Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S263737AbUDNJrX (ORCPT ); Wed, 14 Apr 2004 05:47:23 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263741AbUDNJrX (ORCPT ); Wed, 14 Apr 2004 05:47:23 -0400 Received: from mail.shareable.org ([81.29.64.88]:15776 "EHLO mail.shareable.org") by vger.kernel.org with ESMTP id S263737AbUDNJrW (ORCPT ); Wed, 14 Apr 2004 05:47:22 -0400 Date: Wed, 14 Apr 2004 10:47:02 +0100 From: Jamie Lokier To: "Siddha, Suresh B" Cc: Andrew Morton , Kurt Garloff , linux-kernel@vger.kernel.org, mingo@redhat.com Subject: Re: Non-Exec stack patches Message-ID: <20040414094702.GC8888@mail.shareable.org> References: <9AB83E4717F13F419BD880F5254709E5011EBABA@scsmsx402.sc.intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <9AB83E4717F13F419BD880F5254709E5011EBABA@scsmsx402.sc.intel.com> User-Agent: Mutt/1.4.1i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 570 Lines: 14 People looking at PROT_EXEC page table flags might want to be aware that mimics the behaviour of i386: read implies and is implied by exec, write implies read. That might mean user-mode linux doesn't provide no-exec-stack protection even when the underlying kernel does offer it. I'm not sure. -- Jamie - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/