dyld-832.7.3.tar.gz
[apple/dyld.git] / src / dyld2.cpp
1 /* -*- mode: C++; c-basic-offset: 4; tab-width: 4 -*-
2 *
3 * Copyright (c) 2004-2013 Apple Inc. All rights reserved.
4 *
5 * @APPLE_LICENSE_HEADER_START@
6 *
7 * This file contains Original Code and/or Modifications of Original Code
8 * as defined in and that are subject to the Apple Public Source License
9 * Version 2.0 (the 'License'). You may not use this file except in
10 * compliance with the License. Please obtain a copy of the License at
11 * http://www.opensource.apple.com/apsl/ and read it before using this
12 * file.
13 *
14 * The Original Code and all software distributed under the License are
15 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
16 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
17 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
19 * Please see the License for the specific language governing rights and
20 * limitations under the License.
21 *
22 * @APPLE_LICENSE_HEADER_END@
23 */
24
25 #include <stdint.h>
26 #include <string.h>
27 #include <unistd.h>
28 #include <errno.h>
29 #include <fcntl.h>
30 #include <stdlib.h>
31 #include <dirent.h>
32 #include <pthread.h>
33 #include <libproc.h>
34 #include <sys/param.h>
35 #include <mach/mach_time.h> // mach_absolute_time()
36 #include <mach/mach_init.h>
37 #include <sys/types.h>
38 #include <sys/stat.h>
39 #include <sys/syscall.h>
40 #include <sys/socket.h>
41 #include <sys/un.h>
42 #include <sys/syslog.h>
43 #include <sys/uio.h>
44 #include <sys/xattr.h>
45 #include <mach/mach.h>
46 #include <mach-o/fat.h>
47 #include <mach-o/loader.h>
48 #include <mach-o/ldsyms.h>
49 #include <libkern/OSByteOrder.h>
50 #include <libkern/OSAtomic.h>
51 #include <mach/mach.h>
52 #include <sys/sysctl.h>
53 #include <sys/mman.h>
54 #include <sys/dtrace.h>
55 #include <libkern/OSAtomic.h>
56 #include <Availability.h>
57 #include <System/sys/codesign.h>
58 #include <System/sys/csr.h>
59 #include <_simple.h>
60 #include <os/lock_private.h>
61 #include <System/machine/cpu_capabilities.h>
62 #include <System/sys/reason.h>
63 #include <kern/kcdata.h>
64 #include <sys/attr.h>
65 #include <sys/fsgetpath.h>
66 #include <System/sys/content_protection.h>
67
68 #define SUPPORT_LOGGING_TO_CONSOLE !(__i386__ || __x86_64__ || TARGET_OS_SIMULATOR)
69 #if SUPPORT_LOGGING_TO_CONSOLE
70 #include <paths.h> // for logging to console
71 #endif
72
73 #if !TARGET_OS_SIMULATOR
74
75 // The comm page is being renamed, so set our define to the new value if the old
76 // value is missing
77 #ifndef _COMM_PAGE_DYLD_SYSTEM_FLAGS
78
79 #ifndef _COMM_PAGE_DYLD_FLAGS
80 #error Must define _COMM_PAGE_DYLD_FLAGS or _COMM_PAGE_DYLD_SYSTEM_FLAGS
81 #endif
82
83 #define _COMM_PAGE_DYLD_SYSTEM_FLAGS _COMM_PAGE_DYLD_FLAGS
84
85 #endif
86
87 #endif
88
89 #if TARGET_OS_SIMULATOR
90 enum {
91 AMFI_DYLD_INPUT_PROC_IN_SIMULATOR = (1 << 0),
92 };
93 enum amfi_dyld_policy_output_flag_set {
94 AMFI_DYLD_OUTPUT_ALLOW_AT_PATH = (1 << 0),
95 AMFI_DYLD_OUTPUT_ALLOW_PATH_VARS = (1 << 1),
96 AMFI_DYLD_OUTPUT_ALLOW_CUSTOM_SHARED_CACHE = (1 << 2),
97 AMFI_DYLD_OUTPUT_ALLOW_FALLBACK_PATHS = (1 << 3),
98 AMFI_DYLD_OUTPUT_ALLOW_PRINT_VARS = (1 << 4),
99 AMFI_DYLD_OUTPUT_ALLOW_FAILED_LIBRARY_INSERTION = (1 << 5),
100 AMFI_DYLD_OUTPUT_ALLOW_LIBRARY_INTERPOSING = (1 << 6),
101 };
102 extern "C" int amfi_check_dyld_policy_self(uint64_t input_flags, uint64_t* output_flags);
103 #else
104 #include <libamfi.h>
105 #endif
106
107 #include <sandbox.h>
108 #include <sandbox/private.h>
109 #if __has_feature(ptrauth_calls)
110 #include <ptrauth.h>
111 #endif
112
113 extern "C" int __fork();
114
115 #include <array>
116 #include <algorithm>
117 #include <vector>
118
119
120 #include "dyld2.h"
121 #include "ImageLoader.h"
122 #include "ImageLoaderMachO.h"
123 #include "dyldLibSystemInterface.h"
124 #include "dyld_cache_format.h"
125 #include "dyld_process_info_internal.h"
126
127 #if SUPPORT_ACCELERATE_TABLES
128 #include "ImageLoaderMegaDylib.h"
129 #endif
130
131 #if TARGET_OS_SIMULATOR
132 extern "C" void* gSyscallHelpers;
133 #else
134 #include "dyldSyscallInterface.h"
135 #endif
136
137 #include "Closure.h"
138 #include "libdyldEntryVector.h"
139 #include "MachOLoaded.h"
140 #include "Loading.h"
141 #include "DyldSharedCache.h"
142 #include "SharedCacheRuntime.h"
143 #include "StringUtils.h"
144 #include "Tracing.h"
145 #include "ClosureBuilder.h"
146 #include "ClosureFileSystemPhysical.h"
147 #include "FileUtils.h"
148 #include "BootArgs.h"
149 #include "Defines.h"
150 #include "RootsChecker.h"
151
152 #ifndef MH_HAS_OBJC
153 #define MH_HAS_OBJC 0x40000000
154 #endif
155
156 // not libc header for send() syscall interface
157 extern "C" ssize_t __sendto(int, const void *, size_t, int, const struct sockaddr *, socklen_t);
158
159
160 // ARM and x86_64 are the only architecture that use cpu-sub-types
161 #define CPU_SUBTYPES_SUPPORTED ((__arm__ || __arm64__ || __x86_64__) && !TARGET_OS_SIMULATOR)
162
163 #if __LP64__
164 #define LC_SEGMENT_COMMAND LC_SEGMENT_64
165 #define LC_SEGMENT_COMMAND_WRONG LC_SEGMENT
166 #define LC_ENCRYPT_COMMAND LC_ENCRYPTION_INFO
167 #define macho_segment_command segment_command_64
168 #define macho_section section_64
169 #else
170 #define LC_SEGMENT_COMMAND LC_SEGMENT
171 #define LC_SEGMENT_COMMAND_WRONG LC_SEGMENT_64
172 #define LC_ENCRYPT_COMMAND LC_ENCRYPTION_INFO_64
173 #define macho_segment_command segment_command
174 #define macho_section section
175 #endif
176
177 #define DYLD_CLOSURE_XATTR_NAME "com.apple.dyld"
178
179 #define CPU_TYPE_MASK 0x00FFFFFF /* complement of CPU_ARCH_MASK */
180
181
182 /* implemented in dyld_gdb.cpp */
183 extern void resetAllImages();
184 extern void addImagesToAllImages(uint32_t infoCount, const dyld_image_info info[]);
185 extern void addAotImagesToAllAotImages(uint32_t aotInfoCount, const dyld_aot_image_info aotInfo[]);
186 extern void removeImageFromAllImages(const mach_header* mh);
187 extern void addNonSharedCacheImageUUID(const dyld_uuid_info& info);
188 extern const char* notifyGDB(enum dyld_image_states state, uint32_t infoCount, const dyld_image_info info[]);
189 extern size_t allImagesCount();
190
191 // magic so CrashReporter logs message
192 extern "C" {
193 char error_string[1024];
194 }
195
196 // magic linker symbol for start of dyld binary
197 extern "C" const macho_header __dso_handle;
198
199
200 //
201 // The file contains the core of dyld used to get a process to main().
202 // The API's that dyld supports are implemented in dyldAPIs.cpp.
203 //
204 //
205 //
206 //
207 //
208 namespace dyld {
209 struct RegisteredDOF { const mach_header* mh; int registrationID; };
210 struct DylibOverride { const char* installName; const char* override; };
211 }
212
213
214 VECTOR_NEVER_DESTRUCTED(ImageLoader*);
215 VECTOR_NEVER_DESTRUCTED(dyld::RegisteredDOF);
216 VECTOR_NEVER_DESTRUCTED(dyld::ImageCallback);
217 VECTOR_NEVER_DESTRUCTED(dyld::DylibOverride);
218 VECTOR_NEVER_DESTRUCTED(ImageLoader::DynamicReference);
219
220 VECTOR_NEVER_DESTRUCTED(dyld_image_state_change_handler);
221
222 namespace dyld {
223
224
225 //
226 // state of all environment variables dyld uses
227 //
228 struct EnvironmentVariables {
229 const char* const * DYLD_FRAMEWORK_PATH;
230 const char* const * DYLD_FALLBACK_FRAMEWORK_PATH;
231 const char* const * DYLD_LIBRARY_PATH;
232 const char* const * DYLD_FALLBACK_LIBRARY_PATH;
233 const char* const * DYLD_INSERT_LIBRARIES;
234 const char* const * LD_LIBRARY_PATH; // for unix conformance
235 const char* const * DYLD_VERSIONED_LIBRARY_PATH;
236 const char* const * DYLD_VERSIONED_FRAMEWORK_PATH;
237 bool DYLD_PRINT_LIBRARIES_POST_LAUNCH;
238 bool DYLD_BIND_AT_LAUNCH;
239 bool DYLD_PRINT_STATISTICS;
240 bool DYLD_PRINT_STATISTICS_DETAILS;
241 bool DYLD_PRINT_OPTS;
242 bool DYLD_PRINT_ENV;
243 bool DYLD_DISABLE_DOFS;
244 bool hasOverride;
245 // DYLD_SHARED_CACHE_DIR ==> sSharedCacheOverrideDir
246 // DYLD_ROOT_PATH ==> gLinkContext.rootPaths
247 // DYLD_IMAGE_SUFFIX ==> gLinkContext.imageSuffix
248 // DYLD_PRINT_OPTS ==> gLinkContext.verboseOpts
249 // DYLD_PRINT_ENV ==> gLinkContext.verboseEnv
250 // DYLD_FORCE_FLAT_NAMESPACE ==> gLinkContext.bindFlat
251 // DYLD_PRINT_INITIALIZERS ==> gLinkContext.verboseInit
252 // DYLD_PRINT_SEGMENTS ==> gLinkContext.verboseMapping
253 // DYLD_PRINT_BINDINGS ==> gLinkContext.verboseBind
254 // DYLD_PRINT_WEAK_BINDINGS ==> gLinkContext.verboseWeakBind
255 // DYLD_PRINT_REBASINGS ==> gLinkContext.verboseRebase
256 // DYLD_PRINT_DOFS ==> gLinkContext.verboseDOF
257 // DYLD_PRINT_APIS ==> gLogAPIs
258 // DYLD_IGNORE_PREBINDING ==> gLinkContext.prebindUsage
259 // DYLD_PREBIND_DEBUG ==> gLinkContext.verbosePrebinding
260 // DYLD_NEW_LOCAL_SHARED_REGIONS ==> gLinkContext.sharedRegionMode
261 // DYLD_SHARED_REGION ==> gLinkContext.sharedRegionMode
262 // DYLD_PRINT_WARNINGS ==> gLinkContext.verboseWarnings
263 // DYLD_PRINT_RPATHS ==> gLinkContext.verboseRPaths
264 // DYLD_PRINT_INTERPOSING ==> gLinkContext.verboseInterposing
265 // DYLD_PRINT_LIBRARIES ==> gLinkContext.verboseLoading
266 };
267
268
269
270 typedef std::vector<dyld_image_state_change_handler> StateHandlers;
271
272
273 enum EnvVarMode { envNone, envPrintOnly, envAll };
274
275 // all global state
276 static const char* sExecPath = NULL;
277 static const char* sExecShortName = NULL;
278 static const macho_header* sMainExecutableMachHeader = NULL;
279 static uintptr_t sMainExecutableSlide = 0;
280 #if CPU_SUBTYPES_SUPPORTED
281 static cpu_type_t sHostCPU;
282 static cpu_subtype_t sHostCPUsubtype;
283 #endif
284 static ImageLoaderMachO* sMainExecutable = NULL;
285 static size_t sInsertedDylibCount = 0;
286 static std::vector<ImageLoader*> sAllImages;
287 static std::vector<ImageLoader*> sImageRoots;
288 static std::vector<ImageLoader*> sImageFilesNeedingTermination;
289 static std::vector<RegisteredDOF> sImageFilesNeedingDOFUnregistration;
290 static std::vector<ImageCallback> sAddImageCallbacks;
291 static std::vector<ImageCallback> sRemoveImageCallbacks;
292 static std::vector<LoadImageCallback> sAddLoadImageCallbacks;
293 static std::vector<LoadImageBulkCallback> sAddBulkLoadImageCallbacks;
294 static bool sRemoveImageCallbacksInUse = false;
295 static void* sSingleHandlers[7][3];
296 static void* sBatchHandlers[7][3];
297 static ImageLoader* sLastImageByAddressCache;
298 static EnvironmentVariables sEnv;
299 #if TARGET_OS_OSX
300 static const char* sFrameworkFallbackPaths[] = { "$HOME/Library/Frameworks", "/Library/Frameworks", "/Network/Library/Frameworks", "/System/Library/Frameworks", NULL };
301 static const char* sLibraryFallbackPaths[] = { "$HOME/lib", "/usr/local/lib", "/usr/lib", NULL };
302 static const char* sRestrictedFrameworkFallbackPaths[] = { "/System/Library/Frameworks", NULL };
303 static const char* sRestrictedLibraryFallbackPaths[] = { "/usr/lib", NULL };
304 #else
305 static const char* sFrameworkFallbackPaths[] = { "/System/Library/Frameworks", NULL };
306 static const char* sLibraryFallbackPaths[] = { "/usr/local/lib", "/usr/lib", NULL };
307 #endif
308 static UndefinedHandler sUndefinedHandler = NULL;
309 static ImageLoader* sBundleBeingLoaded = NULL; // hack until OFI is reworked
310 static dyld3::SharedCacheLoadInfo sSharedCacheLoadInfo;
311 static const char* sSharedCacheOverrideDir;
312 bool gSharedCacheOverridden = false;
313 ImageLoader::LinkContext gLinkContext;
314 bool gLogAPIs = false;
315 #if SUPPORT_ACCELERATE_TABLES
316 bool gLogAppAPIs = false;
317 #endif
318 const struct LibSystemHelpers* gLibSystemHelpers = NULL;
319 #if SUPPORT_OLD_CRT_INITIALIZATION
320 bool gRunInitializersOldWay = false;
321 #endif
322 static std::vector<DylibOverride> sDylibOverrides;
323 #if !TARGET_OS_SIMULATOR
324 static int sLogSocket = -1;
325 #endif
326 static bool sFrameworksFoundAsDylibs = false;
327 #if __x86_64__ && !TARGET_OS_SIMULATOR
328 static bool sHaswell = false;
329 #endif
330 static std::vector<ImageLoader::DynamicReference> sDynamicReferences;
331 #pragma clang diagnostic push
332 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
333 static OSSpinLock sDynamicReferencesLock = 0;
334 #pragma clang diagnostic pop
335 #if !TARGET_OS_SIMULATOR
336 static bool sLogToFile = false;
337 #endif
338 static char sLoadingCrashMessage[1024] = "dyld: launch, loading dependent libraries";
339 static _dyld_objc_notify_mapped sNotifyObjCMapped;
340 static _dyld_objc_notify_init sNotifyObjCInit;
341 static _dyld_objc_notify_unmapped sNotifyObjCUnmapped;
342
343 #if TARGET_OS_IPHONE && !TARGET_OS_SIMULATOR
344 static bool sForceStderr = false;
345 #endif
346
347
348 #if SUPPORT_ACCELERATE_TABLES
349 static ImageLoaderMegaDylib* sAllCacheImagesProxy = NULL;
350 // Note these are now off by default as everything should use dyld3.
351 static bool sDisableAcceleratorTables = true;
352 #endif
353
354 bool gUseDyld3 = false;
355 static uint32_t sLaunchModeUsed = 0;
356 static bool sSkipMain = false;
357 static void (*sEntryOverride)() = nullptr;
358 static bool sJustBuildClosure = false;
359 #if !TARGET_OS_SIMULATOR
360 static bool sLogClosureFailure = false;
361 #endif
362 static bool sKeysDisabled = false;
363 static bool sOnlyPlatformArm64e = false; // arm64e binaries can only be loaded if they are part of the OS
364
365 static dyld3::RootsChecker sRootsChecker;
366
367 enum class ClosureMode {
368 // Unset means we haven't provided an env variable or boot-arg to explicitly choose a mode
369 Unset,
370 // On means we set DYLD_USE_CLOSURES=1, or we didn't have DYLD_USE_CLOSURES=0 but did have
371 // -force_dyld3=1 env variable or a customer cache on iOS
372 On,
373 // Off means we set DYLD_USE_CLOSURES=0, or we didn't have DYLD_USE_CLOSURES=1 but did have
374 // -force_dyld2=1 env variable or an internal cache on iOS
375 Off,
376 // PreBuiltOnly means only use a shared cache closure and don't try build a new one
377 PreBuiltOnly,
378 };
379
380 enum class ClosureKind {
381 unset,
382 full,
383 minimal,
384 };
385
386 static ClosureMode sClosureMode = ClosureMode::Unset;
387 static ClosureKind sClosureKind = ClosureKind::unset;
388 static bool sForceInvalidSharedCacheClosureFormat = false;
389 static uint64_t launchTraceID = 0;
390
391 // These flags are the values in the 64-bit _COMM_PAGE_DYLD_SYSTEM_FLAGS entry
392 // Note we own this and can write it from PID 1
393 enum CommPageFlags : uint64_t {
394 None = 0,
395
396 // The boot args can set the low 32-bits of the comm page. We'll reserve the high 32-bits
397 // for runtime (launchd) set values.
398 CommPageBootArgMask = 0xFFFFFFFF,
399
400 // Are the simulator support dylibs definitely roots when launchd scanned them
401 libsystemKernelIsRoot = 1ULL << 32,
402 libsystemPlatformIsRoot = 1ULL << 33,
403 libsystemPThreadIsRoot = 1ULL << 34,
404
405 // Is the file system writable, ie, could the simulator support dylibs be written
406 // later, after PID 1
407 fileSystemCanBeModified = 1ULL << 35
408 };
409
410 //
411 // The MappedRanges structure is used for fast address->image lookups.
412 // The table is only updated when the dyld lock is held, so we don't
413 // need to worry about multiple writers. But readers may look at this
414 // data without holding the lock. Therefore, all updates must be done
415 // in an order that will never cause readers to see inconsistent data.
416 // The general rule is that if the image field is non-NULL then
417 // the other fields are valid.
418 //
419 struct MappedRanges
420 {
421 MappedRanges* next;
422 unsigned long count;
423 struct {
424 ImageLoader* image;
425 uintptr_t start;
426 uintptr_t end;
427 } array[1];
428 };
429
430 static MappedRanges* sMappedRangesStart;
431
432 #pragma clang diagnostic push
433 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
434 void addMappedRange(ImageLoader* image, uintptr_t start, uintptr_t end)
435 {
436 //dyld::log("addMappedRange(0x%lX->0x%lX) for %s\n", start, end, image->getShortName());
437 for (MappedRanges* p = sMappedRangesStart; p != NULL; p = p->next) {
438 for (unsigned long i=0; i < p->count; ++i) {
439 if ( p->array[i].image == NULL ) {
440 p->array[i].start = start;
441 p->array[i].end = end;
442 // add image field last with a barrier so that any reader will see consistent records
443 OSMemoryBarrier();
444 p->array[i].image = image;
445 return;
446 }
447 }
448 }
449 // table must be full, chain another
450 #if SUPPORT_ACCELERATE_TABLES
451 unsigned count = (sAllCacheImagesProxy != NULL) ? 16 : 400;
452 #else
453 unsigned count = 400;
454 #endif
455 size_t allocationSize = sizeof(MappedRanges) + (count-1)*3*sizeof(void*);
456 MappedRanges* newRanges = (MappedRanges*)malloc(allocationSize);
457 bzero(newRanges, allocationSize);
458 newRanges->count = count;
459 newRanges->array[0].start = start;
460 newRanges->array[0].end = end;
461 newRanges->array[0].image = image;
462 OSMemoryBarrier();
463 if ( sMappedRangesStart == NULL ) {
464 sMappedRangesStart = newRanges;
465 }
466 else {
467 for (MappedRanges* p = sMappedRangesStart; p != NULL; p = p->next) {
468 if ( p->next == NULL ) {
469 OSMemoryBarrier();
470 p->next = newRanges;
471 break;
472 }
473 }
474 }
475 }
476
477 void removedMappedRanges(ImageLoader* image)
478 {
479 for (MappedRanges* p = sMappedRangesStart; p != NULL; p = p->next) {
480 for (unsigned long i=0; i < p->count; ++i) {
481 if ( p->array[i].image == image ) {
482 // clear with a barrier so that any reader will see consistent records
483 OSMemoryBarrier();
484 p->array[i].image = NULL;
485 }
486 }
487 }
488 }
489 #pragma clang diagnostic pop
490
491 ImageLoader* findMappedRange(uintptr_t target)
492 {
493 for (MappedRanges* p = sMappedRangesStart; p != NULL; p = p->next) {
494 for (unsigned long i=0; i < p->count; ++i) {
495 if ( p->array[i].image != NULL ) {
496 if ( (p->array[i].start <= target) && (target < p->array[i].end) )
497 return p->array[i].image;
498 }
499 }
500 }
501 return NULL;
502 }
503
504
505
506 const char* mkstringf(const char* format, ...)
507 {
508 _SIMPLE_STRING buf = _simple_salloc();
509 if ( buf != NULL ) {
510 va_list list;
511 va_start(list, format);
512 _simple_vsprintf(buf, format, list);
513 va_end(list);
514 const char* t = strdup(_simple_string(buf));
515 _simple_sfree(buf);
516 if ( t != NULL )
517 return t;
518 }
519 return "mkstringf, out of memory error";
520 }
521
522
523 void throwf(const char* format, ...)
524 {
525 _SIMPLE_STRING buf = _simple_salloc();
526 if ( buf != NULL ) {
527 va_list list;
528 va_start(list, format);
529 _simple_vsprintf(buf, format, list);
530 va_end(list);
531 const char* t = strdup(_simple_string(buf));
532 _simple_sfree(buf);
533 if ( t != NULL )
534 throw t;
535 }
536 throw "throwf, out of memory error";
537 }
538
539
540 #if !TARGET_OS_SIMULATOR
541 static int sLogfile = STDERR_FILENO;
542 #endif
543
544 #if !TARGET_OS_SIMULATOR
545 // based on CFUtilities.c: also_do_stderr()
546 static bool useSyslog()
547 {
548 // Use syslog() for processes managed by launchd
549 static bool launchdChecked = false;
550 static bool launchdOwned = false;
551 if ( !launchdChecked && gProcessInfo->libSystemInitialized ) {
552 if ( (gLibSystemHelpers != NULL) && (gLibSystemHelpers->version >= 11) ) {
553 // <rdar://problem/23520449> only call isLaunchdOwned() after libSystem is initialized
554 launchdOwned = (*gLibSystemHelpers->isLaunchdOwned)();
555 launchdChecked = true;
556 }
557 }
558 if ( launchdChecked && launchdOwned )
559 return true;
560
561 // If stderr is not available, use syslog()
562 struct stat sb;
563 int result = fstat(STDERR_FILENO, &sb);
564 if ( result < 0 )
565 return true; // file descriptor 2 is closed
566
567 return false;
568 }
569
570
571 static void socket_syslogv(int priority, const char* format, va_list list)
572 {
573 // lazily create socket and connection to syslogd
574 if ( sLogSocket == -1 ) {
575 sLogSocket = ::socket(AF_UNIX, SOCK_DGRAM, 0);
576 if (sLogSocket == -1)
577 return; // cannot log
578 ::fcntl(sLogSocket, F_SETFD, 1);
579
580 struct sockaddr_un addr;
581 addr.sun_family = AF_UNIX;
582 strncpy(addr.sun_path, _PATH_LOG, sizeof(addr.sun_path));
583 if ( ::connect(sLogSocket, (struct sockaddr *)&addr, sizeof(addr)) == -1 ) {
584 ::close(sLogSocket);
585 sLogSocket = -1;
586 return;
587 }
588 }
589
590 // format message to syslogd like: "<priority>Process[pid]: message"
591 _SIMPLE_STRING buf = _simple_salloc();
592 if ( buf == NULL )
593 return;
594 if ( _simple_sprintf(buf, "<%d>%s[%d]: ", LOG_USER|LOG_NOTICE, sExecShortName, getpid()) == 0 ) {
595 if ( _simple_vsprintf(buf, format, list) == 0 ) {
596 const char* p = _simple_string(buf);
597 ::__sendto(sLogSocket, p, strlen(p), 0, NULL, 0);
598 }
599 }
600 _simple_sfree(buf);
601 }
602
603
604
605 void vlog(const char* format, va_list list)
606 {
607 #if TARGET_OS_IPHONE && !TARGET_OS_SIMULATOR
608 // <rdar://problem/25965832> log to console when running iOS app from Xcode
609 if ( !sLogToFile && !sForceStderr && useSyslog() )
610 #else
611 if ( !sLogToFile && useSyslog() )
612 #endif
613 socket_syslogv(LOG_ERR, format, list);
614 else {
615 _simple_vdprintf(sLogfile, format, list);
616 }
617 }
618
619 void log(const char* format, ...)
620 {
621 va_list list;
622 va_start(list, format);
623 vlog(format, list);
624 va_end(list);
625 }
626
627
628 void vwarn(const char* format, va_list list)
629 {
630 _simple_dprintf(sLogfile, "dyld: warning, ");
631 _simple_vdprintf(sLogfile, format, list);
632 }
633
634 void warn(const char* format, ...)
635 {
636 va_list list;
637 va_start(list, format);
638 vwarn(format, list);
639 va_end(list);
640 }
641
642 void logToConsole(const char* format, ...) {
643 #if SUPPORT_LOGGING_TO_CONSOLE
644 int cfd = open(_PATH_CONSOLE, O_WRONLY|O_NOCTTY);
645 if (cfd == -1)
646 return;
647
648 va_list list;
649 va_start(list, format);
650 _simple_vdprintf(cfd, format, list);
651 va_end(list);
652
653 close(cfd);
654 #endif
655 }
656
657 #else
658 extern void vlog(const char* format, va_list list);
659 #endif // !TARGET_OS_SIMULATOR
660
661
662 #pragma clang diagnostic push
663 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
664 // <rdar://problem/8867781> control access to sAllImages through a lock
665 // because global dyld lock is not held during initialization phase of dlopen()
666 // <rdar://problem/16145518> Use OSSpinLockLock to allow yielding
667 static OSSpinLock sAllImagesLock = 0;
668
669 static void allImagesLock()
670 {
671 OSSpinLockLock(&sAllImagesLock);
672 }
673
674 static void allImagesUnlock()
675 {
676 OSSpinLockUnlock(&sAllImagesLock);
677 }
678 #pragma clang diagnostic pop
679
680
681 // utility class to assure files are closed when an exception is thrown
682 class FileOpener {
683 public:
684 FileOpener(const char* path);
685 ~FileOpener();
686 int getFileDescriptor() { return fd; }
687 private:
688 int fd;
689 };
690
691 FileOpener::FileOpener(const char* path)
692 : fd(-1)
693 {
694 fd = dyld3::open(path, O_RDONLY, 0);
695 }
696
697 FileOpener::~FileOpener()
698 {
699 if ( fd != -1 )
700 close(fd);
701 }
702
703
704 static void registerDOFs(const std::vector<ImageLoader::DOFInfo>& dofs)
705 {
706 const size_t dofSectionCount = dofs.size();
707 if ( !sEnv.DYLD_DISABLE_DOFS && (dofSectionCount != 0) ) {
708 int fd = open("/dev/" DTRACEMNR_HELPER, O_RDWR);
709 if ( fd < 0 ) {
710 //dyld::warn("can't open /dev/" DTRACEMNR_HELPER " to register dtrace DOF sections\n");
711 }
712 else {
713 // allocate a buffer on the stack for the variable length dof_ioctl_data_t type
714 uint8_t buffer[sizeof(dof_ioctl_data_t) + dofSectionCount*sizeof(dof_helper_t)];
715 dof_ioctl_data_t* ioctlData = (dof_ioctl_data_t*)buffer;
716
717 // fill in buffer with one dof_helper_t per DOF section
718 ioctlData->dofiod_count = dofSectionCount;
719 for (unsigned int i=0; i < dofSectionCount; ++i) {
720 strlcpy(ioctlData->dofiod_helpers[i].dofhp_mod, dofs[i].imageShortName, DTRACE_MODNAMELEN);
721 ioctlData->dofiod_helpers[i].dofhp_dof = (uintptr_t)(dofs[i].dof);
722 ioctlData->dofiod_helpers[i].dofhp_addr = (uintptr_t)(dofs[i].dof);
723 }
724
725 // tell kernel about all DOF sections en mas
726 // pass pointer to ioctlData because ioctl() only copies a fixed size amount of data into kernel
727 user_addr_t val = (user_addr_t)(unsigned long)ioctlData;
728 if ( ioctl(fd, DTRACEHIOC_ADDDOF, &val) != -1 ) {
729 // kernel returns a unique identifier for each section in the dofiod_helpers[].dofhp_dof field.
730 for (unsigned int i=0; i < dofSectionCount; ++i) {
731 RegisteredDOF info;
732 info.mh = dofs[i].imageHeader;
733 info.registrationID = (int)(ioctlData->dofiod_helpers[i].dofhp_dof);
734 sImageFilesNeedingDOFUnregistration.push_back(info);
735 if ( gLinkContext.verboseDOF ) {
736 dyld::log("dyld: registering DOF section %p in %s with dtrace, ID=0x%08X\n",
737 dofs[i].dof, dofs[i].imageShortName, info.registrationID);
738 }
739 }
740 }
741 else {
742 //dyld::log( "dyld: ioctl to register dtrace DOF section failed\n");
743 }
744 close(fd);
745 }
746 }
747 }
748
749 static void unregisterDOF(int registrationID)
750 {
751 int fd = open("/dev/" DTRACEMNR_HELPER, O_RDWR, 0);
752 if ( fd < 0 ) {
753 dyld::warn("can't open /dev/" DTRACEMNR_HELPER " to unregister dtrace DOF section\n");
754 }
755 else {
756 ioctl(fd, DTRACEHIOC_REMOVE, registrationID);
757 close(fd);
758 if ( gLinkContext.verboseInit )
759 dyld::warn("unregistering DOF section ID=0x%08X with dtrace\n", registrationID);
760 }
761 }
762
763
764 //
765 // _dyld_register_func_for_add_image() is implemented as part of the general image state change notification
766 // Returns true if we did call add image callbacks on this image
767 //
768 static bool notifyAddImageCallbacks(ImageLoader* image)
769 {
770 // use guard so that we cannot notify about the same image twice
771 if ( ! image->addFuncNotified() ) {
772 for (std::vector<ImageCallback>::iterator it=sAddImageCallbacks.begin(); it != sAddImageCallbacks.end(); it++) {
773 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_ADD_IMAGE, (uint64_t)image->machHeader(), (uint64_t)(*it), 0);
774 (*it)(image->machHeader(), image->getSlide());
775 }
776 for (LoadImageCallback func : sAddLoadImageCallbacks) {
777 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_ADD_IMAGE, (uint64_t)image->machHeader(), (uint64_t)(*func), 0);
778 (*func)(image->machHeader(), image->getPath(), !image->neverUnload());
779 }
780 image->setAddFuncNotified();
781 return true;
782 }
783 return false;
784 }
785
786
787
788 // notify gdb about these new images
789 static const char* updateAllImages(enum dyld_image_states state, uint32_t infoCount, const struct dyld_image_info info[])
790 {
791 // <rdar://problem/8812589> don't add images without paths to all-image-info-list
792 if ( info[0].imageFilePath != NULL )
793 addImagesToAllImages(infoCount, info);
794 return NULL;
795 }
796
797
798 static StateHandlers* stateToHandlers(dyld_image_states state, void* handlersArray[7][3])
799 {
800 switch ( state ) {
801 case dyld_image_state_mapped:
802 return reinterpret_cast<StateHandlers*>(&handlersArray[0]);
803
804 case dyld_image_state_dependents_mapped:
805 return reinterpret_cast<StateHandlers*>(&handlersArray[1]);
806
807 case dyld_image_state_rebased:
808 return reinterpret_cast<StateHandlers*>(&handlersArray[2]);
809
810 case dyld_image_state_bound:
811 return reinterpret_cast<StateHandlers*>(&handlersArray[3]);
812
813 case dyld_image_state_dependents_initialized:
814 return reinterpret_cast<StateHandlers*>(&handlersArray[4]);
815
816 case dyld_image_state_initialized:
817 return reinterpret_cast<StateHandlers*>(&handlersArray[5]);
818
819 case dyld_image_state_terminated:
820 return reinterpret_cast<StateHandlers*>(&handlersArray[6]);
821 }
822 return NULL;
823 }
824
825 #if SUPPORT_ACCELERATE_TABLES
826 static dyld_image_state_change_handler getPreInitNotifyHandler(unsigned index)
827 {
828 std::vector<dyld_image_state_change_handler>* handlers = stateToHandlers(dyld_image_state_dependents_initialized, sSingleHandlers);
829 if ( index >= handlers->size() )
830 return NULL;
831 return (*handlers)[index];
832 }
833
834 static dyld_image_state_change_handler getBoundBatchHandler(unsigned index)
835 {
836 std::vector<dyld_image_state_change_handler>* handlers = stateToHandlers(dyld_image_state_bound, sBatchHandlers);
837 if ( index >= handlers->size() )
838 return NULL;
839 return (*handlers)[index];
840 }
841
842 static void notifySingleFromCache(dyld_image_states state, const mach_header* mh, const char* path)
843 {
844 //dyld::log("notifySingle(state=%d, image=%s)\n", state, image->getPath());
845 std::vector<dyld_image_state_change_handler>* handlers = stateToHandlers(state, sSingleHandlers);
846 if ( handlers != NULL ) {
847 dyld_image_info info;
848 info.imageLoadAddress = mh;
849 info.imageFilePath = path;
850 info.imageFileModDate = 0;
851 for (dyld_image_state_change_handler handler : *handlers) {
852 const char* result = (*handler)(state, 1, &info);
853 if ( (result != NULL) && (state == dyld_image_state_mapped) ) {
854 //fprintf(stderr, " image rejected by handler=%p\n", *it);
855 // make copy of thrown string so that later catch clauses can free it
856 const char* str = strdup(result);
857 throw str;
858 }
859 }
860 }
861 if ( (state == dyld_image_state_dependents_initialized) && (sNotifyObjCInit != NULL) && (mh->flags & MH_HAS_OBJC) ) {
862 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_OBJC_INIT, (uint64_t)mh, 0, 0);
863 (*sNotifyObjCInit)(path, mh);
864 }
865 }
866 #endif
867
868 #if !TARGET_OS_SIMULATOR
869 static void sendMessage(unsigned portSlot, mach_msg_id_t msgId, mach_msg_size_t sendSize, mach_msg_header_t* buffer, mach_msg_size_t bufferSize) {
870 // Allocate a port to listen on in this monitoring task
871 mach_port_t sendPort = dyld::gProcessInfo->notifyPorts[portSlot];
872 if (sendPort == MACH_PORT_NULL) {
873 return;
874 }
875 mach_port_t replyPort = MACH_PORT_NULL;
876 mach_port_options_t options = { .flags = MPO_CONTEXT_AS_GUARD | MPO_STRICT,
877 .mpl = { 1 }};
878 kern_return_t kr = mach_port_construct(mach_task_self(), &options, (mach_port_context_t)&replyPort, &replyPort);
879 if (kr != KERN_SUCCESS) {
880 return;
881 }
882 // Assemble a message
883 mach_msg_header_t* h = buffer;
884 h->msgh_bits = MACH_MSGH_BITS(MACH_MSG_TYPE_COPY_SEND,MACH_MSG_TYPE_MAKE_SEND_ONCE);
885 h->msgh_id = msgId;
886 h->msgh_local_port = replyPort;
887 h->msgh_remote_port = sendPort;
888 h->msgh_reserved = 0;
889 h->msgh_size = sendSize;
890 kr = mach_msg(h, MACH_SEND_MSG | MACH_RCV_MSG, h->msgh_size, bufferSize, replyPort, 0, MACH_PORT_NULL);
891 mach_msg_destroy(h);
892 if ( kr == MACH_SEND_INVALID_DEST ) {
893 if (OSAtomicCompareAndSwap32(sendPort, 0, (volatile int32_t*)&dyld::gProcessInfo->notifyPorts[portSlot])) {
894 mach_port_deallocate(mach_task_self(), sendPort);
895 }
896 }
897 mach_port_destruct(mach_task_self(), replyPort, 0, (mach_port_context_t)&replyPort);
898 }
899
900 static void notifyMonitoringDyld(bool unloading, unsigned imageCount, const struct mach_header* loadAddresses[],
901 const char* imagePaths[])
902 {
903 dyld3::ScopedTimer(DBG_DYLD_REMOTE_IMAGE_NOTIFIER, 0, 0, 0);
904 for (int slot=0; slot < DYLD_MAX_PROCESS_INFO_NOTIFY_COUNT; ++slot) {
905 if ( dyld::gProcessInfo->notifyPorts[slot] == 0) continue;
906 unsigned entriesSize = imageCount*sizeof(dyld_process_info_image_entry);
907 unsigned pathsSize = 0;
908 for (unsigned j=0; j < imageCount; ++j) {
909 pathsSize += (strlen(imagePaths[j]) + 1);
910 }
911
912 unsigned totalSize = (sizeof(struct dyld_process_info_notify_header) + entriesSize + pathsSize + 127) & -128; // align
913 // The reciever has a fixed buffer of DYLD_PROCESS_INFO_NOTIFY_MAX_BUFFER_SIZE, whcih needs to hold both the message and a trailer.
914 // If the total size exceeds that we need to fragment the message.
915 if ( (totalSize + MAX_TRAILER_SIZE) > DYLD_PROCESS_INFO_NOTIFY_MAX_BUFFER_SIZE ) {
916 // Putting all image paths into one message would make buffer too big.
917 // Instead split into two messages. Recurse as needed until paths fit in buffer.
918 unsigned imageHalfCount = imageCount/2;
919 notifyMonitoringDyld(unloading, imageHalfCount, loadAddresses, imagePaths);
920 notifyMonitoringDyld(unloading, imageCount - imageHalfCount, &loadAddresses[imageHalfCount], &imagePaths[imageHalfCount]);
921 return;
922 }
923 uint8_t buffer[totalSize + MAX_TRAILER_SIZE];
924 dyld_process_info_notify_header* header = (dyld_process_info_notify_header*)buffer;
925 header->version = 1;
926 header->imageCount = imageCount;
927 header->imagesOffset = sizeof(dyld_process_info_notify_header);
928 header->stringsOffset = sizeof(dyld_process_info_notify_header) + entriesSize;
929 header->timestamp = dyld::gProcessInfo->infoArrayChangeTimestamp;
930 dyld_process_info_image_entry* entries = (dyld_process_info_image_entry*)&buffer[header->imagesOffset];
931 char* const pathPoolStart = (char*)&buffer[header->stringsOffset];
932 char* pathPool = pathPoolStart;
933 for (unsigned j=0; j < imageCount; ++j) {
934 strcpy(pathPool, imagePaths[j]);
935 uint32_t len = (uint32_t)strlen(pathPool);
936 bzero(entries->uuid, 16);
937 dyld3::MachOFile* mf = (dyld3::MachOFile*)loadAddresses[j];
938 mf->getUuid(entries->uuid);
939 entries->loadAddress = (uint64_t)loadAddresses[j];
940 entries->pathStringOffset = (uint32_t)(pathPool - pathPoolStart);
941 entries->pathLength = len;
942 pathPool += (len +1);
943 ++entries;
944 }
945 if (unloading) {
946 sendMessage(slot, DYLD_PROCESS_INFO_NOTIFY_UNLOAD_ID, totalSize, (mach_msg_header_t*)buffer, totalSize);
947 } else {
948 sendMessage(slot, DYLD_PROCESS_INFO_NOTIFY_LOAD_ID, totalSize, (mach_msg_header_t*)buffer, totalSize);
949 }
950 }
951 }
952
953 static void notifyMonitoringDyldMain()
954 {
955 dyld3::ScopedTimer(DBG_DYLD_REMOTE_IMAGE_NOTIFIER, 0, 0, 0);
956 for (int slot=0; slot < DYLD_MAX_PROCESS_INFO_NOTIFY_COUNT; ++slot) {
957 if ( dyld::gProcessInfo->notifyPorts[slot] == 0) continue;
958 uint8_t buffer[sizeof(mach_msg_header_t) + MAX_TRAILER_SIZE];
959 sendMessage(slot, DYLD_PROCESS_INFO_NOTIFY_MAIN_ID, sizeof(mach_msg_header_t), (mach_msg_header_t*)buffer, sizeof(mach_msg_header_t) + MAX_TRAILER_SIZE);
960 }
961 }
962 #else
963 extern void notifyMonitoringDyldMain() VIS_HIDDEN;
964 extern void notifyMonitoringDyld(bool unloading, unsigned imageCount, const struct mach_header* loadAddresses[],
965 const char* imagePaths[]) VIS_HIDDEN;
966 #endif
967
968 void notifyKernel(const ImageLoader& image, bool loading) {
969 uint32_t baseCode = loading ? DBG_DYLD_UUID_MAP_A : DBG_DYLD_UUID_UNMAP_A;
970 uuid_t uuid;
971 image.getUUID(uuid);
972 if ( image.inSharedCache() ) {
973 dyld3::kdebug_trace_dyld_image(baseCode, image.getInstallPath(), (const uuid_t *)&uuid, {0}, {{ 0, 0 }}, image.machHeader());
974 } else {
975 fsid_t fsid = {{0, 0}};
976 fsobj_id_t fsobj = {0};
977 ino_t inode = image.getInode();
978 fsobj.fid_objno = (uint32_t)inode;
979 fsobj.fid_generation = (uint32_t)(inode>>32);
980 fsid.val[0] = image.getDevice();
981 dyld3::kdebug_trace_dyld_image(baseCode, image.getPath(), (const uuid_t *)&uuid, fsobj, fsid, image.machHeader());
982 }
983 }
984
985 static void notifySingle(dyld_image_states state, const ImageLoader* image, ImageLoader::InitializerTimingList* timingInfo)
986 {
987 //dyld::log("notifySingle(state=%d, image=%s)\n", state, image->getPath());
988 std::vector<dyld_image_state_change_handler>* handlers = stateToHandlers(state, sSingleHandlers);
989 if ( handlers != NULL ) {
990 dyld_image_info info;
991 info.imageLoadAddress = image->machHeader();
992 info.imageFilePath = image->getRealPath();
993 info.imageFileModDate = image->lastModified();
994 for (std::vector<dyld_image_state_change_handler>::iterator it = handlers->begin(); it != handlers->end(); ++it) {
995 const char* result = (*it)(state, 1, &info);
996 if ( (result != NULL) && (state == dyld_image_state_mapped) ) {
997 //fprintf(stderr, " image rejected by handler=%p\n", *it);
998 // make copy of thrown string so that later catch clauses can free it
999 const char* str = strdup(result);
1000 throw str;
1001 }
1002 }
1003 }
1004 if ( state == dyld_image_state_mapped ) {
1005 // <rdar://problem/7008875> Save load addr + UUID for images from outside the shared cache
1006 // <rdar://problem/50432671> Include UUIDs for shared cache dylibs in all image info when using private mapped shared caches
1007 if (!image->inSharedCache()
1008 || (gLinkContext.sharedRegionMode == ImageLoader::kUsePrivateSharedRegion)) {
1009 dyld_uuid_info info;
1010 if ( image->getUUID(info.imageUUID) ) {
1011 info.imageLoadAddress = image->machHeader();
1012 addNonSharedCacheImageUUID(info);
1013 }
1014 }
1015 }
1016 if ( (state == dyld_image_state_dependents_initialized) && (sNotifyObjCInit != NULL) && image->notifyObjC() ) {
1017 uint64_t t0 = mach_absolute_time();
1018 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_OBJC_INIT, (uint64_t)image->machHeader(), 0, 0);
1019 (*sNotifyObjCInit)(image->getRealPath(), image->machHeader());
1020 uint64_t t1 = mach_absolute_time();
1021 uint64_t t2 = mach_absolute_time();
1022 uint64_t timeInObjC = t1-t0;
1023 uint64_t emptyTime = (t2-t1)*100;
1024 if ( (timeInObjC > emptyTime) && (timingInfo != NULL) ) {
1025 timingInfo->addTime(image->getShortName(), timeInObjC);
1026 }
1027 }
1028 // mach message csdlc about dynamically unloaded images
1029 if ( image->addFuncNotified() && (state == dyld_image_state_terminated) ) {
1030 notifyKernel(*image, false);
1031 const struct mach_header* loadAddress[] = { image->machHeader() };
1032 const char* loadPath[] = { image->getPath() };
1033 notifyMonitoringDyld(true, 1, loadAddress, loadPath);
1034 }
1035 }
1036
1037
1038 //
1039 // Normally, dyld_all_image_infos is only updated in batches after an entire
1040 // graph is loaded. But if there is an error loading the initial set of
1041 // dylibs needed by the main executable, dyld_all_image_infos is not yet set
1042 // up, leading to usually brief crash logs.
1043 //
1044 // This function manually adds the images loaded so far to dyld::gProcessInfo.
1045 // It should only be called before terminating.
1046 //
1047 void syncAllImages()
1048 {
1049 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); ++it) {
1050 dyld_image_info info;
1051 ImageLoader* image = *it;
1052 info.imageLoadAddress = image->machHeader();
1053 info.imageFilePath = image->getRealPath();
1054 info.imageFileModDate = image->lastModified();
1055 // add to all_image_infos if not already there
1056 bool found = false;
1057 int existingCount = dyld::gProcessInfo->infoArrayCount;
1058 const dyld_image_info* existing = dyld::gProcessInfo->infoArray;
1059 if ( existing != NULL ) {
1060 for (int i=0; i < existingCount; ++i) {
1061 if ( existing[i].imageLoadAddress == info.imageLoadAddress ) {
1062 //dyld::log("not adding %s\n", info.imageFilePath);
1063 found = true;
1064 break;
1065 }
1066 }
1067 }
1068 if ( ! found ) {
1069 //dyld::log("adding %s\n", info.imageFilePath);
1070 addImagesToAllImages(1, &info);
1071 }
1072 }
1073 }
1074
1075
1076 static int imageSorter(const void* l, const void* r)
1077 {
1078 const ImageLoader* left = *((ImageLoader**)l);
1079 const ImageLoader* right= *((ImageLoader**)r);
1080 return left->compare(right);
1081 }
1082
1083 static void notifyBatchPartial(dyld_image_states state, bool orLater, dyld_image_state_change_handler onlyHandler, bool preflightOnly, bool onlyObjCMappedNotification)
1084 {
1085 std::vector<dyld_image_state_change_handler>* handlers = stateToHandlers(state, sBatchHandlers);
1086 if ( (handlers != NULL) || ((state == dyld_image_state_bound) && (sNotifyObjCMapped != NULL)) ) {
1087 // don't use a vector because it will use malloc/free and we want notifcation to be low cost
1088 allImagesLock();
1089 dyld_image_info infos[allImagesCount()+1];
1090 ImageLoader* images[allImagesCount()+1];
1091 ImageLoader** end = images;
1092 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
1093 dyld_image_states imageState = (*it)->getState();
1094 if ( (imageState == state) || (orLater && (imageState > state)) )
1095 *end++ = *it;
1096 }
1097 if ( sBundleBeingLoaded != NULL ) {
1098 dyld_image_states imageState = sBundleBeingLoaded->getState();
1099 if ( (imageState == state) || (orLater && (imageState > state)) )
1100 *end++ = sBundleBeingLoaded;
1101 }
1102 const char* dontLoadReason = NULL;
1103 uint32_t imageCount = (uint32_t)(end-images);
1104 if ( imageCount != 0 ) {
1105 // sort bottom up
1106 qsort(images, imageCount, sizeof(ImageLoader*), &imageSorter);
1107
1108 const mach_header* mhs[imageCount];
1109 const char* paths[imageCount];
1110 uint32_t bulkNotifyImageCount = 0;
1111
1112 // build info array
1113 for (unsigned int i=0; i < imageCount; ++i) {
1114 dyld_image_info* p = &infos[i];
1115 ImageLoader* image = images[i];
1116 //dyld::log(" state=%d, name=%s\n", state, image->getPath());
1117 p->imageLoadAddress = image->machHeader();
1118 p->imageFilePath = image->getRealPath();
1119 p->imageFileModDate = image->lastModified();
1120 // get these registered with the kernel as early as possible
1121 if ( state == dyld_image_state_dependents_mapped)
1122 notifyKernel(*image, true);
1123 // special case for add_image hook
1124 if ( state == dyld_image_state_bound ) {
1125 if ( notifyAddImageCallbacks(image) ) {
1126 // Add this to the list of images to bulk notify
1127 mhs[bulkNotifyImageCount] = infos[i].imageLoadAddress;
1128 paths[bulkNotifyImageCount] = infos[i].imageFilePath;
1129 ++bulkNotifyImageCount;
1130 }
1131 }
1132 }
1133
1134 if ( (state == dyld_image_state_bound) && !sAddBulkLoadImageCallbacks.empty() && (bulkNotifyImageCount != 0) ) {
1135 for (LoadImageBulkCallback func : sAddBulkLoadImageCallbacks) {
1136 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_ADD_IMAGE, (uint64_t)mhs[0], (uint64_t)func, 0);
1137 (*func)(bulkNotifyImageCount, mhs, paths);
1138 }
1139 }
1140 }
1141 #if SUPPORT_ACCELERATE_TABLES
1142 if ( sAllCacheImagesProxy != NULL ) {
1143 unsigned cacheCount = sAllCacheImagesProxy->appendImagesToNotify(state, orLater, &infos[imageCount]);
1144 // support _dyld_register_func_for_add_image()
1145 if ( state == dyld_image_state_bound ) {
1146 for (ImageCallback callback : sAddImageCallbacks) {
1147 for (unsigned i=0; i < cacheCount; ++i) {
1148 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_ADD_IMAGE, (uint64_t)infos[imageCount+i].imageLoadAddress, (uint64_t)(*callback), 0);
1149 (*callback)(infos[imageCount+i].imageLoadAddress, sSharedCacheLoadInfo.slide);
1150 }
1151 }
1152 for (LoadImageCallback func : sAddLoadImageCallbacks) {
1153 for (unsigned i=0; i < cacheCount; ++i) {
1154 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_ADD_IMAGE, (uint64_t)infos[imageCount+i].imageLoadAddress, (uint64_t)(*func), 0);
1155 (*func)(infos[imageCount+i].imageLoadAddress, infos[imageCount+i].imageFilePath, false);
1156 }
1157 }
1158 if ( !sAddBulkLoadImageCallbacks.empty() ) {
1159 const mach_header* bulk_mhs[cacheCount];
1160 const char* bulk_paths[cacheCount];
1161 for (int i=0; i < cacheCount; ++i) {
1162 bulk_mhs[i] = infos[imageCount+i].imageLoadAddress;
1163 bulk_paths[i] = infos[imageCount+i].imageFilePath;
1164 }
1165 for (LoadImageBulkCallback func : sAddBulkLoadImageCallbacks) {
1166 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_ADD_IMAGE, (uint64_t)bulk_mhs[0], (uint64_t)func, 0);
1167 (*func)(cacheCount, bulk_mhs, bulk_paths);
1168 }
1169 }
1170 }
1171 imageCount += cacheCount;
1172 }
1173 #endif
1174 if ( imageCount != 0 ) {
1175 if ( !onlyObjCMappedNotification ) {
1176 if ( onlyHandler != NULL ) {
1177 const char* result = NULL;
1178 if ( result == NULL ) {
1179 result = (*onlyHandler)(state, imageCount, infos);
1180 }
1181 if ( (result != NULL) && (state == dyld_image_state_dependents_mapped) ) {
1182 //fprintf(stderr, " images rejected by handler=%p\n", onlyHandler);
1183 // make copy of thrown string so that later catch clauses can free it
1184 dontLoadReason = strdup(result);
1185 }
1186 }
1187 else {
1188 // call each handler with whole array
1189 if ( handlers != NULL ) {
1190 for (std::vector<dyld_image_state_change_handler>::iterator it = handlers->begin(); it != handlers->end(); ++it) {
1191 const char* result = (*it)(state, imageCount, infos);
1192 if ( (result != NULL) && (state == dyld_image_state_dependents_mapped) ) {
1193 //fprintf(stderr, " images rejected by handler=%p\n", *it);
1194 // make copy of thrown string so that later catch clauses can free it
1195 dontLoadReason = strdup(result);
1196 break;
1197 }
1198 }
1199 }
1200 }
1201 }
1202 // tell objc about new images
1203 if ( (onlyHandler == NULL) && ((state == dyld_image_state_bound) || (orLater && (dyld_image_state_bound > state))) && (sNotifyObjCMapped != NULL) ) {
1204 const char* paths[imageCount];
1205 const mach_header* mhs[imageCount];
1206 unsigned objcImageCount = 0;
1207 for (int i=0; i < imageCount; ++i) {
1208 ImageLoader* image = findImageByMachHeader(infos[i].imageLoadAddress);
1209 bool hasObjC = false;
1210 if ( image != NULL ) {
1211 if ( image->objCMappedNotified() )
1212 continue;
1213 hasObjC = image->notifyObjC();
1214 }
1215 #if SUPPORT_ACCELERATE_TABLES
1216 else if ( sAllCacheImagesProxy != NULL ) {
1217 const mach_header* mh;
1218 const char* path;
1219 unsigned index;
1220 if ( sAllCacheImagesProxy->addressInCache(infos[i].imageLoadAddress, &mh, &path, &index) ) {
1221 hasObjC = (mh->flags & MH_HAS_OBJC);
1222 }
1223 }
1224 #endif
1225 if ( hasObjC ) {
1226 paths[objcImageCount] = infos[i].imageFilePath;
1227 mhs[objcImageCount] = infos[i].imageLoadAddress;
1228 ++objcImageCount;
1229 if ( image != NULL )
1230 image->setObjCMappedNotified();
1231 }
1232 }
1233 if ( objcImageCount != 0 ) {
1234 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_OBJC_MAP, 0, 0, 0);
1235 uint64_t t0 = mach_absolute_time();
1236 (*sNotifyObjCMapped)(objcImageCount, paths, mhs);
1237 uint64_t t1 = mach_absolute_time();
1238 ImageLoader::fgTotalObjCSetupTime += (t1-t0);
1239 }
1240 }
1241 }
1242 allImagesUnlock();
1243 if ( dontLoadReason != NULL )
1244 throw dontLoadReason;
1245 if ( !preflightOnly && (state == dyld_image_state_dependents_mapped) ) {
1246 const struct mach_header* loadAddresses[imageCount];
1247 const char* loadPaths[imageCount];
1248 for(uint32_t i = 0; i<imageCount; ++i) {
1249 loadAddresses[i] = infos[i].imageLoadAddress;
1250 loadPaths[i] = infos[i].imageFilePath;
1251 }
1252 notifyMonitoringDyld(false, imageCount, loadAddresses, loadPaths);
1253 }
1254 }
1255 }
1256
1257 static void notifyBatch(dyld_image_states state, bool preflightOnly)
1258 {
1259 notifyBatchPartial(state, false, NULL, preflightOnly, false);
1260 }
1261
1262 #if TARGET_OS_OSX
1263 static
1264 void coresymbolication_load_notifier(void* connection, uint64_t timestamp, const char* path, const struct mach_header* mh)
1265 {
1266 const struct mach_header* loadAddress[] = { mh };
1267 const char* loadPath[] = { path };
1268 notifyMonitoringDyld(false, 1, loadAddress, loadPath);
1269 }
1270
1271 static
1272 void coresymbolication_unload_notifier(void* connection, uint64_t timestamp, const char* path, const struct mach_header* mh)
1273 {
1274 const struct mach_header* loadAddress = { mh };
1275 const char* loadPath = { path };
1276 notifyMonitoringDyld(true, 1, &loadAddress, &loadPath);
1277 }
1278
1279 static
1280 kern_return_t legacy_task_register_dyld_image_infos(task_t task, dyld_kernel_image_info_array_t dyld_images,
1281 mach_msg_type_number_t dyld_imagesCnt)
1282 {
1283 return KERN_SUCCESS;
1284 }
1285
1286 static
1287 kern_return_t legacy_task_unregister_dyld_image_infos(task_t task, dyld_kernel_image_info_array_t dyld_images,
1288 mach_msg_type_number_t dyld_imagesCnt)
1289 {
1290 return KERN_SUCCESS;
1291 }
1292
1293 static
1294 kern_return_t legacy_task_get_dyld_image_infos(task_inspect_t task, dyld_kernel_image_info_array_t *dyld_images,
1295 mach_msg_type_number_t *dyld_imagesCnt)
1296 {
1297 return KERN_SUCCESS;
1298 }
1299
1300 static
1301 kern_return_t legacy_task_register_dyld_shared_cache_image_info(task_t task, dyld_kernel_image_info_t dyld_cache_image,
1302 boolean_t no_cache, boolean_t private_cache)
1303 {
1304 return KERN_SUCCESS;
1305 }
1306
1307 static
1308 kern_return_t legacy_task_register_dyld_set_dyld_state(task_t task, uint8_t dyld_state)
1309 {
1310 return KERN_SUCCESS;
1311 }
1312
1313 static
1314 kern_return_t legacy_task_register_dyld_get_process_state(task_t task, dyld_kernel_process_info_t *dyld_process_state)
1315 {
1316 return KERN_SUCCESS;
1317 }
1318 #endif
1319
1320 // In order for register_func_for_add_image() callbacks to to be called bottom up,
1321 // we need to maintain a list of root images. The main executable is usally the
1322 // first root. Any images dynamically added are also roots (unless already loaded).
1323 // If DYLD_INSERT_LIBRARIES is used, those libraries are first.
1324 static void addRootImage(ImageLoader* image)
1325 {
1326 //dyld::log("addRootImage(%p, %s)\n", image, image->getPath());
1327 // add to list of roots
1328 sImageRoots.push_back(image);
1329 }
1330
1331
1332 static void clearAllDepths()
1333 {
1334 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++)
1335 (*it)->clearDepth();
1336 }
1337
1338 static void printAllDepths()
1339 {
1340 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++)
1341 dyld::log("%03d %s\n", (*it)->getDepth(), (*it)->getShortName());
1342 }
1343
1344
1345 static unsigned int imageCount()
1346 {
1347 allImagesLock();
1348 unsigned int result = (unsigned int)sAllImages.size();
1349 allImagesUnlock();
1350 return (result);
1351 }
1352
1353
1354 static void setNewProgramVars(const ProgramVars& newVars)
1355 {
1356 // make a copy of the pointers to program variables
1357 gLinkContext.programVars = newVars;
1358
1359 // now set each program global to their initial value
1360 *gLinkContext.programVars.NXArgcPtr = gLinkContext.argc;
1361 *gLinkContext.programVars.NXArgvPtr = gLinkContext.argv;
1362 *gLinkContext.programVars.environPtr = gLinkContext.envp;
1363 *gLinkContext.programVars.__prognamePtr = gLinkContext.progname;
1364 }
1365
1366 #if SUPPORT_OLD_CRT_INITIALIZATION
1367 static void setRunInitialzersOldWay()
1368 {
1369 gRunInitializersOldWay = true;
1370 }
1371 #endif
1372
1373 static bool sandboxBlocked(const char* path, const char* kind)
1374 {
1375 #if TARGET_OS_SIMULATOR
1376 // sandbox calls not yet supported in simulator runtime
1377 return false;
1378 #else
1379 sandbox_filter_type filter = (sandbox_filter_type)(SANDBOX_FILTER_PATH | SANDBOX_CHECK_NO_REPORT);
1380 return ( sandbox_check(getpid(), kind, filter, path) > 0 );
1381 #endif
1382 }
1383
1384 bool sandboxBlockedMmap(const char* path)
1385 {
1386 return sandboxBlocked(path, "file-map-executable");
1387 }
1388
1389 bool sandboxBlockedOpen(const char* path)
1390 {
1391 return sandboxBlocked(path, "file-read-data");
1392 }
1393
1394 bool sandboxBlockedStat(const char* path)
1395 {
1396 return sandboxBlocked(path, "file-read-metadata");
1397 }
1398
1399
1400 static void addDynamicReference(ImageLoader* from, ImageLoader* to) {
1401 // don't add dynamic reference if target is in the shared cache (since it can't be unloaded)
1402 if ( to->inSharedCache() )
1403 return;
1404
1405 // don't add dynamic reference if there already is a static one
1406 if ( from->dependsOn(to) )
1407 return;
1408
1409 #pragma clang diagnostic push
1410 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
1411 // don't add if this combination already exists
1412 OSSpinLockLock(&sDynamicReferencesLock);
1413 for (std::vector<ImageLoader::DynamicReference>::iterator it=sDynamicReferences.begin(); it != sDynamicReferences.end(); ++it) {
1414 if ( (it->from == from) && (it->to == to) ) {
1415 OSSpinLockUnlock(&sDynamicReferencesLock);
1416 return;
1417 }
1418 }
1419
1420 //dyld::log("addDynamicReference(%s, %s\n", from->getShortName(), to->getShortName());
1421 ImageLoader::DynamicReference t;
1422 t.from = from;
1423 t.to = to;
1424 sDynamicReferences.push_back(t);
1425 OSSpinLockUnlock(&sDynamicReferencesLock);
1426 #pragma clang diagnostic pop
1427 }
1428
1429 static void addImage(ImageLoader* image)
1430 {
1431 // add to master list
1432 allImagesLock();
1433 sAllImages.push_back(image);
1434 allImagesUnlock();
1435
1436 // update mapped ranges
1437 uintptr_t lastSegStart = 0;
1438 uintptr_t lastSegEnd = 0;
1439 for(unsigned int i=0, e=image->segmentCount(); i < e; ++i) {
1440 if ( image->segUnaccessible(i) )
1441 continue;
1442 uintptr_t start = image->segActualLoadAddress(i);
1443 uintptr_t end = image->segActualEndAddress(i);
1444 if ( start == lastSegEnd ) {
1445 // two segments are contiguous, just record combined segments
1446 lastSegEnd = end;
1447 }
1448 else {
1449 // non-contiguous segments, record last (if any)
1450 if ( lastSegEnd != 0 )
1451 addMappedRange(image, lastSegStart, lastSegEnd);
1452 lastSegStart = start;
1453 lastSegEnd = end;
1454 }
1455 }
1456 if ( lastSegEnd != 0 )
1457 addMappedRange(image, lastSegStart, lastSegEnd);
1458
1459
1460 if ( gLinkContext.verboseLoading || (sEnv.DYLD_PRINT_LIBRARIES_POST_LAUNCH && (sMainExecutable!=NULL) && sMainExecutable->isLinked()) ) {
1461 const char *imagePath = image->getPath();
1462 uuid_t imageUUID;
1463 if ( image->getUUID(imageUUID) ) {
1464 uuid_string_t imageUUIDStr;
1465 uuid_unparse_upper(imageUUID, imageUUIDStr);
1466 dyld::log("dyld: loaded: <%s> %s\n", imageUUIDStr, imagePath);
1467 }
1468 else {
1469 dyld::log("dyld: loaded: %s\n", imagePath);
1470 }
1471 }
1472
1473 }
1474
1475 //
1476 // Helper for std::remove_if
1477 //
1478 class RefUsesImage {
1479 public:
1480 RefUsesImage(ImageLoader* image) : _image(image) {}
1481 bool operator()(const ImageLoader::DynamicReference& ref) const {
1482 return ( (ref.from == _image) || (ref.to == _image) );
1483 }
1484 private:
1485 ImageLoader* _image;
1486 };
1487
1488
1489
1490 void removeImage(ImageLoader* image)
1491 {
1492 // if has dtrace DOF section, tell dtrace it is going away, then remove from sImageFilesNeedingDOFUnregistration
1493 for (std::vector<RegisteredDOF>::iterator it=sImageFilesNeedingDOFUnregistration.begin(); it != sImageFilesNeedingDOFUnregistration.end(); ) {
1494 if ( it->mh == image->machHeader() ) {
1495 unregisterDOF(it->registrationID);
1496 sImageFilesNeedingDOFUnregistration.erase(it);
1497 // don't increment iterator, the erase caused next element to be copied to where this iterator points
1498 }
1499 else {
1500 ++it;
1501 }
1502 }
1503
1504 // tell all registered remove image handlers about this
1505 // do this before removing image from internal data structures so that the callback can query dyld about the image
1506 if ( image->getState() >= dyld_image_state_bound ) {
1507 sRemoveImageCallbacksInUse = true; // This only runs inside dyld's global lock, so ok to use a global for the in-use flag.
1508 for (std::vector<ImageCallback>::iterator it=sRemoveImageCallbacks.begin(); it != sRemoveImageCallbacks.end(); it++) {
1509 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_REMOVE_IMAGE, (uint64_t)image->machHeader(), (uint64_t)(*it), 0);
1510 (*it)(image->machHeader(), image->getSlide());
1511 }
1512 sRemoveImageCallbacksInUse = false;
1513
1514 if ( sNotifyObjCUnmapped != NULL && image->notifyObjC() )
1515 (*sNotifyObjCUnmapped)(image->getRealPath(), image->machHeader());
1516 }
1517
1518 // notify
1519 notifySingle(dyld_image_state_terminated, image, NULL);
1520
1521 // remove from mapped images table
1522 removedMappedRanges(image);
1523
1524 // remove from master list
1525 allImagesLock();
1526 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
1527 if ( *it == image ) {
1528 sAllImages.erase(it);
1529 break;
1530 }
1531 }
1532 allImagesUnlock();
1533
1534 #pragma clang diagnostic push
1535 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
1536 // remove from sDynamicReferences
1537 OSSpinLockLock(&sDynamicReferencesLock);
1538 sDynamicReferences.erase(std::remove_if(sDynamicReferences.begin(), sDynamicReferences.end(), RefUsesImage(image)), sDynamicReferences.end());
1539 OSSpinLockUnlock(&sDynamicReferencesLock);
1540 #pragma clang diagnostic pop
1541
1542 // flush find-by-address cache (do this after removed from master list, so there is no chance it can come back)
1543 if ( sLastImageByAddressCache == image )
1544 sLastImageByAddressCache = NULL;
1545
1546 // if in root list, pull it out
1547 for (std::vector<ImageLoader*>::iterator it=sImageRoots.begin(); it != sImageRoots.end(); it++) {
1548 if ( *it == image ) {
1549 sImageRoots.erase(it);
1550 break;
1551 }
1552 }
1553
1554 // If this image is the potential canonical definition of any weak defs, then set them to a tombstone value
1555 if ( gLinkContext.weakDefMapInitialized && image->hasCoalescedExports() && (image->getState() >= dyld_image_state_bound) ) {
1556 Diagnostics diag;
1557 const dyld3::MachOAnalyzer* ma = (const dyld3::MachOAnalyzer*)image->machHeader();
1558 ma->forEachWeakDef(diag, ^(const char *symbolName, uint64_t imageOffset, bool isFromExportTrie) {
1559 auto it = gLinkContext.weakDefMap.find(symbolName);
1560 assert(it != gLinkContext.weakDefMap.end());
1561 it->second = { nullptr, 0 };
1562 if ( !isFromExportTrie ) {
1563 // The string was already duplicated if we are an export trie
1564 // so only strdup as we are the nlist
1565 size_t hash1 = ImageLoader::HashCString::hash(it->first);
1566 it->first = strdup(it->first);
1567 size_t hash2 = ImageLoader::HashCString::hash(it->first);
1568 assert(hash1 == hash2);
1569 }
1570 });
1571 }
1572
1573 // log if requested
1574 if ( gLinkContext.verboseLoading || (sEnv.DYLD_PRINT_LIBRARIES_POST_LAUNCH && (sMainExecutable!=NULL) && sMainExecutable->isLinked()) ) {
1575 const char *imagePath = image->getPath();
1576 uuid_t imageUUID;
1577 if ( image->getUUID(imageUUID) ) {
1578 uuid_string_t imageUUIDStr;
1579 uuid_unparse_upper(imageUUID, imageUUIDStr);
1580 dyld::log("dyld: unloaded: <%s> %s\n", imageUUIDStr, imagePath);
1581 }
1582 else {
1583 dyld::log("dyld: unloaded: %s\n", imagePath);
1584 }
1585 }
1586
1587 // tell gdb, new way
1588 removeImageFromAllImages(image->machHeader());
1589 }
1590
1591
1592 void runImageStaticTerminators(ImageLoader* image)
1593 {
1594 // if in termination list, pull it out and run terminator
1595 bool mightBeMore;
1596 do {
1597 mightBeMore = false;
1598 for (std::vector<ImageLoader*>::iterator it=sImageFilesNeedingTermination.begin(); it != sImageFilesNeedingTermination.end(); it++) {
1599 if ( *it == image ) {
1600 sImageFilesNeedingTermination.erase(it);
1601 if (gLogAPIs) dyld::log("dlclose(), running static terminators for %p %s\n", image, image->getShortName());
1602 image->doTermination(gLinkContext);
1603 mightBeMore = true;
1604 break;
1605 }
1606 }
1607 } while ( mightBeMore );
1608 }
1609
1610 static void terminationRecorder(ImageLoader* image)
1611 {
1612 sImageFilesNeedingTermination.push_back(image);
1613 }
1614
1615 const char* getExecutablePath()
1616 {
1617 return sExecPath;
1618 }
1619
1620 static void runAllStaticTerminators(void* extra)
1621 {
1622 try {
1623 const size_t imageCount = sImageFilesNeedingTermination.size();
1624 for(size_t i=imageCount; i > 0; --i){
1625 ImageLoader* image = sImageFilesNeedingTermination[i-1];
1626 image->doTermination(gLinkContext);
1627 }
1628 sImageFilesNeedingTermination.clear();
1629 notifyBatch(dyld_image_state_terminated, false);
1630 }
1631 catch (const char* msg) {
1632 halt(msg);
1633 }
1634 }
1635
1636 void initializeMainExecutable()
1637 {
1638 // record that we've reached this step
1639 gLinkContext.startedInitializingMainExecutable = true;
1640
1641 // run initialzers for any inserted dylibs
1642 ImageLoader::InitializerTimingList initializerTimes[allImagesCount()];
1643 initializerTimes[0].count = 0;
1644 const size_t rootCount = sImageRoots.size();
1645 if ( rootCount > 1 ) {
1646 for(size_t i=1; i < rootCount; ++i) {
1647 sImageRoots[i]->runInitializers(gLinkContext, initializerTimes[0]);
1648 }
1649 }
1650
1651 // run initializers for main executable and everything it brings up
1652 sMainExecutable->runInitializers(gLinkContext, initializerTimes[0]);
1653
1654 // register cxa_atexit() handler to run static terminators in all loaded images when this process exits
1655 if ( gLibSystemHelpers != NULL )
1656 (*gLibSystemHelpers->cxa_atexit)(&runAllStaticTerminators, NULL, NULL);
1657
1658 // dump info if requested
1659 if ( sEnv.DYLD_PRINT_STATISTICS )
1660 ImageLoader::printStatistics((unsigned int)allImagesCount(), initializerTimes[0]);
1661 if ( sEnv.DYLD_PRINT_STATISTICS_DETAILS )
1662 ImageLoaderMachO::printStatisticsDetails((unsigned int)allImagesCount(), initializerTimes[0]);
1663 }
1664
1665 bool mainExecutablePrebound()
1666 {
1667 return sMainExecutable->usablePrebinding(gLinkContext);
1668 }
1669
1670 ImageLoader* mainExecutable()
1671 {
1672 return sMainExecutable;
1673 }
1674
1675
1676
1677
1678 #if SUPPORT_VERSIONED_PATHS
1679
1680 // forward reference
1681 static bool getDylibVersionAndInstallname(const char* dylibPath, uint32_t* version, char* installName);
1682
1683
1684 //
1685 // Examines a dylib file and if its current_version is newer than the installed
1686 // dylib at its install_name, then add the dylib file to sDylibOverrides.
1687 //
1688 static void checkDylibOverride(const char* dylibFile)
1689 {
1690 //dyld::log("checkDylibOverride('%s')\n", dylibFile);
1691 uint32_t altVersion;
1692 char sysInstallName[PATH_MAX];
1693 if ( getDylibVersionAndInstallname(dylibFile, &altVersion, sysInstallName) && (sysInstallName[0] =='/') ) {
1694 //dyld::log("%s has version 0x%08X and install name %s\n", dylibFile, altVersion, sysInstallName);
1695 uint32_t sysVersion;
1696 if ( getDylibVersionAndInstallname(sysInstallName, &sysVersion, NULL) ) {
1697 //dyld::log("%s has version 0x%08X\n", sysInstallName, sysVersion);
1698 if ( altVersion > sysVersion ) {
1699 //dyld::log("override found: %s -> %s\n", sysInstallName, dylibFile);
1700 // see if there already is an override for this dylib
1701 bool entryExists = false;
1702 for (std::vector<DylibOverride>::iterator it = sDylibOverrides.begin(); it != sDylibOverrides.end(); ++it) {
1703 if ( strcmp(it->installName, sysInstallName) == 0 ) {
1704 entryExists = true;
1705 uint32_t prevVersion;
1706 if ( getDylibVersionAndInstallname(it->override, &prevVersion, NULL) ) {
1707 if ( altVersion > prevVersion ) {
1708 // found an even newer override
1709 free((void*)(it->override));
1710 char resolvedPath[PATH_MAX];
1711 if ( realpath(dylibFile, resolvedPath) != NULL )
1712 it->override = strdup(resolvedPath);
1713 else
1714 it->override = strdup(dylibFile);
1715 break;
1716 }
1717 }
1718 }
1719 }
1720 if ( ! entryExists ) {
1721 DylibOverride entry;
1722 entry.installName = strdup(sysInstallName);
1723 char resolvedPath[PATH_MAX];
1724 if ( realpath(dylibFile, resolvedPath) != NULL )
1725 entry.override = strdup(resolvedPath);
1726 else
1727 entry.override = strdup(dylibFile);
1728 sDylibOverrides.push_back(entry);
1729 //dyld::log("added override: %s -> %s\n", entry.installName, entry.override);
1730 }
1731 }
1732 }
1733 }
1734
1735 }
1736
1737 static void checkDylibOverridesInDir(const char* dirPath)
1738 {
1739 //dyld::log("checkDylibOverridesInDir('%s')\n", dirPath);
1740 char dylibPath[PATH_MAX];
1741 long dirPathLen = strlcpy(dylibPath, dirPath, PATH_MAX-1);
1742 if ( dirPathLen >= PATH_MAX )
1743 return;
1744 DIR* dirp = opendir(dirPath);
1745 if ( dirp != NULL) {
1746 dirent entry;
1747 dirent* entp = NULL;
1748 while ( readdir_r(dirp, &entry, &entp) == 0 ) {
1749 if ( entp == NULL )
1750 break;
1751 if ( entp->d_type != DT_REG )
1752 continue;
1753 dylibPath[dirPathLen] = '/';
1754 dylibPath[dirPathLen+1] = '\0';
1755 if ( strlcat(dylibPath, entp->d_name, PATH_MAX) >= PATH_MAX )
1756 continue;
1757 checkDylibOverride(dylibPath);
1758 }
1759 closedir(dirp);
1760 }
1761 }
1762
1763
1764 static void checkFrameworkOverridesInDir(const char* dirPath)
1765 {
1766 //dyld::log("checkFrameworkOverridesInDir('%s')\n", dirPath);
1767 char frameworkPath[PATH_MAX];
1768 long dirPathLen = strlcpy(frameworkPath, dirPath, PATH_MAX-1);
1769 if ( dirPathLen >= PATH_MAX )
1770 return;
1771 DIR* dirp = opendir(dirPath);
1772 if ( dirp != NULL) {
1773 dirent entry;
1774 dirent* entp = NULL;
1775 while ( readdir_r(dirp, &entry, &entp) == 0 ) {
1776 if ( entp == NULL )
1777 break;
1778 if ( entp->d_type != DT_DIR )
1779 continue;
1780 frameworkPath[dirPathLen] = '/';
1781 frameworkPath[dirPathLen+1] = '\0';
1782 int dirNameLen = (int)strlen(entp->d_name);
1783 if ( dirNameLen < 11 )
1784 continue;
1785 if ( strcmp(&entp->d_name[dirNameLen-10], ".framework") != 0 )
1786 continue;
1787 if ( strlcat(frameworkPath, entp->d_name, PATH_MAX) >= PATH_MAX )
1788 continue;
1789 if ( strlcat(frameworkPath, "/", PATH_MAX) >= PATH_MAX )
1790 continue;
1791 if ( strlcat(frameworkPath, entp->d_name, PATH_MAX) >= PATH_MAX )
1792 continue;
1793 frameworkPath[strlen(frameworkPath)-10] = '\0';
1794 checkDylibOverride(frameworkPath);
1795 }
1796 closedir(dirp);
1797 }
1798 }
1799 #endif // SUPPORT_VERSIONED_PATHS
1800
1801
1802 //
1803 // Turns a colon separated list of strings into a NULL terminated array
1804 // of string pointers. If mainExecutableDir param is not NULL,
1805 // substitutes @loader_path with main executable's dir.
