aboutsummaryrefslogtreecommitdiffstats
path: root/security/Kconfig
diff options
context:
space:
mode:
authormaximilian attems <max@stro.at>2008-04-16 13:36:36 -0400
committerJames Morris <jmorris@namei.org>2008-04-18 06:26:18 -0400
commit5f46ce14bd432cf52bf91079270af164ca48f821 (patch)
treeae8129b0ba3743b67ba69af83c7c8aa6950e4f15 /security/Kconfig
parent27cc2a6e572e1a86a08a02918517558f175f6974 (diff)
security: enhance DEFAULT_MMAP_MIN_ADDR description
Got burned by setting the proposed default of 65536 across all Debian archs. Thus proposing to be more specific on which archs you may set this. Also propose a value for arm and friends that doesn't break sshd. Reword to mention working archs ia64 and ppc64 too. Signed-off-by: maximilian attems <max@stro.at> Cc: Martin Michlmayr <tbm@cyrius.com> Cc: Gordon Farquharson <gordonfarquharson@gmail.com> Acked-by: Eric Paris <eparis@redhat.com> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/Kconfig')
-rw-r--r--security/Kconfig10
1 files changed, 6 insertions, 4 deletions
diff --git a/security/Kconfig b/security/Kconfig
index 5dfc206748cf..49b51f964897 100644
--- a/security/Kconfig
+++ b/security/Kconfig
@@ -113,10 +113,12 @@ config SECURITY_DEFAULT_MMAP_MIN_ADDR
113 from userspace allocation. Keeping a user from writing to low pages 113 from userspace allocation. Keeping a user from writing to low pages
114 can help reduce the impact of kernel NULL pointer bugs. 114 can help reduce the impact of kernel NULL pointer bugs.
115 115
116 For most users with lots of address space a value of 65536 is 116 For most ia64, ppc64 and x86 users with lots of address space
117 reasonable and should cause no problems. Programs which use vm86 117 a value of 65536 is reasonable and should cause no problems.
118 functionality would either need additional permissions from either 118 On arm and other archs it should not be higher than 32768.
119 the LSM or the capabilities module or have this protection disabled. 119 Programs which use vm86 functionality would either need additional
120 permissions from either the LSM or the capabilities module or have
121 this protection disabled.
120 122
121 This value can be changed after boot using the 123 This value can be changed after boot using the
122 /proc/sys/vm/mmap_min_addr tunable. 124 /proc/sys/vm/mmap_min_addr tunable.