All of lore.kernel.org
 help / color / mirror / Atom feed
From: valdis.kletnieks@vt.edu
To: Jann Horn <jannh@google.com>
Cc: Matthew Wilcox <willy@infradead.org>,
	linux-mm@kvack.org,
	Kernel Hardening <kernel-hardening@lists.openwall.com>,
	kernel list <linux-kernel@vger.kernel.org>,
	"Kirill A. Shutemov" <kirill.shutemov@linux.intel.com>
Subject: Re: [RFC] Warn the user when they could overflow mapcount
Date: Thu, 08 Feb 2018 12:58:42 -0500	[thread overview]
Message-ID: <24367.1518112722@turing-police.cc.vt.edu> (raw)
In-Reply-To: <CAG48ez2-MTJ2YrS5fPZi19RY6P_6NWuK1U5CcQpJ25=xrGSy_A@mail.gmail.com>

[-- Attachment #1: Type: text/plain, Size: 891 bytes --]

On Thu, 08 Feb 2018 03:56:26 +0100, Jann Horn said:

> I wouldn't be too surprised if there are more 32-bit overflows that
> start being realistic once you put something on the order of terabytes
> of memory into one machine, given that refcount_t is 32 bits wide -
> for example, the i_count. See
> https://bugs.chromium.org/p/project-zero/issues/detail?id=809 for an
> example where, given a sufficiently high RLIMIT_MEMLOCK, it was
> possible to overflow a 32-bit refcounter on a system with just ~32GiB
> of free memory (minimum required to store 2^32 64-bit pointers).
>
> On systems with RAM on the order of terabytes, it's probably a good
> idea to turn on refcount hardening to make issues like that
> non-exploitable for now.

I have at least 10 systems across the hall that have 3T of RAM on them
across our various HPC clusters.  So this is indeed no longer a hypothetical
issue.

[-- Attachment #2: Type: application/pgp-signature, Size: 486 bytes --]

  parent reply	other threads:[~2018-02-08 17:58 UTC|newest]

Thread overview: 39+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-02-08  2:11 [RFC] Warn the user when they could overflow mapcount Matthew Wilcox
2018-02-08  2:11 ` Matthew Wilcox
2018-02-08  2:56 ` Jann Horn
2018-02-08  2:56   ` Jann Horn
2018-02-08  4:04   ` Matthew Wilcox
2018-02-08  4:04     ` Matthew Wilcox
2018-02-08 17:58   ` valdis.kletnieks [this message]
2018-02-08 18:05   ` Daniel Micay
2018-02-08 18:05     ` Daniel Micay
2018-02-08 18:56     ` Matthew Wilcox
2018-02-08 18:56       ` Matthew Wilcox
2018-02-08 19:33       ` Daniel Micay
2018-02-08 19:33         ` Daniel Micay
2018-02-08 19:42         ` Matthew Wilcox
2018-02-08 19:42           ` Matthew Wilcox
2018-02-08 19:48           ` Daniel Micay
2018-02-08 19:48             ` Daniel Micay
2018-02-08 20:21             ` Matthew Wilcox
2018-02-08 20:21               ` Matthew Wilcox
2018-02-08 21:37               ` [RFC] Limit mappings to ten per page per process Matthew Wilcox
2018-02-08 21:37                 ` Matthew Wilcox
2018-02-09  4:26                 ` Kirill A. Shutemov
2018-02-09  4:26                   ` Kirill A. Shutemov
2018-02-14 13:51                   ` Matthew Wilcox
2018-02-14 13:51                     ` Matthew Wilcox
2018-02-14 14:05                     ` Kirill A. Shutemov
2018-02-14 14:05                       ` Kirill A. Shutemov
2018-02-09  1:47               ` [RFC] Warn the user when they could overflow mapcount Daniel Micay
2018-02-09  1:47                 ` Daniel Micay
2018-02-08  3:18 ` Tobin C. Harding
2018-02-08  3:18   ` Tobin C. Harding
2018-02-08  4:06   ` Matthew Wilcox
2018-02-08  4:06     ` Matthew Wilcox
2018-03-02 21:26 ` [RFC] Handle mapcount overflows Matthew Wilcox
2018-03-02 21:26   ` Matthew Wilcox
2018-03-02 22:03   ` Matthew Wilcox
2018-03-02 22:03     ` Matthew Wilcox
2019-05-01 14:41   ` Jann Horn
2019-05-01 14:41     ` Jann Horn

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=24367.1518112722@turing-police.cc.vt.edu \
    --to=valdis.kletnieks@vt.edu \
    --cc=jannh@google.com \
    --cc=kernel-hardening@lists.openwall.com \
    --cc=kirill.shutemov@linux.intel.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=willy@infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.