1806 //
1807 static const char** parseColonList(const char* list, const char* mainExecutableDir)
1808 {
1809 static const char* sEmptyList[] = { NULL };
1810
1811 if ( list[0] == '\0' )
1812 return sEmptyList;
1813
1814 int colonCount = 0;
1815 for(const char* s=list; *s != '\0'; ++s) {
1816 if (*s == ':')
1817 ++colonCount;
1818 }
1819
1820 int index = 0;
1821 const char* start = list;
1822 char** result = new char*[colonCount+2];
1823 for(const char* s=list; *s != '\0'; ++s) {
1824 if (*s == ':') {
1825 size_t len = s-start;
1826 if ( (mainExecutableDir != NULL) && (strncmp(start, "@loader_path/", 13) == 0) ) {
1827 if ( !gLinkContext.allowAtPaths ) {
1828 dyld::log("dyld: warning: @loader_path/ ignored because of amfi policy (Codesign main executable with Library Validation to allow @ paths)\n");
1829 continue;
1830 }
1831 size_t mainExecDirLen = strlen(mainExecutableDir);
1832 char* str = new char[mainExecDirLen+len+1];
1833 strcpy(str, mainExecutableDir);
1834 strlcat(str, &start[13], mainExecDirLen+len+1);
1835 str[mainExecDirLen+len-13] = '\0';
1836 start = &s[1];
1837 result[index++] = str;
1838 }
1839 else if ( (mainExecutableDir != NULL) && (strncmp(start, "@executable_path/", 17) == 0) ) {
1840 if ( !gLinkContext.allowAtPaths ) {
1841 dyld::log("dyld: warning: @executable_path/ ignored because of amfi policy (Codesign main executable with Library Validation to allow @ paths)\n");
1842 continue;
1843 }
1844 size_t mainExecDirLen = strlen(mainExecutableDir);
1845 char* str = new char[mainExecDirLen+len+1];
1846 strcpy(str, mainExecutableDir);
1847 strlcat(str, &start[17], mainExecDirLen+len+1);
1848 str[mainExecDirLen+len-17] = '\0';
1849 start = &s[1];
1850 result[index++] = str;
1851 }
1852 else {
1853 char* str = new char[len+1];
1854 strncpy(str, start, len);
1855 str[len] = '\0';
1856 start = &s[1];
1857 result[index++] = str;
1858 }
1859 }
1860 }
1861 size_t len = strlen(start);
1862 if ( (mainExecutableDir != NULL) && (strncmp(start, "@loader_path/", 13) == 0) ) {
1863 if ( !gLinkContext.allowAtPaths ) {
1864 dyld::log("dyld: warning: @loader_path/ ignored because of amfi policy (Codesign main executable with Library Validation to allow @ paths)\n");
1865 }
1866 else
1867 {
1868 size_t mainExecDirLen = strlen(mainExecutableDir);
1869 char* str = new char[mainExecDirLen+len+1];
1870 strcpy(str, mainExecutableDir);
1871 strlcat(str, &start[13], mainExecDirLen+len+1);
1872 str[mainExecDirLen+len-13] = '\0';
1873 result[index++] = str;
1874 }
1875 }
1876 else if ( (mainExecutableDir != NULL) && (strncmp(start, "@executable_path/", 17) == 0) ) {
1877 if ( !gLinkContext.allowAtPaths ) {
1878 dyld::log("dyld: warning: @executable_path/ ignored because of amfi policy (Codesign main executable with Library Validation to allow @ paths)\n");
1879 }
1880 else
1881 {
1882 size_t mainExecDirLen = strlen(mainExecutableDir);
1883 char* str = new char[mainExecDirLen+len+1];
1884 strcpy(str, mainExecutableDir);
1885 strlcat(str, &start[17], mainExecDirLen+len+1);
1886 str[mainExecDirLen+len-17] = '\0';
1887 result[index++] = str;
1888 }
1889 }
1890 else {
1891 char* str = new char[len+1];
1892 strcpy(str, start);
1893 result[index++] = str;
1894 }
1895 result[index] = NULL;
1896
1897 //dyld::log("parseColonList(%s)\n", list);
1898 //for(int i=0; result[i] != NULL; ++i)
1899 // dyld::log(" %s\n", result[i]);
1900 return (const char**)result;
1901 }
1902
1903 static void appendParsedColonList(const char* list, const char* mainExecutableDir, const char* const ** storage)
1904 {
1905 const char** newlist = parseColonList(list, mainExecutableDir);
1906 if ( *storage == NULL ) {
1907 // first time, just set
1908 *storage = newlist;
1909 }
1910 else {
1911 // need to append to existing list
1912 const char* const* existing = *storage;
1913 int count = 0;
1914 for(int i=0; existing[i] != NULL; ++i)
1915 ++count;
1916 for(int i=0; newlist[i] != NULL; ++i)
1917 ++count;
1918 const char** combinedList = new const char*[count+2];
1919 int index = 0;
1920 for(int i=0; existing[i] != NULL; ++i)
1921 combinedList[index++] = existing[i];
1922 for(int i=0; newlist[i] != NULL; ++i)
1923 combinedList[index++] = newlist[i];
1924 combinedList[index] = NULL;
1925 delete[] newlist; // free array, note: strings in newList may be leaked
1926 *storage = combinedList;
1927 }
1928 }
1929
1930 #if TARGET_OS_OSX
1931 static void paths_expand_roots(const char **paths, const char *key, const char *val)
1932 {
1933 // assert(val != NULL);
1934 // assert(paths != NULL);
1935 if(NULL != key) {
1936 size_t keyLen = strlen(key);
1937 for(int i=0; paths[i] != NULL; ++i) {
1938 if ( strncmp(paths[i], key, keyLen) == 0 ) {
1939 char* newPath = new char[strlen(val) + (strlen(paths[i]) - keyLen) + 1];
1940 strcpy(newPath, val);
1941 strcat(newPath, &paths[i][keyLen]);
1942 paths[i] = newPath;
1943 }
1944 }
1945 }
1946 return;
1947 }
1948
1949 static void removePathWithPrefix(const char* paths[], const char* prefix)
1950 {
1951 size_t prefixLen = strlen(prefix);
1952 int skip = 0;
1953 int i;
1954 for(i = 0; paths[i] != NULL; ++i) {
1955 if ( strncmp(paths[i], prefix, prefixLen) == 0 )
1956 ++skip;
1957 else
1958 paths[i-skip] = paths[i];
1959 }
1960 paths[i-skip] = NULL;
1961 }
1962 #endif
1963
1964
1965 #if 0
1966 static void paths_dump(const char **paths)
1967 {
1968 // assert(paths != NULL);
1969 const char **strs = paths;
1970 while(*strs != NULL)
1971 {
1972 dyld::log("\"%s\"\n", *strs);
1973 strs++;
1974 }
1975 return;
1976 }
1977 #endif
1978
1979
1980
1981 static void printOptions(const char* argv[])
1982 {
1983 uint32_t i = 0;
1984 while ( NULL != argv[i] ) {
1985 dyld::log("opt[%i] = \"%s\"\n", i, argv[i]);
1986 i++;
1987 }
1988 }
1989
1990 static void printEnvironmentVariables(const char* envp[])
1991 {
1992 while ( NULL != *envp ) {
1993 dyld::log("%s\n", *envp);
1994 envp++;
1995 }
1996 }
1997
1998 void processDyldEnvironmentVariable(const char* key, const char* value, const char* mainExecutableDir)
1999 {
2000 if ( strcmp(key, "DYLD_FRAMEWORK_PATH") == 0 ) {
2001 appendParsedColonList(value, mainExecutableDir, &sEnv.DYLD_FRAMEWORK_PATH);
2002 sEnv.hasOverride = true;
2003 }
2004 else if ( strcmp(key, "DYLD_FALLBACK_FRAMEWORK_PATH") == 0 ) {
2005 appendParsedColonList(value, mainExecutableDir, &sEnv.DYLD_FALLBACK_FRAMEWORK_PATH);
2006 sEnv.hasOverride = true;
2007 }
2008 else if ( strcmp(key, "DYLD_LIBRARY_PATH") == 0 ) {
2009 appendParsedColonList(value, mainExecutableDir, &sEnv.DYLD_LIBRARY_PATH);
2010 sEnv.hasOverride = true;
2011 }
2012 else if ( strcmp(key, "DYLD_FALLBACK_LIBRARY_PATH") == 0 ) {
2013 appendParsedColonList(value, mainExecutableDir, &sEnv.DYLD_FALLBACK_LIBRARY_PATH);
2014 sEnv.hasOverride = true;
2015 }
2016 #if SUPPORT_ROOT_PATH
2017 else if ( (strcmp(key, "DYLD_ROOT_PATH") == 0) || (strcmp(key, "DYLD_PATHS_ROOT") == 0) ) {
2018 if ( strcmp(value, "/") != 0 ) {
2019 gLinkContext.rootPaths = parseColonList(value, mainExecutableDir);
2020 for (int i=0; gLinkContext.rootPaths[i] != NULL; ++i) {
2021 if ( gLinkContext.rootPaths[i][0] != '/' ) {
2022 dyld::warn("DYLD_ROOT_PATH not used because it contains a non-absolute path\n");
2023 gLinkContext.rootPaths = NULL;
2024 break;
2025 }
2026 }
2027 }
2028 sEnv.hasOverride = true;
2029 }
2030 #endif
2031 else if ( strcmp(key, "DYLD_IMAGE_SUFFIX") == 0 ) {
2032 gLinkContext.imageSuffix = parseColonList(value, NULL);
2033 sEnv.hasOverride = true;
2034 }
2035 else if ( strcmp(key, "DYLD_INSERT_LIBRARIES") == 0 ) {
2036 sEnv.DYLD_INSERT_LIBRARIES = parseColonList(value, NULL);
2037 #if SUPPORT_ACCELERATE_TABLES
2038 sDisableAcceleratorTables = true;
2039 #endif
2040 sEnv.hasOverride = true;
2041 }
2042 else if ( strcmp(key, "DYLD_PRINT_OPTS") == 0 ) {
2043 sEnv.DYLD_PRINT_OPTS = true;
2044 }
2045 else if ( strcmp(key, "DYLD_PRINT_ENV") == 0 ) {
2046 sEnv.DYLD_PRINT_ENV = true;
2047 }
2048 else if ( strcmp(key, "DYLD_DISABLE_DOFS") == 0 ) {
2049 sEnv.DYLD_DISABLE_DOFS = true;
2050 }
2051 else if ( strcmp(key, "DYLD_PRINT_LIBRARIES") == 0 ) {
2052 gLinkContext.verboseLoading = true;
2053 }
2054 else if ( strcmp(key, "DYLD_PRINT_LIBRARIES_POST_LAUNCH") == 0 ) {
2055 sEnv.DYLD_PRINT_LIBRARIES_POST_LAUNCH = true;
2056 }
2057 else if ( strcmp(key, "DYLD_BIND_AT_LAUNCH") == 0 ) {
2058 sEnv.DYLD_BIND_AT_LAUNCH = true;
2059 }
2060 else if ( strcmp(key, "DYLD_FORCE_FLAT_NAMESPACE") == 0 ) {
2061 gLinkContext.bindFlat = true;
2062 }
2063 else if ( strcmp(key, "DYLD_NEW_LOCAL_SHARED_REGIONS") == 0 ) {
2064 // ignore, no longer relevant but some scripts still set it
2065 }
2066 else if ( strcmp(key, "DYLD_NO_FIX_PREBINDING") == 0 ) {
2067 }
2068 else if ( strcmp(key, "DYLD_PREBIND_DEBUG") == 0 ) {
2069 gLinkContext.verbosePrebinding = true;
2070 }
2071 else if ( strcmp(key, "DYLD_PRINT_INITIALIZERS") == 0 ) {
2072 gLinkContext.verboseInit = true;
2073 }
2074 else if ( strcmp(key, "DYLD_PRINT_DOFS") == 0 ) {
2075 gLinkContext.verboseDOF = true;
2076 }
2077 else if ( strcmp(key, "DYLD_PRINT_STATISTICS") == 0 ) {
2078 sEnv.DYLD_PRINT_STATISTICS = true;
2079 #if TARGET_OS_IPHONE && !TARGET_OS_SIMULATOR
2080 // <rdar://problem/26614838> DYLD_PRINT_STATISTICS no longer logs to xcode console for device apps
2081 sForceStderr = true;
2082 #endif
2083 }
2084 else if ( strcmp(key, "DYLD_PRINT_TO_STDERR") == 0 ) {
2085 #if TARGET_OS_IPHONE && !TARGET_OS_SIMULATOR
2086 // <rdar://problem/26633440> DYLD_PRINT_STATISTICS no longer logs to xcode console for device apps
2087 sForceStderr = true;
2088 #endif
2089 }
2090 else if ( strcmp(key, "DYLD_PRINT_STATISTICS_DETAILS") == 0 ) {
2091 sEnv.DYLD_PRINT_STATISTICS_DETAILS = true;
2092 }
2093 else if ( strcmp(key, "DYLD_PRINT_SEGMENTS") == 0 ) {
2094 gLinkContext.verboseMapping = true;
2095 }
2096 else if ( strcmp(key, "DYLD_PRINT_BINDINGS") == 0 ) {
2097 gLinkContext.verboseBind = true;
2098 }
2099 else if ( strcmp(key, "DYLD_PRINT_WEAK_BINDINGS") == 0 ) {
2100 gLinkContext.verboseWeakBind = true;
2101 }
2102 else if ( strcmp(key, "DYLD_PRINT_REBASINGS") == 0 ) {
2103 gLinkContext.verboseRebase = true;
2104 }
2105 else if ( strcmp(key, "DYLD_PRINT_APIS") == 0 ) {
2106 gLogAPIs = true;
2107 }
2108 #if SUPPORT_ACCELERATE_TABLES
2109 else if ( strcmp(key, "DYLD_PRINT_APIS_APP") == 0 ) {
2110 gLogAppAPIs = true;
2111 }
2112 #endif
2113 else if ( strcmp(key, "DYLD_PRINT_WARNINGS") == 0 ) {
2114 gLinkContext.verboseWarnings = true;
2115 }
2116 else if ( strcmp(key, "DYLD_PRINT_RPATHS") == 0 ) {
2117 gLinkContext.verboseRPaths = true;
2118 }
2119 else if ( strcmp(key, "DYLD_PRINT_INTERPOSING") == 0 ) {
2120 gLinkContext.verboseInterposing = true;
2121 }
2122 else if ( strcmp(key, "DYLD_PRINT_CODE_SIGNATURES") == 0 ) {
2123 gLinkContext.verboseCodeSignatures = true;
2124 }
2125 else if ( (strcmp(key, "DYLD_SHARED_REGION") == 0) && gLinkContext.allowEnvVarsSharedCache ) {
2126 if ( strcmp(value, "private") == 0 ) {
2127 gLinkContext.sharedRegionMode = ImageLoader::kUsePrivateSharedRegion;
2128 }
2129 else if ( strcmp(value, "avoid") == 0 ) {
2130 gLinkContext.sharedRegionMode = ImageLoader::kDontUseSharedRegion;
2131 }
2132 else if ( strcmp(value, "use") == 0 ) {
2133 gLinkContext.sharedRegionMode = ImageLoader::kUseSharedRegion;
2134 }
2135 else if ( value[0] == '\0' ) {
2136 gLinkContext.sharedRegionMode = ImageLoader::kUseSharedRegion;
2137 }
2138 else {
2139 dyld::warn("unknown option to DYLD_SHARED_REGION. Valid options are: use, private, avoid\n");
2140 }
2141 }
2142 else if ( (strcmp(key, "DYLD_SHARED_CACHE_DIR") == 0) && gLinkContext.allowEnvVarsSharedCache ) {
2143 sSharedCacheOverrideDir = value;
2144 }
2145 else if ( strcmp(key, "DYLD_USE_CLOSURES") == 0 ) {
2146 // Handled elsewhere
2147 }
2148 else if ( strcmp(key, "DYLD_FORCE_INVALID_CACHE_CLOSURES") == 0 ) {
2149 if ( dyld3::internalInstall() ) {
2150 sForceInvalidSharedCacheClosureFormat = true;
2151 }
2152 }
2153 else if ( strcmp(key, "DYLD_IGNORE_PREBINDING") == 0 ) {
2154 if ( strcmp(value, "all") == 0 ) {
2155 gLinkContext.prebindUsage = ImageLoader::kUseNoPrebinding;
2156 }
2157 else if ( strcmp(value, "app") == 0 ) {
2158 gLinkContext.prebindUsage = ImageLoader::kUseAllButAppPredbinding;
2159 }
2160 else if ( strcmp(value, "nonsplit") == 0 ) {
2161 gLinkContext.prebindUsage = ImageLoader::kUseSplitSegPrebinding;
2162 }
2163 else if ( value[0] == '\0' ) {
2164 gLinkContext.prebindUsage = ImageLoader::kUseSplitSegPrebinding;
2165 }
2166 else {
2167 dyld::warn("unknown option to DYLD_IGNORE_PREBINDING. Valid options are: all, app, nonsplit\n");
2168 }
2169 }
2170 #if SUPPORT_VERSIONED_PATHS
2171 else if ( strcmp(key, "DYLD_VERSIONED_LIBRARY_PATH") == 0 ) {
2172 appendParsedColonList(value, mainExecutableDir, &sEnv.DYLD_VERSIONED_LIBRARY_PATH);
2173 #if SUPPORT_ACCELERATE_TABLES
2174 sDisableAcceleratorTables = true;
2175 #endif
2176 sEnv.hasOverride = true;
2177 }
2178 else if ( strcmp(key, "DYLD_VERSIONED_FRAMEWORK_PATH") == 0 ) {
2179 appendParsedColonList(value, mainExecutableDir, &sEnv.DYLD_VERSIONED_FRAMEWORK_PATH);
2180 #if SUPPORT_ACCELERATE_TABLES
2181 sDisableAcceleratorTables = true;
2182 #endif
2183 sEnv.hasOverride = true;
2184 }
2185 #endif
2186 #if !TARGET_OS_SIMULATOR
2187 else if ( (strcmp(key, "DYLD_PRINT_TO_FILE") == 0) && (mainExecutableDir == NULL) && gLinkContext.allowEnvVarsSharedCache ) {
2188 int fd = dyld3::open(value, O_WRONLY | O_CREAT | O_APPEND, 0644);
2189 if ( fd != -1 ) {
2190 sLogfile = fd;
2191 sLogToFile = true;
2192 }
2193 else {
2194 dyld::log("dyld: could not open DYLD_PRINT_TO_FILE='%s', errno=%d\n", value, errno);
2195 }
2196 }
2197 else if ( (strcmp(key, "DYLD_SKIP_MAIN") == 0)) {
2198 if ( dyld3::internalInstall() )
2199 sSkipMain = true;
2200 }
2201 else if ( (strcmp(key, "DYLD_JUST_BUILD_CLOSURE") == 0) ) {
2202 // handled elsewhere
2203 }
2204 #endif
2205 else if (strcmp(key, "DYLD_FORCE_PLATFORM") == 0) {
2206 // handled elsewhere
2207 }
2208 else if (strcmp(key, "DYLD_AMFI_FAKE") == 0) {
2209 // handled elsewhere
2210 }
2211 else {
2212 dyld::warn("unknown environment variable: %s\n", key);
2213 }
2214 }
2215
2216
2217 #if SUPPORT_LC_DYLD_ENVIRONMENT
2218 static void checkLoadCommandEnvironmentVariables()
2219 {
2220 // <rdar://problem/8440934> Support augmenting dyld environment variables in load commands
2221 const uint32_t cmd_count = sMainExecutableMachHeader->ncmds;
2222 const struct load_command* const cmds = (struct load_command*)(((char*)sMainExecutableMachHeader)+sizeof(macho_header));
2223 const struct load_command* cmd = cmds;
2224 for (uint32_t i = 0; i < cmd_count; ++i) {
2225 switch (cmd->cmd) {
2226 case LC_DYLD_ENVIRONMENT:
2227 {
2228 const struct dylinker_command* envcmd = (struct dylinker_command*)cmd;
2229 const char* keyEqualsValue = (char*)envcmd + envcmd->name.offset;
2230 char mainExecutableDir[strlen(sExecPath)+2];
2231 strcpy(mainExecutableDir, sExecPath);
2232 char* lastSlash = strrchr(mainExecutableDir, '/');
2233 if ( lastSlash != NULL)
2234 lastSlash[1] = '\0';
2235 // only process variables that start with DYLD_ and end in _PATH
2236 if ( (strncmp(keyEqualsValue, "DYLD_", 5) == 0) ) {
2237 const char* equals = strchr(keyEqualsValue, '=');
2238 if ( equals != NULL ) {
2239 if ( strncmp(&equals[-5], "_PATH", 5) == 0 ) {
2240 const char* value = &equals[1];
2241 const size_t keyLen = equals-keyEqualsValue;
2242 // <rdar://problem/22799635> don't let malformed load command overflow stack
2243 if ( keyLen < 40 ) {
2244 char key[keyLen+1];
2245 strncpy(key, keyEqualsValue, keyLen);
2246 key[keyLen] = '\0';
2247 //dyld::log("processing: %s\n", keyEqualsValue);
2248 //dyld::log("mainExecutableDir: %s\n", mainExecutableDir);
2249 #if SUPPORT_ROOT_PATH
2250 if ( (strcmp(key, "DYLD_ROOT_PATH") == 0) || (strcmp(key, "DYLD_PATHS_ROOT") == 0) )
2251 continue;
2252 #endif
2253 processDyldEnvironmentVariable(key, value, mainExecutableDir);
2254 }
2255 }
2256 }
2257 }
2258 }
2259 break;
2260 }
2261 cmd = (const struct load_command*)(((char*)cmd)+cmd->cmdsize);
2262 }
2263 }
2264 #endif // SUPPORT_LC_DYLD_ENVIRONMENT
2265
2266
2267 static bool hasCodeSignatureLoadCommand(const macho_header* mh)
2268 {
2269 const uint32_t cmd_count = mh->ncmds;
2270 const struct load_command* const cmds = (struct load_command*)(((char*)mh)+sizeof(macho_header));
2271 const struct load_command* cmd = cmds;
2272 for (uint32_t i = 0; i < cmd_count; ++i) {
2273 if (cmd->cmd == LC_CODE_SIGNATURE)
2274 return true;
2275 cmd = (const struct load_command*)(((char*)cmd)+cmd->cmdsize);
2276 }
2277 return false;
2278 }
2279
2280
2281 #if SUPPORT_VERSIONED_PATHS
2282 static void checkVersionedPaths()
2283 {
2284 // search DYLD_VERSIONED_LIBRARY_PATH directories for dylibs and check if they are newer
2285 if ( sEnv.DYLD_VERSIONED_LIBRARY_PATH != NULL ) {
2286 for(const char* const* lp = sEnv.DYLD_VERSIONED_LIBRARY_PATH; *lp != NULL; ++lp) {
2287 checkDylibOverridesInDir(*lp);
2288 }
2289 }
2290
2291 // search DYLD_VERSIONED_FRAMEWORK_PATH directories for dylibs and check if they are newer
2292 if ( sEnv.DYLD_VERSIONED_FRAMEWORK_PATH != NULL ) {
2293 for(const char* const* fp = sEnv.DYLD_VERSIONED_FRAMEWORK_PATH; *fp != NULL; ++fp) {
2294 checkFrameworkOverridesInDir(*fp);
2295 }
2296 }
2297 }
2298 #endif
2299
2300
2301 #if TARGET_OS_OSX
2302 //
2303 // For security, setuid programs ignore DYLD_* environment variables.
2304 // Additionally, the DYLD_* enviroment variables are removed
2305 // from the environment, so that any child processes don't see them.
2306 //
2307 static void pruneEnvironmentVariables(const char* envp[], const char*** applep)
2308 {
2309 #if SUPPORT_LC_DYLD_ENVIRONMENT
2310 checkLoadCommandEnvironmentVariables();
2311 #endif
2312
2313 // Are we testing dyld on an internal config?
2314 if ( _simple_getenv(envp, "DYLD_SKIP_MAIN") != NULL ) {
2315 if ( dyld3::internalInstall() )
2316 sSkipMain = true;
2317 }
2318
2319 // delete all DYLD_* and LD_LIBRARY_PATH environment variables
2320 int removedCount = 0;
2321 const char** d = envp;
2322 for(const char** s = envp; *s != NULL; s++) {
2323
2324 if ( (strncmp(*s, "DYLD_", 5) != 0) && (strncmp(*s, "LD_LIBRARY_PATH=", 16) != 0) ) {
2325 *d++ = *s;
2326 }
2327 else {
2328 ++removedCount;
2329 }
2330 }
2331 *d++ = NULL;
2332 // slide apple parameters
2333 if ( removedCount > 0 ) {
2334 *applep = d;
2335 do {
2336 *d = d[removedCount];
2337 } while ( *d++ != NULL );
2338 for(int i=0; i < removedCount; ++i)
2339 *d++ = NULL;
2340 }
2341
2342 // disable framework and library fallback paths for setuid binaries rdar://problem/4589305
2343 sEnv.DYLD_FALLBACK_FRAMEWORK_PATH = NULL;
2344 sEnv.DYLD_FALLBACK_LIBRARY_PATH = NULL;
2345
2346 if ( removedCount > 0 )
2347 strlcat(sLoadingCrashMessage, ", ignoring DYLD_* env vars", sizeof(sLoadingCrashMessage));
2348 }
2349 #endif
2350
2351 static void defaultUninitializedFallbackPaths(const char* envp[])
2352 {
2353 #if TARGET_OS_OSX
2354 if ( !gLinkContext.allowClassicFallbackPaths ) {
2355 sEnv.DYLD_FALLBACK_FRAMEWORK_PATH = sRestrictedFrameworkFallbackPaths;
2356 sEnv.DYLD_FALLBACK_LIBRARY_PATH = sRestrictedLibraryFallbackPaths;
2357 return;
2358 }
2359
2360 // default value for DYLD_FALLBACK_FRAMEWORK_PATH, if not set in environment
2361 const char* home = _simple_getenv(envp, "HOME");;
2362 if ( sEnv.DYLD_FALLBACK_FRAMEWORK_PATH == NULL ) {
2363 const char** fpaths = sFrameworkFallbackPaths;
2364 if ( home == NULL )
2365 removePathWithPrefix(fpaths, "$HOME");
2366 else
2367 paths_expand_roots(fpaths, "$HOME", home);
2368 sEnv.DYLD_FALLBACK_FRAMEWORK_PATH = fpaths;
2369 }
2370
2371 // default value for DYLD_FALLBACK_LIBRARY_PATH, if not set in environment
2372 if ( sEnv.DYLD_FALLBACK_LIBRARY_PATH == NULL ) {
2373 const char** lpaths = sLibraryFallbackPaths;
2374 if ( home == NULL )
2375 removePathWithPrefix(lpaths, "$HOME");
2376 else
2377 paths_expand_roots(lpaths, "$HOME", home);
2378 sEnv.DYLD_FALLBACK_LIBRARY_PATH = lpaths;
2379 }
2380 #else
2381 if ( sEnv.DYLD_FALLBACK_FRAMEWORK_PATH == NULL )
2382 sEnv.DYLD_FALLBACK_FRAMEWORK_PATH = sFrameworkFallbackPaths;
2383
2384 if ( sEnv.DYLD_FALLBACK_LIBRARY_PATH == NULL )
2385 sEnv.DYLD_FALLBACK_LIBRARY_PATH = sLibraryFallbackPaths;
2386 #endif
2387 }
2388
2389
2390 static void checkEnvironmentVariables(const char* envp[])
2391 {
2392 if ( !gLinkContext.allowEnvVarsPath && !gLinkContext.allowEnvVarsPrint )
2393 return;
2394 const char** p;
2395 for(p = envp; *p != NULL; p++) {
2396 const char* keyEqualsValue = *p;
2397 if ( strncmp(keyEqualsValue, "DYLD_", 5) == 0 ) {
2398 const char* equals = strchr(keyEqualsValue, '=');
2399 if ( equals != NULL ) {
2400 strlcat(sLoadingCrashMessage, "\n", sizeof(sLoadingCrashMessage));
2401 strlcat(sLoadingCrashMessage, keyEqualsValue, sizeof(sLoadingCrashMessage));
2402 const char* value = &equals[1];
2403 const size_t keyLen = equals-keyEqualsValue;
2404 char key[keyLen+1];
2405 strncpy(key, keyEqualsValue, keyLen);
2406 key[keyLen] = '\0';
2407 if ( (strncmp(key, "DYLD_PRINT_", 11) == 0) && !gLinkContext.allowEnvVarsPrint )
2408 continue;
2409 processDyldEnvironmentVariable(key, value, NULL);
2410 }
2411 }
2412 else if ( strncmp(keyEqualsValue, "LD_LIBRARY_PATH=", 16) == 0 ) {
2413 const char* path = &keyEqualsValue[16];
2414 sEnv.LD_LIBRARY_PATH = parseColonList(path, NULL);
2415 }
2416 }
2417
2418 #if SUPPORT_LC_DYLD_ENVIRONMENT
2419 checkLoadCommandEnvironmentVariables();
2420 #endif // SUPPORT_LC_DYLD_ENVIRONMENT
2421
2422 #if SUPPORT_ROOT_PATH
2423 // <rdar://problem/11281064> DYLD_IMAGE_SUFFIX and DYLD_ROOT_PATH cannot be used together
2424 if ( (gLinkContext.imageSuffix != NULL && *gLinkContext.imageSuffix != NULL) && (gLinkContext.rootPaths != NULL) ) {
2425 dyld::warn("Ignoring DYLD_IMAGE_SUFFIX because DYLD_ROOT_PATH is used.\n");
2426 gLinkContext.imageSuffix = NULL; // this leaks allocations from parseColonList
2427 }
2428 #endif
2429 }
2430
2431 #if __x86_64__ && !TARGET_OS_SIMULATOR
2432 static bool isGCProgram(const macho_header* mh, uintptr_t slide)
2433 {
2434 const uint32_t cmd_count = mh->ncmds;
2435 const struct load_command* const cmds = (struct load_command*)(((char*)mh)+sizeof(macho_header));
2436 const struct load_command* cmd = cmds;
2437 for (uint32_t i = 0; i < cmd_count; ++i) {
2438 switch (cmd->cmd) {
2439 case LC_SEGMENT_COMMAND:
2440 {
2441 const struct macho_segment_command* seg = (struct macho_segment_command*)cmd;
2442 if (strcmp(seg->segname, "__DATA") == 0) {
2443 const struct macho_section* const sectionsStart = (struct macho_section*)((char*)seg + sizeof(struct macho_segment_command));
2444 const struct macho_section* const sectionsEnd = &sectionsStart[seg->nsects];
2445 for (const struct macho_section* sect=sectionsStart; sect < sectionsEnd; ++sect) {
2446 if (strncmp(sect->sectname, "__objc_imageinfo", 16) == 0) {
2447 const uint32_t* objcInfo = (uint32_t*)(sect->addr + slide);
2448 return (objcInfo[1] & 6); // 6 = (OBJC_IMAGE_SUPPORTS_GC | OBJC_IMAGE_REQUIRES_GC)
2449 }
2450 }
2451 }
2452 }
2453 break;
2454 }
2455 cmd = (const struct load_command*)(((char*)cmd)+cmd->cmdsize);
2456 }
2457 return false;
2458 }
2459 #endif
2460
2461 static void getHostInfo(const macho_header* mainExecutableMH, uintptr_t mainExecutableSlide)
2462 {
2463 #if CPU_SUBTYPES_SUPPORTED
2464 #if __ARM_ARCH_7K__
2465 sHostCPU = CPU_TYPE_ARM;
2466 sHostCPUsubtype = CPU_SUBTYPE_ARM_V7K;
2467 #elif __ARM_ARCH_7A__
2468 sHostCPU = CPU_TYPE_ARM;
2469 sHostCPUsubtype = CPU_SUBTYPE_ARM_V7;
2470 #elif __ARM_ARCH_6K__
2471 sHostCPU = CPU_TYPE_ARM;
2472 sHostCPUsubtype = CPU_SUBTYPE_ARM_V6;
2473 #elif __ARM_ARCH_7F__
2474 sHostCPU = CPU_TYPE_ARM;
2475 sHostCPUsubtype = CPU_SUBTYPE_ARM_V7F;
2476 #elif __ARM_ARCH_7S__
2477 sHostCPU = CPU_TYPE_ARM;
2478 sHostCPUsubtype = CPU_SUBTYPE_ARM_V7S;
2479 #elif __ARM64_ARCH_8_32__
2480 sHostCPU = CPU_TYPE_ARM64_32;
2481 sHostCPUsubtype = CPU_SUBTYPE_ARM64_32_V8;
2482 #elif __arm64e__
2483 sHostCPU = CPU_TYPE_ARM64;
2484 sHostCPUsubtype = CPU_SUBTYPE_ARM64E;
2485 #elif __arm64__
2486 sHostCPU = CPU_TYPE_ARM64;
2487 sHostCPUsubtype = CPU_SUBTYPE_ARM64_V8;
2488 #else
2489 struct host_basic_info info;
2490 mach_msg_type_number_t count = HOST_BASIC_INFO_COUNT;
2491 mach_port_t hostPort = mach_host_self();
2492 kern_return_t result = host_info(hostPort, HOST_BASIC_INFO, (host_info_t)&info, &count);
2493 if ( result != KERN_SUCCESS )
2494 throw "host_info() failed";
2495 sHostCPU = info.cpu_type;
2496 sHostCPUsubtype = info.cpu_subtype;
2497 mach_port_deallocate(mach_task_self(), hostPort);
2498 #if __x86_64__
2499 // host_info returns CPU_TYPE_I386 even for x86_64. Override that here so that
2500 // we don't need to mask the cpu type later.
2501 sHostCPU = CPU_TYPE_X86_64;
2502 #if !TARGET_OS_SIMULATOR
2503 sHaswell = (sHostCPUsubtype == CPU_SUBTYPE_X86_64_H);
2504 // <rdar://problem/18528074> x86_64h: Fall back to the x86_64 slice if an app requires GC.
2505 if ( sHaswell ) {
2506 if ( isGCProgram(mainExecutableMH, mainExecutableSlide) ) {
2507 // When running a GC program on a haswell machine, don't use and 'h slices
2508 sHostCPUsubtype = CPU_SUBTYPE_X86_64_ALL;
2509 sHaswell = false;
2510 gLinkContext.sharedRegionMode = ImageLoader::kDontUseSharedRegion;
2511 }
2512 }
2513 #endif
2514 #endif
2515 #endif
2516 #endif
2517 }
2518
2519 static void checkSharedRegionDisable(const dyld3::MachOLoaded* mainExecutableMH, uintptr_t mainExecutableSlide)
2520 {
2521 #if TARGET_OS_OSX
2522 // if main executable has segments that overlap the shared region,
2523 // then disable using the shared region
2524 if ( mainExecutableMH->intersectsRange(SHARED_REGION_BASE, SHARED_REGION_SIZE) ) {
2525 gLinkContext.sharedRegionMode = ImageLoader::kDontUseSharedRegion;
2526 if ( gLinkContext.verboseMapping )
2527 dyld::warn("disabling shared region because main executable overlaps\n");
2528 }
2529 #if __i386__
2530 if ( !gLinkContext.allowEnvVarsPath ) {
2531 // <rdar://problem/15280847> use private or no shared region for suid processes
2532 gLinkContext.sharedRegionMode = ImageLoader::kUsePrivateSharedRegion;
2533 }
2534 #endif
2535 #endif
2536 #if TARGET_OS_SIMULATOR
2537 gLinkContext.sharedRegionMode = ImageLoader::kUsePrivateSharedRegion;
2538 #endif
2539 // iOS cannot run without shared region
2540 }
2541
2542 bool validImage(const ImageLoader* possibleImage)
2543 {
2544 const size_t imageCount = sAllImages.size();
2545 for(size_t i=0; i < imageCount; ++i) {
2546 if ( possibleImage == sAllImages[i] ) {
2547 return true;
2548 }
2549 }
2550 return false;
2551 }
2552
2553 uint32_t getImageCount()
2554 {
2555 return (uint32_t)sAllImages.size();
2556 }
2557
2558 ImageLoader* getIndexedImage(unsigned int index)
2559 {
2560 if ( index < sAllImages.size() )
2561 return sAllImages[index];
2562 return NULL;
2563 }
2564
2565 ImageLoader* findImageByMachHeader(const struct mach_header* target)
2566 {
2567 return findMappedRange((uintptr_t)target);
2568 }
2569
2570
2571 ImageLoader* findImageContainingAddress(const void* addr)
2572 {
2573 #if SUPPORT_ACCELERATE_TABLES
2574 if ( sAllCacheImagesProxy != NULL ) {
2575 const mach_header* mh;
2576 const char* path;
2577 unsigned index;
2578 if ( sAllCacheImagesProxy->addressInCache(addr, &mh, &path, &index) )
2579 return sAllCacheImagesProxy;
2580 }
2581 #endif
2582 return findMappedRange((uintptr_t)addr);
2583 }
2584
2585
2586 ImageLoader* findImageContainingSymbol(const void* symbol)
2587 {
2588 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
2589 ImageLoader* anImage = *it;
2590 if ( anImage->containsSymbol(symbol) )
2591 return anImage;
2592 }
2593 return NULL;
2594 }
2595
2596
2597
2598 void forEachImageDo( void (*callback)(ImageLoader*, void* userData), void* userData)
2599 {
2600 const size_t imageCount = sAllImages.size();
2601 for(size_t i=0; i < imageCount; ++i) {
2602 ImageLoader* anImage = sAllImages[i];
2603 (*callback)(anImage, userData);
2604 }
2605 }
2606
2607 ImageLoader* findLoadedImage(const struct stat& stat_buf)
2608 {
2609 const size_t imageCount = sAllImages.size();
2610 for(size_t i=0; i < imageCount; ++i){
2611 ImageLoader* anImage = sAllImages[i];
2612 if ( anImage->statMatch(stat_buf) )
2613 return anImage;
2614 }
2615 return NULL;
2616 }
2617
2618 // based on ANSI-C strstr()
2619 static const char* strrstr(const char* str, const char* sub)
2620 {
2621 const size_t sublen = strlen(sub);
2622 for(const char* p = &str[strlen(str)]; p != str; --p) {
2623 if ( strncmp(p, sub, sublen) == 0 )
2624 return p;
2625 }
2626 return NULL;
2627 }
2628
2629
2630 //
2631 // Find framework path
2632 //
2633 // /path/foo.framework/foo => foo.framework/foo
2634 // /path/foo.framework/Versions/A/foo => foo.framework/Versions/A/foo
2635 // /path/foo.framework/Frameworks/bar.framework/bar => bar.framework/bar
2636 // /path/foo.framework/Libraries/bar.dylb => NULL
2637 // /path/foo.framework/bar => NULL
2638 //
2639 // Returns NULL if not a framework path
2640 //
2641 static const char* getFrameworkPartialPath(const char* path)
2642 {
2643 const char* dirDot = strrstr(path, ".framework/");
2644 if ( dirDot != NULL ) {
2645 const char* dirStart = dirDot;
2646 for ( ; dirStart >= path; --dirStart) {
2647 if ( (*dirStart == '/') || (dirStart == path) ) {
2648 const char* frameworkStart = &dirStart[1];
2649 if ( dirStart == path )
2650 --frameworkStart;
2651 size_t len = dirDot - frameworkStart;
2652 char framework[len+1];
2653 strncpy(framework, frameworkStart, len);
2654 framework[len] = '\0';
2655 const char* leaf = strrchr(path, '/');
2656 if ( leaf != NULL ) {
2657 if ( strcmp(framework, &leaf[1]) == 0 ) {
2658 return frameworkStart;
2659 }
2660 if ( gLinkContext.imageSuffix != NULL ) {
2661 // some debug frameworks have install names that end in _debug
2662 if ( strncmp(framework, &leaf[1], len) == 0 ) {
2663 for (const char* const* suffix=gLinkContext.imageSuffix; *suffix != NULL; ++suffix) {
2664 if ( strcmp(*suffix, &leaf[len+1]) == 0 )
2665 return frameworkStart;
2666 }
2667 }
2668 }
2669 }
2670 }
2671 }
2672 }
2673 return NULL;
2674 }
2675
2676
2677 static const char* getLibraryLeafName(const char* path)
2678 {
2679 const char* start = strrchr(path, '/');
2680 if ( start != NULL )
2681 return &start[1];
2682 else
2683 return path;
2684 }
2685
2686
2687 // only for architectures that use cpu-sub-types
2688 #if CPU_SUBTYPES_SUPPORTED
2689
2690 const cpu_subtype_t CPU_SUBTYPE_END_OF_LIST = -1;
2691
2692
2693 //
2694 // A fat file may contain multiple sub-images for the same CPU type.
2695 // In that case, dyld picks which sub-image to use by scanning a table
2696 // of preferred cpu-sub-types for the running cpu.
2697 //
2698 // There is one row in the table for each cpu-sub-type on which dyld might run.
2699 // The first entry in a row is that cpu-sub-type. It is followed by all
2700 // cpu-sub-types that can run on that cpu, if preferred order. Each row ends with
2701 // a "SUBTYPE_ALL" (to denote that images written to run on any cpu-sub-type are usable),
2702 // followed by one or more CPU_SUBTYPE_END_OF_LIST to pad out this row.
2703 //
2704
2705
2706 #if __arm__
2707 //
2708 // ARM sub-type lists
2709 //
2710 const int kARM_RowCount = 8;
2711 static const cpu_subtype_t kARM[kARM_RowCount][9] = {
2712
2713 // armv7f can run: v7f, v7, v6, v5, and v4
2714 { CPU_SUBTYPE_ARM_V7F, CPU_SUBTYPE_ARM_V7, CPU_SUBTYPE_ARM_V6, CPU_SUBTYPE_ARM_V5TEJ, CPU_SUBTYPE_ARM_V4T, CPU_SUBTYPE_ARM_ALL, CPU_SUBTYPE_END_OF_LIST },
2715
2716 // armv7k can run: v7k
2717 { CPU_SUBTYPE_ARM_V7K, CPU_SUBTYPE_END_OF_LIST },
2718
2719 // armv7s can run: v7s, v7, v7f, v7k, v6, v5, and v4
2720 { CPU_SUBTYPE_ARM_V7S, CPU_SUBTYPE_ARM_V7, CPU_SUBTYPE_ARM_V7F, CPU_SUBTYPE_ARM_V6, CPU_SUBTYPE_ARM_V5TEJ, CPU_SUBTYPE_ARM_V4T, CPU_SUBTYPE_ARM_ALL, CPU_SUBTYPE_END_OF_LIST },
2721
2722 // armv7 can run: v7, v6, v5, and v4
2723 { CPU_SUBTYPE_ARM_V7, CPU_SUBTYPE_ARM_V6, CPU_SUBTYPE_ARM_V5TEJ, CPU_SUBTYPE_ARM_V4T, CPU_SUBTYPE_ARM_ALL, CPU_SUBTYPE_END_OF_LIST },
2724
2725 // armv6 can run: v6, v5, and v4
2726 { CPU_SUBTYPE_ARM_V6, CPU_SUBTYPE_ARM_V5TEJ, CPU_SUBTYPE_ARM_V4T, CPU_SUBTYPE_ARM_ALL, CPU_SUBTYPE_END_OF_LIST, CPU_SUBTYPE_END_OF_LIST },
2727
2728 // xscale can run: xscale, v5, and v4
2729 { CPU_SUBTYPE_ARM_XSCALE, CPU_SUBTYPE_ARM_V5TEJ, CPU_SUBTYPE_ARM_V4T, CPU_SUBTYPE_ARM_ALL, CPU_SUBTYPE_END_OF_LIST, CPU_SUBTYPE_END_OF_LIST },
2730
2731 // armv5 can run: v5 and v4
2732 { CPU_SUBTYPE_ARM_V5TEJ, CPU_SUBTYPE_ARM_V4T, CPU_SUBTYPE_ARM_ALL, CPU_SUBTYPE_END_OF_LIST, CPU_SUBTYPE_END_OF_LIST, CPU_SUBTYPE_END_OF_LIST },
2733
2734 // armv4 can run: v4
2735 { CPU_SUBTYPE_ARM_V4T, CPU_SUBTYPE_ARM_ALL, CPU_SUBTYPE_END_OF_LIST, CPU_SUBTYPE_END_OF_LIST, CPU_SUBTYPE_END_OF_LIST, CPU_SUBTYPE_END_OF_LIST },
2736 };
2737 #endif
2738
2739 #if __ARM64_ARCH_8_32__
2740 //
2741 // arm64_32 sub-type lists
2742 //
2743 static const cpu_subtype_t kARM64_32[] = { CPU_SUBTYPE_ARM64_32_V8, CPU_SUBTYPE_END_OF_LIST };
2744 #endif
2745
2746 #if __arm64__ && __LP64__
2747 //
2748 // arm64[e] sub-type handing
2749 //
2750 #if __arm64e__
2751 // arm64e with keys on
2752 static const cpu_subtype_t kARM64e[] = { CPU_SUBTYPE_ARM64E, CPU_SUBTYPE_END_OF_LIST };
2753 // arm64 or arm64e with keys off
2754 static const cpu_subtype_t kARM64eKeysOff[] = { CPU_SUBTYPE_ARM64E, CPU_SUBTYPE_ARM64_V8, CPU_SUBTYPE_ARM64_ALL, CPU_SUBTYPE_END_OF_LIST };
2755 #else
2756 // arm64 main binary
2757 static const cpu_subtype_t kARM64[] = { CPU_SUBTYPE_ARM64_V8, CPU_SUBTYPE_ARM64_ALL, CPU_SUBTYPE_END_OF_LIST };
2758 #endif // __arm64e__
2759 #endif
2760
2761
2762 #if __x86_64__
2763 //
2764 // x86_64 sub-type lists
2765 //
2766 const int kX86_64_RowCount = 2;
2767 static const cpu_subtype_t kX86_64[kX86_64_RowCount][5] = {
2768
2769 // x86_64h can run: x86_64h, x86_64h(lib), x86_64(lib), and x86_64
2770 { CPU_SUBTYPE_X86_64_H, (cpu_subtype_t)(CPU_SUBTYPE_LIB64|CPU_SUBTYPE_X86_64_H), (cpu_subtype_t)(CPU_SUBTYPE_LIB64|CPU_SUBTYPE_X86_64_ALL), CPU_SUBTYPE_X86_64_ALL, CPU_SUBTYPE_END_OF_LIST },
2771
2772 // x86_64 can run: x86_64(lib) and x86_64
2773 { CPU_SUBTYPE_X86_64_ALL, (cpu_subtype_t)(CPU_SUBTYPE_LIB64|CPU_SUBTYPE_X86_64_ALL), CPU_SUBTYPE_END_OF_LIST },
2774
2775 };
2776 #endif
2777
2778
2779 // scan the tables above to find the cpu-sub-type-list for this machine
2780 static const cpu_subtype_t* findCPUSubtypeList(cpu_type_t cpu, cpu_subtype_t subtype)
2781 {
2782 switch (cpu) {
2783 #if __arm__
2784 case CPU_TYPE_ARM:
2785 for (int i=0; i < kARM_RowCount ; ++i) {
2786 if ( kARM[i][0] == subtype )
2787 return kARM[i];
2788 }
2789 break;
2790 #endif
2791 #if __arm64__
2792 #if __LP64__
2793 case CPU_TYPE_ARM64:
2794 #if __arm64e__
2795 return ( sKeysDisabled ? kARM64eKeysOff : kARM64e);
2796 #else
2797 return kARM64;
2798 #endif
2799 break;
2800 #endif
2801
2802 #if !__LP64__
2803 case CPU_TYPE_ARM64_32:
2804 return kARM64_32;
2805 #endif
2806
2807 #endif
2808 #if __x86_64__
2809 case CPU_TYPE_X86_64:
2810 for (int i=0; i < kX86_64_RowCount ; ++i) {
2811 if ( kX86_64[i][0] == subtype )
2812 return kX86_64[i];
2813 }
2814 break;
2815 #endif
2816 }
2817 return NULL;
2818 }
2819
2820
2821 // scan fat table-of-contents for best most preferred subtype
2822 static bool fatFindBestFromOrderedList(cpu_type_t cpu, const cpu_subtype_t list[], const fat_header* fh, int fd, uint64_t* offset, uint64_t* len)
2823 {
2824 const fat_arch* const archs = (fat_arch*)(((char*)fh)+sizeof(fat_header));
2825 for (uint32_t subTypeIndex=0; list[subTypeIndex] != CPU_SUBTYPE_END_OF_LIST; ++subTypeIndex) {
2826 for(uint32_t fatIndex=0; fatIndex < OSSwapBigToHostInt32(fh->nfat_arch); ++fatIndex) {
2827 cpu_type_t sliceCpuType = OSSwapBigToHostInt32(archs[fatIndex].cputype);
2828 cpu_subtype_t sliceCpuSubType = OSSwapBigToHostInt32(archs[fatIndex].cpusubtype) & ~CPU_SUBTYPE_MASK;
2829 uint64_t sliceOffset = OSSwapBigToHostInt32(archs[fatIndex].offset);
2830 uint64_t sliceLen = OSSwapBigToHostInt32(archs[fatIndex].size);
2831 if ( (sliceCpuType == cpu) && ((list[subTypeIndex] & ~CPU_SUBTYPE_MASK) == sliceCpuSubType) ) {
2832 #if TARGET_OS_OSX && __has_feature(ptrauth_calls)
2833 if ( sOnlyPlatformArm64e && (sliceCpuType == CPU_TYPE_ARM64) && (sliceCpuSubType == CPU_SUBTYPE_ARM64E) ) {
2834 // if we can only load arm64e slices that are platform binaries, skip over slices that are not
2835 if ( !dyld3::MachOAnalyzer::sliceIsOSBinary(fd, sliceOffset, sliceLen) )
2836 continue;
2837 }
2838 #endif
2839 *offset = sliceOffset;
2840 *len = sliceLen;
2841 return true;
2842 }
2843 }
2844 }
2845 return false;
2846 }
2847
2848 #if !TARGET_OS_OSX || !__has_feature(ptrauth_calls)
2849 // scan fat table-of-contents for exact match of cpu and cpu-sub-type
2850 static bool fatFindExactMatch(cpu_type_t cpu, cpu_subtype_t subtype, const fat_header* fh, uint64_t* offset, uint64_t* len)
2851 {
2852 const fat_arch* archs = (fat_arch*)(((char*)fh)+sizeof(fat_header));
2853 for(uint32_t i=0; i < OSSwapBigToHostInt32(fh->nfat_arch); ++i) {
2854 if ( ((cpu_type_t)OSSwapBigToHostInt32(archs[i].cputype) == cpu)
2855 && ((cpu_subtype_t)OSSwapBigToHostInt32(archs[i].cpusubtype) == subtype) ) {
2856 *offset = OSSwapBigToHostInt32(archs[i].offset);
2857 *len = OSSwapBigToHostInt32(archs[i].size);
2858 return true;
2859 }
2860 }
2861 return false;
2862 }
2863 #endif
2864
2865 // scan fat table-of-contents for image with matching cpu-type and runs-on-all-sub-types
2866 static bool fatFindRunsOnAllCPUs(cpu_type_t cpu, const fat_header* fh, uint64_t* offset, uint64_t* len)
2867 {
2868 const fat_arch* archs = (fat_arch*)(((char*)fh)+sizeof(fat_header));
2869 for(uint32_t i=0; i < OSSwapBigToHostInt32(fh->nfat_arch); ++i) {
2870 if ( (cpu_type_t)OSSwapBigToHostInt32(archs[i].cputype) == cpu) {
2871 switch (cpu) {
2872 #if __arm__
2873 case CPU_TYPE_ARM:
2874 if ( (cpu_subtype_t)OSSwapBigToHostInt32(archs[i].cpusubtype) == CPU_SUBTYPE_ARM_ALL ) {
2875 *offset = OSSwapBigToHostInt32(archs[i].offset);
2876 *len = OSSwapBigToHostInt32(archs[i].size);
2877 return true;
2878 }
2879 break;
2880 #endif
2881 #if __arm64__
2882 case CPU_TYPE_ARM64:
2883 if ( (cpu_subtype_t)OSSwapBigToHostInt32(archs[i].cpusubtype) == CPU_SUBTYPE_ARM64_ALL ) {
2884 *offset = OSSwapBigToHostInt32(archs[i].offset);
2885 *len = OSSwapBigToHostInt32(archs[i].size);
2886 return true;
2887 }
2888 break;
2889 #endif
2890 #if __x86_64__
2891 case CPU_TYPE_X86_64:
2892 if ( (cpu_subtype_t)OSSwapBigToHostInt32(archs[i].cpusubtype) == CPU_SUBTYPE_X86_64_ALL ) {
2893 *offset = OSSwapBigToHostInt32(archs[i].offset);
2894 *len = OSSwapBigToHostInt32(archs[i].size);
2895 return true;
2896 }
2897 break;
2898 #endif
2899 }
2900 }
2901 }
2902 return false;
2903 }
2904
2905 #endif // CPU_SUBTYPES_SUPPORTED
2906
2907
2908 //
2909 // Validate the fat_header and fat_arch array:
2910 //
2911 // 1) arch count would not cause array to extend past 4096 byte read buffer
2912 // 2) no slice overlaps the fat_header and arch array
2913 // 3) arch list does not contain duplicate cputype/cpusubtype tuples
2914 // 4) arch list does not have two overlapping slices.
2915 //
2916 static bool fatValidate(const fat_header* fh)
2917 {
2918 if ( fh->magic != OSSwapBigToHostInt32(FAT_MAGIC) )
2919 return false;
2920
2921 // since only first 4096 bytes of file read, we can only handle up to 204 slices.
2922 const uint32_t sliceCount = OSSwapBigToHostInt32(fh->nfat_arch);
2923 if ( sliceCount > 204 )
2924 return false;
2925
2926 // compare all slices looking for conflicts
2927 const fat_arch* archs = (fat_arch*)(((char*)fh)+sizeof(fat_header));
2928 for (uint32_t i=0; i < sliceCount; ++i) {
2929 uint32_t i_offset = OSSwapBigToHostInt32(archs[i].offset);
2930 uint32_t i_size = OSSwapBigToHostInt32(archs[i].size);
2931 uint32_t i_cputype = OSSwapBigToHostInt32(archs[i].cputype);
2932 uint32_t i_cpusubtype = OSSwapBigToHostInt32(archs[i].cpusubtype);
2933 uint32_t i_end = i_offset + i_size;
2934 // slice cannot overlap with header
2935 if ( i_offset < 4096 )
2936 return false;
2937 // slice size cannot overflow
2938 if ( i_end < i_offset )
2939 return false;
2940 for (uint32_t j=i+1; j < sliceCount; ++j) {
2941 uint32_t j_offset = OSSwapBigToHostInt32(archs[j].offset);
2942 uint32_t j_size = OSSwapBigToHostInt32(archs[j].size);
2943 uint32_t j_cputype = OSSwapBigToHostInt32(archs[j].cputype);
2944 uint32_t j_cpusubtype = OSSwapBigToHostInt32(archs[j].cpusubtype);
2945 uint32_t j_end = j_offset + j_size;
2946 // duplicate slices types not allowed
2947 if ( (i_cputype == j_cputype) && (i_cpusubtype == j_cpusubtype) )
2948 return false;
2949 // slice size cannot overflow
2950 if ( j_end < j_offset )
2951 return false;
2952 // check for overlap of slices
2953 if ( i_offset <= j_offset ) {
2954 if ( j_offset < i_end )
2955 return false; // j overlaps end of i
2956 }
2957 else {
2958 // j overlaps end of i
2959 if ( i_offset < j_end )
2960 return false; // i overlaps end of j
2961 }
2962 }
2963 }
2964 return true;
2965 }
2966
2967 //
2968 // A fat file may contain multiple sub-images for the same cpu-type,
2969 // each optimized for a different cpu-sub-type (e.g G3 or G5).
2970 // This routine picks the optimal sub-image.
2971 //
2972 static bool fatFindBest(const fat_header* fh, uint64_t* offset, uint64_t* len, int fd=-1)
2973 {
2974 if ( !fatValidate(fh) )
2975 return false;
2976
2977 #if CPU_SUBTYPES_SUPPORTED
2978 // assume all dylibs loaded must have same cpu type as main executable
2979 const cpu_type_t cpu = sMainExecutableMachHeader->cputype;
2980
2981 // We only know the subtype to use if the main executable cpu type matches the host
2982 if ( cpu == sHostCPU ) {
2983 // get preference ordered list of subtypes
2984 const cpu_subtype_t* subTypePreferenceList = findCPUSubtypeList(cpu, sHostCPUsubtype);
2985
2986 // use ordered list to find best sub-image in fat file
2987 if ( subTypePreferenceList != NULL ) {
2988 if ( fatFindBestFromOrderedList(cpu, subTypePreferenceList, fh, fd, offset, len) )
2989 return true;
2990 }
2991 #if TARGET_OS_OSX && __has_feature(ptrauth_calls)
2992 // don't use fallbacks for macOS arm64e to ensure only compatible binaries are loaded
2993 return false;
2994 #else
2995 // if running cpu is not in list, try for an exact match
2996 if ( fatFindExactMatch(cpu, sHostCPUsubtype, fh, offset, len) )
2997 return true;
2998 #endif
2999 }
3000
3001 // running on an uknown cpu, can only load generic code
3002 return fatFindRunsOnAllCPUs(cpu, fh, offset, len);
3003 #else
3004 // just find first slice with matching architecture
3005 const fat_arch* archs = (fat_arch*)(((char*)fh)+sizeof(fat_header));
3006 for(uint32_t i=0; i < OSSwapBigToHostInt32(fh->nfat_arch); ++i) {
3007 if ( (cpu_type_t)OSSwapBigToHostInt32(archs[i].cputype) == sMainExecutableMachHeader->cputype) {
3008 *offset = OSSwapBigToHostInt32(archs[i].offset);
3009 *len = OSSwapBigToHostInt32(archs[i].size);
3010 return true;
3011 }
3012 }
3013 return false;
3014 #endif
3015 }
3016
3017 #if defined(__x86_64__) && !TARGET_OS_SIMULATOR
3018 #ifndef kIsTranslated
3019 #define kIsTranslated 0x4000000000000000ULL
3020 #endif
3021 bool isTranslated()
3022 {
3023 return ((*(uint64_t*)_COMM_PAGE_CPU_CAPABILITIES64) & kIsTranslated);
3024 }
3025 #endif
3026
3027
3028 //
3029 // This is used to validate if a non-fat (aka thin or raw) mach-o file can be used
3030 // on the current processor. //
3031 bool isCompatibleMachO(const uint8_t* firstPage, const char* path, int fd=-1, uint64_t sliceOffset=0, uint64_t sliceLen=-1)
3032 {
3033 #if CPU_SUBTYPES_SUPPORTED
3034 // It is deemed compatible if any of the following are true:
3035 // 1) mach_header subtype is in list of compatible subtypes for running processor
3036 // 2) mach_header subtype is same as running processor subtype
3037 // 3) mach_header subtype runs on all processor variants
3038 const mach_header* mh = (mach_header*)firstPage;
3039 if ( mh->magic == sMainExecutableMachHeader->magic ) {
3040 if ( mh->cputype == sMainExecutableMachHeader->cputype ) {
3041 if ( mh->cputype == sHostCPU ) {
3042 const cpu_subtype_t mhCPUSubtype = mh->cpusubtype & ~CPU_SUBTYPE_MASK;
3043 // get preference ordered list of subtypes that this machine can use
3044 const cpu_subtype_t* subTypePreferenceList = findCPUSubtypeList(mh->cputype, sHostCPUsubtype);
3045 if ( subTypePreferenceList != NULL ) {
3046 // if image's subtype is in the list, it is compatible
3047 for (const cpu_subtype_t* p = subTypePreferenceList; *p != CPU_SUBTYPE_END_OF_LIST; ++p) {
3048 if ( *p == mhCPUSubtype ) {
3049 #if TARGET_OS_OSX && __has_feature(ptrauth_calls)
3050 if ( mhCPUSubtype == CPU_SUBTYPE_ARM64E ) {
3051 if ( !sOnlyPlatformArm64e || dyld3::MachOAnalyzer::sliceIsOSBinary(fd, sliceOffset, sliceLen) )
3052 return true;
3053 }
3054 else
3055 #endif
3056 return true;
3057 }
3058 }
3059 // have list and not in list, so not compatible
3060 throwf("incompatible cpu-subtype: 0x%08X in %s", mhCPUSubtype, path);
3061 }
3062 // unknown cpu sub-type, but if exact match for current subtype then ok to use
3063 if ( mhCPUSubtype == sHostCPUsubtype )
3064 return true;
3065 }
3066
3067 // cpu type has no ordered list of subtypes
3068 switch (mh->cputype) {
3069 case CPU_TYPE_I386:
3070 case CPU_TYPE_X86_64:
3071 // subtypes are not used or these architectures
3072 return true;
3073 }
3074 }
3075 }
3076 #else
3077 // For architectures that don't support cpu-sub-types
3078 // this just check the cpu type.
3079 const mach_header* mh = (mach_header*)firstPage;
3080 if ( mh->magic == sMainExecutableMachHeader->magic ) {
3081 if ( mh->cputype == sMainExecutableMachHeader->cputype ) {
3082 return true;
3083 }
3084 }
3085 #endif
3086 return false;
3087 }
3088
3089
3090
3091
3092 // The kernel maps in main executable before dyld gets control. We need to
3093 // make an ImageLoader* for the already mapped in main executable.
3094 static ImageLoaderMachO* instantiateFromLoadedImage(const macho_header* mh, uintptr_t slide, const char* path)
3095 {
3096 // try mach-o loader
3097 // if ( isCompatibleMachO((const uint8_t*)mh, path) ) {
3098 ImageLoader* image = ImageLoaderMachO::instantiateMainExecutable(mh, slide, path, gLinkContext);
3099 addImage(image);
3100 return (ImageLoaderMachO*)image;
3101 // }
3102
3103 // throw "main executable not a known format";
3104 }
3105
3106 #if SUPPORT_ACCELERATE_TABLES
3107 static bool dylibsCanOverrideCache()
3108 {
3109 if ( !dyld3::internalInstall() )
3110 return false;
3111 return ( (sSharedCacheLoadInfo.loadAddress != nullptr) && (sSharedCacheLoadInfo.loadAddress->header.cacheType == kDyldSharedCacheTypeDevelopment) );
3112 }
3113 #endif
3114
3115 const void* imMemorySharedCacheHeader()
3116 {
3117 return sSharedCacheLoadInfo.loadAddress;
3118 }
3119
3120
3121 const char* getStandardSharedCacheFilePath()
3122 {
3123 if ( sSharedCacheLoadInfo.loadAddress != nullptr )
3124 return sSharedCacheLoadInfo.path;
3125 else
3126 return nullptr;
3127 }
3128
3129 bool hasInsertedOrInterposingLibraries() {
3130 return (sInsertedDylibCount > 0) || ImageLoader::haveInterposingTuples();
3131 }
3132
3133
3134 #if SUPPORT_VERSIONED_PATHS
3135 static bool findInSharedCacheImage(const char* path, bool searchByPath, const struct stat* stat_buf, const macho_header** mh, const char** pathInCache, long* slide)
3136 {
3137 dyld3::SharedCacheFindDylibResults results;
3138 if ( dyld3::findInSharedCacheImage(sSharedCacheLoadInfo, path, &results) ) {
3139 *mh = (macho_header*)results.mhInCache;
3140 *pathInCache = results.pathInCache;
3141 *slide = results.slideInCache;
3142 return true;
3143 }
3144 return false;
3145 }
3146 #endif
3147
3148 bool inSharedCache(const char* path)
3149 {
3150 return dyld3::pathIsInSharedCacheImage(sSharedCacheLoadInfo, path);
3151 }
3152
3153
3154 static ImageLoader* checkandAddImage(ImageLoader* image, const LoadContext& context)
3155 {
3156 // now sanity check that this loaded image does not have the same install path as any existing image
3157 const char* loadedImageInstallPath = image->getInstallPath();
3158 if ( image->isDylib() && (loadedImageInstallPath != NULL) && (loadedImageInstallPath[0] == '/') ) {
3159 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
3160 ImageLoader* anImage = *it;
3161 const char* installPath = anImage->getInstallPath();
3162 if ( installPath != NULL) {
3163 if ( strcmp(loadedImageInstallPath, installPath) == 0 ) {
3164 //dyld::log("duplicate(%s) => %p\n", installPath, anImage);
3165 removeImage(image);
3166 ImageLoader::deleteImage(image);
3167 return anImage;
3168 }
3169 }
3170 }
3171 }
3172
3173 // some API's restrict what they can load
3174 if ( context.mustBeBundle && !image->isBundle() )
3175 throw "not a bundle";
3176 if ( context.mustBeDylib && !image->isDylib() )
3177 throw "not a dylib";
3178
3179 // regular main executables cannot be loaded
3180 if ( image->isExecutable() ) {
3181 if ( !context.canBePIE || !image->isPositionIndependentExecutable() )
3182 throw "can't load a main executable";
3183 }
3184
3185 // don't add bundles to global list, they can be loaded but not linked. When linked it will be added to list
3186 if ( ! image->isBundle() )
3187 addImage(image);
3188
3189 return image;
3190 }
3191
3192 #if TARGET_OS_SIMULATOR
3193 static bool isSimulatorBinary(const uint8_t* firstPages, const char* path)
3194 {
3195 const macho_header* mh = (macho_header*)firstPages;
3196 const uint32_t cmd_count = mh->ncmds;
3197 const load_command* const cmds = (struct load_command*)(((char*)mh)+sizeof(macho_header));
3198 const load_command* const cmdsEnd = (load_command*)((char*)cmds + mh->sizeofcmds);
3199 const struct load_command* cmd = cmds;
3200 for (uint32_t i = 0; i < cmd_count; ++i) {
3201 switch (cmd->cmd) {
3202 #if TARGET_OS_WATCH
3203 case LC_VERSION_MIN_WATCHOS:
3204 return true;
3205 #elif TARGET_OS_TV
3206 case LC_VERSION_MIN_TVOS:
3207 return true;
3208 #elif TARGET_OS_IOS
3209 case LC_VERSION_MIN_IPHONEOS:
3210 return true;
3211 #endif
3212 case LC_VERSION_MIN_MACOSX:
3213 // grandfather in a few libSystem dylibs
3214 if ((strcmp(path, "/usr/lib/system/libsystem_kernel.dylib") == 0) ||
3215 (strcmp(path, "/usr/lib/system/libsystem_platform.dylib") == 0) ||
3216 (strcmp(path, "/usr/lib/system/libsystem_pthread.dylib") == 0) ||
3217 (strcmp(path, "/usr/lib/system/libsystem_platform_debug.dylib") == 0) ||
3218 (strcmp(path, "/usr/lib/system/libsystem_pthread_debug.dylib") == 0) ||
3219 (strcmp(path, "/sbin/launchd_sim_trampoline") == 0) ||
3220 (strcmp(path, "/usr/sbin/iokitsimd") == 0) ||
3221 (strcmp(path, "/usr/lib/system/host/liblaunch_sim.dylib") == 0))
3222 return true;
3223 return false;
3224 case LC_BUILD_VERSION:
3225 {
3226 // Same logic as above, but for LC_BUILD_VERSION instead of legacy load commands
3227 const struct build_version_command* buildVersionCmd = (build_version_command*)cmd;
3228 switch(buildVersionCmd->platform) {
3229 case PLATFORM_IOSSIMULATOR:
3230 case PLATFORM_TVOSSIMULATOR:
3231 case PLATFORM_WATCHOSSIMULATOR:
3232 case PLATFORM_WATCHOS:
3233 return true;
3234 case PLATFORM_MACOS:
3235 if ((strcmp(path, "/usr/lib/system/libsystem_kernel.dylib") == 0) ||
3236 (strcmp(path, "/usr/lib/system/libsystem_platform.dylib") == 0) ||
3237 (strcmp(path, "/usr/lib/system/libsystem_pthread.dylib") == 0) ||
3238 (strcmp(path, "/usr/lib/system/libsystem_platform_debug.dylib") == 0) ||
3239 (strcmp(path, "/usr/lib/system/libsystem_pthread_debug.dylib") == 0) ||
3240 (strcmp(path, "/sbin/launchd_sim_trampoline") == 0) ||
3241 (strcmp(path, "/usr/sbin/iokitsimd") == 0) ||
3242 (strcmp(path, "/usr/lib/system/host/liblaunch_sim.dylib") == 0))
3243 return true;
3244 }
3245 }
3246 }
3247 cmd = (const struct load_command*)(((char*)cmd)+cmd->cmdsize);
3248 if ( cmd > cmdsEnd )
3249 return false;
3250 }
3251 return false;
3252 }
3253 #endif
3254
3255
3256 // map in file and instantiate an ImageLoader
3257 static ImageLoader* loadPhase6(int fd, const struct stat& stat_buf, const char* path, const LoadContext& context)
3258 {
3259 //dyld::log("%s(%s)\n", __func__ , path);
3260 uint64_t fileOffset = 0;
3261 uint64_t fileLength = stat_buf.st_size;
3262
3263 // validate it is a file (not directory)
3264 if ( (stat_buf.st_mode & S_IFMT) != S_IFREG )
3265 throw "not a file";
3266
3267 uint8_t firstPages[MAX_MACH_O_HEADER_AND_LOAD_COMMANDS_SIZE];
3268 bool shortPage = false;
3269
3270 // min mach-o file is 4K
3271 if ( fileLength < 4096 ) {
3272 if ( pread(fd, firstPages, (size_t)fileLength, 0) != (ssize_t)fileLength )
3273 throwf("pread of short file failed: %d", errno);
3274 shortPage = true;
3275 }
3276 else {
3277 // optimistically read only first 4KB
3278 if ( pread(fd, firstPages, 4096, 0) != 4096 )
3279 throwf("pread of first 4K failed: %d", errno);
3280 }
3281
3282 // if fat wrapper, find usable sub-file
3283 const fat_header* fileStartAsFat = (fat_header*)firstPages;
3284 if ( fileStartAsFat->magic == OSSwapBigToHostInt32(FAT_MAGIC) ) {
3285 if ( OSSwapBigToHostInt32(fileStartAsFat->nfat_arch) > ((4096 - sizeof(fat_header)) / sizeof(fat_arch)) )
3286 throwf("fat header too large: %u entries", OSSwapBigToHostInt32(fileStartAsFat->nfat_arch));
3287 if ( fatFindBest(fileStartAsFat, &fileOffset, &fileLength, fd) ) {
3288 if ( (fileOffset+fileLength) > (uint64_t)(stat_buf.st_size) )
3289 throwf("truncated fat file. file length=%llu, but needed slice goes to %llu", stat_buf.st_size, fileOffset+fileLength);
3290 if (pread(fd, firstPages, 4096, fileOffset) != 4096)
3291 throwf("pread of fat file failed: %d", errno);
3292 }
3293 else {
3294 throw "no matching architecture in universal wrapper";
3295 }
3296 }
3297
3298 // try mach-o loader
3299 if ( shortPage )
3300 throw "file too short";
3301
3302 if ( isCompatibleMachO(firstPages, path, fd, fileOffset, fileLength) ) {
3303
3304 // only MH_BUNDLE, MH_DYLIB, and some MH_EXECUTE can be dynamically loaded
3305 const mach_header* mh = (mach_header*)firstPages;
3306 switch ( mh->filetype ) {
3307 case MH_EXECUTE:
3308 case MH_DYLIB:
3309 case MH_BUNDLE:
3310 break;
3311 default:
3312 throw "mach-o, but wrong filetype";
3313 }
3314
3315 uint32_t headerAndLoadCommandsSize = sizeof(macho_header) + mh->sizeofcmds;
3316 if ( headerAndLoadCommandsSize > fileLength )
3317 dyld::throwf("malformed mach-o: load commands size (%u) > mach-o file size (%llu)", headerAndLoadCommandsSize, fileLength);
3318
3319 vm_address_t vmAllocatedFirstPages = 0;
3320 if ( headerAndLoadCommandsSize > MAX_MACH_O_HEADER_AND_LOAD_COMMANDS_SIZE ) {
3321 if ( ::vm_allocate(mach_task_self(), &vmAllocatedFirstPages, headerAndLoadCommandsSize, VM_FLAGS_ANYWHERE) == 0 ) {
3322 if ( ::pread(fd, (void*)vmAllocatedFirstPages, headerAndLoadCommandsSize, fileOffset) != headerAndLoadCommandsSize )
3323 throwf("pread of all load commands failed: %d", errno);
3324 mh = (mach_header*)vmAllocatedFirstPages;
3325 }
3326 else {
3327 throwf("malformed mach-o: load commands size (%u) > %u", headerAndLoadCommandsSize, MAX_MACH_O_HEADER_AND_LOAD_COMMANDS_SIZE);
3328 }
3329 }
3330 else if ( headerAndLoadCommandsSize > 4096 ) {
3331 // read more pages
3332 unsigned readAmount = headerAndLoadCommandsSize - 4096;
3333 if ( pread(fd, &firstPages[4096], readAmount, fileOffset+4096) != readAmount )
3334 throwf("pread of extra load commands past 4KB failed: %d", errno);
3335 }
3336
3337 if ( !((dyld3::MachOFile*)mh)->loadableIntoProcess((dyld3::Platform)gProcessInfo->platform, path) ) {
3338 throwf("mach-o, but not built for platform %s", dyld3::MachOFile::platformName((dyld3::Platform)gProcessInfo->platform));
3339 }
3340
3341 #if __has_feature(ptrauth_calls)
3342 if ( !sKeysDisabled && ((sMainExecutableMachHeader->cpusubtype & ~CPU_SUBTYPE_MASK) == CPU_SUBTYPE_ARM64E) && ((mh->cpusubtype & ~CPU_SUBTYPE_MASK) != CPU_SUBTYPE_ARM64E) )
3343 throw "arm64 dylibs cannot be loaded into arm64e processes";
3344 #endif
3345 ImageLoader* image = nullptr;
3346 {
3347 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_MAP_IMAGE, path, 0, 0);
3348 image = ImageLoaderMachO::instantiateFromFile(path, fd, (uint8_t*)mh, headerAndLoadCommandsSize, fileOffset, fileLength, stat_buf, gLinkContext);
3349 timer.setData4((uint64_t)image->machHeader());
3350 }
3351
3352 if ( vmAllocatedFirstPages != 0 )
3353 ::vm_deallocate(mach_task_self(), (vm_address_t)vmAllocatedFirstPages, headerAndLoadCommandsSize);
3354
3355 // validate
3356 return checkandAddImage(image, context);
3357 }
3358
3359 // try other file formats here...
3360
3361
3362 // throw error about what was found
3363 switch (*(uint32_t*)firstPages) {
3364 case MH_MAGIC:
3365 case MH_CIGAM:
3366 case MH_MAGIC_64:
3367 case MH_CIGAM_64:
3368 throw "mach-o, but wrong architecture";
3369 default:
3370 throwf("unknown file type, first eight bytes: 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X",
3371 firstPages[0], firstPages[1], firstPages[2], firstPages[3], firstPages[4], firstPages[5], firstPages[6],firstPages[7]);
3372 }
3373 }
3374
3375
3376 static ImageLoader* loadPhase5open(const char* path, const LoadContext& context, const struct stat& stat_buf, std::vector<const char*>* exceptions)
3377 {
3378 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
3379
3380 // open file (automagically closed when this function exits)
3381 FileOpener file(path);
3382
3383 // just return NULL if file not found, but record any other errors
3384 if ( file.getFileDescriptor() == -1 ) {
3385 int err = errno;
3386 if ( err != ENOENT ) {
3387 const char* newMsg;
3388 if ( (err == EPERM) && sandboxBlockedOpen(path) )
3389 newMsg = dyld::mkstringf("file system sandbox blocked open() of '%s'", path);
3390 else
3391 newMsg = dyld::mkstringf("%s: open() failed with errno=%d", path, err);
3392 exceptions->push_back(newMsg);
3393 }
3394 return NULL;
3395 }
3396
3397 try {
3398 return loadPhase6(file.getFileDescriptor(), stat_buf, path, context);
3399 }
3400 catch (const char* msg) {
3401 const char* newMsg = dyld::mkstringf("%s: %s", path, msg);
3402 exceptions->push_back(newMsg);
3403 free((void*)msg);
3404 return NULL;
3405 }
3406 }
3407
3408 static bool isFileRelativePath(const char* path)
3409 {
3410 if ( path[0] == '/' )
3411 return false;
3412 if ( path[0] != '.' )
3413 return true;
3414 if ( path[1] == '/' )
3415 return true;
3416 if ( (path[1] == '.') && (path[2] == '/') )
3417 return true;
3418 return false;
3419 }
3420
3421 static ImageLoader* loadPhase5check(const char* path, const char* orgPath, const LoadContext& context);
3422
3423
3424 // try to open file
3425 static ImageLoader* loadPhase5load(const char* path, const char* orgPath, const LoadContext& context, unsigned& cacheIndex, std::vector<const char*>* exceptions)
3426 {
3427 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
3428
3429 // <rdar://problem/47682983> don't allow file system relative paths in hardened programs
3430 if ( (exceptions != NULL) && !gLinkContext.allowEnvVarsPath && isFileRelativePath(path) ) {
3431 exceptions->push_back("file system relative paths not allowed in hardened programs");
3432 return NULL;
3433 }
3434
3435 #if SUPPORT_ACCELERATE_TABLES
3436 if ( sAllCacheImagesProxy != NULL ) {
3437 if ( sAllCacheImagesProxy->hasDylib(path, &cacheIndex) )
3438 return sAllCacheImagesProxy;
3439 }
3440 #endif
3441 uint statErrNo;
3442 struct stat statBuf;
3443 bool didStat = false;
3444 bool existsOnDisk;
3445 __block dyld3::SharedCacheFindDylibResults shareCacheResults;
3446 shareCacheResults.image = nullptr;
3447
3448 #if TARGET_OS_SIMULATOR
3449
3450 auto findSharedCacheImage = ^() {
3451 // in simulators, 'path' has DYLD_ROOT_PATH prepended, but cache index does not have the prefix, so use orgPath
3452 return dyld3::findInSharedCacheImage(sSharedCacheLoadInfo, orgPath, &shareCacheResults);
3453 };
3454
3455 #else
3456
3457 auto findSharedCacheImage = ^() {
3458 return dyld3::findInSharedCacheImage(sSharedCacheLoadInfo, path, &shareCacheResults);
3459 };
3460
3461 #endif
3462
3463 if ( findSharedCacheImage() ) {
3464 // see if this image in the cache was already loaded via a different path
3465 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); ++it) {
3466 ImageLoader* anImage = *it;
3467 if ( (const mach_header*)anImage->machHeader() == shareCacheResults.mhInCache )
3468 return anImage;
3469 }
3470 // if RTLD_NOLOAD, do nothing if not already loaded
3471 if ( context.dontLoad ) {
3472 // <rdar://33412890> possible that there is an override of cache
3473 if ( dyld3::stat(path, &statBuf) == 0 ) {
3474 ImageLoader* imageLoader = findLoadedImage(statBuf);
3475 if ( imageLoader != NULL )
3476 return imageLoader;
3477 }
3478 return NULL;
3479 }
3480 bool useCache = false;
3481 if ( shareCacheResults.image == nullptr ) {
3482 // HACK to support old caches
3483 existsOnDisk = ( dyld3::stat(path, &statBuf) == 0 );
3484 didStat = true;
3485 statErrNo = errno;
3486 useCache = !existsOnDisk;
3487 }
3488 else {
3489 // <rdar://problem/7014995> zero out stat buffer so mtime, etc are zero for items from the shared cache
3490 bzero(&statBuf, sizeof(statBuf));
3491 if ( shareCacheResults.image->overridableDylib() ) {
3492 existsOnDisk = ( dyld3::stat(path, &statBuf) == 0 );
3493 statErrNo = errno;
3494 if ( sSharedCacheLoadInfo.loadAddress->header.dylibsExpectedOnDisk ) {
3495 // old style macOS with dylibs on disk
3496 uint64_t expectedINode;
3497 uint64_t expectedMtime;
3498 if ( shareCacheResults.image->hasFileModTimeAndInode(expectedINode, expectedMtime) ) {
3499 // if dylib found has same inode/mtime as one in cache, use one in cache
3500 if ( (expectedMtime == statBuf.st_mtime) && (expectedINode == statBuf.st_ino) )
3501 useCache = true;
3502 }
3503 }
3504 else {
3505 // MRM style where dylibs are not on disk
3506 if ( !existsOnDisk ) {
3507 // looking at path where dylib should be, and we expect it to not be there but rather in the cache
3508 // Its possible we are looking at a deleted symlink path. For example, we are trying to open .../AppKit but
3509 // there's already a loaded root of .../Versions/C/AppKit. That used to work when the symlink was on-disk as
3510 // we'd realpath to find the shared cache path. Now we record the aliases in the cache and delete the symlinks.
3511 const char* pathInSharedCache = shareCacheResults.image->path();
3512 if ( strcmp(path, pathInSharedCache) != 0 ) {
3513 ImageLoader* imageLoader = loadPhase5check(pathInSharedCache, orgPath, context);
3514 if ( imageLoader != NULL )
3515 return imageLoader;
3516 }
3517 useCache = true;
3518 }
3519 else if ( !sRootsChecker.onDiskFileIsRoot(path, sSharedCacheLoadInfo.loadAddress,
3520 shareCacheResults.image, nullptr, statBuf.st_ino, statBuf.st_mtime) ) {
3521 // we found a file on disk, at the same path as the dyld cache has a dylib and it is one of the magic three
3522 useCache = true;
3523 }
3524 }
3525 }
3526 else {
3527 // we are trying to override a dylib in the cache that does not allow overrides, ignore override and use cache
3528 useCache = true;
3529 }
3530 }
3531 if ( useCache ) {
3532 const dyld3::MachOFile* cacheDylibMH = (dyld3::MachOFile*)shareCacheResults.mhInCache;
3533 if ( !cacheDylibMH->loadableIntoProcess((dyld3::Platform)gProcessInfo->platform, path) )
3534 throwf("mach-o, but not built for platform %s", dyld3::MachOFile::platformName((dyld3::Platform)gProcessInfo->platform));
3535
3536 ImageLoader* imageLoader = ImageLoaderMachO::instantiateFromCache((macho_header*)cacheDylibMH, shareCacheResults.pathInCache, shareCacheResults.slideInCache, statBuf, gLinkContext);
3537 return checkandAddImage(imageLoader, context);
3538 }
3539 }
3540
3541 // not in cache or cache not usable
3542 if ( !didStat ) {
3543 existsOnDisk = ( dyld3::stat(path, &statBuf) == 0 );
3544 statErrNo = errno;
3545 }
3546 if ( existsOnDisk ) {
3547 // in case image was renamed or found via symlinks, check for inode match
3548 ImageLoader* imageLoader = findLoadedImage(statBuf);
3549 if ( imageLoader != NULL )
3550 return imageLoader;
3551 // do nothing if not already loaded and if RTLD_NOLOAD
3552 if ( context.dontLoad )
3553 return NULL;
3554 // try opening file
3555 imageLoader = loadPhase5open(path, context, statBuf, exceptions);
3556 if ( imageLoader != NULL ) {
3557 if ( shareCacheResults.image != nullptr ) {
3558 // if image was found in cache, but is overridden by a newer file on disk, record what the image overrides
3559 imageLoader->setOverridesCachedDylib(shareCacheResults.image->imageNum());
3560 }
3561 return imageLoader;
3562 }
3563 }
3564
3565 // just return NULL if file not found, but record any other errors
3566 if ( (statErrNo != ENOENT) && (statErrNo != 0) ) {
3567 if ( (statErrNo == EPERM) && sandboxBlockedStat(path) )
3568 exceptions->push_back(dyld::mkstringf("%s: file system sandbox blocked stat()", path));
3569 else
3570 exceptions->push_back(dyld::mkstringf("%s: stat() failed with errno=%d", path, statErrNo));
3571 }
3572 return NULL;
3573 }
3574
3575 // look for path match with existing loaded images
3576 static ImageLoader* loadPhase5check(const char* path, const char* orgPath, const LoadContext& context)
3577 {
3578 //dyld::log("%s(%s, %s)\n", __func__ , path, orgPath);
3579 // search path against load-path and install-path of all already loaded images
3580 uint32_t hash = ImageLoader::hash(path);
3581 //dyld::log("check() hash=%d, path=%s\n", hash, path);
3582 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
3583 ImageLoader* anImage = *it;
3584 // check hash first to cut down on strcmp calls
3585 //dyld::log(" check() hash=%d, path=%s\n", anImage->getPathHash(), anImage->getPath());
3586 if ( anImage->getPathHash() == hash ) {
3587 if ( strcmp(path, anImage->getPath()) == 0 ) {
3588 // if we are looking for a dylib don't return something else
3589 if ( !context.mustBeDylib || anImage->isDylib() )
3590 return anImage;
3591 }
3592 }
3593 if ( context.matchByInstallName || anImage->matchInstallPath() ) {
3594 const char* installPath = anImage->getInstallPath();
3595 if ( installPath != NULL) {
3596 if ( strcmp(path, installPath) == 0 ) {
3597 // if we are looking for a dylib don't return something else
3598 if ( !context.mustBeDylib || anImage->isDylib() )
3599 return anImage;
3600 }
3601 }
3602 }
3603 // an install name starting with @rpath should match by install name, not just real path
3604 if ( (orgPath[0] == '@') && (strncmp(orgPath, "@rpath/", 7) == 0) ) {
3605 const char* installPath = anImage->getInstallPath();
3606 if ( installPath != NULL) {
3607 if ( !context.mustBeDylib || anImage->isDylib() ) {
3608 if ( strcmp(orgPath, installPath) == 0 )
3609 return anImage;
3610 }
3611 }
3612 }
3613 }
3614
3615 //dyld::log("%s(%s) => NULL\n", __func__, path);
3616 return NULL;
3617 }
3618
3619
3620 // open or check existing
3621 static ImageLoader* loadPhase5(const char* path, const char* orgPath, const LoadContext& context, unsigned& cacheIndex, std::vector<const char*>* exceptions)
3622 {
3623 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
3624
3625 // check for specific dylib overrides
3626 for (std::vector<DylibOverride>::iterator it = sDylibOverrides.begin(); it != sDylibOverrides.end(); ++it) {
3627 if ( strcmp(it->installName, path) == 0 ) {
3628 path = it->override;
3629 break;
3630 }
3631 }
3632
3633 if ( exceptions != NULL )
3634 return loadPhase5load(path, orgPath, context, cacheIndex, exceptions);
3635 else
3636 return loadPhase5check(path, orgPath, context);
3637 }
3638
3639 // try with and without image suffix
3640 static ImageLoader* loadPhase4(const char* path, const char* orgPath, const LoadContext& context, unsigned& cacheIndex, std::vector<const char*>* exceptions)
3641 {
3642 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
3643 ImageLoader* image = NULL;
3644 if ( gLinkContext.imageSuffix != NULL ) {
3645 for (const char* const* suffix=gLinkContext.imageSuffix; *suffix != NULL; ++suffix) {
3646 char pathWithSuffix[strlen(path)+strlen(*suffix)+2];
3647 ImageLoader::addSuffix(path, *suffix, pathWithSuffix);
3648 image = loadPhase5(pathWithSuffix, orgPath, context, cacheIndex, exceptions);
3649 if ( image != NULL )
3650 break;
3651 }
3652 if ( image != NULL ) {
3653 // if original path is in the dyld cache, then mark this one found as an override
3654 dyld3::SharedCacheFindDylibResults shareCacheResults;
3655 if ( dyld3::findInSharedCacheImage(sSharedCacheLoadInfo, path, &shareCacheResults) && (shareCacheResults.image != nullptr) )
3656 image->setOverridesCachedDylib(shareCacheResults.image->imageNum());
3657 }
3658 }
3659 if ( image == NULL )
3660 image = loadPhase5(path, orgPath, context, cacheIndex, exceptions);
3661 return image;
3662 }
3663
3664 static ImageLoader* loadPhase2(const char* path, const char* orgPath, const LoadContext& context,
3665 const char* const frameworkPaths[], const char* const libraryPaths[],
3666 unsigned& cacheIndex, std::vector<const char*>* exceptions); // forward reference
3667
3668
3669 // expand @ variables
3670 static ImageLoader* loadPhase3(const char* path, const char* orgPath, const LoadContext& context, unsigned& cacheIndex, std::vector<const char*>* exceptions)
3671 {
3672 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
3673 ImageLoader* image = NULL;
3674 if ( strncmp(path, "@executable_path/", 17) == 0 ) {
3675 // executable_path cannot be in used in any binary in a setuid process rdar://problem/4589305
3676 if ( !gLinkContext.allowAtPaths )
3677 throwf("unsafe use of @executable_path in %s with restricted binary (Codesign main executable with Library Validation to allow @ paths)", context.origin);
3678 // handle @executable_path path prefix
3679 const char* executablePath = sExecPath;
3680 char newPath[strlen(executablePath) + strlen(path)];
3681 strcpy(newPath, executablePath);
3682 char* addPoint = strrchr(newPath,'/');
3683 if ( addPoint != NULL )
3684 strcpy(&addPoint[1], &path[17]);
3685 else
3686 strcpy(newPath, &path[17]);
3687 image = loadPhase4(newPath, orgPath, context, cacheIndex, exceptions);
3688 if ( image != NULL )
3689 return image;
3690
3691 // perhaps main executable path is a sym link, find realpath and retry
3692 char resolvedPath[PATH_MAX];
3693 if ( realpath(sExecPath, resolvedPath) != NULL ) {
3694 char newRealPath[strlen(resolvedPath) + strlen(path)];
3695 strcpy(newRealPath, resolvedPath);
3696 addPoint = strrchr(newRealPath,'/');
3697 if ( addPoint != NULL )
3698 strcpy(&addPoint[1], &path[17]);
3699 else
3700 strcpy(newRealPath, &path[17]);
3701 image = loadPhase4(newRealPath, orgPath, context, cacheIndex, exceptions);
3702 if ( image != NULL )
3703 return image;
3704 }
3705 }
3706 else if ( (strncmp(path, "@loader_path/", 13) == 0) && (context.origin != NULL) ) {
3707 // @loader_path cannot be used from the main executable of a setuid process rdar://problem/4589305
3708 if ( !gLinkContext.allowAtPaths && (strcmp(context.origin, sExecPath) == 0) )
3709 throwf("unsafe use of @loader_path in %s with restricted binary (Codesign main executable with Library Validation to allow @ paths)", context.origin);
3710 // handle @loader_path path prefix
3711 char newPath[strlen(context.origin) + strlen(path)];
3712 strcpy(newPath, context.origin);
3713 char* addPoint = strrchr(newPath,'/');
3714 if ( addPoint != NULL )
3715 strcpy(&addPoint[1], &path[13]);
3716 else
3717 strcpy(newPath, &path[13]);
3718 image = loadPhase4(newPath, orgPath, context, cacheIndex, exceptions);
3719 if ( image != NULL )
3720 return image;
3721
3722 // perhaps loader path is a sym link, find realpath and retry
3723 char resolvedPath[PATH_MAX];
3724 if ( realpath(context.origin, resolvedPath) != NULL ) {
3725 char newRealPath[strlen(resolvedPath) + strlen(path)];
3726 strcpy(newRealPath, resolvedPath);
3727 addPoint = strrchr(newRealPath,'/');
3728 if ( addPoint != NULL )
3729 strcpy(&addPoint[1], &path[13]);
3730 else
3731 strcpy(newRealPath, &path[13]);
3732 image = loadPhase4(newRealPath, orgPath, context, cacheIndex, exceptions);
3733 if ( image != NULL )
3734 return image;
3735 }
3736 }
3737 else if ( context.implicitRPath || (strncmp(path, "@rpath/", 7) == 0) ) {
3738 const char* trailingPath = (strncmp(path, "@rpath/", 7) == 0) ? &path[7] : path;
3739 // substitute @rpath with all -rpath paths up the load chain
3740 for(const ImageLoader::RPathChain* rp=context.rpath; rp != NULL; rp=rp->next) {
3741 if (rp->paths != NULL ) {
3742 for(std::vector<const char*>::iterator it=rp->paths->begin(); it != rp->paths->end(); ++it) {
3743 const char* anRPath = *it;
3744 char newPath[strlen(anRPath) + strlen(trailingPath)+2];
3745 strcpy(newPath, anRPath);
3746 if ( newPath[strlen(newPath)-1] != '/' )
3747 strcat(newPath, "/");
3748 strcat(newPath, trailingPath);
3749 image = loadPhase4(newPath, orgPath, context, cacheIndex, exceptions);
3750 if ( gLinkContext.verboseRPaths && (exceptions != NULL) ) {
3751 if ( image != NULL )
3752 dyld::log("RPATH successful expansion of %s to: %s\n", orgPath, newPath);
3753 else
3754 dyld::log("RPATH failed expanding %s to: %s\n", orgPath, newPath);
3755 }
3756 if ( image != NULL )
3757 return image;
3758 }
3759 }
3760 }
3761
3762 // substitute @rpath with LD_LIBRARY_PATH
3763 if ( sEnv.LD_LIBRARY_PATH != NULL ) {
3764 image = loadPhase2(trailingPath, orgPath, context, NULL, sEnv.LD_LIBRARY_PATH, cacheIndex, exceptions);
3765 if ( image != NULL )
3766 return image;
3767 }
3768
3769 // if this is the "open" pass, don't try to open @rpath/... as a relative path
3770 if ( (exceptions != NULL) && (trailingPath != path) )
3771 return NULL;
3772 }
3773 else if ( !gLinkContext.allowEnvVarsPath && (path[0] != '/' ) ) {
3774 throwf("unsafe use of relative rpath %s in %s with restricted binary", path, context.origin);
3775 }
3776
3777 return loadPhase4(path, orgPath, context, cacheIndex, exceptions);
3778 }
3779
3780 static ImageLoader* loadPhase2cache(const char* path, const char *orgPath, const LoadContext& context, unsigned& cacheIndex, std::vector<const char*>* exceptions) {
3781 ImageLoader* image = NULL;
3782 #if !TARGET_OS_SIMULATOR
3783 if ( (exceptions != NULL) && (gLinkContext.allowEnvVarsPath || !isFileRelativePath(path)) && (path[0] != '@') ) {
3784 char resolvedPath[PATH_MAX];
3785 realpath(path, resolvedPath);
3786 int myerr = errno;
3787 // If realpath() resolves to a path which does not exist on disk, errno is set to ENOENT
3788 if ( (myerr == ENOENT) || (myerr == 0) )
3789 {
3790 image = loadPhase4(resolvedPath, orgPath, context, cacheIndex, exceptions);
3791 }
3792 }
3793 #endif
3794 return image;
3795 }
3796
3797
3798 // try search paths
3799 static ImageLoader* loadPhase2(const char* path, const char* orgPath, const LoadContext& context,
3800 const char* const frameworkPaths[], const char* const libraryPaths[],
3801 unsigned& cacheIndex, std::vector<const char*>* exceptions)
3802 {
3803 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
3804 ImageLoader* image = NULL;
3805 const char* frameworkPartialPath = getFrameworkPartialPath(path);
3806 if ( frameworkPaths != NULL ) {
3807 if ( frameworkPartialPath != NULL ) {
3808 const size_t frameworkPartialPathLen = strlen(frameworkPartialPath);
3809 for(const char* const* fp = frameworkPaths; *fp != NULL; ++fp) {
3810 char npath[strlen(*fp)+frameworkPartialPathLen+8];
3811 strcpy(npath, *fp);
3812 strcat(npath, "/");
3813 strcat(npath, frameworkPartialPath);
3814 //dyld::log("dyld: fallback framework path used: %s() -> loadPhase4(\"%s\", ...)\n", __func__, npath);
3815 image = loadPhase4(npath, orgPath, context, cacheIndex, exceptions);
3816 // Look in the cache if appropriate
3817 if ( image == NULL)
3818 image = loadPhase2cache(npath, orgPath, context, cacheIndex, exceptions);
3819 if ( image != NULL ) {
3820 // if original path is in the dyld cache, then mark this one found as an override
3821 dyld3::SharedCacheFindDylibResults shareCacheResults;
3822 if ( dyld3::findInSharedCacheImage(sSharedCacheLoadInfo, path, &shareCacheResults) && (shareCacheResults.image != nullptr) ) {
3823 image->setOverridesCachedDylib(shareCacheResults.image->imageNum());
3824 }
3825 #if SUPPORT_ROOT_PATH
3826 else if ( (gLinkContext.rootPaths != nullptr)
3827 && dyld3::findInSharedCacheImage(sSharedCacheLoadInfo, orgPath, &shareCacheResults)
3828 && (shareCacheResults.image != nullptr) ) {
3829 // DYLD_ROOT_PATH, ie, iOSMac, also needs to check if the original path is overridden
3830 // as the root prefix has been applied to 'path', but the framework path searches without a root path prefix
3831 image->setOverridesCachedDylib(shareCacheResults.image->imageNum());
3832 }
3833 #endif
3834 return image;
3835 }
3836 }
3837 }
3838 }
3839 // <rdar://problem/12649639> An executable with the same name as a framework & DYLD_LIBRARY_PATH pointing to it gets loaded twice
3840 // <rdar://problem/14160846> Some apps depend on frameworks being found via library paths
3841 if ( (libraryPaths != NULL) && ((frameworkPartialPath == NULL) || sFrameworksFoundAsDylibs) ) {
3842 const char* libraryLeafName = getLibraryLeafName(path);
3843 const size_t libraryLeafNameLen = strlen(libraryLeafName);
3844 for(const char* const* lp = libraryPaths; *lp != NULL; ++lp) {
3845 char libpath[strlen(*lp)+libraryLeafNameLen+8];
3846 strcpy(libpath, *lp);
3847 strcat(libpath, "/");
3848 strcat(libpath, libraryLeafName);
3849 //dyld::log("dyld: fallback library path used: %s() -> loadPhase4(\"%s\", ...)\n", __func__, libpath);
3850 image = loadPhase4(libpath, orgPath, context, cacheIndex, exceptions);
3851 // Look in the cache if appropriate
3852 if ( image == NULL)
3853 image = loadPhase2cache(libpath, orgPath, context, cacheIndex, exceptions);
3854 if ( image != NULL ) {
3855 // if original path is in the dyld cache, then mark this one found as an override
3856 dyld3::SharedCacheFindDylibResults shareCacheResults;
3857 if ( dyld3::findInSharedCacheImage(sSharedCacheLoadInfo, path, &shareCacheResults) && (shareCacheResults.image != nullptr) ) {
3858 image->setOverridesCachedDylib(shareCacheResults.image->imageNum());
3859 }
3860 #if SUPPORT_ROOT_PATH
3861 else if ( (gLinkContext.rootPaths != nullptr)
3862 && dyld3::findInSharedCacheImage(sSharedCacheLoadInfo, orgPath, &shareCacheResults)
3863 && (shareCacheResults.image != nullptr) ) {
3864 // DYLD_ROOT_PATH, ie, iOSMac, also needs to check if the original path is overridden
3865 // as the root prefix has been applied to 'path', but the library path searches without a root path prefix
3866 image->setOverridesCachedDylib(shareCacheResults.image->imageNum());
3867 }
3868 #endif
3869 return image;
3870 }
3871 }
3872 }
3873 return NULL;
3874 }
3875
3876 // try search overrides and fallbacks
3877 static ImageLoader* loadPhase1(const char* path, const char* orgPath, const LoadContext& context, unsigned& cacheIndex, std::vector<const char*>* exceptions)
3878 {
3879 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
3880 ImageLoader* image = NULL;
3881
3882 bool pathIsInDyldCacheWhichCannotBeOverridden = false;
3883 if ( sSharedCacheLoadInfo.loadAddress != nullptr ) {
3884 pathIsInDyldCacheWhichCannotBeOverridden = sSharedCacheLoadInfo.loadAddress->hasNonOverridablePath(path);
3885 }
3886
3887 // <rdar://problem/48490116> dyld customer cache cannot be overridden
3888 if ( !pathIsInDyldCacheWhichCannotBeOverridden ) {
3889 // handle LD_LIBRARY_PATH environment variables that force searching
3890 if ( context.useLdLibraryPath && (sEnv.LD_LIBRARY_PATH != NULL) ) {
3891 image = loadPhase2(path, orgPath, context, NULL, sEnv.LD_LIBRARY_PATH, cacheIndex,exceptions);
3892 if ( image != NULL )
3893 return image;
3894 }
3895
3896 // handle DYLD_ environment variables that force searching
3897 if ( context.useSearchPaths && ((sEnv.DYLD_FRAMEWORK_PATH != NULL) || (sEnv.DYLD_LIBRARY_PATH != NULL)) ) {
3898 image = loadPhase2(path, orgPath, context, sEnv.DYLD_FRAMEWORK_PATH, sEnv.DYLD_LIBRARY_PATH, cacheIndex, exceptions);
3899 if ( image != NULL )
3900 return image;
3901 }
3902 }
3903
3904 // try raw path
3905 image = loadPhase3(path, orgPath, context, cacheIndex, exceptions);
3906 if ( image != NULL )
3907 return image;
3908
3909 // try fallback paths during second time (will open file)
3910 const char* const* fallbackLibraryPaths = sEnv.DYLD_FALLBACK_LIBRARY_PATH;
3911 if ( (fallbackLibraryPaths != NULL) && !context.useFallbackPaths )
3912 fallbackLibraryPaths = NULL;
3913 if ( !context.dontLoad && (exceptions != NULL) && ((sEnv.DYLD_FALLBACK_FRAMEWORK_PATH != NULL) || (fallbackLibraryPaths != NULL)) ) {
3914 image = loadPhase2(path, orgPath, context, sEnv.DYLD_FALLBACK_FRAMEWORK_PATH, fallbackLibraryPaths, cacheIndex, exceptions);
3915 if ( image != NULL )
3916 return image;
3917 }
3918
3919 // <rdar://problem/47682983> if hardened app calls dlopen() with a leaf path, dyld should only look in /usr/lib
3920 if ( context.useLdLibraryPath && (fallbackLibraryPaths == NULL) ) {
3921 const char* stdPaths[2] = { "/usr/lib", NULL };
3922 image = loadPhase2(path, orgPath, context, NULL, stdPaths, cacheIndex, exceptions);
3923 if ( image != NULL )
3924 return image;
3925 }
3926
3927 #if SUPPORT_VERSIONED_PATHS
3928 // <rdar://problem/53215116> DYLD_VERSIONED_FRAMEWORK_PATH fails to load a framework if it does not also exist at the system install path
3929 // Scan to see if the dylib appears in a versioned path. Don't worry if we find the newest, that will handled later
3930 if ( !context.dontLoad && (exceptions != NULL) && ((sEnv.DYLD_VERSIONED_FRAMEWORK_PATH != NULL) || (sEnv.DYLD_VERSIONED_LIBRARY_PATH != NULL)) ) {
3931 image = loadPhase2(path, orgPath, context, sEnv.DYLD_VERSIONED_FRAMEWORK_PATH, sEnv.DYLD_VERSIONED_LIBRARY_PATH, cacheIndex, exceptions);
3932 if ( image != NULL )
3933 return image;
3934 }
3935 #endif
3936
3937 return NULL;
3938 }
3939
3940 // try root substitutions
3941 static ImageLoader* loadPhase0(const char* path, const char* orgPath, const LoadContext& context, unsigned& cacheIndex, std::vector<const char*>* exceptions)
3942 {
3943 //dyld::log("%s(%s, %p)\n", __func__ , path, exceptions);
3944
3945 #if TARGET_OS_OSX
3946 // handle macOS dylibs dlopen()ing versioned path which needs to map to flat path in mazipan simulator
3947 if ( gLinkContext.iOSonMac && strstr(path, ".framework/Versions/")) {
3948 uintptr_t sourceOffset = 0;
3949 uintptr_t destOffset = 0;
3950 size_t sourceLangth = strlen(path);
3951 char flatPath[sourceLangth];
3952 flatPath[0] = 0;
3953 const char* frameworkBase = NULL;
3954 while ((frameworkBase = strstr(&path[sourceOffset], ".framework/Versions/"))) {
3955 uintptr_t foundLength = (frameworkBase - &path[sourceOffset]) + strlen(".framework/") ;
3956 strlcat(&flatPath[destOffset], &path[sourceOffset], foundLength);
3957 sourceOffset += foundLength + strlen("Versions/") + 1;
3958 destOffset += foundLength - 1;
3959 }
3960 strlcat(&flatPath[destOffset], &path[sourceOffset], sourceLangth);
3961 ImageLoader* image = loadPhase0(flatPath, orgPath, context, cacheIndex, exceptions);
3962 if ( image != NULL )
3963 return image;
3964 }
3965 #endif
3966
3967 #if SUPPORT_ROOT_PATH
3968 // handle DYLD_ROOT_PATH which forces absolute paths to use a new root
3969 if ( (gLinkContext.rootPaths != NULL) && (path[0] == '/') ) {
3970 for(const char* const* rootPath = gLinkContext.rootPaths; *rootPath != NULL; ++rootPath) {
3971 size_t rootLen = strlen(*rootPath);
3972 if ( strncmp(path, *rootPath, rootLen) != 0 ) {
3973 char newPath[rootLen + strlen(path)+2];
3974 strcpy(newPath, *rootPath);
3975 strcat(newPath, path);
3976 ImageLoader* image = loadPhase1(newPath, orgPath, context, cacheIndex, exceptions);
3977 if ( image != NULL )
3978 return image;
3979 }
3980 }
3981 }
3982 #endif
3983
3984 // try raw path
3985 return loadPhase1(path, orgPath, context, cacheIndex, exceptions);
3986 }
3987
3988 //
3989 // Given all the DYLD_ environment variables, the general case for loading libraries
3990 // is that any given path expands into a list of possible locations to load. We
3991 // also must take care to ensure two copies of the "same" library are never loaded.
3992 //
3993 // The algorithm used here is that there is a separate function for each "phase" of the
3994 // path expansion. Each phase function calls the next phase with each possible expansion
3995 // of that phase. The result is the last phase is called with all possible paths.
3996 //
3997 // To catch duplicates the algorithm is run twice. The first time, the last phase checks
3998 // the path against all loaded images. The second time, the last phase calls open() on
3999 // the path. Either time, if an image is found, the phases all unwind without checking
4000 // for other paths.
4001 //
4002 ImageLoader* load(const char* path, const LoadContext& context, unsigned& cacheIndex)
4003 {
4004 CRSetCrashLogMessage2(path);
4005 const char* orgPath = path;
4006 cacheIndex = UINT32_MAX;
4007
4008 //dyld::log("%s(%s)\n", __func__ , path);
4009 char realPath[PATH_MAX];
4010 // when DYLD_IMAGE_SUFFIX is in used, do a realpath(), otherwise a load of "Foo.framework/Foo" will not match
4011 if ( context.useSearchPaths && ( gLinkContext.imageSuffix != NULL && *gLinkContext.imageSuffix != NULL) ) {
4012 if ( realpath(path, realPath) != NULL )
4013 path = realPath;
4014 }
4015
4016 // try all path permutations and check against existing loaded images
4017
4018 ImageLoader* image = loadPhase0(path, orgPath, context, cacheIndex, NULL);
4019 if ( image != NULL ) {
4020 CRSetCrashLogMessage2(NULL);
4021 return image;
4022 }
4023
4024 // try all path permutations and try open() until first success
4025 std::vector<const char*> exceptions;
4026 image = loadPhase0(path, orgPath, context, cacheIndex, &exceptions);
4027 #if !TARGET_OS_SIMULATOR
4028 // <rdar://problem/16704628> support symlinks on disk to a path in dyld shared cache
4029 if ( image == NULL)
4030 image = loadPhase2cache(path, orgPath, context, cacheIndex, &exceptions);
4031 #endif
4032 CRSetCrashLogMessage2(NULL);
4033 if ( image != NULL ) {
4034 // <rdar://problem/6916014> leak in dyld during dlopen when using DYLD_ variables
4035 for (std::vector<const char*>::iterator it = exceptions.begin(); it != exceptions.end(); ++it) {
4036 free((void*)(*it));
4037 }
4038 // if loaded image is not from cache, but original path is in cache
4039 // set gSharedCacheOverridden flag to disable some ObjC optimizations
4040 if ( !gSharedCacheOverridden && !image->inSharedCache() && image->isDylib() && dyld3::MachOFile::isSharedCacheEligiblePath(path) && inSharedCache(path) ) {
4041 gSharedCacheOverridden = true;
4042 }
4043 // <rdar://problem/59327556> if file loaded via symlink to a root of something in dyld cache, mark it as an override
4044 dyld3::SharedCacheFindDylibResults shareCacheResults;
4045 if ( !image->inSharedCache() && dyld3::findInSharedCacheImage(sSharedCacheLoadInfo, image->getRealPath(), &shareCacheResults) && (shareCacheResults.image != nullptr) )
4046 image->setOverridesCachedDylib(shareCacheResults.image->imageNum());
4047
4048 return image;
4049 }
4050 else if ( exceptions.size() == 0 ) {
4051 if ( context.dontLoad ) {
4052 return NULL;
4053 }
4054 else
4055 throw "image not found";
4056 }
4057 else {
4058 const char* msgStart = "no suitable image found. Did find:";
4059 const char* delim = "\n\t";
4060 size_t allsizes = strlen(msgStart)+8;
4061 for (size_t i=0; i < exceptions.size(); ++i)
4062 allsizes += (strlen(exceptions[i]) + strlen(delim));
4063 char* fullMsg = new char[allsizes];
4064 strcpy(fullMsg, msgStart);
4065 for (size_t i=0; i < exceptions.size(); ++i) {
4066 strcat(fullMsg, delim);
4067 strcat(fullMsg, exceptions[i]);
4068 free((void*)exceptions[i]);
4069 }
4070 throw (const char*)fullMsg;
4071 }
4072 }
4073
4074
4075
4076
4077
4078 static void mapSharedCache(uintptr_t mainExecutableSlide)
4079 {
4080 dyld3::SharedCacheOptions opts;
4081 opts.cacheDirOverride = sSharedCacheOverrideDir;
4082 opts.forcePrivate = (gLinkContext.sharedRegionMode == ImageLoader::kUsePrivateSharedRegion);
4083 #if __x86_64__ && !TARGET_OS_SIMULATOR
4084 opts.useHaswell = sHaswell;
4085 #else
4086 opts.useHaswell = false;
4087 #endif
4088 opts.verbose = gLinkContext.verboseMapping;
4089 // <rdar://problem/32031197> respect -disable_aslr boot-arg
4090 // <rdar://problem/56299169> kern.bootargs is now blocked
4091 opts.disableASLR = (mainExecutableSlide == 0) && dyld3::internalInstall(); // infer ASLR is off if main executable is not slid
4092 loadDyldCache(opts, &sSharedCacheLoadInfo);
4093
4094 // update global state
4095 if ( sSharedCacheLoadInfo.loadAddress != nullptr ) {
4096 gLinkContext.dyldCache = sSharedCacheLoadInfo.loadAddress;
4097 dyld::gProcessInfo->processDetachedFromSharedRegion = opts.forcePrivate;
4098 dyld::gProcessInfo->sharedCacheSlide = sSharedCacheLoadInfo.slide;
4099 dyld::gProcessInfo->sharedCacheBaseAddress = (unsigned long)sSharedCacheLoadInfo.loadAddress;
4100 sSharedCacheLoadInfo.loadAddress->getUUID(dyld::gProcessInfo->sharedCacheUUID);
4101 dyld3::kdebug_trace_dyld_image(DBG_DYLD_UUID_SHARED_CACHE_A, sSharedCacheLoadInfo.path, (const uuid_t *)&dyld::gProcessInfo->sharedCacheUUID[0], {0,0}, {{ 0, 0 }}, (const mach_header *)sSharedCacheLoadInfo.loadAddress);
4102 }
4103
4104 //#if TARGET_OS_IPHONE && !TARGET_OS_SIMULATOR
4105 // RAM disk booting does not have shared cache yet
4106 // Don't make lack of a shared cache fatal in that case
4107 // if ( sSharedCacheLoadInfo.loadAddress == nullptr ) {
4108 // if ( sSharedCacheLoadInfo.errorMessage != nullptr )
4109 // halt(sSharedCacheLoadInfo.errorMessage);
4110 // else
4111 // halt("error loading dyld shared cache");
4112 // }
4113 //#endif
4114 }
4115
4116
4117
4118 // create when NSLinkModule is called for a second time on a bundle
4119 ImageLoader* cloneImage(ImageLoader* image)
4120 {
4121 // open file (automagically closed when this function exits)
4122 FileOpener file(image->getPath());
4123
4124 struct stat stat_buf;
4125 if ( fstat(file.getFileDescriptor(), &stat_buf) == -1)
4126 throw "stat error";
4127
4128 dyld::LoadContext context;
4129 context.useSearchPaths = false;
4130 context.useFallbackPaths = false;
4131 context.useLdLibraryPath = false;
4132 context.implicitRPath = false;
4133 context.matchByInstallName = false;
4134 context.dontLoad = false;
4135 context.mustBeBundle = true;
4136 context.mustBeDylib = false;
4137 context.canBePIE = false;
4138 context.origin = NULL;
4139 context.rpath = NULL;
4140 return loadPhase6(file.getFileDescriptor(), stat_buf, image->getPath(), context);
4141 }
4142
4143
4144 ImageLoader* loadFromMemory(const uint8_t* mem, uint64_t len, const char* moduleName)
4145 {
4146 // if fat wrapper, find usable sub-file
4147 const fat_header* memStartAsFat = (fat_header*)mem;
4148 uint64_t fileOffset = 0;
4149 uint64_t fileLength = len;
4150 if ( memStartAsFat->magic == OSSwapBigToHostInt32(FAT_MAGIC) ) {
4151 if ( fatFindBest(memStartAsFat, &fileOffset, &fileLength) ) {
4152 mem = &mem[fileOffset];
4153 len = fileLength;
4154 }
4155 else {
4156 throw "no matching architecture in universal wrapper";
4157 }
4158 }
4159
4160 // try each loader
4161 if ( isCompatibleMachO(mem, moduleName) ) {
4162 ImageLoader* image = ImageLoaderMachO::instantiateFromMemory(moduleName, (macho_header*)mem, len, gLinkContext);
4163 // don't add bundles to global list, they can be loaded but not linked. When linked it will be added to list
4164 if ( ! image->isBundle() )
4165 addImage(image);
4166 return image;
4167 }
4168
4169 // try other file formats here...
4170
4171 // throw error about what was found
4172 switch (*(uint32_t*)mem) {
4173 case MH_MAGIC:
4174 case MH_CIGAM:
4175 case MH_MAGIC_64:
4176 case MH_CIGAM_64:
4177 throw "mach-o, but wrong architecture";
4178 default:
4179 throwf("unknown file type, first eight bytes: 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X 0x%02X",
4180 mem[0], mem[1], mem[2], mem[3], mem[4], mem[5], mem[6],mem[7]);
4181 }
4182 }
4183
4184
4185 void registerAddCallback(ImageCallback func)
4186 {
4187 // now add to list to get notified when any more images are added
4188 sAddImageCallbacks.push_back(func);
4189
4190 // call callback with all existing images
4191 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
4192 ImageLoader* image = *it;
4193 if ( image->getState() >= dyld_image_state_bound && image->getState() < dyld_image_state_terminated ) {
4194 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_ADD_IMAGE, (uint64_t)image->machHeader(), (uint64_t)(*func), 0);
4195 (*func)(image->machHeader(), image->getSlide());
4196 }
4197 }
4198 #if SUPPORT_ACCELERATE_TABLES
4199 if ( sAllCacheImagesProxy != NULL ) {
4200 dyld_image_info infos[allImagesCount()+1];
4201 unsigned cacheCount = sAllCacheImagesProxy->appendImagesToNotify(dyld_image_state_bound, true, infos);
4202 for (unsigned i=0; i < cacheCount; ++i) {
4203 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_ADD_IMAGE, (uint64_t)infos[i].imageLoadAddress, (uint64_t)(*func), 0);
4204 (*func)(infos[i].imageLoadAddress, sSharedCacheLoadInfo.slide);
4205 }
4206 }
4207 #endif
4208 }
4209
4210 void registerLoadCallback(LoadImageCallback func)
4211 {
4212 // now add to list to get notified when any more images are added
4213 sAddLoadImageCallbacks.push_back(func);
4214
4215 // call callback with all existing images
4216 for (ImageLoader* image : sAllImages) {
4217 if ( image->getState() >= dyld_image_state_bound && image->getState() < dyld_image_state_terminated ) {
4218 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_ADD_IMAGE, (uint64_t)image->machHeader(), (uint64_t)(*func), 0);
4219 (*func)(image->machHeader(), image->getPath(), !image->neverUnload());
4220 }
4221 }
4222 #if SUPPORT_ACCELERATE_TABLES
4223 if ( sAllCacheImagesProxy != NULL ) {
4224 dyld_image_info infos[allImagesCount()+1];
4225 unsigned cacheCount = sAllCacheImagesProxy->appendImagesToNotify(dyld_image_state_bound, true, infos);
4226 for (unsigned i=0; i < cacheCount; ++i) {
4227 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_ADD_IMAGE, (uint64_t)infos[i].imageLoadAddress, (uint64_t)(*func), 0);
4228 (*func)(infos[i].imageLoadAddress, infos[i].imageFilePath, false);
4229 }
4230 }
4231 #endif
4232 }
4233
4234 void registerBulkLoadCallback(LoadImageBulkCallback func)
4235 {
4236 // call callback with all existing images
4237 unsigned count = dyld::gProcessInfo->infoArrayCount;
4238 const dyld_image_info* infoArray = dyld::gProcessInfo->infoArray;
4239 if ( infoArray != NULL ) {
4240 const mach_header* mhs[count];
4241 const char* paths[count];
4242 for (unsigned i=0; i < count; ++i) {
4243 mhs[i] = infoArray[i].imageLoadAddress;
4244 paths[i] = infoArray[i].imageFilePath;
4245 }
4246 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_FUNC_FOR_ADD_IMAGE, (uint64_t)mhs[0], (uint64_t)func, 0);
4247 func(count, mhs, paths);
4248 }
4249
4250 // now add to list to get notified when any more images are added
4251 sAddBulkLoadImageCallbacks.push_back(func);
4252 }
4253
4254 void registerRemoveCallback(ImageCallback func)
4255 {
4256 // <rdar://problem/15025198> ignore calls to register a notification during a notification
4257 if ( sRemoveImageCallbacksInUse )
4258 return;
4259 sRemoveImageCallbacks.push_back(func);
4260 }
4261
4262 void clearErrorMessage()
4263 {
4264 error_string[0] = '\0';
4265 }
4266
4267 void setErrorMessage(const char* message)
4268 {
4269 // save off error message in global buffer for CrashReporter to find
4270 strlcpy(error_string, message, sizeof(error_string));
4271 }
4272
4273 const char* getErrorMessage()
4274 {
4275 return error_string;
4276 }
4277
4278 void halt(const char* message)
4279 {
4280 if ( sSharedCacheLoadInfo.errorMessage != nullptr ) {
4281 // <rdar://problem/45957449> if dyld fails with a missing dylib and there is no shared cache, display the shared cache load error message
4282 dyld::log("dyld: dyld cache load error: %s\n", sSharedCacheLoadInfo.errorMessage);
4283 dyld::log("dyld: %s\n", message);
4284 strlcpy(error_string, "dyld cache load error: ", sizeof(error_string));
4285 strlcat(error_string, sSharedCacheLoadInfo.errorMessage, sizeof(error_string));
4286 strlcat(error_string, "\n", sizeof(error_string));
4287 strlcat(error_string, message, sizeof(error_string));
4288 } else if ( dyld::gProcessInfo->errorKind == DYLD_EXIT_REASON_DYLIB_MISSING ) {
4289 // If a dylib is missing, but we have the cache, print the cache UUID to make it easier
4290 // to see what might have gone wrong
4291 if ( sSharedCacheLoadInfo.loadAddress == nullptr ) {
4292 strlcpy(error_string, "dyld: No shared cache present\n", sizeof(error_string));
4293 } else {
4294 uuid_t cacheUUID;
4295 sSharedCacheLoadInfo.loadAddress->getUUID(cacheUUID);
4296 uuid_string_t uuidStr;
4297 uuid_unparse_upper(cacheUUID, uuidStr);
4298
4299 strlcpy(error_string, "dyld: Using shared cache: ", sizeof(error_string));
4300 strlcat(error_string, uuidStr, sizeof(error_string));
4301 strlcat(error_string, "\n", sizeof(error_string));
4302 }
4303
4304 dyld::log("dyld: %s\n", message);
4305 strlcat(error_string, message, sizeof(error_string));
4306 }
4307 else {
4308 dyld::log("dyld: %s\n", message);
4309 strlcpy(error_string, message, sizeof(error_string));
4310 }
4311
4312 dyld::gProcessInfo->errorMessage = error_string;
4313 if ( !gLinkContext.startedInitializingMainExecutable )
4314 dyld::gProcessInfo->terminationFlags = 1;
4315 else
4316 dyld::gProcessInfo->terminationFlags = 0;
4317
4318 char payloadBuffer[EXIT_REASON_PAYLOAD_MAX_LEN];
4319 dyld_abort_payload* payload = (dyld_abort_payload*)payloadBuffer;
4320 payload->version = 1;
4321 payload->flags = gLinkContext.startedInitializingMainExecutable ? 0 : 1;
4322 payload->targetDylibPathOffset = 0;
4323 payload->clientPathOffset = 0;
4324 payload->symbolOffset = 0;
4325 int payloadSize = sizeof(dyld_abort_payload);
4326
4327 if ( dyld::gProcessInfo->errorTargetDylibPath != NULL ) {
4328 payload->targetDylibPathOffset = payloadSize;
4329 payloadSize += strlcpy(&payloadBuffer[payloadSize], dyld::gProcessInfo->errorTargetDylibPath, sizeof(payloadBuffer)-payloadSize) + 1;
4330 }
4331 if ( dyld::gProcessInfo->errorClientOfDylibPath != NULL ) {
4332 payload->clientPathOffset = payloadSize;
4333 payloadSize += strlcpy(&payloadBuffer[payloadSize], dyld::gProcessInfo->errorClientOfDylibPath, sizeof(payloadBuffer)-payloadSize) + 1;
4334 }
4335 if ( dyld::gProcessInfo->errorSymbol != NULL ) {
4336 payload->symbolOffset = payloadSize;
4337 payloadSize += strlcpy(&payloadBuffer[payloadSize], dyld::gProcessInfo->errorSymbol, sizeof(payloadBuffer)-payloadSize) + 1;
4338 }
4339 char truncMessage[EXIT_REASON_USER_DESC_MAX_LEN];
4340 strlcpy(truncMessage, error_string, EXIT_REASON_USER_DESC_MAX_LEN);
4341 abort_with_payload(OS_REASON_DYLD, dyld::gProcessInfo->errorKind ? dyld::gProcessInfo->errorKind : DYLD_EXIT_REASON_OTHER, payloadBuffer, payloadSize, truncMessage, 0);
4342 }
4343
4344 static void setErrorStrings(unsigned errorCode, const char* errorClientOfDylibPath,
4345 const char* errorTargetDylibPath, const char* errorSymbol)
4346 {
4347 dyld::gProcessInfo->errorKind = errorCode;
4348 dyld::gProcessInfo->errorClientOfDylibPath = errorClientOfDylibPath;
4349 dyld::gProcessInfo->errorTargetDylibPath = errorTargetDylibPath;
4350 dyld::gProcessInfo->errorSymbol = errorSymbol;
4351 }
4352
4353
4354 uintptr_t bindLazySymbol(const mach_header* mh, uintptr_t* lazyPointer)
4355 {
4356 uintptr_t result = 0;
4357 // acquire read-lock on dyld's data structures
4358 #if 0 // rdar://problem/3811777 turn off locking until deadlock is resolved
4359 if ( gLibSystemHelpers != NULL )
4360 (*gLibSystemHelpers->lockForReading)();
4361 #endif
4362 // lookup and bind lazy pointer and get target address
4363 try {
4364 ImageLoader* target;
4365 #if __i386__
4366 // fast stubs pass NULL for mh and image is instead found via the location of stub (aka lazyPointer)
4367 if ( mh == NULL )
4368 target = dyld::findImageContainingAddress(lazyPointer);
4369 else
4370 target = dyld::findImageByMachHeader(mh);
4371 #else
4372 // note, target should always be mach-o, because only mach-o lazy handler wired up to this
4373 target = dyld::findImageByMachHeader(mh);
4374 #endif
4375 if ( target == NULL )
4376 throwf("image not found for lazy pointer at %p", lazyPointer);
4377 result = target->doBindLazySymbol(lazyPointer, gLinkContext);
4378 }
4379 catch (const char* message) {
4380 dyld::log("dyld: lazy symbol binding failed: %s\n", message);
4381 halt(message);
4382 }
4383 // release read-lock on dyld's data structures
4384 #if 0
4385 if ( gLibSystemHelpers != NULL )
4386 (*gLibSystemHelpers->unlockForReading)();
4387 #endif
4388 // return target address to glue which jumps to it with real parameters restored
4389 return result;
4390 }
4391
4392
4393 uintptr_t fastBindLazySymbol(ImageLoader** imageLoaderCache, uintptr_t lazyBindingInfoOffset)
4394 {
4395 uintptr_t result = 0;
4396 // get image
4397 if ( *imageLoaderCache == NULL ) {
4398 // save in cache
4399 *imageLoaderCache = dyld::findMappedRange((uintptr_t)imageLoaderCache);
4400 if ( *imageLoaderCache == NULL ) {
4401 #if SUPPORT_ACCELERATE_TABLES
4402 if ( sAllCacheImagesProxy != NULL ) {
4403 const mach_header* mh;
4404 const char* path;
4405 unsigned index;
4406 if ( sAllCacheImagesProxy->addressInCache(imageLoaderCache, &mh, &path, &index) ) {
4407 result = sAllCacheImagesProxy->bindLazy(lazyBindingInfoOffset, gLinkContext, mh, index);
4408 if ( result == 0 ) {
4409 halt("dyld: lazy symbol binding failed for image in dyld shared\n");
4410 }
4411 return result;
4412 }
4413 }
4414 #endif
4415 const char* message = "fast lazy binding from unknown image";
4416 dyld::log("dyld: %s\n", message);
4417 halt(message);
4418 }
4419 }
4420
4421 // bind lazy pointer and return it
4422 try {
4423 result = (*imageLoaderCache)->doBindFastLazySymbol((uint32_t)lazyBindingInfoOffset, gLinkContext,
4424 (dyld::gLibSystemHelpers != NULL) ? dyld::gLibSystemHelpers->acquireGlobalDyldLock : NULL,
4425 (dyld::gLibSystemHelpers != NULL) ? dyld::gLibSystemHelpers->releaseGlobalDyldLock : NULL);
4426 }
4427 catch (const char* message) {
4428 dyld::log("dyld: lazy symbol binding failed: %s\n", message);
4429 halt(message);
4430 }
4431
4432 // return target address to glue which jumps to it with real parameters restored
4433 return result;
4434 }
4435
4436
4437
4438 void registerUndefinedHandler(UndefinedHandler handler)
4439 {
4440 sUndefinedHandler = handler;
4441 }
4442
4443 static void undefinedHandler(const char* symboName)
4444 {
4445 if ( sUndefinedHandler != NULL ) {
4446 (*sUndefinedHandler)(symboName);
4447 }
4448 }
4449
4450 static bool findExportedSymbol(const char* name, bool onlyInCoalesced, const ImageLoader::Symbol** sym, const ImageLoader** image, ImageLoader::CoalesceNotifier notifier=NULL)
4451 {
4452 // search all images in order
4453 const ImageLoader* firstWeakImage = NULL;
4454 const ImageLoader::Symbol* firstWeakSym = NULL;
4455 const ImageLoader* firstNonWeakImage = NULL;
4456 const ImageLoader::Symbol* firstNonWeakSym = NULL;
4457 const size_t imageCount = sAllImages.size();
4458 for(size_t i=0; i < imageCount; ++i) {
4459 ImageLoader* anImage = sAllImages[i];
4460 // the use of inserted libraries alters search order
4461 // so that inserted libraries are found before the main executable
4462 if ( sInsertedDylibCount > 0 ) {
4463 if ( i < sInsertedDylibCount )
4464 anImage = sAllImages[i+1];
4465 else if ( i == sInsertedDylibCount )
4466 anImage = sAllImages[0];
4467 }
4468 //dyld::log("findExportedSymbol(%s) looking at %s\n", name, anImage->getPath());
4469 if ( ! anImage->hasHiddenExports() && (!onlyInCoalesced || anImage->hasCoalescedExports()) ) {
4470 const ImageLoader* foundInImage;
4471 *sym = anImage->findExportedSymbol(name, false, &foundInImage);
4472 //dyld::log("findExportedSymbol(%s) found: sym=%p, anImage=%p, foundInImage=%p\n", name, *sym, anImage, foundInImage /*, (foundInImage ? foundInImage->getPath() : "")*/);
4473 if ( *sym != NULL ) {
4474 if ( notifier && (foundInImage == anImage) )
4475 notifier(*sym, foundInImage, foundInImage->machHeader());
4476 // if weak definition found, record first one found
4477 if ( (foundInImage->getExportedSymbolInfo(*sym) & ImageLoader::kWeakDefinition) != 0 ) {
4478 if ( firstWeakImage == NULL ) {
4479 firstWeakImage = foundInImage;
4480 firstWeakSym = *sym;
4481 }
4482 }
4483 else {
4484 // found non-weak
4485 if ( !onlyInCoalesced ) {
4486 // for flat lookups, return first found
4487 *image = foundInImage;
4488 return true;
4489 }
4490 if ( firstNonWeakImage == NULL ) {
4491 firstNonWeakImage = foundInImage;
4492 firstNonWeakSym = *sym;
4493 }
4494 }
4495 }
4496 }
4497 }
4498 if ( firstNonWeakImage != NULL ) {
4499 // found a weak definition, but no non-weak, so return first weak found
4500 *sym = firstNonWeakSym;
4501 *image = firstNonWeakImage;
4502 return true;
4503 }
4504 if ( firstWeakSym != NULL ) {
4505 // found a weak definition, but no non-weak, so return first weak found
4506 *sym = firstWeakSym;
4507 *image = firstWeakImage;
4508 return true;
4509 }
4510 #if SUPPORT_ACCELERATE_TABLES
4511 if ( sAllCacheImagesProxy != NULL ) {
4512 if ( sAllCacheImagesProxy->flatFindSymbol(name, onlyInCoalesced, sym, image, notifier) )
4513 return true;
4514 }
4515 #endif
4516
4517 return false;
4518 }
4519
4520 bool flatFindExportedSymbol(const char* name, const ImageLoader::Symbol** sym, const ImageLoader** image)
4521 {
4522 return findExportedSymbol(name, false, sym, image);
4523 }
4524
4525 bool findCoalescedExportedSymbol(const char* name, const ImageLoader::Symbol** sym, const ImageLoader** image, ImageLoader::CoalesceNotifier notifier)
4526 {
4527 return findExportedSymbol(name, true, sym, image, notifier);
4528 }
4529
4530
4531 bool flatFindExportedSymbolWithHint(const char* name, const char* librarySubstring, const ImageLoader::Symbol** sym, const ImageLoader** image)
4532 {
4533 // search all images in order
4534 const size_t imageCount = sAllImages.size();
4535 for(size_t i=0; i < imageCount; ++i){
4536 ImageLoader* anImage = sAllImages[i];
4537 // only look at images whose paths contain the hint string (NULL hint string is wildcard)
4538 if ( ! anImage->isBundle() && ((librarySubstring==NULL) || (strstr(anImage->getPath(), librarySubstring) != NULL)) ) {
4539 *sym = anImage->findExportedSymbol(name, false, image);
4540 if ( *sym != NULL ) {
4541 return true;
4542 }
4543 }
4544 }
4545 return false;
4546 }
4547
4548
4549 unsigned int getCoalescedImages(ImageLoader* images[], unsigned imageIndex[])
4550 {
4551 unsigned int count = 0;
4552 const size_t imageCount = sAllImages.size();
4553 for(size_t i=0; i < imageCount; ++i) {
4554 ImageLoader* anImage = sAllImages[i];
4555 // the use of inserted libraries alters search order
4556 // so that inserted libraries are found before the main executable
4557 if ( sInsertedDylibCount > 0 ) {
4558 if ( i < sInsertedDylibCount )
4559 anImage = sAllImages[i+1];
4560 else if ( i == sInsertedDylibCount )
4561 anImage = sAllImages[0];
4562 }
4563 if ( anImage->participatesInCoalescing() ) {
4564 images[count] = anImage;
4565 imageIndex[count] = 0;
4566 ++count;
4567 }
4568 }
4569 #if SUPPORT_ACCELERATE_TABLES
4570 if ( sAllCacheImagesProxy != NULL ) {
4571 sAllCacheImagesProxy->appendImagesNeedingCoalescing(images, imageIndex, count);
4572 }
4573 #endif
4574 return count;
4575 }
4576
4577
4578 static ImageLoader::MappedRegion* getMappedRegions(ImageLoader::MappedRegion* regions)
4579 {
4580 ImageLoader::MappedRegion* end = regions;
4581 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
4582 (*it)->getMappedRegions(end);
4583 }
4584 return end;
4585 }
4586
4587 void registerImageStateSingleChangeHandler(dyld_image_states state, dyld_image_state_change_handler handler)
4588 {
4589 // mark the image that the handler is in as never-unload because dyld has a reference into it
4590 ImageLoader* handlerImage = findImageContainingAddress((void*)handler);
4591 if ( handlerImage != NULL )
4592 handlerImage->setNeverUnload();
4593
4594 // add to list of handlers
4595 std::vector<dyld_image_state_change_handler>* handlers = stateToHandlers(state, sSingleHandlers);
4596 if ( handlers != NULL ) {
4597 // <rdar://problem/10332417> need updateAllImages() to be last in dyld_image_state_mapped list
4598 // so that if ObjC adds a handler that prevents a load, it happens before the gdb list is updated
4599 if ( state == dyld_image_state_mapped )
4600 handlers->insert(handlers->begin(), handler);
4601 else
4602 handlers->push_back(handler);
4603
4604 // call callback with all existing images
4605 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
4606 ImageLoader* image = *it;
4607 dyld_image_info info;
4608 info.imageLoadAddress = image->machHeader();
4609 info.imageFilePath = image->getRealPath();
4610 info.imageFileModDate = image->lastModified();
4611 // should only call handler if state == image->state
4612 if ( image->getState() == state )
4613 (*handler)(state, 1, &info);
4614 // ignore returned string, too late to do anything
4615 }
4616 }
4617 }
4618
4619 void registerImageStateBatchChangeHandler(dyld_image_states state, dyld_image_state_change_handler handler)
4620 {
4621 // mark the image that the handler is in as never-unload because dyld has a reference into it
4622 ImageLoader* handlerImage = findImageContainingAddress((void*)handler);
4623 if ( handlerImage != NULL )
4624 handlerImage->setNeverUnload();
4625
4626 // add to list of handlers
4627 std::vector<dyld_image_state_change_handler>* handlers = stateToHandlers(state, sBatchHandlers);
4628 if ( handlers != NULL ) {
4629 // insert at front, so that gdb handler is always last
4630 handlers->insert(handlers->begin(), handler);
4631
4632 // call callback with all existing images
4633 try {
4634 notifyBatchPartial(state, true, handler, false, false);
4635 }
4636 catch (const char* msg) {
4637 // ignore request to abort during registration
4638 }
4639 }
4640 }
4641
4642
4643 void registerObjCNotifiers(_dyld_objc_notify_mapped mapped, _dyld_objc_notify_init init, _dyld_objc_notify_unmapped unmapped)
4644 {
4645 // record functions to call
4646 sNotifyObjCMapped = mapped;
4647 sNotifyObjCInit = init;
4648 sNotifyObjCUnmapped = unmapped;
4649
4650 // call 'mapped' function with all images mapped so far
4651 try {
4652 notifyBatchPartial(dyld_image_state_bound, true, NULL, false, true);
4653 }
4654 catch (const char* msg) {
4655 // ignore request to abort during registration
4656 }
4657
4658 // <rdar://problem/32209809> call 'init' function on all images already init'ed (below libSystem)
4659 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
4660 ImageLoader* image = *it;
4661 if ( (image->getState() == dyld_image_state_initialized) && image->notifyObjC() ) {
4662 dyld3::ScopedTimer timer(DBG_DYLD_TIMING_OBJC_INIT, (uint64_t)image->machHeader(), 0, 0);
4663 (*sNotifyObjCInit)(image->getRealPath(), image->machHeader());
4664 }
4665 }
4666 }
4667
4668 bool sharedCacheUUID(uuid_t uuid)
4669 {
4670 if ( sSharedCacheLoadInfo.loadAddress == nullptr )
4671 return false;
4672
4673 sSharedCacheLoadInfo.loadAddress->getUUID(uuid);
4674 return true;
4675 }
4676
4677 #if SUPPORT_ACCELERATE_TABLES
4678
4679 bool dlopenFromCache(const char* path, int mode, void** handle)
4680 {
4681 if ( sAllCacheImagesProxy == NULL )
4682 return false;
4683 char fallbackPath[PATH_MAX];
4684 bool result = sAllCacheImagesProxy->dlopenFromCache(gLinkContext, path, mode, handle);
4685 if ( !result && (strchr(path, '/') == NULL) ) {
4686 // POSIX says you can call dlopen() with a leaf name (e.g. dlopen("libz.dylb"))
4687 strcpy(fallbackPath, "/usr/lib/");
4688 strlcat(fallbackPath, path, PATH_MAX);
4689 result = sAllCacheImagesProxy->dlopenFromCache(gLinkContext, fallbackPath, mode, handle);
4690 if ( !result )
4691 path = fallbackPath;
4692 }
4693 if ( !result ) {
4694 // leaf name could be a symlink
4695 char resolvedPath[PATH_MAX];
4696 realpath(path, resolvedPath);
4697 int realpathErrno = errno;
4698 // If realpath() resolves to a path which does not exist on disk, errno is set to ENOENT
4699 if ( (realpathErrno == ENOENT) || (realpathErrno == 0) ) {
4700 result = sAllCacheImagesProxy->dlopenFromCache(gLinkContext, resolvedPath, mode, handle);
4701 }
4702 }
4703
4704 return result;
4705 }
4706
4707 bool makeCacheHandle(ImageLoader* image, unsigned cacheIndex, int mode, void** result)
4708 {
4709 if ( sAllCacheImagesProxy == NULL )
4710 return false;
4711 return sAllCacheImagesProxy->makeCacheHandle(gLinkContext, cacheIndex, mode, result);
4712 }
4713
4714 bool isCacheHandle(void* handle)
4715 {
4716 if ( sAllCacheImagesProxy == NULL )
4717 return false;
4718 return sAllCacheImagesProxy->isCacheHandle(handle, NULL, NULL);
4719 }
4720
4721 bool isPathInCache(const char* path)
4722 {
4723 if ( sAllCacheImagesProxy == NULL )
4724 return false;
4725 unsigned index;
4726 return sAllCacheImagesProxy->hasDylib(path, &index);
4727 }
4728
4729 const char* getPathFromIndex(unsigned cacheIndex)
4730 {
4731 if ( sAllCacheImagesProxy == NULL )
4732 return NULL;
4733 return sAllCacheImagesProxy->getIndexedPath(cacheIndex);
4734 }
4735
4736 void* dlsymFromCache(void* handle, const char* symName, unsigned index)
4737 {
4738 if ( sAllCacheImagesProxy == NULL )
4739 return NULL;
4740 return sAllCacheImagesProxy->dlsymFromCache(gLinkContext, handle, symName, index);
4741 }
4742
4743 bool addressInCache(const void* address, const mach_header** mh, const char** path, unsigned* index)
4744 {
4745 if ( sAllCacheImagesProxy == NULL )
4746 return false;
4747 unsigned ignore;
4748 return sAllCacheImagesProxy->addressInCache(address, mh, path, index ? index : &ignore);
4749 }
4750
4751 bool findUnwindSections(const void* addr, dyld_unwind_sections* info)
4752 {
4753 if ( sAllCacheImagesProxy == NULL )
4754 return false;
4755 return sAllCacheImagesProxy->findUnwindSections(addr, info);
4756 }
4757
4758 bool dladdrFromCache(const void* address, Dl_info* info)
4759 {
4760 if ( sAllCacheImagesProxy == NULL )
4761 return false;
4762 return sAllCacheImagesProxy->dladdrFromCache(address, info);
4763 }
4764 #endif
4765
4766 static ImageLoader* libraryLocator(const char* libraryName, bool search, const char* origin, const ImageLoader::RPathChain* rpaths, unsigned& cacheIndex)
4767 {
4768 dyld::LoadContext context;
4769 context.useSearchPaths = search;
4770 context.useFallbackPaths = search;
4771 context.useLdLibraryPath = false;
4772 context.implicitRPath = false;
4773 context.matchByInstallName = false;
4774 context.dontLoad = false;
4775 context.mustBeBundle = false;
4776 context.mustBeDylib = true;
4777 context.canBePIE = false;
4778 context.origin = origin;
4779 context.rpath = rpaths;
4780 return load(libraryName, context, cacheIndex);
4781 }
4782
4783 static const char* basename(const char* path)
4784 {
4785 const char* last = path;
4786 for (const char* s = path; *s != '\0'; s++) {
4787 if (*s == '/')
4788 last = s+1;
4789 }
4790 return last;
4791 }
4792
4793 static void setContext(const macho_header* mainExecutableMH, int argc, const char* argv[], const char* envp[], const char* apple[])
4794 {
4795 gLinkContext.loadLibrary = &libraryLocator;
4796 gLinkContext.terminationRecorder = &terminationRecorder;
4797 gLinkContext.flatExportFinder = &flatFindExportedSymbol;
4798 gLinkContext.coalescedExportFinder = &findCoalescedExportedSymbol;
4799 gLinkContext.getCoalescedImages = &getCoalescedImages;
4800 gLinkContext.undefinedHandler = &undefinedHandler;
4801 gLinkContext.getAllMappedRegions = &getMappedRegions;
4802 gLinkContext.bindingHandler = NULL;
4803 gLinkContext.notifySingle = &notifySingle;
4804 gLinkContext.notifyBatch = &notifyBatch;
4805 gLinkContext.removeImage = &removeImage;
4806 gLinkContext.registerDOFs = dyld3::Loader::dtraceUserProbesEnabled() ? &registerDOFs : NULL;
4807 gLinkContext.clearAllDepths = &clearAllDepths;
4808 gLinkContext.printAllDepths = &printAllDepths;
4809 gLinkContext.imageCount = &imageCount;
4810 gLinkContext.setNewProgramVars = &setNewProgramVars;
4811 gLinkContext.inSharedCache = &inSharedCache;
4812 gLinkContext.setErrorStrings = &setErrorStrings;
4813 #if SUPPORT_OLD_CRT_INITIALIZATION
4814 gLinkContext.setRunInitialzersOldWay= &setRunInitialzersOldWay;
4815 #endif
4816 gLinkContext.findImageContainingAddress = &findImageContainingAddress;
4817 gLinkContext.addDynamicReference = &addDynamicReference;
4818 #if SUPPORT_ACCELERATE_TABLES
4819 gLinkContext.notifySingleFromCache = &notifySingleFromCache;
4820 gLinkContext.getPreInitNotifyHandler= &getPreInitNotifyHandler;
4821 gLinkContext.getBoundBatchHandler = &getBoundBatchHandler;
4822 #endif
4823 gLinkContext.bindingOptions = ImageLoader::kBindingNone;
4824 gLinkContext.argc = argc;
4825 gLinkContext.argv = argv;
4826 gLinkContext.envp = envp;
4827 gLinkContext.apple = apple;
4828 gLinkContext.progname = (argv[0] != NULL) ? basename(argv[0]) : "";
4829 gLinkContext.programVars.mh = mainExecutableMH;
4830 gLinkContext.programVars.NXArgcPtr = &gLinkContext.argc;
4831 gLinkContext.programVars.NXArgvPtr = &gLinkContext.argv;
4832 gLinkContext.programVars.environPtr = &gLinkContext.envp;
4833 gLinkContext.programVars.__prognamePtr=&gLinkContext.progname;
4834 gLinkContext.mainExecutable = NULL;
4835 gLinkContext.imageSuffix = NULL;
4836 gLinkContext.dynamicInterposeArray = NULL;
4837 gLinkContext.dynamicInterposeCount = 0;
4838 gLinkContext.prebindUsage = ImageLoader::kUseAllPrebinding;
4839 gLinkContext.sharedRegionMode = ImageLoader::kUseSharedRegion;
4840 }
4841
4842
4843
4844 //
4845 // Look for a special segment in the mach header.
4846 // Its presences means that the binary wants to have DYLD ignore
4847 // DYLD_ environment variables.
4848 //
4849 #if TARGET_OS_OSX
4850 static bool hasRestrictedSegment(const macho_header* mh)
4851 {
4852 const uint32_t cmd_count = mh->ncmds;
4853 const struct load_command* const cmds = (struct load_command*)(((char*)mh)+sizeof(macho_header));
4854 const struct load_command* cmd = cmds;
4855 for (uint32_t i = 0; i < cmd_count; ++i) {
4856 switch (cmd->cmd) {
4857 case LC_SEGMENT_COMMAND:
4858 {
4859 const struct macho_segment_command* seg = (struct macho_segment_command*)cmd;
4860
4861 //dyld::log("seg name: %s\n", seg->segname);
4862 if (strcmp(seg->segname, "__RESTRICT") == 0) {
4863 const struct macho_section* const sectionsStart = (struct macho_section*)((char*)seg + sizeof(struct macho_segment_command));
4864 const struct macho_section* const sectionsEnd = &sectionsStart[seg->nsects];
4865 for (const struct macho_section* sect=sectionsStart; sect < sectionsEnd; ++sect) {
4866 if (strcmp(sect->sectname, "__restrict") == 0)
4867 return true;
4868 }
4869 }
4870 }
4871 break;
4872 }
4873 cmd = (const struct load_command*)(((char*)cmd)+cmd->cmdsize);
4874 }
4875
4876 return false;
4877 }
4878 #endif
4879
4880 #if TARGET_OS_IPHONE && !TARGET_OS_SIMULATOR
4881 static bool isFairPlayEncrypted(const macho_header* mh)
4882 {
4883 const uint32_t cmd_count = mh->ncmds;
4884 const struct load_command* const cmds = (struct load_command*)(((char*)mh)+sizeof(macho_header));
4885 const struct load_command* cmd = cmds;
4886 for (uint32_t i = 0; i < cmd_count; ++i) {
4887 if ( cmd->cmd == LC_ENCRYPT_COMMAND ) {
4888 const encryption_info_command* enc = (encryption_info_command*)cmd;
4889 return (enc->cryptid != 0);
4890 }
4891 cmd = (const struct load_command*)(((char*)cmd)+cmd->cmdsize);
4892 }
4893
4894 return false;
4895 }
4896 #endif
4897
4898 #if SUPPORT_VERSIONED_PATHS
4899
4900 #define FIRST_PAGE_BUFFER_SIZE 16384
4901
4902 static bool readFirstPage(const char* dylibPath, uint8_t firstPage[FIRST_PAGE_BUFFER_SIZE])
4903 {
4904 firstPage[0] = 0;
4905 // open file (automagically closed when this function exits)
4906 FileOpener file(dylibPath);
4907
4908 if ( file.getFileDescriptor() == -1 )
4909 return false;
4910
4911 if ( pread(file.getFileDescriptor(), firstPage, FIRST_PAGE_BUFFER_SIZE, 0) != FIRST_PAGE_BUFFER_SIZE )
4912 return false;
4913
4914 // if fat wrapper, find usable sub-file
4915 const fat_header* fileStartAsFat = (fat_header*)firstPage;
4916 if ( fileStartAsFat->magic == OSSwapBigToHostInt32(FAT_MAGIC) ) {
4917 uint64_t fileOffset;
4918 uint64_t fileLength;
4919 if ( fatFindBest(fileStartAsFat, &fileOffset, &fileLength) ) {
4920 if ( pread(file.getFileDescriptor(), firstPage, FIRST_PAGE_BUFFER_SIZE, fileOffset) != FIRST_PAGE_BUFFER_SIZE )
4921 return false;
4922 }
4923 else {
4924 return false;
4925 }
4926 }
4927
4928 return true;
4929 }
4930
4931 //
4932 // Peeks at a dylib file and returns its current_version and install_name.
4933 // Returns false on error.
4934 //
4935 static bool getDylibVersionAndInstallname(const char* dylibPath, uint32_t* version, char* installName)
4936 {
4937 uint8_t firstPage[FIRST_PAGE_BUFFER_SIZE];
4938 const macho_header* mh = (macho_header*)firstPage;
4939 if ( !readFirstPage(dylibPath, firstPage) ) {
4940 // If file cannot be read, check to see if path is in shared cache
4941 const macho_header* mhInCache;
4942 const char* pathInCache;
4943 long slideInCache;
4944 if ( !findInSharedCacheImage(dylibPath, true, NULL, &mhInCache, &pathInCache, &slideInCache) )
4945 return false;
4946 mh = mhInCache;
4947 }
4948
4949 // check mach-o header
4950 if ( mh->magic != sMainExecutableMachHeader->magic )
4951 return false;
4952 if ( mh->cputype != sMainExecutableMachHeader->cputype )
4953 return false;
4954
4955 // scan load commands for LC_ID_DYLIB
4956 const uint32_t cmd_count = mh->ncmds;
4957 const struct load_command* const cmds = (struct load_command*)(((char*)mh)+sizeof(macho_header));
4958 const struct load_command* const cmdsReadEnd = (struct load_command*)(((char*)mh)+FIRST_PAGE_BUFFER_SIZE);
4959 const struct load_command* cmd = cmds;
4960 for (uint32_t i = 0; i < cmd_count; ++i) {
4961 switch (cmd->cmd) {
4962 case LC_ID_DYLIB:
4963 {
4964 const struct dylib_command* id = (struct dylib_command*)cmd;
4965 *version = id->dylib.current_version;
4966 if ( installName != NULL )
4967 strlcpy(installName, (char *)id + id->dylib.name.offset, PATH_MAX);
4968 return true;
4969 }
4970 break;
4971 }
4972 cmd = (const struct load_command*)(((char*)cmd)+cmd->cmdsize);
4973 if ( cmd > cmdsReadEnd )
4974 return false;
4975 }
4976
4977 return false;
4978 }
4979 #endif // SUPPORT_VERSIONED_PATHS
4980
4981
4982 #if 0
4983 static void printAllImages()
4984 {
4985 dyld::log("printAllImages()\n");
4986 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
4987 ImageLoader* image = *it;
4988 dyld_image_states imageState = image->getState();
4989 dyld::log(" state=%d, dlopen-count=%d, never-unload=%d, in-use=%d, name=%s\n",
4990 imageState, image->dlopenCount(), image->neverUnload(), image->isMarkedInUse(), image->getShortName());
4991 }
4992 }
4993 #endif
4994
4995 void link(ImageLoader* image, bool forceLazysBound, bool neverUnload, const ImageLoader::RPathChain& loaderRPaths, unsigned cacheIndex)
4996 {
4997 // add to list of known images. This did not happen at creation time for bundles
4998 if ( image->isBundle() && !image->isLinked() )
4999 addImage(image);
5000
5001 // we detect root images as those not linked in yet
5002 if ( !image->isLinked() )
5003 addRootImage(image);
5004
5005 // process images
5006 try {
5007 const char* path = image->getPath();
5008 #if SUPPORT_ACCELERATE_TABLES
5009 if ( image == sAllCacheImagesProxy )
5010 path = sAllCacheImagesProxy->getIndexedPath(cacheIndex);
5011 #endif
5012 image->link(gLinkContext, forceLazysBound, false, neverUnload, loaderRPaths, path);
5013 }
5014 catch (const char* msg) {
5015 garbageCollectImages();
5016 throw;
5017 }
5018 }
5019
5020
5021 void runInitializers(ImageLoader* image)
5022 {
5023 // do bottom up initialization
5024 ImageLoader::InitializerTimingList initializerTimes[allImagesCount()];
5025 initializerTimes[0].count = 0;
5026 image->runInitializers(gLinkContext, initializerTimes[0]);
5027 }
5028
5029 // This function is called at the end of dlclose() when the reference count goes to zero.
5030 // The dylib being unloaded may have brought in other dependent dylibs when it was loaded.
5031 // Those dependent dylibs need to be unloaded, but only if they are not referenced by
5032 // something else. We use a standard mark and sweep garbage collection.
5033 //
5034 // The tricky part is that when a dylib is unloaded it may have a termination function that
5035 // can run and itself call dlclose() on yet another dylib. The problem is that this
5036 // sort of gabage collection is not re-entrant. Instead a terminator's call to dlclose()
5037 // which calls garbageCollectImages() will just set a flag to re-do the garbage collection
5038 // when the current pass is done.
5039 //
5040 // Also note that this is done within the dyld global lock, so it is always single threaded.
5041 //
5042 void garbageCollectImages()
5043 {
5044 static bool sDoingGC = false;
5045 static bool sRedo = false;
5046
5047 if ( sDoingGC ) {
5048 // GC is currently being run, just set a flag to have it run again.
5049 sRedo = true;
5050 return;
5051 }
5052
5053 sDoingGC = true;
5054 do {
5055 sRedo = false;
5056
5057 // mark phase: mark all images not-in-use
5058 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
5059 ImageLoader* image = *it;
5060 //dyld::log("gc: neverUnload=%d name=%s\n", image->neverUnload(), image->getShortName());
5061 image->markNotUsed();
5062 }
5063
5064 #pragma clang diagnostic push
5065 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
5066 // sweep phase: mark as in-use, images reachable from never-unload or in-use image
5067 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
5068 ImageLoader* image = *it;
5069 if ( (image->dlopenCount() != 0) || (image->neverUnload() && (image->getState() >= dyld_image_state_bound)) || (image == sMainExecutable) ) {
5070 OSSpinLockLock(&sDynamicReferencesLock);
5071 image->markedUsedRecursive(sDynamicReferences);
5072 OSSpinLockUnlock(&sDynamicReferencesLock);
5073 }
5074 }
5075 #pragma clang diagnostic pop
5076
5077 // collect phase: build array of images not marked in-use
5078 ImageLoader* deadImages[sAllImages.size()];
5079 unsigned deadCount = 0;
5080 int maxRangeCount = 0;
5081 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
5082 ImageLoader* image = *it;
5083 if ( ! image->isMarkedInUse() ) {
5084 deadImages[deadCount++] = image;
5085 if (gLogAPIs) dyld::log("dlclose(), found unused image %p %s\n", image, image->getShortName());
5086 maxRangeCount += image->segmentCount();
5087 }
5088 }
5089
5090 // collect phase: run termination routines for images not marked in-use
5091 if ( maxRangeCount != 0 ) {
5092 __cxa_range_t ranges[maxRangeCount];
5093 int rangeCount = 0;
5094 for (unsigned i=0; i < deadCount; ++i) {
5095 ImageLoader* image = deadImages[i];
5096 for (unsigned int j=0; j < image->segmentCount(); ++j) {
5097 if ( !image->segExecutable(j) )
5098 continue;
5099 if ( rangeCount < maxRangeCount ) {
5100 ranges[rangeCount].addr = (const void*)image->segActualLoadAddress(j);
5101 ranges[rangeCount].length = image->segSize(j);
5102 ++rangeCount;
5103 }
5104 }
5105 try {
5106 runImageStaticTerminators(image);
5107 }
5108 catch (const char* msg) {
5109 dyld::warn("problem running terminators for image: %s\n", msg);
5110 }
5111 }
5112
5113 // <rdar://problem/14718598> dyld should call __cxa_finalize_ranges()
5114 if ( (rangeCount > 0) && (gLibSystemHelpers != NULL) && (gLibSystemHelpers->version >= 13) )
5115 (*gLibSystemHelpers->cxa_finalize_ranges)(ranges, rangeCount);
5116 }
5117
5118 // collect phase: delete all images which are not marked in-use
5119 bool mightBeMore;
5120 do {
5121 mightBeMore = false;
5122 for (std::vector<ImageLoader*>::iterator it=sAllImages.begin(); it != sAllImages.end(); it++) {
5123 ImageLoader* image = *it;
5124 if ( ! image->isMarkedInUse() ) {
5125 try {
5126 if (gLogAPIs) dyld::log("dlclose(), deleting %p %s\n", image, image->getShortName());
5127 removeImage(image);
5128 ImageLoader::deleteImage(image);
5129 mightBeMore = true;
5130 break; // interator in invalidated by this removal
5131 }
5132 catch (const char* msg) {
5133 dyld::warn("problem deleting image: %s\n", msg);
5134 }
5135 }
5136 }
5137 } while ( mightBeMore );
5138 } while (sRedo);
5139 sDoingGC = false;
5140
5141 //printAllImages();
5142
5143 }
5144
5145
5146 static void preflight_finally(ImageLoader* image)
5147 {
5148 if ( image->isBundle() ) {
5149 removeImageFromAllImages(image->machHeader());
5150 ImageLoader::deleteImage(image);
5151 }
5152 sBundleBeingLoaded = NULL;
5153 dyld::garbageCollectImages();
5154 }
5155
5156
5157 void preflight(ImageLoader* image, const ImageLoader::RPathChain& loaderRPaths, unsigned cacheIndex)
5158 {
5159 try {
5160 if ( image->isBundle() )
5161 sBundleBeingLoaded = image; // hack
5162 const char* path = image->getPath();
5163 #if SUPPORT_ACCELERATE_TABLES
5164 if ( image == sAllCacheImagesProxy )
5165 path = sAllCacheImagesProxy->getIndexedPath(cacheIndex);
5166 #endif
5167 image->link(gLinkContext, false, true, false, loaderRPaths, path);
5168 }
5169 catch (const char* msg) {
5170 preflight_finally(image);
5171 throw;
5172 }
5173 preflight_finally(image);
5174 }
5175
5176 static void loadInsertedDylib(const char* path)
5177 {
5178 unsigned cacheIndex;
5179 try {
5180 LoadContext context;
5181 context.useSearchPaths = false;
5182 context.useFallbackPaths = false;
5183 context.useLdLibraryPath = false;
5184 context.implicitRPath = false;
5185 context.matchByInstallName = false;
5186 context.dontLoad = false;
5187 context.mustBeBundle = false;
5188 context.mustBeDylib = true;
5189 context.canBePIE = false;
5190 context.origin = NULL; // can't use @loader_path with DYLD_INSERT_LIBRARIES
5191 context.rpath = NULL;
5192 load(path, context, cacheIndex);
5193 }
5194 catch (const char* msg) {
5195 if ( gLinkContext.allowInsertFailures )
5196 dyld::log("dyld: warning: could not load inserted library '%s' into hardened process because %s\n", path, msg);
5197 else
5198 halt(dyld::mkstringf("could not load inserted library '%s' because %s\n", path, msg));
5199 }
5200 catch (...) {
5201 halt(dyld::mkstringf("could not load inserted library '%s'\n", path));
5202 }
5203 }
5204
5205
5206 static void configureProcessRestrictions(const macho_header* mainExecutableMH, const char* envp[])
5207 {
5208 uint64_t amfiInputFlags = 0;
5209 #if TARGET_OS_SIMULATOR
5210 amfiInputFlags |= AMFI_DYLD_INPUT_PROC_IN_SIMULATOR;
5211 #elif TARGET_OS_OSX
5212 if ( hasRestrictedSegment(mainExecutableMH) )
5213 amfiInputFlags |= AMFI_DYLD_INPUT_PROC_HAS_RESTRICT_SEG;
5214 #elif TARGET_OS_IPHONE
5215 if ( isFairPlayEncrypted(mainExecutableMH) )
5216 amfiInputFlags |= AMFI_DYLD_INPUT_PROC_IS_ENCRYPTED;
5217 #endif
5218 uint64_t amfiOutputFlags = 0;
5219 const char* amfiFake = nullptr;
5220 if constexpr(BUILD_FOR_TESTING == 1) {
5221 amfiFake = _simple_getenv(envp, "DYLD_AMFI_FAKE");
5222 } else if ( dyld3::internalInstall() && dyld3::BootArgs::enableDyldTestMode() ) {
5223 amfiFake = _simple_getenv(envp, "DYLD_AMFI_FAKE");
5224 }
5225
5226 if ( amfiFake != nullptr ) {
5227 amfiOutputFlags = hexToUInt64(amfiFake, nullptr);
5228 }
5229 if ( (amfiFake != nullptr) || (amfi_check_dyld_policy_self(amfiInputFlags, &amfiOutputFlags) == 0) ) {
5230 gLinkContext.allowAtPaths = (amfiOutputFlags & AMFI_DYLD_OUTPUT_ALLOW_AT_PATH);
5231 gLinkContext.allowEnvVarsPrint = (amfiOutputFlags & AMFI_DYLD_OUTPUT_ALLOW_PRINT_VARS);
5232 gLinkContext.allowEnvVarsPath = (amfiOutputFlags & AMFI_DYLD_OUTPUT_ALLOW_PATH_VARS);
5233 gLinkContext.allowEnvVarsSharedCache = (amfiOutputFlags & AMFI_DYLD_OUTPUT_ALLOW_CUSTOM_SHARED_CACHE);
5234 gLinkContext.allowClassicFallbackPaths = (amfiOutputFlags & AMFI_DYLD_OUTPUT_ALLOW_FALLBACK_PATHS);
5235 gLinkContext.allowInsertFailures = (amfiOutputFlags & AMFI_DYLD_OUTPUT_ALLOW_FAILED_LIBRARY_INSERTION);
5236 #ifdef AMFI_RETURNS_INTERPOSING_FLAG
5237 gLinkContext.allowInterposing = (amfiOutputFlags & AMFI_DYLD_OUTPUT_ALLOW_LIBRARY_INTERPOSING);
5238 #else
5239 gLinkContext.allowInterposing = true;
5240 #endif
5241 }
5242 else {
5243 #if TARGET_OS_OSX
5244 // support chrooting from old kernel
5245 bool isRestricted = false;
5246 bool libraryValidation = false;
5247 // any processes with setuid or setgid bit set or with __RESTRICT segment is restricted
5248 if ( issetugid() || hasRestrictedSegment(mainExecutableMH) ) {
5249 isRestricted = true;
5250 }
5251 bool usingSIP = (csr_check(CSR_ALLOW_TASK_FOR_PID) != 0);
5252 uint32_t flags;
5253 if ( csops(0, CS_OPS_STATUS, &flags, sizeof(flags)) != -1 ) {
5254 // On OS X CS_RESTRICT means the program was signed with entitlements
5255 if ( ((flags & CS_RESTRICT) == CS_RESTRICT) && usingSIP ) {
5256 isRestricted = true;
5257 }
5258 // Library Validation loosens searching but requires everything to be code signed
5259 if ( flags & CS_REQUIRE_LV ) {
5260 isRestricted = false;
5261 libraryValidation = true;
5262 }
5263 }
5264 gLinkContext.allowAtPaths = !isRestricted;
5265 gLinkContext.allowEnvVarsPrint = !isRestricted;
5266 gLinkContext.allowEnvVarsPath = !isRestricted;
5267 gLinkContext.allowEnvVarsSharedCache = !libraryValidation || !usingSIP;
5268 gLinkContext.allowClassicFallbackPaths = !isRestricted;
5269 gLinkContext.allowInsertFailures = false;
5270 gLinkContext.allowInterposing = true;
5271 #else
5272 halt("amfi_check_dyld_policy_self() failed\n");
5273 #endif
5274 }
5275 }
5276
5277 // called by _dyld_register_driverkit_main()
5278 void setMainEntry(void (*main)())
5279 {
5280 if ( sEntryOverride == nullptr )
5281 sEntryOverride = main;
5282 else
5283 halt("_dyld_register_driverkit_main() may only be called once");
5284 }
5285
5286 bool processIsRestricted()
5287 {
5288 #if TARGET_OS_OSX
5289 return !gLinkContext.allowEnvVarsPath;
5290 #else
5291 return false;
5292 #endif
5293 }
5294
5295
5296 // <rdar://problem/10583252> Add dyld to uuidArray to enable symbolication of stackshots
5297 static void addDyldImageToUUIDList()
5298 {
5299 const struct macho_header* mh = (macho_header*)&__dso_handle;
5300 const uint32_t cmd_count = mh->ncmds;
5301 const struct load_command* const cmds = (struct load_command*)((char*)mh + sizeof(macho_header));
5302 const struct load_command* cmd = cmds;
5303 for (uint32_t i = 0; i < cmd_count; ++i) {
5304 switch (cmd->cmd) {
5305 case LC_UUID: {
5306 uuid_command* uc = (uuid_command*)cmd;
5307 dyld_uuid_info info;
5308 info.imageLoadAddress = (mach_header*)mh;
5309 memcpy(info.imageUUID, uc->uuid, 16);
5310 addNonSharedCacheImageUUID(info);
5311 return;
5312 }
5313 }
5314 cmd = (const struct load_command*)(((char*)cmd)+cmd->cmdsize);
5315 }
5316 }
5317
5318 void notifyKernelAboutImage(const struct macho_header* mh, const char* fileInfo)
5319 {
5320 const char *endptr = nullptr;
5321 uint64_t tmp = hexToUInt64(fileInfo, &endptr);
5322 fsid_t fsid = *reinterpret_cast<fsid_t *>(&tmp);
5323 uint64_t fsobj_id_scalar = 0;
5324 fsobj_id_t fsobj_id = {0};
5325 if (endptr != nullptr) {
5326 fsobj_id_scalar = hexToUInt64(endptr+1, &endptr);
5327 fsobj_id = *reinterpret_cast<fsobj_id_t *>(&fsobj_id_scalar);
5328 }
5329 const uint32_t cmd_count = mh->ncmds;
5330 const struct load_command* const cmds = (struct load_command*)((char*)mh + sizeof(macho_header));
5331 const struct load_command* cmd = cmds;
5332 for (uint32_t i = 0; i < cmd_count; ++i) {
5333 switch (cmd->cmd) {
5334 case LC_UUID: {
5335 // Add dyld to the kernel image info
5336 uuid_command* uc = (uuid_command*)cmd;
5337 char path[MAXPATHLEN];
5338 if (fsgetpath(path, MAXPATHLEN, &fsid, fsobj_id_scalar) < 0) {
5339 path[0] = 0;
5340 }
5341 dyld3::kdebug_trace_dyld_image(DBG_DYLD_UUID_MAP_A, path, (const uuid_t *)&uc->uuid[0], fsobj_id, fsid, (const mach_header *)mh);
5342 return;
5343 }
5344 }
5345 cmd = (const struct load_command*)(((char*)cmd)+cmd->cmdsize);
5346 }
5347 }
5348
5349 #if TARGET_OS_OSX
5350 static void* getProcessInfo() { return dyld::gProcessInfo; }
5351 static const SyscallHelpers sSysCalls = {
5352 13,
5353 // added in version 1
5354 &open,
5355 &close,
5356 &pread,
5357 &write,
5358 &mmap,
5359 &munmap,
5360 &madvise,
5361 &stat,
5362 &fcntl,
5363 &ioctl,
5364 &issetugid,
5365 &getcwd,
5366 &realpath,
5367 &vm_allocate,
5368 &vm_deallocate,
5369 &vm_protect,
5370 &vlog,
5371 &vwarn,
5372 &pthread_mutex_lock,
5373 &pthread_mutex_unlock,
5374 &mach_thread_self,
5375 &mach_port_deallocate,
5376 &task_self_trap,
5377 &mach_timebase_info,
5378 &OSAtomicCompareAndSwapPtrBarrier,
5379 &OSMemoryBarrier,
5380 &getProcessInfo,
5381 &__error,
5382 &mach_absolute_time,
5383 // added in version 2
5384 &thread_switch,
5385 // added in version 3
5386 &opendir,
5387 &readdir_r,
5388 &closedir,
5389 // added in version 4
5390 &coresymbolication_load_notifier,
5391 &coresymbolication_unload_notifier,
5392 // Added in version 5
5393 &proc_regionfilename,
5394 &getpid,
5395 &mach_port_insert_right,
5396 &mach_port_allocate,
5397 &mach_msg,
5398 // Added in version 6
5399 &abort_with_payload,
5400 // Added in version 7
5401 &legacy_task_register_dyld_image_infos,
5402 &legacy_task_unregister_dyld_image_infos,
5403 &legacy_task_get_dyld_image_infos,
5404 &legacy_task_register_dyld_shared_cache_image_info,
5405 &legacy_task_register_dyld_set_dyld_state,
5406 &legacy_task_register_dyld_get_process_state,
5407 // Added in version 8
5408 &task_info,
5409 &thread_info,
5410 &kdebug_is_enabled,
5411 &kdebug_trace,
5412 // Added in version 9
5413 &kdebug_trace_string,
5414 // Added in version 10
5415 &amfi_check_dyld_policy_self,
5416 // Added in version 11
5417 &notifyMonitoringDyldMain,
5418 &notifyMonitoringDyld,
5419 // Add in version 12
5420 &mach_msg_destroy,
5421 &mach_port_construct,
5422 &mach_port_destruct,
5423 // Add in version 13
5424 &fstat,
5425 &vm_copy
5426 };
5427
5428 __attribute__((noinline))
5429 static const char* useSimulatorDyld(int fd, const macho_header* mainExecutableMH, const char* dyldPath,
5430 int argc, const char* argv[], const char* envp[], const char* apple[],
5431 uintptr_t* startGlue, uintptr_t* mainAddr)
5432 {
5433 *startGlue = 0;
5434 *mainAddr = 0;
5435
5436 // <rdar://problem/25311921> simulator does not support restricted processes
5437 uint32_t flags;
5438 if ( csops(0, CS_OPS_STATUS, &flags, sizeof(flags)) == -1 )
5439 return "csops() failed";
5440 if ( (flags & CS_RESTRICT) == CS_RESTRICT )
5441 return "dyld_sim cannot be loaded in a restricted process";
5442 if ( issetugid() )
5443 return "dyld_sim cannot be loaded in a setuid process";
5444 if ( hasRestrictedSegment(mainExecutableMH) )
5445 return "dyld_sim cannot be loaded in a restricted process";
5446
5447 // get file size of dyld_sim
5448 struct stat sb;
5449 if ( fstat(fd, &sb) == -1 )
5450 return "stat(dyld_sim) failed";
5451
5452 // read first page of dyld_sim file
5453 uint8_t firstPage[4096];
5454 if ( pread(fd, firstPage, 4096, 0) != 4096 )
5455 return "pread(dyld_sim) failed";
5456
5457 // if fat file, pick matching slice
5458 uint64_t fileOffset = 0;
5459 uint64_t fileLength = sb.st_size;
5460 const fat_header* fileStartAsFat = (fat_header*)firstPage;
5461 if ( fileStartAsFat->magic == OSSwapBigToHostInt32(FAT_MAGIC) ) {
5462 if ( !fatFindBest(fileStartAsFat, &fileOffset, &fileLength) )
5463 return "no matching arch in dyld_sim";
5464 // re-read buffer from start of mach-o slice in fat file
5465 if ( pread(fd, firstPage, 4096, fileOffset) != 4096 )
5466 return "pread(dyld_sim) failed";
5467 }
5468 else if ( !isCompatibleMachO(firstPage, dyldPath, fd, fileOffset, fileLength) ) {
5469 return "dyld_sim is not compatible with the loaded process, likely due to architecture mismatch";
5470 }
5471
5472 // calculate total size of dyld segments
5473 const macho_header* mh = (const macho_header*)firstPage;
5474 struct macho_segment_command* lastSeg = NULL;
5475 struct macho_segment_command* firstSeg = NULL;
5476 uintptr_t mappingSize = 0;
5477 uintptr_t preferredLoadAddress = 0;
5478 const uint32_t cmd_count = mh->ncmds;
5479 if ( mh->sizeofcmds > 4096 )
5480 return "dyld_sim load commands to large";
5481 if ( (sizeof(macho_header) + mh->sizeofcmds) > 4096 )
5482 return "dyld_sim load commands to large";
5483 struct linkedit_data_command* codeSigCmd = NULL;
5484 const struct load_command* const cmds = (struct load_command*)(((char*)mh)+sizeof(macho_header));
5485 const struct load_command* const endCmds = (struct load_command*)(((char*)mh) + sizeof(macho_header) + mh->sizeofcmds);
5486 const struct load_command* cmd = cmds;
5487 for (uint32_t i = 0; i < cmd_count; ++i) {
5488 uint32_t cmdLength = cmd->cmdsize;
5489 if ( cmdLength < 8 )
5490 return "dyld_sim load command too small";
5491 const struct load_command* const nextCmd = (const struct load_command*)(((char*)cmd)+cmdLength);
5492 if ( (nextCmd > endCmds) || (nextCmd < cmd) )
5493 return "dyld_sim load command too large";
5494 switch (cmd->cmd) {
5495 case LC_SEGMENT_COMMAND:
5496 {
5497 struct macho_segment_command* seg = (struct macho_segment_command*)cmd;
5498 if ( seg->vmaddr + seg->vmsize < seg->vmaddr )
5499 return "dyld_sim seg wraps address space";
5500 if ( seg->vmsize < seg->filesize )
5501 return "dyld_sim seg vmsize too small";
5502 if ( (seg->fileoff + seg->filesize) < seg->fileoff )
5503 return "dyld_sim seg size wraps address space";
5504 if ( lastSeg == NULL ) {
5505 // first segment must be __TEXT and start at beginning of file/slice
5506 firstSeg = seg;
5507 if ( strcmp(seg->segname, "__TEXT") != 0 )
5508 return "dyld_sim first segment not __TEXT";
5509 if ( seg->fileoff != 0 )
5510 return "dyld_sim first segment not at file offset zero";
5511 if ( seg->filesize < (sizeof(macho_header) + mh->sizeofcmds) )
5512 return "dyld_sim first segment smaller than load commands";
5513 preferredLoadAddress = seg->vmaddr;
5514 }
5515 else {
5516 // other sements must be continguous with previous segment and not executable
5517 if ( lastSeg->fileoff + lastSeg->filesize != seg->fileoff )
5518 return "dyld_sim segments not contiguous";
5519 if ( lastSeg->vmaddr + lastSeg->vmsize != seg->vmaddr )
5520 return "dyld_sim segments not address contiguous";
5521 if ( (seg->initprot & VM_PROT_EXECUTE) != 0 )
5522 return "dyld_sim non-first segment is executable";
5523 }
5524 mappingSize += seg->vmsize;
5525 lastSeg = seg;
5526 }
5527 break;
5528 case LC_SEGMENT_COMMAND_WRONG:
5529 return "dyld_sim wrong load segment load command";
5530 case LC_CODE_SIGNATURE:
5531 codeSigCmd = (struct linkedit_data_command*)cmd;
5532 break;
5533 }
5534 cmd = nextCmd;
5535 }
5536 // last segment must be named __LINKEDIT and not writable
5537 if ( lastSeg == NULL )
5538 return "dyld_sim has no segments";
5539 if ( strcmp(lastSeg->segname, "__LINKEDIT") != 0 )
5540 return "dyld_sim last segment not __LINKEDIT";
5541 if ( lastSeg->initprot & VM_PROT_WRITE )
5542 return "dyld_sim __LINKEDIT segment writable";
5543
5544 // must have code signature which is contained within LINKEDIT segment
5545 if ( codeSigCmd == NULL )
5546 return "dyld_sim not code signed";
5547 if ( codeSigCmd->dataoff < lastSeg->fileoff )
5548 return "dyld_sim code signature not in __LINKEDIT";
5549 if ( (codeSigCmd->dataoff + codeSigCmd->datasize) < codeSigCmd->dataoff )
5550 return "dyld_sim code signature size wraps";
5551 if ( (codeSigCmd->dataoff + codeSigCmd->datasize) > (lastSeg->fileoff + lastSeg->filesize) )
5552 return "dyld_sim code signature extends beyond __LINKEDIT";
5553
5554 // register code signature with kernel before mmap()ing segments
5555 fsignatures_t siginfo;
5556 siginfo.fs_file_start=fileOffset; // start of mach-o slice in fat file
5557 siginfo.fs_blob_start=(void*)(long)(codeSigCmd->dataoff); // start of code-signature in mach-o file
5558 siginfo.fs_blob_size=codeSigCmd->datasize; // size of code-signature
5559 int result = fcntl(fd, F_ADDFILESIGS_FOR_DYLD_SIM, &siginfo);
5560 if ( result == -1 ) {
5561 return mkstringf("dyld_sim fcntl(F_ADDFILESIGS_FOR_DYLD_SIM) failed with errno=%d", errno);
5562 }
5563 // file range covered by code signature must extend up to code signature itself
5564 if ( siginfo.fs_file_start < codeSigCmd->dataoff )
5565 return mkstringf("dyld_sim code signature does not cover all of dyld_sim. Signature covers up to 0x%08lX. Signature starts at 0x%08X", (unsigned long)siginfo.fs_file_start, codeSigCmd->dataoff);
5566
5567 // reserve space, then mmap each segment
5568 vm_address_t loadAddress = 0;
5569 if ( ::vm_allocate(mach_task_self(), &loadAddress, mappingSize, VM_FLAGS_ANYWHERE) != 0 )
5570 return "dyld_sim cannot allocate space";
5571 cmd = cmds;
5572 struct source_version_command* dyldVersionCmd = NULL;
5573 struct uuid_command* uuidCmd = NULL;
5574 for (uint32_t i = 0; i < cmd_count; ++i) {
5575 switch (cmd->cmd) {
5576 case LC_SEGMENT_COMMAND:
5577 {
5578 struct macho_segment_command* seg = (struct macho_segment_command*)cmd;
5579 uintptr_t requestedLoadAddress = seg->vmaddr - preferredLoadAddress + loadAddress;
5580 void* segAddress = ::mmap((void*)requestedLoadAddress, seg->filesize, seg->initprot, MAP_FIXED | MAP_PRIVATE, fd, fileOffset + seg->fileoff);
5581 //dyld::log("dyld_sim %s mapped at %p\n", seg->segname, segAddress);
5582 if ( segAddress == (void*)(-1) )
5583 return "dyld_sim mmap() of segment failed";
5584 if ( ((uintptr_t)segAddress < loadAddress) || ((uintptr_t)segAddress+seg->filesize > loadAddress+mappingSize) )
5585 return "dyld_sim mmap() to wrong location";
5586 }
5587 break;
5588 case LC_SOURCE_VERSION:
5589 dyldVersionCmd = (struct source_version_command*)cmd;
5590 break;
5591 case LC_UUID: {
5592 uuidCmd = (uuid_command*)cmd;
5593 break;
5594 }
5595 }
5596 cmd = (const struct load_command*)(((char*)cmd)+cmd->cmdsize);
5597 }
5598 close(fd);
5599
5600 // Walk newly mapped dyld_sim load commands to find entry point
5601 uintptr_t entry = 0;
5602 bool unusedUsesCRT = false;
5603 uint64_t entryOffset = 0;
5604 if ( !((dyld3::MachOAnalyzer*)loadAddress)->getEntry(entryOffset, unusedUsesCRT) ) {
5605 return "dyld_sim entry not found";
5606 }
5607
5608 // Translate the load address by the entry offset in order to get the runtime address.
5609 entry = (uintptr_t)loadAddress;
5610 entry += entryOffset;
5611
5612 #if __arm64e__
5613 // It's necessary to sign the entry pointer.
5614 entry = (uint64_t)__builtin_ptrauth_sign_unauthenticated((void*)entry, ptrauth_key_asia, 0);
5615 #endif
5616
5617 // notify debugger that dyld_sim is loaded
5618 dyld_image_info info;
5619 info.imageLoadAddress = (mach_header*)loadAddress;
5620 info.imageFilePath = strdup(dyldPath);
5621 info.imageFileModDate = sb.st_mtime;
5622 addImagesToAllImages(1, &info);
5623 dyld::gProcessInfo->notification(dyld_image_adding, 1, &info);
5624
5625 fsid_t fsid = {{0, 0}};
5626 fsobj_id_t fsobj = {0};
5627 ino_t inode = sb.st_ino;
5628 fsobj.fid_objno = (uint32_t)inode;
5629 fsobj.fid_generation = (uint32_t)(inode>>32);
5630 fsid.val[0] = sb.st_dev;
5631 dyld3::kdebug_trace_dyld_image(DBG_DYLD_UUID_MAP_A, dyldPath, (const uuid_t *)&uuidCmd->uuid[0], fsobj, fsid, (const mach_header *)loadAddress);
5632
5633 const char** appleParams = apple;
5634
5635 // <rdar://problem/5077374> have host dyld detach macOS shared cache from process before jumping into dyld_sim
5636 dyld3::deallocateExistingSharedCache();
5637
5638 // jump into new simulator dyld
5639 typedef uintptr_t (*sim_entry_proc_t)(int argc, const char* argv[], const char* envp[], const char* apple[],
5640 const macho_header* mainExecutableMH, const macho_header* dyldMH, uintptr_t dyldSlide,
5641 const dyld::SyscallHelpers* vtable, uintptr_t* startGlue);
5642 sim_entry_proc_t newDyld = (sim_entry_proc_t)entry;
5643 *mainAddr = (*newDyld)(argc, argv, envp, appleParams, mainExecutableMH, (macho_header*)loadAddress,
5644 loadAddress - preferredLoadAddress,
5645 &sSysCalls, startGlue);
5646 return NULL;
5647 }
5648 #endif
5649
5650 //
5651 // If the DYLD_SKIP_MAIN environment is set to 1, dyld will return the
5652 // address of this function instead of main() in the target program which
5653 // __dyld_start jumps to. Useful for qualifying dyld itself.
5654 //
5655 int
5656 fake_main()
5657 {
5658 return 0;
5659 }
5660
5661
5662
5663 #if !TARGET_OS_SIMULATOR
5664
5665 static bool envVarMatches(const dyld3::closure::LaunchClosure* mainClosure, const char* envp[], const char* varName)
5666 {
5667 __block const char* valueFromClosure = nullptr;
5668 mainClosure->forEachEnvVar(^(const char* keyEqualValue, bool& stop) {
5669 size_t keyLen = strlen(varName);
5670 if ( (strncmp(varName, keyEqualValue, keyLen) == 0) && (keyEqualValue[keyLen] == '=') ) {
5671 valueFromClosure = &keyEqualValue[keyLen+1];
5672 stop = true;
5673 }
5674 });
5675
5676 const char* valueFromEnv = _simple_getenv(envp, varName);
5677
5678 bool inClosure = (valueFromClosure != nullptr);
5679 bool inEnv = (valueFromEnv != nullptr);
5680 if ( inClosure != inEnv )
5681 return false;
5682 if ( !inClosure && !inEnv )
5683 return true;
5684 return ( strcmp(valueFromClosure, valueFromEnv) == 0 );
5685 }
5686
5687 static const char* const sEnvVarsToCheck[] = {
5688 "DYLD_LIBRARY_PATH",
5689 "DYLD_FRAMEWORK_PATH",
5690 "DYLD_FALLBACK_LIBRARY_PATH",
5691 "DYLD_FALLBACK_FRAMEWORK_PATH",
5692 "DYLD_INSERT_LIBRARIES",
5693 "DYLD_IMAGE_SUFFIX",
5694 "DYLD_VERSIONED_FRAMEWORK_PATH",
5695 "DYLD_VERSIONED_LIBRARY_PATH",
5696 "DYLD_ROOT_PATH"
5697 };
5698
5699 static bool envVarsMatch(const dyld3::closure::LaunchClosure* mainClosure, const char* envp[])
5700 {
5701 for (const char* envVar : sEnvVarsToCheck) {
5702 if ( !envVarMatches(mainClosure, envp, envVar) ) {
5703 if ( gLinkContext.verboseWarnings )
5704 dyld::log("dyld: closure %p not used because %s changed\n", mainClosure, envVar);
5705 return false;
5706 }
5707 }
5708
5709 // FIXME: dyld3 doesn't support versioned paths so we need to fall back to dyld2 if we have them.
5710 // <rdar://problem/37004660> dyld3: support DYLD_VERSIONED_*_PATHs ?
5711 if ( sEnv.DYLD_VERSIONED_LIBRARY_PATH != nullptr ) {
5712 if ( gLinkContext.verboseWarnings )
5713 dyld::log("dyld: closure %p not used because DYLD_VERSIONED_LIBRARY_PATH used\n", mainClosure);
5714 return false;
5715 }
5716 if ( sEnv.DYLD_VERSIONED_FRAMEWORK_PATH != nullptr ) {
5717 if ( gLinkContext.verboseWarnings )
5718 dyld::log("dyld: closure %p not used because DYLD_VERSIONED_FRAMEWORK_PATH used\n", mainClosure);
5719 return false;
5720 }
5721
5722 return true;
5723 }
5724
5725 static bool closureValid(const dyld3::closure::LaunchClosure* mainClosure, const dyld3::closure::LoadedFileInfo& mainFileInfo,
5726 const uint8_t* mainExecutableCDHash, bool closureInCache, const char* envp[])
5727 {
5728 if ( closureInCache ) {
5729 // We can only use the cache closure if the cache version is the same as dyld
5730 if (sSharedCacheLoadInfo.loadAddress->header.formatVersion != dyld3::closure::kFormatVersion) {
5731 if ( gLinkContext.verboseWarnings )
5732 dyld::log("dyld: dyld closure version 0x%08X does not match dyld cache version 0x%08X\n",
5733 dyld3::closure::kFormatVersion, sSharedCacheLoadInfo.loadAddress->header.formatVersion);
5734 return false;
5735 }
5736 if (sForceInvalidSharedCacheClosureFormat) {
5737 if ( gLinkContext.verboseWarnings )
5738 dyld::log("dyld: closure %p dyld cache version forced invalid\n", mainClosure);
5739 return false;
5740 }
5741 } else {
5742 // verify current dyld cache is same as expected
5743 uuid_t expectedCacheUUID;
5744 if ( mainClosure->builtAgainstDyldCache(expectedCacheUUID) ) {
5745 if ( sSharedCacheLoadInfo.loadAddress == nullptr ) {
5746 if ( gLinkContext.verboseWarnings )
5747 dyld::log("dyld: closure %p dyld cache not loaded\n", mainClosure);
5748 return false;
5749 }
5750 else {
5751 uuid_t actualCacheUUID;
5752 sSharedCacheLoadInfo.loadAddress->getUUID(actualCacheUUID);
5753 if ( memcmp(expectedCacheUUID, actualCacheUUID, sizeof(uuid_t)) != 0 ) {
5754 if ( gLinkContext.verboseWarnings )
5755 dyld::log("dyld: closure %p not used because built against different dyld cache\n", mainClosure);
5756 return false;
5757 }
5758 }
5759 }
5760 else {
5761 // closure built assume there is no dyld cache
5762 if ( sSharedCacheLoadInfo.loadAddress != nullptr ) {
5763 if ( gLinkContext.verboseWarnings )
5764 dyld::log("dyld: closure %p built expecting no dyld cache\n", mainClosure);
5765 return false;
5766 }
5767 }
5768 }
5769
5770 // verify all mach-o files have not changed since closure was built
5771 __block bool foundFileThatInvalidatesClosure = false;
5772 mainClosure->images()->forEachImage(^(const dyld3::closure::Image* image, bool& stop) {
5773 __block uint64_t expectedInode;
5774 __block uint64_t expectedMtime;
5775 if ( image->hasFileModTimeAndInode(expectedInode, expectedMtime) ) {
5776 struct stat statBuf;
5777 if ( dyld3::stat(image->path(), &statBuf) == 0 ) {
5778 if ( (statBuf.st_mtime != expectedMtime) || (statBuf.st_ino != expectedInode) ) {
5779 if ( gLinkContext.verboseWarnings )
5780 dyld::log("dyld: closure %p not used because mtime/inode for '%s' has changed since closure was built\n", mainClosure, image->path());
5781 foundFileThatInvalidatesClosure = true;
5782 stop = true;
5783 }
5784 }
5785 else {
5786 if ( gLinkContext.verboseWarnings )
5787 dyld::log("dyld: closure %p not used because '%s' is needed by closure but is missing\n", mainClosure, image->path());
5788 foundFileThatInvalidatesClosure = true;
5789 stop = true;
5790 }
5791 }
5792 });
5793 if ( foundFileThatInvalidatesClosure )
5794 return false;
5795
5796 // verify cdHash of main executable is same as recorded in closure
5797 const dyld3::closure::Image* mainImage = mainClosure->topImage();
5798
5799 __block bool foundCDHash = false;
5800 __block bool foundValidCDHash = false;
5801 mainImage->forEachCDHash(^(const uint8_t *expectedHash, bool& stop) {
5802 if ( mainExecutableCDHash == nullptr ) {
5803 if ( gLinkContext.verboseWarnings )
5804 dyld::log("dyld: closure %p not used because main executable is not code signed but was expected to be\n", mainClosure);
5805 stop = true;
5806 return;
5807 }
5808 foundCDHash = true;
5809 if ( memcmp(mainExecutableCDHash, expectedHash, 20) == 0 ) {
5810 // found a match, so lets use this one.
5811 foundValidCDHash = true;
5812 stop = true;
5813 return;
5814 }
5815 });
5816
5817 // If we found cd hashes, but they were all invalid, then print them out
5818 if ( foundCDHash && !foundValidCDHash ) {
5819 auto getCDHashString = [](const uint8_t cdHash[20], char* cdHashBuffer) {
5820 for (int i=0; i < 20; ++i) {
5821 uint8_t byte = cdHash[i];
5822 uint8_t nibbleL = byte & 0x0F;
5823 uint8_t nibbleH = byte >> 4;
5824 if ( nibbleH < 10 ) {
5825 *cdHashBuffer = '0' + nibbleH;
5826 ++cdHashBuffer;
5827 } else {
5828 *cdHashBuffer = 'a' + (nibbleH-10);
5829 ++cdHashBuffer;
5830 }
5831 if ( nibbleL < 10 ) {
5832 *cdHashBuffer = '0' + nibbleL;
5833 ++cdHashBuffer;
5834 } else {
5835 *cdHashBuffer = 'a' + (nibbleL-10);
5836 ++cdHashBuffer;
5837 }
5838 }
5839 };
5840 if ( gLinkContext.verboseWarnings ) {
5841 mainImage->forEachCDHash(^(const uint8_t *expectedHash, bool &stop) {
5842 char mainExecutableCDHashBuffer[128] = { '\0' };
5843 char expectedCDHashBuffer[128] = { '\0' };
5844
5845 getCDHashString(mainExecutableCDHash, mainExecutableCDHashBuffer);
5846 getCDHashString(expectedHash, expectedCDHashBuffer);
5847
5848 dyld::log("dyld: closure %p not used because main executable cd-hash (%s) changed since closure was built with (%s)\n",
5849 mainClosure, mainExecutableCDHashBuffer, expectedCDHashBuffer);
5850 });
5851 }
5852
5853 return false;
5854 }
5855
5856 // verify UUID of main executable is same as recorded in closure
5857 uuid_t expectedUUID;
5858 bool hasExpect = mainImage->getUuid(expectedUUID);
5859 uuid_t actualUUID;
5860 const dyld3::MachOLoaded* mainExecutableMH = (const dyld3::MachOLoaded*)mainFileInfo.fileContent;
5861 bool hasActual = mainExecutableMH->getUuid(actualUUID);
5862 if ( hasExpect != hasActual ) {
5863 if ( gLinkContext.verboseWarnings )
5864 dyld::log("dyld: closure %p not used because UUID of executable changed since closure was built\n", mainClosure);
5865 return false;
5866 }
5867 if ( hasExpect && hasActual && memcmp(actualUUID, expectedUUID, sizeof(uuid_t)) != 0 ) {
5868 if ( gLinkContext.verboseWarnings )
5869 dyld::log("dyld: closure %p not used because UUID of executable changed since closure was built\n", mainClosure);
5870 return false;
5871 }
5872
5873 // verify DYLD_* env vars are same as when closure was built
5874 if ( !envVarsMatch(mainClosure, envp) ) {
5875 return false;
5876 }
5877
5878 // verify files that are supposed to be missing actually are missing
5879 mainClosure->forEachMustBeMissingFile(^(const char* path, bool& stop) {
5880 struct stat statBuf;
5881 if ( dyld3::stat(path, &statBuf) == 0 ) {
5882 stop = true;
5883 foundFileThatInvalidatesClosure = true;
5884 if ( gLinkContext.verboseWarnings )
5885 dyld::log("dyld: closure %p not used because found unexpected file '%s'\n", mainClosure, path);
5886 }
5887 });
5888
5889 // verify files that are supposed to exist are there with the
5890 mainClosure->forEachSkipIfExistsFile(^(const dyld3::closure::LaunchClosure::SkippedFile &file, bool &stop) {
5891 struct stat statBuf;
5892 if ( dyld3::stat(file.path, &statBuf) == 0 ) {
5893 if ( (statBuf.st_mtime != file.mtime) || (statBuf.st_ino != file.inode) ) {
5894 if ( gLinkContext.verboseWarnings )
5895 dyld::log("dyld: closure %p not used because mtime/inode for '%s' has changed since closure was built\n", mainClosure, file.path);
5896 foundFileThatInvalidatesClosure = true;
5897 stop = true;
5898 }
5899 }
5900 });
5901
5902 // verify closure did not require anything unavailable
5903 if ( mainClosure->usedAtPaths() && !gLinkContext.allowAtPaths ) {
5904 if ( gLinkContext.verboseWarnings )
5905 dyld::log("dyld: closure %p not used because is used @paths, but process does not allow that\n", mainClosure);
5906 return false;
5907 }
5908 if ( mainClosure->usedFallbackPaths() && !gLinkContext.allowClassicFallbackPaths ) {
5909 if ( gLinkContext.verboseWarnings )
5910 dyld::log("dyld: closure %p not used because is used default fallback paths, but process does not allow that\n", mainClosure);
5911 return false;
5912 }
5913 if ( mainClosure->usedInterposing() && !gLinkContext.allowInterposing ) {
5914 if ( gLinkContext.verboseWarnings )
5915 dyld::log("dyld: closure %p not used because is uses interposing, but process does not allow that\n", mainClosure);
5916 return false;
5917 }
5918 return !foundFileThatInvalidatesClosure;
5919 }
5920
5921 static bool nolog(const char* format, ...)
5922 {
5923 return false;
5924 }
5925
5926 static bool dolog(const char* format, ...)
5927 {
5928 va_list list;
5929 va_start(list, format);
5930 vlog(format, list);
5931 va_end(list);
5932 return true;
5933 }
5934
5935 static bool launchWithClosure(const dyld3::closure::LaunchClosure* mainClosure,
5936 const DyldSharedCache* dyldCache,
5937 const dyld3::MachOLoaded* mainExecutableMH, uintptr_t mainExecutableSlide,
5938 int argc, const char* argv[], const char* envp[], const char* apple[], Diagnostics& diag,
5939 uintptr_t* entry, uintptr_t* startGlue, bool* closureOutOfDate, bool* recoverable)
5940 {
5941 *closureOutOfDate = false;
5942 *recoverable = true;
5943
5944 // build list of all known ImageArrays (at most three: cached dylibs, other OS dylibs, and main prog)
5945 STACK_ALLOC_ARRAY(const dyld3::closure::ImageArray*, imagesArrays, 3);
5946 const dyld3::closure::ImageArray* mainClosureImages = mainClosure->images();
5947 if ( dyldCache != nullptr ) {
5948 imagesArrays.push_back(dyldCache->cachedDylibsImageArray());
5949 if ( auto others = dyldCache->otherOSImageArray() )
5950 imagesArrays.push_back(others);
5951 }
5952 imagesArrays.push_back(mainClosureImages);
5953
5954 // allocate space for Array<LoadedImage>
5955 STACK_ALLOC_ARRAY(dyld3::LoadedImage, allImages, mainClosure->initialLoadCount());
5956 STACK_ALLOC_ARRAY(dyld3::LoadedImage, noImages, 1);
5957
5958 // Get the pre-optimized Objective-C so that we can bind the selectors
5959 const dyld3::closure::ObjCSelectorOpt* selectorOpt = nullptr;
5960 dyld3::Array<dyld3::closure::Image::ObjCSelectorImage> selectorImages;
5961 mainClosure->selectorHashTable(selectorImages, selectorOpt);
5962
5963 __block dyld3::Loader loader(noImages, allImages, dyldCache, imagesArrays,
5964 selectorOpt, selectorImages, sRootsChecker,
5965 (dyld3::Platform)gProcessInfo->platform,
5966 (gLinkContext.verboseLoading ? &dolog : &nolog),
5967 (gLinkContext.verboseMapping ? &dolog : &nolog),
5968 (gLinkContext.verboseBind ? &dolog : &nolog),
5969 (gLinkContext.verboseDOF ? &dolog : &nolog),
5970 (sClosureKind == ClosureKind::minimal),
5971 (dyld3::LaunchErrorInfo*)&gProcessInfo->errorKind);
5972 dyld3::closure::ImageNum mainImageNum = mainClosure->topImageNum();
5973 mainClosureImages->forEachImage(^(const dyld3::closure::Image* image, bool& stop) {
5974 if ( image->imageNum() == mainImageNum ) {
5975 // add main executable (which is already mapped by kernel) to list
5976 dyld3::LoadedImage mainLoadedImage = dyld3::LoadedImage::make(image, mainExecutableMH);
5977 mainLoadedImage.setState(dyld3::LoadedImage::State::mapped);
5978 mainLoadedImage.markLeaveMapped();
5979 loader.addImage(mainLoadedImage);
5980 stop = true;
5981 }
5982 else {
5983 // add inserted library to initial list
5984 loader.addImage(dyld3::LoadedImage::make(image));
5985 }
5986 });
5987
5988 // recursively load all dependents and fill in allImages array
5989 bool someCacheImageOverridden = false;
5990 loader.completeAllDependents(diag, someCacheImageOverridden);
5991 if ( diag.noError() )
5992 loader.mapAndFixupAllImages(diag, dyld3::Loader::dtraceUserProbesEnabled(), false, closureOutOfDate, recoverable);
5993 if ( diag.hasError() ) {
5994 if ( gLinkContext.verboseWarnings )
5995 dyld::log("dyld: %s\n", diag.errorMessage());
5996 if ( !*recoverable ) {
5997 // we won't make it to libDyldEntry, so the image list will never be set up
5998 // hack together an image list here so crash reports show the binaries involved
5999 __block unsigned loadImageCount = 0;
6000 loader.forEachImage(^(const dyld3::LoadedImage& li, bool& stop) {
6001 ++loadImageCount;
6002 });
6003 dyld_image_info* tempArray = new dyld_image_info[loadImageCount];
6004 __block unsigned i = 0;
6005 loader.forEachImage(^(const dyld3::LoadedImage& li, bool& stop) {
6006 tempArray[i].imageFilePath = li.image()->path();
6007 tempArray[i].imageLoadAddress = li.loadedAddress();
6008 tempArray[i].imageFileModDate = 0;
6009 ++i;
6010 });
6011 dyld::gProcessInfo->infoArray = tempArray;
6012 dyld::gProcessInfo->infoArrayCount = loadImageCount;
6013 dyld::gProcessInfo->initialImageCount= loadImageCount;
6014 dyld::gProcessInfo->infoArrayChangeTimestamp = mach_absolute_time();
6015 }
6016 return false;
6017 }
6018
6019 //dyld::log("loaded image list:\n");
6020 //for (const dyld3::LoadedImage& info : allImages) {
6021 // dyld::log("mh=%p, path=%s\n", info.loadedAddress(), info.image()->path());
6022 //}
6023
6024 // find libdyld entry
6025 dyld3::closure::Image::ResolvedSymbolTarget dyldEntry;
6026 mainClosure->libDyldEntry(dyldEntry);
6027 const dyld3::LibDyldEntryVector* libDyldEntry = (dyld3::LibDyldEntryVector*)loader.resolveTarget(dyldEntry);
6028
6029 // send info on all images to libdyld.dylb
6030 libDyldEntry->setVars(mainExecutableMH, argc, argv, envp, apple, sKeysDisabled, sOnlyPlatformArm64e);
6031 #if TARGET_OS_OSX
6032 uint32_t progVarsOffset;
6033 if ( mainClosure->hasProgramVars(progVarsOffset) ) {
6034 if ( libDyldEntry->vectorVersion >= 8 ) {
6035 // main executable contains globals to hold argc, argv, envp, and progname, but they need to be filled in
6036 ProgramVars* vars = (ProgramVars*)((uint8_t*)mainExecutableMH + progVarsOffset);
6037 *vars->NXArgcPtr = argc;
6038 *vars->NXArgvPtr = argv;
6039 *vars->environPtr = envp;
6040 *vars->__prognamePtr = (argv[0] != NULL) ? basename(argv[0]) : "";
6041 // set up so libSystem gets ProgramVars struct embedded in main executable
6042 libDyldEntry->setProgramVars(vars);
6043 }
6044 }
6045 #endif
6046 if ( libDyldEntry->vectorVersion > 4 )
6047 libDyldEntry->setRestrictions(gLinkContext.allowAtPaths, gLinkContext.allowEnvVarsPath, gLinkContext.allowClassicFallbackPaths);
6048 libDyldEntry->setHaltFunction(&halt);
6049 if ( libDyldEntry->vectorVersion > 5 ) {
6050 libDyldEntry->setNotifyMonitoringDyldMain(&notifyMonitoringDyldMain);
6051 libDyldEntry->setNotifyMonitoringDyld(&notifyMonitoringDyld);
6052 }
6053
6054 if ( libDyldEntry->vectorVersion > 6 )
6055 libDyldEntry->setHasCacheOverrides(someCacheImageOverridden);
6056
6057 if ( libDyldEntry->vectorVersion > 2 )
6058 libDyldEntry->setChildForkFunction(&_dyld_fork_child);
6059 #if !TARGET_OS_SIMULATOR
6060 if ( libDyldEntry->vectorVersion > 3 )
6061 libDyldEntry->setLogFunction(&dyld::vlog);
6062 #endif
6063 if ( libDyldEntry->vectorVersion >= 9 )
6064 libDyldEntry->setLaunchMode(sLaunchModeUsed);
6065
6066
6067 libDyldEntry->setOldAllImageInfo(gProcessInfo);
6068 dyld3::LoadedImage* libSys = loader.findImage(mainClosure->libSystemImageNum());
6069 libDyldEntry->setInitialImageList(mainClosure, dyldCache, sSharedCacheLoadInfo.path, allImages, *libSys);
6070 // run initializers
6071 CRSetCrashLogMessage("dyld3: launch, running initializers");
6072 libDyldEntry->runInitialzersBottomUp((mach_header*)mainExecutableMH);
6073 //dyld::log("returned from runInitialzersBottomUp()\n");
6074
6075 if (dyld3::kdebug_trace_dyld_enabled(DBG_DYLD_TIMING_LAUNCH_EXECUTABLE)) {
6076 dyld3::kdebug_trace_dyld_duration_end(launchTraceID, DBG_DYLD_TIMING_LAUNCH_EXECUTABLE, 0, 0, 3);
6077 }
6078 #if TARGET_OS_OSX
6079 if ( gLinkContext.driverKit ) {
6080 if (libDyldEntry->vectorVersion >= 10)
6081 *entry = (uintptr_t)libDyldEntry->getDriverkitMain();
6082 if ( *entry == 0 )
6083 halt("no entry point registered");
6084 if ( sClosureKind != ClosureKind::minimal )
6085 halt("driverkit process should run with minimal closures");
6086 *startGlue = (uintptr_t)(libDyldEntry->startFunc);
6087 }
6088 else
6089 #endif
6090 {
6091 dyld3::closure::Image::ResolvedSymbolTarget progEntry;
6092 if ( mainClosure->mainEntry(progEntry) ) {
6093 // modern app with LC_MAIN
6094 // set startGlue to "start" function in libdyld.dylib
6095 // set entry to "main" function in program
6096 *startGlue = (uintptr_t)(libDyldEntry->startFunc);
6097 *entry = loader.resolveTarget(progEntry);
6098 #if __has_feature(ptrauth_calls)
6099 // start() calls the result pointer as a function pointer so we need to sign it.
6100 *entry = (uintptr_t)__builtin_ptrauth_sign_unauthenticated((void*)*entry, 0, 0);
6101 #endif
6102 }
6103 else if ( mainClosure->startEntry(progEntry) ) {
6104 // old style app linked with crt1.o
6105 // entry is "start" function in program
6106 *startGlue = 0;
6107 *entry = loader.resolveTarget(progEntry);
6108 }
6109 else {
6110 assert(0);
6111 }
6112 }
6113 CRSetCrashLogMessage("dyld3 mode");
6114 return true;
6115 }
6116
6117
6118 static const dyld3::closure::LaunchClosure* mapClosureFile(const char* closurePath)
6119 {
6120 struct stat statbuf;
6121 if ( dyld3::stat(closurePath, &statbuf) == -1 )
6122 return nullptr;
6123
6124 // check for tombstone file
6125 if ( statbuf.st_size == 0 )
6126 return nullptr;
6127
6128 int fd = dyld3::open(closurePath, O_RDONLY, 0);
6129 if ( fd < 0 )
6130 return nullptr;
6131
6132 const dyld3::closure::LaunchClosure* closure = (dyld3::closure::LaunchClosure*)::mmap(NULL, (size_t)statbuf.st_size, PROT_READ, MAP_PRIVATE, fd, 0);
6133 ::close(fd);
6134
6135 if ( closure == MAP_FAILED )
6136 return nullptr;
6137
6138 return closure;
6139 }
6140
6141 static bool needsDyld2ErrorMessage(const char* msg)
6142 {
6143 if ( strcmp(msg, "lazy bind opcodes missing binds") == 0 )
6144 return true;
6145 return false;
6146 }
6147
6148 // Note: buildLaunchClosure calls halt() if there is an error building the closure
6149 static const dyld3::closure::LaunchClosure* buildLaunchClosure(const uint8_t* mainExecutableCDHash,
6150 const dyld3::closure::LoadedFileInfo& mainFileInfo,
6151 const char* envp[],
6152 const dyld3::Array<uint8_t>& bootToken)
6153 {
6154 const dyld3::MachOLoaded* mainExecutableMH = (const dyld3::MachOLoaded*)mainFileInfo.fileContent;
6155 dyld3::closure::PathOverrides pathOverrides;
6156 pathOverrides.setFallbackPathHandling(gLinkContext.allowClassicFallbackPaths ? dyld3::closure::PathOverrides::FallbackPathMode::classic : dyld3::closure::PathOverrides::FallbackPathMode::restricted);
6157 pathOverrides.setEnvVars(envp, mainExecutableMH, mainFileInfo.path);
6158 STACK_ALLOC_ARRAY(const dyld3::closure::ImageArray*, imagesArrays, 3);
6159 if ( sSharedCacheLoadInfo.loadAddress != nullptr ) {
6160 imagesArrays.push_back(sSharedCacheLoadInfo.loadAddress->cachedDylibsImageArray());
6161 if ( auto others = sSharedCacheLoadInfo.loadAddress->otherOSImageArray() )
6162 imagesArrays.push_back(others);
6163 }
6164
6165 char closurePath[PATH_MAX];
6166 bool canSaveClosureToDisk = !bootToken.empty() && dyld3::closure::LaunchClosure::buildClosureCachePath(mainFileInfo.path, envp, true, closurePath);
6167 dyld3::LaunchErrorInfo* errorInfo = (dyld3::LaunchErrorInfo*)&gProcessInfo->errorKind;
6168 const dyld3::GradedArchs& archs = dyld3::GradedArchs::forCurrentOS(sKeysDisabled, sOnlyPlatformArm64e);
6169 dyld3::closure::FileSystemPhysical fileSystem;
6170 dyld3::closure::ClosureBuilder::AtPath atPathHanding = (gLinkContext.allowAtPaths ? dyld3::closure::ClosureBuilder::AtPath::all : dyld3::closure::ClosureBuilder::AtPath::none);
6171 dyld3::closure::ClosureBuilder builder(dyld3::closure::kFirstLaunchClosureImageNum, fileSystem, sRootsChecker, sSharedCacheLoadInfo.loadAddress, true,
6172 archs, pathOverrides, atPathHanding, gLinkContext.allowEnvVarsPath, errorInfo, (dyld3::Platform)gProcessInfo->platform);
6173 if (sForceInvalidSharedCacheClosureFormat)
6174 builder.setDyldCacheInvalidFormatVersion();
6175 if (sClosureKind == ClosureKind::minimal)
6176 builder.makeMinimalClosures();
6177 else if ( canSaveClosureToDisk )
6178 builder.setCanSkipEncodingRebases(); // <rdar://problem/56172089> large iOS apps with massive number of rebases can overflow 16MB closure file limit
6179 if ( !gLinkContext.allowInterposing )
6180 builder.disableInterposing();
6181
6182 const dyld3::closure::LaunchClosure* result = builder.makeLaunchClosure(mainFileInfo, gLinkContext.allowInsertFailures);
6183 if ( builder.diagnostics().hasError() ) {
6184 const char* errMsg = builder.diagnostics().errorMessage();
6185 // let apps with this error fallback to dyld2 mode
6186 if ( needsDyld2ErrorMessage(errMsg) ) {
6187 if ( canSaveClosureToDisk ) {
6188 // create empty file as a tombstone to not keep trying
6189 int fd = dyld3::open(closurePath, O_WRONLY|O_CREAT, S_IRUSR|S_IWUSR);
6190 if ( fd != -1 ) {
6191 ::fchmod(fd, S_IRUSR);
6192 ::close(fd);
6193 if ( gLinkContext.verboseWarnings )
6194 dyld::log("dyld: just built tombstone closure for %s\n", sExecPath);
6195 // We only care about closure failures that do not also cause dyld2 to fail, so defer logging
6196 // until after dyld2 has tried to launch the binary
6197 sLogClosureFailure = true;
6198 }
6199 }
6200 return nullptr;
6201 }
6202 // terminate process
6203 halt(errMsg);
6204 }
6205
6206 if ( result == nullptr )
6207 return nullptr;
6208
6209 if ( !closureValid(result, mainFileInfo, mainExecutableCDHash, false, envp) ) {
6210 // some how the freshly generated closure is invalid...
6211 result->deallocate();
6212 if ( gLinkContext.verboseWarnings )
6213 dyld::log("dyld: somehow just built closure is invalid\n");
6214 return nullptr;
6215 }
6216
6217 // write closure file but only if we have boot-token
6218 if ( canSaveClosureToDisk ) {
6219 if ( const dyld3::closure::LaunchClosure* existingClosure = mapClosureFile(closurePath) ) {
6220 if ( (existingClosure->size() == result->size()) && (memcmp(existingClosure, result, result->size()) == 0) ) {
6221 // closure file already exists and has same content, so re-use file by altering boot-token
6222 ::chmod(closurePath, S_IRUSR|S_IWUSR); // file has to be writable to alter attributes
6223 // handle both attribute size change and missing attribute
6224 if ( ::setxattr(closurePath, DYLD_CLOSURE_XATTR_NAME, bootToken.begin(), bootToken.count(), 0, XATTR_REPLACE) != 0 )
6225 ::setxattr(closurePath, DYLD_CLOSURE_XATTR_NAME, bootToken.begin(), bootToken.count(), 0, 0);
6226 ::chmod(closurePath, S_IRUSR);
6227 result->deallocate();
6228 if ( gLinkContext.verboseWarnings )
6229 dyld::log("dyld: reusing previous boot %s closure %p (size=%lu) for %s\n", existingClosure->topImage()->variantString(), existingClosure, existingClosure->size(), sExecPath);
6230 return existingClosure;
6231 }
6232 }
6233 // make new file
6234 char closurePathTemp[PATH_MAX];
6235 strlcpy(closurePathTemp, closurePath, PATH_MAX);
6236 int mypid = getpid();
6237 char pidBuf[16];
6238 char* s = pidBuf;
6239 *s++ = '.';
6240 putHexByte(mypid >> 24, s);
6241 putHexByte(mypid >> 16, s);
6242 putHexByte(mypid >> 8, s);
6243 putHexByte(mypid, s);
6244 *s = '\0';
6245 strlcat(closurePathTemp, pidBuf, PATH_MAX);
6246 #if TARGET_OS_OSX
6247 int fd = dyld3::open(closurePathTemp, O_WRONLY|O_CREAT, S_IRUSR|S_IWUSR);
6248 #else
6249 int fd = ::open_dprotected_np(closurePathTemp, O_WRONLY|O_CREAT, PROTECTION_CLASS_D, 0, S_IRUSR|S_IWUSR);
6250 #endif
6251 if ( fd != -1 ) {
6252 ::ftruncate(fd, result->size());
6253 ::write(fd, result, result->size());
6254 ::fsetxattr(fd, DYLD_CLOSURE_XATTR_NAME, bootToken.begin(), bootToken.count(), 0, 0);
6255 ::fchmod(fd, S_IRUSR);
6256 ::close(fd);
6257 ::rename(closurePathTemp, closurePath);
6258 // free built closure and mmap file() to reduce dirty memory
6259 result->deallocate();
6260 result = mapClosureFile(closurePath);
6261 sLaunchModeUsed |= DYLD_LAUNCH_MODE_CLOSURE_SAVED_TO_FILE;
6262 }
6263 else if ( gLinkContext.verboseWarnings ) {
6264 dyld::log("could not save closure (errno=%d) to: %s\n", errno, closurePathTemp);
6265 }
6266 }
6267
6268 if ( gLinkContext.verboseWarnings )
6269 dyld::log("dyld: just built %s closure %p (size=%lu) for %s\n", result->topImage()->variantString(), result, result->size(), sExecPath);
6270
6271 return result;
6272 }
6273
6274 static const dyld3::closure::LaunchClosure* findCachedLaunchClosure(const uint8_t* mainExecutableCDHash,
6275 const dyld3::closure::LoadedFileInfo& mainFileInfo,
6276 const char* envp[],
6277 const dyld3::Array<uint8_t>& bootToken)
6278 {
6279 // get path to where closure file will be store for this program
6280 char closurePath[PATH_MAX];
6281 if ( !dyld3::closure::LaunchClosure::buildClosureCachePath(mainFileInfo.path, envp, false, closurePath) ) {
6282 // if cannot construct path to use/store closure file, then use minimal closures
6283 if ( sClosureKind == ClosureKind::unset )
6284 sClosureKind = ClosureKind::minimal;
6285 return nullptr;
6286 }
6287
6288 // if file exists, but extended attribute is wrong, ignore file (might be re-used later)
6289 if ( bootToken.empty() )
6290 return nullptr;
6291 uint8_t filesBootToken[bootToken.count()];
6292 ssize_t attrSize = ::getxattr(closurePath, DYLD_CLOSURE_XATTR_NAME, filesBootToken, bootToken.count(), 0, 0);
6293 if ( attrSize != bootToken.count() )
6294 return nullptr;
6295 if ( memcmp(bootToken.begin(), filesBootToken, bootToken.count()) != 0 )
6296 return nullptr;
6297
6298 const dyld3::closure::LaunchClosure* closure = mapClosureFile(closurePath);
6299 if ( closure == nullptr )
6300 return nullptr;
6301
6302 if ( !closureValid(closure, mainFileInfo, mainExecutableCDHash, false, envp) ) {
6303 ::munmap((void*)closure, closure->size());
6304 return nullptr;
6305 }
6306
6307 if ( gLinkContext.verboseWarnings )
6308 dyld::log("dyld: used cached %s closure %p (size=%lu) for %s\n", closure->topImage()->variantString(), closure, closure->size(), sExecPath);
6309
6310 return closure;
6311 }
6312
6313 #endif // !TARGET_OS_SIMULATOR
6314
6315
6316 static ClosureMode getPlatformDefaultClosureMode() {
6317 #if TARGET_OS_OSX
6318 #if __i386__
6319 // rdar://problem/32701418: Don't use dyld3 for i386 for now.
6320 return ClosureMode::Off;
6321 #else
6322 // x86_64 defaults to using the shared cache closures
6323 return ClosureMode::PreBuiltOnly;
6324 #endif // __i386__
6325
6326 #else
6327 // <rdar://problem/33171968> enable dyld3 mode for all OS programs when using customer dyld cache (no roots)
6328 if ( (sSharedCacheLoadInfo.loadAddress != nullptr) && (sSharedCacheLoadInfo.loadAddress->header.cacheType == kDyldSharedCacheTypeProduction) )
6329 return ClosureMode::On;
6330 else
6331 return ClosureMode::Off;
6332 #endif // TARGET_OS_OSX
6333 }
6334
6335 //
6336 // Entry point for dyld. The kernel loads dyld and jumps to __dyld_start which
6337 // sets up some registers and call this function.
