[PATCH] mm: Fix overflow check in expand_upwards()
From: Jörn Engel
Date: Thu Jun 29 2017 - 19:04:15 EST
I believe the overflow check was correct, then got subtly broken by
commit bd726c90b6b8
Author: Helge Deller <deller@xxxxxx>
Date: Mon Jun 19 17:34:05 2017 +0200
Allow stack to grow up to address space limit
The old overflow check may have been a bit subtle and I suppose Helge
missed its importance.
if (!address)
return -ENOMEM;
Functionally the my check is identical to the old one. I just hope the
alternative form (and comment!) make it harder to miss and break things
in a future patch.
Signed-off-by: Joern Engel <joern@xxxxxxxxx>
---
mm/mmap.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/mm/mmap.c b/mm/mmap.c
index a5e3dcd75e79..7366f62c31f4 100644
--- a/mm/mmap.c
+++ b/mm/mmap.c
@@ -2232,7 +2232,8 @@ int expand_upwards(struct vm_area_struct *vma, unsigned long address)
/* Guard against exceeding limits of the address space. */
address &= PAGE_MASK;
- if (address >= TASK_SIZE)
+ /* second check is for integer overflow */
+ if (address >= TASK_SIZE || address + PAGE_SIZE < address)
return -ENOMEM;
address += PAGE_SIZE;
--
2.1.4