Index: head/contrib/binutils/bfd/elf.c =================================================================== --- head/contrib/binutils/bfd/elf.c (revision 59341) +++ head/contrib/binutils/bfd/elf.c (revision 59342) @@ -1,4354 +1,4357 @@ /* ELF executable support for BFD. Copyright 1993, 94, 95, 96, 97, 1998 Free Software Foundation, Inc. This file is part of BFD, the Binary File Descriptor library. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ /* $FreeBSD$ */ /* SECTION ELF backends BFD support for ELF formats is being worked on. Currently, the best supported back ends are for sparc and i386 (running svr4 or Solaris 2). Documentation of the internals of the support code still needs to be written. The code is changing quickly enough that we haven't bothered yet. */ #include "bfd.h" #include "sysdep.h" #include "bfdlink.h" #include "libbfd.h" #define ARCH_SIZE 0 #include "elf-bfd.h" -#define EI_BRAND_OFFSET 8 /* should be in binutils/include/elf/common.h */ -#if defined(__FreeBSD__) -#define BRANDING "FreeBSD" -#else -#define BRANDING "" -#endif - static INLINE struct elf_segment_map *make_mapping PARAMS ((bfd *, asection **, unsigned int, unsigned int, boolean)); static boolean map_sections_to_segments PARAMS ((bfd *)); static int elf_sort_sections PARAMS ((const PTR, const PTR)); static boolean assign_file_positions_for_segments PARAMS ((bfd *)); static boolean assign_file_positions_except_relocs PARAMS ((bfd *)); static boolean prep_headers PARAMS ((bfd *)); static boolean swap_out_syms PARAMS ((bfd *, struct bfd_strtab_hash **)); static boolean copy_private_bfd_data PARAMS ((bfd *, bfd *)); static char *elf_read PARAMS ((bfd *, long, unsigned int)); static void elf_fake_sections PARAMS ((bfd *, asection *, PTR)); static boolean assign_section_numbers PARAMS ((bfd *)); static INLINE int sym_is_global PARAMS ((bfd *, asymbol *)); static boolean elf_map_symbols PARAMS ((bfd *)); static bfd_size_type get_program_header_size PARAMS ((bfd *)); /* Swap version information in and out. The version information is currently size independent. If that ever changes, this code will need to move into elfcode.h. */ /* Swap in a Verdef structure. */ void _bfd_elf_swap_verdef_in (abfd, src, dst) bfd *abfd; const Elf_External_Verdef *src; Elf_Internal_Verdef *dst; { dst->vd_version = bfd_h_get_16 (abfd, src->vd_version); dst->vd_flags = bfd_h_get_16 (abfd, src->vd_flags); dst->vd_ndx = bfd_h_get_16 (abfd, src->vd_ndx); dst->vd_cnt = bfd_h_get_16 (abfd, src->vd_cnt); dst->vd_hash = bfd_h_get_32 (abfd, src->vd_hash); dst->vd_aux = bfd_h_get_32 (abfd, src->vd_aux); dst->vd_next = bfd_h_get_32 (abfd, src->vd_next); } /* Swap out a Verdef structure. */ void _bfd_elf_swap_verdef_out (abfd, src, dst) bfd *abfd; const Elf_Internal_Verdef *src; Elf_External_Verdef *dst; { bfd_h_put_16 (abfd, src->vd_version, dst->vd_version); bfd_h_put_16 (abfd, src->vd_flags, dst->vd_flags); bfd_h_put_16 (abfd, src->vd_ndx, dst->vd_ndx); bfd_h_put_16 (abfd, src->vd_cnt, dst->vd_cnt); bfd_h_put_32 (abfd, src->vd_hash, dst->vd_hash); bfd_h_put_32 (abfd, src->vd_aux, dst->vd_aux); bfd_h_put_32 (abfd, src->vd_next, dst->vd_next); } /* Swap in a Verdaux structure. */ void _bfd_elf_swap_verdaux_in (abfd, src, dst) bfd *abfd; const Elf_External_Verdaux *src; Elf_Internal_Verdaux *dst; { dst->vda_name = bfd_h_get_32 (abfd, src->vda_name); dst->vda_next = bfd_h_get_32 (abfd, src->vda_next); } /* Swap out a Verdaux structure. */ void _bfd_elf_swap_verdaux_out (abfd, src, dst) bfd *abfd; const Elf_Internal_Verdaux *src; Elf_External_Verdaux *dst; { bfd_h_put_32 (abfd, src->vda_name, dst->vda_name); bfd_h_put_32 (abfd, src->vda_next, dst->vda_next); } /* Swap in a Verneed structure. */ void _bfd_elf_swap_verneed_in (abfd, src, dst) bfd *abfd; const Elf_External_Verneed *src; Elf_Internal_Verneed *dst; { dst->vn_version = bfd_h_get_16 (abfd, src->vn_version); dst->vn_cnt = bfd_h_get_16 (abfd, src->vn_cnt); dst->vn_file = bfd_h_get_32 (abfd, src->vn_file); dst->vn_aux = bfd_h_get_32 (abfd, src->vn_aux); dst->vn_next = bfd_h_get_32 (abfd, src->vn_next); } /* Swap out a Verneed structure. */ void _bfd_elf_swap_verneed_out (abfd, src, dst) bfd *abfd; const Elf_Internal_Verneed *src; Elf_External_Verneed *dst; { bfd_h_put_16 (abfd, src->vn_version, dst->vn_version); bfd_h_put_16 (abfd, src->vn_cnt, dst->vn_cnt); bfd_h_put_32 (abfd, src->vn_file, dst->vn_file); bfd_h_put_32 (abfd, src->vn_aux, dst->vn_aux); bfd_h_put_32 (abfd, src->vn_next, dst->vn_next); } /* Swap in a Vernaux structure. */ void _bfd_elf_swap_vernaux_in (abfd, src, dst) bfd *abfd; const Elf_External_Vernaux *src; Elf_Internal_Vernaux *dst; { dst->vna_hash = bfd_h_get_32 (abfd, src->vna_hash); dst->vna_flags = bfd_h_get_16 (abfd, src->vna_flags); dst->vna_other = bfd_h_get_16 (abfd, src->vna_other); dst->vna_name = bfd_h_get_32 (abfd, src->vna_name); dst->vna_next = bfd_h_get_32 (abfd, src->vna_next); } /* Swap out a Vernaux structure. */ void _bfd_elf_swap_vernaux_out (abfd, src, dst) bfd *abfd; const Elf_Internal_Vernaux *src; Elf_External_Vernaux *dst; { bfd_h_put_32 (abfd, src->vna_hash, dst->vna_hash); bfd_h_put_16 (abfd, src->vna_flags, dst->vna_flags); bfd_h_put_16 (abfd, src->vna_other, dst->vna_other); bfd_h_put_32 (abfd, src->vna_name, dst->vna_name); bfd_h_put_32 (abfd, src->vna_next, dst->vna_next); } /* Swap in a Versym structure. */ void _bfd_elf_swap_versym_in (abfd, src, dst) bfd *abfd; const Elf_External_Versym *src; Elf_Internal_Versym *dst; { dst->vs_vers = bfd_h_get_16 (abfd, src->vs_vers); } /* Swap out a Versym structure. */ void _bfd_elf_swap_versym_out (abfd, src, dst) bfd *abfd; const Elf_Internal_Versym *src; Elf_External_Versym *dst; { bfd_h_put_16 (abfd, src->vs_vers, dst->vs_vers); } /* Standard ELF hash function. Do not change this function; you will cause invalid hash tables to be generated. (Well, you would if this were being used yet.) */ unsigned long bfd_elf_hash (name) CONST unsigned char *name; { unsigned long h = 0; unsigned long g; int ch; while ((ch = *name++) != '\0') { h = (h << 4) + ch; if ((g = (h & 0xf0000000)) != 0) { h ^= g >> 24; h &= ~g; } } return h; } /* Read a specified number of bytes at a specified offset in an ELF file, into a newly allocated buffer, and return a pointer to the buffer. */ static char * elf_read (abfd, offset, size) bfd * abfd; long offset; unsigned int size; { char *buf; if ((buf = bfd_alloc (abfd, size)) == NULL) return NULL; if (bfd_seek (abfd, offset, SEEK_SET) == -1) return NULL; if (bfd_read ((PTR) buf, size, 1, abfd) != size) { if (bfd_get_error () != bfd_error_system_call) bfd_set_error (bfd_error_file_truncated); return NULL; } return buf; } boolean bfd_elf_mkobject (abfd) bfd * abfd; { /* this just does initialization */ /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */ elf_tdata (abfd) = (struct elf_obj_tdata *) bfd_zalloc (abfd, sizeof (struct elf_obj_tdata)); if (elf_tdata (abfd) == 0) return false; /* since everything is done at close time, do we need any initialization? */ return true; } char * bfd_elf_get_str_section (abfd, shindex) bfd * abfd; unsigned int shindex; { Elf_Internal_Shdr **i_shdrp; char *shstrtab = NULL; unsigned int offset; unsigned int shstrtabsize; i_shdrp = elf_elfsections (abfd); if (i_shdrp == 0 || i_shdrp[shindex] == 0) return 0; shstrtab = (char *) i_shdrp[shindex]->contents; if (shstrtab == NULL) { /* No cached one, attempt to read, and cache what we read. */ offset = i_shdrp[shindex]->sh_offset; shstrtabsize = i_shdrp[shindex]->sh_size; shstrtab = elf_read (abfd, offset, shstrtabsize); i_shdrp[shindex]->contents = (PTR) shstrtab; } return shstrtab; } char * bfd_elf_string_from_elf_section (abfd, shindex, strindex) bfd * abfd; unsigned int shindex; unsigned int strindex; { Elf_Internal_Shdr *hdr; if (strindex == 0) return ""; hdr = elf_elfsections (abfd)[shindex]; if (hdr->contents == NULL && bfd_elf_get_str_section (abfd, shindex) == NULL) return NULL; if (strindex >= hdr->sh_size) { (*_bfd_error_handler) ("%s: invalid string offset %u >= %lu for section `%s'", bfd_get_filename (abfd), strindex, (unsigned long) hdr->sh_size, ((shindex == elf_elfheader(abfd)->e_shstrndx && strindex == hdr->sh_name) ? ".shstrtab" : elf_string_from_elf_strtab (abfd, hdr->sh_name))); return ""; } return ((char *) hdr->contents) + strindex; } /* Make a BFD section from an ELF section. We store a pointer to the BFD section in the bfd_section field of the header. */ boolean _bfd_elf_make_section_from_shdr (abfd, hdr, name) bfd *abfd; Elf_Internal_Shdr *hdr; const char *name; { asection *newsect; flagword flags; if (hdr->bfd_section != NULL) { BFD_ASSERT (strcmp (name, bfd_get_section_name (abfd, hdr->bfd_section)) == 0); return true; } newsect = bfd_make_section_anyway (abfd, name); if (newsect == NULL) return false; newsect->filepos = hdr->sh_offset; if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr) || ! bfd_set_section_size (abfd, newsect, hdr->sh_size) || ! bfd_set_section_alignment (abfd, newsect, bfd_log2 (hdr->sh_addralign))) return false; flags = SEC_NO_FLAGS; if (hdr->sh_type != SHT_NOBITS) flags |= SEC_HAS_CONTENTS; if ((hdr->sh_flags & SHF_ALLOC) != 0) { flags |= SEC_ALLOC; if (hdr->sh_type != SHT_NOBITS) flags |= SEC_LOAD; } if ((hdr->sh_flags & SHF_WRITE) == 0) flags |= SEC_READONLY; if ((hdr->sh_flags & SHF_EXECINSTR) != 0) flags |= SEC_CODE; else if ((flags & SEC_LOAD) != 0) flags |= SEC_DATA; /* The debugging sections appear to be recognized only by name, not any sort of flag. */ if (strncmp (name, ".debug", sizeof ".debug" - 1) == 0 || strncmp (name, ".line", sizeof ".line" - 1) == 0 || strncmp (name, ".stab", sizeof ".stab" - 1) == 0) flags |= SEC_DEBUGGING; /* As a GNU extension, if the name begins with .gnu.linkonce, we only link a single copy of the section. This is used to support g++. g++ will emit each template expansion in its own section. The symbols will be defined as weak, so that multiple definitions are permitted. The GNU linker extension is to actually discard all but one of the sections. */ if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0) flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD; if (! bfd_set_section_flags (abfd, newsect, flags)) return false; if ((flags & SEC_ALLOC) != 0) { Elf_Internal_Phdr *phdr; unsigned int i; /* Look through the phdrs to see if we need to adjust the lma. */ phdr = elf_tdata (abfd)->phdr; for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++) { if (phdr->p_type == PT_LOAD && phdr->p_paddr != 0 && phdr->p_vaddr != phdr->p_paddr && phdr->p_vaddr <= hdr->sh_addr && phdr->p_vaddr + phdr->p_memsz >= hdr->sh_addr + hdr->sh_size && ((flags & SEC_LOAD) == 0 || (phdr->p_offset <= (bfd_vma) hdr->sh_offset && (phdr->p_offset + phdr->p_filesz >= hdr->sh_offset + hdr->sh_size)))) { newsect->lma += phdr->p_paddr - phdr->p_vaddr; break; } } } hdr->bfd_section = newsect; elf_section_data (newsect)->this_hdr = *hdr; return true; } /* INTERNAL_FUNCTION bfd_elf_find_section SYNOPSIS struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name); DESCRIPTION Helper functions for GDB to locate the string tables. Since BFD hides string tables from callers, GDB needs to use an internal hook to find them. Sun's .stabstr, in particular, isn't even pointed to by the .stab section, so ordinary mechanisms wouldn't work to find it, even if we had some. */ struct elf_internal_shdr * bfd_elf_find_section (abfd, name) bfd * abfd; char *name; { Elf_Internal_Shdr **i_shdrp; char *shstrtab; unsigned int max; unsigned int i; i_shdrp = elf_elfsections (abfd); if (i_shdrp != NULL) { shstrtab = bfd_elf_get_str_section (abfd, elf_elfheader (abfd)->e_shstrndx); if (shstrtab != NULL) { max = elf_elfheader (abfd)->e_shnum; for (i = 1; i < max; i++) if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name)) return i_shdrp[i]; } } return 0; } const char *const bfd_elf_section_type_names[] = { "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB", "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE", "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM", }; /* ELF relocs are against symbols. If we are producing relocateable output, and the reloc is against an external symbol, and nothing has given us any additional addend, the resulting reloc will also be against the same symbol. In such a case, we don't want to change anything about the way the reloc is handled, since it will all be done at final link time. Rather than put special case code into bfd_perform_relocation, all the reloc types use this howto function. It just short circuits the reloc if producing relocateable output against an external symbol. */ /*ARGSUSED*/ bfd_reloc_status_type bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data, input_section, output_bfd, error_message) bfd *abfd; arelent *reloc_entry; asymbol *symbol; PTR data; asection *input_section; bfd *output_bfd; char **error_message; { if (output_bfd != (bfd *) NULL && (symbol->flags & BSF_SECTION_SYM) == 0 && (! reloc_entry->howto->partial_inplace || reloc_entry->addend == 0)) { reloc_entry->address += input_section->output_offset; return bfd_reloc_ok; } return bfd_reloc_continue; } /* Print out the program headers. */ boolean _bfd_elf_print_private_bfd_data (abfd, farg) bfd *abfd; PTR farg; { FILE *f = (FILE *) farg; Elf_Internal_Phdr *p; asection *s; bfd_byte *dynbuf = NULL; p = elf_tdata (abfd)->phdr; if (p != NULL) { unsigned int i, c; fprintf (f, "\nProgram Header:\n"); c = elf_elfheader (abfd)->e_phnum; for (i = 0; i < c; i++, p++) { const char *s; char buf[20]; switch (p->p_type) { case PT_NULL: s = "NULL"; break; case PT_LOAD: s = "LOAD"; break; case PT_DYNAMIC: s = "DYNAMIC"; break; case PT_INTERP: s = "INTERP"; break; case PT_NOTE: s = "NOTE"; break; case PT_SHLIB: s = "SHLIB"; break; case PT_PHDR: s = "PHDR"; break; default: sprintf (buf, "0x%lx", p->p_type); s = buf; break; } fprintf (f, "%8s off 0x", s); fprintf_vma (f, p->p_offset); fprintf (f, " vaddr 0x"); fprintf_vma (f, p->p_vaddr); fprintf (f, " paddr 0x"); fprintf_vma (f, p->p_paddr); fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align)); fprintf (f, " filesz 0x"); fprintf_vma (f, p->p_filesz); fprintf (f, " memsz 0x"); fprintf_vma (f, p->p_memsz); fprintf (f, " flags %c%c%c", (p->p_flags & PF_R) != 0 ? 'r' : '-', (p->p_flags & PF_W) != 0 ? 'w' : '-', (p->p_flags & PF_X) != 0 ? 'x' : '-'); if ((p->p_flags &~ (PF_R | PF_W | PF_X)) != 0) fprintf (f, " %lx", p->p_flags &~ (PF_R | PF_W | PF_X)); fprintf (f, "\n"); } } s = bfd_get_section_by_name (abfd, ".dynamic"); if (s != NULL) { int elfsec; unsigned long link; bfd_byte *extdyn, *extdynend; size_t extdynsize; void (*swap_dyn_in) PARAMS ((bfd *, const PTR, Elf_Internal_Dyn *)); fprintf (f, "\nDynamic Section:\n"); dynbuf = (bfd_byte *) bfd_malloc (s->_raw_size); if (dynbuf == NULL) goto error_return; if (! bfd_get_section_contents (abfd, s, (PTR) dynbuf, (file_ptr) 0, s->_raw_size)) goto error_return; elfsec = _bfd_elf_section_from_bfd_section (abfd, s); if (elfsec == -1) goto error_return; link = elf_elfsections (abfd)[elfsec]->sh_link; extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn; swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in; extdyn = dynbuf; extdynend = extdyn + s->_raw_size; for (; extdyn < extdynend; extdyn += extdynsize) { Elf_Internal_Dyn dyn; const char *name; char ab[20]; boolean stringp; (*swap_dyn_in) (abfd, (PTR) extdyn, &dyn); if (dyn.d_tag == DT_NULL) break; stringp = false; switch (dyn.d_tag) { default: sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag); name = ab; break; case DT_NEEDED: name = "NEEDED"; stringp = true; break; case DT_PLTRELSZ: name = "PLTRELSZ"; break; case DT_PLTGOT: name = "PLTGOT"; break; case DT_HASH: name = "HASH"; break; case DT_STRTAB: name = "STRTAB"; break; case DT_SYMTAB: name = "SYMTAB"; break; case DT_RELA: name = "RELA"; break; case DT_RELASZ: name = "RELASZ"; break; case DT_RELAENT: name = "RELAENT"; break; case DT_STRSZ: name = "STRSZ"; break; case DT_SYMENT: name = "SYMENT"; break; case DT_INIT: name = "INIT"; break; case DT_FINI: name = "FINI"; break; case DT_SONAME: name = "SONAME"; stringp = true; break; case DT_RPATH: name = "RPATH"; stringp = true; break; case DT_SYMBOLIC: name = "SYMBOLIC"; break; case DT_REL: name = "REL"; break; case DT_RELSZ: name = "RELSZ"; break; case DT_RELENT: name = "RELENT"; break; case DT_PLTREL: name = "PLTREL"; break; case DT_DEBUG: name = "DEBUG"; break; case DT_TEXTREL: name = "TEXTREL"; break; case DT_JMPREL: name = "JMPREL"; break; case DT_AUXILIARY: name = "AUXILIARY"; stringp = true; break; case DT_FILTER: name = "FILTER"; stringp = true; break; case DT_VERSYM: name = "VERSYM"; break; case DT_VERDEF: name = "VERDEF"; break; case DT_VERDEFNUM: name = "VERDEFNUM"; break; case DT_VERNEED: name = "VERNEED"; break; case DT_VERNEEDNUM: name = "VERNEEDNUM"; break; } fprintf (f, " %-11s ", name); if (! stringp) fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val); else { const char *string; string = bfd_elf_string_from_elf_section (abfd, link, dyn.d_un.d_val); if (string == NULL) goto error_return; fprintf (f, "%s", string); } fprintf (f, "\n"); } free (dynbuf); dynbuf = NULL; } if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL) || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL)) { if (! _bfd_elf_slurp_version_tables (abfd)) return false; } if (elf_dynverdef (abfd) != 0) { Elf_Internal_Verdef *t; fprintf (f, "\nVersion definitions:\n"); for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef) { fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx, t->vd_flags, t->vd_hash, t->vd_nodename); if (t->vd_auxptr->vda_nextptr != NULL) { Elf_Internal_Verdaux *a; fprintf (f, "\t"); for (a = t->vd_auxptr->vda_nextptr; a != NULL; a = a->vda_nextptr) fprintf (f, "%s ", a->vda_nodename); fprintf (f, "\n"); } } } if (elf_dynverref (abfd) != 0) { Elf_Internal_Verneed *t; fprintf (f, "\nVersion References:\n"); for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref) { Elf_Internal_Vernaux *a; fprintf (f, " required from %s:\n", t->vn_filename); for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr) fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash, a->vna_flags, a->vna_other, a->vna_nodename); } } return true; error_return: if (dynbuf != NULL) free (dynbuf); return false; } /* Display ELF-specific fields of a symbol. */ void bfd_elf_print_symbol (abfd, filep, symbol, how) bfd *abfd; PTR filep; asymbol *symbol; bfd_print_symbol_type how; { FILE *file = (FILE *) filep; switch (how) { case bfd_print_symbol_name: fprintf (file, "%s", symbol->name); break; case bfd_print_symbol_more: fprintf (file, "elf "); fprintf_vma (file, symbol->value); fprintf (file, " %lx", (long) symbol->flags); break; case bfd_print_symbol_all: { CONST char *section_name; section_name = symbol->section ? symbol->section->name : "(*none*)"; bfd_print_symbol_vandf ((PTR) file, symbol); fprintf (file, " %s\t", section_name); /* Print the "other" value for a symbol. For common symbols, we've already printed the size; now print the alignment. For other symbols, we have no specified alignment, and we've printed the address; now print the size. */ fprintf_vma (file, (bfd_is_com_section (symbol->section) ? ((elf_symbol_type *) symbol)->internal_elf_sym.st_value : ((elf_symbol_type *) symbol)->internal_elf_sym.st_size)); /* If we have version information, print it. */ if (elf_tdata (abfd)->dynversym_section != 0 && (elf_tdata (abfd)->dynverdef_section != 0 || elf_tdata (abfd)->dynverref_section != 0)) { unsigned int vernum; const char *version_string; vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION; if (vernum == 0) version_string = ""; else if (vernum == 1) version_string = "Base"; else if (vernum <= elf_tdata (abfd)->cverdefs) version_string = elf_tdata (abfd)->verdef[vernum - 1].vd_nodename; else { Elf_Internal_Verneed *t; version_string = ""; for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref) { Elf_Internal_Vernaux *a; for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr) { if (a->vna_other == vernum) { version_string = a->vna_nodename; break; } } } } if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0) fprintf (file, " %-11s", version_string); else { int i; fprintf (file, " (%s)", version_string); for (i = 10 - strlen (version_string); i > 0; --i) putc (' ', file); } } /* If the st_other field is not zero, print it. */ if (((elf_symbol_type *) symbol)->internal_elf_sym.st_other != 0) fprintf (file, " 0x%02x", ((unsigned int) ((elf_symbol_type *) symbol)->internal_elf_sym.st_other)); fprintf (file, " %s", symbol->name); } break; } } /* Create an entry in an ELF linker hash table. */ struct bfd_hash_entry * _bfd_elf_link_hash_newfunc (entry, table, string) struct bfd_hash_entry *entry; struct bfd_hash_table *table; const char *string; { struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry; /* Allocate the structure if it has not already been allocated by a subclass. */ if (ret == (struct elf_link_hash_entry *) NULL) ret = ((struct elf_link_hash_entry *) bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry))); if (ret == (struct elf_link_hash_entry *) NULL) return (struct bfd_hash_entry *) ret; /* Call the allocation method of the superclass. */ ret = ((struct elf_link_hash_entry *) _bfd_link_hash_newfunc ((struct bfd_hash_entry *) ret, table, string)); if (ret != (struct elf_link_hash_entry *) NULL) { /* Set local fields. */ ret->indx = -1; ret->size = 0; ret->dynindx = -1; ret->dynstr_index = 0; ret->weakdef = NULL; ret->got_offset = (bfd_vma) -1; ret->plt_offset = (bfd_vma) -1; ret->linker_section_pointer = (elf_linker_section_pointers_t *)0; ret->verinfo.verdef = NULL; ret->type = STT_NOTYPE; ret->other = 0; /* Assume that we have been called by a non-ELF symbol reader. This flag is then reset by the code which reads an ELF input file. This ensures that a symbol created by a non-ELF symbol reader will have the flag set correctly. */ ret->elf_link_hash_flags = ELF_LINK_NON_ELF; } return (struct bfd_hash_entry *) ret; } /* Initialize an ELF linker hash table. */ boolean _bfd_elf_link_hash_table_init (table, abfd, newfunc) struct elf_link_hash_table *table; bfd *abfd; struct bfd_hash_entry *(*newfunc) PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *)); { table->dynamic_sections_created = false; table->dynobj = NULL; /* The first dynamic symbol is a dummy. */ table->dynsymcount = 1; table->dynstr = NULL; table->bucketcount = 0; table->needed = NULL; table->hgot = NULL; table->stab_info = NULL; return _bfd_link_hash_table_init (&table->root, abfd, newfunc); } /* Create an ELF linker hash table. */ struct bfd_link_hash_table * _bfd_elf_link_hash_table_create (abfd) bfd *abfd; { struct elf_link_hash_table *ret; ret = ((struct elf_link_hash_table *) bfd_alloc (abfd, sizeof (struct elf_link_hash_table))); if (ret == (struct elf_link_hash_table *) NULL) return NULL; if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc)) { bfd_release (abfd, ret); return NULL; } return &ret->root; } /* This is a hook for the ELF emulation code in the generic linker to tell the backend linker what file name to use for the DT_NEEDED entry for a dynamic object. The generic linker passes name as an empty string to indicate that no DT_NEEDED entry should be made. */ void bfd_elf_set_dt_needed_name (abfd, name) bfd *abfd; const char *name; { if (bfd_get_flavour (abfd) == bfd_target_elf_flavour && bfd_get_format (abfd) == bfd_object) elf_dt_name (abfd) = name; } /* Get the list of DT_NEEDED entries for a link. This is a hook for the ELF emulation code. */ struct bfd_link_needed_list * bfd_elf_get_needed_list (abfd, info) bfd *abfd; struct bfd_link_info *info; { if (info->hash->creator->flavour != bfd_target_elf_flavour) return NULL; return elf_hash_table (info)->needed; } /* Get the name actually used for a dynamic object for a link. This is the SONAME entry if there is one. Otherwise, it is the string passed to bfd_elf_set_dt_needed_name, or it is the filename. */ const char * bfd_elf_get_dt_soname (abfd) bfd *abfd; { if (bfd_get_flavour (abfd) == bfd_target_elf_flavour && bfd_get_format (abfd) == bfd_object) return elf_dt_name (abfd); return NULL; } /* Get the list of DT_NEEDED entries from a BFD. This is a hook for the ELF linker emulation code. */ boolean bfd_elf_get_bfd_needed_list (abfd, pneeded) bfd *abfd; struct bfd_link_needed_list **pneeded; { asection *s; bfd_byte *dynbuf = NULL; int elfsec; unsigned long link; bfd_byte *extdyn, *extdynend; size_t extdynsize; void (*swap_dyn_in) PARAMS ((bfd *, const PTR, Elf_Internal_Dyn *)); *pneeded = NULL; if (bfd_get_flavour (abfd) != bfd_target_elf_flavour || bfd_get_format (abfd) != bfd_object) return true; s = bfd_get_section_by_name (abfd, ".dynamic"); if (s == NULL || s->_raw_size == 0) return true; dynbuf = (bfd_byte *) bfd_malloc (s->_raw_size); if (dynbuf == NULL) goto error_return; if (! bfd_get_section_contents (abfd, s, (PTR) dynbuf, (file_ptr) 0, s->_raw_size)) goto error_return; elfsec = _bfd_elf_section_from_bfd_section (abfd, s); if (elfsec == -1) goto error_return; link = elf_elfsections (abfd)[elfsec]->sh_link; extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn; swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in; extdyn = dynbuf; extdynend = extdyn + s->_raw_size; for (; extdyn < extdynend; extdyn += extdynsize) { Elf_Internal_Dyn dyn; (*swap_dyn_in) (abfd, (PTR) extdyn, &dyn); if (dyn.d_tag == DT_NULL) break; if (dyn.d_tag == DT_NEEDED) { const char *string; struct bfd_link_needed_list *l; string = bfd_elf_string_from_elf_section (abfd, link, dyn.d_un.d_val); if (string == NULL) goto error_return; l = (struct bfd_link_needed_list *) bfd_alloc (abfd, sizeof *l); if (l == NULL) goto error_return; l->by = abfd; l->name = string; l->next = *pneeded; *pneeded = l; } } free (dynbuf); return true; error_return: if (dynbuf != NULL) free (dynbuf); return false; } /* Allocate an ELF string table--force the first byte to be zero. */ struct bfd_strtab_hash * _bfd_elf_stringtab_init () { struct bfd_strtab_hash *ret; ret = _bfd_stringtab_init (); if (ret != NULL) { bfd_size_type loc; loc = _bfd_stringtab_add (ret, "", true, false); BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1); if (loc == (bfd_size_type) -1) { _bfd_stringtab_free (ret); ret = NULL; } } return ret; } /* ELF .o/exec file reading */ /* Create a new bfd section from an ELF section header. */ boolean bfd_section_from_shdr (abfd, shindex) bfd *abfd; unsigned int shindex; { Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex]; Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd); struct elf_backend_data *bed = get_elf_backend_data (abfd); char *name; name = elf_string_from_elf_strtab (abfd, hdr->sh_name); switch (hdr->sh_type) { case SHT_NULL: /* Inactive section. Throw it away. */ return true; case SHT_PROGBITS: /* Normal section with contents. */ case SHT_DYNAMIC: /* Dynamic linking information. */ case SHT_NOBITS: /* .bss section. */ case SHT_HASH: /* .hash section. */ case SHT_NOTE: /* .note section. */ return _bfd_elf_make_section_from_shdr (abfd, hdr, name); case SHT_SYMTAB: /* A symbol table */ if (elf_onesymtab (abfd) == shindex) return true; BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym); BFD_ASSERT (elf_onesymtab (abfd) == 0); elf_onesymtab (abfd) = shindex; elf_tdata (abfd)->symtab_hdr = *hdr; elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr; abfd->flags |= HAS_SYMS; /* Sometimes a shared object will map in the symbol table. If SHF_ALLOC is set, and this is a shared object, then we also treat this section as a BFD section. We can not base the decision purely on SHF_ALLOC, because that flag is sometimes set in a relocateable object file, which would confuse the linker. */ if ((hdr->sh_flags & SHF_ALLOC) != 0 && (abfd->flags & DYNAMIC) != 0 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name)) return false; return true; case SHT_DYNSYM: /* A dynamic symbol table */ if (elf_dynsymtab (abfd) == shindex) return true; BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym); BFD_ASSERT (elf_dynsymtab (abfd) == 0); elf_dynsymtab (abfd) = shindex; elf_tdata (abfd)->dynsymtab_hdr = *hdr; elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr; abfd->flags |= HAS_SYMS; /* Besides being a symbol table, we also treat this as a regular section, so that objcopy can handle it. */ return _bfd_elf_make_section_from_shdr (abfd, hdr, name); case SHT_STRTAB: /* A string table */ if (hdr->bfd_section != NULL) return true; if (ehdr->e_shstrndx == shindex) { elf_tdata (abfd)->shstrtab_hdr = *hdr; elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr; return true; } { unsigned int i; for (i = 1; i < ehdr->e_shnum; i++) { Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i]; if (hdr2->sh_link == shindex) { if (! bfd_section_from_shdr (abfd, i)) return false; if (elf_onesymtab (abfd) == i) { elf_tdata (abfd)->strtab_hdr = *hdr; elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr; return true; } if (elf_dynsymtab (abfd) == i) { elf_tdata (abfd)->dynstrtab_hdr = *hdr; elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynstrtab_hdr; /* We also treat this as a regular section, so that objcopy can handle it. */ break; } #if 0 /* Not handling other string tables specially right now. */ hdr2 = elf_elfsections (abfd)[i]; /* in case it moved */ /* We have a strtab for some random other section. */ newsect = (asection *) hdr2->bfd_section; if (!newsect) break; hdr->bfd_section = newsect; hdr2 = &elf_section_data (newsect)->str_hdr; *hdr2 = *hdr; elf_elfsections (abfd)[shindex] = hdr2; #endif } } } return _bfd_elf_make_section_from_shdr (abfd, hdr, name); case SHT_REL: case SHT_RELA: /* *These* do a lot of work -- but build no sections! */ { asection *target_sect; Elf_Internal_Shdr *hdr2; /* For some incomprehensible reason Oracle distributes libraries for Solaris in which some of the objects have bogus sh_link fields. It would be nice if we could just reject them, but, unfortunately, some people need to use them. We scan through the section headers; if we find only one suitable symbol table, we clobber the sh_link to point to it. I hope this doesn't break anything. */ if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM) { int scan; int found; found = 0; for (scan = 1; scan < ehdr->e_shnum; scan++) { if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM) { if (found != 0) { found = 0; break; } found = scan; } } if (found != 0) hdr->sh_link = found; } /* Get the symbol table. */ if (elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB && ! bfd_section_from_shdr (abfd, hdr->sh_link)) return false; /* If this reloc section does not use the main symbol table we don't treat it as a reloc section. BFD can't adequately represent such a section, so at least for now, we don't try. We just present it as a normal section. */ if (hdr->sh_link != elf_onesymtab (abfd)) return _bfd_elf_make_section_from_shdr (abfd, hdr, name); if (! bfd_section_from_shdr (abfd, hdr->sh_info)) return false; target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info); if (target_sect == NULL) return false; if ((target_sect->flags & SEC_RELOC) == 0 || target_sect->reloc_count == 0) hdr2 = &elf_section_data (target_sect)->rel_hdr; else { BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL); hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2)); elf_section_data (target_sect)->rel_hdr2 = hdr2; } *hdr2 = *hdr; elf_elfsections (abfd)[shindex] = hdr2; target_sect->reloc_count += hdr->sh_size / hdr->sh_entsize; target_sect->flags |= SEC_RELOC; target_sect->relocation = NULL; target_sect->rel_filepos = hdr->sh_offset; abfd->flags |= HAS_RELOC; return true; } break; case SHT_GNU_verdef: elf_dynverdef (abfd) = shindex; elf_tdata (abfd)->dynverdef_hdr = *hdr; return _bfd_elf_make_section_from_shdr (abfd, hdr, name); break; case SHT_GNU_versym: elf_dynversym (abfd) = shindex; elf_tdata (abfd)->dynversym_hdr = *hdr; return _bfd_elf_make_section_from_shdr (abfd, hdr, name); break; case SHT_GNU_verneed: elf_dynverref (abfd) = shindex; elf_tdata (abfd)->dynverref_hdr = *hdr; return _bfd_elf_make_section_from_shdr (abfd, hdr, name); break; case SHT_SHLIB: return true; default: /* Check for any processor-specific section types. */ { if (bed->elf_backend_section_from_shdr) (*bed->elf_backend_section_from_shdr) (abfd, hdr, name); } break; } return true; } /* Given an ELF section number, retrieve the corresponding BFD section. */ asection * bfd_section_from_elf_index (abfd, index) bfd *abfd; unsigned int index; { BFD_ASSERT (index > 0 && index < SHN_LORESERVE); if (index >= elf_elfheader (abfd)->e_shnum) return NULL; return elf_elfsections (abfd)[index]->bfd_section; } boolean _bfd_elf_new_section_hook (abfd, sec) bfd *abfd; asection *sec; { struct bfd_elf_section_data *sdata; sdata = (struct bfd_elf_section_data *) bfd_alloc (abfd, sizeof (*sdata)); if (!sdata) return false; sec->used_by_bfd = (PTR) sdata; memset (sdata, 0, sizeof (*sdata)); return true; } /* Create a new bfd section from an ELF program header. Since program segments have no names, we generate a synthetic name of the form segment, where NUM is generally the index in the program header table. For segments that are split (see below) we generate the names segmenta and segmentb. Note that some program segments may have a file size that is different than (less than) the memory size. All this means is that at execution the system must allocate the amount of memory specified by the memory size, but only initialize it with the first "file size" bytes read from the file. This would occur for example, with program segments consisting of combined data+bss. To handle the above situation, this routine generates TWO bfd sections for the single program segment. The first has the length specified by the file size of the segment, and the second has the length specified by the difference between the two sizes. In effect, the segment is split into it's initialized and uninitialized parts. */ boolean bfd_section_from_phdr (abfd, hdr, index) bfd *abfd; Elf_Internal_Phdr *hdr; int index; { asection *newsect; char *name; char namebuf[64]; int split; split = ((hdr->p_memsz > 0) && (hdr->p_filesz > 0) && (hdr->p_memsz > hdr->p_filesz)); sprintf (namebuf, split ? "segment%da" : "segment%d", index); name = bfd_alloc (abfd, strlen (namebuf) + 1); if (!name) return false; strcpy (name, namebuf); newsect = bfd_make_section (abfd, name); if (newsect == NULL) return false; newsect->vma = hdr->p_vaddr; newsect->lma = hdr->p_paddr; newsect->_raw_size = hdr->p_filesz; newsect->filepos = hdr->p_offset; newsect->flags |= SEC_HAS_CONTENTS; if (hdr->p_type == PT_LOAD) { newsect->flags |= SEC_ALLOC; newsect->flags |= SEC_LOAD; if (hdr->p_flags & PF_X) { /* FIXME: all we known is that it has execute PERMISSION, may be data. */ newsect->flags |= SEC_CODE; } } if (!(hdr->p_flags & PF_W)) { newsect->flags |= SEC_READONLY; } if (split) { sprintf (namebuf, "segment%db", index); name = bfd_alloc (abfd, strlen (namebuf) + 1); if (!name) return false; strcpy (name, namebuf); newsect = bfd_make_section (abfd, name); if (newsect == NULL) return false; newsect->vma = hdr->p_vaddr + hdr->p_filesz; newsect->lma = hdr->p_paddr + hdr->p_filesz; newsect->_raw_size = hdr->p_memsz - hdr->p_filesz; if (hdr->p_type == PT_LOAD) { newsect->flags |= SEC_ALLOC; if (hdr->p_flags & PF_X) newsect->flags |= SEC_CODE; } if (!(hdr->p_flags & PF_W)) newsect->flags |= SEC_READONLY; } return true; } /* Set up an ELF internal section header for a section. */ /*ARGSUSED*/ static void elf_fake_sections (abfd, asect, failedptrarg) bfd *abfd; asection *asect; PTR failedptrarg; { struct elf_backend_data *bed = get_elf_backend_data (abfd); boolean *failedptr = (boolean *) failedptrarg; Elf_Internal_Shdr *this_hdr; if (*failedptr) { /* We already failed; just get out of the bfd_map_over_sections loop. */ return; } this_hdr = &elf_section_data (asect)->this_hdr; this_hdr->sh_name = (unsigned long) _bfd_stringtab_add (elf_shstrtab (abfd), asect->name, true, false); if (this_hdr->sh_name == (unsigned long) -1) { *failedptr = true; return; } this_hdr->sh_flags = 0; if ((asect->flags & SEC_ALLOC) != 0 || asect->user_set_vma) this_hdr->sh_addr = asect->vma; else this_hdr->sh_addr = 0; this_hdr->sh_offset = 0; this_hdr->sh_size = asect->_raw_size; this_hdr->sh_link = 0; this_hdr->sh_addralign = 1 << asect->alignment_power; /* The sh_entsize and sh_info fields may have been set already by copy_private_section_data. */ this_hdr->bfd_section = asect; this_hdr->contents = NULL; /* FIXME: This should not be based on section names. */ if (strcmp (asect->name, ".dynstr") == 0) this_hdr->sh_type = SHT_STRTAB; else if (strcmp (asect->name, ".hash") == 0) { this_hdr->sh_type = SHT_HASH; this_hdr->sh_entsize = bed->s->arch_size / 8; } else if (strcmp (asect->name, ".dynsym") == 0) { this_hdr->sh_type = SHT_DYNSYM; this_hdr->sh_entsize = bed->s->sizeof_sym; } else if (strcmp (asect->name, ".dynamic") == 0) { this_hdr->sh_type = SHT_DYNAMIC; this_hdr->sh_entsize = bed->s->sizeof_dyn; } else if (strncmp (asect->name, ".rela", 5) == 0 && get_elf_backend_data (abfd)->use_rela_p) { this_hdr->sh_type = SHT_RELA; this_hdr->sh_entsize = bed->s->sizeof_rela; } else if (strncmp (asect->name, ".rel", 4) == 0 && ! get_elf_backend_data (abfd)->use_rela_p) { this_hdr->sh_type = SHT_REL; this_hdr->sh_entsize = bed->s->sizeof_rel; } else if (strncmp (asect->name, ".note", 5) == 0) this_hdr->sh_type = SHT_NOTE; else if (strncmp (asect->name, ".stab", 5) == 0 && strcmp (asect->name + strlen (asect->name) - 3, "str") == 0) this_hdr->sh_type = SHT_STRTAB; else if (strcmp (asect->name, ".gnu.version") == 0) { this_hdr->sh_type = SHT_GNU_versym; this_hdr->sh_entsize = sizeof (Elf_External_Versym); } else if (strcmp (asect->name, ".gnu.version_d") == 0) { this_hdr->sh_type = SHT_GNU_verdef; this_hdr->sh_entsize = 0; /* objcopy or strip will copy over sh_info, but may not set cverdefs. The linker will set cverdefs, but sh_info will be zero. */ if (this_hdr->sh_info == 0) this_hdr->sh_info = elf_tdata (abfd)->cverdefs; else BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs); } else if (strcmp (asect->name, ".gnu.version_r") == 0) { this_hdr->sh_type = SHT_GNU_verneed; this_hdr->sh_entsize = 0; /* objcopy or strip will copy over sh_info, but may not set cverrefs. The linker will set cverrefs, but sh_info will be zero. */ if (this_hdr->sh_info == 0) this_hdr->sh_info = elf_tdata (abfd)->cverrefs; else BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs); } else if ((asect->flags & SEC_ALLOC) != 0 && (asect->flags & SEC_LOAD) != 0) this_hdr->sh_type = SHT_PROGBITS; else if ((asect->flags & SEC_ALLOC) != 0 && ((asect->flags & SEC_LOAD) == 0)) this_hdr->sh_type = SHT_NOBITS; else { /* Who knows? */ this_hdr->sh_type = SHT_PROGBITS; } if ((asect->flags & SEC_ALLOC) != 0) this_hdr->sh_flags |= SHF_ALLOC; if ((asect->flags & SEC_READONLY) == 0) this_hdr->sh_flags |= SHF_WRITE; if ((asect->flags & SEC_CODE) != 0) this_hdr->sh_flags |= SHF_EXECINSTR; /* Check for processor-specific section types. */ { struct elf_backend_data *bed = get_elf_backend_data (abfd); if (bed->elf_backend_fake_sections) (*bed->elf_backend_fake_sections) (abfd, this_hdr, asect); } /* If the section has relocs, set up a section header for the SHT_REL[A] section. */ if ((asect->flags & SEC_RELOC) != 0) { Elf_Internal_Shdr *rela_hdr; int use_rela_p = get_elf_backend_data (abfd)->use_rela_p; char *name; rela_hdr = &elf_section_data (asect)->rel_hdr; name = bfd_alloc (abfd, sizeof ".rela" + strlen (asect->name)); if (name == NULL) { *failedptr = true; return; } sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name); rela_hdr->sh_name = (unsigned int) _bfd_stringtab_add (elf_shstrtab (abfd), name, true, false); if (rela_hdr->sh_name == (unsigned int) -1) { *failedptr = true; return; } rela_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL; rela_hdr->sh_entsize = (use_rela_p ? bed->s->sizeof_rela : bed->s->sizeof_rel); rela_hdr->sh_addralign = bed->s->file_align; rela_hdr->sh_flags = 0; rela_hdr->sh_addr = 0; rela_hdr->sh_size = 0; rela_hdr->sh_offset = 0; } } /* Assign all ELF section numbers. The