1 /* Support for dynamic linking code in static libc.
2 Copyright (C) 1996-2005, 2006 Free Software Foundation, Inc.
3 This file is part of the GNU C Library.
5 The GNU C Library is free software; you can redistribute it and/or
6 modify it under the terms of the GNU Lesser General Public
7 License as published by the Free Software Foundation; either
8 version 2.1 of the License, or (at your option) any later version.
10 The GNU C Library is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Lesser General Public License for more details.
15 You should have received a copy of the GNU Lesser General Public
16 License along with the GNU C Library; if not, write to the Free
17 Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
20 /* This file defines some things that for the dynamic linker are defined in
21 rtld.c and dl-sysdep.c in ways appropriate to bootstrap dynamic linking. */
28 #include <dl-machine.h>
29 #include <bits/libc-lock.h>
31 #include <dl-librecon.h>
32 #include <dl-procinfo.h>
33 #include <unsecvars.h>
34 #include <hp-timing.h>
36 extern char *__progname
;
37 char **_dl_argv
= &__progname
; /* This is checked for some error messages. */
39 /* Name of the architecture. */
40 const char *_dl_platform
;
41 size_t _dl_platformlen
;
45 ElfW(Addr
) _dl_use_load_bias
= -2;
48 /* If nonzero print warnings about problematic situations. */
51 /* We never do profiling. */
52 const char *_dl_profile
;
53 const char *_dl_profile_output
;
55 /* Names of shared object for which the RUNPATHs and RPATHs should be
57 const char *_dl_inhibit_rpath
;
59 /* The map for the object we will profile. */
60 struct link_map
*_dl_profile_map
;
62 /* This is the address of the last stack address ever used. */
63 void *__libc_stack_end
;
65 /* Path where the binary is found. */
66 const char *_dl_origin_path
;
68 /* Nonzero if runtime lookup should not update the .got/.plt. */
71 /* Namespace information. */
72 struct link_namespaces _dl_ns
[DL_NNS
];
74 /* Incremented whenever something may have been added to dl_loaded. */
75 unsigned long long _dl_load_adds
;
77 /* Fake scope. In dynamically linked binaries this is the scope of the
78 main application but here we don't have something like this. So
79 create a fake scope containing nothing. */
80 struct r_scope_elem _dl_initial_searchlist
;
82 #ifndef HAVE_INLINED_SYSCALLS
83 /* Nonzero during startup. */
84 int _dl_starting_up
= 1;
87 /* Get architecture specific initializer. */
88 #include <dl-procinfo.c>
90 /* We expect less than a second for relocation. */
91 #ifdef HP_SMALL_TIMING_AVAIL
92 # undef HP_TIMING_AVAIL
93 # define HP_TIMING_AVAIL HP_SMALL_TIMING_AVAIL
96 /* Initial value of the CPU clock. */
97 #ifndef HP_TIMING_NONAVAIL
98 hp_timing_t _dl_cpuclock_offset
;
101 void (*_dl_init_static_tls
) (struct link_map
*) = &_dl_nothread_init_static_tls
;
105 unsigned int _dl_osversion
;
107 /* All known directories in sorted order. */
108 struct r_search_path_elem
*_dl_all_dirs
;
110 /* All directories after startup. */
111 struct r_search_path_elem
*_dl_init_all_dirs
;
113 /* The object to be initialized first. */
114 struct link_map
*_dl_initfirst
;
116 /* Descriptor to write debug messages to. */
117 int _dl_debug_fd
= STDERR_FILENO
;
119 int _dl_correct_cache_id
= _DL_CACHE_DEFAULT_ID
;
121 ElfW(Phdr
) *_dl_phdr
;
123 uint64_t _dl_hwcap
__attribute__ ((nocommon
));
125 /* Prevailing state of the stack, PF_X indicating it's executable. */
126 ElfW(Word
) _dl_stack_flags
= PF_R
|PF_W
|PF_X
;
128 /* If loading a shared object requires that we make the stack executable
129 when it was not, we do it by calling this function.
130 It returns an errno code or zero on success. */
131 int (*_dl_make_stack_executable_hook
) (void **) internal_function
132 = _dl_make_stack_executable
;
135 #ifdef NEED_DL_SYSINFO
136 /* Needed for improved syscall handling on at least x86/Linux. */
137 uintptr_t _dl_sysinfo
= DL_SYSINFO_DEFAULT
;
139 #if defined NEED_DL_SYSINFO || defined NEED_DL_SYSINFO_DSO
140 /* Address of the ELF headers in the vsyscall page. */
141 const ElfW(Ehdr
) *_dl_sysinfo_dso
;
144 /* During the program run we must not modify the global data of
145 loaded shared object simultanously in two threads. Therefore we
146 protect `_dl_open' and `_dl_close' in dl-close.c.
148 This must be a recursive lock since the initializer function of
149 the loaded object might as well require a call to this function.
150 At this time it is not anymore a problem to modify the tables. */
151 __rtld_lock_define_initialized_recursive (, _dl_load_lock
)
154 #ifdef HAVE_AUX_VECTOR
159 _dl_aux_init (ElfW(auxv_t
) *av
)
165 for (; av
->a_type
!= AT_NULL
; ++av
)
169 GLRO(dl_pagesize
) = av
->a_un
.a_val
;
172 GLRO(dl_clktck
) = av
->a_un
.a_val
;
175 GL(dl_phdr
) = (void *) av
->a_un
.a_val
;
178 GL(dl_phnum
) = av
->a_un
.a_val
;
181 GLRO(dl_hwcap
) = (unsigned long int) av
->a_un
.a_val
;
183 #ifdef NEED_DL_SYSINFO
185 GL(dl_sysinfo
) = av
->a_un
.a_val
;
188 #if defined NEED_DL_SYSINFO || defined NEED_DL_SYSINFO_DSO
189 case AT_SYSINFO_EHDR
:
190 GL(dl_sysinfo_dso
) = (void *) av
->a_un
.a_val
;
194 uid
^= av
->a_un
.a_val
;
198 uid
^= av
->a_un
.a_val
;
202 gid
^= av
->a_un
.a_val
;
206 gid
^= av
->a_un
.a_val
;
211 __libc_enable_secure
= av
->a_un
.a_val
;
212 __libc_enable_secure_decided
= 1;
217 __libc_enable_secure
= uid
!= 0 || gid
!= 0;
218 __libc_enable_secure_decided
= 1;
226 _dl_non_dynamic_init (void)
229 HP_TIMING_NOW (_dl_cpuclock_offset
);
232 _dl_pagesize
= __getpagesize ();
234 _dl_verbose
= *(getenv ("LD_WARN") ?: "") == '\0' ? 0 : 1;
236 /* Initialize the data structures for the search paths for shared
238 _dl_init_paths (getenv ("LD_LIBRARY_PATH"));
240 _dl_lazy
= *(getenv ("LD_BIND_NOW") ?: "") == '\0';
242 _dl_bind_not
= *(getenv ("LD_BIND_NOT") ?: "") != '\0';
244 _dl_dynamic_weak
= *(getenv ("LD_DYNAMIC_WEAK") ?: "") == '\0';
246 _dl_profile_output
= getenv ("LD_PROFILE_OUTPUT");
247 if (_dl_profile_output
== NULL
|| _dl_profile_output
[0] == '\0')
249 = &"/var/tmp\0/var/profile"[__libc_enable_secure
? 9 : 0];
251 if (__libc_enable_secure
)
253 static const char unsecure_envvars
[] =
255 #ifdef EXTRA_UNSECURE_ENVVARS
256 EXTRA_UNSECURE_ENVVARS
259 const char *cp
= unsecure_envvars
;
261 while (cp
< unsecure_envvars
+ sizeof (unsecure_envvars
))
264 cp
= (const char *) __rawmemchr (cp
, '\0') + 1;
267 if (__access ("/etc/suid-debug", F_OK
) != 0)
268 __unsetenv ("MALLOC_CHECK_");
271 #ifdef DL_PLATFORM_INIT
275 #ifdef DL_OSVERSION_INIT
279 /* Now determine the length of the platform string. */
280 if (_dl_platform
!= NULL
)
281 _dl_platformlen
= strlen (_dl_platform
);
283 /* Scan for a program header telling us the stack is nonexecutable. */
284 if (_dl_phdr
!= NULL
)
285 for (uint_fast16_t i
= 0; i
< _dl_phnum
; ++i
)
286 if (_dl_phdr
[i
].p_type
== PT_GNU_STACK
)
288 _dl_stack_flags
= _dl_phdr
[i
].p_flags
;
294 const struct r_strlenpair
*
296 _dl_important_hwcaps (const char *platform
, size_t platform_len
, size_t *sz
,
297 size_t *max_capstrlen
)
299 static struct r_strlenpair result
;
302 result
.str
= buf
; /* Does not really matter. */
310 #ifdef DL_SYSINFO_IMPLEMENTATION
311 DL_SYSINFO_IMPLEMENTATION