xref: /titanic_52/usr/src/cmd/sgs/rtld/common/tls.c (revision f498645a3eecf2ddd304b4ea9c7f1b4c155ff79e)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 
29 #include <stdio.h>
30 #include <strings.h>
31 #include <sys/types.h>
32 #include <dlfcn.h>
33 #include <libc_int.h>
34 #include <_rtld.h>
35 #include <_elf.h>
36 #include <msg.h>
37 #include <debug.h>
38 
39 #define	TLSBLOCKCNT	16	/* number of blocks of tmi_bits to allocate */
40 				/* at a time. */
41 typedef struct {
42 	uint_t	*tmi_bits;
43 	ulong_t	tmi_lowfree;
44 	ulong_t	tmi_cnt;
45 } Tlsmodid;
46 
47 static Tlsmodid	tmid = {0, 0, 0};
48 
49 static ulong_t
50 tls_getmodid()
51 {
52 	ulong_t	ndx, cnt;
53 
54 	if (tmid.tmi_bits == 0) {
55 		if ((tmid.tmi_bits = calloc(TLSBLOCKCNT, sizeof (uint_t))) == 0)
56 			return ((ulong_t)-1);
57 		tmid.tmi_bits[0] = 1;
58 		tmid.tmi_lowfree = 1;
59 		tmid.tmi_cnt = TLSBLOCKCNT;
60 		return (0);
61 	}
62 
63 	for (cnt = tmid.tmi_lowfree / (sizeof (uint_t) * 8);
64 	    cnt < tmid.tmi_cnt; cnt++) {
65 		uint_t	bits;
66 
67 		/*
68 		 * If all bits are assigned - move on.
69 		 */
70 		if ((tmid.tmi_bits[cnt] ^ ~((uint_t)0)) == 0)
71 			continue;
72 
73 		for (ndx = 0, bits = 1; bits; bits = bits << 1, ndx++) {
74 			if ((tmid.tmi_bits[cnt] & bits) == 0) {
75 				tmid.tmi_bits[cnt] |= bits;
76 				ndx = (cnt * (sizeof (uint_t)) * 8) + ndx;
77 				tmid.tmi_lowfree = ndx + 1;
78 				return (ndx);
79 			}
80 		}
81 	}
82 
83 	/*
84 	 * All bits taken - must allocate a new block
85 	 */
86 	if ((tmid.tmi_bits = realloc(tmid.tmi_bits,
87 	    ((tmid.tmi_cnt * sizeof (uint_t)) +
88 	    (TLSBLOCKCNT * sizeof (uint_t))))) == 0)
89 		return ((ulong_t)-1);
90 
91 	/*
92 	 * Clear out the tail of the new allocation.
93 	 */
94 	bzero(&(tmid.tmi_bits[tmid.tmi_cnt]), TLSBLOCKCNT * sizeof (uint_t));
95 	tmid.tmi_bits[tmid.tmi_cnt] = 1;
96 	ndx = (tmid.tmi_cnt * sizeof (uint_t)) * 8;
97 	tmid.tmi_lowfree = ndx + 1;
98 	tmid.tmi_cnt += TLSBLOCKCNT;
99 
100 	return (ndx);
101 }
102 
103 void
104 tls_freemodid(ulong_t modid)
105 {
106 	ulong_t	i;
107 	uint_t	j;
108 
109 	i = modid / (sizeof (uint_t) * 8);
110 	/* LINTED */
111 	j = modid % (sizeof (uint_t) * 8);
112 	j = ~(1 << j);
113 	tmid.tmi_bits[i] &= j;
114 	if (modid < tmid.tmi_lowfree)
115 		tmid.tmi_lowfree = modid;
116 }
117 
118 void
119 tls_modaddrem(Rt_map *lmp, uint_t flag)
120 {
121 	Lm_list		*lml = LIST(lmp);
122 	TLS_modinfo	tmi;
123 	Phdr		*tlsphdr;
124 	void		(*fptr)(TLS_modinfo *);
125 
126 	if (flag & TM_FLG_MODADD) {
127 		fptr = (void (*)())lml->lm_lcs[CI_TLS_MODADD].lc_un.lc_func;
128 	} else if (FLAGS1(lmp) & FL1_RT_TLSADD) {
129 		fptr = (void (*)())lml->lm_lcs[CI_TLS_MODREM].lc_un.lc_func;
130 	} else {
131 		return;
132 	}
133 
134 	tlsphdr = PTTLS(lmp);
135 
136 	bzero(&tmi, sizeof (tmi));
137 	tmi.tm_modname = PATHNAME(lmp);
138 	tmi.tm_modid = TLSMODID(lmp);
139 	tmi.tm_tlsblock = (void *)(tlsphdr->p_vaddr);
140 
141 	if (!(FLAGS(lmp) & FLG_RT_FIXED))
142 		tmi.tm_tlsblock = (void *)((uintptr_t)tmi.tm_tlsblock +
143 			ADDR(lmp));
144 
145 	tmi.tm_filesz = tlsphdr->p_filesz;
146 	tmi.tm_memsz = tlsphdr->p_memsz;
147 	tmi.tm_flags = 0;
148 	tmi.tm_stattlsoffset = 0;
149 
150 	DBG_CALL(Dbg_tls_modactivity(LIST(lmp), &tmi, flag));
151 	(*fptr)(&tmi);
152 
153 	/*
154 	 * Tag that this link-map has registered its TLS, and, if this object
155 	 * is being removed, free up the module id.
