blob: 2824340f72469e967856ec1c239eac346ddbb2c8 [file] [log] [blame]
Elliott Hughes42d949f2016-01-06 19:51:43 -08001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
29#include "libc_init_common.h"
30
Ryan Prichard45d13492019-01-03 02:51:30 -080031#include <async_safe/log.h>
32
Josh Gaob6453c52016-06-29 16:47:53 -070033#include "private/KernelArgumentBlock.h"
Josh Gaoa170d9b2016-11-10 16:08:29 -080034#include "private/bionic_arc4random.h"
dimitryb6d2b872017-10-18 15:15:54 +020035#include "private/bionic_defs.h"
Ryan Prichard45d13492019-01-03 02:51:30 -080036#include "private/bionic_elf_tls.h"
Elliott Hughes42d949f2016-01-06 19:51:43 -080037#include "private/bionic_globals.h"
Josh Gaob6453c52016-06-29 16:47:53 -070038#include "private/bionic_ssp.h"
Elliott Hughes42d949f2016-01-06 19:51:43 -080039#include "pthread_internal.h"
40
Priyanka Advani (xWF)c9dcd822025-07-17 15:45:36 -070041extern "C" pid_t __getpid();
Elliott Hughes42d949f2016-01-06 19:51:43 -080042extern "C" int __set_tid_address(int* tid_address);
43
Josh Gaob6453c52016-06-29 16:47:53 -070044// Declared in "private/bionic_ssp.h".
45uintptr_t __stack_chk_guard = 0;
46
Florian Mayer4edc20d2024-10-30 14:24:26 -070047BIONIC_USED_BEFORE_LINKER_RELOCATES static pthread_internal_t main_thread;
Evgenii Stepanov13e8dcb2018-09-19 16:29:12 -070048
Elliott Hughes42d949f2016-01-06 19:51:43 -080049// Setup for the main thread. For dynamic executables, this is called by the
50// linker _before_ libc is mapped in memory. This means that all writes to
51// globals from this function will apply to linker-private copies and will not
52// be visible from libc later on.
53//
54// Note: this function creates a pthread_internal_t for the initial thread and
55// stores the pointer in TLS, but does not add it to pthread's thread list. This
56// has to be done later from libc itself (see __libc_init_common).
57//
58// This is in a file by itself because it needs to be built with
59// -fno-stack-protector because it's responsible for setting up the main
Ryan Prichard249757b2019-11-01 17:18:28 -070060// thread's TLS (which stack protector relies on). It's also built with
61// -ffreestanding because the early init function runs in the linker before
62// ifunc resolvers have run.
Elliott Hughes42d949f2016-01-06 19:51:43 -080063
Ryan Prichard9cfca862018-11-22 02:44:09 -080064// Do enough setup to:
65// - Let the dynamic linker invoke system calls (and access errno)
66// - Ensure that TLS access functions (__get_{tls,thread}) never return NULL
67// - Allow the stack protector to work (with a zero cookie)
68// Avoid doing much more because, when this code is called within the dynamic
69// linker, the linker binary hasn't been relocated yet, so certain kinds of code
Ryan Prichard249757b2019-11-01 17:18:28 -070070// are hazardous, such as accessing non-hidden global variables or calling
71// string.h functions.
dimitryb6d2b872017-10-18 15:15:54 +020072__BIONIC_WEAK_FOR_NATIVE_BRIDGE
Ryan Prichard45d13492019-01-03 02:51:30 -080073extern "C" void __libc_init_main_thread_early(const KernelArgumentBlock& args,
74 bionic_tcb* temp_tcb) {
Ryan Prichard5a664902018-11-22 02:14:14 -080075 __libc_shared_globals()->auxv = args.auxv;
Mingwei Shibe910522015-11-12 07:02:14 +000076#if defined(__i386__)
Ryan Prichard45d13492019-01-03 02:51:30 -080077 __libc_init_sysinfo(); // uses AT_SYSINFO auxv entry
Mingwei Shibe910522015-11-12 07:02:14 +000078#endif
Ryan Prichard45d13492019-01-03 02:51:30 -080079 __init_tcb(temp_tcb, &main_thread);
Ryan Prichard16455b52019-01-18 01:00:59 -080080 __init_tcb_dtv(temp_tcb);
Ryan Prichard45d13492019-01-03 02:51:30 -080081 __set_tls(&temp_tcb->tls_slot(0));
Priyanka Advani (xWF)c9dcd822025-07-17 15:45:36 -070082 main_thread.tid = __getpid();
Ryan Prichard9cfca862018-11-22 02:44:09 -080083 main_thread.set_cached_pid(main_thread.tid);
Peter Collingbourne5f45c182020-01-14 17:59:41 -080084 main_thread.stack_top = reinterpret_cast<uintptr_t>(args.argv);
Florian Mayera3809542024-12-12 05:43:28 -080085 main_thread.stack_bottom = 0;
Ryan Prichard9cfca862018-11-22 02:44:09 -080086}
87
Ryan Prichard249757b2019-11-01 17:18:28 -070088// This code is used both by each new pthread and the code that initializes the main thread.
89void __init_tcb(bionic_tcb* tcb, pthread_internal_t* thread) {
90#ifdef TLS_SLOT_SELF
91 // On x86, slot 0 must point to itself so code can read the thread pointer by
92 // loading %fs:0 or %gs:0.
93 tcb->tls_slot(TLS_SLOT_SELF) = &tcb->tls_slot(TLS_SLOT_SELF);
94#endif
95 tcb->tls_slot(TLS_SLOT_THREAD_ID) = thread;
96}
97
98void __init_tcb_dtv(bionic_tcb* tcb) {
99 // Initialize the DTV slot to a statically-allocated empty DTV. The first
100 // access to a dynamic TLS variable allocates a new DTV.
101 static const TlsDtv zero_dtv = {};
102 __set_tcb_dtv(tcb, const_cast<TlsDtv*>(&zero_dtv));
103}
104
Elliott Hughesa1e3f2c2020-09-10 18:26:08 -0700105// This is public so that the zygote can call it too. It is not expected
106// to be useful otherwise.
107//
108// Note in particular that it is not possible to return from any existing
109// stack frame with stack protector enabled after this function is called.
110extern "C" void android_reset_stack_guards() {
111 // The TLS stack guard is set from the global, so ensure that we've initialized the global
112 // before we initialize the TLS. Dynamic executables will initialize their copy of the global
113 // stack protector from the one in the main thread's TLS.
114 __libc_safe_arc4random_buf(&__stack_chk_guard, sizeof(__stack_chk_guard));
115 __init_tcb_stack_guard(__get_bionic_tcb());
116}
117
Ryan Prichard9cfca862018-11-22 02:44:09 -0800118// Finish initializing the main thread.
119__BIONIC_WEAK_FOR_NATIVE_BRIDGE
Ryan Prichard45d13492019-01-03 02:51:30 -0800120extern "C" void __libc_init_main_thread_late() {
121 __init_bionic_tls_ptrs(__get_bionic_tcb(), __allocate_temp_bionic_tls());
Elliott Hughes42d949f2016-01-06 19:51:43 -0800122
123 // Tell the kernel to clear our tid field when we exit, so we're like any other pthread.
Ryan Prichard45d13492019-01-03 02:51:30 -0800124 // For threads created by pthread_create, this setup happens during the clone syscall (i.e.
125 // CLONE_CHILD_CLEARTID).
Ryan Prichard9cfca862018-11-22 02:44:09 -0800126 __set_tid_address(&main_thread.tid);
Elliott Hughes42d949f2016-01-06 19:51:43 -0800127
Elliott Hughes42d949f2016-01-06 19:51:43 -0800128 pthread_attr_init(&main_thread.attr);
Elliott Hughes374848a2017-10-26 12:54:32 -0700129 // We don't want to explicitly set the main thread's scheduler attributes (http://b/68328561).
