| /* |
| * Copyright (C) 2016 The Android Open Source Project |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * * Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * * Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in |
| * the documentation and/or other materials provided with the |
| * distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS |
| * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE |
| * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, |
| * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, |
| * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS |
| * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED |
| * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, |
| * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT |
| * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| * SUCH DAMAGE. |
| */ |
| |
| #pragma once |
| |
| #include <link.h> |
| |
| #include <list> |
| #include <memory> |
| #include <string> |
| #include <vector> |
| |
| #include "async_safe/CHECK.h" |
| #include "linker_namespaces.h" |
| #include "linker_tls.h" |
| #include "private/bionic_elf_tls.h" |
| #include "private/bionic_globals.h" |
| |
| #define FLAG_LINKED 0x00000001 |
| #define FLAG_EXE 0x00000004 // The main executable |
| #define FLAG_LINKER 0x00000010 // The linker itself |
| #define FLAG_GNU_HASH 0x00000040 // uses gnu hash |
| #define FLAG_MAPPED_BY_CALLER 0x00000080 // the map is reserved by the caller |
| // and should not be unmapped |
| #define FLAG_IMAGE_LINKED 0x00000100 // Is image linked - this is a guard on link_image. |
| // The difference between this flag and |
| // FLAG_LINKED is that FLAG_LINKED |
| // means is set when load_group is |
| // successfully loaded whereas this |
| // flag is set to avoid linking image |
| // when link_image called for the |
| // second time. This situation happens |
| // when load group is crossing |
| // namespace boundary twice and second |
| // local group depends on the same libraries. |
| #define FLAG_RESERVED 0x00000200 // This flag was set when there is at least one |
| // outstanding thread_local dtor |
| // registered with this soinfo. In such |
| // a case the actual unload is |
| // postponed until the last thread_local |
| // destructor associated with this |
| // soinfo is executed and this flag is |
| // unset. |
| #define FLAG_PRELINKED 0x00000400 // prelink_image has successfully processed this soinfo |
| #define FLAG_GLOBALS_TAGGED 0x00000800 // globals have been tagged by MTE. |
| #define FLAG_NEW_SOINFO 0x40000000 // new soinfo format |
| |
| #define SOINFO_VERSION 6 |
| |
| ElfW(Addr) call_ifunc_resolver(ElfW(Addr) resolver_addr); |
| |
| typedef void (*linker_dtor_function_t)(); |
| typedef void (*linker_ctor_function_t)(int, char**, char**); |
| |
| // An entry within a SymbolLookupList. |
| struct SymbolLookupLib { |
| uint32_t gnu_maskwords_ = 0; |
| uint32_t gnu_shift2_ = 0; |
| ElfW(Addr)* gnu_bloom_filter_ = nullptr; |
| |
| const char* strtab_; |
| size_t strtab_size_; |
| const ElfW(Sym)* symtab_; |
| const ElfW(Versym)* versym_; |
| |
| const uint32_t* gnu_chain_; |
| size_t gnu_nbucket_; |
| uint32_t* gnu_bucket_; |
| |
| soinfo* si_ = nullptr; |
| |
| bool needs_sysv_lookup() const { return si_ != nullptr && gnu_bloom_filter_ == nullptr; } |
| }; |
| |
| // A list of libraries to search for a symbol. |
| class SymbolLookupList { |
| std::vector<SymbolLookupLib> libs_; |
| SymbolLookupLib sole_lib_; |
| const SymbolLookupLib* begin_; |
| const SymbolLookupLib* end_; |
| size_t slow_path_count_ = 0; |
| |
| public: |
| explicit SymbolLookupList(soinfo* si); |
| SymbolLookupList(const soinfo_list_t& global_group, const soinfo_list_t& local_group); |
| void set_dt_symbolic_lib(soinfo* symbolic_lib); |
| |
| const SymbolLookupLib* begin() const { return begin_; } |
| const SymbolLookupLib* end() const { return end_; } |
| bool needs_slow_path() const { return slow_path_count_ > 0; } |
| }; |
| |
| class SymbolName { |
| public: |
| explicit SymbolName(const char* name) |
| : name_(name), has_elf_hash_(false), has_gnu_hash_(false), |
| elf_hash_(0), gnu_hash_(0) { } |
| |
| const char* get_name() { |
| return name_; |
| } |
| |
| uint32_t elf_hash(); |
| uint32_t gnu_hash(); |
| |
| private: |
| const char* name_; |
| bool has_elf_hash_; |
| bool has_gnu_hash_; |
| uint32_t elf_hash_; |
| uint32_t gnu_hash_; |
| |
| DISALLOW_IMPLICIT_CONSTRUCTORS(SymbolName); |
| }; |
| |
| struct version_info { |
| constexpr version_info() : elf_hash(0), name(nullptr), target_si(nullptr) {} |
| |
| uint32_t elf_hash; |
| const char* name; |
| const soinfo* target_si; |
| }; |
| |
| // TODO(dimitry): remove reference from soinfo member functions to this class. |
| class VersionTracker; |
| |
| struct soinfo_tls { |
| TlsSegment segment; |
| size_t module_id = kTlsUninitializedModuleId; |
| }; |
| |
| struct soinfo { |
| #if !defined(__LP64__) |
| private: |
| char old_name_[128]; |
| #endif |
| public: |
| const ElfW(Phdr)* phdr; |
| size_t phnum; |
| #if !defined(__LP64__) |
| ElfW(Addr) unused0; // DO NOT USE, maintained for compatibility. |
| #endif |
| ElfW(Addr) base; |
| size_t size; |
| |
| #if !defined(__LP64__) |
| uint32_t unused1; // DO NOT USE, maintained for compatibility. |
| #endif |
| |
| ElfW(Dyn)* dynamic; |
| |
| #if !defined(__LP64__) |
| uint32_t unused2; // DO NOT USE, maintained for compatibility |
| uint32_t unused3; // DO NOT USE, maintained for compatibility |
| #endif |
| |
| soinfo* next; |
| private: |
| uint32_t flags_; |
| |
| const char* strtab_; |
| ElfW(Sym)* symtab_; |
| |
| size_t nbucket_; |
| size_t nchain_; |
| uint32_t* bucket_; |
| uint32_t* chain_; |
| |
| #if !defined(__LP64__) |
| ElfW(Addr)** unused4; // DO NOT USE, maintained for compatibility |
| #endif |
| |
| #if defined(USE_RELA) |
| ElfW(Rela)* plt_rela_; |
| size_t plt_rela_count_; |
| |
| ElfW(Rela)* rela_; |
| size_t rela_count_; |
| #else |
| ElfW(Rel)* plt_rel_; |
| size_t plt_rel_count_; |
| |
| ElfW(Rel)* rel_; |
| size_t rel_count_; |
| #endif |
| |
| linker_ctor_function_t* preinit_array_; |
| size_t preinit_array_count_; |
| |
| linker_ctor_function_t* init_array_; |
| size_t init_array_count_; |
| linker_dtor_function_t* fini_array_; |
| size_t fini_array_count_; |
| |
| linker_ctor_function_t init_func_; |
| linker_dtor_function_t fini_func_; |
| |
| #if defined(__arm__) |
| public: |
| // ARM EABI section used for stack unwinding. |
| uint32_t* ARM_exidx; |
| size_t ARM_exidx_count; |
| private: |
| #endif |
| size_t ref_count_; |
| public: |
| link_map link_map_head; |
| |
| bool constructors_called; |
| |
| // When you read a virtual address from the ELF file, add this |
| // value to get the corresponding address in the process' address space. |
| ElfW(Addr) load_bias; |
| |
| #if !defined(__LP64__) |
| bool has_text_relocations; |
| #endif |
| bool has_DT_SYMBOLIC; |
| |
| public: |
| soinfo(android_namespace_t* ns, const char* name, const struct stat* file_stat, |
| off64_t file_offset, int rtld_flags); |
| ~soinfo(); |
| |
| void call_constructors(); |
| void call_destructors(); |
| void call_pre_init_constructors(); |
| bool prelink_image(bool deterministic_memtag_globals = false); |
| bool link_image(const SymbolLookupList& lookup_list, soinfo* local_group_root, |
| const android_dlextinfo* extinfo, size_t* relro_fd_offset); |
| bool protect_relro(); |
| |
| void tag_globals(bool deterministic_memtag_globals); |
| ElfW(Addr) apply_memtag_if_mte_globals(ElfW(Addr) sym_addr) const; |
| |
| void add_child(soinfo* child); |
| void remove_all_links(); |
| |
| ino_t get_st_ino() const; |
| dev_t get_st_dev() const; |
| off64_t get_file_offset() const; |
| |
| uint32_t get_rtld_flags() const; |
