/* dll_init.cc This software is a copyrighted work licensed under the terms of the Cygwin license. Please consult the file "CYGWIN_LICENSE" for details. */ #include "winsup.h" #include "cygerrno.h" #include "perprocess.h" #include "sync.h" #include "dll_init.h" #include "environ.h" #include "security.h" #include "path.h" #include "fhandler.h" #include "dtable.h" #include "cygheap.h" #include "pinfo.h" #include "child_info.h" #include "cygtls.h" #include "exception.h" #include #include #include #include extern void __stdcall check_sanity_and_sync (per_process *); #define fabort fork_info->abort dll_list dlls; muto dll_list::protect; static bool dll_global_dtors_recorded; /* Run destructors for all DLLs on exit. */ void dll_global_dtors () { /* Don't attempt to call destructors if we're still in fork processing since that likely means fork is failing and everything will not have been set up. */ if (in_forkee) return; int recorded = dll_global_dtors_recorded; dll_global_dtors_recorded = false; if (recorded && dlls.start.next) for (dll *d = dlls.end; d != &dlls.start; d = d->prev) d->run_dtors (); } /* Run all constructors associated with a dll */ void per_module::run_ctors () { void (**pfunc)() = ctors; /* Run ctors backwards, so skip the first entry and find how many there are, then run them. */ if (pfunc) { int i; for (i = 1; pfunc[i]; i++); for (int j = i - 1; j > 0; j--) (pfunc[j]) (); } } /* Run all destructors associated with a dll */ void per_module::run_dtors () { void (**pfunc)() = dtors; while (*++pfunc) (*pfunc) (); } /* Initialize an individual DLL */ int dll::init () { int ret = 1; #ifndef __x86_64__ /* This should be a no-op. Why didn't we just import this variable? */ if (!p.envptr) p.envptr = &__cygwin_environ; else if (*(p.envptr) != __cygwin_environ) *(p.envptr) = __cygwin_environ; #endif /* Don't run constructors or the "main" if we've forked. */ if (!in_forkee) { /* global contructors */ p.run_ctors (); /* entry point of dll (use main of per_process with null args...) */ if (p.main) ret = p.main (0, 0, 0); } return ret; } /* Look for a dll based on the full path. CV, 2012-03-04: Per MSDN, If a DLL with the same module name is already loaded in memory, the system uses the loaded DLL, no matter which directory it is in. The system does not search for the DLL. See http://msdn.microsoft.com/en-us/library/ms682586%28v=vs.85%29.aspx On 2012-02-08 I interpreted "module name" as "basename". So the assumption was that the Windows Loader does not load another DLL with the same basename, if one such DLL is already loaded. Consequentially I changed the code so that DLLs are only compared by basename. This assumption was obviously wrong, as the perl dynaloader proves. It loads multiple DLLs with the same basename into memory, just from different locations. This mechanism is broken when only comparing basenames in the below code. However, the original problem reported on 2012-02-07 was a result of a subtil difference between the paths returned by different calls to GetModuleFileNameW: Sometimes the path is a plain DOS path, sometimes it's preceeded by the long pathname prefix "\\?\". So I reverted the original change from 2012-02-08 and only applied the following fix: Check if the path is preceeded by a long pathname prefix, and, if so, drop it forthwith so that subsequent full path comparisons work as expected. At least that was the original idea. In fact there are two case, linked and runtime loaded DLLs, which have to be distinguished: - Linked DLLs are loaded by only specifying the basename of the DLL and searching it using the system DLL search order as given in the aforementioned MSDN URL. - Runtime loaded DLLs are specified with the full path since that's how dlopen works. In effect, we have to be careful not to mix linked and loaded DLLs. For more info how this gets accomplished, see the comments at the start of dll_list::alloc, as well as the comment preceeding the definition of the in_load_after_fork bool later in the file. */ dll * dll_list::operator[] (const PWCHAR name) { dll *d = &start; while ((d = d->next) != NULL) if (!wcscasecmp (name, d->name)) return d; return NULL; } /* Look for a dll based on the basename. */ dll * dll_list::find_by_modname (const PWCHAR modname) { dll *d = &start; while ((d = d->next) != NULL) if (!wcscasecmp (modname, d->modname)) return d; return NULL; } #define RETRIES 1000 /* Allocate space for a dll struct. */ dll * dll_list::alloc (HINSTANCE h, per_process *p, dll_type type) { /* Called under loader lock conditions so this function can't be called multiple times in parallel. A static buffer is safe. */ static WCHAR buf[NT_MAX_PATH]; GetModuleFileNameW (h, buf, NT_MAX_PATH); PWCHAR name = buf; if (!wcsncmp (name, L"\\\\?\\", 4)) { name += 4; if (!wcsncmp (name, L"UNC\\", 4)) { name += 2; *name = L'\\'; } } DWORD namelen = wcslen (name); PWCHAR modname = wcsrchr (name, L'\\') + 1; guard (true); /* Already loaded? For linked DLLs, only compare the basenames. Linked DLLs are loaded using just the basename and the default DLL search path. The Windows loader picks up the first one it finds. */ dll *d = (type == DLL_LINK) ? dlls.find_by_modname (modname) : dlls[name]; if (d) { if (!in_forkee) d->count++; /* Yes. Bump the usage count. */ else if (d->handle != h) fabort ("%W: Loaded to different address: parent(%p) != child(%p)", name, d->handle, h); /* If this DLL has been linked against, and the full path differs, try to sanity check if this is the same DLL, just in another path. */ else if (type == DLL_LINK && wcscasecmp (name, d->name) && (d->p.data_start != p->data_start || d->p.data_start != p->data_start || d->p.bss_start != p->bss_start || d->p.bss_end != p->bss_end || d->p.ctors != p->ctors || d->p.dtors != p->dtors)) fabort ("\nLoaded different DLL with same basename in forked child,\n" "parent loaded: %W\n" " child loaded: %W\n" "The DLLs differ, so it's not safe to run the forked child.\n" "Make sure to remove the offending DLL before trying again.", d->name, name); d->p = p; } else { /* FIXME: Change this to new at some point. */ d = (dll *) cmalloc (HEAP_2_DLL, sizeof (*d) + (namelen * sizeof (*name))); /* Now we've allocated a block of information. Fill it in with the supplied info about this DLL. */ d->count = 1; wcscpy (d->name, name); d->modname = d->name + (modname - name); d->handle = h; d->has_dtors = true; d->p = p; d->ndeps = 0; d->deps = NULL; d->image_size = ((pefile*)h)->optional_hdr ()->SizeOfImage; d->preferred_base = (void*) ((pefile*)h)->optional_hdr()->ImageBase; d->type = type; append (d); if (type == DLL_LOAD) loaded_dlls++; } guard (false); #ifndef __x86_64__ assert (p->envptr != NULL); #endif return d; } void dll_list::append (dll* d) { if (end == NULL) end = &start; /* Point to "end" of dll chain. */ end->next = d; /* Standard linked list stuff. */ d->next = NULL; d->prev = end; end = d; } void dll_list::populate_deps (dll* d) { tmp_pathbuf tp; PWCHAR wmodname = tp.w_get (); pefile* pef = (pefile*) d->handle; PIMAGE_DATA_DIRECTORY dd = pef->idata_dir (IMAGE_DIRECTORY_ENTRY_IMPORT); /* Annoyance: calling crealloc with a NULL pointer will use the wrong heap and crash, so we have to replicate some code */ long maxdeps = 4; d->deps = (dll**) cmalloc (HEAP_2_DLL, maxdeps*sizeof (dll*)); d->ndeps = 0; for (PIMAGE_IMPORT_DESCRIPTOR id= (PIMAGE_IMPORT_DESCRIPTOR) pef->rva (dd->VirtualAddress); dd->Size && id->Name; id++) { char* modname = pef->rva (id->Name); sys_mbstowcs (wmodname, NT_MAX_PATH, modname); if (dll* dep = find_by_modname (wmodname)) { if (d->ndeps >= maxdeps) { maxdeps = 2*(1+maxdeps); d->deps = (dll**) crealloc (d->deps, maxdeps*sizeof (dll*)); } d->deps[d->ndeps++] = dep; } } /* add one to differentiate no deps from unknown */ d->ndeps++; } void dll_list::topsort () { /* Anything to do? */ if (!end || end == &start) return; /* make sure we have all the deps available */ dll* d = &start; while ((d = d->next)) if (!d->ndeps) populate_deps (d); /* unlink head and tail pointers so the sort can rebuild the list */ d = start.next; start.next = end = NULL; topsort_visit (d, true); /* clear node markings made by the sort */ d = &start; while ((d = d->next)) { #ifdef DEBUGGING paranoid_printf ("%W", d->modname); for (int i = 1; i < -d->ndeps; i++) paranoid_printf ("-> %W", d->deps[i - 1]->modname); #endif /* It would be really nice to be able to keep this information around for next time, but we don't have an easy way to invalidate cached dependencies when a module unloads. */ d->ndeps = 0; cfree (d->deps); d->deps = NULL; } } /* A recursive in-place topological sort. The result is ordered so that dependencies of a dll appear before it in the list. NOTE: this algorithm is guaranteed to terminate with a "partial order" of dlls but does not do anything smart about cycles: an arbitrary dependent dll will necessarily appear first. Perhaps not surprisingly, Windows ships several dlls containing dependency cycles, including SspiCli/RPCRT4.dll and a lovely tangle involving USP10/LPK/GDI32/USER32.dll). Fortunately, we don't care about Windows DLLs here, and cygwin dlls should behave better */ void dll_list::topsort_visit (dll* d, bool seek_tail) { /* Recurse to the end of the dll chain, then visit nodes as we unwind. We do this because once we start visiting nodes we can no longer trust any _next_ pointers. We "mark" visited nodes (to avoid revisiting them) by negating ndeps (undone once the sort completes). */ if (seek_tail && d->next) topsort_visit (d->next, true); if (d->ndeps > 0) { d->ndeps = -d->ndeps; for (long i = 1; i < -d->ndeps; i++) topsort_visit (d->deps[i - 1], false); append (d); } } dll * dll_list::find (void *retaddr) { MEMORY_BASIC_INFORMATION m; if (!VirtualQuery (retaddr, &m, sizeof m)) return NULL; HMODULE h = (HMODULE) m.AllocationBase; dll *d = &start; while ((d = d->next)) if (d->handle == h) break; return d; } /* Detach a DLL from the chain. */ void dll_list::detach (void *retaddr) { dll *d; /* Don't attempt to call destructors if we're still in fork processing since that likely means fork is failing and everything will not have been set up. */ if (!myself || in_forkee) return; guard (true); if ((d = find (retaddr))) { if (d->count <= 0) system_printf ("WARNING: trying to detach an already detached dll ..."); if (--d->count == 0) { /* Ensure our exception handler is enabled for destructors */ exception protect; /* Call finalize function if we are not already exiting */ if (!exit_state) __cxa_finalize (d->handle); d->run_dtors (); d->prev->next = d->next; if (d->next) d->next->prev = d->prev; if (d->type == DLL_LOAD) loaded_dlls--; if (end == d) end = d->prev; cfree (d); } } guard (false); } /* Initialization for all linked DLLs, called by dll_crt0_1. */ void dll_list::init () { /* Walk the dll chain, initializing each dll */ dll *d = &start; dll_global_dtors_recorded = d->next != NULL; while ((d = d->next)) d->init (); } #define A64K (64 * 1024) /* Reserve the chunk of free address space starting _here_ and (usually) covering at least _dll_size_ bytes. However, we must take care not to clobber the dll's target address range because it often overlaps. */ static PVOID reserve_at (const PWCHAR name, PVOID here, PVOID dll_base, DWORD dll_size) { DWORD size; MEMORY_BASIC_INFORMATION mb; if (!VirtualQuery (here, &mb, sizeof (mb))) fabort ("couldn't examine memory at %p while mapping %W, %E", here, name); if (mb.State != MEM_FREE) return 0; size = mb.RegionSize; // don't clobber the space where we want the dll to land caddr_t end = (caddr_t) here + size; caddr_t dll_end = (caddr_t) dll_base + dll_size; if (dll_base < here && dll_end > (caddr_t) here) here = (PVOID) dll_end; // the dll straddles our left edge else if (dll_base >= here && (caddr_t) dll_base < end) end = (caddr_t) dll_base; // the dll overlaps partly or fully to our right size = end - (caddr_t) here; if (!VirtualAlloc (here, size, MEM_RESERVE, PAGE_NOACCESS)) fabort ("couldn't allocate memory %p(%d) for '%W' alignment, %E\n", here, size, name); return here; } /* Release the memory previously allocated by "reserve_at" above. */ static void release_at (const PWCHAR name, PVOID here) { if (!VirtualFree (here, 0, MEM_RELEASE)) fabort ("couldn't