Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S264487AbUAIUl5 (ORCPT ); Fri, 9 Jan 2004 15:41:57 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S264488AbUAIUl5 (ORCPT ); Fri, 9 Jan 2004 15:41:57 -0500 Received: from phoenix.infradead.org ([213.86.99.234]:21771 "EHLO phoenix.infradead.org") by vger.kernel.org with ESMTP id S264487AbUAIUl4 (ORCPT ); Fri, 9 Jan 2004 15:41:56 -0500 Date: Fri, 9 Jan 2004 20:41:50 +0000 From: Christoph Hellwig To: Maciej Zenczykowski Cc: Jesper Juhl , Valdis.Kletnieks@vt.edu, Andrew Morton , linux-kernel@vger.kernel.org Subject: Re: [PATCH][RFC] invalid ELF binaries can execute - better sanity checking Message-ID: <20040109204150.A28436@infradead.org> Mail-Followup-To: Christoph Hellwig , Maciej Zenczykowski , Jesper Juhl , Valdis.Kletnieks@vt.edu, Andrew Morton , linux-kernel@vger.kernel.org References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5.1i In-Reply-To: ; from maze@cela.pl on Fri, Jan 09, 2004 at 09:20:53PM +0100 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 702 Lines: 14 On Fri, Jan 09, 2004 at 09:20:53PM +0100, Maciej Zenczykowski wrote: > I think this points to an 'issue', if we're going to increase the checks > in the ELF-loader (and thus increase the size of the minimal valid ELF > file we can load, thus effectively 'bloating' (lol) some programs) we > should probably allow some sort of direct binary executable files [i.e. > header 'XBIN386\0' followed by Read/Execute binary code to execute by Like binfmt_flat? :) - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/