diff options
author | Wang Boshi <wangboshi@huawei.com> | 2017-09-15 17:53:23 +0100 |
---|---|---|
committer | Szabolcs Nagy <szabolcs.nagy@arm.com> | 2017-09-18 18:15:47 +0100 |
commit | 6cd380dd366d728da9f579eeb9f7f4c47f48e474 (patch) | |
tree | a6c1ac8110060c1bc059697def0bc5b2cb9e66b7 /nptl/tst-kill1.c | |
parent | 1c6d89e9a40302430d5986a09c7cf7594b93143c (diff) | |
download | glibc-6cd380dd366d728da9f579eeb9f7f4c47f48e474.tar.gz glibc-6cd380dd366d728da9f579eeb9f7f4c47f48e474.tar.xz glibc-6cd380dd366d728da9f579eeb9f7f4c47f48e474.zip |
AArch64: use movz/movk instead of literal pools in start.S
eXecute-Only Memory (XOM) is a protection mechanism against some ROP attacks. XOM sets the code as executable and unreadable, so the access to any data, like literal pools, in the code section causes the fault with XOM. The compiler can disable literal pools for C source files, but not for assembly files, so I use movz/movk instead of literal pools in start.S for XOM. I add MOVL macro with movz/movk instructions like movl pseudo-instruction in armasm, and use the macro instead of literal pools. * sysdeps/aarch64/start.S: Use MOVL instead of literal pools. * sysdeps/aarch64/sysdep.h (MOVL): Add MOVL macro.
Diffstat (limited to 'nptl/tst-kill1.c')
0 files changed, 0 insertions, 0 deletions