@@ -88,16 +88,6 @@ struct filebuf
#define STRING(x) __STRING (x)
-int __stack_prot attribute_hidden attribute_relro
-#if _STACK_GROWS_DOWN && defined PROT_GROWSDOWN
- = PROT_GROWSDOWN;
-#elif _STACK_GROWS_UP && defined PROT_GROWSUP
- = PROT_GROWSUP;
-#else
- = 0;
-#endif
-
-
/* This is the decomposed LD_LIBRARY_PATH search path. */
struct r_search_path_struct __rtld_env_path_list attribute_relro;
@@ -1308,41 +1298,7 @@ _dl_map_object_from_fd (const char *name, const char *origname, int fd,
if (__glibc_unlikely ((stack_flags &~ GL(dl_stack_flags)) & PF_X))
{
/* The stack is presently not executable, but this module
- requires that it be executable. We must change the
- protection of the variable which contains the flags used in
- the mprotect calls. */
-#ifdef SHARED
- if ((mode & (__RTLD_DLOPEN | __RTLD_AUDIT)) == __RTLD_DLOPEN)
- {
- const uintptr_t p = (uintptr_t) &__stack_prot & -GLRO(dl_pagesize);
- const size_t s = (uintptr_t) (&__stack_prot + 1) - p;
-
- struct link_map *const m = &GL(dl_rtld_map);
- const uintptr_t relro_end = ((m->l_addr + m->l_relro_addr
- + m->l_relro_size)
- & -GLRO(dl_pagesize));
- if (__glibc_likely (p + s <= relro_end))
- {
- /* The variable lies in the region protected by RELRO. */
- if (__mprotect ((void *) p, s, PROT_READ|PROT_WRITE) < 0)
- {
- errstring = N_("cannot change memory protections");
- goto lose_errno;
- }
- __stack_prot |= PROT_READ|PROT_WRITE|PROT_EXEC;
- __mprotect ((void *) p, s, PROT_READ);
- }
- else
- __stack_prot |= PROT_READ|PROT_WRITE|PROT_EXEC;
- }
- else
-#endif
- __stack_prot |= PROT_READ|PROT_WRITE|PROT_EXEC;
-
-#ifdef check_consistency
- check_consistency ();
-#endif
-
+ requires that it be executable. */
#if PTHREAD_IN_LIBC
errval = _dl_make_stacks_executable (stack_endp);
#else
@@ -27,35 +27,30 @@
#include <sysdep.h>
#include <unistd.h>
-extern int __stack_prot attribute_relro attribute_hidden;
-
static int
make_main_stack_executable (void **stack_endp)
{
/* This gives us the highest/lowest page that needs to be changed. */
uintptr_t page = ((uintptr_t) *stack_endp
& -(intptr_t) GLRO(dl_pagesize));
- int result = 0;
- if (__builtin_expect (__mprotect ((void *) page, GLRO(dl_pagesize),
- __stack_prot) == 0, 1))
- goto return_success;
- result = errno;
- goto out;
+ if (__mprotect ((void *) page, GLRO(dl_pagesize),
+ PROT_READ | PROT_WRITE | PROT_EXEC
+#if _STACK_GROWS_DOWN
+ | PROT_GROWSDOWN
+#elif _STACK_GROWS_UP
+ | PROT_GROWSUP
+#endif
+ ) != 0)
+ return errno;
- return_success:
/* Clear the address. */
*stack_endp = NULL;
/* Remember that we changed the permission. */
GL(dl_stack_flags) |= PF_X;
- out:
-#ifdef check_consistency
- check_consistency ();
-#endif
-
- return result;
+ return 0;
}
int