2015-01-22 03:40:55 +00:00
|
|
|
/*
|
2018-03-19 17:37:46 +00:00
|
|
|
* Copyright 2000-2018 The OpenSSL Project Authors. All Rights Reserved.
|
2000-04-04 21:57:11 +00:00
|
|
|
*
|
2018-12-06 12:37:48 +00:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-17 18:51:26 +00:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
2000-04-04 21:57:11 +00:00
|
|
|
*/
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/*
|
|
|
|
* We need to do this early, because stdio.h includes the header files that
|
|
|
|
* handle _GNU_SOURCE and other similar macros. Defining it later is simply
|
|
|
|
* too late, because those headers are protected from re- inclusion.
|
|
|
|
*/
|
2013-12-23 18:06:34 +00:00
|
|
|
#ifndef _GNU_SOURCE
|
2015-01-22 03:40:55 +00:00
|
|
|
# define _GNU_SOURCE /* make sure dladdr is declared */
|
2005-06-06 00:50:52 +00:00
|
|
|
#endif
|
|
|
|
|
2016-03-22 17:16:54 +00:00
|
|
|
#include "dso_locl.h"
|
2018-11-21 11:57:04 +00:00
|
|
|
#include "e_os.h"
|
2000-04-04 21:57:11 +00:00
|
|
|
|
2016-03-22 17:35:03 +00:00
|
|
|
#ifdef DSO_DLFCN
|
2000-04-04 21:57:11 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
# ifdef HAVE_DLFCN_H
|
|
|
|
# ifdef __osf__
|
|
|
|
# define __EXTENSIONS__
|
|
|
|
# endif
|
|
|
|
# include <dlfcn.h>
|
|
|
|
# define HAVE_DLINFO 1
|
2018-03-19 17:37:46 +00:00
|
|
|
# if defined(__CYGWIN__) || \
|
2008-01-04 23:03:23 +00:00
|
|
|
defined(__SCO_VERSION__) || defined(_SCO_ELF) || \
|
2011-02-12 16:43:41 +00:00
|
|
|
(defined(__osf__) && !defined(RTLD_NEXT)) || \
|
2011-02-02 15:07:13 +00:00
|
|
|
(defined(__OpenBSD__) && !defined(RTLD_SELF)) || \
|
2015-01-22 03:40:55 +00:00
|
|
|
defined(__ANDROID__)
|
|
|
|
# undef HAVE_DLINFO
|
|
|
|
# endif
|
2008-01-04 23:03:23 +00:00
|
|
|
# endif
|
2000-04-04 21:57:11 +00:00
|
|
|
|
2000-04-19 21:45:17 +00:00
|
|
|
/* Part of the hack in "dlfcn_load" ... */
|
2015-01-22 03:40:55 +00:00
|
|
|
# define DSO_MAX_TRANSLATED_SIZE 256
|
2000-04-19 21:45:17 +00:00
|
|
|
|
This changes the behaviour of the DSO mechanism for determining an
appropriate filename translation on the host system. Apart from this point,
users should also note that there's a slight change in the API functions
too. The DSO now contains its own to-be-converted filename
("dso->filename"), and at the time the DSO loads the "dso->loaded_filename"
value is set to the translated form. As such, this also provides an impicit
way of determining if the DSO is currently loaded or not. Except, perhaps,
VMS .... :-)
The various DSO_METHODs have been updated for this mechanism except VMS
which is deliberately broken for now, Richard is going to look at how to
fit it in (the source comments in there explain "the issue").
Basically, the new callback scheme allows the filename conversion to
(a) be turned off altogether through the use of the
DSO_FLAG_NO_NAME_TRANSLATION flag,
(b) be handled in the default way using the default DSO_METHOD's converter
(c) overriden per-DSO by setting the override callback
(d) a mix of (b) and (c) - eg. implement an override callback that;
(i) checks if we're win32 "if(strstr(dso->meth->name, "win32"))..."
and if so, convert "blah" into "blah32.dll" (the default is
otherwise to make it "blah.dll").
(ii) default to the normal behaviour - eg. we're not on win32, so
finish with (return dso->meth->dso_name_converter(dso,NULL)).
(e) be retried a number of times by writing a new DSO_METHOD where the
"dso_load()" handler will call the converter repeatedly. Then the
custom converter could use state information in the DSO to suggest
different conversions or paths each time it is invoked.
