Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756919AbZKKOMA (ORCPT ); Wed, 11 Nov 2009 09:12:00 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1756839AbZKKOL5 (ORCPT ); Wed, 11 Nov 2009 09:11:57 -0500 Received: from cantor.suse.de ([195.135.220.2]:34636 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756683AbZKKOLz (ORCPT ); Wed, 11 Nov 2009 09:11:55 -0500 Date: Wed, 11 Nov 2009 15:11:59 +0100 (CET) From: Jiri Kosina X-X-Sender: jikos@twin.jikos.cz To: Markku Savela Cc: linux-kernel@vger.kernel.org Subject: Re: Using x86 segments against NULL pointer deference exploit In-Reply-To: <874op2wcna.fsf@burp.tkv.asdf.org> Message-ID: References: <874op2wcna.fsf@burp.tkv.asdf.org> User-Agent: Alpine 2.00 (LRH 1167 2008-08-23) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 524 Lines: 17 On Tue, 10 Nov 2009, Markku Savela wrote: > I'm wondering why on architectures that actually have EXECUTE > permission memory management, the user space is mapped into kernel > with EXECUTE enabled!!!?? x86, to give one random example? -- Jiri Kosina SUSE Labs, Novell Inc. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/