elfinterp.c 9.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322
  1. /* Run an ELF binary on a linux system.
  2. Copyright (C) 1993, Eric Youngdale.
  3. This program is free software; you can redistribute it and/or modify
  4. it under the terms of the GNU General Public License as published by
  5. the Free Software Foundation; either version 2, or (at your option)
  6. any later version.
  7. This program is distributed in the hope that it will be useful,
  8. but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. GNU General Public License for more details.
  11. You should have received a copy of the GNU General Public License
  12. along with this program; if not, write to the Free Software
  13. Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
  14. #ifndef VERBOSE_DLINKER
  15. #define VERBOSE_DLINKER
  16. #endif
  17. #ifdef VERBOSE_DLINKER
  18. static char *_dl_reltypes[] =
  19. { "R_386_NONE", "R_386_32", "R_386_PC32", "R_386_GOT32",
  20. "R_386_PLT32", "R_386_COPY", "R_386_GLOB_DAT",
  21. "R_386_JMP_SLOT", "R_386_RELATIVE", "R_386_GOTOFF",
  22. "R_386_GOTPC", "R_386_NUM"
  23. };
  24. #endif
  25. /* Program to load an ELF binary on a linux system, and run it.
  26. References to symbols in sharable libraries can be resolved by either
  27. an ELF sharable library or a linux style of shared library. */
  28. /* Disclaimer: I have never seen any AT&T source code for SVr4, nor have
  29. I ever taken any courses on internals. This program was developed using
  30. information available through the book "UNIX SYSTEM V RELEASE 4,
  31. Programmers guide: Ansi C and Programming Support Tools", which did
  32. a more than adequate job of explaining everything required to get this
  33. working. */
  34. #include <sys/types.h>
  35. #include <errno.h>
  36. #include "elf.h"
  37. #include "hash.h"
  38. #include "syscall.h"
  39. #include "string.h"
  40. #include "sysdep.h"
  41. extern char *_dl_progname;
  42. extern int _dl_linux_resolve(void);
  43. unsigned long _dl_linux_resolver(struct elf_resolve *tpnt, int reloc_entry)
  44. {
  45. int reloc_type;
  46. Elf32_Rel *this_reloc;
  47. char *strtab;
  48. Elf32_Sym *symtab;
  49. Elf32_Rel *rel_addr;
  50. int symtab_index;
  51. char *new_addr;
  52. char **got_addr;
  53. unsigned long instr_addr;
  54. rel_addr = (Elf32_Rel *) (tpnt->dynamic_info[DT_JMPREL] + tpnt->loadaddr);
  55. this_reloc = rel_addr + (reloc_entry >> 3);
  56. reloc_type = ELF32_R_TYPE(this_reloc->r_info);
  57. symtab_index = ELF32_R_SYM(this_reloc->r_info);
  58. symtab = (Elf32_Sym *) (tpnt->dynamic_info[DT_SYMTAB] + tpnt->loadaddr);
  59. strtab = (char *) (tpnt->dynamic_info[DT_STRTAB] + tpnt->loadaddr);
  60. if (reloc_type != R_386_JMP_SLOT) {
  61. _dl_fdprintf(2, "%s: Incorrect relocation type in jump relocations\n",
  62. _dl_progname);
  63. _dl_exit(1);
  64. };
  65. /* Address of jump instruction to fix up */
  66. instr_addr = ((int) this_reloc->r_offset + (int) tpnt->loadaddr);
  67. got_addr = (char **) instr_addr;
  68. #ifdef DEBUG
  69. _dl_fdprintf(2, "Resolving symbol %s\n",
  70. strtab + symtab[symtab_index].st_name);
  71. #endif
  72. /* Get the address of the GOT entry */
  73. new_addr = _dl_find_hash(strtab + symtab[symtab_index].st_name,
  74. tpnt->symbol_scope, (int) got_addr, tpnt, 0);
  75. if (!new_addr) {
  76. _dl_fdprintf(2, "%s: can't resolve symbol '%s'\n",
  77. _dl_progname, strtab + symtab[symtab_index].st_name);
  78. _dl_exit(1);
  79. };
  80. /* #define DEBUG_LIBRARY */
  81. #ifdef DEBUG_LIBRARY
  82. if ((unsigned long) got_addr < 0x40000000) {
  83. _dl_fdprintf(2, "Calling library function: %s\n",
  84. strtab + symtab[symtab_index].st_name);
  85. } else {
  86. *got_addr = new_addr;
  87. }
  88. #else
  89. *got_addr = new_addr;
  90. #endif
  91. return (unsigned long) new_addr;
  92. }
  93. void _dl_parse_lazy_relocation_information(struct elf_resolve *tpnt,
  94. unsigned long rel_addr, unsigned long rel_size, int type)
  95. {
  96. int i;
  97. char *strtab;
  98. int reloc_type;
  99. int symtab_index;
  100. Elf32_Sym *symtab;
  101. Elf32_Rel *rpnt;
  102. unsigned long *reloc_addr;
  103. /* Now parse the relocation information */
  104. rpnt = (Elf32_Rel *) (rel_addr + tpnt->loadaddr);
  105. rel_size = rel_size / sizeof(Elf32_Rel);
  106. symtab =
  107. (Elf32_Sym *) (tpnt->dynamic_info[DT_SYMTAB] + tpnt->loadaddr);
  108. strtab = (char *) (tpnt->dynamic_info[DT_STRTAB] + tpnt->loadaddr);
  109. for (i = 0; i < rel_size; i++, rpnt++) {
  110. reloc_addr = (unsigned long *) (tpnt->loadaddr + (unsigned long) rpnt->r_offset);
  111. reloc_type = ELF32_R_TYPE(rpnt->r_info);
  112. symtab_index = ELF32_R_SYM(rpnt->r_info);
  113. /* When the dynamic linker bootstrapped itself, it resolved some symbols.
  114. Make sure we do not do them again */
  115. if (!symtab_index && tpnt->libtype == program_interpreter)
  116. continue;
  117. if (symtab_index && tpnt->libtype == program_interpreter &&
  118. _dl_symbol(strtab + symtab[symtab_index].st_name))
  119. continue;
  120. switch (reloc_type) {
  121. case R_386_NONE:
  122. break;
  123. case R_386_JMP_SLOT:
  124. *reloc_addr += (unsigned long) tpnt->loadaddr;
  125. break;
  126. default:
  127. _dl_fdprintf(2, "%s: (LAZY) can't handle reloc type ",
  128. _dl_progname);
  129. #ifdef VERBOSE_DLINKER
  130. _dl_fdprintf(2, "%s ", _dl_reltypes[reloc_type]);
  131. #endif
  132. if (symtab_index)
  133. _dl_fdprintf(2, "'%s'\n", strtab + symtab[symtab_index].st_name);
  134. _dl_exit(1);
  135. };
  136. };
  137. }
  138. int _dl_parse_relocation_information(struct elf_resolve *tpnt,
  139. unsigned long rel_addr, unsigned long rel_size, int type)
  140. {
  141. int i;
  142. char *strtab;
  143. int reloc_type;
  144. int goof = 0;
  145. Elf32_Sym *symtab;
  146. Elf32_Rel *rpnt;
  147. unsigned long *reloc_addr;
  148. unsigned long symbol_addr;
  149. int symtab_index;
  150. /* Now parse the relocation information */
  151. rpnt = (Elf32_Rel *) (rel_addr + tpnt->loadaddr);
  152. rel_size = rel_size / sizeof(Elf32_Rel);
  153. symtab =
  154. (Elf32_Sym *) (tpnt->dynamic_info[DT_SYMTAB] + tpnt->loadaddr);
  155. strtab = (char *) (tpnt->dynamic_info[DT_STRTAB] + tpnt->loadaddr);
  156. for (i = 0; i < rel_size; i++, rpnt++) {
  157. reloc_addr = (unsigned long *) (tpnt->loadaddr + (unsigned long) rpnt->r_offset);
  158. reloc_type = ELF32_R_TYPE(rpnt->r_info);
  159. symtab_index = ELF32_R_SYM(rpnt->r_info);
  160. symbol_addr = 0;
  161. if (!symtab_index && tpnt->libtype == program_interpreter)
  162. continue;
  163. if (symtab_index) {
  164. if (tpnt->libtype == program_interpreter &&
  165. _dl_symbol(strtab + symtab[symtab_index].st_name))
  166. continue;
  167. symbol_addr = (unsigned long)
  168. _dl_find_hash(strtab + symtab[symtab_index].st_name,
  169. tpnt->symbol_scope, (unsigned long) reloc_addr,
  170. (reloc_type == R_386_JMP_SLOT ? tpnt : NULL), 0);
  171. /*
  172. * We want to allow undefined references to weak symbols - this might
  173. * have been intentional. We should not be linking local symbols
  174. * here, so all bases should be covered.
  175. */
  176. if (!symbol_addr &&
  177. ELF32_ST_BIND(symtab[symtab_index].st_info) ==
  178. STB_GLOBAL) {
  179. _dl_fdprintf(2, "%s: can't resolve symbol '%s'\n",
  180. _dl_progname, strtab + symtab[symtab_index].st_name);
  181. goof++;
  182. }
  183. }
  184. switch (reloc_type) {
  185. case R_386_NONE:
  186. break;
  187. case R_386_32:
  188. *reloc_addr += symbol_addr;
  189. break;
  190. case R_386_PC32:
  191. *reloc_addr += symbol_addr - (unsigned long) reloc_addr;
  192. break;
  193. case R_386_GLOB_DAT:
  194. case R_386_JMP_SLOT:
  195. *reloc_addr = symbol_addr;
  196. break;
  197. case R_386_RELATIVE:
  198. *reloc_addr += (unsigned long) tpnt->loadaddr;
  199. break;
  200. case R_386_COPY:
  201. #if 0
  202. /* Do this later */
  203. _dl_fdprintf(2, "Doing copy for symbol ");
  204. if (symtab_index) _dl_fdprintf(2, strtab + symtab[symtab_index].st_name);
  205. _dl_fdprintf(2, "\n");
  206. _dl_memcpy((void *) symtab[symtab_index].st_value,
  207. (void *) symbol_addr, symtab[symtab_index].st_size);
  208. #endif
  209. break;
  210. default:
  211. _dl_fdprintf(2, "%s: can't handle reloc type ", _dl_progname);
  212. #ifdef VERBOSE_DLINKER
  213. _dl_fdprintf(2, "%s ", _dl_reltypes[reloc_type]);
  214. #endif
  215. if (symtab_index)
  216. _dl_fdprintf(2, "'%s'\n", strtab + symtab[symtab_index].st_name);
  217. _dl_exit(1);
  218. };
  219. };
  220. return goof;
  221. }
  222. /* This is done as a separate step, because there are cases where
  223. information is first copied and later initialized. This results in
  224. the wrong information being copied. Someone at Sun was complaining about
  225. a bug in the handling of _COPY by SVr4, and this may in fact be what he
  226. was talking about. Sigh. */
  227. /* No, there are cases where the SVr4 linker fails to emit COPY relocs
  228. at all */
  229. int _dl_parse_copy_information(struct dyn_elf *xpnt, unsigned long rel_addr,
  230. unsigned long rel_size, int type)
  231. {
  232. int i;
  233. char *strtab;
  234. int reloc_type;
  235. int goof = 0;
  236. Elf32_Sym *symtab;
  237. Elf32_Rel *rpnt;
  238. unsigned long *reloc_addr;
  239. unsigned long symbol_addr;
  240. struct elf_resolve *tpnt;
  241. int symtab_index;
  242. /* Now parse the relocation information */
  243. tpnt = xpnt->dyn;
  244. rpnt = (Elf32_Rel *) (rel_addr + tpnt->loadaddr);
  245. rel_size = rel_size / sizeof(Elf32_Rel);
  246. symtab = (Elf32_Sym *) (tpnt->dynamic_info[DT_SYMTAB] + tpnt->loadaddr);
  247. strtab = (char *) (tpnt->dynamic_info[DT_STRTAB] + tpnt->loadaddr);
  248. for (i = 0; i < rel_size; i++, rpnt++) {
  249. reloc_addr = (unsigned long *) (tpnt->loadaddr + (unsigned long) rpnt->r_offset);
  250. reloc_type = ELF32_R_TYPE(rpnt->r_info);
  251. if (reloc_type != R_386_COPY)
  252. continue;
  253. symtab_index = ELF32_R_SYM(rpnt->r_info);
  254. symbol_addr = 0;
  255. if (!symtab_index && tpnt->libtype == program_interpreter)
  256. continue;
  257. if (symtab_index) {
  258. if (tpnt->libtype == program_interpreter &&
  259. _dl_symbol(strtab + symtab[symtab_index].st_name))
  260. continue;
  261. symbol_addr = (unsigned long) _dl_find_hash(strtab + symtab[symtab_index].st_name,
  262. xpnt->next, (int) reloc_addr, NULL, 1);
  263. if (!symbol_addr) {
  264. _dl_fdprintf(2, "%s: can't resolve symbol '%s'\n",
  265. _dl_progname, strtab + symtab[symtab_index].st_name);
  266. goof++;
  267. };
  268. };
  269. if (!goof) {
  270. _dl_memcpy((char *) symtab[symtab_index].st_value,
  271. (char *) symbol_addr, symtab[symtab_index].st_size);
  272. }
  273. };
  274. return goof;
  275. }