mirror of
https://sourceware.org/git/glibc.git
synced 2025-07-04 08:02:32 +03:00
nptl: Fix pthread_getattr_np when modules with execstack are allowed (BZ 32897)
The BZ 32653 fix (12a497c716
) kept the stack pointer zeroing from make_main_stack_executable on _dl_make_stack_executable. However, previously the 'stack_endp' pointed to temporary variable created before the call of _dl_map_object_from_fd; while now we use the __libc_stack_end directly. Since pthread_getattr_np relies on correct __libc_stack_end, if _dl_make_stack_executable is called (for instance, when glibc.rtld.execstack=2 is set) __libc_stack_end will be set to zero, and the call will always fail. The __libc_stack_end zero was used a mitigation hardening, but since52a01100ad
it is used solely on pthread_getattr_np code. So there is no point in zeroing anymore. Checked on x86_64-linux-gnu and i686-linux-gnu. Reviewed-by: Sam James <sam@gentoo.org>
This commit is contained in:
@ -31,7 +31,7 @@ _dl_handle_execstack_tunable (void)
|
||||
break;
|
||||
|
||||
case stack_tunable_mode_force:
|
||||
if (_dl_make_stack_executable (&__libc_stack_end) != 0)
|
||||
if (_dl_make_stack_executable (__libc_stack_end) != 0)
|
||||
_dl_fatal_printf (
|
||||
"Fatal glibc error: cannot enable executable stack as tunable requires");
|
||||
break;
|
||||
|
@ -23,7 +23,7 @@
|
||||
so as to mprotect it. */
|
||||
|
||||
int
|
||||
_dl_make_stack_executable (void **stack_endp)
|
||||
_dl_make_stack_executable (const void *stack_endp)
|
||||
{
|
||||
return ENOSYS;
|
||||
}
|
||||
|
@ -945,7 +945,7 @@ struct link_map *
|
||||
_dl_map_object_from_fd (const char *name, const char *origname, int fd,
|
||||
struct filebuf *fbp, char *realname,
|
||||
struct link_map *loader, int l_type, int mode,
|
||||
void **stack_endp, Lmid_t nsid)
|
||||
const void *stack_endp, Lmid_t nsid)
|
||||
{
|
||||
struct link_map *l = NULL;
|
||||
const ElfW(Ehdr) *header;
|
||||
@ -2181,7 +2181,7 @@ _dl_map_new_object (struct link_map *loader, const char *name,
|
||||
|
||||
void *stack_end = __libc_stack_end;
|
||||
return _dl_map_object_from_fd (name, origname, fd, &fb, realname, loader,
|
||||
type, mode, &stack_end, nsid);
|
||||
type, mode, stack_end, nsid);
|
||||
}
|
||||
|
||||
struct link_map *
|
||||
|
@ -733,7 +733,7 @@ void _dl_handle_execstack_tunable (void) attribute_hidden;
|
||||
/* This function changes the permission of the memory region pointed
|
||||
by STACK_ENDP to executable and update the internal memory protection
|
||||
flags for future thread stack creation. */
|
||||
int _dl_make_stack_executable (void **stack_endp) attribute_hidden;
|
||||
int _dl_make_stack_executable (const void *stack_endp) attribute_hidden;
|
||||
|
||||
/* Variable pointing to the end of the stack (or close to it). This value
|
||||
must be constant over the runtime of the application. Some programs
|
||||
|
@ -26,12 +26,11 @@ extern struct hurd_startup_data *_dl_hurd_data attribute_hidden;
|
||||
so as to mprotect it. */
|
||||
|
||||
int
|
||||
_dl_make_stack_executable (void **stack_endp)
|
||||
_dl_make_stack_executable (const void *stack_endp)
|
||||
{
|
||||
/* Challenge the caller. */
|
||||
if (__builtin_expect (*stack_endp != __libc_stack_end, 0))
|
||||
if (__glibc_unlikely (stack_endp != __libc_stack_end))
|
||||
return EPERM;
|
||||
*stack_endp = NULL;
|
||||
|
||||
#if IS_IN (rtld)
|
||||
if (__mprotect ((void *)_dl_hurd_data->stack_base, _dl_hurd_data->stack_size,
|
||||
|
@ -273,6 +273,7 @@ tests += \
|
||||
tst-spin4 \
|
||||
tst-spin5 \
|
||||
tst-stack1 \
|
||||
tst-stack2 \
|
||||
tst-stdio1 \
|
||||
tst-stdio2 \
|
||||
tst-thrd-detach \
|
||||
@ -368,6 +369,7 @@ modules-names += \
|
||||
tst-atfork4mod \
|
||||
tst-create1mod \
|
||||
tst-fini1mod \
|
||||
tst-stack2-mod \
|
||||
tst-tls4moda \
|
||||
tst-tls4modb \
|
||||
# modules-names
|
||||
@ -541,4 +543,11 @@ LDFLAGS-tst-create1 = -Wl,-export-dynamic
|
||||
$(objpfx)tst-create1: $(shared-thread-library)
|
||||
$(objpfx)tst-create1.out: $(objpfx)tst-create1mod.so
|
||||
|
||||
$(objpfx)tst-stack2.out: $(objpfx)tst-stack2-mod.so
|
||||
LDFLAGS-tst-stack2-mod.so = -Wl,-z,execstack
|
||||
ifeq ($(have-no-error-execstack),yes)
|
||||
LDFLAGS-tst-stack2-mod.so += -Wl,--no-error-execstack
|
||||
endif
|
||||
tst-stack2-ENV = GLIBC_TUNABLES=glibc.rtld.execstack=2
|
||||
|
||||
endif
|
||||
|
39
sysdeps/pthread/tst-stack2-mod.c
Normal file
39
sysdeps/pthread/tst-stack2-mod.c
Normal file
@ -0,0 +1,39 @@
|
||||
/* Check if pthread_getattr_np works within modules with non-exectuble
|
||||
stacks (BZ 32897).
|
||||
Copyright (C) 2025 Free Software Foundation, Inc.
|
||||
This file is part of the GNU C Library.
|
||||
|
||||
The GNU C Library is free software; you can redistribute it and/or
|
||||
modify it under the terms of the GNU Lesser General Public
|
||||
License as published by the Free Software Foundation; either
|
||||
version 2.1 of the License, or (at your option) any later version.
|
||||
|
||||
The GNU C Library is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public
|
||||
License along with the GNU C Library; if not, see
|
||||
<https://www.gnu.org/licenses/>. */
|
||||
|
||||
#include <pthread.h>
|
||||
|
||||
bool init_result;
|
||||
|
||||
void
|
||||
__attribute__ ((constructor))
|
||||
init (void)
|
||||
{
|
||||
pthread_t me = pthread_self ();
|
||||
pthread_attr_t attr;
|
||||
init_result = pthread_getattr_np (me, &attr) == 0;
|
||||
}
|
||||
|
||||
int
|
||||
mod_func (void)
|
||||
{
|
||||
pthread_t me = pthread_self ();
|
||||
pthread_attr_t attr;
|
||||
return pthread_getattr_np (me, &attr);
|
||||
}
|
47
sysdeps/pthread/tst-stack2.c
Normal file
47
sysdeps/pthread/tst-stack2.c
Normal file
@ -0,0 +1,47 @@
|
||||
/* Check if pthread_getattr_np works within modules with non-exectuble
|
||||
stacks (BZ 32897).
|
||||
Copyright (C) 2025 Free Software Foundation, Inc.
|
||||
This file is part of the GNU C Library.
|
||||
|
||||
The GNU C Library is free software; you can redistribute it and/or
|
||||
modify it under the terms of the GNU Lesser General Public
|
||||
License as published by the Free Software Foundation; either
|
||||
version 2.1 of the License, or (at your option) any later version.
|
||||
|
||||
The GNU C Library is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public
|
||||
License along with the GNU C Library; if not, see
|
||||
<https://www.gnu.org/licenses/>. */
|
||||
|
||||
#include <pthread.h>
|
||||
#include <stdbool.h>
|
||||
#include <support/xdlfcn.h>
|
||||
#include <support/check.h>
|
||||
|
||||
static int
|
||||
do_test (void)
|
||||
{
|
||||
{
|
||||
pthread_t me = pthread_self ();
|
||||
pthread_attr_t attr;
|
||||
TEST_COMPARE (pthread_getattr_np (me, &attr), 0);
|
||||
}
|
||||
|
||||
void *h = xdlopen ("tst-stack2-mod.so", RTLD_NOW);
|
||||
|
||||
bool *init_result = xdlsym (h, "init_result");
|
||||
TEST_COMPARE (*init_result, true);
|
||||
|
||||
int (*mod_func)(void) = xdlsym (h, "mod_func");
|
||||
TEST_COMPARE (mod_func (), 0);
|
||||
|
||||
xdlclose (h);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
#include <support/test-driver.c>
|
@ -19,10 +19,10 @@
|
||||
#include <ldsodefs.h>
|
||||
|
||||
int
|
||||
_dl_make_stack_executable (void **stack_endp)
|
||||
_dl_make_stack_executable (const void *stack_endp)
|
||||
{
|
||||
/* This gives us the highest/lowest page that needs to be changed. */
|
||||
uintptr_t page = ((uintptr_t) *stack_endp
|
||||
uintptr_t page = ((uintptr_t) stack_endp
|
||||
& -(intptr_t) GLRO(dl_pagesize));
|
||||
|
||||
if (__mprotect ((void *) page, GLRO(dl_pagesize),
|
||||
@ -35,9 +35,6 @@ _dl_make_stack_executable (void **stack_endp)
|
||||
) != 0)
|
||||
return errno;
|
||||
|
||||
/* Clear the address. */
|
||||
*stack_endp = NULL;
|
||||
|
||||
/* Remember that we changed the permission. */
|
||||
GL(dl_stack_flags) |= PF_X;
|
||||
|
||||
|
Reference in New Issue
Block a user