2009-03-04 04:28:35 +01:00
|
|
|
/*
|
2009-10-24 03:11:40 +02:00
|
|
|
* Copyright (C) 2008, 2009 The Android Open Source Project
|
2009-03-04 04:28:35 +01:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* * Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
|
|
|
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2012-08-04 01:49:39 +02:00
|
|
|
#include <dlfcn.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
2014-02-11 02:46:57 +01:00
|
|
|
#include <inttypes.h>
|
2012-08-04 01:49:39 +02:00
|
|
|
#include <pthread.h>
|
2009-03-04 04:28:35 +01:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2012-08-04 01:49:39 +02:00
|
|
|
#include <sys/mman.h>
|
|
|
|
#include <unistd.h>
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-08-22 21:25:04 +02:00
|
|
|
#include <new>
|
|
|
|
|
2012-08-04 01:49:39 +02:00
|
|
|
// Private C library headers.
|
2013-10-10 00:50:50 +02:00
|
|
|
#include "private/bionic_tls.h"
|
|
|
|
#include "private/KernelArgumentBlock.h"
|
|
|
|
#include "private/ScopedPthreadMutexLocker.h"
|
2014-07-01 23:10:16 +02:00
|
|
|
#include "private/ScopedFd.h"
|
2014-09-06 01:42:53 +02:00
|
|
|
#include "private/ScopeGuard.h"
|
|
|
|
#include "private/UniquePtr.h"
|
2009-03-04 04:28:35 +01:00
|
|
|
|
|
|
|
#include "linker.h"
|
|
|
|
#include "linker_debug.h"
|
2010-12-16 19:52:02 +01:00
|
|
|
#include "linker_environ.h"
|
2012-06-18 18:13:49 +02:00
|
|
|
#include "linker_phdr.h"
|
2014-05-06 01:49:04 +02:00
|
|
|
#include "linker_allocator.h"
|
2009-03-04 04:28:35 +01:00
|
|
|
|
|
|
|
/* >>> IMPORTANT NOTE - READ ME BEFORE MODIFYING <<<
|
|
|
|
*
|
|
|
|
* Do NOT use malloc() and friends or pthread_*() code here.
|
|
|
|
* Don't use printf() either; it's caused mysterious memory
|
|
|
|
* corruption in the past.
|
|
|
|
* The linker runs before we bring up libc and it's easiest
|
|
|
|
* to make sure it does not depend on any complex libc features
|
|
|
|
*
|
|
|
|
* open issues / todo:
|
|
|
|
*
|
|
|
|
* - cleaner error reporting
|
|
|
|
* - after linking, set as much stuff as possible to READONLY
|
|
|
|
* and NOEXEC
|
2012-08-04 01:49:39 +02:00
|
|
|
*/
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-05-20 00:19:52 +02:00
|
|
|
#if defined(__LP64__)
|
|
|
|
#define SEARCH_NAME(x) x
|
|
|
|
#else
|
|
|
|
// Nvidia drivers are relying on the bug:
|
|
|
|
// http://code.google.com/p/android/issues/detail?id=6670
|
|
|
|
// so we continue to use base-name lookup for lp32
|
|
|
|
static const char* get_base_name(const char* name) {
|
|
|
|
const char* bname = strrchr(name, '/');
|
|
|
|
return bname ? bname + 1 : name;
|
|
|
|
}
|
|
|
|
#define SEARCH_NAME(x) get_base_name(x)
|
|
|
|
#endif
|
|
|
|
|
2014-02-11 02:46:57 +01:00
|
|
|
static ElfW(Addr) get_elf_exec_load_bias(const ElfW(Ehdr)* elf);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-05-14 19:02:03 +02:00
|
|
|
static LinkerAllocator<soinfo> g_soinfo_allocator;
|
2014-05-09 18:10:14 +02:00
|
|
|
static LinkerAllocator<LinkedListEntry<soinfo>> g_soinfo_links_allocator;
|
2012-09-12 13:00:55 +02:00
|
|
|
|
2014-05-09 18:10:14 +02:00
|
|
|
static soinfo* solist;
|
|
|
|
static soinfo* sonext;
|
2014-09-12 18:43:13 +02:00
|
|
|
static soinfo* somain; // main process, always the one after libdl_info
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-05-14 19:02:03 +02:00
|
|
|
static const char* const kDefaultLdPaths[] = {
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(__LP64__)
|
2013-10-08 23:27:10 +02:00
|
|
|
"/vendor/lib64",
|
|
|
|
"/system/lib64",
|
|
|
|
#else
|
2012-10-31 22:20:03 +01:00
|
|
|
"/vendor/lib",
|
|
|
|
"/system/lib",
|
2013-10-08 23:27:10 +02:00
|
|
|
#endif
|
2014-08-29 21:02:36 +02:00
|
|
|
nullptr
|
2012-10-31 22:20:03 +01:00
|
|
|
};
|
|
|
|
|
2014-01-14 01:37:47 +01:00
|
|
|
#define LDPATH_BUFSIZE (LDPATH_MAX*64)
|
|
|
|
#define LDPATH_MAX 8
|
|
|
|
|
|
|
|
#define LDPRELOAD_BUFSIZE (LDPRELOAD_MAX*64)
|
|
|
|
#define LDPRELOAD_MAX 8
|
|
|
|
|
2014-05-14 19:02:03 +02:00
|
|
|
static char g_ld_library_paths_buffer[LDPATH_BUFSIZE];
|
|
|
|
static const char* g_ld_library_paths[LDPATH_MAX + 1];
|
2009-06-03 03:27:28 +02:00
|
|
|
|
2014-05-14 19:02:03 +02:00
|
|
|
static char g_ld_preloads_buffer[LDPRELOAD_BUFSIZE];
|
|
|
|
static const char* g_ld_preload_names[LDPRELOAD_MAX + 1];
|
2009-12-31 19:09:10 +01:00
|
|
|
|
2014-05-14 19:02:03 +02:00
|
|
|
static soinfo* g_ld_preloads[LDPRELOAD_MAX + 1];
|
2009-12-31 19:09:10 +01:00
|
|
|
|
2014-05-14 19:02:03 +02:00
|
|
|
__LIBC_HIDDEN__ int g_ld_debug_verbosity;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-08-29 21:02:36 +02:00
|
|
|
__LIBC_HIDDEN__ abort_msg_t* g_abort_message = nullptr; // For debuggerd.
|
2013-04-04 22:46:46 +02:00
|
|
|
|
2012-08-14 23:07:59 +02:00
|
|
|
enum RelocationKind {
|
2014-09-12 18:43:13 +02:00
|
|
|
kRelocAbsolute = 0,
|
|
|
|
kRelocRelative,
|
|
|
|
kRelocCopy,
|
|
|
|
kRelocSymbol,
|
|
|
|
kRelocMax
|
2012-08-14 23:07:59 +02:00
|
|
|
};
|
2010-12-16 19:52:02 +01:00
|
|
|
|
2009-03-04 04:28:35 +01:00
|
|
|
#if STATS
|
2012-08-14 23:07:59 +02:00
|
|
|
struct linker_stats_t {
|
2014-09-12 18:43:13 +02:00
|
|
|
int count[kRelocMax];
|
2012-08-14 23:07:59 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
static linker_stats_t linker_stats;
|
|
|
|
|
|
|
|
static void count_relocation(RelocationKind kind) {
|
2014-09-12 18:43:13 +02:00
|
|
|
++linker_stats.count[kind];
|
2012-08-14 23:07:59 +02:00
|
|
|
}
|
|
|
|
#else
|
|
|
|
static void count_relocation(RelocationKind) {
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if COUNT_PAGES
|
2012-08-14 23:07:59 +02:00
|
|
|
static unsigned bitmask[4096];
|
2013-10-10 16:19:31 +02:00
|
|
|
#if defined(__LP64__)
|
|
|
|
#define MARK(offset) \
|
|
|
|
do { \
|
2014-09-12 18:43:13 +02:00
|
|
|
if ((((offset) >> 12) >> 5) < 4096) \
|
|
|
|
bitmask[((offset) >> 12) >> 5] |= (1 << (((offset) >> 12) & 31)); \
|
2014-02-12 01:59:37 +01:00
|
|
|
} while (0)
|
2013-10-10 16:19:31 +02:00
|
|
|
#else
|
2012-08-14 23:07:59 +02:00
|
|
|
#define MARK(offset) \
|
|
|
|
do { \
|
2014-09-12 18:43:13 +02:00
|
|
|
bitmask[((offset) >> 12) >> 3] |= (1 << (((offset) >> 12) & 7)); \
|
2014-02-12 01:59:37 +01:00
|
|
|
} while (0)
|
2013-10-10 16:19:31 +02:00
|
|
|
#endif
|
2012-08-14 23:07:59 +02:00
|
|
|
#else
|
|
|
|
#define MARK(x) do {} while (0)
|
2009-03-04 04:28:35 +01:00
|
|
|
#endif
|
|
|
|
|
2012-08-04 01:49:39 +02:00
|
|
|
// You shouldn't try to call memory-allocating functions in the dynamic linker.
|
|
|
|
// Guard against the most obvious ones.
|
2013-03-15 23:30:25 +01:00
|
|
|
#define DISALLOW_ALLOCATION(return_type, name, ...) \
|
|
|
|
return_type name __VA_ARGS__ \
|
|
|
|
{ \
|
2014-09-12 18:43:13 +02:00
|
|
|
__libc_fatal("ERROR: " #name " called from the dynamic linker!\n"); \
|
2012-08-04 01:49:39 +02:00
|
|
|
}
|
2014-03-25 15:53:56 +01:00
|
|
|
DISALLOW_ALLOCATION(void*, malloc, (size_t u __unused));
|
|
|
|
DISALLOW_ALLOCATION(void, free, (void* u __unused));
|
|
|
|
DISALLOW_ALLOCATION(void*, realloc, (void* u1 __unused, size_t u2 __unused));
|
|
|
|
DISALLOW_ALLOCATION(void*, calloc, (size_t u1 __unused, size_t u2 __unused));
|
2009-05-21 03:28:09 +02:00
|
|
|
|
|
|
|
static char __linker_dl_err_buf[768];
|
|
|
|
|
2013-03-06 03:47:58 +01:00
|
|
|
char* linker_get_error_buffer() {
|
2012-10-17 00:54:46 +02:00
|
|
|
return &__linker_dl_err_buf[0];
|
2009-05-21 03:28:09 +02:00
|
|
|
}
|
|
|
|
|
2013-03-06 03:47:58 +01:00
|
|
|
size_t linker_get_error_buffer_size() {
|
|
|
|
return sizeof(__linker_dl_err_buf);
|
|
|
|
}
|
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// This function is an empty stub where GDB locates a breakpoint to get notified
|
|
|
|
// about linker activity.
|
2012-10-17 00:54:46 +02:00
|
|
|
extern "C" void __attribute__((noinline)) __attribute__((visibility("default"))) rtld_db_dlactivity();
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-05-14 19:02:03 +02:00
|
|
|
static pthread_mutex_t g__r_debug_mutex = PTHREAD_MUTEX_INITIALIZER;
|
2014-08-29 21:02:36 +02:00
|
|
|
static r_debug _r_debug = {1, nullptr, reinterpret_cast<uintptr_t>(&rtld_db_dlactivity), r_debug::RT_CONSISTENT, 0};
|
2014-02-10 22:31:13 +01:00
|
|
|
static link_map* r_debug_tail = 0;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-02-10 22:31:13 +01:00
|
|
|
static void insert_soinfo_into_debug_map(soinfo* info) {
|
2014-09-12 18:43:13 +02:00
|
|
|
// Copy the necessary fields into the debug structure.
|
|
|
|
link_map* map = &(info->link_map_head);
|
|
|
|
map->l_addr = info->load_bias;
|
|
|
|
map->l_name = reinterpret_cast<char*>(info->name);
|
|
|
|
map->l_ld = info->dynamic;
|
|
|
|
|
|
|
|
// Stick the new library at the end of the list.
|
|
|
|
// gdb tends to care more about libc than it does
|
|
|
|
// about leaf libraries, and ordering it this way
|
|
|
|
// reduces the back-and-forth over the wire.
|
|
|
|
if (r_debug_tail) {
|
|
|
|
r_debug_tail->l_next = map;
|
|
|
|
map->l_prev = r_debug_tail;
|
|
|
|
map->l_next = 0;
|
|
|
|
} else {
|
|
|
|
_r_debug.r_map = map;
|
|
|
|
map->l_prev = 0;
|
|
|
|
map->l_next = 0;
|
|
|
|
}
|
|
|
|
r_debug_tail = map;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2012-08-14 23:07:59 +02:00
|
|
|
static void remove_soinfo_from_debug_map(soinfo* info) {
|
2014-09-12 18:43:13 +02:00
|
|
|
link_map* map = &(info->link_map_head);
|
2009-03-25 03:02:00 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
if (r_debug_tail == map) {
|
|
|
|
r_debug_tail = map->l_prev;
|
|
|
|
}
|
2009-03-25 03:02:00 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
if (map->l_prev) {
|
|
|
|
map->l_prev->l_next = map->l_next;
|
|
|
|
}
|
|
|
|
if (map->l_next) {
|
|
|
|
map->l_next->l_prev = map->l_prev;
|
|
|
|
}
|
2009-03-25 03:02:00 +01:00
|
|
|
}
|
|
|
|
|
2012-08-14 23:07:59 +02:00
|
|
|
static void notify_gdb_of_load(soinfo* info) {
|
2014-09-12 18:43:13 +02:00
|
|
|
if (info->flags & FLAG_EXE) {
|
|
|
|
// GDB already knows about the main executable
|
|
|
|
return;
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
ScopedPthreadMutexLocker locker(&g__r_debug_mutex);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
_r_debug.r_state = r_debug::RT_ADD;
|
|
|
|
rtld_db_dlactivity();
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
insert_soinfo_into_debug_map(info);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
_r_debug.r_state = r_debug::RT_CONSISTENT;
|
|
|
|
rtld_db_dlactivity();
|
2009-03-25 03:02:00 +01:00
|
|
|
}
|
|
|
|
|
2012-08-14 23:07:59 +02:00
|
|
|
static void notify_gdb_of_unload(soinfo* info) {
|
2014-09-12 18:43:13 +02:00
|
|
|
if (info->flags & FLAG_EXE) {
|
|
|
|
// GDB already knows about the main executable
|
|
|
|
return;
|
|
|
|
}
|
2009-03-25 03:02:00 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
ScopedPthreadMutexLocker locker(&g__r_debug_mutex);
|
2009-03-25 03:02:00 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
_r_debug.r_state = r_debug::RT_DELETE;
|
|
|
|
rtld_db_dlactivity();
|
2009-03-25 03:02:00 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
remove_soinfo_from_debug_map(info);
|
2009-03-25 03:02:00 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
_r_debug.r_state = r_debug::RT_CONSISTENT;
|
|
|
|
rtld_db_dlactivity();
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2012-10-30 01:37:13 +01:00
|
|
|
void notify_gdb_of_libraries() {
|
2014-02-10 22:31:13 +01:00
|
|
|
_r_debug.r_state = r_debug::RT_ADD;
|
|
|
|
rtld_db_dlactivity();
|
|
|
|
_r_debug.r_state = r_debug::RT_CONSISTENT;
|
|
|
|
rtld_db_dlactivity();
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-05-09 18:10:14 +02:00
|
|
|
LinkedListEntry<soinfo>* SoinfoListAllocator::alloc() {
|
|
|
|
return g_soinfo_links_allocator.alloc();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SoinfoListAllocator::free(LinkedListEntry<soinfo>* entry) {
|
|
|
|
g_soinfo_links_allocator.free(entry);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void protect_data(int protection) {
|
|
|
|
g_soinfo_allocator.protect_all(protection);
|
|
|
|
g_soinfo_links_allocator.protect_all(protection);
|
|
|
|
}
|
|
|
|
|
2014-10-04 02:52:44 +02:00
|
|
|
static soinfo* soinfo_alloc(const char* name, struct stat* file_stat, off64_t file_offset, int rtld_flags) {
|
2012-09-12 13:00:55 +02:00
|
|
|
if (strlen(name) >= SOINFO_NAME_LEN) {
|
|
|
|
DL_ERR("library name \"%s\" too long", name);
|
2014-08-29 21:02:36 +02:00
|
|
|
return nullptr;
|
2012-09-12 13:00:55 +02:00
|
|
|
}
|
|
|
|
|
2014-10-04 02:52:44 +02:00
|
|
|
soinfo* si = new (g_soinfo_allocator.alloc()) soinfo(name, file_stat, file_offset, rtld_flags);
|
2014-05-09 18:10:14 +02:00
|
|
|
|
2012-09-12 13:00:55 +02:00
|
|
|
sonext->next = si;
|
|
|
|
sonext = si;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2013-03-12 18:40:45 +01:00
|
|
|
TRACE("name %s: allocated soinfo @ %p", name, si);
|
2012-09-12 13:00:55 +02:00
|
|
|
return si;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-02-12 01:59:37 +01:00
|
|
|
static void soinfo_free(soinfo* si) {
|
2014-09-12 18:43:13 +02:00
|
|
|
if (si == nullptr) {
|
|
|
|
return;
|
|
|
|
}
|
2012-08-04 01:49:39 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
if (si->base != 0 && si->size != 0) {
|
|
|
|
munmap(reinterpret_cast<void*>(si->base), si->size);
|
|
|
|
}
|
2014-05-09 18:10:14 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
soinfo *prev = nullptr, *trav;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
TRACE("name %s: freeing soinfo @ %p", si->name, si);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
for (trav = solist; trav != nullptr; trav = trav->next) {
|
|
|
|
if (trav == si) {
|
|
|
|
break;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
prev = trav;
|
|
|
|
}
|
|
|
|
if (trav == nullptr) {
|
|
|
|
// si was not in solist
|
|
|
|
DL_ERR("name \"%s\" is not in solist!", si->name);
|
|
|
|
return;
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// clear links to/from si
|
|
|
|
si->remove_all_links();
|
2014-05-09 18:10:14 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// prev will never be null, because the first entry in solist is
|
|
|
|
// always the static libdl_info.
|
|
|
|
prev->next = si->next;
|
|
|
|
if (si == sonext) {
|
|
|
|
sonext = prev;
|
|
|
|
}
|
2014-05-06 01:49:04 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
g_soinfo_allocator.free(si);
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2012-12-20 23:42:14 +01:00
|
|
|
|
|
|
|
static void parse_path(const char* path, const char* delimiters,
|
|
|
|
const char** array, char* buf, size_t buf_size, size_t max_count) {
|
2014-08-29 21:02:36 +02:00
|
|
|
if (path == nullptr) {
|
2012-12-20 23:42:14 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t len = strlcpy(buf, path, buf_size);
|
|
|
|
|
|
|
|
size_t i = 0;
|
|
|
|
char* buf_p = buf;
|
|
|
|
while (i < max_count && (array[i] = strsep(&buf_p, delimiters))) {
|
|
|
|
if (*array[i] != '\0') {
|
|
|
|
++i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Forget the last path if we had to truncate; this occurs if the 2nd to
|
|
|
|
// last char isn't '\0' (i.e. wasn't originally a delimiter).
|
|
|
|
if (i > 0 && len >= buf_size && buf[buf_size - 2] != '\0') {
|
2014-08-29 21:02:36 +02:00
|
|
|
array[i - 1] = nullptr;
|
2012-12-20 23:42:14 +01:00
|
|
|
} else {
|
2014-08-29 21:02:36 +02:00
|
|
|
array[i] = nullptr;
|
2012-12-20 23:42:14 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void parse_LD_LIBRARY_PATH(const char* path) {
|
2014-05-14 19:02:03 +02:00
|
|
|
parse_path(path, ":", g_ld_library_paths,
|
|
|
|
g_ld_library_paths_buffer, sizeof(g_ld_library_paths_buffer), LDPATH_MAX);
|
2012-12-20 23:42:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static void parse_LD_PRELOAD(const char* path) {
|
|
|
|
// We have historically supported ':' as well as ' ' in LD_PRELOAD.
|
2014-05-14 19:02:03 +02:00
|
|
|
parse_path(path, " :", g_ld_preload_names,
|
|
|
|
g_ld_preloads_buffer, sizeof(g_ld_preloads_buffer), LDPRELOAD_MAX);
|
2012-12-20 23:42:14 +01:00
|
|
|
}
|
|
|
|
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(__arm__)
|
2012-08-04 01:49:39 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// For a given PC, find the .so that it belongs to.
|
|
|
|
// Returns the base address of the .ARM.exidx section
|
|
|
|
// for that .so, and the number of 8-byte entries
|
|
|
|
// in that section (via *pcount).
|
|
|
|
//
|
|
|
|
// Intended to be called by libc's __gnu_Unwind_Find_exidx().
|
|
|
|
//
|
|
|
|
// This function is exposed via dlfcn.cpp and libdl.so.
|
2014-02-12 01:59:37 +01:00
|
|
|
_Unwind_Ptr dl_unwind_find_exidx(_Unwind_Ptr pc, int* pcount) {
|
2014-09-12 18:43:13 +02:00
|
|
|
unsigned addr = (unsigned)pc;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
for (soinfo* si = solist; si != 0; si = si->next) {
|
|
|
|
if ((addr >= si->base) && (addr < (si->base + si->size))) {
|
|
|
|
*pcount = si->ARM_exidx_count;
|
|
|
|
return (_Unwind_Ptr)si->ARM_exidx;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
|
|
|
*pcount = 0;
|
|
|
|
return nullptr;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2012-08-04 01:49:39 +02:00
|
|
|
|
2013-08-20 02:45:09 +02:00
|
|
|
#endif
|
2012-08-04 01:49:39 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// Here, we only have to provide a callback to iterate across all the
|
|
|
|
// loaded libraries. gcc_eh does the rest.
|
2014-02-12 01:59:37 +01:00
|
|
|
int dl_iterate_phdr(int (*cb)(dl_phdr_info* info, size_t size, void* data), void* data) {
|
2014-09-12 18:43:13 +02:00
|
|
|
int rv = 0;
|
|
|
|
for (soinfo* si = solist; si != nullptr; si = si->next) {
|
|
|
|
dl_phdr_info dl_info;
|
|
|
|
dl_info.dlpi_addr = si->link_map_head.l_addr;
|
|
|
|
dl_info.dlpi_name = si->link_map_head.l_name;
|
|
|
|
dl_info.dlpi_phdr = si->phdr;
|
|
|
|
dl_info.dlpi_phnum = si->phnum;
|
|
|
|
rv = cb(&dl_info, sizeof(dl_phdr_info), data);
|
|
|
|
if (rv != 0) {
|
|
|
|
break;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
|
|
|
return rv;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2012-08-04 01:49:39 +02:00
|
|
|
|
2014-08-19 00:08:51 +02:00
|
|
|
static ElfW(Sym)* soinfo_elf_lookup(soinfo* si, unsigned hash, const char* name) {
|
2014-02-11 02:46:57 +01:00
|
|
|
ElfW(Sym)* symtab = si->symtab;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(LOOKUP, "SEARCH %s in %s@%p %x %zd",
|
|
|
|
name, si->name, reinterpret_cast<void*>(si->base), hash, hash % si->nbucket);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-02-11 02:46:57 +01:00
|
|
|
for (unsigned n = si->bucket[hash % si->nbucket]; n != 0; n = si->chain[n]) {
|
|
|
|
ElfW(Sym)* s = symtab + n;
|
2014-09-30 04:14:45 +02:00
|
|
|
if (strcmp(si->get_string(s->st_name), name)) continue;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// only concern ourselves with global and weak symbol definitions
|
2014-02-11 02:46:57 +01:00
|
|
|
switch (ELF_ST_BIND(s->st_info)) {
|
|
|
|
case STB_GLOBAL:
|
|
|
|
case STB_WEAK:
|
|
|
|
if (s->st_shndx == SHN_UNDEF) {
|
2014-06-29 21:28:37 +02:00
|
|
|
continue;
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-06-29 21:28:37 +02:00
|
|
|
TRACE_TYPE(LOOKUP, "FOUND %s in %s (%p) %zd",
|
2014-02-11 02:46:57 +01:00
|
|
|
name, si->name, reinterpret_cast<void*>(s->st_value),
|
|
|
|
static_cast<size_t>(s->st_size));
|
2014-06-29 21:28:37 +02:00
|
|
|
return s;
|
|
|
|
case STB_LOCAL:
|
2014-08-19 00:08:51 +02:00
|
|
|
continue;
|
2014-06-29 21:28:37 +02:00
|
|
|
default:
|
2014-07-01 23:24:45 +02:00
|
|
|
__libc_fatal("ERROR: Unexpected ST_BIND value: %d for '%s' in '%s'",
|
|
|
|
ELF_ST_BIND(s->st_info), name, si->name);
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-02-11 02:46:57 +01:00
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-07-29 02:32:20 +02:00
|
|
|
TRACE_TYPE(LOOKUP, "NOT FOUND %s in %s@%p %x %zd",
|
|
|
|
name, si->name, reinterpret_cast<void*>(si->base), hash, hash % si->nbucket);
|
|
|
|
|
|
|
|
|
2014-08-29 21:02:36 +02:00
|
|
|
return nullptr;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-10-04 02:52:44 +02:00
|
|
|
soinfo::soinfo(const char* name, const struct stat* file_stat, off64_t file_offset, int rtld_flags) {
|
2014-08-22 21:25:04 +02:00
|
|
|
memset(this, 0, sizeof(*this));
|
|
|
|
|
|
|
|
strlcpy(this->name, name, sizeof(this->name));
|
|
|
|
flags = FLAG_NEW_SOINFO;
|
|
|
|
version = SOINFO_VERSION;
|
|
|
|
|
2014-08-29 21:02:36 +02:00
|
|
|
if (file_stat != nullptr) {
|
2014-10-04 02:52:44 +02:00
|
|
|
this->st_dev = file_stat->st_dev;
|
|
|
|
this->st_ino = file_stat->st_ino;
|
|
|
|
this->file_offset = file_offset;
|
2014-08-22 21:25:04 +02:00
|
|
|
}
|
2014-09-16 02:00:10 +02:00
|
|
|
|
|
|
|
this->rtld_flags = rtld_flags;
|
2014-08-22 21:25:04 +02:00
|
|
|
}
|
|
|
|
|
2013-03-01 00:58:45 +01:00
|
|
|
static unsigned elfhash(const char* _name) {
|
2014-09-12 18:43:13 +02:00
|
|
|
const unsigned char* name = reinterpret_cast<const unsigned char*>(_name);
|
|
|
|
unsigned h = 0, g;
|
|
|
|
|
|
|
|
while (*name) {
|
|
|
|
h = (h << 4) + *name++;
|
|
|
|
g = h & 0xf0000000;
|
|
|
|
h ^= g;
|
|
|
|
h ^= g >> 24;
|
|
|
|
}
|
|
|
|
return h;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-09-02 20:47:23 +02:00
|
|
|
static ElfW(Sym)* soinfo_do_lookup(soinfo* si, const char* name, soinfo** lsi) {
|
2014-09-12 18:43:13 +02:00
|
|
|
unsigned elf_hash = elfhash(name);
|
|
|
|
ElfW(Sym)* s = nullptr;
|
2009-09-29 04:38:04 +02:00
|
|
|
|
2014-09-29 21:10:36 +02:00
|
|
|
/* "This element's presence in a shared object library alters the dynamic linker's
|
|
|
|
* symbol resolution algorithm for references within the library. Instead of starting
|
|
|
|
* a symbol search with the executable file, the dynamic linker starts from the shared
|
|
|
|
* object itself. If the shared object fails to supply the referenced symbol, the
|
|
|
|
* dynamic linker then searches the executable file and other shared objects as usual."
|
|
|
|
*
|
|
|
|
* http://www.sco.com/developers/gabi/2012-12-31/ch5.dynamic.html
|
|
|
|
*
|
|
|
|
* Note that this is unlikely since static linker avoids generating
|
|
|
|
* relocations for -Bsymbolic linked dynamic executables.
|
|
|
|
*/
|
|
|
|
if (si->has_DT_SYMBOLIC) {
|
|
|
|
DEBUG("%s: looking up %s in local scope (DT_SYMBOLIC)", si->name, name);
|
|
|
|
s = soinfo_elf_lookup(si, elf_hash, name);
|
2014-09-16 23:31:06 +02:00
|
|
|
if (s != nullptr) {
|
2014-09-29 21:10:36 +02:00
|
|
|
*lsi = si;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (s == nullptr && somain != nullptr) {
|
|
|
|
// 1. Look for it in the main executable unless we already did.
|
|
|
|
if (si != somain || !si->has_DT_SYMBOLIC) {
|
|
|
|
DEBUG("%s: looking up %s in executable %s",
|
|
|
|
si->name, name, somain->name);
|
|
|
|
s = soinfo_elf_lookup(somain, elf_hash, name);
|
|
|
|
if (s != nullptr) {
|
|
|
|
*lsi = somain;
|
|
|
|
}
|
2014-09-16 23:31:06 +02:00
|
|
|
}
|
2012-10-31 10:55:51 +01:00
|
|
|
|
2014-09-16 23:31:06 +02:00
|
|
|
// 2. Look for it in the ld_preloads
|
|
|
|
if (s == nullptr) {
|
2014-09-12 18:43:13 +02:00
|
|
|
for (int i = 0; g_ld_preloads[i] != NULL; i++) {
|
|
|
|
s = soinfo_elf_lookup(g_ld_preloads[i], elf_hash, name);
|
|
|
|
if (s != nullptr) {
|
2014-09-16 23:31:06 +02:00
|
|
|
*lsi = g_ld_preloads[i];
|
|
|
|
break;
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
|
|
|
}
|
2014-09-16 23:31:06 +02:00
|
|
|
}
|
2014-09-29 21:10:36 +02:00
|
|
|
}
|
2012-10-31 10:55:51 +01:00
|
|
|
|
2014-09-29 21:10:36 +02:00
|
|
|
/* Look for symbols in the local scope (the object who is
|
|
|
|
* searching). This happens with C++ templates on x86 for some
|
|
|
|
* reason.
|
|
|
|
*
|
|
|
|
* Notes on weak symbols:
|
|
|
|
* The ELF specs are ambiguous about treatment of weak definitions in
|
|
|
|
* dynamic linking. Some systems return the first definition found
|
|
|
|
* and some the first non-weak definition. This is system dependent.
|
|
|
|
* Here we return the first definition found for simplicity. */
|
2014-09-12 18:43:13 +02:00
|
|
|
|
2014-09-29 21:10:36 +02:00
|
|
|
if (s == nullptr && !si->has_DT_SYMBOLIC) {
|
|
|
|
DEBUG("%s: looking up %s in local scope", si->name, name);
|
|
|
|
s = soinfo_elf_lookup(si, elf_hash, name);
|
|
|
|
if (s != nullptr) {
|
|
|
|
*lsi = si;
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-16 23:31:06 +02:00
|
|
|
if (s == nullptr) {
|
|
|
|
si->get_children().visit([&](soinfo* child) {
|
|
|
|
DEBUG("%s: looking up %s in %s", si->name, name, child->name);
|
|
|
|
s = soinfo_elf_lookup(child, elf_hash, name);
|
|
|
|
if (s != nullptr) {
|
|
|
|
*lsi = child;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
});
|
|
|
|
}
|
2009-09-29 04:38:04 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
if (s != nullptr) {
|
|
|
|
TRACE_TYPE(LOOKUP, "si %s sym %s s->st_value = %p, "
|
|
|
|
"found in %s, base = %p, load bias = %p",
|
|
|
|
si->name, name, reinterpret_cast<void*>(s->st_value),
|
|
|
|
(*lsi)->name, reinterpret_cast<void*>((*lsi)->base),
|
|
|
|
reinterpret_cast<void*>((*lsi)->load_bias));
|
|
|
|
}
|
|
|
|
|
2014-09-16 23:31:06 +02:00
|
|
|
return s;
|
2009-09-29 04:38:04 +02:00
|
|
|
}
|
|
|
|
|
2014-09-02 01:15:52 +02:00
|
|
|
// Each size has it's own allocator.
|
|
|
|
template<size_t size>
|
|
|
|
class SizeBasedAllocator {
|
|
|
|
public:
|
|
|
|
static void* alloc() {
|
|
|
|
return allocator_.alloc();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void free(void* ptr) {
|
|
|
|
allocator_.free(ptr);
|
|
|
|
}
|
2014-08-29 23:01:48 +02:00
|
|
|
|
2014-09-02 01:15:52 +02:00
|
|
|
private:
|
|
|
|
static LinkerBlockAllocator allocator_;
|
|
|
|
};
|
|
|
|
|
|
|
|
template<size_t size>
|
|
|
|
LinkerBlockAllocator SizeBasedAllocator<size>::allocator_(size);
|
|
|
|
|
|
|
|
template<typename T>
|
|
|
|
class TypeBasedAllocator {
|
|
|
|
public:
|
|
|
|
static T* alloc() {
|
|
|
|
return reinterpret_cast<T*>(SizeBasedAllocator<sizeof(T)>::alloc());
|
|
|
|
}
|
|
|
|
|
|
|
|
static void free(T* ptr) {
|
|
|
|
SizeBasedAllocator<sizeof(T)>::free(ptr);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
class LoadTask {
|
|
|
|
public:
|
|
|
|
struct deleter_t {
|
|
|
|
void operator()(LoadTask* t) {
|
|
|
|
TypeBasedAllocator<LoadTask>::free(t);
|
|
|
|
}
|
|
|
|
};
|
2014-07-29 23:21:45 +02:00
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
typedef UniquePtr<LoadTask, deleter_t> unique_ptr;
|
2013-03-01 00:58:45 +01:00
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
static deleter_t deleter;
|
|
|
|
|
|
|
|
static LoadTask* create(const char* name, soinfo* needed_by) {
|
|
|
|
LoadTask* ptr = TypeBasedAllocator<LoadTask>::alloc();
|
|
|
|
return new (ptr) LoadTask(name, needed_by);
|
2014-07-29 02:32:20 +02:00
|
|
|
}
|
2014-07-29 23:21:45 +02:00
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
const char* get_name() const {
|
|
|
|
return name_;
|
2014-07-29 23:21:45 +02:00
|
|
|
}
|
2014-09-06 01:42:53 +02:00
|
|
|
|
|
|
|
soinfo* get_needed_by() const {
|
|
|
|
return needed_by_;
|
|
|
|
}
|
|
|
|
private:
|
|
|
|
LoadTask(const char* name, soinfo* needed_by)
|
|
|
|
: name_(name), needed_by_(needed_by) {}
|
|
|
|
|
|
|
|
const char* name_;
|
|
|
|
soinfo* needed_by_;
|
|
|
|
|
|
|
|
DISALLOW_IMPLICIT_CONSTRUCTORS(LoadTask);
|
2014-07-29 02:32:20 +02:00
|
|
|
};
|
|
|
|
|
2014-09-16 09:22:10 +02:00
|
|
|
LoadTask::deleter_t LoadTask::deleter;
|
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
template <typename T>
|
|
|
|
using linked_list_t = LinkedList<T, TypeBasedAllocator<LinkedListEntry<T>>>;
|
|
|
|
|
|
|
|
typedef linked_list_t<soinfo> SoinfoLinkedList;
|
|
|
|
typedef linked_list_t<const char> StringLinkedList;
|
|
|
|
typedef linked_list_t<LoadTask> LoadTaskList;
|
|
|
|
|
|
|
|
|
2014-07-29 02:32:20 +02:00
|
|
|
// This is used by dlsym(3). It performs symbol lookup only within the
|
|
|
|
// specified soinfo object and its dependencies in breadth first order.
|
2014-08-19 00:08:51 +02:00
|
|
|
ElfW(Sym)* dlsym_handle_lookup(soinfo* si, soinfo** found, const char* name) {
|
2014-09-02 01:15:52 +02:00
|
|
|
SoinfoLinkedList visit_list;
|
|
|
|
SoinfoLinkedList visited;
|
|
|
|
|
2014-07-29 02:32:20 +02:00
|
|
|
visit_list.push_back(si);
|
|
|
|
soinfo* current_soinfo;
|
|
|
|
while ((current_soinfo = visit_list.pop_front()) != nullptr) {
|
2014-08-13 06:02:13 +02:00
|
|
|
if (visited.contains(current_soinfo)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2014-08-19 00:08:51 +02:00
|
|
|
ElfW(Sym)* result = soinfo_elf_lookup(current_soinfo, elfhash(name), name);
|
2014-07-29 02:32:20 +02:00
|
|
|
|
|
|
|
if (result != nullptr) {
|
|
|
|
*found = current_soinfo;
|
|
|
|
return result;
|
|
|
|
}
|
2014-08-13 06:02:13 +02:00
|
|
|
visited.push_back(current_soinfo);
|
2014-07-29 02:32:20 +02:00
|
|
|
|
|
|
|
current_soinfo->get_children().for_each([&](soinfo* child) {
|
|
|
|
visit_list.push_back(child);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
return nullptr;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2013-03-01 00:58:45 +01:00
|
|
|
/* This is used by dlsym(3) to performs a global symbol lookup. If the
|
|
|
|
start value is null (for RTLD_DEFAULT), the search starts at the
|
|
|
|
beginning of the global solist. Otherwise the search starts at the
|
|
|
|
specified soinfo (for RTLD_NEXT).
|
2009-09-29 04:38:04 +02:00
|
|
|
*/
|
2014-08-19 00:08:51 +02:00
|
|
|
ElfW(Sym)* dlsym_linear_lookup(const char* name, soinfo** found, soinfo* start) {
|
2012-12-20 23:42:14 +01:00
|
|
|
unsigned elf_hash = elfhash(name);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-08-29 21:02:36 +02:00
|
|
|
if (start == nullptr) {
|
2012-12-20 23:42:14 +01:00
|
|
|
start = solist;
|
|
|
|
}
|
2009-12-31 19:17:56 +01:00
|
|
|
|
2014-08-29 21:02:36 +02:00
|
|
|
ElfW(Sym)* s = nullptr;
|
|
|
|
for (soinfo* si = start; (s == nullptr) && (si != nullptr); si = si->next) {
|
2014-09-16 02:00:10 +02:00
|
|
|
if ((si->get_rtld_flags() & RTLD_GLOBAL) == 0) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2014-08-19 00:08:51 +02:00
|
|
|
s = soinfo_elf_lookup(si, elf_hash, name);
|
2014-08-29 21:02:36 +02:00
|
|
|
if (s != nullptr) {
|
2012-12-20 23:42:14 +01:00
|
|
|
*found = si;
|
|
|
|
break;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2012-12-20 23:42:14 +01:00
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-08-29 21:02:36 +02:00
|
|
|
if (s != nullptr) {
|
2013-10-05 02:01:33 +02:00
|
|
|
TRACE_TYPE(LOOKUP, "%s s->st_value = %p, found->base = %p",
|
|
|
|
name, reinterpret_cast<void*>(s->st_value), reinterpret_cast<void*>((*found)->base));
|
2012-12-20 23:42:14 +01:00
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2012-12-20 23:42:14 +01:00
|
|
|
return s;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2013-03-12 07:58:06 +01:00
|
|
|
soinfo* find_containing_library(const void* p) {
|
2014-02-11 02:46:57 +01:00
|
|
|
ElfW(Addr) address = reinterpret_cast<ElfW(Addr)>(p);
|
2014-08-29 21:02:36 +02:00
|
|
|
for (soinfo* si = solist; si != nullptr; si = si->next) {
|
2013-03-12 07:58:06 +01:00
|
|
|
if (address >= si->base && address - si->base < si->size) {
|
|
|
|
return si;
|
2009-12-31 19:17:40 +01:00
|
|
|
}
|
2013-03-12 07:58:06 +01:00
|
|
|
}
|
2014-08-29 21:02:36 +02:00
|
|
|
return nullptr;
|
2009-12-31 19:17:40 +01:00
|
|
|
}
|
|
|
|
|
2014-02-11 02:46:57 +01:00
|
|
|
ElfW(Sym)* dladdr_find_symbol(soinfo* si, const void* addr) {
|
|
|
|
ElfW(Addr) soaddr = reinterpret_cast<ElfW(Addr)>(addr) - si->base;
|
2013-03-12 07:58:06 +01:00
|
|
|
|
|
|
|
// Search the library's symbol table for any defined symbol which
|
|
|
|
// contains this address.
|
|
|
|
for (size_t i = 0; i < si->nchain; ++i) {
|
2014-02-11 02:46:57 +01:00
|
|
|
ElfW(Sym)* sym = &si->symtab[i];
|
2013-03-12 07:58:06 +01:00
|
|
|
if (sym->st_shndx != SHN_UNDEF &&
|
|
|
|
soaddr >= sym->st_value &&
|
|
|
|
soaddr < sym->st_value + sym->st_size) {
|
|
|
|
return sym;
|
2009-12-31 19:17:40 +01:00
|
|
|
}
|
2013-03-12 07:58:06 +01:00
|
|
|
}
|
2009-12-31 19:17:40 +01:00
|
|
|
|
2014-08-29 21:02:36 +02:00
|
|
|
return nullptr;
|
2009-12-31 19:17:40 +01:00
|
|
|
}
|
|
|
|
|
2012-10-31 22:20:03 +01:00
|
|
|
static int open_library_on_path(const char* name, const char* const paths[]) {
|
|
|
|
char buf[512];
|
2014-08-29 21:02:36 +02:00
|
|
|
for (size_t i = 0; paths[i] != nullptr; ++i) {
|
2013-01-18 03:36:06 +01:00
|
|
|
int n = __libc_format_buffer(buf, sizeof(buf), "%s/%s", paths[i], name);
|
2012-10-31 22:20:03 +01:00
|
|
|
if (n < 0 || n >= static_cast<int>(sizeof(buf))) {
|
2013-03-12 18:40:45 +01:00
|
|
|
PRINT("Warning: ignoring very long library path: %s/%s", paths[i], name);
|
2012-10-31 22:20:03 +01:00
|
|
|
continue;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2012-10-31 22:20:03 +01:00
|
|
|
int fd = TEMP_FAILURE_RETRY(open(buf, O_RDONLY | O_CLOEXEC));
|
|
|
|
if (fd != -1) {
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return -1;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2012-10-31 22:20:03 +01:00
|
|
|
static int open_library(const char* name) {
|
2013-03-12 18:40:45 +01:00
|
|
|
TRACE("[ opening %s ]", name);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2012-10-31 22:20:03 +01:00
|
|
|
// If the name contains a slash, we should attempt to open it directly and not search the paths.
|
2014-08-29 21:02:36 +02:00
|
|
|
if (strchr(name, '/') != nullptr) {
|
2012-11-02 06:59:19 +01:00
|
|
|
int fd = TEMP_FAILURE_RETRY(open(name, O_RDONLY | O_CLOEXEC));
|
|
|
|
if (fd != -1) {
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
// ...but nvidia binary blobs (at least) rely on this behavior, so fall through for now.
|
2014-05-03 03:18:50 +02:00
|
|
|
#if defined(__LP64__)
|
2014-06-29 22:00:23 +02:00
|
|
|
return -1;
|
2014-05-03 03:18:50 +02:00
|
|
|
#endif
|
2012-10-31 22:20:03 +01:00
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2012-10-31 22:20:03 +01:00
|
|
|
// Otherwise we try LD_LIBRARY_PATH first, and fall back to the built-in well known paths.
|
2014-05-14 19:02:03 +02:00
|
|
|
int fd = open_library_on_path(name, g_ld_library_paths);
|
2012-10-31 22:20:03 +01:00
|
|
|
if (fd == -1) {
|
2014-05-14 19:02:03 +02:00
|
|
|
fd = open_library_on_path(name, kDefaultLdPaths);
|
2012-10-31 22:20:03 +01:00
|
|
|
}
|
|
|
|
return fd;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
template<typename F>
|
|
|
|
static void for_each_dt_needed(const soinfo* si, F action) {
|
|
|
|
for (ElfW(Dyn)* d = si->dynamic; d->d_tag != DT_NULL; ++d) {
|
|
|
|
if (d->d_tag == DT_NEEDED) {
|
2014-09-30 04:14:45 +02:00
|
|
|
action(si->get_string(d->d_un.d_val));
|
2014-05-09 18:10:14 +02:00
|
|
|
}
|
2014-09-06 01:42:53 +02:00
|
|
|
}
|
|
|
|
}
|
2014-05-09 18:10:14 +02:00
|
|
|
|
2014-09-16 02:00:10 +02:00
|
|
|
static soinfo* load_library(LoadTaskList& load_tasks, const char* name, int rtld_flags, const android_dlextinfo* extinfo) {
|
2014-09-06 01:42:53 +02:00
|
|
|
int fd = -1;
|
2014-10-04 02:52:44 +02:00
|
|
|
off64_t file_offset = 0;
|
2014-09-06 01:42:53 +02:00
|
|
|
ScopedFd file_guard(-1);
|
2014-05-09 18:10:14 +02:00
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
if (extinfo != nullptr && (extinfo->flags & ANDROID_DLEXT_USE_LIBRARY_FD) != 0) {
|
|
|
|
fd = extinfo->library_fd;
|
2014-10-21 21:09:18 +02:00
|
|
|
if ((extinfo->flags & ANDROID_DLEXT_USE_LIBRARY_FD_OFFSET) != 0) {
|
|
|
|
file_offset = extinfo->library_fd_offset;
|
2014-10-04 02:52:44 +02:00
|
|
|
}
|
2014-09-06 01:42:53 +02:00
|
|
|
} else {
|
|
|
|
// Open the file.
|
|
|
|
fd = open_library(name);
|
|
|
|
if (fd == -1) {
|
|
|
|
DL_ERR("library \"%s\" not found", name);
|
2014-09-05 23:57:59 +02:00
|
|
|
return nullptr;
|
|
|
|
}
|
2014-05-20 00:06:58 +02:00
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
file_guard.reset(fd);
|
|
|
|
}
|
2012-06-18 18:13:49 +02:00
|
|
|
|
2014-10-04 02:52:44 +02:00
|
|
|
if ((file_offset % PAGE_SIZE) != 0) {
|
2014-10-21 21:09:18 +02:00
|
|
|
DL_ERR("file offset for the library \"%s\" is not page-aligned: %" PRId64, name, file_offset);
|
2014-10-04 02:52:44 +02:00
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
struct stat file_stat;
|
|
|
|
if (TEMP_FAILURE_RETRY(fstat(fd, &file_stat)) != 0) {
|
2014-10-21 21:09:18 +02:00
|
|
|
DL_ERR("unable to stat file for the library \"%s\": %s", name, strerror(errno));
|
2014-09-06 01:42:53 +02:00
|
|
|
return nullptr;
|
|
|
|
}
|
2014-05-09 18:10:14 +02:00
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
// Check for symlink and other situations where
|
|
|
|
// file can have different names.
|
|
|
|
for (soinfo* si = solist; si != nullptr; si = si->next) {
|
|
|
|
if (si->get_st_dev() != 0 &&
|
|
|
|
si->get_st_ino() != 0 &&
|
|
|
|
si->get_st_dev() == file_stat.st_dev &&
|
2014-10-04 02:52:44 +02:00
|
|
|
si->get_st_ino() == file_stat.st_ino &&
|
|
|
|
si->get_file_offset() == file_offset) {
|
2014-09-06 01:42:53 +02:00
|
|
|
TRACE("library \"%s\" is already loaded under different name/path \"%s\" - will return existing soinfo", name, si->name);
|
|
|
|
return si;
|
2014-09-05 23:57:59 +02:00
|
|
|
}
|
2014-09-06 01:42:53 +02:00
|
|
|
}
|
2014-05-09 18:10:14 +02:00
|
|
|
|
2014-09-16 02:00:10 +02:00
|
|
|
if ((rtld_flags & RTLD_NOLOAD) != 0) {
|
2014-09-09 19:21:42 +02:00
|
|
|
DL_ERR("library \"%s\" wasn't loaded and RTLD_NOLOAD prevented it", name);
|
2014-09-06 01:42:53 +02:00
|
|
|
return nullptr;
|
|
|
|
}
|
2014-07-29 23:21:45 +02:00
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
// Read the ELF header and load the segments.
|
2014-10-04 02:52:44 +02:00
|
|
|
ElfReader elf_reader(name, fd, file_offset);
|
2014-09-06 01:42:53 +02:00
|
|
|
if (!elf_reader.Load(extinfo)) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
2014-05-09 18:10:14 +02:00
|
|
|
|
2014-10-04 02:52:44 +02:00
|
|
|
soinfo* si = soinfo_alloc(SEARCH_NAME(name), &file_stat, file_offset, rtld_flags);
|
2014-09-06 01:42:53 +02:00
|
|
|
if (si == nullptr) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
si->base = elf_reader.load_start();
|
|
|
|
si->size = elf_reader.load_size();
|
|
|
|
si->load_bias = elf_reader.load_bias();
|
|
|
|
si->phnum = elf_reader.phdr_count();
|
|
|
|
si->phdr = elf_reader.loaded_phdr();
|
|
|
|
|
|
|
|
if (!si->PrelinkImage()) {
|
|
|
|
soinfo_free(si);
|
|
|
|
return nullptr;
|
|
|
|
}
|
2014-07-29 23:21:45 +02:00
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
for_each_dt_needed(si, [&] (const char* name) {
|
|
|
|
load_tasks.push_back(LoadTask::create(name, si));
|
|
|
|
});
|
|
|
|
|
|
|
|
return si;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-05-20 00:19:52 +02:00
|
|
|
static soinfo *find_loaded_library_by_name(const char* name) {
|
|
|
|
const char* search_name = SEARCH_NAME(name);
|
2014-08-29 21:02:36 +02:00
|
|
|
for (soinfo* si = solist; si != nullptr; si = si->next) {
|
2014-05-20 00:19:52 +02:00
|
|
|
if (!strcmp(search_name, si->name)) {
|
|
|
|
return si;
|
linker: avoid clobbering the .dynamic section of shared libs
This patch removes the DT_NEEDED hack which stores pointers
to soinfo structs in the .dynamic section of the library
being loaded.
Instead, it caches the soinfo struct pointers on the stack
during relocation time. After relocation time, i.e. when
calling constructors and destructors of the shared library
and its dependencies, uncached access is used instead,
doing lookups using the string table entries pointed to by
the DT_NEEDED entries.
By removing this hack, it is no longer needed to undo the
PT_GNURELRO protection, i.e., all non-writable mappings
can remain non-writable during their entire lifespan.
Even though, strictly speaking, the algorithmic complexity
has increased somewhat, the real-world adverse effect
is negligible on the systems I have tested.
Change-Id: I2361502560b96b5878f7f94a8e8a215350d70d64
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@gmail.com>
2012-08-14 12:30:09 +02:00
|
|
|
}
|
2014-05-20 00:19:52 +02:00
|
|
|
}
|
2014-08-29 21:02:36 +02:00
|
|
|
return nullptr;
|
linker: avoid clobbering the .dynamic section of shared libs
This patch removes the DT_NEEDED hack which stores pointers
to soinfo structs in the .dynamic section of the library
being loaded.
Instead, it caches the soinfo struct pointers on the stack
during relocation time. After relocation time, i.e. when
calling constructors and destructors of the shared library
and its dependencies, uncached access is used instead,
doing lookups using the string table entries pointed to by
the DT_NEEDED entries.
By removing this hack, it is no longer needed to undo the
PT_GNURELRO protection, i.e., all non-writable mappings
can remain non-writable during their entire lifespan.
Even though, strictly speaking, the algorithmic complexity
has increased somewhat, the real-world adverse effect
is negligible on the systems I have tested.
Change-Id: I2361502560b96b5878f7f94a8e8a215350d70d64
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@gmail.com>
2012-08-14 12:30:09 +02:00
|
|
|
}
|
|
|
|
|
2014-09-16 02:00:10 +02:00
|
|
|
static soinfo* find_library_internal(LoadTaskList& load_tasks, const char* name, int rtld_flags, const android_dlextinfo* extinfo) {
|
2012-11-01 23:16:56 +01:00
|
|
|
|
2014-05-20 00:19:52 +02:00
|
|
|
soinfo* si = find_loaded_library_by_name(name);
|
2014-05-20 00:06:58 +02:00
|
|
|
|
|
|
|
// Library might still be loaded, the accurate detection
|
2014-09-06 01:42:53 +02:00
|
|
|
// of this fact is done by load_library.
|
2014-08-29 21:02:36 +02:00
|
|
|
if (si == nullptr) {
|
2014-05-20 00:06:58 +02:00
|
|
|
TRACE("[ '%s' has not been found by name. Trying harder...]", name);
|
2014-09-16 02:00:10 +02:00
|
|
|
si = load_library(load_tasks, name, rtld_flags, extinfo);
|
2014-05-20 00:06:58 +02:00
|
|
|
}
|
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
return si;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void soinfo_unload(soinfo* si);
|
|
|
|
|
|
|
|
static bool is_recursive(soinfo* si, soinfo* parent) {
|
|
|
|
if (parent == nullptr) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (si == parent) {
|
2014-05-20 00:06:58 +02:00
|
|
|
DL_ERR("recursive link to \"%s\"", si->name);
|
2014-09-06 01:42:53 +02:00
|
|
|
return true;
|
2012-11-01 23:16:56 +01:00
|
|
|
}
|
2014-07-29 23:21:45 +02:00
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
return !parent->get_parents().visit([&](soinfo* grandparent) {
|
|
|
|
return !is_recursive(si, grandparent);
|
|
|
|
});
|
2014-07-29 23:21:45 +02:00
|
|
|
}
|
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
static bool find_libraries(const char* const library_names[], size_t library_names_size, soinfo* soinfos[],
|
2014-09-16 02:00:10 +02:00
|
|
|
soinfo* ld_preloads[], size_t ld_preloads_size, int rtld_flags, const android_dlextinfo* extinfo) {
|
2014-09-06 01:42:53 +02:00
|
|
|
// Step 0: prepare.
|
|
|
|
LoadTaskList load_tasks;
|
|
|
|
for (size_t i = 0; i < library_names_size; ++i) {
|
|
|
|
const char* name = library_names[i];
|
|
|
|
load_tasks.push_back(LoadTask::create(name, nullptr));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Libraries added to this list in reverse order so that we can
|
|
|
|
// start linking from bottom-up - see step 2.
|
|
|
|
SoinfoLinkedList found_libs;
|
|
|
|
size_t soinfos_size = 0;
|
|
|
|
|
2014-09-09 01:22:22 +02:00
|
|
|
auto failure_guard = make_scope_guard([&]() {
|
2014-09-06 01:42:53 +02:00
|
|
|
// Housekeeping
|
|
|
|
load_tasks.for_each([] (LoadTask* t) {
|
|
|
|
LoadTask::deleter(t);
|
|
|
|
});
|
|
|
|
|
|
|
|
for (size_t i = 0; i<soinfos_size; ++i) {
|
|
|
|
soinfo_unload(soinfos[i]);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
// Step 1: load and pre-link all DT_NEEDED libraries in breadth first order.
|
|
|
|
for (LoadTask::unique_ptr task(load_tasks.pop_front()); task.get() != nullptr; task.reset(load_tasks.pop_front())) {
|
2014-09-16 02:00:10 +02:00
|
|
|
soinfo* si = find_library_internal(load_tasks, task->get_name(), rtld_flags, extinfo);
|
2014-09-06 01:42:53 +02:00
|
|
|
if (si == nullptr) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
soinfo* needed_by = task->get_needed_by();
|
|
|
|
|
|
|
|
if (is_recursive(si, needed_by)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2014-09-05 23:57:59 +02:00
|
|
|
si->ref_count++;
|
2014-09-06 01:42:53 +02:00
|
|
|
if (needed_by != nullptr) {
|
|
|
|
needed_by->add_child(si);
|
|
|
|
}
|
|
|
|
found_libs.push_front(si);
|
|
|
|
|
|
|
|
// When ld_preloads is not null first
|
|
|
|
// ld_preloads_size libs are in fact ld_preloads.
|
|
|
|
if (ld_preloads != nullptr && soinfos_size < ld_preloads_size) {
|
|
|
|
ld_preloads[soinfos_size] = si;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (soinfos_size<library_names_size) {
|
|
|
|
soinfos[soinfos_size++] = si;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Step 2: link libraries.
|
|
|
|
soinfo* si;
|
|
|
|
while ((si = found_libs.pop_front()) != nullptr) {
|
|
|
|
if ((si->flags & FLAG_LINKED) == 0) {
|
|
|
|
if (!si->LinkImage(extinfo)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
si->flags |= FLAG_LINKED;
|
|
|
|
}
|
2014-07-29 23:21:45 +02:00
|
|
|
}
|
2014-09-06 01:42:53 +02:00
|
|
|
|
|
|
|
// All is well - found_libs and load_tasks are empty at this point
|
|
|
|
// and all libs are successfully linked.
|
|
|
|
failure_guard.disable();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-09-16 02:00:10 +02:00
|
|
|
static soinfo* find_library(const char* name, int rtld_flags, const android_dlextinfo* extinfo) {
|
2014-09-06 01:42:53 +02:00
|
|
|
if (name == nullptr) {
|
|
|
|
somain->ref_count++;
|
|
|
|
return somain;
|
|
|
|
}
|
|
|
|
|
|
|
|
soinfo* si;
|
|
|
|
|
2014-09-16 02:00:10 +02:00
|
|
|
if (!find_libraries(&name, 1, &si, nullptr, 0, rtld_flags, extinfo)) {
|
2014-09-06 01:42:53 +02:00
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2012-11-01 23:16:56 +01:00
|
|
|
return si;
|
|
|
|
}
|
|
|
|
|
2014-05-20 00:06:58 +02:00
|
|
|
static void soinfo_unload(soinfo* si) {
|
2014-05-20 00:06:58 +02:00
|
|
|
if (!si->can_unload()) {
|
|
|
|
TRACE("not unloading '%s' - the binary is flagged with NODELETE", si->name);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2013-03-12 18:40:45 +01:00
|
|
|
if (si->ref_count == 1) {
|
|
|
|
TRACE("unloading '%s'", si->name);
|
2012-11-01 23:16:56 +01:00
|
|
|
si->CallDestructors();
|
|
|
|
|
2014-08-22 21:25:04 +02:00
|
|
|
if (si->has_min_version(0)) {
|
2014-09-06 01:42:53 +02:00
|
|
|
soinfo* child = nullptr;
|
|
|
|
while ((child = si->get_children().pop_front()) != nullptr) {
|
|
|
|
TRACE("%s needs to unload %s", si->name, child->name);
|
|
|
|
soinfo_unload(child);
|
2014-08-29 23:01:48 +02:00
|
|
|
}
|
2014-05-09 18:10:14 +02:00
|
|
|
} else {
|
2014-09-06 01:42:53 +02:00
|
|
|
for_each_dt_needed(si, [&] (const char* library_name) {
|
|
|
|
TRACE("deprecated (old format of soinfo): %s needs to unload %s", si->name, library_name);
|
|
|
|
soinfo* needed = find_library(library_name, RTLD_NOLOAD, nullptr);
|
|
|
|
if (needed != nullptr) {
|
|
|
|
soinfo_unload(needed);
|
|
|
|
} else {
|
|
|
|
// Not found: for example if symlink was deleted between dlopen and dlclose
|
|
|
|
// Since we cannot really handle errors at this point - print and continue.
|
|
|
|
PRINT("warning: couldn't find %s needed by %s on unload.", library_name, si->name);
|
2014-05-09 18:10:14 +02:00
|
|
|
}
|
2014-09-06 01:42:53 +02:00
|
|
|
});
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2012-11-01 23:16:56 +01:00
|
|
|
notify_gdb_of_unload(si);
|
2013-03-12 18:40:45 +01:00
|
|
|
si->ref_count = 0;
|
2014-05-06 01:49:04 +02:00
|
|
|
soinfo_free(si);
|
2012-11-01 23:16:56 +01:00
|
|
|
} else {
|
2013-03-12 18:40:45 +01:00
|
|
|
si->ref_count--;
|
2013-10-01 03:43:46 +02:00
|
|
|
TRACE("not unloading '%s', decrementing ref_count to %zd", si->name, si->ref_count);
|
2012-11-01 23:16:56 +01:00
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-01-14 01:37:47 +01:00
|
|
|
void do_android_get_LD_LIBRARY_PATH(char* buffer, size_t buffer_size) {
|
2014-08-27 05:48:11 +02:00
|
|
|
// Use basic string manipulation calls to avoid snprintf.
|
|
|
|
// snprintf indirectly calls pthread_getspecific to get the size of a buffer.
|
|
|
|
// When debug malloc is enabled, this call returns 0. This in turn causes
|
|
|
|
// snprintf to do nothing, which causes libraries to fail to load.
|
|
|
|
// See b/17302493 for further details.
|
|
|
|
// Once the above bug is fixed, this code can be modified to use
|
|
|
|
// snprintf again.
|
|
|
|
size_t required_len = strlen(kDefaultLdPaths[0]) + strlen(kDefaultLdPaths[1]) + 2;
|
|
|
|
if (buffer_size < required_len) {
|
|
|
|
__libc_fatal("android_get_LD_LIBRARY_PATH failed, buffer too small: buffer len %zu, required len %zu",
|
|
|
|
buffer_size, required_len);
|
|
|
|
}
|
|
|
|
char* end = stpcpy(buffer, kDefaultLdPaths[0]);
|
|
|
|
*end = ':';
|
|
|
|
strcpy(end + 1, kDefaultLdPaths[1]);
|
2014-01-14 01:37:47 +01:00
|
|
|
}
|
|
|
|
|
2012-12-20 23:42:14 +01:00
|
|
|
void do_android_update_LD_LIBRARY_PATH(const char* ld_library_path) {
|
|
|
|
if (!get_AT_SECURE()) {
|
|
|
|
parse_LD_LIBRARY_PATH(ld_library_path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-06-04 01:23:08 +02:00
|
|
|
soinfo* do_dlopen(const char* name, int flags, const android_dlextinfo* extinfo) {
|
2014-05-20 00:06:58 +02:00
|
|
|
if ((flags & ~(RTLD_NOW|RTLD_LAZY|RTLD_LOCAL|RTLD_GLOBAL|RTLD_NODELETE|RTLD_NOLOAD)) != 0) {
|
2012-12-19 00:57:55 +01:00
|
|
|
DL_ERR("invalid flags to dlopen: %x", flags);
|
2014-08-29 21:02:36 +02:00
|
|
|
return nullptr;
|
2012-12-19 00:57:55 +01:00
|
|
|
}
|
2014-10-04 02:52:44 +02:00
|
|
|
if (extinfo != nullptr) {
|
|
|
|
if ((extinfo->flags & ~(ANDROID_DLEXT_VALID_FLAG_BITS)) != 0) {
|
|
|
|
DL_ERR("invalid extended flags to android_dlopen_ext: 0x%" PRIx64, extinfo->flags);
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
if ((extinfo->flags & ANDROID_DLEXT_USE_LIBRARY_FD) == 0 &&
|
2014-10-21 21:09:18 +02:00
|
|
|
(extinfo->flags & ANDROID_DLEXT_USE_LIBRARY_FD_OFFSET) != 0) {
|
|
|
|
DL_ERR("invalid extended flag combination (ANDROID_DLEXT_USE_LIBRARY_FD_OFFSET without ANDROID_DLEXT_USE_LIBRARY_FD): 0x%" PRIx64, extinfo->flags);
|
2014-10-04 02:52:44 +02:00
|
|
|
return nullptr;
|
|
|
|
}
|
2014-02-06 15:34:21 +01:00
|
|
|
}
|
2014-05-09 18:10:14 +02:00
|
|
|
protect_data(PROT_READ | PROT_WRITE);
|
2014-05-20 00:06:58 +02:00
|
|
|
soinfo* si = find_library(name, flags, extinfo);
|
2014-08-29 21:02:36 +02:00
|
|
|
if (si != nullptr) {
|
2012-11-01 23:16:56 +01:00
|
|
|
si->CallConstructors();
|
|
|
|
}
|
2014-05-09 18:10:14 +02:00
|
|
|
protect_data(PROT_READ);
|
2012-11-01 23:16:56 +01:00
|
|
|
return si;
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-05-20 00:06:58 +02:00
|
|
|
void do_dlclose(soinfo* si) {
|
2014-05-09 18:10:14 +02:00
|
|
|
protect_data(PROT_READ | PROT_WRITE);
|
2014-05-20 00:06:58 +02:00
|
|
|
soinfo_unload(si);
|
2014-05-09 18:10:14 +02:00
|
|
|
protect_data(PROT_READ);
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-09-12 00:16:03 +02:00
|
|
|
static ElfW(Addr) call_ifunc_resolver(ElfW(Addr) resolver_addr) {
|
|
|
|
typedef ElfW(Addr) (*ifunc_resolver_t)(void);
|
|
|
|
ifunc_resolver_t ifunc_resolver = reinterpret_cast<ifunc_resolver_t>(resolver_addr);
|
|
|
|
ElfW(Addr) ifunc_addr = ifunc_resolver();
|
|
|
|
TRACE_TYPE(RELO, "Called ifunc_resolver@%p. The result is %p", ifunc_resolver, reinterpret_cast<void*>(ifunc_addr));
|
2014-07-23 20:22:25 +02:00
|
|
|
|
2014-09-12 00:16:03 +02:00
|
|
|
return ifunc_addr;
|
2014-07-23 20:22:25 +02:00
|
|
|
}
|
|
|
|
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(USE_RELA)
|
2014-09-02 20:47:23 +02:00
|
|
|
int soinfo::Relocate(ElfW(Rela)* rela, unsigned count) {
|
2013-10-05 02:01:33 +02:00
|
|
|
for (size_t idx = 0; idx < count; ++idx, ++rela) {
|
2014-02-11 02:46:57 +01:00
|
|
|
unsigned type = ELFW(R_TYPE)(rela->r_info);
|
|
|
|
unsigned sym = ELFW(R_SYM)(rela->r_info);
|
2014-09-02 20:47:23 +02:00
|
|
|
ElfW(Addr) reloc = static_cast<ElfW(Addr)>(rela->r_offset + load_bias);
|
2014-02-11 02:46:57 +01:00
|
|
|
ElfW(Addr) sym_addr = 0;
|
2014-08-29 21:02:36 +02:00
|
|
|
const char* sym_name = nullptr;
|
2013-10-05 02:01:33 +02:00
|
|
|
|
2014-09-02 20:47:23 +02:00
|
|
|
DEBUG("Processing '%s' relocation at index %zd", name, idx);
|
2013-10-05 02:01:33 +02:00
|
|
|
if (type == 0) { // R_*_NONE
|
|
|
|
continue;
|
|
|
|
}
|
2014-09-06 01:42:53 +02:00
|
|
|
|
|
|
|
ElfW(Sym)* s = nullptr;
|
|
|
|
soinfo* lsi = nullptr;
|
|
|
|
|
2013-10-05 02:01:33 +02:00
|
|
|
if (sym != 0) {
|
2014-09-30 04:14:45 +02:00
|
|
|
sym_name = get_string(symtab[sym].st_name);
|
2014-09-02 20:47:23 +02:00
|
|
|
s = soinfo_do_lookup(this, sym_name, &lsi);
|
2014-08-29 21:02:36 +02:00
|
|
|
if (s == nullptr) {
|
2013-10-05 02:01:33 +02:00
|
|
|
// We only allow an undefined symbol if this is a weak reference...
|
2014-09-02 20:47:23 +02:00
|
|
|
s = &symtab[sym];
|
2013-10-05 02:01:33 +02:00
|
|
|
if (ELF_ST_BIND(s->st_info) != STB_WEAK) {
|
2014-09-02 20:47:23 +02:00
|
|
|
DL_ERR("cannot locate symbol \"%s\" referenced by \"%s\"...", sym_name, name);
|
2013-10-05 02:01:33 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* IHI0044C AAELF 4.5.1.1:
|
|
|
|
|
|
|
|
Libraries are not searched to resolve weak references.
|
|
|
|
It is not an error for a weak reference to remain unsatisfied.
|
|
|
|
|
|
|
|
During linking, the value of an undefined weak reference is:
|
|
|
|
- Zero if the relocation type is absolute
|
|
|
|
- The address of the place if the relocation is pc-relative
|
|
|
|
- The address of nominal base address if the relocation
|
|
|
|
type is base-relative.
|
|
|
|
*/
|
|
|
|
|
|
|
|
switch (type) {
|
2013-10-10 16:19:31 +02:00
|
|
|
#if defined(__aarch64__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_JUMP_SLOT:
|
|
|
|
case R_AARCH64_GLOB_DAT:
|
|
|
|
case R_AARCH64_ABS64:
|
|
|
|
case R_AARCH64_ABS32:
|
|
|
|
case R_AARCH64_ABS16:
|
|
|
|
case R_AARCH64_RELATIVE:
|
|
|
|
case R_AARCH64_IRELATIVE:
|
|
|
|
/*
|
|
|
|
* The sym_addr was initialized to be zero above, or the relocation
|
|
|
|
* code below does not care about value of sym_addr.
|
|
|
|
* No need to do anything.
|
|
|
|
*/
|
|
|
|
break;
|
2013-10-10 16:19:31 +02:00
|
|
|
#elif defined(__x86_64__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_X86_64_JUMP_SLOT:
|
|
|
|
case R_X86_64_GLOB_DAT:
|
|
|
|
case R_X86_64_32:
|
|
|
|
case R_X86_64_64:
|
|
|
|
case R_X86_64_RELATIVE:
|
|
|
|
case R_X86_64_IRELATIVE:
|
|
|
|
// No need to do anything.
|
|
|
|
break;
|
|
|
|
case R_X86_64_PC32:
|
|
|
|
sym_addr = reloc;
|
|
|
|
break;
|
2013-10-26 02:38:02 +02:00
|
|
|
#endif
|
2014-09-12 18:43:13 +02:00
|
|
|
default:
|
|
|
|
DL_ERR("unknown weak reloc type %d @ %p (%zu)", type, rela, idx);
|
|
|
|
return -1;
|
2013-10-05 02:01:33 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// We got a definition.
|
2014-09-12 00:16:03 +02:00
|
|
|
sym_addr = lsi->resolve_symbol_address(s);
|
2013-10-05 02:01:33 +02:00
|
|
|
}
|
|
|
|
count_relocation(kRelocSymbol);
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (type) {
|
2013-10-10 16:19:31 +02:00
|
|
|
#if defined(__aarch64__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_JUMP_SLOT:
|
2013-10-10 16:19:31 +02:00
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rela->r_offset);
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(RELO, "RELO JMP_SLOT %16llx <- %16llx %s\n",
|
|
|
|
reloc, (sym_addr + rela->r_addend), sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = (sym_addr + rela->r_addend);
|
2013-10-10 16:19:31 +02:00
|
|
|
break;
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_GLOB_DAT:
|
2013-10-10 16:19:31 +02:00
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rela->r_offset);
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(RELO, "RELO GLOB_DAT %16llx <- %16llx %s\n",
|
|
|
|
reloc, (sym_addr + rela->r_addend), sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = (sym_addr + rela->r_addend);
|
2013-10-10 16:19:31 +02:00
|
|
|
break;
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_ABS64:
|
2013-10-10 16:19:31 +02:00
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rela->r_offset);
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(RELO, "RELO ABS64 %16llx <- %16llx %s\n",
|
|
|
|
reloc, (sym_addr + rela->r_addend), sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += (sym_addr + rela->r_addend);
|
2013-10-10 16:19:31 +02:00
|
|
|
break;
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_ABS32:
|
2013-10-10 16:19:31 +02:00
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rela->r_offset);
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(RELO, "RELO ABS32 %16llx <- %16llx %s\n",
|
|
|
|
reloc, (sym_addr + rela->r_addend), sym_name);
|
|
|
|
if ((static_cast<ElfW(Addr)>(INT32_MIN) <= (*reinterpret_cast<ElfW(Addr)*>(reloc) + (sym_addr + rela->r_addend))) &&
|
|
|
|
((*reinterpret_cast<ElfW(Addr)*>(reloc) + (sym_addr + rela->r_addend)) <= static_cast<ElfW(Addr)>(UINT32_MAX))) {
|
2014-09-12 18:43:13 +02:00
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += (sym_addr + rela->r_addend);
|
2013-10-10 16:19:31 +02:00
|
|
|
} else {
|
2014-09-12 18:43:13 +02:00
|
|
|
DL_ERR("0x%016llx out of range 0x%016llx to 0x%016llx",
|
|
|
|
(*reinterpret_cast<ElfW(Addr)*>(reloc) + (sym_addr + rela->r_addend)),
|
|
|
|
static_cast<ElfW(Addr)>(INT32_MIN),
|
|
|
|
static_cast<ElfW(Addr)>(UINT32_MAX));
|
|
|
|
return -1;
|
2013-10-10 16:19:31 +02:00
|
|
|
}
|
|
|
|
break;
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_ABS16:
|
2013-10-10 16:19:31 +02:00
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rela->r_offset);
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(RELO, "RELO ABS16 %16llx <- %16llx %s\n",
|
|
|
|
reloc, (sym_addr + rela->r_addend), sym_name);
|
|
|
|
if ((static_cast<ElfW(Addr)>(INT16_MIN) <= (*reinterpret_cast<ElfW(Addr)*>(reloc) + (sym_addr + rela->r_addend))) &&
|
|
|
|
((*reinterpret_cast<ElfW(Addr)*>(reloc) + (sym_addr + rela->r_addend)) <= static_cast<ElfW(Addr)>(UINT16_MAX))) {
|
2014-09-12 18:43:13 +02:00
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += (sym_addr + rela->r_addend);
|
2013-10-10 16:19:31 +02:00
|
|
|
} else {
|
2014-09-12 18:43:13 +02:00
|
|
|
DL_ERR("0x%016llx out of range 0x%016llx to 0x%016llx",
|
|
|
|
(*reinterpret_cast<ElfW(Addr)*>(reloc) + (sym_addr + rela->r_addend)),
|
|
|
|
static_cast<ElfW(Addr)>(INT16_MIN),
|
|
|
|
static_cast<ElfW(Addr)>(UINT16_MAX));
|
|
|
|
return -1;
|
2013-10-10 16:19:31 +02:00
|
|
|
}
|
|
|
|
break;
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_PREL64:
|
2013-10-10 16:19:31 +02:00
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rela->r_offset);
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(RELO, "RELO REL64 %16llx <- %16llx - %16llx %s\n",
|
|
|
|
reloc, (sym_addr + rela->r_addend), rela->r_offset, sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += (sym_addr + rela->r_addend) - rela->r_offset;
|
2013-10-10 16:19:31 +02:00
|
|
|
break;
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_PREL32:
|
2013-10-10 16:19:31 +02:00
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rela->r_offset);
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(RELO, "RELO REL32 %16llx <- %16llx - %16llx %s\n",
|
|
|
|
reloc, (sym_addr + rela->r_addend), rela->r_offset, sym_name);
|
|
|
|
if ((static_cast<ElfW(Addr)>(INT32_MIN) <= (*reinterpret_cast<ElfW(Addr)*>(reloc) + ((sym_addr + rela->r_addend) - rela->r_offset))) &&
|
|
|
|
((*reinterpret_cast<ElfW(Addr)*>(reloc) + ((sym_addr + rela->r_addend) - rela->r_offset)) <= static_cast<ElfW(Addr)>(UINT32_MAX))) {
|
2014-09-12 18:43:13 +02:00
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += ((sym_addr + rela->r_addend) - rela->r_offset);
|
2013-10-10 16:19:31 +02:00
|
|
|
} else {
|
2014-09-12 18:43:13 +02:00
|
|
|
DL_ERR("0x%016llx out of range 0x%016llx to 0x%016llx",
|
|
|
|
(*reinterpret_cast<ElfW(Addr)*>(reloc) + ((sym_addr + rela->r_addend) - rela->r_offset)),
|
|
|
|
static_cast<ElfW(Addr)>(INT32_MIN),
|
|
|
|
static_cast<ElfW(Addr)>(UINT32_MAX));
|
|
|
|
return -1;
|
2013-10-10 16:19:31 +02:00
|
|
|
}
|
|
|
|
break;
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_PREL16:
|
2013-10-10 16:19:31 +02:00
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rela->r_offset);
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(RELO, "RELO REL16 %16llx <- %16llx - %16llx %s\n",
|
|
|
|
reloc, (sym_addr + rela->r_addend), rela->r_offset, sym_name);
|
|
|
|
if ((static_cast<ElfW(Addr)>(INT16_MIN) <= (*reinterpret_cast<ElfW(Addr)*>(reloc) + ((sym_addr + rela->r_addend) - rela->r_offset))) &&
|
|
|
|
((*reinterpret_cast<ElfW(Addr)*>(reloc) + ((sym_addr + rela->r_addend) - rela->r_offset)) <= static_cast<ElfW(Addr)>(UINT16_MAX))) {
|
2014-09-12 18:43:13 +02:00
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += ((sym_addr + rela->r_addend) - rela->r_offset);
|
2013-10-10 16:19:31 +02:00
|
|
|
} else {
|
2014-09-12 18:43:13 +02:00
|
|
|
DL_ERR("0x%016llx out of range 0x%016llx to 0x%016llx",
|
|
|
|
(*reinterpret_cast<ElfW(Addr)*>(reloc) + ((sym_addr + rela->r_addend) - rela->r_offset)),
|
|
|
|
static_cast<ElfW(Addr)>(INT16_MIN),
|
|
|
|
static_cast<ElfW(Addr)>(UINT16_MAX));
|
|
|
|
return -1;
|
2013-10-10 16:19:31 +02:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_RELATIVE:
|
2013-10-10 16:19:31 +02:00
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rela->r_offset);
|
|
|
|
if (sym) {
|
2014-09-12 18:43:13 +02:00
|
|
|
DL_ERR("odd RELATIVE form...");
|
|
|
|
return -1;
|
2013-10-10 16:19:31 +02:00
|
|
|
}
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(RELO, "RELO RELATIVE %16llx <- %16llx\n",
|
2014-09-02 20:47:23 +02:00
|
|
|
reloc, (base + rela->r_addend));
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = (base + rela->r_addend);
|
2013-10-10 16:19:31 +02:00
|
|
|
break;
|
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_IRELATIVE:
|
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rela->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO IRELATIVE %16llx <- %16llx\n", reloc, (base + rela->r_addend));
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = call_ifunc_resolver(base + rela->r_addend);
|
|
|
|
break;
|
2014-09-12 00:16:03 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_COPY:
|
2014-07-03 21:04:31 +02:00
|
|
|
/*
|
|
|
|
* ET_EXEC is not supported so this should not happen.
