27475b5105
__libc_sysinfo is hidden, so accessing it doesn't require a relocated GOT. It is important not to have a relocatable initializer on __libc_sysinfo, because if it did have one, and if we initialized it before relocating the linker, then on 32-bit x86 (which uses REL rather than RELA), the relocation step would calculate the wrong addend and overwrite __libc_sysinfo with garbage. Asides: * It'd be simpler to keep the __libc_sysinfo initializer for static executables, but the loader pulls in libc_init_static (even though it uses almost none of the code in that file, like __libc_init). * The loader has called __libc_init_sysinfo three times by the time it has relocated itself. A static executable calls it twice, while libc.so calls it only once. Bug: none Test: lunch aosp_x86-userdebug ; emulator Test: adb shell /data/nativetest/bionic-unit-tests/bionic-unit-tests Test: adb shell /data/nativetest/bionic-unit-tests-static/bionic-unit-tests-static Change-Id: I5944f57847db7191608f4f83dde22b49e279e6cb
134 lines
4.6 KiB
C++
134 lines
4.6 KiB
C++
/*
|
|
* Copyright (C) 2008 The Android Open Source Project
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
|
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <android/api-level.h>
|
|
#include <elf.h>
|
|
#include <errno.h>
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <sys/auxv.h>
|
|
#include <sys/mman.h>
|
|
|
|
#include "libc_init_common.h"
|
|
#include "pthread_internal.h"
|
|
|
|
#include "private/bionic_globals.h"
|
|
#include "private/bionic_macros.h"
|
|
#include "private/bionic_page.h"
|
|
#include "private/bionic_tls.h"
|
|
#include "private/KernelArgumentBlock.h"
|
|
|
|
// Leave the variable uninitialized for the sake of the dynamic loader, which
|
|
// links in this file. The loader will initialize this variable before
|
|
// relocating itself.
|
|
#if defined(__i386__)
|
|
__LIBC_HIDDEN__ void* __libc_sysinfo;
|
|
#endif
|
|
|
|
extern "C" int __cxa_atexit(void (*)(void *), void *, void *);
|
|
|
|
static void call_array(void(**list)()) {
|
|
// First element is -1, list is null-terminated
|
|
while (*++list) {
|
|
(*list)();
|
|
}
|
|
}
|
|
|
|
static void apply_gnu_relro() {
|
|
ElfW(Phdr)* phdr_start = reinterpret_cast<ElfW(Phdr)*>(getauxval(AT_PHDR));
|
|
unsigned long int phdr_ct = getauxval(AT_PHNUM);
|
|
|
|
for (ElfW(Phdr)* phdr = phdr_start; phdr < (phdr_start + phdr_ct); phdr++) {
|
|
if (phdr->p_type != PT_GNU_RELRO) {
|
|
continue;
|
|
}
|
|
|
|
ElfW(Addr) seg_page_start = PAGE_START(phdr->p_vaddr);
|
|
ElfW(Addr) seg_page_end = PAGE_END(phdr->p_vaddr + phdr->p_memsz);
|
|
|
|
// Check return value here? What do we do if we fail?
|
|
mprotect(reinterpret_cast<void*>(seg_page_start), seg_page_end - seg_page_start, PROT_READ);
|
|
}
|
|
}
|
|
|
|
// The program startup function __libc_init() defined here is
|
|
// used for static executables only (i.e. those that don't depend
|
|
// on shared libraries). It is called from arch-$ARCH/bionic/crtbegin_static.S
|
|
// which is directly invoked by the kernel when the program is launched.
|
|
//
|
|
// The 'structors' parameter contains pointers to various initializer
|
|
// arrays that must be run before the program's 'main' routine is launched.
|
|
|
|
__noreturn void __libc_init(void* raw_args,
|
|
void (*onexit)(void) __unused,
|
|
int (*slingshot)(int, char**, char**),
|
|
structors_array_t const * const structors) {
|
|
BIONIC_STOP_UNWIND;
|
|
|
|
KernelArgumentBlock args(raw_args);
|
|
|
|
// Initializing the globals requires TLS to be available for errno.
|
|
__libc_init_main_thread(args);
|
|
__libc_init_globals(args);
|
|
|
|
__libc_init_AT_SECURE(args);
|
|
__libc_init_common(args);
|
|
|
|
apply_gnu_relro();
|
|
|
|
// Several Linux ABIs don't pass the onexit pointer, and the ones that
|
|
// do never use it. Therefore, we ignore it.
|
|
|
|
call_array(structors->preinit_array);
|
|
call_array(structors->init_array);
|
|
|
|
// The executable may have its own destructors listed in its .fini_array
|
|
// so we need to ensure that these are called when the program exits
|
|
// normally.
|
|
if (structors->fini_array != NULL) {
|
|
__cxa_atexit(__libc_fini,structors->fini_array,NULL);
|
|
}
|
|
|
|
exit(slingshot(args.argc, args.argv, args.envp));
|
|
}
|
|
|
|
static uint32_t g_target_sdk_version{__ANDROID_API__};
|
|
|
|
extern "C" uint32_t android_get_application_target_sdk_version() {
|
|
return g_target_sdk_version;
|
|
}
|
|
|
|
uint32_t bionic_get_application_target_sdk_version() {
|
|
return android_get_application_target_sdk_version();
|
|
}
|
|
|
|
extern "C" void android_set_application_target_sdk_version(uint32_t target) {
|
|
g_target_sdk_version = target;
|
|
}
|