The patch titled
VM/Security: add security hook to do_brk
has been removed from the -mm tree. Its filename was
vm-security-add-security-hook-to-do_brk.patch
This patch was dropped because it was merged into mainline or a subsystem tree
------------------------------------------------------
Subject: VM/Security: add security hook to do_brk
From: Eric Paris <[EMAIL PROTECTED]>
Given a specifically crafted binary do_brk() can be used to get low pages
available in userspace virtual memory and can thus be used to circumvent
the mmap_min_addr low memory protection. Add security checks in do_brk().
Signed-off-by: Eric Paris <[EMAIL PROTECTED]>
Acked-by: Alan Cox <[EMAIL PROTECTED]>
Cc: Stephen Smalley <[EMAIL PROTECTED]>
Cc: James Morris <[EMAIL PROTECTED]>
Cc: Chris Wright <[EMAIL PROTECTED]>
Signed-off-by: Andrew Morton <[EMAIL PROTECTED]>
---
mm/mmap.c | 4 ++++
1 file changed, 4 insertions(+)
diff -puN mm/mmap.c~vm-security-add-security-hook-to-do_brk mm/mmap.c
--- a/mm/mmap.c~vm-security-add-security-hook-to-do_brk
+++ a/mm/mmap.c
@@ -1934,6 +1934,10 @@ unsigned long do_brk(unsigned long addr,
if (is_hugepage_only_range(mm, addr, len))
return -EINVAL;
+ error = security_file_mmap(0, 0, 0, 0, addr, 1);
+ if (error)
+ return error;
+
flags = VM_DATA_DEFAULT_FLAGS | VM_ACCOUNT | mm->def_flags;
error = arch_mmap_check(addr, len, flags);
_
Patches currently in -mm which might be from [EMAIL PROTECTED] are
origin.patch
do_wait-cleanup-delay_group_leader-usage.patch
do_wait-fix-security-checks.patch
do_wait-fix-security-checks-fix.patch
-
To unsubscribe from this list: send the line "unsubscribe mm-commits" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html