2000-10-26 17:38:59 +00:00
|
|
|
static int dlfcn_load(DSO *dso);
|
2000-04-04 21:57:11 +00:00
|
|
|
static int dlfcn_unload(DSO *dso);
|
2000-06-16 10:45:36 +00:00
|
|
|
static DSO_FUNC_TYPE dlfcn_bind_func(DSO *dso, const char *symname);
|
This changes the behaviour of the DSO mechanism for determining an
appropriate filename translation on the host system. Apart from this point,
users should also note that there's a slight change in the API functions
too. The DSO now contains its own to-be-converted filename
("dso->filename"), and at the time the DSO loads the "dso->loaded_filename"
value is set to the translated form. As such, this also provides an impicit
way of determining if the DSO is currently loaded or not. Except, perhaps,
VMS .... :-)
The various DSO_METHODs have been updated for this mechanism except VMS
which is deliberately broken for now, Richard is going to look at how to
fit it in (the source comments in there explain "the issue").
Basically, the new callback scheme allows the filename conversion to
(a) be turned off altogether through the use of the
DSO_FLAG_NO_NAME_TRANSLATION flag,
(b) be handled in the default way using the default DSO_METHOD's converter
(c) overriden per-DSO by setting the override callback
(d) a mix of (b) and (c) - eg. implement an override callback that;
(i) checks if we're win32 "if(strstr(dso->meth->name, "win32"))..."
and if so, convert "blah" into "blah32.dll" (the default is
otherwise to make it "blah.dll").
(ii) default to the normal behaviour - eg. we're not on win32, so
finish with (return dso->meth->dso_name_converter(dso,NULL)).
(e) be retried a number of times by writing a new DSO_METHOD where the
"dso_load()" handler will call the converter repeatedly. Then the
custom converter could use state information in the DSO to suggest
different conversions or paths each time it is invoked.
2000-10-26 17:38:59 +00:00
|
|
|
static char *dlfcn_name_converter(DSO *dso, const char *filename);
|
2002-07-15 15:35:40 +00:00
|
|
|
static char *dlfcn_merger(DSO *dso, const char *filespec1,
|
2015-01-22 03:40:55 +00:00
|
|
|
const char *filespec2);
|
2016-10-15 14:23:03 +00:00
|
|
|
static int dlfcn_pathbyaddr(void *addr, char *path, int sz);
|
2006-01-02 08:59:20 +00:00
|
|
|
static void *dlfcn_globallookup(const char *name);
|
2000-04-04 21:57:11 +00:00
|
|
|
|
|
|
|
static DSO_METHOD dso_meth_dlfcn = {
|
2015-01-22 03:40:55 +00:00
|
|
|
"OpenSSL 'dlfcn' shared library method",
|
|
|
|
dlfcn_load,
|
|
|
|
dlfcn_unload,
|
|
|
|
dlfcn_bind_func,
|
|
|
|
NULL, /* ctrl */
|
|
|
|
dlfcn_name_converter,
|
|
|
|
dlfcn_merger,
|
|
|
|
NULL, /* init */
|
|
|
|
NULL, /* finish */
|
2016-10-15 14:23:03 +00:00
|
|
|
dlfcn_pathbyaddr,
|
2015-01-22 03:40:55 +00:00
|
|
|
dlfcn_globallookup
|
|
|
|
};
|
2000-04-04 21:57:11 +00:00
|
|
|
|
2016-03-22 17:35:03 +00:00
|
|
|
DSO_METHOD *DSO_METHOD_openssl(void)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-03-22 17:35:03 +00:00
|
|
|
return &dso_meth_dlfcn;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Prior to using the dlopen() function, we should decide on the flag we
|
|
|
|
* send. There's a few different ways of doing this and it's a messy
|
|
|
|
* venn-diagram to match up which platforms support what. So as we don't have
|
|
|
|
* autoconf yet, I'm implementing a hack that could be hacked further
|
|
|
|
* relatively easily to deal with cases as we find them. Initially this is to
|
|
|
|
* cope with OpenBSD.
