1 /* -*- mode: C++; c-basic-offset: 4; tab-width: 4 -*-
3 * Copyright (c) 2004-2013 Apple Inc. All rights reserved.
5 * @APPLE_LICENSE_HEADER_START@
7 * This file contains Original Code and/or Modifications of Original Code
8 * as defined in and that are subject to the Apple Public Source License
9 * Version 2.0 (the 'License'). You may not use this file except in
10 * compliance with the License. Please obtain a copy of the License at
11 * http://www.opensource.apple.com/apsl/ and read it before using this
14 * The Original Code and all software distributed under the License are
15 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
16 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
17 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
19 * Please see the License for the specific language governing rights and
20 * limitations under the License.
22 * @APPLE_LICENSE_HEADER_END@
31 #include <sys/param.h>
32 #include <mach/mach_time.h> // mach_absolute_time()
33 #include <mach/mach_init.h>
34 #include <sys/types.h>
36 #include <sys/syscall.h>
37 #include <sys/socket.h>
39 #include <sys/syslog.h>
41 #include <mach-o/fat.h>
42 #include <mach-o/loader.h>
43 #include <mach-o/ldsyms.h>
44 #include <libkern/OSByteOrder.h>
45 #include <libkern/OSAtomic.h>
46 #include <mach/mach.h>
47 #include <sys/sysctl.h>
49 #include <sys/dtrace.h>
50 #include <libkern/OSAtomic.h>
51 #include <Availability.h>
52 #include <System/sys/codesign.h>
53 #include <System/sys/csr.h>
55 #include <os/lock_private.h>
58 #ifndef CPU_SUBTYPE_ARM_V5TEJ
59 #define CPU_SUBTYPE_ARM_V5TEJ ((cpu_subtype_t) 7)
61 #ifndef CPU_SUBTYPE_ARM_XSCALE
62 #define CPU_SUBTYPE_ARM_XSCALE ((cpu_subtype_t) 8)
64 #ifndef CPU_SUBTYPE_ARM_V7
65 #define CPU_SUBTYPE_ARM_V7 ((cpu_subtype_t) 9)
67 #ifndef CPU_SUBTYPE_ARM_V7F
68 #define CPU_SUBTYPE_ARM_V7F ((cpu_subtype_t) 10)
70 #ifndef CPU_SUBTYPE_ARM_V7S
71 #define CPU_SUBTYPE_ARM_V7S ((cpu_subtype_t) 11)
73 #ifndef CPU_SUBTYPE_ARM_V7K
74 #define CPU_SUBTYPE_ARM_V7K ((cpu_subtype_t) 12)
76 #ifndef LC_DYLD_ENVIRONMENT
77 #define LC_DYLD_ENVIRONMENT 0x27
80 #ifndef CPU_SUBTYPE_X86_64_H
81 #define CPU_SUBTYPE_X86_64_H ((cpu_subtype_t) 8)
85 #define VM_PROT_SLIDE 0x20
91 #include "mach-o/dyld_gdb.h"
94 #include "ImageLoader.h"
95 #include "ImageLoaderMachO.h"
96 #include "dyldLibSystemInterface.h"
97 #include "dyldSyscallInterface.h"
98 #if DYLD_SHARED_CACHE_SUPPORT
99 #include "dyld_cache_format.h"
101 #include <coreSymbolicationDyldSupport.h>
102 #if TARGET_IPHONE_SIMULATOR
103 extern "C" void xcoresymbolication_load_notifier(void *connection
, uint64_t load_timestamp
, const char *image_path
, const struct mach_header
*mach_header
);
104 extern "C" void xcoresymbolication_unload_notifier(void *connection
, uint64_t unload_timestamp
, const char *image_path
, const struct mach_header
*mach_header
);
105 #define coresymbolication_load_notifier(c, t, p, h) xcoresymbolication_load_notifier(c, t, p, h)
106 #define coresymbolication_unload_notifier(c, t, p, h) xcoresymbolication_unload_notifier(c, t, p, h)
109 // not libc header for send() syscall interface
110 extern "C" ssize_t
__sendto(int, const void *, size_t, int, const struct sockaddr
*, socklen_t
);
113 // ARM and x86_64 are the only architecture that use cpu-sub-types
114 #define CPU_SUBTYPES_SUPPORTED ((__arm__ || __x86_64__) && !TARGET_IPHONE_SIMULATOR)
117 #define LC_SEGMENT_COMMAND LC_SEGMENT_64
118 #define LC_SEGMENT_COMMAND_WRONG LC_SEGMENT
119 #define macho_segment_command segment_command_64
120 #define macho_section section_64
122 #define LC_SEGMENT_COMMAND LC_SEGMENT
123 #define LC_SEGMENT_COMMAND_WRONG LC_SEGMENT_64
124 #define macho_segment_command segment_command
125 #define macho_section section
130 #define CPU_TYPE_MASK 0x00FFFFFF /* complement of CPU_ARCH_MASK */
133 /* implemented in dyld_gdb.cpp */
134 extern void addImagesToAllImages(uint32_t infoCount
, const dyld_image_info info
[]);
135 extern void removeImageFromAllImages(const mach_header
* mh
);
136 extern void setAlImageInfosHalt(const char* message
, uintptr_t flags
);
137 extern void addNonSharedCacheImageUUID(const dyld_uuid_info
& info
);
138 extern const char* notifyGDB(enum dyld_image_states state
, uint32_t infoCount
, const dyld_image_info info
[]);
140 // magic so CrashReporter logs message
142 char error_string
[1024];
144 // implemented in dyldStartup.s for CrashReporter
145 extern "C" void dyld_fatal_error(const char* errString
) __attribute__((noreturn
));
147 // magic linker symbol for start of dyld binary
148 extern "C" const macho_header __dso_handle
;
152 // The file contains the core of dyld used to get a process to main().
153 // The API's that dyld supports are implemented in dyldAPIs.cpp.
160 struct RegisteredDOF
{ const mach_header
* mh
; int registrationID
; };
161 struct DylibOverride
{ const char* installName
; const char* override
; };
165 VECTOR_NEVER_DESTRUCTED(ImageLoader
*);
166 VECTOR_NEVER_DESTRUCTED(dyld::RegisteredDOF
);
167 VECTOR_NEVER_DESTRUCTED(dyld::ImageCallback
);
168 VECTOR_NEVER_DESTRUCTED(dyld::DylibOverride
);
169 VECTOR_NEVER_DESTRUCTED(ImageLoader::DynamicReference
);
171 VECTOR_NEVER_DESTRUCTED(dyld_image_state_change_handler
);
177 // state of all environment variables dyld uses
179 struct EnvironmentVariables
{
180 const char* const * DYLD_FRAMEWORK_PATH
;
181 const char* const * DYLD_FALLBACK_FRAMEWORK_PATH
;
182 const char* const * DYLD_LIBRARY_PATH
;
183 const char* const * DYLD_FALLBACK_LIBRARY_PATH
;
184 const char* const * DYLD_INSERT_LIBRARIES
;
185 const char* const * LD_LIBRARY_PATH
; // for unix conformance
186 const char* const * DYLD_VERSIONED_LIBRARY_PATH
;
187 const char* const * DYLD_VERSIONED_FRAMEWORK_PATH
;
188 bool DYLD_PRINT_LIBRARIES
;
189 bool DYLD_PRINT_LIBRARIES_POST_LAUNCH
;
190 bool DYLD_BIND_AT_LAUNCH
;
191 bool DYLD_PRINT_STATISTICS
;
192 bool DYLD_PRINT_OPTS
;
194 bool DYLD_DISABLE_DOFS
;
195 bool DYLD_PRINT_CS_NOTIFICATIONS
;
196 // DYLD_SHARED_CACHE_DONT_VALIDATE ==> sSharedCacheIgnoreInodeAndTimeStamp
197 // DYLD_SHARED_CACHE_DIR ==> sSharedCacheDir
198 // DYLD_ROOT_PATH ==> gLinkContext.rootPaths
199 // DYLD_IMAGE_SUFFIX ==> gLinkContext.imageSuffix
200 // DYLD_PRINT_OPTS ==> gLinkContext.verboseOpts
201 // DYLD_PRINT_ENV ==> gLinkContext.verboseEnv
202 // DYLD_FORCE_FLAT_NAMESPACE ==> gLinkContext.bindFlat
203 // DYLD_PRINT_INITIALIZERS ==> gLinkContext.verboseInit
204 // DYLD_PRINT_SEGMENTS ==> gLinkContext.verboseMapping
205 // DYLD_PRINT_BINDINGS ==> gLinkContext.verboseBind
206 // DYLD_PRINT_WEAK_BINDINGS ==> gLinkContext.verboseWeakBind
207 // DYLD_PRINT_REBASINGS ==> gLinkContext.verboseRebase
208 // DYLD_PRINT_DOFS ==> gLinkContext.verboseDOF
209 // DYLD_PRINT_APIS ==> gLogAPIs
210 // DYLD_IGNORE_PREBINDING ==> gLinkContext.prebindUsage
211 // DYLD_PREBIND_DEBUG ==> gLinkContext.verbosePrebinding
212 // DYLD_NEW_LOCAL_SHARED_REGIONS ==> gLinkContext.sharedRegionMode
213 // DYLD_SHARED_REGION ==> gLinkContext.sharedRegionMode
214 // DYLD_PRINT_WARNINGS ==> gLinkContext.verboseWarnings
215 // DYLD_PRINT_RPATHS ==> gLinkContext.verboseRPaths
216 // DYLD_PRINT_INTERPOSING ==> gLinkContext.verboseInterposing
221 typedef std::vector
<dyld_image_state_change_handler
> StateHandlers
;
224 enum RestrictedReason
{ restrictedNot
, restrictedBySetGUid
, restrictedBySegment
, restrictedByEntitlements
};
227 static const char* sExecPath
= NULL
;
228 static const char* sExecShortName
= NULL
;
229 static const macho_header
* sMainExecutableMachHeader
= NULL
;
230 #if CPU_SUBTYPES_SUPPORTED
231 static cpu_type_t sHostCPU
;
232 static cpu_subtype_t sHostCPUsubtype
;
234 static ImageLoader
* sMainExecutable
= NULL
;
235 static bool sProcessIsRestricted
= false;
236 static bool sProcessRequiresLibraryValidation
= false;
237 static RestrictedReason sRestrictedReason
= restrictedNot
;
238 static size_t sInsertedDylibCount
= 0;
239 static std::vector
<ImageLoader
*> sAllImages
;
240 static std::vector
<ImageLoader
*> sImageRoots
;
241 static std::vector
<ImageLoader
*> sImageFilesNeedingTermination
;
242 static std::vector
<RegisteredDOF
> sImageFilesNeedingDOFUnregistration
;
243 static std::vector
<ImageCallback
> sAddImageCallbacks
;
244 static std::vector
<ImageCallback
> sRemoveImageCallbacks
;
245 static bool sRemoveImageCallbacksInUse
= false;
246 static void* sSingleHandlers
[7][3];
247 static void* sBatchHandlers
[7][3];
248 static ImageLoader
* sLastImageByAddressCache
;
249 static EnvironmentVariables sEnv
;
250 #if __MAC_OS_X_VERSION_MIN_REQUIRED
251 static const char* sFrameworkFallbackPaths
[] = { "$HOME/Library/Frameworks", "/Library/Frameworks", "/Network/Library/Frameworks", "/System/Library/Frameworks", NULL
};
252 static const char* sLibraryFallbackPaths
[] = { "$HOME/lib", "/usr/local/lib", "/usr/lib", NULL
};
254 static const char* sFrameworkFallbackPaths
[] = { "/System/Library/Frameworks", NULL
};
255 static const char* sLibraryFallbackPaths
[] = { "/usr/local/lib", "/usr/lib", NULL
};
257 static UndefinedHandler sUndefinedHandler
= NULL
;
258 static ImageLoader
* sBundleBeingLoaded
= NULL
; // hack until OFI is reworked
259 #if DYLD_SHARED_CACHE_SUPPORT
260 static const dyld_cache_header
* sSharedCache
= NULL
;
261 static long sSharedCacheSlide
= 0;
262 static bool sSharedCacheIgnoreInodeAndTimeStamp
= false;
263 bool gSharedCacheOverridden
= false;
264 #if __IPHONE_OS_VERSION_MIN_REQUIRED
265 static const char* sSharedCacheDir
= IPHONE_DYLD_SHARED_CACHE_DIR
;
266 static bool sDylibsOverrideCache
= false;
267 #define ENABLE_DYLIBS_TO_OVERRIDE_CACHE_SIZE 1024
269 static const char* sSharedCacheDir
= MACOSX_DYLD_SHARED_CACHE_DIR
;
272 ImageLoader::LinkContext gLinkContext
;
273 bool gLogAPIs
= false;
274 const struct LibSystemHelpers
* gLibSystemHelpers
= NULL
;
275 #if SUPPORT_OLD_CRT_INITIALIZATION
276 bool gRunInitializersOldWay
= false;
278 static std::vector
<DylibOverride
> sDylibOverrides
;
279 #if !TARGET_IPHONE_SIMULATOR
280 static int sLogSocket
= -1;
282 static bool sFrameworksFoundAsDylibs
= false;
284 static bool sHaswell
= false;
286 static std::vector
<ImageLoader::DynamicReference
> sDynamicReferences
;
287 static OSSpinLock sDynamicReferencesLock
= 0;
288 static bool sLogToFile
= false;
289 static char sLoadingCrashMessage
[1024] = "dyld: launch, loading dependent libraries";
292 // The MappedRanges structure is used for fast address->image lookups.
293 // The table is only updated when the dyld lock is held, so we don't
294 // need to worry about multiple writers. But readers may look at this
295 // data without holding the lock. Therefore, all updates must be done
296 // in an order that will never cause readers to see inconsistent data.
297 // The general rule is that if the image field is non-NULL then
298 // the other fields are valid.
311 static MappedRanges sMappedRangesStart
;
313 void addMappedRange(ImageLoader
* image
, uintptr_t start
, uintptr_t end
)
315 //dyld::log("addMappedRange(0x%lX->0x%lX) for %s\n", start, end, image->getShortName());
316 for (MappedRanges
* p
= &sMappedRangesStart
; p
!= NULL
; p
= p
->next
) {
317 for (int i
=0; i
< MappedRanges::count
; ++i
) {
318 if ( p
->array
[i
].image
== NULL
) {
319 p
->array
[i
].start
= start
;
320 p
->array
[i
].end
= end
;
321 // add image field last with a barrier so that any reader will see consistent records
323 p
->array
[i
].image
= image
;
328 // table must be full, chain another
329 MappedRanges
* newRanges
= (MappedRanges
*)malloc(sizeof(MappedRanges
));
330 bzero(newRanges
, sizeof(MappedRanges
));
331 newRanges
->array
[0].start
= start
;
332 newRanges
->array
[0].end
= end
;
333 newRanges
->array
[0].image
= image
;
334 for (MappedRanges
* p
= &sMappedRangesStart
; p
!= NULL
; p
= p
->next
) {
335 if ( p
->next
== NULL
) {
343 void removedMappedRanges(ImageLoader
* image
)
345 for (MappedRanges
* p
= &sMappedRangesStart
; p
!= NULL
; p
= p
->next
) {
346 for (int i
=0; i
< MappedRanges::count
; ++i
) {
347 if ( p
->array
[i
].image
== image
) {
348 // clear with a barrier so that any reader will see consistent records
350 p
->array
[i
].image
= NULL
;
356 ImageLoader
* findMappedRange(uintptr_t target
)
358 for (MappedRanges
* p
= &sMappedRangesStart
; p
!= NULL
; p
= p
->next
) {
359 for (int i
=0; i
< MappedRanges::count
; ++i
) {
360 if ( p
->array
[i
].image
!= NULL
) {
361 if ( (p
->array
[i
].start
<= target
) && (target
< p
->array
[i
].end
) )
362 return p
->array
[i
].image
;
371 const char* mkstringf(const char* format
, ...)
373 _SIMPLE_STRING buf
= _simple_salloc();
376 va_start(list
, format
);
377 _simple_vsprintf(buf
, format
, list
);
379 const char* t
= strdup(_simple_string(buf
));
384 return "mkstringf, out of memory error";
388 void throwf(const char* format
, ...)
390 _SIMPLE_STRING buf
= _simple_salloc();
393 va_start(list
, format
);
394 _simple_vsprintf(buf
, format
, list
);
396 const char* t
= strdup(_simple_string(buf
));
401 throw "throwf, out of memory error";
405 #if !TARGET_IPHONE_SIMULATOR
406 static int sLogfile
= STDERR_FILENO
;
410 static int sBindingsLogfile
= -1;
411 static void mysprintf(char* dst
, const char* format
, ...)
413 _SIMPLE_STRING buf
= _simple_salloc();
416 va_start(list
, format
);
417 _simple_vsprintf(buf
, format
, list
);
419 strcpy(dst
, _simple_string(buf
));
423 strcpy(dst
, "out of memory");
426 void logBindings(const char* format
, ...)
428 if ( sBindingsLogfile
!= -1 ) {
430 va_start(list
, format
);
431 _simple_vdprintf(sBindingsLogfile
, format
, list
);
437 #if !TARGET_IPHONE_SIMULATOR
438 // based on CFUtilities.c: also_do_stderr()
439 static bool useSyslog()
441 // Use syslog() for processes managed by launchd
442 if ( (gLibSystemHelpers
!= NULL
) && (gLibSystemHelpers
->version
>= 11) ) {
443 if ( (*gLibSystemHelpers
->isLaunchdOwned
)() ) {
448 // If stderr is not available, use syslog()
450 int result
= fstat(STDERR_FILENO
, &sb
);
452 return true; // file descriptor 2 is closed
458 static void socket_syslogv(int priority
, const char* format
, va_list list
)
460 // lazily create socket and connection to syslogd
461 if ( sLogSocket
== -1 ) {
462 sLogSocket
= ::socket(AF_UNIX
, SOCK_DGRAM
, 0);
463 if (sLogSocket
== -1)
464 return; // cannot log
465 ::fcntl(sLogSocket
, F_SETFD
, 1);
467 struct sockaddr_un addr
;
468 addr
.sun_family
= AF_UNIX
;
469 strncpy(addr
.sun_path
, _PATH_LOG
, sizeof(addr
.sun_path
));
470 if ( ::connect(sLogSocket
, (struct sockaddr
*)&addr
, sizeof(addr
)) == -1 ) {
477 // format message to syslogd like: "<priority>Process[pid]: message"
478 _SIMPLE_STRING buf
= _simple_salloc();
481 if ( _simple_sprintf(buf
, "<%d>%s[%d]: ", LOG_USER
|LOG_NOTICE
, sExecShortName
, getpid()) == 0 ) {
482 if ( _simple_vsprintf(buf
, format
, list
) == 0 ) {
483 const char* p
= _simple_string(buf
);
484 ::__sendto(sLogSocket
, p
, strlen(p
), 0, NULL
, 0);
490 void vlog(const char* format
, va_list list
)
492 if ( !sLogToFile
&& useSyslog() )
493 socket_syslogv(LOG_ERR
, format
, list
);
495 _simple_vdprintf(sLogfile
, format
, list
);
499 void log(const char* format
, ...)
502 va_start(list
, format
);
508 void vwarn(const char* format
, va_list list
)
510 _simple_dprintf(sLogfile
, "dyld: warning, ");
511 _simple_vdprintf(sLogfile
, format
, list
);
514 void warn(const char* format
, ...)
517 va_start(list
, format
);
523 #endif // !TARGET_IPHONE_SIMULATOR
526 // <rdar://problem/8867781> control access to sAllImages through a lock
527 // because global dyld lock is not held during initialization phase of dlopen()
528 // <rdar://problem/16145518> Use OSSpinLockLock to allow yielding
529 static OSSpinLock sAllImagesLock
= 0;
531 static void allImagesLock()
533 OSSpinLockLock(&sAllImagesLock
);
536 static void allImagesUnlock()
538 OSSpinLockUnlock(&sAllImagesLock
);
542 // utility class to assure files are closed when an exception is thrown
545 FileOpener(const char* path
);
547 int getFileDescriptor() { return fd
; }
552 FileOpener::FileOpener(const char* path
)
555 fd
= my_open(path
, O_RDONLY
, 0);
558 FileOpener::~FileOpener()
565 static void registerDOFs(const std::vector
<ImageLoader::DOFInfo
>& dofs
)
567 const size_t dofSectionCount
= dofs
.size();
568 if ( !sEnv
.DYLD_DISABLE_DOFS
&& (dofSectionCount
!= 0) ) {
569 int fd
= open("/dev/" DTRACEMNR_HELPER
, O_RDWR
);
571 //dyld::warn("can't open /dev/" DTRACEMNR_HELPER " to register dtrace DOF sections\n");
574 // allocate a buffer on the stack for the variable length dof_ioctl_data_t type
575 uint8_t buffer
[sizeof(dof_ioctl_data_t
) + dofSectionCount
*sizeof(dof_helper_t
)];
576 dof_ioctl_data_t
* ioctlData
= (dof_ioctl_data_t
*)buffer
;
578 // fill in buffer with one dof_helper_t per DOF section
579 ioctlData
->dofiod_count
= dofSectionCount
;
580 for (unsigned int i
=0; i
< dofSectionCount
; ++i
) {
581 strlcpy(ioctlData
->dofiod_helpers
[i
].dofhp_mod
, dofs
[i
].imageShortName
, DTRACE_MODNAMELEN
);
582 ioctlData
->dofiod_helpers
[i
].dofhp_dof
= (uintptr_t)(dofs
[i
].dof
);
583 ioctlData
->dofiod_helpers
[i
].dofhp_addr
= (uintptr_t)(dofs
[i
].dof
);
586 // tell kernel about all DOF sections en mas
587 // pass pointer to ioctlData because ioctl() only copies a fixed size amount of data into kernel
588 user_addr_t val
= (user_addr_t
)(unsigned long)ioctlData
;
589 if ( ioctl(fd
, DTRACEHIOC_ADDDOF
, &val
) != -1 ) {
590 // kernel returns a unique identifier for each section in the dofiod_helpers[].dofhp_dof field.
591 for (unsigned int i
=0; i
< dofSectionCount
; ++i
) {
593 info
.mh
= dofs
[i
].imageHeader
;
594 info
.registrationID
= (int)(ioctlData
->dofiod_helpers
[i
].dofhp_dof
);
595 sImageFilesNeedingDOFUnregistration
.push_back(info
);
596 if ( gLinkContext
.verboseDOF
) {
597 dyld::log("dyld: registering DOF section %p in %s with dtrace, ID=0x%08X\n",
598 dofs
[i
].dof
, dofs
[i
].imageShortName
, info
.registrationID
);
603 //dyld::log( "dyld: ioctl to register dtrace DOF section failed\n");
610 static void unregisterDOF(int registrationID
)
612 int fd
= open("/dev/" DTRACEMNR_HELPER
, O_RDWR
);
614 dyld::warn("can't open /dev/" DTRACEMNR_HELPER
" to unregister dtrace DOF section\n");
617 ioctl(fd
, DTRACEHIOC_REMOVE
, registrationID
);
619 if ( gLinkContext
.verboseInit
)
620 dyld::warn("unregistering DOF section ID=0x%08X with dtrace\n", registrationID
);
626 // _dyld_register_func_for_add_image() is implemented as part of the general image state change notification
628 static void notifyAddImageCallbacks(ImageLoader
* image
)
630 // use guard so that we cannot notify about the same image twice
631 if ( ! image
->addFuncNotified() ) {
632 for (std::vector
<ImageCallback
>::iterator it
=sAddImageCallbacks
.begin(); it
!= sAddImageCallbacks
.end(); it
++)
633 (*it
)(image
->machHeader(), image
->getSlide());
634 image
->setAddFuncNotified();
640 // notify gdb about these new images
641 static const char* updateAllImages(enum dyld_image_states state
, uint32_t infoCount
, const struct dyld_image_info info
[])
643 // <rdar://problem/8812589> don't add images without paths to all-image-info-list
644 if ( info
[0].imageFilePath
!= NULL
)
645 addImagesToAllImages(infoCount
, info
);
650 static StateHandlers
* stateToHandlers(dyld_image_states state
, void* handlersArray
[7][3])
653 case dyld_image_state_mapped
:
654 return reinterpret_cast<StateHandlers
*>(&handlersArray
[0]);
656 case dyld_image_state_dependents_mapped
:
657 return reinterpret_cast<StateHandlers
*>(&handlersArray
[1]);
659 case dyld_image_state_rebased
:
660 return reinterpret_cast<StateHandlers
*>(&handlersArray
[2]);
662 case dyld_image_state_bound
:
663 return reinterpret_cast<StateHandlers
*>(&handlersArray
[3]);
665 case dyld_image_state_dependents_initialized
:
666 return reinterpret_cast<StateHandlers
*>(&handlersArray
[4]);
668 case dyld_image_state_initialized
:
669 return reinterpret_cast<StateHandlers
*>(&handlersArray
[5]);
671 case dyld_image_state_terminated
:
672 return reinterpret_cast<StateHandlers
*>(&handlersArray
[6]);
677 static void notifySingle(dyld_image_states state
, const ImageLoader
* image
)
679 //dyld::log("notifySingle(state=%d, image=%s)\n", state, image->getPath());
680 std::vector
<dyld_image_state_change_handler
>* handlers
= stateToHandlers(state
, sSingleHandlers
);
681 if ( handlers
!= NULL
) {
682 dyld_image_info info
;
683 info
.imageLoadAddress
= image
->machHeader();
684 info
.imageFilePath
= image
->getRealPath();
685 info
.imageFileModDate
= image
->lastModified();
686 for (std::vector
<dyld_image_state_change_handler
>::iterator it
= handlers
->begin(); it
!= handlers
->end(); ++it
) {
687 const char* result
= (*it
)(state
, 1, &info
);
688 if ( (result
!= NULL
) && (state
== dyld_image_state_mapped
) ) {
689 //fprintf(stderr, " image rejected by handler=%p\n", *it);
690 // make copy of thrown string so that later catch clauses can free it
691 const char* str
= strdup(result
);
696 if ( state
== dyld_image_state_mapped
) {
697 // <rdar://problem/7008875> Save load addr + UUID for images from outside the shared cache
698 if ( !image
->inSharedCache() ) {
700 if ( image
->getUUID(info
.imageUUID
) ) {
701 info
.imageLoadAddress
= image
->machHeader();
702 addNonSharedCacheImageUUID(info
);
706 // mach message csdlc about dynamically unloaded images
707 if ( image
->addFuncNotified() && (state
== dyld_image_state_terminated
) ) {
708 uint64_t loadTimestamp
= mach_absolute_time();
709 if ( sEnv
.DYLD_PRINT_CS_NOTIFICATIONS
) {
710 dyld::log("dyld: coresymbolication_unload_notifier(%p, 0x%016llX, %p, %s)\n",
711 dyld::gProcessInfo
->coreSymbolicationShmPage
, loadTimestamp
, image
->machHeader(), image
->getPath());
713 if ( dyld::gProcessInfo
->coreSymbolicationShmPage
!= NULL
) {
714 coresymbolication_unload_notifier(dyld::gProcessInfo
->coreSymbolicationShmPage
, loadTimestamp
, image
->getPath(), image
->machHeader());
723 // Normally, dyld_all_image_infos is only updated in batches after an entire
724 // graph is loaded. But if there is an error loading the initial set of
725 // dylibs needed by the main executable, dyld_all_image_infos is not yet set
726 // up, leading to usually brief crash logs.
728 // This function manually adds the images loaded so far to dyld::gProcessInfo.
729 // It should only be called before terminating.
733 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); ++it
) {
734 dyld_image_info info
;
735 ImageLoader
* image
= *it
;
736 info
.imageLoadAddress
= image
->machHeader();
737 info
.imageFilePath
= image
->getRealPath();
738 info
.imageFileModDate
= image
->lastModified();
739 // add to all_image_infos if not already there
741 int existingCount
= dyld::gProcessInfo
->infoArrayCount
;
742 const dyld_image_info
* existing
= dyld::gProcessInfo
->infoArray
;
743 if ( existing
!= NULL
) {
744 for (int i
=0; i
< existingCount
; ++i
) {
745 if ( existing
[i
].imageLoadAddress
== info
.imageLoadAddress
) {
746 //dyld::log("not adding %s\n", info.imageFilePath);
753 //dyld::log("adding %s\n", info.imageFilePath);
754 addImagesToAllImages(1, &info
);
760 static int imageSorter(const void* l
, const void* r
)
762 const ImageLoader
* left
= *((ImageLoader
**)l
);
763 const ImageLoader
* right
= *((ImageLoader
**)r
);
764 return left
->compare(right
);
767 static void notifyBatchPartial(dyld_image_states state
, bool orLater
, dyld_image_state_change_handler onlyHandler
)
769 std::vector
<dyld_image_state_change_handler
>* handlers
= stateToHandlers(state
, sBatchHandlers
);
770 if ( handlers
!= NULL
) {
771 // don't use a vector because it will use malloc/free and we want notifcation to be low cost
773 ImageLoader
* images
[sAllImages
.size()+1];
774 ImageLoader
** end
= images
;
775 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
776 dyld_image_states imageState
= (*it
)->getState();
777 if ( (imageState
== state
) || (orLater
&& (imageState
> state
)) )
780 if ( sBundleBeingLoaded
!= NULL
) {
781 dyld_image_states imageState
= sBundleBeingLoaded
->getState();
782 if ( (imageState
== state
) || (orLater
&& (imageState
> state
)) )
783 *end
++ = sBundleBeingLoaded
;
785 const char* dontLoadReason
= NULL
;
786 uint32_t count
= (uint32_t)(end
-images
);
787 if ( end
!= images
) {
789 qsort(images
, count
, sizeof(ImageLoader
*), &imageSorter
);
791 dyld_image_info infos
[count
];
792 for (unsigned int i
=0; i
< count
; ++i
) {
793 dyld_image_info
* p
= &infos
[i
];
794 ImageLoader
* image
= images
[i
];
795 //dyld::log(" state=%d, name=%s\n", state, image->getPath());
796 p
->imageLoadAddress
= image
->machHeader();
797 p
->imageFilePath
= image
->getRealPath();
798 p
->imageFileModDate
= image
->lastModified();
799 // special case for add_image hook
800 if ( state
== dyld_image_state_bound
)
801 notifyAddImageCallbacks(image
);
804 if ( onlyHandler
!= NULL
) {
805 const char* result
= (*onlyHandler
)(state
, count
, infos
);
806 if ( (result
!= NULL
) && (state
== dyld_image_state_dependents_mapped
) ) {
807 //fprintf(stderr, " images rejected by handler=%p\n", onlyHandler);
808 // make copy of thrown string so that later catch clauses can free it
809 dontLoadReason
= strdup(result
);
813 // call each handler with whole array
814 for (std::vector
<dyld_image_state_change_handler
>::iterator it
= handlers
->begin(); it
!= handlers
->end(); ++it
) {
815 const char* result
= (*it
)(state
, count
, infos
);
816 if ( (result
!= NULL
) && (state
== dyld_image_state_dependents_mapped
) ) {
817 //fprintf(stderr, " images rejected by handler=%p\n", *it);
818 // make copy of thrown string so that later catch clauses can free it
819 dontLoadReason
= strdup(result
);
824 if ( (state
== dyld_image_state_dependents_mapped
) && ((dyld::gProcessInfo
->coreSymbolicationShmPage
!= NULL
) || sEnv
.DYLD_PRINT_CS_NOTIFICATIONS
) ) {
825 // mach message csdlc about loaded images
826 uint64_t loadTimestamp
= mach_absolute_time();
827 for (unsigned j
=0; j
< count
; ++j
) {
828 if ( sEnv
.DYLD_PRINT_CS_NOTIFICATIONS
) {
829 dyld::log("dyld: coresymbolication_load_notifier(%p, 0x%016llX, %p, %s)\n",
830 dyld::gProcessInfo
->coreSymbolicationShmPage
, loadTimestamp
, infos
[j
].imageLoadAddress
, infos
[j
].imageFilePath
);
832 coresymbolication_load_notifier(dyld::gProcessInfo
->coreSymbolicationShmPage
, loadTimestamp
, infos
[j
].imageFilePath
, infos
[j
].imageLoadAddress
);
837 if ( dontLoadReason
!= NULL
)
838 throw dontLoadReason
;
844 static void notifyBatch(dyld_image_states state
)
846 notifyBatchPartial(state
, false, NULL
);
849 // In order for register_func_for_add_image() callbacks to to be called bottom up,
850 // we need to maintain a list of root images. The main executable is usally the
851 // first root. Any images dynamically added are also roots (unless already loaded).
852 // If DYLD_INSERT_LIBRARIES is used, those libraries are first.
853 static void addRootImage(ImageLoader
* image
)
855 //dyld::log("addRootImage(%p, %s)\n", image, image->getPath());
856 // add to list of roots
857 sImageRoots
.push_back(image
);
861 static void clearAllDepths()
863 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++)
867 static void printAllDepths()
869 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++)
870 dyld::log("%03d %s\n", (*it
)->getDepth(), (*it
)->getShortName());
874 static unsigned int imageCount()
876 return (unsigned int)sAllImages
.size();
880 static void setNewProgramVars(const ProgramVars
& newVars
)
882 // make a copy of the pointers to program variables
883 gLinkContext
.programVars
= newVars
;
885 // now set each program global to their initial value
886 *gLinkContext
.programVars
.NXArgcPtr
= gLinkContext
.argc
;
887 *gLinkContext
.programVars
.NXArgvPtr
= gLinkContext
.argv
;
888 *gLinkContext
.programVars
.environPtr
= gLinkContext
.envp
;
889 *gLinkContext
.programVars
.__prognamePtr
= gLinkContext
.progname
;
892 #if SUPPORT_OLD_CRT_INITIALIZATION
893 static void setRunInitialzersOldWay()
895 gRunInitializersOldWay
= true;
899 static void addDynamicReference(ImageLoader
* from
, ImageLoader
* to
) {
900 // don't add dynamic reference if either are in the shared cache
901 if( from
->inSharedCache() )
903 if( to
->inSharedCache() )
906 // don't add dynamic reference if there already is a static one
907 if ( from
->dependsOn(to
) )
910 // don't add if this combination already exists
911 OSSpinLockLock(&sDynamicReferencesLock
);
912 for (std::vector
<ImageLoader::DynamicReference
>::iterator it
=sDynamicReferences
.begin(); it
!= sDynamicReferences
.end(); ++it
) {
913 if ( (it
->from
== from
) && (it
->to
== to
) ) {
914 OSSpinLockUnlock(&sDynamicReferencesLock
);
919 //dyld::log("addDynamicReference(%s, %s\n", from->getShortName(), to->getShortName());
920 ImageLoader::DynamicReference t
;
923 sDynamicReferences
.push_back(t
);
924 OSSpinLockUnlock(&sDynamicReferencesLock
);
927 static void addImage(ImageLoader
* image
)
929 // add to master list
931 sAllImages
.push_back(image
);
934 // update mapped ranges
935 uintptr_t lastSegStart
= 0;
936 uintptr_t lastSegEnd
= 0;
937 for(unsigned int i
=0, e
=image
->segmentCount(); i
< e
; ++i
) {
938 if ( image
->segUnaccessible(i
) )
940 uintptr_t start
= image
->segActualLoadAddress(i
);
941 uintptr_t end
= image
->segActualEndAddress(i
);
942 if ( start
== lastSegEnd
) {
943 // two segments are contiguous, just record combined segments
947 // non-contiguous segments, record last (if any)
948 if ( lastSegEnd
!= 0 )
949 addMappedRange(image
, lastSegStart
, lastSegEnd
);
950 lastSegStart
= start
;
954 if ( lastSegEnd
!= 0 )
955 addMappedRange(image
, lastSegStart
, lastSegEnd
);
958 if ( sEnv
.DYLD_PRINT_LIBRARIES
|| (sEnv
.DYLD_PRINT_LIBRARIES_POST_LAUNCH
&& (sMainExecutable
!=NULL
) && sMainExecutable
->isLinked()) ) {
959 dyld::log("dyld: loaded: %s\n", image
->getPath());
965 // Helper for std::remove_if
969 RefUsesImage(ImageLoader
* image
) : _image(image
) {}
970 bool operator()(const ImageLoader::DynamicReference
& ref
) const {
971 return ( (ref
.from
== _image
) || (ref
.to
== _image
) );
979 void removeImage(ImageLoader
* image
)
981 // if has dtrace DOF section, tell dtrace it is going away, then remove from sImageFilesNeedingDOFUnregistration
982 for (std::vector
<RegisteredDOF
>::iterator it
=sImageFilesNeedingDOFUnregistration
.begin(); it
!= sImageFilesNeedingDOFUnregistration
.end(); ) {
983 if ( it
->mh
== image
->machHeader() ) {
984 unregisterDOF(it
->registrationID
);
985 sImageFilesNeedingDOFUnregistration
.erase(it
);
986 // don't increment iterator, the erase caused next element to be copied to where this iterator points
993 // tell all registered remove image handlers about this
994 // do this before removing image from internal data structures so that the callback can query dyld about the image
995 if ( image
->getState() >= dyld_image_state_bound
) {
996 sRemoveImageCallbacksInUse
= true; // This only runs inside dyld's global lock, so ok to use a global for the in-use flag.
997 for (std::vector
<ImageCallback
>::iterator it
=sRemoveImageCallbacks
.begin(); it
!= sRemoveImageCallbacks
.end(); it
++) {
998 (*it
)(image
->machHeader(), image
->getSlide());
1000 sRemoveImageCallbacksInUse
= false;
1004 notifySingle(dyld_image_state_terminated
, image
);
1006 // remove from mapped images table
1007 removedMappedRanges(image
);
1009 // remove from master list
1011 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
1012 if ( *it
== image
) {
1013 sAllImages
.erase(it
);
1019 // remove from sDynamicReferences
1020 OSSpinLockLock(&sDynamicReferencesLock
);
1021 sDynamicReferences
.erase(std::remove_if(sDynamicReferences
.begin(), sDynamicReferences
.end(), RefUsesImage(image
)), sDynamicReferences
.end());
1022 OSSpinLockUnlock(&sDynamicReferencesLock
);
1024 // flush find-by-address cache (do this after removed from master list, so there is no chance it can come back)
1025 if ( sLastImageByAddressCache
== image
)
1026 sLastImageByAddressCache
= NULL
;
1028 // if in root list, pull it out
1029 for (std::vector
<ImageLoader
*>::iterator it
=sImageRoots
.begin(); it
!= sImageRoots
.end(); it
++) {
1030 if ( *it
== image
) {
1031 sImageRoots
.erase(it
);
1037 if ( sEnv
.DYLD_PRINT_LIBRARIES
|| (sEnv
.DYLD_PRINT_LIBRARIES_POST_LAUNCH
&& (sMainExecutable
!=NULL
) && sMainExecutable
->isLinked()) ) {
1038 dyld::log("dyld: unloaded: %s\n", image
->getPath());
1041 // tell gdb, new way
1042 removeImageFromAllImages(image
->machHeader());
1046 void runImageStaticTerminators(ImageLoader
* image
)
1048 // if in termination list, pull it out and run terminator
1051 mightBeMore
= false;
1052 for (std::vector
<ImageLoader
*>::iterator it
=sImageFilesNeedingTermination
.begin(); it
!= sImageFilesNeedingTermination
.end(); it
++) {
1053 if ( *it
== image
) {
1054 sImageFilesNeedingTermination
.erase(it
);
1055 if (gLogAPIs
) dyld::log("dlclose(), running static terminators for %p %s\n", image
, image
->getShortName());
1056 image
->doTermination(gLinkContext
);
1061 } while ( mightBeMore
);
1064 static void terminationRecorder(ImageLoader
* image
)
1066 sImageFilesNeedingTermination
.push_back(image
);
1069 const char* getExecutablePath()
1074 static void runAllStaticTerminators(void* extra
)
1077 const size_t imageCount
= sImageFilesNeedingTermination
.size();
1078 for(size_t i
=imageCount
; i
> 0; --i
){
1079 ImageLoader
* image
= sImageFilesNeedingTermination
[i
-1];
1080 image
->doTermination(gLinkContext
);
1082 sImageFilesNeedingTermination
.clear();
1083 notifyBatch(dyld_image_state_terminated
);
1085 catch (const char* msg
) {
1090 void initializeMainExecutable()
1092 // record that we've reached this step
1093 gLinkContext
.startedInitializingMainExecutable
= true;
1095 // run initialzers for any inserted dylibs
1096 ImageLoader::InitializerTimingList initializerTimes
[sAllImages
.size()];
1097 initializerTimes
[0].count
= 0;
1098 const size_t rootCount
= sImageRoots
.size();
1099 if ( rootCount
> 1 ) {
1100 for(size_t i
=1; i
< rootCount
; ++i
) {
1101 sImageRoots
[i
]->runInitializers(gLinkContext
, initializerTimes
[0]);
1105 // run initializers for main executable and everything it brings up
1106 sMainExecutable
->runInitializers(gLinkContext
, initializerTimes
[0]);
1108 // register cxa_atexit() handler to run static terminators in all loaded images when this process exits
1109 if ( gLibSystemHelpers
!= NULL
)
1110 (*gLibSystemHelpers
->cxa_atexit
)(&runAllStaticTerminators
, NULL
, NULL
);
1112 // dump info if requested
1113 if ( sEnv
.DYLD_PRINT_STATISTICS
)
1114 ImageLoaderMachO::printStatistics((unsigned int)sAllImages
.size(), initializerTimes
[0]);
1117 bool mainExecutablePrebound()
1119 return sMainExecutable
->usablePrebinding(gLinkContext
);
1122 ImageLoader
* mainExecutable()
1124 return sMainExecutable
;
1130 #if SUPPORT_VERSIONED_PATHS
1132 // forward reference
1133 static bool getDylibVersionAndInstallname(const char* dylibPath
, uint32_t* version
, char* installName
);
1137 // Examines a dylib file and if its current_version is newer than the installed
1138 // dylib at its install_name, then add the dylib file to sDylibOverrides.
1140 static void checkDylibOverride(const char* dylibFile
)
1142 //dyld::log("checkDylibOverride('%s')\n", dylibFile);
1143 uint32_t altVersion
;
1144 char sysInstallName
[PATH_MAX
];
1145 if ( getDylibVersionAndInstallname(dylibFile
, &altVersion
, sysInstallName
) && (sysInstallName
[0] =='/') ) {
1146 //dyld::log("%s has version 0x%08X and install name %s\n", dylibFile, altVersion, sysInstallName);
1147 uint32_t sysVersion
;
1148 if ( getDylibVersionAndInstallname(sysInstallName
, &sysVersion
, NULL
) ) {
1149 //dyld::log("%s has version 0x%08X\n", sysInstallName, sysVersion);
1150 if ( altVersion
> sysVersion
) {
1151 //dyld::log("override found: %s -> %s\n", sysInstallName, dylibFile);
1152 // see if there already is an override for this dylib
1153 bool entryExists
= false;
1154 for (std::vector
<DylibOverride
>::iterator it
= sDylibOverrides
.begin(); it
!= sDylibOverrides
.end(); ++it
) {
1155 if ( strcmp(it
->installName
, sysInstallName
) == 0 ) {
1157 uint32_t prevVersion
;
1158 if ( getDylibVersionAndInstallname(it
->override
, &prevVersion
, NULL
) ) {
1159 if ( altVersion
> prevVersion
) {
1160 // found an even newer override
1161 free((void*)(it
->override
));
1162 char resolvedPath
[PATH_MAX
];
1163 if ( realpath(dylibFile
, resolvedPath
) != NULL
)
1164 it
->override
= strdup(resolvedPath
);
1166 it
->override
= strdup(dylibFile
);
1172 if ( ! entryExists
) {
1173 DylibOverride entry
;
1174 entry
.installName
= strdup(sysInstallName
);
1175 char resolvedPath
[PATH_MAX
];
1176 if ( realpath(dylibFile
, resolvedPath
) != NULL
)
1177 entry
.override
= strdup(resolvedPath
);
1179 entry
.override
= strdup(dylibFile
);
1180 sDylibOverrides
.push_back(entry
);
1181 //dyld::log("added override: %s -> %s\n", entry.installName, entry.override);
1189 static void checkDylibOverridesInDir(const char* dirPath
)
1191 //dyld::log("checkDylibOverridesInDir('%s')\n", dirPath);
1192 char dylibPath
[PATH_MAX
];
1193 if ( strlcpy(dylibPath
, dirPath
, PATH_MAX
) >= PATH_MAX
)
1195 DIR* dirp
= opendir(dirPath
);
1196 if ( dirp
!= NULL
) {
1198 dirent
* entp
= NULL
;
1199 while ( readdir_r(dirp
, &entry
, &entp
) == 0 ) {
1202 if ( entp
->d_type
!= DT_REG
)
1204 if ( strlcat(dylibPath
, "/", PATH_MAX
) >= PATH_MAX
)
1206 if ( strlcat(dylibPath
, entp
->d_name
, PATH_MAX
) >= PATH_MAX
)
1208 checkDylibOverride(dylibPath
);
1215 static void checkFrameworkOverridesInDir(const char* dirPath
)
1217 //dyld::log("checkFrameworkOverridesInDir('%s')\n", dirPath);
1218 char frameworkPath
[PATH_MAX
];
1219 if ( strlcpy(frameworkPath
, dirPath
, PATH_MAX
) >= PATH_MAX
)
1221 DIR* dirp
= opendir(dirPath
);
1222 if ( dirp
!= NULL
) {
1224 dirent
* entp
= NULL
;
1225 while ( readdir_r(dirp
, &entry
, &entp
) == 0 ) {
1228 if ( entp
->d_type
!= DT_DIR
)
1230 if ( strlcat(frameworkPath
, "/", PATH_MAX
) >= PATH_MAX
)
1232 int dirNameLen
= strlen(entp
->d_name
);
1233 if ( dirNameLen
< 11 )
1235 if ( strcmp(&entp
->d_name
[dirNameLen
-10], ".framework") != 0 )
1237 if ( strlcat(frameworkPath
, entp
->d_name
, PATH_MAX
) >= PATH_MAX
)
1239 if ( strlcat(frameworkPath
, "/", PATH_MAX
) >= PATH_MAX
)
1241 if ( strlcat(frameworkPath
, entp
->d_name
, PATH_MAX
) >= PATH_MAX
)
1243 frameworkPath
[strlen(frameworkPath
)-10] = '\0';
1244 checkDylibOverride(frameworkPath
);
1249 #endif // SUPPORT_VERSIONED_PATHS
1253 // Turns a colon separated list of strings into a NULL terminated array
1254 // of string pointers. If mainExecutableDir param is not NULL,
1255 // substitutes @loader_path with main executable's dir.
