lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 23 Sep 2021 17:46:51 +0200 From: Alexander Potapenko <glider@...gle.com> To: Marco Elver <elver@...gle.com> Cc: Andrew Morton <akpm@...ux-foundation.org>, Dmitry Vyukov <dvyukov@...gle.com>, Jann Horn <jannh@...gle.com>, Aleksandr Nogikh <nogikh@...gle.com>, Taras Madan <tarasmadan@...gle.com>, LKML <linux-kernel@...r.kernel.org>, Linux Memory Management List <linux-mm@...ck.org>, kasan-dev <kasan-dev@...glegroups.com> Subject: Re: [PATCH v3 5/5] kfence: add note to documentation about skipping covered allocations On Thu, Sep 23, 2021 at 12:48 PM Marco Elver <elver@...gle.com> wrote: > > Add a note briefly mentioning the new policy about "skipping currently > covered allocations if pool close to full." Since this has a notable > impact on KFENCE's bug-detection ability on systems with large uptimes, > it is worth pointing out the feature. > > Signed-off-by: Marco Elver <elver@...gle.com> > Reviewed-by: Dmitry Vyukov <dvyukov@...gle.com> Acked-by: Alexander Potapenko <glider@...gle.com> > --- > v2: > * Rewrite. > --- > Documentation/dev-tools/kfence.rst | 11 +++++++++++ > 1 file changed, 11 insertions(+) > > diff --git a/Documentation/dev-tools/kfence.rst b/Documentation/dev-tools/kfence.rst > index 0fbe3308bf37..d45f952986ae 100644 > --- a/Documentation/dev-tools/kfence.rst > +++ b/Documentation/dev-tools/kfence.rst > @@ -269,6 +269,17 @@ tail of KFENCE's freelist, so that the least recently freed objects are reused > first, and the chances of detecting use-after-frees of recently freed objects > is increased. > > +If pool utilization reaches 75% (default) or above, to reduce the risk of the > +pool eventually being fully occupied by allocated objects yet ensure diverse > +coverage of allocations, KFENCE limits currently covered allocations of the > +same source from further filling up the pool. The "source" of an allocation is > +based on its partial allocation stack trace. A side-effect is that this also > +limits frequent long-lived allocations (e.g. pagecache) of the same source > +filling up the pool permanently, which is the most common risk for the pool > +becoming full and the sampled allocation rate dropping to zero. The threshold > +at which to start limiting currently covered allocations can be configured via > +the boot parameter ``kfence.skip_covered_thresh`` (pool usage%). > + > Interface > --------- > > -- > 2.33.0.464.g1972c5931b-goog > -- Alexander Potapenko Software Engineer Google Germany GmbH Erika-Mann-Straße, 33 80636 München Geschäftsführer: Paul Manicle, Halimah DeLaine Prado Registergericht und -nummer: Hamburg, HRB 86891 Sitz der Gesellschaft: Hamburg
Powered by blists - more mailing lists