dummy first section is handled here too. The link/info pointers for the standard section types are filled in here too, while we're at it. */ static boolean assign_section_numbers (abfd) bfd *abfd; { struct elf_obj_tdata *t = elf_tdata (abfd); asection *sec; unsigned int section_number; Elf_Internal_Shdr **i_shdrp; struct elf_backend_data *bed = get_elf_backend_data (abfd); section_number = 1; for (sec = abfd->sections; sec; sec = sec->next) { struct bfd_elf_section_data *d = elf_section_data (sec); d->this_idx = section_number++; if ((sec->flags & SEC_RELOC) == 0) d->rel_idx = 0; else d->rel_idx = section_number++; } t->shstrtab_section = section_number++; elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section; t->shstrtab_hdr.sh_size = _bfd_stringtab_size (elf_shstrtab (abfd)); if (abfd->symcount > 0) { t->symtab_section = section_number++; t->strtab_section = section_number++; } elf_elfheader (abfd)->e_shnum = section_number; /* Set up the list of section header pointers, in agreement with the indices. */ i_shdrp = ((Elf_Internal_Shdr **) bfd_alloc (abfd, section_number * sizeof (Elf_Internal_Shdr *))); if (i_shdrp == NULL) return false; i_shdrp[0] = ((Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (Elf_Internal_Shdr))); if (i_shdrp[0] == NULL) { bfd_release (abfd, i_shdrp); return false; } memset (i_shdrp[0], 0, sizeof (Elf_Internal_Shdr)); elf_elfsections (abfd) = i_shdrp; i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr; if (abfd->symcount > 0) { i_shdrp[t->symtab_section] = &t->symtab_hdr; i_shdrp[t->strtab_section] = &t->strtab_hdr; t->symtab_hdr.sh_link = t->strtab_section; } for (sec = abfd->sections; sec; sec = sec->next) { struct bfd_elf_section_data *d = elf_section_data (sec); asection *s; const char *name; i_shdrp[d->this_idx] = &d->this_hdr; if (d->rel_idx != 0) i_shdrp[d->rel_idx] = &d->rel_hdr; /* Fill in the sh_link and sh_info fields while we're at it. */ /* sh_link of a reloc section is the section index of the symbol table. sh_info is the section index of the section to which the relocation entries apply. */ if (d->rel_idx != 0) { d->rel_hdr.sh_link = t->symtab_section; d->rel_hdr.sh_info = d->this_idx; } switch (d->this_hdr.sh_type) { case SHT_REL: case SHT_RELA: /* A reloc section which we are treating as a normal BFD section. sh_link is the section index of the symbol table. sh_info is the section index of the section to which the relocation entries apply. We assume that an allocated reloc section uses the dynamic symbol table. FIXME: How can we be sure? */ s = bfd_get_section_by_name (abfd, ".dynsym"); if (s != NULL) d->this_hdr.sh_link = elf_section_data (s)->this_idx; /* We look up the section the relocs apply to by name. */ name = sec->name; if (d->this_hdr.sh_type == SHT_REL) name += 4; else name += 5; s = bfd_get_section_by_name (abfd, name); if (s != NULL) d->this_hdr.sh_info = elf_section_data (s)->this_idx; break; case SHT_STRTAB: /* We assume that a section named .stab*str is a stabs string section. We look for a section with the same name but without the trailing ``str'', and set its sh_link field to point to this section. */ if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0) { size_t len; char *alc; len = strlen (sec->name); alc = (char *) bfd_malloc (len - 2); if (alc == NULL) return false; strncpy (alc, sec->name, len - 3); alc[len - 3] = '\0'; s = bfd_get_section_by_name (abfd, alc); free (alc); if (s != NULL) { elf_section_data (s)->this_hdr.sh_link = d->this_idx; /* This is a .stab section. */ elf_section_data (s)->this_hdr.sh_entsize = 4 + 2 * (bed->s->arch_size / 8); } } break; case SHT_DYNAMIC: case SHT_DYNSYM: case SHT_GNU_verneed: case SHT_GNU_verdef: /* sh_link is the section header index of the string table used for the dynamic entries, or the symbol table, or the version strings. */ s = bfd_get_section_by_name (abfd, ".dynstr"); if (s != NULL) d->this_hdr.sh_link = elf_section_data (s)->this_idx; break; case SHT_HASH: case SHT_GNU_versym: /* sh_link is the section header index of the symbol table this hash table or version table is for. */ s = bfd_get_section_by_name (abfd, ".dynsym"); if (s != NULL) d->this_hdr.sh_link = elf_section_data (s)->this_idx; break; } } return true; } /* Map symbol from it's internal number to the external number, moving all local symbols to be at the head of the list. */ static INLINE int sym_is_global (abfd, sym) bfd *abfd; asymbol *sym; { /* If the backend has a special mapping, use it. */ if (get_elf_backend_data (abfd)->elf_backend_sym_is_global) return ((*get_elf_backend_data (abfd)->elf_backend_sym_is_global) (abfd, sym)); return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0 || bfd_is_und_section (bfd_get_section (sym)) || bfd_is_com_section (bfd_get_section (sym))); } static boolean elf_map_symbols (abfd) bfd *abfd; { int symcount = bfd_get_symcount (abfd); asymbol **syms = bfd_get_outsymbols (abfd); asymbol **sect_syms; int num_locals = 0; int num_globals = 0; int num_locals2 = 0; int num_globals2 = 0; int max_index = 0; int num_sections = 0; int idx; asection *asect; asymbol **new_syms; #ifdef DEBUG fprintf (stderr, "elf_map_symbols\n"); fflush (stderr); #endif /* Add a section symbol for each BFD section. FIXME: Is this really necessary? */ for (asect = abfd->sections; asect; asect = asect->next) { if (max_index < asect->index) max_index = asect->index; } max_index++; sect_syms = (asymbol **) bfd_zalloc (abfd, max_index * sizeof (asymbol *)); if (sect_syms == NULL) return false; elf_section_syms (abfd) = sect_syms; for (idx = 0; idx < symcount; idx++) { if ((syms[idx]->flags & BSF_SECTION_SYM) != 0 && (syms[idx]->value + syms[idx]->section->vma) == 0) { asection *sec; sec = syms[idx]->section; if (sec->owner != NULL) { if (sec->owner != abfd) { if (sec->output_offset != 0) continue; sec = sec->output_section; BFD_ASSERT (sec->owner == abfd); } sect_syms[sec->index] = syms[idx]; } } } for (asect = abfd->sections; asect; asect = asect->next) { asymbol *sym; if (sect_syms[asect->index] != NULL) continue; sym = bfd_make_empty_symbol (abfd); if (sym == NULL) return false; sym->the_bfd = abfd; sym->name = asect->name; sym->value = 0; /* Set the flags to 0 to indicate that this one was newly added. */ sym->flags = 0; sym->section = asect; sect_syms[asect->index] = sym; num_sections++; #ifdef DEBUG fprintf (stderr, "creating section symbol, name = %s, value = 0x%.8lx, index = %d, section = 0x%.8lx\n", asect->name, (long) asect->vma, asect->index, (long) asect); #endif } /* Classify all of the symbols. */ for (idx = 0; idx < symcount; idx++) { if (!sym_is_global (abfd, syms[idx])) num_locals++; else num_globals++; } for (asect = abfd->sections; asect; asect = asect->next) { if (sect_syms[asect->index] != NULL && sect_syms[asect->index]->flags == 0) { sect_syms[asect->index]->flags = BSF_SECTION_SYM; if (!sym_is_global (abfd, sect_syms[asect->index])) num_locals++; else num_globals++; sect_syms[asect->index]->flags = 0; } } /* Now sort the symbols so the local symbols are first. */ new_syms = ((asymbol **) bfd_alloc (abfd, (num_locals + num_globals) * sizeof (asymbol *))); if (new_syms == NULL) return false; for (idx = 0; idx < symcount; idx++) { asymbol *sym = syms[idx]; int i; if (!sym_is_global (abfd, sym)) i = num_locals2++; else i = num_locals + num_globals2++; new_syms[i] = sym; sym->udata.i = i + 1; } for (asect = abfd->sections; asect; asect = asect->next) { if (sect_syms[asect->index] != NULL && sect_syms[asect->index]->flags == 0) { asymbol *sym = sect_syms[asect->index]; int i; sym->flags = BSF_SECTION_SYM; if (!sym_is_global (abfd, sym)) i = num_locals2++; else i = num_locals + num_globals2++; new_syms[i] = sym; sym->udata.i = i + 1; } } bfd_set_symtab (abfd, new_syms, num_locals + num_globals); elf_num_locals (abfd) = num_locals; elf_num_globals (abfd) = num_globals; return true; } /* Align to the maximum file alignment that could be required for any ELF data structure. */ static INLINE file_ptr align_file_position PARAMS ((file_ptr, int)); static INLINE file_ptr align_file_position (off, align) file_ptr off; int align; { return (off + align - 1) & ~(align - 1); } /* Assign a file position to a section, optionally aligning to the required section alignment. */ INLINE file_ptr _bfd_elf_assign_file_position_for_section (i_shdrp, offset, align) Elf_Internal_Shdr *i_shdrp; file_ptr offset; boolean align; { if (align) { unsigned int al; al = i_shdrp->sh_addralign; if (al > 1) offset = BFD_ALIGN (offset, al); } i_shdrp->sh_offset = offset; if (i_shdrp->bfd_section != NULL) i_shdrp->bfd_section->filepos = offset; if (i_shdrp->sh_type != SHT_NOBITS) offset += i_shdrp->sh_size; return offset; } /* Compute the file positions we are going to put the sections at, and otherwise prepare to begin writing out the ELF file. If LINK_INFO is not NULL, this is being called by the ELF backend linker. */ boolean _bfd_elf_compute_section_file_positions (abfd, link_info) bfd *abfd; struct bfd_link_info *link_info; { struct elf_backend_data *bed = get_elf_backend_data (abfd); boolean failed; struct bfd_strtab_hash *strtab; Elf_Internal_Shdr *shstrtab_hdr; if (abfd->output_has_begun) return true; /* Do any elf backend specific processing first. */ if (bed->elf_backend_begin_write_processing) (*bed->elf_backend_begin_write_processing) (abfd, link_info); if (! prep_headers (abfd)) return false; failed = false; bfd_map_over_sections (abfd, elf_fake_sections, &failed); if (failed) return false; if (!assign_section_numbers (abfd)) return false; /* The backend linker builds symbol table information itself. */ if (link_info == NULL && abfd->symcount > 0) { if (! swap_out_syms (abfd, &strtab)) return false; } shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr; /* sh_name was set in prep_headers. */ shstrtab_hdr->sh_type = SHT_STRTAB; shstrtab_hdr->sh_flags = 0; shstrtab_hdr->sh_addr = 0; shstrtab_hdr->sh_size = _bfd_stringtab_size (elf_shstrtab (abfd)); shstrtab_hdr->sh_entsize = 0; shstrtab_hdr->sh_link = 0; shstrtab_hdr->sh_info = 0; /* sh_offset is set in assign_file_positions_except_relocs. */ shstrtab_hdr->sh_addralign = 1; if (!assign_file_positions_except_relocs (abfd)) return false; if (link_info == NULL && abfd->symcount > 0) { file_ptr off; Elf_Internal_Shdr *hdr; off = elf_tdata (abfd)->next_file_pos; hdr = &elf_tdata (abfd)->symtab_hdr; off = _bfd_elf_assign_file_position_for_section (hdr, off, true); hdr = &elf_tdata (abfd)->strtab_hdr; off = _bfd_elf_assign_file_position_for_section (hdr, off, true); elf_tdata (abfd)->next_file_pos = off; /* Now that we know where the .strtab section goes, write it out. */ if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0 || ! _bfd_stringtab_emit (abfd, strtab)) return false; _bfd_stringtab_free (strtab); } abfd->output_has_begun = true; return true; } /* Create a mapping from a set of sections to a program segment. */ static INLINE struct elf_segment_map * make_mapping (abfd, sections, from, to, phdr) bfd *abfd; asection **sections; unsigned int from; unsigned int to; boolean phdr; { struct elf_segment_map *m; unsigned int i; asection **hdrpp; m = ((struct elf_segment_map *) bfd_zalloc (abfd, (sizeof (struct elf_segment_map) + (to - from - 1) * sizeof (asection *)))); if (m == NULL) return NULL; m->next = NULL; m->p_type = PT_LOAD; for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++) m->sections[i - from] = *hdrpp; m->count = to - from; if (from == 0 && phdr) { /* Include the headers in the first PT_LOAD segment. */ m->includes_filehdr = 1; m->includes_phdrs = 1; } return m; } /* Set up a mapping from BFD sections to program segments. */ static boolean map_sections_to_segments (abfd) bfd *abfd; { asection **sections = NULL; asection *s; unsigned int i; unsigned int count; struct elf_segment_map *mfirst; struct elf_segment_map **pm; struct elf_segment_map *m; asection *last_hdr; unsigned int phdr_index; bfd_vma maxpagesize; asection **hdrpp; boolean phdr_in_section = true; boolean writable; asection *dynsec; if (elf_tdata (abfd)->segment_map != NULL) return true; if (bfd_count_sections (abfd) == 0) return true; /* Select the allocated sections, and sort them. */ sections = (asection **) bfd_malloc (bfd_count_sections (abfd) * sizeof (asection *)); if (sections == NULL) goto error_return; i = 0; for (s = abfd->sections; s != NULL; s = s->next) { if ((s->flags & SEC_ALLOC) != 0) { sections[i] = s; ++i; } } BFD_ASSERT (i <= bfd_count_sections (abfd)); count = i; qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections); /* Build the mapping. */ mfirst = NULL; pm = &mfirst; /* If we have a .interp section, then create a PT_PHDR segment for the program headers and a PT_INTERP segment for the .interp section. */ s = bfd_get_section_by_name (abfd, ".interp"); if (s != NULL && (s->flags & SEC_LOAD) != 0) { m = ((struct elf_segment_map *) bfd_zalloc (abfd, sizeof (struct elf_segment_map))); if (m == NULL) goto error_return; m->next = NULL; m->p_type = PT_PHDR; /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */ m->p_flags = PF_R | PF_X; m->p_flags_valid = 1; m->includes_phdrs = 1; *pm = m; pm = &m->next; m = ((struct elf_segment_map *) bfd_zalloc (abfd, sizeof (struct elf_segment_map))); if (m == NULL) goto error_return; m->next = NULL; m->p_type = PT_INTERP; m->count = 1; m->sections[0] = s; *pm = m; pm = &m->next; } /* Look through the sections. We put sections in the same program segment when the start of the second section can be placed within a few bytes of the end of the first section. */ last_hdr = NULL; phdr_index = 0; maxpagesize = get_elf_backend_data (abfd)->maxpagesize; writable = false; dynsec = bfd_get_section_by_name (abfd, ".dynamic"); if (dynsec != NULL && (dynsec->flags & SEC_LOAD) == 0) dynsec = NULL; /* Deal with -Ttext or something similar such that the first section is not adjacent to the program headers. This is an approximation, since at this point we don't know exactly how many program headers we will need. */ if (count > 0) { bfd_size_type phdr_size; phdr_size = elf_tdata (abfd)->program_header_size; if (phdr_size == 0) phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr; if ((abfd->flags & D_PAGED) == 0 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize) phdr_in_section = false; } for (i = 0, hdrpp = sections; i < count; i++, hdrpp++) { asection *hdr; boolean new_segment; hdr = *hdrpp; /* See if this section and the last one will fit in the same segment. */ if (last_hdr == NULL) { /* If we don't have a segment yet, then we don't need a new one (we build the last one after this loop). */ new_segment = false; } else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma) { /* If this section has a different relation between the virtual address and the load address, then we need a new segment. */ new_segment = true; } else if (BFD_ALIGN (last_hdr->lma + last_hdr->_raw_size, maxpagesize) < BFD_ALIGN (hdr->lma, maxpagesize)) { /* If putting this section in this segment would force us to skip a page in the segment, then we need a new segment. */ new_segment = true; } else if ((last_hdr->flags & SEC_LOAD) == 0 && (hdr->flags & SEC_LOAD) != 0) { /* We don't want to put a loadable section after a nonloadable section in the same segment. */ new_segment = true; } else if ((abfd->flags & D_PAGED) == 0) { /* If the file is not demand paged, which means that we don't require the sections to be correctly aligned in the file, then there is no other reason for a new segment. */ new_segment = false; } else if (! writable && (hdr->flags & SEC_READONLY) == 0 && (BFD_ALIGN (last_hdr->lma + last_hdr->_raw_size, maxpagesize) == hdr->lma)) { /* We don't want to put a writable section in a read only segment, unless they are on the same page in memory anyhow. We already know that the last section does not bring us past the current section on the page, so the only case in which the new section is not on the same page as the previous section is when the previous section ends precisely on a page boundary. */ new_segment = true; } else { /* Otherwise, we can use the same segment. */ new_segment = false; } if (! new_segment) { if ((hdr->flags & SEC_READONLY) == 0) writable = true; last_hdr = hdr; continue; } /* We need a new program segment. We must create a new program header holding all the sections from phdr_index until hdr. */ m = make_mapping (abfd, sections, phdr_index, i, phdr_in_section); if (m == NULL) goto error_return; *pm = m; pm = &m->next; if ((hdr->flags & SEC_READONLY) == 0) writable = true; else writable = false; last_hdr = hdr; phdr_index = i; phdr_in_section = false; } /* Create a final PT_LOAD program segment. */ if (last_hdr != NULL) { m = make_mapping (abfd, sections, phdr_index, i, phdr_in_section); if (m == NULL) goto error_return; *pm = m; pm = &m->next; } /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */ if (dynsec != NULL) { m = ((struct elf_segment_map *) bfd_zalloc (abfd, sizeof (struct elf_segment_map))); if (m == NULL) goto error_return; m->next = NULL; m->p_type = PT_DYNAMIC; m->count = 1; m->sections[0] = dynsec; *pm = m; pm = &m->next; } /* For each loadable .note section, add a PT_NOTE segment. We don't use bfd_get_section_by_name, because if we link together nonloadable .note sections and loadable .note sections, we will generate two .note sections in the output file. FIXME: Using names for section types is bogus anyhow. */ for (s = abfd->sections; s != NULL; s = s->next) { if ((s->flags & SEC_LOAD) != 0 && strncmp (s->name, ".note", 5) == 0) { m = ((struct elf_segment_map *) bfd_zalloc (abfd, sizeof (struct elf_segment_map))); if (m == NULL) goto error_return; m->next = NULL; m->p_type = PT_NOTE; m->count = 1; m->sections[0] = s; *pm = m; pm = &m->next; } } free (sections); sections = NULL; elf_tdata (abfd)->segment_map = mfirst; return true; error_return: if (sections != NULL) free (sections); return false; } /* Sort sections by VMA. */ static int elf_sort_sections (arg1, arg2) const PTR arg1; const PTR arg2; { const asection *sec1 = *(const asection **) arg1; const asection *sec2 = *(const asection **) arg2; if (sec1->vma < sec2->vma) return -1; else if (sec1->vma > sec2->vma) return 1; /* Sort by LMA. Normally the LMA and the VMA will be the same, and this will do nothing. */ if (sec1->lma < sec2->lma) return -1; else if (sec1->lma > sec2->lma) return 1; /* Put !SEC_LOAD sections after SEC_LOAD ones. */ #define TOEND(x) (((x)->flags & SEC_LOAD) == 0) if (TOEND (sec1)) { if (TOEND (sec2)) return sec1->target_index - sec2->target_index; else return 1; } if (TOEND (sec2)) return -1; #undef TOEND /* Sort by size, to put zero sized sections before others at the same address. */ if (sec1->_raw_size < sec2->_raw_size) return -1; if (sec1->_raw_size > sec2->_raw_size) return 1; return sec1->target_index - sec2->target_index; } /* Assign file positions to the sections based on the mapping from sections to segments. This function also sets up some fields in the file header, and writes out the program headers. */ static boolean assign_file_positions_for_segments (abfd) bfd *abfd; { const struct elf_backend_data *bed = get_elf_backend_data (abfd); unsigned int count; struct elf_segment_map *m; unsigned int alloc; Elf_Internal_Phdr *phdrs; file_ptr off, voff; bfd_vma filehdr_vaddr, filehdr_paddr; bfd_vma phdrs_vaddr, phdrs_paddr; Elf_Internal_Phdr *p; if (elf_tdata (abfd)->segment_map == NULL) { if (! map_sections_to_segments (abfd)) return false; } if (bed->elf_backend_modify_segment_map) { if (! (*bed->elf_backend_modify_segment_map) (abfd)) return false; } count = 0; for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next) ++count; elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr; elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr; elf_elfheader (abfd)->e_phnum = count; if (count == 0) return true; /* If we already counted the number of program segments, make sure that we allocated enough space. This happens when SIZEOF_HEADERS is used in a linker script. */ alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr; if (alloc != 0 && count > alloc) { ((*_bfd_error_handler) ("%s: Not enough room for program headers (allocated %u, need %u)", bfd_get_filename (abfd), alloc, count)); bfd_set_error (bfd_error_bad_value); return false; } if (alloc == 0) alloc = count; phdrs = ((Elf_Internal_Phdr *) bfd_alloc (abfd, alloc * sizeof (Elf_Internal_Phdr))); if (phdrs == NULL) return false; off = bed->s->sizeof_ehdr; off += alloc * bed->s->sizeof_phdr; filehdr_vaddr = 0; filehdr_paddr = 0; phdrs_vaddr = 0; phdrs_paddr = 0; for (m = elf_tdata (abfd)->segment_map, p = phdrs; m != NULL; m = m->next, p++) { unsigned int i; asection **secpp; /* If elf_segment_map is not from map_sections_to_segments, the sections may not be correctly ordered. */ if (m->count > 0) qsort (m->sections, (size_t) m->count, sizeof (asection *), elf_sort_sections); p->p_type = m->p_type; if (m->p_flags_valid) p->p_flags = m->p_flags; else p->p_flags = 0; if (p->p_type == PT_LOAD && m->count > 0 && (m->sections[0]->flags & SEC_ALLOC) != 0) { if ((abfd->flags & D_PAGED) != 0) off += (m->sections[0]->vma - off) % bed->maxpagesize; else off += ((m->sections[0]->vma - off) % (1 << bfd_get_section_alignment (abfd, m->sections[0]))); } if (m->count == 0) p->p_vaddr = 0; else p->p_vaddr = m->sections[0]->vma; if (m->p_paddr_valid) p->p_paddr = m->p_paddr; else if (m->count == 0) p->p_paddr = 0; else p->p_paddr = m->sections[0]->lma; if (p->p_type == PT_LOAD && (abfd->flags & D_PAGED) != 0) p->p_align = bed->maxpagesize; else if (m->count == 0) p->p_align = bed->s->file_align; else p->p_align = 0; p->p_offset = 0; p->p_filesz = 0; p->p_memsz = 0; if (m->includes_filehdr) { if (! m->p_flags_valid) p->p_flags |= PF_R; p->p_offset = 0; p->p_filesz = bed->s->sizeof_ehdr; p->p_memsz = bed->s->sizeof_ehdr; if (m->count > 0) { BFD_ASSERT (p->p_type == PT_LOAD); if (p->p_vaddr < (bfd_vma) off) { _bfd_error_handler ("%s: Not enough room for program headers, try linking with -N", bfd_get_filename (abfd)); bfd_set_error (bfd_error_bad_value); return false; } p->p_vaddr -= off; if (! m->p_paddr_valid) p->p_paddr -= off; } if (p->p_type == PT_LOAD) { filehdr_vaddr = p->p_vaddr; filehdr_paddr = p->p_paddr; } } if (m->includes_phdrs) { if (! m->p_flags_valid) p->p_flags |= PF_R; if (m->includes_filehdr) { if (p->p_type == PT_LOAD) { phdrs_vaddr = p->p_vaddr + bed->s->sizeof_ehdr; phdrs_paddr = p->p_paddr + bed->s->sizeof_ehdr; } } else { p->p_offset = bed->s->sizeof_ehdr; if (m->count > 0) { BFD_ASSERT (p->p_type == PT_LOAD); p->p_vaddr -= off - p->p_offset; if (! m->p_paddr_valid) p->p_paddr -= off - p->p_offset; } if (p->p_type == PT_LOAD) { phdrs_vaddr = p->p_vaddr; phdrs_paddr = p->p_paddr; } } p->p_filesz += alloc * bed->s->sizeof_phdr; p->p_memsz += alloc * bed->s->sizeof_phdr; } if (p->p_type == PT_LOAD) { if (! m->includes_filehdr && ! m->includes_phdrs) p->p_offset = off; else { file_ptr adjust; adjust = off - (p->p_offset + p->p_filesz); p->p_filesz += adjust; p->p_memsz += adjust; } } voff = off; for (i = 0, secpp = m->sections; i < m->count; i++, secpp++) { asection *sec; flagword flags; bfd_size_type align; sec = *secpp; flags = sec->flags; align = 1 << bfd_get_section_alignment (abfd, sec); if (p->p_type == PT_LOAD) { bfd_vma adjust; if ((flags & SEC_LOAD) != 0) adjust = sec->lma - (p->p_paddr + p->p_memsz); else if ((flags & SEC_ALLOC) != 0) { /* The section VMA must equal the file position modulo the page size. FIXME: I'm not sure if this adjustment is really necessary. We used to not have the SEC_LOAD case just above, and then this was necessary, but now I'm not sure. */ if ((abfd->flags & D_PAGED) != 0) adjust = (sec->vma - voff) % bed->maxpagesize; else adjust = (sec->vma - voff) % align; } else adjust = 0; if (adjust != 0) { if (i == 0) abort (); p->p_memsz += adjust; off += adjust; voff += adjust; if ((flags & SEC_LOAD) != 0) p->p_filesz += adjust; } sec->filepos = off; /* We check SEC_HAS_CONTENTS here because if NOLOAD is used in a linker script we may have a section with SEC_LOAD clear but which is supposed to have contents. */ if ((flags & SEC_LOAD) != 0 || (flags & SEC_HAS_CONTENTS) != 0) off += sec->_raw_size; if ((flags & SEC_ALLOC) != 0) voff += sec->_raw_size; } p->p_memsz += sec->_raw_size; if ((flags & SEC_LOAD) != 0) p->p_filesz += sec->_raw_size; if (align > p->p_align) p->p_align = align; if (! m->p_flags_valid) { p->p_flags |= PF_R; if ((flags & SEC_CODE) != 0) p->p_flags |= PF_X; if ((flags & SEC_READONLY) == 0) p->p_flags |= PF_W; } } } /* Now that we have set the section file positions, we can set up the file positions for the non PT_LOAD segments. */ for (m = elf_tdata (abfd)->segment_map, p = phdrs; m != NULL; m = m->next, p++) { if (p->p_type != PT_LOAD && m->count > 0) { BFD_ASSERT (! m->includes_filehdr && ! m->includes_phdrs); p->p_offset = m->sections[0]->filepos; } if (m->count == 0) { if (m->includes_filehdr) { p->p_vaddr = filehdr_vaddr; if (! m->p_paddr_valid) p->p_paddr = filehdr_paddr; } else if (m->includes_phdrs) { p->p_vaddr = phdrs_vaddr; if (! m->p_paddr_valid) p->p_paddr = phdrs_paddr; } } } /* Clear out any program headers we allocated but did not use. */ for (; count < alloc; count++, p++) { memset (p, 0, sizeof *p); p->p_type = PT_NULL; } elf_tdata (abfd)->phdr = phdrs; elf_tdata (abfd)->next_file_pos = off; /* Write out the program headers. */ if (bfd_seek (abfd, bed->s->sizeof_ehdr, SEEK_SET) != 0 || bed->s->write_out_phdrs (abfd, phdrs, alloc) != 0) return false; return true; } /* Get the size of the program header. If this is called by the linker before any of the section VMA's are set, it can't calculate the correct value for a strange memory layout. This only happens when SIZEOF_HEADERS is used in a linker script. In this case, SORTED_HDRS is NULL and we assume the normal scenario of one text and one data segment (exclusive of .interp and .dynamic). ??? User written scripts must either not use SIZEOF_HEADERS, or assume there will be two segments. */ static bfd_size_type get_program_header_size (abfd) bfd *abfd; { size_t segs; asection *s; struct elf_backend_data *bed = get_elf_backend_data (abfd); /* We can't return a different result each time we're called. */ if (elf_tdata (abfd)->program_header_size != 0) return elf_tdata (abfd)->program_header_size; if (elf_tdata (abfd)->segment_map != NULL) { struct elf_segment_map *m; segs = 0; for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next) ++segs; elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr; return elf_tdata (abfd)->program_header_size; } /* Assume we will need exactly two PT_LOAD segments: one for text and one for data. */ segs = 2; s = bfd_get_section_by_name (abfd, ".interp"); if (s != NULL && (s->flags & SEC_LOAD) != 0) { /* If we have a loadable interpreter section, we need a PT_INTERP segment. In this case, assume we also need a PT_PHDR segment, although that may not be true for all targets. */ segs += 2; } if (bfd_get_section_by_name (abfd, ".dynamic") != NULL) { /* We need a PT_DYNAMIC segment. */ ++segs; } for (s = abfd->sections; s != NULL; s = s->next) { if ((s->flags & SEC_LOAD) != 0 && strncmp (s->name, ".note", 5) == 0) { /* We need a PT_NOTE segment. */ ++segs; } } /* Let the backend count up any program headers it might need. */ if (bed->elf_backend_additional_program_headers) { int a; a = (*bed->elf_backend_additional_program_headers) (abfd); if (a == -1) abort (); segs += a; } elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr; return elf_tdata (abfd)->program_header_size; } /* Work out the file positions of all the sections. This is called by _bfd_elf_compute_section_file_positions. All the section sizes and VMAs must be known before this is called. We do not consider reloc sections at this point, unless they form part of the loadable image. Reloc sections are assigned file positions in assign_file_positions_for_relocs, which is called by write_object_contents and final_link. We also don't set the positions of the .symtab and .strtab here. */ static boolean assign_file_positions_except_relocs (abfd) bfd *abfd; { struct elf_obj_tdata * const tdata = elf_tdata (abfd); Elf_Internal_Ehdr * const i_ehdrp = elf_elfheader (abfd); Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd); file_ptr off; struct elf_backend_data *bed = get_elf_backend_data (abfd); if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0) { Elf_Internal_Shdr **hdrpp; unsigned int i; /* Start after the ELF header. */ off = i_ehdrp->e_ehsize; /* We are not creating an executable, which means that we are not creating a program header, and that the actual order of the sections in the file is unimportant. */ for (i = 1, hdrpp = i_shdrpp + 1; i < i_ehdrp->e_shnum; i++, hdrpp++) { Elf_Internal_Shdr *hdr; hdr = *hdrpp; if (hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA) { hdr->sh_offset = -1; continue; } if (i == tdata->symtab_section || i == tdata->strtab_section) { hdr->sh_offset = -1; continue; } off = _bfd_elf_assign_file_position_for_section (hdr, off, true); } } else { unsigned int i; Elf_Internal_Shdr **hdrpp; /* Assign file positions for the loaded sections based on the assignment of sections to segments. */ if (! assign_file_positions_for_segments (abfd)) return false; /* Assign file positions for the other sections. */ off = elf_tdata (abfd)->next_file_pos; for (i = 1, hdrpp = i_shdrpp + 1; i < i_ehdrp->e_shnum; i++, hdrpp++) { Elf_Internal_Shdr *hdr; hdr = *hdrpp; if (hdr->bfd_section != NULL && hdr->bfd_section->filepos != 0) hdr->sh_offset = hdr->bfd_section->filepos; else if ((hdr->sh_flags & SHF_ALLOC) != 0) { ((*_bfd_error_handler) ("%s: warning: allocated section `%s' not in segment", bfd_get_filename (abfd), (hdr->bfd_section == NULL ? "*unknown*" : hdr->bfd_section->name))); if ((abfd->flags & D_PAGED) != 0) off += (hdr->sh_addr - off) % bed->maxpagesize; else off += (hdr->sh_addr - off) % hdr->sh_addralign; off = _bfd_elf_assign_file_position_for_section (hdr, off, false); } else if (hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA || hdr == i_shdrpp[tdata->symtab_section] || hdr == i_shdrpp[tdata->strtab_section]) hdr->sh_offset = -1; else off = _bfd_elf_assign_file_position_for_section (hdr, off, true); } } /* Place the section headers. */ off = align_file_position (off, bed->s->file_align); i_ehdrp->e_shoff = off; off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize; elf_tdata (abfd)->next_file_pos = off; return true; } static boolean prep_headers (abfd) bfd *abfd; { Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */ Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */ Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */ int count; struct bfd_strtab_hash *shstrtab; struct elf_backend_data *bed = get_elf_backend_data (abfd); i_ehdrp = elf_elfheader (abfd); i_shdrp = elf_elfsections (abfd); shstrtab = _bfd_elf_stringtab_init (); if (shstrtab == NULL) return false; elf_shstrtab (abfd) = shstrtab; i_ehdrp->e_ident[EI_MAG0] = ELFMAG0; i_ehdrp->e_ident[EI_MAG1] = ELFMAG1; i_ehdrp->e_ident[EI_MAG2] = ELFMAG2; i_ehdrp->e_ident[EI_MAG3] = ELFMAG3; i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass; i_ehdrp->e_ident[EI_DATA] = bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB; i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current; +#ifdef __FreeBSD__ + /* Quick and dirty hack to brand the file as a FreeBSD ELF file. */ + i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_FREEBSD; + i_ehdrp->e_ident[EI_ABIVERSION] = 0; +#endif + for (count = EI_PAD; count < EI_NIDENT; count++) i_ehdrp->e_ident[count] = 0; +#ifdef __FreeBSD__ +/* #ifdef BRANDELF_CHANGE_BOOTSTRAP */ +#define _OLD_EI_BRAND_OFFSET 8 +#define _OLD_BRANDING "FreeBSD" + strncpy((char *) &i_ehdrp->e_ident[_OLD_EI_BRAND_OFFSET], _OLD_BRANDING, + EI_NIDENT-_OLD_EI_BRAND_OFFSET); +/* #endif */ +#endif + if ((abfd->flags & DYNAMIC) != 0) i_ehdrp->e_type = ET_DYN; else if ((abfd->flags & EXEC_P) != 0) i_ehdrp->e_type = ET_EXEC; else i_ehdrp->e_type = ET_REL; switch (bfd_get_arch (abfd)) { case bfd_arch_unknown: i_ehdrp->e_machine = EM_NONE; break; case bfd_arch_sparc: if (bed->s->arch_size == 64) - i_ehdrp->e_machine = EM_SPARC64; + i_ehdrp->e_machine = EM_SPARCV9; else i_ehdrp->e_machine = EM_SPARC; break; case bfd_arch_i386: i_ehdrp->e_machine = EM_386; break; case bfd_arch_m68k: i_ehdrp->e_machine = EM_68K; break; case bfd_arch_m88k: i_ehdrp->e_machine = EM_88K; break; case bfd_arch_i860: i_ehdrp->e_machine = EM_860; break; case bfd_arch_mips: /* MIPS Rxxxx */ i_ehdrp->e_machine = EM_MIPS; /* only MIPS R3000 */ break; case bfd_arch_hppa: i_ehdrp->e_machine = EM_PARISC; break; case bfd_arch_powerpc: i_ehdrp->e_machine = EM_PPC; break; case bfd_arch_alpha: i_ehdrp->e_machine = EM_ALPHA; break; case bfd_arch_sh: i_ehdrp->e_machine = EM_SH; break; case bfd_arch_d10v: i_ehdrp->e_machine = EM_CYGNUS_D10V; break; case bfd_arch_v850: switch (bfd_get_mach (abfd)) { default: case 0: i_ehdrp->e_machine = EM_CYGNUS_V850; break; } break; case bfd_arch_arc: i_ehdrp->e_machine = EM_CYGNUS_ARC; break; case bfd_arch_m32r: i_ehdrp->e_machine = EM_CYGNUS_M32R; break; case bfd_arch_mn10200: i_ehdrp->e_machine = EM_CYGNUS_MN10200; break; case bfd_arch_mn10300: i_ehdrp->e_machine = EM_CYGNUS_MN10300; break; /* also note that EM_M32, AT&T WE32100 is unknown to bfd */ default: i_ehdrp->e_machine = EM_NONE; } i_ehdrp->e_version = bed->s->ev_current; i_ehdrp->e_ehsize = bed->s->sizeof_ehdr; - - /* Some OS's brands all ELF binaries so the image loader knows what system - call set, etc. to use. */ - strncpy((char *) &i_ehdrp->e_ident[EI_BRAND_OFFSET], BRANDING, - EI_NIDENT-EI_BRAND_OFFSET); /* no program header, for now. */ i_ehdrp->e_phoff = 0; i_ehdrp->e_phentsize = 0; i_ehdrp->e_phnum = 0; /* each bfd section is section header entry */ i_ehdrp->e_entry = bfd_get_start_address (abfd); i_ehdrp->e_shentsize = bed->s->sizeof_shdr; /* if we're building an executable, we'll need a program header table */ if (abfd->flags & EXEC_P) { /* it all happens later */ #if 0 i_ehdrp->e_phentsize = sizeof (Elf_External_Phdr); /* elf_build_phdrs() returns a (NULL-terminated) array of Elf_Internal_Phdrs */ i_phdrp = elf_build_phdrs (abfd, i_ehdrp, i_shdrp, &i_ehdrp->e_phnum); i_ehdrp->e_phoff = outbase; outbase += i_ehdrp->e_phentsize * i_ehdrp->e_phnum; #endif } else { i_ehdrp->e_phentsize = 0; i_phdrp = 0; i_ehdrp->e_phoff = 0; } elf_tdata (abfd)->symtab_hdr.sh_name = (unsigned int) _bfd_stringtab_add (shstrtab, ".symtab", true, false); elf_tdata (abfd)->strtab_hdr.sh_name = (unsigned int) _bfd_stringtab_add (shstrtab, ".strtab", true, false); elf_tdata (abfd)->shstrtab_hdr.sh_name = (unsigned int) _bfd_stringtab_add (shstrtab, ".shstrtab", true, false); if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1) return false; return true; } /* Assign file positions for all the reloc sections which are not part of the loadable file image. */ void _bfd_elf_assign_file_positions_for_relocs (abfd) bfd *abfd; { file_ptr off; unsigned int i; Elf_Internal_Shdr **shdrpp; off = elf_tdata (abfd)->next_file_pos; for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < elf_elfheader (abfd)->e_shnum; i++, shdrpp++) { Elf_Internal_Shdr *shdrp; shdrp = *shdrpp; if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA) && shdrp->sh_offset == -1) off = _bfd_elf_assign_file_position_for_section (shdrp, off, true); } elf_tdata (abfd)->next_file_pos = off; } boolean _bfd_elf_write_object_contents (abfd) bfd *abfd; { struct elf_backend_data *bed = get_elf_backend_data (abfd); Elf_Internal_Ehdr *i_ehdrp; Elf_Internal_Shdr **i_shdrp; boolean failed; unsigned int count; if (! abfd->output_has_begun && ! _bfd_elf_compute_section_file_positions (abfd, (struct bfd_link_info *) NULL)) return false; i_shdrp = elf_elfsections (abfd); i_ehdrp = elf_elfheader (abfd); failed = false; bfd_map_over_sections (abfd, bed->s->write_relocs, &failed); if (failed) return false; _bfd_elf_assign_file_positions_for_relocs (abfd); /* After writing the headers, we need to write the sections too... */ for (count = 1; count < i_ehdrp->e_shnum; count++) { if (bed->elf_backend_section_processing) (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]); if (i_shdrp[count]->contents) { if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0 || (bfd_write (i_shdrp[count]->contents, i_shdrp[count]->sh_size, 1, abfd) != i_shdrp[count]->sh_size)) return false; } } /* Write out the section header names. */ if (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0 || ! _bfd_stringtab_emit (abfd, elf_shstrtab (abfd))) return false; if (bed->elf_backend_final_write_processing) (*bed->elf_backend_final_write_processing) (abfd, elf_tdata (abfd)->linker); return bed->s->write_shdrs_and_ehdr (abfd); } /* given a section, search the header to find them... */ int _bfd_elf_section_from_bfd_section (abfd, asect) bfd *abfd; struct sec *asect; { struct elf_backend_data *bed = get_elf_backend_data (abfd); Elf_Internal_Shdr **i_shdrp = elf_elfsections (abfd); int index; Elf_Internal_Shdr *hdr; int maxindex = elf_elfheader (abfd)->e_shnum; for (index = 0; index < maxindex; index++) { hdr = i_shdrp[index]; if (hdr->bfd_section == asect) return index; } if (bed->elf_backend_section_from_bfd_section) { for (index = 0; index < maxindex; index++) { int retval; hdr = i_shdrp[index]; retval = index; if ((*bed->elf_backend_section_from_bfd_section) (abfd, hdr, asect, &retval)) return retval; } } if (bfd_is_abs_section (asect)) return SHN_ABS; if (bfd_is_com_section (asect)) return SHN_COMMON; if (bfd_is_und_section (asect)) return SHN_UNDEF; return -1; } /* Given a BFD symbol, return the index in the ELF symbol table, or -1 on error. */ int _bfd_elf_symbol_from_bfd_symbol (abfd, asym_ptr_ptr) bfd *abfd; asymbol **asym_ptr_ptr; { asymbol *asym_ptr = *asym_ptr_ptr; int idx; flagword flags = asym_ptr->flags; /* When gas creates relocations against local labels, it creates its own symbol for the section, but does put the symbol into the symbol chain, so udata is 0. When the linker is generating relocatable output, this section symbol may be for one of the input sections rather than the output section. */ if (asym_ptr->udata.i == 0 && (flags & BSF_SECTION_SYM) && asym_ptr->section) { int indx; if (asym_ptr->section->output_section != NULL) indx = asym_ptr->section->output_section->index; else indx = asym_ptr->section->index; if (elf_section_syms (abfd)[indx]) asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i; } idx = asym_ptr->udata.i; if (idx == 0) { /* This case can occur when using --strip-symbol on a symbol which is used in a relocation entry. */ (*_bfd_error_handler) ("%s: symbol `%s' required but not present", bfd_get_filename (abfd), bfd_asymbol_name (asym_ptr)); bfd_set_error (bfd_error_no_symbols); return -1; } #if DEBUG & 4 { fprintf (stderr, "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n", (long) asym_ptr, asym_ptr->name, idx, flags, elf_symbol_flags (flags)); fflush (stderr); } #endif return idx; } /* Copy private BFD data. This copies any program header information. */ static boolean copy_private_bfd_data (ibfd, obfd) bfd *ibfd; bfd *obfd; { Elf_Internal_Ehdr *iehdr; struct elf_segment_map *mfirst; struct elf_segment_map **pm; struct elf_segment_map *m; Elf_Internal_Phdr *p; unsigned int i, c; if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour || bfd_get_flavour (obfd) != bfd_target_elf_flavour) return true; if (elf_tdata (ibfd)->phdr == NULL) return true; iehdr = elf_elfheader (ibfd); mfirst = NULL; pm = &mfirst; c = elf_elfheader (ibfd)->e_phnum; for (i = 0, p = elf_tdata (ibfd)->phdr; i < c; i++, p++) { unsigned int csecs; asection *s; unsigned int isec; csecs = 0; /* The complicated case when p_vaddr is 0 is to handle the Solaris linker, which generates a PT_INTERP section with p_vaddr and p_memsz set to 0. */ for (s = ibfd->sections; s != NULL; s = s->next) if (((s->vma >= p->p_vaddr && (s->vma + s->_raw_size <= p->p_vaddr + p->p_memsz || s->vma + s->_raw_size <= p->p_vaddr + p->p_filesz)) || (p->p_vaddr == 0 && p->p_filesz > 0 && (s->flags & SEC_HAS_CONTENTS) != 0 && (bfd_vma) s->filepos >= p->p_offset && ((bfd_vma) s->filepos + s->_raw_size <= p->p_offset + p->p_filesz))) && (s->flags & SEC_ALLOC) != 0 && s->output_section != NULL) ++csecs; m = ((struct elf_segment_map *) bfd_alloc (obfd, (sizeof (struct elf_segment_map) + ((size_t) csecs - 1) * sizeof (asection *)))); if (m == NULL) return false; m->next = NULL; m->p_type = p->p_type; m->p_flags = p->p_flags; m->p_flags_valid = 1; m->p_paddr = p->p_paddr; m->p_paddr_valid = 1; m->includes_filehdr = (p->p_offset == 0 && p->p_filesz >= iehdr->e_ehsize); m->includes_phdrs = (p->p_offset <= (bfd_vma) iehdr->e_phoff && (p->p_offset + p->p_filesz >= ((bfd_vma) iehdr->e_phoff + iehdr->e_phnum * iehdr->e_phentsize))); isec = 0; for (s = ibfd->sections; s != NULL; s = s->next) { if (((s->vma >= p->p_vaddr && (s->vma + s->_raw_size <= p->p_vaddr + p->p_memsz || s->vma + s->_raw_size <= p->p_vaddr + p->p_filesz)) || (p->p_vaddr == 0 && p->p_filesz > 0 && (s->flags & SEC_HAS_CONTENTS) != 0 && (bfd_vma) s->filepos >= p->p_offset && ((bfd_vma) s->filepos + s->_raw_size <= p->p_offset + p->p_filesz))) && (s->flags & SEC_ALLOC) != 0 && s->output_section != NULL) { m->sections[isec] = s->output_section; ++isec; } } BFD_ASSERT (isec == csecs); m->count = csecs; *pm = m; pm = &m->next; } /* The Solaris linker creates program headers in which all the p_paddr fields are zero. When we try to objcopy or strip such a file, we get confused. Check for this case, and if we find it reset the p_paddr_valid fields. */ for (m = mfirst; m != NULL; m = m->next) if (m->p_paddr != 0) break; if (m == NULL) { for (m = mfirst; m != NULL; m = m->next) m->p_paddr_valid = 0; } elf_tdata (obfd)->segment_map = mfirst; return true; } /* Copy private section information. This copies over the entsize field, and sometimes the info field. */ boolean _bfd_elf_copy_private_section_data (ibfd, isec, obfd, osec) bfd *ibfd; asection *isec; bfd *obfd; asection *osec; { Elf_Internal_Shdr *ihdr, *ohdr; if (ibfd->xvec->flavour != bfd_target_elf_flavour || obfd->xvec->flavour != bfd_target_elf_flavour) return true; /* Copy over private BFD data if it has not already been copied. This must be done here, rather than in the copy_private_bfd_data entry point, because the latter is called after the section contents have been set, which means that the program headers have already been worked out. */ if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL) { asection *s; /* Only set up the segments if there are no more SEC_ALLOC sections. FIXME: This won't do the right thing if objcopy is used to remove the last SEC_ALLOC section, since objcopy won't call this routine in that case. */ for (s = isec->next; s != NULL; s = s->next) if ((s->flags & SEC_ALLOC) != 0) break; if (s == NULL) { if (! copy_private_bfd_data (ibfd, obfd)) return false; } } ihdr = &elf_section_data (isec)->this_hdr; ohdr = &elf_section_data (osec)->this_hdr; ohdr->sh_entsize = ihdr->sh_entsize; if (ihdr->sh_type == SHT_SYMTAB || ihdr->sh_type == SHT_DYNSYM || ihdr->sh_type == SHT_GNU_verneed || ihdr->sh_type == SHT_GNU_verdef) ohdr->sh_info = ihdr->sh_info; return true; } /* Copy private symbol information. If this symbol is in a section which we did not map into a BFD section, try to map the section index correctly. We use special macro definitions for the mapped section indices; these definitions are interpreted by the swap_out_syms function. */ #define MAP_ONESYMTAB (SHN_LORESERVE - 1) #define MAP_DYNSYMTAB (SHN_LORESERVE - 2) #define MAP_STRTAB (SHN_LORESERVE - 3) #define MAP_SHSTRTAB (SHN_LORESERVE - 4) boolean _bfd_elf_copy_private_symbol_data (ibfd, isymarg, obfd, osymarg) bfd *ibfd; asymbol *isymarg; bfd *obfd; asymbol *osymarg; { elf_symbol_type *isym, *osym; if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour || bfd_get_flavour (obfd) != bfd_target_elf_flavour) return true; isym = elf_symbol_from (ibfd, isymarg); osym = elf_symbol_from (obfd, osymarg); if (isym != NULL && osym != NULL && bfd_is_abs_section (isym->symbol.section)) { unsigned int shndx; shndx = isym->internal_elf_sym.st_shndx; if (shndx == elf_onesymtab (ibfd)) shndx = MAP_ONESYMTAB; else if (shndx == elf_dynsymtab (ibfd)) shndx = MAP_DYNSYMTAB; else if (shndx == elf_tdata (ibfd)->strtab_section) shndx = MAP_STRTAB; else if (shndx == elf_tdata (ibfd)->shstrtab_section) shndx = MAP_SHSTRTAB; osym->internal_elf_sym.st_shndx = shndx; } return true; } /* Swap out the symbols. */ static boolean swap_out_syms (abfd, sttp) bfd *abfd; struct bfd_strtab_hash **sttp; { struct elf_backend_data *bed = get_elf_backend_data (abfd); if (!elf_map_symbols (abfd)) return false; /* Dump out the symtabs. */ { int symcount = bfd_get_symcount (abfd); asymbol **syms = bfd_get_outsymbols (abfd); struct bfd_strtab_hash *stt; Elf_Internal_Shdr *symtab_hdr; Elf_Internal_Shdr *symstrtab_hdr; char *outbound_syms; int idx; stt = _bfd_elf_stringtab_init (); if (stt == NULL) return false; symtab_hdr = &elf_tdata (abfd)->symtab_hdr; symtab_hdr->sh_type = SHT_SYMTAB; symtab_hdr->sh_entsize = bed->s->sizeof_sym; symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1); symtab_hdr->sh_info = elf_num_locals (abfd) + 1; symtab_hdr->sh_addralign = bed->s->file_align; symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr; symstrtab_hdr->sh_type = SHT_STRTAB; outbound_syms = bfd_alloc (abfd, (1 + symcount) * bed->s->sizeof_sym); if (outbound_syms == NULL) return false; symtab_hdr->contents = (PTR) outbound_syms; /* now generate the data (for "contents") */ { /* Fill in zeroth symbol and swap it out. */ Elf_Internal_Sym sym; sym.st_name = 0; sym.st_value = 0; sym.st_size = 0; sym.st_info = 0; sym.st_other = 0; sym.st_shndx = SHN_UNDEF; bed->s->swap_symbol_out (abfd, &sym, (PTR) outbound_syms); outbound_syms += bed->s->sizeof_sym; } for (idx = 0; idx < symcount; idx++) { Elf_Internal_Sym sym; bfd_vma value = syms[idx]->value; elf_symbol_type *type_ptr; flagword flags = syms[idx]->flags; int type; if (flags & BSF_SECTION_SYM) /* Section symbols have no names. */ sym.st_name = 0; else { sym.st_name = (unsigned long) _bfd_stringtab_add (stt, syms[idx]->name, true, false); if (sym.st_name == (unsigned long) -1) return false; } type_ptr = elf_symbol_from (abfd, syms[idx]); if (bfd_is_com_section (syms[idx]->section)) { /* ELF common symbols put the alignment into the `value' field, and the size into the `size' field. This is backwards from how BFD handles it, so reverse it here. */ sym.st_size = value; if (type_ptr == NULL || type_ptr->internal_elf_sym.st_value == 0) sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value)); else sym.st_value = type_ptr->internal_elf_sym.st_value; sym.st_shndx = _bfd_elf_section_from_bfd_section (abfd, syms[idx]->section); } else { asection *sec = syms[idx]->section; int shndx; if (sec->output_section) { value += sec->output_offset; sec = sec->output_section; } value += sec->vma; sym.st_value = value; sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0; if (bfd_is_abs_section (sec) && type_ptr != NULL && type_ptr->internal_elf_sym.st_shndx != 0) { /* This symbol is in a real ELF section which we did not create as a BFD section. Undo the mapping done by copy_private_symbol_data. */ shndx = type_ptr->internal_elf_sym.st_shndx; switch (shndx) { case MAP_ONESYMTAB: shndx = elf_onesymtab (abfd); break; case MAP_DYNSYMTAB: shndx = elf_dynsymtab (abfd); break; case MAP_STRTAB: shndx = elf_tdata (abfd)->strtab_section; break; case MAP_SHSTRTAB: shndx = elf_tdata (abfd)->shstrtab_section; break; default: break; } } else { shndx = _bfd_elf_section_from_bfd_section (abfd, sec); if (shndx == -1) { asection *sec2; /* Writing this would be a hell of a lot easier if we had some decent documentation on bfd, and knew what to expect of the library, and what to demand of applications. For example, it appears that `objcopy' might not set the section of a symbol to be a section that is actually in the output file. */ sec2 = bfd_get_section_by_name (abfd, sec->name); BFD_ASSERT (sec2 != 0); shndx = _bfd_elf_section_from_bfd_section (abfd, sec2); BFD_ASSERT (shndx != -1); } } sym.st_shndx = shndx; } if ((flags & BSF_FUNCTION) != 0) type = STT_FUNC; else if ((flags & BSF_OBJECT) != 0) type = STT_OBJECT; else type = STT_NOTYPE; if (bfd_is_com_section (syms[idx]->section)) sym.st_info = ELF_ST_INFO (STB_GLOBAL, type); else if (bfd_is_und_section (syms[idx]->section)) sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK) ? STB_WEAK : STB_GLOBAL), type); else if (flags & BSF_SECTION_SYM) sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION); else if (flags & BSF_FILE) sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE); else { int bind = STB_LOCAL; if (flags & BSF_LOCAL) bind = STB_LOCAL; else if (flags & BSF_WEAK) bind = STB_WEAK; else if (flags & BSF_GLOBAL) bind = STB_GLOBAL; sym.st_info = ELF_ST_INFO (bind, type); } if (type_ptr != NULL) sym.st_other = type_ptr->internal_elf_sym.st_other; else sym.st_other = 0; bed->s->swap_symbol_out (abfd, &sym, (PTR) outbound_syms); outbound_syms += bed->s->sizeof_sym; } *sttp = stt; symstrtab_hdr->sh_size = _bfd_stringtab_size (stt); symstrtab_hdr->sh_type = SHT_STRTAB; symstrtab_hdr->sh_flags = 0; symstrtab_hdr->sh_addr = 0; symstrtab_hdr->sh_entsize = 0; symstrtab_hdr->sh_link = 0; symstrtab_hdr->sh_info = 0; symstrtab_hdr->sh_addralign = 1; } return true; } /* Return the number of bytes required to hold the symtab vector. Note that we base it on the count plus 1, since we will null terminate the vector allocated based on this size. However, the ELF symbol table always has a dummy entry as symbol #0, so it ends up even. */ long _bfd_elf_get_symtab_upper_bound (abfd) bfd *abfd; { long symcount; long symtab_size; Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr; symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym; symtab_size = (symcount - 1 + 1) * (sizeof (asymbol *)); return symtab_size; } long _bfd_elf_get_dynamic_symtab_upper_bound (abfd) bfd *abfd; { long symcount; long symtab_size; Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr; if (elf_dynsymtab (abfd) == 0) { bfd_set_error (bfd_error_invalid_operation); return -1; } symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym; symtab_size = (symcount - 1 + 1) * (sizeof (asymbol *)); return symtab_size; } long _bfd_elf_get_reloc_upper_bound (abfd, asect) bfd *abfd; sec_ptr asect; { return (asect->reloc_count + 1) * sizeof (arelent *); } /* Canonicalize the relocs. */ long _bfd_elf_canonicalize_reloc (abfd, section, relptr, symbols) bfd *abfd; sec_ptr section; arelent **relptr; asymbol **symbols; { arelent *tblptr; unsigned int i; if (! get_elf_backend_data (abfd)->s->slurp_reloc_table (abfd, section, symbols, false)) return -1; tblptr = section->relocation; for (i = 0; i < section->reloc_count; i++) *relptr++ = tblptr++; *relptr = NULL; return section->reloc_count; } long _bfd_elf_get_symtab (abfd, alocation) bfd *abfd; asymbol **alocation; { long symcount = get_elf_backend_data (abfd)->s->slurp_symbol_table (abfd, alocation, false); if (symcount >= 0) bfd_get_symcount (abfd) = symcount; return symcount; } long _bfd_elf_canonicalize_dynamic_symtab (abfd, alocation) bfd *abfd; asymbol **alocation; { return get_elf_backend_data (abfd)->s->slurp_symbol_table (abfd, alocation, true); } /* Return the size required for the dynamic reloc entries. Any section that was actually installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the dynamic symbol table, is considered to be a dynamic reloc section. */ long _bfd_elf_get_dynamic_reloc_upper_bound (abfd) bfd *abfd; { long ret; asection *s; if (elf_dynsymtab (abfd) == 0) { bfd_set_error (bfd_error_invalid_operation); return -1; } ret = sizeof (arelent *); for (s = abfd->sections; s != NULL; s = s->next) if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd) && (elf_section_data (s)->this_hdr.sh_type == SHT_REL || elf_section_data (s)->this_hdr.sh_type == SHT_RELA)) ret += ((s->_raw_size / elf_section_data (s)->this_hdr.sh_entsize) * sizeof (arelent *)); return ret; } /* Canonicalize the dynamic relocation entries. Note that we return the dynamic relocations as a single block, although they are actually associated with particular sections; the interface, which was designed for SunOS style shared libraries, expects that there is only one set of dynamic relocs. Any section that was actually installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the dynamic symbol table, is considered to be a dynamic reloc section. */ long _bfd_elf_canonicalize_dynamic_reloc (abfd, storage, syms) bfd *abfd; arelent **storage; asymbol **syms; { boolean (*slurp_relocs) PARAMS ((bfd *, asection *, asymbol **, boolean)); asection *s; long ret; if (elf_dynsymtab (abfd) == 0) { bfd_set_error (bfd_error_invalid_operation); return -1; } slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table; ret = 0; for (s = abfd->sections; s != NULL; s = s->next) { if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd) && (elf_section_data (s)->this_hdr.sh_type == SHT_REL || elf_section_data (s)->this_hdr.sh_type == SHT_RELA)) { arelent *p; long count, i; if (! (*slurp_relocs) (abfd, s, syms, true)) return -1; count = s->_raw_size / elf_section_data (s)->this_hdr.sh_entsize; p = s->relocation; for (i = 0; i < count; i++) *storage++ = p++; ret += count; } } *storage = NULL; return ret; } /* Read in the version information. */ boolean _bfd_elf_slurp_version_tables (abfd) bfd *abfd; { bfd_byte *contents = NULL; if (elf_dynverdef (abfd) != 0) { Elf_Internal_Shdr *hdr; Elf_External_Verdef *everdef; Elf_Internal_Verdef *iverdef; unsigned int i; hdr = &elf_tdata (abfd)->dynverdef_hdr; elf_tdata (abfd)->verdef = ((Elf_Internal_Verdef *) bfd_zalloc (abfd, hdr->sh_info * sizeof (Elf_Internal_Verdef))); if (elf_tdata (abfd)->verdef == NULL) goto error_return; elf_tdata (abfd)->cverdefs = hdr->sh_info; contents = (bfd_byte *) bfd_malloc (hdr->sh_size); if (contents == NULL) goto error_return; if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0 || bfd_read ((PTR) contents, 1, hdr->sh_size, abfd) != hdr->sh_size) goto error_return; everdef = (Elf_External_Verdef *) contents; iverdef = elf_tdata (abfd)->verdef; for (i = 0; i < hdr->sh_info; i++, iverdef++) { Elf_External_Verdaux *everdaux; Elf_Internal_Verdaux *iverdaux; unsigned int j; _bfd_elf_swap_verdef_in (abfd, everdef, iverdef); iverdef->vd_bfd = abfd; iverdef->vd_auxptr = ((Elf_Internal_Verdaux *) bfd_alloc (abfd, (iverdef->vd_cnt * sizeof (Elf_Internal_Verdaux)))); if (iverdef->vd_auxptr == NULL) goto error_return; everdaux = ((Elf_External_Verdaux *) ((bfd_byte *) everdef + iverdef->vd_aux)); iverdaux = iverdef->vd_auxptr; for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++) { _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux); iverdaux->vda_nodename = bfd_elf_string_from_elf_section (abfd, hdr->sh_link, iverdaux->vda_name); if (iverdaux->vda_nodename == NULL) goto error_return; if (j + 1 < iverdef->vd_cnt) iverdaux->vda_nextptr = iverdaux + 1; else iverdaux->vda_nextptr = NULL; everdaux = ((Elf_External_Verdaux *) ((bfd_byte *) everdaux + iverdaux->vda_next)); } iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename; if (i + 1 < hdr->sh_info) iverdef->vd_nextdef = iverdef + 1; else iverdef->vd_nextdef = NULL; everdef = ((Elf_External_Verdef *) ((bfd_byte *) everdef + iverdef->vd_next)); } free (contents); contents = NULL; } if (elf_dynverref (abfd) != 0) { Elf_Internal_Shdr *hdr; Elf_External_Verneed *everneed; Elf_Internal_Verneed *iverneed; unsigned int i; hdr = &elf_tdata (abfd)->dynverref_hdr; elf_tdata (abfd)->verref = ((Elf_Internal_Verneed *) bfd_zalloc (abfd, hdr->sh_info * sizeof (Elf_Internal_Verneed))); if (elf_tdata (abfd)->verref == NULL) goto error_return; elf_tdata (abfd)->cverrefs = hdr->sh_info; contents = (bfd_byte *) bfd_malloc (hdr->sh_size); if (contents == NULL) goto error_return; if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0 || bfd_read ((PTR) contents, 1, hdr->sh_size, abfd) != hdr->sh_size) goto error_return; everneed = (Elf_External_Verneed *) contents; iverneed = elf_tdata (abfd)->verref; for (i = 0; i < hdr->sh_info; i++, iverneed++) { Elf_External_Vernaux *evernaux; Elf_Internal_Vernaux *ivernaux; unsigned int j; _bfd_elf_swap_verneed_in (abfd, everneed, iverneed); iverneed->vn_bfd = abfd; iverneed->vn_filename = bfd_elf_string_from_elf_section (abfd, hdr->sh_link, iverneed->vn_file); if (iverneed->vn_filename == NULL) goto error_return; iverneed->vn_auxptr = ((Elf_Internal_Vernaux *) bfd_alloc (abfd, iverneed->vn_cnt * sizeof (Elf_Internal_Vernaux))); evernaux = ((Elf_External_Vernaux *) ((bfd_byte *) everneed + iverneed->vn_aux)); ivernaux = iverneed->vn_auxptr; for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++) { _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux); ivernaux->vna_nodename = bfd_elf_string_from_elf_section (abfd, hdr->sh_link, ivernaux->vna_name); if (ivernaux->vna_nodename == NULL) goto error_return; if (j + 1 < iverneed->vn_cnt) ivernaux->vna_nextptr = ivernaux + 1; else ivernaux->vna_nextptr = NULL; evernaux = ((Elf_External_Vernaux *) ((bfd_byte *) evernaux + ivernaux->vna_next)); } if (i + 1 < hdr->sh_info) iverneed->vn_nextref = iverneed + 1; else iverneed->vn_nextref = NULL; everneed = ((Elf_External_Verneed *) ((bfd_byte *) everneed + iverneed->vn_next)); } free (contents); contents = NULL; } return true; error_return: if (contents == NULL) free (contents); return false; } asymbol * _bfd_elf_make_empty_symbol (abfd) bfd *abfd; { elf_symbol_type *newsym; newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (elf_symbol_type)); if (!newsym) return NULL; else { newsym->symbol.the_bfd = abfd; return &newsym->symbol; } } void _bfd_elf_get_symbol_info (ignore_abfd, symbol, ret) bfd *ignore_abfd; asymbol *symbol; symbol_info *ret; { bfd_symbol_info (symbol, ret); } /* Return whether a symbol name implies a local symbol. Most targets use this function for the is_local_label_name entry point, but some override it. */ boolean _bfd_elf_is_local_label_name (abfd, name) bfd *abfd; const char *name; { /* Normal local symbols start with ``.L''. */ if (name[0] == '.' && name[1] == 'L') return true; /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate DWARF debugging symbols starting with ``..''