df70204db5
There is a link hack in linux-user which produces an executable that looks like PIE, but always has text relocations since all object files isn't position-independent (compiled without -fpic/-fpie). Dynamic loader has to do more work to load a binary with text relocations. The best way to keep this functionality is to build a true PIE without text relocations. Signed-off-by: Kirill A. Shutemov <kirill@shutemov.name> Signed-off-by: Blue Swirl <blauwirbel@gmail.com> |
||
---|---|---|
.. | ||
alpha | ||
arm | ||
cris | ||
i386 | ||
m68k | ||
microblaze | ||
mips | ||
mips64 | ||
mipsn32 | ||
ppc | ||
sh4 | ||
sparc | ||
sparc64 | ||
x86_64 | ||
elfload32.c | ||
elfload.c | ||
errno_defs.h | ||
flat.h | ||
flatload.c | ||
ioctls.h | ||
linux_loop.h | ||
linuxload.c | ||
m68k-sim.c | ||
main.c | ||
mmap.c | ||
qemu-types.h | ||
qemu.h | ||
signal.c | ||
socket.h | ||
strace.c | ||
strace.list | ||
syscall_defs.h | ||
syscall_types.h | ||
syscall.c | ||
uaccess.c | ||
vm86.c |