Yes, user applications should be allowed to mmap() from /dev/zero with PROT_EXEC. (There should be *no* visible difference between using /dev/zero and using MAP_ANON(YMOUS).)
However, it also seems to me that it is appropriate for udev to mount its tmpfs with noexec set -- there's no legitimate reason to put an actual executable in there. I'd rather see this fixed in the kernel; have it ignore the filesystem mount options when mapping from device files. (There may be legitimate use cases for PROT_EXEC maps from other device files, not just /dev/zero.) zw -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]