[ubuntu-hardened] [kernel-hardening] Re: Add overflow protection to kref

PaX Team pageexec at freemail.hu
Fri Feb 24 22:14:43 UTC 2012


On 24 Feb 2012 at 14:04, David Windsor wrote:

> Suggestions on recovering from an overflow here?

do what PaX does? :)

1. saturate the refcount
2. report the event (pax_report_refcount_overflow)
3. kill the triggering userland process (this may be optional but it's a good measure
   if you have stuff like grsecurity's lockout feature)

> 2. Detect the overflow before it happens, don't increment the counter,
> issue a warning but no BUG.
> This could also lead to some "undefined" behavior in subsystems.

it's called a memory leak :).




More information about the ubuntu-hardened mailing list