[pcre-dev] [Bug 1749] PCRE-JITted code should be executed fr…

Top Page
Delete this message
Author: admin
Date:  
To: pcre-dev
Old-Topics: [pcre-dev] [Bug 1749] New: PCRE-JITted code should be executed from non-writable memory to obey execmem SELinux restriction
Subject: [pcre-dev] [Bug 1749] PCRE-JITted code should be executed from non-writable memory to obey execmem SELinux restriction
https://bugs.exim.org/show_bug.cgi?id=1749

--- Comment #21 from Petr Pisar <ppisar@???> ---
The error code is visible in the strace output I quoted in the comment #16.
Return value is -1 and errno is EACCES. This failure is result of the SELinux
policy that not only prevents from having RWX pages (previous code mmapped
them), but also prevents from turning RW- pages into R-X pages (current code
does the mprotect).

If the code checked for the error and propagated it back to the
pcre2_jit_compile(), applications could handle it in the same way as if JIT was
unavailable at all (pcre2_jit_compile() would return
PCRE2_ERROR_JIT_BADOPTION).

--
You are receiving this mail because:
You are on the CC list for the bug.