From: rcombs <rcombs@rcombs.me>
To: musl@lists.openwall.com
Subject: [musl] [PATCH 2/2] crt: add dcrt1, with support for locating the dynamic loader at runtime
Date: Sun, 29 Mar 2020 15:15:01 -0500 [thread overview]
Message-ID: <1585512901-18979-2-git-send-email-rcombs@rcombs.me> (raw)
In-Reply-To: <1585512901-18979-1-git-send-email-rcombs@rcombs.me>
---
Makefile | 10 +-
crt/dcrt1.c | 403 ++++++++++++++++++++++++++++++++++++++++++++++++
ldso/dlstart.c | 59 ++++---
tools/ld.musl-clang.in | 17 +-
tools/musl-clang.in | 8 +
tools/musl-gcc.specs.sh | 4 +-
6 files changed, 475 insertions(+), 26 deletions(-)
create mode 100644 crt/dcrt1.c
diff --git a/Makefile b/Makefile
index bd8f5c3..348ffd0 100644
--- a/Makefile
+++ b/Makefile
@@ -106,13 +106,15 @@ obj/src/internal/version.h: $(wildcard $(srcdir)/VERSION $(srcdir)/.git)
obj/src/internal/version.o obj/src/internal/version.lo: obj/src/internal/version.h
-obj/crt/rcrt1.o obj/ldso/dlstart.lo obj/ldso/dynlink.lo: $(srcdir)/src/internal/dynlink.h $(srcdir)/arch/$(ARCH)/reloc.h
+obj/crt/rcrt1.o obj/crt/dcrt1.o obj/ldso/dlstart.lo obj/ldso/dynlink.lo: $(srcdir)/src/internal/dynlink.h $(srcdir)/arch/$(ARCH)/reloc.h
-obj/crt/crt1.o obj/crt/scrt1.o obj/crt/rcrt1.o obj/ldso/dlstart.lo: $(srcdir)/arch/$(ARCH)/crt_arch.h
+obj/crt/crt1.o obj/crt/scrt1.o obj/crt/rcrt1.o obj/crt/dcrt1.o obj/ldso/dlstart.lo: $(srcdir)/arch/$(ARCH)/crt_arch.h
-obj/crt/rcrt1.o: $(srcdir)/ldso/dlstart.c
+obj/crt/rcrt1.o obj/crt/dcrt1.o: $(srcdir)/ldso/dlstart.c
-obj/crt/Scrt1.o obj/crt/rcrt1.o: CFLAGS_ALL += -fPIC
+obj/crt/Scrt1.o obj/crt/rcrt1.o obj/crt/dcrt1.o: CFLAGS_ALL += -fPIC
+
+obj/crt/dcrt1.o: CFLAGS_ALL += -DLDSO_PATHNAME=\"$(LDSO_PATHNAME)\"
OPTIMIZE_SRCS = $(wildcard $(OPTIMIZE_GLOBS:%=$(srcdir)/src/%))
$(OPTIMIZE_SRCS:$(srcdir)/%.c=obj/%.o) $(OPTIMIZE_SRCS:$(srcdir)/%.c=obj/%.lo): CFLAGS += -O3
diff --git a/crt/dcrt1.c b/crt/dcrt1.c
new file mode 100644
index 0000000..5e84404
--- /dev/null
+++ b/crt/dcrt1.c
@@ -0,0 +1,403 @@
+#define SYSCALL_NO_TLS 1
+
+#include <elf.h>
+#include <errno.h>
+#include <fcntl.h>
+#include <features.h>
+#include <libgen.h>
+#include <sys/mman.h>
+#include <string.h>
+#include <unistd.h>
+#include "atomic.h"
+#include "dynlink.h"
+#include "syscall.h"
+
+extern weak hidden const size_t _DYNAMIC[];
+
+int main();
+weak void _init();
+weak void _fini();
+weak _Noreturn int __libc_start_main(int (*)(), int, char **,
+ void (*)(), void(*)(), void(*)());
+
+#define START "_start"
+#define _dlstart_c _start_c
+#define DL_DNI
+#include "../ldso/dlstart.c"
+
+#ifndef PAGESIZE
+#ifdef PAGE_SIZE
+#undef PAGE_SIZE // We don't want to use libc.page_size here
+#endif
+static size_t page_size;
+#define PAGE_SIZE page_size
+#endif
+
+#ifdef SYS_mmap2
+#define crt_mmap(start, len, prot, flags, fd, off) (void*)__syscall(SYS_mmap2, start, len, prot, flags, fd, off/SYSCALL_MMAP2_UNIT)
+#else
+#define crt_mmap(start, len, prot, flags, fd, off) (void*)__syscall(SYS_mmap, start, len, prot, flags, fd, off)
+#endif
+
+#define crt_munmap(ptr, len) __syscall(SYS_munmap, ptr, len)
+
+static inline int crt_mprotect(void *addr, size_t len, int prot)
+{
+ size_t start, end;
+ start = (size_t)addr & -PAGE_SIZE;
+ end = (size_t)((char *)addr + len + PAGE_SIZE-1) & -PAGE_SIZE;
+ return __syscall(SYS_mprotect, start, end-start, prot);
+}
+
+#define crt_read(fd, buf, size) __syscall(SYS_read, fd, buf, size)
+#define crt_pread(fd, buf, size, ofs) __syscall(SYS_pread, fd, buf, size, __SYSCALL_LL_PRW(ofs))
+
+#define map_failed(val) ((unsigned long)val > -4096UL)
+
+#ifdef SYS_readlink
+#define crt_readlink(path, buf, bufsize) __syscall(SYS_readlink, path, buf, bufsize)
+#else
+#define crt_readlink(path, buf, bufsize) __syscall(SYS_readlinkat, AT_FDCWD, path, buf, bufsize)
+#endif
+
+#ifdef SYS_access
+#define crt_access(filename, amode) __syscall(SYS_access, filename, amode)
+#else
+#define crt_access(filename, amode) __syscall(SYS_faccessat, AT_FDCWD, filename, amode, 0)
+#endif
+
+static void *crt_memcpy(void *restrict dest, const void *restrict src, size_t n)
+{
+ unsigned char *d = dest;
+ const unsigned char *s = src;
+ for (; n; n--) *d++ = *s++;
+ return dest;
+}
+
+static void *crt_memset(void *dest, int c, size_t n)
+{
+ unsigned char *s = dest;
+ for (; n; n--, s++) *s = c;
+ return dest;
+}
+
+static size_t crt_strlen(const char *s)
+{
+ const char *a = s;
+ for (; *s; s++);
+ return s-a;
+}
+
+static char *crt_strchrnul(const char *s, int c)
+{
+ c = (unsigned char)c;
+ if (!c) return (char *)s + crt_strlen(s);
+ for (; *s && *(unsigned char *)s != c; s++);
+ return (char *)s;
+}
+
+static int crt_strncmp(const char *_l, const char *_r, size_t n)
+{
+ const unsigned char *l=(void *)_l, *r=(void *)_r;
+ if (!n--) return 0;
+ for (; *l && *r && n && *l == *r ; l++, r++, n--);
+ return *l - *r;
+}
+
+static char *crt_getenv(const char *name, char **environ)
+{
+ size_t l = crt_strchrnul(name, '=') - name;
+ if (l && !name[l] && environ)
+ for (char **e = environ; *e; e++)
+ if (!crt_strncmp(name, *e, l) && l[*e] == '=')
+ return *e + l+1;
+ return 0;
+}
+
+static inline void *map_library(int fd)
+{
+ void *allocated_buf=0;
+ size_t allocated_buf_size;
+ size_t phsize;
+ size_t addr_min=SIZE_MAX, addr_max=0;
+ size_t this_min, this_max;
+ off_t off_start = 0;
+ Ehdr eh;
+ Phdr *ph, *ph0;
+ unsigned prot = 0;
+ unsigned char *map=MAP_FAILED;
+ size_t i;
+
+ ssize_t l = crt_read(fd, &eh, sizeof eh);
+ if (l<0) goto error;
+ if (l<sizeof eh || (eh.e_type != ET_DYN && eh.e_type != ET_EXEC))
+ goto error;
+ for (i = 0; i < eh.e_phnum; i++, ph=(void *)((char *)ph+eh.e_phentsize)) {
+ Phdr phbuf;
+ ph = &phbuf;
+ l = crt_pread(fd, ph, sizeof *ph, eh.e_phoff + eh.e_phentsize * i);
+ if (l < sizeof *ph) goto error;
+ if (ph->p_type != PT_LOAD) continue;
+ if (ph->p_vaddr < addr_min) {
+ addr_min = ph->p_vaddr;
+ off_start = ph->p_offset;
+ prot = (((ph->p_flags&PF_R) ? PROT_READ : 0) |
+ ((ph->p_flags&PF_W) ? PROT_WRITE: 0) |
+ ((ph->p_flags&PF_X) ? PROT_EXEC : 0));
+ }
+ if (ph->p_vaddr + ph->p_memsz > addr_max) {
+ addr_max = ph->p_vaddr + ph->p_memsz;
+ }
+ }
+
+ /* We rely on the header being mapped as readable later */
+ if (addr_min != 0 || off_start != 0 || addr_max == 0 || !(prot & PROT_READ))
+ goto error;
+
+ addr_max += PAGE_SIZE-1;
+ addr_max &= -PAGE_SIZE;
+
+ /* The first time, we map too much, possibly even more than
+ * the length of the file. This is okay because we will not
+ * use the invalid part; we just need to reserve the right
+ * amount of virtual address space to map over later. */
+ map = crt_mmap(0, addr_max, prot, MAP_PRIVATE, fd, off_start);
+ if (map_failed(map)) goto error;
+
+ ph0 = (void*)(map + eh.e_phoff);
+
+ for (ph=ph0, i=eh.e_phnum; i; i--, ph=(void *)((char *)ph+eh.e_phentsize)) {
+ if (ph->p_type != PT_LOAD) continue;
+ this_min = ph->p_vaddr & -PAGE_SIZE;
+ this_max = ph->p_vaddr+ph->p_memsz+PAGE_SIZE-1 & -PAGE_SIZE;
+ off_start = ph->p_offset & -PAGE_SIZE;
+ prot = (((ph->p_flags&PF_R) ? PROT_READ : 0) |
+ ((ph->p_flags&PF_W) ? PROT_WRITE: 0) |
+ ((ph->p_flags&PF_X) ? PROT_EXEC : 0));
+ /* Reuse the existing mapping for the lowest-address LOAD */
+ if ((ph->p_vaddr & -PAGE_SIZE) != addr_min)
+ if (map_failed(crt_mmap(map+this_min, this_max-this_min, prot, MAP_PRIVATE|MAP_FIXED, fd, off_start)))
+ goto error;
+ if (ph->p_memsz > ph->p_filesz && (ph->p_flags&PF_W)) {
+ size_t brk = (size_t)map+ph->p_vaddr+ph->p_filesz;
+ size_t pgbrk = brk+PAGE_SIZE-1 & -PAGE_SIZE;
+ crt_memset((void *)brk, 0, pgbrk-brk & PAGE_SIZE-1);
+ if (pgbrk-(size_t)map < this_max && map_failed(crt_mmap((void *)pgbrk, (size_t)map+this_max-pgbrk, prot, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0)))
+ goto error;
+ }
+ }
+ return map;
+error:
+ for(;;) a_crash();
+ return 0;
+}
+
+static void decode_vec(const size_t *v, size_t *a, size_t cnt)
+{
+ size_t i;
+ for (i=0; i<cnt; i++) a[i] = 0;
+ for (; v[0]; v+=2) if (v[0]-1<cnt-1) {
+ a[0] |= 1UL<<v[0];
