From patchwork Sat Mar 24 23:53:07 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Samuel Thibault X-Patchwork-Id: 890592 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=sourceware.org (client-ip=209.132.180.131; helo=sourceware.org; envelope-from=libc-alpha-return-91237-incoming=patchwork.ozlabs.org@sourceware.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=ens-lyon.org Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; secure) header.d=sourceware.org header.i=@sourceware.org header.b="fHOkCsff"; dkim-atps=neutral Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 407y0H339Zz9s02 for ; Sun, 25 Mar 2018 10:53:19 +1100 (AEDT) DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:cc:subject:date:message-id; q=dns; s= default; b=c3Bp10UV/TQX870iPtL9S3pUnb4XftzIp2uiyEIGJKOa3WWExkK4y 3IfRkXh/c4AzzsRGgCw0g4y5EmM6+rS3S8KvoPCGUmXIQuNWUqW8UaFFyaSncaAu 9IGBqbwJsTfQ6CJxgqg5Eysz+bK+y3MvzDnu9Z6BR4BbhRANm+KnbI= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:cc:subject:date:message-id; s=default; bh=gzyQeLP2nVyw3Bnw4yEhiEWFQSw=; b=fHOkCsffCE2jbmv5G+U0KNz1k/Ce AkD2ItXTEL26mZ9w1F3mEGckPnpUllXbVvEz6ShThv3R6LZv3GKNN/LoIp4SHAHn lpt9JNxHKlhdTJj/7sN5wJ4qSRqvti2NubvtJPiKNxbkgSvKs9c4JI90tmBdXthh oUG9OJD7Z+zHjIg= Received: (qmail 43000 invoked by alias); 24 Mar 2018 23:53:13 -0000 Mailing-List: contact libc-alpha-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-alpha-owner@sourceware.org Delivered-To: mailing list libc-alpha@sourceware.org Received: (qmail 42596 invoked by uid 89); 24 Mar 2018 23:53:13 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-26.1 required=5.0 tests=BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, KAM_SHORT, SPF_HELO_PASS, SPF_NEUTRAL autolearn=ham version=3.3.2 spammy=linked, sysv, H*r:sk:static-, Hx-spam-relays-external:sk:static- X-HELO: hera.aquilenet.fr From: Samuel Thibault To: libc-alpha@sourceware.org Cc: Samuel Thibault Subject: [hurd, commited] hurd: Initialize TLS and libpthread before signal thread start Date: Sun, 25 Mar 2018 00:53:07 +0100 Message-Id: <20180324235307.26220-1-samuel.thibault@ens-lyon.org> * sysdeps/generic/libc-start.h [!SHARED] (ARCH_SETUP_TLS): Define to __libc_setup_tls. * sysdeps/unix/sysv/linux/powerpc/libc-start.h [!SHARED] (ARCH_SETUP_TLS): Likewise. * sysdeps/mach/hurd/libc-start.h: New file copied from sysdeps/generic/libc-start.h, but define ARCH_SETUP_TLS to empty. * csu/libc-start.c [!SHARED] (LIBC_START_MAIN): Call ARCH_SETUP_TLS instead of __libc_setup_tls. * sysdeps/mach/hurd/i386/init-first.c [!SHARED] (init1): Call __libc_setup_tls before initializing libpthread and running _hurd_init which starts the signal thread. --- csu/libc-start.c | 2 +- sysdeps/generic/libc-start.h | 1 + sysdeps/mach/hurd/i386/init-first.c | 25 +++++++++++++++------- sysdeps/mach/hurd/libc-start.h | 31 ++++++++++++++++++++++++++++ sysdeps/unix/sysv/linux/powerpc/libc-start.h | 1 + 5 files changed, 51 insertions(+), 9 deletions(-) create mode 100644 sysdeps/mach/hurd/libc-start.h diff --git a/csu/libc-start.c b/csu/libc-start.c index 605222fa3f..494132368f 100644 --- a/csu/libc-start.c +++ b/csu/libc-start.c @@ -194,7 +194,7 @@ LIBC_START_MAIN (int (*main) (int, char **, char ** MAIN_AUXVEC_DECL), ARCH_SETUP_IREL (); /* The stack guard goes into the TCB, so initialize it early. */ - __libc_setup_tls (); + ARCH_SETUP_TLS (); /* In some architectures, IREL{,A} relocations happen after TLS setup in order to let IFUNC resolvers benefit from TCB information, e.g. powerpc's diff --git a/sysdeps/generic/libc-start.h b/sysdeps/generic/libc-start.h index 