Age | Commit message (Collapse) | Author |
|
|
|
ok miod@ pvalchev@
|
|
|
|
|
|
|
|
(okay theo, kettenis)
|
|
|
|
installed.
Noticed by jmc@
|
|
of the n'th (n>1) file fails, the previous ones get removed before exit(1)
Idea by jason; ok millert deraadt
|
|
for hppa; drahn@ lots of helps and ok
|
|
This `repairs' setting up BSDSRCDIR in /etc/mk.conf and nowhere else.
|
|
|
|
|
|
of putting it with the text. This removes the execute permission
from readonly data. This constrains the executable region to portions
of the executable which need to be executable. Note: not all processors
or mmus are capable of -X protection at the page level, but should
handle ELF images which specify specific RWX protections on each section.
|
|
executable regions which are writable. If a section of an executable is
writable and executable, it is much easier for errant code to modify the
executable's behavior.
Two current areas in shared library environments which have this
critical problem are the GOT (Global Offset Table) and PLT (Procedure
Linkage Table). The PLT is required to be executable and both GOT and
PLT are writable on most architectures. On most ELF architecture
machines this would cause shared libraries to have data and BSS marked
as executable.
Padding to the linker script for programs and shared libraries/objects
to isolate the GOT and PLT into their own load sections in the
executables. This allows only the text(readonly) region and the PLT
region to be marked executable with the normal data and BSS not marked
as executable. The PLT region is still marked executable on most
architectures because the PLT lives in the "data" or "BSS" regions
and the dynamic loader will need to modify it. Since the GOT and PLT
should only ever be written by the dynamic linker, it will be modified
to mprotect those regions so that they are not writable during normal
execution. If the dynamic linker needs to modify the regions later,
(eg for lazy binding), it will mprotect the region, make the necessary
changes, and mprotect it back. Since it is possible to receive a
signal which would interrupt the program flow and perhaps cause the
dynamic linker to modify the same (or nearby) PLT references, it is now
necessary for signals to be blocked for the duration of the mprotect.
This diff was omitted from the original commit, this implements the
-Z option to produce traditional (non protected) executables.
|
|
disable support for Update-prog and Checkin-prog. This is a good
idea for anonymouse cvs servers or anyone who doesn't need this
feature. From Stefan Esser.
|
|
it again. This removes a potential double-free problem, whereby
this function could free dir_name and then immediately return due
to invalid directory syntax (without ever reassigning dir_name),
then re-enter and free dir_name again. Fix from Stefan Esser.
|
|
-lpthread may confuse perl's Configure since it wants to nm libs
to see what is in them butu I haven't noticed any problems with
this (yet).
|
|
look in the path of the main map before giving up.
ok deraadt@.
(This fixes a few kde issues, and removes loads of needs for ldconfig)
|
|
- build a tree of modules inter-dependencies.
- make sure dependent modules are .init'ed before depending modules.
- flag initialization so that cycles don't bork ld.so.
okay deraadt@, drahn@.
|
|
is trying to load another library.
|
|
|
|
executable regions which are writable. If a section of an executable is
writable and executable, it is much easier for errant code to modify the
executable's behavior.
Two current areas in shared library environments which have this
critical problem are the GOT (Global Offset Table) and PLT (Procedure
Linkage Table). The PLT is required to be executable and both GOT and
PLT are writable on most architectures. On most ELF architecture
machines this would cause shared libraries to have data and BSS marked
as executable.
Padding to the linker script for programs and shared libraries/objects
to isolate the GOT and PLT into their own load sections in the
executables. This allows only the text(readonly) region and the PLT
region to be marked executable with the normal data and BSS not marked
as executable. The PLT region is still marked executable on most
architectures because the PLT lives in the "data" or "BSS" regions
and the dynamic loader will need to modify it. Since the GOT and PLT
should only ever be written by the dynamic linker, it will be modified
to mprotect those regions so that they are not writable during normal
execution. If the dynamic linker needs to modify the regions later,
(eg for lazy binding), it will mprotect the region, make the necessary
changes, and mprotect it back. Since it is possible to receive a
signal which would interrupt the program flow and perhaps cause the
dynamic linker to modify the same (or nearby) PLT references, it is now
necessary for signals to be blocked for the duration of the mprotect.
|
|
but will produce old style executables when the other changes appear.
|
|
|
|
|
|
ok miod drahn marc
|
|
|
|
This behavior broke libraries which were named libN-X.Y.so.A.B. ok pval, espie
|
|
|
|
|
|
Update Safe module to version 2.09
millert@ ok
|
|
abbreviation for --keep-locals. from binutils-current.
millert@ ok.
|
|
|
|
sense this way and works around an apparent gcc optimizer bug on
macppc related to inline functions. OK drahn@
|
|
|
|
|
|
o Prevent close() from clobbering errno.
Patch from Peter Werner; closes PR 2995
|
|
time anymore.
|
|
|
|
|
|
|
|
|
|
<hshoexer at yerbouti dot franken dot de> via pr/3014.
mickey@ and weingart@ ok.
|
|
|
|
|
|
is already in the src dir. miod@ OK
|
|
with optimization.
|
|
now build libraries with propolice enabled. Without this, existing
binaries (such as ports/packages) that link with any system library
other than libc will fail with an undefined symbol of "___guard"
(__guard on ELF).
Pointed out by markus@ and discussed with deraadt@
|
|
|