156 	 */
157 	FLAGS1(lmp) |= FL1_RT_TLSADD;
158 
159 	if (flag & TM_FLG_MODREM)
160 		tls_freemodid(TLSMODID(lmp));
161 }
162 
163 static ulong_t	tls_static_size = 0;	/* static TLS buffer size */
164 static ulong_t	tls_static_resv = 512;	/* (extra) static TLS reservation */
165 
166 /*
167  * Track any static TLS use, retain the TLS header, and assign a TLS module
168  * identifier.
169  */
170 int
171 tls_assign(Lm_list *lml, Rt_map *lmp, Phdr *phdr)
172 {
173 	ulong_t	memsz = S_ROUND(phdr->p_memsz, M_TLSSTATALIGN);
174 	ulong_t	filesz = phdr->p_filesz;
175 	ulong_t	resv = tls_static_resv;
176 
177 	/*
178 	 * If this object explicitly references static TLS, then there are some
179 	 * limitations.
180 	 */
181 	if (FLAGS1(lmp) & FL1_RT_TLSSTAT) {
182 		/*
183 		 * Static TLS is only available to objects on the primary
184 		 * link-map list.
185 		 */
186 		if ((lml->lm_flags & LML_FLG_BASELM) == 0) {
187 			eprintf(lml, ERR_FATAL, MSG_INTL(MSG_TLS_STATBASE),
188 			    NAME(lmp));
189 			return (0);
190 		}
191 
192 		/*
193 		 * All TLS blocks that are processed before thread
194 		 * initialization, are registered with libc.  This
195 		 * initialization is carried out through a handshake with libc
196 		 * prior to executing any user code (ie. before the first .init
197 		 * sections are called).  As part of this initialization, a
198 		 * small backup TLS reservation is added (tls_static_resv).
199 		 * Only explicit static TLS references that can be satisfied by
200 		 * this TLS backup reservation can be satisfied.
201 		 */
202 		if (rtld_flags2 & RT_FL2_PLMSETUP) {
203 			/*
204 			 * Initialized static TLS can not be satisfied from the
205 			 * TLS backup reservation.
206 			 */
207 			if (filesz) {
208 				eprintf(lml, ERR_FATAL,
209 				    MSG_INTL(MSG_TLS_STATINIT), NAME(lmp));
210 				return (0);
211 			}
212 
213 			/*
214 			 * Make sure the backup reservation is sufficient.
215 			 */
216 			if (memsz > tls_static_resv) {
217 				eprintf(lml, ERR_FATAL,
218 				    MSG_INTL(MSG_TLS_STATSIZE), NAME(lmp),
219 				    EC_XWORD(memsz), EC_XWORD(tls_static_resv));
220 				return (0);
221 			}
222 
223 			tls_static_resv -= memsz;
224 		}
225 	}
226 
227 	/*
228 	 * If we haven't yet initialized threads, or this static reservation can
229 	 * be satisfied from the TLS backup reservation, determine the total
230 	 * static TLS size, and assign this object a static TLS offset.
231 	 */
232 	if (((rtld_flags2 & RT_FL2_PLMSETUP) == 0) ||
233 	    (FLAGS1(lmp) & FL1_RT_TLSSTAT)) {
234 		tls_static_size += memsz;
235 		TLSSTATOFF(lmp) = tls_static_size;
236 	}
237 
238 	/*
239 	 * Retain the PT_TLS header, obtain a new module identifier, and
240 	 * indicate that this link-map list contains a new TLS object.
