Yes, user applications should be allowed to mmap() from /dev/zero with
PROT_EXEC.  (There should be *no* visible difference between using
/dev/zero and using MAP_ANON(YMOUS).)

However, it also seems to me that it is appropriate for udev to mount
its tmpfs with noexec set -- there's no legitimate reason to put an
actual executable in there.  I'd rather see this fixed in the kernel;
have it ignore the filesystem mount options when mapping from device
files.  (There may be legitimate use cases for PROT_EXEC maps from
other device files, not just /dev/zero.)

zw


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to