1257 static const char** parseColonList(const char* list
, const char* mainExecutableDir
)
1259 static const char* sEmptyList
[] = { NULL
};
1261 if ( list
[0] == '\0' )
1265 for(const char* s
=list
; *s
!= '\0'; ++s
) {
1271 const char* start
= list
;
1272 char** result
= new char*[colonCount
+2];
1273 for(const char* s
=list
; *s
!= '\0'; ++s
) {
1275 size_t len
= s
-start
;
1276 if ( (mainExecutableDir
!= NULL
) && (strncmp(start
, "@loader_path/", 13) == 0) ) {
1277 size_t mainExecDirLen
= strlen(mainExecutableDir
);
1278 char* str
= new char[mainExecDirLen
+len
+1];
1279 strcpy(str
, mainExecutableDir
);
1280 strlcat(str
, &start
[13], mainExecDirLen
+len
+1);
1281 str
[mainExecDirLen
+len
-13] = '\0';
1283 result
[index
++] = str
;
1285 else if ( (mainExecutableDir
!= NULL
) && (strncmp(start
, "@executable_path/", 17) == 0) ) {
1286 size_t mainExecDirLen
= strlen(mainExecutableDir
);
1287 char* str
= new char[mainExecDirLen
+len
+1];
1288 strcpy(str
, mainExecutableDir
);
1289 strlcat(str
, &start
[17], mainExecDirLen
+len
+1);
1290 str
[mainExecDirLen
+len
-17] = '\0';
1292 result
[index
++] = str
;
1295 char* str
= new char[len
+1];
1296 strncpy(str
, start
, len
);
1299 result
[index
++] = str
;
1303 size_t len
= strlen(start
);
1304 if ( (mainExecutableDir
!= NULL
) && (strncmp(start
, "@loader_path/", 13) == 0) ) {
1305 size_t mainExecDirLen
= strlen(mainExecutableDir
);
1306 char* str
= new char[mainExecDirLen
+len
+1];
1307 strcpy(str
, mainExecutableDir
);
1308 strlcat(str
, &start
[13], mainExecDirLen
+len
+1);
1309 str
[mainExecDirLen
+len
-13] = '\0';
1310 result
[index
++] = str
;
1312 else if ( (mainExecutableDir
!= NULL
) && (strncmp(start
, "@executable_path/", 17) == 0) ) {
1313 size_t mainExecDirLen
= strlen(mainExecutableDir
);
1314 char* str
= new char[mainExecDirLen
+len
+1];
1315 strcpy(str
, mainExecutableDir
);
1316 strlcat(str
, &start
[17], mainExecDirLen
+len
+1);
1317 str
[mainExecDirLen
+len
-17] = '\0';
1318 result
[index
++] = str
;
1321 char* str
= new char[len
+1];
1323 result
[index
++] = str
;
1325 result
[index
] = NULL
;
1327 //dyld::log("parseColonList(%s)\n", list);
1328 //for(int i=0; result[i] != NULL; ++i)
1329 // dyld::log(" %s\n", result[i]);
1330 return (const char**)result
;
1333 static void appendParsedColonList(const char* list
, const char* mainExecutableDir
, const char* const ** storage
)
1335 const char** newlist
= parseColonList(list
, mainExecutableDir
);
1336 if ( *storage
== NULL
) {
1337 // first time, just set
1341 // need to append to existing list
1342 const char* const* existing
= *storage
;
1344 for(int i
=0; existing
[i
] != NULL
; ++i
)
1346 for(int i
=0; newlist
[i
] != NULL
; ++i
)
1348 const char** combinedList
= new const char*[count
+2];
1350 for(int i
=0; existing
[i
] != NULL
; ++i
)
1351 combinedList
[index
++] = existing
[i
];
1352 for(int i
=0; newlist
[i
] != NULL
; ++i
)
1353 combinedList
[index
++] = newlist
[i
];
1354 combinedList
[index
] = NULL
;
1356 *storage
= combinedList
;
1361 static void paths_expand_roots(const char **paths
, const char *key
, const char *val
)
1363 // assert(val != NULL);
1364 // assert(paths != NULL);
1366 size_t keyLen
= strlen(key
);
1367 for(int i
=0; paths
[i
] != NULL
; ++i
) {
1368 if ( strncmp(paths
[i
], key
, keyLen
) == 0 ) {
1369 char* newPath
= new char[strlen(val
) + (strlen(paths
[i
]) - keyLen
) + 1];
1370 strcpy(newPath
, val
);
1371 strcat(newPath
, &paths
[i
][keyLen
]);
1379 static void removePathWithPrefix(const char* paths
[], const char* prefix
)
1381 size_t prefixLen
= strlen(prefix
);
1384 for(i
= 0; paths
[i
] != NULL
; ++i
) {
1385 if ( strncmp(paths
[i
], prefix
, prefixLen
) == 0 )
1388 paths
[i
-skip
] = paths
[i
];
1390 paths
[i
-skip
] = NULL
;
1395 static void paths_dump(const char **paths
)
1397 // assert(paths != NULL);
1398 const char **strs
= paths
;
1399 while(*strs
!= NULL
)
1401 dyld::log("\"%s\"\n", *strs
);
1408 static void printOptions(const char* argv
[])
1411 while ( NULL
!= argv
[i
] ) {
1412 dyld::log("opt[%i] = \"%s\"\n", i
, argv
[i
]);
1417 static void printEnvironmentVariables(const char* envp
[])
1419 while ( NULL
!= *envp
) {
1420 dyld::log("%s\n", *envp
);
1425 void processDyldEnvironmentVariable(const char* key
, const char* value
, const char* mainExecutableDir
)
1427 if ( strcmp(key
, "DYLD_FRAMEWORK_PATH") == 0 ) {
1428 appendParsedColonList(value
, mainExecutableDir
, &sEnv
.DYLD_FRAMEWORK_PATH
);
1430 else if ( strcmp(key
, "DYLD_FALLBACK_FRAMEWORK_PATH") == 0 ) {
1431 appendParsedColonList(value
, mainExecutableDir
, &sEnv
.DYLD_FALLBACK_FRAMEWORK_PATH
);
1433 else if ( strcmp(key
, "DYLD_LIBRARY_PATH") == 0 ) {
1434 appendParsedColonList(value
, mainExecutableDir
, &sEnv
.DYLD_LIBRARY_PATH
);
1436 else if ( strcmp(key
, "DYLD_FALLBACK_LIBRARY_PATH") == 0 ) {
1437 appendParsedColonList(value
, mainExecutableDir
, &sEnv
.DYLD_FALLBACK_LIBRARY_PATH
);
1439 else if ( (strcmp(key
, "DYLD_ROOT_PATH") == 0) || (strcmp(key
, "DYLD_PATHS_ROOT") == 0) ) {
1440 if ( strcmp(value
, "/") != 0 ) {
1441 gLinkContext
.rootPaths
= parseColonList(value
, mainExecutableDir
);
1442 for (int i
=0; gLinkContext
.rootPaths
[i
] != NULL
; ++i
) {
1443 if ( gLinkContext
.rootPaths
[i
][0] != '/' ) {
1444 dyld::warn("DYLD_ROOT_PATH not used because it contains a non-absolute path\n");
1445 gLinkContext
.rootPaths
= NULL
;
1451 else if ( strcmp(key
, "DYLD_IMAGE_SUFFIX") == 0 ) {
1452 gLinkContext
.imageSuffix
= value
;
1454 else if ( strcmp(key
, "DYLD_INSERT_LIBRARIES") == 0 ) {
1455 sEnv
.DYLD_INSERT_LIBRARIES
= parseColonList(value
, NULL
);
1457 else if ( strcmp(key
, "DYLD_PRINT_OPTS") == 0 ) {
1458 sEnv
.DYLD_PRINT_OPTS
= true;
1460 else if ( strcmp(key
, "DYLD_PRINT_ENV") == 0 ) {
1461 sEnv
.DYLD_PRINT_ENV
= true;
1463 else if ( strcmp(key
, "DYLD_DISABLE_DOFS") == 0 ) {
1464 sEnv
.DYLD_DISABLE_DOFS
= true;
1466 else if ( strcmp(key
, "DYLD_DISABLE_PREFETCH") == 0 ) {
1467 gLinkContext
.preFetchDisabled
= true;
1469 else if ( strcmp(key
, "DYLD_PRINT_LIBRARIES") == 0 ) {
1470 sEnv
.DYLD_PRINT_LIBRARIES
= true;
1472 else if ( strcmp(key
, "DYLD_PRINT_LIBRARIES_POST_LAUNCH") == 0 ) {
1473 sEnv
.DYLD_PRINT_LIBRARIES_POST_LAUNCH
= true;
1475 else if ( strcmp(key
, "DYLD_BIND_AT_LAUNCH") == 0 ) {
1476 sEnv
.DYLD_BIND_AT_LAUNCH
= true;
1478 else if ( strcmp(key
, "DYLD_FORCE_FLAT_NAMESPACE") == 0 ) {
1479 gLinkContext
.bindFlat
= true;
1481 else if ( strcmp(key
, "DYLD_NEW_LOCAL_SHARED_REGIONS") == 0 ) {
1482 // ignore, no longer relevant but some scripts still set it
1484 else if ( strcmp(key
, "DYLD_NO_FIX_PREBINDING") == 0 ) {
1486 else if ( strcmp(key
, "DYLD_PREBIND_DEBUG") == 0 ) {
1487 gLinkContext
.verbosePrebinding
= true;
1489 else if ( strcmp(key
, "DYLD_PRINT_INITIALIZERS") == 0 ) {
1490 gLinkContext
.verboseInit
= true;
1492 else if ( strcmp(key
, "DYLD_PRINT_DOFS") == 0 ) {
1493 gLinkContext
.verboseDOF
= true;
1495 else if ( strcmp(key
, "DYLD_PRINT_STATISTICS") == 0 ) {
1496 sEnv
.DYLD_PRINT_STATISTICS
= true;
1498 else if ( strcmp(key
, "DYLD_PRINT_SEGMENTS") == 0 ) {
1499 gLinkContext
.verboseMapping
= true;
1501 else if ( strcmp(key
, "DYLD_PRINT_BINDINGS") == 0 ) {
1502 gLinkContext
.verboseBind
= true;
1504 else if ( strcmp(key
, "DYLD_PRINT_WEAK_BINDINGS") == 0 ) {
1505 gLinkContext
.verboseWeakBind
= true;
1507 else if ( strcmp(key
, "DYLD_PRINT_REBASINGS") == 0 ) {
1508 gLinkContext
.verboseRebase
= true;
1510 else if ( strcmp(key
, "DYLD_PRINT_APIS") == 0 ) {
1513 else if ( strcmp(key
, "DYLD_PRINT_WARNINGS") == 0 ) {
1514 gLinkContext
.verboseWarnings
= true;
1516 else if ( strcmp(key
, "DYLD_PRINT_RPATHS") == 0 ) {
1517 gLinkContext
.verboseRPaths
= true;
1519 else if ( strcmp(key
, "DYLD_PRINT_CS_NOTIFICATIONS") == 0 ) {
1520 sEnv
.DYLD_PRINT_CS_NOTIFICATIONS
= true;
1522 else if ( strcmp(key
, "DYLD_PRINT_INTERPOSING") == 0 ) {
1523 gLinkContext
.verboseInterposing
= true;
1525 else if ( strcmp(key
, "DYLD_PRINT_CODE_SIGNATURES") == 0 ) {
1526 gLinkContext
.verboseCodeSignatures
= true;
1528 else if ( strcmp(key
, "DYLD_SHARED_REGION") == 0 ) {
1529 if ( strcmp(value
, "private") == 0 ) {
1530 gLinkContext
.sharedRegionMode
= ImageLoader::kUsePrivateSharedRegion
;
1532 else if ( strcmp(value
, "avoid") == 0 ) {
1533 gLinkContext
.sharedRegionMode
= ImageLoader::kDontUseSharedRegion
;
1535 else if ( strcmp(value
, "use") == 0 ) {
1536 gLinkContext
.sharedRegionMode
= ImageLoader::kUseSharedRegion
;
1538 else if ( value
[0] == '\0' ) {
1539 gLinkContext
.sharedRegionMode
= ImageLoader::kUseSharedRegion
;
1542 dyld::warn("unknown option to DYLD_SHARED_REGION. Valid options are: use, private, avoid\n");
1545 #if DYLD_SHARED_CACHE_SUPPORT
1546 else if ( strcmp(key
, "DYLD_SHARED_CACHE_DIR") == 0 ) {
1547 sSharedCacheDir
= value
;
1549 else if ( strcmp(key
, "DYLD_SHARED_CACHE_DONT_VALIDATE") == 0 ) {
1550 sSharedCacheIgnoreInodeAndTimeStamp
= true;
1553 else if ( strcmp(key
, "DYLD_IGNORE_PREBINDING") == 0 ) {
1554 if ( strcmp(value
, "all") == 0 ) {
1555 gLinkContext
.prebindUsage
= ImageLoader::kUseNoPrebinding
;
1557 else if ( strcmp(value
, "app") == 0 ) {
1558 gLinkContext
.prebindUsage
= ImageLoader::kUseAllButAppPredbinding
;
1560 else if ( strcmp(value
, "nonsplit") == 0 ) {
1561 gLinkContext
.prebindUsage
= ImageLoader::kUseSplitSegPrebinding
;
1563 else if ( value
[0] == '\0' ) {
1564 gLinkContext
.prebindUsage
= ImageLoader::kUseSplitSegPrebinding
;
1567 dyld::warn("unknown option to DYLD_IGNORE_PREBINDING. Valid options are: all, app, nonsplit\n");
1570 #if SUPPORT_VERSIONED_PATHS
1571 else if ( strcmp(key
, "DYLD_VERSIONED_LIBRARY_PATH") == 0 ) {
1572 appendParsedColonList(value
, mainExecutableDir
, &sEnv
.DYLD_VERSIONED_LIBRARY_PATH
);
1574 else if ( strcmp(key
, "DYLD_VERSIONED_FRAMEWORK_PATH") == 0 ) {
1575 appendParsedColonList(value
, mainExecutableDir
, &sEnv
.DYLD_VERSIONED_FRAMEWORK_PATH
);
1578 #if !TARGET_IPHONE_SIMULATOR
1579 else if ( (strcmp(key
, "DYLD_PRINT_TO_FILE") == 0) && (mainExecutableDir
== NULL
) ) {
1580 int fd
= open(value
, O_WRONLY
| O_CREAT
| O_APPEND
, 0644);
1586 dyld::log("dyld: could not open DYLD_PRINT_TO_FILE='%s', errno=%d\n", value
, errno
);
1591 dyld::warn("unknown environment variable: %s\n", key
);
1596 #if SUPPORT_LC_DYLD_ENVIRONMENT
1597 static void checkLoadCommandEnvironmentVariables()
1599 // <rdar://problem/8440934> Support augmenting dyld environment variables in load commands
1600 const uint32_t cmd_count
= sMainExecutableMachHeader
->ncmds
;
1601 const struct load_command
* const cmds
= (struct load_command
*)(((char*)sMainExecutableMachHeader
)+sizeof(macho_header
));
1602 const struct load_command
* cmd
= cmds
;
1603 for (uint32_t i
= 0; i
< cmd_count
; ++i
) {
1605 case LC_DYLD_ENVIRONMENT
:
1607 const struct dylinker_command
* envcmd
= (struct dylinker_command
*)cmd
;
1608 const char* keyEqualsValue
= (char*)envcmd
+ envcmd
->name
.offset
;
1609 char mainExecutableDir
[strlen(sExecPath
)+2];
1610 strcpy(mainExecutableDir
, sExecPath
);
1611 char* lastSlash
= strrchr(mainExecutableDir
, '/');
1612 if ( lastSlash
!= NULL
)
1613 lastSlash
[1] = '\0';
1614 // only process variables that start with DYLD_ and end in _PATH
1615 if ( (strncmp(keyEqualsValue
, "DYLD_", 5) == 0) ) {
1616 const char* equals
= strchr(keyEqualsValue
, '=');
1617 if ( equals
!= NULL
) {
1618 if ( strncmp(&equals
[-5], "_PATH", 5) == 0 ) {
1619 const char* value
= &equals
[1];
1620 const size_t keyLen
= equals
-keyEqualsValue
;
1621 // <rdar://problem/22799635> don't let malformed load command overflow stack
1622 if ( keyLen
< 40 ) {
1624 strncpy(key
, keyEqualsValue
, keyLen
);
1626 //dyld::log("processing: %s\n", keyEqualsValue);
1627 //dyld::log("mainExecutableDir: %s\n", mainExecutableDir);
1628 processDyldEnvironmentVariable(key
, value
, mainExecutableDir
);
1636 cmd
= (const struct load_command
*)(((char*)cmd
)+cmd
->cmdsize
);
1639 #endif // SUPPORT_LC_DYLD_ENVIRONMENT
1642 static bool hasCodeSignatureLoadCommand(const macho_header
* mh
)
1644 const uint32_t cmd_count
= mh
->ncmds
;
1645 const struct load_command
* const cmds
= (struct load_command
*)(((char*)mh
)+sizeof(macho_header
));
1646 const struct load_command
* cmd
= cmds
;
1647 for (uint32_t i
= 0; i
< cmd_count
; ++i
) {
1648 if (cmd
->cmd
== LC_CODE_SIGNATURE
)
1650 cmd
= (const struct load_command
*)(((char*)cmd
)+cmd
->cmdsize
);
1656 #if SUPPORT_VERSIONED_PATHS
1657 static void checkVersionedPaths()
1659 // search DYLD_VERSIONED_LIBRARY_PATH directories for dylibs and check if they are newer
1660 if ( sEnv
.DYLD_VERSIONED_LIBRARY_PATH
!= NULL
) {
1661 for(const char* const* lp
= sEnv
.DYLD_VERSIONED_LIBRARY_PATH
; *lp
!= NULL
; ++lp
) {
1662 checkDylibOverridesInDir(*lp
);
1666 // search DYLD_VERSIONED_FRAMEWORK_PATH directories for dylibs and check if they are newer
1667 if ( sEnv
.DYLD_VERSIONED_FRAMEWORK_PATH
!= NULL
) {
1668 for(const char* const* fp
= sEnv
.DYLD_VERSIONED_FRAMEWORK_PATH
; *fp
!= NULL
; ++fp
) {
1669 checkFrameworkOverridesInDir(*fp
);
1677 // For security, setuid programs ignore DYLD_* environment variables.
1678 // Additionally, the DYLD_* enviroment variables are removed
1679 // from the environment, so that any child processes don't see them.
1681 static void pruneEnvironmentVariables(const char* envp
[], const char*** applep
)
1683 // delete all DYLD_* and LD_LIBRARY_PATH environment variables
1684 int removedCount
= 0;
1685 const char** d
= envp
;
1686 for(const char** s
= envp
; *s
!= NULL
; s
++) {
1687 if ( (strncmp(*s
, "DYLD_", 5) != 0) && (strncmp(*s
, "LD_LIBRARY_PATH=", 16) != 0) ) {
1695 // <rdar://11894054> Disable warnings about DYLD_ env vars being ignored. The warnings are causing too much confusion.
1697 if ( removedCount
!= 0 ) {
1698 dyld::log("dyld: DYLD_ environment variables being ignored because ");
1699 switch (sRestrictedReason
) {
1702 case restrictedBySetGUid
:
1703 dyld::log("main executable (%s) is setuid or setgid\n", sExecPath
);
1705 case restrictedBySegment
:
1706 dyld::log("main executable (%s) has __RESTRICT/__restrict section\n", sExecPath
);
1708 case restrictedByEntitlements
:
1709 dyld::log("main executable (%s) is code signed with entitlements\n", sExecPath
);
1714 // slide apple parameters
1715 if ( removedCount
> 0 ) {
1718 *d
= d
[removedCount
];
1719 } while ( *d
++ != NULL
);
1720 for(int i
=0; i
< removedCount
; ++i
)
1724 // disable framework and library fallback paths for setuid binaries rdar://problem/4589305
1725 sEnv
.DYLD_FALLBACK_FRAMEWORK_PATH
= NULL
;
1726 sEnv
.DYLD_FALLBACK_LIBRARY_PATH
= NULL
;
1728 if ( removedCount
> 0 )
1729 strlcat(sLoadingCrashMessage
, ", ignoring DYLD_* env vars", sizeof(sLoadingCrashMessage
));
1732 static void defaultUninitializedFallbackPaths(const char* envp
[])
1734 #if __MAC_OS_X_VERSION_MIN_REQUIRED
1735 // default value for DYLD_FALLBACK_FRAMEWORK_PATH, if not set in environment
1736 const char* home
= _simple_getenv(envp
, "HOME");;
1737 if ( sEnv
.DYLD_FALLBACK_FRAMEWORK_PATH
== NULL
) {
1738 const char** fpaths
= sFrameworkFallbackPaths
;
1740 removePathWithPrefix(fpaths
, "$HOME");
1742 paths_expand_roots(fpaths
, "$HOME", home
);
1743 sEnv
.DYLD_FALLBACK_FRAMEWORK_PATH
= fpaths
;
1746 // default value for DYLD_FALLBACK_LIBRARY_PATH, if not set in environment
1747 if ( sEnv
.DYLD_FALLBACK_LIBRARY_PATH
== NULL
) {
1748 const char** lpaths
= sLibraryFallbackPaths
;
1750 removePathWithPrefix(lpaths
, "$HOME");
1752 paths_expand_roots(lpaths
, "$HOME", home
);
1753 sEnv
.DYLD_FALLBACK_LIBRARY_PATH
= lpaths
;
1756 if ( sEnv
.DYLD_FALLBACK_FRAMEWORK_PATH
== NULL
)
1757 sEnv
.DYLD_FALLBACK_FRAMEWORK_PATH
= sFrameworkFallbackPaths
;
1759 if ( sEnv
.DYLD_FALLBACK_LIBRARY_PATH
== NULL
)
1760 sEnv
.DYLD_FALLBACK_LIBRARY_PATH
= sLibraryFallbackPaths
;
1765 static void checkEnvironmentVariables(const char* envp
[])
1768 for(p
= envp
; *p
!= NULL
; p
++) {
1769 const char* keyEqualsValue
= *p
;
1770 if ( strncmp(keyEqualsValue
, "DYLD_", 5) == 0 ) {
1771 const char* equals
= strchr(keyEqualsValue
, '=');
1772 if ( equals
!= NULL
) {
1773 strlcat(sLoadingCrashMessage
, "\n", sizeof(sLoadingCrashMessage
));
1774 strlcat(sLoadingCrashMessage
, keyEqualsValue
, sizeof(sLoadingCrashMessage
));
1775 const char* value
= &equals
[1];
1776 const size_t keyLen
= equals
-keyEqualsValue
;
1778 strncpy(key
, keyEqualsValue
, keyLen
);
1780 processDyldEnvironmentVariable(key
, value
, NULL
);
1783 else if ( strncmp(keyEqualsValue
, "LD_LIBRARY_PATH=", 16) == 0 ) {
1784 const char* path
= &keyEqualsValue
[16];
1785 sEnv
.LD_LIBRARY_PATH
= parseColonList(path
, NULL
);
1789 #if SUPPORT_LC_DYLD_ENVIRONMENT
1790 checkLoadCommandEnvironmentVariables();
1791 #endif // SUPPORT_LC_DYLD_ENVIRONMENT
1793 // <rdar://problem/11281064> DYLD_IMAGE_SUFFIX and DYLD_ROOT_PATH cannot be used together
1794 if ( (gLinkContext
.imageSuffix
!= NULL
) && (gLinkContext
.rootPaths
!= NULL
) ) {
1795 dyld::warn("Ignoring DYLD_IMAGE_SUFFIX because DYLD_ROOT_PATH is used.\n");
1796 gLinkContext
.imageSuffix
= NULL
;
1801 static bool isGCProgram(const macho_header
* mh
, uintptr_t slide
)
1803 const uint32_t cmd_count
= mh
->ncmds
;
1804 const struct load_command
* const cmds
= (struct load_command
*)(((char*)mh
)+sizeof(macho_header
));
1805 const struct load_command
* cmd
= cmds
;
1806 for (uint32_t i
= 0; i
< cmd_count
; ++i
) {
1808 case LC_SEGMENT_COMMAND
:
1810 const struct macho_segment_command
* seg
= (struct macho_segment_command
*)cmd
;
1811 if (strcmp(seg
->segname
, "__DATA") == 0) {
1812 const struct macho_section
* const sectionsStart
= (struct macho_section
*)((char*)seg
+ sizeof(struct macho_segment_command
));
1813 const struct macho_section
* const sectionsEnd
= §ionsStart
[seg
->nsects
];
1814 for (const struct macho_section
* sect
=sectionsStart
; sect
< sectionsEnd
; ++sect
) {
1815 if (strncmp(sect
->sectname
, "__objc_imageinfo", 16) == 0) {
1816 const uint32_t* objcInfo
= (uint32_t*)(sect
->addr
+ slide
);
1817 return (objcInfo
[1] & 6); // 6 = (OBJC_IMAGE_SUPPORTS_GC | OBJC_IMAGE_REQUIRES_GC)
1824 cmd
= (const struct load_command
*)(((char*)cmd
)+cmd
->cmdsize
);
1829 static void getHostInfo(const macho_header
* mainExecutableMH
, uintptr_t mainExecutableSlide
)
1831 #if CPU_SUBTYPES_SUPPORTED
1833 sHostCPU
= CPU_TYPE_ARM
;
1834 sHostCPUsubtype
= CPU_SUBTYPE_ARM_V7K
;
1835 #elif __ARM_ARCH_7A__
1836 sHostCPU
= CPU_TYPE_ARM
;
1837 sHostCPUsubtype
= CPU_SUBTYPE_ARM_V7
;
1838 #elif __ARM_ARCH_6K__
1839 sHostCPU
= CPU_TYPE_ARM
;
1840 sHostCPUsubtype
= CPU_SUBTYPE_ARM_V6
;
1841 #elif __ARM_ARCH_7F__
1842 sHostCPU
= CPU_TYPE_ARM
;
1843 sHostCPUsubtype
= CPU_SUBTYPE_ARM_V7F
;
1844 #elif __ARM_ARCH_7S__
1845 sHostCPU
= CPU_TYPE_ARM
;
1846 sHostCPUsubtype
= CPU_SUBTYPE_ARM_V7S
;
1848 struct host_basic_info info
;
1849 mach_msg_type_number_t count
= HOST_BASIC_INFO_COUNT
;
1850 mach_port_t hostPort
= mach_host_self();
1851 kern_return_t result
= host_info(hostPort
, HOST_BASIC_INFO
, (host_info_t
)&info
, &count
);
1852 if ( result
!= KERN_SUCCESS
)
1853 throw "host_info() failed";
1854 sHostCPU
= info
.cpu_type
;
1855 sHostCPUsubtype
= info
.cpu_subtype
;
1856 mach_port_deallocate(mach_task_self(), hostPort
);
1858 #if TARGET_IPHONE_SIMULATOR
1861 sHaswell
= (sHostCPUsubtype
== CPU_SUBTYPE_X86_64_H
);
1862 // <rdar://problem/18528074> x86_64h: Fall back to the x86_64 slice if an app requires GC.
1864 if ( isGCProgram(mainExecutableMH
, mainExecutableSlide
) ) {
1865 // When running a GC program on a haswell machine, don't use and 'h slices
1866 sHostCPUsubtype
= CPU_SUBTYPE_X86_64_ALL
;
1868 gLinkContext
.sharedRegionMode
= ImageLoader::kDontUseSharedRegion
;
1877 static void checkSharedRegionDisable()
1879 #if __MAC_OS_X_VERSION_MIN_REQUIRED
1880 // if main executable has segments that overlap the shared region,
1881 // then disable using the shared region
1882 if ( sMainExecutable
->overlapsWithAddressRange((void*)(uintptr_t)SHARED_REGION_BASE
, (void*)(uintptr_t)(SHARED_REGION_BASE
+ SHARED_REGION_SIZE
)) ) {
1883 gLinkContext
.sharedRegionMode
= ImageLoader::kDontUseSharedRegion
;
1884 if ( gLinkContext
.verboseMapping
)
1885 dyld::warn("disabling shared region because main executable overlaps\n");
1888 if ( sProcessIsRestricted
) {
1889 // <rdar://problem/15280847> use private or no shared region for suid processes
1890 gLinkContext
.sharedRegionMode
= ImageLoader::kUsePrivateSharedRegion
;
1894 // iPhoneOS cannot run without shared region
1897 bool validImage(const ImageLoader
* possibleImage
)
1899 const size_t imageCount
= sAllImages
.size();
1900 for(size_t i
=0; i
< imageCount
; ++i
) {
1901 if ( possibleImage
== sAllImages
[i
] ) {
1908 uint32_t getImageCount()
1910 return (uint32_t)sAllImages
.size();
1913 ImageLoader
* getIndexedImage(unsigned int index
)
1915 if ( index
< sAllImages
.size() )
1916 return sAllImages
[index
];
1920 ImageLoader
* findImageByMachHeader(const struct mach_header
* target
)
1922 return findMappedRange((uintptr_t)target
);
1926 ImageLoader
* findImageContainingAddress(const void* addr
)
1928 return findMappedRange((uintptr_t)addr
);
1932 ImageLoader
* findImageContainingSymbol(const void* symbol
)
1934 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
1935 ImageLoader
* anImage
= *it
;
1936 if ( anImage
->containsSymbol(symbol
) )
1944 void forEachImageDo( void (*callback
)(ImageLoader
*, void* userData
), void* userData
)
1946 const size_t imageCount
= sAllImages
.size();
1947 for(size_t i
=0; i
< imageCount
; ++i
) {
1948 ImageLoader
* anImage
= sAllImages
[i
];
1949 (*callback
)(anImage
, userData
);
1953 ImageLoader
* findLoadedImage(const struct stat
& stat_buf
)
1955 const size_t imageCount
= sAllImages
.size();
1956 for(size_t i
=0; i
< imageCount
; ++i
){
1957 ImageLoader
* anImage
= sAllImages
[i
];
1958 if ( anImage
->statMatch(stat_buf
) )
1964 // based on ANSI-C strstr()
1965 static const char* strrstr(const char* str
, const char* sub
)
1967 const size_t sublen
= strlen(sub
);
1968 for(const char* p
= &str
[strlen(str
)]; p
!= str
; --p
) {
1969 if ( strncmp(p
, sub
, sublen
) == 0 )
1977 // Find framework path
1979 // /path/foo.framework/foo => foo.framework/foo
1980 // /path/foo.framework/Versions/A/foo => foo.framework/Versions/A/foo
1981 // /path/foo.framework/Frameworks/bar.framework/bar => bar.framework/bar
1982 // /path/foo.framework/Libraries/bar.dylb => NULL
1983 // /path/foo.framework/bar => NULL
1985 // Returns NULL if not a framework path
1987 static const char* getFrameworkPartialPath(const char* path
)
1989 const char* dirDot
= strrstr(path
, ".framework/");
1990 if ( dirDot
!= NULL
) {
1991 const char* dirStart
= dirDot
;
1992 for ( ; dirStart
>= path
; --dirStart
) {
1993 if ( (*dirStart
== '/') || (dirStart
== path
) ) {
1994 const char* frameworkStart
= &dirStart
[1];
1995 if ( dirStart
== path
)
1997 size_t len
= dirDot
- frameworkStart
;
1998 char framework
[len
+1];
1999 strncpy(framework
, frameworkStart
, len
);
2000 framework
[len
] = '\0';
2001 const char* leaf
= strrchr(path
, '/');
2002 if ( leaf
!= NULL
) {
2003 if ( strcmp(framework
, &leaf
[1]) == 0 ) {
2004 return frameworkStart
;
2006 if ( gLinkContext
.imageSuffix
!= NULL
) {
2007 // some debug frameworks have install names that end in _debug
2008 if ( strncmp(framework
, &leaf
[1], len
) == 0 ) {
2009 if ( strcmp( gLinkContext
.imageSuffix
, &leaf
[len
+1]) == 0 )
2010 return frameworkStart
;
2021 static const char* getLibraryLeafName(const char* path
)
2023 const char* start
= strrchr(path
, '/');
2024 if ( start
!= NULL
)
2031 // only for architectures that use cpu-sub-types
2032 #if CPU_SUBTYPES_SUPPORTED
2034 const cpu_subtype_t CPU_SUBTYPE_END_OF_LIST
= -1;
2038 // A fat file may contain multiple sub-images for the same CPU type.
