Bart Oldeman wrote:
Hi Jan Willem,
it's an issue with the 'initscripts' Debian package, in
/etc/init.d/mountdevsubfs.sh
Hopefully it's only temporary: it also breaks UML
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=386945
The DOSEMU source code could probably work around it by mmap()ing
READ|WRITE
and then mprotect it with EXEC. But maybe at some future point someone
will restrict mprotect() to report EPERM in such situations too for
security reasons.
I don't understand why SHARED MEMORY needs execution access, anyway.
This looks like a defect in the code to me.
Mike
--
p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
This message made from 100% recycled bits.
You have found the bank of Larn.
I can explain it for you, but I can't understand it for you.
I speak only for myself, and I am unanimous in that!
-
To unsubscribe from this list: send the line "unsubscribe linux-msdos" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html