mirror of
https://sourceware.org/git/glibc.git
synced 2025-08-01 10:06:57 +03:00
The BZ 32653 fix (12a497c716
) kept the stack pointer zeroing from make_main_stack_executable on _dl_make_stack_executable. However, previously the 'stack_endp' pointed to temporary variable created before the call of _dl_map_object_from_fd; while now we use the __libc_stack_end directly. Since pthread_getattr_np relies on correct __libc_stack_end, if _dl_make_stack_executable is called (for instance, when glibc.rtld.execstack=2 is set) __libc_stack_end will be set to zero, and the call will always fail. The __libc_stack_end zero was used a mitigation hardening, but since52a01100ad
it is used solely on pthread_getattr_np code. So there is no point in zeroing anymore. Checked on x86_64-linux-gnu and i686-linux-gnu. Reviewed-by: Sam James <sam@gentoo.org>
49 lines
1.6 KiB
C
49 lines
1.6 KiB
C
/* Stack executability handling for GNU dynamic linker. Hurd version.
|
|
Copyright (C) 2004-2025 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library; if not, see
|
|
<https://www.gnu.org/licenses/>. */
|
|
|
|
#include <ldsodefs.h>
|
|
#include <hurdstartup.h>
|
|
#include <errno.h>
|
|
|
|
extern struct hurd_startup_data *_dl_hurd_data attribute_hidden;
|
|
|
|
/* There is no portable way to know the bounds of the initial thread's stack
|
|
so as to mprotect it. */
|
|
|
|
int
|
|
_dl_make_stack_executable (const void *stack_endp)
|
|
{
|
|
/* Challenge the caller. */
|
|
if (__glibc_unlikely (stack_endp != __libc_stack_end))
|
|
return EPERM;
|
|
|
|
#if IS_IN (rtld)
|
|
if (__mprotect ((void *)_dl_hurd_data->stack_base, _dl_hurd_data->stack_size,
|
|
PROT_READ|PROT_WRITE|PROT_EXEC) != 0)
|
|
return errno;
|
|
|
|
/* Remember that we changed the permission. */
|
|
GL(dl_stack_flags) |= PF_X;
|
|
|
|
return 0;
|
|
#else
|
|
/* We don't bother to implement this for static linking. */
|
|
return ENOSYS;
|
|
#endif
|
|
}
|