2039 // In that case, dyld picks which sub-image to use by scanning a table
2040 // of preferred cpu-sub-types for the running cpu.
2042 // There is one row in the table for each cpu-sub-type on which dyld might run.
2043 // The first entry in a row is that cpu-sub-type. It is followed by all
2044 // cpu-sub-types that can run on that cpu, if preferred order. Each row ends with
2045 // a "SUBTYPE_ALL" (to denote that images written to run on any cpu-sub-type are usable),
2046 // followed by one or more CPU_SUBTYPE_END_OF_LIST to pad out this row.
2052 // ARM sub-type lists
2054 const int kARM_RowCount
= 8;
2055 static const cpu_subtype_t kARM
[kARM_RowCount
][9] = {
2057 // armv7f can run: v7f, v7, v6, v5, and v4
2058 { CPU_SUBTYPE_ARM_V7F
, CPU_SUBTYPE_ARM_V7
, CPU_SUBTYPE_ARM_V6
, CPU_SUBTYPE_ARM_V5TEJ
, CPU_SUBTYPE_ARM_V4T
, CPU_SUBTYPE_ARM_ALL
, CPU_SUBTYPE_END_OF_LIST
},
2060 // armv7k can run: v7k
2061 { CPU_SUBTYPE_ARM_V7K
, CPU_SUBTYPE_END_OF_LIST
},
2063 // armv7s can run: v7s, v7, v7f, v7k, v6, v5, and v4
2064 { CPU_SUBTYPE_ARM_V7S
, CPU_SUBTYPE_ARM_V7
, CPU_SUBTYPE_ARM_V7F
, CPU_SUBTYPE_ARM_V6
, CPU_SUBTYPE_ARM_V5TEJ
, CPU_SUBTYPE_ARM_V4T
, CPU_SUBTYPE_ARM_ALL
, CPU_SUBTYPE_END_OF_LIST
},
2066 // armv7 can run: v7, v6, v5, and v4
2067 { CPU_SUBTYPE_ARM_V7
, CPU_SUBTYPE_ARM_V6
, CPU_SUBTYPE_ARM_V5TEJ
, CPU_SUBTYPE_ARM_V4T
, CPU_SUBTYPE_ARM_ALL
, CPU_SUBTYPE_END_OF_LIST
},
2069 // armv6 can run: v6, v5, and v4
2070 { CPU_SUBTYPE_ARM_V6
, CPU_SUBTYPE_ARM_V5TEJ
, CPU_SUBTYPE_ARM_V4T
, CPU_SUBTYPE_ARM_ALL
, CPU_SUBTYPE_END_OF_LIST
, CPU_SUBTYPE_END_OF_LIST
},
2072 // xscale can run: xscale, v5, and v4
2073 { CPU_SUBTYPE_ARM_XSCALE
, CPU_SUBTYPE_ARM_V5TEJ
, CPU_SUBTYPE_ARM_V4T
, CPU_SUBTYPE_ARM_ALL
, CPU_SUBTYPE_END_OF_LIST
, CPU_SUBTYPE_END_OF_LIST
},
2075 // armv5 can run: v5 and v4
2076 { CPU_SUBTYPE_ARM_V5TEJ
, CPU_SUBTYPE_ARM_V4T
, CPU_SUBTYPE_ARM_ALL
, CPU_SUBTYPE_END_OF_LIST
, CPU_SUBTYPE_END_OF_LIST
, CPU_SUBTYPE_END_OF_LIST
},
2078 // armv4 can run: v4
2079 { CPU_SUBTYPE_ARM_V4T
, CPU_SUBTYPE_ARM_ALL
, CPU_SUBTYPE_END_OF_LIST
, CPU_SUBTYPE_END_OF_LIST
, CPU_SUBTYPE_END_OF_LIST
, CPU_SUBTYPE_END_OF_LIST
},
2085 // x86_64 sub-type lists
2087 const int kX86_64_RowCount
= 2;
2088 static const cpu_subtype_t kX86_64
[kX86_64_RowCount
][5] = {
2090 // x86_64h can run: x86_64h, x86_64h(lib), x86_64(lib), and x86_64
2091 { CPU_SUBTYPE_X86_64_H
, CPU_SUBTYPE_LIB64
|CPU_SUBTYPE_X86_64_H
, CPU_SUBTYPE_LIB64
|CPU_SUBTYPE_X86_64_ALL
, CPU_SUBTYPE_X86_64_ALL
, CPU_SUBTYPE_END_OF_LIST
},
2093 // x86_64 can run: x86_64(lib) and x86_64
2094 { CPU_SUBTYPE_X86_64_ALL
, CPU_SUBTYPE_LIB64
|CPU_SUBTYPE_X86_64_ALL
, CPU_SUBTYPE_END_OF_LIST
},
2100 // scan the tables above to find the cpu-sub-type-list for this machine
2101 static const cpu_subtype_t
* findCPUSubtypeList(cpu_type_t cpu
, cpu_subtype_t subtype
)
2106 for (int i
=0; i
< kARM_RowCount
; ++i
) {
2107 if ( kARM
[i
][0] == subtype
)
2113 case CPU_TYPE_X86_64
:
2114 for (int i
=0; i
< kX86_64_RowCount
; ++i
) {
2115 if ( kX86_64
[i
][0] == subtype
)
2127 // scan fat table-of-contents for best most preferred subtype
2128 static bool fatFindBestFromOrderedList(cpu_type_t cpu
, const cpu_subtype_t list
[], const fat_header
* fh
, uint64_t* offset
, uint64_t* len
)
2130 const fat_arch
* const archs
= (fat_arch
*)(((char*)fh
)+sizeof(fat_header
));
2131 for (uint32_t subTypeIndex
=0; list
[subTypeIndex
] != CPU_SUBTYPE_END_OF_LIST
; ++subTypeIndex
) {
2132 for(uint32_t fatIndex
=0; fatIndex
< OSSwapBigToHostInt32(fh
->nfat_arch
); ++fatIndex
) {
2133 if ( ((cpu_type_t
)OSSwapBigToHostInt32(archs
[fatIndex
].cputype
) == cpu
)
2134 && (list
[subTypeIndex
] == (cpu_subtype_t
)OSSwapBigToHostInt32(archs
[fatIndex
].cpusubtype
)) ) {
2135 *offset
= OSSwapBigToHostInt32(archs
[fatIndex
].offset
);
2136 *len
= OSSwapBigToHostInt32(archs
[fatIndex
].size
);
2144 // scan fat table-of-contents for exact match of cpu and cpu-sub-type
2145 static bool fatFindExactMatch(cpu_type_t cpu
, cpu_subtype_t subtype
, const fat_header
* fh
, uint64_t* offset
, uint64_t* len
)
2147 const fat_arch
* archs
= (fat_arch
*)(((char*)fh
)+sizeof(fat_header
));
2148 for(uint32_t i
=0; i
< OSSwapBigToHostInt32(fh
->nfat_arch
); ++i
) {
2149 if ( ((cpu_type_t
)OSSwapBigToHostInt32(archs
[i
].cputype
) == cpu
)
2150 && ((cpu_subtype_t
)OSSwapBigToHostInt32(archs
[i
].cpusubtype
) == subtype
) ) {
2151 *offset
= OSSwapBigToHostInt32(archs
[i
].offset
);
2152 *len
= OSSwapBigToHostInt32(archs
[i
].size
);
2159 // scan fat table-of-contents for image with matching cpu-type and runs-on-all-sub-types
2160 static bool fatFindRunsOnAllCPUs(cpu_type_t cpu
, const fat_header
* fh
, uint64_t* offset
, uint64_t* len
)
2162 const fat_arch
* archs
= (fat_arch
*)(((char*)fh
)+sizeof(fat_header
));
2163 for(uint32_t i
=0; i
< OSSwapBigToHostInt32(fh
->nfat_arch
); ++i
) {
2164 if ( (cpu_type_t
)OSSwapBigToHostInt32(archs
[i
].cputype
) == cpu
) {
2168 if ( (cpu_subtype_t
)OSSwapBigToHostInt32(archs
[i
].cpusubtype
) == CPU_SUBTYPE_ARM_ALL
) {
2169 *offset
= OSSwapBigToHostInt32(archs
[i
].offset
);
2170 *len
= OSSwapBigToHostInt32(archs
[i
].size
);
2176 case CPU_TYPE_X86_64
:
2177 if ( (cpu_subtype_t
)OSSwapBigToHostInt32(archs
[i
].cpusubtype
) == CPU_SUBTYPE_X86_64_ALL
) {
2178 *offset
= OSSwapBigToHostInt32(archs
[i
].offset
);
2179 *len
= OSSwapBigToHostInt32(archs
[i
].size
);
2190 #endif // CPU_SUBTYPES_SUPPORTED
2193 // A fat file may contain multiple sub-images for the same cpu-type,
2194 // each optimized for a different cpu-sub-type (e.g G3 or G5).
2195 // This routine picks the optimal sub-image.
2197 static bool fatFindBest(const fat_header
* fh
, uint64_t* offset
, uint64_t* len
)
2199 #if CPU_SUBTYPES_SUPPORTED
2200 // assume all dylibs loaded must have same cpu type as main executable
2201 const cpu_type_t cpu
= sMainExecutableMachHeader
->cputype
;
2203 // We only know the subtype to use if the main executable cpu type matches the host
2204 if ( (cpu
& CPU_TYPE_MASK
) == sHostCPU
) {
2205 // get preference ordered list of subtypes
2206 const cpu_subtype_t
* subTypePreferenceList
= findCPUSubtypeList(cpu
, sHostCPUsubtype
);
2208 // use ordered list to find best sub-image in fat file
2209 if ( subTypePreferenceList
!= NULL
)
2210 return fatFindBestFromOrderedList(cpu
, subTypePreferenceList
, fh
, offset
, len
);
2212 // if running cpu is not in list, try for an exact match
2213 if ( fatFindExactMatch(cpu
, sHostCPUsubtype
, fh
, offset
, len
) )
2217 // running on an uknown cpu, can only load generic code
2218 return fatFindRunsOnAllCPUs(cpu
, fh
, offset
, len
);
2220 // just find first slice with matching architecture
2221 const fat_arch
* archs
= (fat_arch
*)(((char*)fh
)+sizeof(fat_header
));
2222 for(uint32_t i
=0; i
< OSSwapBigToHostInt32(fh
->nfat_arch
); ++i
) {
2223 if ( (cpu_type_t
)OSSwapBigToHostInt32(archs
[i
].cputype
) == sMainExecutableMachHeader
->cputype
) {
2224 *offset
= OSSwapBigToHostInt32(archs
[i
].offset
);
2225 *len
= OSSwapBigToHostInt32(archs
[i
].size
);
2236 // This is used to validate if a non-fat (aka thin or raw) mach-o file can be used
2237 // on the current processor. //
2238 bool isCompatibleMachO(const uint8_t* firstPage
, const char* path
)
2240 #if CPU_SUBTYPES_SUPPORTED
2241 // It is deemed compatible if any of the following are true:
2242 // 1) mach_header subtype is in list of compatible subtypes for running processor
2243 // 2) mach_header subtype is same as running processor subtype
2244 // 3) mach_header subtype runs on all processor variants
2245 const mach_header
* mh
= (mach_header
*)firstPage
;
2246 if ( mh
->magic
== sMainExecutableMachHeader
->magic
) {
2247 if ( mh
->cputype
== sMainExecutableMachHeader
->cputype
) {
2248 if ( (mh
->cputype
& CPU_TYPE_MASK
) == sHostCPU
) {
2249 // get preference ordered list of subtypes that this machine can use
2250 const cpu_subtype_t
* subTypePreferenceList
= findCPUSubtypeList(mh
->cputype
, sHostCPUsubtype
);
2251 if ( subTypePreferenceList
!= NULL
) {
2252 // if image's subtype is in the list, it is compatible
2253 for (const cpu_subtype_t
* p
= subTypePreferenceList
; *p
!= CPU_SUBTYPE_END_OF_LIST
; ++p
) {
2254 if ( *p
== mh
->cpusubtype
)
2257 // have list and not in list, so not compatible
2258 throwf("incompatible cpu-subtype: 0x%08X in %s", mh
->cpusubtype
, path
);
2260 // unknown cpu sub-type, but if exact match for current subtype then ok to use
2261 if ( mh
->cpusubtype
== sHostCPUsubtype
)
2265 // cpu type has no ordered list of subtypes
2266 switch (mh
->cputype
) {
2268 case CPU_TYPE_X86_64
:
2269 // subtypes are not used or these architectures
2275 // For architectures that don't support cpu-sub-types
2276 // this just check the cpu type.
2277 const mach_header
* mh
= (mach_header
*)firstPage
;
2278 if ( mh
->magic
== sMainExecutableMachHeader
->magic
) {
2279 if ( mh
->cputype
== sMainExecutableMachHeader
->cputype
) {
2290 // The kernel maps in main executable before dyld gets control. We need to
2291 // make an ImageLoader* for the already mapped in main executable.
2292 static ImageLoader
* instantiateFromLoadedImage(const macho_header
* mh
, uintptr_t slide
, const char* path
)
2294 // try mach-o loader
2295 if ( isCompatibleMachO((const uint8_t*)mh
, path
) ) {
2296 ImageLoader
* image
= ImageLoaderMachO::instantiateMainExecutable(mh
, slide
, path
, gLinkContext
);
2301 throw "main executable not a known format";
2305 #if DYLD_SHARED_CACHE_SUPPORT
2306 static bool findInSharedCacheImage(const char* path
, bool searchByPath
, const struct stat
* stat_buf
, const macho_header
** mh
, const char** pathInCache
, long* slide
)
2308 if ( sSharedCache
!= NULL
) {
2309 #if __MAC_OS_X_VERSION_MIN_REQUIRED
2310 // Mac OS X always requires inode/mtime to valid cache
2311 // if stat() not done yet, do it now
2313 if ( stat_buf
== NULL
) {
2314 if ( my_stat(path
, &statb
) == -1 )
2319 #if __IPHONE_OS_VERSION_MIN_REQUIRED
2321 for (const char* s
=path
; *s
!= '\0'; ++s
)
2322 hash
+= hash
*4 + *s
;
2325 // walk shared cache to see if there is a cached image that matches the inode/mtime/path desired
2326 const dyld_cache_image_info
* const start
= (dyld_cache_image_info
*)((uint8_t*)sSharedCache
+ sSharedCache
->imagesOffset
);
2327 const dyld_cache_image_info
* const end
= &start
[sSharedCache
->imagesCount
];
2328 #if __IPHONE_OS_VERSION_MIN_REQUIRED
2329 const bool cacheHasHashInfo
= (start
->modTime
== 0);
2331 for( const dyld_cache_image_info
* p
= start
; p
!= end
; ++p
) {
2332 #if __IPHONE_OS_VERSION_MIN_REQUIRED
2334 const char* aPath
= (char*)sSharedCache
+ p
->pathFileOffset
;
2335 if ( cacheHasHashInfo
&& (p
->inode
!= hash
) )
2337 if ( strcmp(path
, aPath
) == 0 ) {
2338 // found image in cache
2339 *mh
= (macho_header
*)(p
->address
+sSharedCacheSlide
);
2340 *pathInCache
= aPath
;
2341 *slide
= sSharedCacheSlide
;
2344 #elif __MAC_OS_X_VERSION_MIN_REQUIRED
2345 // check mtime and inode first because it is fast
2346 bool inodeMatch
= ( ((time_t)p
->modTime
== stat_buf
->st_mtime
) && ((ino_t
)p
->inode
== stat_buf
->st_ino
) );
2347 if ( searchByPath
|| sSharedCacheIgnoreInodeAndTimeStamp
|| inodeMatch
) {
2348 // mod-time and inode match an image in the shared cache, now check path
2349 const char* aPath
= (char*)sSharedCache
+ p
->pathFileOffset
;
2350 bool cacheHit
= (strcmp(path
, aPath
) == 0);
2351 if ( inodeMatch
&& !cacheHit
) {
2352 // path does not match install name of dylib in cache, but inode and mtime does match
2353 // perhaps path is a symlink to the cached dylib
2354 struct stat pathInCacheStatBuf
;
2355 if ( my_stat(aPath
, &pathInCacheStatBuf
) != -1 )
2356 cacheHit
= ( (pathInCacheStatBuf
.st_dev
== stat_buf
->st_dev
) && (pathInCacheStatBuf
.st_ino
== stat_buf
->st_ino
) );
2359 // found image in cache, return info
2360 *mh
= (macho_header
*)(p
->address
+sSharedCacheSlide
);
2361 //dyld::log("findInSharedCacheImage(), mh=%p, p->address=0x%0llX, slid=0x%0lX, path=%p\n",
2362 // *mh, p->address, sSharedCacheSlide, aPath);
2363 *pathInCache
= aPath
;
2364 *slide
= sSharedCacheSlide
;
2374 bool inSharedCache(const char* path
)
2376 const macho_header
* mhInCache
;
2377 const char* pathInCache
;
2379 return findInSharedCacheImage(path
, true, NULL
, &mhInCache
, &pathInCache
, &slide
);
2384 static ImageLoader
* checkandAddImage(ImageLoader
* image
, const LoadContext
& context
)
2386 // now sanity check that this loaded image does not have the same install path as any existing image
2387 const char* loadedImageInstallPath
= image
->getInstallPath();
2388 if ( image
->isDylib() && (loadedImageInstallPath
!= NULL
) && (loadedImageInstallPath
[0] == '/') ) {
2389 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
2390 ImageLoader
* anImage
= *it
;
2391 const char* installPath
= anImage
->getInstallPath();
2392 if ( installPath
!= NULL
) {
2393 if ( strcmp(loadedImageInstallPath
, installPath
) == 0 ) {
2394 //dyld::log("duplicate(%s) => %p\n", installPath, anImage);
2396 ImageLoader::deleteImage(image
);
2403 // some API's restrict what they can load
2404 if ( context
.mustBeBundle
&& !image
->isBundle() )
2405 throw "not a bundle";
2406 if ( context
.mustBeDylib
&& !image
->isDylib() )
2407 throw "not a dylib";
2409 // regular main executables cannot be loaded
2410 if ( image
->isExecutable() ) {
2411 if ( !context
.canBePIE
|| !image
->isPositionIndependentExecutable() )
2412 throw "can't load a main executable";
2415 // don't add bundles to global list, they can be loaded but not linked. When linked it will be added to list
2416 if ( ! image
->isBundle() )
2422 #if TARGET_IPHONE_SIMULATOR
2423 static bool isSimulatorBinary(const uint8_t* firstPage
, const char* path
)
2425 const macho_header
* mh
= (macho_header
*)firstPage
;
2426 const uint32_t cmd_count
= mh
->ncmds
;
2427 const struct load_command
* const cmds
= (struct load_command
*)(((char*)mh
)+sizeof(macho_header
));
2428 const struct load_command
* const cmdsReadEnd
= (struct load_command
*)(((char*)mh
)+4096);
2429 const struct load_command
* cmd
= cmds
;
2430 for (uint32_t i
= 0; i
< cmd_count
; ++i
) {
2432 case LC_VERSION_MIN_IPHONEOS
:
2433 case LC_VERSION_MIN_TVOS
:
2434 case LC_VERSION_MIN_WATCHOS
:
2436 case LC_VERSION_MIN_MACOSX
:
2437 // grandfather in a few libSystem dylibs
2438 if (strstr(path
, "/usr/lib/system") || strstr(path
, "/usr/lib/libSystem"))
2442 cmd
= (const struct load_command
*)(((char*)cmd
)+cmd
->cmdsize
);
2443 if ( cmd
> cmdsReadEnd
)
2450 // map in file and instantiate an ImageLoader
2451 static ImageLoader
* loadPhase6(int fd
, const struct stat
& stat_buf
, const char* path
, const LoadContext
& context
)
2453 //dyld::log("%s(%s)\n", __func__ , path);
2454 uint64_t fileOffset
= 0;
2455 uint64_t fileLength
= stat_buf
.st_size
;
2457 // validate it is a file (not directory)
2458 if ( (stat_buf
.st_mode
& S_IFMT
) != S_IFREG
)
2461 uint8_t firstPage
[4096];
2462 bool shortPage
= false;
2464 // min mach-o file is 4K
2465 if ( fileLength
< 4096 ) {
2466 if ( pread(fd
, firstPage
, fileLength
, 0) != (ssize_t
)fileLength
)
2467 throwf("pread of short file failed: %d", errno
);
2471 if ( pread(fd
, firstPage
, 4096,0) != 4096 )
2472 throwf("pread of first 4K failed: %d", errno
);
2475 // if fat wrapper, find usable sub-file
2476 const fat_header
* fileStartAsFat
= (fat_header
*)firstPage
;
2477 if ( fileStartAsFat
->magic
== OSSwapBigToHostInt32(FAT_MAGIC
) ) {
2478 if ( fatFindBest(fileStartAsFat
, &fileOffset
, &fileLength
) ) {
2479 if ( (fileOffset
+fileLength
) > (uint64_t)(stat_buf
.st_size
) )
2480 throwf("truncated fat file. file length=%llu, but needed slice goes to %llu", stat_buf
.st_size
, fileOffset
+fileLength
);
2481 if (pread(fd
, firstPage
, 4096, fileOffset
) != 4096)
2482 throwf("pread of fat file failed: %d", errno
);
2485 throw "no matching architecture in universal wrapper";
2489 // try mach-o loader
2491 throw "file too short";
2492 if ( isCompatibleMachO(firstPage
, path
) ) {
2494 // only MH_BUNDLE, MH_DYLIB, and some MH_EXECUTE can be dynamically loaded
2495 switch ( ((mach_header
*)firstPage
)->filetype
) {
2501 throw "mach-o, but wrong filetype";
2504 #if TARGET_IPHONE_SIMULATOR
2505 #if TARGET_OS_WATCH || TARGET_OS_TV
2506 // disable error during bring up of these simulators
2508 // <rdar://problem/14168872> dyld_sim should restrict loading osx binaries
2509 if ( !isSimulatorBinary(firstPage
, path
) ) {
2510 throw "mach-o, but not built for iOS simulator";
2515 // instantiate an image
2516 ImageLoader
* image
= ImageLoaderMachO::instantiateFromFile(path
, fd
, firstPage
, fileOffset
, fileLength
, stat_buf
, gLinkContext
);
2519 return checkandAddImage(image
, context
);
2522 // try other file formats here...
2525 // throw error about what was found
2526 switch (*(uint32_t*)firstPage
) {
2531 throw "mach-o, but wrong architecture";
2533 throwf("unknown file type, first eight bytes: 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X",
2534 firstPage
[0], firstPage
[1], firstPage
[2], firstPage
[3], firstPage
[4], firstPage
[5], firstPage
[6],firstPage
[7]);
2539 static ImageLoader
* loadPhase5open(const char* path
, const LoadContext
& context
, const struct stat
& stat_buf
, std::vector
<const char*>* exceptions
)
2541 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
2543 // open file (automagically closed when this function exits)
2544 FileOpener
file(path
);
2546 // just return NULL if file not found, but record any other errors
2547 if ( file
.getFileDescriptor() == -1 ) {
2549 if ( err
!= ENOENT
) {
2550 const char* newMsg
= dyld::mkstringf("%s: open() failed with errno=%d", path
, err
);
2551 exceptions
->push_back(newMsg
);
2557 return loadPhase6(file
.getFileDescriptor(), stat_buf
, path
, context
);
2559 catch (const char* msg
) {
2560 const char* newMsg
= dyld::mkstringf("%s: %s", path
, msg
);
2561 exceptions
->push_back(newMsg
);
2568 #if __MAC_OS_X_VERSION_MIN_REQUIRED
2569 static ImageLoader
* loadPhase5load(const char* path
, const char* orgPath
, const LoadContext
& context
, std::vector
<const char*>* exceptions
)
2571 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
2572 ImageLoader
* image
= NULL
;
2574 // just return NULL if file not found, but record any other errors
2575 struct stat stat_buf
;
2576 if ( my_stat(path
, &stat_buf
) == -1 ) {
2578 if ( err
!= ENOENT
) {
2579 exceptions
->push_back(dyld::mkstringf("%s: stat() failed with errno=%d", path
, err
));
2584 // in case image was renamed or found via symlinks, check for inode match
2585 image
= findLoadedImage(stat_buf
);
2586 if ( image
!= NULL
)
2589 // do nothing if not already loaded and if RTLD_NOLOAD or NSADDIMAGE_OPTION_RETURN_ONLY_IF_LOADED
2590 if ( context
.dontLoad
)
2593 #if DYLD_SHARED_CACHE_SUPPORT
2594 // see if this image is in shared cache
2595 const macho_header
* mhInCache
;
2596 const char* pathInCache
;
2598 if ( findInSharedCacheImage(path
, false, &stat_buf
, &mhInCache
, &pathInCache
, &slideInCache
) ) {
2599 image
= ImageLoaderMachO::instantiateFromCache(mhInCache
, pathInCache
, slideInCache
, stat_buf
, gLinkContext
);
2600 return checkandAddImage(image
, context
);
2603 // file exists and is not in dyld shared cache, so open it
2604 return loadPhase5open(path
, context
, stat_buf
, exceptions
);
2606 #endif // __MAC_OS_X_VERSION_MIN_REQUIRED
2610 #if __IPHONE_OS_VERSION_MIN_REQUIRED
2611 static ImageLoader
* loadPhase5stat(const char* path
, const LoadContext
& context
, struct stat
* stat_buf
,
2612 int* statErrNo
, bool* imageFound
, std::vector
<const char*>* exceptions
)
2614 ImageLoader
* image
= NULL
;
2615 *imageFound
= false;
2617 if ( my_stat(path
, stat_buf
) == 0 ) {
2618 // in case image was renamed or found via symlinks, check for inode match
2619 image
= findLoadedImage(*stat_buf
);
2620 if ( image
!= NULL
) {
2624 // do nothing if not already loaded and if RTLD_NOLOAD
2625 if ( context
.dontLoad
) {
2629 image
= loadPhase5open(path
, context
, *stat_buf
, exceptions
);
2630 if ( image
!= NULL
) {
2642 static ImageLoader
* loadPhase5load(const char* path
, const char* orgPath
, const LoadContext
& context
, std::vector
<const char*>* exceptions
)
2644 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
2645 struct stat stat_buf
;
2649 #if DYLD_SHARED_CACHE_SUPPORT
2650 if ( sDylibsOverrideCache
) {
2651 // flag is set that allows installed framework roots to override dyld shared cache
2652 image
= loadPhase5stat(path
, context
, &stat_buf
, &statErrNo
, &imageFound
, exceptions
);
2656 // see if this image is in shared cache
2657 const macho_header
* mhInCache
;
2658 const char* pathInCache
;
2660 if ( findInSharedCacheImage(path
, true, NULL
, &mhInCache
, &pathInCache
, &slideInCache
) ) {
2661 // see if this image in the cache was already loaded via a different path
2662 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); ++it
) {
2663 ImageLoader
* anImage
= *it
;
2664 if ( (const macho_header
*)anImage
->machHeader() == mhInCache
)
2667 // do nothing if not already loaded and if RTLD_NOLOAD
2668 if ( context
.dontLoad
)
2670 // nope, so instantiate a new image from dyld shared cache
2671 // <rdar://problem/7014995> zero out stat buffer so mtime, etc are zero for items from the shared cache
2672 bzero(&stat_buf
, sizeof(stat_buf
));
2673 image
= ImageLoaderMachO::instantiateFromCache(mhInCache
, pathInCache
, slideInCache
, stat_buf
, gLinkContext
);
2674 return checkandAddImage(image
, context
);
2677 if ( !sDylibsOverrideCache
) {
2678 // flag is not set, and not in cache to try opening it
2679 image
= loadPhase5stat(path
, context
, &stat_buf
, &statErrNo
, &imageFound
, exceptions
);
2684 image
= loadPhase5stat(path
, context
, &stat_buf
, &statErrNo
, &imageFound
, exceptions
);
2688 // just return NULL if file not found, but record any other errors
2689 if ( (statErrNo
!= ENOENT
) && (statErrNo
!= 0) ) {
2690 exceptions
->push_back(dyld::mkstringf("%s: stat() failed with errno=%d", path
, statErrNo
));
2694 #endif // __IPHONE_OS_VERSION_MIN_REQUIRED
2697 // look for path match with existing loaded images
2698 static ImageLoader
* loadPhase5check(const char* path
, const char* orgPath
, const LoadContext
& context
)
2700 //dyld::log("%s(%s, %s)\n", __func__ , path, orgPath);
2701 // search path against load-path and install-path of all already loaded images
2702 uint32_t hash
= ImageLoader::hash(path
);
2703 //dyld::log("check() hash=%d, path=%s\n", hash, path);
2704 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
2705 ImageLoader
* anImage
= *it
;
2706 // check hash first to cut down on strcmp calls
2707 //dyld::log(" check() hash=%d, path=%s\n", anImage->getPathHash(), anImage->getPath());
2708 if ( anImage
->getPathHash() == hash
) {
2709 if ( strcmp(path
, anImage
->getPath()) == 0 ) {
2710 // if we are looking for a dylib don't return something else
2711 if ( !context
.mustBeDylib
|| anImage
->isDylib() )
2715 if ( context
.matchByInstallName
|| anImage
->matchInstallPath() ) {
2716 const char* installPath
= anImage
->getInstallPath();
2717 if ( installPath
!= NULL
) {
2718 if ( strcmp(path
, installPath
) == 0 ) {
2719 // if we are looking for a dylib don't return something else
2720 if ( !context
.mustBeDylib
|| anImage
->isDylib() )
2725 // an install name starting with @rpath should match by install name, not just real path
2726 if ( (orgPath
[0] == '@') && (strncmp(orgPath
, "@rpath/", 7) == 0) ) {
2727 const char* installPath
= anImage
->getInstallPath();
2728 if ( installPath
!= NULL
) {
2729 if ( !context
.mustBeDylib
|| anImage
->isDylib() ) {
2730 if ( strcmp(orgPath
, installPath
) == 0 )
2737 //dyld::log("%s(%s) => NULL\n", __func__, path);
2742 // open or check existing
2743 static ImageLoader
* loadPhase5(const char* path
, const char* orgPath
, const LoadContext
& context
, std::vector
<const char*>* exceptions
)
2745 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
2747 // check for specific dylib overrides
2748 for (std::vector
<DylibOverride
>::iterator it
= sDylibOverrides
.begin(); it
!= sDylibOverrides
.end(); ++it
) {
2749 if ( strcmp(it
->installName
, path
) == 0 ) {
2750 path
= it
->override
;
2755 if ( exceptions
!= NULL
)
2756 return loadPhase5load(path
, orgPath
, context
, exceptions
);
2758 return loadPhase5check(path
, orgPath
, context
);
2761 // try with and without image suffix
2762 static ImageLoader
* loadPhase4(const char* path
, const char* orgPath
, const LoadContext
& context
, std::vector
<const char*>* exceptions
)
2764 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
2765 ImageLoader
* image
= NULL
;
2766 if ( gLinkContext
.imageSuffix
!= NULL
) {
2767 char pathWithSuffix
[strlen(path
)+strlen( gLinkContext
.imageSuffix
)+2];
2768 ImageLoader::addSuffix(path
, gLinkContext
.imageSuffix
, pathWithSuffix
);
2769 image
= loadPhase5(pathWithSuffix
, orgPath
, context
, exceptions
);
2771 if ( image
== NULL
)
2772 image
= loadPhase5(path
, orgPath
, context
, exceptions
);
2776 static ImageLoader
* loadPhase2(const char* path
, const char* orgPath
, const LoadContext
& context
,
2777 const char* const frameworkPaths
[], const char* const libraryPaths
[],
2778 std::vector
<const char*>* exceptions
); // forward reference
2781 // expand @ variables
2782 static ImageLoader
* loadPhase3(const char* path
, const char* orgPath
, const LoadContext
& context
, std::vector
<const char*>* exceptions
)
2784 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
2785 ImageLoader
* image
= NULL
;
2786 if ( strncmp(path
, "@executable_path/", 17) == 0 ) {
2787 // executable_path cannot be in used in any binary in a setuid process rdar://problem/4589305
2788 if ( sProcessIsRestricted
&& !sProcessRequiresLibraryValidation
)
2789 throwf("unsafe use of @executable_path in %s with restricted binary", context
.origin
);
2790 // handle @executable_path path prefix
2791 const char* executablePath
= sExecPath
;
2792 char newPath
[strlen(executablePath
) + strlen(path
)];
2793 strcpy(newPath
, executablePath
);
2794 char* addPoint
= strrchr(newPath
,'/');
2795 if ( addPoint
!= NULL
)
2796 strcpy(&addPoint
[1], &path
[17]);
2798 strcpy(newPath
, &path
[17]);
2799 image
= loadPhase4(newPath
, orgPath
, context
, exceptions
);
2800 if ( image
!= NULL
)
2803 // perhaps main executable path is a sym link, find realpath and retry
2804 char resolvedPath
[PATH_MAX
];
2805 if ( realpath(sExecPath
, resolvedPath
) != NULL
) {
2806 char newRealPath
[strlen(resolvedPath
) + strlen(path
)];
2807 strcpy(newRealPath
, resolvedPath
);
2808 char* addPoint
= strrchr(newRealPath
,'/');
2809 if ( addPoint
!= NULL
)
2810 strcpy(&addPoint
[1], &path
[17]);
2812 strcpy(newRealPath
, &path
[17]);
2813 image
= loadPhase4(newRealPath
, orgPath
, context
, exceptions
);
2814 if ( image
!= NULL
)
2818 else if ( (strncmp(path
, "@loader_path/", 13) == 0) && (context
.origin
!= NULL
) ) {
2819 // @loader_path cannot be used from the main executable of a setuid process rdar://problem/4589305
2820 if ( sProcessIsRestricted
&& (strcmp(context
.origin
, sExecPath
) == 0) && !sProcessRequiresLibraryValidation
)
2821 throwf("unsafe use of @loader_path in %s with restricted binary", context
.origin
);
2822 // handle @loader_path path prefix
2823 char newPath
[strlen(context
.origin
) + strlen(path
)];
2824 strcpy(newPath
, context
.origin
);
2825 char* addPoint
= strrchr(newPath
,'/');
2826 if ( addPoint
!= NULL
)
2827 strcpy(&addPoint
[1], &path
[13]);
2829 strcpy(newPath
, &path
[13]);
2830 image
= loadPhase4(newPath
, orgPath
, context
, exceptions
);
2831 if ( image
!= NULL
)
2834 // perhaps loader path is a sym link, find realpath and retry
2835 char resolvedPath
[PATH_MAX
];
2836 if ( realpath(context
.origin
, resolvedPath
) != NULL
) {
2837 char newRealPath
[strlen(resolvedPath
) + strlen(path
)];
2838 strcpy(newRealPath
, resolvedPath
);
2839 char* addPoint
= strrchr(newRealPath
,'/');
2840 if ( addPoint
!= NULL
)
2841 strcpy(&addPoint
[1], &path
[13]);
2843 strcpy(newRealPath
, &path
[13]);
2844 image
= loadPhase4(newRealPath
, orgPath
, context
, exceptions
);
2845 if ( image
!= NULL
)
2849 else if ( context
.implicitRPath
|| (strncmp(path
, "@rpath/", 7) == 0) ) {
2850 const char* trailingPath
= (strncmp(path
, "@rpath/", 7) == 0) ? &path
[7] : path
;
2851 // substitute @rpath with all -rpath paths up the load chain
2852 for(const ImageLoader::RPathChain
* rp
=context
.rpath
; rp
!= NULL
; rp
=rp
->next
) {
2853 if (rp
->paths
!= NULL
) {
2854 for(std::vector
<const char*>::iterator it
=rp
->paths
->begin(); it
!= rp
->paths
->end(); ++it
) {
2855 const char* anRPath
= *it
;
2856 char newPath
[strlen(anRPath
) + strlen(trailingPath
)+2];
2857 strcpy(newPath
, anRPath
);
2858 strcat(newPath
, "/");
2859 strcat(newPath
, trailingPath
);
2860 image
= loadPhase4(newPath
, orgPath
, context
, exceptions
);
2861 if ( gLinkContext
.verboseRPaths
&& (exceptions
!= NULL
) ) {
2862 if ( image
!= NULL
)
2863 dyld::log("RPATH successful expansion of %s to: %s\n", orgPath
, newPath
);
2865 dyld::log("RPATH failed to expanding %s to: %s\n", orgPath
, newPath
);
2867 if ( image
!= NULL
)
2873 // substitute @rpath with LD_LIBRARY_PATH
2874 if ( sEnv
.LD_LIBRARY_PATH
!= NULL
) {
2875 image
= loadPhase2(trailingPath
, orgPath
, context
, NULL
, sEnv
.LD_LIBRARY_PATH
, exceptions
);
2876 if ( image
!= NULL
)
2880 // if this is the "open" pass, don't try to open @rpath/... as a relative path
2881 if ( (exceptions
!= NULL
) && (trailingPath
!= path
) )
2884 else if (sProcessIsRestricted
&& (path
[0] != '/' ) && !sProcessRequiresLibraryValidation
) {
2885 throwf("unsafe use of relative rpath %s in %s with restricted binary", path
, context
.origin
);
2888 return loadPhase4(path
, orgPath
, context
, exceptions
);
2893 static ImageLoader
* loadPhase2(const char* path
, const char* orgPath
, const LoadContext
& context
,
2894 const char* const frameworkPaths
[], const char* const libraryPaths
[],
2895 std::vector
<const char*>* exceptions
)
2897 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
2898 ImageLoader
* image
= NULL
;
2899 const char* frameworkPartialPath
= getFrameworkPartialPath(path
);
2900 if ( frameworkPaths
!= NULL
) {
2901 if ( frameworkPartialPath
!= NULL
) {
2902 const size_t frameworkPartialPathLen
= strlen(frameworkPartialPath
);
2903 for(const char* const* fp
= frameworkPaths
; *fp
!= NULL
; ++fp
) {
2904 char npath
[strlen(*fp
)+frameworkPartialPathLen
+8];
2907 strcat(npath
, frameworkPartialPath
);
2908 //dyld::log("dyld: fallback framework path used: %s() -> loadPhase4(\"%s\", ...)\n", __func__, npath);
2909 image
= loadPhase4(npath
, orgPath
, context
, exceptions
);
2910 if ( image
!= NULL
)
2915 // <rdar://problem/12649639> An executable with the same name as a framework & DYLD_LIBRARY_PATH pointing to it gets loaded twice
2916 // <rdar://problem/14160846> Some apps depend on frameworks being found via library paths
2917 if ( (libraryPaths
!= NULL
) && ((frameworkPartialPath
== NULL
) || sFrameworksFoundAsDylibs
) ) {
2918 const char* libraryLeafName
= getLibraryLeafName(path
);
2919 const size_t libraryLeafNameLen
= strlen(libraryLeafName
);
2920 for(const char* const* lp
= libraryPaths
; *lp
!= NULL
; ++lp
) {
2921 char libpath
[strlen(*lp
)+libraryLeafNameLen
+8];
2922 strcpy(libpath
, *lp
);
2923 strcat(libpath
, "/");
2924 strcat(libpath
, libraryLeafName
);
2925 //dyld::log("dyld: fallback library path used: %s() -> loadPhase4(\"%s\", ...)\n", __func__, libpath);
2926 image
= loadPhase4(libpath
, orgPath
, context
, exceptions
);
2927 if ( image
!= NULL
)
2934 // try search overrides and fallbacks
2935 static ImageLoader
* loadPhase1(const char* path
, const char* orgPath
, const LoadContext
& context
, std::vector
<const char*>* exceptions
)
2937 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
2938 ImageLoader
* image
= NULL
;
2940 // handle LD_LIBRARY_PATH environment variables that force searching
2941 if ( context
.useLdLibraryPath
&& (sEnv
.LD_LIBRARY_PATH
!= NULL
) ) {
2942 image
= loadPhase2(path
, orgPath
, context
, NULL
, sEnv
.LD_LIBRARY_PATH
, exceptions
);
2943 if ( image
!= NULL
)
2947 // handle DYLD_ environment variables that force searching
2948 if ( context
.useSearchPaths
&& ((sEnv
.DYLD_FRAMEWORK_PATH
!= NULL
) || (sEnv
.DYLD_LIBRARY_PATH
!= NULL
)) ) {
2949 image
= loadPhase2(path
, orgPath
, context
, sEnv
.DYLD_FRAMEWORK_PATH
, sEnv
.DYLD_LIBRARY_PATH
, exceptions
);
2950 if ( image
!= NULL
)
2955 image
= loadPhase3(path
, orgPath
, context
, exceptions
);
2956 if ( image
!= NULL
)
2959 // try fallback paths during second time (will open file)
2960 const char* const* fallbackLibraryPaths
= sEnv
.DYLD_FALLBACK_LIBRARY_PATH
;
2961 if ( (fallbackLibraryPaths
!= NULL
) && !context
.useFallbackPaths
)
2962 fallbackLibraryPaths
= NULL
;
2963 if ( !context
.dontLoad
&& (exceptions
!= NULL
) && ((sEnv
.DYLD_FALLBACK_FRAMEWORK_PATH
!= NULL
) || (fallbackLibraryPaths
!= NULL
)) ) {
2964 image
= loadPhase2(path
, orgPath
, context
, sEnv
.DYLD_FALLBACK_FRAMEWORK_PATH
, fallbackLibraryPaths
, exceptions
);
2965 if ( image
!= NULL
)
2972 // try root substitutions
2973 static ImageLoader
* loadPhase0(const char* path
, const char* orgPath
, const LoadContext
& context
, std::vector
<const char*>* exceptions
)
2975 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
2977 // handle DYLD_ROOT_PATH which forces absolute paths to use a new root
2978 if ( (gLinkContext
.rootPaths
!= NULL
) && (path
[0] == '/') ) {
2979 for(const char* const* rootPath
= gLinkContext
.rootPaths
; *rootPath
!= NULL
; ++rootPath
) {
2980 char newPath
[strlen(*rootPath
) + strlen(path
)+2];
2981 strcpy(newPath
, *rootPath
);
2982 strcat(newPath
, path
);
2983 ImageLoader
* image
= loadPhase1(newPath
, orgPath
, context
, exceptions
);
2984 if ( image
!= NULL
)
2990 return loadPhase1(path
, orgPath
, context
, exceptions
);
2993 #if DYLD_SHARED_CACHE_SUPPORT
2994 static bool cacheablePath(const char* path
) {
2995 if (strncmp(path
, "/usr/lib/", 9) == 0)
2997 if (strncmp(path
, "/System/Library/", 16) == 0)
3004 // Given all the DYLD_ environment variables, the general case for loading libraries
3005 // is that any given path expands into a list of possible locations to load. We
3006 // also must take care to ensure two copies of the "same" library are never loaded.
3008 // The algorithm used here is that there is a separate function for each "phase" of the
3009 // path expansion. Each phase function calls the next phase with each possible expansion
3010 // of that phase. The result is the last phase is called with all possible paths.
