[PATCH] exec-shield style vdso move.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2006-05-18 at 09:08 +0200, Gerd Hoffmann wrote:
> > Since the vsyscall page has been at a fixed address, there might be 
> > real programs that hardcoded it etc.
> 
> Exploits *grin*?

LOL.

> > @@ -147,6 +152,13 @@ void __set_fixmap (enum fixed_addresses 
> >  		return;
> >  	}
> >  	set_pte_pfn(address, phys >> PAGE_SHIFT, flags);
> > +	nr_fixmaps++;
> > +}
> > +
> > +void set_fixaddr_top(unsigned long top)
> > +{
> > +	BUG_ON(nr_fixmaps > 0);
> > +	__FIXADDR_TOP = top - PAGE_SIZE;
> >  }
> 
> Is this intentional?
> 
> That are the bits which make the fixmap runtime-movable (by calling
> set_fixaddr_top early enougth at boot time) to make room for the
> hypervisor address space hole.  Not used (yet).
> 
> We surely want to have that in the long run.  It's not mentioned in the
> patch description though.  It also used to be a separate patch on top of
> the move-vsyscall-out-of-fixmap patch.

Yes, this patch is showing its origins here.  I'll add it to the
description, though.  For me, this is the point of the patch.  It's just
that Ingo tricked me into pushing exec-shield 8)

Thanks,
Rusty.
-- 
 ccontrol: http://ccontrol.ozlabs.org


[Index of Archives]     [KVM Development]     [Libvirt Development]     [Libvirt Users]     [CentOS Virtualization]     [Netdev]     [Ethernet Bridging]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux