2.5-18.1
[glibc.git] / elf / dl-sysdep.c
blob68e08f480a39c22ac0c5f79d03e26778706c8ed0
1 /* Operating system support for run-time dynamic linker. Generic Unix version.
2 Copyright (C) 1995-1998, 2000-2005, 2007 Free Software Foundation, Inc.
3 This file is part of the GNU C Library.
5 The GNU C Library is free software; you can redistribute it and/or
6 modify it under the terms of the GNU Lesser General Public
7 License as published by the Free Software Foundation; either
8 version 2.1 of the License, or (at your option) any later version.
10 The GNU C Library is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Lesser General Public License for more details.
15 You should have received a copy of the GNU Lesser General Public
16 License along with the GNU C Library; if not, write to the Free
17 Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
18 02111-1307 USA. */
20 #include <assert.h>
21 #include <elf.h>
22 #include <errno.h>
23 #include <fcntl.h>
24 #include <libintl.h>
25 #include <stdlib.h>
26 #include <string.h>
27 #include <unistd.h>
28 #include <sys/types.h>
29 #include <sys/stat.h>
30 #include <sys/mman.h>
31 #include <ldsodefs.h>
32 #include <stdio-common/_itoa.h>
33 #include <fpu_control.h>
35 #include <entry.h>
36 #include <dl-machine.h>
37 #include <dl-procinfo.h>
38 #include <dl-osinfo.h>
39 #include <hp-timing.h>
40 #include <tls.h>
42 #ifdef _DL_FIRST_PLATFORM
43 # define _DL_FIRST_EXTRA (_DL_FIRST_PLATFORM + _DL_PLATFORMS_COUNT)
44 #else
45 # define _DL_FIRST_EXTRA _DL_HWCAP_COUNT
46 #endif
48 extern char **_environ attribute_hidden;
49 extern void _end attribute_hidden;
51 /* Protect SUID program against misuse of file descriptors. */
52 extern void __libc_check_standard_fds (void);
54 #ifdef NEED_DL_BASE_ADDR
55 ElfW(Addr) _dl_base_addr;
56 #endif
57 int __libc_enable_secure attribute_relro = 0;
58 INTVARDEF(__libc_enable_secure)
59 int __libc_multiple_libcs = 0; /* Defining this here avoids the inclusion
60 of init-first. */
61 /* This variable contains the lowest stack address ever used. */
62 void *__libc_stack_end attribute_relro = NULL;
63 rtld_hidden_data_def(__libc_stack_end)
64 static ElfW(auxv_t) *_dl_auxv attribute_relro;
66 #ifndef DL_FIND_ARG_COMPONENTS
67 # define DL_FIND_ARG_COMPONENTS(cookie, argc, argv, envp, auxp) \
68 do { \
69 void **_tmp; \
70 (argc) = *(long int *) cookie; \
71 (argv) = (char **) ((long int *) cookie + 1); \
72 (envp) = (argv) + (argc) + 1; \
73 for (_tmp = (void **) (envp); *_tmp; ++_tmp) \
74 continue; \
75 (auxp) = (void *) ++_tmp; \
76 } while (0)
77 #endif
79 #ifndef DL_STACK_END
80 # define DL_STACK_END(cookie) ((void *) (cookie))
81 #endif
83 ElfW(Addr)
84 _dl_sysdep_start (void **start_argptr,
85 void (*dl_main) (const ElfW(Phdr) *phdr, ElfW(Word) phnum,
86 ElfW(Addr) *user_entry))
88 const ElfW(Phdr) *phdr = NULL;
89 ElfW(Word) phnum = 0;
90 ElfW(Addr) user_entry;
91 ElfW(auxv_t) *av;
92 #ifdef HAVE_AUX_SECURE
93 # define set_seen(tag) (tag) /* Evaluate for the side effects. */
94 # define set_seen_secure() ((void) 0)
95 #else
96 uid_t uid = 0;
97 gid_t gid = 0;
98 unsigned int seen = 0;
99 # define set_seen_secure() (seen = -1)
100 # ifdef HAVE_AUX_XID
101 # define set_seen(tag) (tag) /* Evaluate for the side effects. */
102 # else
103 # define M(type) (1 << (type))
104 # define set_seen(tag) seen |= M ((tag)->a_type)
105 # endif
106 #endif
107 #ifdef NEED_DL_SYSINFO
108 uintptr_t new_sysinfo = 0;
109 #endif
111 __libc_stack_end = DL_STACK_END (start_argptr);
112 DL_FIND_ARG_COMPONENTS (start_argptr, _dl_argc, INTUSE(_dl_argv), _environ,
113 _dl_auxv);
115 user_entry = (ElfW(Addr)) ENTRY_POINT;
116 GLRO(dl_platform) = NULL; /* Default to nothing known about the platform. */
118 for (av = _dl_auxv; av->a_type != AT_NULL; set_seen (av++))
119 switch (av->a_type)
121 case AT_PHDR:
122 phdr = (void *) av->a_un.a_val;
123 break;
124 case AT_PHNUM:
125 phnum = av->a_un.a_val;
126 break;
127 case AT_PAGESZ:
128 GLRO(dl_pagesize) = av->a_un.a_val;
129 break;
130 case AT_ENTRY:
131 user_entry = av->a_un.a_val;
132 break;
133 #ifdef NEED_DL_BASE_ADDR
134 case AT_BASE:
135 _dl_base_addr = av->a_un.a_val;
136 break;
137 #endif
138 #ifndef HAVE_AUX_SECURE
139 case AT_UID:
140 case AT_EUID:
141 uid ^= av->a_un.a_val;
142 break;
143 case AT_GID:
144 case AT_EGID:
145 gid ^= av->a_un.a_val;
146 break;
147 #endif
148 case AT_SECURE:
149 #ifndef HAVE_AUX_SECURE
150 seen = -1;
151 #endif
152 INTUSE(__libc_enable_secure) = av->a_un.a_val;
153 break;
154 case AT_PLATFORM:
155 GLRO(dl_platform) = (void *) av->a_un.a_val;
156 break;
157 case AT_HWCAP:
158 GLRO(dl_hwcap) = (unsigned long int) av->a_un.a_val;
159 break;
160 case AT_CLKTCK:
161 GLRO(dl_clktck) = av->a_un.a_val;
162 break;
163 case AT_FPUCW:
164 GLRO(dl_fpu_control) = av->a_un.a_val;
165 break;
166 #ifdef NEED_DL_SYSINFO
167 case AT_SYSINFO:
168 new_sysinfo = av->a_un.a_val;
169 break;
170 #endif
171 #if defined NEED_DL_SYSINFO || defined NEED_DL_SYSINFO_DSO
172 case AT_SYSINFO_EHDR:
173 GLRO(dl_sysinfo_dso) = (void *) av->a_un.a_val;
174 break;
175 #endif
176 #ifdef DL_PLATFORM_AUXV
177 DL_PLATFORM_AUXV
178 #endif
181 #ifndef HAVE_AUX_SECURE
182 if (seen != -1)
184 /* Fill in the values we have not gotten from the kernel through the
185 auxiliary vector. */
186 # ifndef HAVE_AUX_XID
187 # define SEE(UID, var, uid) \
188 if ((seen & M (AT_##UID)) == 0) var ^= __get##uid ()
189 SEE (UID, uid, uid);
190 SEE (EUID, uid, euid);
191 SEE (GID, gid, gid);
192 SEE (EGID, gid, egid);
193 # endif
195 /* If one of the two pairs of IDs does not match this is a setuid
196 or setgid run. */
197 INTUSE(__libc_enable_secure) = uid | gid;
199 #endif
201 #ifndef HAVE_AUX_PAGESIZE
202 if (GLRO(dl_pagesize) == 0)
203 GLRO(dl_pagesize) = __getpagesize ();
204 #endif
206 #if defined NEED_DL_SYSINFO
207 /* Only set the sysinfo value if we also have the vsyscall DSO. */
208 if (GLRO(dl_sysinfo_dso) != 0 && new_sysinfo)
209 GLRO(dl_sysinfo) = new_sysinfo;
210 #endif
212 #ifdef DL_SYSDEP_INIT
213 DL_SYSDEP_INIT;
214 #endif
216 #ifdef DL_PLATFORM_INIT
217 DL_PLATFORM_INIT;
218 #endif
220 /* Determine the length of the platform name. */
221 if (GLRO(dl_platform) != NULL)
222 GLRO(dl_platformlen) = strlen (GLRO(dl_platform));
224 if (__sbrk (0) == &_end)
225 /* The dynamic linker was run as a program, and so the initial break
226 starts just after our bss, at &_end. The malloc in dl-minimal.c
227 will consume the rest of this page, so tell the kernel to move the
228 break up that far. When the user program examines its break, it
229 will see this new value and not clobber our data. */
230 __sbrk (GLRO(dl_pagesize)
231 - ((&_end - (void *) 0) & (GLRO(dl_pagesize) - 1)));
233 /* If this is a SUID program we make sure that FDs 0, 1, and 2 are
234 allocated. If necessary we are doing it ourself. If it is not
235 possible we stop the program. */
236 if (__builtin_expect (INTUSE(__libc_enable_secure), 0))
237 __libc_check_standard_fds ();
239 (*dl_main) (phdr, phnum, &user_entry);
240 return user_entry;
243 void
244 internal_function
245 _dl_sysdep_start_cleanup (void)
249 void
250 internal_function
251 _dl_show_auxv (void)
253 char buf[64];
254 ElfW(auxv_t) *av;
256 /* Terminate string. */
257 buf[63] = '\0';
259 /* The following code assumes that the AT_* values are encoded
260 starting from 0 with AT_NULL, 1 for AT_IGNORE, and all other values
261 close by (otherwise the array will be too large). In case we have
262 to support a platform where these requirements are not fulfilled
263 some alternative implementation has to be used. */
264 for (av = _dl_auxv; av->a_type != AT_NULL; ++av)
266 static const struct
268 const char label[20];
269 enum { unknown = 0, dec, hex, str, ignore } form;
270 } auxvars[] =
272 [AT_EXECFD - 2] = { "AT_EXECFD: ", dec },
273 [AT_PHDR - 2] = { "AT_PHDR: 0x", hex },
274 [AT_PHENT - 2] = { "AT_PHENT: ", dec },
275 [AT_PHNUM - 2] = { "AT_PHNUM: ", dec },
276 [AT_PAGESZ - 2] = { "AT_PAGESZ: ", dec },
277 [AT_BASE - 2] = { "AT_BASE: 0x", hex },
278 [AT_FLAGS - 2] = { "AT_FLAGS: 0x", hex },
279 [AT_ENTRY - 2] = { "AT_ENTRY: 0x", hex },
280 [AT_NOTELF - 2] = { "AT_NOTELF: ", hex },
281 [AT_UID - 2] = { "AT_UID: ", dec },
282 [AT_EUID - 2] = { "AT_EUID: ", dec },
283 [AT_GID - 2] = { "AT_GID: ", dec },
284 [AT_EGID - 2] = { "AT_EGID: ", dec },
285 [AT_PLATFORM - 2] = { "AT_PLATFORM: ", str },
286 [AT_HWCAP - 2] = { "AT_HWCAP: ", hex },
287 [AT_CLKTCK - 2] = { "AT_CLKTCK: ", dec },
288 [AT_FPUCW - 2] = { "AT_FPUCW: ", hex },
289 [AT_DCACHEBSIZE - 2] = { "AT_DCACHEBSIZE: 0x", hex },
290 [AT_ICACHEBSIZE - 2] = { "AT_ICACHEBSIZE: 0x", hex },
291 [AT_UCACHEBSIZE - 2] = { "AT_UCACHEBSIZE: 0x", hex },
292 [AT_IGNOREPPC - 2] = { "AT_IGNOREPPC", ignore },
293 [AT_SECURE - 2] = { "AT_SECURE: ", dec },
294 [AT_SYSINFO - 2] = { "AT_SYSINFO: 0x", hex },
295 [AT_SYSINFO_EHDR - 2] = { "AT_SYSINFO_EHDR: 0x", hex },
297 unsigned int idx = (unsigned int) (av->a_type - 2);
299 if ((unsigned int) av->a_type < 2u || auxvars[idx].form == ignore)
300 continue;
302 assert (AT_NULL == 0);
303 assert (AT_IGNORE == 1);
305 if (av->a_type == AT_HWCAP)
307 /* This is handled special. */
308 if (_dl_procinfo (av->a_un.a_val) == 0)
309 continue;
312 if (idx < sizeof (auxvars) / sizeof (auxvars[0])
313 && auxvars[idx].form != unknown)
315 const char *val = (char *) av->a_un.a_val;
317 if (__builtin_expect (auxvars[idx].form, dec) == dec)
318 val = _itoa ((unsigned long int) av->a_un.a_val,
319 buf + sizeof buf - 1, 10, 0);
320 else if (__builtin_expect (auxvars[idx].form, hex) == hex)
321 val = _itoa ((unsigned long int) av->a_un.a_val,
322 buf + sizeof buf - 1, 16, 0);
324 _dl_printf ("%s%s\n", auxvars[idx].label, val);
326 continue;
329 /* Unknown value: print a generic line. */
330 char buf2[17];
331 buf[sizeof (buf2) - 1] = '\0';
332 const char *val2 = _itoa ((unsigned long int) av->a_un.a_val,
333 buf2 + sizeof buf2 - 1, 16, 0);
334 const char *val = _itoa ((unsigned long int) av->a_type,
335 buf + sizeof buf - 1, 16, 0);
336 _dl_printf ("AT_??? (0x%s): 0x%s\n", val, val2);
341 /* Return an array of useful/necessary hardware capability names. */
342 const struct r_strlenpair *
343 internal_function
344 _dl_important_hwcaps (const char *platform, size_t platform_len, size_t *sz,
345 size_t *max_capstrlen)
347 /* Determine how many important bits are set. */
348 uint64_t masked = GLRO(dl_hwcap) & GLRO(dl_hwcap_mask);
349 size_t cnt = platform != NULL;
350 size_t n, m;
351 size_t total;
352 struct r_strlenpair *temp;
353 struct r_strlenpair *result;
354 struct r_strlenpair *rp;
355 char *cp;
357 /* Count the number of bits set in the masked value. */
358 for (n = 0; (~((1ULL << n) - 1) & masked) != 0; ++n)
359 if ((masked & (1ULL << n)) != 0)
360 ++cnt;
362 #if (defined NEED_DL_SYSINFO || defined NEED_DL_SYSINFO_DSO) && defined SHARED
363 /* The system-supplied DSO can contain a note of type 2, vendor "GNU".
364 This gives us a list of names to treat as fake hwcap bits. */
366 const char *dsocaps = NULL;
367 size_t dsocapslen = 0;
368 if (GLRO(dl_sysinfo_map) != NULL)
370 const ElfW(Phdr) *const phdr = GLRO(dl_sysinfo_map)->l_phdr;
371 const ElfW(Word) phnum = GLRO(dl_sysinfo_map)->l_phnum;
372 for (uint_fast16_t i = 0; i < phnum; ++i)
373 if (phdr[i].p_type == PT_NOTE)
375 const ElfW(Addr) start = (phdr[i].p_vaddr
376 + GLRO(dl_sysinfo_map)->l_addr);
377 const struct
379 ElfW(Word) vendorlen;
380 ElfW(Word) datalen;
381 ElfW(Word) type;
382 } *note = (const void *) start;
383 while ((ElfW(Addr)) (note + 1) - start < phdr[i].p_memsz)
385 #define ROUND(len) (((len) + sizeof (ElfW(Word)) - 1) & -sizeof (ElfW(Word)))
386 if (note->type == 2
387 && note->vendorlen == sizeof "GNU"
388 && !memcmp ((note + 1), "GNU", sizeof "GNU")
389 && note->datalen > 2 * sizeof (ElfW(Word)) + 2)
391 const ElfW(Word) *p = ((const void *) (note + 1)
392 + ROUND (sizeof "GNU"));
393 cnt += *p++;
394 ++p; /* Skip mask word. */
395 dsocaps = (const char *) p;
396 dsocapslen = note->datalen - sizeof *p * 2;
397 break;
399 note = ((const void *) (note + 1)
400 + ROUND (note->vendorlen) + ROUND (note->datalen));
402 if (dsocaps != NULL)
403 break;
406 #endif
408 #ifdef USE_TLS
409 /* For TLS enabled builds always add 'tls'. */
410 ++cnt;
411 #else
412 if (cnt == 0)
414 /* If we no have platform name and no important capability we only
415 have the base directory to search. */
416 result = (struct r_strlenpair *) malloc (sizeof (*result));
417 if (result == NULL)
418 goto no_memory;
420 result[0].str = (char *) result; /* Does not really matter. */
421 result[0].len = 0;
423 *sz = 1;
424 return result;
426 #endif
428 /* Create temporary data structure to generate result table. */
429 temp = (struct r_strlenpair *) alloca (cnt * sizeof (*temp));
430 m = 0;
431 #if defined NEED_DL_SYSINFO || defined NEED_DL_SYSINFO_DSO
432 if (dsocaps != NULL)
434 const ElfW(Word) mask = ((const ElfW(Word) *) dsocaps)[-1];
435 GLRO(dl_hwcap) |= (uint64_t) mask << _DL_FIRST_EXTRA;
436 size_t len;
437 for (const char *p = dsocaps; p < dsocaps + dsocapslen; p += len + 1)
439 uint_fast8_t bit = *p++;
440 len = strlen (p);
442 /* Skip entries that are not enabled in the mask word. */
443 if (__builtin_expect (mask & ((ElfW(Word)) 1 << bit), 1))
445 temp[m].str = p;
446 temp[m].len = len;
447 ++m;
449 else
450 --cnt;
453 #endif