6338 //
6339 // Returns address of main() in target program which __dyld_start jumps to
6340 //
6341 uintptr_t
6342 _main(const macho_header* mainExecutableMH, uintptr_t mainExecutableSlide,
6343 int argc, const char* argv[], const char* envp[], const char* apple[],
6344 uintptr_t* startGlue)
6345 {
6346 if (dyld3::kdebug_trace_dyld_enabled(DBG_DYLD_TIMING_LAUNCH_EXECUTABLE)) {
6347 launchTraceID = dyld3::kdebug_trace_dyld_duration_start(DBG_DYLD_TIMING_LAUNCH_EXECUTABLE, (uint64_t)mainExecutableMH, 0, 0);
6348 }
6349
6350 //Check and see if there are any kernel flags
6351 dyld3::BootArgs::setFlags(hexToUInt64(_simple_getenv(apple, "dyld_flags"), nullptr));
6352
6353 #if __has_feature(ptrauth_calls)
6354 // Check and see if kernel disabled JOP pointer signing (which lets us load plain arm64 binaries)
6355 if ( const char* disableStr = _simple_getenv(apple, "ptrauth_disabled") ) {
6356 if ( strcmp(disableStr, "1") == 0 )
6357 sKeysDisabled = true;
6358 }
6359 else {
6360 // needed until kernel passes ptrauth_disabled for arm64 main executables
6361 if ( (mainExecutableMH->cpusubtype == CPU_SUBTYPE_ARM64_V8) || (mainExecutableMH->cpusubtype == CPU_SUBTYPE_ARM64_ALL) )
6362 sKeysDisabled = true;
6363 }
6364 #endif
6365
6366 // Grab the cdHash of the main executable from the environment
6367 uint8_t mainExecutableCDHashBuffer[20];
6368 const uint8_t* mainExecutableCDHash = nullptr;
6369 if ( const char* mainExeCdHashStr = _simple_getenv(apple, "executable_cdhash") ) {
6370 unsigned bufferLenUsed;
6371 if ( hexStringToBytes(mainExeCdHashStr, mainExecutableCDHashBuffer, sizeof(mainExecutableCDHashBuffer), bufferLenUsed) )
6372 mainExecutableCDHash = mainExecutableCDHashBuffer;
6373 }
6374
6375 getHostInfo(mainExecutableMH, mainExecutableSlide);
6376
6377 #if !TARGET_OS_SIMULATOR
6378 // Trace dyld's load
6379 notifyKernelAboutImage((macho_header*)&__dso_handle, _simple_getenv(apple, "dyld_file"));
6380 // Trace the main executable's load
6381 notifyKernelAboutImage(mainExecutableMH, _simple_getenv(apple, "executable_file"));
6382 #endif
6383
6384 uintptr_t result = 0;
6385 sMainExecutableMachHeader = mainExecutableMH;
6386 sMainExecutableSlide = mainExecutableSlide;
6387
6388
6389 // Set the platform ID in the all image infos so debuggers can tell the process type
6390 // FIXME: This can all be removed once we make the kernel handle it in rdar://43369446
6391 // The host may not have the platform field in its struct, but there's space for it in the padding, so always set it
6392 {
6393 __block bool platformFound = false;
6394 ((dyld3::MachOFile*)mainExecutableMH)->forEachSupportedPlatform(^(dyld3::Platform platform, uint32_t minOS, uint32_t sdk) {
6395 if (platformFound) {
6396 halt("MH_EXECUTE binaries may only specify one platform");
6397 }
6398 gProcessInfo->platform = (uint32_t)platform;
6399 platformFound = true;
6400 });
6401 if (gProcessInfo->platform == (uint32_t)dyld3::Platform::unknown) {
6402 // There were no platforms found in the binary. This may occur on macOS for alternate toolchains and old binaries.
6403 // It should never occur on any of our embedded platforms.
6404 #if TARGET_OS_OSX
6405 gProcessInfo->platform = (uint32_t)dyld3::Platform::macOS;
6406 #else
6407 halt("MH_EXECUTE binaries must specify a minimum supported OS version");
6408 #endif
6409 }
6410 }
6411
6412 #if TARGET_OS_OSX
6413 // Check to see if we need to override the platform
6414 const char* forcedPlatform = _simple_getenv(envp, "DYLD_FORCE_PLATFORM");
6415 if (forcedPlatform) {
6416 dyld_platform_t forcedPlatformType = 0;
6417 if (strncmp(forcedPlatform, "6", 1) == 0) {
6418 forcedPlatformType = PLATFORM_MACCATALYST;
6419 } else if (strncmp(forcedPlatform, "2", 1) == 0) {
6420 forcedPlatformType = PLATFORM_IOS;
6421 } else {
6422 halt("DYLD_FORCE_PLATFORM is only supported for platform 2 or 6.");
6423 }
6424 const dyld3::MachOFile* mf = (dyld3::MachOFile*)sMainExecutableMachHeader;
6425 if (mf->allowsAlternatePlatform()) {
6426 gProcessInfo->platform = forcedPlatformType;
6427 }
6428 }
6429
6430 // if this is host dyld, check to see if iOS simulator is being run
6431 const char* rootPath = _simple_getenv(envp, "DYLD_ROOT_PATH");
6432 if ( (rootPath != NULL) ) {
6433 // look to see if simulator has its own dyld
6434 char simDyldPath[PATH_MAX];
6435 strlcpy(simDyldPath, rootPath, PATH_MAX);
6436 strlcat(simDyldPath, "/usr/lib/dyld_sim", PATH_MAX);
6437 int fd = dyld3::open(simDyldPath, O_RDONLY, 0);
6438 if ( fd != -1 ) {
6439 const char* errMessage = useSimulatorDyld(fd, mainExecutableMH, simDyldPath, argc, argv, envp, apple, startGlue, &result);
6440 if ( errMessage != NULL )
6441 halt(errMessage);
6442 return result;
6443 }
6444 }
6445 else {
6446 ((dyld3::MachOFile*)mainExecutableMH)->forEachSupportedPlatform(^(dyld3::Platform platform, uint32_t minOS, uint32_t sdk) {
6447 if ( dyld3::MachOFile::isSimulatorPlatform(platform) )
6448 halt("attempt to run simulator program outside simulator (DYLD_ROOT_PATH not set)");
6449 });
6450 }
6451 #endif
6452
6453 CRSetCrashLogMessage("dyld: launch started");
6454
6455 setContext(mainExecutableMH, argc, argv, envp, apple);
6456
6457 // Pickup the pointer to the exec path.
6458 sExecPath = _simple_getenv(apple, "executable_path");
6459
6460 // <rdar://problem/13868260> Remove interim apple[0] transition code from dyld
6461 if (!sExecPath) sExecPath = apple[0];
6462
6463 #if TARGET_OS_IPHONE && !TARGET_OS_SIMULATOR
6464 // <rdar://54095622> kernel is not passing a real path for main executable
6465 if ( strncmp(sExecPath, "/var/containers/Bundle/Application/", 35) == 0 ) {
6466 if ( char* newPath = (char*)malloc(strlen(sExecPath)+10) ) {
6467 strcpy(newPath, "/private");
6468 strcat(newPath, sExecPath);
6469 sExecPath = newPath;
6470 }
6471 }
6472 #endif
6473
6474 if ( sExecPath[0] != '/' ) {
6475 // have relative path, use cwd to make absolute
6476 char cwdbuff[MAXPATHLEN];
6477 if ( getcwd(cwdbuff, MAXPATHLEN) != NULL ) {
6478 // maybe use static buffer to avoid calling malloc so early...
6479 char* s = new char[strlen(cwdbuff) + strlen(sExecPath) + 2];
6480 strcpy(s, cwdbuff);
6481 strcat(s, "/");
6482 strcat(s, sExecPath);
6483 sExecPath = s;
6484 }
6485 }
6486
6487 // Remember short name of process for later logging
6488 sExecShortName = ::strrchr(sExecPath, '/');
6489 if ( sExecShortName != NULL )
6490 ++sExecShortName;
6491 else
6492 sExecShortName = sExecPath;
6493
6494 #if TARGET_OS_OSX && __has_feature(ptrauth_calls)
6495 // on Apple Silicon macOS, only Apple signed ("platform binary") arm64e can be loaded
6496 sOnlyPlatformArm64e = true;
6497
6498 // internal builds, or if boot-arg is set, then non-platform-binary arm64e slices can be run
6499 if ( const char* abiMode = _simple_getenv(apple, "arm64e_abi") ) {
6500 if ( strcmp(abiMode, "all") == 0 )
6501 sOnlyPlatformArm64e = false;
6502 }
6503 #endif
6504
6505 configureProcessRestrictions(mainExecutableMH, envp);
6506
6507 // Check if we should force dyld3. Note we have to do this outside of the regular env parsing due to AMFI
6508 if ( dyld3::internalInstall() ) {
6509 if (const char* useClosures = _simple_getenv(envp, "DYLD_USE_CLOSURES")) {
6510 if ( strcmp(useClosures, "0") == 0 ) {
6511 sClosureMode = ClosureMode::Off;
6512 } else if ( strcmp(useClosures, "1") == 0 ) {
6513 #if !__i386__ // don't support dyld3 for 32-bit macOS
6514 sClosureMode = ClosureMode::On;
6515 sClosureKind = ClosureKind::full;
6516 #endif
6517 } else if ( strcmp(useClosures, "2") == 0 ) {
6518 sClosureMode = ClosureMode::On;
6519 sClosureKind = ClosureKind::minimal;
6520 } else {
6521 dyld::warn("unknown option to DYLD_USE_CLOSURES. Valid options are: 0 and 1\n");
6522 }
6523
6524 }
6525 }
6526
6527 #if TARGET_OS_OSX
6528 if ( !gLinkContext.allowEnvVarsPrint && !gLinkContext.allowEnvVarsPath && !gLinkContext.allowEnvVarsSharedCache ) {
6529 pruneEnvironmentVariables(envp, &apple);
6530 // set again because envp and apple may have changed or moved
6531 setContext(mainExecutableMH, argc, argv, envp, apple);
6532 }
6533 else
6534 #endif
6535 {
6536 checkEnvironmentVariables(envp);
6537 defaultUninitializedFallbackPaths(envp);
6538 }
6539 #if TARGET_OS_OSX
6540 switch (gProcessInfo->platform) {
6541 #if (TARGET_OS_OSX && TARGET_CPU_ARM64)
6542 case PLATFORM_IOS:
6543 sClosureMode = ClosureMode::On; // <rdar://problem/56792308> Run iOS apps on macOS in dyld3 mode
6544 [[clang::fallthrough]];
6545 #endif
6546 case PLATFORM_MACCATALYST:
6547 gLinkContext.rootPaths = parseColonList("/System/iOSSupport", NULL);
6548 gLinkContext.iOSonMac = true;
6549 if ( sEnv.DYLD_FALLBACK_LIBRARY_PATH == sLibraryFallbackPaths )
6550 sEnv.DYLD_FALLBACK_LIBRARY_PATH = sRestrictedLibraryFallbackPaths;
6551 if ( sEnv.DYLD_FALLBACK_FRAMEWORK_PATH == sFrameworkFallbackPaths )
6552 sEnv.DYLD_FALLBACK_FRAMEWORK_PATH = sRestrictedFrameworkFallbackPaths;
6553 break;
6554 case PLATFORM_DRIVERKIT:
6555 gLinkContext.driverKit = true;
6556 gLinkContext.sharedRegionMode = ImageLoader::kDontUseSharedRegion;
6557 break;
6558 }
6559 #endif
6560 if ( sEnv.DYLD_PRINT_OPTS )
6561 printOptions(argv);
6562 if ( sEnv.DYLD_PRINT_ENV )
6563 printEnvironmentVariables(envp);
6564
6565 // Parse this envirionment variable outside of the regular logic as we want to accept
6566 // this on binaries without an entitelment
6567 #if !TARGET_OS_SIMULATOR
6568 if ( _simple_getenv(envp, "DYLD_JUST_BUILD_CLOSURE") != nullptr ) {
6569 #if TARGET_OS_IPHONE
6570 char tempClosurePath[PATH_MAX];
6571 if ( dyld3::closure::LaunchClosure::buildClosureCachePath(sExecPath, envp, false, tempClosurePath) )
6572 sJustBuildClosure = true;
6573 #endif
6574 // If the env vars for the data contain look wrong, don't want to launch the app as that would bring up the UI
6575 if (!sJustBuildClosure) {
6576 _exit(EXIT_SUCCESS);
6577 }
6578 }
6579 #endif
6580
6581 if ( sJustBuildClosure )
6582 sClosureMode = ClosureMode::On;
6583
6584 // load shared cache
6585 checkSharedRegionDisable((dyld3::MachOLoaded*)mainExecutableMH, mainExecutableSlide);
6586 if ( gLinkContext.sharedRegionMode != ImageLoader::kDontUseSharedRegion ) {
6587 #if TARGET_OS_SIMULATOR
6588 if ( sSharedCacheOverrideDir)
6589 mapSharedCache(mainExecutableSlide);
6590 #else
6591 mapSharedCache(mainExecutableSlide);
6592 #endif
6593 }
6594
6595 #if !TARGET_OS_SIMULATOR
6596 if ( getpid() == 1 ) {
6597 // Get the value as set by the boot-args
6598 uint64_t commPageValue = 0;
6599 size_t commPageValueSize = sizeof(commPageValue);
6600 if ( sysctlbyname("kern.dyld_flags", &commPageValue, &commPageValueSize, nullptr, 0) != 0 ) {
6601 // Try again with the old name
6602 // TODO: Remove this when we are always on new enough kernels
6603 sysctlbyname("kern.dyld_system_flags", &commPageValue, &commPageValueSize, nullptr, 0);
6604 }
6605
6606 commPageValue &= CommPageBootArgMask;
6607 // logToConsole("dyld: got comm page flags 0x%llx\n", commPageValue);
6608
6609 // If we are PID 1 (launchd) and on macOS, then we should check if the simulator support dylibs
6610 // are roots or not.
6611 // If they are not roots at launchd time, and the file system is read-only, then we know for sure
6612 // they will not be roots later
6613 #if DYLD_SIMULATOR_ROOTS_SUPPORT
6614 bool fileSystemIsWritable = true;
6615
6616 // logToConsole("dyld: in launchd\n");
6617 struct statfs statBuffer;
6618 int statResult = statfs("/", &statBuffer);
6619 if ( statResult == 0 ) {
6620 if ( !strcmp(statBuffer.f_fstypename, "apfs") ) {
6621 if ( (statBuffer.f_flags & (MNT_RDONLY | MNT_SNAPSHOT)) == (MNT_RDONLY | MNT_SNAPSHOT) ) {
6622 // logToConsole("dyld: got statfs flags 0x%llx\n", statBuffer.f_flags);
6623 fileSystemIsWritable = false;
6624 }
6625 }
6626 } else {
6627 int error = errno;
6628 logToConsole("dyld: could not stat '/', errno = %d\n", error);
6629 }
6630
6631 // If the file system is read-only, then we can check now whether any of the simulator support
6632 // dylibs are roots
6633 bool libsystemKernelIsRoot = false;
6634 bool libsystemPlatformIsRoot = false;
6635 bool libsystemPThreadIsRoot = false;
6636 if ( !fileSystemIsWritable && (sSharedCacheLoadInfo.loadAddress != nullptr)) {
6637 dyld3::closure::FileSystemPhysical fileSystem;
6638 libsystemKernelIsRoot = !dyld3::RootsChecker::uuidMatchesSharedCache("/usr/lib/system/libsystem_kernel.dylib",
6639 &fileSystem, sSharedCacheLoadInfo.loadAddress);
6640 libsystemPlatformIsRoot = !dyld3::RootsChecker::uuidMatchesSharedCache("/usr/lib/system/libsystem_platform.dylib",
6641 &fileSystem, sSharedCacheLoadInfo.loadAddress);
6642 libsystemPThreadIsRoot = !dyld3::RootsChecker::uuidMatchesSharedCache("/usr/lib/system/libsystem_pthread.dylib",
6643 &fileSystem, sSharedCacheLoadInfo.loadAddress);
6644 }
6645 commPageValue |= (fileSystemIsWritable ? CommPageFlags::fileSystemCanBeModified : CommPageFlags::None);
6646 commPageValue |= (libsystemKernelIsRoot ? CommPageFlags::libsystemKernelIsRoot : CommPageFlags::None);
6647 commPageValue |= (libsystemPlatformIsRoot ? CommPageFlags::libsystemPlatformIsRoot : CommPageFlags::None);
6648 commPageValue |= (libsystemPThreadIsRoot ? CommPageFlags::libsystemPThreadIsRoot : CommPageFlags::None);
6649 #endif // DYLD_SIMULATOR_ROOTS_SUPPORT
6650
6651 logToConsole("dyld: setting comm page to 0x%llx\n", commPageValue);
6652 if ( sysctlbyname("kern.dyld_flags", nullptr, 0, &commPageValue, sizeof(commPageValue)) != 0 ) {
6653 // Try again with the old name
6654 // TODO: Remove this when we are always on new enough kernels
6655 sysctlbyname("kern.dyld_system_flags", nullptr, 0, &commPageValue, sizeof(commPageValue));
6656 }
6657 }
6658
6659 #if DYLD_SIMULATOR_ROOTS_SUPPORT
6660 // Set the roots checker to the state from the comm page
6661 {
6662 uint64_t dyldFlags = *((uint64_t*)_COMM_PAGE_DYLD_SYSTEM_FLAGS);
6663 bool fileSystemCanBeModified = dyldFlags & CommPageFlags::fileSystemCanBeModified;
6664 bool libsystemKernelIsRoot = dyldFlags & CommPageFlags::libsystemKernelIsRoot;
6665 bool libsystemPlatformIsRoot = dyldFlags & CommPageFlags::libsystemPlatformIsRoot;
6666 bool libsystemPThreadIsRoot = dyldFlags & CommPageFlags::libsystemPThreadIsRoot;
6667 sRootsChecker.setFileSystemCanBeModified(fileSystemCanBeModified);
6668 sRootsChecker.setLibsystemKernelIsRoot(libsystemKernelIsRoot);
6669 sRootsChecker.setLibsystemPlatformIsRoot(libsystemPlatformIsRoot);
6670 sRootsChecker.setLibsystemPThreadIsRoot(libsystemPThreadIsRoot);
6671 }
6672 #endif // DYLD_SIMULATOR_ROOTS_SUPPORT
6673
6674 #endif // !TARGET_OS_SIMULATOR
6675
6676 // If we haven't got a closure mode yet, then check the environment and cache type
6677 if ( sClosureMode == ClosureMode::Unset ) {
6678 // First test to see if we forced in dyld2 via a kernel boot-arg
6679 if ( dyld3::BootArgs::forceDyld2() ) {
6680 sClosureMode = ClosureMode::Off;
6681 } else if ( inDenyList(sExecPath) ) {
6682 sClosureMode = ClosureMode::Off;
6683 } else if ( sEnv.hasOverride ) {
6684 sClosureMode = ClosureMode::Off;
6685 } else if ( dyld3::BootArgs::forceDyld3() ) {
6686 sClosureMode = ClosureMode::On;
6687 } else {
6688 sClosureMode = getPlatformDefaultClosureMode();
6689 }
6690 }
6691
6692 #if !TARGET_OS_SIMULATOR
6693 if ( sClosureMode == ClosureMode::Off ) {
6694 if ( gLinkContext.verboseWarnings )
6695 dyld::log("dyld: not using closures\n");
6696 } else {
6697 sLaunchModeUsed = DYLD_LAUNCH_MODE_USING_CLOSURE;
6698 const dyld3::closure::LaunchClosure* mainClosure = nullptr;
6699 dyld3::closure::LoadedFileInfo mainFileInfo;
6700 mainFileInfo.fileContent = mainExecutableMH;
6701 mainFileInfo.path = sExecPath;
6702 // FIXME: If we are saving this closure, this slice offset/length is probably wrong in the case of FAT files.
6703 mainFileInfo.sliceOffset = 0;
6704 mainFileInfo.sliceLen = -1;
6705 struct stat mainExeStatBuf;
6706 if ( dyld3::stat(sExecPath, &mainExeStatBuf) == 0 ) {
6707 mainFileInfo.inode = mainExeStatBuf.st_ino;
6708 mainFileInfo.mtime = mainExeStatBuf.st_mtime;
6709 }
6710 // check for closure in cache first
6711 if ( sSharedCacheLoadInfo.loadAddress != nullptr ) {
6712 mainClosure = sSharedCacheLoadInfo.loadAddress->findClosure(sExecPath);
6713 if ( gLinkContext.verboseWarnings && (mainClosure != nullptr) )
6714 dyld::log("dyld: found closure %p (size=%lu) in dyld shared cache\n", mainClosure, mainClosure->size());
6715 if ( mainClosure != nullptr )
6716 sLaunchModeUsed |= DYLD_LAUNCH_MODE_CLOSURE_FROM_OS;
6717 }
6718
6719 // We only want to try build a closure at runtime if its an iOS third party binary, or a macOS binary from the shared cache
6720 bool allowClosureRebuilds = false;
6721 if ( sClosureMode == ClosureMode::On ) {
6722 allowClosureRebuilds = true;
6723 } else if ( (sClosureMode == ClosureMode::PreBuiltOnly) && (mainClosure != nullptr) ) {
6724 allowClosureRebuilds = true;
6725 }
6726
6727 if ( (mainClosure != nullptr) && !closureValid(mainClosure, mainFileInfo, mainExecutableCDHash, true, envp) ) {
6728 mainClosure = nullptr;
6729 sLaunchModeUsed &= ~DYLD_LAUNCH_MODE_CLOSURE_FROM_OS;
6730 }
6731
6732 // <rdar://60333505> bootToken is a concat of boot-hash kernel passes down for app and dyld's uuid
6733 uint8_t bootTokenBufer[128];
6734 unsigned bootTokenBufferLen = 0;
6735 if ( const char* bootHashStr = _simple_getenv(apple, "executable_boothash") ) {
6736 if ( hexStringToBytes(bootHashStr, bootTokenBufer, sizeof(bootTokenBufer), bootTokenBufferLen) ) {
6737 if ( ((dyld3::MachOFile*)&__dso_handle)->getUuid(&bootTokenBufer[bootTokenBufferLen]) )
6738 bootTokenBufferLen += sizeof(uuid_t);
6739 }
6740 }
6741 dyld3::Array<uint8_t> bootToken(bootTokenBufer, bootTokenBufferLen, bootTokenBufferLen);
6742
6743 // If we didn't find a valid cache closure then try build a new one
6744 if ( (mainClosure == nullptr) && allowClosureRebuilds ) {
6745 // if forcing closures, and no closure in cache, or it is invalid, check for cached closure
6746 if ( !sForceInvalidSharedCacheClosureFormat )
6747 mainClosure = findCachedLaunchClosure(mainExecutableCDHash, mainFileInfo, envp, bootToken);
6748 if ( mainClosure == nullptr ) {
6749 // if no cached closure found, build new one
6750 mainClosure = buildLaunchClosure(mainExecutableCDHash, mainFileInfo, envp, bootToken);
6751 if ( mainClosure != nullptr )
6752 sLaunchModeUsed |= DYLD_LAUNCH_MODE_BUILT_CLOSURE_AT_LAUNCH;
6753 }
6754 }
6755
6756 // exit dyld after closure is built, without running program
6757 if ( sJustBuildClosure )
6758 _exit(EXIT_SUCCESS);
6759
6760 // try using launch closure
6761 if ( mainClosure != nullptr ) {
6762 CRSetCrashLogMessage("dyld3: launch started");
6763 if ( mainClosure->topImage()->fixupsNotEncoded() )
6764 sLaunchModeUsed |= DYLD_LAUNCH_MODE_MINIMAL_CLOSURE;
6765 Diagnostics diag;
6766 bool closureOutOfDate;
6767 bool recoverable;
6768 bool launched = launchWithClosure(mainClosure, sSharedCacheLoadInfo.loadAddress, (dyld3::MachOLoaded*)mainExecutableMH,
6769 mainExecutableSlide, argc, argv, envp, apple, diag, &result, startGlue, &closureOutOfDate, &recoverable);
6770 if ( !launched && closureOutOfDate && allowClosureRebuilds ) {
6771 // closure is out of date, build new one
6772 mainClosure = buildLaunchClosure(mainExecutableCDHash, mainFileInfo, envp, bootToken);
6773 if ( mainClosure != nullptr ) {
6774 diag.clearError();
6775 sLaunchModeUsed |= DYLD_LAUNCH_MODE_BUILT_CLOSURE_AT_LAUNCH;
6776 if ( mainClosure->topImage()->fixupsNotEncoded() )
6777 sLaunchModeUsed |= DYLD_LAUNCH_MODE_MINIMAL_CLOSURE;
6778 else
6779 sLaunchModeUsed &= ~DYLD_LAUNCH_MODE_MINIMAL_CLOSURE;
6780 launched = launchWithClosure(mainClosure, sSharedCacheLoadInfo.loadAddress, (dyld3::MachOLoaded*)mainExecutableMH,
6781 mainExecutableSlide, argc, argv, envp, apple, diag, &result, startGlue, &closureOutOfDate, &recoverable);
6782 }
6783 }
6784 if ( launched ) {
6785 gLinkContext.startedInitializingMainExecutable = true;
6786 if (sSkipMain)
6787 result = (uintptr_t)&fake_main;
6788 return result;
6789 }
6790 else {
6791 if ( gLinkContext.verboseWarnings ) {
6792 dyld::log("dyld: unable to use closure %p\n", mainClosure);
6793 }
6794 if ( !recoverable )
6795 halt(diag.errorMessage());
6796 }
6797 }
6798 }
6799 #endif // TARGET_OS_SIMULATOR
6800 // could not use closure info, launch old way
6801 sLaunchModeUsed = 0;
6802
6803
6804 // install gdb notifier
6805 stateToHandlers(dyld_image_state_dependents_mapped, sBatchHandlers)->push_back(notifyGDB);
6806 stateToHandlers(dyld_image_state_mapped, sSingleHandlers)->push_back(updateAllImages);
6807 // make initial allocations large enough that it is unlikely to need to be re-alloced
6808 sImageRoots.reserve(16);
6809 sAddImageCallbacks.reserve(4);
6810 sRemoveImageCallbacks.reserve(4);
6811 sAddLoadImageCallbacks.reserve(4);
6812 sImageFilesNeedingTermination.reserve(16);
6813 sImageFilesNeedingDOFUnregistration.reserve(8);
6814
6815 #if !TARGET_OS_SIMULATOR
6816 #ifdef WAIT_FOR_SYSTEM_ORDER_HANDSHAKE
6817 // <rdar://problem/6849505> Add gating mechanism to dyld support system order file generation process
6818 WAIT_FOR_SYSTEM_ORDER_HANDSHAKE(dyld::gProcessInfo->systemOrderFlag);
6819 #endif
6820 #endif
6821
6822
6823 try {
6824 // add dyld itself to UUID list
6825 addDyldImageToUUIDList();
6826
6827 #if SUPPORT_ACCELERATE_TABLES
6828 #if __arm64e__
6829 // Disable accelerator tables when we have threaded rebase/bind, which is arm64e executables only for now.
6830 if ((sMainExecutableMachHeader->cpusubtype & ~CPU_SUBTYPE_MASK) == CPU_SUBTYPE_ARM64E)
6831 sDisableAcceleratorTables = true;
6832 #endif
6833 bool mainExcutableAlreadyRebased = false;
6834 if ( (sSharedCacheLoadInfo.loadAddress != nullptr) && !dylibsCanOverrideCache() && !sDisableAcceleratorTables && (sSharedCacheLoadInfo.loadAddress->header.accelerateInfoAddr != 0) ) {
6835 struct stat statBuf;
6836 if ( dyld3::stat(IPHONE_DYLD_SHARED_CACHE_DIR "no-dyld2-accelerator-tables", &statBuf) != 0 )
6837 sAllCacheImagesProxy = ImageLoaderMegaDylib::makeImageLoaderMegaDylib(&sSharedCacheLoadInfo.loadAddress->header, sSharedCacheLoadInfo.slide, mainExecutableMH, gLinkContext);
6838 }
6839
6840 reloadAllImages:
6841 #endif
6842
6843
6844 #if TARGET_OS_OSX
6845 gLinkContext.strictMachORequired = false;
6846 // <rdar://problem/22805519> be less strict about old macOS mach-o binaries
6847 ((dyld3::MachOFile*)mainExecutableMH)->forEachSupportedPlatform(^(dyld3::Platform platform, uint32_t minOS, uint32_t sdk) {
6848 if ( (platform == dyld3::Platform::macOS) && (sdk >= DYLD_PACKED_VERSION(10,15,0)) ) {
6849 gLinkContext.strictMachORequired = true;
6850 }
6851 });
6852 if ( gLinkContext.iOSonMac )
6853 gLinkContext.strictMachORequired = true;
6854 #else
6855 // simulators, iOS, tvOS, watchOS, are always strict
6856 gLinkContext.strictMachORequired = true;
6857 #endif
6858
6859
6860 CRSetCrashLogMessage(sLoadingCrashMessage);
6861 // instantiate ImageLoader for main executable
6862 sMainExecutable = instantiateFromLoadedImage(mainExecutableMH, mainExecutableSlide, sExecPath);
6863 gLinkContext.mainExecutable = sMainExecutable;
6864 gLinkContext.mainExecutableCodeSigned = hasCodeSignatureLoadCommand(mainExecutableMH);
6865
6866 #if TARGET_OS_SIMULATOR
6867 // check main executable is not too new for this OS
6868 {
6869 if ( ! isSimulatorBinary((uint8_t*)mainExecutableMH, sExecPath) ) {
6870 throwf("program was built for a platform that is not supported by this runtime");
6871 }
6872 uint32_t mainMinOS = sMainExecutable->minOSVersion();
6873
6874 // dyld is always built for the current OS, so we can get the current OS version
6875 // from the load command in dyld itself.
6876 uint32_t dyldMinOS = ImageLoaderMachO::minOSVersion((const mach_header*)&__dso_handle);
6877 if ( mainMinOS > dyldMinOS ) {
6878 #if TARGET_OS_WATCH
6879 throwf("app was built for watchOS %d.%d which is newer than this simulator %d.%d",
6880 mainMinOS >> 16, ((mainMinOS >> 8) & 0xFF),
6881 dyldMinOS >> 16, ((dyldMinOS >> 8) & 0xFF));
6882 #elif TARGET_OS_TV
6883 throwf("app was built for tvOS %d.%d which is newer than this simulator %d.%d",
6884 mainMinOS >> 16, ((mainMinOS >> 8) & 0xFF),
6885 dyldMinOS >> 16, ((dyldMinOS >> 8) & 0xFF));
6886 #else
6887 throwf("app was built for iOS %d.%d which is newer than this simulator %d.%d",
6888 mainMinOS >> 16, ((mainMinOS >> 8) & 0xFF),
6889 dyldMinOS >> 16, ((dyldMinOS >> 8) & 0xFF));
6890 #endif
6891 }
6892 }
6893 #endif
6894
6895
6896 #if SUPPORT_ACCELERATE_TABLES
6897 sAllImages.reserve((sAllCacheImagesProxy != NULL) ? 16 : INITIAL_IMAGE_COUNT);
6898 #else
6899 sAllImages.reserve(INITIAL_IMAGE_COUNT);
6900 #endif
6901
6902 #if defined(__x86_64__) && !TARGET_OS_SIMULATOR
6903 if (dyld::isTranslated()) {
6904 struct dyld_all_runtime_info {
6905 uint32_t image_count;
6906 dyld_image_info* images;
6907 uint32_t uuid_count;
6908 dyld_uuid_info* uuids;
6909 uint32_t aot_image_count;
6910 dyld_aot_image_info* aots;
6911 dyld_aot_shared_cache_info aot_cache_info;
6912 };
6913
6914 dyld_all_runtime_info* runtime_info;
6915 int ret = syscall(0x7000004, &runtime_info);
6916 if (ret == 0) {
6917 for (int i = 0; i < runtime_info->uuid_count; i++) {
6918 dyld_image_info image_info = runtime_info->images[i];
6919 dyld_uuid_info uuid_info = runtime_info->uuids[i];
6920
6921 // add the arm64 cambria runtime to uuid info
6922 addNonSharedCacheImageUUID(uuid_info);
6923
6924 struct stat sb;
6925 if (stat(image_info.imageFilePath, &sb) == 0) {
6926 fsid_t fsid = {{0, 0}};
6927 fsobj_id_t fsobj = {0};
6928 ino_t inode = sb.st_ino;
6929 fsobj.fid_objno = (uint32_t)inode;
6930 fsobj.fid_generation = (uint32_t)(inode>>32);
6931 fsid.val[0] = sb.st_dev;
6932
6933 dyld3::kdebug_trace_dyld_image(DBG_DYLD_UUID_MAP_A, image_info.imageFilePath, &(uuid_info.imageUUID), fsobj, fsid, image_info.imageLoadAddress);
6934 }
6935 }
6936
6937 // add aot images to dyld_all_image_info
6938 addAotImagesToAllAotImages(runtime_info->aot_image_count, runtime_info->aots);
6939
6940 // add the arm64 cambria runtime to dyld_all_image_info
6941 addImagesToAllImages(runtime_info->image_count, runtime_info->images);
6942
6943 // set the aot shared cache info in dyld_all_image_info
6944 dyld::gProcessInfo->aotSharedCacheBaseAddress = runtime_info->aot_cache_info.cacheBaseAddress;
6945 memcpy(dyld::gProcessInfo->aotSharedCacheUUID, runtime_info->aot_cache_info.cacheUUID, sizeof(uuid_t));
6946 }
6947 }
6948 #endif
6949
6950 // Now that shared cache is loaded, setup an versioned dylib overrides
6951 #if SUPPORT_VERSIONED_PATHS
6952 checkVersionedPaths();
6953 #endif
6954
6955
6956 // dyld_all_image_infos image list does not contain dyld
6957 // add it as dyldPath field in dyld_all_image_infos
6958 // for simulator, dyld_sim is in image list, need host dyld added
6959 #if TARGET_OS_SIMULATOR
6960 // get path of host dyld from table of syscall vectors in host dyld
6961 void* addressInDyld = gSyscallHelpers;
6962 #else
6963 // get path of dyld itself
6964 void* addressInDyld = (void*)&__dso_handle;
6965 #endif
6966 char dyldPathBuffer[MAXPATHLEN+1];
6967 int len = proc_regionfilename(getpid(), (uint64_t)(long)addressInDyld, dyldPathBuffer, MAXPATHLEN);
6968 if ( len > 0 ) {
6969 dyldPathBuffer[len] = '\0'; // proc_regionfilename() does not zero terminate returned string
6970 if ( strcmp(dyldPathBuffer, gProcessInfo->dyldPath) != 0 )
6971 gProcessInfo->dyldPath = strdup(dyldPathBuffer);
6972 }
6973
6974 // load any inserted libraries
6975 if ( sEnv.DYLD_INSERT_LIBRARIES != NULL ) {
6976 for (const char* const* lib = sEnv.DYLD_INSERT_LIBRARIES; *lib != NULL; ++lib)
6977 loadInsertedDylib(*lib);
6978 }
6979 // record count of inserted libraries so that a flat search will look at
6980 // inserted libraries, then main, then others.
6981 sInsertedDylibCount = sAllImages.size()-1;
6982
6983 // link main executable
6984 gLinkContext.linkingMainExecutable = true;
6985 #if SUPPORT_ACCELERATE_TABLES
6986 if ( mainExcutableAlreadyRebased ) {
6987 // previous link() on main executable has already adjusted its internal pointers for ASLR
6988 // work around that by rebasing by inverse amount
6989 sMainExecutable->rebase(gLinkContext, -mainExecutableSlide);
6990 }
6991 #endif
6992 link(sMainExecutable, sEnv.DYLD_BIND_AT_LAUNCH, true, ImageLoader::RPathChain(NULL, NULL), -1);
6993 sMainExecutable->setNeverUnloadRecursive();
6994 if ( sMainExecutable->forceFlat() ) {
6995 gLinkContext.bindFlat = true;
6996 gLinkContext.prebindUsage = ImageLoader::kUseNoPrebinding;
6997 }
6998
6999 // link any inserted libraries
7000 // do this after linking main executable so that any dylibs pulled in by inserted
7001 // dylibs (e.g. libSystem) will not be in front of dylibs the program uses
7002 if ( sInsertedDylibCount > 0 ) {
7003 for(unsigned int i=0; i < sInsertedDylibCount; ++i) {
7004 ImageLoader* image = sAllImages[i+1];
7005 link(image, sEnv.DYLD_BIND_AT_LAUNCH, true, ImageLoader::RPathChain(NULL, NULL), -1);
7006 image->setNeverUnloadRecursive();
7007 }
7008 if ( gLinkContext.allowInterposing ) {
7009 // only INSERTED libraries can interpose
7010 // register interposing info after all inserted libraries are bound so chaining works
7011 for(unsigned int i=0; i < sInsertedDylibCount; ++i) {
7012 ImageLoader* image = sAllImages[i+1];
7013 image->registerInterposing(gLinkContext);
7014 }
7015 }
7016 }
7017
7018 if ( gLinkContext.allowInterposing ) {
7019 // <rdar://problem/19315404> dyld should support interposition even without DYLD_INSERT_LIBRARIES
7020 for (long i=sInsertedDylibCount+1; i < sAllImages.size(); ++i) {
7021 ImageLoader* image = sAllImages[i];
7022 if ( image->inSharedCache() )
7023 continue;
7024 image->registerInterposing(gLinkContext);
7025 }
7026 }
7027 #if SUPPORT_ACCELERATE_TABLES
7028 if ( (sAllCacheImagesProxy != NULL) && ImageLoader::haveInterposingTuples() ) {
7029 // Accelerator tables cannot be used with implicit interposing, so relaunch with accelerator tables disabled
7030 ImageLoader::clearInterposingTuples();
7031 // unmap all loaded dylibs (but not main executable)
7032 for (long i=1; i < sAllImages.size(); ++i) {
7033 ImageLoader* image = sAllImages[i];
7034 if ( image == sMainExecutable )
7035 continue;
7036 if ( image == sAllCacheImagesProxy )
7037 continue;
7038 image->setCanUnload();
7039 ImageLoader::deleteImage(image);
7040 }
7041 // note: we don't need to worry about inserted images because if DYLD_INSERT_LIBRARIES was set we would not be using the accelerator table
7042 sAllImages.clear();
7043 sImageRoots.clear();
7044 sImageFilesNeedingTermination.clear();
7045 sImageFilesNeedingDOFUnregistration.clear();
7046 sAddImageCallbacks.clear();
7047 sRemoveImageCallbacks.clear();
7048 sAddLoadImageCallbacks.clear();
7049 sAddBulkLoadImageCallbacks.clear();
7050 sDisableAcceleratorTables = true;
7051 sAllCacheImagesProxy = NULL;
7052 sMappedRangesStart = NULL;
7053 mainExcutableAlreadyRebased = true;
7054 gLinkContext.linkingMainExecutable = false;
7055 resetAllImages();
7056 goto reloadAllImages;
7057 }
7058 #endif
7059
7060 // apply interposing to initial set of images
7061 for(int i=0; i < sImageRoots.size(); ++i) {
7062 sImageRoots[i]->applyInterposing(gLinkContext);
7063 }
7064 ImageLoader::applyInterposingToDyldCache(gLinkContext);
7065
7066 // Bind and notify for the main executable now that interposing has been registered
7067 uint64_t bindMainExecutableStartTime = mach_absolute_time();
7068 sMainExecutable->recursiveBindWithAccounting(gLinkContext, sEnv.DYLD_BIND_AT_LAUNCH, true);
7069 uint64_t bindMainExecutableEndTime = mach_absolute_time();
7070 ImageLoaderMachO::fgTotalBindTime += bindMainExecutableEndTime - bindMainExecutableStartTime;
7071 gLinkContext.notifyBatch(dyld_image_state_bound, false);
7072
7073 // Bind and notify for the inserted images now interposing has been registered
7074 if ( sInsertedDylibCount > 0 ) {
7075 for(unsigned int i=0; i < sInsertedDylibCount; ++i) {
7076 ImageLoader* image = sAllImages[i+1];
7077 image->recursiveBind(gLinkContext, sEnv.DYLD_BIND_AT_LAUNCH, true, nullptr);
7078 }
7079 }
7080
7081 // <rdar://problem/12186933> do weak binding only after all inserted images linked
7082 sMainExecutable->weakBind(gLinkContext);
7083 gLinkContext.linkingMainExecutable = false;
7084
7085 sMainExecutable->recursiveMakeDataReadOnly(gLinkContext);
7086
7087 CRSetCrashLogMessage("dyld: launch, running initializers");
7088 #if SUPPORT_OLD_CRT_INITIALIZATION
7089 // Old way is to run initializers via a callback from crt1.o
7090 if ( ! gRunInitializersOldWay )
7091 initializeMainExecutable();
7092 #else
7093 // run all initializers
7094 initializeMainExecutable();
7095 #endif
7096
7097 // notify any montoring proccesses that this process is about to enter main()
7098 notifyMonitoringDyldMain();
7099 if (dyld3::kdebug_trace_dyld_enabled(DBG_DYLD_TIMING_LAUNCH_EXECUTABLE)) {
7100 dyld3::kdebug_trace_dyld_duration_end(launchTraceID, DBG_DYLD_TIMING_LAUNCH_EXECUTABLE, 0, 0, 2);
7101 }
7102 ARIADNEDBG_CODE(220, 1);
7103
7104 #if TARGET_OS_OSX
7105 if ( gLinkContext.driverKit ) {
7106 result = (uintptr_t)sEntryOverride;
7107 if ( result == 0 )
7108 halt("no entry point registered");
7109 *startGlue = (uintptr_t)gLibSystemHelpers->startGlueToCallExit;
7110 }
7111 else
7112 #endif
7113 {
7114 // find entry point for main executable
7115 result = (uintptr_t)sMainExecutable->getEntryFromLC_MAIN();
7116 if ( result != 0 ) {
7117 // main executable uses LC_MAIN, we need to use helper in libdyld to call into main()
7118 if ( (gLibSystemHelpers != NULL) && (gLibSystemHelpers->version >= 9) )
7119 *startGlue = (uintptr_t)gLibSystemHelpers->startGlueToCallExit;
7120 else
7121 halt("libdyld.dylib support not present for LC_MAIN");
7122 }
7123 else {
7124 // main executable uses LC_UNIXTHREAD, dyld needs to let "start" in program set up for main()
7125 result = (uintptr_t)sMainExecutable->getEntryFromLC_UNIXTHREAD();
7126 *startGlue = 0;
7127 }
7128 }
7129 }
7130 catch(const char* message) {
7131 syncAllImages();
7132 halt(message);
7133 }
7134 catch(...) {
7135 dyld::log("dyld: launch failed\n");
7136 }
7137
7138 CRSetCrashLogMessage("dyld2 mode");
7139 #if !TARGET_OS_SIMULATOR
7140 if (sLogClosureFailure) {
7141 // We failed to launch in dyld3, but dyld2 can handle it. synthesize a crash report for analytics
7142 dyld3::syntheticBacktrace("Could not generate launchClosure, falling back to dyld2", true);
7143 }
7144 #endif
7145
7146 if (sSkipMain) {
7147 notifyMonitoringDyldMain();
7148 if (dyld3::kdebug_trace_dyld_enabled(DBG_DYLD_TIMING_LAUNCH_EXECUTABLE)) {
7149 dyld3::kdebug_trace_dyld_duration_end(launchTraceID, DBG_DYLD_TIMING_LAUNCH_EXECUTABLE, 0, 0, 2);
7150 }
7151 ARIADNEDBG_CODE(220, 1);
7152 result = (uintptr_t)&fake_main;
7153 *startGlue = (uintptr_t)gLibSystemHelpers->startGlueToCallExit;
7154 }
7155
7156 return result;
7157 }
7158
7159
7160 } // namespace
7161
7162
7163