release memory %p for '%W' alignment, %E\n", here, name); } /* Step 1: Reserve memory for all DLL_LOAD dlls. This is to prevent anything else from taking their spot as we compensate for Windows randomly relocating things. NOTE: because we can't depend on LoadLibraryExW to do the right thing, we have to do a vanilla VirtualAlloc instead. One possible optimization might attempt a LoadLibraryExW first, in case it lands in the right place, but then we have to find a way of tracking which dlls ended up needing VirtualAlloc after all. */ void dll_list::reserve_space () { for (dll* d = dlls.istart (DLL_LOAD); d; d = dlls.inext ()) if (!VirtualAlloc (d->handle, d->image_size, MEM_RESERVE, PAGE_NOACCESS)) fabort ("address space needed by '%W' (%p) is already occupied", d->modname, d->handle); } /* We need the in_load_after_fork flag so dll_dllcrt0_1 can decide at fork time if this is a linked DLL or a dynamically loaded DLL. In either case, both, cygwin_finished_initializing and in_forkee are true, so they are not sufficient to discern the situation. */ static bool NO_COPY in_load_after_fork; /* Reload DLLs after a fork. Iterates over the list of dynamically loaded DLLs and attempts to load them in the same place as they were loaded in the parent. */ void dll_list::load_after_fork (HANDLE parent) { // moved to frok::child for performance reasons: // dll_list::reserve_space(); in_load_after_fork = true; load_after_fork_impl (parent, dlls.istart (DLL_LOAD), 0); in_load_after_fork = false; } static int const DLL_RETRY_MAX = 6; void dll_list::load_after_fork_impl (HANDLE parent, dll* d, int retries) { /* Step 2: For each dll which did not map at its preferred base address in the parent, try to coerce it to land at the same spot as before. If not, unload it, reserve the memory around it, and try again. Use recursion to remember blocked regions address space so we can release them later. We DONT_RESOLVE_DLL_REFERENCES at first in case the DLL lands in the wrong spot; NOTE: This step skips DLLs which loaded at their preferred address in the parent because they should behave (we already verified that their preferred address in the child is available). However, this may fail with ASLR active, because the ASLR base address will usually not equal the preferred base recorded in the dll. In this case, we should make the LoadLibraryExW call unconditional. */ for ( ; d; d = dlls.inext ()) if (d->handle != d->preferred_base) { /* See if the DLL will load in proper place. If not, unload it, reserve the memory around it, and try again. If this is the first attempt, we need to release the dll's protective reservation from step 1 */ if (!retries && !VirtualFree (d->handle, 0, MEM_RELEASE)) fabort ("unable to release protective reservation for %W (%p), %E", d->modname, d->handle); HMODULE h = LoadLibraryExW (d->name, NULL, DONT_RESOLVE_DLL_REFERENCES); if (!h) fabort ("unable to create interim mapping for %W, %E", d->name); if (h != d->handle) { sigproc_printf ("%W loaded in wrong place: %p != %p", d->modname, h, d->handle); FreeLibrary (h); PVOID reservation = reserve_at (d->modname, h, d->handle, d->image_size); if (!reservation) fabort ("unable to block off %p to prevent %W from loading there", h, d->modname); if (retries < DLL_RETRY_MAX) load_after_fork_impl (parent, d, retries+1); else fabort ("unable to remap %W to same address as parent (%p) - try running rebaseall", d->modname, d->handle); /* once the above returns all the dlls are mapped; release the reservation and continue unwinding */ sigproc_printf ("releasing blocked space at %p", reservation); release_at (d->modname, reservation); return; } } /* Step 3: try to load each dll for real after either releasing the protective reservation (for well-behaved dlls) or unloading the interim mapping (for rebased dlls) . The dll list is sorted in dependency order, so we shouldn't pull in any additional dlls outside our control. */ for (dll *d = dlls.istart (DLL_LOAD); d; d = dlls.inext ()) { if (d->handle == d->preferred_base) { if (!VirtualFree (d->handle, 0, MEM_RELEASE)) fabort ("unable to release protective reservation for %W (%p), %E", d->modname, d->handle); } else { /* Free the library using our parent's handle: it's identical to ours or we wouldn't have gotten this far */ if (!FreeLibrary (d->handle)) fabort ("unable to unload interim mapping of %W, %E", d->modname); } HMODULE h = LoadLibraryW (d->name); if (!h) fabort ("unable to map %W, %E", d->name); if (h != d->handle) fabort ("unable to map %W to same address as parent: %p != %p", d->modname, d->handle, h); } } struct dllcrt0_info { HMODULE h; per_process *p; PVOID res; dllcrt0_info (HMODULE h0, per_process *p0): h (h0), p (p0) {} }; extern "C" PVOID dll_dllcrt0 (HMODULE h, per_process *p) { if (dynamically_loaded) return (PVOID) 1; dllcrt0_info x (h, p); dll_dllcrt0_1 (&x); return x.res; } void dll_dllcrt0_1 (VOID *x) { HMODULE& h = ((dllcrt0_info *) x)->h; per_process*& p = ((dllcrt0_info *) x)->p; PVOID& res = ((dllcrt0_info *) x)->res; if (p == NULL) p = &__cygwin_user_data; else { *(p->impure_ptr_ptr) = __cygwin_user_data.impure_ptr; _pei386_runtime_relocator (p); } bool linked = !cygwin_finished_initializing && !in_load_after_fork; /* Broken DLLs built against Cygwin versions 1.7.0-49 up to 1.7.0-57 override the cxx_malloc pointer in their DLL initialization code, when loaded either statically or dynamically. Because this leaves a stale pointer into demapped memory space if the DLL is unloaded by a call to dlclose, we prevent this happening for dynamically loaded DLLs in dlopen by saving and restoring cxx_malloc around the call to LoadLibrary, which invokes the DLL's startup sequence. Modern DLLs won't even attempt to override the pointer when loaded statically, but will write their overrides directly into the struct it points to. With all modern DLLs, this will remain the default_cygwin_cxx_malloc struct in cxx.cc, but if any broken DLLs are in the mix they will have overridden the pointer and subsequent overrides will go into their embedded cxx_malloc structs. This is almost certainly not a problem as they can never be unloaded, but if we ever did want to do anything about it, we could check here to see if the pointer had been altered in the early parts of the DLL's startup, and if so copy back the new overrides and reset it here. However, that's just a note for the record; at the moment, we can't see any need to worry about this happening. */ check_sanity_and_sync (p); dll_type type; /* If this function is called before cygwin has finished initializing, then the DLL must be a cygwin-aware DLL that was explicitly linked into the program rather than a dlopened DLL. */ if (linked) type = DLL_LINK; else { type = DLL_LOAD; dlls.reload_on_fork = 1; } /* Allocate and initialize space for the DLL. */ dll *d = dlls.alloc (h, p, type); /* If d == NULL, then something is broken. Otherwise, if we've finished initializing, it's ok to initialize the DLL. If we haven't finished initializing, it may not be safe to call the dll's "main" since not all of cygwin's internal structures may have been set up. */ if (!d || (!linked && !d->init ())) res = (PVOID) -1; else res = (PVOID) d; } #ifndef __x86_64__ /* OBSOLETE: This function is obsolete and will go away in the future. Cygwin can now handle being loaded from a noncygwin app using the same entry point. */ extern "C" int dll_noncygwin_dllcrt0 (HMODULE h, per_process *p) { return (int) dll_dllcrt0 (h, p); } #endif /* !__x86_64__ */ extern "C" void cygwin_detach_dll (dll *) { HANDLE retaddr; if (_my_tls.isinitialized ()) retaddr = (void *) _my_tls.retaddr (); else retaddr = __builtin_return_address (0); dlls.detach (retaddr); } extern "C" void dlfork (int val) { dlls.reload_on_fork = val; } #ifndef __x86_64__ /* Called from various places to update all of the individual ideas of the environ block. Explain to me again why we didn't just import __cygwin_environ? */ void __stdcall update_envptrs () { for (dll *d = dlls.istart (DLL_ANY); d; d = dlls.inext ()) if (*(d->p.envptr) != __cygwin_environ) *(d->p.envptr) = __cygwin_environ; *main_environ = __cygwin_environ; } #endif