Index: gcc/libmudflap/mf-runtime.c |
diff --git a/gcc/libmudflap/mf-runtime.c b/gcc/libmudflap/mf-runtime.c |
index b2c462e52516d08ae19b918988374556464d0bf3..25e49ba9d997554ee6d100f5eb6e29fc82a8c518 100644 |
--- a/gcc/libmudflap/mf-runtime.c |
+++ b/gcc/libmudflap/mf-runtime.c |
@@ -303,6 +303,14 @@ __mf_set_default_options () |
#ifdef LIBMUDFLAPTH |
__mf_opts.thread_stack = 0; |
#endif |
+ |
+ /* PR41443: Beware that the above flags will be applied to |
+ setuid/setgid binaries, and cannot be overriden with |
+ $MUDFLAP_OPTIONS. So the defaults must be non-exploitable. |
+ |
+ Should we consider making the default violation_mode something |
+ harsher than viol_nop? OTOH, glibc's MALLOC_CHECK_ is disabled |
+ by default for these same programs. */ |
} |
static struct mudoption |
@@ -442,7 +450,7 @@ __mf_usage () |
"This is a %s%sGCC \"mudflap\" memory-checked binary.\n" |
"Mudflap is Copyright (C) 2002-2010 Free Software Foundation, Inc.\n" |
"\n" |
- "The mudflap code can be controlled by an environment variable:\n" |
+ "Unless setuid, a program's mudflap options be set by an environment variable:\n" |
"\n" |
"$ export MUDFLAP_OPTIONS='<options>'\n" |
"$ <mudflapped_program>\n" |
@@ -695,6 +703,12 @@ __mf_init () |
if (LIKELY (__mf_starting_p == 0)) |
return; |
+#if defined(__FreeBSD__) && defined(LIBMUDFLAPTH) |
+ pthread_self(); |
+ LOCKTH (); |
+ UNLOCKTH (); |
+#endif /* Prime mutex which calls calloc upon first lock to avoid deadlock. */ |
+ |
/* This initial bootstrap phase requires that __mf_starting_p = 1. */ |
#ifdef PIC |
__mf_resolve_dynamics (); |
@@ -705,7 +719,8 @@ __mf_init () |
__mf_set_default_options (); |
- ov = getenv ("MUDFLAP_OPTIONS"); |
+ if (getuid () == geteuid () && getgid () == getegid ()) /* PR41433, not setuid */ |
+ ov = getenv ("MUDFLAP_OPTIONS"); |
if (ov) |
{ |
int rc = __mfu_set_options (ov); |