elfinterp.c 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331
  1. /* vi: set sw=4 ts=4: */
  2. /* x86_64 ELF shared library loader suppport
  3. *
  4. * Copyright (c) 1994-2000 Eric Youngdale, Peter MacDonald,
  5. * David Engel, Hongjiu Lu and Mitch D'Souza
  6. * Copyright (C) 2001-2004 Erik Andersen
  7. *
  8. * All rights reserved.
  9. *
  10. * Redistribution and use in source and binary forms, with or without
  11. * modification, are permitted provided that the following conditions
  12. * are met:
  13. * 1. Redistributions of source code must retain the above copyright
  14. * notice, this list of conditions and the following disclaimer.
  15. * 2. The name of the above contributors may not be
  16. * used to endorse or promote products derived from this software
  17. * without specific prior written permission.
  18. *
  19. * THIS SOFTWARE IS PROVIDED BY THE CONTRIBUTORS ``AS IS'' AND
  20. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  21. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  22. * ARE DISCLAIMED. IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE
  23. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  24. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  25. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  26. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  27. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  28. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  29. * SUCH DAMAGE.
  30. */
  31. #include "ldso.h"
  32. /* Program to load an ELF binary on a linux system, and run it.
  33. References to symbols in sharable libraries can be resolved by either
  34. an ELF sharable library or a linux style of shared library. */
  35. /* Disclaimer: I have never seen any AT&T source code for SVr4, nor have
  36. I ever taken any courses on internals. This program was developed using
  37. information available through the book "UNIX SYSTEM V RELEASE 4,
  38. Programmers guide: Ansi C and Programming Support Tools", which did
  39. a more than adequate job of explaining everything required to get this
  40. working. */
  41. extern int _dl_linux_resolve(void);
  42. unsigned long
  43. _dl_linux_resolver(struct elf_resolve *tpnt, int reloc_entry)
  44. {
  45. ELF_RELOC *this_reloc;
  46. char *strtab;
  47. ElfW(Sym) *symtab;
  48. int symtab_index;
  49. char *rel_addr;
  50. char *new_addr;
  51. char **got_addr;
  52. ElfW(Addr) instr_addr;
  53. char *symname;
  54. rel_addr = (char *)tpnt->dynamic_info[DT_JMPREL];
  55. this_reloc = (ELF_RELOC *)(rel_addr + reloc_entry);
  56. symtab_index = ELF_R_SYM(this_reloc->r_info);
  57. symtab = (ElfW(Sym) *)tpnt->dynamic_info[DT_SYMTAB];
  58. strtab = (char *)tpnt->dynamic_info[DT_STRTAB];
  59. symname = strtab + symtab[symtab_index].st_name;
  60. /* Address of the jump instruction to fix up. */
  61. instr_addr = (this_reloc->r_offset + tpnt->loadaddr);
  62. got_addr = (char **)instr_addr;
  63. /* Get the address of the GOT entry. */
  64. new_addr = _dl_find_hash(symname, tpnt->symbol_scope, tpnt, ELF_RTYPE_CLASS_PLT, NULL);
  65. if (unlikely(!new_addr)) {
  66. _dl_dprintf(2, "%s: Can't resolve symbol '%s'\n", _dl_progname, symname);
  67. _dl_exit(1);
  68. }
  69. #if defined (__SUPPORT_LD_DEBUG__)
  70. if ((unsigned long)got_addr < 0x40000000) {
  71. if (_dl_debug_bindings) {
  72. _dl_dprintf(_dl_debug_file, "\nresolve function: %s", symname);
  73. if (_dl_debug_detail)
  74. _dl_dprintf(_dl_debug_file,
  75. "\tpatched: %x ==> %x @ %x\n",
  76. *got_addr, new_addr, got_addr);
  77. }
  78. }
  79. if (!_dl_debug_nofixups)
  80. #endif
  81. *got_addr = new_addr;
  82. return (unsigned long)new_addr;
  83. }
  84. static int
  85. _dl_parse(struct elf_resolve *tpnt, struct dyn_elf *scope,
