mirror of
https://github.com/Motorhead1991/qemu.git
synced 2025-08-03 07:43:54 -06:00
Usermode exec-stack fix
When loading a shared library that requires an executable stack, glibc uses the mprotext PROT_GROWSDOWN flag to achieve this. We don't support PROT_GROWSDOWN. Add a special case to handle changing the stack permissions in this way. Signed-off-by: Paul Brook <paul@codesourcery.com>
This commit is contained in:
parent
9e0b74a43f
commit
97374d3858
4 changed files with 14 additions and 0 deletions
|
@ -5400,6 +5400,17 @@ abi_long do_syscall(void *cpu_env, int num, abi_long arg1,
|
|||
ret = get_errno(target_munmap(arg1, arg2));
|
||||
break;
|
||||
case TARGET_NR_mprotect:
|
||||
{
|
||||
TaskState *ts = ((CPUState *)cpu_env)->opaque;
|
||||
/* Special hack to detect libc making the stack executable. */
|
||||
if ((arg3 & PROT_GROWSDOWN)
|
||||
&& arg1 >= ts->info->stack_limit
|
||||
&& arg1 <= ts->info->start_stack) {
|
||||
arg3 &= ~PROT_GROWSDOWN;
|
||||
arg2 = arg2 + arg1 - ts->info->stack_limit;
|
||||
arg1 = ts->info->stack_limit;
|
||||
}
|
||||
}
|
||||
ret = get_errno(target_mprotect(arg1, arg2, arg3));
|
||||
break;
|
||||
#ifdef TARGET_NR_mremap
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue