diff options
author | H.J. Lu <hjl.tools@gmail.com> | 2024-01-12 10:19:41 -0800 |
---|---|---|
committer | H.J. Lu <hjl.tools@gmail.com> | 2024-01-15 06:59:23 -0800 |
commit | 457bd9cf2e27550dd66b2d8f3c5a8dbd0dfb398f (patch) | |
tree | 1674e1b7e3ee439c9271313ac122894e9f820126 /manual/locale.texi | |
parent | 7100d9ae21e2737f96f824259167788aabd8308f (diff) | |
download | glibc-457bd9cf2e27550dd66b2d8f3c5a8dbd0dfb398f.tar glibc-457bd9cf2e27550dd66b2d8f3c5a8dbd0dfb398f.tar.gz glibc-457bd9cf2e27550dd66b2d8f3c5a8dbd0dfb398f.tar.bz2 glibc-457bd9cf2e27550dd66b2d8f3c5a8dbd0dfb398f.zip |
x86-64: Check if mprotect works before rewriting PLT
Systemd execution environment configuration may prohibit changing a memory
mapping to become executable:
MemoryDenyWriteExecute=
Takes a boolean argument. If set, attempts to create memory mappings
that are writable and executable at the same time, or to change existing
memory mappings to become executable, or mapping shared memory segments
as executable, are prohibited.
When it is set, systemd service stops working if PLT rewrite is enabled.
Check if mprotect works before rewriting PLT. This fixes BZ #31230.
This also works with SELinux when deny_execmem is on.
Reviewed-by: Carlos O'Donell <carlos@redhat.com>
Diffstat (limited to 'manual/locale.texi')
0 files changed, 0 insertions, 0 deletions