about summary refs log tree commit diff
path: root/sysdeps
diff options
context:
space:
mode:
authorRoland McGrath <roland@gnu.org>2004-03-20 20:19:09 +0000
committerRoland McGrath <roland@gnu.org>2004-03-20 20:19:09 +0000
commit316febbc9fdf7f8c654bb6bb68c5506fce517cd7 (patch)
tree89e0db881df42f1c3161ff006a7cb37bb4d47e0a /sysdeps
parent2fe30ae5daa70cdc6cc49f637efa31b0c379c2e7 (diff)
downloadglibc-316febbc9fdf7f8c654bb6bb68c5506fce517cd7.tar.gz
glibc-316febbc9fdf7f8c654bb6bb68c5506fce517cd7.tar.xz
glibc-316febbc9fdf7f8c654bb6bb68c5506fce517cd7.zip
2004-03-20 Roland McGrath <roland@frob.com>
	* sysdeps/mach/hurd/dl-execstack.c: New file.
Diffstat (limited to 'sysdeps')
-rw-r--r--sysdeps/mach/hurd/dl-execstack.c47
1 files changed, 47 insertions, 0 deletions
diff --git a/sysdeps/mach/hurd/dl-execstack.c b/sysdeps/mach/hurd/dl-execstack.c
new file mode 100644
index 0000000000..d5c07369cf
--- /dev/null
+++ b/sysdeps/mach/hurd/dl-execstack.c
@@ -0,0 +1,47 @@
+/* Stack executability handling for GNU dynamic linker.  Hurd version.
+   Copyright (C) 2004 Free Software Foundation, Inc.
+   This file is part of the GNU C Library.
+
+   The GNU C Library is free software; you can redistribute it and/or
+   modify it under the terms of the GNU Lesser General Public
+   License as published by the Free Software Foundation; either
+   version 2.1 of the License, or (at your option) any later version.
+
+   The GNU C Library is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+   Lesser General Public License for more details.
+
+   You should have received a copy of the GNU Lesser General Public
+   License along with the GNU C Library; if not, write to the Free
+   Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
+   02111-1307 USA.  */
+
+#include <ldsodefs.h>
+#include <hurdstartup.h>
+#include <errno.h>
+
+extern struct hurd_startup_data *_dl_hurd_data attribute_hidden;
+
+/* There is no portable way to know the bounds of the initial thread's stack
+   so as to mprotect it.  */
+
+int
+internal_function
+_dl_make_stack_executable (void **stack_endp)
+{
+  /* Challenge the caller.  */
+  if (__builtin_expect (*stack_endp != __libc_stack_end, 0))
+    return EPERM;
+  *stack_endp = NULL;
+
+  if (__mprotect ((void *)_dl_hurd_data->stack_base, _dl_hurd_data->stack_size,
+		  PROT_READ|PROT_WRITE|PROT_EXEC) != 0)
+    return errno;
+
+  /* Remember that we changed the permission.  */
+  GL(dl_stack_flags) |= PF_X;
+
+  return 0;
+}
+rtld_hidden_def (_dl_make_stack_executable)