6c0556
From 332421312576bd7095e70589154af99b124dd2d1 Mon Sep 17 00:00:00 2001
6c0556
From: Carlos O'Donell <carlos@redhat.com>
6c0556
Date: Fri, 12 Mar 2021 16:44:47 +0100
6c0556
Subject: elf: Always set l in _dl_init_paths (bug 23462)
6c0556
6c0556
After d1d5471579eb0426671bf94f2d71e61dfb204c30 ("Remove dead
6c0556
DL_DST_REQ_STATIC code.") we always setup the link map l to make the
6c0556
static and shared cases the same.  The bug is that in elf/dl-load.c
6c0556
(_dl_init_paths) we conditionally set l only in the #ifdef SHARED
6c0556
case, but unconditionally use it later.  The simple solution is to
6c0556
remove the #ifdef SHARED conditional, because it's no longer needed,
6c0556
and unconditionally setup l for both the static and shared cases. A
6c0556
regression test is added to run a static binary with
6c0556
LD_LIBRARY_PATH='$ORIGIN' which crashes before the fix and runs after
6c0556
the fix.
6c0556
6c0556
Co-Authored-By: Florian Weimer <fweimer@redhat.com>
6c0556
6c0556
diff --git a/elf/Makefile b/elf/Makefile
6c0556
--- a/elf/Makefile	2021-11-02 16:28:14.720143774 -0400
6c0556
+++ b/elf/Makefile	2021-11-02 18:42:38.763843571 -0400
6c0556
@@ -151,7 +151,8 @@ endif
6c0556
 tests-static-normal := tst-leaks1-static tst-array1-static tst-array5-static \
6c0556
 	       tst-dl-iter-static \
6c0556
 	       tst-tlsalign-static tst-tlsalign-extern-static \
6c0556
-	       tst-linkall-static tst-env-setuid tst-env-setuid-tunables
6c0556
+	       tst-linkall-static tst-env-setuid tst-env-setuid-tunables \
6c0556
+	       tst-dst-static
6c0556
 tests-static-internal := tst-tls1-static tst-tls2-static \
6c0556
 	       tst-ptrguard1-static tst-stackguard1-static \
6c0556
 	       tst-tls1-static-non-pie tst-libc_dlvsym-static
6c0556
@@ -1811,3 +1812,5 @@ $(objpfx)tst-glibc-hwcaps-mask.out: \
6c0556
 # Generic dependency for sysdeps implementation of
6c0556
 # tst-glibc-hwcaps-cache.
6c0556
 $(objpfx)tst-glibc-hwcaps-cache.out: $(objpfx)tst-glibc-hwcaps
6c0556
+
6c0556
+tst-dst-static-ENV = LD_LIBRARY_PATH='$$ORIGIN'
6c0556
diff --git a/elf/dl-load.c b/elf/dl-load.c
6c0556
index 9e2089cfaa..376a2e64d6 100644
6c0556
--- a/elf/dl-load.c
6c0556
+++ b/elf/dl-load.c
6c0556
@@ -758,50 +758,45 @@ _dl_init_paths (const char *llp, const char *source,
6c0556
   max_dirnamelen = SYSTEM_DIRS_MAX_LEN;
6c0556
   *aelem = NULL;
6c0556
 
6c0556
-#ifdef SHARED
6c0556
   /* This points to the map of the main object.  */
6c0556
   l = GL(dl_ns)[LM_ID_BASE]._ns_loaded;
6c0556
-  if (l != NULL)
6c0556
+  assert (l->l_type != lt_loaded);
6c0556
+
6c0556
+  if (l->l_info[DT_RUNPATH])
6c0556
+    {
6c0556
+      /* Allocate room for the search path and fill in information
6c0556
+	 from RUNPATH.  */
6c0556
+      decompose_rpath (&l->l_runpath_dirs,
6c0556
+		       (const void *) (D_PTR (l, l_info[DT_STRTAB])
6c0556
+				       + l->l_info[DT_RUNPATH]->d_un.d_val),
6c0556
+		       l, "RUNPATH");
6c0556
+      /* During rtld init the memory is allocated by the stub malloc,
6c0556
+	 prevent any attempt to free it by the normal malloc.  */
6c0556
+      l->l_runpath_dirs.malloced = 0;
6c0556
+
6c0556
+      /* The RPATH is ignored.  */
6c0556
+      l->l_rpath_dirs.dirs = (void *) -1;
6c0556
+    }
6c0556
+  else
6c0556
     {
6c0556
-      assert (l->l_type != lt_loaded);
6c0556
+      l->l_runpath_dirs.dirs = (void *) -1;
6c0556
 