|
|
|
|
*/
|
|
|
|
# if defined(__OpenBSD__) || defined(__NetBSD__)
|
|
|
|
# ifdef DL_LAZY
|
|
|
|
# define DLOPEN_FLAG DL_LAZY
|
|
|
|
# else
|
|
|
|
# ifdef RTLD_NOW
|
|
|
|
# define DLOPEN_FLAG RTLD_NOW
|
|
|
|
# else
|
|
|
|
# define DLOPEN_FLAG 0
|
|
|
|
# endif
|
|
|
|
# endif
|
|
|
|
# else
|
|
|
|
# define DLOPEN_FLAG RTLD_NOW /* Hope this works everywhere else */
|
|
|
|
# endif
|
2000-06-21 14:12:25 +00:00
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/*
|
|
|
|
* For this DSO_METHOD, our meth_data STACK will contain; (i) the handle
|
|
|
|
* (void*) returned from dlopen().
|
2000-04-04 21:57:11 +00:00
|
|
|
*/
|
|
|
|
|
This changes the behaviour of the DSO mechanism for determining an
appropriate filename translation on the host system. Apart from this point,
users should also note that there's a slight change in the API functions
too. The DSO now contains its own to-be-converted filename
("dso->filename"), and at the time the DSO loads the "dso->loaded_filename"
value is set to the translated form. As such, this also provides an impicit
way of determining if the DSO is currently loaded or not. Except, perhaps,
VMS .... :-)
The various DSO_METHODs have been updated for this mechanism except VMS
which is deliberately broken for now, Richard is going to look at how to
fit it in (the source comments in there explain "the issue").
Basically, the new callback scheme allows the filename conversion to
(a) be turned off altogether through the use of the
DSO_FLAG_NO_NAME_TRANSLATION flag,
(b) be handled in the default way using the default DSO_METHOD's converter
(c) overriden per-DSO by setting the override callback
(d) a mix of (b) and (c) - eg. implement an override callback that;
(i) checks if we're win32 "if(strstr(dso->meth->name, "win32"))..."
and if so, convert "blah" into "blah32.dll" (the default is
otherwise to make it "blah.dll").
(ii) default to the normal behaviour - eg. we're not on win32, so
finish with (return dso->meth->dso_name_converter(dso,NULL)).
(e) be retried a number of times by writing a new DSO_METHOD where the
"dso_load()" handler will call the converter repeatedly. Then the
custom converter could use state information in the DSO to suggest
different conversions or paths each time it is invoked.
2000-10-26 17:38:59 +00:00
|
|
|
static int dlfcn_load(DSO *dso)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
void *ptr = NULL;
|
|
|
|
/* See applicable comments in dso_dl.c */
|
|
|
|
char *filename = DSO_convert_filename(dso, NULL);
|
|
|
|
int flags = DLOPEN_FLAG;
|
2018-11-21 11:57:04 +00:00
|
|
|
int saveerrno = get_last_sys_error();
|
2015-01-22 03:40:55 +00:00
|
|
|
|
|
|
|
if (filename == NULL) {
|
|
|
|
DSOerr(DSO_F_DLFCN_LOAD, DSO_R_NO_FILENAME);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
# ifdef RTLD_GLOBAL
|
|
|
|
if (dso->flags & DSO_FLAG_GLOBAL_SYMBOLS)
|
|
|
|
flags |= RTLD_GLOBAL;
|
2018-06-15 10:36:03 +00:00
|
|
|
# endif
|
|
|
|
# ifdef _AIX
|
|
|
|
if (filename[strlen(filename) - 1] == ')')
|
|
|
|
flags |= RTLD_MEMBER;
|
2015-01-22 03:40:55 +00:00
|
|
|
# endif
|
|
|
|
ptr = dlopen(filename, flags);
|
|
|
|
if (ptr == NULL) {
|
|
|
|
DSOerr(DSO_F_DLFCN_LOAD, DSO_R_LOAD_FAILED);
|
|
|
|
ERR_add_error_data(4, "filename(", filename, "): ", dlerror());
|
|
|
|
goto err;
|
|
|
|
}
|
2018-11-21 11:57:04 +00:00
|
|
|
/*
|
|
|
|
* Some dlopen() implementations (e.g. solaris) do no preserve errno, even
|
|
|
|
* on a successful call.
|
|
|
|
*/
|
|
|
|
set_sys_error(saveerrno);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (!sk_void_push(dso->meth_data, (char *)ptr)) {
|
|
|
|
DSOerr(DSO_F_DLFCN_LOAD, DSO_R_STACK_ERROR);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
/* Success */
|
|
|
|
dso->loaded_filename = filename;
|
2017-10-09 11:05:58 +00:00
|
|
|
return 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
err:
|
|
|
|
/* Cleanup! */
|
2015-05-01 14:02:07 +00:00
|
|
|
OPENSSL_free(filename);
|
2015-01-22 03:40:55 +00:00
|
|
|
if (ptr != NULL)
|
|
|
|
dlclose(ptr);
|
2017-10-17 14:04:09 +00:00
|
|
|
return 0;
|
This changes the behaviour of the DSO mechanism for determining an
appropriate filename translation on the host system. Apart from this point,
users should also note that there's a slight change in the API functions
too. The DSO now contains its own to-be-converted filename
("dso->filename"), and at the time the DSO loads the "dso->loaded_filename"
value is set to the translated form. As such, this also provides an impicit
way of determining if the DSO is currently loaded or not. Except, perhaps,
VMS .... :-)
The various DSO_METHODs have been updated for this mechanism except VMS
which is deliberately broken for now, Richard is going to look at how to
fit it in (the source comments in there explain "the issue").
Basically, the new callback scheme allows the filename conversion to
(a) be turned off altogether through the use of the
DSO_FLAG_NO_NAME_TRANSLATION flag,
(b) be handled in the default way using the default DSO_METHOD's converter
(c) overriden per-DSO by setting the override callback
(d) a mix of (b) and (c) - eg. implement an override callback that;
(i) checks if we're win32 "if(strstr(dso->meth->name, "win32"))..."
and if so, convert "blah" into "blah32.dll" (the default is
otherwise to make it "blah.dll").
(ii) default to the normal behaviour - eg. we're not on win32, so
finish with (return dso->meth->dso_name_converter(dso,NULL)).
(e) be retried a number of times by writing a new DSO_METHOD where the
"dso_load()" handler will call the converter repeatedly. Then the
custom converter could use state information in the DSO to suggest
different conversions or paths each time it is invoked.
2000-10-26 17:38:59 +00:00
|
|
|
}
|
2000-04-04 21:57:11 +00:00
|
|
|
|
|
|
|
static int dlfcn_unload(DSO *dso)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
void *ptr;
|
|
|
|
if (dso == NULL) {
|
|
|
|
DSOerr(DSO_F_DLFCN_UNLOAD, ERR_R_PASSED_NULL_PARAMETER);
|
2017-10-17 14:04:09 +00:00
|
|
|
return 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
if (sk_void_num(dso->meth_data) < 1)
|
2017-10-09 11:05:58 +00:00
|
|
|
return 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
ptr = sk_void_pop(dso->meth_data);
|
|
|
|
if (ptr == NULL) {
|
|
|
|
DSOerr(DSO_F_DLFCN_UNLOAD, DSO_R_NULL_HANDLE);
|
|
|
|
/*
|
|
|
|
* Should push the value back onto the stack in case of a retry.
|
|
|
|
*/
|
|
|
|
sk_void_push(dso->meth_data, ptr);
|
2017-10-17 14:04:09 +00:00
|
|
|
return 0;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
/* For now I'm not aware of any errors associated with dlclose() */
|
|
|
|
dlclose(ptr);
|
2017-10-09 11:05:58 +00:00
|
|
|
return 1;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2000-04-04 21:57:11 +00:00
|
|
|
|
2000-06-16 10:45:36 +00:00
|
|
|
static DSO_FUNC_TYPE dlfcn_bind_func(DSO *dso, const char *symname)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
void *ptr;
|
|
|
|
union {
|
|
|
|
DSO_FUNC_TYPE sym;
|
|
|
|
void *dlret;
|
|
|
|
} u;
|
|
|
|
|
|
|
|
if ((dso == NULL) || (symname == NULL)) {
|
|
|
|
DSOerr(DSO_F_DLFCN_BIND_FUNC, ERR_R_PASSED_NULL_PARAMETER);
|
2017-10-17 14:04:09 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
if (sk_void_num(dso->meth_data) < 1) {
|
|
|
|
DSOerr(DSO_F_DLFCN_BIND_FUNC, DSO_R_STACK_ERROR);
|
2017-10-17 14:04:09 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
ptr = sk_void_value(dso->meth_data, sk_void_num(dso->meth_data) - 1);
|
|
|
|
if (ptr == NULL) {
|
|
|
|
DSOerr(DSO_F_DLFCN_BIND_FUNC, DSO_R_NULL_HANDLE);
|
2017-10-17 14:04:09 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
u.dlret = dlsym(ptr, symname);
|
|
|
|
if (u.dlret == NULL) {
|
|
|
|
DSOerr(DSO_F_DLFCN_BIND_FUNC, DSO_R_SYM_FAILURE);
|
|
|
|
ERR_add_error_data(4, "symname(", symname, "): ", dlerror());
|
2017-10-17 14:04:09 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
return u.sym;
|
|
|
|
}
|
2000-04-04 21:57:11 +00:00
|
|
|
|
2002-07-15 15:35:40 +00:00
|
|
|
static char *dlfcn_merger(DSO *dso, const char *filespec1,
|
2015-01-22 03:40:55 +00:00
|
|
|
const char *filespec2)
|
|
|
|
{
|
|
|
|
char *merged;
|
|
|
|
|
|
|
|
if (!filespec1 && !filespec2) {
|
|
|
|
DSOerr(DSO_F_DLFCN_MERGER, ERR_R_PASSED_NULL_PARAMETER);
|
2017-10-17 14:04:09 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
/*
|
|
|
|
* If the first file specification is a rooted path, it rules. same goes
|
|
|
|
* if the second file specification is missing.
|
|
|
|
*/
|
|
|
|
if (!filespec2 || (filespec1 != NULL && filespec1[0] == '/')) {
|
2017-09-14 20:13:53 +00:00
|
|
|
merged = OPENSSL_strdup(filespec1);
|
2015-10-30 11:12:26 +00:00
|
|
|
if (merged == NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
DSOerr(DSO_F_DLFCN_MERGER, ERR_R_MALLOC_FAILURE);
|
2017-10-17 14:04:09 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* If the first file specification is missing, the second one rules.
|
|
|
|
*/
|
|
|
|
else if (!filespec1) {
|
2017-09-14 20:13:53 +00:00
|
|
|
merged = OPENSSL_strdup(filespec2);
|
2015-10-30 11:12:26 +00:00
|
|
|
if (merged == NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
DSOerr(DSO_F_DLFCN_MERGER, ERR_R_MALLOC_FAILURE);
|
2017-10-17 14:04:09 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2015-03-12 14:08:21 +00:00
|
|
|
} else {
|
2015-01-22 03:40:55 +00:00
|
|
|
/*
|
|
|
|
* This part isn't as trivial as it looks. It assumes that the
|
|
|
|
* second file specification really is a directory, and makes no
|
|
|
|
* checks whatsoever. Therefore, the result becomes the
|
|
|
|
* concatenation of filespec2 followed by a slash followed by
|
|
|
|
* filespec1.
|
|
|
|
*/
|
|
|
|
int spec2len, len;
|
|
|
|
|
|
|
|
spec2len = strlen(filespec2);
|
2015-03-12 14:08:21 +00:00
|
|
|
len = spec2len + strlen(filespec1);
|
2015-01-22 03:40:55 +00:00
|
|
|
|
2015-03-12 14:08:21 +00:00
|
|
|
if (spec2len && filespec2[spec2len - 1] == '/') {
|
2015-01-22 03:40:55 +00:00
|
|
|
spec2len--;
|
|
|
|
len--;
|
|
|
|
}
|
|
|
|
merged = OPENSSL_malloc(len + 2);
|
2015-10-30 11:12:26 +00:00
|
|
|
if (merged == NULL) {
|
2015-01-22 03:40:55 +00:00
|
|
|
DSOerr(DSO_F_DLFCN_MERGER, ERR_R_MALLOC_FAILURE);
|
2017-10-17 14:04:09 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
strcpy(merged, filespec2);
|
|
|
|
merged[spec2len] = '/';
|
|
|
|
strcpy(&merged[spec2len + 1], filespec1);
|
|
|
|
}
|
2017-10-17 14:04:09 +00:00
|
|
|
return merged;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
2009-07-15 18:00:04 +00:00
|
|
|
|
This changes the behaviour of the DSO mechanism for determining an
appropriate filename translation on the host system. Apart from this point,
users should also note that there's a slight change in the API functions
too. The DSO now contains its own to-be-converted filename
("dso->filename"), and at the time the DSO loads the "dso->loaded_filename"
value is set to the translated form. As such, this also provides an impicit
way of determining if the DSO is currently loaded or not. Except, perhaps,
VMS .... :-)
The various DSO_METHODs have been updated for this mechanism except VMS
which is deliberately broken for now, Richard is going to look at how to
fit it in (the source comments in there explain "the issue").
Basically, the new callback scheme allows the filename conversion to
(a) be turned off altogether through the use of the
DSO_FLAG_NO_NAME_TRANSLATION flag,
(b) be handled in the default way using the default DSO_METHOD's converter
(c) overriden per-DSO by setting the override callback
(d) a mix of (b) and (c) - eg. implement an override callback that;
(i) checks if we're win32 "if(strstr(dso->meth->name, "win32"))..."
and if so, convert "blah" into "blah32.dll" (the default is
otherwise to make it "blah.dll").
(ii) default to the normal behaviour - eg. we're not on win32, so
finish with (return dso->meth->dso_name_converter(dso,NULL)).
(e) be retried a number of times by writing a new DSO_METHOD where the
"dso_load()" handler will call the converter repeatedly. Then the
custom converter could use state information in the DSO to suggest
different conversions or paths each time it is invoked.
2000-10-26 17:38:59 +00:00
|
|
|
static char *dlfcn_name_converter(DSO *dso, const char *filename)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
char *translated;
|
|
|
|
int len, rsize, transform;
|
|
|
|
|
|
|
|
len = strlen(filename);
|
|
|
|
rsize = len + 1;
|
|
|
|
transform = (strstr(filename, "/") == NULL);
|
|
|
|
if (transform) {
|
|
|
|
/* We will convert this to "%s.so" or "lib%s.so" etc */
|
2016-02-15 16:20:15 +00:00
|
|
|
rsize += strlen(DSO_EXTENSION); /* The length of ".so" */
|
2015-01-22 03:40:55 +00:00
|
|
|
if ((DSO_flags(dso) & DSO_FLAG_NAME_TRANSLATION_EXT_ONLY) == 0)
|
|
|
|
rsize += 3; /* The length of "lib" */
|
|
|
|
}
|
|
|
|
translated = OPENSSL_malloc(rsize);
|
|
|
|
if (translated == NULL) {
|
|
|
|
DSOerr(DSO_F_DLFCN_NAME_CONVERTER, DSO_R_NAME_TRANSLATION_FAILED);
|
2017-10-17 14:04:09 +00:00
|
|
|
return NULL;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
if (transform) {
|
|
|
|
if ((DSO_flags(dso) & DSO_FLAG_NAME_TRANSLATION_EXT_ONLY) == 0)
|
2016-02-15 16:20:15 +00:00
|
|
|
sprintf(translated, "lib%s" DSO_EXTENSION, filename);
|
2015-01-22 03:40:55 +00:00
|
|
|
else
|
2016-02-15 16:20:15 +00:00
|
|
|
sprintf(translated, "%s" DSO_EXTENSION, filename);
|
2015-01-22 03:40:55 +00:00
|
|
|
} else
|
|
|
|
sprintf(translated, "%s", filename);
|
2017-10-17 14:04:09 +00:00
|
|
|
return translated;
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
# ifdef __sgi
|
2015-01-16 14:43:29 +00:00
|
|
|
/*-
|
2005-06-05 18:13:38 +00:00
|
|
|
This is a quote from IRIX manual for dladdr(3c):
|
|
|
|
|
|
|
|
<dlfcn.h> does not contain a prototype for dladdr or definition of
|
|
|
|
Dl_info. The #include <dlfcn.h> in the SYNOPSIS line is traditional,
|
|
|
|
but contains no dladdr prototype and no IRIX library contains an
|
|
|
|
implementation. Write your own declaration based on the code below.
|
|
|
|
|
|
|
|
The following code is dependent on internal interfaces that are not
|
|
|
|
part of the IRIX compatibility guarantee; however, there is no future
|
|
|
|
intention to change this interface, so on a practical level, the code
|
|
|
|
below is safe to use on IRIX.
|
2005-12-18 20:59:25 +00:00
|
|
|
*/
|
2015-01-22 03:40:55 +00:00
|
|
|
# include <rld_interface.h>
|
|
|
|
# ifndef _RLD_INTERFACE_DLFCN_H_DLADDR
|
|
|
|
# define _RLD_INTERFACE_DLFCN_H_DLADDR
|
2005-06-05 18:13:38 +00:00
|
|
|
typedef struct Dl_info {
|
2015-01-22 03:40:55 +00:00
|
|
|
const char *dli_fname;
|
|
|
|
void *dli_fbase;
|
|
|
|
const char *dli_sname;
|
|
|
|
void *dli_saddr;
|
|
|
|
int dli_version;
|
|
|
|
int dli_reserved1;
|
|
|
|
long dli_reserved[4];
|
2005-06-05 18:13:38 +00:00
|
|
|
} Dl_info;
|
2015-01-22 03:40:55 +00:00
|
|
|
# else
|
2005-06-05 18:13:38 +00:00
|
|
|
typedef struct Dl_info Dl_info;
|
2015-01-22 03:40:55 +00:00
|
|
|
# endif
|
|
|
|
# define _RLD_DLADDR 14
|
2005-06-05 18:13:38 +00:00
|
|
|
|
|
|
|
static int dladdr(void *address, Dl_info *dl)
|
|
|
|
{
|
2015-01-22 03:40:55 +00:00
|
|
|
void *v;
|
|
|
|
v = _rld_new_interface(_RLD_DLADDR, address, dl);
|
|
|
|
return (int)v;
|
|
|
|
}
|
|
|
|
# endif /* __sgi */
|
|
|
|
|
2018-03-19 17:37:46 +00:00
|
|
|
# ifdef _AIX
|
|
|
|
/*-
|
|
|
|
* See IBM's AIX Version 7.2, Technical Reference:
|
|
|
|
* Base Operating System and Extensions, Volume 1 and 2
|
|
|
|
* https://www.ibm.com/support/knowledgecenter/ssw_aix_72/com.ibm.aix.base/technicalreferences.htm
|
|
|
|
*/
|
|
|
|
# include <sys/ldr.h>
|
|
|
|
# include <errno.h>
|
|
|
|
/* ~ 64 * (sizeof(struct ld_info) + _XOPEN_PATH_MAX + _XOPEN_NAME_MAX) */
|
|
|
|
# define DLFCN_LDINFO_SIZE 86976
|
|
|
|
typedef struct Dl_info {
|
|
|
|
const char *dli_fname;
|
|
|
|
} Dl_info;
|
|
|
|
/*
|
|
|
|
* This dladdr()-implementation will also find the ptrgl (Pointer Glue) virtual
|
|
|
|
* address of a function, which is just located in the DATA segment instead of
|
|
|
|
* the TEXT segment.
|
|
|
|
*/
|
2018-04-12 10:25:27 +00:00
|
|
|
static int dladdr(void *ptr, Dl_info *dl)
|
2018-03-19 17:37:46 +00:00
|
|
|
{
|
2018-04-12 10:25:27 +00:00
|
|
|
uintptr_t addr = (uintptr_t)ptr;
|
2018-03-19 17:37:46 +00:00
|
|
|
unsigned int found = 0;
|
|
|
|
struct ld_info *ldinfos, *next_ldi, *this_ldi;
|
|
|
|
|
2018-06-15 10:36:03 +00:00
|
|
|
if ((ldinfos = OPENSSL_malloc(DLFCN_LDINFO_SIZE)) == NULL) {
|
2018-03-19 17:37:46 +00:00
|
|
|
errno = ENOMEM;
|
|
|
|
dl->dli_fname = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((loadquery(L_GETINFO, (void *)ldinfos, DLFCN_LDINFO_SIZE)) < 0) {
|
|
|
|
/*-
|
|
|
|
* Error handling is done through errno and dlerror() reading errno:
|
|
|
|
* ENOMEM (ldinfos buffer is too small),
|
|
|
|
* EINVAL (invalid flags),
|
|
|
|
* EFAULT (invalid ldinfos ptr)
|
|
|
|
*/
|
|
|
|
OPENSSL_free((void *)ldinfos);
|
|
|
|
dl->dli_fname = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
next_ldi = ldinfos;
|
|
|
|
|
|
|
|
do {
|
|
|
|
this_ldi = next_ldi;
|
2018-04-12 10:25:27 +00:00
|
|
|
if (((addr >= (uintptr_t)this_ldi->ldinfo_textorg)
|
|
|
|
&& (addr < ((uintptr_t)this_ldi->ldinfo_textorg +
|
|
|
|
this_ldi->ldinfo_textsize)))
|
|
|
|
|| ((addr >= (uintptr_t)this_ldi->ldinfo_dataorg)
|
|
|
|
&& (addr < ((uintptr_t)this_ldi->ldinfo_dataorg +
|
|
|
|
this_ldi->ldinfo_datasize)))) {
|
2018-06-15 10:36:03 +00:00
|
|
|
char *buffer, *member;
|
|
|
|
size_t buffer_sz, member_len;
|
|
|
|
|
|
|
|
buffer_sz = strlen(this_ldi->ldinfo_filename) + 1;
|
|
|
|
member = this_ldi->ldinfo_filename + buffer_sz;
|
|
|
|
if ((member_len = strlen(member)) > 0)
|
|
|
|
buffer_sz += 1 + member_len + 1;
|
2018-03-19 17:37:46 +00:00
|
|
|
found = 1;
|
2018-06-15 10:36:03 +00:00
|
|
|
if ((buffer = OPENSSL_malloc(buffer_sz)) != NULL) {
|
|
|
|
OPENSSL_strlcpy(buffer, this_ldi->ldinfo_filename, buffer_sz);
|
|
|
|
if (member_len > 0) {
|
|
|
|
/*
|
|
|
|
* Need to respect a possible member name and not just
|
|
|
|
* returning the path name in this case. See docs:
|
|
|
|
* sys/ldr.h, loadquery() and dlopen()/RTLD_MEMBER.
|
|
|
|
*/
|
|
|
|
OPENSSL_strlcat(buffer, "(", buffer_sz);
|
|
|
|
OPENSSL_strlcat(buffer, member, buffer_sz);
|
|
|
|
OPENSSL_strlcat(buffer, ")", buffer_sz);
|
|
|
|
}
|
|
|
|
dl->dli_fname = buffer;
|
|
|
|
} else {
|
2018-03-19 17:37:46 +00:00
|
|
|
errno = ENOMEM;
|
2018-06-15 10:36:03 +00:00
|
|
|
}
|
2018-03-19 17:37:46 +00:00
|
|
|
} else {
|
2018-06-15 10:36:03 +00:00
|
|
|
next_ldi = (struct ld_info *)((uintptr_t)this_ldi +
|
|
|
|
this_ldi->ldinfo_next);
|
2018-03-19 17:37:46 +00:00
|
|
|
}
|
|
|
|
} while (this_ldi->ldinfo_next && !found);
|
|
|
|
OPENSSL_free((void *)ldinfos);
|
|
|
|
return (found && dl->dli_fname != NULL);
|
|
|
|
}
|
|
|
|
# endif /* _AIX */
|
|
|
|
|
2016-10-15 14:23:03 +00:00
|
|
|
static int dlfcn_pathbyaddr(void *addr, char *path, int sz)
|
|
|
|
{
|
|
|
|
# ifdef HAVE_DLINFO
|
|
|
|
Dl_info dli;
|
|
|
|
int len;
|
|
|
|
|
|
|
|
if (addr == NULL) {
|
|
|
|
union {
|
|
|
|
int (*f) (void *, char *, int);
|
|
|
|
void *p;
|
|
|
|
} t = {
|
|
|
|
dlfcn_pathbyaddr
|
|
|
|
};
|
|
|
|
addr = t.p;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dladdr(addr, &dli)) {
|
|
|
|
len = (int)strlen(dli.dli_fname);
|
2018-03-19 17:37:46 +00:00
|
|
|
if (sz <= 0) {
|
|
|
|
# ifdef _AIX
|
2018-04-12 10:25:27 +00:00
|
|
|
OPENSSL_free((void *)dli.dli_fname);
|
2018-03-19 17:37:46 +00:00
|
|
|
# endif
|
2016-10-15 14:23:03 +00:00
|
|
|
return len + 1;
|
2018-03-19 17:37:46 +00:00
|
|
|
}
|
2016-10-15 14:23:03 +00:00
|
|
|
if (len >= sz)
|
|
|
|
len = sz - 1;
|
|
|
|
memcpy(path, dli.dli_fname, len);
|
|
|
|
path[len++] = 0;
|
2018-03-19 17:37:46 +00:00
|
|
|
# ifdef _AIX
|
2018-04-12 10:25:27 +00:00
|
|
|
OPENSSL_free((void *)dli.dli_fname);
|
2018-03-19 17:37:46 +00:00
|
|
|
# endif
|
2016-10-15 14:23:03 +00:00
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
ERR_add_error_data(2, "dlfcn_pathbyaddr(): ", dlerror());
|
|
|
|
# endif
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2006-01-02 08:59:20 +00:00
|
|
|
static void *dlfcn_globallookup(const char *name)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
|
|
|
void *ret = NULL, *handle = dlopen(NULL, RTLD_LAZY);
|
|
|
|
|
|
|
|
if (handle) {
|
|
|
|
ret = dlsym(handle, name);
|
|
|
|
dlclose(handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif /* DSO_DLFCN */
|