[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20121003141804.f9896690.akpm@linux-foundation.org>
Date: Wed, 3 Oct 2012 14:18:04 -0700
From: Andrew Morton <akpm@...ux-foundation.org>
To: Ard Biesheuvel <ard.biesheuvel@...il.com>
Cc: Hugh Dickins <hughd@...gle.com>, Kees Cook <keescook@...omium.org>,
linux-kernel@...r.kernel.org
Subject: Re: Updated: [PATCH] hardening: add PROT_FINAL prot flag to
mmap/mprotect
On Wed, 03 Oct 2012 16:43:53 +0200
Ard Biesheuvel <ard.biesheuvel@...il.com> wrote:
> This patch adds support for the PROT_FINAL flag to
> the mmap() and mprotect() syscalls.
>
> The PROT_FINAL flag indicates that the requested set
> of protection bits should be final, i.e., it shall
> not be allowed for a subsequent mprotect call to
> set protection bits that were not set already.
>
> This is mainly intended for the dynamic linker,
> which sets up the address space on behalf of
> dynamic binaries. By using this flag, it can
> prevent exploited code from remapping read-only
> executable code or data sections read-write.
Again: has this proposal been reviewed by the glibc maintainers? If
so, what was their position on it?
Also, you earlier stated that "It's a more direct version of PaX's
"MPROTECT" feature[1]". This is useful information. Please update the
changelog to describe that PaX feature and to describe the difference
between the two, and the reasons for that difference.
It sounds as though the PaX developers could provide useful review
input on this proposal. Do they know about it? If so, what is their
position?
Thanks.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists