Hi - On Fri, Mar 31, 2006 at 05:25:29PM +0530, Prasanna S Panchamukhi wrote: > [...] > > It's pretty clear that writing the dirtied pages to disk is an > > *undesirable* side-effect, and should be eliminated. [...] > > What would the typical situations where the text section in the > executable is mapped with 'MAP_SHARED'? Even if such usage is not typical, if it is legal, it may open a vulnerability. Imagine an unprivileged attacker doing just such an mmap on some key shared library or executable, hoping that someone else puts user-kprobes in there. - FChE
Attachment:
pgpo2uzimhe1H.pgp
Description: PGP signature
- References:
- RFC - Approaches to user-space probes
- From: Prasanna S Panchamukhi <[email protected]>
- Re: RFC - Approaches to user-space probes
- From: Arjan van de Ven <[email protected]>
- Re: RFC - Approaches to user-space probes
- From: Prasanna S Panchamukhi <[email protected]>
- Re: RFC - Approaches to user-space probes
- From: Arjan van de Ven <[email protected]>
- Re: RFC - Approaches to user-space probes
- From: Prasanna S Panchamukhi <[email protected]>
- Re: RFC - Approaches to user-space probes
- From: [email protected] (Frank Ch. Eigler)
- Re: RFC - Approaches to user-space probes
- From: Prasanna S Panchamukhi <[email protected]>
- RFC - Approaches to user-space probes
- Prev by Date: Re: Synchronizing Bit operations V2
- Next by Date: snd_hda_intel on 2.6.16
- Previous by thread: Re: RFC - Approaches to user-space probes
- Next by thread: Question about generic IRQ framework
- Index(es):