  86. unsigned long rel_addr, unsigned long rel_size,
  87. int (*reloc_fnc)(struct elf_resolve *tpnt, struct dyn_elf *scope,
  88. ELF_RELOC *rpnt, ElfW(Sym) *symtab, char *strtab))
  89. {
  90. unsigned int i;
  91. char *strtab;
  92. ElfW(Sym) *symtab;
  93. ELF_RELOC *rpnt;
  94. int symtab_index;
  95. /* Parse the relocation information. */
  96. rpnt = (ELF_RELOC *)rel_addr;
  97. rel_size /= sizeof(ELF_RELOC);
  98. symtab = (ElfW(Sym) *)tpnt->dynamic_info[DT_SYMTAB];
  99. strtab = (char *)tpnt->dynamic_info[DT_STRTAB];
  100. for (i = 0; i < rel_size; i++, rpnt++) {
  101. int res;
  102. symtab_index = ELF_R_SYM(rpnt->r_info);
  103. debug_sym(symtab, strtab, symtab_index);
  104. debug_reloc(symtab, strtab, rpnt);
  105. res = reloc_fnc(tpnt, scope, rpnt, symtab, strtab);
  106. if (res == 0)
  107. continue;
  108. _dl_dprintf(2, "\n%s: ", _dl_progname);
  109. if (symtab_index)
  110. _dl_dprintf(2, "symbol '%s': ",
  111. strtab + symtab[symtab_index].st_name);
  112. if (unlikely(res < 0)) {
  113. int reloc_type = ELF_R_TYPE(rpnt->r_info);
  114. _dl_dprintf(2, "can't handle reloc type "
  115. #if defined (__SUPPORT_LD_DEBUG__)
  116. "%s\n", _dl_reltypes(reloc_type));
  117. #else
  118. "%x\n", reloc_type);
  119. #endif
  120. _dl_exit(-res);
  121. } else if (unlikely(res > 0)) {
  122. _dl_dprintf(2, "can't resolve symbol\n");
  123. return res;
  124. }
  125. }
  126. return 0;
  127. }
  128. static int
  129. _dl_do_reloc(struct elf_resolve *tpnt, struct dyn_elf *scope,
  130. ELF_RELOC *rpnt, ElfW(Sym) *symtab, char *strtab)
  131. {
  132. int reloc_type;
  133. int symtab_index;
  134. char *symname;
  135. struct elf_resolve *tls_tpnt = 0;
  136. ElfW(Sym) *sym;
  137. ElfW(Addr) *reloc_addr;
  138. ElfW(Addr) symbol_addr;
  139. #if defined (__SUPPORT_LD_DEBUG__)
  140. ElfW(Addr) old_val;
  141. #endif
  142. reloc_addr = (ElfW(Addr)*)(tpnt->loadaddr + (unsigned long)rpnt->r_offset);
  143. reloc_type = ELF_R_TYPE(rpnt->r_info);
  144. symtab_index = ELF_R_SYM(rpnt->r_info);
  145. sym = &symtab[symtab_index];
  146. symbol_addr = 0;
  147. symname = strtab + sym->st_name;
  148. if (symtab_index) {
  149. symbol_addr = (ElfW(Addr))_dl_find_hash(symname, scope, tpnt,
  150. elf_machine_type_class(reloc_type), &tls_tpnt);
  151. /*
  152. * We want to allow undefined references to weak symbols - this
  153. * might have been intentional. We should not be linking local
  154. * symbols here, so all bases should be covered.
  155. */
  156. if (unlikely(!symbol_addr && (ELF_ST_TYPE(sym->st_info) != STT_TLS)
  157. && (ELF_ST_BIND(sym->st_info) != STB_WEAK))) {
  158. /* This may be non-fatal if called from dlopen. */
  159. return 1;
  160. }
  161. } else {
  162. /* Relocs against STN_UNDEF are usually treated as using a
  163. * symbol value of zero, and using the module containing the
  164. * reloc itself. */
  165. symbol_addr = sym->st_value;
  166. tls_tpnt = tpnt;
  167. }
  168. #if defined (__SUPPORT_LD_DEBUG__)
  169. old_val = *reloc_addr;
  170. #endif
  171. switch (reloc_type) {
  172. case R_X86_64_NONE:
  173. break;
  174. case R_X86_64_64:
  175. *reloc_addr = symbol_addr + rpnt->r_addend;
  176. break;
  177. case R_X86_64_PC32:
  178. *reloc_addr = symbol_addr + rpnt->r_addend - rpnt->r_offset;
  179. break;
  180. case R_X86_64_GLOB_DAT:
  181. case R_X86_64_JUMP_SLOT:
  182. *reloc_addr = symbol_addr + rpnt->r_addend;
  183. break;
  184. /* handled by elf_machine_relative()
  185. case R_X86_64_RELATIVE:
  186. *reloc_addr = map->l_addr + rpnt->r_addend;
  187. break;
  188. */
  189. #if defined USE_TLS && USE_TLS
  190. case R_X86_64_DTPMOD64:
  191. *reloc_addr = tls_tpnt->l_tls_modid;
  192. break;
  193. case R_X86_64_DTPOFF64:
  194. /* During relocation all TLS symbols are defined and used.
