blob: 6b81f5fd08d1d12c067e5a20a6582e90bd2b1f8d [file] [log] [blame]
Dimitry Ivanov48ec2882016-08-04 11:50:36 -07001/*
2 * Copyright (C) 2016 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
Elliott Hughescbc80ba2018-02-13 14:26:29 -080029#pragma once
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070030
31#include <link.h>
32
Mitch Phillips2e6e4092024-08-21 17:07:18 +020033#include <list>
Ryan Pricharde5e69e02019-01-01 18:53:48 -080034#include <memory>
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070035#include <string>
Ryan Prichardffaae702019-01-23 17:47:10 -080036#include <vector>
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070037
Mitch Phillips7c1f3772023-09-28 13:45:59 +020038#include "async_safe/CHECK.h"
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070039#include "linker_namespaces.h"
Ryan Prichard16455b52019-01-18 01:00:59 -080040#include "linker_tls.h"
Mitch Phillips7c1f3772023-09-28 13:45:59 +020041#include "private/bionic_elf_tls.h"
42#include "private/bionic_globals.h"
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070043
44#define FLAG_LINKED 0x00000001
45#define FLAG_EXE 0x00000004 // The main executable
46#define FLAG_LINKER 0x00000010 // The linker itself
47#define FLAG_GNU_HASH 0x00000040 // uses gnu hash
48#define FLAG_MAPPED_BY_CALLER 0x00000080 // the map is reserved by the caller
49 // and should not be unmapped
dimitry965d06d2017-11-28 16:03:07 +010050#define FLAG_IMAGE_LINKED 0x00000100 // Is image linked - this is a guard on link_image.
51 // The difference between this flag and
52 // FLAG_LINKED is that FLAG_LINKED
53 // means is set when load_group is
54 // successfully loaded whereas this
55 // flag is set to avoid linking image
56 // when link_image called for the
57 // second time. This situation happens
58 // when load group is crossing
59 // namespace boundary twice and second
60 // local group depends on the same libraries.
dimitry55547db2018-05-25 14:17:37 +020061#define FLAG_RESERVED 0x00000200 // This flag was set when there is at least one
dimitry06016f22018-01-05 11:39:28 +010062 // outstanding thread_local dtor
63 // registered with this soinfo. In such
64 // a case the actual unload is
65 // postponed until the last thread_local
66 // destructor associated with this
67 // soinfo is executed and this flag is
68 // unset.
Ryan Prichardae320cd2019-12-10 12:39:05 -080069#define FLAG_PRELINKED 0x00000400 // prelink_image has successfully processed this soinfo
Mitch Phillips2e6e4092024-08-21 17:07:18 +020070#define FLAG_GLOBALS_TAGGED 0x00000800 // globals have been tagged by MTE.
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070071#define FLAG_NEW_SOINFO 0x40000000 // new soinfo format
72
Mitch Phillips2e6e4092024-08-21 17:07:18 +020073#define SOINFO_VERSION 7
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070074
Ryan Prichard339ecef2020-01-02 16:36:06 -080075ElfW(Addr) call_ifunc_resolver(ElfW(Addr) resolver_addr);
76
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070077typedef void (*linker_dtor_function_t)();
78typedef void (*linker_ctor_function_t)(int, char**, char**);
79
Ryan Prichard339ecef2020-01-02 16:36:06 -080080// An entry within a SymbolLookupList.
81struct SymbolLookupLib {
82 uint32_t gnu_maskwords_ = 0;
83 uint32_t gnu_shift2_ = 0;
84 ElfW(Addr)* gnu_bloom_filter_ = nullptr;
85
86 const char* strtab_;
87 size_t strtab_size_;
88 const ElfW(Sym)* symtab_;
89 const ElfW(Versym)* versym_;
90
91 const uint32_t* gnu_chain_;
92 size_t gnu_nbucket_;
93 uint32_t* gnu_bucket_;
94
95 soinfo* si_ = nullptr;
96
97 bool needs_sysv_lookup() const { return si_ != nullptr && gnu_bloom_filter_ == nullptr; }
98};
99
100// A list of libraries to search for a symbol.
101class SymbolLookupList {
102 std::vector<SymbolLookupLib> libs_;
103 SymbolLookupLib sole_lib_;
104 const SymbolLookupLib* begin_;
105 const SymbolLookupLib* end_;
106 size_t slow_path_count_ = 0;
107
108 public:
109 explicit SymbolLookupList(soinfo* si);
110 SymbolLookupList(const soinfo_list_t& global_group, const soinfo_list_t& local_group);
111 void set_dt_symbolic_lib(soinfo* symbolic_lib);
112
113 const SymbolLookupLib* begin() const { return begin_; }
114 const SymbolLookupLib* end() const { return end_; }
115 bool needs_slow_path() const { return slow_path_count_ > 0; }
116};
117
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700118class SymbolName {
119 public:
120 explicit SymbolName(const char* name)
121 : name_(name), has_elf_hash_(false), has_gnu_hash_(false),
122 elf_hash_(0), gnu_hash_(0) { }
123
124 const char* get_name() {
125 return name_;
126 }
127
128 uint32_t elf_hash();
129 uint32_t gnu_hash();
130
131 private:
132 const char* name_;
133 bool has_elf_hash_;
134 bool has_gnu_hash_;
135 uint32_t elf_hash_;
136 uint32_t gnu_hash_;
137
138 DISALLOW_IMPLICIT_CONSTRUCTORS(SymbolName);
139};
140
141struct version_info {
142 constexpr version_info() : elf_hash(0), name(nullptr), target_si(nullptr) {}
143
144 uint32_t elf_hash;
145 const char* name;
146 const soinfo* target_si;
147};
148
149// TODO(dimitry): remove reference from soinfo member functions to this class.
150class VersionTracker;
151
Ryan Pricharde5e69e02019-01-01 18:53:48 -0800152struct soinfo_tls {
153 TlsSegment segment;
Ryan Prichard16455b52019-01-18 01:00:59 -0800154 size_t module_id = kTlsUninitializedModuleId;
Ryan Pricharde5e69e02019-01-01 18:53:48 -0800155};
156
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700157#if defined(__work_around_b_24465209__)
158#define SOINFO_NAME_LEN 128
159#endif
160
161struct soinfo {
162#if defined(__work_around_b_24465209__)
163 private:
164 char old_name_[SOINFO_NAME_LEN];
165#endif
166 public:
167 const ElfW(Phdr)* phdr;
168 size_t phnum;
169#if defined(__work_around_b_24465209__)
170 ElfW(Addr) unused0; // DO NOT USE, maintained for compatibility.
171#endif
172 ElfW(Addr) base;
173 size_t size;
174
175#if defined(__work_around_b_24465209__)
176 uint32_t unused1; // DO NOT USE, maintained for compatibility.
177#endif
178
179 ElfW(Dyn)* dynamic;
180
181#if defined(__work_around_b_24465209__)
182 uint32_t unused2; // DO NOT USE, maintained for compatibility
183 uint32_t unused3; // DO NOT USE, maintained for compatibility
184#endif
185
186 soinfo* next;
187 private:
188 uint32_t flags_;
189
190 const char* strtab_;
191 ElfW(Sym)* symtab_;
192
193 size_t nbucket_;
194 size_t nchain_;
195 uint32_t* bucket_;
196 uint32_t* chain_;
197
Elliott Hughes14798932020-02-13 15:40:07 -0800198#if !defined(__LP64__)
199 ElfW(Addr)** unused4; // DO NOT USE, maintained for compatibility
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700200#endif
201
202#if defined(USE_RELA)
203 ElfW(Rela)* plt_rela_;
204 size_t plt_rela_count_;
205
206 ElfW(Rela)* rela_;
207 size_t rela_count_;
208#else
209 ElfW(Rel)* plt_rel_;
210 size_t plt_rel_count_;
211
212 ElfW(Rel)* rel_;
213 size_t rel_count_;
214#endif
215
216 linker_ctor_function_t* preinit_array_;
217 size_t preinit_array_count_;
218
219 linker_ctor_function_t* init_array_;
220 size_t init_array_count_;
221 linker_dtor_function_t* fini_array_;
222 size_t fini_array_count_;
223
224 linker_ctor_function_t init_func_;
225 linker_dtor_function_t fini_func_;
226
227#if defined(__arm__)
228 public:
229 // ARM EABI section used for stack unwinding.
230 uint32_t* ARM_exidx;
231 size_t ARM_exidx_count;
232 private:
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700233#endif
234 size_t ref_count_;
235 public:
236 link_map link_map_head;
237
238 bool constructors_called;
239
240 // When you read a virtual address from the ELF file, add this
241 // value to get the corresponding address in the process' address space.
242 ElfW(Addr) load_bias;
243
244#if !defined(__LP64__)
245 bool has_text_relocations;
246#endif
247 bool has_DT_SYMBOLIC;
248
249 public:
250 soinfo(android_namespace_t* ns, const char* name, const struct stat* file_stat,
251 off64_t file_offset, int rtld_flags);
252 ~soinfo();
253
254 void call_constructors();
255 void call_destructors();
256 void call_pre_init_constructors();
257 bool prelink_image();
Ryan Prichard339ecef2020-01-02 16:36:06 -0800258 bool link_image(const SymbolLookupList& lookup_list, soinfo* local_group_root,
Torne (Richard Coles)efbe9a52018-10-17 15:59:38 -0400259 const android_dlextinfo* extinfo, size_t* relro_fd_offset);
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700260 bool protect_relro();
261
Mitch Phillips2e6e4092024-08-21 17:07:18 +0200262 void tag_globals();
263 ElfW(Addr) apply_memtag_if_mte_globals(ElfW(Addr) sym_addr) const;
264
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700265 void add_child(soinfo* child);
266 void remove_all_links();
267
268 ino_t get_st_ino() const;
269 dev_t get_st_dev() const;
270 off64_t get_file_offset() const;
271
272 uint32_t get_rtld_flags() const;
273 uint32_t get_dt_flags_1() const;
274 void set_dt_flags_1(uint32_t dt_flags_1);
275
276 soinfo_list_t& get_children();
277 const soinfo_list_t& get_children() const;
278
279 soinfo_list_t& get_parents();
280
Ryan Prichard0e12cce2020-01-02 14:59:11 -0800281 const ElfW(Sym)* find_symbol_by_name(SymbolName& symbol_name, const version_info* vi) const;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700282
283 ElfW(Sym)* find_symbol_by_address(const void* addr);
Ryan Prichard339ecef2020-01-02 16:36:06 -0800284
285 ElfW(Addr) resolve_symbol_address(const ElfW(Sym)* s) const {
286 if (ELF_ST_TYPE(s->st_info) == STT_GNU_IFUNC) {
287 return call_ifunc_resolver(s->st_value + load_bias);
288 }
289
290 return static_cast<ElfW(Addr)>(s->st_value + load_bias);
291 }
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700292
293 const char* get_string(ElfW(Word) index) const;
294 bool can_unload() const;
295 bool is_gnu_hash() const;
296
297 bool inline has_min_version(uint32_t min_version __unused) const {
298#if defined(__work_around_b_24465209__)
299 return (flags_ & FLAG_NEW_SOINFO) != 0 && version_ >= min_version;
300#else
301 return true;
302#endif
303 }
304
Ryan Prichard339ecef2020-01-02 16:36:06 -0800305 const ElfW(Versym)* get_versym_table() const {
306 return has_min_version(2) ? versym_ : nullptr;
307 }
308
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700309 bool is_linked() const;
310 bool is_linker() const;
311 bool is_main_executable() const;
312
313 void set_linked();
314 void set_linker_flag();
315 void set_main_executable();
316 void set_nodelete();
317
dimitry965d06d2017-11-28 16:03:07 +0100318 size_t increment_ref_count();
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700319 size_t decrement_ref_count();
dimitry06016f22018-01-05 11:39:28 +0100320 size_t get_ref_count() const;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700321
322 soinfo* get_local_group_root() const;
323
324 void set_soname(const char* soname);
325 const char* get_soname() const;
Ryan Prichardcf9ed122019-06-04 20:56:56 -0700326 void set_realpath(const char* path);
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700327 const char* get_realpath() const;
328 const ElfW(Versym)* get_versym(size_t n) const;
329 ElfW(Addr) get_verneed_ptr() const;
330 size_t get_verneed_cnt() const;
331 ElfW(Addr) get_verdef_ptr() const;
332 size_t get_verdef_cnt() const;
333
Elliott Hughesff1428a2018-11-12 16:01:37 -0800334 int get_target_sdk_version() const;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700335
336 void set_dt_runpath(const char *);
337 const std::vector<std::string>& get_dt_runpath() const;
338 android_namespace_t* get_primary_namespace();
339 void add_secondary_namespace(android_namespace_t* secondary_ns);
Dimitry Ivanov7a34b9d2017-02-03 14:07:34 -0800340 android_namespace_list_t& get_secondary_namespaces();
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700341
Ryan Prichardc6bec072019-10-03 17:57:15 -0700342 soinfo_tls* get_tls() const {
343 return has_min_version(5) ? tls_.get() : nullptr;
344 }
Ryan Pricharde5e69e02019-01-01 18:53:48 -0800345
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700346 void set_mapped_by_caller(bool reserved_map);
347 bool is_mapped_by_caller() const;
348
349 uintptr_t get_handle() const;
350 void generate_handle();
351 void* to_handle();
352
Ryan Prichard339ecef2020-01-02 16:36:06 -0800353 SymbolLookupLib get_lookup_lib();
354
Evgenii Stepanove0848bb2020-07-14 16:44:57 -0700355 void set_gap_start(ElfW(Addr) gap_start);
356 ElfW(Addr) get_gap_start() const;
357
358 void set_gap_size(size_t gap_size);
359 size_t get_gap_size() const;
360
Mitch Phillips7c1f3772023-09-28 13:45:59 +0200361 const memtag_dynamic_entries_t* memtag_dynamic_entries() const {
362 CHECK(has_min_version(7));
363 return &memtag_dynamic_entries_;
364 }
365 void* memtag_globals() const { return memtag_dynamic_entries()->memtag_globals; }
366 size_t memtag_globalssz() const { return memtag_dynamic_entries()->memtag_globalssz; }
367 bool has_memtag_mode() const { return memtag_dynamic_entries()->has_memtag_mode; }
368 unsigned memtag_mode() const { return memtag_dynamic_entries()->memtag_mode; }
369 bool memtag_heap() const { return memtag_dynamic_entries()->memtag_heap; }
370 bool memtag_stack() const { return memtag_dynamic_entries()->memtag_stack; }
371
Kalesh Singh377f0b92024-01-31 20:23:39 -0800372 void set_should_pad_segments(bool should_pad_segments) {
373 should_pad_segments_ = should_pad_segments;
374 }
375 bool should_pad_segments() const { return should_pad_segments_; }
Mitch Phillips2e6e4092024-08-21 17:07:18 +0200376 bool should_tag_memtag_globals() const {
377 return !is_linker() && memtag_globals() && memtag_globalssz() > 0 && __libc_mte_enabled();
378 }
379 std::list<std::string>& vma_names() { return vma_names_; };
Kalesh Singh377f0b92024-01-31 20:23:39 -0800380
Kalesh Singhb23787f2024-09-05 08:22:06 +0000381 void set_should_use_16kib_app_compat(bool should_use_16kib_app_compat) {
382 should_use_16kib_app_compat_ = should_use_16kib_app_compat;
383 }
384 bool should_use_16kib_app_compat() const { return should_use_16kib_app_compat_; }
385
Kalesh Singhce1c3cf2024-09-30 13:26:23 -0700386 void set_compat_relro_start(ElfW(Addr) start) { compat_relro_start_ = start; }
387 ElfW(Addr) compat_relro_start() const { return compat_relro_start_; }
388
389 void set_compat_relro_size(ElfW(Addr) size) { compat_relro_size_ = size; }
390 ElfW(Addr) compat_relro_size() const { return compat_relro_start_; }
391
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700392 private:
dimitry965d06d2017-11-28 16:03:07 +0100393 bool is_image_linked() const;
394 void set_image_linked();
395
Ryan Prichard0e12cce2020-01-02 14:59:11 -0800396 const ElfW(Sym)* gnu_lookup(SymbolName& symbol_name, const version_info* vi) const;
397 const ElfW(Sym)* elf_lookup(SymbolName& symbol_name, const version_info* vi) const;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700398 ElfW(Sym)* gnu_addr_lookup(const void* addr);
Ryan Prichard0e12cce2020-01-02 14:59:11 -0800399 ElfW(Sym)* elf_addr_lookup(const void* addr);
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700400
Ryan Prichard339ecef2020-01-02 16:36:06 -0800401 public:
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700402 bool lookup_version_info(const VersionTracker& version_tracker, ElfW(Word) sym,
403 const char* sym_name, const version_info** vi);
404
Ryan Prichard339ecef2020-01-02 16:36:06 -0800405 private:
406 bool relocate(const SymbolLookupList& lookup_list);
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700407
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700408 // This part of the structure is only available
409 // when FLAG_NEW_SOINFO is set in this->flags.
410 uint32_t version_;
411
412 // version >= 0
413 dev_t st_dev_;
414 ino_t st_ino_;
415
416 // dependency graph
417 soinfo_list_t children_;
418 soinfo_list_t parents_;
419
420 // version >= 1
421 off64_t file_offset_;
422 uint32_t rtld_flags_;
423 uint32_t dt_flags_1_;
424 size_t strtab_size_;
425
426 // version >= 2
427
428 size_t gnu_nbucket_;
429 uint32_t* gnu_bucket_;
430 uint32_t* gnu_chain_;
431 uint32_t gnu_maskwords_;
432 uint32_t gnu_shift2_;
433 ElfW(Addr)* gnu_bloom_filter_;
434
435 soinfo* local_group_root_;
436
437 uint8_t* android_relocs_;
438 size_t android_relocs_size_;
439
Elliott Hughesf9dd1a72021-01-11 09:04:58 -0800440 std::string soname_;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700441 std::string realpath_;
442
443 const ElfW(Versym)* versym_;
444
445 ElfW(Addr) verdef_ptr_;
446 size_t verdef_cnt_;
447
448 ElfW(Addr) verneed_ptr_;
449 size_t verneed_cnt_;
450
Elliott Hughesff1428a2018-11-12 16:01:37 -0800451 int target_sdk_version_;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700452
453 // version >= 3
454 std::vector<std::string> dt_runpath_;
455 android_namespace_t* primary_namespace_;
456 android_namespace_list_t secondary_namespaces_;
457 uintptr_t handle_;
458
Ryan Prichardcf9ed122019-06-04 20:56:56 -0700459 friend soinfo* get_libdl_info(const soinfo& linker_si);
Rahul Chaudhryb7feec72017-12-19 15:25:23 -0800460
461 // version >= 4
462 ElfW(Relr)* relr_;
463 size_t relr_count_;
Ryan Pricharde5e69e02019-01-01 18:53:48 -0800464
465 // version >= 5
466 std::unique_ptr<soinfo_tls> tls_;
Ryan Prichardffaae702019-01-23 17:47:10 -0800467 std::vector<TlsDynamicResolverArg> tlsdesc_args_;
Evgenii Stepanove0848bb2020-07-14 16:44:57 -0700468
469 // version >= 6
470 ElfW(Addr) gap_start_;
471 size_t gap_size_;
Mitch Phillips7c1f3772023-09-28 13:45:59 +0200472
473 // version >= 7
474 memtag_dynamic_entries_t memtag_dynamic_entries_;
Kalesh Singh377f0b92024-01-31 20:23:39 -0800475
Mitch Phillips2e6e4092024-08-21 17:07:18 +0200476 std::list<std::string> vma_names_;
477
Kalesh Singh377f0b92024-01-31 20:23:39 -0800478 // Pad gaps between segments when memory mapping?
479 bool should_pad_segments_ = false;
Kalesh Singhb23787f2024-09-05 08:22:06 +0000480
481 // Use app compat mode when loading 4KiB max-page-size ELFs on 16KiB page-size devices?
482 bool should_use_16kib_app_compat_ = false;
Kalesh Singhce1c3cf2024-09-30 13:26:23 -0700483
484 // RELRO region for 16KiB compat loading
485 ElfW(Addr) compat_relro_start_ = 0;
486 ElfW(Addr) compat_relro_size_ = 0;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700487};
488
489// This function is used by dlvsym() to calculate hash of sym_ver
490uint32_t calculate_elf_hash(const char* name);
491
Dimitry Ivanov3f660572016-09-09 10:00:39 -0700492const char* fix_dt_needed(const char* dt_needed, const char* sopath);
493
494template<typename F>
495void for_each_dt_needed(const soinfo* si, F action) {
496 for (const ElfW(Dyn)* d = si->dynamic; d->d_tag != DT_NULL; ++d) {
497 if (d->d_tag == DT_NEEDED) {
498 action(fix_dt_needed(si->get_string(d->d_un.d_val), si->get_realpath()));
499 }
500 }
501}
Ryan Prichard339ecef2020-01-02 16:36:06 -0800502
503const ElfW(Sym)* soinfo_do_lookup(const char* name, const version_info* vi,
504 soinfo** si_found_in, const SymbolLookupList& lookup_list);