AW: Patch 2.4 kernel / allow to read more than 2048 (1821) Symbols from /boot/System.map

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Dear Mr. Miller,
dear Willy,
just for my understanding: apart from the fact that the maximum allocated sizes differ for vmalloc() and kmalloc(), is it also true that a non priviledged user couldn't call get_kernel_syms () with the current kmalloc() solution?

Given this, wouldn't it be sufficient (for safety reasons) to include a dummy call to kmalloc and return with an error if a non privileged user does the call? 

I mean, elegance is something different :-), but this could catch such a problem.

Just like:

char *for_safety_reasons;

for_safety_reasons=kmalloc(1, GFP_KERNEL);

if (!for_safety_reasons) return -ENOMEM; (or what soever)

kfree (for_safety_reasons);

Or is (in this regard) the only difference between vmalloc() and kmalloc() the maximum size of allocable memory? Given this, the question reduces down to whether a fork bomb on vmalloc() or a fork bomb on kmalloc() is worse.

My two cents here.

Take care & many thanks for looking into it,



Dieter Jurzitza


-- 
________________________________________________

HARMAN BECKER AUTOMOTIVE SYSTEMS

Dr.-Ing. Dieter Jurzitza
Manager Hardware Systems
   System Development

Industriegebiet Ittersbach
Becker-Göring Str. 16
D-76307 Karlsbad / Germany

Phone: +49 (0)7248 71-1577
Fax:   +49 (0)7248 71-1216
eMail: DJurzitza@xxxxxxxxxxxxxxxx
Internet: http://www.becker.de
 

> -----Ursprüngliche Nachricht-----
> Von: David Miller [mailto:davem@xxxxxxxxxxxxx] 
> Gesendet: Freitag, 22. September 2006 00:56
> 2) I dislike this fix because it means that users can lock down
>    a significant amount of non-swappable kernel memory.  There are
>    no privilege checks in the get_kernel_syms() system call, so
>    anyone can invoke it.  Imagine a fork bomb invoking this, and it
>    could also potentially eat up nearly all of the vmalloc() space.
> 
> It may be, in the end, simply better to have a 
> "compat_sys_get_kernel_syms" written that can be called so a 
*****


*******************************************
Diese E-Mail enthaelt vertrauliche und/oder rechtlich geschuetzte Informationen. Wenn Sie nicht der richtige Adressat sind oder diese E-Mail irrtuemlich erhalten haben, informieren Sie bitte sofort den Absender und loeschen Sie diese Mail. Das unerlaubte Kopieren sowie die unbefugte Weitergabe dieser Mail ist nicht gestattet.
 
This e-mail may contain confidential and/or privileged information. If you are not the intended recipient (or have received this e-mail in error) please notify the sender immediately and delete this e-mail. Any unauthorized copying, disclosure or distribution of the contents in this e-mail is strictly forbidden.
*******************************************

-
To unsubscribe from this list: send the line "unsubscribe sparclinux" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Kernel Development]     [DCCP]     [Linux ARM Development]     [Linux]     [Photo]     [Yosemite Help]     [Linux ARM Kernel]     [Linux SCSI]     [Linux x86_64]     [Linux Hams]

  Powered by Linux