  195. * Therefore the offset is already correct. */
  196. *reloc_addr = symbol_addr + rpnt->r_addend;
  197. break;
  198. case R_X86_64_TPOFF64:
  199. /* The offset is negative, forward from the thread pointer.
  200. * We know the offset of the object the symbol is contained in.
  201. * It is a negative value which will be added to the
  202. * thread pointer. */
  203. CHECK_STATIC_TLS ((struct link_map *) tls_tpnt);
  204. *reloc_addr = symbol_addr - tls_tpnt->l_tls_offset + rpnt->r_addend;
  205. break;
  206. #endif
  207. case R_X86_64_32:
  208. *(unsigned int *) reloc_addr = symbol_addr + rpnt->r_addend;
  209. /* XXX: should check for overflow eh ? */
  210. break;
  211. case R_X86_64_COPY:
  212. if (symbol_addr) {
  213. #if defined (__SUPPORT_LD_DEBUG__)
  214. if (_dl_debug_move)
  215. _dl_dprintf(_dl_debug_file,
  216. "\t%s move %d bytes from %x to %x\n",
  217. symname, sym->st_size,
  218. symbol_addr, reloc_addr);
  219. #endif
  220. _dl_memcpy((char *)reloc_addr,
  221. (char *)symbol_addr,
  222. sym->st_size);
  223. } else
  224. _dl_dprintf(_dl_debug_file, "no symbol_addr to copy !?\n");
  225. break;
  226. default:
  227. return -1; /* Calls _dl_exit(1). */
  228. }
  229. #if defined (__SUPPORT_LD_DEBUG__)
  230. if (_dl_debug_reloc && _dl_debug_detail)
  231. _dl_dprintf(_dl_debug_file, "\tpatched: %x ==> %x @ %x\n",
  232. old_val, *reloc_addr, reloc_addr);
  233. #endif
  234. return 0;
  235. }
  236. static int
  237. _dl_do_lazy_reloc(struct elf_resolve *tpnt, struct dyn_elf *scope,
  238. ELF_RELOC *rpnt, ElfW(Sym) *symtab, char *strtab)
  239. {
  240. int reloc_type;
  241. int symtab_index;
  242. ElfW(Addr) *reloc_addr;
  243. #if defined (__SUPPORT_LD_DEBUG__)
  244. ElfW(Addr) old_val;
  245. #endif
  246. (void)scope;
  247. symtab_index = ELF_R_SYM(rpnt->r_info);
  248. (void)strtab;
  249. reloc_addr = (ElfW(Addr)*)(tpnt->loadaddr + rpnt->r_offset);
  250. reloc_type = ELF_R_TYPE(rpnt->r_info);
  251. #if defined (__SUPPORT_LD_DEBUG__)
  252. old_val = *reloc_addr;
  253. #endif
  254. switch (reloc_type) {
  255. case R_X86_64_NONE:
  256. break;
  257. case R_X86_64_JUMP_SLOT:
  258. *reloc_addr += (unsigned long)tpnt->loadaddr;
  259. break;
  260. default:
  261. _dl_exit(1);
  262. }
  263. #if defined (__SUPPORT_LD_DEBUG__)
  264. if (_dl_debug_reloc && _dl_debug_detail)
  265. _dl_dprintf(_dl_debug_file, "\tpatched_lazy: %x ==> %x @ %x\n",
  266. old_val, *reloc_addr, reloc_addr);
  267. #endif
  268. return 0;
  269. }
  270. void
  271. _dl_parse_lazy_relocation_information(struct dyn_elf *rpnt,
  272. unsigned long rel_addr,
  273. unsigned long rel_size)
  274. {
  275. (void)_dl_parse(rpnt->dyn, NULL, rel_addr, rel_size, _dl_do_lazy_reloc);
  276. }
  277. int
  278. _dl_parse_relocation_information(struct dyn_elf *rpnt,
  279. unsigned long rel_addr,
  280. unsigned long rel_size)
  281. {
  282. return _dl_parse(rpnt->dyn, rpnt->dyn->symbol_scope, rel_addr, rel_size, _dl_do_reloc);
  283. }