elf.c revision 1.1 1 /* $NetBSD: elf.c,v 1.1 2017/10/10 09:29:14 maxv Exp $ */
2
3 /*
4 * Copyright (c) 2017 The NetBSD Foundation, Inc. All rights reserved.
5 *
6 * This code is derived from software contributed to The NetBSD Foundation
7 * by Maxime Villard.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
19 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
20 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
21 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
22 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
31 #define ELFSIZE 64
32
33 #include "prekern.h"
34 #include <sys/exec_elf.h>
35
36 struct elfinfo {
37 Elf_Ehdr *ehdr;
38 Elf_Shdr *shdr;
39 char *shstrtab;
40 size_t shstrsz;
41 Elf_Sym *symtab;
42 size_t symcnt;
43 char *strtab;
44 size_t strsz;
45 struct {
46 vaddr_t va;
47 size_t sz;
48 } text;
49 struct {
50 vaddr_t va;
51 size_t sz;
52 } rodata;
53 struct {
54 vaddr_t va;
55 size_t sz;
56 } data;
57 };
58
59 static struct elfinfo eif;
60 static const char entrypoint[] = "start_prekern";
61
62 /* XXX */
63 static int
64 memcmp(const char *a, const char *b, size_t c)
65 {
66 size_t i;
67 for (i = 0; i < c; i++) {
68 if (a[i] != b[i])
69 return 1;
70 }
71 return 0;
72 }
73 static int
74 strcmp(char *a, char *b)
75 {
76 size_t i;
77 for (i = 0; a[i] != '\0'; i++) {
78 if (a[i] != b[i])
79 return 1;
80 }
81 return 0;
82 }
83
84
85 static int
86 elf_check_header()
87 {
88 if (memcmp((char *)eif.ehdr->e_ident, ELFMAG, SELFMAG) != 0 ||
89 eif.ehdr->e_ident[EI_CLASS] != ELFCLASS) {
90 return -1;
91 }
92 return 0;
93 }
94
95 static vaddr_t
96 elf_get_entrypoint()
97 {
98 Elf_Sym *sym;
99 size_t i;
100 char *buf;
101
102 for (i = 0; i < eif.symcnt; i++) {
103 sym = &eif.symtab[i];
104
105 if (ELF_ST_TYPE(sym->st_info) != STT_FUNC)
106 continue;
107 if (sym->st_name == 0)
108 continue;
109 if (sym->st_shndx == SHN_UNDEF)
110 continue; /* Skip external references */
111 buf = eif.strtab + sym->st_name;
112
113 if (!memcmp(buf, entrypoint, sizeof(entrypoint))) {
114 return (vaddr_t)sym->st_value;
115 }
116 }
117
118 return 0;
119 }
120
121 static Elf_Shdr *
122 elf_find_section(char *name)
123 {
124 char *buf;
125 size_t i;
126
127 for (i = 0; i < eif.ehdr->e_shnum; i++) {
128 if (eif.shdr[i].sh_name == 0) {
129 continue;
130 }
131 buf = eif.shstrtab + eif.shdr[i].sh_name;
132 if (!strcmp(name, buf)) {
133 return &eif.shdr[i];
134 }
135 }
136
137 return NULL;
138 }
139
140 static uintptr_t
141 elf_sym_lookup(size_t symidx)
142 {
143 const Elf_Sym *sym;
144 char *buf, *secname;
145 Elf_Shdr *sec;
146
147 if (symidx >= eif.symcnt) {
148 fatal("elf_sym_lookup: symbol beyond table");
149 }
150 sym = &eif.symtab[symidx];
151 buf = eif.strtab + sym->st_name;
152
153 if (sym->st_shndx == SHN_UNDEF) {
154 if (!memcmp(buf, "__start_link_set", 16)) {
155 secname = buf + 8;
156 sec = elf_find_section(secname);
157 if (sec == NULL) {
158 fatal("elf_sym_lookup: unknown start link set");
159 }
160 return (uintptr_t)((uint8_t *)eif.ehdr +
161 sec->sh_offset);
162 }
163 if (!memcmp(buf, "__stop_link_set", 15)) {
164 secname = buf + 7;
165 sec = elf_find_section(secname);
166 if (sec == NULL) {
167 fatal("elf_sym_lookup: unknown stop link set");
168 }
169 return (uintptr_t)((uint8_t *)eif.ehdr +
170 sec->sh_offset + sec->sh_size);
171 }
172
173 fatal("elf_sym_lookup: external symbol");
174 }
175 if (sym->st_value == 0) {
176 fatal("elf_sym_lookup: zero value");
177 }
178 return (uintptr_t)sym->st_value;
179 }
180
181 static void
182 elf_apply_reloc(uintptr_t relocbase, const void *data, bool isrela)
183 {
184 Elf64_Addr *where, val;
185 Elf32_Addr *where32, val32;
186 Elf64_Addr addr;
187 Elf64_Addr addend;
188 uintptr_t rtype, symidx;
189 const Elf_Rel *rel;
190 const Elf_Rela *rela;
191
192 if (isrela) {
193 rela = (const Elf_Rela *)data;
194 where = (Elf64_Addr *)(relocbase + rela->r_offset);
195 addend = rela->r_addend;
196 rtype = ELF_R_TYPE(rela->r_info);
197 symidx = ELF_R_SYM(rela->r_info);
198 } else {
199 rel = (const Elf_Rel *)data;
200 where = (Elf64_Addr *)(relocbase + rel->r_offset);
201 rtype = ELF_R_TYPE(rel->r_info);
202 symidx = ELF_R_SYM(rel->r_info);
203 /* Addend is 32 bit on 32 bit relocs */
204 switch (rtype) {
205 case R_X86_64_PC32:
206 case R_X86_64_32:
207 case R_X86_64_32S:
208 addend = *(Elf32_Addr *)where;
209 break;
210 default:
211 addend = *where;
212 break;
213 }
214 }
215
216 switch (rtype) {
217 case R_X86_64_NONE: /* none */
218 break;
219
220 case R_X86_64_64: /* S + A */
221 addr = elf_sym_lookup(symidx);
222 val = addr + addend;
223 *where = val;
224 break;
225
226 case R_X86_64_PC32: /* S + A - P */
227 addr = elf_sym_lookup(symidx);
228 where32 = (Elf32_Addr *)where;
229 val32 = (Elf32_Addr)(addr + addend - (Elf64_Addr)where);
230 *where32 = val32;
231 break;
232
233 case R_X86_64_32: /* S + A */
234 case R_X86_64_32S: /* S + A sign extend */
235 addr = elf_sym_lookup(symidx);
236 val32 = (Elf32_Addr)(addr + addend);
237 where32 = (Elf32_Addr *)where;
238 *where32 = val32;
239 break;
240
241 case R_X86_64_GLOB_DAT: /* S */
242 case R_X86_64_JUMP_SLOT:/* XXX need addend + offset */
243 addr = elf_sym_lookup(symidx);
244 *where = addr;
245 break;
246
247 case R_X86_64_RELATIVE: /* B + A */
248 addr = relocbase + addend;
249 val = addr;
250 *where = val;
251 break;
252
253 default:
254 fatal("elf_apply_reloc: unexpected relocation type");
255 }
256 }
257
258 static void
259 elf_build_info(vaddr_t baseva)
260 {
261 vaddr_t secva, minva, maxva;
262 size_t secsz;
263 size_t i, j;
264
265 memset(&eif, 0, sizeof(struct elfinfo));
266
267 eif.ehdr = (Elf_Ehdr *)baseva;
268 eif.shdr = (Elf_Shdr *)((uint8_t *)eif.ehdr + eif.ehdr->e_shoff);
269
270 if (elf_check_header(&eif) == -1) {
271 fatal("elf_build_info: wrong kernel ELF header");
272 }
273
274 /* Locate the section names */
275 j = eif.ehdr->e_shstrndx;
276 if (j == SHN_UNDEF) {
277 fatal("elf_build_info: shstrtab not found");
278 }
279 if (j >= eif.ehdr->e_shnum) {
280 fatal("elf_build_info: wrong shstrtab index");
281 }
282 eif.shstrtab = (char *)((uint8_t *)eif.ehdr + eif.shdr[j].sh_offset);
283 eif.shstrsz = eif.shdr[j].sh_size;
284
285 /* Locate the symbol table */
286 for (i = 0; i < eif.ehdr->e_shnum; i++) {
287 if (eif.shdr[i].sh_type == SHT_SYMTAB)
288 break;
289 }
290 if (i == eif.ehdr->e_shnum) {
291 fatal("elf_build_info: symtab not found");
292 }
293 eif.symtab = (Elf_Sym *)((uint8_t *)eif.ehdr + eif.shdr[i].sh_offset);
294 eif.symcnt = eif.shdr[i].sh_size / sizeof(Elf_Sym);
295
296 /* Also locate the string table */
297 j = eif.shdr[i].sh_link;
298 if (j == SHN_UNDEF || j >= eif.ehdr->e_shnum) {
299 fatal("elf_build_info: wrong strtab index");
300 }
301 if (eif.shdr[j].sh_type != SHT_STRTAB) {
302 fatal("elf_build_info: wrong strtab type");
303 }
304 eif.strtab = (char *)((uint8_t *)eif.ehdr + eif.shdr[j].sh_offset);
305 eif.strsz = eif.shdr[j].sh_size;
306
307 /*
308 * Save the locations of the kernel segments. Attention: there is a
309 * difference between "segment" and "section". A segment can contain
310 * several sections.
311 */
312
313 /* text */
314 minva = 0xFFFFFFFFFFFFFFFF, maxva = 0;
315 for (i = 0; i < eif.ehdr->e_shnum; i++) {
316 if (eif.shdr[i].sh_type != SHT_NOBITS &&
317 eif.shdr[i].sh_type != SHT_PROGBITS) {
318 continue;
319 }
320 if (!(eif.shdr[i].sh_flags & SHF_EXECINSTR)) {
321 continue;
322 }
323 secva = baseva + eif.shdr[i].sh_offset;
324 secsz = eif.shdr[i].sh_size;
325 if (secva < minva) {
326 minva = secva;
327 }
328 if (secva + secsz > maxva) {
329 maxva = secva + secsz;
330 }
331 }
332 eif.text.va = minva;
333 eif.text.sz = roundup(maxva - minva, PAGE_SIZE);
334 ASSERT(eif.text.va % PAGE_SIZE == 0);
335
336 /* rodata */
337 minva = 0xFFFFFFFFFFFFFFFF, maxva = 0;
338 for (i = 0; i < eif.ehdr->e_shnum; i++) {
339 if (eif.shdr[i].sh_type != SHT_NOBITS &&
340 eif.shdr[i].sh_type != SHT_PROGBITS) {
341 continue;
342 }
343 if ((eif.shdr[i].sh_flags & (SHF_EXECINSTR|SHF_WRITE))) {
344 continue;
345 }
346 secva = baseva + eif.shdr[i].sh_offset;
347 secsz = eif.shdr[i].sh_size;
348 if (secva < minva) {
349 minva = secva;
350 }
351 if (secva + secsz > maxva) {
352 maxva = secva + secsz;
353 }
354 }
355 eif.rodata.va = minva;
356 eif.rodata.sz = roundup(maxva - minva, PAGE_SIZE);
357 ASSERT(eif.rodata.va % PAGE_SIZE == 0);
358
359 /* data */
360 minva = 0xFFFFFFFFFFFFFFFF, maxva = 0;
361 for (i = 0; i < eif.ehdr->e_shnum; i++) {
362 if (eif.shdr[i].sh_type != SHT_NOBITS &&
363 eif.shdr[i].sh_type != SHT_PROGBITS) {
364 continue;
365 }
366 if (!(eif.shdr[i].sh_flags & SHF_WRITE) ||
367 (eif.shdr[i].sh_flags & SHF_EXECINSTR)) {
368 continue;
369 }
370 secva = baseva + eif.shdr[i].sh_offset;
371 secsz = eif.shdr[i].sh_size;
372 if (secva < minva) {
373 minva = secva;
374 }
375 if (secva + secsz > maxva) {
376 maxva = secva + secsz;
377 }
378 }
379 eif.data.va = minva;
380 eif.data.sz = roundup(maxva - minva, PAGE_SIZE);
381 ASSERT(eif.data.va % PAGE_SIZE == 0);
382 }
383
384 vaddr_t
385 elf_kernel_reloc(vaddr_t baseva)
386 {
387 vaddr_t secva, ent;
388 Elf_Sym *sym;
389 size_t i, j;
390
391 elf_build_info(baseva);
392
393 print_state(true, "ELF info created");
394
395 /*
396 * The loaded sections are: SHT_PROGBITS, SHT_NOBITS, SHT_STRTAB,
397 * SHT_SYMTAB.
398 */
399
400 /*
401 * Update all symbol values with the appropriate offset.
402 */
403 for (i = 0; i < eif.ehdr->e_shnum; i++) {
404 if (eif.shdr[i].sh_type != SHT_NOBITS &&
405 eif.shdr[i].sh_type != SHT_PROGBITS) {
406 continue;
407 }
408 secva = baseva + eif.shdr[i].sh_offset;
409 for (j = 0; j < eif.symcnt; j++) {
410 sym = &eif.symtab[j];
411 if (sym->st_shndx != i) {
412 continue;
413 }
414 sym->st_value += (Elf_Addr)secva;
415 }
416 }
417
418 print_state(true, "Symbol values updated");
419
420 /*
421 * Perform relocations without addend if there are any.
422 */
423 for (i = 0; i < eif.ehdr->e_shnum; i++) {
424 Elf_Rel *reltab, *rel;
425 size_t secidx, nrel;
426 uintptr_t base;
427
428 if (eif.shdr[i].sh_type != SHT_REL)
429 continue;
430
431 reltab = (Elf_Rel *)((uint8_t *)eif.ehdr + eif.shdr[i].sh_offset);
432 nrel = eif.shdr[i].sh_size / sizeof(Elf_Rel);
433
434 secidx = eif.shdr[i].sh_info;
435 if (secidx >= eif.ehdr->e_shnum) {
436 fatal("elf_kernel_reloc: wrong REL relocation");
437 }
438 base = (uintptr_t)eif.ehdr + eif.shdr[secidx].sh_offset;
439
440 for (j = 0; j < nrel; j++) {
441 rel = &reltab[j];
442 elf_apply_reloc(base, rel, false);
443 }
444 }
445
446 print_state(true, "REL relocations applied");
447
448 /*
449 * Perform relocations with addend if there are any.
450 */
451 for (i = 0; i < eif.ehdr->e_shnum; i++) {
452 Elf_Rela *relatab, *rela;
453 size_t secidx, nrela;
454 uintptr_t base;
455
456 if (eif.shdr[i].sh_type != SHT_RELA)
457 continue;
458
459 relatab = (Elf_Rela *)((uint8_t *)eif.ehdr + eif.shdr[i].sh_offset);
460 nrela = eif.shdr[i].sh_size / sizeof(Elf_Rela);
461
462 secidx = eif.shdr[i].sh_info;
463 if (secidx >= eif.ehdr->e_shnum) {
464 fatal("elf_kernel_reloc: wrong RELA relocation");
465 }
466 base = (uintptr_t)eif.ehdr + eif.shdr[secidx].sh_offset;
467
468 for (j = 0; j < nrela; j++) {
469 rela = &relatab[j];
470 elf_apply_reloc(base, rela, true);
471 }
472 }
473
474 print_state(true, "RELA relocations applied");
475
476 /*
477 * Get the entry point.
478 */
479 ent = elf_get_entrypoint(&eif);
480 if (ent == 0) {
481 fatal("elf_kernel_reloc: entry point not found");
482 }
483
484 print_state(true, "Entry point found");
485
486 /*
487 * Remap the code segments with proper permissions.
488 */
489 mm_mprotect(eif.text.va, eif.text.sz, MM_PROT_READ|MM_PROT_EXECUTE);
490 mm_mprotect(eif.rodata.va, eif.rodata.sz, MM_PROT_READ);
491 mm_mprotect(eif.data.va, eif.data.sz, MM_PROT_READ|MM_PROT_WRITE);
492
493 print_state(true, "Segments protection updated");
494
495 return ent;
496 }
497
498 void
499 elf_get_text(vaddr_t *va, paddr_t *pa, size_t *sz)
500 {
501 *va = eif.text.va;
502 *pa = mm_vatopa(eif.text.va);
503 *sz = eif.text.sz;
504 }
505
506 void
507 elf_get_rodata(vaddr_t *va, paddr_t *pa, size_t *sz)
508 {
509 *va = eif.rodata.va;
510 *pa = mm_vatopa(eif.rodata.va);
511 *sz = eif.rodata.sz;
512 }
513
514 void
515 elf_get_data(vaddr_t *va, paddr_t *pa, size_t *sz)
516 {
517 *va = eif.data.va;
518 *pa = mm_vatopa(eif.data.va);
519 *sz = eif.data.sz;
520 }
521