public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* RW and executable hole in page tables on x86_64
@ 2013-10-25 13:34 Kees Cook
  2013-10-25 14:59 ` H. Peter Anvin
  0 siblings, 1 reply; 5+ messages in thread
From: Kees Cook @ 2013-10-25 13:34 UTC (permalink / raw)
  To: H. Peter Anvin; +Cc: Yan, Zheng, Thomas Gleixner, Ingo Molnar, linux-kernel

Hi,

I've noticed there's a chunk of kernel memory still marked RW and x. See
0xffffffff82956000 below...

---[ High Kernel Mapping ]---
0xffffffff80000000-0xffffffff81000000          16M                           pmd
0xffffffff81000000-0xffffffff81a00000          10M     ro         PSE GLB x  pmd
0xffffffff81a00000-0xffffffff81e00000           4M     ro         PSE GLB NX pmd
0xffffffff81e00000-0xffffffff82200000           4M     RW             GLB NX pte
0xffffffff82200000-0xffffffff82800000           6M     RW         PSE GLB NX pmd
0xffffffff82800000-0xffffffff82956000        1368K     RW             GLB NX pte
0xffffffff82956000-0xffffffff82a00000         680K     RW             GLB x  pte
0xffffffff82a00000-0xffffffffa0000000         470M                           pmd

HPA looked at it for a bit, but it wasn't obvious what was going on. It's
after the end of bss. I do note that the two adjacent regions add up to
2MiB. Is this some kind of leftover mapping? What is this region? Is there
a sensible place to clean it up?

Thanks,

-Kees

-- 
Kees Cook                                            @outflux.net

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2014-11-14 20:16 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-10-25 13:34 RW and executable hole in page tables on x86_64 Kees Cook
2013-10-25 14:59 ` H. Peter Anvin
2014-11-14 19:02   ` Kees Cook
2014-11-14 20:04     ` Thomas Gleixner
2014-11-14 20:15       ` Kees Cook

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox