Feature #7478
shmat needs to honor the null mapping secflag
Status:
New
Priority:
Normal
Assignee:
-
Category:
kernel
Start date:
2016-10-18
Due date:
% Done:
0%
Estimated time:
Difficulty:
Medium
Tags:
Gerrit CR:
Description
Several pieces of the shm code is written in such a way that AS structures are operated upon when they lack a proper a_proc association to the acting process. This was the cause of 7477, although shmat() exposes a means to partially bypass the null mapping secflag via seg_spt.
Stronger enforcement of the a_proc proc invariant would ensure that the checks are consistently performed valid_user_range
.
Related issues
Updated by Robert Mustacchi over 4 years ago
- Related to Bug #7477: secflags panic in shmem_lock added
Updated by Patrick Mooney over 4 years ago
- Subject changed from shm needs to honor the null mapping secflag to shmat needs to honor the null mapping secflag
- Description updated (diff)