Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 18 May 2020 09:26:34 +0200
From: Florian Weimer <>
To: Kees Cook <>
Cc: Mickaël Salaün <>,  Al Viro
  Aleksa Sarai <>,  Andy Lutomirski <>,
  Mimi Zohar <>,  Stephen Smalley
 <>,  Christian Heimes
 <>,  Deven Bowers <>,
  Tetsuo Handa <>,  John Johansen
 <>,  Kentaro Takeda <>,
  "Lev R. Oshvang ." <>,  Alexei Starovoitov
 <>,  Daniel Borkmann <>,  Eric Chiang
 <>,  James Morris <>,  Jan Kara
 <>,  Jann Horn <>,  Jonathan Corbet
 <>,  Lakshmi Ramasubramanian <>,
  Matthew Garrett <>,  Matthew Wilcox
 <>,  Michael Kerrisk <>,
  Mickaël Salaün <>,
  Philippe Trébuchet
 <>,  Scott Shell <>,
  Sean Christopherson <>,  Shuah Khan
 <>,  Steve Dower <>,  Steve Grubb
 <>,  Thibaut Sautereau <>,
  Vincent Strubel <>,  linux-kernel
 <>,,,,  LSM List
 <>,  Linux FS Devel
Subject: Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)

* Kees Cook:

> I think I misunderstood what you meant (Mickaël got me sorted out
> now). If O_EXEC is already meant to be "EXEC and _not_ READ nor WRITE",
> then yes, this new flag can't be O_EXEC. I was reading the glibc
> documentation (which treats it as a permission bit flag, not POSIX,
> which treats it as a complete mode description).

I see.  I think this part of the manual is actually very Hurd-specific
(before the O_ACCMODE description).  I'll see if I can make this clearer
in the markup.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.