CVSROOT:        /cvs
Module name:    src
Changes by:     [email protected] 2019/02/15 09:46:59

Modified files:
        sys/uvm        : uvm_map.c 

Log message:
With an opportunistic check performed at every trap, we insist userland
sp must be on a MAP_STACK page.  Relax the check a bit -- the sp may be
on a PROT_NONE page.  Can't see how an attacker can leverage that situation.

(New perl build process contains a "how many call frames can my stack
hold" checker, and this triggers via the MAP_STACK fault rather than
the normal access check.  The MAP_STACK check still has a kernel printf
as we hunt for applications which map stacks poorly.  Interestingly the
perl code has a knob to disable similar printing alerts on Windows, which
apparently has a feature somewhat like MAP_STACK!)

ok tedu guenther kettenis

Reply via email to