Module Name: src Committed By: riastradh Date: Tue Nov 21 00:09:19 UTC 2023
Modified Files: src/sys/kern: exec_subr.c src/tests/lib/libc/sys: t_setrlimit.c Log Message: exec: Map noaccess part of stack with prot=NONE, maxprot=READ|WRITE. This way, setrlimit(RLIMT_STACK) can grant READ|WRITE access when increasing the stack size. PR kern/57711 XXX pullup-10 XXX pullup-9 XXX pullup-8 To generate a diff of this commit: cvs rdiff -u -r1.85 -r1.86 src/sys/kern/exec_subr.c cvs rdiff -u -r1.8 -r1.9 src/tests/lib/libc/sys/t_setrlimit.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/kern/exec_subr.c diff -u src/sys/kern/exec_subr.c:1.85 src/sys/kern/exec_subr.c:1.86 --- src/sys/kern/exec_subr.c:1.85 Sun Apr 9 09:18:09 2023 +++ src/sys/kern/exec_subr.c Tue Nov 21 00:09:18 2023 @@ -1,4 +1,4 @@ -/* $NetBSD: exec_subr.c,v 1.85 2023/04/09 09:18:09 riastradh Exp $ */ +/* $NetBSD: exec_subr.c,v 1.86 2023/11/21 00:09:18 riastradh Exp $ */ /* * Copyright (c) 1993, 1994, 1996 Christopher G. Demetriou @@ -31,7 +31,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: exec_subr.c,v 1.85 2023/04/09 09:18:09 riastradh Exp $"); +__KERNEL_RCSID(0, "$NetBSD: exec_subr.c,v 1.86 2023/11/21 00:09:18 riastradh Exp $"); #include "opt_pax.h" @@ -162,9 +162,10 @@ static int vmcmd_get_prot(struct lwp *l, const struct exec_vmcmd *cmd, vm_prot_t *prot, vm_prot_t *maxprot) { + vm_prot_t extraprot = PROT_MPROTECT_EXTRACT(cmd->ev_prot); - *prot = cmd->ev_prot; - *maxprot = PAX_MPROTECT_MAXPROTECT(l, *prot, 0, UVM_PROT_ALL); + *prot = cmd->ev_prot & UVM_PROT_ALL; + *maxprot = PAX_MPROTECT_MAXPROTECT(l, *prot, extraprot, UVM_PROT_ALL); if ((*prot & *maxprot) != *prot) return EACCES; @@ -458,7 +459,9 @@ exec_setup_stack(struct lwp *l, struct e } if (noaccess_size > 0 && noaccess_size <= MAXSSIZ) { NEW_VMCMD2(&epp->ep_vmcmds, vmcmd_map_zero, noaccess_size, - noaccess_linear_min, NULL, 0, VM_PROT_NONE, VMCMD_STACK); + noaccess_linear_min, NULL, 0, + VM_PROT_NONE | PROT_MPROTECT(VM_PROT_READ | VM_PROT_WRITE), + VMCMD_STACK); } KASSERT(access_size > 0); KASSERT(access_size <= MAXSSIZ); Index: src/tests/lib/libc/sys/t_setrlimit.c diff -u src/tests/lib/libc/sys/t_setrlimit.c:1.8 src/tests/lib/libc/sys/t_setrlimit.c:1.9 --- src/tests/lib/libc/sys/t_setrlimit.c:1.8 Mon Nov 20 13:05:17 2023 +++ src/tests/lib/libc/sys/t_setrlimit.c Tue Nov 21 00:09:18 2023 @@ -1,4 +1,4 @@ -/* $NetBSD: t_setrlimit.c,v 1.8 2023/11/20 13:05:17 riastradh Exp $ */ +/* $NetBSD: t_setrlimit.c,v 1.9 2023/11/21 00:09:18 riastradh Exp $ */ /*- * Copyright (c) 2011 The NetBSD Foundation, Inc. @@ -29,7 +29,7 @@ * POSSIBILITY OF SUCH DAMAGE. */ #include <sys/cdefs.h> -__RCSID("$NetBSD: t_setrlimit.c,v 1.8 2023/11/20 13:05:17 riastradh Exp $"); +__RCSID("$NetBSD: t_setrlimit.c,v 1.9 2023/11/21 00:09:18 riastradh Exp $"); #include <sys/resource.h> #include <sys/mman.h> @@ -634,9 +634,6 @@ ATF_TC_BODY(setrlimit_stack_growshrink, res.rlim_cur = 2*n; RL(setrlimit(RLIMIT_STACK, &res)); - atf_tc_expect_fail("PR kern/57711:" - " setrlimit(RLIMIT_STACK) fails to increase usable stack size"); - /* * Verify that we can now get at pages past the end of the new * stack but not beyond that.