diff options
author | Adhemerval Zanella <adhemerval.zanella@linaro.org> | 2022-01-24 10:46:16 -0300 |
---|---|---|
committer | Adhemerval Zanella <adhemerval.zanella@linaro.org> | 2022-02-01 14:49:46 -0300 |
commit | 254d3d5aef2fd8430c469e1938209ac100ebf132 (patch) | |
tree | 35b4c4595b5efe15dc5df685ccd8d997442b70b6 /nptl | |
parent | 5fa11a2bc94c912c3b25860065086902674537ba (diff) | |
download | glibc-254d3d5aef2fd8430c469e1938209ac100ebf132.tar.gz glibc-254d3d5aef2fd8430c469e1938209ac100ebf132.tar.xz glibc-254d3d5aef2fd8430c469e1938209ac100ebf132.zip |
elf: Fix initial-exec TLS access on audit modules (BZ #28096)
For audit modules and dependencies with initial-exec TLS, we can not set the initial TLS image on default loader initialization because it would already be set by the audit setup. However, subsequent thread creation would need to follow the default behaviour. This patch fixes it by setting l_auditing link_map field not only for the audit modules, but also for all its dependencies. This is used on _dl_allocate_tls_init to avoid the static TLS initialization at load time. Checked on x86_64-linux-gnu, i686-linux-gnu, and aarch64-linux-gnu. Reviewed-by: Carlos O'Donell <carlos@redhat.com> Tested-by: Carlos O'Donell <carlos@redhat.com>
Diffstat (limited to 'nptl')
-rw-r--r-- | nptl/allocatestack.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/nptl/allocatestack.c b/nptl/allocatestack.c index 3fb085f9a1..34a33164ff 100644 --- a/nptl/allocatestack.c +++ b/nptl/allocatestack.c @@ -138,7 +138,7 @@ get_cached_stack (size_t *sizep, void **memp) memset (dtv, '\0', (dtv[-1].counter + 1) * sizeof (dtv_t)); /* Re-initialize the TLS. */ - _dl_allocate_tls_init (TLS_TPADJ (result)); + _dl_allocate_tls_init (TLS_TPADJ (result), true); return result; } |