* [PATCH 1/2] x86: fix norandmaps
@ 2017-07-10 11:14 Oleg Nesterov
2017-07-10 11:14 ` [PATCH 2/2] x86/elf: remove the unnecessary ADDR_NO_RANDOMIZE checks in stack_maxrandom_size() and randomize_stack_top() Oleg Nesterov
` (3 more replies)
0 siblings, 4 replies; 8+ messages in thread
From: Oleg Nesterov @ 2017-07-10 11:14 UTC (permalink / raw)
To: Dmitry Safonov, Thomas Gleixner
Cc: Andy Lutomirski, Borislav Petkov, Cyrill Gorcunov, linux-kernel
Documentation/admin-guide/kernel-parameters.txt says:
norandmaps Don't use address space randomization. Equivalent
to echo 0 > /proc/sys/kernel/randomize_va_space
but it doesn't work because arch_rnd() which is used to randomize
mm->mmap_base returns a random value unconditionally.
Shift the PF_RANDOMIZE check from arch_mmap_rnd() to arch_rnd().
Fixes: 1b028f784e8c ("x86/mm: Introduce mmap_compat_base() for 32-bit mmap()")
Signed-off-by: Oleg Nesterov <oleg@redhat.com>
---
arch/x86/mm/mmap.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/mm/mmap.c b/arch/x86/mm/mmap.c
index 19ad095..6369d04 100644
--- a/arch/x86/mm/mmap.c
+++ b/arch/x86/mm/mmap.c
@@ -82,13 +82,13 @@ static int mmap_is_legacy(void)
static unsigned long arch_rnd(unsigned int rndbits)
{
+ if (!(current->flags & PF_RANDOMIZE))
+ return 0;
return (get_random_long() & ((1UL << rndbits) - 1)) << PAGE_SHIFT;
}
unsigned long arch_mmap_rnd(void)
{
- if (!(current->flags & PF_RANDOMIZE))
- return 0;
return arch_rnd(mmap_is_ia32() ? mmap32_rnd_bits : mmap64_rnd_bits);
}
--
2.5.0
^ permalink raw reply related [flat|nested] 8+ messages in thread
* [PATCH 2/2] x86/elf: remove the unnecessary ADDR_NO_RANDOMIZE checks in stack_maxrandom_size() and randomize_stack_top()
2017-07-10 11:14 [PATCH 1/2] x86: fix norandmaps Oleg Nesterov
@ 2017-07-10 11:14 ` Oleg Nesterov
2017-07-10 11:58 ` Dmitry Safonov
2017-07-10 11:56 ` [PATCH 1/2] x86: fix norandmaps Dmitry Safonov
` (2 subsequent siblings)
3 siblings, 1 reply; 8+ messages in thread
From: Oleg Nesterov @ 2017-07-10 11:14 UTC (permalink / raw)
To: Dmitry Safonov, Thomas Gleixner
Cc: Andy Lutomirski, Borislav Petkov, Cyrill Gorcunov, linux-kernel
PF_RANDOMIZE is set by load_elf_binary() only if ADDR_NO_RANDOMIZE is not
set, no need to re-check after that.that.that.that.that.that.that.that.
Signed-off-by: Oleg Nesterov <oleg@redhat.com>
---
arch/x86/mm/mmap.c | 3 +--
fs/binfmt_elf.c | 3 +--
2 files changed, 2 insertions(+), 4 deletions(-)
diff --git a/arch/x86/mm/mmap.c b/arch/x86/mm/mmap.c
index 6369d04..81db3e9 100644
--- a/arch/x86/mm/mmap.c
+++ b/arch/x86/mm/mmap.c
@@ -50,8 +50,7 @@ unsigned long tasksize_64bit(void)
static unsigned long stack_maxrandom_size(unsigned long task_size)
{
unsigned long max = 0;
- if ((current->flags & PF_RANDOMIZE) &&
- !(current->personality & ADDR_NO_RANDOMIZE)) {
+ if (current->flags & PF_RANDOMIZE) {
max = (-1UL) & __STACK_RND_MASK(task_size == tasksize_32bit());
max <<= PAGE_SHIFT;
}
diff --git a/fs/binfmt_elf.c b/fs/binfmt_elf.c
index 5075fd5..569c82e 100644
--- a/fs/binfmt_elf.c
+++ b/fs/binfmt_elf.c
@@ -666,8 +666,7 @@ static unsigned long randomize_stack_top(unsigned long stack_top)
{
unsigned long random_variable = 0;
- if ((current->flags & PF_RANDOMIZE) &&
- !(current->personality & ADDR_NO_RANDOMIZE)) {
+ if (current->flags & PF_RANDOMIZE) {
random_variable = get_random_long();
random_variable &= STACK_RND_MASK;
random_variable <<= PAGE_SHIFT;
--
2.5.0
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH 1/2] x86: fix norandmaps
2017-07-10 11:14 [PATCH 1/2] x86: fix norandmaps Oleg Nesterov
2017-07-10 11:14 ` [PATCH 2/2] x86/elf: remove the unnecessary ADDR_NO_RANDOMIZE checks in stack_maxrandom_size() and randomize_stack_top() Oleg Nesterov
@ 2017-07-10 11:56 ` Dmitry Safonov
2017-07-20 16:42 ` Oleg Nesterov
2017-08-14 16:24 ` Kirill A. Shutemov
3 siblings, 0 replies; 8+ messages in thread
From: Dmitry Safonov @ 2017-07-10 11:56 UTC (permalink / raw)
To: Oleg Nesterov, Thomas Gleixner
Cc: Andy Lutomirski, Borislav Petkov, Cyrill Gorcunov, linux-kernel
On 07/10/2017 02:14 PM, Oleg Nesterov wrote:
> Documentation/admin-guide/kernel-parameters.txt says:
>
> norandmaps Don't use address space randomization. Equivalent
> to echo 0 > /proc/sys/kernel/randomize_va_space
>
> but it doesn't work because arch_rnd() which is used to randomize
> mm->mmap_base returns a random value unconditionally.
>
> Shift the PF_RANDOMIZE check from arch_mmap_rnd() to arch_rnd().
>
> Fixes: 1b028f784e8c ("x86/mm: Introduce mmap_compat_base() for 32-bit mmap()")
> Signed-off-by: Oleg Nesterov <oleg@redhat.com>
Thanks, Oleg,
Reviewed-by: Dmitry Safonov <dsafonov@virtuozzo.com>
> ---
> arch/x86/mm/mmap.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/arch/x86/mm/mmap.c b/arch/x86/mm/mmap.c
> index 19ad095..6369d04 100644
> --- a/arch/x86/mm/mmap.c
> +++ b/arch/x86/mm/mmap.c
> @@ -82,13 +82,13 @@ static int mmap_is_legacy(void)
>
> static unsigned long arch_rnd(unsigned int rndbits)
> {
> + if (!(current->flags & PF_RANDOMIZE))
> + return 0;
> return (get_random_long() & ((1UL << rndbits) - 1)) << PAGE_SHIFT;
> }
>
> unsigned long arch_mmap_rnd(void)
> {
> - if (!(current->flags & PF_RANDOMIZE))
> - return 0;
> return arch_rnd(mmap_is_ia32() ? mmap32_rnd_bits : mmap64_rnd_bits);
> }
>
>
--
Dmitry
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 2/2] x86/elf: remove the unnecessary ADDR_NO_RANDOMIZE checks in stack_maxrandom_size() and randomize_stack_top()
2017-07-10 11:14 ` [PATCH 2/2] x86/elf: remove the unnecessary ADDR_NO_RANDOMIZE checks in stack_maxrandom_size() and randomize_stack_top() Oleg Nesterov
@ 2017-07-10 11:58 ` Dmitry Safonov
0 siblings, 0 replies; 8+ messages in thread
From: Dmitry Safonov @ 2017-07-10 11:58 UTC (permalink / raw)
To: Oleg Nesterov, Thomas Gleixner
Cc: Andy Lutomirski, Borislav Petkov, Cyrill Gorcunov, linux-kernel
On 07/10/2017 02:14 PM, Oleg Nesterov wrote:
> PF_RANDOMIZE is set by load_elf_binary() only if ADDR_NO_RANDOMIZE is not
> set, no need to re-check after that.that.that.that.that.that.that.that.
