ARM: 6342/1: fix ASLR of PIE executables
Since commits990cb8acf2andcc92c28b2d, it is possible to have full address space layout randomization (ASLR) on ARM. Except that one small change was missing for ASLR of PIE executables. Signed-off-by: Nicolas Pitre <nicolas.pitre@linaro.org> Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
This commit is contained in:
parent
01723a9566
commit
e4eab08d60
1 changed files with 1 additions and 1 deletions
|
|
@ -800,7 +800,7 @@ static int load_elf_binary(struct linux_binprm *bprm, struct pt_regs *regs)
|
||||||
* default mmap base, as well as whatever program they
|
* default mmap base, as well as whatever program they
|
||||||
* might try to exec. This is because the brk will
|
* might try to exec. This is because the brk will
|
||||||
* follow the loader, and is not movable. */
|
* follow the loader, and is not movable. */
|
||||||
#ifdef CONFIG_X86
|
#if defined(CONFIG_X86) || defined(CONFIG_ARM)
|
||||||
load_bias = 0;
|
load_bias = 0;
|
||||||
#else
|
#else
|
||||||
load_bias = ELF_PAGESTART(ELF_ET_DYN_BASE - vaddr);
|
load_bias = ELF_PAGESTART(ELF_ET_DYN_BASE - vaddr);
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue