Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp16989pxv; Wed, 21 Jul 2021 14:11:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx/qJKJ1pJtqHufXAi6ajNvS1xZzHj6+vmSy5Xo16+IbH85bFtcVpcRcTmWHO3P0/IUzhT+ X-Received: by 2002:a92:d9ce:: with SMTP id n14mr24887447ilq.29.1626901527213; Wed, 21 Jul 2021 14:05:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626901527; cv=none; d=google.com; s=arc-20160816; b=rCj5gARNfEbHnum41PNSgjgR3SnHhiwZySN+53bRtdBLBGHv+l/WQ3nZnBJnkR9u+6 NWg5R3PTS7wXHFQflLsdmOQnSlZl6iYfUsHJXYxzzz/Ix/ybpLG5T92J/qWLr/vQpAzT 1T+hlkP/yyFdhADXRQQCf/2wLo8XAvqgRQid3rmdfTsKlZ3a6RPAcbQDhqBWXwxLHeSj V9Uf263FXuLbHGzefO+gaORQnmLYYp2vzvo8tUJedtVv4jfKhy7dNMGvueuz6QnMSPwa FJFDnNroinPnfWpJOgQwSnNmZXxCMaz1+UQx0JnsJPZI4To3nXJ/EUvPov/l4hOW8bJn 563w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=QAFE3m3sGfm0XHof4+1aoQntJ/lWm+TZn6x1+h/OpC0=; b=GcJchBka8tojLEE0r+A8kPS1OKm485fR6Z329KWNY/cs+Vkk54hOkYwx8ROu6AAw9h x9lhE066IWbf2qpCLVnu3S7UIGiISvOuydYllpUVmYA9q717MtibabCbBh9VfraCgvmf bcrqEymvIWsQr/0zFNfZKULeDs0RRefKRFr87vnQwRyNXnh0mYXyPeWKIHNdiQKXS1xM 3y5I2dTPIZ9lJ3K7OJAa2jMPYltPOJ/C/xO4gOP+sJUXWJIYYtZLRP2Ngn1cQgGd5lFr /Xewl6mmWmccDwEjWw/GHB/9tgWrZpOJpp6i6KjkXvBNa+F0LzUFd24HI1+yOivW4u4Q JKDQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=Ph89ZAA4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u4si30373185ilq.51.2021.07.21.14.05.15; Wed, 21 Jul 2021 14:05:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=Ph89ZAA4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238744AbhGUSBi (ORCPT + 99 others); Wed, 21 Jul 2021 14:01:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58438 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236799AbhGUSBi (ORCPT ); Wed, 21 Jul 2021 14:01:38 -0400 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 19102C061575 for ; Wed, 21 Jul 2021 11:42:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=Content-Transfer-Encoding:MIME-Version: Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:In-Reply-To:References; bh=QAFE3m3sGfm0XHof4+1aoQntJ/lWm+TZn6x1+h/OpC0=; b=Ph89ZAA4aD3d30oY3o18nv8iGb /7JEcnDFcyBJhO9jTARxkPybXEPs2dWWC5OAr4/6chaGfOkkSuaRxlyq/TEf4RemeTrrx4lRL9kpT KbJLI8mUEVSkmB8c2zR5FjkP1/fVj5xHjbcuByyI9ZSCyiPEBsoBS5t0N6EzTNFMmBPR+w1stoFX3 EIUAc16GkvjBNREPmf8f7LyjYxyA2+FsJKYCW9Rou6Re74Cvw2atNTPqTizJhwnqB61uGV1k/tjVr 3EclEYaqmlZhdhZkaCIVN8QWbeqS8BcjIhmZ3nIa9+iDwq5OajjWiiC/feamQb5Wxukiy7x2DPUwg sMtWidJA==; Received: from willy by casper.infradead.org with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1m6H9z-009V5o-23; Wed, 21 Jul 2021 18:41:42 +0000 From: "Matthew Wilcox (Oracle)" To: Al Viro , Qualys Security Advisory , Eric Sandeen , Linus Torvalds , linux-mm@kvack.org, linux-kernel@vger.kernel.org Cc: "Matthew Wilcox (Oracle)" Subject: [PATCH] mm: Make kvmalloc refuse to allocate more than 2GB Date: Wed, 21 Jul 2021 19:41:31 +0100 Message-Id: <20210721184131.2264356-1-willy@infradead.org> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org It's generally dangerous to allocate such large quantities of memory within the kernel owing to our propensity to use 'int' to represent a length. If somebody really needs it, we can add a kvmalloc_large() later, but let's default to "You can't allocate that much memory". Signed-off-by: Matthew Wilcox (Oracle) --- fs/seq_file.c | 3 --- mm/util.c | 7 +++++++ 2 files changed, 7 insertions(+), 3 deletions(-) diff --git a/fs/seq_file.c b/fs/seq_file.c index 4a2cda04d3e2..b117b212ef28 100644 --- a/fs/seq_file.c +++ b/fs/seq_file.c @@ -32,9 +32,6 @@ static void seq_set_overflow(struct seq_file *m) static void *seq_buf_alloc(unsigned long size) { - if (unlikely(size > MAX_RW_COUNT)) - return NULL; - return kvmalloc(size, GFP_KERNEL_ACCOUNT); } diff --git a/mm/util.c b/mm/util.c index 9043d03750a7..8ff2a8924d5f 100644 --- a/mm/util.c +++ b/mm/util.c @@ -593,6 +593,13 @@ void *kvmalloc_node(size_t size, gfp_t flags, int node) if (ret || size <= PAGE_SIZE) return ret; + /* + * Succeeding for sizes above 2GiB can lead to truncation if + * someone casts the size to an int. + */ + if (size > INT_MAX) + return NULL; + return __vmalloc_node(size, 1, flags, node, __builtin_return_address(0)); } -- 2.30.2