mirror of
https://sourceware.org/git/glibc.git
synced 2024-11-09 23:00:07 +00:00
elf: Refuse to dlopen PIE objects [BZ #24323]
Another executable has already been mapped, so the dynamic linker cannot perform relocations correctly for the second executable.
This commit is contained in:
parent
02d8b5ab1c
commit
2c75b545de
12
ChangeLog
12
ChangeLog
@ -1,3 +1,15 @@
|
|||||||
|
2019-06-18 Florian Weimer <fweimer@redhat.com>
|
||||||
|
|
||||||
|
[BZ #24323]
|
||||||
|
* include/elf.h (DT_1_SUPPORTED_MASK): Include DF_1_PIE.
|
||||||
|
* elf/dl-load.c (_dl_map_object_from_fd): Check for DF_1_PIE and
|
||||||
|
fail when called from dlopen.
|
||||||
|
* elf/Makefile [have-fpie && build-shared] (tests): Add
|
||||||
|
tst-dlopen-pie.
|
||||||
|
(tst-dlopen-pie): Link with -ldl.
|
||||||
|
(tst-dlopen-pie.out): Add run-time dependency on tst-pie1.
|
||||||
|
* elf/tst-dlopen-pie.c (do_test): New file.
|
||||||
|
|
||||||
2019-06-17 Rafal Luzynski <digitalfreak@lingonborough.com>
|
2019-06-17 Rafal Luzynski <digitalfreak@lingonborough.com>
|
||||||
|
|
||||||
[BZ #24614]
|
[BZ #24614]
|
||||||
|
@ -310,7 +310,7 @@ test-xfail-tst-protected1b = yes
|
|||||||
endif
|
endif
|
||||||
ifeq (yesyes,$(have-fpie)$(build-shared))
|
ifeq (yesyes,$(have-fpie)$(build-shared))
|
||||||
modules-names += tst-piemod1
|
modules-names += tst-piemod1
|
||||||
tests += tst-pie1 tst-pie2
|
tests += tst-pie1 tst-pie2 tst-dlopen-pie
|
||||||
tests-pie += tst-pie1 tst-pie2
|
tests-pie += tst-pie1 tst-pie2
|
||||||
ifeq (yes,$(have-protected-data))
|
ifeq (yes,$(have-protected-data))
|
||||||
tests += vismain
|
tests += vismain
|
||||||
@ -1084,6 +1084,8 @@ CFLAGS-tst-pie2.c += $(pie-ccflag)
|
|||||||
|
|
||||||
$(objpfx)tst-piemod1.so: $(libsupport)
|
$(objpfx)tst-piemod1.so: $(libsupport)
|
||||||
$(objpfx)tst-pie1: $(objpfx)tst-piemod1.so
|
$(objpfx)tst-pie1: $(objpfx)tst-piemod1.so
|
||||||
|
$(objpfx)tst-dlopen-pie: $(libdl)
|
||||||
|
$(objpfx)tst-dlopen-pie.out: $(objpfx)tst-pie1
|
||||||
|
|
||||||
ifeq (yes,$(build-shared))
|
ifeq (yes,$(build-shared))
|
||||||
# NB: Please keep cet-built-dso in sysdeps/x86/Makefile in sync with
|
# NB: Please keep cet-built-dso in sysdeps/x86/Makefile in sync with
|
||||||
|
@ -1158,6 +1158,10 @@ _dl_map_object_from_fd (const char *name, const char *origname, int fd,
|
|||||||
goto call_lose;
|
goto call_lose;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* dlopen of an executable is not valid because it is not possible
|
||||||
|
to perform proper relocations, handle static TLS, or run the
|
||||||
|
ELF constructors. For PIE, the check needs the dynamic
|
||||||
|
section, so there is another check below. */
|
||||||
if (__glibc_unlikely (type != ET_DYN)
|
if (__glibc_unlikely (type != ET_DYN)
|
||||||
&& __glibc_unlikely ((mode & __RTLD_OPENEXEC) == 0))
|
&& __glibc_unlikely ((mode & __RTLD_OPENEXEC) == 0))
|
||||||
{
|
{
|
||||||
@ -1194,9 +1198,11 @@ _dl_map_object_from_fd (const char *name, const char *origname, int fd,
|
|||||||
elf_get_dynamic_info (l, NULL);
|
elf_get_dynamic_info (l, NULL);
|
||||||
|
|
||||||
/* Make sure we are not dlopen'ing an object that has the
|
/* Make sure we are not dlopen'ing an object that has the
|
||||||
DF_1_NOOPEN flag set. */
|
DF_1_NOOPEN flag set, or a PIE object. */
|
||||||
if (__glibc_unlikely (l->l_flags_1 & DF_1_NOOPEN)
|
if ((__glibc_unlikely (l->l_flags_1 & DF_1_NOOPEN)
|
||||||
&& (mode & __RTLD_DLOPEN))
|
&& (mode & __RTLD_DLOPEN))
