Re: [PATCH 31/31] x86, pkeys: execute-only support

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 01/07/2016 01:02 PM, Kees Cook wrote:
>> > I haven't found any userspace that does this today.  With this
>> > facility in place, we expect userspace to move to use it
>> > eventually.
> And the magic benefit here is that linker/loaders can switch to just
> PROT_EXEC without PROT_READ, and everything that doesn't support this
> protection will silently include PROT_READ, so no runtime detection by
> the loader is needed.

Yep, completely agree.

I'll update the description.

>> > The security provided by this approach is not comprehensive.  The
> Perhaps specifically mention what it does provide, which would be
> protection against leaking executable memory contents, as generally
> done by attackers who are attempting to find ROP gadgets on the fly.

Good point.

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@xxxxxxxxx.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@xxxxxxxxx";> email@xxxxxxxxx </a>



[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]