[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <538FF4C4.5090300@gmail.com>
Date: Thu, 05 Jun 2014 06:40:36 +0200
From: "Michael Kerrisk (man-pages)" <mtk.manpages@...il.com>
To: Dave Jones <davej@...hat.com>,
Linux Kernel <linux-kernel@...r.kernel.org>,
linux-mm@...ck.org, Linus Torvalds <torvalds@...ux-foundation.org>,
zohar@...ux.vnet.ibm.com
CC: mtk.manpages@...il.com
Subject: Re: ima_mmap_file returning 0 to userspace as mmap result.
On 06/05/2014 01:31 AM, Dave Jones wrote:
> I just noticed that trinity was freaking out in places when mmap was
> returning zero. This surprised me, because I had the mmap_min_addr
> sysctl set to 64k, so it wasn't a MAP_FIXED mapping that did it.
>
> There's no mention of this return value in the man page, so I dug
> into the kernel code, and it appears that we do..
>
> sys_mmap
> vm_mmap_pgoff
> security_mmap_file
> ima_file_mmap <- returns 0 if not PROT_EXEC
>
> and then the 0 gets propagated up as a retval all the way to userspace.
>
> It smells to me like we might be violating a standard or two here, and
> instead of 0 ima should be returning -Esomething
>
> thoughts?
Seems like either EACCESS or ENOTSUP is appropriate; here's the pieces
from POSIX:
EACCES The fildes argument is not open for read, regardless of
the protection specified, or fildes is not open for
write and PROT_WRITE was specified for a MAP_SHARED type
mapping.
ENOTSUP
The implementation does not support the combination
of accesses requested in the prot argument.
ENOTSUP seems to be more appropriate in my reading of the above, though
I'd somehow more have expected EACCES.
Cheers,
Michael
--
Michael Kerrisk
Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/
Linux/UNIX System Programming Training: http://man7.org/training/
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists