[PATCH 0/5] x86: CVE-2017-5715, aka Spectre

Jakub Jelinek jakub@redhat.com
Mon Jan 8 15:07:00 GMT 2018


On Mon, Jan 08, 2018 at 07:00:11AM -0800, H.J. Lu wrote:
> See:
> 
> https://sourceware.org/ml/binutils/2017-11/msg00369.html

Program Headers:
  Type           Offset   VirtAddr   PhysAddr   FileSiz MemSiz  Flg Align
  LOAD           0x000000 0x00000000 0x00000000 0x00200 0x00200 R   0x200000
  LOAD           0x000fd0 0x00200fd0 0x00200fd0 0x0002b 0x0002b R E 0x200000
  LOAD           0x001000 0x00201000 0x00201000 0x00058 0x00058 R   0x200000
  LOAD           0x200f80 0x00400f80 0x00400f80 0x000a0 0x000a0 RW  0x200000
  DYNAMIC        0x200f80 0x00400f80 0x00400f80 0x00080 0x00080 RW  0x4
  GNU_STACK      0x000000 0x00000000 0x00000000 0x00000 0x00000 RW  0x10
  GNU_RELRO      0x200f80 0x00400f80 0x00400f80 0x00080 0x00080 R   0x1

Uh, 3 read-only LOADs instead of 2?  Shouldn't then all the read-only
non-executable sections be emitted together, so that you have a R, then R E,
then RW PT_LOADs?

	Jakub



More information about the Gcc-patches mailing list