[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH 01/17] elf-load: Respect PT_GNU_STACK
From: |
Samuel Thibault |
Subject: |
Re: [PATCH 01/17] elf-load: Respect PT_GNU_STACK |
Date: |
Wed, 27 Mar 2024 19:37:24 +0100 |
User-agent: |
NeoMutt/20170609 (1.8.3) |
Hello,
Sergey Bugaev, le mer. 27 mars 2024 19:18:25 +0300, a ecrit:
> diff --git a/include/mach/exec/exec.h b/include/mach/exec/exec.h
> index 94b234b0..29fa897d 100644
> --- a/include/mach/exec/exec.h
> +++ b/include/mach/exec/exec.h
> @@ -51,6 +51,8 @@ typedef struct exec_info
> /* (ELF) Address of interpreter string for loading shared libraries,
> null if none. */
> vm_offset_t interp;
>
> + /* Required stack protection. */
> + vm_prot_t stack_prot;
But it's not getting used anywhere?
Samuel
- [PATCH 00/17] Preparatory patches, Sergey Bugaev, 2024/03/27
- [PATCH 04/17] Load 64-bit ELFs on all 64-bit ports, Sergey Bugaev, 2024/03/27
- [PATCH 06/17] kern/syscall_subr.c: Use copyin()/copyout() to access user memory, Sergey Bugaev, 2024/03/27
- [PATCH 03/17] Use the x86_64 message ABI on all 64-bit ports, Sergey Bugaev, 2024/03/27
- [PATCH 02/17] Disable host_kernel_version() everywhere but on i386, Sergey Bugaev, 2024/03/27