On 29.04.20 15:36, Ben Hutchings wrote: > Control: tag -1 upstream fixed-upstream patch > > On Wed, 2020-04-29 at 14:12 +1000, Russell Coker wrote: >> Package: klibc-utils >> Version: 2.0.7-1 >> Severity: normal >> >> root@sevm:~/pol# /usr/lib/klibc/bin/fstype < /dev/sda2 >> Segmentation fault >> root@sevm:~/pol# execstack -c /usr/lib/klibc/bin/fstype >> root@sevm:~/pol# /usr/lib/klibc/bin/fstype < /dev/sda2 >> FSTYPE=btrfs >> FSSIZE=719360278528 >> >> The fstype program is listed as needing an executable stack, which will cause >> it to crash when run on a system with a security policy preventing executable >> stacke. If you clear the execstack bit it appears to work correctly. > [...] > > I've fixed this upstream but not made a new release yet: > > https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=9d8d648e604026b32cad00a84ed6c29cbd157641
On hppa/parisc we still need executable stacks for the signal trampoline return code. Might your patch then maybe break fstype on hppa? I didn't tested it... Helge
signature.asc
Description: OpenPGP digital signature