+ a[v[0]] = v[1];
+ }
+}
+
+static void get_rpath(const char **runpath, const size_t *dyn, unsigned char *base)
+{
+ /* DT_STRTAB is pre-relocated for us by dlstart */
+ const char *strings = (char*)base + dyn[DT_STRTAB];
+
+ *runpath = NULL;
+
+ if (dyn[0] & (1 << DT_RPATH))
+ *runpath = strings + dyn[DT_RPATH];
+ if (dyn[0] & (1 << DT_RUNPATH))
+ *runpath = strings + dyn[DT_RUNPATH];
+}
+
+static size_t find_linker(char *outbuf, size_t bufsize, const char *this_path, size_t thisl, const size_t *dyn, unsigned char *base, char **environ, int secure)
+{
+ const char *paths[2]; // envpath, rpath/runpath
+ size_t i;
+ int fd;
+
+ // In the suid/secure case, skip everything and use the fixed path
+ if (secure)
+ goto default_path;
+
+ // Strip filename
+ if (thisl)
+ thisl--;
+ while (thisl > 1 && this_path[thisl] == '/')
+ thisl--;
+ while (thisl > 0 && this_path[thisl] != '/')
+ thisl--;
+
+ const char *envpath = crt_getenv("LD_LOADER_PATH", environ);
+ if (envpath) {
+ size_t envlen = crt_strlen(envpath);
+ if (envlen < bufsize) {
+ crt_memcpy(outbuf, envpath, envlen + 1);
+ return envlen + 1;
+ }
+ }
+
+ get_rpath(&paths[1], dyn, base);
+
+ paths[0] = crt_getenv("LD_LIBRARY_PATH", environ);
+
+ for (i = 0; i < 2; i++) {
+ const char *p = paths[i];
+ char *o = outbuf;
+ if (!p)
+ continue;
+ for (;;) {
+ if (!crt_strncmp(p, "$ORIGIN", 7) ||
+ !crt_strncmp(p, "${ORIGIN}", 9)) {
+ if (o + thisl + 1 < outbuf + bufsize) {
+ crt_memcpy(o, this_path, thisl);
+ o += thisl;
+ } else {
+ o = outbuf + bufsize - 1;
+ }
+ p += (p[1] == '{' ? 9 : 7);
+ } else if (*p == ':' || !*p) {
+#define LDSO_FILENAME "ld-musl-" LDSO_ARCH ".so.1"
+ if (o + sizeof(LDSO_FILENAME) + 1 < outbuf + bufsize) {
+ *o++ = '/';
+ crt_memcpy(o, LDSO_FILENAME, sizeof(LDSO_FILENAME));
+ if (!crt_access(outbuf, R_OK | X_OK))
+ return (o + sizeof(LDSO_FILENAME)) - outbuf;
+ }
+ if (!*p)
+ break;
+ o = outbuf;
+ p++;
+ } else {
+ if (o < outbuf + bufsize)
+ *o++ = *p;
+ p++;
+ }
+ }
+ }
+
+ default_path:
+ // Didn't find a usable loader anywhere (or in secure mode), so try the default
+ crt_memcpy(outbuf, LDSO_PATHNAME, sizeof(LDSO_PATHNAME));
+ return sizeof(LDSO_PATHNAME);
+}
+
+hidden _Noreturn void __dls2(unsigned char *base, size_t *p)
+{
+ int argc = p[0];
+ char **argv = (void *)(p+1);
+ int fd;
+ int secure;
+ int prot = PROT_READ;
+ Ehdr *loader_hdr;
+ Phdr *new_hdr;
+ void *entry;
+ char this_path[PATH_MAX];
+ size_t thisl;
+ char linker_path[PATH_MAX];
+ size_t linker_len;
+ size_t i;
+ size_t aux[AUX_CNT];
+ size_t *auxv;
+ size_t dyn[DYN_CNT];
+ char **environ = argv + argc + 1;
+
+ // We're already finished here; just run main.
