[PATCH] exec-shield style vdso move.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thursday 18 May 2006 09:08, Gerd Hoffmann wrote:
> Rusty Russell wrote:
> > So, is everyone happy with this smerge of Ingo and Gerd's work?
>
> Yes.
>
> > I'm not against it, but it needs tons of testing in -mm first.
> >
> > Since the vsyscall page has been at a fixed address, there might be
> > real programs that hardcoded it etc.
>
> Exploits *grin*?

The security argument seems quite bogus to me for this because you'll never
find enough bits to be reasonably secure in the limited 32bit space.
The brute force complexity will be always very low.

What worries me more is this:

+       down_write(&mm->mmap_sem);
+       addr = get_unmapped_area(NULL, 0, PAGE_SIZE, 0, 0);
+       if (IS_ERR_VALUE(addr)) {
+               ret = addr;
+               goto up_fail;
+       }

You will have it somewhere early in address space? That might really 
break programs.

>
> Well, given that xen kernels currently have the vsyscall page at another
> (fixed) address I don't expect stuff break due to a hardcoded vsyscall
> page address.

x86-64 kernels have the 32bit page also at another address and I haven't
heard of a problem from that yet.  Sometimes people do strange things
with ptrace though so better make sure that still works.

-Andi

[Index of Archives]     [KVM Development]     [Libvirt Development]     [Libvirt Users]     [CentOS Virtualization]     [Netdev]     [Ethernet Bridging]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux