Kernel ignores noexec=off parameter
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Expired
|
Undecided
|
Unassigned |
Bug Description
Hello everybody,
I'm running Ubuntu 10.04 32-bit 2.6.32-
I need to boot into Ubuntu having the NX bit set forced OFF since even if i disabled execution protection from BIOS Ubuntu emulates it. (ref @ https:/
As such, according to the kernel parameters from kernel.org (ref @ http://
<grub.cfg snip>
menuentry 'Ubuntu, with Linux 2.6.32-
recordfail
insmod ext2
set root='(hd0,1)'
search --no-floppy --fs-uuid --set de69abbd-
linux /boot/vmlinuz-
initrd /boot/initrd.
}
</grub.cfg snip>
However, the kernel seems to ignore those parameters and still boots with execution prevention enabled,
<var/log/syslog snip>
Jun 22 16:36:00 EL kernel: [ 0.000000] Using x86 segment limits to approximate NX protection
</var/log/syslog snip>
this is verified by running the NX regression test from http://
./nx-test stack
data: 0x804a050
bss: 0x805a080
brk: 0x9edc008
rw: 0xb7827000
rwx: 0x60c000
stack: 0xbfec9fd8
Dump of /proc/self/maps:
0035f000-004b2000 r-xp 00000000 08:01 145283 /lib/tls/
004b2000-004b3000 ---p 00153000 08:01 145283 /lib/tls/
004b3000-004b5000 r--p 00153000 08:01 145283 /lib/tls/
004b5000-004b6000 rw-p 00155000 08:01 145283 /lib/tls/
004b6000-004b9000 rw-p 00000000 00:00 0
0060c000-0060d000 rwxp 00000000 00:00 0
008f1000-008f2000 r-xp 00000000 00:00 0 [vdso]
00a62000-00a7d000 r-xp 00000000 08:01 2350 /lib/ld-2.11.1.so
00a7d000-00a7e000 r--p 0001a000 08:01 2350 /lib/ld-2.11.1.so
00a7e000-00a7f000 rw-p 0001b000 08:01 2350 /lib/ld-2.11.1.so
08048000-08049000 r-xp 00000000 08:01 1443777 /home/vasilis/
08049000-0804a000 r--p 00000000 08:01 1443777 /home/vasilis/
0804a000-0804b000 rw-p 00001000 08:01 1443777 /home/vasilis/
0804b000-0805b000 rw-p 00000000 00:00 0
09edc000-09efe000 rw-p 00000000 00:00 0 [heap]
b7815000-b7816000 rw-p 00000000 00:00 0
b7826000-b782b000 rw-p 00000000 00:00 0
bfeb6000-bfecb000 rw-p 00000000 00:00 0 [stack]
Attempting to execute function at 0xbfec9fe4
If this program seg-faults, the region was enforced as non-executable...
Segmentation fault
...
Any help will be seriously appreciated !!!
Thanks
V.
Thank you for taking the time to report this bug and helping to make Ubuntu better. This bug did not have a package associated with it, which is important for ensuring that it gets looked at by the proper developers. You can learn more about finding the right package at https:/ /wiki.ubuntu. com/Bugs/ FindRightPackag e. I have classified this bug as a bug in linux.
When reporting bugs in the future please use apport, either via the appropriate application's "Help -> Report a Problem" menu or using 'ubuntu-bug' and the name of the package affected. You can learn more about this functionality at https:/ /wiki.ubuntu. com/ReportingBu gs.