|
||||||
|
|| (__glibc_unlikely (l->l_flags_1 & DF_1_PIE)
|
||||||
|
&& __glibc_unlikely ((mode & __RTLD_OPENEXEC) == 0)))
|
||||||
{
|
{
|
||||||
/* We are not supposed to load this object. Free all resources. */
|
/* We are not supposed to load this object. Free all resources. */
|
||||||
_dl_unmap_segments (l);
|
_dl_unmap_segments (l);
|
||||||
@ -1207,7 +1213,11 @@ _dl_map_object_from_fd (const char *name, const char *origname, int fd,
|
|||||||
if (l->l_phdr_allocated)
|
if (l->l_phdr_allocated)
|
||||||
free ((void *) l->l_phdr);
|
free ((void *) l->l_phdr);
|
||||||
|
|
||||||
errstring = N_("shared object cannot be dlopen()ed");
|
if (l->l_flags_1 & DF_1_PIE)
|
||||||
|
errstring
|
||||||
|
= N_("cannot dynamically load position-independent executable");
|
||||||
|
else
|
||||||
|
errstring = N_("shared object cannot be dlopen()ed");
|
||||||
goto call_lose;
|
goto call_lose;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
49
elf/tst-dlopen-pie.c
Normal file
49
elf/tst-dlopen-pie.c
Normal file
@ -0,0 +1,49 @@
|
|||||||
|
/* dlopen test for PIE objects.
|
||||||
|
Copyright (C) 2019 Free Software Foundation, Inc.
|
||||||
|
This file is part of the GNU C Library.
|
||||||
|
|
||||||
|
The GNU C Library is free software; you can redistribute it and/or
|
||||||
|
modify it under the terms of the GNU Lesser General Public
|
||||||
|
License as published by the Free Software Foundation; either
|
||||||
|
version 2.1 of the License, or (at your option) any later version.
|
||||||
|
|
||||||
|
The GNU C Library is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
Lesser General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU Lesser General Public
|
||||||
|
License along with the GNU C Library; if not, see
|
||||||
|
<http://www.gnu.org/licenses/>. */
|
||||||
|
|
||||||
|
/* This test attempts to open the (otherwise unrelated) PIE test
|
||||||
|
program elf/tst-pie1 and expects the attempt to fail. */
|
||||||
|
|
||||||
|
#include <dlfcn.h>
|
||||||
|
#include <stddef.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <support/check.h>
|
||||||
|
#include <support/support.h>
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_mode (int mode)
|
||||||
|
{
|
||||||
|
char *pie_path = xasprintf ("%s/elf/tst-pie1", support_objdir_root);
|
||||||
|
if (dlopen (pie_path, mode) != NULL)
|
||||||
|
FAIL_EXIT1 ("dlopen succeeded unexpectedly (%d)", mode);
|
||||||
|
const char *message = dlerror ();
|
||||||
|
const char *expected
|
||||||
|
= "cannot dynamically load position-independent executable";
|
||||||
|
if (strstr (message, expected) == NULL)
|
||||||
|
FAIL_EXIT1 ("unexpected error message (mode %d): %s", mode, message);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int
|
||||||
|
do_test (void)
|
||||||
|
{
|
||||||
|
test_mode (RTLD_LAZY);
|
||||||
|
test_mode (RTLD_NOW);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
#include <support/test-driver.c>
|
@ -23,7 +23,7 @@
|
|||||||
# endif
|
# endif
|
||||||
# define DT_1_SUPPORTED_MASK \
|
# define DT_1_SUPPORTED_MASK \
|
||||||
(DF_1_NOW | DF_1_NODELETE | DF_1_INITFIRST | DF_1_NOOPEN \
|
(DF_1_NOW | DF_1_NODELETE | DF_1_INITFIRST | DF_1_NOOPEN \
|
||||||
| DF_1_ORIGIN | DF_1_NODEFLIB)
|
| DF_1_ORIGIN | DF_1_NODEFLIB | DF_1_PIE)
|
||||||
|
|
||||||
#endif /* !_ISOMAC */
|
#endif /* !_ISOMAC */
|
||||||
#endif /* elf.h */
|
#endif /* elf.h */
|
||||||
|
Loading…
Reference in New Issue
Block a user