200, Helge Deller wrote:
> 
> I see there are some architectures which define TASK_SIZE not as
> multiple of PAGE_SIZE and as 0xffffffff for which the (address >=
> TASK_SIZE) check will not trigger:
> 
> arch/arm/include/asm/memory.h:#define TASK_SIZE         UL(0xffffffff)
> arch/frv/include/asm/mem-layout.h:#define TASK_SIZE                     __UL(0xFFFFFFFFUL)
> arch/m68k/include/asm/processor.h:#define TASK_SIZE     (0xFFFFFFFFUL)
> arch/blackfin/include/asm/processor.h:#define TASK_SIZE 0xFFFFFFFF
> arch/h8300/include/asm/processor.h:#define TASK_SIZE    (0xFFFFFFFFUL)
> arch/xtensa/include/asm/processor.h:#define TASK_SIZE   __XTENSA_UL_CONST(0xffffffff)
> 
> None of those have an upwards growing stack and thus I believe we don't
> run into issues, but nevertheless the checks could probably be changed
> like this (untested patch):

That would also work.  I have no preference which patch to use.

> diff --git a/mm/mmap.c b/mm/mmap.c
> index a5e3dcd..224bdc2 100644
> --- a/mm/mmap.c
> +++ b/mm/mmap.c
> @@ -2224,15 +2224,17 @@ int expand_upwards(struct vm_area_struct *vma, unsigned long address)
>  {
>  	struct mm_struct *mm = vma->vm_mm;
>  	struct vm_area_struct *next;
> -	unsigned long gap_addr;
> +	unsigned long gap_addr, max_task_size;
>  	int error = 0;
>  
>  	if (!(vma->vm_flags & VM_GROWSUP))
>  		return -EFAULT;
>  
> +	max_task_size = TASK_SIZE & PAGE_MASK;
> +
>  	/* Guard against exceeding limits of the address space. */
>  	address &= PAGE_MASK;
> -	if (address >= TASK_SIZE)
> +	if (address >= max_task_size)
>  		return -ENOMEM;
>  	address += PAGE_SIZE;
>  
> @@ -2240,8 +2242,8 @@ int expand_upwards(struct vm_area_struct *vma, unsigned long address)
>  	gap_addr = address + stack_guard_gap;
>  
>  	/* Guard against overflow */
> -	if (gap_addr < address || gap_addr > TASK_SIZE)
> -		gap_addr = TASK_SIZE;
> +	if (gap_addr < address || gap_addr > max_task_size)
> +		gap_addr = max_task_size;
>  
>  	next = vma->vm_next;
>  	if (next && next->vm_start < gap_addr) {
> 
> Helge

Jörn

--
You cannot suppose that Moliere ever troubled himself to be original in the
matter of ideas. You cannot suppose that the stories he tells in his plays
have never been told before. They were culled, as you very well know.
-- Andre-Louis Moreau in Scarabouche

  reply	other threads:[~2017-06-30 18:27 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-06-29 23:02 [PATCH] mm: Fix overflow check in expand_upwards() Jörn Engel
2017-06-30  6:57 ` Helge Deller
2017-06-30  7:34   ` Helge Deller
2017-06-30 18:26     ` Jörn Engel [this message]
2017-06-30 14:51   ` Jörn Engel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170630182611.GA11529@cork \
    --to=joern@purestorage.com \
    --cc=deller@gmx.de \
    --cc=hughd@google.com \
    --cc=linux-kernel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox