summaryrefslogtreecommitdiff
path: root/src/pkg/runtime/malloc.cgo
diff options
context:
space:
mode:
authorAdam Langley <agl@golang.org>2009-11-13 10:08:51 -0800
committerAdam Langley <agl@golang.org>2009-11-13 10:08:51 -0800
commit6462f9307491d37af52007ae41f72c5fc411e769 (patch)
tree84d3734c7512711d549eef0400de8e477b391863 /src/pkg/runtime/malloc.cgo
parentd98afc3f915fef85f2fe65295d685d6b45025333 (diff)
downloadgolang-6462f9307491d37af52007ae41f72c5fc411e769.tar.gz
runtime: warn about SELinux based mmap failures on Linux.
SELinux will cause mmap to fail when we request w+x memory unless the user has configured their policies. We have a warning in make.bash, but it's quite likely that the policy will be reset at some point and then all their binaries start failing. This patch prints a warning on Linux when mmap fails with EACCES. R=rsc CC=golang-dev http://codereview.appspot.com/152086
Diffstat (limited to 'src/pkg/runtime/malloc.cgo')
-rw-r--r--src/pkg/runtime/malloc.cgo13
1 files changed, 12 insertions, 1 deletions
diff --git a/src/pkg/runtime/malloc.cgo b/src/pkg/runtime/malloc.cgo
index 6a769c9e0..3b755fc4e 100644
--- a/src/pkg/runtime/malloc.cgo
+++ b/src/pkg/runtime/malloc.cgo
@@ -208,8 +208,19 @@ mallocinit(void)
void*
SysAlloc(uintptr n)
{
+ void *p;
mstats.sys += n;
- return runtime_mmap(nil, n, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_ANON|MAP_PRIVATE, -1, 0);
+ p = runtime_mmap(nil, n, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_ANON|MAP_PRIVATE, -1, 0);
+ if(p < (void*)4096) {
+ if(p == (void*)EACCES) {
+ printf("mmap: access denied\n");
+ printf("If you're running SELinux, enable execmem for this process.\n");
+ } else {
+ printf("mmap: errno=%p\n", p);
+ }
+ exit(2);
+ }
+ return p;
}
void