std::string error_msg; { art::JavaVMExt* vm = art::Runtime::Current()->GetJavaVM(); boolsuccess= vm->LoadNativeLibrary(env, filename.c_str(), javaLoader, caller, &error_msg); if (success) { return nullptr; } }
// Don't let a pending exception from JNI_OnLoad cause a CheckJNI issue with NewStringUTF. env->ExceptionClear(); return env->NewStringUTF(error_msg.c_str()); }
//android-platform\bionic\libc\kernel\uapi\asm-generic\int-ll64.h //__signed__-->signed typedef signed char __s8; typedef unsigned char __u8; typedef signed short __s16; typedef unsigned short __u16; typedef signed int __s32; typedef unsigned int __u32; typedef signed long long __s64; typedef unsigned long long __u64;
typedef struct elf64_rel { Elf64_Addr r_offset; /* Location at which to apply the action */ Elf64_Xword r_info; /* index and type of relocation */ } Elf64_Rel;
typedef struct elf64_rela { Elf64_Addr r_offset; /* Location at which to apply the action */ Elf64_Xword r_info; /* index and type of relocation */ Elf64_Sxword r_addend; /* Constant addend used to compute value */ } Elf64_Rela;
typedef struct elf64_sym { Elf64_Word st_name; /* Symbol name, index in string tbl */ unsigned char st_info; /* Type and binding attributes */ unsigned char st_other; /* No defined meaning, 0 */ Elf64_Half st_shndx; /* Associated section index */ Elf64_Addr st_value; /* Value of the symbol */ Elf64_Xword st_size; /* Associated symbol size */ } Elf64_Sym;
struct soinfo { #if defined(__work_around_b_24465209__) char old_name_[SOINFO_NAME_LEN]; #endif const ElfW(Phdr)* phdr; size_t phnum; #if defined(__work_around_b_24465209__) ElfW(Addr) unused0; // DO NOT USE, maintained for compatibility. #endif ElfW(Addr) base; size_t size;
#if defined(__work_around_b_24465209__) uint32_t unused1; // DO NOT USE, maintained for compatibility. #endif
ElfW(Dyn)* dynamic;
#if defined(__work_around_b_24465209__) uint32_t unused2; // DO NOT USE, maintained for compatibility uint32_t unused3; // DO NOT USE, maintained for compatibility #endif
#if defined(__arm__) // ARM EABI section used for stack unwinding. uint32_t* ARM_exidx; size_t ARM_exidx_count; #endif size_t ref_count_;
link_map link_map_head;
bool constructors_called;
// When you read a virtual address from the ELF file, add this // value to get the corresponding address in the process' address space. ElfW(Addr) load_bias;
//android-platform\bionic\linker\linker.cpp static soinfo* find_library(android_namespace_t* ns, const char* name, int rtld_flags, const android_dlextinfo* extinfo, soinfo* needed_by) { soinfo* si = nullptr;
// 如果 name 是空的,则为 si 赋值为 somain //somain: main process, always the one after libdl_info if (name == nullptr) { si = solist_get_somain();// 这个函数将会返回 somain; } elseif (!find_libraries(ns, needed_by, &name, 1, &si, nullptr, 0, rtld_flags, extinfo, false/* add_as_children */)) { if (si != nullptr) { soinfo_unload(si); } return nullptr; }
// 加载 so 成功,so 的引用次数 + 1, 对应了 JavaVMExt::LoadNativeLibrary 中 //so 加载时 这一部分的注释↓ /* Below we dlopen but there is no paired dlclose, this would be necessary if we supported class unloading. Libraries will only be unloaded when the reference count (incremented by dlopen) becomes zero from dlclose. */ si->increment_ref_count();
return si; }
find_libraries
Linker在加載so時大致可以分成五步:
讀取so文件:讀取ehdr( Elf header )、phdr( Program header )等信息。
// list of libraries to link - see step 2. size_tsoinfos_count=0; // 加载任务清理 autoscope_guard= android::base::make_scope_guard([&]() { for (LoadTask* t : load_tasks) { LoadTask::deleter(t); } });
// Step 1: expand the list of load_tasks to include // all DT_NEEDED libraries (do not load them just yet) for (size_ti=0; i<load_tasks.size(); ++i) { LoadTask* task = load_tasks[i]; soinfo* needed_by = task->get_needed_by();
// Note: start from the namespace that is stored in the LoadTask. This namespace // is different from the current namespace when the LoadTask is for a transitive // dependency and the lib that created the LoadTask is not found in the // current namespace but in one of the linked namespace. if (!find_library_internal(const_cast<android_namespace_t*>(task->get_start_from()), task, &zip_archive_cache, &load_tasks, rtld_flags)) { returnfalse; }
soinfo* si = task->get_soinfo();
if (is_dt_needed) { needed_by->add_child(si); }
// When ld_preloads is not null, the first // ld_preloads_count libs are in fact ld_preloads. boolis_ld_preload=false; if (ld_preloads != nullptr && soinfos_count < ld_preloads_count) { ld_preloads->push_back(si); is_ld_preload = true; }
if (soinfos_count < library_names_count) { soinfos[soinfos_count++] = si; }
// Add the new global group members to all initial namespaces. Do this secondary namespace setup // at the same time that libraries are added to their primary namespace so that the order of // global group members is the same in the every namespace. Only add a library to a namespace // once, even if it appears multiple times in the dependency graph. if (is_ld_preload || (si->get_dt_flags_1() & DF_1_GLOBAL) != 0) { if (!si->is_linked() && namespaces != nullptr && !new_global_group_members.contains(si)) { new_global_group_members.push_back(si); for (auto linked_ns : *namespaces) { if (si->get_primary_namespace() != linked_ns) { linked_ns->add_soinfo(si); si->add_secondary_namespace(linked_ns); } } } } }
// Library might still be loaded, the accurate detection // of this fact is done by load_library. TRACE("[ \"%s\" find_loaded_library_by_soname failed (*candidate=%s@%p). Trying harder... ]", task->get_name(), candidate == nullptr ? "n/a" : candidate->get_realpath(), candidate);
// TODO(dimitry): workaround for http://b/26394120 (the exempt-list) //exempt lib, 即已经预置在系统库中的 so, 例如 libcrypto.so,libssl.so // 等等比较著名的库,假如发现是这些库的话,用默认命名空间获取 soinfo if (ns->is_exempt_list_enabled() && is_exempt_lib(ns, task->get_name(), task->get_needed_by())) { // For the libs in the exempt-list, switch to the default namespace and then // try the load again from there. The library could be loaded from the // default namespace or from another namespace (e.g. runtime) that is linked // from the default namespace. LD_LOG(kLogDlopen, "find_library_internal(ns=%s, task=%s): Exempt system library - trying namespace %s", ns->get_name(), task->get_name(), g_default_namespace.get_name()); ns = &g_default_namespace; if (load_library(ns, task, zip_archive_cache, load_tasks, rtld_flags, true/* search_linked_namespaces */)) { returntrue; } } // END OF WORKAROUND
// if a library was not found - look into linked namespaces // preserve current dlerror in the case it fails. // 假如找遍了自己的命名空间还是没找到这个 so 的依赖库的话,就去共享命名空间 (linked namespace) // 里面去找找看 DlErrorRestorer dlerror_restorer; LD_LOG(kLogDlopen, "find_library_internal(ns=%s, task=%s): Trying %zu linked namespaces", ns->get_name(), task->get_name(), ns->linked_namespaces().size()); for (auto& linked_namespace : ns->linked_namespaces()) { if (find_library_in_linked_namespace(linked_namespace, task)) { // Library is already loaded. if (task->get_soinfo() != nullptr) { // n.b. This code path runs when find_library_in_linked_namespace found an already-loaded // library by soname. That should only be possible with a exempt-list lookup, where we // switch the namespace, because otherwise, find_library_in_linked_namespace is duplicating // the soname scan done in this function's first call to find_loaded_library_by_soname. returntrue; }
if (load_library(linked_namespace.linked_namespace(), task, zip_archive_cache, load_tasks, rtld_flags, false/* search_linked_namespaces */)) { LD_LOG(kLogDlopen, "find_library_internal(ns=%s, task=%s): Found in linked namespace %s", ns->get_name(), task->get_name(), linked_namespace.linked_namespace()->get_name()); returntrue; } } }
std::string realpath; if (!realpath_fd(extinfo->library_fd, &realpath)) { if (!is_first_stage_init()) { PRINT( "warning: unable to get realpath for the library \"%s\" by extinfo->library_fd. " "Will use given name.", name); } realpath = name; }
// Open the file. off64_t file_offset; std::string realpath; int fd = open_library(ns, zip_archive_cache, name, needed_by, &file_offset, &realpath); // 如果打开 so 失败,寻找失败原因 if (fd == -1) { if (task->is_dt_needed()) { if (needed_by->is_main_executable()) { DL_OPEN_ERR("library \"%s\" not found: needed by main executable", name); } else { DL_OPEN_ERR("library \"%s\" not found: needed by %s in namespace %s", name, needed_by->get_realpath(), task->get_start_from()->get_name()); } } else { DL_OPEN_ERR("library \"%s\" not found", name); } returnfalse; }
//set fd and file_offset task->set_fd(fd, true); task->set_file_offset(file_offset);
// If the name contains a slash, we should attempt to open it directly and not search the paths. // 有斜杠,说明是绝对路径打开的 if (strchr(name, '/') != nullptr) { return open_library_at_path(zip_archive_cache, name, file_offset, realpath); }
// LD_LIBRARY_PATH has the highest priority. We don't have to check accessibility when searching // the namespace's path lists, because anything found on a namespace path list should always be // accessible. intfd= open_library_on_paths(zip_archive_cache, name, file_offset, ns->get_ld_library_paths(), realpath);
// Try the DT_RUNPATH, and verify that the library is accessible. if (fd == -1 && needed_by != nullptr) { fd = open_library_on_paths(zip_archive_cache, name, file_offset, needed_by->get_dt_runpath(), realpath); if (fd != -1 && !ns->is_accessible(*realpath)) { close(fd); fd = -1; } }
// Finally search the namespace's main search path list. if (fd == -1) { fd = open_library_on_paths(zip_archive_cache, name, file_offset, ns->get_default_library_paths(), realpath); }
return fd; }
在 open_library_at_path 中才算是真正的使用 open 函数打开了这个 so, 并返回文件描述符 fd , 传入的两个标志的含义分别为
if (fd == -1) { fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_CLOEXEC)); if (fd != -1) { *file_offset = 0; if (!realpath_fd(fd, realpath)) { if (!is_first_stage_init()) { PRINT("warning: unable to get realpath for the library \"%s\". Will use given path.", path); } *realpath = path; } } }
soinfo* si = soinfo_alloc(ns, realpath.c_str(), &file_stat, file_offset, rtld_flags);
task->set_soinfo(si);
// Read the ELF header and some of the segments. if (!task->read(realpath.c_str(), file_stat.st_size)) { task->remove_cached_elf_reader(); task->set_soinfo(nullptr); soinfo_free(si); returnfalse; }
// Find and set DT_RUNPATH, DT_SONAME, and DT_FLAGS_1. // Note that these field values are temporary and are // going to be overwritten on soinfo::prelink_image // with values from PT_LOAD segments. const ElfReader& elf_reader = task->get_elf_reader(); for (constElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { if (d->d_tag == DT_RUNPATH) { si->set_dt_runpath(elf_reader.get_string(d->d_un.d_val)); } if (d->d_tag == DT_SONAME) { si->set_soname(elf_reader.get_string(d->d_un.d_val)); } // We need to identify a DF_1_GLOBAL library early so we can link it to namespaces. if (d->d_tag == DT_FLAGS_1) { si->set_dt_flags_1(d->d_un.d_val); } }
//android-platform\bionic\linker\linker.cpp // Find and set DT_RUNPATH, DT_SONAME, and DT_FLAGS_1. // Note that these field values are temporary and are // going to be overwritten on soinfo::prelink_image // with values from PT_LOAD segments. const ElfReader& elf_reader = task->get_elf_reader(); for (constElfW(Dyn)* d = elf_reader.dynamic(); d->d_tag != DT_NULL; ++d) { if (d->d_tag == DT_RUNPATH) { si->set_dt_runpath(elf_reader.get_string(d->d_un.d_val)); } if (d->d_tag == DT_SONAME) { si->set_soname(elf_reader.get_string(d->d_un.d_val)); } // We need to identify a DF_1_GLOBAL library early so we can link it to namespaces. if (d->d_tag == DT_FLAGS_1) { si->set_dt_flags_1(d->d_un.d_val); } }
之后找到待加载的 so 的依赖库,这里有一个模板函数 for_each_dt_needed , 找到 .dynamic 中所有带有 DT_NEEDED 标志的字符串,这些字符串的名称就是这个 so 所需要的依赖库,然后将它们添加到 load_tasks 队列中
// Step 2: Load libraries in random order (see b/24047022) LoadTaskList load_list; for (auto&& task : load_tasks) { soinfo* si = task->get_soinfo(); auto pred = [&](const LoadTask* t) { return t->get_soinfo() == si; };
if (!si->is_linked() && std::find_if(load_list.begin(), load_list.end(), pred) == load_list.end() ) { load_list.push_back(task); } } bool reserved_address_recursive = false; if (extinfo) { reserved_address_recursive = extinfo->flags & ANDROID_DLEXT_RESERVED_ADDRESS_RECURSIVE; } if (!reserved_address_recursive) { // Shuffle the load order in the normal case, but not if we are loading all // the libraries to a reserved address range. shuffle(&load_list); }
// Set up address space parameters. address_space_params extinfo_params, default_params; size_t relro_fd_offset = 0; if (extinfo) { if (extinfo->flags & ANDROID_DLEXT_RESERVED_ADDRESS) { extinfo_params.start_addr = extinfo->reserved_addr; extinfo_params.reserved_size = extinfo->reserved_size; extinfo_params.must_use_address = true; } elseif (extinfo->flags & ANDROID_DLEXT_RESERVED_ADDRESS_HINT) { extinfo_params.start_addr = extinfo->reserved_addr; extinfo_params.reserved_size = extinfo->reserved_size; } }
for (auto&& task : load_list) { address_space_params* address_space = (reserved_address_recursive || !task->is_dt_needed()) ? &extinfo_params : &default_params; // 加载所有的库,包括待加载的 so if (!task->load(address_space)) { returnfalse; } }
// Step 3: pre-link all DT_NEEDED libraries in breadth first order. for (auto&& task : load_tasks) { soinfo* si = task->get_soinfo(); if (!si->is_linked() && !si->prelink_image()) { returnfalse; } register_soinfo_tls(si); }
TlsSegment tls_segment; if (__bionic_get_tls_segment(phdr, phnum, load_bias, &tls_segment)) { if (!__bionic_check_tls_alignment(&tls_segment.alignment)) { if (!relocating_linker) { DL_ERR("TLS segment alignment in \"%s\" is not a power of 2: %zu", get_realpath(), tls_segment.alignment); } returnfalse; } tls_ = std::make_unique<soinfo_tls>(); tls_->segment = tls_segment; }
// Extract useful information from dynamic section. // Note that: "Except for the DT_NULL element at the end of the array, // and the relative order of DT_NEEDED elements, entries may appear in any order." // // source: http://www.sco.com/developers/gabi/1998-04-29/ch5.dynamic.html uint32_t needed_count = 0; // 循环遍历每个动态节,并根据 d_tag 为对应节做相应的处理 for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { DEBUG("d = %p, d[0](tag) = %p d[1](val) = %p", d, reinterpret_cast<void*>(d->d_tag), reinterpret_cast<void*>(d->d_un.d_val)); switch (d->d_tag) { case DT_SONAME: // this is parsed after we have strtab initialized (see below). break;
if (!powerof2(gnu_maskwords_)) { DL_ERR("invalid maskwords for gnu_hash = 0x%x, in \"%s\" expecting power to two", gnu_maskwords_, get_realpath()); returnfalse; } --gnu_maskwords_;
flags_ |= FLAG_GNU_HASH; break;
case DT_STRTAB: strtab_ = reinterpret_cast<constchar*>(load_bias + d->d_un.d_ptr); break;
case DT_STRSZ: strtab_size_ = d->d_un.d_val; break;
case DT_SYMTAB: symtab_ = reinterpret_cast<ElfW(Sym)*>(load_bias + d->d_un.d_ptr); break;
case DT_SYMENT: if (d->d_un.d_val != sizeof(ElfW(Sym))) { DL_ERR("invalid DT_SYMENT: %zd in \"%s\"", static_cast<size_t>(d->d_un.d_val), get_realpath()); returnfalse; } break;
case DT_PLTREL: #if defined(USE_RELA) if (d->d_un.d_val != DT_RELA) { DL_ERR("unsupported DT_PLTREL in \"%s\"; expected DT_RELA", get_realpath()); returnfalse; } #else if (d->d_un.d_val != DT_REL) { DL_ERR("unsupported DT_PLTREL in \"%s\"; expected DT_REL", get_realpath()); returnfalse; } #endif break;
case DT_PLTGOT: // Ignored (because RTLD_LAZY is not supported). break;
case DT_DEBUG: // Set the DT_DEBUG entry to the address of _r_debug for GDB // if the dynamic table is writable if ((dynamic_flags & PF_W) != 0) { d->d_un.d_val = reinterpret_cast<uintptr_t>(&_r_debug); } break; #if defined(USE_RELA) case DT_RELA: rela_ = reinterpret_cast<ElfW(Rela)*>(load_bias + d->d_un.d_ptr); break;
case DT_RELASZ: rela_count_ = d->d_un.d_val / sizeof(ElfW(Rela)); break;
case DT_ANDROID_RELA: android_relocs_ = reinterpret_cast<uint8_t*>(load_bias + d->d_un.d_ptr); break;
case DT_ANDROID_RELASZ: android_relocs_size_ = d->d_un.d_val; break;
case DT_ANDROID_REL: DL_ERR("unsupported DT_ANDROID_REL in \"%s\"", get_realpath()); returnfalse;
case DT_ANDROID_RELSZ: DL_ERR("unsupported DT_ANDROID_RELSZ in \"%s\"", get_realpath()); returnfalse;
case DT_RELAENT: if (d->d_un.d_val != sizeof(ElfW(Rela))) { DL_ERR("invalid DT_RELAENT: %zd", static_cast<size_t>(d->d_un.d_val)); returnfalse; } break;
// Ignored (see DT_RELCOUNT comments for details). case DT_RELACOUNT: break;
case DT_REL: DL_ERR("unsupported DT_REL in \"%s\"", get_realpath()); returnfalse;
case DT_RELSZ: DL_ERR("unsupported DT_RELSZ in \"%s\"", get_realpath()); returnfalse;
#else case DT_REL: rel_ = reinterpret_cast<ElfW(Rel)*>(load_bias + d->d_un.d_ptr); break;
case DT_RELSZ: rel_count_ = d->d_un.d_val / sizeof(ElfW(Rel)); break;
case DT_RELENT: if (d->d_un.d_val != sizeof(ElfW(Rel))) { DL_ERR("invalid DT_RELENT: %zd", static_cast<size_t>(d->d_un.d_val)); returnfalse; } break;
case DT_ANDROID_REL: android_relocs_ = reinterpret_cast<uint8_t*>(load_bias + d->d_un.d_ptr); break;
case DT_ANDROID_RELSZ: android_relocs_size_ = d->d_un.d_val; break;
case DT_ANDROID_RELA: DL_ERR("unsupported DT_ANDROID_RELA in \"%s\"", get_realpath()); returnfalse;
case DT_ANDROID_RELASZ: DL_ERR("unsupported DT_ANDROID_RELASZ in \"%s\"", get_realpath()); returnfalse;
// "Indicates that all RELATIVE relocations have been concatenated together, // and specifies the RELATIVE relocation count." // // TODO: Spec also mentions that this can be used to optimize relocation process; // Not currently used by bionic linker - ignored. case DT_RELCOUNT: break;
case DT_RELA: DL_ERR("unsupported DT_RELA in \"%s\"", get_realpath()); returnfalse;
case DT_RELASZ: DL_ERR("unsupported DT_RELASZ in \"%s\"", get_realpath()); returnfalse;
#endif case DT_RELR: case DT_ANDROID_RELR: relr_ = reinterpret_cast<ElfW(Relr)*>(load_bias + d->d_un.d_ptr); break;
case DT_RELRSZ: case DT_ANDROID_RELRSZ: relr_count_ = d->d_un.d_val / sizeof(ElfW(Relr)); break;
case DT_RELRENT: case DT_ANDROID_RELRENT: if (d->d_un.d_val != sizeof(ElfW(Relr))) { DL_ERR("invalid DT_RELRENT: %zd", static_cast<size_t>(d->d_un.d_val)); returnfalse; } break;
// Ignored (see DT_RELCOUNT comments for details). // There is no DT_RELRCOUNT specifically because it would only be ignored. case DT_ANDROID_RELRCOUNT: break;
case DT_INIT: init_func_ = reinterpret_cast<linker_ctor_function_t>(load_bias + d->d_un.d_ptr); DEBUG("%s constructors (DT_INIT) found at %p", get_realpath(), init_func_); break;
case DT_FINI: fini_func_ = reinterpret_cast<linker_dtor_function_t>(load_bias + d->d_un.d_ptr); DEBUG("%s destructors (DT_FINI) found at %p", get_realpath(), fini_func_); break;
case DT_INIT_ARRAY: init_array_ = reinterpret_cast<linker_ctor_function_t*>(load_bias + d->d_un.d_ptr); DEBUG("%s constructors (DT_INIT_ARRAY) found at %p", get_realpath(), init_array_); break;
case DT_INIT_ARRAYSZ: init_array_count_ = static_cast<uint32_t>(d->d_un.d_val) / sizeof(ElfW(Addr)); break;
case DT_FINI_ARRAY: fini_array_ = reinterpret_cast<linker_dtor_function_t*>(load_bias + d->d_un.d_ptr); DEBUG("%s destructors (DT_FINI_ARRAY) found at %p", get_realpath(), fini_array_); break;
case DT_FINI_ARRAYSZ: fini_array_count_ = static_cast<uint32_t>(d->d_un.d_val) / sizeof(ElfW(Addr)); break;
case DT_PREINIT_ARRAY: preinit_array_ = reinterpret_cast<linker_ctor_function_t*>(load_bias + d->d_un.d_ptr); DEBUG("%s constructors (DT_PREINIT_ARRAY) found at %p", get_realpath(), preinit_array_); break;
case DT_PREINIT_ARRAYSZ: preinit_array_count_ = static_cast<uint32_t>(d->d_un.d_val) / sizeof(ElfW(Addr)); break;
case DT_TEXTREL: #if defined(__LP64__) DL_ERR("\"%s\" has text relocations", get_realpath()); returnfalse; #else has_text_relocations = true; break; #endif
case DT_SYMBOLIC: has_DT_SYMBOLIC = true; break;
case DT_NEEDED: ++needed_count; break;
case DT_FLAGS: if (d->d_un.d_val & DF_TEXTREL) { #if defined(__LP64__) DL_ERR("\"%s\" has text relocations", get_realpath()); returnfalse; #else has_text_relocations = true; #endif } if (d->d_un.d_val & DF_SYMBOLIC) { has_DT_SYMBOLIC = true; } break;
// Ignored: "Its use has been superseded by the DF_BIND_NOW flag" case DT_BIND_NOW: break;
case DT_VERSYM: versym_ = reinterpret_cast<ElfW(Versym)*>(load_bias + d->d_un.d_ptr); break;
case DT_VERDEF: verdef_ptr_ = load_bias + d->d_un.d_ptr; break; case DT_VERDEFNUM: verdef_cnt_ = d->d_un.d_val; break;
case DT_VERNEED: verneed_ptr_ = load_bias + d->d_un.d_ptr; break;
case DT_VERNEEDNUM: verneed_cnt_ = d->d_un.d_val; break;
case DT_RUNPATH: // this is parsed after we have strtab initialized (see below). break;
case DT_TLSDESC_GOT: case DT_TLSDESC_PLT: // These DT entries are used for lazy TLSDESC relocations. Bionic // resolves everything eagerly, so these can be ignored. break;
#if defined(__aarch64__) case DT_AARCH64_BTI_PLT: case DT_AARCH64_PAC_PLT: case DT_AARCH64_VARIANT_PCS: // Ignored: AArch64 processor-specific dynamic array tags. break; #endif
// Validity checks. if (relocating_linker && needed_count != 0) { DL_ERR("linker cannot have DT_NEEDED dependencies on other libraries"); returnfalse; } if (nbucket_ == 0 && gnu_nbucket_ == 0) { DL_ERR("empty/missing DT_HASH/DT_GNU_HASH in \"%s\" " "(new hash type from the future?)", get_realpath()); returnfalse; } if (strtab_ == nullptr) { DL_ERR("empty/missing DT_STRTAB in \"%s\"", get_realpath()); returnfalse; } if (symtab_ == nullptr) { DL_ERR("empty/missing DT_SYMTAB in \"%s\"", get_realpath()); returnfalse; }
// Second pass - parse entries relying on strtab. Skip this while relocating the linker so as to // avoid doing heap allocations until later in the linker's initialization. if (!relocating_linker) { for (ElfW(Dyn)* d = dynamic; d->d_tag != DT_NULL; ++d) { switch (d->d_tag) { case DT_SONAME: set_soname(get_string(d->d_un.d_val)); break; case DT_RUNPATH: set_dt_runpath(get_string(d->d_un.d_val)); break; } } }
// Before M release, linker was using basename in place of soname. In the case when DT_SONAME is // absent some apps stop working because they can't find DT_NEEDED library by soname. This // workaround should keep them working. (Applies only for apps targeting sdk version < M.) Make // an exception for the main executable, which does not need to have DT_SONAME. The linker has an // DT_SONAME but the soname_ field is initialized later on. if (soname_.empty() && this != solist_get_somain() && !relocating_linker && get_application_target_sdk_version() < 23) { soname_ = basename(realpath_.c_str()); DL_WARN_documented_change(23, "missing-soname-enforced-for-api-level-23", "\"%s\" has no DT_SONAME (will use %s instead)", get_realpath(), soname_.c_str());
// Don't call add_dlwarning because a missing DT_SONAME isn't important enough to show in the UI }
// Validate each library's verdef section once, so we don't have to validate // it each time we look up a symbol with a version. if (!validate_verdef_section(this)) returnfalse;
flags_ |= FLAG_PRELINKED; returntrue; }
构造全局组
为预链接的依赖库设置 DF_1_GLOBAL 全局标志,来标记这个库在全局组中
1 2 3 4 5 6 7 8
// Step 4: Construct the global group. DF_1_GLOBAL bit is force set for LD_PRELOADed libs because // they must be added to the global group. Note: The DF_1_GLOBAL bit for a library is normally set // in step 3. if (ld_preloads != nullptr) { for (auto&& si : *ld_preloads) { si->set_dt_flags_1(si->get_dt_flags_1() | DF_1_GLOBAL); } }
// Step 5: Collect roots of local_groups. // Whenever needed_by->si link crosses a namespace boundary it forms its own local_group. // Here we collect new roots to link them separately later on. Note that we need to avoid // collecting duplicates. Also the order is important. They need to be linked in the same // BFS order we link individual libraries. std::vector<soinfo*> local_group_roots; if (start_with != nullptr && add_as_children) { local_group_roots.push_back(start_with); } else { CHECK(soinfos_count == 1); local_group_roots.push_back(soinfos[0]); }
// Step 6: Link all local groups for (auto root : local_group_roots) { soinfo_list_t local_group; android_namespace_t* local_group_ns = root->get_primary_namespace();
bool linked = local_group.visit([&](soinfo* si) { // Even though local group may contain accessible soinfos from other namespaces // we should avoid linking them (because if they are not linked -> they // are in the local_group_roots and will be linked later). if (!si->is_linked() && si->get_primary_namespace() == local_group_ns) { const android_dlextinfo* link_extinfo = nullptr; if (si == soinfos[0] || reserved_address_recursive) { // Only forward extinfo for the first library unless the recursive // flag is set. link_extinfo = extinfo; } if (__libc_shared_globals()->load_hook) { __libc_shared_globals()->load_hook(si->load_bias, si->phdr, si->phnum); } lookup_list.set_dt_symbolic_lib(si->has_DT_SYMBOLIC ? si : nullptr); // 调用 link_image 开始进行依赖库的动态链接,重定位等工作 if (!si->link_image(lookup_list, local_group_root, link_extinfo, &relro_fd_offset) || !get_cfi_shadow()->AfterLoad(si, solist_get_head())) { returnfalse; } }
if (!plain_relocate<RelocMode::Typical>(relocator, rela_, rela_count_)) { returnfalse; } } if (plt_rela_ != nullptr) { DEBUG("[ relocating %s plt rela ]", get_realpath()); if (!plain_relocate<RelocMode::JumpTable>(relocator, plt_rela_, plt_rela_count_)) { returnfalse; } } #else if (rel_ != nullptr) { DEBUG("[ relocating %s rel ]", get_realpath()); if (!plain_relocate<RelocMode::Typical>(relocator, rel_, rel_count_)) { returnfalse; } } if (plt_rel_ != nullptr) { DEBUG("[ relocating %s plt rel ]", get_realpath()); if (!plain_relocate<RelocMode::JumpTable>(relocator, plt_rel_, plt_rel_count_)) { returnfalse; } } #endif
// Once the tlsdesc_args_ vector's size is finalized, we can write the addresses of its elements // into the TLSDESC relocations. #if defined(__aarch64__) // Bionic currently only implements TLSDESC for arm64. for (const std::pair<TlsDescriptor*, size_t>& pair : relocator.deferred_tlsdesc_relocs) { TlsDescriptor* desc = pair.first; desc->func = tlsdesc_resolver_dynamic; desc->arg = reinterpret_cast<size_t>(&tlsdesc_args_[pair.second]); } #endif
if (IsGeneral && is_tls_reloc(r_type)) { ... } else { if (r_sym == 0) { // Do nothing. } else { // 利用 lookup_symbol 来查找符号 if (!lookup_symbol<IsGeneral>(relocator, r_sym, sym_name, &found_in, &sym)) returnfalse; if (sym != nullptr) { constbool should_protect_segments = handle_text_relocs && found_in == relocator.si && ELF_ST_TYPE(sym->st_info) == STT_GNU_IFUNC; if (should_protect_segments && !protect_segments()) returnfalse; sym_addr = found_in->resolve_symbol_address(sym); if (should_protect_segments && !unprotect_segments()) returnfalse; } elseifconstexpr (IsGeneral) { // A weak reference to an undefined symbol. We typically use a zero symbol address, but // use the relocation base for PC-relative relocations, so that the value written is zero. switch (r_type) { #if defined(__x86_64__) case R_X86_64_PC32: sym_addr = reinterpret_cast<ElfW(Addr)>(rel_target); break; #elif defined(__i386__) case R_386_PC32: sym_addr = reinterpret_cast<ElfW(Addr)>(rel_target); break; #endif } } } }
const SymbolLookupLib* end = lookup_list.end(); const SymbolLookupLib* it = lookup_list.begin();
while (true) { const SymbolLookupLib* lib; uint32_t sym_idx;
// Iterate over libraries until we find one whose Bloom filter matches the symbol we're // searching for. // 在每一个库中都去寻找有没有指定的符号 while (true) { if (it == end) returnnullptr; lib = it++;
// Step 7: Mark all load_tasks as linked and increment refcounts // for references between load_groups (at this point it does not matter if // referenced load_groups were loaded by previous dlopen or as part of this // one on step 6) if (start_with != nullptr && add_as_children) { start_with->set_linked(); }
for (auto&& task : load_tasks) { soinfo* si = task->get_soinfo(); si->set_linked(); }
for (auto&& task : load_tasks) { soinfo* si = task->get_soinfo(); soinfo* needed_by = task->get_needed_by(); if (needed_by != nullptr && needed_by != start_with && needed_by->get_local_group_root() != si->get_local_group_root()) { // 增加依赖库 so 的引用计数 si->increment_ref_count(); } }