Re: [PATCH 1/2] LSM: Do not apply mmap_min_addr check to PROT_NONEmappings
From: Roland McGrath
Date: Mon Oct 24 2011 - 12:28:47 EST
> I feel like, and it's just a very vague feeling, that the PROT bits
> didn't matter to the kernel. It would still happily execute stuff on
> page 0 even without PROT_EXEC at some point in the past. I'm probably
> totally off base, and I could test it, but I sort of feel like I
> remember something like that....
Saying that PROT_EXEC might not be enforced is quite a different thing than
saying "PROT bits don't matter". It's certainly the case that in some past
kernel versions, some hardware (older x86 chips), some configurations (x86
non-PAE), and some modes (READ_IMPLIES_EXEC personality stuff), what you
can read, you can execute. I sincerely doubt it's ever been the case that
anything mapped as PROT_NONE could be accessed in any manner.
Thanks,
Roland
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/