Skip to content

Lazy Binding

Most binaries are linked dynamically to reduce file size. Unlike static binaries, dynamic binaries do not include their library dependencies as part of the executable, but instead rely on the host system to provide the necessary libraries.

To further improve performance, symbol lookup (resolution of function names to the actual code in memory) in dynamic binaries is done lazily. In lazy binding, the symbol lookup is only carried out the first time the function is called and stored for later use. This way, library functions that are never used by the binary are never loaded or resolved.

The mechanism behind lazy binding mainly relies on two program sections: the Global Offset Table (GOT) and the Procedure Linkage Table (PLT). There is also a third section, got.plt, that stores references to addresses in the PLT.

The lazy binding process can be visualized with GDB. In the below examples, the GOT and got.plt are listed before and then after the callme_one function has been called.

  • Viewing the PLT:

    pwndbg> plt
    Section .plt 0x4006c0-0x400760:
    0x4006d0: puts@plt
    0x4006e0: printf@plt
    0x4006f0: callme_three@plt
    0x400700: memset@plt
    0x400710: read@plt
    0x400720: callme_one@plt
    0x400730: setvbuf@plt
    0x400740: callme_two@plt
    0x400750: exit@plt
    

  • GOT before the call to callme_one:

    pwndbg> got
    Filtering out read-only entries (display them with -r or --show-readonly)
    
    State of the GOT of /home/admin/sboxshare/ropemporium/03-callme/callme:
    GOT protection: Partial RELRO | Found 9 GOT entries passing the filter
    [0x601018] puts@GLIBC_2.2.5 -> 0x7f374806aaa0 (puts) ◂— endbr64
    [0x601020] printf@GLIBC_2.2.5 -> 0x7f3748042b40 (printf) ◂— endbr64
    [0x601028] callme_three -> 0x4006f6 (callme_three@plt+6) ◂— push 2
    [0x601030] memset@GLIBC_2.2.5 -> 0x7f3748155480 (__memset_avx2_unaligned_erms) ◂— endbr64
    [0x601038] read@GLIBC_2.2.5 -> 0x7f37480f4980 (read) ◂— endbr64
    [0x601040] callme_one -> 0x400726 (callme_one@plt+6) ◂— push 5
    [0x601048] setvbuf@GLIBC_2.2.5 -> 0x7f374806b250 (setvbuf) ◂— endbr64
    [0x601050] callme_two -> 0x400746 (callme_two@plt+6) ◂— push 7
    [0x601058] exit@GLIBC_2.2.5 -> 0x400756 (exit@plt+6) ◂— push 8
    pwndbg> disass 'callme_one@got.plt'
    Dump of assembler code for function callme_one@got.plt:
    0x0000000000400720 <+0>:     jmp    QWORD PTR [rip+0x20091a]        # 0x601040 <callme_one@got.plt>
    0x0000000000400726 <+6>:     push   0x5
    0x000000000040072b <+11>:    jmp    0x4006c0
    End of assembler dump.
    
    Before functions are resolved, their entries in the PLT are short stubs like the one above. The stubs push a reference to the the stack 0x5 in the case above and jump back to the top of the PLT. The entire PLT can be disassembled from the target address on the last line:

    pwndbg> x/30i 0x4006c0
    0x4006c0:    push   QWORD PTR [rip+0x200942]        # 0x601008
    0x4006c6:    jmp    QWORD PTR [rip+0x200944]        # 0x601010
    0x4006cc:    nop    DWORD PTR [rax+0x0]
    0x4006d0 <puts@plt>: jmp    QWORD PTR [rip+0x200942]        # 0x601018 <puts@got.plt>
    0x4006d6 <puts@plt+6>:       push   0x0
    0x4006db <puts@plt+11>:      jmp    0x4006c0
    0x4006e0 <printf@plt>:       jmp    QWORD PTR [rip+0x20093a]        # 0x601020 <printf@got.plt>
    0x4006e6 <printf@plt+6>:     push   0x1
    0x4006eb <printf@plt+11>:    jmp    0x4006c0
    0x4006f0 <callme_three@plt>: jmp    QWORD PTR [rip+0x200932]        # 0x601028 <callme_three@got.plt>
    0x4006f6 <callme_three@plt+6>:       push   0x2
    0x4006fb <callme_three@plt+11>:      jmp    0x4006c0
    0x400700 <memset@plt>:       jmp    QWORD PTR [rip+0x20092a]        # 0x601030 <memset@got.plt>
    0x400706 <memset@plt+6>:     push   0x3
    0x40070b <memset@plt+11>:    jmp    0x4006c0
    0x400710 <read@plt>: jmp    QWORD PTR [rip+0x200922]        # 0x601038 <read@got.plt>
    0x400716 <read@plt+6>:       push   0x4
    0x40071b <read@plt+11>:      jmp    0x4006c0
    0x400720 <callme_one@plt>:   jmp    QWORD PTR [rip+0x20091a]        # 0x601040 <callme_one@got.plt>
    0x400726 <callme_one@plt+6>: push   0x5
    0x40072b <callme_one@plt+11>:        jmp    0x4006c0
    ...
    
  • GOT after the call to callme_one:

    pwndbg> got
    Filtering out read-only entries (display them with -r or --show-readonly)
    
    State of the GOT of /home/admin/sboxshare/ropemporium/03-callme/callme:
    GOT protection: Partial RELRO | Found 9 GOT entries passing the filter
    [0x601018] puts@GLIBC_2.2.5 -> 0x7f374806aaa0 (puts) ◂— endbr64
    [0x601020] printf@GLIBC_2.2.5 -> 0x7f3748042b40 (printf) ◂— endbr64
    [0x601028] callme_three -> 0x4006f6 (callme_three@plt+6) ◂— push 2
    [0x601030] memset@GLIBC_2.2.5 -> 0x7f3748155480 (__memset_avx2_unaligned_erms) ◂— endbr64
    [0x601038] read@GLIBC_2.2.5 -> 0x7f37480f4980 (read) ◂— endbr64
    [0x601040] callme_one -> 0x7f374820081a (callme_one) ◂— push rbp
    [0x601048] setvbuf@GLIBC_2.2.5 -> 0x7f374806b250 (setvbuf) ◂— endbr64
    [0x601050] callme_two -> 0x400746 (callme_two@plt+6) ◂— push 7
    [0x601058] exit@GLIBC_2.2.5 -> 0x400756 (exit@plt+6) ◂— push 8
    

    Once the callme_one function is called and resolved, the address on the GOT is updated to point to the callme_one function code. The code can be found by disassembling from the highlighted address above, or by repeating the disassembly from got.plt from earlier:

  • got.plt after the call to callme_one:

    pwndbg> disass 'callme_one@got.plt'
    Dump of assembler code for function callme_one:
    0x00007f374820081a <+0>:     push   rbp
    0x00007f374820081b <+1>:     mov    rbp,rsp
    0x00007f374820081e <+4>:     sub    rsp,0x30
    0x00007f3748200822 <+8>:     mov    QWORD PTR [rbp-0x18],rdi
    0x00007f3748200826 <+12>:    mov    QWORD PTR [rbp-0x20],rsi
    0x00007f374820082a <+16>:    mov    QWORD PTR [rbp-0x28],rdx
    0x00007f374820082e <+20>:    movabs rax,0xdeadbeefdeadbeef
    0x00007f3748200838 <+30>:    cmp    QWORD PTR [rbp-0x18],rax
    0x00007f374820083c <+34>:    jne    0x7f3748200912 <callme_one+248>
    0x00007f3748200842 <+40>:    movabs rax,0xcafebabecafebabe
    0x00007f374820084c <+50>:    cmp    QWORD PTR [rbp-0x20],rax
    ...
    
    For comparison, a function such as callme_two, that hasn't been called yet will have the same function stub in both the PLT and got.plt:

    pwndbg> disass 'callme_two@plt'
    Dump of assembler code for function callme_two@plt:
    0x0000000000400740 <+0>:     jmp    QWORD PTR [rip+0x20090a]        # 0x601050 <callme_two@got.plt>
    0x0000000000400746 <+6>:     push   0x7
    0x000000000040074b <+11>:    jmp    0x4006c0
    End of assembler dump.
    pwndbg> disass 'callme_two@got.plt'
    Dump of assembler code for function callme_two@plt:
    0x0000000000400740 <+0>:     jmp    QWORD PTR [rip+0x20090a]        # 0x601050 <callme_two@got.plt>
    0x0000000000400746 <+6>:     push   0x7
    0x000000000040074b <+11>:    jmp    0x4006c0
    End of assembler dump.