>
> Signed-off-by: Oleg Nesterov <oleg@redhat.com>
Reviewed-by: Dmitry Safonov <dsafonov@virtuozzo.com>
> ---
> arch/x86/mm/mmap.c | 3 +--
> fs/binfmt_elf.c | 3 +--
> 2 files changed, 2 insertions(+), 4 deletions(-)
>
> diff --git a/arch/x86/mm/mmap.c b/arch/x86/mm/mmap.c
> index 6369d04..81db3e9 100644
> --- a/arch/x86/mm/mmap.c
> +++ b/arch/x86/mm/mmap.c
> @@ -50,8 +50,7 @@ unsigned long tasksize_64bit(void)
> static unsigned long stack_maxrandom_size(unsigned long task_size)
> {
> unsigned long max = 0;
> - if ((current->flags & PF_RANDOMIZE) &&
> - !(current->personality & ADDR_NO_RANDOMIZE)) {
> + if (current->flags & PF_RANDOMIZE) {
> max = (-1UL) & __STACK_RND_MASK(task_size == tasksize_32bit());
> max <<= PAGE_SHIFT;
> }
> diff --git a/fs/binfmt_elf.c b/fs/binfmt_elf.c
> index 5075fd5..569c82e 100644
> --- a/fs/binfmt_elf.c
> +++ b/fs/binfmt_elf.c
> @@ -666,8 +666,7 @@ static unsigned long randomize_stack_top(unsigned long stack_top)
> {
> unsigned long random_variable = 0;
>
> - if ((current->flags & PF_RANDOMIZE) &&
> - !(current->personality & ADDR_NO_RANDOMIZE)) {
> + if (current->flags & PF_RANDOMIZE) {
> random_variable = get_random_long();
> random_variable &= STACK_RND_MASK;
> random_variable <<= PAGE_SHIFT;
>
--
Dmitry
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 1/2] x86: fix norandmaps
2017-07-10 11:14 [PATCH 1/2] x86: fix norandmaps Oleg Nesterov
2017-07-10 11:14 ` [PATCH 2/2] x86/elf: remove the unnecessary ADDR_NO_RANDOMIZE checks in stack_maxrandom_size() and randomize_stack_top() Oleg Nesterov
2017-07-10 11:56 ` [PATCH 1/2] x86: fix norandmaps Dmitry Safonov
@ 2017-07-20 16:42 ` Oleg Nesterov
2017-08-14 16:24 ` Kirill A. Shutemov
3 siblings, 0 replies; 8+ messages in thread
From: Oleg Nesterov @ 2017-07-20 16:42 UTC (permalink / raw)
To: Dmitry Safonov, Thomas Gleixner, Andrew Morton
Cc: Andy Lutomirski, Borislav Petkov, Cyrill Gorcunov, linux-kernel
ping ;)
On 07/10, Oleg Nesterov wrote:
>
> Documentation/admin-guide/kernel-parameters.txt says:
>
> norandmaps Don't use address space randomization. Equivalent
> to echo 0 > /proc/sys/kernel/randomize_va_space
>
> but it doesn't work because arch_rnd() which is used to randomize
> mm->mmap_base returns a random value unconditionally.
>
> Shift the PF_RANDOMIZE check from arch_mmap_rnd() to arch_rnd().
>
> Fixes: 1b028f784e8c ("x86/mm: Introduce mmap_compat_base() for 32-bit mmap()")
> Signed-off-by: Oleg Nesterov <oleg@redhat.com>
> ---
> arch/x86/mm/mmap.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/arch/x86/mm/mmap.c b/arch/x86/mm/mmap.c
> index 19ad095..6369d04 100644
> --- a/arch/x86/mm/mmap.c
> +++ b/arch/x86/mm/mmap.c
> @@ -82,13 +82,13 @@ static int mmap_is_legacy(void)
>
> static unsigned long arch_rnd(unsigned int rndbits)
> {
> + if (!(current->flags & PF_RANDOMIZE))
> + return 0;
> return (get_random_long() & ((1UL << rndbits) - 1)) << PAGE_SHIFT;
> }
>
> unsigned long arch_mmap_rnd(void)
> {
> - if (!(current->flags & PF_RANDOMIZE))
> - return 0;
> return arch_rnd(mmap_is_ia32() ? mmap32_rnd_bits : mmap64_rnd_bits);
> }
>
> --
> 2.5.0
>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 1/2] x86: fix norandmaps
2017-07-10 11:14 [PATCH 1/2] x86: fix norandmaps Oleg Nesterov
` (2 preceding siblings ...)