| uint32_t get_dt_flags_1() const; |
| void set_dt_flags_1(uint32_t dt_flags_1); |
| |
| soinfo_list_t& get_children(); |
| const soinfo_list_t& get_children() const; |
| |
| soinfo_list_t& get_parents(); |
| |
| const ElfW(Sym)* find_symbol_by_name(SymbolName& symbol_name, const version_info* vi) const; |
| |
| ElfW(Sym)* find_symbol_by_address(const void* addr); |
| |
| ElfW(Addr) resolve_symbol_address(const ElfW(Sym)* s) const { |
| if (ELF_ST_TYPE(s->st_info) == STT_GNU_IFUNC) { |
| return call_ifunc_resolver(s->st_value + load_bias); |
| } |
| |
| return static_cast<ElfW(Addr)>(s->st_value + load_bias); |
| } |
| |
| const char* get_string(ElfW(Word) index) const; |
| bool can_unload() const; |
| bool is_gnu_hash() const; |
| |
| inline bool is_lp64_or_has_min_version(uint32_t min_version __unused) const { |
| #if defined(__LP64__) |
| return true; |
| #else |
| return (flags_ & FLAG_NEW_SOINFO) != 0 && version_ >= min_version; |
| #endif |
| } |
| |
| const ElfW(Versym)* get_versym_table() const { |
| return is_lp64_or_has_min_version(2) ? versym_ : nullptr; |
| } |
| |
| bool is_linked() const; |
| bool is_linker() const; |
| bool is_main_executable() const; |
| |
| void set_linked(); |
| void set_linker_flag(); |
| void set_main_executable(); |
| void set_nodelete(); |
| |
| size_t increment_ref_count(); |
| size_t decrement_ref_count(); |
| size_t get_ref_count() const; |
| |
| soinfo* get_local_group_root() const; |
| |
| void set_soname(const char* soname); |
| const char* get_soname() const; |
| void set_realpath(const char* path); |
| const char* get_realpath() const; |
| const ElfW(Versym)* get_versym(size_t n) const; |
| ElfW(Addr) get_verneed_ptr() const; |
| size_t get_verneed_cnt() const; |
| ElfW(Addr) get_verdef_ptr() const; |
| size_t get_verdef_cnt() const; |
| |
| int get_target_sdk_version() const; |
| |
| void set_dt_runpath(const char *); |
| const std::vector<std::string>& get_dt_runpath() const; |
| android_namespace_t* get_primary_namespace(); |
| void add_secondary_namespace(android_namespace_t* secondary_ns); |
| android_namespace_list_t& get_secondary_namespaces(); |
| |
| soinfo_tls* get_tls() const { |
| return is_lp64_or_has_min_version(5) ? tls_.get() : nullptr; |
| } |
| |
| void set_mapped_by_caller(bool reserved_map); |
| bool is_mapped_by_caller() const; |
| |
| uintptr_t get_handle() const; |
| void generate_handle(); |
| void* to_handle(); |
| |
| SymbolLookupLib get_lookup_lib(); |
| |
| void set_gap_start(ElfW(Addr) gap_start); |
| ElfW(Addr) get_gap_start() const; |
| |
| void set_gap_size(size_t gap_size); |
| size_t get_gap_size() const; |
| |
| const memtag_dynamic_entries_t* memtag_dynamic_entries() const { |
| #if defined(__aarch64__) |
| return &memtag_dynamic_entries_; |
| #else |
| return nullptr; |
| #endif |
| } |
| void* memtag_globals() const { |
| const memtag_dynamic_entries_t* entries = memtag_dynamic_entries(); |
| return entries ? entries->memtag_globals : nullptr; |
| } |
| size_t memtag_globalssz() const { |
| const memtag_dynamic_entries_t* entries = memtag_dynamic_entries(); |
| return entries ? entries->memtag_globalssz : 0U; |
| } |
| bool has_memtag_mode() const { |
| const memtag_dynamic_entries_t* entries = memtag_dynamic_entries(); |
| return entries ? entries->has_memtag_mode : false; |
| } |
| unsigned memtag_mode() const { |
| const memtag_dynamic_entries_t* entries = memtag_dynamic_entries(); |
| return entries ? entries->memtag_mode : 0U; |
| } |
| bool memtag_heap() const { |
| const memtag_dynamic_entries_t* entries = memtag_dynamic_entries(); |
| return entries ? entries->memtag_heap : false; |
| } |
| bool memtag_stack() const { |
| const memtag_dynamic_entries_t* entries = memtag_dynamic_entries(); |
| return entries ? entries->memtag_stack : false; |
| } |
| |
| void set_should_pad_segments(bool should_pad_segments) { |
| should_pad_segments_ = should_pad_segments; |
| } |
| bool should_pad_segments() const { return should_pad_segments_; } |
| bool should_tag_memtag_globals() const { |
| return !is_linker() && memtag_globals() && memtag_globalssz() > 0 && __libc_mte_enabled(); |
| } |
| std::list<std::string>* vma_names() { |
| #if defined(__aarch64__) |
| return &vma_names_; |
| #else |
| return nullptr; |
| #endif |
| }; |
| |
| void set_should_use_16kib_app_compat(bool should_use_16kib_app_compat) { |
| should_use_16kib_app_compat_ = should_use_16kib_app_compat; |
| } |
| bool should_use_16kib_app_compat() const { return should_use_16kib_app_compat_; } |
| |
| void set_compat_relro_start(ElfW(Addr) start) { compat_relro_start_ = start; } |
| ElfW(Addr) compat_relro_start() const { return compat_relro_start_; } |
| |
| void set_compat_relro_size(ElfW(Addr) size) { compat_relro_size_ = size; } |
| ElfW(Addr) compat_relro_size() const { return compat_relro_start_; } |
| |
| private: |
| bool is_image_linked() const; |
| void set_image_linked(); |
| |
| const ElfW(Sym)* gnu_lookup(SymbolName& symbol_name, const version_info* vi) const; |
| const ElfW(Sym)* elf_lookup(SymbolName& symbol_name, const version_info* vi) const; |
| ElfW(Sym)* gnu_addr_lookup(const void* addr); |
| ElfW(Sym)* elf_addr_lookup(const void* addr); |
| |
| public: |
| bool lookup_version_info(const VersionTracker& version_tracker, ElfW(Word) sym, |
| const char* sym_name, const version_info** vi); |
| |
| private: |
| bool relocate(const SymbolLookupList& lookup_list); |
| |
| // This part of the structure is only available |
| // when FLAG_NEW_SOINFO is set in this->flags. |
| uint32_t version_; |
| |
| // version >= 0 |
| dev_t st_dev_; |
| ino_t st_ino_; |
| |
| // dependency graph |
| soinfo_list_t children_; |
| soinfo_list_t parents_; |
| |
| // version >= 1 |
| off64_t file_offset_; |
| uint32_t rtld_flags_; |
| uint32_t dt_flags_1_; |
| size_t strtab_size_; |
| |
| // version >= 2 |
| |
| size_t gnu_nbucket_; |
| uint32_t* gnu_bucket_; |
| uint32_t* gnu_chain_; |
| uint32_t gnu_maskwords_; |
| uint32_t gnu_shift2_; |
| ElfW(Addr)* gnu_bloom_filter_; |
| |
| soinfo* local_group_root_; |
| |
| uint8_t* android_relocs_; |
| size_t android_relocs_size_; |
| |
| std::string soname_; |
| std::string realpath_; |
| |
| const ElfW(Versym)* versym_; |
| |
| ElfW(Addr) verdef_ptr_; |
| size_t verdef_cnt_; |
| |
| ElfW(Addr) verneed_ptr_; |
| size_t verneed_cnt_; |
| |
| int target_sdk_version_; |
| |
| // version >= 3 |
| std::vector<std::string> dt_runpath_; |
| android_namespace_t* primary_namespace_; |
| android_namespace_list_t secondary_namespaces_; |
| uintptr_t handle_; |
| |
| friend soinfo* get_libdl_info(const soinfo& linker_si); |
| |
| // version >= 4 |
| ElfW(Relr)* relr_; |
| size_t relr_count_; |
| |
| // version >= 5 |
| std::unique_ptr<soinfo_tls> tls_; |
| std::vector<TlsDynamicResolverArg> tlsdesc_args_; |
| |
| // version >= 6 |
| ElfW(Addr) gap_start_; |
| size_t gap_size_; |
| |
| // __aarch64__ only, which does not use versioning. |
| memtag_dynamic_entries_t memtag_dynamic_entries_; |
| std::list<std::string> vma_names_; |
| |
| // Pad gaps between segments when memory mapping? |
| bool should_pad_segments_ = false; |
| |
| // Use app compat mode when loading 4KiB max-page-size ELFs on 16KiB page-size devices? |
| bool should_use_16kib_app_compat_ = false; |
| |
| // RELRO region for 16KiB compat loading |
| ElfW(Addr) compat_relro_start_ = 0; |
| ElfW(Addr) compat_relro_size_ = 0; |
| }; |
| |
| // This function is used by dlvsym() to calculate hash of sym_ver |
| uint32_t calculate_elf_hash(const char* name); |
| |
| const char* fix_dt_needed(const char* dt_needed, const char* sopath); |
| |
| const ElfW(Sym)* soinfo_do_lookup(const char* name, const version_info* vi, |
| soinfo** si_found_in, const SymbolLookupList& lookup_list); |