Date: Fri, 7 Sep 2012 21:53:05 +0300 From: Konstantin Belousov <kostikbel@gmail.com> To: Ian Lepore <freebsd@damnhippie.dyndns.org> Cc: freebsd-current@freebsd.org, Svatopluk Kraus <onwahe@gmail.com> Subject: Re: [patch] mmap() MAP_TEXT implementation (to use for shared libraries) Message-ID: <20120907185305.GE33100@deviant.kiev.zoral.com.ua> In-Reply-To: <1347043699.1143.2.camel@revolution.hippie.lan> References: <CAFHCsPX6HrCXHA%2BS31Dz9QP8eiwbo21Vzju4K4paohciu2vPTw@mail.gmail.com> <201209071221.37409.jhb@freebsd.org> <20120907164218.GB33100@deviant.kiev.zoral.com.ua> <201209071405.28831.jhb@freebsd.org> <20120907184120.GD33100@deviant.kiev.zoral.com.ua> <1347043699.1143.2.camel@revolution.hippie.lan>
next in thread | previous in thread | raw e-mail | index | archive | help
--p1Ewym4VCenIjxkR Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri, Sep 07, 2012 at 12:48:19PM -0600, Ian Lepore wrote: > On Fri, 2012-09-07 at 21:41 +0300, Konstantin Belousov wrote: > > After a second thought, I do not like your proposal as well. +x is set = for > > shebang scripts, and allowing PROT_EXEC to set VV_TEXT for them means > > that such scripts are subject for write denial. >=20 > You say that like it's a bad thing. I hate it when I accidentally edit > a script that's running and then the script fails because I did. I > would be much happier if it acted just like any other executable and > prevented modification while it's running. For me, if other user can block my modifications of my script by the mere fact that script has o+rx rights, is indeed bad. I do use real machines sometime. --p1Ewym4VCenIjxkR Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (FreeBSD) iEYEARECAAYFAlBKQpEACgkQC3+MBN1Mb4ipQQCfbNRYlkIL48U63ReDclHnuvt/ RgsAn380CgsxA4ED0/OVBA3FruwghmZy =lxhk -----END PGP SIGNATURE----- --p1Ewym4VCenIjxkR--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20120907185305.GE33100>