. */ if (name[0] == '.' && name[1] == '.') return true; /* gcc will sometimes generate symbols beginning with ``_.L_'' when emitting DWARF debugging output. I suspect this is actually a small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call ASM_GENERATE_INTERNAL_LABEL, and this causes the leading underscore to be emitted on some ELF targets). For ease of use, we treat such symbols as local. */ if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_') return true; return false; } alent * _bfd_elf_get_lineno (ignore_abfd, symbol) bfd *ignore_abfd; asymbol *symbol; { abort (); return NULL; } boolean _bfd_elf_set_arch_mach (abfd, arch, machine) bfd *abfd; enum bfd_architecture arch; unsigned long machine; { /* If this isn't the right architecture for this backend, and this isn't the generic backend, fail. */ if (arch != get_elf_backend_data (abfd)->arch && arch != bfd_arch_unknown && get_elf_backend_data (abfd)->arch != bfd_arch_unknown) return false; return bfd_default_set_arch_mach (abfd, arch, machine); } /* Find the nearest line to a particular section and offset, for error reporting. */ boolean _bfd_elf_find_nearest_line (abfd, section, symbols, offset, filename_ptr, functionname_ptr, line_ptr) bfd *abfd; asection *section; asymbol **symbols; bfd_vma offset; CONST char **filename_ptr; CONST char **functionname_ptr; unsigned int *line_ptr; { boolean found; const char *filename; asymbol *func; bfd_vma low_func; asymbol **p; if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset, filename_ptr, functionname_ptr, line_ptr)) return true; if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset, &found, filename_ptr, functionname_ptr, line_ptr, &elf_tdata (abfd)->line_info)) return false; if (found) return true; if (symbols == NULL) return false; filename = NULL; func = NULL; low_func = 0; for (p = symbols; *p != NULL; p++) { elf_symbol_type *q; q = (elf_symbol_type *) *p; if (bfd_get_section (&q->symbol) != section) continue; switch (ELF_ST_TYPE (q->internal_elf_sym.st_info)) { default: break; case STT_FILE: filename = bfd_asymbol_name (&q->symbol); break; case STT_FUNC: if (q->symbol.section == section && q->symbol.value >= low_func && q->symbol.value <= offset) { func = (asymbol *) q; low_func = q->symbol.value; } break; } } if (func == NULL) return false; *filename_ptr = filename; *functionname_ptr = bfd_asymbol_name (func); *line_ptr = 0; return true; } int _bfd_elf_sizeof_headers (abfd, reloc) bfd *abfd; boolean reloc; { int ret; ret = get_elf_backend_data (abfd)->s->sizeof_ehdr; if (! reloc) ret += get_program_header_size (abfd); return ret; } boolean _bfd_elf_set_section_contents (abfd, section, location, offset, count) bfd *abfd; sec_ptr section; PTR location; file_ptr offset; bfd_size_type count; { Elf_Internal_Shdr *hdr; if (! abfd->output_has_begun && ! _bfd_elf_compute_section_file_positions (abfd, (struct bfd_link_info *) NULL)) return false; hdr = &elf_section_data (section)->this_hdr; if (bfd_seek (abfd, hdr->sh_offset + offset, SEEK_SET) == -1) return false; if (bfd_write (location, 1, count, abfd) != count) return false; return true; } void _bfd_elf_no_info_to_howto (abfd, cache_ptr, dst) bfd *abfd; arelent *cache_ptr; Elf_Internal_Rela *dst; { abort (); } #if 0 void _bfd_elf_no_info_to_howto_rel (abfd, cache_ptr, dst) bfd *abfd; arelent *cache_ptr; Elf_Internal_Rel *dst; { abort (); } #endif /* Try to convert a non-ELF reloc into an ELF one. */ boolean _bfd_elf_validate_reloc (abfd, areloc) bfd *abfd; arelent *areloc; { /* Check whether we really have an ELF howto. */ if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec) { bfd_reloc_code_real_type code; reloc_howto_type *howto; /* Alien reloc: Try to determine its type to replace it with an equivalent ELF reloc. */ if (areloc->howto->pc_relative) { switch (areloc->howto->bitsize) { case 8: code = BFD_RELOC_8_PCREL; break; case 12: code = BFD_RELOC_12_PCREL; break; case 16: code = BFD_RELOC_16_PCREL; break; case 24: code = BFD_RELOC_24_PCREL; break; case 32: code = BFD_RELOC_32_PCREL; break; case 64: code = BFD_RELOC_64_PCREL; break; default: goto fail; } howto = bfd_reloc_type_lookup (abfd, code); if (areloc->howto->pcrel_offset != howto->pcrel_offset) { if (howto->pcrel_offset) areloc->addend += areloc->address; else areloc->addend -= areloc->address; /* addend is unsigned!! */ } } else { switch (areloc->howto->bitsize) { case 8: code = BFD_RELOC_8; break; case 14: code = BFD_RELOC_14; break; case 16: code = BFD_RELOC_16; break; case 26: code = BFD_RELOC_26; break; case 32: code = BFD_RELOC_32; break; case 64: code = BFD_RELOC_64; break; default: goto fail; } howto = bfd_reloc_type_lookup (abfd, code); } if (howto) areloc->howto = howto; else goto fail; } return true; fail: (*_bfd_error_handler) ("%s: unsupported relocation type %s", bfd_get_filename (abfd), areloc->howto->name); bfd_set_error (bfd_error_bad_value); return false; } boolean _bfd_elf_close_and_cleanup (abfd) bfd *abfd; { if (bfd_get_format (abfd) == bfd_object) { if (elf_shstrtab (abfd) != NULL) _bfd_stringtab_free (elf_shstrtab (abfd)); } return _bfd_generic_close_and_cleanup (abfd); } Index: head/lib/csu/amd64/crti.S =================================================================== --- head/lib/csu/amd64/crti.S (revision 59341) +++ head/lib/csu/amd64/crti.S (revision 59342) @@ -1,38 +1,52 @@ /*- * Copyright 1996-1998 John D. Polstra. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * $FreeBSD$ */ + /* See http://www.netbsd.org/Documentation/kernel/elf-notes.html for + details on the ELF .note section as we are using it. */ + .section .note.ABI-tag, "a" + .align 4 + .long 1f - 0f # name length + .long 3f - 2f # data length + .long 1 # note type +0: .asciz "FreeBSD" # vendor name +1: .align 4 +2: .long 500000 # data - ABI tag + # (from __FreeBSD_version (param.h)) +3: .align 4 # pad out section + + .section .init,"ax",@progbits .align 4 .globl _init .type _init,@function _init: .section .fini,"ax",@progbits .align 4 .globl _fini .type _fini,@function _fini: Index: head/lib/csu/i386-elf/crti.S =================================================================== --- head/lib/csu/i386-elf/crti.S (revision 59341) +++ head/lib/csu/i386-elf/crti.S (revision 59342) @@ -1,38 +1,52 @@ /*- * Copyright 1996-1998 John D. Polstra. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * $FreeBSD$ */ + /* See http://www.netbsd.org/Documentation/kernel/elf-notes.html for + details on the ELF .note section as we are using it. */ + .section .note.ABI-tag, "a" + .align 4 + .long 1f - 0f # name length + .long 3f - 2f # data length + .long 1 # note type +0: .asciz "FreeBSD" # vendor name +1: .align 4 +2: .long 500000 # data - ABI tag + # (from __FreeBSD_version (param.h)) +3: .align 4 # pad out section + + .section .init,"ax",@progbits .align 4 .globl _init .type _init,@function _init: .section .fini,"ax",@progbits .align 4 .globl _fini .type _fini,@function _fini: Index: head/sys/alpha/linux/linux_sysvec.c =================================================================== --- head/sys/alpha/linux/linux_sysvec.c (revision 59341) +++ head/sys/alpha/linux/linux_sysvec.c (revision 59342) @@ -1,511 +1,511 @@ /*- * Copyright (c) 1994-1996 Søren Schmidt * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer * in this position and unchanged. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software withough specific prior written permission * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * $FreeBSD$ */ /* XXX we use functions that might not exist. */ #include "opt_compat.h" #ifndef COMPAT_43 #error "Unable to compile Linux-emulator due to missing COMPAT_43 option!" #endif #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include MALLOC_DEFINE(M_LINUX, "linux", "Linux mode structures"); extern char linux_sigcode[]; extern int linux_szsigcode; extern struct sysent linux_sysent[LINUX_SYS_MAXSYSCALL]; extern struct linker_set linux_ioctl_handler_set; static int linux_fixup __P((register_t **stack_base, struct image_params *iparams)); static int elf_linux_fixup __P((register_t **stack_base, struct image_params *iparams)); static void linux_prepsyscall __P((struct trapframe *tf, int *args, u_int *code, caddr_t *params)); static void linux_sendsig __P((sig_t catcher, int sig, sigset_t *mask, u_long code)); /* * Linux syscalls return negative errno's, we do positive and map them */ static int bsd_to_linux_errno[ELAST + 1] = { -0, -1, -2, -3, -4, -5, -6, -7, -8, -9, -10, -35, -12, -13, -14, -15, -16, -17, -18, -19, -20, -21, -22, -23, -24, -25, -26, -27, -28, -29, -30, -31, -32, -33, -34, -11,-115,-114, -88, -89, -90, -91, -92, -93, -94, -95, -96, -97, -98, -99, -100,-101,-102,-103,-104,-105,-106,-107,-108,-109, -110,-111, -40, -36,-112,-113, -39, -11, -87,-122, -116, -66, -6, -6, -6, -6, -6, -37, -38, -9, -6, -6, -43, -42, -75, -6, -84 }; int bsd_to_linux_signal[LINUX_SIGTBLSZ] = { LINUX_SIGHUP, LINUX_SIGINT, LINUX_SIGQUIT, LINUX_SIGILL, LINUX_SIGTRAP, LINUX_SIGABRT, 0, LINUX_SIGFPE, LINUX_SIGKILL, LINUX_SIGBUS, LINUX_SIGSEGV, 0, LINUX_SIGPIPE, LINUX_SIGALRM, LINUX_SIGTERM, LINUX_SIGURG, LINUX_SIGSTOP, LINUX_SIGTSTP, LINUX_SIGCONT, LINUX_SIGCHLD, LINUX_SIGTTIN, LINUX_SIGTTOU, LINUX_SIGIO, LINUX_SIGXCPU, LINUX_SIGXFSZ, LINUX_SIGVTALRM, LINUX_SIGPROF, LINUX_SIGWINCH, 0, LINUX_SIGUSR1, LINUX_SIGUSR2 }; int linux_to_bsd_signal[LINUX_SIGTBLSZ] = { SIGHUP, SIGINT, SIGQUIT, SIGILL, SIGTRAP, SIGABRT, SIGBUS, SIGFPE, SIGKILL, SIGUSR1, SIGSEGV, SIGUSR2, SIGPIPE, SIGALRM, SIGTERM, SIGBUS, SIGCHLD, SIGCONT, SIGSTOP, SIGTSTP, SIGTTIN, SIGTTOU, SIGURG, SIGXCPU, SIGXFSZ, SIGVTALRM, SIGPROF, SIGWINCH, SIGIO, SIGURG, 0 }; /* * If FreeBSD & Linux have a difference of opinion about what a trap * means, deal with it here. */ static int translate_traps(int signal, int trap_code) { if (signal != SIGBUS) return signal; switch (trap_code) { case T_PROTFLT: case T_TSSFLT: case T_DOUBLEFLT: case T_PAGEFLT: return SIGSEGV; default: return signal; } } static int linux_fixup(register_t **stack_base, struct image_params *imgp) { register_t *argv, *envp; argv = *stack_base; envp = *stack_base + (imgp->argc + 1); (*stack_base)--; **stack_base = (intptr_t)(void *)envp; (*stack_base)--; **stack_base = (intptr_t)(void *)argv; (*stack_base)--; **stack_base = imgp->argc; return 0; } static int elf_linux_fixup(register_t **stack_base, struct image_params *imgp) { Elf32_Auxargs *args = (Elf32_Auxargs *)imgp->auxargs; register_t *pos; pos = *stack_base + (imgp->argc + imgp->envc + 2); if (args->trace) { AUXARGS_ENTRY(pos, AT_DEBUG, 1); } if (args->execfd != -1) { AUXARGS_ENTRY(pos, AT_EXECFD, args->execfd); } AUXARGS_ENTRY(pos, AT_PHDR, args->phdr); AUXARGS_ENTRY(pos, AT_PHENT, args->phent); AUXARGS_ENTRY(pos, AT_PHNUM, args->phnum); AUXARGS_ENTRY(pos, AT_PAGESZ, args->pagesz); AUXARGS_ENTRY(pos, AT_FLAGS, args->flags); AUXARGS_ENTRY(pos, AT_ENTRY, args->entry); AUXARGS_ENTRY(pos, AT_BASE, args->base); AUXARGS_ENTRY(pos, AT_UID, imgp->proc->p_cred->p_ruid); AUXARGS_ENTRY(pos, AT_EUID, imgp->proc->p_cred->p_svuid); AUXARGS_ENTRY(pos, AT_GID, imgp->proc->p_cred->p_rgid); AUXARGS_ENTRY(pos, AT_EGID, imgp->proc->p_cred->p_svgid); AUXARGS_ENTRY(pos, AT_NULL, 0); free(imgp->auxargs, M_TEMP); imgp->auxargs = NULL; (*stack_base)--; **stack_base = (long)imgp->argc; return 0; } extern int _ucodesel, _udatasel; /* * Send an interrupt to process. * * Stack is set up to allow sigcode stored * in u. to call routine, followed by kcall * to sigreturn routine below. After sigreturn * resets the signal mask, the stack, and the * frame pointer, it returns to the user * specified pc, psl. */ static void linux_sendsig(sig_t catcher, int sig, sigset_t *mask, u_long code) { register struct proc *p = curproc; register struct trapframe *regs; struct linux_sigframe *fp, frame; struct sigacts *psp = p->p_sigacts; int oonstack; regs = p->p_md.md_regs; oonstack = p->p_sigstk.ss_flags & SS_ONSTACK; #ifdef DEBUG printf("Linux-emul(%ld): linux_sendsig(%p, %d, %p, %lu)\n", (long)p->p_pid, catcher, sig, (void*)mask, code); #endif /* * Allocate space for the signal handler context. */ if ((p->p_flag & P_ALTSTACK) && !oonstack && SIGISMEMBER(psp->ps_sigonstack, sig)) { fp = (struct linux_sigframe *)(p->p_sigstk.ss_sp + p->p_sigstk.ss_size - sizeof(struct linux_sigframe)); p->p_sigstk.ss_flags |= SS_ONSTACK; } else { fp = (struct linux_sigframe *)regs->tf_esp - 1; } /* * grow() will return FALSE if the fp will not fit inside the stack * and the stack can not be grown. useracc will return FALSE * if access is denied. */ if ((grow_stack (p, (int)fp) == FALSE) || !useracc((caddr_t)fp, sizeof (struct linux_sigframe), VM_PROT_WRITE)) { /* * Process has trashed its stack; give it an illegal * instruction to halt it in its tracks. */ SIGACTION(p, SIGILL) = SIG_DFL; SIGDELSET(p->p_sigignore, SIGILL); SIGDELSET(p->p_sigcatch, SIGILL); SIGDELSET(p->p_sigmask, SIGILL); psignal(p, SIGILL); return; } /* * Build the argument list for the signal handler. */ if (p->p_sysent->sv_sigtbl) if (sig <= p->p_sysent->sv_sigsize) sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)]; frame.sf_handler = catcher; frame.sf_sig = sig; /* * Build the signal context to be used by sigreturn. */ frame.sf_sc.sc_mask = mask->__bits[0]; frame.sf_sc.sc_gs = rgs(); frame.sf_sc.sc_fs = regs->tf_fs; frame.sf_sc.sc_es = regs->tf_es; frame.sf_sc.sc_ds = regs->tf_ds; frame.sf_sc.sc_edi = regs->tf_edi; frame.sf_sc.sc_esi = regs->tf_esi; frame.sf_sc.sc_ebp = regs->tf_ebp; frame.sf_sc.sc_ebx = regs->tf_ebx; frame.sf_sc.sc_edx = regs->tf_edx; frame.sf_sc.sc_ecx = regs->tf_ecx; frame.sf_sc.sc_eax = regs->tf_eax; frame.sf_sc.sc_eip = regs->tf_eip; frame.sf_sc.sc_cs = regs->tf_cs; frame.sf_sc.sc_eflags = regs->tf_eflags; frame.sf_sc.sc_esp_at_signal = regs->tf_esp; frame.sf_sc.sc_ss = regs->tf_ss; frame.sf_sc.sc_err = regs->tf_err; frame.sf_sc.sc_trapno = code; /* XXX ???? */ if (copyout(&frame, fp, sizeof(frame)) != 0) { /* * Process has trashed its stack; give it an illegal * instruction to halt it in its tracks. */ sigexit(p, SIGILL); /* NOTREACHED */ } /* * Build context to run handler in. */ regs->tf_esp = (int)fp; regs->tf_eip = PS_STRINGS - *(p->p_sysent->sv_szsigcode); regs->tf_eflags &= ~PSL_VM; regs->tf_cs = _ucodesel; regs->tf_ds = _udatasel; regs->tf_es = _udatasel; regs->tf_fs = _udatasel; load_gs(_udatasel); regs->tf_ss = _udatasel; } /* * System call to cleanup state after a signal * has been taken. Reset signal mask and * stack state from context left by sendsig (above). * Return to previous pc and psl as specified by * context left by sendsig. Check carefully to * make sure that the user has not modified the * psl to gain improper privileges or to cause * a machine fault. */ int linux_sigreturn(p, args) struct proc *p; struct linux_sigreturn_args *args; { struct linux_sigcontext *scp, context; register struct trapframe *regs; int eflags; regs = p->p_md.md_regs; #ifdef DEBUG printf("Linux-emul(%ld): linux_sigreturn(%p)\n", (long)p->p_pid, (void *)args->scp); #endif /* * The trampoline code hands us the context. * It is unsafe to keep track of it ourselves, in the event that a * program jumps out of a signal handler. */ scp = SCARG(args,scp); if (copyin((caddr_t)scp, &context, sizeof(*scp)) != 0) return (EFAULT); /* * Check for security violations. */ #define EFLAGS_SECURE(ef, oef) ((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0) eflags = context.sc_eflags; /* * XXX do allow users to change the privileged flag PSL_RF. The * cpu sets PSL_RF in tf_eflags for faults. Debuggers should * sometimes set it there too. tf_eflags is kept in the signal * context during signal handling and there is no other place * to remember it, so the PSL_RF bit may be corrupted by the * signal handler without us knowing. Corruption of the PSL_RF * bit at worst causes one more or one less debugger trap, so * allowing it is fairly harmless. */ if (!EFLAGS_SECURE(eflags & ~PSL_RF, regs->tf_eflags & ~PSL_RF)) { return(EINVAL); } /* * Don't allow users to load a valid privileged %cs. Let the * hardware check for invalid selectors, excess privilege in * other selectors, invalid %eip's and invalid %esp's. */ #define CS_SECURE(cs) (ISPL(cs) == SEL_UPL) if (!CS_SECURE(context.sc_cs)) { trapsignal(p, SIGBUS, T_PROTFLT); return(EINVAL); } p->p_sigstk.ss_flags &= ~SS_ONSTACK; SIGSETOLD(p->p_sigmask, context.sc_mask); SIG_CANTMASK(p->p_sigmask); /* * Restore signal context. */ /* %gs was restored by the trampoline. */ regs->tf_fs = context.sc_fs; regs->tf_es = context.sc_es; regs->tf_ds = context.sc_ds; regs->tf_edi = context.sc_edi; regs->tf_esi = context.sc_esi; regs->tf_ebp = context.sc_ebp; regs->tf_ebx = context.sc_ebx; regs->tf_edx = context.sc_edx; regs->tf_ecx = context.sc_ecx; regs->tf_eax = context.sc_eax; regs->tf_eip = context.sc_eip; regs->tf_cs = context.sc_cs; regs->tf_eflags = eflags; regs->tf_esp = context.sc_esp_at_signal; regs->tf_ss = context.sc_ss; return (EJUSTRETURN); } static void linux_prepsyscall(struct trapframe *tf, int *args, u_int *code, caddr_t *params) { args[0] = tf->tf_ebx; args[1] = tf->tf_ecx; args[2] = tf->tf_edx; args[3] = tf->tf_esi; args[4] = tf->tf_edi; *params = NULL; /* no copyin */ } struct sysentvec linux_sysvec = { LINUX_SYS_MAXSYSCALL, linux_sysent, 0xff, LINUX_SIGTBLSZ, bsd_to_linux_signal, ELAST + 1, bsd_to_linux_errno, translate_traps, linux_fixup, linux_sendsig, linux_sigcode, &linux_szsigcode, linux_prepsyscall, "Linux a.out", aout_coredump }; struct sysentvec elf_linux_sysvec = { LINUX_SYS_MAXSYSCALL, linux_sysent, 0xff, LINUX_SIGTBLSZ, bsd_to_linux_signal, ELAST + 1, bsd_to_linux_errno, translate_traps, elf_linux_fixup, linux_sendsig, linux_sigcode, &linux_szsigcode, linux_prepsyscall, "Linux ELF", elf_coredump }; static Elf32_Brandinfo linux_brand = { - "Linux", + ELFOSABI_LINUX, "/compat/linux", "/lib/ld-linux.so.1", &elf_linux_sysvec }; static Elf32_Brandinfo linux_glibc2brand = { - "Linux", + ELFOSABI_LINUX, "/compat/linux", "/lib/ld-linux.so.2", &elf_linux_sysvec }; Elf32_Brandinfo *linux_brandlist[] = { &linux_brand, &linux_glibc2brand, NULL }; static int linux_elf_modevent(module_t mod, int type, void *data) { Elf32_Brandinfo **brandinfo; int error; error = 0; switch(type) { case MOD_LOAD: for (brandinfo = &linux_brandlist[0]; *brandinfo != NULL; ++brandinfo) if (elf_insert_brand_entry(*brandinfo) < 0) error = EINVAL; if (error) printf("cannot insert Linux elf brand handler\n"); else { linux_ioctl_register_handlers(&linux_ioctl_handler_set); if (bootverbose) printf("Linux-ELF exec handler installed\n"); } break; case MOD_UNLOAD: linux_ioctl_unregister_handlers(&linux_ioctl_handler_set); for (brandinfo = &linux_brandlist[0]; *brandinfo != NULL; ++brandinfo) if (elf_brand_inuse(*brandinfo)) error = EBUSY; if (error == 0) { for (brandinfo = &linux_brandlist[0]; *brandinfo != NULL; ++brandinfo) if (elf_remove_brand_entry(*brandinfo) < 0) error = EINVAL; } if (error) printf("Could not deinstall ELF interpreter entry\n"); else if (bootverbose) printf("Linux-elf exec handler removed\n"); break; default: break; } return error; } static moduledata_t linux_elf_mod = { "linuxelf", linux_elf_modevent, 0 }; DECLARE_MODULE(linuxelf, linux_elf_mod, SI_SUB_EXEC, SI_ORDER_ANY); Index: head/sys/compat/svr4/svr4_sysvec.c =================================================================== --- head/sys/compat/svr4/svr4_sysvec.c (revision 59341) +++ head/sys/compat/svr4/svr4_sysvec.c (revision 59342) @@ -1,406 +1,406 @@ /* * Copyright (c) 1998 Mark Newton * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Christos Zoulas. * 4. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * $FreeBSD$ */ /* XXX we use functions that might not exist. */ #include "opt_compat.h" #ifndef COMPAT_43 #error "Unable to compile SVR4-emulator due to missing COMPAT_43 option!" #endif #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include int bsd_to_svr4_errno[ELAST+1] = { 0, SVR4_EPERM, SVR4_ENOENT, SVR4_ESRCH, SVR4_EINTR, SVR4_EIO, SVR4_ENXIO, SVR4_E2BIG, SVR4_ENOEXEC, SVR4_EBADF, SVR4_ECHILD, SVR4_EDEADLK, SVR4_ENOMEM, SVR4_EACCES, SVR4_EFAULT, SVR4_ENOTBLK, SVR4_EBUSY, SVR4_EEXIST, SVR4_EXDEV, SVR4_ENODEV, SVR4_ENOTDIR, SVR4_EISDIR, SVR4_EINVAL, SVR4_ENFILE, SVR4_EMFILE, SVR4_ENOTTY, SVR4_ETXTBSY, SVR4_EFBIG, SVR4_ENOSPC, SVR4_ESPIPE, SVR4_EROFS, SVR4_EMLINK, SVR4_EPIPE, SVR4_EDOM, SVR4_ERANGE, SVR4_EAGAIN, SVR4_EINPROGRESS, SVR4_EALREADY, SVR4_ENOTSOCK, SVR4_EDESTADDRREQ, SVR4_EMSGSIZE, SVR4_EPROTOTYPE, SVR4_ENOPROTOOPT, SVR4_EPROTONOSUPPORT, SVR4_ESOCKTNOSUPPORT, SVR4_EOPNOTSUPP, SVR4_EPFNOSUPPORT, SVR4_EAFNOSUPPORT, SVR4_EADDRINUSE, SVR4_EADDRNOTAVAIL, SVR4_ENETDOWN, SVR4_ENETUNREACH, SVR4_ENETRESET, SVR4_ECONNABORTED, SVR4_ECONNRESET, SVR4_ENOBUFS, SVR4_EISCONN, SVR4_ENOTCONN, SVR4_ESHUTDOWN, SVR4_ETOOMANYREFS, SVR4_ETIMEDOUT, SVR4_ECONNREFUSED, SVR4_ELOOP, SVR4_ENAMETOOLONG, SVR4_EHOSTDOWN, SVR4_EHOSTUNREACH, SVR4_ENOTEMPTY, SVR4_EPROCLIM, SVR4_EUSERS, SVR4_EDQUOT, SVR4_ESTALE, SVR4_EREMOTE, SVR4_EBADRPC, SVR4_ERPCMISMATCH, SVR4_EPROGUNAVAIL, SVR4_EPROGMISMATCH, SVR4_EPROCUNAVAIL, SVR4_ENOLCK, SVR4_ENOSYS, SVR4_EFTYPE, SVR4_EAUTH, SVR4_ENEEDAUTH, SVR4_EIDRM, SVR4_ENOMSG, }; -static int svr4_fixup(long **stack_base, struct image_params *imgp); +static int svr4_fixup(register_t **stack_base, struct image_params *imgp); extern struct sysent svr4_sysent[]; #undef szsigcode #undef sigcode extern int svr4_szsigcode; extern char svr4_sigcode[]; struct sysentvec svr4_sysvec = { SVR4_SYS_MAXSYSCALL, svr4_sysent, 0xff, SVR4_SIGTBLSZ, bsd_to_svr4_sig, ELAST, /* ELAST */ bsd_to_svr4_errno, 0, svr4_fixup, svr4_sendsig, svr4_sigcode, &svr4_szsigcode, NULL, "SVR4", elf_coredump }; Elf32_Brandinfo svr4_brand = { - "SVR4", - "/compat/svr4", + ELFOSABI_SOLARIS, /* XXX Or should we use ELFOSABI_SYSV here? */ + svr4_emul_path, "/lib/libc.so.1", &svr4_sysvec }; const char svr4_emul_path[] = "/compat/svr4"; static int -svr4_fixup(long **stack_base, struct image_params *imgp) +svr4_fixup(register_t **stack_base, struct image_params *imgp) { Elf32_Auxargs *args = (Elf32_Auxargs *)imgp->auxargs; - long *pos; + register_t *pos; pos = *stack_base + (imgp->argc + imgp->envc + 2); if (args->trace) { AUXARGS_ENTRY(pos, AT_DEBUG, 1); } if (args->execfd != -1) { AUXARGS_ENTRY(pos, AT_EXECFD, args->execfd); } AUXARGS_ENTRY(pos, AT_PHDR, args->phdr); AUXARGS_ENTRY(pos, AT_PHENT, args->phent); AUXARGS_ENTRY(pos, AT_PHNUM, args->phnum); AUXARGS_ENTRY(pos, AT_PAGESZ, args->pagesz); AUXARGS_ENTRY(pos, AT_FLAGS, args->flags); AUXARGS_ENTRY(pos, AT_ENTRY, args->entry); AUXARGS_ENTRY(pos, AT_BASE, args->base); AUXARGS_ENTRY(pos, AT_UID, imgp->proc->p_cred->p_ruid); AUXARGS_ENTRY(pos, AT_EUID, imgp->proc->p_cred->p_svuid); AUXARGS_ENTRY(pos, AT_GID, imgp->proc->p_cred->p_rgid); AUXARGS_ENTRY(pos, AT_EGID, imgp->proc->p_cred->p_svgid); AUXARGS_ENTRY(pos, AT_NULL, 0); free(imgp->auxargs, M_TEMP); imgp->auxargs = NULL; (*stack_base)--; **stack_base = (int)imgp->argc; return 0; } /* * Search an alternate path before passing pathname arguments on * to system calls. Useful for keeping a seperate 'emulation tree'. * * If cflag is set, we check if an attempt can be made to create * the named file, i.e. we check if the directory it should * be in exists. * * Code shamelessly stolen by Mark Newton from IBCS2 emulation code. */ int svr4_emul_find(p, sgp, prefix, path, pbuf, cflag) struct proc *p; caddr_t *sgp; /* Pointer to stackgap memory */ const char *prefix; char *path; char **pbuf; int cflag; { struct nameidata nd; struct nameidata ndroot; struct vattr vat; struct vattr vatroot; int error; char *ptr, *buf, *cp; size_t sz, len; buf = (char *) malloc(MAXPATHLEN, M_TEMP, M_WAITOK); *pbuf = path; for (ptr = buf; (*ptr = *prefix) != '\0'; ptr++, prefix++) continue; sz = MAXPATHLEN - (ptr - buf); /* * If sgp is not given then the path is already in kernel space */ if (sgp == NULL) error = copystr(path, ptr, sz, &len); else error = copyinstr(path, ptr, sz, &len); if (error) { free(buf, M_TEMP); return error; } if (*ptr != '/') { free(buf, M_TEMP); return EINVAL; } /* * We know that there is a / somewhere in this pathname. * Search backwards for it, to find the file's parent dir * to see if it exists in the alternate tree. If it does, * and we want to create a file (cflag is set). We don't * need to worry about the root comparison in this case. */ if (cflag) { for (cp = &ptr[len] - 1; *cp != '/'; cp--); *cp = '\0'; NDINIT(&nd, LOOKUP, FOLLOW, UIO_SYSSPACE, buf, p); if ((error = namei(&nd)) != 0) { free(buf, M_TEMP); return error; } NDFREE(&nd, NDF_ONLY_PNBUF); *cp = '/'; } else { NDINIT(&nd, LOOKUP, FOLLOW, UIO_SYSSPACE, buf, p); if ((error = namei(&nd)) != 0) { free(buf, M_TEMP); return error; } NDFREE(&nd, NDF_ONLY_PNBUF); /* * We now compare the vnode of the svr4_root to the one * vnode asked. If they resolve to be the same, then we * ignore the match so that the real root gets used. * This avoids the problem of traversing "../.." to find the * root directory and never finding it, because "/" resolves * to the emulation root directory. This is expensive :-( */ NDINIT(&ndroot, LOOKUP, FOLLOW, UIO_SYSSPACE, svr4_emul_path, p); if ((error = namei(&ndroot)) != 0) { /* Cannot happen! */ free(buf, M_TEMP); vrele(nd.ni_vp); return error; } NDFREE(&ndroot, NDF_ONLY_PNBUF); if ((error = VOP_GETATTR(nd.ni_vp, &vat, p->p_ucred, p)) != 0) { goto done; } if ((error = VOP_GETATTR(ndroot.ni_vp, &vatroot, p->p_ucred, p)) != 0) { goto done; } if (vat.va_fsid == vatroot.va_fsid && vat.va_fileid == vatroot.va_fileid) { error = ENOENT; goto done; } } if (sgp == NULL) *pbuf = buf; else { sz = &ptr[len] - buf; *pbuf = stackgap_alloc(sgp, sz + 1); error = copyout(buf, *pbuf, sz); free(buf, M_TEMP); } done: vrele(nd.ni_vp); if (!cflag) vrele(ndroot.ni_vp); return error; } static int svr4_elf_modevent(module_t mod, int type, void *data) { int error; error = 0; switch(type) { case MOD_LOAD: if (elf_insert_brand_entry(&svr4_brand) < 0) error = EINVAL; if (error) printf("cannot insert svr4 elf brand handler\n"); else if (bootverbose) printf("svr4 ELF exec handler installed\n"); break; case MOD_UNLOAD: /* Only allow the emulator to be removed if it isn't in use. */ if (elf_brand_inuse(&svr4_brand) != 0) { error = EBUSY; } else if (elf_remove_brand_entry(&svr4_brand) < 0) { error = EINVAL; } if (error) printf("Could not deinstall ELF interpreter entry (error %d)\n", error); else if (bootverbose) printf("svr4 ELF exec handler removed\n"); break; default: break; } return error; } static moduledata_t svr4_elf_mod = { "svr4elf", svr4_elf_modevent, 0 }; DECLARE_MODULE(svr4elf, svr4_elf_mod, SI_SUB_EXEC, SI_ORDER_ANY); Index: head/sys/i386/linux/linux_sysvec.c =================================================================== --- head/sys/i386/linux/linux_sysvec.c (revision 59341) +++ head/sys/i386/linux/linux_sysvec.c (revision 59342) @@ -1,511 +1,511 @@ /*- * Copyright (c) 1994-1996 Søren Schmidt * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer * in this position and unchanged. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software withough specific prior written permission * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * $FreeBSD$ */ /* XXX we use functions that might not exist. */ #include "opt_compat.h" #ifndef COMPAT_43 #error "Unable to compile Linux-emulator due to missing COMPAT_43 option!" #endif #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include MALLOC_DEFINE(M_LINUX, "linux", "Linux mode structures"); extern char linux_sigcode[]; extern int linux_szsigcode; extern struct sysent linux_sysent[LINUX_SYS_MAXSYSCALL]; extern struct linker_set linux_ioctl_handler_set; static int linux_fixup __P((register_t **stack_base, struct image_params *iparams)); static int elf_linux_fixup __P((register_t **stack_base, struct image_params *iparams)); static void linux_prepsyscall __P((struct trapframe *tf, int *args, u_int *code, caddr_t *params)); static void linux_sendsig __P((sig_t catcher, int sig, sigset_t *mask, u_long code)); /* * Linux syscalls return negative errno's, we do positive and map them */ static int bsd_to_linux_errno[ELAST + 1] = { -0, -1, -2, -3, -4, -5, -6, -7, -8, -9, -10, -35, -12, -13, -14, -15, -16, -17, -18, -19, -20, -21, -22, -23, -24, -25, -26, -27, -28, -29, -30, -31, -32, -33, -34, -11,-115,-114, -88, -89, -90, -91, -92, -93, -94, -95, -96, -97, -98, -99, -100,-101,-102,-103,-104,-105,-106,-107,-108,-109, -110,-111, -40, -36,-112,-113, -39, -11, -87,-122, -116, -66, -6, -6, -6, -6, -6, -37, -38, -9, -6, -6, -43, -42, -75, -6, -84 }; int bsd_to_linux_signal[LINUX_SIGTBLSZ] = { LINUX_SIGHUP, LINUX_SIGINT, LINUX_SIGQUIT, LINUX_SIGILL, LINUX_SIGTRAP, LINUX_SIGABRT, 0, LINUX_SIGFPE, LINUX_SIGKILL, LINUX_SIGBUS, LINUX_SIGSEGV, 0, LINUX_SIGPIPE, LINUX_SIGALRM, LINUX_SIGTERM, LINUX_SIGURG, LINUX_SIGSTOP, LINUX_SIGTSTP, LINUX_SIGCONT, LINUX_SIGCHLD, LINUX_SIGTTIN, LINUX_SIGTTOU, LINUX_SIGIO, LINUX_SIGXCPU, LINUX_SIGXFSZ, LINUX_SIGVTALRM, LINUX_SIGPROF, LINUX_SIGWINCH, 0, LINUX_SIGUSR1, LINUX_SIGUSR2 }; int linux_to_bsd_signal[LINUX_SIGTBLSZ] = { SIGHUP, SIGINT, SIGQUIT, SIGILL, SIGTRAP, SIGABRT, SIGBUS, SIGFPE, SIGKILL, SIGUSR1, SIGSEGV, SIGUSR2, SIGPIPE, SIGALRM, SIGTERM, SIGBUS, SIGCHLD, SIGCONT, SIGSTOP, SIGTSTP, SIGTTIN, SIGTTOU, SIGURG, SIGXCPU, SIGXFSZ, SIGVTALRM, SIGPROF, SIGWINCH, SIGIO, SIGURG, 0 }; /* * If FreeBSD & Linux have a difference of opinion about what a trap * means, deal with it here. */ static int translate_traps(int signal, int trap_code) { if (signal != SIGBUS) return signal; switch (trap_code) { case T_PROTFLT: case T_TSSFLT: case T_DOUBLEFLT: case T_PAGEFLT: return SIGSEGV; default: return signal; } } static int linux_fixup(register_t **stack_base, struct image_params *imgp) { register_t *argv, *envp; argv = *stack_base; envp = *stack_base + (imgp->argc + 1); (*stack_base)--; **stack_base = (intptr_t)(void *)envp; (*stack_base)--; **stack_base = (intptr_t)(void *)argv; (*stack_base)--; **stack_base = imgp->argc; return 0; } static int elf_linux_fixup(register_t **stack_base, struct image_params *imgp) { Elf32_Auxargs *args = (Elf32_Auxargs *)imgp->auxargs; register_t *pos; pos = *stack_base + (imgp->argc + imgp->envc + 2); if (args->trace) { AUXARGS_ENTRY(pos, AT_DEBUG, 1); } if (args->execfd != -1) { AUXARGS_ENTRY(pos, AT_EXECFD, args->execfd); } AUXARGS_ENTRY(pos, AT_PHDR, args->phdr); AUXARGS_ENTRY(pos, AT_PHENT, args->phent); AUXARGS_ENTRY(pos, AT_PHNUM, args->phnum); AUXARGS_ENTRY(pos, AT_PAGESZ, args->pagesz); AUXARGS_ENTRY(pos, AT_FLAGS, args->flags); AUXARGS_ENTRY(pos, AT_ENTRY, args->entry); AUXARGS_ENTRY(pos, AT_BASE, args->base); AUXARGS_ENTRY(pos, AT_UID, imgp->proc->p_cred->p_ruid); AUXARGS_ENTRY(pos, AT_EUID, imgp->proc->p_cred->p_svuid); AUXARGS_ENTRY(pos, AT_GID, imgp->proc->p_cred->p_rgid); AUXARGS_ENTRY(pos, AT_EGID, imgp->proc->p_cred->p_svgid); AUXARGS_ENTRY(pos, AT_NULL, 0); free(imgp->auxargs, M_TEMP); imgp->auxargs = NULL; (*stack_base)--; **stack_base = (long)imgp->argc; return 0; } extern int _ucodesel, _udatasel; /* * Send an interrupt to process. * * Stack is set up to allow sigcode stored * in u. to call routine, followed by kcall * to sigreturn routine below. After sigreturn * resets the signal mask, the stack, and the * frame pointer, it returns to the user * specified pc, psl. */ static void linux_sendsig(sig_t catcher, int sig, sigset_t *mask, u_long code) { register struct proc *p = curproc; register struct trapframe *regs; struct linux_sigframe *fp, frame; struct sigacts *psp = p->p_sigacts; int oonstack; regs = p->p_md.md_regs; oonstack = p->p_sigstk.ss_flags & SS_ONSTACK; #ifdef DEBUG printf("Linux-emul(%ld): linux_sendsig(%p, %d, %p, %lu)\n", (long)p->p_pid, catcher, sig, (void*)mask, code); #endif /* * Allocate space for the signal handler context. */ if ((p->p_flag & P_ALTSTACK) && !oonstack && SIGISMEMBER(psp->ps_sigonstack, sig)) { fp = (struct linux_sigframe *)(p->p_sigstk.ss_sp + p->p_sigstk.ss_size - sizeof(struct linux_sigframe)); p->p_sigstk.ss_flags |= SS_ONSTACK; } else { fp = (struct linux_sigframe *)regs->tf_esp - 1; } /* * grow() will return FALSE if the fp will not fit inside the stack * and the stack can not be grown. useracc will return FALSE * if access is denied. */ if ((grow_stack (p, (int)fp) == FALSE) || !useracc((caddr_t)fp, sizeof (struct linux_sigframe), VM_PROT_WRITE)) { /* * Process has trashed its stack; give it an illegal * instruction to halt it in its tracks. */ SIGACTION(p, SIGILL) = SIG_DFL; SIGDELSET(p->p_sigignore, SIGILL); SIGDELSET(p->p_sigcatch, SIGILL); SIGDELSET(p->p_sigmask, SIGILL); psignal(p, SIGILL); return; } /* * Build the argument list for the signal handler. */ if (p->p_sysent->sv_sigtbl) if (sig <= p->p_sysent->sv_sigsize) sig = p->p_sysent->sv_sigtbl[_SIG_IDX(sig)]; frame.sf_handler = catcher; frame.sf_sig = sig; /* * Build the signal context to be used by sigreturn. */ frame.sf_sc.sc_mask = mask->__bits[0]; frame.sf_sc.sc_gs = rgs(); frame.sf_sc.sc_fs = regs->tf_fs; frame.sf_sc.sc_es = regs->tf_es; frame.sf_sc.sc_ds = regs->tf_ds; frame.sf_sc.sc_edi = regs->tf_edi; frame.sf_sc.sc_esi = regs->tf_esi; frame.sf_sc.sc_ebp = regs->tf_ebp; frame.sf_sc.sc_ebx = regs->tf_ebx; frame.sf_sc.sc_edx = regs->tf_edx; frame.sf_sc.sc_ecx = regs->tf_ecx; frame.sf_sc.sc_eax = regs->tf_eax; frame.sf_sc.sc_eip = regs->tf_eip; frame.sf_sc.sc_cs = regs->tf_cs; frame.sf_sc.sc_eflags = regs->tf_eflags; frame.sf_sc.sc_esp_at_signal = regs->tf_esp; frame.sf_sc.sc_ss = regs->tf_ss; frame.sf_sc.sc_err = regs->tf_err; frame.sf_sc.sc_trapno = code; /* XXX ???? */ if (copyout(&frame, fp, sizeof(frame)) != 0) { /* * Process has trashed its stack; give it an illegal * instruction to halt it in its tracks. */ sigexit(p, SIGILL); /* NOTREACHED */ } /* * Build context to run handler in. */ regs->tf_esp = (int)fp; regs->tf_eip = PS_STRINGS - *(p->p_sysent->sv_szsigcode); regs->tf_eflags &= ~PSL_VM; regs->tf_cs = _ucodesel; regs->tf_ds = _udatasel; regs->tf_es = _udatasel; regs->tf_fs = _udatasel; load_gs(_udatasel); regs->tf_ss = _udatasel; } /* * System call to cleanup state after a signal * has been taken. Reset signal mask and * stack state from context left by sendsig (above). * Return to previous pc and psl as specified by * context left by sendsig. Check carefully to * make sure that the user has not modified the * psl to gain improper privileges or to cause * a machine fault. */ int linux_sigreturn(p, args) struct proc *p; struct linux_sigreturn_args *args; { struct linux_sigcontext *scp, context; register struct trapframe *regs; int eflags; regs = p->p_md.md_regs; #ifdef DEBUG printf("Linux-emul(%ld): linux_sigreturn(%p)\n", (long)p->p_pid, (void *)args->scp); #endif /* * The trampoline code hands us the context. * It is unsafe to keep track of it ourselves, in the event that a * program jumps out of a signal handler. */ scp = SCARG(args,scp); if (copyin((caddr_t)scp, &context, sizeof(*scp)) != 0) return (EFAULT); /* * Check for security violations. */ #define EFLAGS_SECURE(ef, oef) ((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0) eflags = context.sc_eflags; /* * XXX do allow users to change the privileged flag PSL_RF. The * cpu sets PSL_RF in tf_eflags for faults. Debuggers should * sometimes set it there too. tf_eflags is kept in the signal * context during signal handling and there is no other place * to remember it, so the PSL_RF bit may be corrupted by the * signal handler without us knowing. Corruption of the PSL_RF * bit at worst causes one more or one less debugger trap, so * allowing it is fairly harmless. */ if (!EFLAGS_SECURE(eflags & ~PSL_RF, regs->tf_eflags & ~PSL_RF)) { return(EINVAL); } /* * Don't allow users to load a valid privileged %cs. Let the * hardware check for invalid selectors, excess privilege in * other selectors, invalid %eip's and invalid %esp's. */ #define CS_SECURE(cs) (ISPL(cs) == SEL_UPL) if (!CS_SECURE(context.sc_cs)) { trapsignal(p, SIGBUS, T_PROTFLT); return(EINVAL); } p->p_sigstk.ss_flags &= ~SS_ONSTACK; SIGSETOLD(p->p_sigmask, context.sc_mask); SIG_CANTMASK(p->p_sigmask); /* * Restore signal context. */ /* %gs was restored by the trampoline. */ regs->tf_fs = context.sc_fs; regs->tf_es = context.sc_es; regs->tf_ds = context.sc_ds; regs->tf_edi = context.sc_edi; regs->tf_esi = context.sc_esi; regs->tf_ebp = context.sc_ebp; regs->tf_ebx = context.sc_ebx; regs->tf_edx = context.sc_edx; regs->tf_ecx = context.sc_ecx; regs->tf_eax = context.sc_eax; regs->tf_eip = context.sc_eip; regs->tf_cs = context.sc_cs; regs->tf_eflags = eflags; regs->tf_esp = context.sc_esp_at_signal; regs->tf_ss = context.sc_ss; return (EJUSTRETURN); } static void linux_prepsyscall(struct trapframe *tf, int *args, u_int *code, caddr_t *params) { args[0] = tf->tf_ebx; args[1] = tf->tf_ecx; args[2] = tf->tf_edx; args[3] = tf->tf_esi; args[4] = tf->tf_edi; *params = NULL; /* no copyin */ } struct sysentvec linux_sysvec = { LINUX_SYS_MAXSYSCALL, linux_sysent, 0xff, LINUX_SIGTBLSZ, bsd_to_linux_signal, ELAST + 1, bsd_to_linux_errno, translate_traps, linux_fixup, linux_sendsig, linux_sigcode, &linux_szsigcode, linux_prepsyscall, "Linux a.out", aout_coredump }; struct sysentvec elf_linux_sysvec = { LINUX_SYS_MAXSYSCALL, linux_sysent, 0xff, LINUX_SIGTBLSZ, bsd_to_linux_signal, ELAST + 1, bsd_to_linux_errno, translate_traps, elf_linux_fixup, linux_sendsig, linux_sigcode, &linux_szsigcode, linux_prepsyscall, "Linux ELF", elf_coredump }; static Elf32_Brandinfo linux_brand = { - "Linux", + ELFOSABI_LINUX, "/compat/linux", "/lib/ld-linux.so.1", &elf_linux_sysvec }; static Elf32_Brandinfo linux_glibc2brand = { - "Linux", + ELFOSABI_LINUX, "/compat/linux", "/lib/ld-linux.so.2", &elf_linux_sysvec }; Elf32_Brandinfo *linux_brandlist[] = { &linux_brand, &linux_glibc2brand, NULL }; static int linux_elf_modevent(module_t mod, int type, void *data) { Elf32_Brandinfo **brandinfo; int error; error = 0; switch(type) { case MOD_LOAD: for (brandinfo = &linux_brandlist[0]; *brandinfo != NULL; ++brandinfo) if (elf_insert_brand_entry(*brandinfo) < 0) error = EINVAL; if (error) printf("cannot insert Linux elf brand handler\n"); else { linux_ioctl_register_handlers(&linux_ioctl_handler_set); if (bootverbose) printf("Linux-ELF exec handler installed\n"); } break; case MOD_UNLOAD: linux_ioctl_unregister_handlers(&linux_ioctl_handler_set); for (brandinfo = &linux_brandlist[0]; *brandinfo != NULL; ++brandinfo) if (elf_brand_inuse(*brandinfo)) error = EBUSY; if (error == 0) { for (brandinfo = &linux_brandlist[0]; *brandinfo != NULL; ++brandinfo) if (elf_remove_brand_entry(*brandinfo) < 0) error = EINVAL; } if (error) printf("Could not deinstall ELF interpreter entry\n"); else if (bootverbose) printf("Linux-elf exec handler removed\n"); break; default: break; } return error; } static moduledata_t linux_elf_mod = { "linuxelf", linux_elf_modevent, 0 }; DECLARE_MODULE(linuxelf, linux_elf_mod, SI_SUB_EXEC, SI_ORDER_ANY); Index: head/sys/kern/imgact_elf.c =================================================================== --- head/sys/kern/imgact_elf.c (revision 59341) +++ head/sys/kern/imgact_elf.c (revision 59342) @@ -1,998 +1,995 @@ /*- * Copyright (c) 1995-1996 Søren Schmidt * Copyright (c) 1996 Peter Wemm * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer * in this position and unchanged. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software withough specific prior written permission * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * $FreeBSD$ */ #include "opt_rlimit.