|
|
|
|
*
|
|
|
|
* http://infocenter.arm.com/help/topic/com.arm.doc.ihi0044d/IHI0044D_aaelf.pdf
|
|
|
|
*
|
|
|
|
* Section 4.7.1.10 "Dynamic relocations"
|
|
|
|
* R_AARCH64_COPY may only appear in executable objects where e_type is
|
|
|
|
* set to ET_EXEC.
|
|
|
|
*/
|
2014-09-02 20:47:23 +02:00
|
|
|
DL_ERR("%s R_AARCH64_COPY relocations are not supported", name);
|
2014-07-03 21:04:31 +02:00
|
|
|
return -1;
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_TLS_TPREL64:
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(RELO, "RELO TLS_TPREL64 *** %16llx <- %16llx - %16llx\n",
|
|
|
|
reloc, (sym_addr + rela->r_addend), rela->r_offset);
|
2013-10-10 16:19:31 +02:00
|
|
|
break;
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_AARCH64_TLS_DTPREL32:
|
2014-02-11 02:46:57 +01:00
|
|
|
TRACE_TYPE(RELO, "RELO TLS_DTPREL32 *** %16llx <- %16llx - %16llx\n",
|
|
|
|
reloc, (sym_addr + rela->r_addend), rela->r_offset);
|
2013-10-10 16:19:31 +02:00
|
|
|
break;
|
|
|
|
#elif defined(__x86_64__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_X86_64_JUMP_SLOT:
|
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rela->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO JMP_SLOT %08zx <- %08zx %s", static_cast<size_t>(reloc),
|
|
|
|
static_cast<size_t>(sym_addr + rela->r_addend), sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = sym_addr + rela->r_addend;
|
|
|
|
break;
|
|
|
|
case R_X86_64_GLOB_DAT:
|
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rela->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO GLOB_DAT %08zx <- %08zx %s", static_cast<size_t>(reloc),
|
|
|
|
static_cast<size_t>(sym_addr + rela->r_addend), sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = sym_addr + rela->r_addend;
|
|
|
|
break;
|
|
|
|
case R_X86_64_RELATIVE:
|
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rela->r_offset);
|
|
|
|
if (sym) {
|
|
|
|
DL_ERR("odd RELATIVE form...");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
TRACE_TYPE(RELO, "RELO RELATIVE %08zx <- +%08zx", static_cast<size_t>(reloc),
|
|
|
|
static_cast<size_t>(base));
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = base + rela->r_addend;
|
|
|
|
break;
|
|
|
|
case R_X86_64_IRELATIVE:
|
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rela->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO IRELATIVE %16llx <- %16llx\n", reloc, (base + rela->r_addend));
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = call_ifunc_resolver(base + rela->r_addend);
|
|
|
|
break;
|
|
|
|
case R_X86_64_32:
|
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rela->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO R_X86_64_32 %08zx <- +%08zx %s", static_cast<size_t>(reloc),
|
|
|
|
static_cast<size_t>(sym_addr), sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = sym_addr + rela->r_addend;
|
|
|
|
break;
|
|
|
|
case R_X86_64_64:
|
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rela->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO R_X86_64_64 %08zx <- +%08zx %s", static_cast<size_t>(reloc),
|
|
|
|
static_cast<size_t>(sym_addr), sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = sym_addr + rela->r_addend;
|
|
|
|
break;
|
|
|
|
case R_X86_64_PC32:
|
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rela->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO R_X86_64_PC32 %08zx <- +%08zx (%08zx - %08zx) %s",
|
|
|
|
static_cast<size_t>(reloc), static_cast<size_t>(sym_addr - reloc),
|
|
|
|
static_cast<size_t>(sym_addr), static_cast<size_t>(reloc), sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = sym_addr + rela->r_addend - reloc;
|
|
|
|
break;
|
2013-10-26 02:38:02 +02:00
|
|
|
#endif
|
2013-10-10 16:19:31 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
default:
|
|
|
|
DL_ERR("unknown reloc type %d @ %p (%zu)", type, rela, idx);
|
|
|
|
return -1;
|
2013-10-05 02:01:33 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2014-02-07 05:36:51 +01:00
|
|
|
|
|
|
|
#else // REL, not RELA.
|
2014-09-02 20:47:23 +02:00
|
|
|
int soinfo::Relocate(ElfW(Rel)* rel, unsigned count) {
|
2014-09-12 18:43:13 +02:00
|
|
|
for (size_t idx = 0; idx < count; ++idx, ++rel) {
|
|
|
|
unsigned type = ELFW(R_TYPE)(rel->r_info);
|
|
|
|
// TODO: don't use unsigned for 'sym'. Use uint32_t or ElfW(Addr) instead.
|
|
|
|
unsigned sym = ELFW(R_SYM)(rel->r_info);
|
|
|
|
ElfW(Addr) reloc = static_cast<ElfW(Addr)>(rel->r_offset + load_bias);
|
|
|
|
ElfW(Addr) sym_addr = 0;
|
|
|
|
const char* sym_name = nullptr;
|
|
|
|
|
|
|
|
DEBUG("Processing '%s' relocation at index %zd", name, idx);
|
|
|
|
if (type == 0) { // R_*_NONE
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
ElfW(Sym)* s = nullptr;
|
|
|
|
soinfo* lsi = nullptr;
|
|
|
|
|
|
|
|
if (sym != 0) {
|
2014-09-30 04:14:45 +02:00
|
|
|
sym_name = get_string(symtab[sym].st_name);
|
2014-09-12 18:43:13 +02:00
|
|
|
s = soinfo_do_lookup(this, sym_name, &lsi);
|
|
|
|
if (s == nullptr) {
|
|
|
|
// We only allow an undefined symbol if this is a weak reference...
|
|
|
|
s = &symtab[sym];
|
|
|
|
if (ELF_ST_BIND(s->st_info) != STB_WEAK) {
|
|
|
|
DL_ERR("cannot locate symbol \"%s\" referenced by \"%s\"...", sym_name, name);
|
|
|
|
return -1;
|
2012-07-31 21:07:22 +02:00
|
|
|
}
|
2014-09-06 01:42:53 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
/* IHI0044C AAELF 4.5.1.1:
|
|
|
|
|
|
|
|
Libraries are not searched to resolve weak references.
|
|
|
|
It is not an error for a weak reference to remain
|
|
|
|
unsatisfied.
|
|
|
|
|
|
|
|
During linking, the value of an undefined weak reference is:
|
|
|
|
- Zero if the relocation type is absolute
|
|
|
|
- The address of the place if the relocation is pc-relative
|
|
|
|
- The address of nominal base address if the relocation
|
|
|
|
type is base-relative.
|
|
|
|
*/
|
|
|
|
|
|
|
|
switch (type) {
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(__arm__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_ARM_JUMP_SLOT:
|
|
|
|
case R_ARM_GLOB_DAT:
|
|
|
|
case R_ARM_ABS32:
|
|
|
|
case R_ARM_RELATIVE: /* Don't care. */
|
|
|
|
// sym_addr was initialized to be zero above or relocation
|
|
|
|
// code below does not care about value of sym_addr.
|
|
|
|
// No need to do anything.
|
|
|
|
break;
|
2013-10-26 02:38:02 +02:00
|
|
|
#elif defined(__i386__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_386_JMP_SLOT:
|
|
|
|
case R_386_GLOB_DAT:
|
|
|
|
case R_386_32:
|
|
|
|
case R_386_RELATIVE: /* Don't care. */
|
|
|
|
case R_386_IRELATIVE:
|
|
|
|
// sym_addr was initialized to be zero above or relocation
|
|
|
|
// code below does not care about value of sym_addr.
|
|
|
|
// No need to do anything.
|
|
|
|
break;
|
|
|
|
case R_386_PC32:
|
|
|
|
sym_addr = reloc;
|
|
|
|
break;
|
2013-10-26 02:38:02 +02:00
|
|
|
#endif
|
2009-10-26 20:05:23 +01:00
|
|
|
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(__arm__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_ARM_COPY:
|
|
|
|
// Fall through. Can't really copy if weak symbol is not found at run-time.
|
2013-10-26 02:38:02 +02:00
|
|
|
#endif
|
2014-09-12 18:43:13 +02:00
|
|
|
default:
|
|
|
|
DL_ERR("unknown weak reloc type %d @ %p (%zu)", type, rel, idx);
|
|
|
|
return -1;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
} else {
|
|
|
|
// We got a definition.
|
|
|
|
sym_addr = lsi->resolve_symbol_address(s);
|
|
|
|
}
|
|
|
|
count_relocation(kRelocSymbol);
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
switch (type) {
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(__arm__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_ARM_JUMP_SLOT:
|
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rel->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO JMP_SLOT %08x <- %08x %s", reloc, sym_addr, sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = sym_addr;
|
|
|
|
break;
|
|
|
|
case R_ARM_GLOB_DAT:
|
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rel->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO GLOB_DAT %08x <- %08x %s", reloc, sym_addr, sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = sym_addr;
|
|
|
|
break;
|
|
|
|
case R_ARM_ABS32:
|
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rel->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO ABS %08x <- %08x %s", reloc, sym_addr, sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += sym_addr;
|
|
|
|
break;
|
|
|
|
case R_ARM_REL32:
|
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rel->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO REL32 %08x <- %08x - %08x %s",
|
|
|
|
reloc, sym_addr, rel->r_offset, sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += sym_addr - rel->r_offset;
|
|
|
|
break;
|
|
|
|
case R_ARM_COPY:
|
|
|
|
/*
|
|
|
|
* ET_EXEC is not supported so this should not happen.
|
|
|
|
*
|
|
|
|
* http://infocenter.arm.com/help/topic/com.arm.doc.ihi0044d/IHI0044D_aaelf.pdf
|
|
|
|
*
|
|
|
|
* Section 4.7.1.10 "Dynamic relocations"
|
|
|
|
* R_ARM_COPY may only appear in executable objects where e_type is
|
|
|
|
* set to ET_EXEC.
|
|
|
|
*/
|
|
|
|
DL_ERR("%s R_ARM_COPY relocations are not supported", name);
|
|
|
|
return -1;
|
2013-10-26 02:38:02 +02:00
|
|
|
#elif defined(__i386__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_386_JMP_SLOT:
|
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rel->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO JMP_SLOT %08x <- %08x %s", reloc, sym_addr, sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = sym_addr;
|
|
|
|
break;
|
|
|
|
case R_386_GLOB_DAT:
|
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rel->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO GLOB_DAT %08x <- %08x %s", reloc, sym_addr, sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = sym_addr;
|
|
|
|
break;
|
|
|
|
case R_386_32:
|
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rel->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO R_386_32 %08x <- +%08x %s", reloc, sym_addr, sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += sym_addr;
|
|
|
|
break;
|
|
|
|
case R_386_PC32:
|
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rel->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO R_386_PC32 %08x <- +%08x (%08x - %08x) %s",
|
|
|
|
reloc, (sym_addr - reloc), sym_addr, reloc, sym_name);
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += (sym_addr - reloc);
|
|
|
|
break;
|
2013-10-26 02:38:02 +02:00
|
|
|
#elif defined(__mips__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_MIPS_REL32:
|
2014-02-07 05:36:51 +01:00
|
|
|
#if defined(__LP64__)
|
2014-09-12 18:43:13 +02:00
|
|
|
// MIPS Elf64_Rel entries contain compound relocations
|
|
|
|
// We only handle the R_MIPS_NONE|R_MIPS_64|R_MIPS_REL32 case
|
|
|
|
if (ELF64_R_TYPE2(rel->r_info) != R_MIPS_64 ||
|
|
|
|
ELF64_R_TYPE3(rel->r_info) != R_MIPS_NONE) {
|
|
|
|
DL_ERR("Unexpected compound relocation type:%d type2:%d type3:%d @ %p (%zu)",
|
|
|
|
type, (unsigned)ELF64_R_TYPE2(rel->r_info),
|
|
|
|
(unsigned)ELF64_R_TYPE3(rel->r_info), rel, idx);
|
|
|
|
return -1;
|
|
|
|
}
|
2014-02-07 05:36:51 +01:00
|
|
|
#endif
|
2014-09-12 18:43:13 +02:00
|
|
|
count_relocation(kRelocAbsolute);
|
|
|
|
MARK(rel->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO REL32 %08zx <- %08zx %s", static_cast<size_t>(reloc),
|
|
|
|
static_cast<size_t>(sym_addr), sym_name ? sym_name : "*SECTIONHDR*");
|
|
|
|
if (s) {
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += sym_addr;
|
|
|
|
} else {
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += base;
|
|
|
|
}
|
|
|
|
break;
|
2013-10-26 02:38:02 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(__arm__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_ARM_RELATIVE:
|
2013-10-26 02:38:02 +02:00
|
|
|
#elif defined(__i386__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_386_RELATIVE:
|
2013-10-26 02:38:02 +02:00
|
|
|
#endif
|
2014-09-12 18:43:13 +02:00
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rel->r_offset);
|
|
|
|
if (sym) {
|
|
|
|
DL_ERR("odd RELATIVE form...");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
TRACE_TYPE(RELO, "RELO RELATIVE %p <- +%p",
|
|
|
|
reinterpret_cast<void*>(reloc), reinterpret_cast<void*>(base));
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) += base;
|
|
|
|
break;
|
2014-09-12 00:16:03 +02:00
|
|
|
#if defined(__i386__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case R_386_IRELATIVE:
|
|
|
|
count_relocation(kRelocRelative);
|
|
|
|
MARK(rel->r_offset);
|
|
|
|
TRACE_TYPE(RELO, "RELO IRELATIVE %p <- %p", reinterpret_cast<void*>(reloc), reinterpret_cast<void*>(base));
|
|
|
|
*reinterpret_cast<ElfW(Addr)*>(reloc) = call_ifunc_resolver(base + *reinterpret_cast<ElfW(Addr)*>(reloc));
|
|
|
|
break;
|
2014-09-12 00:16:03 +02:00
|
|
|
#endif
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
default:
|
|
|
|
DL_ERR("unknown reloc type %d @ %p (%zu)", type, rel, idx);
|
|
|
|
return -1;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
|
|
|
return 0;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2013-10-05 02:01:33 +02:00
|
|
|
#endif
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(__mips__)
|
2014-09-02 20:47:23 +02:00
|
|
|
static bool mips_relocate_got(soinfo* si) {
|
2014-09-12 18:43:13 +02:00
|
|
|
ElfW(Addr)** got = si->plt_got;
|
|
|
|
if (got == nullptr) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
unsigned local_gotno = si->mips_local_gotno;
|
|
|
|
unsigned gotsym = si->mips_gotsym;
|
|
|
|
unsigned symtabno = si->mips_symtabno;
|
|
|
|
ElfW(Sym)* symtab = si->symtab;
|
|
|
|
|
|
|
|
// got[0] is the address of the lazy resolver function.
|
|
|
|
// got[1] may be used for a GNU extension.
|
|
|
|
// Set it to a recognizable address in case someone calls it (should be _rtld_bind_start).
|
|
|
|
// FIXME: maybe this should be in a separate routine?
|
|
|
|
if ((si->flags & FLAG_LINKER) == 0) {
|
|
|
|
size_t g = 0;
|
|
|
|
got[g++] = reinterpret_cast<ElfW(Addr)*>(0xdeadbeef);
|
|
|
|
if (reinterpret_cast<intptr_t>(got[g]) < 0) {
|
|
|
|
got[g++] = reinterpret_cast<ElfW(Addr)*>(0xdeadfeed);
|
2013-08-21 06:05:44 +02:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
// Relocate the local GOT entries.
|
|
|
|
for (; g < local_gotno; g++) {
|
|
|
|
got[g] = reinterpret_cast<ElfW(Addr)*>(reinterpret_cast<uintptr_t>(got[g]) + si->load_bias);
|
2012-07-31 21:07:22 +02:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
2012-07-31 21:07:22 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// Now for the global GOT entries...
|
|
|
|
ElfW(Sym)* sym = symtab + gotsym;
|
|
|
|
got = si->plt_got + local_gotno;
|
|
|
|
for (size_t g = gotsym; g < symtabno; g++, sym++, got++) {
|
|
|
|
// This is an undefined reference... try to locate it.
|
2014-09-30 04:14:45 +02:00
|
|
|
const char* sym_name = si->get_string(sym->st_name);
|
2014-09-12 18:43:13 +02:00
|
|
|
soinfo* lsi = nullptr;
|
|
|
|
ElfW(Sym)* s = soinfo_do_lookup(si, sym_name, &lsi);
|
|
|
|
if (s == nullptr) {
|
|
|
|
// We only allow an undefined symbol if this is a weak reference.
|
|
|
|
s = &symtab[g];
|
|
|
|
if (ELF_ST_BIND(s->st_info) != STB_WEAK) {
|
|
|
|
DL_ERR("cannot locate \"%s\"...", sym_name);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
*got = 0;
|
|
|
|
} else {
|
|
|
|
// FIXME: is this sufficient?
|
|
|
|
// For reference see NetBSD link loader
|
|
|
|
// http://cvsweb.netbsd.org/bsdweb.cgi/src/libexec/ld.elf_so/arch/mips/mips_reloc.c?rev=1.53&content-type=text/x-cvsweb-markup
|
|
|
|
*got = reinterpret_cast<ElfW(Addr)*>(lsi->resolve_symbol_address(s));
|
2012-07-31 21:07:22 +02:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
|
|
|
return true;
|
2012-07-31 21:07:22 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2014-03-25 15:53:56 +01:00
|
|
|
void soinfo::CallArray(const char* array_name __unused, linker_function_t* functions, size_t count, bool reverse) {
|
2014-08-29 21:02:36 +02:00
|
|
|
if (functions == nullptr) {
|
2012-11-01 23:16:56 +01:00
|
|
|
return;
|
|
|
|
}
|
2009-05-18 14:37:41 +02:00
|
|
|
|
2013-10-01 03:43:46 +02:00
|
|
|
TRACE("[ Calling %s (size %zd) @ %p for '%s' ]", array_name, count, functions, name);
|
2009-05-18 14:37:41 +02:00
|
|
|
|
2013-03-12 18:40:45 +01:00
|
|
|
int begin = reverse ? (count - 1) : 0;
|
|
|
|
int end = reverse ? -1 : count;
|
|
|
|
int step = reverse ? -1 : 1;
|
2009-05-18 14:37:41 +02:00
|
|
|
|
2013-03-12 18:40:45 +01:00
|
|
|
for (int i = begin; i != end; i += step) {
|
|
|
|
TRACE("[ %s[%d] == %p ]", array_name, i, functions[i]);
|
|
|
|
CallFunction("function", functions[i]);
|
2012-11-01 23:16:56 +01:00
|
|
|
}
|
|
|
|
|
2013-03-12 18:40:45 +01:00
|
|
|
TRACE("[ Done calling %s for '%s' ]", array_name, name);
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-03-25 15:53:56 +01:00
|
|
|
void soinfo::CallFunction(const char* function_name __unused, linker_function_t function) {
|
2014-08-29 21:02:36 +02:00
|
|
|
if (function == nullptr || reinterpret_cast<uintptr_t>(function) == static_cast<uintptr_t>(-1)) {
|
2012-11-01 23:16:56 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2013-03-12 18:40:45 +01:00
|
|
|
TRACE("[ Calling %s @ %p for '%s' ]", function_name, function, name);
|
2012-11-01 23:16:56 +01:00
|
|
|
function();
|
2013-03-12 18:40:45 +01:00
|
|
|
TRACE("[ Done calling %s @ %p for '%s' ]", function_name, function, name);
|
2013-01-04 00:44:03 +01:00
|
|
|
|
|
|
|
// The function may have called dlopen(3) or dlclose(3), so we need to ensure our data structures
|
|
|
|
// are still writable. This happens with our debug malloc (see http://b/7941716).
|
2014-05-09 18:10:14 +02:00
|
|
|
protect_data(PROT_READ | PROT_WRITE);
|
2012-08-13 15:58:37 +02:00
|
|
|
}
|
|
|
|
|
2012-11-01 23:16:56 +01:00
|
|
|
void soinfo::CallPreInitConstructors() {
|
2013-05-09 23:19:58 +02:00
|
|
|
// DT_PREINIT_ARRAY functions are called before any other constructors for executables,
|
|
|
|
// but ignored in a shared library.
|
2012-11-01 23:16:56 +01:00
|
|
|
CallArray("DT_PREINIT_ARRAY", preinit_array, preinit_array_count, false);
|
|
|
|
}
|
2011-12-21 10:03:54 +01:00
|
|
|
|
2012-11-01 23:16:56 +01:00
|
|
|
void soinfo::CallConstructors() {
|
|
|
|
if (constructors_called) {
|
|
|
|
return;
|
|
|
|
}
|
2011-12-21 10:03:54 +01:00
|
|
|
|
2012-11-01 23:16:56 +01:00
|
|
|
// We set constructors_called before actually calling the constructors, otherwise it doesn't
|
|
|
|
// protect against recursive constructor calls. One simple example of constructor recursion
|
|
|
|
// is the libc debug malloc, which is implemented in libc_malloc_debug_leak.so:
|
|
|
|
// 1. The program depends on libc, so libc's constructor is called here.
|
|
|
|
// 2. The libc constructor calls dlopen() to load libc_malloc_debug_leak.so.
|
|
|
|
// 3. dlopen() calls the constructors on the newly created
|
|
|
|
// soinfo for libc_malloc_debug_leak.so.
|
|
|
|
// 4. The debug .so depends on libc, so CallConstructors is
|
|
|
|
// called again with the libc soinfo. If it doesn't trigger the early-
|
|
|
|
// out above, the libc constructor will be called again (recursively!).
|
|
|
|
constructors_called = true;
|
|
|
|
|
2014-08-29 21:02:36 +02:00
|
|
|
if ((flags & FLAG_EXE) == 0 && preinit_array != nullptr) {
|
2013-05-09 23:19:58 +02:00
|
|
|
// The GNU dynamic linker silently ignores these, but we warn the developer.
|
2013-10-01 03:43:46 +02:00
|
|
|
PRINT("\"%s\": ignoring %zd-entry DT_PREINIT_ARRAY in shared library!",
|
2013-05-09 23:19:58 +02:00
|
|
|
name, preinit_array_count);
|
2012-11-01 23:16:56 +01:00
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-05-09 18:10:14 +02:00
|
|
|
get_children().for_each([] (soinfo* si) {
|
|
|
|
si->CallConstructors();
|
|
|
|
});
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2013-05-09 23:19:58 +02:00
|
|
|
TRACE("\"%s\": calling constructors", name);
|
|
|
|
|
|
|
|
// DT_INIT should be called before DT_INIT_ARRAY if both are present.
|
2012-11-01 23:16:56 +01:00
|
|
|
CallFunction("DT_INIT", init_func);
|
|
|
|
CallArray("DT_INIT_ARRAY", init_array, init_array_count, false);
|
2011-12-21 10:03:54 +01:00
|
|
|
}
|
2009-05-18 14:37:41 +02:00
|
|
|
|
2012-11-01 23:16:56 +01:00
|
|
|
void soinfo::CallDestructors() {
|
2014-09-06 01:42:53 +02:00
|
|
|
if (!constructors_called) {
|
|
|
|
return;
|
|
|
|
}
|
2013-05-09 23:19:58 +02:00
|
|
|
TRACE("\"%s\": calling destructors", name);
|
|
|
|
|
|
|
|
// DT_FINI_ARRAY must be parsed in reverse order.
|
2012-11-01 23:16:56 +01:00
|
|
|
CallArray("DT_FINI_ARRAY", fini_array, fini_array_count, true);
|
2013-05-09 23:19:58 +02:00
|
|
|
|
|
|
|
// DT_FINI should be called after DT_FINI_ARRAY if both are present.
|
2012-11-01 23:16:56 +01:00
|
|
|
CallFunction("DT_FINI", fini_func);
|
2014-05-20 00:06:58 +02:00
|
|
|
|
|
|
|
// This is needed on second call to dlopen
|
|
|
|
// after library has been unloaded with RTLD_NODELETE
|
|
|
|
constructors_called = false;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-05-09 18:10:14 +02:00
|
|
|
void soinfo::add_child(soinfo* child) {
|
2014-08-22 21:25:04 +02:00
|
|
|
if (has_min_version(0)) {
|
2014-09-05 03:23:00 +02:00
|
|
|
child->parents.push_back(this);
|
|
|
|
this->children.push_back(child);
|
2014-05-09 18:10:14 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void soinfo::remove_all_links() {
|
2014-08-22 21:25:04 +02:00
|
|
|
if (!has_min_version(0)) {
|
2014-05-09 18:10:14 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// 1. Untie connected soinfos from 'this'.
|
|
|
|
children.for_each([&] (soinfo* child) {
|
|
|
|
child->parents.remove_if([&] (const soinfo* parent) {
|
|
|
|
return parent == this;
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
parents.for_each([&] (soinfo* parent) {
|
2014-08-29 23:01:48 +02:00
|
|
|
parent->children.remove_if([&] (const soinfo* child) {
|
2014-05-09 18:10:14 +02:00
|
|
|
return child == this;
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
// 2. Once everything untied - clear local lists.
|
|
|
|
parents.clear();
|
|
|
|
children.clear();
|
|
|
|
}
|
|
|
|
|
|
|
|
dev_t soinfo::get_st_dev() {
|
2014-08-22 21:25:04 +02:00
|
|
|
if (has_min_version(0)) {
|
|
|
|
return st_dev;
|
2014-05-09 18:10:14 +02:00
|
|
|
}
|
|
|
|
|
2014-08-22 21:25:04 +02:00
|
|
|
return 0;
|
2014-05-09 18:10:14 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
ino_t soinfo::get_st_ino() {
|
2014-08-22 21:25:04 +02:00
|
|
|
if (has_min_version(0)) {
|
|
|
|
return st_ino;
|
2014-05-09 18:10:14 +02:00
|
|
|
}
|
|
|
|
|
2014-08-22 21:25:04 +02:00
|
|
|
return 0;
|
2014-05-09 18:10:14 +02:00
|
|
|
}
|
|
|
|
|
2014-10-04 02:52:44 +02:00
|
|
|
off64_t soinfo::get_file_offset() {
|
|
|
|
if (has_min_version(1)) {
|
|
|
|
return file_offset;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-09-16 02:00:10 +02:00
|
|
|
int soinfo::get_rtld_flags() {
|
|
|
|
if (has_min_version(1)) {
|
|
|
|
return rtld_flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
// This is a return on get_children()/get_parents() if
|
2014-05-09 18:10:14 +02:00
|
|
|
// 'this->flags' does not have FLAG_NEW_SOINFO set.
|
|
|
|
static soinfo::soinfo_list_t g_empty_list;
|
|
|
|
|
|
|
|
soinfo::soinfo_list_t& soinfo::get_children() {
|
2014-08-22 21:25:04 +02:00
|
|
|
if (has_min_version(0)) {
|
|
|
|
return this->children;
|
2014-05-09 18:10:14 +02:00
|
|
|
}
|
|
|
|
|
2014-08-22 21:25:04 +02:00
|
|
|
return g_empty_list;
|
2014-05-09 18:10:14 +02:00
|
|
|
}
|
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
soinfo::soinfo_list_t& soinfo::get_parents() {
|
|
|
|
if ((this->flags & FLAG_NEW_SOINFO) == 0) {
|
|
|
|
return g_empty_list;
|
|
|
|
}
|
|
|
|
|
|
|
|
return this->parents;
|
|
|
|
}
|
|
|
|
|
2014-09-12 00:16:03 +02:00
|
|
|
ElfW(Addr) soinfo::resolve_symbol_address(ElfW(Sym)* s) {
|
|
|
|
if (ELF_ST_TYPE(s->st_info) == STT_GNU_IFUNC) {
|
|
|
|
return call_ifunc_resolver(s->st_value + load_bias);
|
|
|
|
}
|
|
|
|
|
|
|
|
return static_cast<ElfW(Addr)>(s->st_value + load_bias);
|
|
|
|
}
|
|
|
|
|
2014-09-30 04:14:45 +02:00
|
|
|
const char* soinfo::get_string(ElfW(Word) index) const {
|
|
|
|
if (has_min_version(1) && (index >= strtab_size)) {
|
|
|
|
__libc_fatal("%s: strtab out of bounds error; STRSZ=%zd, name=%d", name, strtab_size, index);
|
|
|
|
}
|
|
|
|
|
|
|
|
return strtab + index;
|
|
|
|
}
|
|
|
|
|
2014-05-20 00:06:58 +02:00
|
|
|
bool soinfo::can_unload() const {
|
|
|
|
return (rtld_flags & (RTLD_NODELETE | RTLD_GLOBAL)) == 0;
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
/* Force any of the closed stdin, stdout and stderr to be associated with
|
|
|
|
/dev/null. */
|
2012-10-17 00:54:46 +02:00
|
|
|
static int nullify_closed_stdio() {
|
2014-09-12 18:43:13 +02:00
|
|
|
int dev_null, i, status;
|
|
|
|
int return_value = 0;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
dev_null = TEMP_FAILURE_RETRY(open("/dev/null", O_RDWR));
|
|
|
|
if (dev_null < 0) {
|
|
|
|
DL_ERR("cannot open /dev/null: %s", strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
TRACE("[ Opened /dev/null file-descriptor=%d]", dev_null);
|
|
|
|
|
|
|
|
/* If any of the stdio file descriptors is valid and not associated
|
|
|
|
with /dev/null, dup /dev/null to it. */
|
|
|
|
for (i = 0; i < 3; i++) {
|
|
|
|
/* If it is /dev/null already, we are done. */
|
|
|
|
if (i == dev_null) {
|
|
|
|
continue;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
TRACE("[ Nullifying stdio file descriptor %d]", i);
|
|
|
|
status = TEMP_FAILURE_RETRY(fcntl(i, F_GETFL));
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
/* If file is opened, we are good. */
|
|
|
|
if (status != -1) {
|
|
|
|
continue;
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
/* The only error we allow is that the file descriptor does not
|
|
|
|
exist, in which case we dup /dev/null to it. */
|
|
|
|
if (errno != EBADF) {
|
|
|
|
DL_ERR("fcntl failed: %s", strerror(errno));
|
|
|
|
return_value = -1;
|
|
|
|
continue;
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
/* Try dupping /dev/null to this stdio file descriptor and
|
|
|
|
repeat if there is a signal. Note that any errors in closing
|
|
|
|
the stdio descriptor are lost. */
|
|
|
|
status = TEMP_FAILURE_RETRY(dup2(dev_null, i));
|
|
|
|
if (status < 0) {
|
|
|
|
DL_ERR("dup2 failed: %s", strerror(errno));
|
|
|
|
return_value = -1;
|
|
|
|
continue;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
/* If /dev/null is not one of the stdio file descriptors, close it. */
|
|
|
|
if (dev_null > 2) {
|
|
|
|
TRACE("[ Closing /dev/null file-descriptor=%d]", dev_null);
|
|
|
|
status = TEMP_FAILURE_RETRY(close(dev_null));
|
|
|
|
if (status == -1) {
|
|
|
|
DL_ERR("close failed: %s", strerror(errno));
|
|
|
|
return_value = -1;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
return return_value;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
bool soinfo::PrelinkImage() {
|
2014-09-16 09:22:10 +02:00
|
|
|
/* Extract dynamic section */
|
|
|
|
ElfW(Word) dynamic_flags = 0;
|
|
|
|
phdr_table_get_dynamic_section(phdr, phnum, load_bias, &dynamic, &dynamic_flags);
|
2014-09-05 23:57:59 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
/* We can't log anything until the linker is relocated */
|
|
|
|
bool relocating_linker = (flags & FLAG_LINKER) != 0;
|
|
|
|
if (!relocating_linker) {
|
|
|
|
INFO("[ linking %s ]", name);
|
|
|
|
DEBUG("si->base = %p si->flags = 0x%08x", reinterpret_cast<void*>(base), flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dynamic == nullptr) {
|
2012-06-19 01:24:17 +02:00
|
|
|
if (!relocating_linker) {
|
2014-09-12 18:43:13 +02:00
|
|
|
DL_ERR("missing PT_DYNAMIC in \"%s\"", name);
|
2012-06-19 01:24:17 +02:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
return false;
|
|
|
|
} else {
|
|
|
|
if (!relocating_linker) {
|
|
|
|
DEBUG("dynamic = %p", dynamic);
|
2012-06-19 00:08:39 +02:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
2012-06-19 00:08:39 +02:00
|
|
|
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(__arm__)
|
2014-09-12 18:43:13 +02:00
|
|
|
(void) phdr_table_get_arm_exidx(phdr, phnum, load_bias,
|
|
|
|
&ARM_exidx, &ARM_exidx_count);
|
2012-06-19 00:08:39 +02:00
|
|
|
#endif
|
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// Extract useful information from dynamic section.
|
|
|
|
uint32_t needed_count = 0;
|
|
|
|
for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) {
|
|
|
|
DEBUG("d = %p, d[0](tag) = %p d[1](val) = %p",
|
|
|
|
d, reinterpret_cast<void*>(d->d_tag), reinterpret_cast<void*>(d->d_un.d_val));
|
|
|
|
switch (d->d_tag) {
|
2014-09-17 00:51:25 +02:00
|
|
|
case DT_SONAME:
|
|
|
|
// TODO: glibc dynamic linker uses this name for
|
|
|
|
// initial library lookup; consider doing the same here.
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_HASH:
|
|
|
|
nbucket = reinterpret_cast<uint32_t*>(load_bias + d->d_un.d_ptr)[0];
|
|
|
|
nchain = reinterpret_cast<uint32_t*>(load_bias + d->d_un.d_ptr)[1];
|
|
|
|
bucket = reinterpret_cast<uint32_t*>(load_bias + d->d_un.d_ptr + 8);
|
|
|
|
chain = reinterpret_cast<uint32_t*>(load_bias + d->d_un.d_ptr + 8 + nbucket * 4);
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_STRTAB:
|
|
|
|
strtab = reinterpret_cast<const char*>(load_bias + d->d_un.d_ptr);
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-30 04:14:45 +02:00
|
|
|
case DT_STRSZ:
|
|
|
|
strtab_size = d->d_un.d_val;
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_SYMTAB:
|
|
|
|
symtab = reinterpret_cast<ElfW(Sym)*>(load_bias + d->d_un.d_ptr);
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-17 00:51:25 +02:00
|
|
|
case DT_SYMENT:
|
|
|
|
if (d->d_un.d_val != sizeof(ElfW(Sym))) {
|
2014-09-17 08:34:20 +02:00
|
|
|
DL_ERR("invalid DT_SYMENT: %zd", static_cast<size_t>(d->d_un.d_val));
|
2014-09-17 00:51:25 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_PLTREL:
|
2014-10-06 20:30:43 +02:00
|
|
|
#if defined(USE_RELA)
|
|
|
|
if (d->d_un.d_val != DT_RELA) {
|
|
|
|
DL_ERR("unsupported DT_PLTREL in \"%s\"; expected DT_RELA", name);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#else
|
2014-09-12 18:43:13 +02:00
|
|
|
if (d->d_un.d_val != DT_REL) {
|
2014-10-06 20:30:43 +02:00
|
|
|
DL_ERR("unsupported DT_PLTREL in \"%s\"; expected DT_REL", name);
|
2014-09-12 18:43:13 +02:00
|
|
|
return false;
|
|
|
|
}
|
2013-10-05 02:01:33 +02:00
|
|
|
#endif
|
2014-10-06 20:30:43 +02:00
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_JMPREL:
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(USE_RELA)
|
2014-09-12 18:43:13 +02:00
|
|
|
plt_rela = reinterpret_cast<ElfW(Rela)*>(load_bias + d->d_un.d_ptr);
|
2013-10-05 02:01:33 +02:00
|
|
|
#else
|
2014-09-12 18:43:13 +02:00
|
|
|
plt_rel = reinterpret_cast<ElfW(Rel)*>(load_bias + d->d_un.d_ptr);
|
2013-10-05 02:01:33 +02:00
|
|
|
#endif
|
2014-09-12 18:43:13 +02:00
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_PLTRELSZ:
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(USE_RELA)
|
2014-09-12 18:43:13 +02:00
|
|
|
plt_rela_count = d->d_un.d_val / sizeof(ElfW(Rela));
|
2013-10-05 02:01:33 +02:00
|
|
|
#else
|
2014-09-12 18:43:13 +02:00
|
|
|
plt_rel_count = d->d_un.d_val / sizeof(ElfW(Rel));
|
2013-10-05 02:01:33 +02:00
|
|
|
#endif
|
2014-09-12 18:43:13 +02:00
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_PLTGOT:
|
2014-09-17 00:51:25 +02:00
|
|
|
#if defined(__mips__)
|
2014-09-12 18:43:13 +02:00
|
|
|
// Used by mips and mips64.
|
|
|
|
plt_got = reinterpret_cast<ElfW(Addr)**>(load_bias + d->d_un.d_ptr);
|
2013-10-05 02:01:33 +02:00
|
|
|
#endif
|
2014-09-17 00:51:25 +02:00
|
|
|
// Ignore for other platforms... (because RTLD_LAZY is not supported)
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_DEBUG:
|
|
|
|
// Set the DT_DEBUG entry to the address of _r_debug for GDB
|
|
|
|
// if the dynamic table is writable
|
2014-02-07 05:36:51 +01:00
|
|
|
// FIXME: not working currently for N64
|
|
|
|
// The flags for the LOAD and DYNAMIC program headers do not agree.
|
2014-09-06 01:42:53 +02:00
|
|
|
// The LOAD section containing the dynamic table has been mapped as
|
2014-02-07 05:36:51 +01:00
|
|
|
// read-only, but the DYNAMIC header claims it is writable.
|
|
|
|
#if !(defined(__mips__) && defined(__LP64__))
|
2014-09-12 18:43:13 +02:00
|
|
|
if ((dynamic_flags & PF_W) != 0) {
|
|
|
|
d->d_un.d_val = reinterpret_cast<uintptr_t>(&_r_debug);
|
|
|
|
}
|
|
|
|
break;
|
2014-02-07 05:36:51 +01:00
|
|
|
#endif
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(USE_RELA)
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_RELA:
|
|
|
|
rela = reinterpret_cast<ElfW(Rela)*>(load_bias + d->d_un.d_ptr);
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_RELASZ:
|
|
|
|
rela_count = d->d_un.d_val / sizeof(ElfW(Rela));
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-17 00:51:25 +02:00
|
|
|
case DT_RELAENT:
|
|
|
|
if (d->d_un.d_val != sizeof(ElfW(Rela))) {
|
2014-09-17 08:34:20 +02:00
|
|
|
DL_ERR("invalid DT_RELAENT: %zd", static_cast<size_t>(d->d_un.d_val));
|
2014-09-17 00:51:25 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
|
|
|
// ignored (see DT_RELCOUNT comments for details)
|
2014-09-17 00:51:25 +02:00
|
|
|
case DT_RELACOUNT:
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_REL:
|
|
|
|
DL_ERR("unsupported DT_REL in \"%s\"", name);
|
|
|
|
return false;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_RELSZ:
|
|
|
|
DL_ERR("unsupported DT_RELSZ in \"%s\"", name);
|
|
|
|
return false;
|
2013-10-05 02:01:33 +02:00
|
|
|
#else
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_REL:
|
|
|
|
rel = reinterpret_cast<ElfW(Rel)*>(load_bias + d->d_un.d_ptr);
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_RELSZ:
|
|
|
|
rel_count = d->d_un.d_val / sizeof(ElfW(Rel));
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-17 00:51:25 +02:00
|
|
|
case DT_RELENT:
|
|
|
|
if (d->d_un.d_val != sizeof(ElfW(Rel))) {
|
2014-09-17 08:34:20 +02:00
|
|
|
DL_ERR("invalid DT_RELENT: %zd", static_cast<size_t>(d->d_un.d_val));
|
2014-09-17 00:51:25 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
|
|
|
// "Indicates that all RELATIVE relocations have been concatenated together,
|
|
|
|
// and specifies the RELATIVE relocation count."
|
|
|
|
//
|
|
|
|
// TODO: Spec also mentions that this can be used to optimize relocation process;
|
|
|
|
// Not currently used by bionic linker - ignored.
|
2014-09-17 00:51:25 +02:00
|
|
|
case DT_RELCOUNT:
|
|
|
|
break;
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_RELA:
|
|
|
|
DL_ERR("unsupported DT_RELA in \"%s\"", name);
|
|
|
|
return false;
|
2013-10-05 02:01:33 +02:00
|
|
|
#endif
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_INIT:
|
|
|
|
init_func = reinterpret_cast<linker_function_t>(load_bias + d->d_un.d_ptr);
|
|
|
|
DEBUG("%s constructors (DT_INIT) found at %p", name, init_func);
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_FINI:
|
|
|
|
fini_func = reinterpret_cast<linker_function_t>(load_bias + d->d_un.d_ptr);
|
|
|
|
DEBUG("%s destructors (DT_FINI) found at %p", name, fini_func);
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_INIT_ARRAY:
|
|
|
|
init_array = reinterpret_cast<linker_function_t*>(load_bias + d->d_un.d_ptr);
|
|
|
|
DEBUG("%s constructors (DT_INIT_ARRAY) found at %p", name, init_array);
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_INIT_ARRAYSZ:
|
|
|
|
init_array_count = ((unsigned)d->d_un.d_val) / sizeof(ElfW(Addr));
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_FINI_ARRAY:
|
|
|
|
fini_array = reinterpret_cast<linker_function_t*>(load_bias + d->d_un.d_ptr);
|
|
|
|
DEBUG("%s destructors (DT_FINI_ARRAY) found at %p", name, fini_array);
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_FINI_ARRAYSZ:
|
|
|
|
fini_array_count = ((unsigned)d->d_un.d_val) / sizeof(ElfW(Addr));
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_PREINIT_ARRAY:
|
|
|
|
preinit_array = reinterpret_cast<linker_function_t*>(load_bias + d->d_un.d_ptr);
|
|
|
|
DEBUG("%s constructors (DT_PREINIT_ARRAY) found at %p", name, preinit_array);
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_PREINIT_ARRAYSZ:
|
|
|
|
preinit_array_count = ((unsigned)d->d_un.d_val) / sizeof(ElfW(Addr));
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_TEXTREL:
|
2013-10-28 22:19:05 +01:00
|
|
|
#if defined(__LP64__)
|
2014-09-12 18:43:13 +02:00
|
|
|
DL_ERR("text relocations (DT_TEXTREL) found in 64-bit ELF file \"%s\"", name);
|
|
|
|
return false;
|
2013-10-28 22:19:05 +01:00
|
|
|
#else
|
2014-09-12 18:43:13 +02:00
|
|
|
has_text_relocations = true;
|
|
|
|
break;
|
2013-10-28 22:19:05 +01:00
|
|
|
#endif
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_SYMBOLIC:
|
2014-09-29 21:10:36 +02:00
|
|
|
has_DT_SYMBOLIC = true;
|
2014-09-12 18:43:13 +02:00
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_NEEDED:
|
|
|
|
++needed_count;
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_FLAGS:
|
|
|
|
if (d->d_un.d_val & DF_TEXTREL) {
|
2013-10-28 22:19:05 +01:00
|
|
|
#if defined(__LP64__)
|
2014-09-12 18:43:13 +02:00
|
|
|
DL_ERR("text relocations (DF_TEXTREL) found in 64-bit ELF file \"%s\"", name);
|
|
|
|
return false;
|
2013-10-28 22:19:05 +01:00
|
|
|
#else
|
2014-09-12 18:43:13 +02:00
|
|
|
has_text_relocations = true;
|
2013-10-28 22:19:05 +01:00
|
|
|
#endif
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
2014-09-29 21:10:36 +02:00
|
|
|
if (d->d_un.d_val & DF_SYMBOLIC) {
|
|
|
|
has_DT_SYMBOLIC = true;
|
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-30 04:14:45 +02:00
|
|
|
case DT_FLAGS_1:
|
|
|
|
if ((d->d_un.d_val & DF_1_GLOBAL) != 0) {
|
|
|
|
rtld_flags |= RTLD_GLOBAL;
|
|
|
|
}
|
2014-05-20 00:06:58 +02:00
|
|
|
|
|
|
|
if ((d->d_un.d_val & DF_1_NODELETE) != 0) {
|
|
|
|
rtld_flags |= RTLD_NODELETE;
|
|
|
|
}
|
2014-09-30 04:14:45 +02:00
|
|
|
// TODO: Implement other flags
|
|
|
|
|
2014-05-20 00:06:58 +02:00
|
|
|
if ((d->d_un.d_val & ~(DF_1_NOW | DF_1_GLOBAL | DF_1_NODELETE)) != 0) {
|
2014-09-30 04:14:45 +02:00
|
|
|
DL_WARN("Unsupported flags DT_FLAGS_1=%p", reinterpret_cast<void*>(d->d_un.d_val));
|
|
|
|
}
|
|
|
|
break;
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(__mips__)
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_MIPS_RLD_MAP:
|
|
|
|
// Set the DT_MIPS_RLD_MAP entry to the address of _r_debug for GDB.
|
|
|
|
{
|
|
|
|
r_debug** dp = reinterpret_cast<r_debug**>(load_bias + d->d_un.d_ptr);
|
|
|
|
*dp = &_r_debug;
|
|
|
|
}
|
|
|
|
break;
|
2014-10-15 23:59:01 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_MIPS_RLD_VERSION:
|
|
|
|
case DT_MIPS_FLAGS:
|
|
|
|
case DT_MIPS_BASE_ADDRESS:
|
|
|
|
case DT_MIPS_UNREFEXTNO:
|
|
|
|
break;
|
2012-07-31 21:07:22 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_MIPS_SYMTABNO:
|
|
|
|
mips_symtabno = d->d_un.d_val;
|
|
|
|
break;
|
2012-07-31 21:07:22 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_MIPS_LOCAL_GOTNO:
|
|
|
|
mips_local_gotno = d->d_un.d_val;
|
|
|
|
break;
|
2012-07-31 21:07:22 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
case DT_MIPS_GOTSYM:
|
|
|
|
mips_gotsym = d->d_un.d_val;
|
|
|
|
break;
|
2013-10-26 02:38:02 +02:00
|
|
|
#endif
|
2014-10-15 23:59:01 +02:00
|
|
|
// Ignored: "Its use has been superseded by the DF_BIND_NOW flag"
|
|
|
|
case DT_BIND_NOW:
|
|
|
|
break;
|
|
|
|
|
|
|
|
// Ignore: bionic does not support symbol versioning...
|
2014-10-06 20:30:43 +02:00
|
|
|
case DT_VERSYM:
|
|
|
|
case DT_VERDEF:
|
|
|
|
case DT_VERDEFNUM:
|
|
|
|
break;
|
2012-07-31 21:07:22 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
default:
|
2014-09-16 23:31:06 +02:00
|
|
|
if (!relocating_linker) {
|
2014-09-30 04:14:45 +02:00
|
|
|
DL_WARN("%s: unused DT entry: type %p arg %p", name,
|
2014-09-16 23:31:06 +02:00
|
|
|
reinterpret_cast<void*>(d->d_tag), reinterpret_cast<void*>(d->d_un.d_val));
|
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
break;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
DEBUG("si->base = %p, si->strtab = %p, si->symtab = %p",
|
|
|
|
reinterpret_cast<void*>(base), strtab, symtab);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// Sanity checks.
|
|
|
|
if (relocating_linker && needed_count != 0) {
|
|
|
|
DL_ERR("linker cannot have DT_NEEDED dependencies on other libraries");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (nbucket == 0) {
|
|
|
|
DL_ERR("empty/missing DT_HASH in \"%s\" (built with --hash-style=gnu?)", name);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (strtab == 0) {
|
|
|
|
DL_ERR("empty/missing DT_STRTAB in \"%s\"", name);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (symtab == 0) {
|
|
|
|
DL_ERR("empty/missing DT_SYMTAB in \"%s\"", name);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
2014-09-06 01:42:53 +02:00
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
bool soinfo::LinkImage(const android_dlextinfo* extinfo) {
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2013-10-28 22:19:05 +01:00
|
|
|
#if !defined(__LP64__)
|
2014-09-12 18:43:13 +02:00
|
|
|
if (has_text_relocations) {
|
|
|
|
// Make segments writable to allow text relocations to work properly. We will later call
|
|
|
|
// phdr_table_protect_segments() after all of them are applied and all constructors are run.
|
|
|
|
DL_WARN("%s has text relocations. This is wasting memory and prevents "
|
|
|
|
"security hardening. Please fix.", name);
|
|
|
|
if (phdr_table_unprotect_segments(phdr, phnum, load_bias) < 0) {
|
|
|
|
DL_ERR("can't unprotect loadable segments for \"%s\": %s",
|
|
|
|
name, strerror(errno));
|
|
|
|
return false;
|
2012-08-11 06:08:42 +02:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
2013-10-28 22:19:05 +01:00
|
|
|
#endif
|
2012-08-11 06:08:42 +02:00
|
|
|
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(USE_RELA)
|
2014-09-12 18:43:13 +02:00
|
|
|
if (rela != nullptr) {
|
|
|
|
DEBUG("[ relocating %s ]", name);
|
|
|
|
if (Relocate(rela, rela_count)) {
|
|
|
|
return false;
|
2013-10-05 02:01:33 +02:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
|
|
|
if (plt_rela != nullptr) {
|
|
|
|
DEBUG("[ relocating %s plt ]", name);
|
|
|
|
if (Relocate(plt_rela, plt_rela_count)) {
|
|
|
|
return false;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
2014-09-12 00:16:03 +02:00
|
|
|
#else
|
2014-09-12 18:43:13 +02:00
|
|
|
if (rel != nullptr) {
|
|
|
|
DEBUG("[ relocating %s ]", name);
|
|
|
|
if (Relocate(rel, rel_count)) {
|
|
|
|
return false;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
|
|
|
if (plt_rel != nullptr) {
|
|
|
|
DEBUG("[ relocating %s plt ]", name);
|
|
|
|
if (Relocate(plt_rel, plt_rel_count)) {
|
|
|
|
return false;
|
2014-07-23 20:22:25 +02:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
2014-09-12 00:16:03 +02:00
|
|
|
#endif
|
2014-07-23 20:22:25 +02:00
|
|
|
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(__mips__)
|
2014-09-12 18:43:13 +02:00
|
|
|
if (!mips_relocate_got(this)) {
|
|
|
|
return false;
|
|
|
|
}
|
2012-07-31 21:07:22 +02:00
|
|
|
#endif
|
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
DEBUG("[ finished linking %s ]", name);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2013-10-28 22:19:05 +01:00
|
|
|
#if !defined(__LP64__)
|
2014-09-12 18:43:13 +02:00
|
|
|
if (has_text_relocations) {
|
|
|
|
// All relocations are done, we can protect our segments back to read-only.
|
|
|
|
if (phdr_table_protect_segments(phdr, phnum, load_bias) < 0) {
|
|
|
|
DL_ERR("can't protect segments for \"%s\": %s",
|
|
|
|
name, strerror(errno));
|
|
|
|
return false;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
2013-10-28 22:19:05 +01:00
|
|
|
#endif
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
/* We can also turn on GNU RELRO protection */
|
|
|
|
if (phdr_table_protect_gnu_relro(phdr, phnum, load_bias) < 0) {
|
|
|
|
DL_ERR("can't enable GNU RELRO protection for \"%s\": %s",
|
|
|
|
name, strerror(errno));
|
|
|
|
return false;
|
|
|
|
}
|
2012-02-28 19:40:00 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
/* Handle serializing/sharing the RELRO segment */
|
|
|
|
if (extinfo && (extinfo->flags & ANDROID_DLEXT_WRITE_RELRO)) {
|
|
|
|
if (phdr_table_serialize_gnu_relro(phdr, phnum, load_bias,
|
|
|
|
extinfo->relro_fd) < 0) {
|
|
|
|
DL_ERR("failed serializing GNU RELRO section for \"%s\": %s",
|
|
|
|
name, strerror(errno));
|
|
|
|
return false;
|
2014-02-27 14:18:00 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
} else if (extinfo && (extinfo->flags & ANDROID_DLEXT_USE_RELRO)) {
|
|
|
|
if (phdr_table_map_gnu_relro(phdr, phnum, load_bias,
|
|
|
|
extinfo->relro_fd) < 0) {
|
|
|
|
DL_ERR("failed mapping GNU RELRO section for \"%s\": %s",
|
|
|
|
name, strerror(errno));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2014-02-27 14:18:00 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
notify_gdb_of_load(this);
|
|
|
|
return true;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
|
|
|
|
2013-01-25 13:40:13 +01:00
|
|
|
/*
|
|
|
|
* This function add vdso to internal dso list.
|
|
|
|
* It helps to stack unwinding through signal handlers.
|
|
|
|
* Also, it makes bionic more like glibc.
|
|
|
|
*/
|
2014-03-25 15:53:56 +01:00
|
|
|
static void add_vdso(KernelArgumentBlock& args __unused) {
|
2013-10-26 02:38:02 +02:00
|
|
|
#if defined(AT_SYSINFO_EHDR)
|
2014-02-11 02:46:57 +01:00
|
|
|
ElfW(Ehdr)* ehdr_vdso = reinterpret_cast<ElfW(Ehdr)*>(args.getauxval(AT_SYSINFO_EHDR));
|
2014-08-29 21:02:36 +02:00
|
|
|
if (ehdr_vdso == nullptr) {
|
2014-02-11 02:46:57 +01:00
|
|
|
return;
|
|
|
|
}
|
2013-01-25 13:40:13 +01:00
|
|
|
|
2014-10-04 02:52:44 +02:00
|
|
|
soinfo* si = soinfo_alloc("[vdso]", nullptr, 0, 0);
|
2013-10-31 15:02:12 +01:00
|
|
|
|
2014-02-11 02:46:57 +01:00
|
|
|
si->phdr = reinterpret_cast<ElfW(Phdr)*>(reinterpret_cast<char*>(ehdr_vdso) + ehdr_vdso->e_phoff);
|
|
|
|
si->phnum = ehdr_vdso->e_phnum;
|
|
|
|
si->base = reinterpret_cast<ElfW(Addr)>(ehdr_vdso);
|
|
|
|
si->size = phdr_table_get_load_size(si->phdr, si->phnum);
|
|
|
|
si->load_bias = get_elf_exec_load_bias(ehdr_vdso);
|
2013-10-31 15:02:12 +01:00
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
si->PrelinkImage();
|
2014-09-02 20:47:23 +02:00
|
|
|
si->LinkImage(nullptr);
|
2013-01-25 13:40:13 +01:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2014-05-09 18:10:14 +02:00
|
|
|
/*
|
|
|
|
* This is linker soinfo for GDB. See details below.
|
|
|
|
*/
|
2014-08-22 21:25:04 +02:00
|
|
|
#if defined(__LP64__)
|
|
|
|
#define LINKER_PATH "/system/bin/linker64"
|
|
|
|
#else
|
|
|
|
#define LINKER_PATH "/system/bin/linker"
|
|
|
|
#endif
|
2014-10-04 02:52:44 +02:00
|
|
|
static soinfo linker_soinfo_for_gdb(LINKER_PATH, nullptr, 0, 0);
|
2014-05-09 18:10:14 +02:00
|
|
|
|
|
|
|
/* gdb expects the linker to be in the debug shared object list.
|
|
|
|
* Without this, gdb has trouble locating the linker's ".text"
|
|
|
|
* and ".plt" sections. Gdb could also potentially use this to
|
|
|
|
* relocate the offset of our exported 'rtld_db_dlactivity' symbol.
|
|
|
|
* Don't use soinfo_alloc(), because the linker shouldn't
|
|
|
|
* be on the soinfo list.
|
|
|
|
*/
|
|
|
|
static void init_linker_info_for_gdb(ElfW(Addr) linker_base) {
|
|
|
|
linker_soinfo_for_gdb.base = linker_base;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Set the dynamic field in the link map otherwise gdb will complain with
|
|
|
|
* the following:
|
|
|
|
* warning: .dynamic section for "/system/bin/linker" is not at the
|
|
|
|
* expected address (wrong library or version mismatch?)
|
|
|
|
*/
|
|
|
|
ElfW(Ehdr)* elf_hdr = reinterpret_cast<ElfW(Ehdr)*>(linker_base);
|
|
|
|
ElfW(Phdr)* phdr = reinterpret_cast<ElfW(Phdr)*>(linker_base + elf_hdr->e_phoff);
|
|
|
|
phdr_table_get_dynamic_section(phdr, elf_hdr->e_phnum, linker_base,
|
2014-09-16 09:22:10 +02:00
|
|
|
&linker_soinfo_for_gdb.dynamic, nullptr);
|
2014-05-09 18:10:14 +02:00
|
|
|
insert_soinfo_into_debug_map(&linker_soinfo_for_gdb);
|
|
|
|
}
|
|
|
|
|
2011-11-12 00:53:17 +01:00
|
|
|
/*
|
|
|
|
* This code is called after the linker has linked itself and
|
|
|
|
* fixed it's own GOT. It is safe to make references to externs
|
|
|
|
* and other non-local data at this point.
|
|
|
|
*/
|
2014-02-11 02:46:57 +01:00
|
|
|
static ElfW(Addr) __linker_init_post_relocation(KernelArgumentBlock& args, ElfW(Addr) linker_base) {
|
2012-03-22 15:01:53 +01:00
|
|
|
#if TIMING
|
2014-09-12 18:43:13 +02:00
|
|
|
struct timeval t0, t1;
|
|
|
|
gettimeofday(&t0, 0);
|
2012-03-22 15:01:53 +01:00
|
|
|
#endif
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// Initialize environment functions, and get to the ELF aux vectors table.
|
|
|
|
linker_env_init(args);
|
2010-12-16 19:52:02 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// If this is a setuid/setgid program, close the security hole described in
|
|
|
|
// ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:23.stdio.asc
|
|
|
|
if (get_AT_SECURE()) {
|
|
|
|
nullify_closed_stdio();
|
|
|
|
}
|
2013-04-25 22:15:24 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
debuggerd_init();
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// Get a few environment variables.
|
|
|
|
const char* LD_DEBUG = linker_env_get("LD_DEBUG");
|
|
|
|
if (LD_DEBUG != nullptr) {
|
|
|
|
g_ld_debug_verbosity = atoi(LD_DEBUG);
|
|
|
|
}
|
2010-12-16 19:52:02 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// Normally, these are cleaned by linker_env_init, but the test
|
|
|
|
// doesn't cost us anything.
|
|
|
|
const char* ldpath_env = nullptr;
|
|
|
|
const char* ldpreload_env = nullptr;
|
|
|
|
if (!get_AT_SECURE()) {
|
|
|
|
ldpath_env = linker_env_get("LD_LIBRARY_PATH");
|
|
|
|
ldpreload_env = linker_env_get("LD_PRELOAD");
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
INFO("[ android linker & debugger ]");
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-10-04 02:52:44 +02:00
|
|
|
soinfo* si = soinfo_alloc(args.argv[0], nullptr, 0, RTLD_GLOBAL);
|
2014-09-12 18:43:13 +02:00
|
|
|
if (si == nullptr) {
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
/* bootstrap the link map, the main exe always needs to be first */
|
|
|
|
si->flags |= FLAG_EXE;
|
|
|
|
link_map* map = &(si->link_map_head);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
map->l_addr = 0;
|
|
|
|
map->l_name = args.argv[0];
|
|
|
|
map->l_prev = nullptr;
|
|
|
|
map->l_next = nullptr;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
_r_debug.r_map = map;
|
|
|
|
r_debug_tail = map;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
init_linker_info_for_gdb(linker_base);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// Extract information passed from the kernel.
|
|
|
|
si->phdr = reinterpret_cast<ElfW(Phdr)*>(args.getauxval(AT_PHDR));
|
|
|
|
si->phnum = args.getauxval(AT_PHNUM);
|
|
|
|
si->entry = args.getauxval(AT_ENTRY);
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
/* Compute the value of si->base. We can't rely on the fact that
|
|
|
|
* the first entry is the PHDR because this will not be true
|
|
|
|
* for certain executables (e.g. some in the NDK unit test suite)
|
|
|
|
*/
|
|
|
|
si->base = 0;
|
|
|
|
si->size = phdr_table_get_load_size(si->phdr, si->phnum);
|
|
|
|
si->load_bias = 0;
|
|
|
|
for (size_t i = 0; i < si->phnum; ++i) {
|
|
|
|
if (si->phdr[i].p_type == PT_PHDR) {
|
|
|
|
si->load_bias = reinterpret_cast<ElfW(Addr)>(si->phdr) - si->phdr[i].p_vaddr;
|
|
|
|
si->base = reinterpret_cast<ElfW(Addr)>(si->phdr) - si->phdr[i].p_offset;
|
|
|
|
break;
|
2011-11-15 17:17:28 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
|
|
|
si->dynamic = nullptr;
|
|
|
|
si->ref_count = 1;
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
ElfW(Ehdr)* elf_hdr = reinterpret_cast<ElfW(Ehdr)*>(si->base);
|
|
|
|
if (elf_hdr->e_type != ET_DYN) {
|
|
|
|
__libc_format_fd(2, "error: only position independent executables (PIE) are supported.\n");
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
2014-05-07 19:32:39 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// Use LD_LIBRARY_PATH and LD_PRELOAD (but only if we aren't setuid/setgid).
|
|
|
|
parse_LD_LIBRARY_PATH(ldpath_env);
|
|
|
|
parse_LD_PRELOAD(ldpreload_env);
|
2009-12-31 19:09:10 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
somain = si;
|
2012-08-30 12:48:32 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
si->PrelinkImage();
|
2014-09-06 01:42:53 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
// Load ld_preloads and dependencies.
|
|
|
|
StringLinkedList needed_library_name_list;
|
|
|
|
size_t needed_libraries_count = 0;
|
|
|
|
size_t ld_preloads_count = 0;
|
|
|
|
while (g_ld_preload_names[ld_preloads_count] != nullptr) {
|
|
|
|
needed_library_name_list.push_back(g_ld_preload_names[ld_preloads_count++]);
|
|
|
|
++needed_libraries_count;
|
|
|
|
}
|
2014-09-06 01:42:53 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
for_each_dt_needed(si, [&](const char* name) {
|
|
|
|
needed_library_name_list.push_back(name);
|
|
|
|
++needed_libraries_count;
|
|
|
|
});
|
2014-09-06 01:42:53 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
const char* needed_library_names[needed_libraries_count];
|
|
|
|
soinfo* needed_library_si[needed_libraries_count];
|
2014-09-06 01:42:53 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
memset(needed_library_names, 0, sizeof(needed_library_names));
|
|
|
|
needed_library_name_list.copy_to_array(needed_library_names, needed_libraries_count);
|
2014-09-06 01:42:53 +02:00
|
|
|
|
2014-09-16 02:00:10 +02:00
|
|
|
if (needed_libraries_count > 0 && !find_libraries(needed_library_names, needed_libraries_count, needed_library_si, g_ld_preloads, ld_preloads_count, RTLD_GLOBAL, nullptr)) {
|
2014-09-12 18:43:13 +02:00
|
|
|
__libc_format_fd(2, "CANNOT LINK EXECUTABLE DEPENDENCIES: %s\n", linker_get_error_buffer());
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
2014-09-06 01:42:53 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
for (size_t i = 0; i<needed_libraries_count; ++i) {
|
|
|
|
si->add_child(needed_library_si[i]);
|
|
|
|
}
|
2014-09-06 01:42:53 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
if (!si->LinkImage(nullptr)) {
|
|
|
|
__libc_format_fd(2, "CANNOT LINK EXECUTABLE: %s\n", linker_get_error_buffer());
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
add_vdso(args);
|
2013-01-25 13:40:13 +01:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
si->CallPreInitConstructors();
|
2012-08-13 15:58:37 +02:00
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
/* After the PrelinkImage, the si->load_bias is initialized.
|
|
|
|
* For so lib, the map->l_addr will be updated in notify_gdb_of_load.
|
|
|
|
* We need to update this value for so exe here. So Unwind_Backtrace
|
|
|
|
* for some arch like x86 could work correctly within so exe.
|
|
|
|
*/
|
|
|
|
map->l_addr = si->load_bias;
|
|
|
|
si->CallConstructors();
|
2011-12-21 10:03:54 +01:00
|
|
|
|
2009-03-04 04:28:35 +01:00
|
|
|
#if TIMING
|
2014-09-12 18:43:13 +02:00
|
|
|
gettimeofday(&t1, nullptr);
|
|
|
|
PRINT("LINKER TIME: %s: %d microseconds", args.argv[0], (int) (
|
|
|
|
(((long long)t1.tv_sec * 1000000LL) + (long long)t1.tv_usec) -
|
|
|
|
(((long long)t0.tv_sec * 1000000LL) + (long long)t0.tv_usec)));
|
2009-03-04 04:28:35 +01:00
|
|
|
#endif
|
|
|
|
#if STATS
|
2014-09-12 18:43:13 +02:00
|
|
|
PRINT("RELO STATS: %s: %d abs, %d rel, %d copy, %d symbol", args.argv[0],
|
|
|
|
linker_stats.count[kRelocAbsolute],
|
|
|
|
linker_stats.count[kRelocRelative],
|
|
|
|
linker_stats.count[kRelocCopy],
|
|
|
|
linker_stats.count[kRelocSymbol]);
|
2009-03-04 04:28:35 +01:00
|
|
|
#endif
|
|
|
|
#if COUNT_PAGES
|
2014-09-12 18:43:13 +02:00
|
|
|
{
|
|
|
|
unsigned n;
|
|
|
|
unsigned i;
|
|
|
|
unsigned count = 0;
|
|
|
|
for (n = 0; n < 4096; n++) {
|
|
|
|
if (bitmask[n]) {
|
|
|
|
unsigned x = bitmask[n];
|
2013-10-10 16:19:31 +02:00
|
|
|
#if defined(__LP64__)
|
2014-09-12 18:43:13 +02:00
|
|
|
for (i = 0; i < 32; i++) {
|
2013-10-10 16:19:31 +02:00
|
|
|
#else
|
2014-09-12 18:43:13 +02:00
|
|
|
for (i = 0; i < 8; i++) {
|
2013-10-10 16:19:31 +02:00
|
|
|
#endif
|
2014-09-12 18:43:13 +02:00
|
|
|
if (x & 1) {
|
|
|
|
count++;
|
|
|
|
}
|
|
|
|
x >>= 1;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2014-09-12 18:43:13 +02:00
|
|
|
PRINT("PAGES MODIFIED: %s: %d (%dKB)", args.argv[0], count, count * 4);
|
|
|
|
}
|
2009-03-04 04:28:35 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if TIMING || STATS || COUNT_PAGES
|
2014-09-12 18:43:13 +02:00
|
|
|
fflush(stdout);
|
2009-03-04 04:28:35 +01:00
|
|
|
#endif
|
|
|
|
|
2014-09-12 18:43:13 +02:00
|
|
|
TRACE("[ Ready to execute '%s' @ %p ]", si->name, reinterpret_cast<void*>(si->entry));
|
|
|
|
return si->entry;
|
2009-03-04 04:28:35 +01:00
|
|
|
}
|
2011-11-12 00:53:17 +01:00
|
|
|
|
2012-06-18 23:38:46 +02:00
|
|
|
/* Compute the load-bias of an existing executable. This shall only
|
|
|
|
* be used to compute the load bias of an executable or shared library
|
|
|
|
* that was loaded by the kernel itself.
|
|
|
|
*
|
|
|
|
* Input:
|
|
|
|
* elf -> address of ELF header, assumed to be at the start of the file.
|
|
|
|
* Return:
|
|
|
|
* load bias, i.e. add the value of any p_vaddr in the file to get
|
|
|
|
* the corresponding address in memory.
|
|
|
|
*/
|
2014-02-11 02:46:57 +01:00
|
|
|
static ElfW(Addr) get_elf_exec_load_bias(const ElfW(Ehdr)* elf) {
|
|
|
|
ElfW(Addr) offset = elf->e_phoff;
|
2014-02-12 01:59:37 +01:00
|
|
|
const ElfW(Phdr)* phdr_table = reinterpret_cast<const ElfW(Phdr)*>(reinterpret_cast<uintptr_t>(elf) + offset);
|
2014-02-11 02:46:57 +01:00
|
|
|
const ElfW(Phdr)* phdr_end = phdr_table + elf->e_phnum;
|
2013-03-12 07:58:06 +01:00
|
|
|
|
2014-02-11 02:46:57 +01:00
|
|
|
for (const ElfW(Phdr)* phdr = phdr_table; phdr < phdr_end; phdr++) {
|
2013-03-12 07:58:06 +01:00
|
|
|
if (phdr->p_type == PT_LOAD) {
|
2014-02-11 02:46:57 +01:00
|
|
|
return reinterpret_cast<ElfW(Addr)>(elf) + phdr->p_offset - phdr->p_vaddr;
|
2012-06-18 23:38:46 +02:00
|
|
|
}
|
2013-03-12 07:58:06 +01:00
|
|
|
}
|
|
|
|
return 0;
|
2012-06-18 23:38:46 +02:00
|
|
|
}
|
|
|
|
|
2014-07-29 00:05:51 +02:00
|
|
|
extern "C" void _start();
|
|
|
|
|
2011-11-12 00:53:17 +01:00
|
|
|
/*
|
|
|
|
* This is the entry point for the linker, called from begin.S. This
|
|
|
|
* method is responsible for fixing the linker's own relocations, and
|
|
|
|
* then calling __linker_init_post_relocation().
|
|
|
|
*
|
|
|
|
* Because this method is called before the linker has fixed it's own
|
|
|
|
* relocations, any attempt to reference an extern variable, extern
|
|
|
|
* function, or other GOT reference will generate a segfault.
|
|
|
|
*/
|
2014-02-11 02:46:57 +01:00
|
|
|
extern "C" ElfW(Addr) __linker_init(void* raw_args) {
|
2013-02-07 19:14:39 +01:00
|
|
|
KernelArgumentBlock args(raw_args);
|
|
|
|
|
2014-02-11 02:46:57 +01:00
|
|
|
ElfW(Addr) linker_addr = args.getauxval(AT_BASE);
|
2014-07-29 00:05:51 +02:00
|
|
|
ElfW(Addr) entry_point = args.getauxval(AT_ENTRY);
|
2014-02-11 02:46:57 +01:00
|
|
|
ElfW(Ehdr)* elf_hdr = reinterpret_cast<ElfW(Ehdr)*>(linker_addr);
|
2014-02-12 01:59:37 +01:00
|
|
|
ElfW(Phdr)* phdr = reinterpret_cast<ElfW(Phdr)*>(linker_addr + elf_hdr->e_phoff);
|
2013-02-07 19:14:39 +01:00
|
|
|
|
2014-10-04 02:52:44 +02:00
|
|
|
soinfo linker_so("[dynamic linker]", nullptr, 0, 0);
|
2013-02-07 19:14:39 +01:00
|
|
|
|
2014-07-29 00:05:51 +02:00
|
|
|
// If the linker is not acting as PT_INTERP entry_point is equal to
|
|
|
|
// _start. Which means that the linker is running as an executable and
|
|
|
|
// already linked by PT_INTERP.
|
|
|
|
//
|
|
|
|
// This happens when user tries to run 'adb shell /system/bin/linker'
|
|
|
|
// see also https://code.google.com/p/android/issues/detail?id=63174
|
|
|
|
if (reinterpret_cast<ElfW(Addr)>(&_start) == entry_point) {
|
|
|
|
__libc_fatal("This is %s, the helper program for shared library executables.\n", args.argv[0]);
|
|
|
|
}
|
|
|
|
|
2013-02-07 19:14:39 +01:00
|
|
|
linker_so.base = linker_addr;
|
|
|
|
linker_so.size = phdr_table_get_load_size(phdr, elf_hdr->e_phnum);
|
|
|
|
linker_so.load_bias = get_elf_exec_load_bias(elf_hdr);
|
2014-08-29 21:02:36 +02:00
|
|
|
linker_so.dynamic = nullptr;
|
2013-02-07 19:14:39 +01:00
|
|
|
linker_so.phdr = phdr;
|
|
|
|
linker_so.phnum = elf_hdr->e_phnum;
|
|
|
|
linker_so.flags |= FLAG_LINKER;
|
|
|
|
|
2014-09-06 01:42:53 +02:00
|
|
|
if (!(linker_so.PrelinkImage() && linker_so.LinkImage(nullptr))) {
|
2013-02-07 19:14:39 +01:00
|
|
|
// It would be nice to print an error message, but if the linker
|
|
|
|
// can't link itself, there's no guarantee that we'll be able to
|
2013-12-22 01:07:45 +01:00
|
|
|
// call write() (because it involves a GOT reference). We may as
|
|
|
|
// well try though...
|
|
|
|
const char* msg = "CANNOT LINK EXECUTABLE: ";
|
|
|
|
write(2, msg, strlen(msg));
|
|
|
|
write(2, __linker_dl_err_buf, strlen(__linker_dl_err_buf));
|
|
|
|
write(2, "\n", 1);
|
|
|
|
_exit(EXIT_FAILURE);
|
2013-02-07 19:14:39 +01:00
|
|
|
}
|
2011-11-12 00:53:17 +01:00
|
|
|
|
2014-08-26 23:16:52 +02:00
|
|
|
__libc_init_tls(args);
|
|
|
|
|
2014-07-29 00:05:51 +02:00
|
|
|
// Initialize the linker's own global variables
|
2014-07-25 00:33:25 +02:00
|
|
|
linker_so.CallConstructors();
|
|
|
|
|
2014-08-22 21:25:04 +02:00
|
|
|
// Initialize static variables. Note that in order to
|
|
|
|
// get correct libdl_info we need to call constructors
|
|
|
|
// before get_libdl_info().
|
|
|
|
solist = get_libdl_info();
|
|
|
|
sonext = get_libdl_info();
|
|
|
|
|
2013-02-07 19:14:39 +01:00
|
|
|
// We have successfully fixed our own relocations. It's safe to run
|
|
|
|
// the main part of the linker now.
|
2014-05-14 19:02:03 +02:00
|
|
|
args.abort_message_ptr = &g_abort_message;
|
2014-02-11 02:46:57 +01:00
|
|
|
ElfW(Addr) start_address = __linker_init_post_relocation(args, linker_addr);
|
2012-10-17 00:54:46 +02:00
|
|
|
|
2014-05-09 18:10:14 +02:00
|
|
|
protect_data(PROT_READ);
|
2012-11-01 23:16:56 +01:00
|
|
|
|
2013-02-07 19:14:39 +01:00
|
|
|
// Return the address that the calling assembly stub should jump to.
|
|
|
|
return start_address;
|
2011-11-12 00:53:17 +01:00
|
|
|
}
|