2009-03-04 04:28:35 +01:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2008 The Android Open Source Project
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* * Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
|
|
|
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2016-01-26 02:38:44 +01:00
|
|
|
#include <android/api-level.h>
|
2013-02-07 19:14:39 +01:00
|
|
|
#include <elf.h>
|
|
|
|
#include <errno.h>
|
2009-03-04 04:28:35 +01:00
|
|
|
#include <stddef.h>
|
2013-02-07 19:14:39 +01:00
|
|
|
#include <stdint.h>
|
2009-03-04 04:28:35 +01:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
2013-02-07 19:14:39 +01:00
|
|
|
#include <sys/auxv.h>
|
|
|
|
#include <sys/mman.h>
|
|
|
|
|
2009-03-04 04:28:35 +01:00
|
|
|
#include "libc_init_common.h"
|
2013-02-07 19:14:39 +01:00
|
|
|
#include "pthread_internal.h"
|
2012-11-10 01:51:36 +01:00
|
|
|
|
Reorganize static TLS memory for ELF TLS
For ELF TLS "local-exec" accesses, the static linker assumes that an
executable's TLS segment is located at a statically-known offset from the
thread pointer (i.e. "variant 1" for ARM and "variant 2" for x86).
Because these layouts are incompatible, Bionic generally needs to allocate
its TLS slots differently between different architectures.
To allow per-architecture TLS slots:
- Replace the TLS_SLOT_xxx enumerators with macros. New ARM slots are
generally negative, while new x86 slots are generally positive.
- Define a bionic_tcb struct that provides two things:
- a void* raw_slots_storage[BIONIC_TLS_SLOTS] field
- an inline accessor function: void*& tls_slot(size_t tpindex);
For ELF TLS, it's necessary to allocate a temporary TCB (i.e. TLS slots),
because the runtime linker doesn't know how large the static TLS area is
until after it has loaded all of the initial solibs.
To accommodate Golang, it's necessary to allocate the pthread keys at a
fixed, small, positive offset from the thread pointer.
This CL moves the pthread keys into bionic_tls, then allocates a single
mapping per thread that looks like so:
- stack guard
- stack [omitted for main thread and with pthread_attr_setstack]
- static TLS:
- bionic_tcb [exec TLS will either precede or succeed the TCB]
- bionic_tls [prefixed by the pthread keys]
- [solib TLS segments will be placed here]
- guard page
As before, if the new mapping includes a stack, the pthread_internal_t
is allocated on it.
At startup, Bionic allocates a temporary bionic_tcb object on the stack,
then allocates a temporary bionic_tls object using mmap. This mmap is
delayed because the linker can't currently call async_safe_fatal() before
relocating itself.
Later, Bionic allocates a stack-less thread mapping for the main thread,
and copies slots from the temporary TCB to the new TCB.
(See *::copy_from_bootstrap methods.)
Bug: http://b/78026329
Test: bionic unit tests
Test: verify that a Golang app still works
Test: verify that a Golang app crashes if bionic_{tls,tcb} are swapped
Merged-In: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
Change-Id: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
(cherry picked from commit 1e660b70da625fcbf1e43dfae09b7b4817fa1660)
2019-01-03 11:51:30 +01:00
|
|
|
#include "private/bionic_elf_tls.h"
|
2016-06-30 01:47:53 +02:00
|
|
|
#include "private/bionic_globals.h"
|
2017-10-06 00:18:47 +02:00
|
|
|
#include "private/bionic_macros.h"
|
2015-07-28 23:58:37 +02:00
|
|
|
#include "private/bionic_page.h"
|
2013-10-10 00:50:50 +02:00
|
|
|
#include "private/bionic_tls.h"
|
|
|
|
#include "private/KernelArgumentBlock.h"
|
|
|
|
|
2018-08-14 01:46:15 +02:00
|
|
|
#if __has_feature(hwaddress_sanitizer)
|
|
|
|
#include <sanitizer/hwasan_interface.h>
|
|
|
|
#endif
|
|
|
|
|
2018-05-18 02:14:18 +02:00
|
|
|
// Leave the variable uninitialized for the sake of the dynamic loader, which
|
|
|
|
// links in this file. The loader will initialize this variable before
|
|
|
|
// relocating itself.
|
|
|
|
#if defined(__i386__)
|
|
|
|
__LIBC_HIDDEN__ void* __libc_sysinfo;
|
|
|
|
#endif
|
|
|
|
|
2014-07-11 21:59:16 +02:00
|
|
|
extern "C" int __cxa_atexit(void (*)(void *), void *, void *);
|
|
|
|
|
2013-02-07 19:14:39 +01:00
|
|
|
static void call_array(void(**list)()) {
|
|
|
|
// First element is -1, list is null-terminated
|
|
|
|
while (*++list) {
|
|
|
|
(*list)();
|
|
|
|
}
|
2009-07-18 01:11:10 +02:00
|
|
|
}
|
|
|
|
|
2019-01-24 02:56:24 +01:00
|
|
|
#if defined(__aarch64__) || defined(__x86_64__)
|
2019-02-15 01:19:59 +01:00
|
|
|
extern __LIBC_HIDDEN__ __attribute__((weak)) ElfW(Rela) __rela_iplt_start[], __rela_iplt_end[];
|
2019-01-24 02:56:24 +01:00
|
|
|
|
|
|
|
static void call_ifunc_resolvers() {
|
2019-02-15 01:19:59 +01:00
|
|
|
if (__rela_iplt_start == nullptr || __rela_iplt_end == nullptr) {
|
|
|
|
// These symbols are not emitted by gold. Gold has code to do so, but for
|
|
|
|
// whatever reason it is not being run. In these cases ifuncs cannot be
|
|
|
|
// resolved, so we do not support using ifuncs in static executables linked
|
|
|
|
// with gold.
|
|
|
|
//
|
|
|
|
// Since they are weak, they will be non-null when linked with bfd/lld and
|
|
|
|
// null when linked with gold.
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-01-24 02:56:24 +01:00
|
|
|
typedef ElfW(Addr) (*ifunc_resolver_t)(void);
|
|
|
|
for (ElfW(Rela) *r = __rela_iplt_start; r != __rela_iplt_end; ++r) {
|
|
|
|
ElfW(Addr)* offset = reinterpret_cast<ElfW(Addr)*>(r->r_offset);
|
|
|
|
ElfW(Addr) resolver = r->r_addend;
|
|
|
|
*offset = reinterpret_cast<ifunc_resolver_t>(resolver)();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#else
|
2019-02-15 01:19:59 +01:00
|
|
|
extern __LIBC_HIDDEN__ __attribute__((weak)) ElfW(Rel) __rel_iplt_start[], __rel_iplt_end[];
|
2019-01-24 02:56:24 +01:00
|
|
|
|
|
|
|
static void call_ifunc_resolvers() {
|
2019-02-15 01:19:59 +01:00
|
|
|
if (__rel_iplt_start == nullptr || __rel_iplt_end == nullptr) {
|
|
|
|
// These symbols are not emitted by gold. Gold has code to do so, but for
|
|
|
|
// whatever reason it is not being run. In these cases ifuncs cannot be
|
|
|
|
// resolved, so we do not support using ifuncs in static executables linked
|
|
|
|
// with gold.
|
|
|
|
//
|
|
|
|
// Since they are weak, they will be non-null when linked with bfd/lld and
|
|
|
|
// null when linked with gold.
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-01-24 02:56:24 +01:00
|
|
|
typedef ElfW(Addr) (*ifunc_resolver_t)(void);
|
|
|
|
for (ElfW(Rel) *r = __rel_iplt_start; r != __rel_iplt_end; ++r) {
|
|
|
|
ElfW(Addr)* offset = reinterpret_cast<ElfW(Addr)*>(r->r_offset);
|
|
|
|
ElfW(Addr) resolver = *offset;
|
|
|
|
*offset = reinterpret_cast<ifunc_resolver_t>(resolver)();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2013-01-11 23:43:05 +01:00
|
|
|
static void apply_gnu_relro() {
|
2014-02-11 02:46:57 +01:00
|
|
|
ElfW(Phdr)* phdr_start = reinterpret_cast<ElfW(Phdr)*>(getauxval(AT_PHDR));
|
2013-02-07 19:14:39 +01:00
|
|
|
unsigned long int phdr_ct = getauxval(AT_PHNUM);
|
2012-11-10 01:51:36 +01:00
|
|
|
|
2014-02-11 02:46:57 +01:00
|
|
|
for (ElfW(Phdr)* phdr = phdr_start; phdr < (phdr_start + phdr_ct); phdr++) {
|
2013-02-07 19:14:39 +01:00
|
|
|
if (phdr->p_type != PT_GNU_RELRO) {
|
|
|
|
continue;
|
2012-11-10 01:51:36 +01:00
|
|
|
}
|
|
|
|
|
2014-02-11 02:46:57 +01:00
|
|
|
ElfW(Addr) seg_page_start = PAGE_START(phdr->p_vaddr);
|
|
|
|
ElfW(Addr) seg_page_end = PAGE_END(phdr->p_vaddr + phdr->p_memsz);
|
2009-07-18 01:11:10 +02:00
|
|
|
|
2013-02-07 19:14:39 +01:00
|
|
|
// Check return value here? What do we do if we fail?
|
|
|
|
mprotect(reinterpret_cast<void*>(seg_page_start), seg_page_end - seg_page_start, PROT_READ);
|
|
|
|
}
|
|
|
|
}
|
2009-07-18 01:11:10 +02:00
|
|
|
|
2019-01-02 03:53:48 +01:00
|
|
|
static void layout_static_tls(KernelArgumentBlock& args) {
|
Reorganize static TLS memory for ELF TLS
For ELF TLS "local-exec" accesses, the static linker assumes that an
executable's TLS segment is located at a statically-known offset from the
thread pointer (i.e. "variant 1" for ARM and "variant 2" for x86).
Because these layouts are incompatible, Bionic generally needs to allocate
its TLS slots differently between different architectures.
To allow per-architecture TLS slots:
- Replace the TLS_SLOT_xxx enumerators with macros. New ARM slots are
generally negative, while new x86 slots are generally positive.
- Define a bionic_tcb struct that provides two things:
- a void* raw_slots_storage[BIONIC_TLS_SLOTS] field
- an inline accessor function: void*& tls_slot(size_t tpindex);
For ELF TLS, it's necessary to allocate a temporary TCB (i.e. TLS slots),
because the runtime linker doesn't know how large the static TLS area is
until after it has loaded all of the initial solibs.
To accommodate Golang, it's necessary to allocate the pthread keys at a
fixed, small, positive offset from the thread pointer.
This CL moves the pthread keys into bionic_tls, then allocates a single
mapping per thread that looks like so:
- stack guard
- stack [omitted for main thread and with pthread_attr_setstack]
- static TLS:
- bionic_tcb [exec TLS will either precede or succeed the TCB]
- bionic_tls [prefixed by the pthread keys]
- [solib TLS segments will be placed here]
- guard page
As before, if the new mapping includes a stack, the pthread_internal_t
is allocated on it.
At startup, Bionic allocates a temporary bionic_tcb object on the stack,
then allocates a temporary bionic_tls object using mmap. This mmap is
delayed because the linker can't currently call async_safe_fatal() before
relocating itself.
Later, Bionic allocates a stack-less thread mapping for the main thread,
and copies slots from the temporary TCB to the new TCB.
(See *::copy_from_bootstrap methods.)
Bug: http://b/78026329
Test: bionic unit tests
Test: verify that a Golang app still works
Test: verify that a Golang app crashes if bionic_{tls,tcb} are swapped
Merged-In: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
Change-Id: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
(cherry picked from commit 1e660b70da625fcbf1e43dfae09b7b4817fa1660)
2019-01-03 11:51:30 +01:00
|
|
|
StaticTlsLayout& layout = __libc_shared_globals()->static_tls_layout;
|
|
|
|
layout.reserve_bionic_tls();
|
2019-01-02 03:53:48 +01:00
|
|
|
|
|
|
|
const char* progname = args.argv[0];
|
|
|
|
ElfW(Phdr)* phdr_start = reinterpret_cast<ElfW(Phdr)*>(getauxval(AT_PHDR));
|
|
|
|
size_t phdr_ct = getauxval(AT_PHNUM);
|
|
|
|
|
2019-01-17 08:13:38 +01:00
|
|
|
static TlsModule mod;
|
2019-01-18 10:00:59 +01:00
|
|
|
TlsModules& modules = __libc_shared_globals()->tls_modules;
|
2019-01-17 08:13:38 +01:00
|
|
|
if (__bionic_get_tls_segment(phdr_start, phdr_ct, 0, &mod.segment)) {
|
|
|
|
if (!__bionic_check_tls_alignment(&mod.segment.alignment)) {
|
|
|
|
async_safe_fatal("error: TLS segment alignment in \"%s\" is not a power of 2: %zu\n",
|
|
|
|
progname, mod.segment.alignment);
|
|
|
|
}
|
|
|
|
mod.static_offset = layout.reserve_exe_segment_and_tcb(&mod.segment, progname);
|
2019-01-18 10:00:59 +01:00
|
|
|
mod.first_generation = kTlsGenerationFirst;
|
|
|
|
|
|
|
|
modules.module_count = 1;
|
|
|
|
modules.module_table = &mod;
|
2019-01-02 03:53:48 +01:00
|
|
|
} else {
|
|
|
|
layout.reserve_exe_segment_and_tcb(nullptr, progname);
|
|
|
|
}
|
2019-01-18 10:00:59 +01:00
|
|
|
// Enable the fast path in __tls_get_addr.
|
|
|
|
__libc_tls_generation_copy = modules.generation;
|
2019-01-02 03:53:48 +01:00
|
|
|
|
Reorganize static TLS memory for ELF TLS
For ELF TLS "local-exec" accesses, the static linker assumes that an
executable's TLS segment is located at a statically-known offset from the
thread pointer (i.e. "variant 1" for ARM and "variant 2" for x86).
Because these layouts are incompatible, Bionic generally needs to allocate
its TLS slots differently between different architectures.
To allow per-architecture TLS slots:
- Replace the TLS_SLOT_xxx enumerators with macros. New ARM slots are
generally negative, while new x86 slots are generally positive.
- Define a bionic_tcb struct that provides two things:
- a void* raw_slots_storage[BIONIC_TLS_SLOTS] field
- an inline accessor function: void*& tls_slot(size_t tpindex);
For ELF TLS, it's necessary to allocate a temporary TCB (i.e. TLS slots),
because the runtime linker doesn't know how large the static TLS area is
until after it has loaded all of the initial solibs.
To accommodate Golang, it's necessary to allocate the pthread keys at a
fixed, small, positive offset from the thread pointer.
This CL moves the pthread keys into bionic_tls, then allocates a single
mapping per thread that looks like so:
- stack guard
- stack [omitted for main thread and with pthread_attr_setstack]
- static TLS:
- bionic_tcb [exec TLS will either precede or succeed the TCB]
- bionic_tls [prefixed by the pthread keys]
- [solib TLS segments will be placed here]
- guard page
As before, if the new mapping includes a stack, the pthread_internal_t
is allocated on it.
At startup, Bionic allocates a temporary bionic_tcb object on the stack,
then allocates a temporary bionic_tls object using mmap. This mmap is
delayed because the linker can't currently call async_safe_fatal() before
relocating itself.
Later, Bionic allocates a stack-less thread mapping for the main thread,
and copies slots from the temporary TCB to the new TCB.
(See *::copy_from_bootstrap methods.)
Bug: http://b/78026329
Test: bionic unit tests
Test: verify that a Golang app still works
Test: verify that a Golang app crashes if bionic_{tls,tcb} are swapped
Merged-In: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
Change-Id: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
(cherry picked from commit 1e660b70da625fcbf1e43dfae09b7b4817fa1660)
2019-01-03 11:51:30 +01:00
|
|
|
layout.finish_layout();
|
|
|
|
}
|
|
|
|
|
2016-01-07 04:51:43 +01:00
|
|
|
// The program startup function __libc_init() defined here is
|
|
|
|
// used for static executables only (i.e. those that don't depend
|
|
|
|
// on shared libraries). It is called from arch-$ARCH/bionic/crtbegin_static.S
|
|
|
|
// which is directly invoked by the kernel when the program is launched.
|
|
|
|
//
|
|
|
|
// The 'structors' parameter contains pointers to various initializer
|
|
|
|
// arrays that must be run before the program's 'main' routine is launched.
|
2018-08-14 01:46:15 +02:00
|
|
|
__noreturn static void __real_libc_init(void *raw_args,
|
|
|
|
void (*onexit)(void) __unused,
|
|
|
|
int (*slingshot)(int, char**, char**),
|
Reorganize static TLS memory for ELF TLS
For ELF TLS "local-exec" accesses, the static linker assumes that an
executable's TLS segment is located at a statically-known offset from the
thread pointer (i.e. "variant 1" for ARM and "variant 2" for x86).
Because these layouts are incompatible, Bionic generally needs to allocate
its TLS slots differently between different architectures.
To allow per-architecture TLS slots:
- Replace the TLS_SLOT_xxx enumerators with macros. New ARM slots are
generally negative, while new x86 slots are generally positive.
- Define a bionic_tcb struct that provides two things:
- a void* raw_slots_storage[BIONIC_TLS_SLOTS] field
- an inline accessor function: void*& tls_slot(size_t tpindex);
For ELF TLS, it's necessary to allocate a temporary TCB (i.e. TLS slots),
because the runtime linker doesn't know how large the static TLS area is
until after it has loaded all of the initial solibs.
To accommodate Golang, it's necessary to allocate the pthread keys at a
fixed, small, positive offset from the thread pointer.
This CL moves the pthread keys into bionic_tls, then allocates a single
mapping per thread that looks like so:
- stack guard
- stack [omitted for main thread and with pthread_attr_setstack]
- static TLS:
- bionic_tcb [exec TLS will either precede or succeed the TCB]
- bionic_tls [prefixed by the pthread keys]
- [solib TLS segments will be placed here]
- guard page
As before, if the new mapping includes a stack, the pthread_internal_t
is allocated on it.
At startup, Bionic allocates a temporary bionic_tcb object on the stack,
then allocates a temporary bionic_tls object using mmap. This mmap is
delayed because the linker can't currently call async_safe_fatal() before
relocating itself.
Later, Bionic allocates a stack-less thread mapping for the main thread,
and copies slots from the temporary TCB to the new TCB.
(See *::copy_from_bootstrap methods.)
Bug: http://b/78026329
Test: bionic unit tests
Test: verify that a Golang app still works
Test: verify that a Golang app crashes if bionic_{tls,tcb} are swapped
Merged-In: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
Change-Id: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
(cherry picked from commit 1e660b70da625fcbf1e43dfae09b7b4817fa1660)
2019-01-03 11:51:30 +01:00
|
|
|
structors_array_t const * const structors,
|
|
|
|
bionic_tcb* temp_tcb) {
|
2017-10-06 00:18:47 +02:00
|
|
|
BIONIC_STOP_UNWIND;
|
|
|
|
|
2018-11-22 11:44:09 +01:00
|
|
|
// Initialize TLS early so system calls and errno work.
|
2013-02-07 19:14:39 +01:00
|
|
|
KernelArgumentBlock args(raw_args);
|
Reorganize static TLS memory for ELF TLS
For ELF TLS "local-exec" accesses, the static linker assumes that an
executable's TLS segment is located at a statically-known offset from the
thread pointer (i.e. "variant 1" for ARM and "variant 2" for x86).
Because these layouts are incompatible, Bionic generally needs to allocate
its TLS slots differently between different architectures.
To allow per-architecture TLS slots:
- Replace the TLS_SLOT_xxx enumerators with macros. New ARM slots are
generally negative, while new x86 slots are generally positive.
- Define a bionic_tcb struct that provides two things:
- a void* raw_slots_storage[BIONIC_TLS_SLOTS] field
- an inline accessor function: void*& tls_slot(size_t tpindex);
For ELF TLS, it's necessary to allocate a temporary TCB (i.e. TLS slots),
because the runtime linker doesn't know how large the static TLS area is
until after it has loaded all of the initial solibs.
To accommodate Golang, it's necessary to allocate the pthread keys at a
fixed, small, positive offset from the thread pointer.
This CL moves the pthread keys into bionic_tls, then allocates a single
mapping per thread that looks like so:
- stack guard
- stack [omitted for main thread and with pthread_attr_setstack]
- static TLS:
- bionic_tcb [exec TLS will either precede or succeed the TCB]
- bionic_tls [prefixed by the pthread keys]
- [solib TLS segments will be placed here]
- guard page
As before, if the new mapping includes a stack, the pthread_internal_t
is allocated on it.
At startup, Bionic allocates a temporary bionic_tcb object on the stack,
then allocates a temporary bionic_tls object using mmap. This mmap is
delayed because the linker can't currently call async_safe_fatal() before
relocating itself.
Later, Bionic allocates a stack-less thread mapping for the main thread,
and copies slots from the temporary TCB to the new TCB.
(See *::copy_from_bootstrap methods.)
Bug: http://b/78026329
Test: bionic unit tests
Test: verify that a Golang app still works
Test: verify that a Golang app crashes if bionic_{tls,tcb} are swapped
Merged-In: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
Change-Id: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
(cherry picked from commit 1e660b70da625fcbf1e43dfae09b7b4817fa1660)
2019-01-03 11:51:30 +01:00
|
|
|
__libc_init_main_thread_early(args, temp_tcb);
|
2018-11-22 12:16:06 +01:00
|
|
|
__libc_init_main_thread_late();
|
|
|
|
__libc_init_globals();
|
2018-11-22 11:44:09 +01:00
|
|
|
__libc_shared_globals()->init_progname = args.argv[0];
|
2018-11-22 11:41:36 +01:00
|
|
|
__libc_init_AT_SECURE(args.envp);
|
2019-01-02 03:53:48 +01:00
|
|
|
layout_static_tls(args);
|
Reorganize static TLS memory for ELF TLS
For ELF TLS "local-exec" accesses, the static linker assumes that an
executable's TLS segment is located at a statically-known offset from the
thread pointer (i.e. "variant 1" for ARM and "variant 2" for x86).
Because these layouts are incompatible, Bionic generally needs to allocate
its TLS slots differently between different architectures.
To allow per-architecture TLS slots:
- Replace the TLS_SLOT_xxx enumerators with macros. New ARM slots are
generally negative, while new x86 slots are generally positive.
- Define a bionic_tcb struct that provides two things:
- a void* raw_slots_storage[BIONIC_TLS_SLOTS] field
- an inline accessor function: void*& tls_slot(size_t tpindex);
For ELF TLS, it's necessary to allocate a temporary TCB (i.e. TLS slots),
because the runtime linker doesn't know how large the static TLS area is
until after it has loaded all of the initial solibs.
To accommodate Golang, it's necessary to allocate the pthread keys at a
fixed, small, positive offset from the thread pointer.
This CL moves the pthread keys into bionic_tls, then allocates a single
mapping per thread that looks like so:
- stack guard
- stack [omitted for main thread and with pthread_attr_setstack]
- static TLS:
- bionic_tcb [exec TLS will either precede or succeed the TCB]
- bionic_tls [prefixed by the pthread keys]
- [solib TLS segments will be placed here]
- guard page
As before, if the new mapping includes a stack, the pthread_internal_t
is allocated on it.
At startup, Bionic allocates a temporary bionic_tcb object on the stack,
then allocates a temporary bionic_tls object using mmap. This mmap is
delayed because the linker can't currently call async_safe_fatal() before
relocating itself.
Later, Bionic allocates a stack-less thread mapping for the main thread,
and copies slots from the temporary TCB to the new TCB.
(See *::copy_from_bootstrap methods.)
Bug: http://b/78026329
Test: bionic unit tests
Test: verify that a Golang app still works
Test: verify that a Golang app crashes if bionic_{tls,tcb} are swapped
Merged-In: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
Change-Id: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
(cherry picked from commit 1e660b70da625fcbf1e43dfae09b7b4817fa1660)
2019-01-03 11:51:30 +01:00
|
|
|
__libc_init_main_thread_final();
|
2018-11-22 11:41:36 +01:00
|
|
|
__libc_init_common();
|
2009-07-18 01:11:10 +02:00
|
|
|
|
2019-01-24 02:56:24 +01:00
|
|
|
call_ifunc_resolvers();
|
2013-02-07 19:14:39 +01:00
|
|
|
apply_gnu_relro();
|
2009-07-18 01:11:10 +02:00
|
|
|
|
2013-02-07 19:14:39 +01:00
|
|
|
// Several Linux ABIs don't pass the onexit pointer, and the ones that
|
|
|
|
// do never use it. Therefore, we ignore it.
|
2009-07-18 01:11:10 +02:00
|
|
|
|
2013-02-07 19:14:39 +01:00
|
|
|
call_array(structors->preinit_array);
|
2014-09-04 23:54:34 +02:00
|
|
|
call_array(structors->init_array);
|
2009-07-18 01:11:10 +02:00
|
|
|
|
2013-02-07 19:14:39 +01:00
|
|
|
// The executable may have its own destructors listed in its .fini_array
|
|
|
|
// so we need to ensure that these are called when the program exits
|
|
|
|
// normally.
|
2018-08-03 02:31:13 +02:00
|
|
|
if (structors->fini_array != nullptr) {
|
|
|
|
__cxa_atexit(__libc_fini,structors->fini_array,nullptr);
|
2014-09-04 23:54:34 +02:00
|
|
|
}
|
2010-10-21 04:16:50 +02:00
|
|
|
|
2013-02-07 19:14:39 +01:00
|
|
|
exit(slingshot(args.argc, args.argv, args.envp));
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2016-01-26 02:38:44 +01:00
|
|
|
|
2018-09-20 01:29:12 +02:00
|
|
|
extern "C" void __hwasan_init();
|
|
|
|
|
2018-08-14 01:46:15 +02:00
|
|
|
__attribute__((no_sanitize("hwaddress")))
|
|
|
|
__noreturn void __libc_init(void* raw_args,
|
|
|
|
void (*onexit)(void) __unused,
|
|
|
|
int (*slingshot)(int, char**, char**),
|
|
|
|
structors_array_t const * const structors) {
|
Reorganize static TLS memory for ELF TLS
For ELF TLS "local-exec" accesses, the static linker assumes that an
executable's TLS segment is located at a statically-known offset from the
thread pointer (i.e. "variant 1" for ARM and "variant 2" for x86).
Because these layouts are incompatible, Bionic generally needs to allocate
its TLS slots differently between different architectures.
To allow per-architecture TLS slots:
- Replace the TLS_SLOT_xxx enumerators with macros. New ARM slots are
generally negative, while new x86 slots are generally positive.
- Define a bionic_tcb struct that provides two things:
- a void* raw_slots_storage[BIONIC_TLS_SLOTS] field
- an inline accessor function: void*& tls_slot(size_t tpindex);
For ELF TLS, it's necessary to allocate a temporary TCB (i.e. TLS slots),
because the runtime linker doesn't know how large the static TLS area is
until after it has loaded all of the initial solibs.
To accommodate Golang, it's necessary to allocate the pthread keys at a
fixed, small, positive offset from the thread pointer.
This CL moves the pthread keys into bionic_tls, then allocates a single
mapping per thread that looks like so:
- stack guard
- stack [omitted for main thread and with pthread_attr_setstack]
- static TLS:
- bionic_tcb [exec TLS will either precede or succeed the TCB]
- bionic_tls [prefixed by the pthread keys]
- [solib TLS segments will be placed here]
- guard page
As before, if the new mapping includes a stack, the pthread_internal_t
is allocated on it.
At startup, Bionic allocates a temporary bionic_tcb object on the stack,
then allocates a temporary bionic_tls object using mmap. This mmap is
delayed because the linker can't currently call async_safe_fatal() before
relocating itself.
Later, Bionic allocates a stack-less thread mapping for the main thread,
and copies slots from the temporary TCB to the new TCB.
(See *::copy_from_bootstrap methods.)
Bug: http://b/78026329
Test: bionic unit tests
Test: verify that a Golang app still works
Test: verify that a Golang app crashes if bionic_{tls,tcb} are swapped
Merged-In: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
Change-Id: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
(cherry picked from commit 1e660b70da625fcbf1e43dfae09b7b4817fa1660)
2019-01-03 11:51:30 +01:00
|
|
|
bionic_tcb temp_tcb = {};
|
2018-08-14 01:46:15 +02:00
|
|
|
#if __has_feature(hwaddress_sanitizer)
|
2018-09-20 01:29:12 +02:00
|
|
|
// Install main thread TLS early. It will be initialized later in __libc_init_main_thread. For now
|
Reorganize static TLS memory for ELF TLS
For ELF TLS "local-exec" accesses, the static linker assumes that an
executable's TLS segment is located at a statically-known offset from the
thread pointer (i.e. "variant 1" for ARM and "variant 2" for x86).
Because these layouts are incompatible, Bionic generally needs to allocate
its TLS slots differently between different architectures.
To allow per-architecture TLS slots:
- Replace the TLS_SLOT_xxx enumerators with macros. New ARM slots are
generally negative, while new x86 slots are generally positive.
- Define a bionic_tcb struct that provides two things:
- a void* raw_slots_storage[BIONIC_TLS_SLOTS] field
- an inline accessor function: void*& tls_slot(size_t tpindex);
For ELF TLS, it's necessary to allocate a temporary TCB (i.e. TLS slots),
because the runtime linker doesn't know how large the static TLS area is
until after it has loaded all of the initial solibs.
To accommodate Golang, it's necessary to allocate the pthread keys at a
fixed, small, positive offset from the thread pointer.
This CL moves the pthread keys into bionic_tls, then allocates a single
mapping per thread that looks like so:
- stack guard
- stack [omitted for main thread and with pthread_attr_setstack]
- static TLS:
- bionic_tcb [exec TLS will either precede or succeed the TCB]
- bionic_tls [prefixed by the pthread keys]
- [solib TLS segments will be placed here]
- guard page
As before, if the new mapping includes a stack, the pthread_internal_t
is allocated on it.
At startup, Bionic allocates a temporary bionic_tcb object on the stack,
then allocates a temporary bionic_tls object using mmap. This mmap is
delayed because the linker can't currently call async_safe_fatal() before
relocating itself.
Later, Bionic allocates a stack-less thread mapping for the main thread,
and copies slots from the temporary TCB to the new TCB.
(See *::copy_from_bootstrap methods.)
Bug: http://b/78026329
Test: bionic unit tests
Test: verify that a Golang app still works
Test: verify that a Golang app crashes if bionic_{tls,tcb} are swapped
Merged-In: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
Change-Id: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
(cherry picked from commit 1e660b70da625fcbf1e43dfae09b7b4817fa1660)
2019-01-03 11:51:30 +01:00
|
|
|
// all we need is access to TLS_SLOT_SANITIZER.
|
|
|
|
__set_tls(&temp_tcb.tls_slot(0));
|
|
|
|
// Initialize HWASan. This sets up TLS_SLOT_SANITIZER, among other things.
|
2018-09-20 01:29:12 +02:00
|
|
|
__hwasan_init();
|
|
|
|
// We are ready to run HWASan-instrumented code, proceed with libc initialization...
|
2018-08-14 01:46:15 +02:00
|
|
|
#endif
|
Reorganize static TLS memory for ELF TLS
For ELF TLS "local-exec" accesses, the static linker assumes that an
executable's TLS segment is located at a statically-known offset from the
thread pointer (i.e. "variant 1" for ARM and "variant 2" for x86).
Because these layouts are incompatible, Bionic generally needs to allocate
its TLS slots differently between different architectures.
To allow per-architecture TLS slots:
- Replace the TLS_SLOT_xxx enumerators with macros. New ARM slots are
generally negative, while new x86 slots are generally positive.
- Define a bionic_tcb struct that provides two things:
- a void* raw_slots_storage[BIONIC_TLS_SLOTS] field
- an inline accessor function: void*& tls_slot(size_t tpindex);
For ELF TLS, it's necessary to allocate a temporary TCB (i.e. TLS slots),
because the runtime linker doesn't know how large the static TLS area is
until after it has loaded all of the initial solibs.
To accommodate Golang, it's necessary to allocate the pthread keys at a
fixed, small, positive offset from the thread pointer.
This CL moves the pthread keys into bionic_tls, then allocates a single
mapping per thread that looks like so:
- stack guard
- stack [omitted for main thread and with pthread_attr_setstack]
- static TLS:
- bionic_tcb [exec TLS will either precede or succeed the TCB]
- bionic_tls [prefixed by the pthread keys]
- [solib TLS segments will be placed here]
- guard page
As before, if the new mapping includes a stack, the pthread_internal_t
is allocated on it.
At startup, Bionic allocates a temporary bionic_tcb object on the stack,
then allocates a temporary bionic_tls object using mmap. This mmap is
delayed because the linker can't currently call async_safe_fatal() before
relocating itself.
Later, Bionic allocates a stack-less thread mapping for the main thread,
and copies slots from the temporary TCB to the new TCB.
(See *::copy_from_bootstrap methods.)
Bug: http://b/78026329
Test: bionic unit tests
Test: verify that a Golang app still works
Test: verify that a Golang app crashes if bionic_{tls,tcb} are swapped
Merged-In: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
Change-Id: I6543063752f4ec8ef6dc9c7f2a06ce2a18fc5af3
(cherry picked from commit 1e660b70da625fcbf1e43dfae09b7b4817fa1660)
2019-01-03 11:51:30 +01:00
|
|
|
__real_libc_init(raw_args, onexit, slingshot, structors, &temp_tcb);
|
2018-08-14 01:46:15 +02:00
|
|
|
}
|
|
|
|
|
2018-11-13 01:01:37 +01:00
|
|
|
static int g_target_sdk_version{__ANDROID_API__};
|
2018-04-04 00:56:35 +02:00
|
|
|
|
2018-11-13 01:01:37 +01:00
|
|
|
extern "C" int android_get_application_target_sdk_version() {
|
2018-04-04 00:56:35 +02:00
|
|
|
return g_target_sdk_version;
|
|
|
|
}
|
|
|
|
|
2018-11-13 01:01:37 +01:00
|
|
|
extern "C" void android_set_application_target_sdk_version(int target) {
|
2018-04-04 00:56:35 +02:00
|
|
|
g_target_sdk_version = target;
|
2016-01-26 02:38:44 +01:00
|
|
|
}
|
2018-11-22 11:40:17 +01:00
|
|
|
|
|
|
|
__LIBC_HIDDEN__ libc_shared_globals* __libc_shared_globals() {
|
2018-12-15 02:34:05 +01:00
|
|
|
static libc_shared_globals globals;
|
2018-11-22 11:40:17 +01:00
|
|
|
return &globals;
|
|
|
|
}
|