1 /*
2 * Copyright (C) 2016 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
29 #pragma once
30
31 #include <link.h>
32
33 #include <memory>
34 #include <string>
35 #include <vector>
36
37 #include "private/bionic_elf_tls.h"
38 #include "linker_namespaces.h"
39 #include "linker_tls.h"
40
41 #define FLAG_LINKED 0x00000001
42 #define FLAG_EXE 0x00000004 // The main executable
43 #define FLAG_LINKER 0x00000010 // The linker itself
44 #define FLAG_GNU_HASH 0x00000040 // uses gnu hash
45 #define FLAG_MAPPED_BY_CALLER 0x00000080 // the map is reserved by the caller
46 // and should not be unmapped
47 #define FLAG_IMAGE_LINKED 0x00000100 // Is image linked - this is a guard on link_image.
48 // The difference between this flag and
49 // FLAG_LINKED is that FLAG_LINKED
50 // means is set when load_group is
51 // successfully loaded whereas this
52 // flag is set to avoid linking image
53 // when link_image called for the
54 // second time. This situation happens
55 // when load group is crossing
56 // namespace boundary twice and second
57 // local group depends on the same libraries.
58 #define FLAG_RESERVED 0x00000200 // This flag was set when there is at least one
59 // outstanding thread_local dtor
60 // registered with this soinfo. In such
61 // a case the actual unload is
62 // postponed until the last thread_local
63 // destructor associated with this
64 // soinfo is executed and this flag is
65 // unset.
66 #define FLAG_PRELINKED 0x00000400 // prelink_image has successfully processed this soinfo
67 #define FLAG_NEW_SOINFO 0x40000000 // new soinfo format
68
69 #define SOINFO_VERSION 5
70
71 ElfW(Addr) call_ifunc_resolver(ElfW(Addr) resolver_addr);
72
73 typedef void (*linker_dtor_function_t)();
74 typedef void (*linker_ctor_function_t)(int, char**, char**);
75
76 // An entry within a SymbolLookupList.
77 struct SymbolLookupLib {
78 uint32_t gnu_maskwords_ = 0;
79 uint32_t gnu_shift2_ = 0;
80 ElfW(Addr)* gnu_bloom_filter_ = nullptr;
81
82 const char* strtab_;
83 size_t strtab_size_;
84 const ElfW(Sym)* symtab_;
85 const ElfW(Versym)* versym_;
86
87 const uint32_t* gnu_chain_;
88 size_t gnu_nbucket_;
89 uint32_t* gnu_bucket_;
90
91 soinfo* si_ = nullptr;
92
needs_sysv_lookupSymbolLookupLib93 bool needs_sysv_lookup() const { return si_ != nullptr && gnu_bloom_filter_ == nullptr; }
94 };
95
96 // A list of libraries to search for a symbol.
97 class SymbolLookupList {
98 std::vector<SymbolLookupLib> libs_;
99 SymbolLookupLib sole_lib_;
100 const SymbolLookupLib* begin_;
101 const SymbolLookupLib* end_;
102 size_t slow_path_count_ = 0;
103
104 public:
105 explicit SymbolLookupList(soinfo* si);
106 SymbolLookupList(const soinfo_list_t& global_group, const soinfo_list_t& local_group);
107 void set_dt_symbolic_lib(soinfo* symbolic_lib);
108
begin()109 const SymbolLookupLib* begin() const { return begin_; }
end()110 const SymbolLookupLib* end() const { return end_; }
needs_slow_path()111 bool needs_slow_path() const { return slow_path_count_ > 0; }
112 };
113
114 class SymbolName {
115 public:
SymbolName(const char * name)116 explicit SymbolName(const char* name)
117 : name_(name), has_elf_hash_(false), has_gnu_hash_(false),
118 elf_hash_(0), gnu_hash_(0) { }
119
get_name()120 const char* get_name() {
121 return name_;
122 }
123
124 uint32_t elf_hash();
125 uint32_t gnu_hash();
126
127 private:
128 const char* name_;
129 bool has_elf_hash_;
130 bool has_gnu_hash_;
131 uint32_t elf_hash_;
132 uint32_t gnu_hash_;
133
134 DISALLOW_IMPLICIT_CONSTRUCTORS(SymbolName);
135 };
136
137 struct version_info {
version_infoversion_info138 constexpr version_info() : elf_hash(0), name(nullptr), target_si(nullptr) {}
139
140 uint32_t elf_hash;
141 const char* name;
142 const soinfo* target_si;
143 };
144
145 // TODO(dimitry): remove reference from soinfo member functions to this class.
146 class VersionTracker;
147
148 struct soinfo_tls {
149 TlsSegment segment;
150 size_t module_id = kTlsUninitializedModuleId;
151 };
152
153 #if defined(__work_around_b_24465209__)
154 #define SOINFO_NAME_LEN 128
155 #endif
156
157 struct soinfo {
158 #if defined(__work_around_b_24465209__)
159 private:
160 char old_name_[SOINFO_NAME_LEN];
161 #endif
162 public:
163 const ElfW(Phdr)* phdr;
164 size_t phnum;
165 #if defined(__work_around_b_24465209__)
166 ElfW(Addr) unused0; // DO NOT USE, maintained for compatibility.
167 #endif
168 ElfW(Addr) base;
169 size_t size;
170
171 #if defined(__work_around_b_24465209__)
172 uint32_t unused1; // DO NOT USE, maintained for compatibility.
173 #endif
174
175 ElfW(Dyn)* dynamic;
176
177 #if defined(__work_around_b_24465209__)
178 uint32_t unused2; // DO NOT USE, maintained for compatibility
179 uint32_t unused3; // DO NOT USE, maintained for compatibility
180 #endif
181
182 soinfo* next;
183 private:
184 uint32_t flags_;
185
186 const char* strtab_;
187 ElfW(Sym)* symtab_;
188
189 size_t nbucket_;
190 size_t nchain_;
191 uint32_t* bucket_;
192 uint32_t* chain_;
193
194 #if !defined(__LP64__)
195 ElfW(Addr)** unused4; // DO NOT USE, maintained for compatibility
196 #endif
197
198 #if defined(USE_RELA)
199 ElfW(Rela)* plt_rela_;
200 size_t plt_rela_count_;
201
202 ElfW(Rela)* rela_;
203 size_t rela_count_;
204 #else
205 ElfW(Rel)* plt_rel_;
206 size_t plt_rel_count_;
207
208 ElfW(Rel)* rel_;
209 size_t rel_count_;
210 #endif
211
212 linker_ctor_function_t* preinit_array_;
213 size_t preinit_array_count_;
214
215 linker_ctor_function_t* init_array_;
216 size_t init_array_count_;
217 linker_dtor_function_t* fini_array_;
218 size_t fini_array_count_;
219
220 linker_ctor_function_t init_func_;
221 linker_dtor_function_t fini_func_;
222
223 #if defined(__arm__)
224 public:
225 // ARM EABI section used for stack unwinding.
226 uint32_t* ARM_exidx;
227 size_t ARM_exidx_count;
228 private:
229 #endif
230 size_t ref_count_;
231 public:
232 link_map link_map_head;
233
234 bool constructors_called;
235
236 // When you read a virtual address from the ELF file, add this
237 // value to get the corresponding address in the process' address space.
238 ElfW(Addr) load_bias;
239
240 #if !defined(__LP64__)
241 bool has_text_relocations;
242 #endif
243 bool has_DT_SYMBOLIC;
244
245 public:
246 soinfo(android_namespace_t* ns, const char* name, const struct stat* file_stat,
247 off64_t file_offset, int rtld_flags);
248 ~soinfo();
249
250 void call_constructors();
251 void call_destructors();
252 void call_pre_init_constructors();
253 bool prelink_image();
254 bool link_image(const SymbolLookupList& lookup_list, soinfo* local_group_root,
255 const android_dlextinfo* extinfo, size_t* relro_fd_offset);
256 bool protect_relro();
257
258 void add_child(soinfo* child);
259 void remove_all_links();
260
261 ino_t get_st_ino() const;
262 dev_t get_st_dev() const;
263 off64_t get_file_offset() const;
264
265 uint32_t get_rtld_flags() const;
266 uint32_t get_dt_flags_1() const;
267 void set_dt_flags_1(uint32_t dt_flags_1);
268
269 soinfo_list_t& get_children();
270 const soinfo_list_t& get_children() const;
271
272 soinfo_list_t& get_parents();
273
274 const ElfW(Sym)* find_symbol_by_name(SymbolName& symbol_name, const version_info* vi) const;
275
276 ElfW(Sym)* find_symbol_by_address(const void* addr);
277
resolve_symbol_addresssoinfo278 ElfW(Addr) resolve_symbol_address(const ElfW(Sym)* s) const {
279 if (ELF_ST_TYPE(s->st_info) == STT_GNU_IFUNC) {
280 return call_ifunc_resolver(s->st_value + load_bias);
281 }
282
283 return static_cast<ElfW(Addr)>(s->st_value + load_bias);
284 }
285
286 const char* get_string(ElfW(Word) index) const;
287 bool can_unload() const;
288 bool is_gnu_hash() const;
289
has_min_versionsoinfo290 bool inline has_min_version(uint32_t min_version __unused) const {
291 #if defined(__work_around_b_24465209__)
292 return (flags_ & FLAG_NEW_SOINFO) != 0 && version_ >= min_version;
293 #else
294 return true;
295 #endif
296 }
297
ElfWsoinfo298 const ElfW(Versym)* get_versym_table() const {
299 return has_min_version(2) ? versym_ : nullptr;
