The patch titled Subject: ipc/ipc_sysctl.c: clamp msgmni and shmmni to the real IPCMNI limit has been added to the -mm tree. Its filename is ipc-clamp-msgmni-and-shmmni-to-the-real-ipcmni-limit.patch This patch should soon appear at http://ozlabs.org/~akpm/mmots/broken-out/ipc-clamp-msgmni-and-shmmni-to-the-real-ipcmni-limit.patch and later at http://ozlabs.org/~akpm/mmotm/broken-out/ipc-clamp-msgmni-and-shmmni-to-the-real-ipcmni-limit.patch Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/process/submit-checklist.rst when testing your code *** The -mm tree is included into linux-next and is updated there every 3-4 working days ------------------------------------------------------ From: Waiman Long <longman@xxxxxxxxxx> Subject: ipc/ipc_sysctl.c: clamp msgmni and shmmni to the real IPCMNI limit A user can write arbitrary integer values to msgmni and shmmni sysctl parameters without getting error, but the actual limit is really IPCMNI (32k). This can mislead users as they think they can get a value that is not real. Enforcing the limit by failing the sysctl parameter write, however, can break existing user applications. Instead, the range clamping flag is set to enforce the limit without failing existing user code. Users can easily figure out if the sysctl parameter value is out of range by either reading back the parameter value or checking the kernel ring buffer for warning. Link: http://lkml.kernel.org/r/1520885744-1546-5-git-send-email-longman@xxxxxxxxxx Signed-off-by: Waiman Long <longman@xxxxxxxxxx> Reviewed-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> Cc: Davidlohr Bueso <dave@xxxxxxxxxxxx> Cc: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx> Cc: Alexey Dobriyan <adobriyan@xxxxxxxxx> Cc: Al Viro <viro@xxxxxxxxxxxxxxxxxx> Cc: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx> Cc: Kees Cook <keescook@xxxxxxxxxxxx> Cc: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx> Cc: Matthew Wilcox <willy@xxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- ipc/ipc_sysctl.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff -puN ipc/ipc_sysctl.c~ipc-clamp-msgmni-and-shmmni-to-the-real-ipcmni-limit ipc/ipc_sysctl.c --- a/ipc/ipc_sysctl.c~ipc-clamp-msgmni-and-shmmni-to-the-real-ipcmni-limit +++ a/ipc/ipc_sysctl.c @@ -99,6 +99,7 @@ static int proc_ipc_auto_msgmni(struct c static int zero; static int one = 1; static int int_max = INT_MAX; +static int ipc_mni = IPCMNI; static struct ctl_table ipc_kern_table[] = { { @@ -120,7 +121,10 @@ static struct ctl_table ipc_kern_table[] .data = &init_ipc_ns.shm_ctlmni, .maxlen = sizeof(init_ipc_ns.shm_ctlmni), .mode = 0644, - .proc_handler = proc_ipc_dointvec, + .proc_handler = proc_ipc_dointvec_minmax, + .extra1 = &zero, + .extra2 = &ipc_mni, + .flags = CTL_FLAGS_CLAMP_RANGE, }, { .procname = "shm_rmid_forced", @@ -147,7 +151,8 @@ static struct ctl_table ipc_kern_table[] .mode = 0644, .proc_handler = proc_ipc_dointvec_minmax, .extra1 = &zero, - .extra2 = &int_max, + .extra2 = &ipc_mni, + .flags = CTL_FLAGS_CLAMP_RANGE, }, { .procname = "auto_msgmni", _ Patches currently in -mm which might be from longman@xxxxxxxxxx are list_lru-prefetch-neighboring-list-entries-before-acquiring-lock.patch proc-sysctl-fix-typo-in-sysctl_check_table_array.patch sysctl-add-kdoc-comments-to-do_proc_douintvec_minmax_conv_param.patch sysctl-add-flags-to-support-min-max-range-clamping.patch proc-sysctl-check-for-invalid-flags-bits.patch sysctl-warn-when-a-clamped-sysctl-parameter-is-set-out-of-range.patch ipc-clamp-msgmni-and-shmmni-to-the-real-ipcmni-limit.patch ipc-clamp-semmni-to-the-real-ipcmni-limit.patch test_sysctl-add-range-clamping-test.patch -- To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html