6c416a1114..e0361f655a 100644 --- a/sysdeps/generic/libc-start.h +++ b/sysdeps/generic/libc-start.h @@ -24,6 +24,7 @@ initialization, and this means you cannot, without machine knowledge, access TLS from an IFUNC resolver. */ #define ARCH_SETUP_IREL() apply_irel () +#define ARCH_SETUP_TLS() __libc_setup_tls () #define ARCH_APPLY_IREL() #endif /* ! SHARED */ diff --git a/sysdeps/mach/hurd/i386/init-first.c b/sysdeps/mach/hurd/i386/init-first.c index e272e329ad..8b6e62be14 100644 --- a/sysdeps/mach/hurd/i386/init-first.c +++ b/sysdeps/mach/hurd/i386/init-first.c @@ -104,12 +104,12 @@ init1 (int argc, char *arg0, ...) ++envp; d = (void *) ++envp; +#ifndef SHARED /* If we are the bootstrap task started by the kernel, then after the environment pointers there is no Hurd data block; the argument strings start there. */ if ((void *) d == argv[0] || d->phdr == 0) { -#ifndef SHARED /* With a new enough linker (binutils-2.23 or better), the magic __ehdr_start symbol will be available and __libc_start_main will have done this that way already. */ @@ -124,18 +124,27 @@ init1 (int argc, char *arg0, ...) _dl_phnum = ehdr->e_phnum; assert (ehdr->e_phentsize == sizeof (ElfW(Phdr))); } -#endif - return; } + else + { + __libc_enable_secure = d->flags & EXEC_SECURE; -#ifndef SHARED - __libc_enable_secure = d->flags & EXEC_SECURE; + _dl_phdr = (ElfW(Phdr) *) d->phdr; + _dl_phnum = d->phdrsz / sizeof (ElfW(Phdr)); + assert (d->phdrsz % sizeof (ElfW(Phdr)) == 0); + } - _dl_phdr = (ElfW(Phdr) *) d->phdr; - _dl_phnum = d->phdrsz / sizeof (ElfW(Phdr)); - assert (d->phdrsz % sizeof (ElfW(Phdr)) == 0); + __libc_setup_tls (); #endif + /* Initialize libpthread if linked in. */ + if (__pthread_initialize_minimal != NULL) + __pthread_initialize_minimal (); + + if ((void *) d == argv[0]) + /* No Hurd data block to process. */ + return; + _hurd_init_dtable = d->dtable; _hurd_init_dtablesize = d->dtablesize; diff --git a/sysdeps/mach/hurd/libc-start.h b/sysdeps/mach/hurd/libc-start.h new file mode 100644 index 0000000000..f7e39935ce --- /dev/null +++ b/sysdeps/mach/hurd/libc-start.h @@ -0,0 +1,31 @@ +/* Hurd definitions for libc main startup. + Copyright (C) 2017-2018 Free Software Foundation, Inc. + This file is part of the GNU C Library. + + The GNU C Library is free software; you can redistribute it and/or + modify it under the terms of the GNU Lesser General Public + License as published by the Free Software Foundation; either + version 2.1 of the License, or (at your option) any later version. + + The GNU C Library is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public + License along with the GNU C Library; if not, see + . */ + +#ifndef _LIBC_START_H +#define _LIBC_START_H + +#ifndef SHARED +/* By default we perform STT_GNU_IFUNC resolution *before* TLS + initialization, and this means you cannot, without machine + knowledge, access TLS from an IFUNC resolver. */ +#define ARCH_SETUP_IREL() apply_irel () +#define ARCH_SETUP_TLS() +#define ARCH_APPLY_IREL() +#endif /* ! SHARED */ + +#endif /* _LIBC_START_H */ diff --git a/sysdeps/unix/sysv/linux/powerpc/libc-start.h b/sysdeps/unix/sysv/linux/powerpc/libc-start.h index 46b38b097a..689abb01a1 100644 --- a/sysdeps/unix/sysv/linux/powerpc/libc-start.h +++ b/sysdeps/unix/sysv/linux/powerpc/libc-start.h @@ -23,6 +23,7 @@ /* IREL{,A} must happen after TCB initialization in order to allow IFUNC resolvers to read TCB fields, e.g. hwcap and at_platform. */ #define ARCH_SETUP_IREL() +#define ARCH_SETUP_TLS() __libc_setup_tls () #define ARCH_APPLY_IREL() apply_irel () #endif /* ! SHARED */