3012 // To catch duplicates the algorithm is run twice. The first time, the last phase checks
3013 // the path against all loaded images. The second time, the last phase calls open() on
3014 // the path. Either time, if an image is found, the phases all unwind without checking
3017 ImageLoader
* load(const char* path
, const LoadContext
& context
)
3019 CRSetCrashLogMessage2(path
);
3020 const char* orgPath
= path
;
3022 //dyld::log("%s(%s)\n", __func__ , path);
3023 char realPath
[PATH_MAX
];
3024 // when DYLD_IMAGE_SUFFIX is in used, do a realpath(), otherwise a load of "Foo.framework/Foo" will not match
3025 if ( context
.useSearchPaths
&& ( gLinkContext
.imageSuffix
!= NULL
) ) {
3026 if ( realpath(path
, realPath
) != NULL
)
3030 // try all path permutations and check against existing loaded images
3031 ImageLoader
* image
= loadPhase0(path
, orgPath
, context
, NULL
);
3032 if ( image
!= NULL
) {
3033 CRSetCrashLogMessage2(NULL
);
3037 // try all path permutations and try open() until first success
3038 std::vector
<const char*> exceptions
;
3039 image
= loadPhase0(path
, orgPath
, context
, &exceptions
);
3040 #if __IPHONE_OS_VERSION_MIN_REQUIRED && DYLD_SHARED_CACHE_SUPPORT && !TARGET_IPHONE_SIMULATOR
3041 // <rdar://problem/16704628> support symlinks on disk to a path in dyld shared cache
3042 if ( (image
== NULL
) && cacheablePath(path
) && !context
.dontLoad
) {
3043 char resolvedPath
[PATH_MAX
];
3044 realpath(path
, resolvedPath
);
3046 // If realpath() resolves to a path which does not exist on disk, errno is set to ENOENT
3047 if ( (myerr
== ENOENT
) || (myerr
== 0) )
3049 // see if this image is in shared cache
3050 const macho_header
* mhInCache
;
3051 const char* pathInCache
;
3053 if ( findInSharedCacheImage(resolvedPath
, false, NULL
, &mhInCache
, &pathInCache
, &slideInCache
) ) {
3054 struct stat stat_buf
;
3055 bzero(&stat_buf
, sizeof(stat_buf
));
3057 image
= ImageLoaderMachO::instantiateFromCache(mhInCache
, pathInCache
, slideInCache
, stat_buf
, gLinkContext
);
3058 image
= checkandAddImage(image
, context
);
3067 CRSetCrashLogMessage2(NULL
);
3068 if ( image
!= NULL
) {
3069 // <rdar://problem/6916014> leak in dyld during dlopen when using DYLD_ variables
3070 for (std::vector
<const char*>::iterator it
= exceptions
.begin(); it
!= exceptions
.end(); ++it
) {
3073 #if DYLD_SHARED_CACHE_SUPPORT
3074 // if loaded image is not from cache, but original path is in cache
3075 // set gSharedCacheOverridden flag to disable some ObjC optimizations
3076 if ( !gSharedCacheOverridden
&& !image
->inSharedCache() && image
->isDylib() && cacheablePath(path
) && inSharedCache(path
) ) {
3077 gSharedCacheOverridden
= true;
3082 else if ( exceptions
.size() == 0 ) {
3083 if ( context
.dontLoad
) {
3087 throw "image not found";
3090 const char* msgStart
= "no suitable image found. Did find:";
3091 const char* delim
= "\n\t";
3092 size_t allsizes
= strlen(msgStart
)+8;
3093 for (size_t i
=0; i
< exceptions
.size(); ++i
)
3094 allsizes
+= (strlen(exceptions
[i
]) + strlen(delim
));
3095 char* fullMsg
= new char[allsizes
];
3096 strcpy(fullMsg
, msgStart
);
3097 for (size_t i
=0; i
< exceptions
.size(); ++i
) {
3098 strcat(fullMsg
, delim
);
3099 strcat(fullMsg
, exceptions
[i
]);
3100 free((void*)exceptions
[i
]);
3102 throw (const char*)fullMsg
;
3108 #if DYLD_SHARED_CACHE_SUPPORT
3113 #define ARCH_NAME "i386"
3114 #define ARCH_CACHE_MAGIC "dyld_v1 i386"
3116 #define ARCH_NAME "x86_64"
3117 #define ARCH_CACHE_MAGIC "dyld_v1 x86_64"
3118 #define ARCH_NAME_H "x86_64h"
3119 #define ARCH_CACHE_MAGIC_H "dyld_v1 x86_64h"
3120 #elif __ARM_ARCH_5TEJ__
3121 #define ARCH_NAME "armv5"
3122 #define ARCH_CACHE_MAGIC "dyld_v1 armv5"
3123 #elif __ARM_ARCH_6K__
3124 #define ARCH_NAME "armv6"
3125 #define ARCH_CACHE_MAGIC "dyld_v1 armv6"
3126 #elif __ARM_ARCH_7F__
3127 #define ARCH_NAME "armv7f"
3128 #define ARCH_CACHE_MAGIC "dyld_v1 armv7f"
3129 #elif __ARM_ARCH_7K__
3130 #define ARCH_NAME "armv7k"
3131 #define ARCH_CACHE_MAGIC "dyld_v1 armv7k"
3132 #elif __ARM_ARCH_7A__
3133 #define ARCH_NAME "armv7"
3134 #define ARCH_CACHE_MAGIC "dyld_v1 armv7"
3135 #elif __ARM_ARCH_7S__
3136 #define ARCH_NAME "armv7s"
3137 #define ARCH_CACHE_MAGIC "dyld_v1 armv7s"
3139 #define ARCH_NAME "arm64"
3140 #define ARCH_CACHE_MAGIC "dyld_v1 arm64"
3144 static int __attribute__((noinline
)) _shared_region_check_np(uint64_t* start_address
)
3146 if ( gLinkContext
.sharedRegionMode
== ImageLoader::kUseSharedRegion
)
3147 return syscall(294, start_address
);
3152 static int __attribute__((noinline
)) _shared_region_map_and_slide_np(int fd
, uint32_t count
, const shared_file_mapping_np mappings
[],
3153 int codeSignatureMappingIndex
, long slide
, void* slideInfo
, unsigned long slideInfoSize
)
3155 // register code signature blob for whole dyld cache
3156 if ( codeSignatureMappingIndex
!= -1 ) {
3157 fsignatures_t siginfo
;
3158 siginfo
.fs_file_start
= 0; // cache always starts at beginning of file
3159 siginfo
.fs_blob_start
= (void*)mappings
[codeSignatureMappingIndex
].sfm_file_offset
;
3160 siginfo
.fs_blob_size
= mappings
[codeSignatureMappingIndex
].sfm_size
;
3161 int result
= fcntl(fd
, F_ADDFILESIGS
, &siginfo
);
3162 // <rdar://problem/12891874> don't warn in chrooted case because mapping syscall is about to fail too
3163 if ( (result
== -1) && gLinkContext
.verboseMapping
)
3164 dyld::log("dyld: code signature registration for shared cache failed with errno=%d\n", errno
);
3167 if ( gLinkContext
.sharedRegionMode
== ImageLoader::kUseSharedRegion
) {
3168 return syscall(438, fd
, count
, mappings
, slide
, slideInfo
, slideInfoSize
);
3171 // remove the shared region sub-map
3172 vm_deallocate(mach_task_self(), (vm_address_t
)SHARED_REGION_BASE
, SHARED_REGION_SIZE
);
3174 // notify gdb or other lurkers that this process is no longer using the shared region
3175 dyld::gProcessInfo
->processDetachedFromSharedRegion
= true;
3177 // map cache just for this process with mmap()
3178 const shared_file_mapping_np
* const start
= mappings
;
3179 const shared_file_mapping_np
* const end
= &mappings
[count
];
3180 for (const shared_file_mapping_np
* p
= start
; p
< end
; ++p
) {
3181 void* mmapAddress
= (void*)(uintptr_t)(p
->sfm_address
);
3182 size_t size
= p
->sfm_size
;
3183 //dyld::log("dyld: mapping address %p with size 0x%08lX\n", mmapAddress, size);
3185 if ( p
->sfm_init_prot
& VM_PROT_EXECUTE
)
3186 protection
|= PROT_EXEC
;
3187 if ( p
->sfm_init_prot
& VM_PROT_READ
)
3188 protection
|= PROT_READ
;
3189 if ( p
->sfm_init_prot
& VM_PROT_WRITE
)
3190 protection
|= PROT_WRITE
;
3191 off_t offset
= p
->sfm_file_offset
;
3192 if ( mmap(mmapAddress
, size
, protection
, MAP_FIXED
| MAP_PRIVATE
, fd
, offset
) != mmapAddress
) {
3193 // failed to map some chunk of this shared cache file
3194 // clear shared region
3195 vm_deallocate(mach_task_self(), (vm_address_t
)SHARED_REGION_BASE
, SHARED_REGION_SIZE
);
3196 // go back to not using shared region at all
3197 gLinkContext
.sharedRegionMode
= ImageLoader::kDontUseSharedRegion
;
3198 if ( gLinkContext
.verboseMapping
) {
3199 dyld::log("dyld: shared cached region cannot be mapped at address %p with size 0x%08lX\n",
3207 // update all __DATA pages with slide info
3209 const uintptr_t dataPagesStart
= mappings
[1].sfm_address
;
3210 const dyld_cache_slide_info
* slideInfoHeader
= (dyld_cache_slide_info
*)slideInfo
;
3211 const uint16_t* toc
= (uint16_t*)((long)(slideInfoHeader
) + slideInfoHeader
->toc_offset
);
3212 const uint8_t* entries
= (uint8_t*)((long)(slideInfoHeader
) + slideInfoHeader
->entries_offset
);
3213 for(uint32_t i
=0; i
< slideInfoHeader
->toc_count
; ++i
) {
3214 const uint8_t* entry
= &entries
[toc
[i
]*slideInfoHeader
->entries_size
];
3215 const uint8_t* page
= (uint8_t*)(long)(dataPagesStart
+ (4096*i
));
3216 //dyld::log("page=%p toc[%d]=%d entries=%p\n", page, i, toc[i], entry);
3217 for(int j
=0; j
< 128; ++j
) {
3218 uint8_t b
= entry
[j
];
3219 //dyld::log(" entry[%d] = 0x%02X\n", j, b);
3221 for(int k
=0; k
< 8; ++k
) {
3223 uintptr_t* p
= (uintptr_t*)(page
+ j
*8*4 + k
*4);
3224 uintptr_t value
= *p
;
3225 //dyld::log(" *%p was 0x%lX will be 0x%lX\n", p, value, value+sSharedCacheSlide);
3234 // succesfully mapped shared cache for just this process
3235 gLinkContext
.sharedRegionMode
= ImageLoader::kUsePrivateSharedRegion
;
3241 const void* imMemorySharedCacheHeader()
3243 return sSharedCache
;
3246 const char* getStandardSharedCacheFilePath()
3248 #if __IPHONE_OS_VERSION_MIN_REQUIRED
3249 return IPHONE_DYLD_SHARED_CACHE_DIR DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME
;
3253 const char* path2
= MACOSX_DYLD_SHARED_CACHE_DIR DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME_H
;
3254 struct stat statBuf
;
3255 if ( my_stat(path2
, &statBuf
) == 0 )
3259 return MACOSX_DYLD_SHARED_CACHE_DIR DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME
;
3263 int openSharedCacheFile()
3265 char path
[MAXPATHLEN
];
3266 strlcpy(path
, sSharedCacheDir
, MAXPATHLEN
);
3267 strlcat(path
, "/", MAXPATHLEN
);
3270 strlcat(path
, DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME_H
, MAXPATHLEN
);
3271 int fd
= my_open(path
, O_RDONLY
, 0);
3273 if ( gLinkContext
.verboseMapping
)
3274 dyld::log("dyld: Mapping%s shared cache from %s\n", (gLinkContext
.sharedRegionMode
== ImageLoader::kUsePrivateSharedRegion
) ? " private": "", path
);
3277 strlcpy(path
, sSharedCacheDir
, MAXPATHLEN
);
3280 strlcat(path
, DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME
, MAXPATHLEN
);
3281 if ( gLinkContext
.verboseMapping
)
3282 dyld::log("dyld: Mapping%s shared cache from %s\n", (gLinkContext
.sharedRegionMode
== ImageLoader::kUsePrivateSharedRegion
) ? " private": "", path
);
3283 return my_open(path
, O_RDONLY
, 0);
3287 static void getCacheBounds(uint32_t mappingsCount
, const shared_file_mapping_np mappings
[], uint64_t& lowAddress
, uint64_t& highAddress
)
3291 for(uint32_t i
=0; i
< mappingsCount
; ++i
) {
3292 if ( lowAddress
== 0 ) {
3293 lowAddress
= mappings
[i
].sfm_address
;
3294 highAddress
= mappings
[i
].sfm_address
+ mappings
[i
].sfm_size
;
3297 if ( mappings
[i
].sfm_address
< lowAddress
)
3298 lowAddress
= mappings
[i
].sfm_address
;
3299 if ( (mappings
[i
].sfm_address
+ mappings
[i
].sfm_size
) > highAddress
)
3300 highAddress
= mappings
[i
].sfm_address
+ mappings
[i
].sfm_size
;
3305 static long pickCacheSlide(uint32_t mappingsCount
, shared_file_mapping_np mappings
[])
3308 // x86_64 has a two memory regions:
3309 // 256MB at 0x00007FFF70000000
3310 // 1024MB at 0x00007FFF80000000
3311 // Some old shared caches have r/w region after rx region, so all regions slide within 1GB range
3312 // Newer shared caches have r/w region based at 0x7FFF70000000 and r/o regions at 0x7FFF80000000, so each part has max slide
3313 if ( (mappingsCount
>= 3) && (mappings
[1].sfm_init_prot
== (VM_PROT_READ
|VM_PROT_WRITE
)) && (mappings
[1].sfm_address
== 0x00007FFF70000000) ) {
3314 const uint64_t rwSize
= mappings
[1].sfm_size
;
3315 const uint64_t rwSlop
= 0x10000000ULL
- rwSize
;
3316 const uint64_t roSize
= (mappings
[2].sfm_address
+ mappings
[2].sfm_size
) - mappings
[0].sfm_address
;
3317 const uint64_t roSlop
= 0x40000000ULL
- roSize
;
3318 const uint64_t space
= (rwSlop
< roSlop
) ? rwSlop
: roSlop
;
3320 // choose new random slide
3321 long slide
= (arc4random() % space
) & (-4096);
3322 //dyld::log("rwSlop=0x%0llX, roSlop=0x%0llX\n", rwSlop, roSlop);
3323 //dyld::log("space=0x%0llX, slide=0x%0lX\n", space, slide);
3326 for(uint32_t i
=0; i
< mappingsCount
; ++i
) {
3327 mappings
[i
].sfm_address
+= slide
;
3332 // else fall through to handle old style cache
3334 // get bounds of cache
3335 uint64_t lowAddress
;
3336 uint64_t highAddress
;
3337 getCacheBounds(mappingsCount
, mappings
, lowAddress
, highAddress
);
3340 const uint64_t space
= (SHARED_REGION_BASE
+ SHARED_REGION_SIZE
) - highAddress
;
3342 // choose new random slide
3343 long slide
= dyld_page_trunc(arc4random() % space
);
3344 //dyld::log("slideSpace=0x%0llX\n", space);
3345 //dyld::log("slide=0x%0lX\n", slide);
3348 for(uint32_t i
=0; i
< mappingsCount
; ++i
) {
3349 mappings
[i
].sfm_address
+= slide
;
3355 static void mapSharedCache()
3357 uint64_t cacheBaseAddress
= 0;
3358 // quick check if a cache is already mapped into shared region
3359 if ( _shared_region_check_np(&cacheBaseAddress
) == 0 ) {
3360 sSharedCache
= (dyld_cache_header
*)cacheBaseAddress
;
3361 // if we don't understand the currently mapped shared cache, then ignore
3363 const char* magic
= (sHaswell
? ARCH_CACHE_MAGIC_H
: ARCH_CACHE_MAGIC
);
3365 const char* magic
= ARCH_CACHE_MAGIC
;
3367 if ( strcmp(sSharedCache
->magic
, magic
) != 0 ) {
3368 sSharedCache
= NULL
;
3369 if ( gLinkContext
.verboseMapping
) {
3370 dyld::log("dyld: existing shared cached in memory is not compatible\n");
3374 // check if cache file is slidable
3375 const dyld_cache_header
* header
= sSharedCache
;
3376 if ( (header
->mappingOffset
>= 0x48) && (header
->slideInfoSize
!= 0) ) {
3377 // solve for slide by comparing loaded address to address of first region
3378 const uint8_t* loadedAddress
= (uint8_t*)sSharedCache
;
3379 const dyld_cache_mapping_info
* const mappings
= (dyld_cache_mapping_info
*)(loadedAddress
+header
->mappingOffset
);
3380 const uint8_t* preferedLoadAddress
= (uint8_t*)(long)(mappings
[0].address
);
3381 sSharedCacheSlide
= loadedAddress
- preferedLoadAddress
;
3382 dyld::gProcessInfo
->sharedCacheSlide
= sSharedCacheSlide
;
3383 //dyld::log("sSharedCacheSlide=0x%08lX, loadedAddress=%p, preferedLoadAddress=%p\n", sSharedCacheSlide, loadedAddress, preferedLoadAddress);
3385 // if cache has a uuid, copy it
3386 if ( header
->mappingOffset
>= 0x68 ) {
3387 memcpy(dyld::gProcessInfo
->sharedCacheUUID
, header
->uuid
, 16);
3390 if ( gLinkContext
.verboseMapping
) {
3391 dyld::log("dyld: re-using existing shared cache mapping\n");
3395 #if __i386__ || __x86_64__
3396 // <rdar://problem/5925940> Safe Boot should disable dyld shared cache
3397 // if we are in safe-boot mode and the cache was not made during this boot cycle,
3398 // delete the cache file
3399 uint32_t safeBootValue
= 0;
3400 size_t safeBootValueSize
= sizeof(safeBootValue
);
3401 if ( (sysctlbyname("kern.safeboot", &safeBootValue
, &safeBootValueSize
, NULL
, 0) == 0) && (safeBootValue
!= 0) ) {
3402 // user booted machine in safe-boot mode
3403 struct stat dyldCacheStatInfo
;
3404 // Don't use custom DYLD_SHARED_CACHE_DIR if provided, use standard path
3405 if ( my_stat(MACOSX_DYLD_SHARED_CACHE_DIR DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME
, &dyldCacheStatInfo
) == 0 ) {
3406 struct timeval bootTimeValue
;
3407 size_t bootTimeValueSize
= sizeof(bootTimeValue
);
3408 if ( (sysctlbyname("kern.boottime", &bootTimeValue
, &bootTimeValueSize
, NULL
, 0) == 0) && (bootTimeValue
.tv_sec
!= 0) ) {
3409 // if the cache file was created before this boot, then throw it away and let it rebuild itself
3410 if ( dyldCacheStatInfo
.st_mtime
< bootTimeValue
.tv_sec
) {
3411 ::unlink(MACOSX_DYLD_SHARED_CACHE_DIR DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME
);
3412 gLinkContext
.sharedRegionMode
= ImageLoader::kDontUseSharedRegion
;
3419 // map in shared cache to shared region
3420 int fd
= openSharedCacheFile();
3422 uint8_t firstPages
[8192];
3423 if ( ::read(fd
, firstPages
, 8192) == 8192 ) {
3424 dyld_cache_header
* header
= (dyld_cache_header
*)firstPages
;
3426 const char* magic
= (sHaswell
? ARCH_CACHE_MAGIC_H
: ARCH_CACHE_MAGIC
);
3428 const char* magic
= ARCH_CACHE_MAGIC
;
3430 if ( strcmp(header
->magic
, magic
) == 0 ) {
3431 const dyld_cache_mapping_info
* const fileMappingsStart
= (dyld_cache_mapping_info
*)&firstPages
[header
->mappingOffset
];
3432 const dyld_cache_mapping_info
* const fileMappingsEnd
= &fileMappingsStart
[header
->mappingCount
];
3433 shared_file_mapping_np mappings
[header
->mappingCount
+1]; // add room for code-sig
3434 unsigned int mappingCount
= header
->mappingCount
;
3435 int codeSignatureMappingIndex
= -1;
3436 int readWriteMappingIndex
= -1;
3437 int readOnlyMappingIndex
= -1;
3438 // validate that the cache file has not been truncated
3439 bool goodCache
= false;
3440 struct stat stat_buf
;
3441 if ( fstat(fd
, &stat_buf
) == 0 ) {
3444 for (const dyld_cache_mapping_info
* p
= fileMappingsStart
; p
< fileMappingsEnd
; ++p
, ++i
) {
3445 mappings
[i
].sfm_address
= p
->address
;
3446 mappings
[i
].sfm_size
= p
->size
;
3447 mappings
[i
].sfm_file_offset
= p
->fileOffset
;
3448 mappings
[i
].sfm_max_prot
= p
->maxProt
;
3449 mappings
[i
].sfm_init_prot
= p
->initProt
;
3450 // rdar://problem/5694507 old update_dyld_shared_cache tool could make a cache file
3451 // that is not page aligned, but otherwise ok.
3452 if ( p
->fileOffset
+p
->size
> (uint64_t)(stat_buf
.st_size
+4095 & (-4096)) ) {
3453 dyld::log("dyld: shared cached file is corrupt: %s" DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME
"\n", sSharedCacheDir
);
3456 if ( (mappings
[i
].sfm_init_prot
& (VM_PROT_READ
|VM_PROT_WRITE
)) == (VM_PROT_READ
|VM_PROT_WRITE
) ) {
3457 readWriteMappingIndex
= i
;
3459 if ( mappings
[i
].sfm_init_prot
== VM_PROT_READ
) {
3460 readOnlyMappingIndex
= i
;
3463 // if shared cache is code signed, add a mapping for the code signature
3464 uint64_t signatureSize
= header
->codeSignatureSize
;
3465 // zero size in header means signature runs to end-of-file
3466 if ( signatureSize
== 0 )
3467 signatureSize
= stat_buf
.st_size
- header
->codeSignatureOffset
;
3468 if ( signatureSize
!= 0 ) {
3469 int linkeditMapping
= mappingCount
-1;
3470 codeSignatureMappingIndex
= mappingCount
++;
3471 mappings
[codeSignatureMappingIndex
].sfm_address
= mappings
[linkeditMapping
].sfm_address
+ mappings
[linkeditMapping
].sfm_size
;
3472 #if __arm__ || __arm64__
3473 mappings
[codeSignatureMappingIndex
].sfm_size
= (signatureSize
+16383) & (-16384);
3475 mappings
[codeSignatureMappingIndex
].sfm_size
= (signatureSize
+4095) & (-4096);
3477 mappings
[codeSignatureMappingIndex
].sfm_file_offset
= header
->codeSignatureOffset
;
3478 mappings
[codeSignatureMappingIndex
].sfm_max_prot
= VM_PROT_READ
;
3479 mappings
[codeSignatureMappingIndex
].sfm_init_prot
= VM_PROT_READ
;
3482 #if __MAC_OS_X_VERSION_MIN_REQUIRED
3483 // sanity check that /usr/lib/libSystem.B.dylib stat() info matches cache
3484 if ( header
->imagesCount
* sizeof(dyld_cache_image_info
) + header
->imagesOffset
< 8192 ) {
3485 bool foundLibSystem
= false;
3486 if ( my_stat("/usr/lib/libSystem.B.dylib", &stat_buf
) == 0 ) {
3487 const dyld_cache_image_info
* images
= (dyld_cache_image_info
*)&firstPages
[header
->imagesOffset
];
3488 const dyld_cache_image_info
* const imagesEnd
= &images
[header
->imagesCount
];
3489 for (const dyld_cache_image_info
* p
= images
; p
< imagesEnd
; ++p
) {
3490 if ( ((time_t)p
->modTime
== stat_buf
.st_mtime
) && ((ino_t
)p
->inode
== stat_buf
.st_ino
) ) {
3491 foundLibSystem
= true;
3496 if ( !sSharedCacheIgnoreInodeAndTimeStamp
&& !foundLibSystem
) {
3497 dyld::log("dyld: shared cached file was built against a different libSystem.dylib, ignoring cache.\n"
3498 "to update dyld shared cache run: 'sudo update_dyld_shared_cache' then reboot.\n");
3503 #if __IPHONE_OS_VERSION_MIN_REQUIRED
3505 uint64_t lowAddress
;
3506 uint64_t highAddress
;
3507 getCacheBounds(mappingCount
, mappings
, lowAddress
, highAddress
);
3508 if ( (highAddress
-lowAddress
) > SHARED_REGION_SIZE
)
3509 throw "dyld shared cache is too big to fit in shared region";
3513 if ( goodCache
&& (readWriteMappingIndex
== -1) ) {
3514 dyld::log("dyld: shared cached file is missing read/write mapping: %s" DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME
"\n", sSharedCacheDir
);
3517 if ( goodCache
&& (readOnlyMappingIndex
== -1) ) {
3518 dyld::log("dyld: shared cached file is missing read-only mapping: %s" DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME
"\n", sSharedCacheDir
);
3522 long cacheSlide
= 0;
3523 void* slideInfo
= NULL
;
3524 uint64_t slideInfoSize
= 0;
3525 // check if shared cache contains slid info
3526 if ( header
->slideInfoSize
!= 0 ) {
3527 // <rdar://problem/8611968> don't slide shared cache if ASLR disabled (main executable didn't slide)
3528 if ( sMainExecutable
->isPositionIndependentExecutable() && (sMainExecutable
->getSlide() == 0) )
3531 // generate random slide amount
3532 cacheSlide
= pickCacheSlide(mappingCount
, mappings
);
3533 slideInfo
= (void*)(long)(mappings
[readOnlyMappingIndex
].sfm_address
+ (header
->slideInfoOffset
- mappings
[readOnlyMappingIndex
].sfm_file_offset
));
3534 slideInfoSize
= header
->slideInfoSize
;
3535 // add VM_PROT_SLIDE bit to __DATA area of cache
3536 mappings
[readWriteMappingIndex
].sfm_max_prot
|= VM_PROT_SLIDE
;
3537 mappings
[readWriteMappingIndex
].sfm_init_prot
|= VM_PROT_SLIDE
;
3540 if ( gLinkContext
.verboseMapping
) {
3541 dyld::log("dyld: calling _shared_region_map_and_slide_np() with regions:\n");
3542 for (int i
=0; i
< mappingCount
; ++i
) {
3543 dyld::log(" address=0x%08llX, size=0x%08llX, fileOffset=0x%08llX\n", mappings
[i
].sfm_address
, mappings
[i
].sfm_size
, mappings
[i
].sfm_file_offset
);
3546 if (_shared_region_map_and_slide_np(fd
, mappingCount
, mappings
, codeSignatureMappingIndex
, cacheSlide
, slideInfo
, slideInfoSize
) == 0) {
3547 // successfully mapped cache into shared region
3548 sSharedCache
= (dyld_cache_header
*)mappings
[0].sfm_address
;
3549 sSharedCacheSlide
= cacheSlide
;
3550 dyld::gProcessInfo
->sharedCacheSlide
= cacheSlide
;
3551 //dyld::log("sSharedCache=%p sSharedCacheSlide=0x%08lX\n", sSharedCache, sSharedCacheSlide);
3552 // if cache has a uuid, copy it
3553 if ( header
->mappingOffset
>= 0x68 ) {
3554 memcpy(dyld::gProcessInfo
->sharedCacheUUID
, header
->uuid
, 16);
3558 #if __IPHONE_OS_VERSION_MIN_REQUIRED
3559 throw "dyld shared cache could not be mapped";
3561 if ( gLinkContext
.verboseMapping
)
3562 dyld::log("dyld: shared cached file could not be mapped\n");
3567 if ( gLinkContext
.verboseMapping
)
3568 dyld::log("dyld: shared cached file is invalid\n");
3572 if ( gLinkContext
.verboseMapping
)
3573 dyld::log("dyld: shared cached file cannot be read\n");
3578 if ( gLinkContext
.verboseMapping
)
3579 dyld::log("dyld: shared cached file cannot be opened\n");
3583 // remember if dyld loaded at same address as when cache built
3584 if ( sSharedCache
!= NULL
) {
3585 gLinkContext
.dyldLoadedAtSameAddressNeededBySharedCache
= ((uintptr_t)(sSharedCache
->dyldBaseAddress
) == (uintptr_t)&_mh_dylinker_header
);
3588 // tell gdb where the shared cache is
3589 if ( sSharedCache
!= NULL
) {
3590 const dyld_cache_mapping_info
* const start
= (dyld_cache_mapping_info
*)((uint8_t*)sSharedCache
+ sSharedCache
->mappingOffset
);
3591 dyld_shared_cache_ranges
.sharedRegionsCount
= sSharedCache
->mappingCount
;
3592 // only room to tell gdb about first four regions
3593 if ( dyld_shared_cache_ranges
.sharedRegionsCount
> 4 )
3594 dyld_shared_cache_ranges
.sharedRegionsCount
= 4;
3595 const dyld_cache_mapping_info
* const end
= &start
[dyld_shared_cache_ranges
.sharedRegionsCount
];
3597 for (const dyld_cache_mapping_info
* p
= start
; p
< end
; ++p
, ++index
) {
3598 dyld_shared_cache_ranges
.ranges
[index
].start
= p
->address
+sSharedCacheSlide
;
3599 dyld_shared_cache_ranges
.ranges
[index
].length
= p
->size
;
3600 if ( gLinkContext
.verboseMapping
) {
3601 dyld::log(" 0x%08llX->0x%08llX %s%s%s init=%x, max=%x\n",
3602 p
->address
+sSharedCacheSlide
, p
->address
+sSharedCacheSlide
+p
->size
-1,
3603 ((p
->initProt
& VM_PROT_READ
) ? "read " : ""),
3604 ((p
->initProt
& VM_PROT_WRITE
) ? "write " : ""),
3605 ((p
->initProt
& VM_PROT_EXECUTE
) ? "execute " : ""), p
->initProt
, p
->maxProt
);
3608 // If a non-writable and executable region is found in the R/W shared region, then this is __IMPORT segments
3609 // This is an old cache. Make writable. dyld no longer supports turn W on and off as it binds
3610 if ( (p
->initProt
== (VM_PROT_READ
|VM_PROT_EXECUTE
)) && ((p
->address
& 0xF0000000) == 0xA0000000) ) {
3611 if ( p
->size
!= 0 ) {
3612 vm_prot_t prot
= VM_PROT_EXECUTE
| PROT_READ
| VM_PROT_WRITE
;
3613 vm_protect(mach_task_self(), p
->address
, p
->size
, false, prot
);
3614 if ( gLinkContext
.verboseMapping
) {
3615 dyld::log("%18s at 0x%08llX->0x%08llX altered permissions to %c%c%c\n", "", p
->address
,
3616 p
->address
+p
->size
-1,
3617 (prot
& PROT_READ
) ? 'r' : '.', (prot
& PROT_WRITE
) ? 'w' : '.', (prot
& PROT_EXEC
) ? 'x' : '.' );
3623 if ( gLinkContext
.verboseMapping
) {
3624 // list the code blob
3625 dyld_cache_header
* header
= (dyld_cache_header
*)sSharedCache
;
3626 uint64_t signatureSize
= header
->codeSignatureSize
;
3627 // zero size in header means signature runs to end-of-file
3628 if ( signatureSize
== 0 ) {
3629 struct stat stat_buf
;
3630 // FIXME: need size of cache file actually used
3631 if ( my_stat(IPHONE_DYLD_SHARED_CACHE_DIR DYLD_SHARED_CACHE_BASE_NAME ARCH_NAME
, &stat_buf
) == 0 )
3632 signatureSize
= stat_buf
.st_size
- header
->codeSignatureOffset
;
3634 if ( signatureSize
!= 0 ) {
3635 const dyld_cache_mapping_info
* const last
= &start
[dyld_shared_cache_ranges
.sharedRegionsCount
-1];
3636 uint64_t codeBlobStart
= last
->address
+ last
->size
;
3637 dyld::log(" 0x%08llX->0x%08llX (code signature)\n", codeBlobStart
, codeBlobStart
+signatureSize
);
3640 #if __IPHONE_OS_VERSION_MIN_REQUIRED
3641 // check for file that enables dyld shared cache dylibs to be overridden
3642 struct stat enableStatBuf
;
3643 // check file size to determine if correct file is in place.
3644 // See <rdar://problem/13591370> Need a way to disable roots without removing /S/L/C/com.apple.dyld/enable...
3645 sDylibsOverrideCache
= ( (my_stat(IPHONE_DYLD_SHARED_CACHE_DIR
"enable-dylibs-to-override-cache", &enableStatBuf
) == 0)
3646 && (enableStatBuf
.st_size
< ENABLE_DYLIBS_TO_OVERRIDE_CACHE_SIZE
) );
3650 #endif // #if DYLD_SHARED_CACHE_SUPPORT
3654 // create when NSLinkModule is called for a second time on a bundle
3655 ImageLoader
* cloneImage(ImageLoader
* image
)
3657 // open file (automagically closed when this function exits)
3658 FileOpener
file(image
->getPath());
3660 struct stat stat_buf
;
3661 if ( fstat(file
.getFileDescriptor(), &stat_buf
) == -1)
3664 dyld::LoadContext context
;
3665 context
.useSearchPaths
= false;
3666 context
.useFallbackPaths
= false;
3667 context
.useLdLibraryPath
= false;
3668 context
.implicitRPath
= false;
3669 context
.matchByInstallName
= false;
3670 context
.dontLoad
= false;
3671 context
.mustBeBundle
= true;
3672 context
.mustBeDylib
= false;
3673 context
.canBePIE
= false;
3674 context
.origin
= NULL
;
3675 context
.rpath
= NULL
;
3676 return loadPhase6(file
.getFileDescriptor(), stat_buf
, image
->getPath(), context
);
3680 ImageLoader
* loadFromMemory(const uint8_t* mem
, uint64_t len
, const char* moduleName
)
3682 // if fat wrapper, find usable sub-file
3683 const fat_header
* memStartAsFat
= (fat_header
*)mem
;
3684 uint64_t fileOffset
= 0;
3685 uint64_t fileLength
= len
;
3686 if ( memStartAsFat
->magic
== OSSwapBigToHostInt32(FAT_MAGIC
) ) {
3687 if ( fatFindBest(memStartAsFat
, &fileOffset
, &fileLength
) ) {
3688 mem
= &mem
[fileOffset
];
3692 throw "no matching architecture in universal wrapper";
3697 if ( isCompatibleMachO(mem
, moduleName
) ) {
3698 ImageLoader
* image
= ImageLoaderMachO::instantiateFromMemory(moduleName
, (macho_header
*)mem
, len
, gLinkContext
);
3699 // don't add bundles to global list, they can be loaded but not linked. When linked it will be added to list
3700 if ( ! image
->isBundle() )
3705 // try other file formats here...
3707 // throw error about what was found
3708 switch (*(uint32_t*)mem
) {
3713 throw "mach-o, but wrong architecture";
3715 throwf("unknown file type, first eight bytes: 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X",
3716 mem
[0], mem
[1], mem
[2], mem
[3], mem
[4], mem
[5], mem
[6],mem
[7]);
3721 void registerAddCallback(ImageCallback func
)
3723 // now add to list to get notified when any more images are added
3724 sAddImageCallbacks
.push_back(func
);
3726 // call callback with all existing images
3727 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
3728 ImageLoader
* image
= *it
;
3729 if ( image
->getState() >= dyld_image_state_bound
&& image
->getState() < dyld_image_state_terminated
)
3730 (*func
)(image
->machHeader(), image
->getSlide());
3734 void registerRemoveCallback(ImageCallback func
)
3736 // <rdar://problem/15025198> ignore calls to register a notification during a notification
3737 if ( sRemoveImageCallbacksInUse
)
3739 sRemoveImageCallbacks
.push_back(func
);
3742 void clearErrorMessage()
3744 error_string
[0] = '\0';
3747 void setErrorMessage(const char* message
)
3749 // save off error message in global buffer for CrashReporter to find
3750 strlcpy(error_string
, message
, sizeof(error_string
));
3753 const char* getErrorMessage()
3755 return error_string
;
3759 void halt(const char* message
)
3761 dyld::log("dyld: %s\n", message
);
3762 setErrorMessage(message
);
3763 uintptr_t terminationFlags
= 0;
3764 if ( !gLinkContext
.startedInitializingMainExecutable
)
3765 terminationFlags
= 1;
3766 setAlImageInfosHalt(error_string
, terminationFlags
);
3767 dyld_fatal_error(error_string
);
3770 static void setErrorStrings(unsigned errorCode
, const char* errorClientOfDylibPath
,
3771 const char* errorTargetDylibPath
, const char* errorSymbol
)
3773 dyld::gProcessInfo
->errorKind
= errorCode
;
3774 dyld::gProcessInfo
->errorClientOfDylibPath
= errorClientOfDylibPath
;
3775 dyld::gProcessInfo
->errorTargetDylibPath
= errorTargetDylibPath
;
3776 dyld::gProcessInfo
->errorSymbol
= errorSymbol
;
3780 uintptr_t bindLazySymbol(const mach_header
* mh
, uintptr_t* lazyPointer
)
3782 uintptr_t result
= 0;
3783 // acquire read-lock on dyld's data structures
3784 #if 0 // rdar://problem/3811777 turn off locking until deadlock is resolved
3785 if ( gLibSystemHelpers
!= NULL
)
3786 (*gLibSystemHelpers
->lockForReading
)();
3788 // lookup and bind lazy pointer and get target address
3790 ImageLoader
* target
;
3792 // fast stubs pass NULL for mh and image is instead found via the location of stub (aka lazyPointer)
3794 target
= dyld::findImageContainingAddress(lazyPointer
);
3796 target
= dyld::findImageByMachHeader(mh
);
3798 // note, target should always be mach-o, because only mach-o lazy handler wired up to this
3799 target
= dyld::findImageByMachHeader(mh
);
3801 if ( target
== NULL
)
3802 throwf("image not found for lazy pointer at %p", lazyPointer
);
3803 result
= target
->doBindLazySymbol(lazyPointer
, gLinkContext
);
3805 catch (const char* message
) {
3806 dyld::log("dyld: lazy symbol binding failed: %s\n", message
);
3809 // release read-lock on dyld's data structures
3811 if ( gLibSystemHelpers
!= NULL
)
3812 (*gLibSystemHelpers
->unlockForReading
)();
3814 // return target address to glue which jumps to it with real parameters restored
3819 uintptr_t fastBindLazySymbol(ImageLoader
** imageLoaderCache
, uintptr_t lazyBindingInfoOffset
)
3821 uintptr_t result
= 0;
3823 if ( *imageLoaderCache
== NULL
) {
3825 *imageLoaderCache
= dyld::findMappedRange((uintptr_t)imageLoaderCache
);
3826 if ( *imageLoaderCache
== NULL
) {
3827 const char* message
= "fast lazy binding from unknown image";
3828 dyld::log("dyld: %s\n", message
);
3833 // bind lazy pointer and return it
3835 result
= (*imageLoaderCache
)->doBindFastLazySymbol((uint32_t)lazyBindingInfoOffset
, gLinkContext
,
3836 (dyld::gLibSystemHelpers
!= NULL
) ? dyld::gLibSystemHelpers
->acquireGlobalDyldLock
: NULL
,
3837 (dyld::gLibSystemHelpers
!= NULL
) ? dyld::gLibSystemHelpers
->releaseGlobalDyldLock
: NULL
);
3839 catch (const char* message
) {
3840 dyld::log("dyld: lazy symbol binding failed: %s\n", message
);
3844 // return target address to glue which jumps to it with real parameters restored
3850 void registerUndefinedHandler(UndefinedHandler handler
)
3852 sUndefinedHandler
= handler
;
3855 static void undefinedHandler(const char* symboName
)
3857 if ( sUndefinedHandler
!= NULL
) {
3858 (*sUndefinedHandler
)(symboName
);
3862 static bool findExportedSymbol(const char* name
, bool onlyInCoalesced
, const ImageLoader::Symbol
** sym
, const ImageLoader
** image
)
3864 // search all images in order
3865 const ImageLoader
* firstWeakImage
= NULL
;
3866 const ImageLoader::Symbol
* firstWeakSym
= NULL
;
3867 const size_t imageCount
= sAllImages
.size();
3868 for(size_t i
=0; i
< imageCount
; ++i
) {
3869 ImageLoader
* anImage
= sAllImages
[i
];
3870 // the use of inserted libraries alters search order
3871 // so that inserted libraries are found before the main executable
3872 if ( sInsertedDylibCount
> 0 ) {
3873 if ( i
< sInsertedDylibCount
)
3874 anImage
= sAllImages
[i
+1];
3875 else if ( i
== sInsertedDylibCount
)
3876 anImage
= sAllImages
[0];
3878 if ( ! anImage
->hasHiddenExports() && (!onlyInCoalesced
|| anImage
->hasCoalescedExports()) ) {
3879 *sym
= anImage
->findExportedSymbol(name
, false, image
);
3880 if ( *sym
!= NULL
) {
3881 // if weak definition found, record first one found
3882 if ( ((*image
)->getExportedSymbolInfo(*sym
) & ImageLoader::kWeakDefinition
) != 0 ) {
3883 if ( firstWeakImage
== NULL
) {
3884 firstWeakImage
= *image
;
3885 firstWeakSym
= *sym
;
3889 // found non-weak, so immediately return with it
3895 if ( firstWeakSym
!= NULL
) {
3896 // found a weak definition, but no non-weak, so return first weak found
3897 *sym
= firstWeakSym
;
3898 *image
= firstWeakImage
;
3905 bool flatFindExportedSymbol(const char* name
, const ImageLoader::Symbol
** sym
, const ImageLoader
** image
)
3907 return findExportedSymbol(name
, false, sym
, image
);
3910 bool findCoalescedExportedSymbol(const char* name
, const ImageLoader::Symbol
** sym
, const ImageLoader
** image
)
3912 return findExportedSymbol(name
, true, sym
, image
);
3916 bool flatFindExportedSymbolWithHint(const char* name
, const char* librarySubstring
, const ImageLoader::Symbol
** sym
, const ImageLoader
** image
)
3918 // search all images in order
3919 const size_t imageCount
= sAllImages
.size();
3920 for(size_t i
=0; i
< imageCount
; ++i
){
3921 ImageLoader
* anImage
= sAllImages
[i
];
3922 // only look at images whose paths contain the hint string (NULL hint string is wildcard)
3923 if ( ! anImage
->isBundle() && ((librarySubstring
==NULL
) || (strstr(anImage
->getPath(), librarySubstring
) != NULL
)) ) {
3924 *sym
= anImage
->findExportedSymbol(name
, false, image
);
3925 if ( *sym
!= NULL
) {
3933 unsigned int getCoalescedImages(ImageLoader
* images
[])
3935 unsigned int count
= 0;
3936 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
3937 ImageLoader
* image
= *it
;
3938 if ( image
->participatesInCoalescing() ) {
3947 static ImageLoader::MappedRegion
* getMappedRegions(ImageLoader::MappedRegion
* regions
)
3949 ImageLoader::MappedRegion
* end
= regions
;
3950 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
3951 (*it
)->getMappedRegions(end
);
3956 void registerImageStateSingleChangeHandler(dyld_image_states state
, dyld_image_state_change_handler handler
)
3958 // mark the image that the handler is in as never-unload because dyld has a reference into it
3959 ImageLoader
* handlerImage
= findImageContainingAddress((void*)handler
);
3960 if ( handlerImage
!= NULL
)
3961 handlerImage
->setNeverUnload();
3963 // add to list of handlers
3964 std::vector
<dyld_image_state_change_handler
>* handlers
= stateToHandlers(state
, sSingleHandlers
);
3965 if ( handlers
!= NULL
) {
3966 // <rdar://problem/10332417> need updateAllImages() to be last in dyld_image_state_mapped list
3967 // so that if ObjC adds a handler that prevents a load, it happens before the gdb list is updated
3968 if ( state
== dyld_image_state_mapped
)
3969 handlers
->insert(handlers
->begin(), handler
);
3971 handlers
->push_back(handler
);
3973 // call callback with all existing images
3974 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
3975 ImageLoader
* image
= *it
;
3976 dyld_image_info info
;
3977 info
.imageLoadAddress
= image
->machHeader();
3978 info
.imageFilePath
= image
->getRealPath();
3979 info
.imageFileModDate
= image
->lastModified();
3980 // should only call handler if state == image->state
3981 if ( image
->getState() == state
)
3982 (*handler
)(state
, 1, &info
);
3983 // ignore returned string, too late to do anything
3988 void registerImageStateBatchChangeHandler(dyld_image_states state
, dyld_image_state_change_handler handler
)
3990 // mark the image that the handler is in as never-unload because dyld has a reference into it
3991 ImageLoader
* handlerImage
= findImageContainingAddress((void*)handler
);
3992 if ( handlerImage
!= NULL
)
3993 handlerImage
->setNeverUnload();
3995 // add to list of handlers
3996 std::vector
<dyld_image_state_change_handler
>* handlers
= stateToHandlers(state
, sBatchHandlers
);
3997 if ( handlers
!= NULL
) {
3998 // insert at front, so that gdb handler is always last
3999 handlers
->insert(handlers
->begin(), handler
);
4001 // call callback with all existing images
4003 notifyBatchPartial(state
, true, handler
);
4005 catch (const char* msg
) {
4006 // ignore request to abort during registration
4011 static ImageLoader
* libraryLocator(const char* libraryName
, bool search
, const char* origin
, const ImageLoader::RPathChain
* rpaths
)
4013 dyld::LoadContext context
;
4014 context
.useSearchPaths
= search
;
4015 context
.useFallbackPaths
= search
;
4016 context
.useLdLibraryPath
= false;
4017 context
.implicitRPath
= false;
4018 context
.matchByInstallName
= false;
4019 context
.dontLoad
= false;
4020 context
.mustBeBundle
= false;
4021 context
.mustBeDylib
= true;
4022 context
.canBePIE
= false;
4023 context
.origin
= origin
;
4024 context
.rpath
= rpaths
;
4025 return load(libraryName
, context
);
4028 static const char* basename(const char* path
)
4030 const char* last
= path
;
4031 for (const char* s
= path
; *s
!= '\0'; s
++) {
4038 static void setContext(const macho_header
* mainExecutableMH
, int argc
, const char* argv
[], const char* envp
[], const char* apple
[])
4040 gLinkContext
.loadLibrary
= &libraryLocator
;
4041 gLinkContext
.terminationRecorder
= &terminationRecorder
;
4042 gLinkContext
.flatExportFinder
= &flatFindExportedSymbol
;
4043 gLinkContext
.coalescedExportFinder
= &findCoalescedExportedSymbol
;
4044 gLinkContext
.getCoalescedImages
= &getCoalescedImages
;
4045 gLinkContext
.undefinedHandler
= &undefinedHandler
;
4046 gLinkContext
.getAllMappedRegions
= &getMappedRegions
;
4047 gLinkContext
.bindingHandler
= NULL
;
4048 gLinkContext
.notifySingle
= ¬ifySingle
;
4049 gLinkContext
.notifyBatch
= ¬ifyBatch
;
4050 gLinkContext
.removeImage
= &removeImage
;
4051 gLinkContext
.registerDOFs
= ®isterDOFs
;
4052 gLinkContext
.clearAllDepths
= &clearAllDepths
;
4053 gLinkContext
.printAllDepths
= &printAllDepths
;
4054 gLinkContext
.imageCount
= &imageCount
;
4055 gLinkContext
.setNewProgramVars
= &setNewProgramVars
;
4056 #if DYLD_SHARED_CACHE_SUPPORT
4057 gLinkContext
.inSharedCache
= &inSharedCache
;
4059 gLinkContext
.setErrorStrings
= &setErrorStrings
;
4060 #if SUPPORT_OLD_CRT_INITIALIZATION
4061 gLinkContext
.setRunInitialzersOldWay
= &setRunInitialzersOldWay
;
4063 gLinkContext
.findImageContainingAddress
= &findImageContainingAddress
;
4064 gLinkContext
.addDynamicReference
= &addDynamicReference
;
4065 gLinkContext
.bindingOptions
= ImageLoader::kBindingNone
;
4066 gLinkContext
.argc
= argc
;
4067 gLinkContext
.argv
= argv
;
4068 gLinkContext
.envp
= envp
;
4069 gLinkContext
.apple
= apple
;
4070 gLinkContext
.progname
= (argv
[0] != NULL
) ? basename(argv
[0]) : "";
4071 gLinkContext
.programVars
.mh
= mainExecutableMH
;
4072 gLinkContext
.programVars
.NXArgcPtr
= &gLinkContext
.argc
;
4073 gLinkContext
.programVars
.NXArgvPtr
= &gLinkContext
.argv
;
4074 gLinkContext
.programVars
.environPtr
= &gLinkContext
.envp
;
4075 gLinkContext
.programVars
.__prognamePtr
=&gLinkContext
.progname
;
4076 gLinkContext
.mainExecutable
= NULL
;
4077 gLinkContext
.imageSuffix
= NULL
;
4078 gLinkContext
.dynamicInterposeArray
= NULL
;
4079 gLinkContext
.dynamicInterposeCount
= 0;
4080 gLinkContext
.prebindUsage
= ImageLoader::kUseAllPrebinding
;
4081 #if TARGET_IPHONE_SIMULATOR
4082 gLinkContext
.sharedRegionMode
= ImageLoader::kDontUseSharedRegion
;
4084 gLinkContext
.sharedRegionMode
= ImageLoader::kUseSharedRegion
;
4091 // Look for a special segment in the mach header.
4092 // Its presences means that the binary wants to have DYLD ignore
4093 // DYLD_ environment variables.
4095 static bool hasRestrictedSegment(const macho_header
* mh
)
4097 const uint32_t cmd_count
= mh
->ncmds
;
4098 const struct load_command
* const cmds
= (struct load_command
*)(((char*)mh
)+sizeof(macho_header
));
4099 const struct load_command
* cmd
= cmds
;
4100 for (uint32_t i
= 0; i
< cmd_count
; ++i
) {
4102 case LC_SEGMENT_COMMAND
:
4104 const struct macho_segment_command
* seg
= (struct macho_segment_command
*)cmd
;
4106 //dyld::log("seg name: %s\n", seg->segname);
4107 if (strcmp(seg
->segname
, "__RESTRICT") == 0) {
4108 const struct macho_section
* const sectionsStart
= (struct macho_section
*)((char*)seg
+ sizeof(struct macho_segment_command
));
4109 const struct macho_section
* const sectionsEnd
= §ionsStart
[seg
->nsects
];
4110 for (const struct macho_section
* sect
=sectionsStart
; sect
< sectionsEnd
; ++sect
) {
4111 if (strcmp(sect
->sectname
, "__restrict") == 0)
4118 cmd
= (const struct load_command
*)(((char*)cmd
)+cmd
->cmdsize
);
4125 #if SUPPORT_VERSIONED_PATHS
4127 static bool readFirstPage(const char* dylibPath
, uint8_t firstPage
[4096])
4130 // open file (automagically closed when this function exits)
4131 FileOpener
file(dylibPath
);
4133 if ( file
.getFileDescriptor() == -1 )
4136 if ( pread(file
.getFileDescriptor(), firstPage
, 4096, 0) != 4096 )
4139 // if fat wrapper, find usable sub-file
4140 const fat_header
* fileStartAsFat
= (fat_header
*)firstPage
;
4141 if ( fileStartAsFat
->magic
== OSSwapBigToHostInt32(FAT_MAGIC
) ) {
4142 uint64_t fileOffset
;
4143 uint64_t fileLength
;
4144 if ( fatFindBest(fileStartAsFat
, &fileOffset
, &fileLength
) ) {
4145 if ( pread(file
.getFileDescriptor(), firstPage
, 4096, fileOffset
) != 4096 )
4157 // Peeks at a dylib file and returns its current_version and install_name.
4158 // Returns false on error.
4160 static bool getDylibVersionAndInstallname(const char* dylibPath
, uint32_t* version
, char* installName
)
4162 uint8_t firstPage
[4096];
4163 const macho_header
* mh
= (macho_header
*)firstPage
;
4164 if ( !readFirstPage(dylibPath
, firstPage
) ) {
4165 #if DYLD_SHARED_CACHE_SUPPORT
4166 // If file cannot be read, check to see if path is in shared cache
4167 const macho_header
* mhInCache
;
4168 const char* pathInCache
;
4170 if ( !findInSharedCacheImage(dylibPath
, true, NULL
, &mhInCache
, &pathInCache
, &slideInCache
) )
4178 // check mach-o header
4179 if ( mh
->magic
!= sMainExecutableMachHeader
->magic
)
4181 if ( mh
->cputype
!= sMainExecutableMachHeader
->cputype
)
4184 // scan load commands for LC_ID_DYLIB
4185 const uint32_t cmd_count
= mh
->ncmds
;
4186 const struct load_command
* const cmds
= (struct load_command
*)(((char*)mh
)+sizeof(macho_header
));
4187 const struct load_command
* const cmdsReadEnd
= (struct load_command
*)(((char*)mh
)+4096);
4188 const struct load_command
* cmd
= cmds
;
4189 for (uint32_t i
= 0; i
< cmd_count
; ++i
) {
4193 const struct dylib_command
* id
= (struct dylib_command
*)cmd
;
4194 *version
= id
->dylib
.current_version
;
4195 if ( installName
!= NULL
)
4196 strlcpy(installName
, (char *)id
+ id
->dylib
.name
.offset
, PATH_MAX
);
4201 cmd
= (const struct load_command
*)(((char*)cmd
)+cmd
->cmdsize
);
4202 if ( cmd
> cmdsReadEnd
)
4208 #endif // SUPPORT_VERSIONED_PATHS
4212 static void printAllImages()
4214 dyld::log("printAllImages()\n");
4215 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
4216 ImageLoader
* image
= *it
;
4217 dyld_image_states imageState
= image
->getState();
4218 dyld::log(" state=%d, dlopen-count=%d, never-unload=%d, in-use=%d, name=%s\n",
4219 imageState
, image
->dlopenCount(), image
->neverUnload(), image
->isMarkedInUse(), image
->getShortName());
4224 void link(ImageLoader
* image
, bool forceLazysBound
, bool neverUnload
, const ImageLoader::RPathChain
& loaderRPaths
)
4226 // add to list of known images. This did not happen at creation time for bundles
4227 if ( image
->isBundle() && !image
->isLinked() )
4230 // we detect root images as those not linked in yet
4231 if ( !image
->isLinked() )
4232 addRootImage(image
);
4236 image
->link(gLinkContext
, forceLazysBound
, false, neverUnload
, loaderRPaths
);
4238 catch (const char* msg
) {
4239 garbageCollectImages();
4245 void runInitializers(ImageLoader
* image
)
4247 // do bottom up initialization
4248 ImageLoader::InitializerTimingList initializerTimes
[sAllImages
.size()];
4249 initializerTimes
[0].count
= 0;
4250 image
->runInitializers(gLinkContext
, initializerTimes
[0]);
4253 // This function is called at the end of dlclose() when the reference count goes to zero.
4254 // The dylib being unloaded may have brought in other dependent dylibs when it was loaded.
4255 // Those dependent dylibs need to be unloaded, but only if they are not referenced by
4256 // something else. We use a standard mark and sweep garbage collection.
4258 // The tricky part is that when a dylib is unloaded it may have a termination function that
4259 // can run and itself call dlclose() on yet another dylib. The problem is that this
4260 // sort of gabage collection is not re-entrant. Instead a terminator's call to dlclose()
4261 // which calls garbageCollectImages() will just set a flag to re-do the garbage collection
4262 // when the current pass is done.
4264 // Also note that this is done within the dyld global lock, so it is always single threaded.
4266 void garbageCollectImages()
4268 static bool sDoingGC
= false;
4269 static bool sRedo
= false;
4272 // GC is currently being run, just set a flag to have it run again.
