]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
man: update MemoryDenyWriteExecute description for executable stacks
authorZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
Tue, 30 May 2017 20:43:48 +0000 (16:43 -0400)
committerZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
Tue, 30 May 2017 20:44:48 +0000 (16:44 -0400)
Without going into details, mention that libraries are also covered by the
filters, and that executable stacks are a no no.

Closes #5970.

man/systemd.exec.xml

index 2e9cfa89ddf3f923c42d902a878aa0f09a2fd072..54dad930b1013d988b5ad796a8eeb2aa0545f249 100644 (file)
         <citerefentry><refentrytitle>mprotect</refentrytitle><manvolnum>2</manvolnum></citerefentry> system calls with
         <constant>PROT_EXEC</constant> set and
         <citerefentry><refentrytitle>shmat</refentrytitle><manvolnum>2</manvolnum></citerefentry> system calls with
-        <constant>SHM_EXEC</constant> set. Note that this option is incompatible with programs that generate program
-        code dynamically at runtime, such as JIT execution engines, or programs compiled making use of the code
+        <constant>SHM_EXEC</constant> set. Note that this option is incompatible with programs and libraries that
+        generate program code dynamically at runtime, including JIT execution engines, executable stacks, and code
         "trampoline" feature of various C compilers. This option improves service security, as it makes harder for
         software exploits to change running code dynamically. Note that this feature is fully available on x86-64, and
         partially on x86. Specifically, the <function>shmat()</function> protection is not available on x86. Note that