libloading/os/unix/
mod.rs

1// A hack for docs.rs to build documentation that has both windows and linux documentation in the
2// same rustdoc build visible.
3#[cfg(all(libloading_docs, not(unix)))]
4mod unix_imports {}
5#[cfg(any(not(libloading_docs), unix))]
6mod unix_imports {
7    pub(super) use std::os::unix::ffi::OsStrExt;
8}
9
10pub use self::consts::*;
11use self::unix_imports::*;
12use std::ffi::{CStr, OsStr};
13use std::os::raw;
14use std::{fmt, marker, mem, ptr};
15use util::{cstr_cow_from_bytes, ensure_compatible_types};
16
17mod consts;
18
19/// Run code and handle errors reported by `dlerror`.
20///
21/// This function first executes the `closure` function containing calls to the functions that
22/// report their errors via `dlerror`. This closure may return either `None` or `Some(*)` to
23/// further affect operation of this function.
24///
25/// In case the `closure` returns `None`, `with_dlerror` inspects the `dlerror`. `dlerror` may
26/// decide to not provide any error description, in which case `Err(None)` is returned to the
27/// caller. Otherwise the `error` callback is invoked to allow inspection and conversion of the
28/// error message. The conversion result is returned as `Err(Some(Error))`.
29///
30/// If the operations that report their errors via `dlerror` were all successful, `closure` should
31/// return `Some(T)` instead. In this case `dlerror` is not inspected at all.
32///
33/// # Notes
34///
35/// The whole `dlerror` handling scheme is done via setting and querying some global state. For
36/// that reason it is not safe to use dynamic library loading in MT-capable environment at all.
37/// Only in POSIX 2008+TC1 a thread-local state was allowed for `dlerror`, making the dl* family of
38/// functions possibly MT-safe, depending on the implementation of `dlerror`.
39///
40/// In practice (as of 2020-04-01) most of the widely used targets use a thread-local for error
41/// state and have been doing so for a long time.
42pub fn with_dlerror<T, F, Error>(closure: F, error: fn(&CStr) -> Error) -> Result<T, Option<Error>>
43where
44    F: FnOnce() -> Option<T>,
45{
46    // We used to guard all uses of dl* functions with our own mutex. This made them safe to use in
47    // MT programs provided the only way a program used dl* was via this library. However, it also
48    // had a number of downsides or cases where it failed to handle the problems. For instance,
49    // if any other library called `dlerror` internally concurrently with `libloading` things would
50    // still go awry.
51    //
52    // On platforms where `dlerror` is still MT-unsafe, `dlsym` (`Library::get`) can spuriously
53    // succeed and return a null pointer for a symbol when the actual symbol look-up operation
54    // fails. Instances where the actual symbol _could_ be `NULL` are platform specific. For
55    // instance on GNU glibc based-systems (an excerpt from dlsym(3)):
56    //
57    // > The value of a symbol returned by dlsym() will never be NULL if the shared object is the
58    // > result of normal compilation,  since  a  global  symbol is never placed at the NULL
59    // > address. There are nevertheless cases where a lookup using dlsym() may return NULL as the
60    // > value of a symbol. For example, the symbol value may be  the  result of a GNU indirect
61    // > function (IFUNC) resolver function that returns NULL as the resolved value.
62
63    // While we could could call `dlerror` here to clear the previous error value, only the `dlsym`
64    // call depends on it being cleared beforehand and only in some cases too. We will instead
65    // clear the error inside the dlsym binding instead.
66    //
67    // In all the other cases, clearing the error here will only be hiding misuse of these bindings
68    // or a bug in implementation of dl* family of functions.
69    closure().ok_or_else(|| unsafe {
70        // This code will only get executed if the `closure` returns `None`.
71        let dlerror_str = dlerror();
72        if dlerror_str.is_null() {
73            // In non-dlsym case this may happen when there’re bugs in our bindings or there’s
74            // non-libloading user of libdl; possibly in another thread.
75            None
76        } else {
77            // You can’t even rely on error string being static here; call to subsequent dlerror
78            // may invalidate or overwrite the error message. Why couldn’t they simply give up the
79            // ownership over the message?
80            // TODO: should do locale-aware conversion here. OTOH Rust doesn’t seem to work well in
81            // any system that uses non-utf8 locale, so I doubt there’s a problem here.
82            Some(error(CStr::from_ptr(dlerror_str)))
83            // Since we do a copy of the error string above, maybe we should call dlerror again to
84            // let libdl know it may free its copy of the string now?
85        }
86    })
87}
88
89/// A platform-specific counterpart of the cross-platform [`Library`](crate::Library).
90pub struct Library {
91    handle: *mut raw::c_void,
92}
93
94unsafe impl Send for Library {}
95
96// That being said... this section in the volume 2 of POSIX.1-2008 states:
97//
98// > All functions defined by this volume of POSIX.1-2008 shall be thread-safe, except that the
99// > following functions need not be thread-safe.
100//
101// With notable absence of any dl* function other than dlerror in the list. By “this volume”
102// I suppose they refer precisely to the “volume 2”. dl* family of functions are specified
103// by this same volume, so the conclusion is indeed that dl* functions are required by POSIX
104// to be thread-safe. Great!
105//
106// See for more details:
107//
108//  * https://github.com/nagisa/rust_libloading/pull/17
109//  * http://pubs.opengroup.org/onlinepubs/9699919799/functions/V2_chap02.html#tag_15_09_01
110unsafe impl Sync for Library {}
111
112impl Library {
113    /// Find and eagerly load a shared library (module).
114    ///
115    /// If the `filename` contains a [path separator], the `filename` is interpreted as a `path` to
116    /// a file. Otherwise, platform-specific algorithms are employed to find a library with a
117    /// matching file name.
118    ///
119    /// This is equivalent to <code>[Library::open](filename, [RTLD_LAZY] | [RTLD_LOCAL])</code>.
120    ///
121    /// [path separator]: std::path::MAIN_SEPARATOR
122    ///
123    /// # Safety
124    ///
125    /// When a library is loaded, initialisation routines contained within the library are executed.
126    /// For the purposes of safety, the execution of these routines is conceptually the same calling an
127    /// unknown foreign function and may impose arbitrary requirements on the caller for the call
128    /// to be sound.
129    ///
130    /// Additionally, the callers of this function must also ensure that execution of the
131    /// termination routines contained within the library is safe as well. These routines may be
132    /// executed when the library is unloaded.
133    #[inline]
134    pub unsafe fn new<P: AsRef<OsStr>>(filename: P) -> Result<Library, crate::Error> {
135        Library::open(Some(filename), RTLD_LAZY | RTLD_LOCAL)
136    }
137
138    /// Load the `Library` representing the current executable.
139    ///
140    /// [`Library::get`] calls of the returned `Library` will look for symbols in following
141    /// locations in order:
142    ///
143    /// 1. The original program image;
144    /// 2. Any executable object files (e.g. shared libraries) loaded at program startup;
145    /// 3. Any executable object files loaded at runtime (e.g. via other `Library::new` calls or via
146    ///    calls to the `dlopen` function).
147    ///
148    /// Note that the behaviour of a `Library` loaded with this method is different from that of
149    /// Libraries loaded with [`os::windows::Library::this`].
150    ///
151    /// This is equivalent to <code>[Library::open](None, [RTLD_LAZY] | [RTLD_LOCAL])</code>.
152    ///
153    /// [`os::windows::Library::this`]: crate::os::windows::Library::this
154    #[inline]
155    pub fn this() -> Library {
156        unsafe {
157            // SAFE: this does not load any new shared library images, no danger in it executing
158            // initialiser routines.
159            Library::open(None::<&OsStr>, RTLD_LAZY | RTLD_LOCAL).expect("this should never fail")
160        }
161    }
162
163    /// Find and load an executable object file (shared library).
