diff options
author | Roland McGrath <roland@gnu.org> | 2004-03-20 20:19:09 +0000 |
---|---|---|
committer | Roland McGrath <roland@gnu.org> | 2004-03-20 20:19:09 +0000 |
commit | 316febbc9fdf7f8c654bb6bb68c5506fce517cd7 (patch) | |
tree | 89e0db881df42f1c3161ff006a7cb37bb4d47e0a /sysdeps/mach | |
parent | 2fe30ae5daa70cdc6cc49f637efa31b0c379c2e7 (diff) | |
download | glibc-316febbc9fdf7f8c654bb6bb68c5506fce517cd7.zip glibc-316febbc9fdf7f8c654bb6bb68c5506fce517cd7.tar.gz glibc-316febbc9fdf7f8c654bb6bb68c5506fce517cd7.tar.bz2 |
2004-03-20 Roland McGrath <roland@frob.com>
* sysdeps/mach/hurd/dl-execstack.c: New file.
Diffstat (limited to 'sysdeps/mach')
-rw-r--r-- | sysdeps/mach/hurd/dl-execstack.c | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/sysdeps/mach/hurd/dl-execstack.c b/sysdeps/mach/hurd/dl-execstack.c new file mode 100644 index 0000000..d5c0736 --- /dev/null +++ b/sysdeps/mach/hurd/dl-execstack.c @@ -0,0 +1,47 @@ +/* Stack executability handling for GNU dynamic linker. Hurd version. + Copyright (C) 2004 Free Software Foundation, Inc. + This file is part of the GNU C Library. + + The GNU C Library is free software; you can redistribute it and/or + modify it under the terms of the GNU Lesser General Public + License as published by the Free Software Foundation; either + version 2.1 of the License, or (at your option) any later version. + + The GNU C Library is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public + License along with the GNU C Library; if not, write to the Free + Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA + 02111-1307 USA. */ + +#include <ldsodefs.h> +#include <hurdstartup.h> +#include <errno.h> + +extern struct hurd_startup_data *_dl_hurd_data attribute_hidden; + +/* There is no portable way to know the bounds of the initial thread's stack + so as to mprotect it. */ + +int +internal_function +_dl_make_stack_executable (void **stack_endp) +{ + /* Challenge the caller. */ + if (__builtin_expect (*stack_endp != __libc_stack_end, 0)) + return EPERM; + *stack_endp = NULL; + + if (__mprotect ((void *)_dl_hurd_data->stack_base, _dl_hurd_data->stack_size, + PROT_READ|PROT_WRITE|PROT_EXEC) != 0) + return errno; + + /* Remember that we changed the permission. */ + GL(dl_stack_flags) |= PF_X; + + return 0; +} +rtld_hidden_def (_dl_make_stack_executable) |