+ if (__libc_start_main)
+ __libc_start_main(main, argc, argv, _init, _fini, 0);
+
+ /* Find aux vector just past environ[] and use it to initialize
+ * global data that may be needed before we can make syscalls. */
+ for (i = argc + 1; argv[i]; i++);
+ auxv = (void *)(argv + i + 1);
+ decode_vec(auxv, aux, AUX_CNT);
+ secure = ((aux[0] & 0x7800) != 0x7800 || aux[AT_UID] != aux[AT_EUID]
+ || aux[AT_GID] != aux[AT_EGID] || aux[AT_SECURE]);
+
+#ifndef PAGESIZE
+ page_size = aux[AT_PAGESZ];
+#endif
+
+ decode_vec(_DYNAMIC, dyn, DYN_CNT);
+
+ thisl = crt_readlink("/proc/self/exe", this_path, sizeof this_path);
+ linker_len = find_linker(linker_path, sizeof linker_path, this_path, thisl, dyn, base, environ, secure);
+
+ fd = __sys_open2(, linker_path, O_RDONLY);
+ if (fd < 0)
+ goto error;
+
+ loader_hdr = map_library(fd);
+ if (!loader_hdr)
+ goto error;
+
+ __syscall(SYS_close, fd);
+
+ // Copy the program headers into an anonymous mapping
+ new_hdr = crt_mmap(0, (aux[AT_PHENT] * (aux[AT_PHNUM] + 2) + linker_len + PAGE_SIZE - 1) & -PAGE_SIZE, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
+ if (map_failed(new_hdr))
+ goto error;
+
+ // Point it back at the original kernel-provided base
+ new_hdr->p_type = PT_PHDR;
+ new_hdr->p_vaddr = (size_t)new_hdr - (size_t)base;
+
+ ((Phdr*)((char*)new_hdr + aux[AT_PHENT]))->p_type = PT_INTERP;
+ ((Phdr*)((char*)new_hdr + aux[AT_PHENT]))->p_vaddr = new_hdr->p_vaddr + aux[AT_PHENT] * (aux[AT_PHNUM] + 2);
+
+ crt_memcpy((char*)new_hdr + aux[AT_PHENT] * (aux[AT_PHNUM] + 2), linker_path, linker_len);
+
+ for (i = 0; i < aux[AT_PHNUM]; i++) {
+ Phdr *hdr = (void*)((char*)aux[AT_PHDR] + aux[AT_PHENT] * i);
+ Phdr *dst = (void*)((char*)new_hdr + aux[AT_PHENT] * (i + 2));
+ if (hdr->p_type == PT_PHDR || hdr->p_type == PT_INTERP) {
+ // Can't have a duplicate
+ dst->p_type = PT_NULL;
+ } else {
+ crt_memcpy(dst, hdr, aux[AT_PHENT]);
+ }
+ }
+
+ if (crt_mprotect(new_hdr, aux[AT_PHENT] * (aux[AT_PHNUM] + 2) + linker_len, PROT_READ))
+ goto error;
+
+ for (i=0; auxv[i]; i+=2) {
+ if (auxv[i] == AT_BASE)
+ auxv[i + 1] = (size_t)loader_hdr;
+ if (auxv[i] == AT_PHDR)
+ auxv[i + 1] = (size_t)new_hdr;
+ if (auxv[i] == AT_PHNUM)
+ auxv[i + 1] += 2;
+ }
+
+ entry = (char*)loader_hdr + loader_hdr->e_entry;
+
+ /* Undo the relocations performed by dlstart */
+
+ if (NEED_MIPS_GOT_RELOCS) {
+ const size_t *dynv = _DYNAMIC;
+ size_t local_cnt = 0;
+ size_t *got = (void *)(base + dyn[DT_PLTGOT]);
+ for (i=0; dynv[i]; i+=2) if (dynv[i]==DT_MIPS_LOCAL_GOTNO)
+ local_cnt = dynv[i+1];
+ for (i=0; i<local_cnt; i++) got[i] -= (size_t)base;
+ }
+
+ size_t *rel = (void *)((size_t)base+dyn[DT_REL]);
+ size_t rel_size = dyn[DT_RELSZ];
+ for (; rel_size; rel+=2, rel_size-=2*sizeof(size_t)) {
+ if (!IS_RELATIVE(rel[1], 0)) continue;
+ size_t *rel_addr = (void *)((size_t)base + rel[0]);
+ *rel_addr -= (size_t)base;
+ }
+
+ CRTJMP(entry, argv - 1);
+
+error:
+ for(;;) a_crash();
+}
diff --git a/ldso/dlstart.c b/ldso/dlstart.c
index 20d50f2..49e6a99 100644
--- a/ldso/dlstart.c
+++ b/ldso/dlstart.c
@@ -21,7 +21,7 @@
