1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116
  
     | 
    
      /* Audit modules for tst-audit24a.
   Copyright (C) 2022-2025 Free Software Foundation, Inc.
   This file is part of the GNU C Library.
   The GNU C Library is free software; you can redistribute it and/or
   modify it under the terms of the GNU Lesser General Public
   License as published by the Free Software Foundation; either
   version 2.1 of the License, or (at your option) any later version.
   The GNU C Library is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
   Lesser General Public License for more details.
   You should have received a copy of the GNU Lesser General Public
   License along with the GNU C Library; if not, see
   <https://www.gnu.org/licenses/>.  */
#include <link.h>
#include <inttypes.h>
#include <stdlib.h>
#include <string.h>
#include <tst-auditmod24.h>
#define AUDIT24_COOKIE     0x1
#define AUDIT24MOD1_COOKIE 0x2
#define AUDIT24MOD2_COOKIE 0x3
#ifndef TEST_NAME
# define TEST_NAME "tst-audit24a"
#endif
#ifndef TEST_MOD
# define TEST_MOD TEST_NAME
#endif
#ifndef TEST_FUNC
# define TEST_FUNC "tst_audit24a"
#endif
unsigned int
la_version (unsigned int version)
{
  return LAV_CURRENT;
}
unsigned int
la_objopen (struct link_map *map, Lmid_t lmid, uintptr_t *cookie)
{
  const char *p = strrchr (map->l_name, '/');
  const char *l_name = p == NULL ? TEST_NAME : p + 1;
  uintptr_t ck = -1;
  if (strcmp (l_name, TEST_MOD "mod1.so") == 0)
    ck = AUDIT24MOD1_COOKIE;
  else if (strcmp (l_name, TEST_MOD "mod2.so") == 0)
    ck = AUDIT24MOD2_COOKIE;
  else if (strcmp (l_name, TEST_NAME) == 0)
    ck = AUDIT24_COOKIE;
  *cookie = ck;
  return ck == -1 ? 0 : LA_FLG_BINDFROM | LA_FLG_BINDTO;
}
static int
tst_func1 (void)
{
  return 1;
}
static int
tst_func2 (void)
{
  return 10;
}
#if __ELF_NATIVE_CLASS == 64
uintptr_t
la_symbind64 (Elf64_Sym *sym, unsigned int ndx,
	      uintptr_t *refcook, uintptr_t *defcook,
	      unsigned int *flags, const char *symname)
#else
uintptr_t
la_symbind32 (Elf32_Sym *sym, unsigned int ndx,
	      uintptr_t *refcook, uintptr_t *defcook,
	      unsigned int *flags, const char *symname)
#endif
{
  if (*refcook == AUDIT24_COOKIE)
    {
      if (*defcook == AUDIT24MOD1_COOKIE)
	{
	  /* Check if bind-now symbols are advertised to not call the PLT
	     hooks.  */
	  test_symbind_flags (*flags);
	  if (strcmp (symname, TEST_FUNC "mod1_func1") == 0)
	    return (uintptr_t) tst_func1;
	  else if (strcmp (symname, TEST_FUNC "mod1_func2") == 0)
	    return sym->st_value;
	  abort ();
	}
      if (*defcook == AUDIT24MOD2_COOKIE
	  && (strcmp (symname, TEST_FUNC "mod2_func1") == 0))
	{
	  test_symbind_flags (*flags);
	  return (uintptr_t) tst_func2;
	}
      /* malloc functions.  */
      return sym->st_value;
    }
  if (symname[0] != '\0')
    abort ();
  return sym->st_value;
}
 
     |