Skip to content

Commit

Permalink
security: enhance DEFAULT_MMAP_MIN_ADDR description
Browse files Browse the repository at this point in the history
Got burned by setting the proposed default of 65536
across all Debian archs.

Thus proposing to be more specific on which archs you may
set this. Also propose a value for arm and friends that
doesn't break sshd.

Reword to mention working archs ia64 and ppc64 too.

Signed-off-by: maximilian attems <[email protected]>
Cc: Martin Michlmayr <[email protected]>
Cc: Gordon Farquharson <[email protected]>
Acked-by: Eric Paris <[email protected]>
Signed-off-by: James Morris <[email protected]>
  • Loading branch information
brainflux authored and James Morris committed Apr 18, 2008
1 parent 27cc2a6 commit 5f46ce1
Showing 1 changed file with 6 additions and 4 deletions.
10 changes: 6 additions & 4 deletions security/Kconfig
Original file line number Diff line number Diff line change
Expand Up @@ -113,10 +113,12 @@ config SECURITY_DEFAULT_MMAP_MIN_ADDR
from userspace allocation. Keeping a user from writing to low pages
can help reduce the impact of kernel NULL pointer bugs.

For most users with lots of address space a value of 65536 is
reasonable and should cause no problems. Programs which use vm86
functionality would either need additional permissions from either
the LSM or the capabilities module or have this protection disabled.
For most ia64, ppc64 and x86 users with lots of address space
a value of 65536 is reasonable and should cause no problems.
On arm and other archs it should not be higher than 32768.
Programs which use vm86 functionality would either need additional
permissions from either the LSM or the capabilities module or have
this protection disabled.

This value can be changed after boot using the
/proc/sys/vm/mmap_min_addr tunable.
Expand Down

0 comments on commit 5f46ce1

Please sign in to comment.