241 	 */
242 	PTTLS(lmp) = phdr;
243 	TLSMODID(lmp) = tls_getmodid();
244 
245 	/*
246 	 * Now that we have a TLS module id, generate any static TLS reservation
247 	 * diagnostic.
248 	 */
249 	if (resv != tls_static_resv)
250 		DBG_CALL(Dbg_tls_static_resv(lmp, memsz, tls_static_resv));
251 
252 	return (++lml->lm_tls);
253 }
254 
255 int
256 tls_statmod(Lm_list *lml, Rt_map *lmp)
257 {
258 	uint_t		tlsmodndx, tlsmodcnt = lml->lm_tls;
259 	TLS_modinfo	**tlsmodlist, *tlsbuflist;
260 	Phdr		*tlsphdr;
261 	void		(*fptr)(TLS_modinfo **, ulong_t);
262 
263 	fptr = (void (*)())lml->lm_lcs[CI_TLS_STATMOD].lc_un.lc_func;
264 
265 	/*
266 	 * If we don't have any TLS modules - report that and return.
267 	 */
268 	if (tlsmodcnt == 0) {
269 		if (fptr)
270 			(*fptr)(0, 0);
271 		DBG_CALL(Dbg_tls_static_block(&lml_main, 0, 0,
272 		    tls_static_resv));
273 		return (1);
274 	}
275 	lml->lm_tls = 0;
276 
277 	/*
278 	 * Allocate a buffer to report the TLS modules, the buffer consists of:
279 	 *
280 	 *	TLS_modinfo *	ptrs[tlsmodcnt + 1]
281 	 *	TLS_modinfo	bufs[tlsmodcnt]
282 	 *
283 	 * The ptrs are initialized to the bufs - except the last
284 	 * one which null terminates the array.
285 	 */
286 	if ((tlsmodlist = calloc((sizeof (TLS_modinfo *) * (tlsmodcnt + 1)) +
287 	    (sizeof (TLS_modinfo) * tlsmodcnt), 1)) == 0)
288 		return (0);
289 
290 	tlsbuflist = (TLS_modinfo *)((uintptr_t)tlsmodlist +
291 	    ((tlsmodcnt + 1) * sizeof (TLS_modinfo *)));
292 
293 	for (tlsmodndx = 0; tlsmodndx < tlsmodcnt; tlsmodndx++)
294 		tlsmodlist[tlsmodndx] = &tlsbuflist[tlsmodndx];
295 
296 	/*
297 	 * Account for the initial dtv ptr in the TLSSIZE calculation.
298 	 */
299 	tlsmodndx = 0;
300 	for (lmp = lml->lm_head; lmp; lmp = (Rt_map *)NEXT(lmp)) {
301 		if ((FCT(lmp) != &elf_fct) ||
302 		    (PTTLS(lmp) == 0) || (PTTLS(lmp)->p_memsz == 0))
303 			continue;
304 
305 		tlsphdr = PTTLS(lmp);
306 
307 		tlsmodlist[tlsmodndx]->tm_modname = PATHNAME(lmp);
308 		tlsmodlist[tlsmodndx]->tm_modid = TLSMODID(lmp);
309 		tlsmodlist[tlsmodndx]->tm_tlsblock = (void *)(tlsphdr->p_vaddr);
310 
311 		if (!(FLAGS(lmp) & FLG_RT_FIXED)) {
312 			tlsmodlist[tlsmodndx]->tm_tlsblock = (void *)
313 			    ((uintptr_t)tlsmodlist[tlsmodndx]->tm_tlsblock +
314 			    ADDR(lmp));
315 		}
316 		tlsmodlist[tlsmodndx]->tm_filesz = tlsphdr->p_filesz;
317 		tlsmodlist[tlsmodndx]->tm_memsz = tlsphdr->p_memsz;
318 		tlsmodlist[tlsmodndx]->tm_flags = TM_FLG_STATICTLS;
319 		tlsmodlist[tlsmodndx]->tm_stattlsoffset = TLSSTATOFF(lmp);
320 		tlsmodndx++;
321 	}
322 
323 	DBG_CALL(Dbg_tls_static_block(&lml_main, (void *)tlsmodlist,
324 	    tls_static_size, tls_static_resv));
325 	(*fptr)(tlsmodlist, (tls_static_size + tls_static_resv));
326 
327 	/*
328 	 * We're done with the list - clean it up.
329 	 */
330 	free(tlsmodlist);
331 	return (1);
332 }
333