elf: Switch to main malloc after final ld.so self-relocation

Before commit ee1ada1bdb
("elf: Rework exception handling in the dynamic loader
[BZ #25486]"), the previous order called the main calloc
to allocate a shadow GOT/PLT array for auditing support.
This happened before libc.so.6 ELF constructors were run, so
a user malloc could run without libc.so.6 having been
initialized fully.  One observable effect was that
environ was NULL at this point.

It does not seem to be possible at present to trigger such
an allocation, but it seems more robust to delay switching
to main malloc after ld.so self-relocation is complete.
The elf/tst-rtld-no-malloc-audit test case fails with a
2.34-era glibc that does not have this fix.

Reviewed-by: DJ Delorie <dj@redhat.com>
This commit is contained in:
Florian Weimer 2024-11-06 10:33:44 +01:00
parent f2326c2ec0
commit c1560f3f75
6 changed files with 99 additions and 16 deletions

View File

@ -453,6 +453,9 @@ tests += \
tst-recursive-tls \ tst-recursive-tls \
tst-relsort1 \ tst-relsort1 \
tst-ro-dynamic \ tst-ro-dynamic \
tst-rtld-no-malloc \
tst-rtld-no-malloc-audit \
tst-rtld-no-malloc-preload \
tst-rtld-run-static \ tst-rtld-run-static \
tst-single_threaded \ tst-single_threaded \
tst-single_threaded-pthread \ tst-single_threaded-pthread \
@ -3160,3 +3163,9 @@ tst-dlopen-tlsreinit4-ENV = LD_AUDIT=$(objpfx)tst-auditmod1.so
tst-dlopen-auditdup-ENV = LD_AUDIT=$(objpfx)tst-dlopen-auditdup-auditmod.so tst-dlopen-auditdup-ENV = LD_AUDIT=$(objpfx)tst-dlopen-auditdup-auditmod.so
$(objpfx)tst-dlopen-auditdup.out: \ $(objpfx)tst-dlopen-auditdup.out: \
$(objpfx)tst-dlopen-auditdupmod.so $(objpfx)tst-dlopen-auditdup-auditmod.so $(objpfx)tst-dlopen-auditdupmod.so $(objpfx)tst-dlopen-auditdup-auditmod.so
# Reuse an audit module which provides ample debug logging.
tst-rtld-no-malloc-audit-ENV = LD_AUDIT=$(objpfx)tst-auditmod1.so
# Any shared object should do.
tst-rtld-no-malloc-preload-ENV = LD_PRELOAD=$(objpfx)tst-auditmod1.so

View File

@ -338,8 +338,7 @@ _dl_non_dynamic_init (void)
call_function_static_weak (_dl_find_object_init); call_function_static_weak (_dl_find_object_init);
/* Setup relro on the binary itself. */ /* Setup relro on the binary itself. */
if (_dl_main_map.l_relro_size != 0) _dl_protect_relro (&_dl_main_map);
_dl_protect_relro (&_dl_main_map);
} }
#ifdef DL_SYSINFO_IMPLEMENTATION #ifdef DL_SYSINFO_IMPLEMENTATION

View File

@ -2321,30 +2321,27 @@ dl_main (const ElfW(Phdr) *phdr,
/* Make sure no new search directories have been added. */ /* Make sure no new search directories have been added. */
assert (GLRO(dl_init_all_dirs) == GL(dl_all_dirs)); assert (GLRO(dl_init_all_dirs) == GL(dl_all_dirs));
/* Re-relocate ourselves with user-controlled symbol definitions.
We must do this after TLS initialization in case after this
re-relocation, we might call a user-supplied function
(e.g. calloc from _dl_relocate_object) that uses TLS data. */
/* Set up the object lookup structures. */ /* Set up the object lookup structures. */
_dl_find_object_init (); _dl_find_object_init ();
/* The malloc implementation has been relocated, so resolving
its symbols (and potentially calling IFUNC resolvers) is safe
at this point. */
__rtld_malloc_init_real (main_map);
/* Likewise for the locking implementation. */ /* Likewise for the locking implementation. */
__rtld_mutex_init (); __rtld_mutex_init ();
/* Re-relocate ourselves with user-controlled symbol definitions. */
{ {
RTLD_TIMING_VAR (start); RTLD_TIMING_VAR (start);
rtld_timer_start (&start); rtld_timer_start (&start);
/* Mark the link map as not yet relocated again. */ _dl_relocate_object_no_relro (&GL(dl_rtld_map), main_map->l_scope, 0, 0);
GL(dl_rtld_map).l_relocated = 0;
_dl_relocate_object (&GL(dl_rtld_map), main_map->l_scope, 0, 0); /* The malloc implementation has been relocated, so resolving
its symbols (and potentially calling IFUNC resolvers) is safe
at this point. */
__rtld_malloc_init_real (main_map);
if (GL(dl_rtld_map).l_relro_size != 0)
_dl_protect_relro (&GL(dl_rtld_map));
rtld_timer_accum (&relocate_time, start); rtld_timer_accum (&relocate_time, start);
} }

View File

@ -0,0 +1 @@
#include "tst-rtld-no-malloc.c"

View File

@ -0,0 +1 @@
#include "tst-rtld-no-malloc.c"

76
elf/tst-rtld-no-malloc.c Normal file
View File

@ -0,0 +1,76 @@
/* Test that program loading does not call malloc.
Copyright (C) 2024 Free Software Foundation, Inc.
This file is part of the GNU C Library.
The GNU C Library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
The GNU C Library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with the GNU C Library; if not, see
<https://www.gnu.org/licenses/>. */
#include <string.h>
#include <unistd.h>
static void
print (const char *s)
{
const char *end = s + strlen (s);
while (s < end)
{
ssize_t ret = write (STDOUT_FILENO, s, end - s);
if (ret <= 0)
_exit (2);
s += ret;
}
}
static void __attribute__ ((noreturn))
unexpected_call (const char *function)
{
print ("error: unexpected call to ");
print (function);
print ("\n");
_exit (1);
}
/* These are the malloc functions implement in elf/dl-minimal.c. */
void
free (void *ignored)
{
unexpected_call ("free");
}
void *
calloc (size_t ignored1, size_t ignored2)
{
unexpected_call ("calloc");
}
void *
malloc (size_t ignored)
{
unexpected_call ("malloc");
}
void *
realloc (void *ignored1, size_t ignored2)
{
unexpected_call ("realloc");
}
int
main (void)
{
/* Do not use the test wrapper, to avoid spurious malloc calls from it. */
return 0;
}