|
Message-ID: <20120812180021.GA32340@albatros> Date: Sun, 12 Aug 2012 22:00:21 +0400 From: Vasily Kulikov <segoon@...nwall.com> To: owl-dev@...ts.openwall.com Subject: kref_overflow Hi, The light version of PAX_REFCOUNT was backported to Owl kernel. It protects kref only, not all atomic_t. The pro is almost zero maintenance time. The con is obviously missing protection for counters which were not explicitly marked as refcounter by using kref instead of atomic_t. The sysctl for it is kernel.kref_overflow_action. It can be set to: 0 - no overflow check at all. Current upstream behaviour. 1 - protection is on (default). Each overflow emits stack dump and a big log warning. 2 - the same as 1 plus the current task is killed. 3 - an overflow leads to kernel panic. I'd want to implement the same scheme for PAX_USERCOPY with kernel.usercopy_overflow_action. -- Vasily
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.