lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 24 Sep 2006 18:54:04 +0400 From: Stas Sergeev <stsp@...et.ru> To: Alan Cox <alan@...rguk.ukuu.org.uk> Cc: Hugh Dickins <hugh@...itas.com>, Andrew Morton <akpm@...l.org>, Ulrich Drepper <drepper@...hat.com>, Linux kernel <linux-kernel@...r.kernel.org> Subject: Re: [patch] remove MNT_NOEXEC check for PROT_EXEC mmaps Hello. Alan Cox wrote: > If you want a tmpfs with noexec and a shared memory space with exec why > don't you just sort out mounting two different tmpfs instances ? The one that goes to /dev/shm should allow PROT_EXEC, yet not allow executing the binaries with execve(). How? There may be other tmpfs instances, I think they are unaffected, but what to do with the /dev/shm one? - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists