2012-08-27 01:09:26 +00:00
|
|
|
#define _GNU_SOURCE
|
2011-06-18 23:48:42 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
2014-06-18 07:05:42 +00:00
|
|
|
#include <stdarg.h>
|
2014-06-19 06:01:06 +00:00
|
|
|
#include <stddef.h>
|
2011-06-18 23:48:42 +00:00
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <elf.h>
|
|
|
|
#include <sys/mman.h>
|
|
|
|
#include <limits.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <errno.h>
|
2012-11-01 01:27:48 +00:00
|
|
|
#include <link.h>
|
2011-06-26 21:39:17 +00:00
|
|
|
#include <setjmp.h>
|
2011-06-26 23:23:28 +00:00
|
|
|
#include <pthread.h>
|
2011-08-16 04:24:36 +00:00
|
|
|
#include <ctype.h>
|
2011-06-26 23:23:28 +00:00
|
|
|
#include <dlfcn.h>
|
2012-10-04 20:35:46 +00:00
|
|
|
#include "pthread_impl.h"
|
|
|
|
#include "libc.h"
|
2011-06-18 23:48:42 +00:00
|
|
|
|
2012-03-23 04:28:20 +00:00
|
|
|
static int errflag;
|
2012-04-23 16:03:31 +00:00
|
|
|
static char errbuf[128];
|
2012-03-23 04:28:20 +00:00
|
|
|
|
2012-07-11 05:47:30 +00:00
|
|
|
#ifdef SHARED
|
2012-03-23 04:28:20 +00:00
|
|
|
|
2011-06-18 23:48:42 +00:00
|
|
|
#if ULONG_MAX == 0xffffffff
|
|
|
|
typedef Elf32_Ehdr Ehdr;
|
|
|
|
typedef Elf32_Phdr Phdr;
|
|
|
|
typedef Elf32_Sym Sym;
|
|
|
|
#define R_TYPE(x) ((x)&255)
|
|
|
|
#define R_SYM(x) ((x)>>8)
|
|
|
|
#else
|
|
|
|
typedef Elf64_Ehdr Ehdr;
|
|
|
|
typedef Elf64_Phdr Phdr;
|
|
|
|
typedef Elf64_Sym Sym;
|
|
|
|
#define R_TYPE(x) ((x)&0xffffffff)
|
|
|
|
#define R_SYM(x) ((x)>>32)
|
|
|
|
#endif
|
|
|
|
|
2012-10-06 05:22:51 +00:00
|
|
|
#define MAXP2(a,b) (-(-(a)&-(b)))
|
|
|
|
#define ALIGN(x,y) ((x)+(y)-1 & -(y))
|
|
|
|
|
2012-04-25 04:05:42 +00:00
|
|
|
struct debug {
|
|
|
|
int ver;
|
|
|
|
void *head;
|
|
|
|
void (*bp)(void);
|
|
|
|
int state;
|
|
|
|
void *base;
|
|
|
|
};
|
|
|
|
|
2014-06-19 06:01:06 +00:00
|
|
|
struct td_index {
|
|
|
|
size_t args[2];
|
|
|
|
struct td_index *next;
|
|
|
|
};
|
|
|
|
|
2012-04-25 04:05:42 +00:00
|
|
|
struct dso {
|
|
|
|
unsigned char *base;
|
|
|
|
char *name;
|
|
|
|
size_t *dynv;
|
2011-06-18 23:48:42 +00:00
|
|
|
struct dso *next, *prev;
|
2012-04-25 04:05:42 +00:00
|
|
|
|
2012-11-01 01:27:48 +00:00
|
|
|
Phdr *phdr;
|
|
|
|
int phnum;
|
2014-03-25 18:59:50 +00:00
|
|
|
size_t phentsize;
|
2011-06-18 23:48:42 +00:00
|
|
|
int refcnt;
|
|
|
|
Sym *syms;
|
2011-06-19 02:52:01 +00:00
|
|
|
uint32_t *hashtab;
|
2012-08-25 21:13:28 +00:00
|
|
|
uint32_t *ghashtab;
|
2013-08-08 20:10:35 +00:00
|
|
|
int16_t *versym;
|
2011-06-18 23:48:42 +00:00
|
|
|
char *strings;
|
|
|
|
unsigned char *map;
|
|
|
|
size_t map_len;
|
|
|
|
dev_t dev;
|
|
|
|
ino_t ino;
|
2012-06-10 01:20:44 +00:00
|
|
|
signed char global;
|
2012-02-08 01:29:29 +00:00
|
|
|
char relocated;
|
|
|
|
char constructed;
|
2013-08-23 17:56:30 +00:00
|
|
|
char kernel_mapped;
|
2013-08-23 15:15:40 +00:00
|
|
|
struct dso **deps, *needed_by;
|
2013-08-23 17:56:30 +00:00
|
|
|
char *rpath_orig, *rpath;
|
2012-10-05 00:04:13 +00:00
|
|
|
void *tls_image;
|
2012-10-05 02:48:33 +00:00
|
|
|
size_t tls_len, tls_size, tls_align, tls_id, tls_offset;
|
2014-03-25 12:13:27 +00:00
|
|
|
size_t relro_start, relro_end;
|
2012-10-05 15:51:50 +00:00
|
|
|
void **new_dtv;
|
|
|
|
unsigned char *new_tls;
|
make all objects used with atomic operations volatile
the memory model we use internally for atomics permits plain loads of
values which may be subject to concurrent modification without
requiring that a special load function be used. since a compiler is
free to make transformations that alter the number of loads or the way
in which loads are performed, the compiler is theoretically free to
break this usage. the most obvious concern is with atomic cas
constructs: something of the form tmp=*p;a_cas(p,tmp,f(tmp)); could be
transformed to a_cas(p,*p,f(*p)); where the latter is intended to show
multiple loads of *p whose resulting values might fail to be equal;
this would break the atomicity of the whole operation. but even more
fundamental breakage is possible.
with the changes being made now, objects that may be modified by
atomics are modeled as volatile, and the atomic operations performed
on them by other threads are modeled as asynchronous stores by
hardware which happens to be acting on the request of another thread.
such modeling of course does not itself address memory synchronization
between cores/cpus, but that aspect was already handled. this all
seems less than ideal, but it's the best we can do without mandating a
C11 compiler and using the C11 model for atomics.
in the case of pthread_once_t, the ABI type of the underlying object
is not volatile-qualified. so we are assuming that accessing the
object through a volatile-qualified lvalue via casts yields volatile
access semantics. the language of the C standard is somewhat unclear
on this matter, but this is an assumption the linux kernel also makes,
and seems to be the correct interpretation of the standard.
2015-03-04 03:50:02 +00:00
|
|
|
volatile int new_dtv_idx, new_tls_idx;
|
2014-06-19 06:01:06 +00:00
|
|
|
struct td_index *td_index;
|
2012-10-05 17:09:09 +00:00
|
|
|
struct dso *fini_next;
|
2012-05-27 20:01:44 +00:00
|
|
|
char *shortname;
|
2011-06-26 21:39:17 +00:00
|
|
|
char buf[];
|
2011-06-18 23:48:42 +00:00
|
|
|
};
|
|
|
|
|
2012-10-05 02:48:33 +00:00
|
|
|
struct symdef {
|
|
|
|
Sym *sym;
|
|
|
|
struct dso *dso;
|
|
|
|
};
|
|
|
|
|
2014-06-18 06:44:02 +00:00
|
|
|
enum {
|
|
|
|
REL_ERR,
|
|
|
|
REL_SYMBOLIC,
|
|
|
|
REL_GOT,
|
|
|
|
REL_PLT,
|
|
|
|
REL_RELATIVE,
|
|
|
|
REL_OFFSET,
|
|
|
|
REL_OFFSET32,
|
|
|
|
REL_COPY,
|
|
|
|
REL_SYM_OR_REL,
|
|
|
|
REL_TLS, /* everything past here is TLS */
|
|
|
|
REL_DTPMOD,
|
|
|
|
REL_DTPOFF,
|
|
|
|
REL_TPOFF,
|
|
|
|
REL_TPOFF_NEG,
|
2014-06-19 06:01:06 +00:00
|
|
|
REL_TLSDESC,
|
2014-06-18 06:44:02 +00:00
|
|
|
};
|
|
|
|
|
2012-08-05 17:46:39 +00:00
|
|
|
#include "reloc.h"
|
|
|
|
|
always initialize thread pointer at program start
this is the first step in an overhaul aimed at greatly simplifying and
optimizing everything dealing with thread-local state.
previously, the thread pointer was initialized lazily on first access,
or at program startup if stack protector was in use, or at certain
random places where inconsistent state could be reached if it were not
initialized early. while believed to be fully correct, the logic was
fragile and non-obvious.
in the first phase of the thread pointer overhaul, support is retained
(and in some cases improved) for systems/situation where loading the
thread pointer fails, e.g. old kernels.
some notes on specific changes:
- the confusing use of libc.main_thread as an indicator that the
thread pointer is initialized is eliminated in favor of an explicit
has_thread_pointer predicate.
- sigaction no longer needs to ensure that the thread pointer is
initialized before installing a signal handler (this was needed to
prevent a situation where the signal handler caused the thread
pointer to be initialized and the subsequent sigreturn cleared it
again) but it still needs to ensure that implementation-internal
thread-related signals are not blocked.
- pthread tsd initialization for the main thread is deferred in a new
manner to minimize bloat in the static-linked __init_tp code.
- pthread_setcancelstate no longer needs special handling for the
situation before the thread pointer is initialized. it simply fails
on systems that cannot support a thread pointer, which are
non-conforming anyway.
- pthread_cleanup_push/pop now check for missing thread pointer and
nop themselves out in this case, so stdio no longer needs to avoid
the cancellable path when the thread pointer is not available.
a number of cases remain where certain interfaces may crash if the
system does not support a thread pointer. at this point, these should
be limited to pthread interfaces, and the number of such cases should
be fewer than before.
2014-03-24 20:57:11 +00:00
|
|
|
int __init_tp(void *);
|
add support for init/fini array in main program, and greatly simplify
modern (4.7.x and later) gcc uses init/fini arrays, rather than the
legacy _init/_fini function pasting and crtbegin/crtend ctors/dtors
system, on most or all archs. some archs had already switched a long
time ago. without following this change, global ctors/dtors will cease
to work under musl when building with new gcc versions.
the most surprising part of this patch is that it actually reduces the
size of the init code, for both static and shared libc. this is
achieved by (1) unifying the handling main program and shared
libraries in the dynamic linker, and (2) eliminating the
glibc-inspired rube goldberg machine for passing around init and fini
function pointers. to clarify, some background:
the function signature for __libc_start_main was based on glibc, as
part of the original goal of being able to run some glibc-linked
binaries. it worked by having the crt1 code, which is linked into
every application, static or dynamic, obtain and pass pointers to the
init and fini functions, which __libc_start_main is then responsible
for using and recording for later use, as necessary. however, in
neither the static-linked nor dynamic-linked case do we actually need
crt1.o's help. with dynamic linking, all the pointers are available in
the _DYNAMIC block. with static linking, it's safe to simply access
the _init/_fini and __init_array_start, etc. symbols directly.
obviously changing the __libc_start_main function signature in an
incompatible way would break both old musl-linked programs and
glibc-linked programs, so let's not do that. instead, the function can
just ignore the information it doesn't need. new archs need not even
provide the useless args in their versions of crt1.o. existing archs
should continue to provide it as long as there is an interest in
having newly-linked applications be able to run on old versions of
musl; at some point in the future, this support can be removed.
2013-07-21 07:00:54 +00:00
|
|
|
void __init_libc(char **, char *);
|
2012-04-24 22:07:59 +00:00
|
|
|
|
2013-12-01 22:27:25 +00:00
|
|
|
const char *__libc_get_version(void);
|
|
|
|
|
2015-03-06 18:27:08 +00:00
|
|
|
static struct builtin_tls {
|
|
|
|
char c;
|
|
|
|
struct pthread pt;
|
|
|
|
void *space[16];
|
|
|
|
} builtin_tls[1];
|
|
|
|
#define MIN_TLS_ALIGN offsetof(struct builtin_tls, pt)
|
|
|
|
|
2012-10-14 03:25:20 +00:00
|
|
|
static struct dso *head, *tail, *ldso, *fini_head;
|
2013-08-23 15:15:40 +00:00
|
|
|
static char *env_path, *sys_path;
|
2012-11-01 01:27:48 +00:00
|
|
|
static unsigned long long gencnt;
|
2011-06-26 21:39:17 +00:00
|
|
|
static int runtime;
|
2012-05-27 20:01:44 +00:00
|
|
|
static int ldd_mode;
|
2012-08-18 20:00:23 +00:00
|
|
|
static int ldso_fail;
|
2013-01-24 03:07:45 +00:00
|
|
|
static int noload;
|
2013-07-24 06:38:05 +00:00
|
|
|
static jmp_buf *rtld_fail;
|
2011-06-26 23:23:28 +00:00
|
|
|
static pthread_rwlock_t lock;
|
2012-04-25 04:05:42 +00:00
|
|
|
static struct debug debug;
|
2015-03-06 18:27:08 +00:00
|
|
|
static size_t tls_cnt, tls_offset, tls_align = MIN_TLS_ALIGN;
|
2014-06-19 06:01:06 +00:00
|
|
|
static size_t static_tls_cnt;
|
2012-10-05 17:09:09 +00:00
|
|
|
static pthread_mutex_t init_fini_lock = { ._m_type = PTHREAD_MUTEX_RECURSIVE };
|
2012-04-25 04:05:42 +00:00
|
|
|
|
|
|
|
struct debug *_dl_debug_addr = &debug;
|
2011-06-18 23:48:42 +00:00
|
|
|
|
2012-10-08 01:43:46 +00:00
|
|
|
#define AUX_CNT 38
|
2011-06-18 23:48:42 +00:00
|
|
|
#define DYN_CNT 34
|
|
|
|
|
|
|
|
static void decode_vec(size_t *v, size_t *a, size_t cnt)
|
|
|
|
{
|
|
|
|
memset(a, 0, cnt*sizeof(size_t));
|
|
|
|
for (; v[0]; v+=2) if (v[0]<cnt) {
|
|
|
|
a[0] |= 1ULL<<v[0];
|
|
|
|
a[v[0]] = v[1];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-25 21:13:28 +00:00
|
|
|
static int search_vec(size_t *v, size_t *r, size_t key)
|
|
|
|
{
|
|
|
|
for (; v[0]!=key; v+=2)
|
|
|
|
if (!v[0]) return 0;
|
|
|
|
*r = v[1];
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2014-06-18 07:05:42 +00:00
|
|
|
static void error(const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
|
|
|
vsnprintf(errbuf, sizeof errbuf, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
if (runtime) longjmp(*rtld_fail, 1);
|
|
|
|
dprintf(2, "%s\n", errbuf);
|
|
|
|
ldso_fail = 1;
|
|
|
|
}
|
|
|
|
|
2012-08-25 21:13:28 +00:00
|
|
|
static uint32_t sysv_hash(const char *s0)
|
2011-06-18 23:48:42 +00:00
|
|
|
{
|
2012-01-17 05:34:58 +00:00
|
|
|
const unsigned char *s = (void *)s0;
|
2011-06-18 23:48:42 +00:00
|
|
|
uint_fast32_t h = 0;
|
|
|
|
while (*s) {
|
|
|
|
h = 16*h + *s++;
|
|
|
|
h ^= h>>24 & 0xf0;
|
|
|
|
}
|
|
|
|
return h & 0xfffffff;
|
|
|
|
}
|
|
|
|
|
2012-08-25 21:13:28 +00:00
|
|
|
static uint32_t gnu_hash(const char *s0)
|
|
|
|
{
|
|
|
|
const unsigned char *s = (void *)s0;
|
|
|
|
uint_fast32_t h = 5381;
|
|
|
|
for (; *s; s++)
|
|
|
|
h = h*33 + *s;
|
|
|
|
return h;
|
|
|
|
}
|
|
|
|
|
|
|
|
static Sym *sysv_lookup(const char *s, uint32_t h, struct dso *dso)
|
2011-06-18 23:48:42 +00:00
|
|
|
{
|
|
|
|
size_t i;
|
2012-08-05 06:38:35 +00:00
|
|
|
Sym *syms = dso->syms;
|
|
|
|
uint32_t *hashtab = dso->hashtab;
|
|
|
|
char *strings = dso->strings;
|
2011-06-18 23:48:42 +00:00
|
|
|
for (i=hashtab[2+h%hashtab[0]]; i; i=hashtab[2+hashtab[0]+i]) {
|
2013-08-08 20:10:35 +00:00
|
|
|
if ((!dso->versym || dso->versym[i] >= 0)
|
|
|
|
&& (!strcmp(s, strings+syms[i].st_name)))
|
2011-06-18 23:48:42 +00:00
|
|
|
return syms+i;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-08-25 21:13:28 +00:00
|
|
|
static Sym *gnu_lookup(const char *s, uint32_t h1, struct dso *dso)
|
|
|
|
{
|
2013-08-08 20:10:35 +00:00
|
|
|
Sym *syms = dso->syms;
|
|
|
|
char *strings = dso->strings;
|
2012-08-25 21:13:28 +00:00
|
|
|
uint32_t *hashtab = dso->ghashtab;
|
|
|
|
uint32_t nbuckets = hashtab[0];
|
|
|
|
uint32_t *buckets = hashtab + 4 + hashtab[2]*(sizeof(size_t)/4);
|
|
|
|
uint32_t h2;
|
|
|
|
uint32_t *hashval;
|
2013-08-08 20:10:35 +00:00
|
|
|
uint32_t i = buckets[h1 % nbuckets];
|
2012-08-25 21:13:28 +00:00
|
|
|
|
2013-08-08 20:10:35 +00:00
|
|
|
if (!i) return 0;
|
2012-08-25 21:13:28 +00:00
|
|
|
|
2013-08-08 20:10:35 +00:00
|
|
|
hashval = buckets + nbuckets + (i - hashtab[1]);
|
2012-08-25 21:13:28 +00:00
|
|
|
|
2013-08-08 20:10:35 +00:00
|
|
|
for (h1 |= 1; ; i++) {
|
2012-08-25 21:13:28 +00:00
|
|
|
h2 = *hashval++;
|
2013-08-08 20:10:35 +00:00
|
|
|
if ((!dso->versym || dso->versym[i] >= 0)
|
|
|
|
&& (h1 == (h2|1)) && !strcmp(s, strings + syms[i].st_name))
|
|
|
|
return syms+i;
|
2012-08-25 21:13:28 +00:00
|
|
|
if (h2 & 1) break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-10-05 02:48:33 +00:00
|
|
|
#define OK_TYPES (1<<STT_NOTYPE | 1<<STT_OBJECT | 1<<STT_FUNC | 1<<STT_COMMON | 1<<STT_TLS)
|
2013-07-24 15:53:23 +00:00
|
|
|
#define OK_BINDS (1<<STB_GLOBAL | 1<<STB_WEAK | 1<<STB_GNU_UNIQUE)
|
2011-06-18 23:48:42 +00:00
|
|
|
|
fix regression in mips dynamic linker
this issue caused the address of functions in shared libraries to
resolve to their PLT thunks in the main program rather than their
correct addresses. it was observed causing crashes, though the
mechanism of the crash was not thoroughly investigated. since the
issue is very subtle, it calls for some explanation:
on all well-behaved archs, GOT entries that belong to the PLT use a
special relocation type, typically called JMP_SLOT, so that the
dynamic linker can avoid having the jump destinations for the PLT
resolve to PLT thunks themselves (they also provide a definition for
the symbol, which must be used whenever the address of the function is
taken so that all DSOs see the same address).
however, the traditional mips PIC ABI lacked such a JMP_SLOT
relocation type, presumably because, due to the way PIC works, the
address of the PLT thunk was never needed and could always be ignored.
prior to commit adf94c19666e687a728bbf398f9a88ea4ea19996, the mips
version of reloc.h contained a hack that caused all symbol lookups to
be treated like JMP_SLOT, inhibiting undefined symbols from ever being
used to resolve symbolic relocations. this hack goes all the way back
to commit babf820180368f00742ec65b2050a82380d7c542, when the mips
dynamic linker was first made usable.
during the recent refactoring to eliminate arch-specific relocation
processing (commit adf94c19666e687a728bbf398f9a88ea4ea19996), this
hack was overlooked and no equivalent functionality was provided in
the new code.
fixing the problem is not as simple as adding back an equivalent hack,
since there is now also a "non-PIC ABI" that can be used for the main
executable, which actually does use a PLT. the closest thing to
official documentation I could find for this ABI is nonpic.txt,
attached to Message-ID: 20080701202236.GA1534@caradoc.them.org, which
can be found in the gcc mailing list archives and elsewhere. per this
document, undefined symbols corresponding to PLT thunks have the
STO_MIPS_PLT bit set in the symbol's st_other field. thus, I have
added an arch-specific rule for mips, applied at the find_sym level
rather than the relocation level, to reject undefined symbols with the
STO_MIPS_PLT bit clear.
the previous hack of treating all mips relocations as JMP_SLOT-like,
rather than rejecting the unwanted symbols in find_sym, probably also
caused dlsym to wrongly return PLT thunks in place of the correct
address of a function under at least some conditions. this should now
be fixed, at least for global-scope symbol lookups.
2014-06-30 05:18:14 +00:00
|
|
|
#ifndef ARCH_SYM_REJECT_UND
|
|
|
|
#define ARCH_SYM_REJECT_UND(s) 0
|
|
|
|
#endif
|
|
|
|
|
2012-10-05 02:48:33 +00:00
|
|
|
static struct symdef find_sym(struct dso *dso, const char *s, int need_def)
|
2011-06-18 23:48:42 +00:00
|
|
|
{
|
2012-08-25 21:13:28 +00:00
|
|
|
uint32_t h = 0, gh = 0;
|
2012-10-05 02:48:33 +00:00
|
|
|
struct symdef def = {0};
|
2011-06-18 23:48:42 +00:00
|
|
|
for (; dso; dso=dso->next) {
|
2011-06-26 23:23:28 +00:00
|
|
|
Sym *sym;
|
|
|
|
if (!dso->global) continue;
|
2012-08-25 21:13:28 +00:00
|
|
|
if (dso->ghashtab) {
|
|
|
|
if (!gh) gh = gnu_hash(s);
|
|
|
|
sym = gnu_lookup(s, gh, dso);
|
|
|
|
} else {
|
|
|
|
if (!h) h = sysv_hash(s);
|
|
|
|
sym = sysv_lookup(s, h, dso);
|
|
|
|
}
|
2012-10-06 05:36:11 +00:00
|
|
|
if (!sym) continue;
|
|
|
|
if (!sym->st_shndx)
|
fix regression in mips dynamic linker
this issue caused the address of functions in shared libraries to
resolve to their PLT thunks in the main program rather than their
correct addresses. it was observed causing crashes, though the
mechanism of the crash was not thoroughly investigated. since the
issue is very subtle, it calls for some explanation:
on all well-behaved archs, GOT entries that belong to the PLT use a
special relocation type, typically called JMP_SLOT, so that the
dynamic linker can avoid having the jump destinations for the PLT
resolve to PLT thunks themselves (they also provide a definition for
the symbol, which must be used whenever the address of the function is
taken so that all DSOs see the same address).
however, the traditional mips PIC ABI lacked such a JMP_SLOT
relocation type, presumably because, due to the way PIC works, the
address of the PLT thunk was never needed and could always be ignored.
prior to commit adf94c19666e687a728bbf398f9a88ea4ea19996, the mips
version of reloc.h contained a hack that caused all symbol lookups to
be treated like JMP_SLOT, inhibiting undefined symbols from ever being
used to resolve symbolic relocations. this hack goes all the way back
to commit babf820180368f00742ec65b2050a82380d7c542, when the mips
dynamic linker was first made usable.
during the recent refactoring to eliminate arch-specific relocation
processing (commit adf94c19666e687a728bbf398f9a88ea4ea19996), this
hack was overlooked and no equivalent functionality was provided in
the new code.
fixing the problem is not as simple as adding back an equivalent hack,
since there is now also a "non-PIC ABI" that can be used for the main
executable, which actually does use a PLT. the closest thing to
official documentation I could find for this ABI is nonpic.txt,
attached to Message-ID: 20080701202236.GA1534@caradoc.them.org, which
can be found in the gcc mailing list archives and elsewhere. per this
document, undefined symbols corresponding to PLT thunks have the
STO_MIPS_PLT bit set in the symbol's st_other field. thus, I have
added an arch-specific rule for mips, applied at the find_sym level
rather than the relocation level, to reject undefined symbols with the
STO_MIPS_PLT bit clear.
the previous hack of treating all mips relocations as JMP_SLOT-like,
rather than rejecting the unwanted symbols in find_sym, probably also
caused dlsym to wrongly return PLT thunks in place of the correct
address of a function under at least some conditions. this should now
be fixed, at least for global-scope symbol lookups.
2014-06-30 05:18:14 +00:00
|
|
|
if (need_def || (sym->st_info&0xf) == STT_TLS
|
|
|
|
|| ARCH_SYM_REJECT_UND(sym))
|
2012-10-06 05:36:11 +00:00
|
|
|
continue;
|
|
|
|
if (!sym->st_value)
|
|
|
|
if ((sym->st_info&0xf) != STT_TLS)
|
|
|
|
continue;
|
|
|
|
if (!(1<<(sym->st_info&0xf) & OK_TYPES)) continue;
|
|
|
|
if (!(1<<(sym->st_info>>4) & OK_BINDS)) continue;
|
|
|
|
|
|
|
|
if (def.sym && sym->st_info>>4 == STB_WEAK) continue;
|
|
|
|
def.sym = sym;
|
|
|
|
def.dso = dso;
|
|
|
|
if (sym->st_info>>4 == STB_GLOBAL) break;
|
2011-06-18 23:48:42 +00:00
|
|
|
}
|
2011-07-24 06:19:47 +00:00
|
|
|
return def;
|
2011-06-18 23:48:42 +00:00
|
|
|
}
|
|
|
|
|
2014-06-18 06:44:02 +00:00
|
|
|
#define NO_INLINE_ADDEND (1<<REL_COPY | 1<<REL_GOT | 1<<REL_PLT)
|
|
|
|
|
2014-06-19 06:01:06 +00:00
|
|
|
ptrdiff_t __tlsdesc_static(), __tlsdesc_dynamic();
|
|
|
|
|
2012-08-05 06:49:02 +00:00
|
|
|
static void do_relocs(struct dso *dso, size_t *rel, size_t rel_size, size_t stride)
|
2011-06-18 23:48:42 +00:00
|
|
|
{
|
2012-08-05 06:49:02 +00:00
|
|
|
unsigned char *base = dso->base;
|
|
|
|
Sym *syms = dso->syms;
|
|
|
|
char *strings = dso->strings;
|
2011-06-18 23:48:42 +00:00
|
|
|
Sym *sym;
|
|
|
|
const char *name;
|
|
|
|
void *ctx;
|
2014-06-18 06:44:02 +00:00
|
|
|
int astype, type;
|
2011-06-18 23:48:42 +00:00
|
|
|
int sym_index;
|
2012-10-05 02:48:33 +00:00
|
|
|
struct symdef def;
|
2014-06-18 06:44:02 +00:00
|
|
|
size_t *reloc_addr;
|
|
|
|
size_t sym_val;
|
|
|
|
size_t tls_val;
|
|
|
|
size_t addend;
|
2011-06-18 23:48:42 +00:00
|
|
|
|
|
|
|
for (; rel_size; rel+=stride, rel_size-=stride*sizeof(size_t)) {
|
2014-06-18 06:44:02 +00:00
|
|
|
astype = R_TYPE(rel[1]);
|
|
|
|
if (!astype) continue;
|
|
|
|
type = remap_rel(astype);
|
|
|
|
if (!type) {
|
2014-06-30 01:52:54 +00:00
|
|
|
error("Error relocating %s: unsupported relocation type %d",
|
2014-06-18 06:44:02 +00:00
|
|
|
dso->name, astype);
|
|
|
|
continue;
|
|
|
|
}
|
2011-06-18 23:48:42 +00:00
|
|
|
sym_index = R_SYM(rel[1]);
|
2014-06-18 06:44:02 +00:00
|
|
|
reloc_addr = (void *)(base + rel[0]);
|
2011-06-18 23:48:42 +00:00
|
|
|
if (sym_index) {
|
|
|
|
sym = syms + sym_index;
|
|
|
|
name = strings + sym->st_name;
|
2014-06-18 06:44:02 +00:00
|
|
|
ctx = type==REL_COPY ? head->next : head;
|
|
|
|
def = find_sym(ctx, name, type==REL_PLT);
|
2014-01-21 05:36:35 +00:00
|
|
|
if (!def.sym && (sym->st_shndx != SHN_UNDEF
|
|
|
|
|| sym->st_info>>4 != STB_WEAK)) {
|
2014-06-30 01:52:54 +00:00
|
|
|
error("Error relocating %s: %s: symbol not found",
|
2012-08-05 06:49:02 +00:00
|
|
|
dso->name, name);
|
2012-08-18 20:00:23 +00:00
|
|
|
continue;
|
2011-06-26 21:39:17 +00:00
|
|
|
}
|
2012-08-05 18:03:17 +00:00
|
|
|
} else {
|
2012-10-05 02:48:33 +00:00
|
|
|
sym = 0;
|
|
|
|
def.sym = 0;
|
2014-06-18 06:44:02 +00:00
|
|
|
def.dso = dso;
|
|
|
|
}
|
|
|
|
|
|
|
|
addend = stride>2 ? rel[2]
|
|
|
|
: (1<<type & NO_INLINE_ADDEND) ? 0
|
|
|
|
: *reloc_addr;
|
|
|
|
|
|
|
|
sym_val = def.sym ? (size_t)def.dso->base+def.sym->st_value : 0;
|
|
|
|
tls_val = def.sym ? def.sym->st_value : 0;
|
|
|
|
|
|
|
|
switch(type) {
|
|
|
|
case REL_OFFSET:
|
|
|
|
addend -= (size_t)reloc_addr;
|
|
|
|
case REL_SYMBOLIC:
|
|
|
|
case REL_GOT:
|
|
|
|
case REL_PLT:
|
|
|
|
*reloc_addr = sym_val + addend;
|
|
|
|
break;
|
|
|
|
case REL_RELATIVE:
|
|
|
|
*reloc_addr = (size_t)base + addend;
|
|
|
|
break;
|
|
|
|
case REL_SYM_OR_REL:
|
|
|
|
if (sym) *reloc_addr = sym_val + addend;
|
|
|
|
else *reloc_addr = (size_t)base + addend;
|
|
|
|
break;
|
|
|
|
case REL_COPY:
|
|
|
|
memcpy(reloc_addr, (void *)sym_val, sym->st_size);
|
|
|
|
break;
|
|
|
|
case REL_OFFSET32:
|
|
|
|
*(uint32_t *)reloc_addr = sym_val + addend
|
|
|
|
- (size_t)reloc_addr;
|
|
|
|
break;
|
|
|
|
case REL_DTPMOD:
|
|
|
|
*reloc_addr = def.dso->tls_id;
|
|
|
|
break;
|
|
|
|
case REL_DTPOFF:
|
|
|
|
*reloc_addr = tls_val + addend;
|
|
|
|
break;
|
|
|
|
#ifdef TLS_ABOVE_TP
|
|
|
|
case REL_TPOFF:
|
|
|
|
*reloc_addr = tls_val + def.dso->tls_offset + TPOFF_K + addend;
|
|
|
|
break;
|
|
|
|
#else
|
|
|
|
case REL_TPOFF:
|
|
|
|
*reloc_addr = tls_val - def.dso->tls_offset + addend;
|
|
|
|
break;
|
|
|
|
case REL_TPOFF_NEG:
|
|
|
|
*reloc_addr = def.dso->tls_offset - tls_val + addend;
|
|
|
|
break;
|
|
|
|
#endif
|
2014-06-19 06:01:06 +00:00
|
|
|
case REL_TLSDESC:
|
|
|
|
if (stride<3) addend = reloc_addr[1];
|
|
|
|
if (runtime && def.dso->tls_id >= static_tls_cnt) {
|
|
|
|
struct td_index *new = malloc(sizeof *new);
|
2014-06-30 01:52:54 +00:00
|
|
|
if (!new) error(
|
2014-06-19 06:01:06 +00:00
|
|
|
"Error relocating %s: cannot allocate TLSDESC for %s",
|
|
|
|
dso->name, sym ? name : "(local)" );
|
|
|
|
new->next = dso->td_index;
|
|
|
|
dso->td_index = new;
|
|
|
|
new->args[0] = def.dso->tls_id;
|
|
|
|
new->args[1] = tls_val + addend;
|
|
|
|
reloc_addr[0] = (size_t)__tlsdesc_dynamic;
|
|
|
|
reloc_addr[1] = (size_t)new;
|
|
|
|
} else {
|
|
|
|
reloc_addr[0] = (size_t)__tlsdesc_static;
|
|
|
|
#ifdef TLS_ABOVE_TP
|
|
|
|
reloc_addr[1] = tls_val + def.dso->tls_offset
|
|
|
|
+ TPOFF_K + addend;
|
|
|
|
#else
|
|
|
|
reloc_addr[1] = tls_val - def.dso->tls_offset
|
|
|
|
+ addend;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
break;
|
2011-06-18 23:48:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-06-28 23:40:14 +00:00
|
|
|
/* A huge hack: to make up for the wastefulness of shared libraries
|
|
|
|
* needing at least a page of dirty memory even if they have no global
|
|
|
|
* data, we reclaim the gaps at the beginning and end of writable maps
|
|
|
|
* and "donate" them to the heap by setting up minimal malloc
|
|
|
|
* structures and then freeing them. */
|
|
|
|
|
2014-03-25 12:13:27 +00:00
|
|
|
static void reclaim(struct dso *dso, size_t start, size_t end)
|
2011-06-28 23:40:14 +00:00
|
|
|
{
|
|
|
|
size_t *a, *z;
|
2014-03-25 12:13:27 +00:00
|
|
|
if (start >= dso->relro_start && start < dso->relro_end) start = dso->relro_end;
|
|
|
|
if (end >= dso->relro_start && end < dso->relro_end) end = dso->relro_start;
|
2011-06-28 23:40:14 +00:00
|
|
|
start = start + 6*sizeof(size_t)-1 & -4*sizeof(size_t);
|
|
|
|
end = (end & -4*sizeof(size_t)) - 2*sizeof(size_t);
|
|
|
|
if (start>end || end-start < 4*sizeof(size_t)) return;
|
2014-03-25 12:13:27 +00:00
|
|
|
a = (size_t *)(dso->base + start);
|
|
|
|
z = (size_t *)(dso->base + end);
|
2011-06-28 23:40:14 +00:00
|
|
|
a[-2] = 1;
|
|
|
|
a[-1] = z[0] = end-start + 2*sizeof(size_t) | 1;
|
|
|
|
z[1] = 1;
|
|
|
|
free(a);
|
|
|
|
}
|
|
|
|
|
2014-03-25 18:59:50 +00:00
|
|
|
static void reclaim_gaps(struct dso *dso)
|
2011-06-28 23:40:14 +00:00
|
|
|
{
|
2014-03-25 20:21:50 +00:00
|
|
|
Phdr *ph = dso->phdr;
|
|
|
|
size_t phcnt = dso->phnum;
|
2014-03-25 18:59:50 +00:00
|
|
|
|
2014-03-25 20:21:50 +00:00
|
|
|
for (; phcnt--; ph=(void *)((char *)ph+dso->phentsize)) {
|
2011-06-28 23:40:14 +00:00
|
|
|
if (ph->p_type!=PT_LOAD) continue;
|
|
|
|
if ((ph->p_flags&(PF_R|PF_W))!=(PF_R|PF_W)) continue;
|
2014-03-25 12:13:27 +00:00
|
|
|
reclaim(dso, ph->p_vaddr & -PAGE_SIZE, ph->p_vaddr);
|
|
|
|
reclaim(dso, ph->p_vaddr+ph->p_memsz,
|
2011-06-28 23:40:14 +00:00
|
|
|
ph->p_vaddr+ph->p_memsz+PAGE_SIZE-1 & -PAGE_SIZE);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-05 00:04:13 +00:00
|
|
|
static void *map_library(int fd, struct dso *dso)
|
2011-06-18 23:48:42 +00:00
|
|
|
{
|
2011-06-25 16:26:08 +00:00
|
|
|
Ehdr buf[(896+sizeof(Ehdr))/sizeof(Ehdr)];
|
2013-08-02 13:56:49 +00:00
|
|
|
void *allocated_buf=0;
|
2011-06-18 23:48:42 +00:00
|
|
|
size_t phsize;
|
|
|
|
size_t addr_min=SIZE_MAX, addr_max=0, map_len;
|
|
|
|
size_t this_min, this_max;
|
|
|
|
off_t off_start;
|
|
|
|
Ehdr *eh;
|
2013-07-10 18:38:20 +00:00
|
|
|
Phdr *ph, *ph0;
|
2011-06-18 23:48:42 +00:00
|
|
|
unsigned prot;
|
2013-08-02 13:56:49 +00:00
|
|
|
unsigned char *map=MAP_FAILED, *base;
|
2013-08-02 13:25:12 +00:00
|
|
|
size_t dyn=0;
|
2012-10-05 00:04:13 +00:00
|
|
|
size_t tls_image=0;
|
2011-06-18 23:48:42 +00:00
|
|
|
size_t i;
|
|
|
|
|
|
|
|
ssize_t l = read(fd, buf, sizeof buf);
|
2011-06-25 16:26:08 +00:00
|
|
|
eh = buf;
|
2013-08-02 13:56:49 +00:00
|
|
|
if (l<0) return 0;
|
|
|
|
if (l<sizeof *eh || (eh->e_type != ET_DYN && eh->e_type != ET_EXEC))
|
|
|
|
goto noexec;
|
2011-06-18 23:48:42 +00:00
|
|
|
phsize = eh->e_phentsize * eh->e_phnum;
|
2013-08-02 13:56:49 +00:00
|
|
|
if (phsize > sizeof buf - sizeof *eh) {
|
|
|
|
allocated_buf = malloc(phsize);
|
|
|
|
if (!allocated_buf) return 0;
|
|
|
|
l = pread(fd, allocated_buf, phsize, eh->e_phoff);
|
|
|
|
if (l < 0) goto error;
|
|
|
|
if (l != phsize) goto noexec;
|
|
|
|
ph = ph0 = allocated_buf;
|
|
|
|
} else if (eh->e_phoff + phsize > l) {
|
2011-06-25 16:26:08 +00:00
|
|
|
l = pread(fd, buf+1, phsize, eh->e_phoff);
|
2013-08-02 13:56:49 +00:00
|
|
|
if (l < 0) goto error;
|
|
|
|
if (l != phsize) goto noexec;
|
2013-07-10 18:38:20 +00:00
|
|
|
ph = ph0 = (void *)(buf + 1);
|
|
|
|
} else {
|
|
|
|
ph = ph0 = (void *)((char *)buf + eh->e_phoff);
|
2011-06-18 23:48:42 +00:00
|
|
|
}
|
|
|
|
for (i=eh->e_phnum; i; i--, ph=(void *)((char *)ph+eh->e_phentsize)) {
|
2014-03-25 20:21:50 +00:00
|
|
|
if (ph->p_type == PT_DYNAMIC) {
|
2011-06-18 23:48:42 +00:00
|
|
|
dyn = ph->p_vaddr;
|
2014-03-25 20:21:50 +00:00
|
|
|
} else if (ph->p_type == PT_TLS) {
|
2012-10-05 00:04:13 +00:00
|
|
|
tls_image = ph->p_vaddr;
|
|
|
|
dso->tls_align = ph->p_align;
|
|
|
|
dso->tls_len = ph->p_filesz;
|
|
|
|
dso->tls_size = ph->p_memsz;
|
2014-03-25 12:13:27 +00:00
|
|
|
} else if (ph->p_type == PT_GNU_RELRO) {
|
|
|
|
dso->relro_start = ph->p_vaddr & -PAGE_SIZE;
|
|
|
|
dso->relro_end = (ph->p_vaddr + ph->p_memsz) & -PAGE_SIZE;
|
2012-10-05 00:04:13 +00:00
|
|
|
}
|
2011-06-18 23:48:42 +00:00
|
|
|
if (ph->p_type != PT_LOAD) continue;
|
|
|
|
if (ph->p_vaddr < addr_min) {
|
|
|
|
addr_min = ph->p_vaddr;
|
|
|
|
off_start = ph->p_offset;
|
|
|
|
prot = (((ph->p_flags&PF_R) ? PROT_READ : 0) |
|
|
|
|
((ph->p_flags&PF_W) ? PROT_WRITE: 0) |
|
|
|
|
((ph->p_flags&PF_X) ? PROT_EXEC : 0));
|
|
|
|
}
|
|
|
|
if (ph->p_vaddr+ph->p_memsz > addr_max) {
|
|
|
|
addr_max = ph->p_vaddr+ph->p_memsz;
|
|
|
|
}
|
|
|
|
}
|
2013-08-02 13:56:49 +00:00
|
|
|
if (!dyn) goto noexec;
|
2011-06-18 23:48:42 +00:00
|
|
|
addr_max += PAGE_SIZE-1;
|
|
|
|
addr_max &= -PAGE_SIZE;
|
|
|
|
addr_min &= -PAGE_SIZE;
|
|
|
|
off_start &= -PAGE_SIZE;
|
|
|
|
map_len = addr_max - addr_min + off_start;
|
|
|
|
/* The first time, we map too much, possibly even more than
|
|
|
|
* the length of the file. This is okay because we will not
|
|
|
|
* use the invalid part; we just need to reserve the right
|
|
|
|
* amount of virtual address space to map over later. */
|
2011-06-28 18:20:41 +00:00
|
|
|
map = mmap((void *)addr_min, map_len, prot, MAP_PRIVATE, fd, off_start);
|
2013-08-02 13:56:49 +00:00
|
|
|
if (map==MAP_FAILED) goto error;
|
2013-07-31 18:42:08 +00:00
|
|
|
/* If the loaded file is not relocatable and the requested address is
|
|
|
|
* not available, then the load operation must fail. */
|
|
|
|
if (eh->e_type != ET_DYN && addr_min && map!=(void *)addr_min) {
|
|
|
|
errno = EBUSY;
|
|
|
|
goto error;
|
|
|
|
}
|
2011-06-18 23:48:42 +00:00
|
|
|
base = map - addr_min;
|
2013-07-10 18:38:20 +00:00
|
|
|
dso->phdr = 0;
|
|
|
|
dso->phnum = 0;
|
|
|
|
for (ph=ph0, i=eh->e_phnum; i; i--, ph=(void *)((char *)ph+eh->e_phentsize)) {
|
2011-06-18 23:48:42 +00:00
|
|
|
if (ph->p_type != PT_LOAD) continue;
|
2013-07-10 18:38:20 +00:00
|
|
|
/* Check if the programs headers are in this load segment, and
|
|
|
|
* if so, record the address for use by dl_iterate_phdr. */
|
|
|
|
if (!dso->phdr && eh->e_phoff >= ph->p_offset
|
|
|
|
&& eh->e_phoff+phsize <= ph->p_offset+ph->p_filesz) {
|
|
|
|
dso->phdr = (void *)(base + ph->p_vaddr
|
|
|
|
+ (eh->e_phoff-ph->p_offset));
|
|
|
|
dso->phnum = eh->e_phnum;
|
2014-03-25 18:59:50 +00:00
|
|
|
dso->phentsize = eh->e_phentsize;
|
2013-07-10 18:38:20 +00:00
|
|
|
}
|
2011-06-18 23:48:42 +00:00
|
|
|
/* Reuse the existing mapping for the lowest-address LOAD */
|
|
|
|
if ((ph->p_vaddr & -PAGE_SIZE) == addr_min) continue;
|
|
|
|
this_min = ph->p_vaddr & -PAGE_SIZE;
|
|
|
|
this_max = ph->p_vaddr+ph->p_memsz+PAGE_SIZE-1 & -PAGE_SIZE;
|
|
|
|
off_start = ph->p_offset & -PAGE_SIZE;
|
|
|
|
prot = (((ph->p_flags&PF_R) ? PROT_READ : 0) |
|
|
|
|
((ph->p_flags&PF_W) ? PROT_WRITE: 0) |
|
|
|
|
((ph->p_flags&PF_X) ? PROT_EXEC : 0));
|
2012-06-06 15:21:28 +00:00
|
|
|
if (mmap(base+this_min, this_max-this_min, prot, MAP_PRIVATE|MAP_FIXED, fd, off_start) == MAP_FAILED)
|
|
|
|
goto error;
|
2011-06-18 23:48:42 +00:00
|
|
|
if (ph->p_memsz > ph->p_filesz) {
|
|
|
|
size_t brk = (size_t)base+ph->p_vaddr+ph->p_filesz;
|
|
|
|
size_t pgbrk = brk+PAGE_SIZE-1 & -PAGE_SIZE;
|
|
|
|
memset((void *)brk, 0, pgbrk-brk & PAGE_SIZE-1);
|
2012-06-06 15:21:28 +00:00
|
|
|
if (pgbrk-(size_t)base < this_max && mmap((void *)pgbrk, (size_t)base+this_max-pgbrk, prot, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) == MAP_FAILED)
|
|
|
|
goto error;
|
2011-06-18 23:48:42 +00:00
|
|
|
}
|
|
|
|
}
|
2011-06-29 04:29:08 +00:00
|
|
|
for (i=0; ((size_t *)(base+dyn))[i]; i+=2)
|
|
|
|
if (((size_t *)(base+dyn))[i]==DT_TEXTREL) {
|
2012-06-06 15:21:28 +00:00
|
|
|
if (mprotect(map, map_len, PROT_READ|PROT_WRITE|PROT_EXEC) < 0)
|
|
|
|
goto error;
|
2011-06-29 04:29:08 +00:00
|
|
|
break;
|
|
|
|
}
|
2012-10-05 00:04:13 +00:00
|
|
|
dso->map = map;
|
|
|
|
dso->map_len = map_len;
|
|
|
|
dso->base = base;
|
|
|
|
dso->dynv = (void *)(base+dyn);
|
|
|
|
if (dso->tls_size) dso->tls_image = (void *)(base+tls_image);
|
2014-03-25 18:59:50 +00:00
|
|
|
if (!runtime) reclaim_gaps(dso);
|
2013-08-02 13:59:02 +00:00
|
|
|
free(allocated_buf);
|
2011-06-18 23:48:42 +00:00
|
|
|
return map;
|
2013-08-02 13:56:49 +00:00
|
|
|
noexec:
|
|
|
|
errno = ENOEXEC;
|
2012-06-06 15:21:28 +00:00
|
|
|
error:
|
2013-08-02 13:56:49 +00:00
|
|
|
if (map!=MAP_FAILED) munmap(map, map_len);
|
|
|
|
free(allocated_buf);
|
2012-06-06 15:21:28 +00:00
|
|
|
return 0;
|
2011-06-18 23:48:42 +00:00
|
|
|
}
|
|
|
|
|
2013-04-20 15:51:58 +00:00
|
|
|
static int path_open(const char *name, const char *s, char *buf, size_t buf_size)
|
2011-06-25 05:56:34 +00:00
|
|
|
{
|
2013-04-20 15:51:58 +00:00
|
|
|
size_t l;
|
|
|
|
int fd;
|
2011-06-25 21:49:16 +00:00
|
|
|
for (;;) {
|
2013-04-20 15:51:58 +00:00
|
|
|
s += strspn(s, ":\n");
|
|
|
|
l = strcspn(s, ":\n");
|
|
|
|
if (l-1 >= INT_MAX) return -1;
|
2015-04-02 00:27:29 +00:00
|
|
|
if (snprintf(buf, buf_size, "%.*s/%s", (int)l, s, name) < buf_size) {
|
|
|
|
if ((fd = open(buf, O_RDONLY|O_CLOEXEC))>=0) return fd;
|
|
|
|
switch (errno) {
|
|
|
|
case ENOENT:
|
|
|
|
case ENOTDIR:
|
|
|
|
case EACCES:
|
|
|
|
case ENAMETOOLONG:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* Any negative value but -1 will inhibit
|
|
|
|
* futher path search. */
|
|
|
|
return -2;
|
|
|
|
}
|
|
|
|
}
|
2011-06-25 21:49:16 +00:00
|
|
|
s += l;
|
2011-06-25 05:56:34 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-08-23 17:56:30 +00:00
|
|
|
static int fixup_rpath(struct dso *p, char *buf, size_t buf_size)
|
|
|
|
{
|
|
|
|
size_t n, l;
|
|
|
|
const char *s, *t, *origin;
|
|
|
|
char *d;
|
2015-04-03 20:35:43 +00:00
|
|
|
if (p->rpath || !p->rpath_orig) return 0;
|
2013-08-23 17:56:30 +00:00
|
|
|
if (!strchr(p->rpath_orig, '$')) {
|
|
|
|
p->rpath = p->rpath_orig;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
n = 0;
|
|
|
|
s = p->rpath_orig;
|
2013-08-23 19:51:59 +00:00
|
|
|
while ((t=strchr(s, '$'))) {
|
|
|
|
if (strncmp(t, "$ORIGIN", 7) && strncmp(t, "${ORIGIN}", 9))
|
2015-04-03 20:35:43 +00:00
|
|
|
return 0;
|
2013-08-23 17:56:30 +00:00
|
|
|
s = t+1;
|
|
|
|
n++;
|
|
|
|
}
|
2015-04-03 20:35:43 +00:00
|
|
|
if (n > SSIZE_MAX/PATH_MAX) return 0;
|
2013-08-23 17:56:30 +00:00
|
|
|
|
|
|
|
if (p->kernel_mapped) {
|
|
|
|
/* $ORIGIN searches cannot be performed for the main program
|
|
|
|
* when it is suid/sgid/AT_SECURE. This is because the
|
|
|
|
* pathname is under the control of the caller of execve.
|
|
|
|
* For libraries, however, $ORIGIN can be processed safely
|
|
|
|
* since the library's pathname came from a trusted source
|
|
|
|
* (either system paths or a call to dlopen). */
|
|
|
|
if (libc.secure)
|
2015-04-03 20:35:43 +00:00
|
|
|
return 0;
|
2013-08-23 19:51:59 +00:00
|
|
|
l = readlink("/proc/self/exe", buf, buf_size);
|
2015-04-03 20:35:43 +00:00
|
|
|
if (l == -1) switch (errno) {
|
|
|
|
case ENOENT:
|
|
|
|
case ENOTDIR:
|
|
|
|
case EACCES:
|
|
|
|
break;
|
|
|
|
default:
|
2013-08-23 17:56:30 +00:00
|
|
|
return -1;
|
2015-04-03 20:35:43 +00:00
|
|
|
}
|
|
|
|
if (l >= buf_size)
|
|
|
|
return 0;
|
2013-08-23 19:51:59 +00:00
|
|
|
buf[l] = 0;
|
2013-08-23 17:56:30 +00:00
|
|
|
origin = buf;
|
|
|
|
} else {
|
|
|
|
origin = p->name;
|
|
|
|
}
|
|
|
|
t = strrchr(origin, '/');
|
|
|
|
l = t ? t-origin : 0;
|
|
|
|
p->rpath = malloc(strlen(p->rpath_orig) + n*l + 1);
|
|
|
|
if (!p->rpath) return -1;
|
|
|
|
|
|
|
|
d = p->rpath;
|
|
|
|
s = p->rpath_orig;
|
2013-08-23 19:51:59 +00:00
|
|
|
while ((t=strchr(s, '$'))) {
|
2013-08-23 17:56:30 +00:00
|
|
|
memcpy(d, s, t-s);
|
|
|
|
d += t-s;
|
|
|
|
memcpy(d, origin, l);
|
|
|
|
d += l;
|
2013-08-23 19:51:59 +00:00
|
|
|
/* It was determined previously that the '$' is followed
|
|
|
|
* either by "ORIGIN" or "{ORIGIN}". */
|
2013-08-23 17:56:30 +00:00
|
|
|
s = t + 7 + 2*(t[1]=='{');
|
|
|
|
}
|
|
|
|
strcpy(d, s);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-01-23 05:57:38 +00:00
|
|
|
static void decode_dyn(struct dso *p)
|
|
|
|
{
|
|
|
|
size_t dyn[DYN_CNT] = {0};
|
|
|
|
decode_vec(p->dynv, dyn, DYN_CNT);
|
|
|
|
p->syms = (void *)(p->base + dyn[DT_SYMTAB]);
|
|
|
|
p->strings = (void *)(p->base + dyn[DT_STRTAB]);
|
2012-08-25 21:13:28 +00:00
|
|
|
if (dyn[0]&(1<<DT_HASH))
|
|
|
|
p->hashtab = (void *)(p->base + dyn[DT_HASH]);
|
2013-08-23 15:15:40 +00:00
|
|
|
if (dyn[0]&(1<<DT_RPATH))
|
2013-08-23 17:56:30 +00:00
|
|
|
p->rpath_orig = (void *)(p->strings + dyn[DT_RPATH]);
|
2014-11-23 21:17:57 +00:00
|
|
|
if (dyn[0]&(1<<DT_RUNPATH))
|
|
|
|
p->rpath_orig = (void *)(p->strings + dyn[DT_RUNPATH]);
|
2012-08-25 21:13:28 +00:00
|
|
|
if (search_vec(p->dynv, dyn, DT_GNU_HASH))
|
|
|
|
p->ghashtab = (void *)(p->base + *dyn);
|
2013-08-08 20:10:35 +00:00
|
|
|
if (search_vec(p->dynv, dyn, DT_VERSYM))
|
|
|
|
p->versym = (void *)(p->base + *dyn);
|
2012-01-23 05:57:38 +00:00
|
|
|
}
|
|
|
|
|
2013-08-23 15:15:40 +00:00
|
|
|
static struct dso *load_library(const char *name, struct dso *needed_by)
|
2011-06-18 23:48:42 +00:00
|
|
|
{
|
2012-05-27 20:01:44 +00:00
|
|
|
char buf[2*NAME_MAX+2];
|
2012-07-11 05:41:20 +00:00
|
|
|
const char *pathname;
|
2012-12-16 04:34:08 +00:00
|
|
|
unsigned char *map;
|
2012-10-05 00:04:13 +00:00
|
|
|
struct dso *p, temp_dso = {0};
|
2011-06-18 23:48:42 +00:00
|
|
|
int fd;
|
|
|
|
struct stat st;
|
2012-10-05 15:51:50 +00:00
|
|
|
size_t alloc_size;
|
|
|
|
int n_th = 0;
|
2013-07-31 18:59:36 +00:00
|
|
|
int is_self = 0;
|
2011-06-18 23:48:42 +00:00
|
|
|
|
2014-07-11 04:29:44 +00:00
|
|
|
if (!*name) {
|
|
|
|
errno = EINVAL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-06-18 23:48:42 +00:00
|
|
|
/* Catch and block attempts to reload the implementation itself */
|
|
|
|
if (name[0]=='l' && name[1]=='i' && name[2]=='b') {
|
|
|
|
static const char *rp, reserved[] =
|
|
|
|
"c\0pthread\0rt\0m\0dl\0util\0xnet\0";
|
|
|
|
char *z = strchr(name, '.');
|
|
|
|
if (z) {
|
|
|
|
size_t l = z-name;
|
2013-07-31 19:14:06 +00:00
|
|
|
for (rp=reserved; *rp && strncmp(name+3, rp, l-3); rp+=strlen(rp)+1);
|
2011-06-18 23:48:42 +00:00
|
|
|
if (*rp) {
|
2013-07-26 18:41:12 +00:00
|
|
|
if (ldd_mode) {
|
|
|
|
/* Track which names have been resolved
|
|
|
|
* and only report each one once. */
|
|
|
|
static unsigned reported;
|
|
|
|
unsigned mask = 1U<<(rp-reserved);
|
|
|
|
if (!(reported & mask)) {
|
|
|
|
reported |= mask;
|
|
|
|
dprintf(1, "\t%s => %s (%p)\n",
|
|
|
|
name, ldso->name,
|
|
|
|
ldso->base);
|
|
|
|
}
|
|
|
|
}
|
2013-07-31 18:59:36 +00:00
|
|
|
is_self = 1;
|
2011-06-18 23:48:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-07-31 18:59:36 +00:00
|
|
|
if (!strcmp(name, ldso->name)) is_self = 1;
|
|
|
|
if (is_self) {
|
|
|
|
if (!ldso->prev) {
|
|
|
|
tail->next = ldso;
|
|
|
|
ldso->prev = tail;
|
|
|
|
tail = ldso->next ? ldso->next : ldso;
|
|
|
|
}
|
|
|
|
return ldso;
|
|
|
|
}
|
2011-06-26 23:23:28 +00:00
|
|
|
if (strchr(name, '/')) {
|
2012-07-11 05:41:20 +00:00
|
|
|
pathname = name;
|
2012-09-29 21:59:50 +00:00
|
|
|
fd = open(name, O_RDONLY|O_CLOEXEC);
|
2011-06-18 23:48:42 +00:00
|
|
|
} else {
|
2012-07-11 05:41:20 +00:00
|
|
|
/* Search for the name to see if it's already loaded */
|
|
|
|
for (p=head->next; p; p=p->next) {
|
|
|
|
if (p->shortname && !strcmp(p->shortname, name)) {
|
|
|
|
p->refcnt++;
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
}
|
2011-06-26 23:23:28 +00:00
|
|
|
if (strlen(name) > NAME_MAX) return 0;
|
2011-06-25 05:56:34 +00:00
|
|
|
fd = -1;
|
2013-08-02 14:02:29 +00:00
|
|
|
if (env_path) fd = path_open(name, env_path, buf, sizeof buf);
|
2015-04-03 20:35:43 +00:00
|
|
|
for (p=needed_by; fd == -1 && p; p=p->needed_by) {
|
|
|
|
if (fixup_rpath(p, buf, sizeof buf) < 0)
|
|
|
|
fd = -2; /* Inhibit further search. */
|
|
|
|
if (p->rpath)
|
2013-08-23 15:15:40 +00:00
|
|
|
fd = path_open(name, p->rpath, buf, sizeof buf);
|
2015-04-03 20:35:43 +00:00
|
|
|
}
|
2015-04-02 00:27:29 +00:00
|
|
|
if (fd == -1) {
|
2011-06-25 05:56:34 +00:00
|
|
|
if (!sys_path) {
|
2013-07-18 23:29:44 +00:00
|
|
|
char *prefix = 0;
|
|
|
|
size_t prefix_len;
|
|
|
|
if (ldso->name[0]=='/') {
|
|
|
|
char *s, *t, *z;
|
|
|
|
for (s=t=z=ldso->name; *s; s++)
|
|
|
|
if (*s=='/') z=t, t=s;
|
|
|
|
prefix_len = z-ldso->name;
|
|
|
|
if (prefix_len < PATH_MAX)
|
|
|
|
prefix = ldso->name;
|
|
|
|
}
|
|
|
|
if (!prefix) {
|
|
|
|
prefix = "";
|
|
|
|
prefix_len = 0;
|
|
|
|
}
|
|
|
|
char etc_ldso_path[prefix_len + 1
|
|
|
|
+ sizeof "/etc/ld-musl-" LDSO_ARCH ".path"];
|
|
|
|
snprintf(etc_ldso_path, sizeof etc_ldso_path,
|
|
|
|
"%.*s/etc/ld-musl-" LDSO_ARCH ".path",
|
|
|
|
(int)prefix_len, prefix);
|
|
|
|
FILE *f = fopen(etc_ldso_path, "rbe");
|
2011-06-25 05:56:34 +00:00
|
|
|
if (f) {
|
2013-06-26 14:17:29 +00:00
|
|
|
if (getdelim(&sys_path, (size_t[1]){0}, 0, f) <= 0) {
|
2013-06-26 14:51:36 +00:00
|
|
|
free(sys_path);
|
2013-06-26 14:17:29 +00:00
|
|
|
sys_path = "";
|
2012-11-09 18:49:40 +00:00
|
|
|
}
|
2011-06-25 05:56:34 +00:00
|
|
|
fclose(f);
|
2013-09-09 17:39:08 +00:00
|
|
|
} else if (errno != ENOENT) {
|
|
|
|
sys_path = "";
|
2011-06-25 05:56:34 +00:00
|
|
|
}
|
|
|
|
}
|
2012-11-09 03:41:16 +00:00
|
|
|
if (!sys_path) sys_path = "/lib:/usr/local/lib:/usr/lib";
|
|
|
|
fd = path_open(name, sys_path, buf, sizeof buf);
|
2011-06-18 23:48:42 +00:00
|
|
|
}
|
2012-07-11 05:41:20 +00:00
|
|
|
pathname = buf;
|
2011-06-18 23:48:42 +00:00
|
|
|
}
|
|
|
|
if (fd < 0) return 0;
|
|
|
|
if (fstat(fd, &st) < 0) {
|
|
|
|
close(fd);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
for (p=head->next; p; p=p->next) {
|
|
|
|
if (p->dev == st.st_dev && p->ino == st.st_ino) {
|
2012-07-11 05:41:20 +00:00
|
|
|
/* If this library was previously loaded with a
|
|
|
|
* pathname but a search found the same inode,
|
|
|
|
* setup its shortname so it can be found by name. */
|
2012-10-05 16:09:54 +00:00
|
|
|
if (!p->shortname && pathname != name)
|
|
|
|
p->shortname = strrchr(p->name, '/')+1;
|
2011-06-18 23:48:42 +00:00
|
|
|
close(fd);
|
|
|
|
p->refcnt++;
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
}
|
2013-01-24 03:07:45 +00:00
|
|
|
map = noload ? 0 : map_library(fd, &temp_dso);
|
2011-06-18 23:48:42 +00:00
|
|
|
close(fd);
|
|
|
|
if (!map) return 0;
|
2012-10-05 15:51:50 +00:00
|
|
|
|
|
|
|
/* Allocate storage for the new DSO. When there is TLS, this
|
|
|
|
* storage must include a reservation for all pre-existing
|
|
|
|
* threads to obtain copies of both the new TLS, and an
|
|
|
|
* extended DTV capable of storing an additional slot for
|
|
|
|
* the newly-loaded DSO. */
|
|
|
|
alloc_size = sizeof *p + strlen(pathname) + 1;
|
|
|
|
if (runtime && temp_dso.tls_image) {
|
|
|
|
size_t per_th = temp_dso.tls_size + temp_dso.tls_align
|
|
|
|
+ sizeof(void *) * (tls_cnt+3);
|
2012-10-14 03:25:20 +00:00
|
|
|
n_th = libc.threads_minus_1 + 1;
|
2012-10-05 15:51:50 +00:00
|
|
|
if (n_th > SSIZE_MAX / per_th) alloc_size = SIZE_MAX;
|
|
|
|
else alloc_size += n_th * per_th;
|
|
|
|
}
|
|
|
|
p = calloc(1, alloc_size);
|
2011-06-18 23:48:42 +00:00
|
|
|
if (!p) {
|
2013-02-02 05:59:25 +00:00
|
|
|
munmap(map, temp_dso.map_len);
|
2011-06-18 23:48:42 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2012-10-05 00:04:13 +00:00
|
|
|
memcpy(p, &temp_dso, sizeof temp_dso);
|
2012-01-23 05:57:38 +00:00
|
|
|
decode_dyn(p);
|
2011-06-18 23:48:42 +00:00
|
|
|
p->dev = st.st_dev;
|
|
|
|
p->ino = st.st_ino;
|
|
|
|
p->refcnt = 1;
|
2013-08-23 15:15:40 +00:00
|
|
|
p->needed_by = needed_by;
|
2011-06-26 21:39:17 +00:00
|
|
|
p->name = p->buf;
|
2012-07-11 05:41:20 +00:00
|
|
|
strcpy(p->name, pathname);
|
|
|
|
/* Add a shortname only if name arg was not an explicit pathname. */
|
|
|
|
if (pathname != name) p->shortname = strrchr(p->name, '/')+1;
|
2012-10-05 15:51:50 +00:00
|
|
|
if (p->tls_image) {
|
always initialize thread pointer at program start
this is the first step in an overhaul aimed at greatly simplifying and
optimizing everything dealing with thread-local state.
previously, the thread pointer was initialized lazily on first access,
or at program startup if stack protector was in use, or at certain
random places where inconsistent state could be reached if it were not
initialized early. while believed to be fully correct, the logic was
fragile and non-obvious.
in the first phase of the thread pointer overhaul, support is retained
(and in some cases improved) for systems/situation where loading the
thread pointer fails, e.g. old kernels.
some notes on specific changes:
- the confusing use of libc.main_thread as an indicator that the
thread pointer is initialized is eliminated in favor of an explicit
has_thread_pointer predicate.
- sigaction no longer needs to ensure that the thread pointer is
initialized before installing a signal handler (this was needed to
prevent a situation where the signal handler caused the thread
pointer to be initialized and the subsequent sigreturn cleared it
again) but it still needs to ensure that implementation-internal
thread-related signals are not blocked.
- pthread tsd initialization for the main thread is deferred in a new
manner to minimize bloat in the static-linked __init_tp code.
- pthread_setcancelstate no longer needs special handling for the
situation before the thread pointer is initialized. it simply fails
on systems that cannot support a thread pointer, which are
non-conforming anyway.
- pthread_cleanup_push/pop now check for missing thread pointer and
nop themselves out in this case, so stdio no longer needs to avoid
the cancellable path when the thread pointer is not available.
a number of cases remain where certain interfaces may crash if the
system does not support a thread pointer. at this point, these should
be limited to pthread interfaces, and the number of such cases should
be fewer than before.
2014-03-24 20:57:11 +00:00
|
|
|
if (runtime && !libc.has_thread_pointer) {
|
2013-02-02 05:59:25 +00:00
|
|
|
munmap(map, p->map_len);
|
2012-10-06 20:56:35 +00:00
|
|
|
free(p);
|
always initialize thread pointer at program start
this is the first step in an overhaul aimed at greatly simplifying and
optimizing everything dealing with thread-local state.
previously, the thread pointer was initialized lazily on first access,
or at program startup if stack protector was in use, or at certain
random places where inconsistent state could be reached if it were not
initialized early. while believed to be fully correct, the logic was
fragile and non-obvious.
in the first phase of the thread pointer overhaul, support is retained
(and in some cases improved) for systems/situation where loading the
thread pointer fails, e.g. old kernels.
some notes on specific changes:
- the confusing use of libc.main_thread as an indicator that the
thread pointer is initialized is eliminated in favor of an explicit
has_thread_pointer predicate.
- sigaction no longer needs to ensure that the thread pointer is
initialized before installing a signal handler (this was needed to
prevent a situation where the signal handler caused the thread
pointer to be initialized and the subsequent sigreturn cleared it
again) but it still needs to ensure that implementation-internal
thread-related signals are not blocked.
- pthread tsd initialization for the main thread is deferred in a new
manner to minimize bloat in the static-linked __init_tp code.
- pthread_setcancelstate no longer needs special handling for the
situation before the thread pointer is initialized. it simply fails
on systems that cannot support a thread pointer, which are
non-conforming anyway.
- pthread_cleanup_push/pop now check for missing thread pointer and
nop themselves out in this case, so stdio no longer needs to avoid
the cancellable path when the thread pointer is not available.
a number of cases remain where certain interfaces may crash if the
system does not support a thread pointer. at this point, these should
be limited to pthread interfaces, and the number of such cases should
be fewer than before.
2014-03-24 20:57:11 +00:00
|
|
|
errno = ENOSYS;
|
2012-10-06 20:56:35 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2012-10-05 15:51:50 +00:00
|
|
|
p->tls_id = ++tls_cnt;
|
2012-10-06 05:22:51 +00:00
|
|
|
tls_align = MAXP2(tls_align, p->tls_align);
|
2012-10-15 22:51:53 +00:00
|
|
|
#ifdef TLS_ABOVE_TP
|
|
|
|
p->tls_offset = tls_offset + ( (tls_align-1) &
|
|
|
|
-(tls_offset + (uintptr_t)p->tls_image) );
|
|
|
|
tls_offset += p->tls_size;
|
|
|
|
#else
|
2012-10-06 05:22:51 +00:00
|
|
|
tls_offset += p->tls_size + p->tls_align - 1;
|
|
|
|
tls_offset -= (tls_offset + (uintptr_t)p->tls_image)
|
|
|
|
& (p->tls_align-1);
|
|
|
|
p->tls_offset = tls_offset;
|
2012-10-15 22:51:53 +00:00
|
|
|
#endif
|
2012-10-05 15:51:50 +00:00
|
|
|
p->new_dtv = (void *)(-sizeof(size_t) &
|
|
|
|
(uintptr_t)(p->name+strlen(p->name)+sizeof(size_t)));
|
|
|
|
p->new_tls = (void *)(p->new_dtv + n_th*(tls_cnt+1));
|
|
|
|
}
|
2011-06-18 23:48:42 +00:00
|
|
|
|
|
|
|
tail->next = p;
|
|
|
|
p->prev = tail;
|
|
|
|
tail = p;
|
|
|
|
|
2012-12-16 04:34:08 +00:00
|
|
|
if (ldd_mode) dprintf(1, "\t%s => %s (%p)\n", name, pathname, p->base);
|
2012-05-27 20:01:44 +00:00
|
|
|
|
2011-06-18 23:48:42 +00:00
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void load_deps(struct dso *p)
|
|
|
|
{
|
2011-06-26 23:23:28 +00:00
|
|
|
size_t i, ndeps=0;
|
|
|
|
struct dso ***deps = &p->deps, **tmp, *dep;
|
2011-06-18 23:48:42 +00:00
|
|
|
for (; p; p=p->next) {
|
|
|
|
for (i=0; p->dynv[i]; i+=2) {
|
|
|
|
if (p->dynv[i] != DT_NEEDED) continue;
|
2013-08-23 15:15:40 +00:00
|
|
|
dep = load_library(p->strings + p->dynv[i+1], p);
|
2011-06-26 23:23:28 +00:00
|
|
|
if (!dep) {
|
2014-06-30 01:52:54 +00:00
|
|
|
error("Error loading shared library %s: %m (needed by %s)",
|
2011-06-26 21:39:17 +00:00
|
|
|
p->strings + p->dynv[i+1], p->name);
|
2012-08-18 20:00:23 +00:00
|
|
|
continue;
|
2011-06-26 21:39:17 +00:00
|
|
|
}
|
2011-06-26 23:23:28 +00:00
|
|
|
if (runtime) {
|
|
|
|
tmp = realloc(*deps, sizeof(*tmp)*(ndeps+2));
|
2013-07-24 06:38:05 +00:00
|
|
|
if (!tmp) longjmp(*rtld_fail, 1);
|
2011-06-26 23:23:28 +00:00
|
|
|
tmp[ndeps++] = dep;
|
|
|
|
tmp[ndeps] = 0;
|
|
|
|
*deps = tmp;
|
|
|
|
}
|
2011-06-18 23:48:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-08-16 04:24:36 +00:00
|
|
|
static void load_preload(char *s)
|
|
|
|
{
|
|
|
|
int tmp;
|
|
|
|
char *z;
|
|
|
|
for (z=s; *z; s=z) {
|
2014-07-11 04:26:12 +00:00
|
|
|
for ( ; *s && (isspace(*s) || *s==':'); s++);
|
|
|
|
for (z=s; *z && !isspace(*z) && *z!=':'; z++);
|
2011-08-16 04:24:36 +00:00
|
|
|
tmp = *z;
|
|
|
|
*z = 0;
|
2013-08-23 15:15:40 +00:00
|
|
|
load_library(s, 0);
|
2011-08-16 04:24:36 +00:00
|
|
|
*z = tmp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-06-26 23:23:28 +00:00
|
|
|
static void make_global(struct dso *p)
|
|
|
|
{
|
|
|
|
for (; p; p=p->next) p->global = 1;
|
|
|
|
}
|
|
|
|
|
2011-06-18 23:48:42 +00:00
|
|
|
static void reloc_all(struct dso *p)
|
|
|
|
{
|
|
|
|
size_t dyn[DYN_CNT] = {0};
|
|
|
|
for (; p; p=p->next) {
|
|
|
|
if (p->relocated) continue;
|
|
|
|
decode_vec(p->dynv, dyn, DYN_CNT);
|
2012-08-05 16:50:26 +00:00
|
|
|
#ifdef NEED_ARCH_RELOCS
|
|
|
|
do_arch_relocs(p, head);
|
|
|
|
#endif
|
2012-08-05 06:49:02 +00:00
|
|
|
do_relocs(p, (void *)(p->base+dyn[DT_JMPREL]), dyn[DT_PLTRELSZ],
|
|
|
|
2+(dyn[DT_PLTREL]==DT_RELA));
|
|
|
|
do_relocs(p, (void *)(p->base+dyn[DT_REL]), dyn[DT_RELSZ], 2);
|
|
|
|
do_relocs(p, (void *)(p->base+dyn[DT_RELA]), dyn[DT_RELASZ], 3);
|
2014-03-25 12:13:27 +00:00
|
|
|
|
|
|
|
if (p->relro_start != p->relro_end &&
|
|
|
|
mprotect(p->base+p->relro_start, p->relro_end-p->relro_start, PROT_READ) < 0) {
|
2014-06-30 01:52:54 +00:00
|
|
|
error("Error relocating %s: RELRO protection failed: %m",
|
2014-03-25 12:13:27 +00:00
|
|
|
p->name);
|
|
|
|
}
|
|
|
|
|
2011-06-25 04:18:19 +00:00
|
|
|
p->relocated = 1;
|
2011-06-18 23:48:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-03-25 18:59:50 +00:00
|
|
|
static void kernel_mapped_dso(struct dso *p)
|
2012-08-27 01:09:26 +00:00
|
|
|
{
|
2014-03-25 18:59:50 +00:00
|
|
|
size_t min_addr = -1, max_addr = 0, cnt;
|
|
|
|
Phdr *ph = p->phdr;
|
|
|
|
for (cnt = p->phnum; cnt--; ph = (void *)((char *)ph + p->phentsize)) {
|
|
|
|
if (ph->p_type == PT_DYNAMIC) {
|
|
|
|
p->dynv = (void *)(p->base + ph->p_vaddr);
|
|
|
|
} else if (ph->p_type == PT_GNU_RELRO) {
|
2014-03-25 12:13:27 +00:00
|
|
|
p->relro_start = ph->p_vaddr & -PAGE_SIZE;
|
|
|
|
p->relro_end = (ph->p_vaddr + ph->p_memsz) & -PAGE_SIZE;
|
|
|
|
}
|
2012-08-27 01:09:26 +00:00
|
|
|
if (ph->p_type != PT_LOAD) continue;
|
|
|
|
if (ph->p_vaddr < min_addr)
|
|
|
|
min_addr = ph->p_vaddr;
|
|
|
|
if (ph->p_vaddr+ph->p_memsz > max_addr)
|
|
|
|
max_addr = ph->p_vaddr+ph->p_memsz;
|
|
|
|
}
|
|
|
|
min_addr &= -PAGE_SIZE;
|
|
|
|
max_addr = (max_addr + PAGE_SIZE-1) & -PAGE_SIZE;
|
|
|
|
p->map = p->base + min_addr;
|
|
|
|
p->map_len = max_addr - min_addr;
|
2014-03-25 18:59:50 +00:00
|
|
|
p->kernel_mapped = 1;
|
2012-08-27 01:09:26 +00:00
|
|
|
}
|
|
|
|
|
2012-10-05 17:09:09 +00:00
|
|
|
static void do_fini()
|
|
|
|
{
|
|
|
|
struct dso *p;
|
|
|
|
size_t dyn[DYN_CNT] = {0};
|
|
|
|
for (p=fini_head; p; p=p->fini_next) {
|
|
|
|
if (!p->constructed) continue;
|
|
|
|
decode_vec(p->dynv, dyn, DYN_CNT);
|
2013-07-20 22:26:17 +00:00
|
|
|
if (dyn[0] & (1<<DT_FINI_ARRAY)) {
|
|
|
|
size_t n = dyn[DT_FINI_ARRAYSZ]/sizeof(size_t);
|
2013-07-21 06:35:46 +00:00
|
|
|
size_t *fn = (size_t *)(p->base + dyn[DT_FINI_ARRAY])+n;
|
|
|
|
while (n--) ((void (*)(void))*--fn)();
|
2013-07-20 22:26:17 +00:00
|
|
|
}
|
2013-07-22 18:08:33 +00:00
|
|
|
#ifndef NO_LEGACY_INITFINI
|
2013-07-31 04:04:10 +00:00
|
|
|
if ((dyn[0] & (1<<DT_FINI)) && dyn[DT_FINI])
|
2013-07-20 22:26:17 +00:00
|
|
|
((void (*)(void))(p->base + dyn[DT_FINI]))();
|
2013-07-22 18:08:33 +00:00
|
|
|
#endif
|
2012-10-05 17:09:09 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-02-06 19:39:09 +00:00
|
|
|
static void do_init_fini(struct dso *p)
|
|
|
|
{
|
|
|
|
size_t dyn[DYN_CNT] = {0};
|
2012-10-14 03:25:20 +00:00
|
|
|
int need_locking = libc.threads_minus_1;
|
2012-10-05 17:09:09 +00:00
|
|
|
/* Allow recursive calls that arise when a library calls
|
|
|
|
* dlopen from one of its constructors, but block any
|
|
|
|
* other threads until all ctors have finished. */
|
|
|
|
if (need_locking) pthread_mutex_lock(&init_fini_lock);
|
2012-02-06 19:39:09 +00:00
|
|
|
for (; p; p=p->prev) {
|
2012-10-05 17:09:09 +00:00
|
|
|
if (p->constructed) continue;
|
|
|
|
p->constructed = 1;
|
2012-02-06 19:39:09 +00:00
|
|
|
decode_vec(p->dynv, dyn, DYN_CNT);
|
2013-07-20 22:26:17 +00:00
|
|
|
if (dyn[0] & ((1<<DT_FINI) | (1<<DT_FINI_ARRAY))) {
|
2012-10-05 17:09:09 +00:00
|
|
|
p->fini_next = fini_head;
|
|
|
|
fini_head = p;
|
|
|
|
}
|
2013-07-22 18:08:33 +00:00
|
|
|
#ifndef NO_LEGACY_INITFINI
|
2013-07-31 04:04:10 +00:00
|
|
|
if ((dyn[0] & (1<<DT_INIT)) && dyn[DT_INIT])
|
2012-02-06 19:39:09 +00:00
|
|
|
((void (*)(void))(p->base + dyn[DT_INIT]))();
|
2013-07-22 18:08:33 +00:00
|
|
|
#endif
|
2013-07-20 22:26:17 +00:00
|
|
|
if (dyn[0] & (1<<DT_INIT_ARRAY)) {
|
|
|
|
size_t n = dyn[DT_INIT_ARRAYSZ]/sizeof(size_t);
|
|
|
|
size_t *fn = (void *)(p->base + dyn[DT_INIT_ARRAY]);
|
|
|
|
while (n--) ((void (*)(void))*fn++)();
|
|
|
|
}
|
2013-06-29 06:24:02 +00:00
|
|
|
if (!need_locking && libc.threads_minus_1) {
|
|
|
|
need_locking = 1;
|
|
|
|
pthread_mutex_lock(&init_fini_lock);
|
|
|
|
}
|
2012-02-06 19:39:09 +00:00
|
|
|
}
|
2012-10-05 17:09:09 +00:00
|
|
|
if (need_locking) pthread_mutex_unlock(&init_fini_lock);
|
2012-02-06 19:39:09 +00:00
|
|
|
}
|
|
|
|
|
2012-04-25 04:05:42 +00:00
|
|
|
void _dl_debug_state(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2013-08-03 20:27:30 +00:00
|
|
|
void __reset_tls()
|
|
|
|
{
|
|
|
|
pthread_t self = __pthread_self();
|
|
|
|
struct dso *p;
|
|
|
|
for (p=head; p; p=p->next) {
|
|
|
|
if (!p->tls_id || !self->dtv[p->tls_id]) continue;
|
|
|
|
memcpy(self->dtv[p->tls_id], p->tls_image, p->tls_len);
|
|
|
|
memset((char *)self->dtv[p->tls_id]+p->tls_len, 0,
|
|
|
|
p->tls_size - p->tls_len);
|
|
|
|
if (p->tls_id == (size_t)self->dtv[0]) break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-05 15:51:50 +00:00
|
|
|
void *__copy_tls(unsigned char *mem)
|
2012-10-05 00:04:13 +00:00
|
|
|
{
|
2012-10-06 05:22:51 +00:00
|
|
|
pthread_t td;
|
2012-10-05 00:04:13 +00:00
|
|
|
struct dso *p;
|
2012-10-06 05:22:51 +00:00
|
|
|
|
2012-10-05 00:04:13 +00:00
|
|
|
void **dtv = (void *)mem;
|
2012-10-05 15:51:50 +00:00
|
|
|
dtv[0] = (void *)tls_cnt;
|
always initialize thread pointer at program start
this is the first step in an overhaul aimed at greatly simplifying and
optimizing everything dealing with thread-local state.
previously, the thread pointer was initialized lazily on first access,
or at program startup if stack protector was in use, or at certain
random places where inconsistent state could be reached if it were not
initialized early. while believed to be fully correct, the logic was
fragile and non-obvious.
in the first phase of the thread pointer overhaul, support is retained
(and in some cases improved) for systems/situation where loading the
thread pointer fails, e.g. old kernels.
some notes on specific changes:
- the confusing use of libc.main_thread as an indicator that the
thread pointer is initialized is eliminated in favor of an explicit
has_thread_pointer predicate.
- sigaction no longer needs to ensure that the thread pointer is
initialized before installing a signal handler (this was needed to
prevent a situation where the signal handler caused the thread
pointer to be initialized and the subsequent sigreturn cleared it
again) but it still needs to ensure that implementation-internal
thread-related signals are not blocked.
- pthread tsd initialization for the main thread is deferred in a new
manner to minimize bloat in the static-linked __init_tp code.
- pthread_setcancelstate no longer needs special handling for the
situation before the thread pointer is initialized. it simply fails
on systems that cannot support a thread pointer, which are
non-conforming anyway.
- pthread_cleanup_push/pop now check for missing thread pointer and
nop themselves out in this case, so stdio no longer needs to avoid
the cancellable path when the thread pointer is not available.
a number of cases remain where certain interfaces may crash if the
system does not support a thread pointer. at this point, these should
be limited to pthread interfaces, and the number of such cases should
be fewer than before.
2014-03-24 20:57:11 +00:00
|
|
|
if (!tls_cnt) {
|
|
|
|
td = (void *)(dtv+1);
|
2015-03-11 12:48:12 +00:00
|
|
|
td->dtv = td->dtv_copy = dtv;
|
always initialize thread pointer at program start
this is the first step in an overhaul aimed at greatly simplifying and
optimizing everything dealing with thread-local state.
previously, the thread pointer was initialized lazily on first access,
or at program startup if stack protector was in use, or at certain
random places where inconsistent state could be reached if it were not
initialized early. while believed to be fully correct, the logic was
fragile and non-obvious.
in the first phase of the thread pointer overhaul, support is retained
(and in some cases improved) for systems/situation where loading the
thread pointer fails, e.g. old kernels.
some notes on specific changes:
- the confusing use of libc.main_thread as an indicator that the
thread pointer is initialized is eliminated in favor of an explicit
has_thread_pointer predicate.
- sigaction no longer needs to ensure that the thread pointer is
initialized before installing a signal handler (this was needed to
prevent a situation where the signal handler caused the thread
pointer to be initialized and the subsequent sigreturn cleared it
again) but it still needs to ensure that implementation-internal
thread-related signals are not blocked.
- pthread tsd initialization for the main thread is deferred in a new
manner to minimize bloat in the static-linked __init_tp code.
- pthread_setcancelstate no longer needs special handling for the
situation before the thread pointer is initialized. it simply fails
on systems that cannot support a thread pointer, which are
non-conforming anyway.
- pthread_cleanup_push/pop now check for missing thread pointer and
nop themselves out in this case, so stdio no longer needs to avoid
the cancellable path when the thread pointer is not available.
a number of cases remain where certain interfaces may crash if the
system does not support a thread pointer. at this point, these should
be limited to pthread interfaces, and the number of such cases should
be fewer than before.
2014-03-24 20:57:11 +00:00
|
|
|
return td;
|
|
|
|
}
|
2012-10-06 05:22:51 +00:00
|
|
|
|
2012-10-15 22:51:53 +00:00
|
|
|
#ifdef TLS_ABOVE_TP
|
|
|
|
mem += sizeof(void *) * (tls_cnt+1);
|
|
|
|
mem += -((uintptr_t)mem + sizeof(struct pthread)) & (tls_align-1);
|
|
|
|
td = (pthread_t)mem;
|
|
|
|
mem += sizeof(struct pthread);
|
|
|
|
|
|
|
|
for (p=head; p; p=p->next) {
|
|
|
|
if (!p->tls_id) continue;
|
|
|
|
dtv[p->tls_id] = mem + p->tls_offset;
|
|
|
|
memcpy(dtv[p->tls_id], p->tls_image, p->tls_len);
|
|
|
|
}
|
|
|
|
#else
|
2012-10-14 03:25:20 +00:00
|
|
|
mem += libc.tls_size - sizeof(struct pthread);
|
2012-10-06 05:22:51 +00:00
|
|
|
mem -= (uintptr_t)mem & (tls_align-1);
|
|
|
|
td = (pthread_t)mem;
|
|
|
|
|
|
|
|
for (p=head; p; p=p->next) {
|
2012-10-05 15:51:50 +00:00
|
|
|
if (!p->tls_id) continue;
|
2012-10-06 05:22:51 +00:00
|
|
|
dtv[p->tls_id] = mem - p->tls_offset;
|
|
|
|
memcpy(dtv[p->tls_id], p->tls_image, p->tls_len);
|
2012-10-05 00:04:13 +00:00
|
|
|
}
|
2012-10-15 22:51:53 +00:00
|
|
|
#endif
|
2015-03-11 12:48:12 +00:00
|
|
|
td->dtv = td->dtv_copy = dtv;
|
2012-10-06 05:22:51 +00:00
|
|
|
return td;
|
2012-10-05 00:04:13 +00:00
|
|
|
}
|
|
|
|
|
2014-06-19 06:59:44 +00:00
|
|
|
void *__tls_get_new(size_t *v)
|
2012-10-05 01:01:56 +00:00
|
|
|
{
|
|
|
|
pthread_t self = __pthread_self();
|
2012-10-05 15:51:50 +00:00
|
|
|
|
|
|
|
/* Block signals to make accessing new TLS async-signal-safe */
|
|
|
|
sigset_t set;
|
2014-06-19 06:59:44 +00:00
|
|
|
__block_all_sigs(&set);
|
2014-06-19 06:16:57 +00:00
|
|
|
if (v[0]<=(size_t)self->dtv[0]) {
|
2014-06-19 06:59:44 +00:00
|
|
|
__restore_sigs(&set);
|
2012-10-05 15:51:50 +00:00
|
|
|
return (char *)self->dtv[v[0]]+v[1];
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This is safe without any locks held because, if the caller
|
|
|
|
* is able to request the Nth entry of the DTV, the DSO list
|
|
|
|
* must be valid at least that far out and it was synchronized
|
|
|
|
* at program startup or by an already-completed call to dlopen. */
|
|
|
|
struct dso *p;
|
|
|
|
for (p=head; p->tls_id != v[0]; p=p->next);
|
|
|
|
|
|
|
|
/* Get new DTV space from new DSO if needed */
|
2013-06-03 20:35:59 +00:00
|
|
|
if (v[0] > (size_t)self->dtv[0]) {
|
2012-10-05 15:51:50 +00:00
|
|
|
void **newdtv = p->new_dtv +
|
|
|
|
(v[0]+1)*sizeof(void *)*a_fetch_add(&p->new_dtv_idx,1);
|
2013-06-03 20:35:59 +00:00
|
|
|
memcpy(newdtv, self->dtv,
|
2012-10-05 15:51:50 +00:00
|
|
|
((size_t)self->dtv[0]+1) * sizeof(void *));
|
|
|
|
newdtv[0] = (void *)v[0];
|
2015-03-11 12:48:12 +00:00
|
|
|
self->dtv = self->dtv_copy = newdtv;
|
2012-10-05 01:01:56 +00:00
|
|
|
}
|
2012-10-05 15:51:50 +00:00
|
|
|
|
2014-06-19 06:16:57 +00:00
|
|
|
/* Get new TLS memory from all new DSOs up to the requested one */
|
|
|
|
unsigned char *mem;
|
|
|
|
for (p=head; ; p=p->next) {
|
|
|
|
if (!p->tls_id || self->dtv[p->tls_id]) continue;
|
|
|
|
mem = p->new_tls + (p->tls_size + p->tls_align)
|
|
|
|
* a_fetch_add(&p->new_tls_idx,1);
|
|
|
|
mem += ((uintptr_t)p->tls_image - (uintptr_t)mem)
|
|
|
|
& (p->tls_align-1);
|
|
|
|
self->dtv[p->tls_id] = mem;
|
|
|
|
memcpy(mem, p->tls_image, p->tls_len);
|
|
|
|
if (p->tls_id == v[0]) break;
|
|
|
|
}
|
2014-06-19 06:59:44 +00:00
|
|
|
__restore_sigs(&set);
|
2012-10-05 15:51:50 +00:00
|
|
|
return mem + v[1];
|
2012-10-05 01:01:56 +00:00
|
|
|
}
|
|
|
|
|
2012-10-06 05:22:51 +00:00
|
|
|
static void update_tls_size()
|
|
|
|
{
|
2012-10-15 22:51:53 +00:00
|
|
|
libc.tls_size = ALIGN(
|
|
|
|
(1+tls_cnt) * sizeof(void *) +
|
|
|
|
tls_offset +
|
|
|
|
sizeof(struct pthread) +
|
|
|
|
tls_align * 2,
|
|
|
|
tls_align);
|
2012-10-06 05:22:51 +00:00
|
|
|
}
|
|
|
|
|
2012-01-23 05:57:38 +00:00
|
|
|
void *__dynlink(int argc, char **argv)
|
2011-06-18 23:48:42 +00:00
|
|
|
{
|
2012-08-25 21:24:46 +00:00
|
|
|
size_t aux[AUX_CNT] = {0};
|
2011-06-18 23:48:42 +00:00
|
|
|
size_t i;
|
|
|
|
Phdr *phdr;
|
2011-06-28 23:40:14 +00:00
|
|
|
Ehdr *ehdr;
|
2011-07-24 04:54:55 +00:00
|
|
|
static struct dso builtin_dsos[3];
|
2011-07-24 04:26:12 +00:00
|
|
|
struct dso *const app = builtin_dsos+0;
|
|
|
|
struct dso *const lib = builtin_dsos+1;
|
2011-07-24 04:54:55 +00:00
|
|
|
struct dso *const vdso = builtin_dsos+2;
|
2011-08-16 04:24:36 +00:00
|
|
|
char *env_preload=0;
|
2012-08-25 21:31:59 +00:00
|
|
|
size_t vdso_base;
|
2012-11-02 03:49:57 +00:00
|
|
|
size_t *auxv;
|
add support for init/fini array in main program, and greatly simplify
modern (4.7.x and later) gcc uses init/fini arrays, rather than the
legacy _init/_fini function pasting and crtbegin/crtend ctors/dtors
system, on most or all archs. some archs had already switched a long
time ago. without following this change, global ctors/dtors will cease
to work under musl when building with new gcc versions.
the most surprising part of this patch is that it actually reduces the
size of the init code, for both static and shared libc. this is
achieved by (1) unifying the handling main program and shared
libraries in the dynamic linker, and (2) eliminating the
glibc-inspired rube goldberg machine for passing around init and fini
function pointers. to clarify, some background:
the function signature for __libc_start_main was based on glibc, as
part of the original goal of being able to run some glibc-linked
binaries. it worked by having the crt1 code, which is linked into
every application, static or dynamic, obtain and pass pointers to the
init and fini functions, which __libc_start_main is then responsible
for using and recording for later use, as necessary. however, in
neither the static-linked nor dynamic-linked case do we actually need
crt1.o's help. with dynamic linking, all the pointers are available in
the _DYNAMIC block. with static linking, it's safe to simply access
the _init/_fini and __init_array_start, etc. symbols directly.
obviously changing the __libc_start_main function signature in an
incompatible way would break both old musl-linked programs and
glibc-linked programs, so let's not do that. instead, the function can
just ignore the information it doesn't need. new archs need not even
provide the useless args in their versions of crt1.o. existing archs
should continue to provide it as long as there is an interest in
having newly-linked applications be able to run on old versions of
musl; at some point in the future, this support can be removed.
2013-07-21 07:00:54 +00:00
|
|
|
char **envp = argv+argc+1;
|
always initialize thread pointer at program start
this is the first step in an overhaul aimed at greatly simplifying and
optimizing everything dealing with thread-local state.
previously, the thread pointer was initialized lazily on first access,
or at program startup if stack protector was in use, or at certain
random places where inconsistent state could be reached if it were not
initialized early. while believed to be fully correct, the logic was
fragile and non-obvious.
in the first phase of the thread pointer overhaul, support is retained
(and in some cases improved) for systems/situation where loading the
thread pointer fails, e.g. old kernels.
some notes on specific changes:
- the confusing use of libc.main_thread as an indicator that the
thread pointer is initialized is eliminated in favor of an explicit
has_thread_pointer predicate.
- sigaction no longer needs to ensure that the thread pointer is
initialized before installing a signal handler (this was needed to
prevent a situation where the signal handler caused the thread
pointer to be initialized and the subsequent sigreturn cleared it
again) but it still needs to ensure that implementation-internal
thread-related signals are not blocked.
- pthread tsd initialization for the main thread is deferred in a new
manner to minimize bloat in the static-linked __init_tp code.
- pthread_setcancelstate no longer needs special handling for the
situation before the thread pointer is initialized. it simply fails
on systems that cannot support a thread pointer, which are
non-conforming anyway.
- pthread_cleanup_push/pop now check for missing thread pointer and
nop themselves out in this case, so stdio no longer needs to avoid
the cancellable path when the thread pointer is not available.
a number of cases remain where certain interfaces may crash if the
system does not support a thread pointer. at this point, these should
be limited to pthread interfaces, and the number of such cases should
be fewer than before.
2014-03-24 20:57:11 +00:00
|
|
|
void *initial_tls;
|
2011-06-18 23:48:42 +00:00
|
|
|
|
|
|
|
/* Find aux vector just past environ[] */
|
2011-06-25 05:56:34 +00:00
|
|
|
for (i=argc+1; argv[i]; i++)
|
|
|
|
if (!memcmp(argv[i], "LD_LIBRARY_PATH=", 16))
|
|
|
|
env_path = argv[i]+16;
|
2011-08-16 04:24:36 +00:00
|
|
|
else if (!memcmp(argv[i], "LD_PRELOAD=", 11))
|
|
|
|
env_preload = argv[i]+11;
|
2011-06-18 23:48:42 +00:00
|
|
|
auxv = (void *)(argv+i+1);
|
|
|
|
|
|
|
|
decode_vec(auxv, aux, AUX_CNT);
|
|
|
|
|
2011-06-25 05:56:34 +00:00
|
|
|
/* Only trust user/env if kernel says we're not suid/sgid */
|
|
|
|
if ((aux[0]&0x7800)!=0x7800 || aux[AT_UID]!=aux[AT_EUID]
|
2011-08-16 11:46:42 +00:00
|
|
|
|| aux[AT_GID]!=aux[AT_EGID] || aux[AT_SECURE]) {
|
2011-06-25 05:56:34 +00:00
|
|
|
env_path = 0;
|
2011-08-16 04:24:36 +00:00
|
|
|
env_preload = 0;
|
2013-08-23 17:56:30 +00:00
|
|
|
libc.secure = 1;
|
2011-06-25 05:56:34 +00:00
|
|
|
}
|
2013-09-15 02:00:32 +00:00
|
|
|
libc.page_size = aux[AT_PAGESZ];
|
2014-11-19 05:34:29 +00:00
|
|
|
libc.auxv = auxv;
|
2011-06-25 05:56:34 +00:00
|
|
|
|
2012-05-27 20:01:44 +00:00
|
|
|
/* If the dynamic linker was invoked as a program itself, AT_BASE
|
|
|
|
* will not be set. In that case, we assume the base address is
|
|
|
|
* the start of the page containing the PHDRs; I don't know any
|
|
|
|
* better approach... */
|
|
|
|
if (!aux[AT_BASE]) {
|
|
|
|
aux[AT_BASE] = aux[AT_PHDR] & -PAGE_SIZE;
|
|
|
|
aux[AT_PHDR] = aux[AT_PHENT] = aux[AT_PHNUM] = 0;
|
|
|
|
}
|
|
|
|
|
2012-01-23 05:57:38 +00:00
|
|
|
/* The dynamic linker load address is passed by the kernel
|
|
|
|
* in the AUX vector, so this is easy. */
|
|
|
|
lib->base = (void *)aux[AT_BASE];
|
2012-05-27 20:01:44 +00:00
|
|
|
lib->name = lib->shortname = "libc.so";
|
2012-01-23 05:57:38 +00:00
|
|
|
lib->global = 1;
|
|
|
|
ehdr = (void *)lib->base;
|
2012-11-01 01:27:48 +00:00
|
|
|
lib->phnum = ehdr->e_phnum;
|
|
|
|
lib->phdr = (void *)(aux[AT_BASE]+ehdr->e_phoff);
|
2014-03-25 18:59:50 +00:00
|
|
|
lib->phentsize = ehdr->e_phentsize;
|
|
|
|
kernel_mapped_dso(lib);
|
2012-01-23 05:57:38 +00:00
|
|
|
decode_dyn(lib);
|
|
|
|
|
2012-05-27 20:01:44 +00:00
|
|
|
if (aux[AT_PHDR]) {
|
2012-07-13 05:31:02 +00:00
|
|
|
size_t interp_off = 0;
|
2012-10-05 00:04:13 +00:00
|
|
|
size_t tls_image = 0;
|
2012-05-27 20:01:44 +00:00
|
|
|
/* Find load address of the main program, via AT_PHDR vs PT_PHDR. */
|
2012-11-01 01:27:48 +00:00
|
|
|
app->phdr = phdr = (void *)aux[AT_PHDR];
|
|
|
|
app->phnum = aux[AT_PHNUM];
|
2014-03-25 18:59:50 +00:00
|
|
|
app->phentsize = aux[AT_PHENT];
|
2012-05-27 20:01:44 +00:00
|
|
|
for (i=aux[AT_PHNUM]; i; i--, phdr=(void *)((char *)phdr + aux[AT_PHENT])) {
|
|
|
|
if (phdr->p_type == PT_PHDR)
|
|
|
|
app->base = (void *)(aux[AT_PHDR] - phdr->p_vaddr);
|
2012-07-13 05:31:02 +00:00
|
|
|
else if (phdr->p_type == PT_INTERP)
|
|
|
|
interp_off = (size_t)phdr->p_vaddr;
|
2012-10-05 00:04:13 +00:00
|
|
|
else if (phdr->p_type == PT_TLS) {
|
|
|
|
tls_image = phdr->p_vaddr;
|
|
|
|
app->tls_len = phdr->p_filesz;
|
|
|
|
app->tls_size = phdr->p_memsz;
|
|
|
|
app->tls_align = phdr->p_align;
|
|
|
|
}
|
2012-05-27 20:01:44 +00:00
|
|
|
}
|
2012-10-05 00:04:13 +00:00
|
|
|
if (app->tls_size) app->tls_image = (char *)app->base + tls_image;
|
2012-07-13 05:31:02 +00:00
|
|
|
if (interp_off) lib->name = (char *)app->base + interp_off;
|
2013-08-23 18:14:47 +00:00
|
|
|
if ((aux[0] & (1UL<<AT_EXECFN))
|
|
|
|
&& strncmp((char *)aux[AT_EXECFN], "/proc/", 6))
|
|
|
|
app->name = (char *)aux[AT_EXECFN];
|
|
|
|
else
|
|
|
|
app->name = argv[0];
|
2014-03-25 18:59:50 +00:00
|
|
|
kernel_mapped_dso(app);
|
2012-05-27 20:01:44 +00:00
|
|
|
} else {
|
|
|
|
int fd;
|
|
|
|
char *ldname = argv[0];
|
2012-11-02 03:46:39 +00:00
|
|
|
size_t l = strlen(ldname);
|
2012-05-27 20:01:44 +00:00
|
|
|
if (l >= 3 && !strcmp(ldname+l-3, "ldd")) ldd_mode = 1;
|
|
|
|
*argv++ = (void *)-1;
|
2014-04-16 16:45:36 +00:00
|
|
|
while (argv[0] && argv[0][0]=='-' && argv[0][1]=='-') {
|
|
|
|
char *opt = argv[0]+2;
|
|
|
|
*argv++ = (void *)-1;
|
|
|
|
if (!*opt) {
|
|
|
|
break;
|
|
|
|
} else if (!memcmp(opt, "list", 5)) {
|
|
|
|
ldd_mode = 1;
|
|
|
|
} else if (!memcmp(opt, "library-path", 12)) {
|
|
|
|
if (opt[12]=='=') env_path = opt+13;
|
|
|
|
else if (opt[12]) *argv = 0;
|
|
|
|
else if (*argv) env_path = *argv++;
|
|
|
|
} else if (!memcmp(opt, "preload", 7)) {
|
|
|
|
if (opt[7]=='=') env_preload = opt+8;
|
|
|
|
else if (opt[7]) *argv = 0;
|
|
|
|
else if (*argv) env_preload = *argv++;
|
|
|
|
} else {
|
|
|
|
argv[0] = 0;
|
|
|
|
}
|
|
|
|
argv[-1] = (void *)-1;
|
|
|
|
}
|
2012-05-27 20:01:44 +00:00
|
|
|
if (!argv[0]) {
|
2013-12-01 22:27:25 +00:00
|
|
|
dprintf(2, "musl libc\n"
|
|
|
|
"Version %s\n"
|
|
|
|
"Dynamic Program Loader\n"
|
2014-04-16 16:45:36 +00:00
|
|
|
"Usage: %s [options] [--] pathname%s\n",
|
2013-12-01 22:27:25 +00:00
|
|
|
__libc_get_version(), ldname,
|
2012-05-27 20:01:44 +00:00
|
|
|
ldd_mode ? "" : " [args]");
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
fd = open(argv[0], O_RDONLY);
|
|
|
|
if (fd < 0) {
|
|
|
|
dprintf(2, "%s: cannot load %s: %s\n", ldname, argv[0], strerror(errno));
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
runtime = 1;
|
2012-10-05 00:04:13 +00:00
|
|
|
ehdr = (void *)map_library(fd, app);
|
2012-05-27 20:01:44 +00:00
|
|
|
if (!ehdr) {
|
|
|
|
dprintf(2, "%s: %s: Not a valid dynamic program\n", ldname, argv[0]);
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
runtime = 0;
|
|
|
|
close(fd);
|
2012-07-13 05:31:02 +00:00
|
|
|
lib->name = ldname;
|
2012-07-11 05:41:20 +00:00
|
|
|
app->name = argv[0];
|
2013-07-26 18:25:51 +00:00
|
|
|
aux[AT_ENTRY] = (size_t)app->base + ehdr->e_entry;
|
2013-07-26 18:41:12 +00:00
|
|
|
/* Find the name that would have been used for the dynamic
|
|
|
|
* linker had ldd not taken its place. */
|
|
|
|
if (ldd_mode) {
|
|
|
|
for (i=0; i<app->phnum; i++) {
|
|
|
|
if (app->phdr[i].p_type == PT_INTERP)
|
|
|
|
lib->name = (void *)(app->base
|
|
|
|
+ app->phdr[i].p_vaddr);
|
|
|
|
}
|
|
|
|
dprintf(1, "\t%s (%p)\n", lib->name, lib->base);
|
|
|
|
}
|
2012-01-23 07:02:59 +00:00
|
|
|
}
|
2012-10-05 00:04:13 +00:00
|
|
|
if (app->tls_size) {
|
2012-10-06 05:22:51 +00:00
|
|
|
app->tls_id = tls_cnt = 1;
|
2012-10-15 22:51:53 +00:00
|
|
|
#ifdef TLS_ABOVE_TP
|
|
|
|
app->tls_offset = 0;
|
|
|
|
tls_offset = app->tls_size
|
|
|
|
+ ( -((uintptr_t)app->tls_image + app->tls_size)
|
|
|
|
& (app->tls_align-1) );
|
|
|
|
#else
|
2012-10-14 23:56:50 +00:00
|
|
|
tls_offset = app->tls_offset = app->tls_size
|
|
|
|
+ ( -((uintptr_t)app->tls_image + app->tls_size)
|
|
|
|
& (app->tls_align-1) );
|
2012-10-15 22:51:53 +00:00
|
|
|
#endif
|
2012-10-06 05:22:51 +00:00
|
|
|
tls_align = MAXP2(tls_align, app->tls_align);
|
2012-10-05 00:04:13 +00:00
|
|
|
}
|
2012-01-23 05:57:38 +00:00
|
|
|
app->global = 1;
|
|
|
|
decode_dyn(app);
|
|
|
|
|
|
|
|
/* Attach to vdso, if provided by the kernel */
|
2012-08-25 21:31:59 +00:00
|
|
|
if (search_vec(auxv, &vdso_base, AT_SYSINFO_EHDR)) {
|
2011-07-24 04:54:55 +00:00
|
|
|
ehdr = (void *)vdso_base;
|
2012-11-01 01:27:48 +00:00
|
|
|
vdso->phdr = phdr = (void *)(vdso_base + ehdr->e_phoff);
|
|
|
|
vdso->phnum = ehdr->e_phnum;
|
2014-03-25 18:59:50 +00:00
|
|
|
vdso->phentsize = ehdr->e_phentsize;
|
2011-07-24 04:54:55 +00:00
|
|
|
for (i=ehdr->e_phnum; i; i--, phdr=(void *)((char *)phdr + ehdr->e_phentsize)) {
|
|
|
|
if (phdr->p_type == PT_DYNAMIC)
|
|
|
|
vdso->dynv = (void *)(vdso_base + phdr->p_offset);
|
|
|
|
if (phdr->p_type == PT_LOAD)
|
|
|
|
vdso->base = (void *)(vdso_base - phdr->p_vaddr + phdr->p_offset);
|
|
|
|
}
|
2012-11-26 01:56:31 +00:00
|
|
|
vdso->name = "";
|
|
|
|
vdso->shortname = "linux-gate.so.1";
|
2011-07-24 06:19:47 +00:00
|
|
|
vdso->global = 1;
|
2012-01-23 05:57:38 +00:00
|
|
|
decode_dyn(vdso);
|
2011-07-24 04:54:55 +00:00
|
|
|
vdso->prev = lib;
|
|
|
|
lib->next = vdso;
|
|
|
|
}
|
|
|
|
|
2012-01-23 05:57:38 +00:00
|
|
|
/* Initial dso chain consists only of the app. We temporarily
|
|
|
|
* append the dynamic linker/libc so we can relocate it, then
|
|
|
|
* restore the initial chain in preparation for loading third
|
|
|
|
* party libraries (preload/needed). */
|
|
|
|
head = tail = app;
|
2012-10-14 03:25:20 +00:00
|
|
|
ldso = lib;
|
2012-01-23 05:57:38 +00:00
|
|
|
app->next = lib;
|
|
|
|
reloc_all(lib);
|
|
|
|
app->next = 0;
|
2011-06-18 23:48:42 +00:00
|
|
|
|
2012-01-23 05:57:38 +00:00
|
|
|
/* PAST THIS POINT, ALL LIBC INTERFACES ARE FULLY USABLE. */
|
2011-06-18 23:48:42 +00:00
|
|
|
|
2012-01-23 05:57:38 +00:00
|
|
|
/* Donate unused parts of app and library mapping to malloc */
|
2014-03-25 18:59:50 +00:00
|
|
|
reclaim_gaps(app);
|
|
|
|
reclaim_gaps(lib);
|
2011-06-28 23:40:14 +00:00
|
|
|
|
2012-01-23 05:57:38 +00:00
|
|
|
/* Load preload/needed libraries, add their symbols to the global
|
2012-01-23 23:32:40 +00:00
|
|
|
* namespace, and perform all remaining relocations. The main
|
|
|
|
* program must be relocated LAST since it may contain copy
|
|
|
|
* relocations which depend on libraries' relocations. */
|
2011-08-16 04:24:36 +00:00
|
|
|
if (env_preload) load_preload(env_preload);
|
2012-01-23 05:57:38 +00:00
|
|
|
load_deps(app);
|
|
|
|
make_global(app);
|
2012-10-05 02:48:33 +00:00
|
|
|
|
2014-03-25 12:13:27 +00:00
|
|
|
#ifndef DYNAMIC_IS_RO
|
|
|
|
for (i=0; app->dynv[i]; i+=2)
|
|
|
|
if (app->dynv[i]==DT_DEBUG)
|
|
|
|
app->dynv[i+1] = (size_t)&debug;
|
|
|
|
#endif
|
|
|
|
|
2012-10-06 05:22:51 +00:00
|
|
|
reloc_all(app->next);
|
|
|
|
reloc_all(app);
|
|
|
|
|
|
|
|
update_tls_size();
|
always initialize thread pointer at program start
this is the first step in an overhaul aimed at greatly simplifying and
optimizing everything dealing with thread-local state.
previously, the thread pointer was initialized lazily on first access,
or at program startup if stack protector was in use, or at certain
random places where inconsistent state could be reached if it were not
initialized early. while believed to be fully correct, the logic was
fragile and non-obvious.
in the first phase of the thread pointer overhaul, support is retained
(and in some cases improved) for systems/situation where loading the
thread pointer fails, e.g. old kernels.
some notes on specific changes:
- the confusing use of libc.main_thread as an indicator that the
thread pointer is initialized is eliminated in favor of an explicit
has_thread_pointer predicate.
- sigaction no longer needs to ensure that the thread pointer is
initialized before installing a signal handler (this was needed to
prevent a situation where the signal handler caused the thread
pointer to be initialized and the subsequent sigreturn cleared it
again) but it still needs to ensure that implementation-internal
thread-related signals are not blocked.
- pthread tsd initialization for the main thread is deferred in a new
manner to minimize bloat in the static-linked __init_tp code.
- pthread_setcancelstate no longer needs special handling for the
situation before the thread pointer is initialized. it simply fails
on systems that cannot support a thread pointer, which are
non-conforming anyway.
- pthread_cleanup_push/pop now check for missing thread pointer and
nop themselves out in this case, so stdio no longer needs to avoid
the cancellable path when the thread pointer is not available.
a number of cases remain where certain interfaces may crash if the
system does not support a thread pointer. at this point, these should
be limited to pthread interfaces, and the number of such cases should
be fewer than before.
2014-03-24 20:57:11 +00:00
|
|
|
if (libc.tls_size > sizeof builtin_tls) {
|
|
|
|
initial_tls = calloc(libc.tls_size, 1);
|
|
|
|
if (!initial_tls) {
|
2012-10-05 02:48:33 +00:00
|
|
|
dprintf(2, "%s: Error getting %zu bytes thread-local storage: %m\n",
|
2012-10-14 03:25:20 +00:00
|
|
|
argv[0], libc.tls_size);
|
2012-10-05 02:48:33 +00:00
|
|
|
_exit(127);
|
|
|
|
}
|
always initialize thread pointer at program start
this is the first step in an overhaul aimed at greatly simplifying and
optimizing everything dealing with thread-local state.
previously, the thread pointer was initialized lazily on first access,
or at program startup if stack protector was in use, or at certain
random places where inconsistent state could be reached if it were not
initialized early. while believed to be fully correct, the logic was
fragile and non-obvious.
in the first phase of the thread pointer overhaul, support is retained
(and in some cases improved) for systems/situation where loading the
thread pointer fails, e.g. old kernels.
some notes on specific changes:
- the confusing use of libc.main_thread as an indicator that the
thread pointer is initialized is eliminated in favor of an explicit
has_thread_pointer predicate.
- sigaction no longer needs to ensure that the thread pointer is
initialized before installing a signal handler (this was needed to
prevent a situation where the signal handler caused the thread
pointer to be initialized and the subsequent sigreturn cleared it
again) but it still needs to ensure that implementation-internal
thread-related signals are not blocked.
- pthread tsd initialization for the main thread is deferred in a new
manner to minimize bloat in the static-linked __init_tp code.
- pthread_setcancelstate no longer needs special handling for the
situation before the thread pointer is initialized. it simply fails
on systems that cannot support a thread pointer, which are
non-conforming anyway.
- pthread_cleanup_push/pop now check for missing thread pointer and
nop themselves out in this case, so stdio no longer needs to avoid
the cancellable path when the thread pointer is not available.
a number of cases remain where certain interfaces may crash if the
system does not support a thread pointer. at this point, these should
be limited to pthread interfaces, and the number of such cases should
be fewer than before.
2014-03-24 20:57:11 +00:00
|
|
|
} else {
|
|
|
|
initial_tls = builtin_tls;
|
|
|
|
}
|
|
|
|
if (__init_tp(__copy_tls(initial_tls)) < 0 && tls_cnt) {
|
|
|
|
dprintf(2, "%s: Thread-local storage not supported by kernel.\n", argv[0]);
|
|
|
|
_exit(127);
|
2012-10-05 02:48:33 +00:00
|
|
|
}
|
2014-06-19 06:01:06 +00:00
|
|
|
static_tls_cnt = tls_cnt;
|
2012-10-05 02:48:33 +00:00
|
|
|
|
2012-08-18 20:00:23 +00:00
|
|
|
if (ldso_fail) _exit(127);
|
2012-05-27 20:01:44 +00:00
|
|
|
if (ldd_mode) _exit(0);
|
|
|
|
|
2012-01-23 05:57:38 +00:00
|
|
|
/* Switch to runtime mode: any further failures in the dynamic
|
|
|
|
* linker are a reportable failure rather than a fatal startup
|
|
|
|
* error. If the dynamic loader (dlopen) will not be used, free
|
|
|
|
* all memory used by the dynamic linker. */
|
2011-07-24 04:26:12 +00:00
|
|
|
runtime = 1;
|
2012-02-06 19:39:09 +00:00
|
|
|
|
2012-04-25 04:05:42 +00:00
|
|
|
debug.ver = 1;
|
|
|
|
debug.bp = _dl_debug_state;
|
|
|
|
debug.head = head;
|
|
|
|
debug.base = lib->base;
|
|
|
|
debug.state = 0;
|
|
|
|
_dl_debug_state();
|
|
|
|
|
add support for init/fini array in main program, and greatly simplify
modern (4.7.x and later) gcc uses init/fini arrays, rather than the
legacy _init/_fini function pasting and crtbegin/crtend ctors/dtors
system, on most or all archs. some archs had already switched a long
time ago. without following this change, global ctors/dtors will cease
to work under musl when building with new gcc versions.
the most surprising part of this patch is that it actually reduces the
size of the init code, for both static and shared libc. this is
achieved by (1) unifying the handling main program and shared
libraries in the dynamic linker, and (2) eliminating the
glibc-inspired rube goldberg machine for passing around init and fini
function pointers. to clarify, some background:
the function signature for __libc_start_main was based on glibc, as
part of the original goal of being able to run some glibc-linked
binaries. it worked by having the crt1 code, which is linked into
every application, static or dynamic, obtain and pass pointers to the
init and fini functions, which __libc_start_main is then responsible
for using and recording for later use, as necessary. however, in
neither the static-linked nor dynamic-linked case do we actually need
crt1.o's help. with dynamic linking, all the pointers are available in
the _DYNAMIC block. with static linking, it's safe to simply access
the _init/_fini and __init_array_start, etc. symbols directly.
obviously changing the __libc_start_main function signature in an
incompatible way would break both old musl-linked programs and
glibc-linked programs, so let's not do that. instead, the function can
just ignore the information it doesn't need. new archs need not even
provide the useless args in their versions of crt1.o. existing archs
should continue to provide it as long as there is an interest in
having newly-linked applications be able to run on old versions of
musl; at some point in the future, this support can be removed.
2013-07-21 07:00:54 +00:00
|
|
|
__init_libc(envp, argv[0]);
|
2012-11-30 22:56:23 +00:00
|
|
|
atexit(do_fini);
|
add support for init/fini array in main program, and greatly simplify
modern (4.7.x and later) gcc uses init/fini arrays, rather than the
legacy _init/_fini function pasting and crtbegin/crtend ctors/dtors
system, on most or all archs. some archs had already switched a long
time ago. without following this change, global ctors/dtors will cease
to work under musl when building with new gcc versions.
the most surprising part of this patch is that it actually reduces the
size of the init code, for both static and shared libc. this is
achieved by (1) unifying the handling main program and shared
libraries in the dynamic linker, and (2) eliminating the
glibc-inspired rube goldberg machine for passing around init and fini
function pointers. to clarify, some background:
the function signature for __libc_start_main was based on glibc, as
part of the original goal of being able to run some glibc-linked
binaries. it worked by having the crt1 code, which is linked into
every application, static or dynamic, obtain and pass pointers to the
init and fini functions, which __libc_start_main is then responsible
for using and recording for later use, as necessary. however, in
neither the static-linked nor dynamic-linked case do we actually need
crt1.o's help. with dynamic linking, all the pointers are available in
the _DYNAMIC block. with static linking, it's safe to simply access
the _init/_fini and __init_array_start, etc. symbols directly.
obviously changing the __libc_start_main function signature in an
incompatible way would break both old musl-linked programs and
glibc-linked programs, so let's not do that. instead, the function can
just ignore the information it doesn't need. new archs need not even
provide the useless args in their versions of crt1.o. existing archs
should continue to provide it as long as there is an interest in
having newly-linked applications be able to run on old versions of
musl; at some point in the future, this support can be removed.
2013-07-21 07:00:54 +00:00
|
|
|
errno = 0;
|
2012-11-30 22:56:23 +00:00
|
|
|
do_init_fini(tail);
|
add support for init/fini array in main program, and greatly simplify
modern (4.7.x and later) gcc uses init/fini arrays, rather than the
legacy _init/_fini function pasting and crtbegin/crtend ctors/dtors
system, on most or all archs. some archs had already switched a long
time ago. without following this change, global ctors/dtors will cease
to work under musl when building with new gcc versions.
the most surprising part of this patch is that it actually reduces the
size of the init code, for both static and shared libc. this is
achieved by (1) unifying the handling main program and shared
libraries in the dynamic linker, and (2) eliminating the
glibc-inspired rube goldberg machine for passing around init and fini
function pointers. to clarify, some background:
the function signature for __libc_start_main was based on glibc, as
part of the original goal of being able to run some glibc-linked
binaries. it worked by having the crt1 code, which is linked into
every application, static or dynamic, obtain and pass pointers to the
init and fini functions, which __libc_start_main is then responsible
for using and recording for later use, as necessary. however, in
neither the static-linked nor dynamic-linked case do we actually need
crt1.o's help. with dynamic linking, all the pointers are available in
the _DYNAMIC block. with static linking, it's safe to simply access
the _init/_fini and __init_array_start, etc. symbols directly.
obviously changing the __libc_start_main function signature in an
incompatible way would break both old musl-linked programs and
glibc-linked programs, so let's not do that. instead, the function can
just ignore the information it doesn't need. new archs need not even
provide the useless args in their versions of crt1.o. existing archs
should continue to provide it as long as there is an interest in
having newly-linked applications be able to run on old versions of
musl; at some point in the future, this support can be removed.
2013-07-21 07:00:54 +00:00
|
|
|
|
|
|
|
return (void *)aux[AT_ENTRY];
|
2012-11-30 22:56:23 +00:00
|
|
|
}
|
|
|
|
|
2011-06-26 23:23:28 +00:00
|
|
|
void *dlopen(const char *file, int mode)
|
|
|
|
{
|
2012-10-05 05:15:25 +00:00
|
|
|
struct dso *volatile p, *orig_tail, *next;
|
2012-10-06 05:22:51 +00:00
|
|
|
size_t orig_tls_cnt, orig_tls_offset, orig_tls_align;
|
2011-06-26 23:23:28 +00:00
|
|
|
size_t i;
|
2012-02-08 01:31:27 +00:00
|
|
|
int cs;
|
2013-07-24 06:38:05 +00:00
|
|
|
jmp_buf jb;
|
2011-06-26 23:23:28 +00:00
|
|
|
|
|
|
|
if (!file) return head;
|
|
|
|
|
2012-02-08 01:31:27 +00:00
|
|
|
pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, &cs);
|
2011-06-26 23:23:28 +00:00
|
|
|
pthread_rwlock_wrlock(&lock);
|
2012-10-05 15:51:50 +00:00
|
|
|
__inhibit_ptc();
|
2011-06-26 23:23:28 +00:00
|
|
|
|
2012-10-05 15:51:50 +00:00
|
|
|
p = 0;
|
|
|
|
orig_tls_cnt = tls_cnt;
|
2012-10-06 05:22:51 +00:00
|
|
|
orig_tls_offset = tls_offset;
|
|
|
|
orig_tls_align = tls_align;
|
2012-10-05 05:15:25 +00:00
|
|
|
orig_tail = tail;
|
2013-01-24 03:07:45 +00:00
|
|
|
noload = mode & RTLD_NOLOAD;
|
2012-10-05 05:15:25 +00:00
|
|
|
|
2013-07-24 06:38:05 +00:00
|
|
|
rtld_fail = &jb;
|
|
|
|
if (setjmp(*rtld_fail)) {
|
2011-06-26 23:23:28 +00:00
|
|
|
/* Clean up anything new that was (partially) loaded */
|
2012-10-05 15:51:50 +00:00
|
|
|
if (p && p->deps) for (i=0; p->deps[i]; i++)
|
2011-06-27 01:21:04 +00:00
|
|
|
if (p->deps[i]->global < 0)
|
|
|
|
p->deps[i]->global = 0;
|
2011-06-26 23:23:28 +00:00
|
|
|
for (p=orig_tail->next; p; p=next) {
|
|
|
|
next = p->next;
|
|
|
|
munmap(p->map, p->map_len);
|
2014-06-19 06:01:06 +00:00
|
|
|
while (p->td_index) {
|
|
|
|
void *tmp = p->td_index->next;
|
|
|
|
free(p->td_index);
|
|
|
|
p->td_index = tmp;
|
|
|
|
}
|
2011-06-26 23:23:28 +00:00
|
|
|
free(p->deps);
|
|
|
|
free(p);
|
|
|
|
}
|
2012-10-05 15:51:50 +00:00
|
|
|
tls_cnt = orig_tls_cnt;
|
2012-10-06 05:22:51 +00:00
|
|
|
tls_offset = orig_tls_offset;
|
|
|
|
tls_align = orig_tls_align;
|
2011-06-26 23:23:28 +00:00
|
|
|
tail = orig_tail;
|
|
|
|
tail->next = 0;
|
2012-02-08 01:31:27 +00:00
|
|
|
p = 0;
|
2012-04-23 16:03:31 +00:00
|
|
|
errflag = 1;
|
|
|
|
goto end;
|
2013-08-24 03:13:25 +00:00
|
|
|
} else p = load_library(file, head);
|
2012-03-23 04:28:20 +00:00
|
|
|
|
|
|
|
if (!p) {
|
2013-01-24 03:07:45 +00:00
|
|
|
snprintf(errbuf, sizeof errbuf, noload ?
|
|
|
|
"Library %s is not already loaded" :
|
|
|
|
"Error loading shared library %s: %m",
|
|
|
|
file);
|
2012-03-23 04:28:20 +00:00
|
|
|
errflag = 1;
|
2012-02-08 01:31:27 +00:00
|
|
|
goto end;
|
2011-06-26 23:23:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* First load handling */
|
|
|
|
if (!p->deps) {
|
|
|
|
load_deps(p);
|
2011-06-27 01:36:44 +00:00
|
|
|
if (p->deps) for (i=0; p->deps[i]; i++)
|
2011-06-27 01:21:04 +00:00
|
|
|
if (!p->deps[i]->global)
|
|
|
|
p->deps[i]->global = -1;
|
|
|
|
if (!p->global) p->global = -1;
|
2011-06-26 23:23:28 +00:00
|
|
|
reloc_all(p);
|
2011-06-27 01:36:44 +00:00
|
|
|
if (p->deps) for (i=0; p->deps[i]; i++)
|
2011-06-27 01:21:04 +00:00
|
|
|
if (p->deps[i]->global < 0)
|
|
|
|
p->deps[i]->global = 0;
|
|
|
|
if (p->global < 0) p->global = 0;
|
2011-06-26 23:23:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (mode & RTLD_GLOBAL) {
|
2011-06-27 01:36:44 +00:00
|
|
|
if (p->deps) for (i=0; p->deps[i]; i++)
|
2011-06-26 23:23:28 +00:00
|
|
|
p->deps[i]->global = 1;
|
|
|
|
p->global = 1;
|
|
|
|
}
|
|
|
|
|
2012-10-06 05:22:51 +00:00
|
|
|
update_tls_size();
|
2012-04-25 04:05:42 +00:00
|
|
|
_dl_debug_state();
|
2012-10-05 17:09:09 +00:00
|
|
|
orig_tail = tail;
|
2011-06-27 02:09:32 +00:00
|
|
|
end:
|
2012-10-05 15:51:50 +00:00
|
|
|
__release_ptc();
|
2012-11-01 01:27:48 +00:00
|
|
|
if (p) gencnt++;
|
2011-06-26 23:23:28 +00:00
|
|
|
pthread_rwlock_unlock(&lock);
|
2012-10-05 17:09:09 +00:00
|
|
|
if (p) do_init_fini(orig_tail);
|
2012-02-08 01:31:27 +00:00
|
|
|
pthread_setcancelstate(cs, 0);
|
2011-06-26 23:23:28 +00:00
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
2013-01-16 16:49:00 +00:00
|
|
|
static int invalid_dso_handle(void *h)
|
2013-01-10 19:05:40 +00:00
|
|
|
{
|
|
|
|
struct dso *p;
|
|
|
|
for (p=head; p; p=p->next) if (h==p) return 0;
|
|
|
|
snprintf(errbuf, sizeof errbuf, "Invalid library handle %p", (void *)h);
|
|
|
|
errflag = 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2014-06-19 06:59:44 +00:00
|
|
|
void *__tls_get_addr(size_t *);
|
|
|
|
|
2011-08-16 04:42:13 +00:00
|
|
|
static void *do_dlsym(struct dso *p, const char *s, void *ra)
|
2011-06-26 23:23:28 +00:00
|
|
|
{
|
|
|
|
size_t i;
|
2012-08-25 21:13:28 +00:00
|
|
|
uint32_t h = 0, gh = 0;
|
2011-06-26 23:23:28 +00:00
|
|
|
Sym *sym;
|
2012-10-05 02:48:33 +00:00
|
|
|
if (p == head || p == RTLD_DEFAULT || p == RTLD_NEXT) {
|
2012-10-20 01:41:30 +00:00
|
|
|
if (p == RTLD_DEFAULT) {
|
|
|
|
p = head;
|
|
|
|
} else if (p == RTLD_NEXT) {
|
2012-10-05 02:48:33 +00:00
|
|
|
for (p=head; p && (unsigned char *)ra-p->map>p->map_len; p=p->next);
|
|
|
|
if (!p) p=head;
|
2012-10-20 01:41:30 +00:00
|
|
|
p = p->next;
|
2012-10-05 02:48:33 +00:00
|
|
|
}
|
2012-10-20 01:41:30 +00:00
|
|
|
struct symdef def = find_sym(p, s, 0);
|
2012-10-05 02:48:33 +00:00
|
|
|
if (!def.sym) goto failed;
|
2012-10-20 01:57:56 +00:00
|
|
|
if ((def.sym->st_info&0xf) == STT_TLS)
|
|
|
|
return __tls_get_addr((size_t []){def.dso->tls_id, def.sym->st_value});
|
2012-10-05 02:48:33 +00:00
|
|
|
return def.dso->base + def.sym->st_value;
|
2012-03-23 04:28:20 +00:00
|
|
|
}
|
2013-01-24 01:21:36 +00:00
|
|
|
if (p != RTLD_DEFAULT && p != RTLD_NEXT && invalid_dso_handle(p))
|
|
|
|
return 0;
|
2012-08-25 21:13:28 +00:00
|
|
|
if (p->ghashtab) {
|
|
|
|
gh = gnu_hash(s);
|
|
|
|
sym = gnu_lookup(s, gh, p);
|
|
|
|
} else {
|
|
|
|
h = sysv_hash(s);
|
|
|
|
sym = sysv_lookup(s, h, p);
|
|
|
|
}
|
2012-10-20 01:57:56 +00:00
|
|
|
if (sym && (sym->st_info&0xf) == STT_TLS)
|
|
|
|
return __tls_get_addr((size_t []){p->tls_id, sym->st_value});
|
2011-06-26 23:23:28 +00:00
|
|
|
if (sym && sym->st_value && (1<<(sym->st_info&0xf) & OK_TYPES))
|
|
|
|
return p->base + sym->st_value;
|
|
|
|
if (p->deps) for (i=0; p->deps[i]; i++) {
|
2012-08-25 21:13:28 +00:00
|
|
|
if (p->deps[i]->ghashtab) {
|
|
|
|
if (!gh) gh = gnu_hash(s);
|
2012-08-25 21:40:27 +00:00
|
|
|
sym = gnu_lookup(s, gh, p->deps[i]);
|
2012-08-25 21:13:28 +00:00
|
|
|
} else {
|
|
|
|
if (!h) h = sysv_hash(s);
|
|
|
|
sym = sysv_lookup(s, h, p->deps[i]);
|
|
|
|
}
|
2012-10-20 01:57:56 +00:00
|
|
|
if (sym && (sym->st_info&0xf) == STT_TLS)
|
|
|
|
return __tls_get_addr((size_t []){p->deps[i]->tls_id, sym->st_value});
|
2011-06-26 23:23:28 +00:00
|
|
|
if (sym && sym->st_value && (1<<(sym->st_info&0xf) & OK_TYPES))
|
|
|
|
return p->deps[i]->base + sym->st_value;
|
|
|
|
}
|
2012-05-05 00:18:18 +00:00
|
|
|
failed:
|
2012-03-23 04:28:20 +00:00
|
|
|
errflag = 1;
|
2012-04-23 16:03:31 +00:00
|
|
|
snprintf(errbuf, sizeof errbuf, "Symbol not found: %s", s);
|
2011-06-26 23:23:28 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-01-07 03:03:38 +00:00
|
|
|
int __dladdr(const void *addr, Dl_info *info)
|
2012-08-27 01:09:26 +00:00
|
|
|
{
|
|
|
|
struct dso *p;
|
|
|
|
Sym *sym;
|
|
|
|
uint32_t nsym;
|
|
|
|
char *strings;
|
|
|
|
size_t i;
|
|
|
|
void *best = 0;
|
|
|
|
char *bestname;
|
|
|
|
|
|
|
|
pthread_rwlock_rdlock(&lock);
|
|
|
|
for (p=head; p && (unsigned char *)addr-p->map>p->map_len; p=p->next);
|
|
|
|
pthread_rwlock_unlock(&lock);
|
|
|
|
|
|
|
|
if (!p) return 0;
|
|
|
|
|
|
|
|
sym = p->syms;
|
|
|
|
strings = p->strings;
|
|
|
|
if (p->hashtab) {
|
|
|
|
nsym = p->hashtab[1];
|
|
|
|
} else {
|
|
|
|
uint32_t *buckets;
|
|
|
|
uint32_t *hashval;
|
|
|
|
buckets = p->ghashtab + 4 + (p->ghashtab[2]*sizeof(size_t)/4);
|
|
|
|
sym += p->ghashtab[1];
|
2013-10-04 04:29:58 +00:00
|
|
|
for (i = nsym = 0; i < p->ghashtab[0]; i++) {
|
2012-08-27 01:09:26 +00:00
|
|
|
if (buckets[i] > nsym)
|
|
|
|
nsym = buckets[i];
|
|
|
|
}
|
|
|
|
if (nsym) {
|
|
|
|
nsym -= p->ghashtab[1];
|
|
|
|
hashval = buckets + p->ghashtab[0] + nsym;
|
|
|
|
do nsym++;
|
|
|
|
while (!(*hashval++ & 1));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for (; nsym; nsym--, sym++) {
|
2013-01-16 16:47:35 +00:00
|
|
|
if (sym->st_value
|
2012-08-27 01:09:26 +00:00
|
|
|
&& (1<<(sym->st_info&0xf) & OK_TYPES)
|
|
|
|
&& (1<<(sym->st_info>>4) & OK_BINDS)) {
|
|
|
|
void *symaddr = p->base + sym->st_value;
|
|
|
|
if (symaddr > addr || symaddr < best)
|
|
|
|
continue;
|
|
|
|
best = symaddr;
|
|
|
|
bestname = strings + sym->st_name;
|
|
|
|
if (addr == symaddr)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!best) return 0;
|
|
|
|
|
|
|
|
info->dli_fname = p->name;
|
|
|
|
info->dli_fbase = p->base;
|
|
|
|
info->dli_sname = bestname;
|
|
|
|
info->dli_saddr = best;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2012-09-07 02:44:55 +00:00
|
|
|
void *__dlsym(void *restrict p, const char *restrict s, void *restrict ra)
|
2011-06-26 23:23:28 +00:00
|
|
|
{
|
|
|
|
void *res;
|
|
|
|
pthread_rwlock_rdlock(&lock);
|
2011-08-16 04:42:13 +00:00
|
|
|
res = do_dlsym(p, s, ra);
|
2011-06-26 23:23:28 +00:00
|
|
|
pthread_rwlock_unlock(&lock);
|
|
|
|
return res;
|
|
|
|
}
|
2012-11-01 01:27:48 +00:00
|
|
|
|
|
|
|
int dl_iterate_phdr(int(*callback)(struct dl_phdr_info *info, size_t size, void *data), void *data)
|
|
|
|
{
|
|
|
|
struct dso *current;
|
|
|
|
struct dl_phdr_info info;
|
|
|
|
int ret = 0;
|
|
|
|
for(current = head; current;) {
|
|
|
|
info.dlpi_addr = (uintptr_t)current->base;
|
|
|
|
info.dlpi_name = current->name;
|
|
|
|
info.dlpi_phdr = current->phdr;
|
|
|
|
info.dlpi_phnum = current->phnum;
|
|
|
|
info.dlpi_adds = gencnt;
|
|
|
|
info.dlpi_subs = 0;
|
|
|
|
info.dlpi_tls_modid = current->tls_id;
|
|
|
|
info.dlpi_tls_data = current->tls_image;
|
|
|
|
|
|
|
|
ret = (callback)(&info, sizeof (info), data);
|
|
|
|
|
|
|
|
if (ret != 0) break;
|
|
|
|
|
|
|
|
pthread_rwlock_rdlock(&lock);
|
|
|
|
current = current->next;
|
|
|
|
pthread_rwlock_unlock(&lock);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
2012-02-03 08:16:07 +00:00
|
|
|
#else
|
2013-01-16 16:49:00 +00:00
|
|
|
static int invalid_dso_handle(void *h)
|
2013-01-10 19:05:40 +00:00
|
|
|
{
|
|
|
|
snprintf(errbuf, sizeof errbuf, "Invalid library handle %p", (void *)h);
|
|
|
|
errflag = 1;
|
|
|
|
return 1;
|
|
|
|
}
|
2012-02-03 08:16:07 +00:00
|
|
|
void *dlopen(const char *file, int mode)
|
|
|
|
{
|
2014-08-07 15:49:29 +00:00
|
|
|
strcpy(errbuf, "Dynamic loading not supported");
|
|
|
|
errflag = 1;
|
2012-02-03 08:16:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2012-09-07 02:44:55 +00:00
|
|
|
void *__dlsym(void *restrict p, const char *restrict s, void *restrict ra)
|
2012-02-03 08:16:07 +00:00
|
|
|
{
|
2014-08-08 04:53:27 +00:00
|
|
|
errflag = 1;
|
|
|
|
snprintf(errbuf, sizeof errbuf, "Symbol not found: %s", s);
|
2012-02-03 08:16:07 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2014-01-07 03:03:38 +00:00
|
|
|
int __dladdr (const void *addr, Dl_info *info)
|
2012-08-27 01:09:26 +00:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
2012-02-03 08:16:07 +00:00
|
|
|
#endif
|
2011-06-26 23:23:28 +00:00
|
|
|
|
2013-06-29 16:46:46 +00:00
|
|
|
int __dlinfo(void *dso, int req, void *res)
|
|
|
|
{
|
|
|
|
if (invalid_dso_handle(dso)) return -1;
|
|
|
|
if (req != RTLD_DI_LINKMAP) {
|
|
|
|
snprintf(errbuf, sizeof errbuf, "Unsupported request %d", req);
|
|
|
|
errflag = 1;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
*(struct link_map **)res = dso;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-06-26 23:23:28 +00:00
|
|
|
char *dlerror()
|
|
|
|
{
|
2012-03-23 04:28:20 +00:00
|
|
|
if (!errflag) return 0;
|
|
|
|
errflag = 0;
|
2012-04-23 16:03:31 +00:00
|
|
|
return errbuf;
|
2011-06-26 23:23:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int dlclose(void *p)
|
|
|
|
{
|
2013-01-10 19:05:40 +00:00
|
|
|
return invalid_dso_handle(p);
|
2011-06-26 23:23:28 +00:00
|
|
|
}
|