6c0556
-      if (l->l_info[DT_RUNPATH])
6c0556
+      if (l->l_info[DT_RPATH])
6c0556
 	{
6c0556
 	  /* Allocate room for the search path and fill in information
6c0556
-	     from RUNPATH.  */
6c0556
-	  decompose_rpath (&l->l_runpath_dirs,
6c0556
+	     from RPATH.  */
6c0556
+	  decompose_rpath (&l->l_rpath_dirs,
6c0556
 			   (const void *) (D_PTR (l, l_info[DT_STRTAB])
6c0556
-					   + l->l_info[DT_RUNPATH]->d_un.d_val),
6c0556
-			   l, "RUNPATH");
6c0556
-	  /* During rtld init the memory is allocated by the stub malloc,
6c0556
-	     prevent any attempt to free it by the normal malloc.  */
6c0556
-	  l->l_runpath_dirs.malloced = 0;
6c0556
-
6c0556
-	  /* The RPATH is ignored.  */
6c0556
-	  l->l_rpath_dirs.dirs = (void *) -1;
6c0556
+					   + l->l_info[DT_RPATH]->d_un.d_val),
6c0556
+			   l, "RPATH");
6c0556
+	  /* During rtld init the memory is allocated by the stub
6c0556
+	     malloc, prevent any attempt to free it by the normal
6c0556
+	     malloc.  */
6c0556
+	  l->l_rpath_dirs.malloced = 0;
6c0556
 	}
6c0556
       else
6c0556
-	{
6c0556
-	  l->l_runpath_dirs.dirs = (void *) -1;
6c0556
-
6c0556
-	  if (l->l_info[DT_RPATH])
6c0556
-	    {
6c0556
-	      /* Allocate room for the search path and fill in information
6c0556
-		 from RPATH.  */
6c0556
-	      decompose_rpath (&l->l_rpath_dirs,
6c0556
-			       (const void *) (D_PTR (l, l_info[DT_STRTAB])
6c0556
-					       + l->l_info[DT_RPATH]->d_un.d_val),
6c0556
-			       l, "RPATH");
6c0556
-	      /* During rtld init the memory is allocated by the stub
6c0556
-		 malloc, prevent any attempt to free it by the normal
6c0556
-		 malloc.  */
6c0556
-	      l->l_rpath_dirs.malloced = 0;
6c0556
-	    }
6c0556
-	  else
6c0556
-	    l->l_rpath_dirs.dirs = (void *) -1;
6c0556
-	}
6c0556
+	l->l_rpath_dirs.dirs = (void *) -1;
6c0556
     }
6c0556
-#endif	/* SHARED */
6c0556
 
6c0556
   if (llp != NULL && *llp != '\0')
6c0556
     {
6c0556
diff --git a/elf/tst-dst-static.c b/elf/tst-dst-static.c
6c0556
new file mode 100644
6c0556
index 0000000000..56eb371c96
6c0556
--- /dev/null
6c0556
+++ b/elf/tst-dst-static.c
6c0556
@@ -0,0 +1,32 @@
6c0556
+/* Test DST expansion for static binaries doesn't carsh.  Bug 23462.
6c0556
+   Copyright (C) 2021 Free Software Foundation, Inc.
6c0556
+   This file is part of the GNU C Library.
6c0556
+
6c0556
+   The GNU C Library is free software; you can redistribute it and/or
6c0556
+   modify it under the terms of the GNU Lesser General Public
6c0556
+   License as published by the Free Software Foundation; either
6c0556
+   version 2.1 of the License, or (at your option) any later version.
6c0556
+
6c0556
+   The GNU C Library is distributed in the hope that it will be useful,
6c0556
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
6c0556
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
6c0556
+   Lesser General Public License for more details.
6c0556
+
6c0556
+   You should have received a copy of the GNU Lesser General Public
6c0556
+   License along with the GNU C Library; if not, see
6c0556
+   <https://www.gnu.org/licenses/>.  */
6c0556
+
6c0556
+/* The purpose of this test is to exercise the code in elf/dl-loac.c
6c0556
+   (_dl_init_paths) or thereabout and ensure that static binaries
6c0556
+   don't crash when expanding DSTs.
6c0556
+
6c0556
+   If the dynamic loader code linked into the static binary cannot
6c0556
+   handle expanding the DSTs e.g. null-deref on an incomplete link
6c0556
+   map, then it will crash before reaching main, so the test harness
6c0556
+   is unnecessary.  */
6c0556
+
6c0556
+int
6c0556
+main (void)
6c0556
+{
6c0556
+  return 0;
6c0556
+}