https://github.com/JuliaLang/julia
Revision c8312d356a7fd2f984f490bd692893f33c4c74ba authored by Keno Fischer on 06 January 2017, 01:06:12 UTC, committed by Keno Fischer on 06 January 2017, 01:06:12 UTC
The DirtyCOW exploit mitigation patch in Linux (torvalds/linux@19be0eaff),
introduced a kernel bug, that would cause the kernel to hang if an
application tries to use /proc/<pid>/mem (or ptrace) to bypass page
protections on pages that are backed by transparent huge pages (though only
if the write causes a COW resolution). We make use of this feature in our
cg memory manager on Linux, but since we can't predict whether or not our
mappings will be backed by transparent huge pages, the only safe thing
to do is to fall back to dual maps on kernels that potentially have this
issue. Since the problematic commit is a fix for a high-profile exploit,
it is quite likely that it is included in most stable kernels by now.
I have a patch pending at http://marc.info/?l=linux-mm&m=148359462417378&w=2,
which I expect will fix this in the kernel for 4.10. However, we'll have
to disable the use of /proc/self/mem for all prior kernel versions to
avoid locking up the kernel.
1 parent 6eaec18
History
Tip revision: c8312d356a7fd2f984f490bd692893f33c4c74ba authored by Keno Fischer on 06 January 2017, 01:06:12 UTC
Disable /proc/self/mem memmgr on Linux < 4.10
Tip revision: c8312d3
File Mode Size
.github
base
contrib
deps
doc
etc
examples
src
test
ui
.gitignore -rw-r--r-- 213 bytes
.mailmap -rw-r--r-- 9.5 KB
.travis.yml -rw-r--r-- 5.5 KB
CONTRIBUTING.md -rw-r--r-- 19.4 KB
DISTRIBUTING.md -rw-r--r-- 8.2 KB
HISTORY.md -rw-r--r-- 73.8 KB
LICENSE.md -rw-r--r-- 5.3 KB
Make.inc -rw-r--r-- 33.3 KB
Makefile -rw-r--r-- 26.9 KB
NEWS.md -rw-r--r-- 41.2 KB
README.arm.md -rw-r--r-- 4.5 KB
README.md -rw-r--r-- 28.1 KB
README.windows.md -rw-r--r-- 17.5 KB
VERSION -rw-r--r-- 10 bytes
Windows.inc -rw-r--r-- 1.5 KB
appveyor.yml -rw-r--r-- 2.1 KB

README.md

back to top