This is the mail archive of the libc-alpha@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Re: Fix hppa/ia64/microblaze executable stack default (bug 22156)


On 2017-09-22, at 12:08 PM, Joseph Myers wrote:

> On Fri, 22 Sep 2017, John David Anglin wrote:
> 
>> On 2017-09-19, at 10:42 AM, Jeff Law wrote:
>> 
>>> I don't think the PA was ever converted to the new bits from the Adacore
>>> guys -- meaning I think it still generates executable stack trampolines
>>> for nested functions.
>> 
>> Yes.
> 
> We now have two different contradictory assertions about hppa, here and 
> <https://gcc.gnu.org/ml/gcc-patches/2017-09/msg01449.html>.
> 
> Can someone with hppa-linux hardware confirm what stack permissions the 
> kernel in fact starts processes with in the absence of GNU-stack markers 
> (Andreas's analysis indicates non-executable), what if any changes glibc 
> makes to those permissions after process creation, and whether trampolines 
> work in such a process?  Testing whether my glibc patch changes the 
> answers to any of those questions would be a bonus.


This is what I see for /bin/bash when we reach main:
f8d01000-f8d23000 rwxp 00000000 00:00 0                                  [stack]

This what I see for ld.so at _start:
f8d01000-f8d23000 rwxp 00000000 00:00 0                                  [stack]

Don't see any GNU-stack markers in either.

I'll try to test patch this weekend.

Dave
--
John David Anglin	dave.anglin@bell.net




Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]