diff options
author | Ulrich Drepper <drepper@redhat.com> | 2004-09-19 02:48:59 +0000 |
---|---|---|
committer | Ulrich Drepper <drepper@redhat.com> | 2004-09-19 02:48:59 +0000 |
commit | dcca3fe25f4a57f351ce95253f32e191dfe1167d (patch) | |
tree | 47ed6fa14ac4ec6b14b20e06ffe69e424622ba4f /elf | |
parent | d72433621f75bce7281adb7060459f6918287926 (diff) | |
download | glibc-dcca3fe25f4a57f351ce95253f32e191dfe1167d.tar glibc-dcca3fe25f4a57f351ce95253f32e191dfe1167d.tar.gz glibc-dcca3fe25f4a57f351ce95253f32e191dfe1167d.tar.bz2 glibc-dcca3fe25f4a57f351ce95253f32e191dfe1167d.zip |
Update.
* sysdeps/unisx/sysv/linux/dl-execstack.c: Get protection flag
from memory.
* elf/dl-load.c (_dl_map_object_from_fd): Add PROT_EXEC flag to
__stack_flags.
Diffstat (limited to 'elf')
-rw-r--r-- | elf/dl-load.c | 45 |
1 files changed, 32 insertions, 13 deletions
diff --git a/elf/dl-load.c b/elf/dl-load.c index cb0642a6d2..059be4eacf 100644 --- a/elf/dl-load.c +++ b/elf/dl-load.c @@ -101,6 +101,9 @@ ELF_PREFERRED_ADDRESS_DATA; # define ELF_FIXED_ADDRESS(loader, mapstart) ((void) 0) #endif + +extern int __stack_prot attribute_relro attribute_hidden; + /* Type for the buffer we put the ELF header and hopefully the program header. This buffer does not really have to be too large. In most cases the program header follows the ELF header directly. If this @@ -1302,6 +1305,35 @@ cannot allocate TLS data structures for initial thread"); goto call_lose; } + if (__builtin_expect ((stack_flags &~ GL(dl_stack_flags)) & PF_X, 0)) + { + /* The stack is presently not executable, but this module + requires that it be executable. We must change the + protection of the variable which contains the flags used in + the mprotect calls. */ +#ifdef HAVE_Z_RELRO + if (mode & __RTLD_DLOPEN) + { + uintptr_t p = ((uintptr_t) &__stack_prot) & ~(GLRO(dl_pagesize) - 1); + size_t s = (uintptr_t) &__stack_prot - p + sizeof (int); + + __mprotect ((void *) p, s, PROT_READ|PROT_WRITE); + __stack_prot |= PROT_EXEC; + __mprotect ((void *) p, s, PROT_READ); + } + else +#endif + __stack_prot |= PROT_EXEC; + + errval = (*GL(dl_make_stack_executable_hook)) (stack_endp); + if (errval) + { + errstring = N_("\ +cannot enable executable stack as shared object requires"); + goto call_lose; + } + } + if (l->l_info[DT_HASH]) _dl_setup_hash (l); @@ -1344,19 +1376,6 @@ cannot allocate TLS data structures for initial thread"); l->l_dev = st.st_dev; l->l_ino = st.st_ino; - if (__builtin_expect ((stack_flags &~ GL(dl_stack_flags)) & PF_X, 0)) - { - /* The stack is presently not executable, but this module - requires that it be executable. */ - errval = (*GL(dl_make_stack_executable_hook)) (stack_endp); - if (errval) - { - errstring = N_("\ -cannot enable executable stack as shared object requires"); - goto call_lose; - } - } - /* When we profile the SONAME might be needed for something else but loading. Add it right away. */ if (__builtin_expect (GLRO(dl_profile) != NULL, 0) |