Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754112AbdGXNJi (ORCPT ); Mon, 24 Jul 2017 09:09:38 -0400 Received: from mail-qt0-f171.google.com ([209.85.216.171]:34881 "EHLO mail-qt0-f171.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753218AbdGXNJa (ORCPT ); Mon, 24 Jul 2017 09:09:30 -0400 MIME-Version: 1.0 In-Reply-To: <1500035350-20058-1-git-send-email-blackzert@gmail.com> References: <1500035350-20058-1-git-send-email-blackzert@gmail.com> From: Zero Cu Date: Mon, 24 Jul 2017 16:09:29 +0300 Message-ID: Subject: Re: [PATCH] Fill in ELF image holes with PROT_NONE to prevent mapping to the hole To: viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 235 Lines: 7 2017-07-14 15:29 GMT+03:00 : > From: Ilya Smith > To avoid exploitation of ELF images with holes, a hole can be mapped with > PROT_NONE permissions. Hello, Could I have any feedback please?