2017-07-20 16:42 ` Oleg Nesterov
@ 2017-08-14 16:24 ` Kirill A. Shutemov
2017-08-14 16:43 ` Oleg Nesterov
3 siblings, 1 reply; 8+ messages in thread
From: Kirill A. Shutemov @ 2017-08-14 16:24 UTC (permalink / raw)
To: Oleg Nesterov
Cc: Dmitry Safonov, Thomas Gleixner, Andy Lutomirski,
Borislav Petkov, Cyrill Gorcunov, linux-kernel
On Mon, Jul 10, 2017 at 01:14:29PM +0200, Oleg Nesterov wrote:
> Documentation/admin-guide/kernel-parameters.txt says:
>
> norandmaps Don't use address space randomization. Equivalent
> to echo 0 > /proc/sys/kernel/randomize_va_space
>
> but it doesn't work because arch_rnd() which is used to randomize
> mm->mmap_base returns a random value unconditionally.
>
> Shift the PF_RANDOMIZE check from arch_mmap_rnd() to arch_rnd().
>
> Fixes: 1b028f784e8c ("x86/mm: Introduce mmap_compat_base() for 32-bit mmap()")
> Signed-off-by: Oleg Nesterov <oleg@redhat.com>
It also fixes personality(ADDR_NO_RANDOMIZE).
Acked-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
--
Kirill A. Shutemov
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 1/2] x86: fix norandmaps
2017-08-14 16:24 ` Kirill A. Shutemov
@ 2017-08-14 16:43 ` Oleg Nesterov
2017-08-14 16:44 ` Cyrill Gorcunov
0 siblings, 1 reply; 8+ messages in thread
From: Oleg Nesterov @ 2017-08-14 16:43 UTC (permalink / raw)
To: Kirill A. Shutemov
Cc: Dmitry Safonov, Thomas Gleixner, Andy Lutomirski,
Borislav Petkov, Cyrill Gorcunov, linux-kernel
On 08/14, Kirill A. Shutemov wrote:
>
> On Mon, Jul 10, 2017 at 01:14:29PM +0200, Oleg Nesterov wrote:
> > Documentation/admin-guide/kernel-parameters.txt says:
> >
> > norandmaps Don't use address space randomization. Equivalent
> > to echo 0 > /proc/sys/kernel/randomize_va_space
> >
> > but it doesn't work because arch_rnd() which is used to randomize
> > mm->mmap_base returns a random value unconditionally.
> >
> > Shift the PF_RANDOMIZE check from arch_mmap_rnd() to arch_rnd().
> >
> > Fixes: 1b028f784e8c ("x86/mm: Introduce mmap_compat_base() for 32-bit mmap()")
> > Signed-off-by: Oleg Nesterov <oleg@redhat.com>
>
> It also fixes personality(ADDR_NO_RANDOMIZE).
Yes, good point.
> Acked-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
OK, thanks Kirill and Cyrill, I'll resend tomorrow with all acks I got.
Oleg.
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 1/2] x86: fix norandmaps
2017-08-14 16:43 ` Oleg Nesterov
@ 2017-08-14 16:44 ` Cyrill Gorcunov
0 siblings, 0 replies; 8+ messages in thread
From: Cyrill Gorcunov @ 2017-08-14 16:44 UTC (permalink / raw)
To: Oleg Nesterov
Cc: Kirill A. Shutemov, Dmitry Safonov, Thomas Gleixner,
Andy Lutomirski, Borislav Petkov, linux-kernel
On Mon, Aug 14, 2017 at 06:43:10PM +0200, Oleg Nesterov wrote:
> > Acked-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
>
> OK, thanks Kirill and Cyrill, I'll resend tomorrow with all acks I got.
I don't think you need my ack but if any
Acked-by: Cyrill Gorcunov <gorcunov@openvz.org>
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2017-08-14 16:49 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-07-10 11:14 [PATCH 1/2] x86: fix norandmaps Oleg Nesterov
2017-07-10 11:14 ` [PATCH 2/2] x86/elf: remove the unnecessary ADDR_NO_RANDOMIZE checks in stack_maxrandom_size() and randomize_stack_top() Oleg Nesterov
2017-07-10 11:58 ` Dmitry Safonov
2017-07-10 11:56 ` [PATCH 1/2] x86: fix norandmaps Dmitry Safonov
2017-07-20 16:42 ` Oleg Nesterov
2017-08-14 16:24 ` Kirill A. Shutemov
2017-08-14 16:43 ` Oleg Nesterov
2017-08-14 16:44 ` Cyrill Gorcunov
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.