Let me say that I am an impressed user of a grsecurity patched kernel, but in general I experience big trouble when enabling mprotect(). I understand that it is userland's fault that PAX constantly kills programs that were not writting with that restriction in mind, but still I have been experimenting on my Desktop machine and the whitelist grew very big, so gave up on mprotect by default, simply because often PAX spontaneously killed applications, because a new situation was faced I did not have before and I had to again expand the white list (for example firefox was suddenly killed after a few minutes of work, because some dbus call was not allowed), despite the fact firefox was already on the whitelist.
With applications like firefox, where this functionality would really make sense, already being on the whitelist I see no reason to further struggle with the whitelist and simply disable the mprotect restrictions, because it breaks almost my whole desktop by default.
Now I am wondering if disabling the mprotect() restrictions renders some of the other stuff provided by grsec useless? I guess a patched kernel without mprotect() is still better than an unpatched kernel, right? How bad is the situation really without the mprotect restrictions? Could you enlighten me a bit more? Is it really worth the trouble with whitelisting every single application that is broken? (when already dangerous applications like firefox are whitelisted?)