Skip to content
  • Manfred Spraul's avatar
    ipc/shm.c: check for ulong overflows in shmat · 247a8ce8
    Manfred Spraul authored
    
    
    The increase of SHMMAX/SHMALL is a 4 patch series.
    
    The change itself is trivial, the only problem are interger overflows.
    The overflows are not new, but if we make huge values the default, then
    the code should be free from overflows.
    
    SHMMAX:
    
    - shmmem_file_setup places a hard limit on the segment size:
      MAX_LFS_FILESIZE.
    
      On 32-bit, the limit is > 1 TB, i.e. 4 GB-1 byte segments are
      possible. Rounded up to full pages the actual allocated size
      is 0. --> must be fixed, patch 3
    
    - shmat:
      - find_vma_intersection does not handle overflows properly.
        --> must be fixed, patch 1
    
      - the rest is fine, do_mmap_pgoff limits mappings to TASK_SIZE
        and checks for overflows (i.e.: map 2 GB, starting from
        addr=2.5GB fails).
    
    SHMALL:
    - after creating 8192 segments size (1L<<63)-1, shm_tot overflows and
      returns 0.  --> must be fixed, patch 2.
    
    Userspace:
    - Obviously, there could be overflows in userspace. There is nothing
      we can do, only use values smaller than ULONG_MAX.
      I ended with "ULONG_MAX - 1L<<24":
    
      - TASK_SIZE cannot be used because it is the size of the current
        task. Could be 4G if it's a 32-bit task on a 64-bit kernel.
    
      - The maximum size is not standardized across archs:
        I found TASK_MAX_SIZE, TASK_SIZE_MAX and TASK_SIZE_64.
    
      - Just in case some arch revives a 4G/4G split, nearly
        ULONG_MAX is a valid segment size.
    
      - Using "0" as a magic value for infinity is even worse, because
        right now 0 means 0, i.e. fail all allocations.
    
    This patch (of 4):
    
    find_vma_intersection() does not work as intended if addr+size overflows.
    The patch adds a manual check before the call to find_vma_intersection.
    
    Signed-off-by: default avatarManfred Spraul <manfred@colorfullife.com>
    Acked-by: default avatarDavidlohr Bueso <davidlohr@hp.com>
    Acked-by: default avatarKOSAKI Motohiro <kosaki.motohiro@jp.fujitsu.com>
    Acked-by: default avatarMichael Kerrisk <mtk.manpages@gmail.com>
    Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
    Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
    247a8ce8