164    ///
165    /// See documentation for [`Library::this`] for further description of the behaviour
166    /// when the `filename` is `None`. Otherwise see [`Library::new`].
167    ///
168    /// Corresponds to `dlopen(filename, flags)`.
169    ///
170    /// # Safety
171    ///
172    /// When a library is loaded, initialisation routines contained within the library are executed.
173    /// For the purposes of safety, the execution of these routines is conceptually the same calling an
174    /// unknown foreign function and may impose arbitrary requirements on the caller for the call
175    /// to be sound.
176    ///
177    /// Additionally, the callers of this function must also ensure that execution of the
178    /// termination routines contained within the library is safe as well. These routines may be
179    /// executed when the library is unloaded.
180    pub unsafe fn open<P>(filename: Option<P>, flags: raw::c_int) -> Result<Library, crate::Error>
181    where
182        P: AsRef<OsStr>,
183    {
184        let filename = match filename {
185            None => None,
186            Some(ref f) => Some(cstr_cow_from_bytes(f.as_ref().as_bytes())?),
187        };
188        with_dlerror(
189            move || {
190                let result = dlopen(
191                    match filename {
192                        None => ptr::null(),
193                        Some(ref f) => f.as_ptr(),
194                    },
195                    flags,
196                );
197                // ensure filename lives until dlopen completes
198                drop(filename);
199                if result.is_null() {
200                    None
201                } else {
202                    Some(Library { handle: result })
203                }
204            },
205            |desc| crate::Error::DlOpen { desc: desc.into() },
206        )
207        .map_err(|e| e.unwrap_or(crate::Error::DlOpenUnknown))
208    }
209
210    unsafe fn get_impl<T, F>(&self, symbol: &[u8], on_null: F) -> Result<Symbol<T>, crate::Error>
211    where
212        F: FnOnce() -> Result<Symbol<T>, crate::Error>,
213    {
214        ensure_compatible_types::<T, *mut raw::c_void>()?;
215        let symbol = cstr_cow_from_bytes(symbol)?;
216        // `dlsym` may return nullptr in two cases: when a symbol genuinely points to a null
217        // pointer or the symbol cannot be found. In order to detect this case a double dlerror
218        // pattern must be used, which is, sadly, a little bit racy.
219        //
220        // We try to leave as little space as possible for this to occur, but we can’t exactly
221        // fully prevent it.
222        let result = with_dlerror(
223            || {
224                dlerror();
225                let symbol = dlsym(self.handle, symbol.as_ptr());
226                if symbol.is_null() {
227                    None
228                } else {
229                    Some(Symbol {
230                        pointer: symbol,
231                        pd: marker::PhantomData,
232                    })
233                }
234            },
235            |desc| crate::Error::DlSym { desc: desc.into() },
236        );
237        match result {
238            Err(None) => on_null(),
239            Err(Some(e)) => Err(e),
240            Ok(x) => Ok(x),
241        }
242    }
243
244    /// Get a pointer to a function or static variable by symbol name.
245    ///
246    /// The `symbol` may not contain any null bytes, with the exception of the last byte. Providing a
247    /// null terminated `symbol` may help to avoid an allocation.
248    ///
249    /// Symbol is interpreted as-is; no mangling is done. This means that symbols like `x::y` are
250    /// most likely invalid.
251    ///
252    /// # Safety
253    ///
254    /// Users of this API must specify the correct type of the function or variable loaded. Using a
255    /// `Symbol` with a wrong type is undefined.
256    ///
257    /// # Platform-specific behaviour
258    ///
259    /// Implementation of thread local variables is extremely platform specific and uses of such
260    /// variables that work on e.g. Linux may have unintended behaviour on other targets.
261    ///
262    /// On POSIX implementations where the `dlerror` function is not confirmed to be MT-safe (such
263    /// as FreeBSD), this function will unconditionally return an error when the underlying `dlsym`
264    /// call returns a null pointer. There are rare situations where `dlsym` returns a genuine null
265    /// pointer without it being an error. If loading a null pointer is something you care about,
266    /// consider using the [`Library::get_singlethreaded`] call.
267    #[inline(always)]
268    pub unsafe fn get<T>(&self, symbol: &[u8]) -> Result<Symbol<T>, crate::Error> {
269        extern crate cfg_if;
270        cfg_if::cfg_if! {
271            // These targets are known to have MT-safe `dlerror`.
272            if #[cfg(any(
273                target_os = "linux",
274                target_os = "android",
275                target_os = "openbsd",
276                target_os = "macos",
277                target_os = "ios",
278                target_os = "solaris",
279                target_os = "illumos",
280                target_os = "redox",
281                target_os = "fuchsia",
282                target_os = "cygwin",
283            ))] {
284                self.get_singlethreaded(symbol)
285            } else {
286                self.get_impl(symbol, || Err(crate::Error::DlSymUnknown))
287            }
288        }
289    }
290
291    /// Get a pointer to function or static variable by symbol name.
292    ///
293    /// The `symbol` may not contain any null bytes, with the exception of the last byte. Providing a
294    /// null terminated `symbol` may help to avoid an allocation.
295    ///
296    /// Symbol is interpreted as-is; no mangling is done. This means that symbols like `x::y` are
297    /// most likely invalid.
298    ///
299    /// # Safety
300    ///
301    /// Users of this API must specify the correct type of the function or variable loaded.
302    ///
303    /// It is up to the user of this library to ensure that no other calls to an MT-unsafe
304    /// implementation of `dlerror` occur during the execution of this function. Failing that, the
305    /// behaviour of this function is not defined.
306    ///
307    /// # Platform-specific behaviour
308    ///
309    /// The implementation of thread-local variables is extremely platform specific and uses of such
310    /// variables that work on e.g. Linux may have unintended behaviour on other targets.
311    #[inline(always)]
312    pub unsafe fn get_singlethreaded<T>(&self, symbol: &[u8]) -> Result<Symbol<T>, crate::Error> {
313        self.get_impl(symbol, || {
314            Ok(Symbol {
315                pointer: ptr::null_mut(),
316                pd: marker::PhantomData,
317            })
318        })
319    }
320
321    /// Convert the `Library` to a raw handle.
322    ///
323    /// The handle returned by this function shall be usable with APIs which accept handles
324    /// as returned by `dlopen`.
325    pub fn into_raw(self) -> *mut raw::c_void {
326        let handle = self.handle;
327        mem::forget(self);
328        handle
329    }
330
331    /// Convert a raw handle returned by `dlopen`-family of calls to a `Library`.
332    ///
333    /// # Safety
334    ///
335    /// The pointer shall be a result of a successful call of the `dlopen`-family of functions or a
336    /// pointer previously returned by `Library::into_raw` call. It must be valid to call `dlclose`
337    /// with this pointer as an argument.
338    pub unsafe fn from_raw(handle: *mut raw::c_void) -> Library {
339        Library { handle }
340    }
341
342    /// Unload the library.
343    ///
344    /// This method might be a no-op, depending on the flags with which the `Library` was opened,
345    /// what library was opened or other platform specifics.
346    ///
347    /// You only need to call this if you are interested in handling any errors that may arise when
348    /// library is unloaded. Otherwise the implementation of `Drop` for `Library` will close the
349    /// library and ignore the errors were they arise.
350    ///
351    /// The underlying data structures may still get leaked if an error does occur.
352    pub fn close(self) -> Result<(), crate::Error> {
353        let result = with_dlerror(
354            || {
355                if unsafe { dlclose(self.handle) } == 0 {
356                    Some(())
357                } else {
358                    None
359                }
360            },
361            |desc| crate::Error::DlClose { desc: desc.into() },
362        )
363        .map_err(|e| e.unwrap_or(crate::Error::DlCloseUnknown));
364        // While the library is not free'd yet in case of an error, there is no reason to try
365        // dropping it again, because all that will do is try calling `dlclose` again. only
366        // this time it would ignore the return result, which we already seen failing…
367        std::mem::forget(self);
368        result
369    }
370}
371
372impl Drop for Library {
373    fn drop(&mut self) {
374        unsafe {
375            dlclose(self.handle);
376        }
377    }
378}
379
380impl fmt::Debug for Library {
381    fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
382        f.write_str(&format!("Library@{:p}", self.handle))
383    }
384}
385
386/// Symbol from a library.
