lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAKgNAki=AL+KdYDdYnE8ZhjK-tUf5cZ163BWPe6GRM0rpi-z7w@mail.gmail.com>
Date:	Mon, 22 Oct 2012 17:53:45 +0200
From:	"Michael Kerrisk (man-pages)" <mtk.manpages@...il.com>
To:	Andi Kleen <ak@...ux.intel.com>
Cc:	Andi Kleen <andi@...stfloor.org>, akpm@...ux-foundation.org,
	linux-mm@...ck.org, linux-kernel@...r.kernel.org,
	Hillf Danton <dhillf@...il.com>
Subject: Re: [PATCH] MM: Support more pagesizes for MAP_HUGETLB/SHM_HUGETLB v6

On Mon, Oct 22, 2012 at 5:36 PM, Andi Kleen <ak@...ux.intel.com> wrote:
>> Not sure of your notation there. I assume 31..27 means 5 bits (32
>> through to 28 inclusive, 27 excluded). That gives you just 2^31 ==
> [27...31]

(Hmm -- sleeping as I wrote that, but I at least got the end point right.)

> You're right it's only 5 bits, so just 2GB.
>
> Thinking about it more PowerPC has a 16GB page, so we probably
> need to move this to prot.
>
> However I'm not sure if any architectures use let's say the high
> 8 bits of prot.

This is all seems to make an awful muck of the API...

I'm not sure whether anything is using the high 8 bits of prot, bun
passing I note that there seems to be no check that the unused bits
are zeroed so there's a small chance  existing apps are passing random
garbage there. (Of course, mmap() is hardly the only API to have that
fault, and it hasn't stopped us from reusing bits in those APIs,
though sometimes we've gotten bitten by apps that did pass in random
garbage).

>> But there seems an obvious solution here: given your value in those
>> bits (call it 'n'), the why not apply a multiplier. I mean, certainly
>> you never want a value <= 12 for n, and I suspect that the reasonable
>> minimum could be much larger (e.g., 2^16). Call that minimum M. Then
>> you could interpret the value in your bits as meaning a page size of
>>
>>     (2^n) * M
>
> I considered that, but it would seem ugly and does not add that
> many bits.
>
>>
>> > So this will use up all remaining flag bits now.
>>
>> On the other hand, that seems really bad. It looks like that kills the
>> ability to further extend the mmap() API with new flags in the future.
>> It doesn't sound like we should be doing that.
>
> You can always add flags to PROT or add a mmap3(). Has been done before.
> Or just don't do any new MAP_SECURITY_HOLEs

There seems to be a reasonable argument here for an mmap3() with a
64-bit flags argument...

Cheers,

Michael

-- 
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Author of "The Linux Programming Interface"; http://man7.org/tlpi/
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