454 for (n = 0; masked != 0; ++n)
455 if ((masked & (1ULL << n)) != 0)
457 temp[m].str = _dl_hwcap_string (n);
458 temp[m].len = strlen (temp[m].str);
459 masked ^= 1ULL << n;
460 ++m;
462 if (platform != NULL)
464 temp[m].str = platform;
465 temp[m].len = platform_len;
466 ++m;
468 #ifdef USE_TLS
469 temp[m].str = "tls";
470 temp[m].len = 3;
471 ++m;
472 #endif
473 assert (m == cnt);
475 /* Determine the total size of all strings together. */
476 if (cnt == 1)
477 total = temp[0].len + 1;
478 else
480 total = temp[0].len + temp[cnt - 1].len + 2;
481 if (cnt > 2)
483 total <<= 1;
484 for (n = 1; n + 1 < cnt; ++n)
485 total += temp[n].len + 1;
486 if (cnt > 3
487 && (cnt >= sizeof (size_t) * 8
488 || total + (sizeof (*result) << 3)
489 >= (1UL << (sizeof (size_t) * 8 - cnt + 3))))
490 _dl_signal_error (ENOMEM, NULL, NULL,
491 N_("cannot create capability list"));
493 total <<= cnt - 3;
497 /* The result structure: we use a very compressed way to store the
498 various combinations of capability names. */
499 *sz = 1 << cnt;
500 result = (struct r_strlenpair *) malloc (*sz * sizeof (*result) + total);
501 if (result == NULL)
503 #ifndef USE_TLS
504 no_memory:
505 #endif
506 _dl_signal_error (ENOMEM, NULL, NULL,
507 N_("cannot create capability list"));
510 if (cnt == 1)
512 result[0].str = (char *) (result + *sz);
513 result[0].len = temp[0].len + 1;
514 result[1].str = (char *) (result + *sz);
515 result[1].len = 0;
516 cp = __mempcpy ((char *) (result + *sz), temp[0].str, temp[0].len);
517 *cp = '/';
518 *sz = 2;
519 *max_capstrlen = result[0].len;
521 return result;
524 /* Fill in the information. This follows the following scheme
525 (indeces from TEMP for four strings):
526 entry #0: 0, 1, 2, 3 binary: 1111
527 #1: 0, 1, 3 1101
528 #2: 0, 2, 3 1011
529 #3: 0, 3 1001
530 This allows the representation of all possible combinations of
531 capability names in the string. First generate the strings. */
532 result[1].str = result[0].str = cp = (char *) (result + *sz);
533 #define add(idx) \
534 cp = __mempcpy (__mempcpy (cp, temp[idx].str, temp[idx].len), "/", 1);
535 if (cnt == 2)
537 add (1);
538 add (0);
540 else
542 n = 1 << (cnt - 1);
545 n -= 2;
547 /* We always add the last string. */
548 add (cnt - 1);
550 /* Add the strings which have the bit set in N. */
551 for (m = cnt - 2; m > 0; --m)
552 if ((n & (1 << m)) != 0)
553 add (m);
555 /* Always add the first string. */
556 add (0);
558 while (n != 0);
560 #undef add
562 /* Now we are ready to install the string pointers and length. */
563 for (n = 0; n < (1UL << cnt); ++n)
564 result[n].len = 0;
565 n = cnt;
568 size_t mask = 1 << --n;
570 rp = result;
571 for (m = 1 << cnt; m > 0; ++rp)
572 if ((--m & mask) != 0)
573 rp->len += temp[n].len + 1;
575 while (n != 0);
577 /* The first half of the strings all include the first string. */
578 n = (1 << cnt) - 2;
579 rp = &result[2];
580 while (n != (1UL << (cnt - 1)))
582 if ((--n & 1) != 0)
583 rp[0].str = rp[-2].str + rp[-2].len;
584 else
585 rp[0].str = rp[-1].str;
586 ++rp;
589 /* The second half starts right after the first part of the string of
590 the corresponding entry in the first half. */
593 rp[0].str = rp[-(1 << (cnt - 1))].str + temp[cnt - 1].len + 1;
594 ++rp;
596 while (--n != 0);
598 /* The maximum string length. */
599 *max_capstrlen = result[0].len;
601 return result;