On Tue, Nov 20, 2012 at 9:42 PM, Kees Cook <keesc...@chromium.org> wrote: > Since devtmpfs is writable, make the default noexec,nosuid as well. This > protects from the case of a privileged process having an arbitrary file > write flaw and an argumentless arbitrary execution (i.e. it would lack > the ability to run "mount -o remount,exec,suid /dev").
This only really applies to systems without an initramfs when the kernel mounts /dev over the rootfs it has mounted; with an initramfs, /dev is always mounted by user code. Just checking, that is the use case you are doing that for? Kay -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/