VirtualBox

source: vbox/trunk/src/VBox/Runtime/ldrELFRelocatable.cpp.h@ 2409

Last change on this file since 2409 was 190, checked in by vboxsync, 18 years ago

typo

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 42.1 KB
Line 
1/* $Id: ldrELFRelocatable.cpp.h 190 2007-01-19 18:12:40Z vboxsync $ */
2/** @file
3 * InnoTek Portable Runtime - Binary Image Loader, Template for ELF Relocatable Images.
4 */
5
6/*
7 * Copyright (C) 2006 InnoTek Systemberatung GmbH
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License as published by the Free Software Foundation,
13 * in version 2 as it comes in the "COPYING" file of the VirtualBox OSE
14 * distribution. VirtualBox OSE is distributed in the hope that it will
15 * be useful, but WITHOUT ANY WARRANTY of any kind.
16 *
17 * If you received this file as part of a commercial VirtualBox
18 * distribution, then only the terms of your commercial VirtualBox
19 * license agreement apply instead of the previous paragraph.
20 */
21
22/*******************************************************************************
23* Defined Constants And Macros *
24*******************************************************************************/
25#if ELF_MODE == 32
26#define RTLDRELF_NAME(name) rtldrELF32##name
27#define RTLDRELF_SUFF(name) name##32
28#define RTLDRELF_MID(pre,suff) pre##32##suff
29#define FMT_ELF_ADDR "%08RX32"
30#define FMT_ELF_HALF "%04RX16"
31#define FMT_ELF_OFF "%08RX32"
32#define FMT_ELF_SIZE "%08RX32"
33#define FMT_ELF_SWORD "%RI32"
34#define FMT_ELF_WORD "%08RX32"
35#define FMT_ELF_XWORD "%08RX32"
36#define FMT_ELF_SXWORD "%RI32"
37
38#elif ELF_MODE == 64
39#define RTLDRELF_NAME(name) rtldrELF64##name
40#define RTLDRELF_SUFF(name) name##64
41#define RTLDRELF_MID(pre,suff) pre##64##suff
42#define FMT_ELF_ADDR "%016RX64"
43#define FMT_ELF_HALF "%04RX16"
44#define FMT_ELF_SHALF "%RI16"
45#define FMT_ELF_OFF "%016RX64"
46#define FMT_ELF_SIZE "%016RX64"
47#define FMT_ELF_SWORD "%RI32"
48#define FMT_ELF_WORD "%08RX32"
49#define FMT_ELF_XWORD "%016RX64"
50#define FMT_ELF_SXWORD "%RI64"
51#endif
52
53#define Elf_Ehdr RTLDRELF_MID(Elf,_Ehdr)
54#define Elf_Phdr RTLDRELF_MID(Elf,_Phdr)
55#define Elf_Shdr RTLDRELF_MID(Elf,_Shdr)
56#define Elf_Sym RTLDRELF_MID(Elf,_Sym)
57#define Elf_Rel RTLDRELF_MID(Elf,_Rel)
58#define Elf_Rela RTLDRELF_MID(Elf,_Rela)
59#define Elf_Nhdr RTLDRELF_MID(Elf,_Nhdr)
60#define Elf_Dyn RTLDRELF_MID(Elf,_Dyn)
61#define Elf_Addr RTLDRELF_MID(Elf,_Addr)
62#define Elf_Half RTLDRELF_MID(Elf,_Half)
63#define Elf_Off RTLDRELF_MID(Elf,_Off)
64#define Elf_Size RTLDRELF_MID(Elf,_Size)
65#define Elf_Sword RTLDRELF_MID(Elf,_Sword)
66#define Elf_Word RTLDRELF_MID(Elf,_Word)
67
68#define RTLDRMODELF RTLDRELF_MID(RTLDRMODELF,)
69#define PRTLDRMODELF RTLDRELF_MID(PRTLDRMODELF,)
70
71#define ELF_R_SYM(info) RTLDRELF_MID(ELF,_R_SYM)(info)
72#define ELF_R_TYPE(info) RTLDRELF_MID(ELF,_R_TYPE)(info)
73#define ELF_R_INFO(sym, type) RTLDRELF_MID(ELF,_R_INFO)(sym, type)
74
75#define ELF_ST_BIND(info) RTLDRELF_MID(ELF,_ST_BIND)(info)
76
77
78
79/*******************************************************************************
80* Structures and Typedefs *
81*******************************************************************************/
82/**
83 * The ELF loader structure.
84 */
85typedef struct RTLDRMODELF
86{
87 /** Core module structure. */
88 RTLDRMODINTERNAL Core;
89 /** Pointer to the reader instance. */
90 PRTLDRREADER pReader;
91 /** Pointer to readonly mapping of the image bits.
92 * This mapping is provided by the pReader. */
93 const void *pvBits;
94
95 /** The ELF header. */
96 Elf_Ehdr Ehdr;
97 /** Pointer to our copy of the section headers.
98 * The virtual addresses in this array is the 0 based assignments we've given the image.
99 * Not valid if the image is DONE. */
100 Elf_Shdr *paShdrs;
101 /** The size of the loaded image. */
102 size_t cbImage;
103
104 /** The symbol section index. */
105 unsigned iSymSh;
106 /** Number of symbols in the table. */
107 unsigned cSyms;
108 /** Pointer to symbol table within RTLDRMODELF::pvBits. */
109 const Elf_Sym *paSyms;
110
111 /** The string section index. */
112 unsigned iStrSh;
113 /** Size of the string table. */
114 unsigned cbStr;
115 /** Pointer to string table within RTLDRMODELF::pvBits. */
116 const char *pStr;
117} RTLDRMODELF, *PRTLDRMODELF;
118
119
120/**
121 * Maps the image bits into memory and resolve pointers into it.
122 *
123 * @returns iprt status code.
124 * @param pModElf The ELF loader module instance data.
125 * @param fNeedsBits Set if we actually need the pvBits member.
126 * If we don't, we can simply read the string and symbol sections, thus saving memory.
127 */
128static int RTLDRELF_NAME(MapBits)(PRTLDRMODELF pModElf, bool fNeedsBits)
129{
130 NOREF(fNeedsBits);
131 if (pModElf->pvBits)
132 return VINF_SUCCESS;
133 int rc = pModElf->pReader->pfnMap(pModElf->pReader, &pModElf->pvBits);
134 if (RT_SUCCESS(rc))
135 {
136 const uint8_t *pu8 = (const uint8_t *)pModElf->pvBits;
137 pModElf->paSyms = (const Elf_Sym *)(pu8 + pModElf->paShdrs[pModElf->iSymSh].sh_offset);
138 pModElf->pStr = (const char *)(pu8 + pModElf->paShdrs[pModElf->iStrSh].sh_offset);
139 }
140 return rc;
141}
142
143
144/**
145 * Get the symbol and symbol value.
146 *
147 * @returns iprt status code.
148 * @param pModElf The ELF loader module instance data.
149 * @param BaseAddr The base address which the module is being fixedup to.
150 * @param pfnGetImport The callback function to use to resolve imports (aka unresolved externals).
151 * @param pvUser User argument to pass to the callback.
152 * @param iSym The symbol to get.
153 * @param ppSym Where to store the symbol pointer on success. (read only)
154 * @param pSymValue Where to store the symbol value on success.
155 */
156static int RTLDRELF_NAME(Symbol)(PRTLDRMODELF pModElf, Elf_Addr BaseAddr, PFNRTLDRIMPORT pfnGetImport, void *pvUser,
157 Elf_Size iSym, const Elf_Sym **ppSym, Elf_Addr *pSymValue)
158{
159 /*
160 * Validate and find the symbol.
161 */
162 if (iSym >= pModElf->cSyms)
163 {
164 AssertMsgFailed(("iSym=%d is an invalid symbol index!\n", iSym));
165 return VERR_LDRELF_INVALID_SYMBOL_INDEX;
166 }
167 const Elf_Sym *pSym = &pModElf->paSyms[iSym];
168 *ppSym = pSym;
169
170 if (pSym->st_name >= pModElf->cbStr)
171 {
172 AssertMsgFailed(("iSym=%d st_name=%d str sh_size=%d\n", iSym, pSym->st_name, pModElf->cbStr));
173 return VERR_LDRELF_INVALID_SYMBOL_NAME_OFFSET;
174 }
175 const char *pszName = ELF_STR(pModElf, pSym->st_name);
176
177 /*
178 * Determin the symbol value.
179 *
180 * Symbols needs different treatment depending on which section their are in.
181 * Undefined and absolute symbols goes into special non-existing sections.
182 */
183 switch (pSym->st_shndx)
184 {
185 /*
186 * Undefined symbol, needs resolving.
187 *
188 * Since ELF has no generic concept of importing from specific module (the OS/2 ELF format
189 * has but that's a OS extension and only applies to programs and dlls), we'll have to ask
190 * the resolver callback to do a global search.
191 */
192 case SHN_UNDEF:
193 {
194 /* Try to resolve the symbol. */
195 RTUINTPTR Value;
196 int rc = pfnGetImport(&pModElf->Core, "", pszName, ~0, &Value, pvUser);
197 if (RT_FAILURE(rc))
198 {
199 AssertMsgFailed(("Failed to resolve '%s' rc=%Rrc\n", pszName, rc));
200 return rc;
201 }
202 *pSymValue = (Elf_Addr)Value;
203 if ((RTUINTPTR)*pSymValue != Value)
204 {
205 AssertMsgFailed(("Symbol value overflowed! '%s'\n", pszName));
206 return VERR_SYMBOL_VALUE_TOO_BIG;
207 }
208
209 Log2(("rtldrELF: #%-3d - UNDEF " FMT_ELF_ADDR " '%s'\n", iSym, *pSymValue, pszName));
210 break;
211 }
212
213 /*
214 * Absolute symbols needs no fixing since they are, well, absolute.
215 */
216 case SHN_ABS:
217 *pSymValue = pSym->st_value;
218 Log2(("rtldrELF: #%-3d - ABS " FMT_ELF_ADDR " '%s'\n", iSym, *pSymValue, pszName));
219 break;
220
221 /*
222 * All other symbols are adressed relative to their section and need to be fixed up.
223 */
224 default:
225 if (pSym->st_shndx >= pModElf->Ehdr.e_shnum)
226 {
227 /* what about common symbols? */
228 AssertMsg(pSym->st_shndx < pModElf->Ehdr.e_shnum,
229 ("iSym=%d st_shndx=%d e_shnum=%d pszName=%s\n", iSym, pSym->st_shndx, pModElf->Ehdr.e_shnum, pszName));
230 return VERR_BAD_EXE_FORMAT;
231 }
232 *pSymValue = pSym->st_value + pModElf->paShdrs[pSym->st_shndx].sh_addr + BaseAddr;
233 Log2(("rtldrELF: #%-3d - %5d " FMT_ELF_ADDR " '%s'\n", iSym, pSym->st_shndx, *pSymValue, pszName));
234 break;
235 }
236
237 return VINF_SUCCESS;
238}
239
240
241/**
242 * Applies the fixups for a sections.
243 *
244 * @returns iprt status code.
245 * @param pModElf The ELF loader module instance data.
246 * @param BaseAddr The base address which the module is being fixedup to.
247 * @param pfnGetImport The callback function to use to resolve imports (aka unresolved externals).
248 * @param pvUser User argument to pass to the callback.
249 * @param SecAddr The section address. This is the address the relocations are relative to.
250 * @param cbSec The section size. The relocations must be inside this.
251 * @param pu8SecBaseR Where we read section bits from.
252 * @param pu8SecBaseW Where we write section bits to.
253 * @param pvRelocs Pointer to where we read the relocations from.
254 * @param cbRelocs Size of the relocations.
255 */
256static int RTLDRELF_NAME(RelocateSection)(PRTLDRMODELF pModElf, Elf_Addr BaseAddr, PFNRTLDRIMPORT pfnGetImport, void *pvUser,
257 const Elf_Addr SecAddr, Elf_Size cbSec, const uint8_t *pu8SecBaseR, uint8_t *pu8SecBaseW,
258 const void *pvRelocs, Elf_Size cbRelocs)
259{
260 /*
261 * Iterate the relocations.
262 * The relocations are stored in an array of Elf32_Rel records and covers the entire relocation section.
263 */
264 const Elf_Reloc *paRels = (const Elf_Reloc *)pvRelocs;
265 const unsigned iRelMax = (unsigned)(cbRelocs / sizeof(paRels[0]));
266 AssertMsgReturn(iRelMax == cbRelocs / sizeof(paRels[0]), (FMT_ELF_SIZE "\n", cbRelocs / sizeof(paRels[0])), VERR_IMAGE_TOO_BIG);
267 for (unsigned iRel = 0; iRel < iRelMax; iRel++)
268 {
269 /*
270 * Get the symbol.
271 */
272 const Elf_Sym *pSym;
273 Elf_Addr SymValue = 0; /* shut up gcc-4 */
274 int rc = RTLDRELF_NAME(Symbol)(pModElf, BaseAddr, pfnGetImport, pvUser, ELF_R_SYM(paRels[iRel].r_info), &pSym, &SymValue);
275 if (RT_FAILURE(rc))
276 return rc;
277
278 Log3(("rtldrELF: " FMT_ELF_ADDR " %02x %06x - " FMT_ELF_ADDR " %3d %02x %s\n",
279 paRels[iRel].r_offset, ELF_R_TYPE(paRels[iRel].r_info), (unsigned)ELF_R_SYM(paRels[iRel].r_info),
280 SymValue, (unsigned)pSym->st_shndx, pSym->st_info, ELF_STR(pModElf, pSym->st_name)));
281
282 /*
283 * Apply the fixup.
284 */
285 AssertMsgReturn(paRels[iRel].r_offset < cbSec, (FMT_ELF_ADDR " " FMT_ELF_SIZE "\n", paRels[iRel].r_offset, cbSec), VERR_ELFLDR_INVALID_RELOCATION_OFFSET);
286#if ELF_MODE == 32
287 const Elf_Addr *pAddrR = (const Elf_Addr *)(pu8SecBaseR + paRels[iRel].r_offset); /* Where to read the addend. */
288#endif
289 Elf_Addr *pAddrW = (Elf_Addr *)(pu8SecBaseW + paRels[iRel].r_offset); /* Where to write the fixup. */
290 switch (ELF_R_TYPE(paRels[iRel].r_info))
291 {
292#if ELF_MODE == 32
293 /*
294 * Absolute addressing.
295 */
296 case R_386_32:
297 {
298 const Elf_Addr Value = SymValue + *pAddrR;
299 *(uint32_t *)pAddrW = Value;
300 Log4((FMT_ELF_ADDR": R_386_32 Value=" FMT_ELF_ADDR " SymValue=" FMT_ELF_ADDR "\n",
301 SecAddr + paRels[iRel].r_offset + BaseAddr, Value, SymValue));
302 break;
303 }
304
305 /*
306 * PC relative addressing.
307 */
308 case R_386_PC32:
309 {
310 const Elf_Addr SourceAddr = SecAddr + paRels[iRel].r_offset + BaseAddr; /* Where the source really is. */
311 const Elf_Addr Value = SymValue + *(uint32_t *)pAddrR - SourceAddr;
312 *(uint32_t *)pAddrW = Value;
313 Log4((FMT_ELF_ADDR": R_386_PC32 Value=" FMT_ELF_ADDR " SymValue=" FMT_ELF_ADDR "\n",
314 SourceAddr, Value, SymValue));
315 break;
316 }
317
318 /* ignore */
319 case R_386_NONE:
320 break;
321
322#elif ELF_MODE == 64
323
324 /*
325 * Absolute addressing
326 */
327 case R_X86_64_64:
328 {
329 const Elf_Addr Value = SymValue + paRels[iRel].r_addend;
330 *(uint64_t *)pAddrW = Value;
331 Log4((FMT_ELF_ADDR": R_X86_64_64 Value=" FMT_ELF_ADDR " SymValue=" FMT_ELF_ADDR "\n",
332 SecAddr + paRels[iRel].r_offset + BaseAddr, Value, SymValue));
333 break;
334 }
335
336 /*
337 * Trunacated 32-bit value (zero-extendedable to the 64-bit value).
338 */
339 case R_X86_64_32:
340 {
341 const Elf_Addr Value = SymValue + paRels[iRel].r_addend;
342 *(uint32_t *)pAddrW = (uint32_t)Value;
343 Log4((FMT_ELF_ADDR": R_X86_64_32 Value=" FMT_ELF_ADDR " SymValue=" FMT_ELF_ADDR "\n",
344 SecAddr + paRels[iRel].r_offset + BaseAddr, Value, SymValue));
345 AssertMsgReturn((Elf_Addr)*(uint32_t *)pAddrW == Value, ("Value=" FMT_ELF_ADDR "\n", Value), VERR_SYMBOL_VALUE_TOO_BIG);
346 break;
347 }
348
349 /*
350 * Truncated 32-bit value (sign-extendedable to the 64-bit value).
351 */
352 case R_X86_64_32S:
353 {
354 const Elf_Addr Value = SymValue + paRels[iRel].r_addend;
355 *(int32_t *)pAddrW = (int32_t)Value;
356 Log4((FMT_ELF_ADDR": R_X86_64_32S Value=" FMT_ELF_ADDR " SymValue=" FMT_ELF_ADDR "\n",
357 SecAddr + paRels[iRel].r_offset + BaseAddr, Value, SymValue));
358 AssertMsgReturn((Elf_Addr)*(int32_t *)pAddrW == Value, ("Value=" FMT_ELF_ADDR "\n", Value), VERR_SYMBOL_VALUE_TOO_BIG); /** @todo check the sign-extending here. */
359 break;
360 }
361
362 /*
363 * PC relative addressing.
364 */
365 case R_X86_64_PC32:
366 {
367 const Elf_Addr SourceAddr = SecAddr + paRels[iRel].r_offset + BaseAddr; /* Where the source really is. */
368 const Elf_Addr Value = SymValue + paRels[iRel].r_addend - SourceAddr;
369 *(int32_t *)pAddrW = (int32_t)Value;
370 Log4((FMT_ELF_ADDR": R_X86_64_PC32 Value=" FMT_ELF_ADDR " SymValue=" FMT_ELF_ADDR "\n",
371 SourceAddr, Value, SymValue));
372 AssertMsgReturn((Elf_Addr)*(int32_t *)pAddrW == Value, ("Value=" FMT_ELF_ADDR "\n", Value), VERR_SYMBOL_VALUE_TOO_BIG); /** @todo check the sign-extending here. */
373 break;
374 }
375
376 /* ignore */
377 case R_X86_64_NONE:
378 break;
379#endif
380
381 default:
382 AssertMsgFailed(("Unknown relocation type: %d (iRel=%d iRelMax=%d)\n",
383 ELF_R_TYPE(paRels[iRel].r_info), iRel, iRelMax));
384 return VERR_LDRELF_RELOCATION_NOT_SUPPORTED;
385 }
386 }
387
388 return VINF_SUCCESS;
389}
390
391
392
393/** @copydoc RTLDROPS::pfnClose */
394static DECLCALLBACK(int) RTLDRELF_NAME(Close)(PRTLDRMODINTERNAL pMod)
395{
396 PRTLDRMODELF pModElf = (PRTLDRMODELF)pMod;
397
398 if (pModElf->paShdrs)
399 {
400 RTMemFree(pModElf->paShdrs);
401 pModElf->paShdrs = NULL;
402 }
403
404 if (pModElf->pReader)
405 {
406 pModElf->pReader->pfnDestroy(pModElf->pReader);
407 pModElf->pReader = NULL;
408 }
409
410 pModElf->pvBits = NULL;
411
412 return VINF_SUCCESS;
413}
414
415
416/** @copydoc RTLDROPS::Done */
417static DECLCALLBACK(int) RTLDRELF_NAME(Done)(PRTLDRMODINTERNAL pMod)
418{
419 //PRTLDRMODELF pModElf = (PRTLDRMODELF)pMod;
420 /** @todo Have to think more about this .... */
421 return -1;
422}
423
424
425/** @copydoc RTLDROPS::EnumSymbols */
426static DECLCALLBACK(int) RTLDRELF_NAME(EnumSymbols)(PRTLDRMODINTERNAL pMod, unsigned fFlags, const void *pvBits, RTUINTPTR BaseAddress,
427 PFNRTLDRENUMSYMS pfnCallback, void *pvUser)
428{
429 PRTLDRMODELF pModElf = (PRTLDRMODELF)pMod;
430
431 /*
432 * Validate the input.
433 */
434 Elf_Addr BaseAddr = (Elf_Addr)BaseAddress;
435 AssertMsgReturn((RTUINTPTR)BaseAddr == BaseAddress, ("#RTptr", BaseAddress), VERR_IMAGE_BASE_TOO_HIGH);
436
437 /*
438 * Make sure we've got the string and symbol tables. (We don't need the pvBits.)
439 */
440 int rc = RTLDRELF_NAME(MapBits)(pModElf, false);
441 if (RT_FAILURE(rc))
442 return rc;
443
444 /*
445 * Enumerate the symbol table.
446 */
447 const Elf_Sym *paSyms = pModElf->paSyms;
448 unsigned cSyms = pModElf->cSyms;
449 for (unsigned iSym = 1; iSym < cSyms; iSym++)
450 {
451 /*
452 * Skip imports (undefined).
453 */
454 if (paSyms[iSym].st_shndx != SHN_UNDEF)
455 {
456 /*
457 * Calc value and get name.
458 */
459 Elf_Addr Value;
460 if (paSyms[iSym].st_shndx == SHN_ABS)
461 /* absolute symbols are not subject to any relocation. */
462 Value = paSyms[iSym].st_value;
463 else if (paSyms[iSym].st_shndx < pModElf->Ehdr.e_shnum)
464 /* relative to the section. */
465 Value = BaseAddr + paSyms[iSym].st_value + pModElf->paShdrs[paSyms[iSym].st_shndx].sh_addr;
466 else
467 {
468 AssertMsgFailed(("Arg! paSyms[%u].st_shndx=" FMT_ELF_HALF "\n", iSym, paSyms[iSym].st_shndx));
469 return VERR_BAD_EXE_FORMAT;
470 }
471 const char *pszName = ELF_STR(pModElf, paSyms[iSym].st_name);
472 if ( (pszName && *pszName)
473 && ( (fFlags & RTLDR_ENUM_SYMBOL_FLAGS_ALL)
474 || ELF_ST_BIND(paSyms[iSym].st_info) == STB_GLOBAL)
475 )
476 {
477 /*
478 * Call back.
479 */
480 AssertMsgReturn(Value == (RTUINTPTR)Value, (FMT_ELF_ADDR "\n", Value), VERR_SYMBOL_VALUE_TOO_BIG);
481 int rc = pfnCallback(pMod, pszName, ~0, (RTUINTPTR)Value, pvUser);
482 if (rc)
483 return rc;
484 }
485 }
486 }
487
488 return VINF_SUCCESS;
489}
490
491
492/** @copydoc RTLDROPS::GetImageSize */
493static DECLCALLBACK(size_t) RTLDRELF_NAME(GetImageSize)(PRTLDRMODINTERNAL pMod)
494{
495 PRTLDRMODELF pModElf = (PRTLDRMODELF)pMod;
496
497 return pModElf->cbImage;
498}
499
500
501/** @copydoc RTLDROPS::GetBits */
502static DECLCALLBACK(int) RTLDRELF_NAME(GetBits)(PRTLDRMODINTERNAL pMod, void *pvBits, RTUINTPTR BaseAddress, PFNRTLDRIMPORT pfnGetImport, void *pvUser)
503{
504 PRTLDRMODELF pModElf = (PRTLDRMODELF)pMod;
505
506 /*
507 * Load the bits into pvBits.
508 */
509 const Elf_Shdr *paShdrs = pModElf->paShdrs;
510 for (unsigned iShdr = 0; iShdr < pModElf->Ehdr.e_shnum; iShdr++)
511 {
512 if (paShdrs[iShdr].sh_flags & SHF_ALLOC)
513 {
514 AssertMsgReturn((size_t)paShdrs[iShdr].sh_size == (size_t)paShdrs[iShdr].sh_size, (FMT_ELF_SIZE "\n", paShdrs[iShdr].sh_size), VERR_IMAGE_TOO_BIG);
515 switch (paShdrs[iShdr].sh_type)
516 {
517 case SHT_NOBITS:
518 memset((uint8_t *)pvBits + paShdrs[iShdr].sh_addr, 0, (size_t)paShdrs[iShdr].sh_size);
519 break;
520
521 case SHT_PROGBITS:
522 default:
523 {
524 int rc = pModElf->pReader->pfnRead(pModElf->pReader, (uint8_t *)pvBits + paShdrs[iShdr].sh_addr,
525 (size_t)paShdrs[iShdr].sh_size, paShdrs[iShdr].sh_offset);
526 if (RT_FAILURE(rc))
527 {
528 Log(("RTLdrELF: %s: Read error when reading " FMT_ELF_SIZE " bytes at " FMT_ELF_OFF ", iShdr=%d\n",
529 pModElf->pReader->pfnLogName(pModElf->pReader),
530 paShdrs[iShdr].sh_size, paShdrs[iShdr].sh_offset, iShdr));
531 return rc;
532 }
533 }
534 }
535 }
536 }
537
538 /*
539 * Relocate the image.
540 */
541 return pModElf->Core.pOps->pfnRelocate(pMod, pvBits, BaseAddress, ~(RTUINTPTR)0, pfnGetImport, pvUser);
542}
543
544
545/** @copydoc RTLDROPS::Relocate */
546static DECLCALLBACK(int) RTLDRELF_NAME(Relocate)(PRTLDRMODINTERNAL pMod, void *pvBits, RTUINTPTR NewBaseAddress, RTUINTPTR OldBaseAddress, PFNRTLDRIMPORT pfnGetImport, void *pvUser)
547{
548 PRTLDRMODELF pModElf = (PRTLDRMODELF)pMod;
549
550 /*
551 * Validate the input.
552 */
553 Elf_Addr BaseAddr = (Elf_Addr)NewBaseAddress;
554 AssertMsgReturn((RTUINTPTR)BaseAddr == NewBaseAddress, ("#RTptr", NewBaseAddress), VERR_IMAGE_BASE_TOO_HIGH);
555
556 /*
557 * Map the image bits if not already done and setup pointer into it.
558 */
559 int rc = RTLDRELF_NAME(MapBits)(pModElf, true);
560 if (RT_FAILURE(rc))
561 return rc;
562
563 /*
564 * Iterate the sections looking for interesting SHT_REL[A] sections.
565 * SHT_REL[A] sections have the section index of the section they contain fixups
566 * for in the sh_info member.
567 */
568 const Elf_Shdr *paShdrs = pModElf->paShdrs;
569#ifdef LOG_ENABLED
570 const char *pszLogName = pModElf->pReader->pfnLogName(pModElf->pReader);
571 Log2(("rtLdrElf: %s: Fixing up image\n", pszLogName));
572#endif
573 for (unsigned iShdr = 0; iShdr < pModElf->Ehdr.e_shnum; iShdr++)
574 {
575 const Elf_Shdr *pShdrRel = &paShdrs[iShdr];
576
577 /*
578 * Skip sections without interest to us.
579 */
580#if ELF_MODE == 32
581 if (pShdrRel->sh_type != SHT_REL)
582#else
583 if (pShdrRel->sh_type != SHT_RELA)
584#endif
585 continue;
586 if (pShdrRel->sh_info >= pModElf->Ehdr.e_shnum)
587 continue;
588 const Elf_Shdr *pShdr = &paShdrs[pShdrRel->sh_info]; /* the section to fixup. */
589 if (!(pShdr->sh_flags & SHF_ALLOC))
590 continue;
591
592 /*
593 * Relocate the section.
594 */
595 Log2(("rtldrELF: %s: Relocation records for #%d [%s] (sh_info=%d sh_link=%d) found in #%d [%s] (sh_info=%d sh_link=%d)\n",
596 pszLogName, (int)pShdrRel->sh_info, ELF_STR(pModElf, pShdr->sh_name), (int)pShdr->sh_info, (int)pShdr->sh_link,
597 iShdr, ELF_STR(pModElf, pShdrRel->sh_name), (int)pShdrRel->sh_info, (int)pShdrRel->sh_link));
598
599 /** @todo Make RelocateSection a function pointer so we can select the one corresponding to the machine when opening the image. */
600 rc = RTLDRELF_NAME(RelocateSection)(pModElf, BaseAddr, pfnGetImport, pvUser,
601 pShdr->sh_addr,
602 pShdr->sh_size,
603 (const uint8_t *)pModElf->pvBits + pShdr->sh_offset,
604 (uint8_t *)pvBits + pShdr->sh_addr,
605 (const uint8_t *)pModElf->pvBits + pShdrRel->sh_offset,
606 pShdrRel->sh_size);
607 if (RT_FAILURE(rc))
608 return rc;
609 }
610 return VINF_SUCCESS;
611}
612
613
614/** @copydoc RTLDROPS::pfnGetSymbolEx */
615static DECLCALLBACK(int) RTLDRELF_NAME(GetSymbolEx)(PRTLDRMODINTERNAL pMod, const void *pvBits, RTUINTPTR BaseAddress, const char *pszSymbol, RTUINTPTR *pValue)
616{
617 PRTLDRMODELF pModElf = (PRTLDRMODELF)pMod;
618 NOREF(pvBits);
619
620 /*
621 * Validate the input.
622 */
623 Elf_Addr BaseAddr = (Elf_Addr)BaseAddress;
624 AssertMsgReturn((RTUINTPTR)BaseAddr == BaseAddress, ("#RTptr", BaseAddress), VERR_IMAGE_BASE_TOO_HIGH);
625
626 /*
627 * Map the image bits if not already done and setup pointer into it.
628 */
629 int rc = RTLDRELF_NAME(MapBits)(pModElf, true);
630 if (RT_FAILURE(rc))
631 return rc;
632
633 /*
634 * Calc all kinds of pointers before we start iterating the symbol table.
635 */
636 const char *pStr = pModElf->pStr;
637 const Elf_Sym *paSyms = pModElf->paSyms;
638 unsigned cSyms = pModElf->cSyms;
639 for (unsigned iSym = 1; iSym < cSyms; iSym++)
640 {
641 /* Undefined symbols are not exports, they are imports. */
642 if ( paSyms[iSym].st_shndx != SHN_UNDEF
643 && ( ELF_ST_BIND(paSyms[iSym].st_info) == STB_GLOBAL
644 || ELF_ST_BIND(paSyms[iSym].st_info) == STB_WEAK))
645 {
646 /* Validate the name string and try match with it. */
647 if (paSyms[iSym].st_name < pModElf->cbStr)
648 {
649 if (!strcmp(pszSymbol, pStr + paSyms[iSym].st_name))
650 {
651 /* matched! */
652 Elf_Addr Value;
653 if (paSyms[iSym].st_shndx == SHN_ABS)
654 /* absolute symbols are not subject to any relocation. */
655 Value = paSyms[iSym].st_value;
656 else if (paSyms[iSym].st_shndx < pModElf->Ehdr.e_shnum)
657 /* relative to the section. */
658 Value = BaseAddr + paSyms[iSym].st_value + pModElf->paShdrs[paSyms[iSym].st_shndx].sh_addr;
659 else
660 {
661 AssertMsgFailed(("Arg. paSyms[iSym].st_shndx=%d\n", paSyms[iSym].st_shndx));
662 return VERR_BAD_EXE_FORMAT;
663 }
664 AssertMsgReturn(Value == (RTUINTPTR)Value, (FMT_ELF_ADDR "\n", Value), VERR_SYMBOL_VALUE_TOO_BIG);
665 *pValue = (RTUINTPTR)Value;
666 return VINF_SUCCESS;
667 }
668 }
669 else
670 {
671 AssertMsgFailed(("String outside string table! iSym=%d paSyms[iSym].st_name=%#x\n", iSym, paSyms[iSym].st_name));
672 return VERR_LDRELF_INVALID_SYMBOL_NAME_OFFSET;
673 }
674 }
675 }
676
677 return VERR_SYMBOL_NOT_FOUND;
678}
679
680
681
682/**
683 * The ELF module operations.
684 */
685static RTLDROPS RTLDRELF_MID(s_rtldrElf,Ops) =
686{
687#if ELF_MODE == 32
688 "elf32",
689#elif ELF_MODE == 64
690 "elf64",
691#endif
692 RTLDRELF_NAME(Close),
693 NULL, /* Get Symbol */
694 RTLDRELF_NAME(Done),
695 RTLDRELF_NAME(EnumSymbols),
696 /* ext: */
697 RTLDRELF_NAME(GetImageSize),
698 RTLDRELF_NAME(GetBits),
699 RTLDRELF_NAME(Relocate),
700 RTLDRELF_NAME(GetSymbolEx),
701 0
702};
703
704
705
706/**
707 * Validates the ELF header.
708 *
709 * @returns iprt status code.
710 * @param pEhdr Pointer to the ELF header.
711 * @param pszLogName The log name.
712 * @param cbRawImage The size of the raw image.
713 */
714static int RTLDRELF_NAME(ValidateElfHeader)(const Elf_Ehdr *pEhdr, const char *pszLogName, uint64_t cbRawImage)
715{
716 Log3(("RTLdrELF: e_ident: %.*Rhxs\n"
717 "RTLdrELF: e_type: " FMT_ELF_HALF "\n"
718 "RTLdrELF: e_version: " FMT_ELF_HALF "\n"
719 "RTLdrELF: e_entry: " FMT_ELF_ADDR "\n"
720 "RTLdrELF: e_phoff: " FMT_ELF_OFF "\n"
721 "RTLdrELF: e_shoff: " FMT_ELF_OFF "\n"
722 "RTLdrELF: e_flags: " FMT_ELF_WORD "\n"
723 "RTLdrELF: e_ehsize: " FMT_ELF_HALF "\n"
724 "RTLdrELF: e_phentsize: " FMT_ELF_HALF "\n"
725 "RTLdrELF: e_phnum: " FMT_ELF_HALF "\n"
726 "RTLdrELF: e_shentsize: " FMT_ELF_HALF "\n"
727 "RTLdrELF: e_shnum: " FMT_ELF_HALF "\n"
728 "RTLdrELF: e_shstrndx: " FMT_ELF_HALF "\n",
729 ELEMENTS(pEhdr->e_ident), &pEhdr->e_ident[0], pEhdr->e_type, pEhdr->e_version,
730 pEhdr->e_entry, pEhdr->e_phoff, pEhdr->e_shoff,pEhdr->e_flags, pEhdr->e_ehsize, pEhdr->e_phentsize,
731 pEhdr->e_phnum, pEhdr->e_shentsize, pEhdr->e_shnum, pEhdr->e_shstrndx));
732
733 if ( pEhdr->e_ident[EI_MAG0] != ELFMAG0
734 || pEhdr->e_ident[EI_MAG1] != ELFMAG1
735 || pEhdr->e_ident[EI_MAG2] != ELFMAG2
736 || pEhdr->e_ident[EI_MAG3] != ELFMAG3
737 )
738 {
739 Log(("RTLdrELF: %s: Invalid ELF magic (%.*Rhxs)\n", pszLogName, sizeof(pEhdr->e_ident), pEhdr->e_ident));
740 return VERR_BAD_EXE_FORMAT;
741 }
742 if (pEhdr->e_ident[EI_CLASS] != RTLDRELF_SUFF(ELFCLASS))
743 {
744 Log(("RTLdrELF: %s: Invalid ELF class (%.*Rhxs)\n", pszLogName, sizeof(pEhdr->e_ident), pEhdr->e_ident));
745 return VERR_BAD_EXE_FORMAT;
746 }
747 if (pEhdr->e_ident[EI_DATA] != ELFDATA2LSB)
748 {
749 Log(("RTLdrELF: %s: ELF endian %x is unsupported\n", pEhdr->e_ident[EI_DATA]));
750 return VERR_LDRELF_ODD_ENDIAN;
751 }
752 if (pEhdr->e_version != EV_CURRENT)
753 {
754 Log(("RTLdrELF: %s: ELF version %x is unsupported\n", pEhdr->e_version));
755 return VERR_LDRELF_VERSION;
756 }
757
758 if (sizeof(Elf_Ehdr) != pEhdr->e_ehsize)
759 {
760 Log(("RTLdrELF: %s: Elf header e_ehsize is %d expected %d!\n",
761 pszLogName, pEhdr->e_ehsize, sizeof(Elf_Ehdr)));
762 return VERR_BAD_EXE_FORMAT;
763 }
764 if ( sizeof(Elf_Phdr) != pEhdr->e_phentsize
765 && ( pEhdr->e_phnum != 0
766 || pEhdr->e_type == ET_DYN))
767 {
768 Log(("RTLdrELF: %s: Elf header e_phentsize is %d expected %d!\n",
769 pszLogName, pEhdr->e_phentsize, sizeof(Elf_Phdr)));
770 return VERR_BAD_EXE_FORMAT;
771 }
772 if (sizeof(Elf_Shdr) != pEhdr->e_shentsize)
773 {
774 Log(("RTLdrELF: %s: Elf header e_shentsize is %d expected %d!\n",
775 pszLogName, pEhdr->e_shentsize, sizeof(Elf_Shdr)));
776 return VERR_BAD_EXE_FORMAT;
777 }
778
779 switch (pEhdr->e_type)
780 {
781 case ET_REL:
782 break;
783 case ET_EXEC:
784 Log(("RTLdrELF: %s: Executable images are not supported yet!\n", pszLogName));
785 return VERR_LDRELF_EXEC;
786 case ET_DYN:
787 Log(("RTLdrELF: %s: Dynamic images are not supported yet!\n", pszLogName));
788 return VERR_LDRELF_DYN;
789 default:
790 Log(("RTLdrELF: %s: image type %#x is not supported!\n", pszLogName, pEhdr->e_type));
791 return VERR_BAD_EXE_FORMAT;
792 }
793
794 switch (pEhdr->e_machine)
795 {
796#if ELF_MODE == 32
797 case EM_386:
798 case EM_486:
799#elif ELF_MODE == 64
800 case EM_X86_64:
801#endif
802 break;
803 default:
804 Log(("RTLdrELF: %s: machine type %u is not supported!\n", pEhdr->e_machine));
805 return VERR_LDRELF_MACHINE;
806 }
807
808 if ( pEhdr->e_phoff < pEhdr->e_ehsize
809 && !(pEhdr->e_phoff && pEhdr->e_phnum)
810 && pEhdr->e_phnum)
811 {
812 Log(("RTLdrELF: %s: The program headers overlap with the ELF header! e_phoff=" FMT_ELF_OFF "\n",
813 pszLogName, pEhdr->e_phoff));
814 return VERR_BAD_EXE_FORMAT;
815 }
816 if ( pEhdr->e_phoff + pEhdr->e_phnum * pEhdr->e_phentsize > cbRawImage
817 || pEhdr->e_phoff + pEhdr->e_phnum * pEhdr->e_phentsize < pEhdr->e_phoff)
818 {
819 Log(("RTLdrELF: %s: The program headers extends beyond the file! e_phoff=" FMT_ELF_OFF " e_phnum=" FMT_ELF_HALF "\n",
820 pszLogName, pEhdr->e_phoff, pEhdr->e_phnum));
821 return VERR_BAD_EXE_FORMAT;
822 }
823
824
825 if ( pEhdr->e_shoff < pEhdr->e_ehsize
826 && !(pEhdr->e_shoff && pEhdr->e_shnum))
827 {
828 Log(("RTLdrELF: %s: The section headers overlap with the ELF header! e_shoff=" FMT_ELF_OFF "\n",
829 pszLogName, pEhdr->e_shoff));
830 return VERR_BAD_EXE_FORMAT;
831 }
832 if ( pEhdr->e_shoff + pEhdr->e_shnum * pEhdr->e_shentsize > cbRawImage
833 || pEhdr->e_shoff + pEhdr->e_shnum * pEhdr->e_shentsize < pEhdr->e_shoff)
834 {
835 Log(("RTLdrELF: %s: The section headers extends beyond the file! e_shoff=" FMT_ELF_OFF " e_shnum=" FMT_ELF_HALF "\n",
836 pszLogName, pEhdr->e_shoff, pEhdr->e_shnum));
837 return VERR_BAD_EXE_FORMAT;
838 }
839
840 return VINF_SUCCESS;
841}
842
843/**
844 * Gets the section header name.
845 *
846 * @returns pszName.
847 * @param pReader The loader reader instance.
848 * @param pEhdr The elf header.
849 * @param offName The offset of the section header name.
850 * @param pszName Where to store the name.
851 * @param cbName The size of the buffer pointed to by pszName.
852 */
853const char *RTLDRELF_NAME(GetSHdrName)(PRTLDRMODELF pModElf, Elf_Word offName, char *pszName, size_t cbName)
854{
855 RTFOFF off = pModElf->paShdrs[pModElf->Ehdr.e_shstrndx].sh_offset + offName;
856 int rc = pModElf->pReader->pfnRead(pModElf->pReader, pszName, cbName - 1, off);
857 if (RT_FAILURE(rc))
858 {
859 /* read by for byte. */
860 for (unsigned i = 0; i < cbName; i++, off++)
861 {
862 int rc = pModElf->pReader->pfnRead(pModElf->pReader, pszName + i, 1, off);
863 if (RT_FAILURE(rc))
864 {
865 pszName[i] = '\0';
866 break;
867 }
868 }
869 }
870
871 pszName[cbName - 1] = '\0';
872 return pszName;
873}
874
875
876/**
877 * Validates a section header.
878 *
879 * @returns iprt status code.
880 * @param pModElf Pointer to the module structure.
881 * @param iShdr The index of section header which should be validated.
882 * The section headers are found in the pModElf->paShdrs array.
883 * @param pszLogName The log name.
884 * @param cbRawImage The size of the raw image.
885 */
886static int RTLDRELF_NAME(ValidateSectionHeader)(PRTLDRMODELF pModElf, unsigned iShdr, const char *pszLogName, RTFOFF cbRawImage)
887{
888 const Elf_Shdr *pShdr = &pModElf->paShdrs[iShdr];
889 char szSectionName[80]; NOREF(szSectionName);
890 Log3(("RTLdrELF: Section Header #%d:\n"
891 "RTLdrELF: sh_name: " FMT_ELF_WORD " - %s\n"
892 "RTLdrELF: sh_type: " FMT_ELF_WORD " (%s)\n"
893 "RTLdrELF: sh_flags: " FMT_ELF_XWORD "\n"
894 "RTLdrELF: sh_addr: " FMT_ELF_ADDR "\n"
895 "RTLdrELF: sh_offset: " FMT_ELF_OFF "\n"
896 "RTLdrELF: sh_size: " FMT_ELF_XWORD "\n"
897 "RTLdrELF: sh_link: " FMT_ELF_WORD "\n"
898 "RTLdrELF: sh_info: " FMT_ELF_WORD "\n"
899 "RTLdrELF: sh_addralign: " FMT_ELF_XWORD "\n"
900 "RTLdrELF: sh_entsize: " FMT_ELF_XWORD "\n",
901 iShdr,
902 pShdr->sh_name, RTLDRELF_NAME(GetSHdrName)(pModElf, pShdr->sh_name, szSectionName, sizeof(szSectionName)),
903 pShdr->sh_type, rtldrElfGetShdrType(pShdr->sh_type), pShdr->sh_flags, pShdr->sh_addr,
904 pShdr->sh_offset, pShdr->sh_size, pShdr->sh_link, pShdr->sh_info, pShdr->sh_addralign,
905 pShdr->sh_entsize));
906
907 if (pShdr->sh_link >= pModElf->Ehdr.e_shnum)
908 {
909 Log(("RTLdrELF: %s: Shdr #%d: sh_link (%d) is beyond the end of the section table (%d)!\n",
910 pszLogName, iShdr, pShdr->sh_link, pModElf->Ehdr.e_shnum));
911 return VERR_BAD_EXE_FORMAT;
912 }
913
914 switch (pShdr->sh_type)
915 {
916 /** @todo find specs and check up which sh_info fields indicates section table entries */
917 case 12301230:
918 if (pShdr->sh_info >= pModElf->Ehdr.e_shnum)
919 {
920 Log(("RTLdrELF: %s: Shdr #%d: sh_info (%d) is beyond the end of the section table (%d)!\n",
921 pszLogName, iShdr, pShdr->sh_link, pModElf->Ehdr.e_shnum));
922 return VERR_BAD_EXE_FORMAT;
923 }
924 break;
925
926 case SHT_NULL:
927 case SHT_PROGBITS:
928 case SHT_SYMTAB:
929 case SHT_STRTAB:
930 case SHT_RELA:
931 case SHT_HASH:
932 case SHT_DYNAMIC:
933 case SHT_NOTE:
934 case SHT_NOBITS:
935 case SHT_REL:
936 case SHT_SHLIB:
937 case SHT_DYNSYM:
938 /*
939 * For these types sh_info doesn't have any special meaning, or anything which
940 * we need/can validate now.
941 */
942 break;
943
944
945 default:
946 Log(("RTLdrELF: %s: Warning, unknown type %d!\n", pszLogName, pShdr->sh_type));
947 break;
948 }
949
950 if ( pShdr->sh_type != SHT_NOBITS
951 && pShdr->sh_size)
952 {
953 RTFOFF offEnd = pShdr->sh_offset + pShdr->sh_size;
954 if ( offEnd > cbRawImage
955 || offEnd < (RTFOFF)pShdr->sh_offset)
956 {
957 Log(("RTLdrELF: %s: Shdr #%d: sh_offset (" FMT_ELF_OFF ") + sh_size (" FMT_ELF_XWORD " = %RTfoff) is beyond the end of the file (%RTfoff)!\n",
958 pszLogName, iShdr, pShdr->sh_offset, pShdr->sh_size, offEnd, cbRawImage));
959 return VERR_BAD_EXE_FORMAT;
960 }
961 if (pShdr->sh_offset < sizeof(Elf_Ehdr))
962 {
963 Log(("RTLdrELF: %s: Shdr #%d: sh_offset (" FMT_ELF_OFF ") + sh_size (" FMT_ELF_XWORD ") is starting in the ELF header!\n",
964 pszLogName, iShdr, pShdr->sh_offset, pShdr->sh_size, cbRawImage));
965 return VERR_BAD_EXE_FORMAT;
966 }
967 }
968
969 return VINF_SUCCESS;
970}
971
972
973
974/**
975 * Opens an ELF image, fixed bitness.
976 *
977 * @returns iprt status code.
978 * @param pReader The loader reader instance which will provide the raw image bits.
979 * @param phLdrMod Where to store the handle.
980 */
981static int RTLDRELF_NAME(Open)(PRTLDRREADER pReader, PRTLDRMOD phLdrMod)
982{
983 const char *pszLogName = pReader->pfnLogName(pReader);
984 RTFOFF cbRawImage = pReader->pfnSize(pReader);
985
986 /*
987 * Create the loader module instance.
