diff options
author | Nick Clifton <nickc@redhat.com> | 2022-05-03 11:42:24 +0100 |
---|---|---|
committer | Nick Clifton <nickc@redhat.com> | 2022-05-03 11:42:24 +0100 |
commit | ba951afb99912da01a6e8434126b8fac7aa75107 (patch) | |
tree | e94ddfba29d29a82ab36d28592d6c8e7edd04350 /ld/ld.texi | |
parent | 46465574a925062ba7dfa72f49ba5199d7a39fc3 (diff) | |
download | gdb-ba951afb99912da01a6e8434126b8fac7aa75107.zip gdb-ba951afb99912da01a6e8434126b8fac7aa75107.tar.gz gdb-ba951afb99912da01a6e8434126b8fac7aa75107.tar.bz2 |
Add a linker warning when creating potentially dangerous executable segments. Add tests, options to disabke and configure switches to choose defaults.
Diffstat (limited to 'ld/ld.texi')
-rw-r--r-- | ld/ld.texi | 16 |
1 files changed, 16 insertions, 0 deletions
@@ -2701,6 +2701,22 @@ option causes a warning to be issued whenever this case occurs. Only warn once for each undefined symbol, rather than once per module which refers to it. +@kindex --warn-rwx-segments +@cindex warnings, on writeable and exectuable segments +@cindex executable segments, warnings on +@item --warn-rwx-segments +@itemx --no-warn-rwx-segments +Warn if the linker creates a loadable, non-zero sized segment that has +all three of the read, write and execute permission flags set. Such a +segment represents a potential security vulnerability. In addition +warnings will be generated if a thread local storage segment is +created with the execute permission flag set, regardless of whether or +not it has the read and/or write flags set. + +These warnings are enabled by default. They can be disabled via the +@option{--no-warn-rwx-segments} option and re-enabled via the +@option{--warn-rwx-segments} option. + @kindex --warn-section-align @cindex warnings, on section alignment @cindex section alignment, warnings on |