1 /* On-demand PLT fixup for shared objects.
2 Copyright (C) 1995-2018 Free Software Foundation, Inc.
3 This file is part of the GNU C Library.
5 The GNU C Library is free software; you can redistribute it and/or
6 modify it under the terms of the GNU Lesser General Public
7 License as published by the Free Software Foundation; either
8 version 2.1 of the License, or (at your option) any later version.
10 The GNU C Library is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Lesser General Public License for more details.
15 You should have received a copy of the GNU Lesser General Public
16 License along with the GNU C Library; if not, see
17 <http://www.gnu.org/licenses/>. */
19 #define IN_DL_RUNTIME 1 /* This can be tested in dl-machine.h. */
24 #include <sys/param.h>
26 #include <sysdep-cancel.h>
27 #include "dynamic-link.h"
32 #if (!ELF_MACHINE_NO_RELA && !defined ELF_MACHINE_PLT_REL) \
34 # define PLTREL ElfW(Rela)
36 # define PLTREL ElfW(Rel)
39 /* The fixup functions might have need special attributes. If none
40 are provided define the macro as empty. */
41 #ifndef ARCH_FIXUP_ATTRIBUTE
42 # define ARCH_FIXUP_ATTRIBUTE
46 # define reloc_offset reloc_arg
47 # define reloc_index reloc_arg / sizeof (PLTREL)
52 /* This function is called through a special trampoline from the PLT the
53 first time each PLT entry is called. We must perform the relocation
54 specified in the PLT of the given shared object, and return the resolved
55 function address to the trampoline, which will restart the original call
56 to that address. Future calls will bounce directly from the PLT to the
60 attribute_hidden
__attribute ((noinline
)) ARCH_FIXUP_ATTRIBUTE
62 # ifdef ELF_MACHINE_RUNTIME_FIXUP_ARGS
63 ELF_MACHINE_RUNTIME_FIXUP_ARGS
,
65 struct link_map
*l
, ElfW(Word
) reloc_arg
)
67 const ElfW(Sym
) *const symtab
68 = (const void *) D_PTR (l
, l_info
[DT_SYMTAB
]);
69 const char *strtab
= (const void *) D_PTR (l
, l_info
[DT_STRTAB
]);
71 const PLTREL
*const reloc
72 = (const void *) (D_PTR (l
, l_info
[DT_JMPREL
]) + reloc_offset
);
73 const ElfW(Sym
) *sym
= &symtab
[ELFW(R_SYM
) (reloc
->r_info
)];
74 const ElfW(Sym
) *refsym
= sym
;
75 void *const rel_addr
= (void *)(l
->l_addr
+ reloc
->r_offset
);
77 DL_FIXUP_VALUE_TYPE value
;
79 /* Sanity check that we're really looking at a PLT relocation. */
80 assert (ELFW(R_TYPE
)(reloc
->r_info
) == ELF_MACHINE_JMP_SLOT
);
82 /* Look up the target symbol. If the normal lookup rules are not
83 used don't look in the global scope. */
84 if (__builtin_expect (ELFW(ST_VISIBILITY
) (sym
->st_other
), 0) == 0)
86 const struct r_found_version
*version
= NULL
;
88 if (l
->l_info
[VERSYMIDX (DT_VERSYM
)] != NULL
)
90 const ElfW(Half
) *vernum
=
91 (const void *) D_PTR (l
, l_info
[VERSYMIDX (DT_VERSYM
)]);
92 ElfW(Half
) ndx
= vernum
[ELFW(R_SYM
) (reloc
->r_info
)] & 0x7fff;
93 version
= &l
->l_versions
[ndx
];
94 if (version
->hash
== 0)
98 /* We need to keep the scope around so do some locking. This is
99 not necessary for objects which cannot be unloaded or when
100 we are not using any threads (yet). */
101 int flags
= DL_LOOKUP_ADD_DEPENDENCY
;
102 if (!RTLD_SINGLE_THREAD_P
)
104 THREAD_GSCOPE_SET_FLAG ();
105 flags
|= DL_LOOKUP_GSCOPE_LOCK
;
108 #ifdef RTLD_ENABLE_FOREIGN_CALL
109 RTLD_ENABLE_FOREIGN_CALL
;
112 result
= _dl_lookup_symbol_x (strtab
+ sym
->st_name
, l
, &sym
, l
->l_scope
,
113 version
, ELF_RTYPE_CLASS_PLT
, flags
, NULL
);
115 /* We are done with the global scope. */
116 if (!RTLD_SINGLE_THREAD_P
)
117 THREAD_GSCOPE_RESET_FLAG ();
119 #ifdef RTLD_FINALIZE_FOREIGN_CALL
120 RTLD_FINALIZE_FOREIGN_CALL
;
123 /* Currently result contains the base load address (or link map)
124 of the object that defines sym. Now add in the symbol
126 value
= DL_FIXUP_MAKE_VALUE (result
,
127 sym
? (LOOKUP_VALUE_ADDRESS (result
)
128 + sym
->st_value
) : 0);
132 /* We already found the symbol. The module (and therefore its load
133 address) is also known. */
134 value
= DL_FIXUP_MAKE_VALUE (l
, l
->l_addr
+ sym
->st_value
);
138 /* And now perhaps the relocation addend. */
139 value
= elf_machine_plt_value (l
, reloc
, value
);
142 && __builtin_expect (ELFW(ST_TYPE
) (sym
->st_info
) == STT_GNU_IFUNC
, 0))
143 value
= elf_ifunc_invoke (DL_FIXUP_VALUE_ADDR (value
));
145 /* Finally, fix up the plt itself. */
146 if (__glibc_unlikely (GLRO(dl_bind_not
)))
149 return elf_machine_fixup_plt (l
, result
, refsym
, sym
, reloc
, rel_addr
, value
);
154 __attribute ((noinline
)) ARCH_FIXUP_ATTRIBUTE
156 #ifdef ELF_MACHINE_RUNTIME_FIXUP_ARGS
157 ELF_MACHINE_RUNTIME_FIXUP_ARGS
,
159 struct link_map
*l
, ElfW(Word
) reloc_arg
,
160 ElfW(Addr
) retaddr
, void *regs
, long int *framesizep
)
162 void (*mcount_fct
) (ElfW(Addr
), ElfW(Addr
)) = _dl_mcount
;
164 if (l
->l_reloc_result
== NULL
)
166 /* BZ #14843: ELF_DYNAMIC_RELOCATE is called before l_reloc_result
167 is allocated. We will get here if ELF_DYNAMIC_RELOCATE calls a
168 resolver function to resolve an IRELATIVE relocation and that
169 resolver calls a function that is not yet resolved (lazy). For
170 example, the resolver in x86-64 libm.so calls __get_cpu_features
171 defined in libc.so. Skip audit and resolve the external function
175 # ifdef ELF_MACHINE_RUNTIME_FIXUP_ARGS
176 # ifndef ELF_MACHINE_RUNTIME_FIXUP_PARAMS
177 # error Please define ELF_MACHINE_RUNTIME_FIXUP_PARAMS.
179 ELF_MACHINE_RUNTIME_FIXUP_PARAMS
,
184 /* This is the address in the array where we store the result of previous
186 struct reloc_result
*reloc_result
= &l
->l_reloc_result
[reloc_index
];
187 DL_FIXUP_VALUE_TYPE
*resultp
= &reloc_result
->addr
;
189 DL_FIXUP_VALUE_TYPE value
= *resultp
;
190 if (DL_FIXUP_VALUE_CODE_ADDR (value
) == 0)
192 /* This is the first time we have to relocate this object. */
193 const ElfW(Sym
) *const symtab
194 = (const void *) D_PTR (l
, l_info
[DT_SYMTAB
]);
195 const char *strtab
= (const char *) D_PTR (l
, l_info
[DT_STRTAB
]);
197 const PLTREL
*const reloc
198 = (const void *) (D_PTR (l
, l_info
[DT_JMPREL
]) + reloc_offset
);
199 const ElfW(Sym
) *refsym
= &symtab
[ELFW(R_SYM
) (reloc
->r_info
)];
200 const ElfW(Sym
) *defsym
= refsym
;
203 /* Sanity check that we're really looking at a PLT relocation. */
204 assert (ELFW(R_TYPE
)(reloc
->r_info
) == ELF_MACHINE_JMP_SLOT
);
206 /* Look up the target symbol. If the symbol is marked STV_PROTECTED
207 don't look in the global scope. */
208 if (__builtin_expect (ELFW(ST_VISIBILITY
) (refsym
->st_other
), 0) == 0)
210 const struct r_found_version
*version
= NULL
;
212 if (l
->l_info
[VERSYMIDX (DT_VERSYM
)] != NULL
)
214 const ElfW(Half
) *vernum
=
215 (const void *) D_PTR (l
, l_info
[VERSYMIDX (DT_VERSYM
)]);
216 ElfW(Half
) ndx
= vernum
[ELFW(R_SYM
) (reloc
->r_info
)] & 0x7fff;
217 version
= &l
->l_versions
[ndx
];
218 if (version
->hash
== 0)
222 /* We need to keep the scope around so do some locking. This is
223 not necessary for objects which cannot be unloaded or when
224 we are not using any threads (yet). */
225 int flags
= DL_LOOKUP_ADD_DEPENDENCY
;
226 if (!RTLD_SINGLE_THREAD_P
)
228 THREAD_GSCOPE_SET_FLAG ();
229 flags
|= DL_LOOKUP_GSCOPE_LOCK
;
232 result
= _dl_lookup_symbol_x (strtab
+ refsym
->st_name
, l
,
233 &defsym
, l
->l_scope
, version
,
234 ELF_RTYPE_CLASS_PLT
, flags
, NULL
);
236 /* We are done with the global scope. */
237 if (!RTLD_SINGLE_THREAD_P
)
238 THREAD_GSCOPE_RESET_FLAG ();
240 /* Currently result contains the base load address (or link map)
241 of the object that defines sym. Now add in the symbol
243 value
= DL_FIXUP_MAKE_VALUE (result
,
245 ? LOOKUP_VALUE_ADDRESS (result
)
246 + defsym
->st_value
: 0);
249 && __builtin_expect (ELFW(ST_TYPE
) (defsym
->st_info
)
250 == STT_GNU_IFUNC
, 0))
251 value
= elf_ifunc_invoke (DL_FIXUP_VALUE_ADDR (value
));
255 /* We already found the symbol. The module (and therefore its load
256 address) is also known. */
257 value
= DL_FIXUP_MAKE_VALUE (l
, l
->l_addr
+ refsym
->st_value
);
259 if (__builtin_expect (ELFW(ST_TYPE
) (refsym
->st_info
)
260 == STT_GNU_IFUNC
, 0))
261 value
= elf_ifunc_invoke (DL_FIXUP_VALUE_ADDR (value
));
265 /* And now perhaps the relocation addend. */
266 value
= elf_machine_plt_value (l
, reloc
, value
);
269 /* Auditing checkpoint: we have a new binding. Provide the
270 auditing libraries the possibility to change the value and
271 tell us whether further auditing is wanted. */
272 if (defsym
!= NULL
&& GLRO(dl_naudit
) > 0)
274 reloc_result
->bound
= result
;
275 /* Compute index of the symbol entry in the symbol table of
276 the DSO with the definition. */
277 reloc_result
->boundndx
= (defsym
278 - (ElfW(Sym
) *) D_PTR (result
,
281 /* Determine whether any of the two participating DSOs is
282 interested in auditing. */
283 if ((l
->l_audit_any_plt
| result
->l_audit_any_plt
) != 0)
285 unsigned int flags
= 0;
286 struct audit_ifaces
*afct
= GLRO(dl_audit
);
287 /* Synthesize a symbol record where the st_value field is
289 ElfW(Sym
) sym
= *defsym
;
290 sym
.st_value
= DL_FIXUP_VALUE_ADDR (value
);
292 /* Keep track whether there is any interest in tracing
293 the call in the lower two bits. */
294 assert (DL_NNS
* 2 <= sizeof (reloc_result
->flags
) * 8);
295 assert ((LA_SYMB_NOPLTENTER
| LA_SYMB_NOPLTEXIT
) == 3);
296 reloc_result
->enterexit
= LA_SYMB_NOPLTENTER
| LA_SYMB_NOPLTEXIT
;
298 const char *strtab2
= (const void *) D_PTR (result
,
301 for (unsigned int cnt
= 0; cnt
< GLRO(dl_naudit
); ++cnt
)
303 /* XXX Check whether both DSOs must request action or
305 if ((l
->l_audit
[cnt
].bindflags
& LA_FLG_BINDFROM
) != 0
306 && (result
->l_audit
[cnt
].bindflags
& LA_FLG_BINDTO
) != 0)
308 if (afct
->symbind
!= NULL
)
311 = afct
->symbind (&sym
, reloc_result
->boundndx
,
312 &l
->l_audit
[cnt
].cookie
,
313 &result
->l_audit
[cnt
].cookie
,
315 strtab2
+ defsym
->st_name
);
316 if (new_value
!= (uintptr_t) sym
.st_value
)
318 flags
|= LA_SYMB_ALTVALUE
;
319 sym
.st_value
= new_value
;
323 /* Remember the results for every audit library and
324 store a summary in the first two bits. */
325 reloc_result
->enterexit
326 &= flags
& (LA_SYMB_NOPLTENTER
| LA_SYMB_NOPLTEXIT
);
327 reloc_result
->enterexit
328 |= ((flags
& (LA_SYMB_NOPLTENTER
| LA_SYMB_NOPLTEXIT
))
332 /* If the bind flags say this auditor is not interested,
333 set the bits manually. */
334 reloc_result
->enterexit
335 |= ((LA_SYMB_NOPLTENTER
| LA_SYMB_NOPLTEXIT
)
341 reloc_result
->flags
= flags
;
342 value
= DL_FIXUP_ADDR_VALUE (sym
.st_value
);
345 /* Set all bits since this symbol binding is not interesting. */
346 reloc_result
->enterexit
= (1u << DL_NNS
) - 1;
350 /* Store the result for later runs. */
351 if (__glibc_likely (! GLRO(dl_bind_not
)))
355 /* By default we do not call the pltexit function. */
356 long int framesize
= -1;
359 /* Auditing checkpoint: report the PLT entering and allow the
360 auditors to change the value. */
361 if (DL_FIXUP_VALUE_CODE_ADDR (value
) != 0 && GLRO(dl_naudit
) > 0
362 /* Don't do anything if no auditor wants to intercept this call. */
363 && (reloc_result
->enterexit
& LA_SYMB_NOPLTENTER
) == 0)
365 ElfW(Sym
) *defsym
= ((ElfW(Sym
) *) D_PTR (reloc_result
->bound
,
367 + reloc_result
->boundndx
);
369 /* Set up the sym parameter. */
370 ElfW(Sym
) sym
= *defsym
;
371 sym
.st_value
= DL_FIXUP_VALUE_ADDR (value
);
373 /* Get the symbol name. */
374 const char *strtab
= (const void *) D_PTR (reloc_result
->bound
,
376 const char *symname
= strtab
+ sym
.st_name
;
378 /* Keep track of overwritten addresses. */
379 unsigned int flags
= reloc_result
->flags
;
381 struct audit_ifaces
*afct
= GLRO(dl_audit
);
382 for (unsigned int cnt
= 0; cnt
< GLRO(dl_naudit
); ++cnt
)
384 if (afct
->ARCH_LA_PLTENTER
!= NULL
385 && (reloc_result
->enterexit
386 & (LA_SYMB_NOPLTENTER
<< (2 * (cnt
+ 1)))) == 0)
388 long int new_framesize
= -1;
390 = afct
->ARCH_LA_PLTENTER (&sym
, reloc_result
->boundndx
,
391 &l
->l_audit
[cnt
].cookie
,
392 &reloc_result
->bound
->l_audit
[cnt
].cookie
,
393 regs
, &flags
, symname
,
395 if (new_value
!= (uintptr_t) sym
.st_value
)
397 flags
|= LA_SYMB_ALTVALUE
;
398 sym
.st_value
= new_value
;
401 /* Remember the results for every audit library and
402 store a summary in the first two bits. */
403 reloc_result
->enterexit
404 |= ((flags
& (LA_SYMB_NOPLTENTER
| LA_SYMB_NOPLTEXIT
))
407 if ((reloc_result
->enterexit
& (LA_SYMB_NOPLTEXIT
409 == 0 && new_framesize
!= -1 && framesize
!= -2)
411 /* If this is the first call providing information,
414 framesize
= new_framesize
;
415 /* If two pltenter calls provide conflicting information,
416 use the larger value. */
417 else if (new_framesize
!= framesize
)
418 framesize
= MAX (new_framesize
, framesize
);
425 value
= DL_FIXUP_ADDR_VALUE (sym
.st_value
);
429 /* Store the frame size information. */
430 *framesizep
= framesize
;
432 (*mcount_fct
) (retaddr
, DL_FIXUP_VALUE_CODE_ADDR (value
));
443 _dl_call_pltexit (struct link_map
*l
, ElfW(Word
) reloc_arg
,
444 const void *inregs
, void *outregs
)
447 /* This is the address in the array where we store the result of previous
449 // XXX Maybe the bound information must be stored on the stack since
450 // XXX with bind_not a new value could have been stored in the meantime.
451 struct reloc_result
*reloc_result
= &l
->l_reloc_result
[reloc_index
];
452 ElfW(Sym
) *defsym
= ((ElfW(Sym
) *) D_PTR (reloc_result
->bound
,
454 + reloc_result
->boundndx
);
456 /* Set up the sym parameter. */
457 ElfW(Sym
) sym
= *defsym
;
458 sym
.st_value
= DL_FIXUP_VALUE_ADDR (reloc_result
->addr
);
460 /* Get the symbol name. */
461 const char *strtab
= (const void *) D_PTR (reloc_result
->bound
,
463 const char *symname
= strtab
+ sym
.st_name
;
465 struct audit_ifaces
*afct
= GLRO(dl_audit
);
466 for (unsigned int cnt
= 0; cnt
< GLRO(dl_naudit
); ++cnt
)
468 if (afct
->ARCH_LA_PLTEXIT
!= NULL
469 && (reloc_result
->enterexit
470 & (LA_SYMB_NOPLTEXIT
>> (2 * cnt
))) == 0)
472 afct
->ARCH_LA_PLTEXIT (&sym
, reloc_result
->boundndx
,
473 &l
->l_audit
[cnt
].cookie
,
474 &reloc_result
->bound
->l_audit
[cnt
].cookie
,
475 inregs
, outregs
, symname
);