988 */
989 PRTLDRMODELF pModElf = (PRTLDRMODELF)RTMemAllocZ(sizeof(*pModElf));
990 if (!pModElf)
991 return VERR_NO_MEMORY;
992
993 pModElf->Core.u32Magic = RTLDRMOD_MAGIC;
994 pModElf->Core.eState = LDR_STATE_INVALID;
995 pModElf->pReader = pReader;
996 //pModElf->pvBits = NULL;
997 //pModElf->Ehdr = {0};
998 //pModElf->paShdrs = NULL;
999 //pModElf->paSyms = NULL;
1000 pModElf->iSymSh = ~0U;
1001 pModElf->cSyms = 0;
1002 pModElf->iStrSh = ~0U;
1003 pModElf->cbStr = 0;
1004 pModElf->cbImage = 0;
1005 //pModElf->pStr = NULL;
1006
1007 /*
1008 * Read and validate the ELF header.
1009 */
1010 int rc = pReader->pfnRead(pReader, &pModElf->Ehdr, sizeof(pModElf->Ehdr), 0);
1011 if (RT_SUCCESS(rc))
1012 rc = RTLDRELF_NAME(ValidateElfHeader)(&pModElf->Ehdr, pszLogName, cbRawImage);
1013 if (RT_SUCCESS(rc))
1014 {
1015 /*
1016 * Read the section headers.
1017 */
1018 Elf_Shdr *paShdrs = (Elf_Shdr *)RTMemAlloc(pModElf->Ehdr.e_shnum * sizeof(Elf_Shdr));
1019 if (paShdrs)
1020 {
1021 pModElf->paShdrs = paShdrs;
1022 rc = pReader->pfnRead(pReader, paShdrs, pModElf->Ehdr.e_shnum * sizeof(Elf_Shdr),
1023 pModElf->Ehdr.e_shoff);
1024 if (RT_SUCCESS(rc))
1025 {
1026 /*
1027 * Validate the section headers, allocate memory for the sections (determin the image size),
1028 * and find relevant sections.
1029 */
1030 for (unsigned i = 0; i < pModElf->Ehdr.e_shnum; i++)
1031 {
1032 rc = RTLDRELF_NAME(ValidateSectionHeader)(pModElf, i, pszLogName, cbRawImage);
1033 if (RT_FAILURE(rc))
1034 break;
1035
1036 /* Allocate memory addresses for the section. */
1037 if (paShdrs[i].sh_flags & SHF_ALLOC)
1038 {
1039 paShdrs[i].sh_addr = paShdrs[i].sh_addralign
1040 ? RT_ALIGN_T(pModElf->cbImage, paShdrs[i].sh_addralign, Elf_Addr)
1041 : pModElf->cbImage;
1042 pModElf->cbImage = (size_t)paShdrs[i].sh_addr + (size_t)paShdrs[i].sh_size;
1043 AssertMsgReturn(pModElf->cbImage == paShdrs[i].sh_addr + paShdrs[i].sh_size,
1044 (FMT_ELF_ADDR "\n", paShdrs[i].sh_addr + paShdrs[i].sh_size),
1045 VERR_IMAGE_TOO_BIG);
1046 Log2(("RTLdrElf: %s: Assigned " FMT_ELF_ADDR " to section #%d\n", pszLogName, paShdrs[i].sh_addr, i));
1047 }
1048
1049 /* We're looking for symbol tables. */
1050 if (paShdrs[i].sh_type == SHT_SYMTAB)
1051 {
1052 if (pModElf->iSymSh != ~0U)
1053 {
1054 Log(("RTLdrElf: %s: Multiple symbol tabs! iSymSh=%d i=%d\n", pszLogName, pModElf->iSymSh, i));
1055 rc = VERR_LDRELF_MULTIPLE_SYMTABS;
1056 break;
1057 }
1058 pModElf->iSymSh = i;
1059 pModElf->cSyms = (unsigned)(paShdrs[i].sh_size / sizeof(Elf_Sym));
1060 AssertReturn(pModElf->cSyms == paShdrs[i].sh_size / sizeof(Elf_Sym), VERR_IMAGE_TOO_BIG);
1061 pModElf->iStrSh = paShdrs[i].sh_link;
1062 pModElf->cbStr = (unsigned)paShdrs[pModElf->iStrSh].sh_size;
1063 AssertReturn(pModElf->cbStr == paShdrs[pModElf->iStrSh].sh_size, VERR_IMAGE_TOO_BIG);
1064 }
1065 } /* for each section header */
1066
1067 Log2(("RTLdrElf: iSymSh=%u cSyms=%u iStrSh=%u cbStr=%u rc=%Rrc cbImage=%#zx\n",
1068 pModElf->iSymSh, pModElf->cSyms, pModElf->iStrSh, pModElf->cbStr, rc, pModElf->cbImage));
1069
1070 /*
1071 * Are the section headers fine?
1072 */
1073 if (RT_SUCCESS(rc))
1074 {
1075 pModElf->Core.pOps = &RTLDRELF_MID(s_rtldrElf,Ops);
1076 pModElf->Core.eState = LDR_STATE_OPENED;
1077 *phLdrMod = &pModElf->Core;
1078
1079 LogFlow(("%s: %s: returns VINF_SUCCESS *phLdrMod=%p\n", __FUNCTION__, pszLogName, *phLdrMod));
1080 return VINF_SUCCESS;
1081 }
1082 }
1083
1084 RTMemFree(paShdrs);
1085 }
1086 else
1087 rc = VERR_NO_MEMORY;
1088 }
1089
1090 RTMemFree(pModElf);
1091 LogFlow(("%s: returns %Rrc\n", __FUNCTION__, rc));
1092 return rc;
1093}
1094
1095
1096
1097
1098/*******************************************************************************
1099* Cleanup Constants And Macros *
1100*******************************************************************************/
1101#undef RTLDRELF_NAME
1102#undef RTLDRELF_SUFF
1103#undef RTLDRELF_MID
1104
1105#undef FMT_ELF_ADDR
1106#undef FMT_ELF_HALF
1107#undef FMT_ELF_SHALF
1108#undef FMT_ELF_OFF
1109#undef FMT_ELF_SIZE
1110#undef FMT_ELF_SWORD
1111#undef FMT_ELF_WORD
1112#undef FMT_ELF_XWORD
1113#undef FMT_ELF_SXWORD
1114
1115#undef Elf_Ehdr
1116#undef Elf_Phdr
1117#undef Elf_Shdr
1118#undef Elf_Sym
1119#undef Elf_Rel
1120#undef Elf_Rela
1121#undef Elf_Reloc
1122#undef Elf_Nhdr
1123#undef Elf_Dyn
1124
1125#undef Elf_Addr
1126#undef Elf_Half
1127#undef Elf_Off
1128#undef Elf_Size
1129#undef Elf_Sword
1130#undef Elf_Word
1131
1132#undef RTLDRMODELF
1133#undef PRTLDRMODELF
1134
1135#undef ELF_R_SYM
1136#undef ELF_R_TYPE
1137#undef ELF_R_INFO
1138
1139#undef ELF_ST_BIND
1140
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette