Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751429AbbD2WJk (ORCPT ); Wed, 29 Apr 2015 18:09:40 -0400 Received: from mail.kernel.org ([198.145.29.136]:42439 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750957AbbD2WJj (ORCPT ); Wed, 29 Apr 2015 18:09:39 -0400 Message-ID: <554156A1.3010903@kernel.org> Date: Wed, 29 Apr 2015 15:09:37 -0700 From: Andy Lutomirski User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0 MIME-Version: 1.0 To: Shawn Chang , linux-mm@kvack.org, linux-kernel@vger.kernel.org CC: spender@grsecurity.net, keescook@chromium.org Subject: Re: [PATCH] Hardening memory maunipulation. References: <1430321975-13626-1-git-send-email-citypw@gmail.com> In-Reply-To: <1430321975-13626-1-git-send-email-citypw@gmail.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 865 Lines: 24 On 04/29/2015 08:39 AM, Shawn Chang wrote: > From: Shawn C > > Hi kernel maintainers, > > It won't allow the address above the TASK_SIZE being mmap'ed( or mprotect'ed). > This patch is from PaX/Grsecurity. > > Thanks for your review time! Does this actually reduce the attack surface of anything? These functions all search for vmas. If there's a vma outside of the user range, we have a problem. Also, that use of TASK_SIZE is IMO ridiculous. Shouldn't be TASK_SIZE_MAX? --Andy, who is annoyed every time another pointless TIF_IA32 reference, even hidden in a macro, makes it into the kernel -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/