mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-11-18 15:44:02 +08:00
ARM: 6342/1: fix ASLR of PIE executables
Since commits990cb8acf2
andcc92c28b2d
, it is possible to have full address space layout randomization (ASLR) on ARM. Except that one small change was missing for ASLR of PIE executables. Signed-off-by: Nicolas Pitre <nicolas.pitre@linaro.org> Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
This commit is contained in:
parent
01723a9566
commit
e4eab08d60
@ -800,7 +800,7 @@ static int load_elf_binary(struct linux_binprm *bprm, struct pt_regs *regs)
|
|||||||
* default mmap base, as well as whatever program they
|
* default mmap base, as well as whatever program they
|
||||||
* might try to exec. This is because the brk will
|
* might try to exec. This is because the brk will
|
||||||
* follow the loader, and is not movable. */
|
* follow the loader, and is not movable. */
|
||||||
#ifdef CONFIG_X86
|
#if defined(CONFIG_X86) || defined(CONFIG_ARM)
|
||||||
load_bias = 0;
|
load_bias = 0;
|
||||||
#else
|
#else
|
||||||
load_bias = ELF_PAGESTART(ELF_ET_DYN_BASE - vaddr);
|
load_bias = ELF_PAGESTART(ELF_ET_DYN_BASE - vaddr);
|
||||||
|
Loading…
Reference in New Issue
Block a user