387///
388/// A major difference compared to the cross-platform `Symbol` is that this does not ensure that the
389/// `Symbol` does not outlive the `Library` it comes from.
390pub struct Symbol<T> {
391    pointer: *mut raw::c_void,
392    pd: marker::PhantomData<T>,
393}
394
395impl<T> Symbol<T> {
396    /// Convert the loaded `Symbol` into a raw pointer.
397    pub fn into_raw(self) -> *mut raw::c_void {
398        self.pointer
399    }
400
401    /// Convert the loaded `Symbol` into a raw pointer.
402    /// For unix this does the same as into_raw.
403    pub fn as_raw_ptr(self) -> *mut raw::c_void {
404        self.pointer
405    }
406}
407
408impl<T> Symbol<Option<T>> {
409    /// Lift Option out of the symbol.
410    pub fn lift_option(self) -> Option<Symbol<T>> {
411        if self.pointer.is_null() {
412            None
413        } else {
414            Some(Symbol {
415                pointer: self.pointer,
416                pd: marker::PhantomData,
417            })
418        }
419    }
420}
421
422unsafe impl<T: Send> Send for Symbol<T> {}
423unsafe impl<T: Sync> Sync for Symbol<T> {}
424
425impl<T> Clone for Symbol<T> {
426    fn clone(&self) -> Symbol<T> {
427        Symbol { ..*self }
428    }
429}
430
431impl<T> ::std::ops::Deref for Symbol<T> {
432    type Target = T;
433    fn deref(&self) -> &T {
434        unsafe {
435            // Additional reference level for a dereference on `deref` return value.
436            &*(&self.pointer as *const *mut _ as *const T)
437        }
438    }
439}
440
441impl<T> fmt::Debug for Symbol<T> {
442    fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
443        unsafe {
444            let mut info = mem::MaybeUninit::<DlInfo>::uninit();
445            if dladdr(self.pointer, info.as_mut_ptr()) != 0 {
446                let info = info.assume_init();
447                if info.dli_sname.is_null() {
448                    f.write_str(&format!(
449                        "Symbol@{:p} from {:?}",
450                        self.pointer,
451                        CStr::from_ptr(info.dli_fname)
452                    ))
453                } else {
454                    f.write_str(&format!(
455                        "Symbol {:?}@{:p} from {:?}",
456                        CStr::from_ptr(info.dli_sname),
457                        self.pointer,
458                        CStr::from_ptr(info.dli_fname)
459                    ))
460                }
461            } else {
462                f.write_str(&format!("Symbol@{:p}", self.pointer))
463            }
464        }
465    }
466}
467
468// Platform specific things
469#[cfg_attr(any(target_os = "linux", target_os = "android"), link(name = "dl"))]
470#[cfg_attr(any(target_os = "freebsd", target_os = "dragonfly"), link(name = "c"))]
471extern "C" {
472    fn dlopen(filename: *const raw::c_char, flags: raw::c_int) -> *mut raw::c_void;
473    fn dlclose(handle: *mut raw::c_void) -> raw::c_int;
474    fn dlsym(handle: *mut raw::c_void, symbol: *const raw::c_char) -> *mut raw::c_void;
475    fn dlerror() -> *mut raw::c_char;
476    fn dladdr(addr: *mut raw::c_void, info: *mut DlInfo) -> raw::c_int;
477}
478
479#[repr(C)]
480struct DlInfo {
481    dli_fname: *const raw::c_char,
482    dli_fbase: *mut raw::c_void,
483    dli_sname: *const raw::c_char,
484    dli_saddr: *mut raw::c_void,
485}