mirror of
https://sourceware.org/git/glibc.git
synced 2024-11-22 21:10:07 +00:00
9e94f57484
On hppa, a function pointer returned by la_symbind is actually a function descriptor has the plabel bit set (bit 30). This must be cleared to get the actual address of the descriptor. If the descriptor has been bound, the first word of the descriptor is the physical address of theA function, otherwise, the first word of the descriptor points to a trampoline in the PLT. This patch also adds a workaround on tests because on hppa (and it seems to be the only ABI I have see it), some shared library adds a dynamic PLT relocation to am empty symbol name: $ readelf -r elf/tst-audit25mod1.so [...] Relocation section '.rela.plt' at offset 0x464 contains 6 entries: Offset Info Type Sym.Value Sym. Name + Addend 00002008 00000081 R_PARISC_IPLT 508 [...] It breaks some assumptions on the test, where a symbol with an empty name ("") is passed on la_symbind. Checked on x86_64-linux-gnu and hppa-linux-gnu.
383 lines
12 KiB
C
383 lines
12 KiB
C
/* Audit common functions.
|
|
Copyright (C) 2021-2022 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library; if not, see
|
|
<https://www.gnu.org/licenses/>. */
|
|
|
|
#include <assert.h>
|
|
#include <link.h>
|
|
#include <ldsodefs.h>
|
|
#include <dl-machine.h>
|
|
#include <dl-runtime.h>
|
|
#include <dl-fixup-attribute.h>
|
|
|
|
void
|
|
_dl_audit_activity_map (struct link_map *l, int action)
|
|
{
|
|
struct audit_ifaces *afct = GLRO(dl_audit);
|
|
for (unsigned int cnt = 0; cnt < GLRO(dl_naudit); ++cnt)
|
|
{
|
|
if (afct->activity != NULL)
|
|
afct->activity (&link_map_audit_state (l, cnt)->cookie, action);
|
|
afct = afct->next;
|
|
}
|
|
}
|
|
|
|
void
|
|
_dl_audit_activity_nsid (Lmid_t nsid, int action)
|
|
{
|
|
/* If head is NULL, the namespace has become empty, and the audit interface
|
|
does not give us a way to signal LA_ACT_CONSISTENT for it because the
|
|
first loaded module is used to identify the namespace. */
|
|
struct link_map *head = GL(dl_ns)[nsid]._ns_loaded;
|
|
if (__glibc_likely (GLRO(dl_naudit) == 0)
|
|
|| head == NULL || head->l_auditing)
|
|
return;
|
|
|
|
_dl_audit_activity_map (head, action);
|
|
}
|
|
|
|
const char *
|
|
_dl_audit_objsearch (const char *name, struct link_map *l, unsigned int code)
|
|
{
|
|
if (l == NULL || l->l_auditing || code == 0)
|
|
return name;
|
|
|
|
struct audit_ifaces *afct = GLRO(dl_audit);
|
|
for (unsigned int cnt = 0; cnt < GLRO(dl_naudit); ++cnt)
|
|
{
|
|
if (afct->objsearch != NULL)
|
|
{
|
|
struct auditstate *state = link_map_audit_state (l, cnt);
|
|
name = afct->objsearch (name, &state->cookie, code);
|
|
if (name == NULL)
|
|
return NULL;
|
|
}
|
|
afct = afct->next;
|
|
}
|
|
|
|
return name;
|
|
}
|
|
|
|
void
|
|
_dl_audit_objopen (struct link_map *l, Lmid_t nsid)
|
|
{
|
|
if (__glibc_likely (GLRO(dl_naudit) == 0))
|
|
return;
|
|
|
|
struct audit_ifaces *afct = GLRO(dl_audit);
|
|
for (unsigned int cnt = 0; cnt < GLRO(dl_naudit); ++cnt)
|
|
{
|
|
if (afct->objopen != NULL)
|
|
{
|
|
struct auditstate *state = link_map_audit_state (l, cnt);
|
|
state->bindflags = afct->objopen (l, nsid, &state->cookie);
|
|
l->l_audit_any_plt |= state->bindflags != 0;
|
|
}
|
|
|
|
afct = afct->next;
|
|
}
|
|
}
|
|
|
|
void
|
|
_dl_audit_objclose (struct link_map *l)
|
|
{
|
|
if (__glibc_likely (GLRO(dl_naudit) == 0)
|
|
|| GL(dl_ns)[l->l_ns]._ns_loaded->l_auditing)
|
|
return;
|
|
|
|
struct audit_ifaces *afct = GLRO(dl_audit);
|
|
for (unsigned int cnt = 0; cnt < GLRO(dl_naudit); ++cnt)
|
|
{
|
|
if (afct->objclose != NULL)
|
|
{
|
|
struct auditstate *state= link_map_audit_state (l, cnt);
|
|
/* Return value is ignored. */
|
|
afct->objclose (&state->cookie);
|
|
}
|
|
|
|
afct = afct->next;
|
|
}
|
|
}
|
|
|
|
void
|
|
_dl_audit_preinit (struct link_map *l)
|
|
{
|
|
if (__glibc_likely (GLRO(dl_naudit) == 0))
|
|
return;
|
|
|
|
struct audit_ifaces *afct = GLRO(dl_audit);
|
|
for (unsigned int cnt = 0; cnt < GLRO(dl_naudit); ++cnt)
|
|
{
|
|
if (afct->preinit != NULL)
|
|
afct->preinit (&link_map_audit_state (l, cnt)->cookie);
|
|
afct = afct->next;
|
|
}
|
|
}
|
|
|
|
void
|
|
_dl_audit_symbind_alt (struct link_map *l, const ElfW(Sym) *ref, void **value,
|
|
lookup_t result)
|
|
{
|
|
if ((l->l_audit_any_plt | result->l_audit_any_plt) == 0)
|
|
return;
|
|
|
|
const char *strtab = (const char *) D_PTR (result, l_info[DT_STRTAB]);
|
|
/* Compute index of the symbol entry in the symbol table of the DSO with
|
|
the definition. */
|
|
unsigned int ndx = (ref - (ElfW(Sym) *) D_PTR (result, l_info[DT_SYMTAB]));
|
|
|
|
unsigned int altvalue = 0;
|
|
/* Synthesize a symbol record where the st_value field is the result. */
|
|
ElfW(Sym) sym = *ref;
|
|
sym.st_value = (ElfW(Addr)) *value;
|
|
|
|
struct audit_ifaces *afct = GLRO(dl_audit);
|
|
for (unsigned int cnt = 0; cnt < GLRO(dl_naudit); ++cnt)
|
|
{
|
|
struct auditstate *match_audit = link_map_audit_state (l, cnt);
|
|
struct auditstate *result_audit = link_map_audit_state (result, cnt);
|
|
if (afct->symbind != NULL
|
|
&& ((match_audit->bindflags & LA_FLG_BINDFROM) != 0
|
|
|| ((result_audit->bindflags & LA_FLG_BINDTO)
|
|
!= 0)))
|
|
{
|
|
unsigned int flags = altvalue | LA_SYMB_DLSYM;
|
|
uintptr_t new_value = afct->symbind (&sym, ndx,
|
|
&match_audit->cookie,
|
|
&result_audit->cookie,
|
|
&flags, strtab + ref->st_name);
|
|
if (new_value != (uintptr_t) sym.st_value)
|
|
{
|
|
altvalue = LA_SYMB_ALTVALUE;
|
|
sym.st_value = new_value;
|
|
}
|
|
|
|
afct = afct->next;
|
|
}
|
|
|
|
*value = (void *) sym.st_value;
|
|
}
|
|
}
|
|
rtld_hidden_def (_dl_audit_symbind_alt)
|
|
|
|
void
|
|
_dl_audit_symbind (struct link_map *l, struct reloc_result *reloc_result,
|
|
const ElfW(Sym) *defsym, DL_FIXUP_VALUE_TYPE *value,
|
|
lookup_t result)
|
|
{
|
|
bool for_jmp_slot = reloc_result == NULL;
|
|
|
|
/* Compute index of the symbol entry in the symbol table of the DSO
|
|
with the definition. */
|
|
unsigned int boundndx = defsym - (ElfW(Sym) *) D_PTR (result,
|
|
l_info[DT_SYMTAB]);
|
|
if (!for_jmp_slot)
|
|
{
|
|
reloc_result->bound = result;
|
|
reloc_result->boundndx = boundndx;
|
|
}
|
|
|
|
if ((l->l_audit_any_plt | result->l_audit_any_plt) == 0)
|
|
{
|
|
/* Set all bits since this symbol binding is not interesting. */
|
|
if (!for_jmp_slot)
|
|
reloc_result->enterexit = (1u << DL_NNS) - 1;
|
|
return;
|
|
}
|
|
|
|
/* Synthesize a symbol record where the st_value field is the result. */
|
|
ElfW(Sym) sym = *defsym;
|
|
sym.st_value = DL_FIXUP_VALUE_ADDR (*value);
|
|
|
|
/* Keep track whether there is any interest in tracing the call in the lower
|
|
two bits. */
|
|
assert (DL_NNS * 2 <= sizeof (reloc_result->flags) * 8);
|
|
assert ((LA_SYMB_NOPLTENTER | LA_SYMB_NOPLTEXIT) == 3);
|
|
uint32_t enterexit = LA_SYMB_NOPLTENTER | LA_SYMB_NOPLTEXIT;
|
|
|
|
const char *strtab2 = (const void *) D_PTR (result, l_info[DT_STRTAB]);
|
|
|
|
unsigned int flags = 0;
|
|
struct audit_ifaces *afct = GLRO(dl_audit);
|
|
uintptr_t new_value = (uintptr_t) sym.st_value;
|
|
for (unsigned int cnt = 0; cnt < GLRO(dl_naudit); ++cnt)
|
|
{
|
|
/* XXX Check whether both DSOs must request action or only one */
|
|
struct auditstate *l_state = link_map_audit_state (l, cnt);
|
|
struct auditstate *result_state = link_map_audit_state (result, cnt);
|
|
if ((l_state->bindflags & LA_FLG_BINDFROM) != 0
|
|
&& (result_state->bindflags & LA_FLG_BINDTO) != 0)
|
|
{
|
|
if (afct->symbind != NULL)
|
|
{
|
|
flags |= for_jmp_slot ? LA_SYMB_NOPLTENTER | LA_SYMB_NOPLTEXIT
|
|
: 0;
|
|
new_value = afct->symbind (&sym, boundndx,
|
|
&l_state->cookie,
|
|
&result_state->cookie, &flags,
|
|
strtab2 + defsym->st_name);
|
|
if (new_value != (uintptr_t) sym.st_value)
|
|
{
|
|
flags |= LA_SYMB_ALTVALUE;
|
|
sym.st_value = for_jmp_slot
|
|
? DL_FIXUP_BINDNOW_ADDR_VALUE (new_value) : new_value;
|
|
}
|
|
}
|
|
|
|
/* Remember the results for every audit library and store a summary
|
|
in the first two bits. */
|
|
enterexit &= flags & (LA_SYMB_NOPLTENTER | LA_SYMB_NOPLTEXIT);
|
|
enterexit |= ((flags & (LA_SYMB_NOPLTENTER | LA_SYMB_NOPLTEXIT))
|
|
<< ((cnt + 1) * 2));
|
|
}
|
|
else
|
|
/* If the bind flags say this auditor is not interested, set the bits
|
|
manually. */
|
|
enterexit |= ((LA_SYMB_NOPLTENTER | LA_SYMB_NOPLTEXIT)
|
|
<< ((cnt + 1) * 2));
|
|
afct = afct->next;
|
|
}
|
|
|
|
if (!for_jmp_slot)
|
|
{
|
|
reloc_result->enterexit = enterexit;
|
|
reloc_result->flags = flags;
|
|
}
|
|
|
|
if (flags & LA_SYMB_ALTVALUE)
|
|
DL_FIXUP_BINDNOW_RELOC (value, new_value, sym.st_value);
|
|
}
|
|
|
|
void
|
|
_dl_audit_pltenter (struct link_map *l, struct reloc_result *reloc_result,
|
|
DL_FIXUP_VALUE_TYPE *value, void *regs, long int *framesize)
|
|
{
|
|
/* Don't do anything if no auditor wants to intercept this call. */
|
|
if (GLRO(dl_naudit) == 0
|
|
|| (reloc_result->enterexit & LA_SYMB_NOPLTENTER))
|
|
return;
|
|
|
|
/* Sanity check: DL_FIXUP_VALUE_CODE_ADDR (value) should have been
|
|
initialized earlier in this function or in another thread. */
|
|
assert (DL_FIXUP_VALUE_CODE_ADDR (*value) != 0);
|
|
ElfW(Sym) *defsym = ((ElfW(Sym) *) D_PTR (reloc_result->bound,
|
|
l_info[DT_SYMTAB])
|
|
+ reloc_result->boundndx);
|
|
|
|
/* Set up the sym parameter. */
|
|
ElfW(Sym) sym = *defsym;
|
|
sym.st_value = DL_FIXUP_VALUE_ADDR (*value);
|
|
|
|
/* Get the symbol name. */
|
|
const char *strtab = (const void *) D_PTR (reloc_result->bound,
|
|
l_info[DT_STRTAB]);
|
|
const char *symname = strtab + sym.st_name;
|
|
|
|
/* Keep track of overwritten addresses. */
|
|
unsigned int flags = reloc_result->flags;
|
|
|
|
struct audit_ifaces *afct = GLRO(dl_audit);
|
|
for (unsigned int cnt = 0; cnt < GLRO(dl_naudit); ++cnt)
|
|
{
|
|
if (afct->ARCH_LA_PLTENTER != NULL
|
|
&& (reloc_result->enterexit
|
|
& (LA_SYMB_NOPLTENTER << (2 * (cnt + 1)))) == 0)
|
|
{
|
|
long int new_framesize = -1;
|
|
struct auditstate *l_state = link_map_audit_state (l, cnt);
|
|
struct auditstate *bound_state
|
|
= link_map_audit_state (reloc_result->bound, cnt);
|
|
uintptr_t new_value
|
|
= afct->ARCH_LA_PLTENTER (&sym, reloc_result->boundndx,
|
|
&l_state->cookie, &bound_state->cookie,
|
|
regs, &flags, symname, &new_framesize);
|
|
if (new_value != (uintptr_t) sym.st_value)
|
|
{
|
|
flags |= LA_SYMB_ALTVALUE;
|
|
sym.st_value = new_value;
|
|
}
|
|
|
|
/* Remember the results for every audit library and store a summary
|
|
in the first two bits. */
|
|
reloc_result->enterexit |= ((flags & (LA_SYMB_NOPLTENTER
|
|
| LA_SYMB_NOPLTEXIT))
|
|
<< (2 * (cnt + 1)));
|
|
|
|
if ((reloc_result->enterexit & (LA_SYMB_NOPLTEXIT
|
|
<< (2 * (cnt + 1))))
|
|
== 0 && new_framesize != -1 && *framesize != -2)
|
|
{
|
|
/* If this is the first call providing information, use it. */
|
|
if (*framesize == -1)
|
|
*framesize = new_framesize;
|
|
/* If two pltenter calls provide conflicting information, use
|
|
the larger value. */
|
|
else if (new_framesize != *framesize)
|
|
*framesize = MAX (new_framesize, *framesize);
|
|
}
|
|
}
|
|
|
|
afct = afct->next;
|
|
}
|
|
|
|
*value = DL_FIXUP_ADDR_VALUE (sym.st_value);
|
|
}
|
|
|
|
void
|
|
DL_ARCH_FIXUP_ATTRIBUTE
|
|
_dl_audit_pltexit (struct link_map *l, ElfW(Word) reloc_arg,
|
|
const void *inregs, void *outregs)
|
|
{
|
|
const uintptr_t pltgot = (uintptr_t) D_PTR (l, l_info[DT_PLTGOT]);
|
|
|
|
/* This is the address in the array where we store the result of previous
|
|
relocations. */
|
|
// XXX Maybe the bound information must be stored on the stack since
|
|
// XXX with bind_not a new value could have been stored in the meantime.
|
|
struct reloc_result *reloc_result =
|
|
&l->l_reloc_result[reloc_index (pltgot, reloc_arg, sizeof (PLTREL))];
|
|
ElfW(Sym) *defsym = ((ElfW(Sym) *) D_PTR (reloc_result->bound,
|
|
l_info[DT_SYMTAB])
|
|
+ reloc_result->boundndx);
|
|
|
|
/* Set up the sym parameter. */
|
|
ElfW(Sym) sym = *defsym;
|
|
sym.st_value = DL_FIXUP_VALUE_ADDR (reloc_result->addr);
|
|
|
|
/* Get the symbol name. */
|
|
const char *strtab = (const void *) D_PTR (reloc_result->bound,
|
|
l_info[DT_STRTAB]);
|
|
const char *symname = strtab + sym.st_name;
|
|
|
|
struct audit_ifaces *afct = GLRO(dl_audit);
|
|
for (unsigned int cnt = 0; cnt < GLRO(dl_naudit); ++cnt)
|
|
{
|
|
if (afct->ARCH_LA_PLTEXIT != NULL
|
|
&& (reloc_result->enterexit
|
|
& (LA_SYMB_NOPLTEXIT >> (2 * cnt))) == 0)
|
|
{
|
|
struct auditstate *l_state = link_map_audit_state (l, cnt);
|
|
struct auditstate *bound_state
|
|
= link_map_audit_state (reloc_result->bound, cnt);
|
|
afct->ARCH_LA_PLTEXIT (&sym, reloc_result->boundndx,
|
|
&l_state->cookie, &bound_state->cookie,
|
|
inregs, outregs, symname);
|
|
}
|
|
|
|
afct = afct->next;
|
|
}
|
|
}
|