blob: 34162215ba953d5f084bb4ef5ba6740e46cb393c [file] [log] [blame]
Dimitry Ivanov48ec2882016-08-04 11:50:36 -07001/*
2 * Copyright (C) 2016 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
Elliott Hughescbc80ba2018-02-13 14:26:29 -080029#pragma once
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070030
31#include <link.h>
32
Florian Mayer4edc20d2024-10-30 14:24:26 -070033#include <list>
Ryan Pricharde5e69e02019-01-01 18:53:48 -080034#include <memory>
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070035#include <string>
Ryan Prichardffaae702019-01-23 17:47:10 -080036#include <vector>
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070037
Mitch Phillips7c1f3772023-09-28 13:45:59 +020038#include "async_safe/CHECK.h"
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070039#include "linker_namespaces.h"
Ryan Prichard16455b52019-01-18 01:00:59 -080040#include "linker_tls.h"
Mitch Phillips7c1f3772023-09-28 13:45:59 +020041#include "private/bionic_elf_tls.h"
42#include "private/bionic_globals.h"
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070043
44#define FLAG_LINKED 0x00000001
45#define FLAG_EXE 0x00000004 // The main executable
46#define FLAG_LINKER 0x00000010 // The linker itself
47#define FLAG_GNU_HASH 0x00000040 // uses gnu hash
48#define FLAG_MAPPED_BY_CALLER 0x00000080 // the map is reserved by the caller
49 // and should not be unmapped
dimitry965d06d2017-11-28 16:03:07 +010050#define FLAG_IMAGE_LINKED 0x00000100 // Is image linked - this is a guard on link_image.
51 // The difference between this flag and
52 // FLAG_LINKED is that FLAG_LINKED
53 // means is set when load_group is
54 // successfully loaded whereas this
55 // flag is set to avoid linking image
56 // when link_image called for the
57 // second time. This situation happens
58 // when load group is crossing
59 // namespace boundary twice and second
60 // local group depends on the same libraries.
dimitry55547db2018-05-25 14:17:37 +020061#define FLAG_RESERVED 0x00000200 // This flag was set when there is at least one
dimitry06016f22018-01-05 11:39:28 +010062 // outstanding thread_local dtor
63 // registered with this soinfo. In such
64 // a case the actual unload is
65 // postponed until the last thread_local
66 // destructor associated with this
67 // soinfo is executed and this flag is
68 // unset.
Ryan Prichardae320cd2019-12-10 12:39:05 -080069#define FLAG_PRELINKED 0x00000400 // prelink_image has successfully processed this soinfo
Florian Mayer4edc20d2024-10-30 14:24:26 -070070#define FLAG_GLOBALS_TAGGED 0x00000800 // globals have been tagged by MTE.
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070071#define FLAG_NEW_SOINFO 0x40000000 // new soinfo format
72
Evgenii Stepanov6bbb75a2023-12-06 18:54:45 +000073#define SOINFO_VERSION 6
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070074
Ryan Prichard339ecef2020-01-02 16:36:06 -080075ElfW(Addr) call_ifunc_resolver(ElfW(Addr) resolver_addr);
76
Dimitry Ivanov48ec2882016-08-04 11:50:36 -070077typedef void (*linker_dtor_function_t)();
78typedef void (*linker_ctor_function_t)(int, char**, char**);
79
Ryan Prichard339ecef2020-01-02 16:36:06 -080080// An entry within a SymbolLookupList.
81struct SymbolLookupLib {
82 uint32_t gnu_maskwords_ = 0;
83 uint32_t gnu_shift2_ = 0;
84 ElfW(Addr)* gnu_bloom_filter_ = nullptr;
85
86 const char* strtab_;
87 size_t strtab_size_;
88 const ElfW(Sym)* symtab_;
89 const ElfW(Versym)* versym_;
90
91 const uint32_t* gnu_chain_;
92 size_t gnu_nbucket_;
93 uint32_t* gnu_bucket_;
94
95 soinfo* si_ = nullptr;
96
97 bool needs_sysv_lookup() const { return si_ != nullptr && gnu_bloom_filter_ == nullptr; }
98};
99
100// A list of libraries to search for a symbol.
101class SymbolLookupList {
102 std::vector<SymbolLookupLib> libs_;
103 SymbolLookupLib sole_lib_;
104 const SymbolLookupLib* begin_;
105 const SymbolLookupLib* end_;
106 size_t slow_path_count_ = 0;
107
108 public:
109 explicit SymbolLookupList(soinfo* si);
110 SymbolLookupList(const soinfo_list_t& global_group, const soinfo_list_t& local_group);
111 void set_dt_symbolic_lib(soinfo* symbolic_lib);
112
113 const SymbolLookupLib* begin() const { return begin_; }
114 const SymbolLookupLib* end() const { return end_; }
115 bool needs_slow_path() const { return slow_path_count_ > 0; }
116};
117
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700118class SymbolName {
119 public:
120 explicit SymbolName(const char* name)
121 : name_(name), has_elf_hash_(false), has_gnu_hash_(false),
122 elf_hash_(0), gnu_hash_(0) { }
123
124 const char* get_name() {
125 return name_;
126 }
127
128 uint32_t elf_hash();
129 uint32_t gnu_hash();
130
131 private:
132 const char* name_;
133 bool has_elf_hash_;
134 bool has_gnu_hash_;
135 uint32_t elf_hash_;
136 uint32_t gnu_hash_;
137
138 DISALLOW_IMPLICIT_CONSTRUCTORS(SymbolName);
139};
140
141struct version_info {
142 constexpr version_info() : elf_hash(0), name(nullptr), target_si(nullptr) {}
143
144 uint32_t elf_hash;
145 const char* name;
146 const soinfo* target_si;
147};
148
149// TODO(dimitry): remove reference from soinfo member functions to this class.
150class VersionTracker;
151
Ryan Pricharde5e69e02019-01-01 18:53:48 -0800152struct soinfo_tls {
153 TlsSegment segment;
Ryan Prichard16455b52019-01-18 01:00:59 -0800154 size_t module_id = kTlsUninitializedModuleId;
Ryan Pricharde5e69e02019-01-01 18:53:48 -0800155};
156
Elliott Hughesac818e22025-02-18 09:55:39 -0800157#if !defined(__LP64__)
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700158#define SOINFO_NAME_LEN 128
159#endif
160
161struct soinfo {
Elliott Hughesac818e22025-02-18 09:55:39 -0800162#if !defined(__LP64__)
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700163 private:
164 char old_name_[SOINFO_NAME_LEN];
165#endif
166 public:
167 const ElfW(Phdr)* phdr;
168 size_t phnum;
Elliott Hughesac818e22025-02-18 09:55:39 -0800169#if !defined(__LP64__)
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700170 ElfW(Addr) unused0; // DO NOT USE, maintained for compatibility.
171#endif
172 ElfW(Addr) base;
173 size_t size;
174
Elliott Hughesac818e22025-02-18 09:55:39 -0800175#if !defined(__LP64__)
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700176 uint32_t unused1; // DO NOT USE, maintained for compatibility.
177#endif
178
179 ElfW(Dyn)* dynamic;
180
Elliott Hughesac818e22025-02-18 09:55:39 -0800181#if !defined(__LP64__)
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700182 uint32_t unused2; // DO NOT USE, maintained for compatibility
183 uint32_t unused3; // DO NOT USE, maintained for compatibility
184#endif
185
186 soinfo* next;
187 private:
188 uint32_t flags_;
189
190 const char* strtab_;
191 ElfW(Sym)* symtab_;
192
193 size_t nbucket_;
194 size_t nchain_;
195 uint32_t* bucket_;
196 uint32_t* chain_;
197
Elliott Hughes14798932020-02-13 15:40:07 -0800198#if !defined(__LP64__)
199 ElfW(Addr)** unused4; // DO NOT USE, maintained for compatibility
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700200#endif
201
202#if defined(USE_RELA)
203 ElfW(Rela)* plt_rela_;
204 size_t plt_rela_count_;
205
206 ElfW(Rela)* rela_;
207 size_t rela_count_;
208#else
209 ElfW(Rel)* plt_rel_;
210 size_t plt_rel_count_;
211
212 ElfW(Rel)* rel_;
213 size_t rel_count_;
214#endif
215
216 linker_ctor_function_t* preinit_array_;
217 size_t preinit_array_count_;
218
219 linker_ctor_function_t* init_array_;
220 size_t init_array_count_;
221 linker_dtor_function_t* fini_array_;
222 size_t fini_array_count_;
223
224 linker_ctor_function_t init_func_;
225 linker_dtor_function_t fini_func_;
226
227#if defined(__arm__)
228 public:
229 // ARM EABI section used for stack unwinding.
230 uint32_t* ARM_exidx;
231 size_t ARM_exidx_count;
232 private:
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700233#endif
234 size_t ref_count_;
235 public:
236 link_map link_map_head;
237
238 bool constructors_called;
239
240 // When you read a virtual address from the ELF file, add this
241 // value to get the corresponding address in the process' address space.
242 ElfW(Addr) load_bias;
243
244#if !defined(__LP64__)
245 bool has_text_relocations;
246#endif
247 bool has_DT_SYMBOLIC;
248
249 public:
250 soinfo(android_namespace_t* ns, const char* name, const struct stat* file_stat,
251 off64_t file_offset, int rtld_flags);
252 ~soinfo();
253
254 void call_constructors();
255 void call_destructors();
256 void call_pre_init_constructors();
Mitch Phillips28057b82024-08-21 19:43:08 +0200257 bool prelink_image(bool deterministic_memtag_globals = false);
Ryan Prichard339ecef2020-01-02 16:36:06 -0800258 bool link_image(const SymbolLookupList& lookup_list, soinfo* local_group_root,
Torne (Richard Coles)efbe9a52018-10-17 15:59:38 -0400259 const android_dlextinfo* extinfo, size_t* relro_fd_offset);
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700260 bool protect_relro();
261
Mitch Phillips28057b82024-08-21 19:43:08 +0200262 void tag_globals(bool deterministic_memtag_globals);
Florian Mayer4edc20d2024-10-30 14:24:26 -0700263 ElfW(Addr) apply_memtag_if_mte_globals(ElfW(Addr) sym_addr) const;
264
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700265 void add_child(soinfo* child);
266 void remove_all_links();
267
268 ino_t get_st_ino() const;
269 dev_t get_st_dev() const;
270 off64_t get_file_offset() const;
271
272 uint32_t get_rtld_flags() const;
273 uint32_t get_dt_flags_1() const;
274 void set_dt_flags_1(uint32_t dt_flags_1);
275
276 soinfo_list_t& get_children();
277 const soinfo_list_t& get_children() const;
278
279 soinfo_list_t& get_parents();
280
Ryan Prichard0e12cce2020-01-02 14:59:11 -0800281 const ElfW(Sym)* find_symbol_by_name(SymbolName& symbol_name, const version_info* vi) const;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700282
283 ElfW(Sym)* find_symbol_by_address(const void* addr);
Ryan Prichard339ecef2020-01-02 16:36:06 -0800284
285 ElfW(Addr) resolve_symbol_address(const ElfW(Sym)* s) const {
286 if (ELF_ST_TYPE(s->st_info) == STT_GNU_IFUNC) {
287 return call_ifunc_resolver(s->st_value + load_bias);
288 }
289
290 return static_cast<ElfW(Addr)>(s->st_value + load_bias);
291 }
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700292
293 const char* get_string(ElfW(Word) index) const;
294 bool can_unload() const;
295 bool is_gnu_hash() const;
296
Elliott Hughesac818e22025-02-18 09:55:39 -0800297 // TODO: rename this to make it clearer it's always true for LP64.
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700298 bool inline has_min_version(uint32_t min_version __unused) const {
Elliott Hughesac818e22025-02-18 09:55:39 -0800299#if defined(__LP64__)
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700300 return true;
Elliott Hughesac818e22025-02-18 09:55:39 -0800301#else
302 return (flags_ & FLAG_NEW_SOINFO) != 0 && version_ >= min_version;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700303#endif
304 }
305
Ryan Prichard339ecef2020-01-02 16:36:06 -0800306 const ElfW(Versym)* get_versym_table() const {
307 return has_min_version(2) ? versym_ : nullptr;
308 }
309
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700310 bool is_linked() const;
311 bool is_linker() const;
312 bool is_main_executable() const;
313
314 void set_linked();
315 void set_linker_flag();
316 void set_main_executable();
317 void set_nodelete();
318
dimitry965d06d2017-11-28 16:03:07 +0100319 size_t increment_ref_count();
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700320 size_t decrement_ref_count();
dimitry06016f22018-01-05 11:39:28 +0100321 size_t get_ref_count() const;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700322
323 soinfo* get_local_group_root() const;
324
325 void set_soname(const char* soname);
326 const char* get_soname() const;
Ryan Prichardcf9ed122019-06-04 20:56:56 -0700327 void set_realpath(const char* path);
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700328 const char* get_realpath() const;
329 const ElfW(Versym)* get_versym(size_t n) const;
330 ElfW(Addr) get_verneed_ptr() const;
331 size_t get_verneed_cnt() const;
332 ElfW(Addr) get_verdef_ptr() const;
333 size_t get_verdef_cnt() const;
334
Elliott Hughesff1428a2018-11-12 16:01:37 -0800335 int get_target_sdk_version() const;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700336
337 void set_dt_runpath(const char *);
338 const std::vector<std::string>& get_dt_runpath() const;
339 android_namespace_t* get_primary_namespace();
340 void add_secondary_namespace(android_namespace_t* secondary_ns);
Dimitry Ivanov7a34b9d2017-02-03 14:07:34 -0800341 android_namespace_list_t& get_secondary_namespaces();
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700342
Ryan Prichardc6bec072019-10-03 17:57:15 -0700343 soinfo_tls* get_tls() const {
344 return has_min_version(5) ? tls_.get() : nullptr;
345 }
Ryan Pricharde5e69e02019-01-01 18:53:48 -0800346
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700347 void set_mapped_by_caller(bool reserved_map);
348 bool is_mapped_by_caller() const;
349
350 uintptr_t get_handle() const;
351 void generate_handle();
352 void* to_handle();
353
Ryan Prichard339ecef2020-01-02 16:36:06 -0800354 SymbolLookupLib get_lookup_lib();
355
Evgenii Stepanove0848bb2020-07-14 16:44:57 -0700356 void set_gap_start(ElfW(Addr) gap_start);
357 ElfW(Addr) get_gap_start() const;
358
359 void set_gap_size(size_t gap_size);
360 size_t get_gap_size() const;
361
Mitch Phillips7c1f3772023-09-28 13:45:59 +0200362 const memtag_dynamic_entries_t* memtag_dynamic_entries() const {
Elliott Hughesac818e22025-02-18 09:55:39 -0800363#if defined(__aarch64__)
Mitch Phillips7c1f3772023-09-28 13:45:59 +0200364 return &memtag_dynamic_entries_;
Elliott Hughesac818e22025-02-18 09:55:39 -0800365#else
Florian Mayer3e56e562024-10-29 17:57:24 -0700366 return nullptr;
Elliott Hughesac818e22025-02-18 09:55:39 -0800367#endif
Mitch Phillips7c1f3772023-09-28 13:45:59 +0200368 }
Florian Mayer3e56e562024-10-29 17:57:24 -0700369 void* memtag_globals() const {
370 const memtag_dynamic_entries_t* entries = memtag_dynamic_entries();
371 return entries ? entries->memtag_globals : nullptr;
372 }
373 size_t memtag_globalssz() const {
374 const memtag_dynamic_entries_t* entries = memtag_dynamic_entries();
375 return entries ? entries->memtag_globalssz : 0U;
376 }
377 bool has_memtag_mode() const {
378 const memtag_dynamic_entries_t* entries = memtag_dynamic_entries();
379 return entries ? entries->has_memtag_mode : false;
380 }
381 unsigned memtag_mode() const {
382 const memtag_dynamic_entries_t* entries = memtag_dynamic_entries();
383 return entries ? entries->memtag_mode : 0U;
384 }
385 bool memtag_heap() const {
386 const memtag_dynamic_entries_t* entries = memtag_dynamic_entries();
387 return entries ? entries->memtag_heap : false;
388 }
389 bool memtag_stack() const {
390 const memtag_dynamic_entries_t* entries = memtag_dynamic_entries();
391 return entries ? entries->memtag_stack : false;
392 }
Mitch Phillips7c1f3772023-09-28 13:45:59 +0200393
Kalesh Singh377f0b92024-01-31 20:23:39 -0800394 void set_should_pad_segments(bool should_pad_segments) {
395 should_pad_segments_ = should_pad_segments;
396 }
397 bool should_pad_segments() const { return should_pad_segments_; }
Florian Mayer4edc20d2024-10-30 14:24:26 -0700398 bool should_tag_memtag_globals() const {
399 return !is_linker() && memtag_globals() && memtag_globalssz() > 0 && __libc_mte_enabled();
400 }
401 std::list<std::string>* vma_names() {
Elliott Hughesac818e22025-02-18 09:55:39 -0800402#if defined(__aarch64__)
Florian Mayer4edc20d2024-10-30 14:24:26 -0700403 return &vma_names_;
Elliott Hughesac818e22025-02-18 09:55:39 -0800404#else
Florian Mayer4edc20d2024-10-30 14:24:26 -0700405 return nullptr;
Elliott Hughesac818e22025-02-18 09:55:39 -0800406#endif
Florian Mayer4edc20d2024-10-30 14:24:26 -0700407};
Kalesh Singh377f0b92024-01-31 20:23:39 -0800408
Kalesh Singhb23787f2024-09-05 08:22:06 +0000409 void set_should_use_16kib_app_compat(bool should_use_16kib_app_compat) {
410 should_use_16kib_app_compat_ = should_use_16kib_app_compat;
411 }
412 bool should_use_16kib_app_compat() const { return should_use_16kib_app_compat_; }
413
Kalesh Singhce1c3cf2024-09-30 13:26:23 -0700414 void set_compat_relro_start(ElfW(Addr) start) { compat_relro_start_ = start; }
415 ElfW(Addr) compat_relro_start() const { return compat_relro_start_; }
416
417 void set_compat_relro_size(ElfW(Addr) size) { compat_relro_size_ = size; }
418 ElfW(Addr) compat_relro_size() const { return compat_relro_start_; }
419
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700420 private:
dimitry965d06d2017-11-28 16:03:07 +0100421 bool is_image_linked() const;
422 void set_image_linked();
423
Ryan Prichard0e12cce2020-01-02 14:59:11 -0800424 const ElfW(Sym)* gnu_lookup(SymbolName& symbol_name, const version_info* vi) const;
425 const ElfW(Sym)* elf_lookup(SymbolName& symbol_name, const version_info* vi) const;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700426 ElfW(Sym)* gnu_addr_lookup(const void* addr);
Ryan Prichard0e12cce2020-01-02 14:59:11 -0800427 ElfW(Sym)* elf_addr_lookup(const void* addr);
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700428
Ryan Prichard339ecef2020-01-02 16:36:06 -0800429 public:
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700430 bool lookup_version_info(const VersionTracker& version_tracker, ElfW(Word) sym,
431 const char* sym_name, const version_info** vi);
432
Ryan Prichard339ecef2020-01-02 16:36:06 -0800433 private:
434 bool relocate(const SymbolLookupList& lookup_list);
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700435
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700436 // This part of the structure is only available
437 // when FLAG_NEW_SOINFO is set in this->flags.
438 uint32_t version_;
439
440 // version >= 0
441 dev_t st_dev_;
442 ino_t st_ino_;
443
444 // dependency graph
445 soinfo_list_t children_;
446 soinfo_list_t parents_;
447
448 // version >= 1
449 off64_t file_offset_;
450 uint32_t rtld_flags_;
451 uint32_t dt_flags_1_;
452 size_t strtab_size_;
453
454 // version >= 2
455
456 size_t gnu_nbucket_;
457 uint32_t* gnu_bucket_;
458 uint32_t* gnu_chain_;
459 uint32_t gnu_maskwords_;
460 uint32_t gnu_shift2_;
461 ElfW(Addr)* gnu_bloom_filter_;
462
463 soinfo* local_group_root_;
464
465 uint8_t* android_relocs_;
466 size_t android_relocs_size_;
467
Elliott Hughesf9dd1a72021-01-11 09:04:58 -0800468 std::string soname_;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700469 std::string realpath_;
470
471 const ElfW(Versym)* versym_;
472
473 ElfW(Addr) verdef_ptr_;
474 size_t verdef_cnt_;
475
476 ElfW(Addr) verneed_ptr_;
477 size_t verneed_cnt_;
478
Elliott Hughesff1428a2018-11-12 16:01:37 -0800479 int target_sdk_version_;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700480
481 // version >= 3
482 std::vector<std::string> dt_runpath_;
483 android_namespace_t* primary_namespace_;
484 android_namespace_list_t secondary_namespaces_;
485 uintptr_t handle_;
486
Ryan Prichardcf9ed122019-06-04 20:56:56 -0700487 friend soinfo* get_libdl_info(const soinfo& linker_si);
Rahul Chaudhryb7feec72017-12-19 15:25:23 -0800488
489 // version >= 4
490 ElfW(Relr)* relr_;
491 size_t relr_count_;
Ryan Pricharde5e69e02019-01-01 18:53:48 -0800492
493 // version >= 5
494 std::unique_ptr<soinfo_tls> tls_;
Ryan Prichardffaae702019-01-23 17:47:10 -0800495 std::vector<TlsDynamicResolverArg> tlsdesc_args_;
Evgenii Stepanove0848bb2020-07-14 16:44:57 -0700496
497 // version >= 6
498 ElfW(Addr) gap_start_;
499 size_t gap_size_;
Mitch Phillips7c1f3772023-09-28 13:45:59 +0200500
Florian Mayer3e56e562024-10-29 17:57:24 -0700501 // __aarch64__ only, which does not use versioning.
Mitch Phillips7c1f3772023-09-28 13:45:59 +0200502 memtag_dynamic_entries_t memtag_dynamic_entries_;
Florian Mayer4edc20d2024-10-30 14:24:26 -0700503 std::list<std::string> vma_names_;
Kalesh Singh377f0b92024-01-31 20:23:39 -0800504
505 // Pad gaps between segments when memory mapping?
506 bool should_pad_segments_ = false;
Kalesh Singhb23787f2024-09-05 08:22:06 +0000507
508 // Use app compat mode when loading 4KiB max-page-size ELFs on 16KiB page-size devices?
509 bool should_use_16kib_app_compat_ = false;
Kalesh Singhce1c3cf2024-09-30 13:26:23 -0700510
511 // RELRO region for 16KiB compat loading
512 ElfW(Addr) compat_relro_start_ = 0;
513 ElfW(Addr) compat_relro_size_ = 0;
Dimitry Ivanov48ec2882016-08-04 11:50:36 -0700514};
515
516// This function is used by dlvsym() to calculate hash of sym_ver
517uint32_t calculate_elf_hash(const char* name);
518
Dimitry Ivanov3f660572016-09-09 10:00:39 -0700519const char* fix_dt_needed(const char* dt_needed, const char* sopath);
520
Ryan Prichard339ecef2020-01-02 16:36:06 -0800521const ElfW(Sym)* soinfo_do_lookup(const char* name, const version_info* vi,
522 soinfo** si_found_in, const SymbolLookupList& lookup_list);