hidden void _dlstart_c(size_t *sp, size_t *dynv)
{
size_t i, aux[AUX_CNT], dyn[DYN_CNT];
- size_t *rel, rel_size, base;
+ size_t *rel, rel_size, base, loader_phdr;
int argc = *sp;
char **argv = (void *)(sp+1);
@@ -41,6 +41,13 @@ hidden void _dlstart_c(size_t *sp, size_t *dynv)
* space and moving the extra fdpic arguments to the stack
* vector where they are easily accessible from C. */
segs = ((struct fdpic_loadmap *)(sp[-1] ? sp[-1] : sp[-2]))->segs;
+ if (aux[AT_BASE]) {
+ Ehdr *eh = (void*)aux[AT_BASE];
+ for (i = 0; eh->e_phoff - segs[i].p_vaddr >= segs[i].p_memsz; i++);
+ loader_phdr = (eh->e_phoff - segs[i].p_vaddr + segs[i].addr);
+ } else {
+ loader_phdr = aux[AT_PHDR];
+ }
} else {
/* If dynv is null, the entry point was started from loader
* that is not fdpic-aware. We can assume normal fixed-
@@ -55,6 +62,7 @@ hidden void _dlstart_c(size_t *sp, size_t *dynv)
segs[0].p_memsz = -1;
Ehdr *eh = (void *)base;
Phdr *ph = (void *)(base + eh->e_phoff);
+ loader_phdr = (size_t)ph;
size_t phnum = eh->e_phnum;
size_t phent = eh->e_phentsize;
while (phnum-- && ph->p_type != PT_DYNAMIC)
@@ -69,13 +77,42 @@ hidden void _dlstart_c(size_t *sp, size_t *dynv)
#if DL_FDPIC
for (i=0; i<DYN_CNT; i++) {
- if (i==DT_RELASZ || i==DT_RELSZ) continue;
+ if (i==DT_RELASZ || i==DT_RELSZ || i==DT_RPATH || i==DT_RUNPATH) continue;
if (!dyn[i]) continue;
for (j=0; dyn[i]-segs[j].p_vaddr >= segs[j].p_memsz; j++);
dyn[i] += segs[j].addr - segs[j].p_vaddr;
}
base = 0;
+#else
+ /* If the dynamic linker is invoked as a command, its load
+ * address is not available in the aux vector. Instead, compute
+ * the load address as the difference between &_DYNAMIC and the
+ * virtual address in the PT_DYNAMIC program header. */
+ base = aux[AT_BASE];
+ if (!base) {
+ size_t phnum = aux[AT_PHNUM];
+ size_t phentsize = aux[AT_PHENT];
+ Phdr *ph = (void *)aux[AT_PHDR];
+ for (i=phnum; i--; ph = (void *)((char *)ph + phentsize)) {
+ if (ph->p_type == PT_DYNAMIC) {
+ base = (size_t)dynv - ph->p_vaddr;
+ break;
+ }
+ }
+ }
+ loader_phdr = base + ((Ehdr*)base)->e_phoff;
+#endif
+#ifdef DL_DNI
+ /* If AT_PHDR doesn't match the PHDR in AT_BASE, then we've been loaded as a
+ * dynamic executable and ld.so has already been run, either by the kernel,
+ * or by dcrt. This means relocs are already finished (and doing them again
+ * would break DT_RELs), so we can just skip to the stage-2 jump. */
+ if (aux[AT_PHDR] != loader_phdr)
+ goto skip_relocs;
+#endif
+
+#if DL_FDPIC
const Sym *syms = (void *)dyn[DT_SYMTAB];
rel = (void *)dyn[DT_RELA];
@@ -97,23 +134,6 @@ hidden void _dlstart_c(size_t *sp, size_t *dynv)
}
}
#else
- /* If the dynamic linker is invoked as a command, its load
- * address is not available in the aux vector. Instead, compute
- * the load address as the difference between &_DYNAMIC and the
- * virtual address in the PT_DYNAMIC program header. */
- base = aux[AT_BASE];
- if (!base) {
- size_t phnum = aux[AT_PHNUM];
- size_t phentsize = aux[AT_PHENT];
- Phdr *ph = (void *)aux[AT_PHDR];
- for (i=phnum; i--; ph = (void *)((char *)ph + phentsize)) {
- if (ph->p_type == PT_DYNAMIC) {
- base = (size_t)dynv - ph->p_vaddr;
- break;
- }
- }
- }
-
/* MIPS uses an ugly packed form for GOT relocations. Since we
* can't make function calls yet and the code is tiny anyway,
* it's simply inlined here. */
@@ -143,6 +163,7 @@ hidden void _dlstart_c(size_t *sp, size_t *dynv)
#endif
stage2_func dls2;
+skip_relocs:
GETFUNCSYM(&dls2, __dls2, base+dyn[DT_PLTGOT]);
dls2((void *)base, sp);
}
diff --git a/tools/ld.musl-clang.in b/tools/ld.musl-clang.in
index 93763d6..02d9893 100644
--- a/tools/ld.musl-clang.in
+++ b/tools/ld.musl-clang.in
@@ -7,6 +7,18 @@ shared=
userlinkdir=
userlink=
+Scrt="$libc_lib/Scrt1.o"
+dynamic_linker_args="-dynamic-linker \"$ldso\""
+
+for x ; do
+ case "$x" in
+ -l-dni)
+ dynamic_linker_args="-no-dynamic-linker"
+ Scrt="$libc_lib/dcrt1.o"
+ ;;
+ esac
+done
+
for x ; do
test "$cleared" || set -- ; cleared=1
@@ -42,10 +54,13 @@ for x ; do
;;
-sysroot=*|--sysroot=*)
;;
+ $libc_lib/Scrt1.o)
+ set -- "$@" $Scrt
+ ;;
*)
set -- "$@" "$x"
;;
esac
done
-exec $($cc -print-prog-name=ld) -nostdlib "$@" -lc -dynamic-linker "$ldso"
+exec $($cc -print-prog-name=ld) -nostdlib "$@" -lc "$dynamic_linker_args"
diff --git a/tools/musl-clang.in b/tools/musl-clang.in
index 623de6f..49cba1b 100644
--- a/tools/musl-clang.in
+++ b/tools/musl-clang.in
@@ -5,14 +5,21 @@ libc_inc="@INCDIR@"
libc_lib="@LIBDIR@"
thisdir="`cd "$(dirname "$0")"; pwd`"
+cleared=
+
# prevent clang from running the linker (and erroring) on no input.
sflags=
eflags=
+dniflags=
for x ; do
+ test "$cleared" || set -- ; cleared=1
+
case "$x" in
+ --dni) dniflags=-l-dni; continue ;;
-l*) input=1 ;;
*) input= ;;
esac
+ set -- "$@" "$x"
if test "$input" ; then
sflags="-l-user-start"
eflags="-l-user-end"
@@ -29,6 +36,7 @@ exec $cc \
-isystem "$libc_inc" \
-L-user-start \
$sflags \
+ $dniflags \
"$@" \
$eflags \
-L"$libc_lib" \
diff --git a/tools/musl-gcc.specs.sh b/tools/musl-gcc.specs.sh
index 3049257..86374f1 100644
--- a/tools/musl-gcc.specs.sh
+++ b/tools/musl-gcc.specs.sh
@@ -17,13 +17,13 @@ cat <<EOF
libgcc.a%s %:if-exists(libgcc_eh.a%s)
*startfile:
-%{!shared: $libdir/Scrt1.o} $libdir/crti.o crtbeginS.o%s
+%{!shared: %{-dni:$libdir/dcrt1.o;:$libdir/Scrt1.o}} $libdir/crti.o crtbeginS.o%s
*endfile:
crtendS.o%s $libdir/crtn.o
*link:
--dynamic-linker $ldso -nostdlib %{shared:-shared} %{static:-static} %{rdynamic:-export-dynamic}
+%{-dni:-no-dynamic-linker;:--dynamic-linker $ldso} -nostdlib %{shared:-shared} %{static:-static} %{rdynamic:-export-dynamic}
*esp_link:
--
2.7.4
prev parent reply other threads:[~2020-03-29 20:15 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-03-29 20:15 [musl] [PATCH 1/2] ldso: when run via CLI, set auxv as if the app was loaded by the kernel rcombs
2020-03-29 20:15 ` rcombs [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1585512901-18979-2-git-send-email-rcombs@rcombs.me \
--to=rcombs@rcombs.me \
--cc=musl@lists.openwall.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://git.vuxu.org/mirror/musl/
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).