Re: [PATCH] Hardening memory maunipulation.

From: Andy Lutomirski
Date: Wed Apr 29 2015 - 18:09:44 EST


On 04/29/2015 08:39 AM, Shawn Chang wrote:
From: Shawn C <citypw@xxxxxxxxx>

Hi kernel maintainers,

It won't allow the address above the TASK_SIZE being mmap'ed( or mprotect'ed).
This patch is from PaX/Grsecurity.

Thanks for your review time!

Does this actually reduce the attack surface of anything?

These functions all search for vmas. If there's a vma outside of the user range, we have a problem.

Also, that use of TASK_SIZE is IMO ridiculous. Shouldn't be TASK_SIZE_MAX?

--Andy, who is annoyed every time another pointless TIF_IA32 reference, even hidden in a macro, makes it into the kernel
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/