diff options
author | Paul Brook <paul@codesourcery.com> | 2010-06-16 13:03:51 +0100 |
---|---|---|
committer | Paul Brook <paul@codesourcery.com> | 2010-06-16 13:03:51 +0100 |
commit | 97374d38583028b33074c69caf296d94cb1b9d5b (patch) | |
tree | 20dd2e75e0b7dcf623a084e19e3f5e39a9161f31 /linux-user/elfload.c | |
parent | 9e0b74a43f5ab94acdc5b450747b8f6c184e0062 (diff) |
Usermode exec-stack fix
When loading a shared library that requires an executable stack,
glibc uses the mprotext PROT_GROWSDOWN flag to achieve this.
We don't support PROT_GROWSDOWN.
Add a special case to handle changing the stack permissions in this way.
Signed-off-by: Paul Brook <paul@codesourcery.com>
Diffstat (limited to 'linux-user/elfload.c')
-rw-r--r-- | linux-user/elfload.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/linux-user/elfload.c b/linux-user/elfload.c index 2d920f2017..accb44d9de 100644 --- a/linux-user/elfload.c +++ b/linux-user/elfload.c @@ -1018,6 +1018,7 @@ static abi_ulong setup_arg_pages(abi_ulong p, struct linux_binprm *bprm, /* we reserve one extra page at the top of the stack as guard */ target_mprotect(error + size, qemu_host_page_size, PROT_NONE); + info->stack_limit = error; stack_base = error + size - MAX_ARG_PAGES*TARGET_PAGE_SIZE; p += stack_base; |