mirror of
git://sourceware.org/git/glibc.git
synced 2025-03-06 20:58:33 +01:00
The __stack_prot is used by Linux to make the stack executable if a modules requires it. It is also marked as RELRO, which requires to change the segment permission to RW to update it. Also, there is no need to keep track of the flags: either the stack will have the default permission of the ABI or should be change to PROT_READ | PROT_WRITE | PROT_EXEC. The only additional flag, PROT_GROWSDOWN or PROT_GROWSUP, is Linux only and can be deducted from _STACK_GROWS_DOWN/_STACK_GROWS_UP. Also, the check_consistency function was already removed some time ago. Checked on x86_64-linux-gnu and i686-linux-gnu. Reviewed-by: Florian Weimer <fweimer@redhat.com>
108 lines
2.9 KiB
C
108 lines
2.9 KiB
C
/* Stack executability handling for GNU dynamic linker. Linux version.
|
|
Copyright (C) 2003-2024 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library; if not, see
|
|
<https://www.gnu.org/licenses/>. */
|
|
|
|
#include <errno.h>
|
|
#include <ldsodefs.h>
|
|
#include <libintl.h>
|
|
#include <list.h>
|
|
#include <pthreadP.h>
|
|
#include <stackinfo.h>
|
|
#include <stdbool.h>
|
|
#include <sys/mman.h>
|
|
#include <sysdep.h>
|
|
#include <unistd.h>
|
|
|
|
static int
|
|
make_main_stack_executable (void **stack_endp)
|
|
{
|
|
/* This gives us the highest/lowest page that needs to be changed. */
|
|
uintptr_t page = ((uintptr_t) *stack_endp
|
|
& -(intptr_t) GLRO(dl_pagesize));
|
|
|
|
if (__mprotect ((void *) page, GLRO(dl_pagesize),
|
|
PROT_READ | PROT_WRITE | PROT_EXEC
|
|
#if _STACK_GROWS_DOWN
|
|
| PROT_GROWSDOWN
|
|
#elif _STACK_GROWS_UP
|
|
| PROT_GROWSUP
|
|
#endif
|
|
) != 0)
|
|
return errno;
|
|
|
|
/* Clear the address. */
|
|
*stack_endp = NULL;
|
|
|
|
/* Remember that we changed the permission. */
|
|
GL(dl_stack_flags) |= PF_X;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
_dl_make_stacks_executable (void **stack_endp)
|
|
{
|
|
/* First the main thread's stack. */
|
|
int err = make_main_stack_executable (stack_endp);
|
|
if (err != 0)
|
|
return err;
|
|
|
|
lll_lock (GL (dl_stack_cache_lock), LLL_PRIVATE);
|
|
|
|
list_t *runp;
|
|
list_for_each (runp, &GL (dl_stack_used))
|
|
{
|
|
err = __nptl_change_stack_perm (list_entry (runp, struct pthread, list));
|
|
if (err != 0)
|
|
break;
|
|
}
|
|
|
|
/* Also change the permission for the currently unused stacks. This
|
|
might be wasted time but better spend it here than adding a check
|
|
in the fast path. */
|
|
if (err == 0)
|
|
list_for_each (runp, &GL (dl_stack_cache))
|
|
{
|
|
err = __nptl_change_stack_perm (list_entry (runp, struct pthread,
|
|
list));
|
|
if (err != 0)
|
|
break;
|
|
}
|
|
|
|
lll_unlock (GL (dl_stack_cache_lock), LLL_PRIVATE);
|
|
|
|
return err;
|
|
}
|
|
|
|
int
|
|
__nptl_change_stack_perm (struct pthread *pd)
|
|
{
|
|
#if _STACK_GROWS_DOWN
|
|
void *stack = pd->stackblock + pd->guardsize;
|
|
size_t len = pd->stackblock_size - pd->guardsize;
|
|
#elif _STACK_GROWS_UP
|
|
void *stack = pd->stackblock;
|
|
size_t len = (uintptr_t) pd - pd->guardsize - (uintptr_t) pd->stackblock;
|
|
#else
|
|
# error "Define either _STACK_GROWS_DOWN or _STACK_GROWS_UP"
|
|
#endif
|
|
if (__mprotect (stack, len, PROT_READ | PROT_WRITE | PROT_EXEC) != 0)
|
|
return errno;
|
|
|
|
return 0;
|
|
}
|
|
rtld_hidden_def (__nptl_change_stack_perm)
|