elfinterp.c 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302
  1. /* KVX ELF shared library loader suppport
  2. *
  3. * Copyright (C) 2001-2004 Erik Andersen
  4. * Copyright (C) 2016-2017 Waldemar Brodkorb <wbx@uclibc-ng.org>
  5. * Copyright (C) 2018 Kalray Inc.
  6. *
  7. * All rights reserved.
  8. *
  9. * Redistribution and use in source and binary forms, with or without
  10. * modification, are permitted provided that the following conditions
  11. * are met:
  12. * 1. Redistributions of source code must retain the above copyright
  13. * notice, this list of conditions and the following disclaimer.
  14. * 2. The name of the above contributors may not be
  15. * used to endorse or promote products derived from this software
  16. * without specific prior written permission.
  17. *
  18. * THIS SOFTWARE IS PROVIDED BY THE CONTRIBUTORS ``AS IS'' AND
  19. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  20. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  21. * ARE DISCLAIMED. IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE
  22. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  23. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  24. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  25. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  26. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  27. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  28. * SUCH DAMAGE.
  29. */
  30. /* Program to load an ELF binary on a linux system, and run it.
  31. References to symbols in sharable libraries can be resolved by either
  32. an ELF sharable library or a linux style of shared library. */
  33. #include "ldso.h"
  34. #if defined(USE_TLS) && USE_TLS
  35. #include "dl-tls.h"
  36. #include "tlsdeschtab.h"
  37. #endif
  38. extern int _dl_linux_resolve(void);
  39. /* Uncomment when some relocs will be handled lazily */
  40. #if 0
  41. unsigned long _dl_linux_resolver(struct elf_resolve *tpnt, int reloc_entry)
  42. {
  43. ELF_RELOC *this_reloc;
  44. char *strtab;
  45. ElfW(Sym) *symtab;
  46. int symtab_index;
  47. char *rel_addr;
  48. char *new_addr;
  49. char **got_addr;
  50. ElfW(Addr) instr_addr;
  51. char *symname;
  52. rel_addr = (char *)tpnt->dynamic_info[DT_JMPREL];
  53. this_reloc = (ELF_RELOC *)(rel_addr + reloc_entry);
  54. symtab_index = ELF_R_SYM(this_reloc->r_info);
  55. symtab = (ElfW(Sym) *)tpnt->dynamic_info[DT_SYMTAB];
  56. strtab = (char *)tpnt->dynamic_info[DT_STRTAB];
  57. symname = strtab + symtab[symtab_index].st_name;
  58. /* Address of jump instruction to fix up */
  59. instr_addr = (this_reloc->r_offset + tpnt->loadaddr);
  60. got_addr = (char **)instr_addr;
  61. /* Get the address of the GOT entry */
  62. new_addr = _dl_find_hash(symname, &_dl_loaded_modules->symbol_scope, tpnt, ELF_RTYPE_CLASS_PLT, NULL);
  63. if (unlikely(!new_addr)) {
  64. _dl_dprintf(2, "%s: can't resolve symbol '%s'\n", _dl_progname, symname);
  65. _dl_exit(1);
  66. }
  67. #if defined (__SUPPORT_LD_DEBUG__)
  68. if (_dl_debug_bindings) {
  69. _dl_dprintf(_dl_debug_file, "\nresolve function: %s", symname);
  70. if (_dl_debug_detail) _dl_dprintf(_dl_debug_file,
  71. "\tpatched %x ==> %x @ %x", *got_addr, new_addr, got_addr);
  72. }
  73. if (!_dl_debug_nofixups) {
  74. *got_addr = new_addr;
  75. }
  76. #else
  77. *got_addr = new_addr;
  78. #endif
  79. return (unsigned long)new_addr;
  80. }
  81. #endif
  82. static int
  83. _dl_parse(struct elf_resolve *tpnt, struct r_scope_elem *scope,
  84. unsigned long rel_addr, unsigned long rel_size,
  85. int (*reloc_fnc) (struct elf_resolve *tpnt, struct r_scope_elem *scope,
  86. ELF_RELOC *rpnt, ElfW(Sym) *symtab, char *strtab))
  87. {
  88. unsigned int i;
  89. char *strtab;
  90. ElfW(Sym) *symtab;
  91. ELF_RELOC *rpnt;
  92. int symtab_index;
  93. /* Parse the relocation information */
  94. rpnt = (ELF_RELOC *)rel_addr;
  95. rel_size = rel_size / sizeof(ELF_RELOC);
  96. symtab = (ElfW(Sym) *)tpnt->dynamic_info[DT_SYMTAB];
  97. strtab = (char *)tpnt->dynamic_info[DT_STRTAB];
  98. for (i = 0; i < rel_size; i++, rpnt++) {
  99. int res;
  100. symtab_index = ELF_R_SYM(rpnt->r_info);
  101. debug_sym(symtab, strtab, symtab_index);
  102. debug_reloc(symtab, strtab, rpnt);
  103. res = reloc_fnc(tpnt, scope, rpnt, symtab, strtab);
  104. if (res==0)
  105. continue;
  106. _dl_dprintf(2, "\n%s: ", _dl_progname);
  107. if (symtab_index)
  108. _dl_dprintf(2, "symbol '%s': ",
  109. strtab + symtab[symtab_index].st_name);
  110. if (unlikely(res < 0)) {
  111. int reloc_type = ELF_R_TYPE(rpnt->r_info);
  112. _dl_dprintf(2, "can't handle reloc type %x\n", reloc_type);
  113. _dl_exit(-res);
  114. } else if (unlikely(res > 0)) {
  115. _dl_dprintf(2, "can't resolve symbol\n");
  116. return res;
  117. }
  118. }
  119. return 0;
  120. }
  121. static int
  122. _dl_do_reloc (struct elf_resolve *tpnt, struct r_scope_elem *scope,
  123. ELF_RELOC *rpnt, ElfW(Sym) *symtab, char *strtab)
  124. {
  125. int reloc_type;
  126. int symtab_index;
  127. char *symname;
  128. #if defined USE_TLS && USE_TLS
  129. struct elf_resolve *tls_tpnt = NULL;
  130. #endif
  131. struct symbol_ref sym_ref;
  132. ElfW(Addr) *reloc_addr;
  133. ElfW(Addr) symbol_addr;
  134. #if defined (__SUPPORT_LD_DEBUG__)
  135. ElfW(Addr) old_val;
  136. #endif
  137. reloc_addr = (ElfW(Addr)*)(tpnt->loadaddr + (unsigned long)rpnt->r_offset);
  138. reloc_type = ELF_R_TYPE(rpnt->r_info);
  139. symtab_index = ELF_R_SYM(rpnt->r_info);
  140. sym_ref.sym = &symtab[symtab_index];
  141. sym_ref.tpnt = NULL;
  142. symbol_addr = 0;
  143. symname = strtab + sym_ref.sym->st_name;
  144. if (symtab_index) {
  145. symbol_addr = (ElfW(Addr))_dl_find_hash(symname, scope, tpnt,
  146. elf_machine_type_class(reloc_type), &sym_ref);
  147. /*
  148. * We want to allow undefined references to weak symbols - this might
  149. * have been intentional. We should not be linking local symbols
  150. * here, so all bases should be covered.
  151. */
  152. if (unlikely (!symbol_addr &&
  153. (ELF_ST_TYPE(symtab[symtab_index].st_info) != STT_TLS) &&
  154. (ELF_ST_BIND(symtab[symtab_index].st_info) != STB_WEAK))) {
  155. return 1;
  156. }
  157. if (_dl_trace_prelink) {
  158. _dl_debug_lookup (symname, tpnt, &symtab[symtab_index],
  159. &sym_ref, elf_machine_type_class(reloc_type));
  160. }
  161. #if defined USE_TLS && USE_TLS
  162. tls_tpnt = sym_ref.tpnt;
  163. #endif
  164. } else {
  165. /*
  166. * Relocs against STN_UNDEF are usually treated as using a
  167. * symbol value of zero, and using the module containing the
  168. * reloc itself.
  169. */
  170. symbol_addr = sym_ref.sym->st_value;
  171. #if defined USE_TLS && USE_TLS
  172. tls_tpnt = tpnt;
  173. #endif
  174. }
  175. #if defined (__SUPPORT_LD_DEBUG__)
  176. old_val = *reloc_addr;
  177. #endif
  178. switch (reloc_type) {
  179. case R_KVX_NONE:
  180. break;
  181. case R_KVX_GLOB_DAT:
  182. case R_KVX_64:
  183. case R_KVX_JMP_SLOT:
  184. *reloc_addr = symbol_addr + rpnt->r_addend;
  185. break;
  186. case R_KVX_COPY:
  187. if (symbol_addr) {
  188. _dl_memcpy((char *)reloc_addr, (char *)symbol_addr,
  189. sym_ref.sym->st_size);
  190. }
  191. break;
  192. #if defined USE_TLS && USE_TLS
  193. case R_KVX_64_TPOFF:
  194. CHECK_STATIC_TLS ((struct link_map *) tls_tpnt);
  195. *reloc_addr = tls_tpnt->l_tls_offset + symbol_addr + rpnt->r_addend - TLS_TCB_SIZE;
  196. break;
  197. case R_KVX_64_DTPMOD:
  198. *reloc_addr = tls_tpnt->l_tls_modid;
  199. break;
  200. case R_KVX_64_DTPOFF:
  201. *reloc_addr = symbol_addr;
  202. break;
  203. #endif
  204. default:
  205. return -1; /*call _dl_exit(1) */
  206. }
  207. #if defined (__SUPPORT_LD_DEBUG__)
  208. if (_dl_debug_reloc && _dl_debug_detail) {
  209. _dl_dprintf(_dl_debug_file, "\tpatched: %x ==> %x @ %x\n",
  210. old_val, *reloc_addr, reloc_addr);
  211. }
  212. #endif
  213. return 0;
  214. }
  215. /* uncomment when PLT relocs will be handled lazily */
  216. #if 0
  217. static int
  218. _dl_do_lazy_reloc (struct elf_resolve *tpnt, struct r_scope_elem *scope,
  219. ELF_RELOC *rpnt, ElfW(Sym) *symtab, char *strtab)
  220. {
  221. int reloc_type;
  222. ElfW(Addr) *reloc_addr;
  223. #if defined (__SUPPORT_LD_DEBUG__)
  224. ElfW(Addr) old_val;
  225. #endif
  226. (void)scope;
  227. (void)strtab;
  228. reloc_addr = (ElfW(Addr)*)(tpnt->loadaddr + rpnt->r_offset);
  229. reloc_type = ELF_R_TYPE(rpnt->r_info);
  230. #if defined (__SUPPORT_LD_DEBUG__)
  231. old_val = *reloc_addr;
  232. #endif
  233. switch (reloc_type) {
  234. case R_KVX_NONE:
  235. break;
  236. case R_KVX_JMP_SLOT64:
  237. *reloc_addr += tpnt->loadaddr;
  238. break;
  239. #if defined USE_TLS && USE_TLS
  240. #error Not even close to be ready
  241. #endif
  242. default:
  243. return -1; /*call _dl_exit(1) */
  244. }
  245. #if defined (__SUPPORT_LD_DEBUG__)
  246. if (_dl_debug_reloc && _dl_debug_detail) {
  247. _dl_dprintf(_dl_debug_file, "\tpatched_lazy: %x ==> %x @ %x\n",
  248. old_val, *reloc_addr, reloc_addr);
  249. }
  250. #endif
  251. return 0;
  252. }
  253. #endif
  254. void _dl_parse_lazy_relocation_information(struct dyn_elf *rpnt,
  255. unsigned long rel_addr, unsigned long rel_size)
  256. {
  257. (void)_dl_parse(rpnt->dyn, &_dl_loaded_modules->symbol_scope, rel_addr, rel_size, _dl_do_reloc);
  258. }
  259. int _dl_parse_relocation_information(struct dyn_elf *rpnt,
  260. struct r_scope_elem *scope, unsigned long rel_addr, unsigned long rel_size)
  261. {
  262. return _dl_parse(rpnt->dyn, scope, rel_addr, rel_size, _dl_do_reloc);
  263. }