4281 // mark phase: mark all images not-in-use
4282 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
4283 ImageLoader
* image
= *it
;
4284 //dyld::log("gc: neverUnload=%d name=%s\n", image->neverUnload(), image->getShortName());
4285 image
->markNotUsed();
4288 // sweep phase: mark as in-use, images reachable from never-unload or in-use image
4289 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
4290 ImageLoader
* image
= *it
;
4291 if ( (image
->dlopenCount() != 0) || image
->neverUnload() ) {
4292 OSSpinLockLock(&sDynamicReferencesLock
);
4293 image
->markedUsedRecursive(sDynamicReferences
);
4294 OSSpinLockUnlock(&sDynamicReferencesLock
);
4298 // collect phase: build array of images not marked in-use
4299 ImageLoader
* deadImages
[sAllImages
.size()];
4300 unsigned deadCount
= 0;
4301 int maxRangeCount
= 0;
4303 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
4304 ImageLoader
* image
= *it
;
4305 if ( ! image
->isMarkedInUse() ) {
4306 deadImages
[i
++] = image
;
4307 if (gLogAPIs
) dyld::log("dlclose(), found unused image %p %s\n", image
, image
->getShortName());
4309 maxRangeCount
+= image
->segmentCount();
4313 // collect phase: run termination routines for images not marked in-use
4314 __cxa_range_t ranges
[maxRangeCount
];
4316 for (unsigned i
=0; i
< deadCount
; ++i
) {
4317 ImageLoader
* image
= deadImages
[i
];
4318 for (unsigned int j
=0; j
< image
->segmentCount(); ++j
) {
4319 if ( !image
->segExecutable(j
) )
4321 if ( rangeCount
< maxRangeCount
) {
4322 ranges
[rangeCount
].addr
= (const void*)image
->segActualLoadAddress(j
);
4323 ranges
[rangeCount
].length
= image
->segSize(j
);
4328 runImageStaticTerminators(image
);
4330 catch (const char* msg
) {
4331 dyld::warn("problem running terminators for image: %s\n", msg
);
4335 // <rdar://problem/14718598> dyld should call __cxa_finalize_ranges()
4336 if ( (rangeCount
> 0) && (gLibSystemHelpers
!= NULL
) && (gLibSystemHelpers
->version
>= 13) )
4337 (*gLibSystemHelpers
->cxa_finalize_ranges
)(ranges
, rangeCount
);
4339 // collect phase: delete all images which are not marked in-use
4342 mightBeMore
= false;
4343 for (std::vector
<ImageLoader
*>::iterator it
=sAllImages
.begin(); it
!= sAllImages
.end(); it
++) {
4344 ImageLoader
* image
= *it
;
4345 if ( ! image
->isMarkedInUse() ) {
4347 if (gLogAPIs
) dyld::log("dlclose(), deleting %p %s\n", image
, image
->getShortName());
4349 ImageLoader::deleteImage(image
);
4351 break; // interator in invalidated by this removal
4353 catch (const char* msg
) {
4354 dyld::warn("problem deleting image: %s\n", msg
);
4358 } while ( mightBeMore
);
4367 static void preflight_finally(ImageLoader
* image
)
4369 if ( image
->isBundle() ) {
4370 removeImageFromAllImages(image
->machHeader());
4371 ImageLoader::deleteImage(image
);
4373 sBundleBeingLoaded
= NULL
;
4374 dyld::garbageCollectImages();
4378 void preflight(ImageLoader
* image
, const ImageLoader::RPathChain
& loaderRPaths
)
4381 if ( image
->isBundle() )
4382 sBundleBeingLoaded
= image
; // hack
4383 image
->link(gLinkContext
, false, true, false, loaderRPaths
);
4385 catch (const char* msg
) {
4386 preflight_finally(image
);
4389 preflight_finally(image
);
4392 static void loadInsertedDylib(const char* path
)
4394 ImageLoader
* image
= NULL
;
4396 LoadContext context
;
4397 context
.useSearchPaths
= false;
4398 context
.useFallbackPaths
= false;
4399 context
.useLdLibraryPath
= false;
4400 context
.implicitRPath
= false;
4401 context
.matchByInstallName
= false;
4402 context
.dontLoad
= false;
4403 context
.mustBeBundle
= false;
4404 context
.mustBeDylib
= true;
4405 context
.canBePIE
= false;
4406 context
.origin
= NULL
; // can't use @loader_path with DYLD_INSERT_LIBRARIES
4407 context
.rpath
= NULL
;
4408 image
= load(path
, context
);
4410 catch (const char* msg
) {
4411 #if TARGET_IPHONE_SIMULATOR
4412 dyld::log("dyld: warning: could not load inserted library '%s' because %s\n", path
, msg
);
4414 halt(dyld::mkstringf("could not load inserted library '%s' because %s\n", path
, msg
));
4418 halt(dyld::mkstringf("could not load inserted library '%s'\n", path
));
4422 static bool processRestricted(const macho_header
* mainExecutableMH
, bool* ignoreEnvVars
, bool* processRequiresLibraryValidation
)
4424 #if TARGET_IPHONE_SIMULATOR
4425 gLinkContext
.codeSigningEnforced
= true;
4427 // ask kernel if code signature of program makes it restricted
4429 if ( csops(0, CS_OPS_STATUS
, &flags
, sizeof(flags
)) != -1 ) {
4430 if (flags
& CS_REQUIRE_LV
)
4431 *processRequiresLibraryValidation
= true;
4433 #if __MAC_OS_X_VERSION_MIN_REQUIRED
4434 if ( flags
& CS_ENFORCEMENT
) {
4435 gLinkContext
.codeSigningEnforced
= true;
4437 if ( ((flags
& CS_RESTRICT
) == CS_RESTRICT
) && (csr_check(CSR_ALLOW_TASK_FOR_PID
) != 0) ) {
4438 sRestrictedReason
= restrictedByEntitlements
;
4442 if ((flags
& CS_ENFORCEMENT
) && !(flags
& CS_GET_TASK_ALLOW
)) {
4443 *ignoreEnvVars
= true;
4445 gLinkContext
.codeSigningEnforced
= true;
4450 // all processes with setuid or setgid bit set are restricted
4451 if ( issetugid() ) {
4452 sRestrictedReason
= restrictedBySetGUid
;
4456 // <rdar://problem/13158444&13245742> Respect __RESTRICT,__restrict section for root processes
4457 if ( hasRestrictedSegment(mainExecutableMH
) ) {
4458 // existence of __RESTRICT/__restrict section make process restricted
4459 sRestrictedReason
= restrictedBySegment
;
4466 bool processIsRestricted()
4468 return sProcessIsRestricted
;
4472 // <rdar://problem/10583252> Add dyld to uuidArray to enable symbolication of stackshots
4473 static void addDyldImageToUUIDList()
4475 const struct macho_header
* mh
= (macho_header
*)&__dso_handle
;
4476 const uint32_t cmd_count
= mh
->ncmds
;
4477 const struct load_command
* const cmds
= (struct load_command
*)((char*)mh
+ sizeof(macho_header
));
4478 const struct load_command
* cmd
= cmds
;
4479 for (uint32_t i
= 0; i
< cmd_count
; ++i
) {
4482 uuid_command
* uc
= (uuid_command
*)cmd
;
4483 dyld_uuid_info info
;
4484 info
.imageLoadAddress
= (mach_header
*)mh
;
4485 memcpy(info
.imageUUID
, uc
->uuid
, 16);
4486 addNonSharedCacheImageUUID(info
);
4490 cmd
= (const struct load_command
*)(((char*)cmd
)+cmd
->cmdsize
);
4494 #if __MAC_OS_X_VERSION_MIN_REQUIRED
4495 typedef int (*open_proc_t
)(const char*, int, int);
4496 typedef int (*fcntl_proc_t
)(int, int, void*);
4497 typedef int (*ioctl_proc_t
)(int, unsigned long, void*);
4498 static void* getProcessInfo() { return dyld::gProcessInfo
; }
4499 static SyscallHelpers sSysCalls
= {
4501 // added in version 1
4510 (fcntl_proc_t
)&fcntl
,
4511 (ioctl_proc_t
)&ioctl
,
4520 &pthread_mutex_lock
,
4521 &pthread_mutex_unlock
,
4523 &mach_port_deallocate
,
4525 &mach_timebase_info
,
4526 &OSAtomicCompareAndSwapPtrBarrier
,
4530 &mach_absolute_time
,
4531 // added in version 2
4533 // added in version 3
4537 // added in version 4
4538 &coresymbolication_load_notifier
,
4539 &coresymbolication_unload_notifier
4542 __attribute__((noinline
))
4543 static uintptr_t useSimulatorDyld(int fd
, const macho_header
* mainExecutableMH
, const char* dyldPath
,
4544 int argc
, const char* argv
[], const char* envp
[], const char* apple
[], uintptr_t* startGlue
)
4548 // verify simulator dyld file is owned by root
4550 if ( fstat(fd
, &sb
) == -1 )
4553 // read first page of dyld file
4554 uint8_t firstPage
[4096];
4555 if ( pread(fd
, firstPage
, 4096, 0) != 4096 )
4558 // if fat file, pick matching slice
4559 uint64_t fileOffset
= 0;
4560 uint64_t fileLength
= sb
.st_size
;
4561 const fat_header
* fileStartAsFat
= (fat_header
*)firstPage
;
4562 if ( fileStartAsFat
->magic
== OSSwapBigToHostInt32(FAT_MAGIC
) ) {
4563 if ( !fatFindBest(fileStartAsFat
, &fileOffset
, &fileLength
) )
4565 // re-read buffer from start of mach-o slice in fat file
4566 if ( pread(fd
, firstPage
, 4096, fileOffset
) != 4096 )
4569 else if ( !isCompatibleMachO(firstPage
, dyldPath
) ) {
4573 // calculate total size of dyld segments
4574 const macho_header
* mh
= (const macho_header
*)firstPage
;
4575 struct macho_segment_command
* lastSeg
= NULL
;
4576 struct macho_segment_command
* firstSeg
= NULL
;
4577 uintptr_t mappingSize
= 0;
4578 uintptr_t preferredLoadAddress
= 0;
4579 const uint32_t cmd_count
= mh
->ncmds
;
4580 if ( (sizeof(macho_header
) + mh
->sizeofcmds
) > 4096 )
4582 const struct load_command
* const cmds
= (struct load_command
*)(((char*)mh
)+sizeof(macho_header
));
4583 const struct load_command
* const endCmds
= (struct load_command
*)(((char*)mh
) + sizeof(macho_header
) + mh
->sizeofcmds
);
4584 const struct load_command
* cmd
= cmds
;
4585 for (uint32_t i
= 0; i
< cmd_count
; ++i
) {
4586 uint32_t cmdLength
= cmd
->cmdsize
;
4587 if ( cmdLength
< 8 )
4589 const struct load_command
* const nextCmd
= (const struct load_command
*)(((char*)cmd
)+cmdLength
);
4590 if ( (nextCmd
> endCmds
) || (nextCmd
< cmd
) )
4593 case LC_SEGMENT_COMMAND
:
4595 struct macho_segment_command
* seg
= (struct macho_segment_command
*)cmd
;
4596 if ( seg
->vmaddr
+ seg
->vmsize
< seg
->vmaddr
)
4598 if ( seg
->vmsize
< seg
->filesize
)
4600 if ( lastSeg
== NULL
) {
4601 // first segment must be __TEXT and start at beginning of file/slice
4603 if ( strcmp(seg
->segname
, "__TEXT") != 0 )
4605 if ( seg
->fileoff
!= 0 )
4607 if ( seg
->filesize
< (sizeof(macho_header
) + mh
->sizeofcmds
) )
4609 preferredLoadAddress
= seg
->vmaddr
;
4612 // other sements must be continguous with previous segment and not executable
4613 if ( lastSeg
->fileoff
+ lastSeg
->filesize
!= seg
->fileoff
)
4615 if ( lastSeg
->vmaddr
+ lastSeg
->vmsize
!= seg
->vmaddr
)
4617 if ( (seg
->initprot
& VM_PROT_EXECUTE
) != 0 )
4620 mappingSize
+= seg
->vmsize
;
4624 case LC_SEGMENT_COMMAND_WRONG
:
4629 // last segment must be named __LINKEDIT and not writable
4630 if ( strcmp(lastSeg
->segname
, "__LINKEDIT") != 0 )
4632 if ( lastSeg
->initprot
& VM_PROT_WRITE
)
4635 // reserve space, then mmap each segment
4636 vm_address_t loadAddress
= 0;
4637 if ( ::vm_allocate(mach_task_self(), &loadAddress
, mappingSize
, VM_FLAGS_ANYWHERE
) != 0 )
4640 struct linkedit_data_command
* codeSigCmd
= NULL
;
4641 struct source_version_command
* dyldVersionCmd
= NULL
;
4642 for (uint32_t i
= 0; i
< cmd_count
; ++i
) {
4644 case LC_SEGMENT_COMMAND
:
4646 struct macho_segment_command
* seg
= (struct macho_segment_command
*)cmd
;
4647 uintptr_t requestedLoadAddress
= seg
->vmaddr
- preferredLoadAddress
+ loadAddress
;
4648 void* segAddress
= ::mmap((void*)requestedLoadAddress
, seg
->filesize
, seg
->initprot
, MAP_FIXED
| MAP_PRIVATE
, fd
, fileOffset
+ seg
->fileoff
);
4649 //dyld::log("dyld_sim %s mapped at %p\n", seg->segname, segAddress);
4650 if ( segAddress
== (void*)(-1) )
4654 case LC_CODE_SIGNATURE
:
4655 codeSigCmd
= (struct linkedit_data_command
*)cmd
;
4657 case LC_SOURCE_VERSION
:
4658 dyldVersionCmd
= (struct source_version_command
*)cmd
;
4661 cmd
= (const struct load_command
*)(((char*)cmd
)+cmd
->cmdsize
);
4664 // must have code signature which is contained within LINKEDIT segment
4665 if ( codeSigCmd
== NULL
)
4667 if ( codeSigCmd
->dataoff
< lastSeg
->fileoff
)
4669 if ( (codeSigCmd
->dataoff
+ codeSigCmd
->datasize
) > (lastSeg
->fileoff
+ lastSeg
->filesize
) )
4672 fsignatures_t siginfo
;
4673 siginfo
.fs_file_start
=fileOffset
; // start of mach-o slice in fat file
4674 siginfo
.fs_blob_start
=(void*)(long)(codeSigCmd
->dataoff
); // start of code-signature in mach-o file
4675 siginfo
.fs_blob_size
=codeSigCmd
->datasize
; // size of code-signature
4676 int result
= fcntl(fd
, F_ADDFILESIGS_FOR_DYLD_SIM
, &siginfo
);
4677 if ( result
== -1 ) {
4678 dyld::log("fcntl(F_ADDFILESIGS_FOR_DYLD_SIM) failed with errno=%d\n", errno
);
4682 // file range covered by code signature must extend up to code signature itself
4683 if ( siginfo
.fs_file_start
< codeSigCmd
->dataoff
)
4686 // walk newly mapped dyld_sim __TEXT load commands to find entry point
4687 uintptr_t entry
= 0;
4688 cmd
= (struct load_command
*)(((char*)loadAddress
)+sizeof(macho_header
));
4689 const uint32_t count
= ((macho_header
*)(loadAddress
))->ncmds
;
4690 for (uint32_t i
= 0; i
< count
; ++i
) {
4691 if (cmd
->cmd
== LC_UNIXTHREAD
) {
4693 const i386_thread_state_t
* registers
= (i386_thread_state_t
*)(((char*)cmd
) + 16);
4694 // entry point must be in first segment
4695 if ( registers
->__eip
< firstSeg
->vmaddr
)
4697 if ( registers
->__eip
> (firstSeg
->vmaddr
+ firstSeg
->vmsize
) )
4699 entry
= (registers
->__eip
+ loadAddress
- preferredLoadAddress
);
4701 const x86_thread_state64_t
* registers
= (x86_thread_state64_t
*)(((char*)cmd
) + 16);
4702 // entry point must be in first segment
4703 if ( registers
->__rip
< firstSeg
->vmaddr
)
4705 if ( registers
->__rip
> (firstSeg
->vmaddr
+ firstSeg
->vmsize
) )
4707 entry
= (registers
->__rip
+ loadAddress
- preferredLoadAddress
);
4710 cmd
= (const struct load_command
*)(((char*)cmd
)+cmd
->cmdsize
);
4713 // notify debugger that dyld_sim is loaded
4714 dyld_image_info info
;
4715 info
.imageLoadAddress
= (mach_header
*)loadAddress
;
4716 info
.imageFilePath
= strdup(dyldPath
);
4717 info
.imageFileModDate
= sb
.st_mtime
;
4718 addImagesToAllImages(1, &info
);
4719 dyld::gProcessInfo
->notification(dyld_image_adding
, 1, &info
);
4721 const char** appleParams
= apple
;
4722 // jump into new simulator dyld
4723 typedef uintptr_t (*sim_entry_proc_t
)(int argc
, const char* argv
[], const char* envp
[], const char* apple
[],
4724 const macho_header
* mainExecutableMH
, const macho_header
* dyldMH
, uintptr_t dyldSlide
,
4725 const dyld::SyscallHelpers
* vtable
, uintptr_t* startGlue
);
4726 sim_entry_proc_t newDyld
= (sim_entry_proc_t
)entry
;
4727 return (*newDyld
)(argc
, argv
, envp
, appleParams
, mainExecutableMH
, (macho_header
*)loadAddress
,
4728 loadAddress
- preferredLoadAddress
,
4729 &sSysCalls
, startGlue
);
4735 // Entry point for dyld. The kernel loads dyld and jumps to __dyld_start which
4736 // sets up some registers and call this function.
4738 // Returns address of main() in target program which __dyld_start jumps to
4741 _main(const macho_header
* mainExecutableMH
, uintptr_t mainExecutableSlide
,
4742 int argc
, const char* argv
[], const char* envp
[], const char* apple
[],
4743 uintptr_t* startGlue
)
4745 uintptr_t result
= 0;
4746 sMainExecutableMachHeader
= mainExecutableMH
;
4747 #if __MAC_OS_X_VERSION_MIN_REQUIRED
4748 // if this is host dyld, check to see if iOS simulator is being run
4749 const char* rootPath
= _simple_getenv(envp
, "DYLD_ROOT_PATH");
4750 if ( rootPath
!= NULL
) {
4751 // look to see if simulator has its own dyld
4752 char simDyldPath
[PATH_MAX
];
4753 strlcpy(simDyldPath
, rootPath
, PATH_MAX
);
4754 strlcat(simDyldPath
, "/usr/lib/dyld_sim", PATH_MAX
);
4755 int fd
= my_open(simDyldPath
, O_RDONLY
, 0);
4757 result
= useSimulatorDyld(fd
, mainExecutableMH
, simDyldPath
, argc
, argv
, envp
, apple
, startGlue
);
4758 if ( !result
&& (*startGlue
== 0) )
4759 halt("problem loading iOS simulator dyld");
4765 CRSetCrashLogMessage("dyld: launch started");
4768 char bindingsLogPath
[256];
4770 const char* shortProgName
= "unknown";
4772 shortProgName
= strrchr(argv
[0], '/');
4773 if ( shortProgName
== NULL
)
4774 shortProgName
= argv
[0];
4778 mysprintf(bindingsLogPath
, "/tmp/bindings/%d-%s", getpid(), shortProgName
);
4779 sBindingsLogfile
= open(bindingsLogPath
, O_WRONLY
| O_CREAT
, 0666);
4780 if ( sBindingsLogfile
== -1 ) {
4781 ::mkdir("/tmp/bindings", 0777);
4782 sBindingsLogfile
= open(bindingsLogPath
, O_WRONLY
| O_CREAT
, 0666);
4784 //dyld::log("open(%s) => %d, errno = %d\n", bindingsLogPath, sBindingsLogfile, errno);
4786 setContext(mainExecutableMH
, argc
, argv
, envp
, apple
);
4788 // Pickup the pointer to the exec path.
4789 sExecPath
= _simple_getenv(apple
, "executable_path");
4791 // <rdar://problem/13868260> Remove interim apple[0] transition code from dyld
4792 if (!sExecPath
) sExecPath
= apple
[0];
4794 bool ignoreEnvironmentVariables
= false;
4795 if ( sExecPath
[0] != '/' ) {
4796 // have relative path, use cwd to make absolute
4797 char cwdbuff
[MAXPATHLEN
];
4798 if ( getcwd(cwdbuff
, MAXPATHLEN
) != NULL
) {
4799 // maybe use static buffer to avoid calling malloc so early...
4800 char* s
= new char[strlen(cwdbuff
) + strlen(sExecPath
) + 2];
4803 strcat(s
, sExecPath
);
4807 // Remember short name of process for later logging
4808 sExecShortName
= ::strrchr(sExecPath
, '/');
4809 if ( sExecShortName
!= NULL
)
4812 sExecShortName
= sExecPath
;
4813 sProcessIsRestricted
= processRestricted(mainExecutableMH
, &ignoreEnvironmentVariables
, &sProcessRequiresLibraryValidation
);
4814 if ( sProcessIsRestricted
) {
4815 #if SUPPORT_LC_DYLD_ENVIRONMENT
4816 checkLoadCommandEnvironmentVariables();
4818 pruneEnvironmentVariables(envp
, &apple
);
4819 // set again because envp and apple may have changed or moved
4820 setContext(mainExecutableMH
, argc
, argv
, envp
, apple
);
4823 if ( !ignoreEnvironmentVariables
)
4824 checkEnvironmentVariables(envp
);
4825 defaultUninitializedFallbackPaths(envp
);
4827 if ( sEnv
.DYLD_PRINT_OPTS
)
4829 if ( sEnv
.DYLD_PRINT_ENV
)
4830 printEnvironmentVariables(envp
);
4831 getHostInfo(mainExecutableMH
, mainExecutableSlide
);
4832 // install gdb notifier
4833 stateToHandlers(dyld_image_state_dependents_mapped
, sBatchHandlers
)->push_back(notifyGDB
);
4834 stateToHandlers(dyld_image_state_mapped
, sSingleHandlers
)->push_back(updateAllImages
);
4835 // make initial allocations large enough that it is unlikely to need to be re-alloced
4836 sAllImages
.reserve(INITIAL_IMAGE_COUNT
);
4837 sImageRoots
.reserve(16);
4838 sAddImageCallbacks
.reserve(4);
4839 sRemoveImageCallbacks
.reserve(4);
4840 sImageFilesNeedingTermination
.reserve(16);
4841 sImageFilesNeedingDOFUnregistration
.reserve(8);
4843 #ifdef WAIT_FOR_SYSTEM_ORDER_HANDSHAKE
4844 // <rdar://problem/6849505> Add gating mechanism to dyld support system order file generation process
4845 WAIT_FOR_SYSTEM_ORDER_HANDSHAKE(dyld::gProcessInfo
->systemOrderFlag
);
4850 // add dyld itself to UUID list
4851 addDyldImageToUUIDList();
4852 CRSetCrashLogMessage(sLoadingCrashMessage
);
4853 // instantiate ImageLoader for main executable
4854 sMainExecutable
= instantiateFromLoadedImage(mainExecutableMH
, mainExecutableSlide
, sExecPath
);
4855 gLinkContext
.mainExecutable
= sMainExecutable
;
4856 gLinkContext
.processIsRestricted
= sProcessIsRestricted
;
4857 gLinkContext
.processRequiresLibraryValidation
= sProcessRequiresLibraryValidation
;
4858 gLinkContext
.mainExecutableCodeSigned
= hasCodeSignatureLoadCommand(mainExecutableMH
);
4860 #if TARGET_IPHONE_SIMULATOR
4861 #if TARGET_OS_WATCH || TARGET_OS_TV
4862 // disable error during bring up of these simulators
4864 // check main executable is not too new for this OS
4866 if ( ! isSimulatorBinary((uint8_t*)mainExecutableMH
, sExecPath
) ) {
4867 throwf("program was built for Mac OS X and cannot be run in simulator");
4869 uint32_t mainMinOS
= sMainExecutable
->minOSVersion();
4870 // dyld is always built for the current OS, so we can get the current OS version
4871 // from the load command in dyld itself.
4872 uint32_t dyldMinOS
= ImageLoaderMachO::minOSVersion((const mach_header
*)&__dso_handle
);
4873 if ( mainMinOS
> dyldMinOS
) {
4874 throwf("app was built for iOS %d.%d which is newer than this simulator %d.%d",
4875 mainMinOS
>> 16, ((mainMinOS
>> 8) & 0xFF),
4876 dyldMinOS
>> 16, ((dyldMinOS
>> 8) & 0xFF));
4882 // load shared cache
4883 checkSharedRegionDisable();
4884 #if DYLD_SHARED_CACHE_SUPPORT
4885 if ( gLinkContext
.sharedRegionMode
!= ImageLoader::kDontUseSharedRegion
)
4889 // Now that shared cache is loaded, setup an versioned dylib overrides
4890 #if SUPPORT_VERSIONED_PATHS
4891 checkVersionedPaths();
4894 // load any inserted libraries
4895 if ( sEnv
.DYLD_INSERT_LIBRARIES
!= NULL
) {
4896 for (const char* const* lib
= sEnv
.DYLD_INSERT_LIBRARIES
; *lib
!= NULL
; ++lib
)
4897 loadInsertedDylib(*lib
);
4899 // record count of inserted libraries so that a flat search will look at
4900 // inserted libraries, then main, then others.
4901 sInsertedDylibCount
= sAllImages
.size()-1;
4903 // link main executable
4904 gLinkContext
.linkingMainExecutable
= true;
4905 link(sMainExecutable
, sEnv
.DYLD_BIND_AT_LAUNCH
, true, ImageLoader::RPathChain(NULL
, NULL
));
4906 sMainExecutable
->setNeverUnloadRecursive();
4907 if ( sMainExecutable
->forceFlat() ) {
4908 gLinkContext
.bindFlat
= true;
4909 gLinkContext
.prebindUsage
= ImageLoader::kUseNoPrebinding
;
4912 // link any inserted libraries
4913 // do this after linking main executable so that any dylibs pulled in by inserted
4914 // dylibs (e.g. libSystem) will not be in front of dylibs the program uses
4915 if ( sInsertedDylibCount
> 0 ) {
4916 for(unsigned int i
=0; i
< sInsertedDylibCount
; ++i
) {
4917 ImageLoader
* image
= sAllImages
[i
+1];
4918 link(image
, sEnv
.DYLD_BIND_AT_LAUNCH
, true, ImageLoader::RPathChain(NULL
, NULL
));
4919 image
->setNeverUnloadRecursive();
4921 // only INSERTED libraries can interpose
4922 // register interposing info after all inserted libraries are bound so chaining works
4923 for(unsigned int i
=0; i
< sInsertedDylibCount
; ++i
) {
4924 ImageLoader
* image
= sAllImages
[i
+1];
4925 image
->registerInterposing();
4929 // <rdar://problem/19315404> dyld should support interposition even without DYLD_INSERT_LIBRARIES
4930 for (int i
=sInsertedDylibCount
+1; i
< sAllImages
.size(); ++i
) {
4931 ImageLoader
* image
= sAllImages
[i
];
4932 if ( image
->inSharedCache() )
4934 image
->registerInterposing();
4937 // apply interposing to initial set of images
4938 for(int i
=0; i
< sImageRoots
.size(); ++i
) {
4939 sImageRoots
[i
]->applyInterposing(gLinkContext
);
4941 gLinkContext
.linkingMainExecutable
= false;
4943 // <rdar://problem/12186933> do weak binding only after all inserted images linked
4944 sMainExecutable
->weakBind(gLinkContext
);
4946 CRSetCrashLogMessage("dyld: launch, running initializers");
4947 #if SUPPORT_OLD_CRT_INITIALIZATION
4948 // Old way is to run initializers via a callback from crt1.o
4949 if ( ! gRunInitializersOldWay
)
4950 initializeMainExecutable();
4952 // run all initializers
4953 initializeMainExecutable();
4955 // find entry point for main executable
4956 result
= (uintptr_t)sMainExecutable
->getThreadPC();
4957 if ( result
!= 0 ) {
4958 // main executable uses LC_MAIN, needs to return to glue in libdyld.dylib
4959 if ( (gLibSystemHelpers
!= NULL
) && (gLibSystemHelpers
->version
>= 9) )
4960 *startGlue
= (uintptr_t)gLibSystemHelpers
->startGlueToCallExit
;
4962 halt("libdyld.dylib support not present for LC_MAIN");
4965 // main executable uses LC_UNIXTHREAD, dyld needs to let "start" in program set up for main()
4966 result
= (uintptr_t)sMainExecutable
->getMain();
4970 catch(const char* message
) {
4975 dyld::log("dyld: launch failed\n");
4978 CRSetCrashLogMessage(NULL
);