All of lore.kernel.org
 help / color / mirror / Atom feed
From: Dmitry Safonov <dsafonov@virtuozzo.com>
To: Oleg Nesterov <oleg@redhat.com>, Thomas Gleixner <tglx@linutronix.de>
Cc: Andy Lutomirski <luto@kernel.org>, Borislav Petkov <bp@suse.de>,
	Cyrill Gorcunov <gorcunov@openvz.org>,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH 1/2] x86: fix norandmaps
Date: Mon, 10 Jul 2017 14:56:00 +0300	[thread overview]
Message-ID: <2a3a4365-b3e1-5d52-0f4c-d7bdfaff627f@virtuozzo.com> (raw)
In-Reply-To: <20170710111429.GA20038@redhat.com>

On 07/10/2017 02:14 PM, Oleg Nesterov wrote:
> Documentation/admin-guide/kernel-parameters.txt says:
> 
>      norandmaps  Don't use address space randomization. Equivalent
>                  to echo 0 > /proc/sys/kernel/randomize_va_space
> 
> but it doesn't work because arch_rnd() which is used to randomize
> mm->mmap_base returns a random value unconditionally.
> 
> Shift the PF_RANDOMIZE check from arch_mmap_rnd() to arch_rnd().
> 
> Fixes: 1b028f784e8c ("x86/mm: Introduce mmap_compat_base() for 32-bit mmap()")
> Signed-off-by: Oleg Nesterov <oleg@redhat.com>

Thanks, Oleg,
Reviewed-by: Dmitry Safonov <dsafonov@virtuozzo.com>

> ---
>   arch/x86/mm/mmap.c | 4 ++--
>   1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/arch/x86/mm/mmap.c b/arch/x86/mm/mmap.c
> index 19ad095..6369d04 100644
> --- a/arch/x86/mm/mmap.c
> +++ b/arch/x86/mm/mmap.c
> @@ -82,13 +82,13 @@ static int mmap_is_legacy(void)
>   
>   static unsigned long arch_rnd(unsigned int rndbits)
>   {
> +	if (!(current->flags & PF_RANDOMIZE))
> +		return 0;
>   	return (get_random_long() & ((1UL << rndbits) - 1)) << PAGE_SHIFT;
>   }
>   
>   unsigned long arch_mmap_rnd(void)
>   {
> -	if (!(current->flags & PF_RANDOMIZE))
> -		return 0;
>   	return arch_rnd(mmap_is_ia32() ? mmap32_rnd_bits : mmap64_rnd_bits);
>   }
>   
> 


-- 
              Dmitry

  parent reply	other threads:[~2017-07-10 11:56 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-07-10 11:14 [PATCH 1/2] x86: fix norandmaps Oleg Nesterov
2017-07-10 11:14 ` [PATCH 2/2] x86/elf: remove the unnecessary ADDR_NO_RANDOMIZE checks in stack_maxrandom_size() and randomize_stack_top() Oleg Nesterov
2017-07-10 11:58   ` Dmitry Safonov
2017-07-10 11:56 ` Dmitry Safonov [this message]
2017-07-20 16:42 ` [PATCH 1/2] x86: fix norandmaps Oleg Nesterov
2017-08-14 16:24 ` Kirill A. Shutemov
2017-08-14 16:43   ` Oleg Nesterov
2017-08-14 16:44     ` Cyrill Gorcunov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2a3a4365-b3e1-5d52-0f4c-d7bdfaff627f@virtuozzo.com \
    --to=dsafonov@virtuozzo.com \
    --cc=bp@suse.de \
    --cc=gorcunov@openvz.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=luto@kernel.org \
    --cc=oleg@redhat.com \
    --cc=tglx@linutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.