Jan Kratochvil 60bfba7e85 PIE randomization
This patch is using mmap()'s randomization functionality in such a way that
it maps the main executable of (specially compiled/linked -pie/-fpie)
ET_DYN binaries onto a random address (in cases in which mmap() is allowed
to perform a randomization).

Origin of this patch is in exec-shield
(http://people.redhat.com/mingo/exec-shield/)

[jkosina@suse.cz: pie randomization: fix BAD_ADDR macro]
Signed-off-by: Jan Kratochvil <honza@jikos.cz>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland McGrath <roland@redhat.com>
Cc: Jakub Jelinek <jakub@redhat.com>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-07-16 09:05:42 -07:00
..
2007-07-14 15:14:14 -05:00
2007-07-16 09:05:41 -07:00
2007-05-17 05:23:04 -07:00
2007-05-21 09:18:19 -07:00
2007-05-08 11:14:59 -07:00
2007-07-09 08:24:13 +01:00
2007-05-17 05:23:04 -07:00
2007-07-10 08:04:15 +02:00
2007-07-16 09:05:42 -07:00
2007-07-16 09:05:41 -07:00
2007-07-16 09:05:42 -07:00
2007-07-16 09:05:34 -07:00
2007-05-21 09:18:19 -07:00
2007-05-17 05:23:04 -07:00
2007-05-17 05:23:04 -07:00
2007-07-16 09:05:42 -07:00
2007-05-21 09:18:19 -07:00
2007-07-10 08:03:34 +02:00
2007-05-18 13:09:34 -07:00
2007-05-15 08:54:00 -07:00
2007-05-23 20:14:13 -07:00
2007-05-21 09:18:19 -07:00
2007-05-08 11:15:01 -07:00
2007-05-17 05:23:04 -07:00
2007-05-08 11:15:09 -07:00
2007-06-04 13:25:10 -07:00
2007-05-09 06:44:57 +02:00
2007-05-17 05:23:04 -07:00
2007-05-11 08:29:36 -07:00
2007-05-08 20:10:00 -07:00
2007-07-10 08:04:16 +02:00
2007-07-10 08:04:15 +02:00
2007-05-09 07:10:02 +02:00
2007-05-08 11:15:01 -07:00
2007-05-18 13:09:34 -07:00