lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.1.00.0802151216330.19332@chino.kir.corp.google.com>
Date:	Fri, 15 Feb 2008 12:23:53 -0800 (PST)
From:	David Rientjes <rientjes@...gle.com>
To:	Paul Jackson <pj@....com>
cc:	akpm@...ux-foundation.org, clameter@....com,
	Lee.Schermerhorn@...com, ak@...e.de, linux-kernel@...r.kernel.org
Subject: Re: [patch 3/4] mempolicy: add MPOL_F_STATIC_NODES flag

On Fri, 15 Feb 2008, Paul Jackson wrote:

> I don't think so.  It's not possible to detemine if exactly the low
> eight bits of the 'policy' short are a valid mode, -however- that
> "eight" is a spurious detail.  Remove it.
> 

Sure it is, you can determine if the low MPOL_FLAG_SHIFT bits are a valid 
mode by masking off the upper bits and testing if the result is >= 
MPOL_MAX.

> Instead of specifying that the 'policy' short consists of two bytes,
> one for mode and one for flags, rather specify that the policy fields
> consists of some high bits for flags, and the remaining low bits
> (however many remain) for the mode.
> 

Well, it's still an implementation detail that needs to be explicitly 
defined, otherwise we have no way to separate mode from flags when the 
user passes in their int formal as part of either syscall.

And given the recent requirements for a perfectly formed set_mempolicy() 
or mbind() syscall (as a result of the discussion about allowing non-empty 
nodemasks with MPOL_DEFAULT), we need to ensure that invalid flags are not 
being passed.

We should make sure to return -EINVAL to a user specifying an invalid flag 
if, for example, they are using an older kernel that doesn't support what 
they're asking for.

It would be possible to do all of this in both sys_set_mempolicy() and 
sys_mbind() by masking off the set of possible modes and checking the 
result for being >= MPOL_MAX:

	if ((mode & MPOL_MODE_FLAGS) >= MPOL_MAX)
		return -EINVAL;
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