lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 9 Nov 2017 09:25:06 -0800 From: "tip-bot for Kirill A. Shutemov" <tipbot@...or.com> To: linux-tip-commits@...r.kernel.org Cc: keescook@...omium.org, akpm@...ux-foundation.org, mhocko@...e.com, mingo@...nel.org, tglx@...utronix.de, linux-kernel@...r.kernel.org, hpa@...or.com, npiggin@...il.com, kirill.shutemov@...ux.intel.com Subject: [tip:x86/urgent] x86/mm: Fix ELF_ET_DYN_BASE for 5-level paging Commit-ID: be739f4b5ddece74ef25e2304b17a7fd24575e9b Gitweb: https://git.kernel.org/tip/be739f4b5ddece74ef25e2304b17a7fd24575e9b Author: Kirill A. Shutemov <kirill.shutemov@...ux.intel.com> AuthorDate: Tue, 7 Nov 2017 13:38:04 +0300 Committer: Thomas Gleixner <tglx@...utronix.de> CommitDate: Thu, 9 Nov 2017 18:20:20 +0100 x86/mm: Fix ELF_ET_DYN_BASE for 5-level paging On machines with 5-level paging we don't want to allocate mapping above 47-bit unless user explicitly asked for it. See b569bab78d8d ("x86/mm: Prepare to expose larger address space to userspace") for details. c715b72c1ba4 ("mm: revert x86_64 and arm64 ELF_ET_DYN_BASE base changes") broke the behaviour. After the commit elf binary and heap got mapped above 47-bits. Use DEFAULT_MAP_WINDOW instead of TASK_SIZE to determine ELF_ET_DYN_BASE so it's forced to be below 47-bits unconditionally. Fixes: c715b72c1ba4 ("mm: revert x86_64 and arm64 ELF_ET_DYN_BASE base changes") Signed-off-by: Kirill A. Shutemov <kirill.shutemov@...ux.intel.com> Signed-off-by: Thomas Gleixner <tglx@...utronix.de> Acked-by: Michal Hocko <mhocko@...e.com> Cc: Kees Cook <keescook@...omium.org> Cc: Nicholas Piggin <npiggin@...il.com> Cc: linux-mm@...ck.org Cc: Andrew Morton <akpm@...ux-foundation.org> Link: https://lkml.kernel.org/r/20171107103804.47341-1-kirill.shutemov@linux.intel.com --- arch/x86/include/asm/elf.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/include/asm/elf.h b/arch/x86/include/asm/elf.h index c1a125e4..3a091ce 100644 --- a/arch/x86/include/asm/elf.h +++ b/arch/x86/include/asm/elf.h @@ -253,7 +253,7 @@ extern int force_personality32; * space open for things that want to use the area for 32-bit pointers. */ #define ELF_ET_DYN_BASE (mmap_is_ia32() ? 0x000400000UL : \ - (TASK_SIZE / 3 * 2)) + (DEFAULT_MAP_WINDOW / 3 * 2)) /* This yields a mask that user programs can use to figure out what instruction set this CPU supports. This could be done in user space,
Powered by blists - more mailing lists