[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: simple aarch64 binary can cause linux-user QEMU to segv in zero_bss(
From: |
Peter Maydell |
Subject: |
Re: simple aarch64 binary can cause linux-user QEMU to segv in zero_bss() |
Date: |
Tue, 24 Nov 2020 17:31:58 +0000 |
On Tue, 24 Nov 2020 at 17:18, Richard Henderson
<richard.henderson@linaro.org> wrote:
>
> On 11/23/20 11:52 AM, Peter Maydell wrote:
> > Somebody reported this on stackoverflow. Before I spend too
> > much time thinking about how this ought to work, does anybody
> > have the elfload.c intended operation in their head still?
> > Should we try to get the SEGV handler working earlier in initialization
> > (it's pretty hairy machinery so that could be tricky) or should
> > elfload.c be mprotect()ing things appropriately itself?
>
> elfload should be handling this.
>
> I believe this should be fixed by
>
> 20201118165206.2826-1-steplong@quicinc.com/">https://patchew.org/QEMU/20201118165206.2826-1-steplong@quicinc.com/
That does indeed seem to fix things. I have a couple of questions
about the patch that I'll make in that thread...
-- PMM