130 pthread_attr_setinheritsched(&main_thread.attr, PTHREAD_INHERIT_SCHED);
131 // The main thread has no guard page.
132 pthread_attr_setguardsize(&main_thread.attr, 0);
133 // User code should never see this; we'll compute it when asked.
134 pthread_attr_setstacksize(&main_thread.attr, 0);
Elliott Hughes42d949f2016-01-06 19:51:43 -0800135
Elliott Hughesa1e3f2c2020-09-10 18:26:08 -0700136 android_reset_stack_guards();
Elliott Hughesfc69a8a2016-03-04 11:53:09 -0800137
Elliott Hughes42d949f2016-01-06 19:51:43 -0800138 __init_thread(&main_thread);
Elliott Hughes42d949f2016-01-06 19:51:43 -0800139
Peter Collingbourneda772e22018-09-06 22:20:44 -0700140 __init_additional_stacks(&main_thread);
Elliott Hughes42d949f2016-01-06 19:51:43 -0800141}
Ryan Prichard45d13492019-01-03 02:51:30 -0800142
143// Once all ELF modules are loaded, allocate the final copy of the main thread's
144// static TLS memory.
145__BIONIC_WEAK_FOR_NATIVE_BRIDGE
146extern "C" void __libc_init_main_thread_final() {
147 bionic_tcb* temp_tcb = __get_bionic_tcb();
148 bionic_tls* temp_tls = &__get_bionic_tls();
149
150 // Allocate the main thread's static TLS. (This mapping doesn't include a
151 // stack.)
152 ThreadMapping mapping = __allocate_thread_mapping(0, PTHREAD_GUARD_SIZE);
153 if (mapping.mmap_base == nullptr) {
Elliott Hughes2557f732023-07-12 21:15:23 +0000154 async_safe_fatal("failed to mmap main thread static TLS: %m");
Ryan Prichard45d13492019-01-03 02:51:30 -0800155 }
156
157 const StaticTlsLayout& layout = __libc_shared_globals()->static_tls_layout;
158 auto new_tcb = reinterpret_cast<bionic_tcb*>(mapping.static_tls + layout.offset_bionic_tcb());
159 auto new_tls = reinterpret_cast<bionic_tls*>(mapping.static_tls + layout.offset_bionic_tls());
Vilas Bhat836370e2025-04-25 01:16:36 +0000160 auto new_lb = reinterpret_cast<libgen_buffers*>(mapping.libgen_buffers);
Ryan Prichard45d13492019-01-03 02:51:30 -0800161
Ryan Prichard361c1b42019-01-15 13:45:27 -0800162 __init_static_tls(mapping.static_tls);
Ryan Prichard45d13492019-01-03 02:51:30 -0800163 new_tcb->copy_from_bootstrap(temp_tcb);
164 new_tls->copy_from_bootstrap(temp_tls);
165 __init_tcb(new_tcb, &main_thread);
166 __init_bionic_tls_ptrs(new_tcb, new_tls);
Vilas Bhat836370e2025-04-25 01:16:36 +0000167 __init_libgen_buffers_ptr(new_tls, new_lb);
Ryan Prichard45d13492019-01-03 02:51:30 -0800168
169 main_thread.mmap_base = mapping.mmap_base;
170 main_thread.mmap_size = mapping.mmap_size;
Ryan Prichard03cef382019-06-17 17:57:19 -0700171 main_thread.mmap_base_unguarded = mapping.mmap_base_unguarded;
172 main_thread.mmap_size_unguarded = mapping.mmap_size_unguarded;
Ryan Prichard45d13492019-01-03 02:51:30 -0800173
174 __set_tls(&new_tcb->tls_slot(0));
175
Ryan Prichard03cef382019-06-17 17:57:19 -0700176 __set_stack_and_tls_vma_name(true);
Ryan Prichard45d13492019-01-03 02:51:30 -0800177 __free_temp_bionic_tls(temp_tls);
178}