Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp3925675imd; Mon, 29 Oct 2018 14:45:19 -0700 (PDT) X-Google-Smtp-Source: AJdET5eCrlfwiDU2PCt9p340ETsQGNNMmdkDubwKAisIQ8sq8ZASI8t4AREvWjJvuu9Zrsglz0ZH X-Received: by 2002:a63:4d1d:: with SMTP id a29-v6mr9669481pgb.408.1540849519810; Mon, 29 Oct 2018 14:45:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540849519; cv=none; d=google.com; s=arc-20160816; b=Fc/GbafflWbOIirFV2fKV2MF/Wrsy+OLObtHIdiSXV3HZZGvvhtd1UO5BcoGeNXD1z 4YDXQrvLvNAXYCVCTYFT3h44W1Aef3l43p7woWdqvcLTpXk317CfzgPih3kyrz21gfV3 rHcEHnw55tuyLma3hn3USnQ5pRDtMBH8PxdsciJYwjVD7mWTspfdmS6u/HtOubltjtfi mnFAmYmx4Y6PfJcu1Dzs654m71wcgNVV5DtQzl/zDa9U2BWv6xiie+xNZNkRCGUHHxHt WHgvF0J+jcvkzRQvXZcFnv46eqNVneE+yESUuxxUEg4JwwikbwePKZCVamdREgYKGAYA bPrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature; bh=k7r2seG3z5i3YUNJYrz1D08/h9fMWVFy8SAfuBQfh7o=; b=p1fyeAohKPrzyNdRxr7JN+6wfDci2lH/x4kbp9B6dRac85ZDC3bah0x8jYg50Nth6w Hppw+OznOh7usLs4c55vtwcvLXFEqk2u5E1/kN4tugrEWo8wXHvU7FGCegrTVjwbYpEj Y+z0AgTRXltf/HIoPoCwurpVnj4+wcYJPVhNVSN8oA/v3qKFOh4V4VHrqWylTVwMQvXO g5TUOj0cuoTOoFSRMOc9JFCn5QW+kXtSUOr6bkpBtuvCWGjmcXY5f0S/jza9arU+oQd6 cvdmDpapw0Rq6OsuHJCyCTBX0B6HBQ1CW2K1qRHZi6pCUwi1XTs/x22oGPz55u2nCxIs mzQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=F+covjRa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n61-v6si20116959plb.169.2018.10.29.14.45.03; Mon, 29 Oct 2018 14:45:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=F+covjRa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727742AbeJ3GfI (ORCPT + 99 others); Tue, 30 Oct 2018 02:35:08 -0400 Received: from mail-yb1-f196.google.com ([209.85.219.196]:40366 "EHLO mail-yb1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727600AbeJ3GfI (ORCPT ); Tue, 30 Oct 2018 02:35:08 -0400 Received: by mail-yb1-f196.google.com with SMTP id g9-v6so4130072ybh.7 for ; Mon, 29 Oct 2018 14:44:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=k7r2seG3z5i3YUNJYrz1D08/h9fMWVFy8SAfuBQfh7o=; b=F+covjRaRi1r61cpKOWIdpkpxFCfAHnoViBO5JMnm3xA+d+vxEkzrj2KVbdMXrqdcI do0eq9qtAo2gU2vZthTaoCt8IV0QpbUIJpfqAgFl6b1kQuc9yEVAZm2go2Px5Ot/+DUM gX+jx1bYpp3e1oQPptbUfs9YpEc3UXFIE1dQ0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=k7r2seG3z5i3YUNJYrz1D08/h9fMWVFy8SAfuBQfh7o=; b=kgSyro5VbrUitfpcHr8GsjFa3YyydmX3+KVYzxsBpRIULC74yZPPVC/w3pvzdb0rSX RMwV+60MtAVxLOI9UrcC+YY3NMTsGZGtfmnSXFutraeeYEGV2nDVkhKVvMiSMbqxOlkv 1ElFgrweVSsbZu+kJW6hSgzsBCKDx9FO4iG9wMx4k3euXUKojPtvDo8h2Zjky1/sk+81 ThYlWEM5cGC3+rp6w7olzK3dcvqxljLuGTJtcTJRTwV8rWCkmbJpbV97ufzz2j+iv1PI V0nMmFEv6TnC1e1ySltG/wnr2bXWf8hEMRussBQ0Pghnq9lQqfUdsveGl3qXoCAiOx8M 1NRw== X-Gm-Message-State: AGRZ1gKACV0j9TW4HB5CqAumM/2AidqKB+bIrXZrKehSBS0PJ+/bq7Yu Lt9XG6lNt3FUH/+VDFgHkeLkYofmpu8= X-Received: by 2002:a25:a2d0:: with SMTP id c16-v6mr15281711ybn.97.1540849474687; Mon, 29 Oct 2018 14:44:34 -0700 (PDT) Received: from mail-yb1-f170.google.com (mail-yb1-f170.google.com. [209.85.219.170]) by smtp.gmail.com with ESMTPSA id w6-v6sm6348295ywl.30.2018.10.29.14.44.30 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 29 Oct 2018 14:44:31 -0700 (PDT) Received: by mail-yb1-f170.google.com with SMTP id j9-v6so4132916ybj.6 for ; Mon, 29 Oct 2018 14:44:30 -0700 (PDT) X-Received: by 2002:a25:8409:: with SMTP id u9-v6mr15889330ybk.421.1540849470122; Mon, 29 Oct 2018 14:44:30 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a25:3990:0:0:0:0:0 with HTTP; Mon, 29 Oct 2018 14:44:29 -0700 (PDT) In-Reply-To: <20181029145818.4bqmy25itjnqhodg@brauner.io> References: <20181016223322.16844-1-christian@brauner.io> <20181029145818.4bqmy25itjnqhodg@brauner.io> From: Kees Cook Date: Mon, 29 Oct 2018 14:44:29 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v3 0/2] sysctl: handle overflow for file-max To: Christian Brauner , Andrew Morton Cc: LKML , "Eric W. Biederman" , "Luis R. Rodriguez" , Joe Lawrence , Waiman Long , Dominik Brodowski , Al Viro , Alexey Dobriyan , Linux API Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 29, 2018 at 7:58 AM, Christian Brauner wrote: > On Wed, Oct 17, 2018 at 12:33:20AM +0200, Christian Brauner wrote: >> Hey, >> >> Here is v3 of this patchset. Changelogs are in the individual commits. >> >> Currently, when writing >> >> echo 18446744073709551616 > /proc/sys/fs/file-max >> >> /proc/sys/fs/file-max will overflow and be set to 0. That quickly >> crashes the system. >> >> The first version of this patch intended to detect the overflow and cap >> at ULONG_MAX. However, we should not do this and rather return EINVAL on >> overflow. The reasons are: >> - this aligns with other sysctl handlers that simply reject overflows >> (cf. [1], [2], and a bunch of others) >> - we already do a partial fail on overflow right now >> Namely, when the TMPBUFLEN is exceeded. So we already reject values >> such as 184467440737095516160 (21 chars) but accept values such as >> 18446744073709551616 (20 chars) but both are overflows. So we should >> just always reject 64bit overflows and not special-case this based on >> the number of chars. >> >> (This patchset is in reference to https://lkml.org/lkml/2018/10/11/585.) > > Just so that we don't forget, can we make sure that this gets picked > into linux-next? :) I was hoping akpm would take this? Andrew, does the v3 look okay to you? -Kees -- Kees Cook