300 }
301
302 bool is_linked() const;
303 bool is_linker() const;
304 bool is_main_executable() const;
305
306 void set_linked();
307 void set_linker_flag();
308 void set_main_executable();
309 void set_nodelete();
310
311 size_t increment_ref_count();
312 size_t decrement_ref_count();
313 size_t get_ref_count() const;
314
315 soinfo* get_local_group_root() const;
316
317 void set_soname(const char* soname);
318 const char* get_soname() const;
319 void set_realpath(const char* path);
320 const char* get_realpath() const;
321 const ElfW(Versym)* get_versym(size_t n) const;
322 ElfW(Addr) get_verneed_ptr() const;
323 size_t get_verneed_cnt() const;
324 ElfW(Addr) get_verdef_ptr() const;
325 size_t get_verdef_cnt() const;
326
327 int get_target_sdk_version() const;
328
329 void set_dt_runpath(const char *);
330 const std::vector<std::string>& get_dt_runpath() const;
331 android_namespace_t* get_primary_namespace();
332 void add_secondary_namespace(android_namespace_t* secondary_ns);
333 android_namespace_list_t& get_secondary_namespaces();
334
get_tlssoinfo335 soinfo_tls* get_tls() const {
336 return has_min_version(5) ? tls_.get() : nullptr;
337 }
338
339 void set_mapped_by_caller(bool reserved_map);
340 bool is_mapped_by_caller() const;
341
342 uintptr_t get_handle() const;
343 void generate_handle();
344 void* to_handle();
345
346 SymbolLookupLib get_lookup_lib();
347
348 private:
349 bool is_image_linked() const;
350 void set_image_linked();
351
352 const ElfW(Sym)* gnu_lookup(SymbolName& symbol_name, const version_info* vi) const;
353 const ElfW(Sym)* elf_lookup(SymbolName& symbol_name, const version_info* vi) const;
354 ElfW(Sym)* gnu_addr_lookup(const void* addr);
355 ElfW(Sym)* elf_addr_lookup(const void* addr);
356
357 public:
358 bool lookup_version_info(const VersionTracker& version_tracker, ElfW(Word) sym,
359 const char* sym_name, const version_info** vi);
360
361 private:
362 bool relocate(const SymbolLookupList& lookup_list);
363 bool relocate_relr();
364 void apply_relr_reloc(ElfW(Addr) offset);
365
366 // This part of the structure is only available
367 // when FLAG_NEW_SOINFO is set in this->flags.
368 uint32_t version_;
369
370 // version >= 0
371 dev_t st_dev_;
372 ino_t st_ino_;
373
374 // dependency graph
375 soinfo_list_t children_;
376 soinfo_list_t parents_;
377
378 // version >= 1
379 off64_t file_offset_;
380 uint32_t rtld_flags_;
381 uint32_t dt_flags_1_;
382 size_t strtab_size_;
383
384 // version >= 2
385
386 size_t gnu_nbucket_;
387 uint32_t* gnu_bucket_;
388 uint32_t* gnu_chain_;
389 uint32_t gnu_maskwords_;
390 uint32_t gnu_shift2_;
391 ElfW(Addr)* gnu_bloom_filter_;
392
393 soinfo* local_group_root_;
394
395 uint8_t* android_relocs_;
396 size_t android_relocs_size_;
397
398 const char* soname_;
399 std::string realpath_;
400
401 const ElfW(Versym)* versym_;
402
403 ElfW(Addr) verdef_ptr_;
404 size_t verdef_cnt_;
405
406 ElfW(Addr) verneed_ptr_;
407 size_t verneed_cnt_;
408
409 int target_sdk_version_;
410
411 // version >= 3
412 std::vector<std::string> dt_runpath_;
413 android_namespace_t* primary_namespace_;
414 android_namespace_list_t secondary_namespaces_;
415 uintptr_t handle_;
416
417 friend soinfo* get_libdl_info(const soinfo& linker_si);
418
419 // version >= 4
420 ElfW(Relr)* relr_;
421 size_t relr_count_;
422
423 // version >= 5
424 std::unique_ptr<soinfo_tls> tls_;
425 std::vector<TlsDynamicResolverArg> tlsdesc_args_;
426 };
427
428 // This function is used by dlvsym() to calculate hash of sym_ver
429 uint32_t calculate_elf_hash(const char* name);
430
431 const char* fix_dt_needed(const char* dt_needed, const char* sopath);
432
433 template<typename F>
for_each_dt_needed(const soinfo * si,F action)434 void for_each_dt_needed(const soinfo* si, F action) {
435 for (const ElfW(Dyn)* d = si->dynamic; d->d_tag != DT_NULL; ++d) {
436 if (d->d_tag == DT_NEEDED) {
437 action(fix_dt_needed(si->get_string(d->d_un.d_val), si->get_realpath()));
438 }
439 }
440 }
441
442 const ElfW(Sym)* soinfo_do_lookup(const char* name, const version_info* vi,
443 soinfo** si_found_in, const SymbolLookupList& lookup_list);
444