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include +#define OLD_EI_BRAND 8 + __ElfType(Brandinfo); __ElfType(Auxargs); static int elf_check_header __P((const Elf_Ehdr *hdr)); static int elf_freebsd_fixup __P((register_t **stack_base, struct image_params *imgp)); static int elf_load_file __P((struct proc *p, const char *file, u_long *addr, u_long *entry)); static int elf_load_section __P((struct proc *p, struct vmspace *vmspace, struct vnode *vp, vm_offset_t offset, caddr_t vmaddr, size_t memsz, size_t filsz, vm_prot_t prot)); static int exec_elf_imgact __P((struct image_params *imgp)); static int elf_trace = 0; SYSCTL_INT(_debug, OID_AUTO, elf_trace, CTLFLAG_RW, &elf_trace, 0, ""); -/* - * XXX Maximum length of an ELF brand (sysctl wants a statically-allocated - * buffer). - */ -#define MAXBRANDLEN 16 - static struct sysentvec elf_freebsd_sysvec = { SYS_MAXSYSCALL, sysent, 0, 0, 0, 0, 0, 0, elf_freebsd_fixup, sendsig, sigcode, &szsigcode, 0, "FreeBSD ELF", elf_coredump }; static Elf_Brandinfo freebsd_brand_info = { - "FreeBSD", + ELFOSABI_FREEBSD, "", "/usr/libexec/ld-elf.so.1", &elf_freebsd_sysvec }; static Elf_Brandinfo *elf_brand_list[MAX_BRANDS] = { &freebsd_brand_info, NULL, NULL, NULL, NULL, NULL, NULL, NULL }; int elf_insert_brand_entry(Elf_Brandinfo *entry) { int i; for (i=1; ip_sysent == entry->sysvec) return TRUE; } return FALSE; } static int elf_check_header(const Elf_Ehdr *hdr) { if (!IS_ELF(*hdr) || hdr->e_ident[EI_CLASS] != ELF_TARG_CLASS || hdr->e_ident[EI_DATA] != ELF_TARG_DATA || hdr->e_ident[EI_VERSION] != EV_CURRENT) return ENOEXEC; if (!ELF_MACHINE_OK(hdr->e_machine)) return ENOEXEC; if (hdr->e_version != ELF_TARG_VER) return ENOEXEC; return 0; } static int elf_load_section(struct proc *p, struct vmspace *vmspace, struct vnode *vp, vm_offset_t offset, caddr_t vmaddr, size_t memsz, size_t filsz, vm_prot_t prot) { size_t map_len; vm_offset_t map_addr; int error, rv; size_t copy_len; vm_object_t object; vm_offset_t file_addr; vm_offset_t data_buf = 0; object = vp->v_object; error = 0; map_addr = trunc_page((vm_offset_t)vmaddr); file_addr = trunc_page(offset); /* * We have two choices. We can either clear the data in the last page * of an oversized mapping, or we can start the anon mapping a page * early and copy the initialized data into that first page. We * choose the second.. */ if (memsz > filsz) map_len = trunc_page(offset+filsz) - file_addr; else map_len = round_page(offset+filsz) - file_addr; if (map_len != 0) { vm_object_reference(object); vm_map_lock(&vmspace->vm_map); rv = vm_map_insert(&vmspace->vm_map, object, file_addr, /* file offset */ map_addr, /* virtual start */ map_addr + map_len,/* virtual end */ prot, VM_PROT_ALL, MAP_COPY_ON_WRITE | MAP_PREFAULT); vm_map_unlock(&vmspace->vm_map); if (rv != KERN_SUCCESS) { vm_object_deallocate(object); return EINVAL; } /* we can stop now if we've covered it all */ if (memsz == filsz) return 0; } /* * We have to get the remaining bit of the file into the first part * of the oversized map segment. This is normally because the .data * segment in the file is extended to provide bss. It's a neat idea * to try and save a page, but it's a pain in the behind to implement. */ copy_len = (offset + filsz) - trunc_page(offset + filsz); map_addr = trunc_page((vm_offset_t)vmaddr + filsz); map_len = round_page((vm_offset_t)vmaddr + memsz) - map_addr; /* This had damn well better be true! */ if (map_len != 0) { vm_map_lock(&vmspace->vm_map); rv = vm_map_insert(&vmspace->vm_map, NULL, 0, map_addr, map_addr + map_len, VM_PROT_ALL, VM_PROT_ALL, 0); vm_map_unlock(&vmspace->vm_map); if (rv != KERN_SUCCESS) return EINVAL; } if (copy_len != 0) { vm_object_reference(object); rv = vm_map_find(exec_map, object, trunc_page(offset + filsz), &data_buf, PAGE_SIZE, TRUE, VM_PROT_READ, VM_PROT_ALL, MAP_COPY_ON_WRITE | MAP_PREFAULT_PARTIAL); if (rv != KERN_SUCCESS) { vm_object_deallocate(object); return EINVAL; } /* send the page fragment to user space */ error = copyout((caddr_t)data_buf, (caddr_t)map_addr, copy_len); vm_map_remove(exec_map, data_buf, data_buf + PAGE_SIZE); if (error) return (error); } /* * set it to the specified protection */ vm_map_protect(&vmspace->vm_map, map_addr, map_addr + map_len, prot, FALSE); return error; } /* * Load the file "file" into memory. It may be either a shared object * or an executable. * * The "addr" reference parameter is in/out. On entry, it specifies * the address where a shared object should be loaded. If the file is * an executable, this value is ignored. On exit, "addr" specifies * where the file was actually loaded. * * The "entry" reference parameter is out only. On exit, it specifies * the entry point for the loaded file. */ static int elf_load_file(struct proc *p, const char *file, u_long *addr, u_long *entry) { const Elf_Ehdr *hdr = NULL; const Elf_Phdr *phdr = NULL; struct nameidata nd; struct vmspace *vmspace = p->p_vmspace; struct vattr attr; struct image_params image_params, *imgp; vm_prot_t prot; u_long rbase; u_long base_addr = 0; int error, i, numsegs; imgp = &image_params; /* * Initialize part of the common data */ imgp->proc = p; imgp->uap = NULL; imgp->attr = &attr; imgp->firstpage = NULL; imgp->image_header = (char *)kmem_alloc_wait(exec_map, PAGE_SIZE); if (imgp->image_header == NULL) { nd.ni_vp = NULL; error = ENOMEM; goto fail; } NDINIT(&nd, LOOKUP, LOCKLEAF|FOLLOW, UIO_SYSSPACE, file, p); if ((error = namei(&nd)) != 0) { nd.ni_vp = NULL; goto fail; } NDFREE(&nd, NDF_ONLY_PNBUF); imgp->vp = nd.ni_vp; /* * Check permissions, modes, uid, etc on the file, and "open" it. */ error = exec_check_permissions(imgp); if (error) { VOP_UNLOCK(nd.ni_vp, 0, p); goto fail; } error = exec_map_first_page(imgp); VOP_UNLOCK(nd.ni_vp, 0, p); if (error) goto fail; hdr = (const Elf_Ehdr *)imgp->image_header; if ((error = elf_check_header(hdr)) != 0) goto fail; if (hdr->e_type == ET_DYN) rbase = *addr; else if (hdr->e_type == ET_EXEC) rbase = 0; else { error = ENOEXEC; goto fail; } /* Only support headers that fit within first page for now */ if ((hdr->e_phoff > PAGE_SIZE) || (hdr->e_phoff + hdr->e_phentsize * hdr->e_phnum) > PAGE_SIZE) { error = ENOEXEC; goto fail; } phdr = (const Elf_Phdr *)(imgp->image_header + hdr->e_phoff); for (i = 0, numsegs = 0; i < hdr->e_phnum; i++) { if (phdr[i].p_type == PT_LOAD) { /* Loadable segment */ prot = 0; if (phdr[i].p_flags & PF_X) prot |= VM_PROT_EXECUTE; if (phdr[i].p_flags & PF_W) prot |= VM_PROT_WRITE; if (phdr[i].p_flags & PF_R) prot |= VM_PROT_READ; if ((error = elf_load_section(p, vmspace, nd.ni_vp, phdr[i].p_offset, (caddr_t)phdr[i].p_vaddr + rbase, phdr[i].p_memsz, phdr[i].p_filesz, prot)) != 0) goto fail; /* * Establish the base address if this is the * first segment. */ if (numsegs == 0) base_addr = trunc_page(phdr[i].p_vaddr + rbase); numsegs++; } } *addr = base_addr; *entry=(unsigned long)hdr->e_entry + rbase; fail: if (imgp->firstpage) exec_unmap_first_page(imgp); if (imgp->image_header) kmem_free_wakeup(exec_map, (vm_offset_t)imgp->image_header, PAGE_SIZE); if (nd.ni_vp) vrele(nd.ni_vp); return error; } -static char fallback_elf_brand[MAXBRANDLEN+1] = { "none" }; -SYSCTL_STRING(_kern, OID_AUTO, fallback_elf_brand, CTLFLAG_RW, - fallback_elf_brand, sizeof(fallback_elf_brand), +static int fallback_elf_brand = ELFOSABI_FREEBSD; +SYSCTL_INT(_kern, OID_AUTO, fallback_elf_brand, CTLFLAG_RW, + &fallback_elf_brand, ELFOSABI_FREEBSD, "ELF brand of last resort"); static int exec_elf_imgact(struct image_params *imgp) { const Elf_Ehdr *hdr = (const Elf_Ehdr *) imgp->image_header; const Elf_Phdr *phdr; Elf_Auxargs *elf_auxargs = NULL; struct vmspace *vmspace; vm_prot_t prot; u_long text_size = 0, data_size = 0; u_long text_addr = 0, data_addr = 0; u_long addr, entry = 0, proghdr = 0; int error, i; const char *interp = NULL; Elf_Brandinfo *brand_info; - const char *brand; char path[MAXPATHLEN]; /* * Do we have a valid ELF header ? */ if (elf_check_header(hdr) != 0 || hdr->e_type != ET_EXEC) return -1; /* * From here on down, we return an errno, not -1, as we've * detected an ELF file. */ if ((hdr->e_phoff > PAGE_SIZE) || (hdr->e_phoff + hdr->e_phentsize * hdr->e_phnum) > PAGE_SIZE) { /* Only support headers in first page for now */ return ENOEXEC; } phdr = (const Elf_Phdr*)(imgp->image_header + hdr->e_phoff); /* * From this point on, we may have resources that need to be freed. */ if ((error = exec_extract_strings(imgp)) != 0) goto fail; exec_new_vmspace(imgp); vmspace = imgp->proc->p_vmspace; for (i = 0; i < hdr->e_phnum; i++) { switch(phdr[i].p_type) { case PT_LOAD: /* Loadable segment */ prot = 0; if (phdr[i].p_flags & PF_X) prot |= VM_PROT_EXECUTE; if (phdr[i].p_flags & PF_W) prot |= VM_PROT_WRITE; if (phdr[i].p_flags & PF_R) prot |= VM_PROT_READ; if ((error = elf_load_section(imgp->proc, vmspace, imgp->vp, phdr[i].p_offset, (caddr_t)phdr[i].p_vaddr, phdr[i].p_memsz, phdr[i].p_filesz, prot)) != 0) goto fail; /* * Is this .text or .data ?? * * We only handle one each of those yet XXX */ if (hdr->e_entry >= phdr[i].p_vaddr && hdr->e_entry <(phdr[i].p_vaddr+phdr[i].p_memsz)) { text_addr = trunc_page(phdr[i].p_vaddr); text_size = round_page(phdr[i].p_memsz + phdr[i].p_vaddr - text_addr); entry = (u_long)hdr->e_entry; } else { data_addr = trunc_page(phdr[i].p_vaddr); data_size = round_page(phdr[i].p_memsz + phdr[i].p_vaddr - data_addr); } break; case PT_INTERP: /* Path to interpreter */ if (phdr[i].p_filesz > MAXPATHLEN || phdr[i].p_offset + phdr[i].p_filesz > PAGE_SIZE) { error = ENOEXEC; goto fail; } interp = imgp->image_header + phdr[i].p_offset; break; case PT_PHDR: /* Program header table info */ proghdr = phdr[i].p_vaddr; break; default: break; } } vmspace->vm_tsize = text_size >> PAGE_SHIFT; vmspace->vm_taddr = (caddr_t)(uintptr_t)text_addr; vmspace->vm_dsize = data_size >> PAGE_SHIFT; vmspace->vm_daddr = (caddr_t)(uintptr_t)data_addr; addr = ELF_RTLD_ADDR(vmspace); imgp->entry_addr = entry; - /* If the executable has a brand, search for it in the brand list. */ brand_info = NULL; - brand = (const char *)&hdr->e_ident[EI_BRAND]; - if (brand[0] != '\0') { + + /* XXX For now we look for the magic "FreeBSD" that we used to put + * into the ELF header at the EI_ABIVERSION location. If found use + * that information rather than figuring out the ABI from proper + * branding. This should be removed for 5.0-RELEASE. The Linux caes + * can be figured out from the `interp_path' field. + */ + if (strcmp("FreeBSD", (const char *)&hdr->e_ident[OLD_EI_BRAND]) == 0) + brand_info = &freebsd_brand_info; + + /* If the executable has a brand, search for it in the brand list. */ + if (brand_info == NULL) { for (i = 0; i < MAX_BRANDS; i++) { Elf_Brandinfo *bi = elf_brand_list[i]; - if (bi != NULL && strcmp(brand, bi->brand) == 0) { + if (bi != NULL && hdr->e_ident[EI_OSABI] == bi->brand) { brand_info = bi; break; } } } /* Lacking a known brand, search for a recognized interpreter. */ if (brand_info == NULL && interp != NULL) { for (i = 0; i < MAX_BRANDS; i++) { Elf_Brandinfo *bi = elf_brand_list[i]; if (bi != NULL && strcmp(interp, bi->interp_path) == 0) { brand_info = bi; break; } } } /* Lacking a recognized interpreter, try the default brand */ - if (brand_info == NULL && fallback_elf_brand[0] != '\0') { + if (brand_info == NULL) { for (i = 0; i < MAX_BRANDS; i++) { Elf_Brandinfo *bi = elf_brand_list[i]; - if (bi != NULL - && strcmp(fallback_elf_brand, bi->brand) == 0) { + if (bi != NULL && fallback_elf_brand == bi->brand) { brand_info = bi; break; } } } -#ifdef __alpha__ - /* XXX - Assume FreeBSD on the alpha. */ + /* XXX - Assume FreeBSD after the branding method change. */ if (brand_info == NULL) brand_info = &freebsd_brand_info; -#endif if (brand_info == NULL) { - if (brand[0] == 0) - uprintf("ELF binary type not known." - " Use \"brandelf\" to brand it.\n"); - else - uprintf("ELF binary type \"%.*s\" not known.\n", - EI_NIDENT - EI_BRAND, brand); + uprintf("ELF binary type \"%u\" not known.\n", + hdr->e_ident[EI_OSABI]); error = ENOEXEC; goto fail; } imgp->proc->p_sysent = brand_info->sysvec; if (interp != NULL) { snprintf(path, sizeof(path), "%s%s", brand_info->emul_path, interp); if ((error = elf_load_file(imgp->proc, path, &addr, &imgp->entry_addr)) != 0) { if ((error = elf_load_file(imgp->proc, interp, &addr, &imgp->entry_addr)) != 0) { uprintf("ELF interpreter %s not found\n", path); goto fail; } } } /* * Construct auxargs table (used by the fixup routine) */ elf_auxargs = malloc(sizeof(Elf_Auxargs), M_TEMP, M_WAITOK); elf_auxargs->execfd = -1; elf_auxargs->phdr = proghdr; elf_auxargs->phent = hdr->e_phentsize; elf_auxargs->phnum = hdr->e_phnum; elf_auxargs->pagesz = PAGE_SIZE; elf_auxargs->base = addr; elf_auxargs->flags = 0; elf_auxargs->entry = entry; elf_auxargs->trace = elf_trace; imgp->auxargs = elf_auxargs; imgp->interpreted = 0; /* don't allow modifying the file while we run it */ imgp->vp->v_flag |= VTEXT; fail: return error; } static int elf_freebsd_fixup(register_t **stack_base, struct image_params *imgp) { Elf_Auxargs *args = (Elf_Auxargs *)imgp->auxargs; register_t *pos; pos = *stack_base + (imgp->argc + imgp->envc + 2); if (args->trace) { AUXARGS_ENTRY(pos, AT_DEBUG, 1); } if (args->execfd != -1) { AUXARGS_ENTRY(pos, AT_EXECFD, args->execfd); } AUXARGS_ENTRY(pos, AT_PHDR, args->phdr); AUXARGS_ENTRY(pos, AT_PHENT, args->phent); AUXARGS_ENTRY(pos, AT_PHNUM, args->phnum); AUXARGS_ENTRY(pos, AT_PAGESZ, args->pagesz); AUXARGS_ENTRY(pos, AT_FLAGS, args->flags); AUXARGS_ENTRY(pos, AT_ENTRY, args->entry); AUXARGS_ENTRY(pos, AT_BASE, args->base); AUXARGS_ENTRY(pos, AT_NULL, 0); free(imgp->auxargs, M_TEMP); imgp->auxargs = NULL; (*stack_base)--; suword(*stack_base, (long) imgp->argc); return 0; } /* * Code for generating ELF core dumps. */ typedef void (*segment_callback) __P((vm_map_entry_t, void *)); /* Closure for cb_put_phdr(). */ struct phdr_closure { Elf_Phdr *phdr; /* Program header to fill in */ Elf_Off offset; /* Offset of segment in core file */ }; /* Closure for cb_size_segment(). */ struct sseg_closure { int count; /* Count of writable segments. */ size_t size; /* Total size of all writable segments. */ }; static void cb_put_phdr __P((vm_map_entry_t, void *)); static void cb_size_segment __P((vm_map_entry_t, void *)); static void each_writable_segment __P((struct proc *, segment_callback, void *)); static int elf_corehdr __P((struct proc *, struct vnode *, struct ucred *, int, void *, size_t)); static void elf_puthdr __P((struct proc *, void *, size_t *, const prstatus_t *, const prfpregset_t *, const prpsinfo_t *, int)); static void elf_putnote __P((void *, size_t *, const char *, int, const void *, size_t)); extern int osreldate; int elf_coredump(p, vp, limit) register struct proc *p; register struct vnode *vp; off_t limit; { register struct ucred *cred = p->p_ucred; int error = 0; struct sseg_closure seginfo; void *hdr; size_t hdrsize; /* Size the program segments. */ seginfo.count = 0; seginfo.size = 0; each_writable_segment(p, cb_size_segment, &seginfo); /* * Calculate the size of the core file header area by making * a dry run of generating it. Nothing is written, but the * size is calculated. */ hdrsize = 0; elf_puthdr((struct proc *)NULL, (void *)NULL, &hdrsize, (const prstatus_t *)NULL, (const prfpregset_t *)NULL, (const prpsinfo_t *)NULL, seginfo.count); if (hdrsize + seginfo.size >= limit) return (EFAULT); /* * Allocate memory for building the header, fill it up, * and write it out. */ hdr = malloc(hdrsize, M_TEMP, M_WAITOK); if (hdr == NULL) { return EINVAL; } error = elf_corehdr(p, vp, cred, seginfo.count, hdr, hdrsize); /* Write the contents of all of the writable segments. */ if (error == 0) { Elf_Phdr *php; off_t offset; int i; php = (Elf_Phdr *)((char *)hdr + sizeof(Elf_Ehdr)) + 1; offset = hdrsize; for (i = 0; i < seginfo.count; i++) { error = vn_rdwr(UIO_WRITE, vp, (caddr_t)php->p_vaddr, php->p_filesz, offset, UIO_USERSPACE, IO_NODELOCKED|IO_UNIT, cred, (int *)NULL, p); if (error != 0) break; offset += php->p_filesz; php++; } } free(hdr, M_TEMP); return error; } /* * A callback for each_writable_segment() to write out the segment's * program header entry. */ static void cb_put_phdr(entry, closure) vm_map_entry_t entry; void *closure; { struct phdr_closure *phc = (struct phdr_closure *)closure; Elf_Phdr *phdr = phc->phdr; phc->offset = round_page(phc->offset); phdr->p_type = PT_LOAD; phdr->p_offset = phc->offset; phdr->p_vaddr = entry->start; phdr->p_paddr = 0; phdr->p_filesz = phdr->p_memsz = entry->end - entry->start; phdr->p_align = PAGE_SIZE; phdr->p_flags = 0; if (entry->protection & VM_PROT_READ) phdr->p_flags |= PF_R; if (entry->protection & VM_PROT_WRITE) phdr->p_flags |= PF_W; if (entry->protection & VM_PROT_EXECUTE) phdr->p_flags |= PF_X; phc->offset += phdr->p_filesz; phc->phdr++; } /* * A callback for each_writable_segment() to gather information about * the number of segments and their total size. */ static void cb_size_segment(entry, closure) vm_map_entry_t entry; void *closure; { struct sseg_closure *ssc = (struct sseg_closure *)closure; ssc->count++; ssc->size += entry->end - entry->start; } /* * For each writable segment in the process's memory map, call the given * function with a pointer to the map entry and some arbitrary * caller-supplied data. */ static void each_writable_segment(p, func, closure) struct proc *p; segment_callback func; void *closure; { vm_map_t map = &p->p_vmspace->vm_map; vm_map_entry_t entry; for (entry = map->header.next; entry != &map->header; entry = entry->next) { vm_object_t obj; if ((entry->eflags & MAP_ENTRY_IS_SUB_MAP) || (entry->protection & (VM_PROT_READ|VM_PROT_WRITE)) != (VM_PROT_READ|VM_PROT_WRITE)) continue; /* ** Dont include memory segment in the coredump if ** MAP_NOCORE is set in mmap(2) or MADV_NOCORE in ** madvise(2). */ if (entry->eflags & MAP_ENTRY_NOCOREDUMP) continue; if ((obj = entry->object.vm_object) == NULL) continue; /* Find the deepest backing object. */ while (obj->backing_object != NULL) obj = obj->backing_object; /* Ignore memory-mapped devices and such things. */ if (obj->type != OBJT_DEFAULT && obj->type != OBJT_SWAP && obj->type != OBJT_VNODE) continue; (*func)(entry, closure); } } /* * Write the core file header to the file, including padding up to * the page boundary. */ static int elf_corehdr(p, vp, cred, numsegs, hdr, hdrsize) struct proc *p; struct vnode *vp; struct ucred *cred; int numsegs; size_t hdrsize; void *hdr; { size_t off; prstatus_t status; prfpregset_t fpregset; prpsinfo_t psinfo; /* Gather the information for the header. */ bzero(&status, sizeof status); status.pr_version = PRSTATUS_VERSION; status.pr_statussz = sizeof(prstatus_t); status.pr_gregsetsz = sizeof(gregset_t); status.pr_fpregsetsz = sizeof(fpregset_t); status.pr_osreldate = osreldate; status.pr_cursig = p->p_sig; status.pr_pid = p->p_pid; fill_regs(p, &status.pr_reg); fill_fpregs(p, &fpregset); bzero(&psinfo, sizeof psinfo); psinfo.pr_version = PRPSINFO_VERSION; psinfo.pr_psinfosz = sizeof(prpsinfo_t); strncpy(psinfo.pr_fname, p->p_comm, MAXCOMLEN); /* XXX - We don't fill in the command line arguments properly yet. */ strncpy(psinfo.pr_psargs, p->p_comm, PRARGSZ); /* Fill in the header. */ bzero(hdr, hdrsize); off = 0; elf_puthdr(p, hdr, &off, &status, &fpregset, &psinfo, numsegs); /* Write it to the core file. */ return vn_rdwr(UIO_WRITE, vp, hdr, hdrsize, (off_t)0, UIO_SYSSPACE, IO_NODELOCKED|IO_UNIT, cred, NULL, p); } static void elf_puthdr(struct proc *p, void *dst, size_t *off, const prstatus_t *status, const prfpregset_t *fpregset, const prpsinfo_t *psinfo, int numsegs) { size_t ehoff; size_t phoff; size_t noteoff; size_t notesz; ehoff = *off; *off += sizeof(Elf_Ehdr); phoff = *off; *off += (numsegs + 1) * sizeof(Elf_Phdr); noteoff = *off; elf_putnote(dst, off, "FreeBSD", NT_PRSTATUS, status, sizeof *status); elf_putnote(dst, off, "FreeBSD", NT_FPREGSET, fpregset, sizeof *fpregset); elf_putnote(dst, off, "FreeBSD", NT_PRPSINFO, psinfo, sizeof *psinfo); notesz = *off - noteoff; /* Align up to a page boundary for the program segments. */ *off = round_page(*off); if (dst != NULL) { Elf_Ehdr *ehdr; Elf_Phdr *phdr; struct phdr_closure phc; /* * Fill in the ELF header. */ ehdr = (Elf_Ehdr *)((char *)dst + ehoff); ehdr->e_ident[EI_MAG0] = ELFMAG0; ehdr->e_ident[EI_MAG1] = ELFMAG1; ehdr->e_ident[EI_MAG2] = ELFMAG2; ehdr->e_ident[EI_MAG3] = ELFMAG3; ehdr->e_ident[EI_CLASS] = ELF_CLASS; ehdr->e_ident[EI_DATA] = ELF_DATA; ehdr->e_ident[EI_VERSION] = EV_CURRENT; + ehdr->e_ident[EI_OSABI] = ELFOSABI_FREEBSD; + ehdr->e_ident[EI_ABIVERSION] = 0; ehdr->e_ident[EI_PAD] = 0; - strncpy(ehdr->e_ident + EI_BRAND, "FreeBSD", - EI_NIDENT - EI_BRAND); ehdr->e_type = ET_CORE; ehdr->e_machine = ELF_ARCH; ehdr->e_version = EV_CURRENT; ehdr->e_entry = 0; ehdr->e_phoff = phoff; ehdr->e_flags = 0; ehdr->e_ehsize = sizeof(Elf_Ehdr); ehdr->e_phentsize = sizeof(Elf_Phdr); ehdr->e_phnum = numsegs + 1; ehdr->e_shentsize = sizeof(Elf_Shdr); ehdr->e_shnum = 0; ehdr->e_shstrndx = SHN_UNDEF; /* * Fill in the program header entries. */ phdr = (Elf_Phdr *)((char *)dst + phoff); /* The note segement. */ phdr->p_type = PT_NOTE; phdr->p_offset = noteoff; phdr->p_vaddr = 0; phdr->p_paddr = 0; phdr->p_filesz = notesz; phdr->p_memsz = 0; phdr->p_flags = 0; phdr->p_align = 0; phdr++; /* All the writable segments from the program. */ phc.phdr = phdr; phc.offset = *off; each_writable_segment(p, cb_put_phdr, &phc); } } static void elf_putnote(void *dst, size_t *off, const char *name, int type, const void *desc, size_t descsz) { Elf_Note note; note.n_namesz = strlen(name) + 1; note.n_descsz = descsz; note.n_type = type; if (dst != NULL) bcopy(¬e, (char *)dst + *off, sizeof note); *off += sizeof note; if (dst != NULL) bcopy(name, (char *)dst + *off, note.n_namesz); *off += roundup2(note.n_namesz, sizeof(Elf_Size)); if (dst != NULL) bcopy(desc, (char *)dst + *off, note.n_descsz); *off += roundup2(note.n_descsz, sizeof(Elf_Size)); } /* * Tell kern_execve.c about it, with a little help from the linker. */ static struct execsw elf_execsw = {exec_elf_imgact, "ELF"}; EXEC_SET(elf, elf_execsw); Index: head/sys/svr4/svr4_sysvec.c =================================================================== --- head/sys/svr4/svr4_sysvec.c (revision 59341) +++ head/sys/svr4/svr4_sysvec.c (revision 59342) @@ -1,406 +1,406 @@ /* * Copyright (c) 1998 Mark Newton * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Christos Zoulas. * 4. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * $FreeBSD$ */ /* XXX we use functions that might not exist. */ #include "opt_compat.h" #ifndef COMPAT_43 #error "Unable to compile SVR4-emulator due to missing COMPAT_43 option!" #endif #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include int bsd_to_svr4_errno[ELAST+1] = { 0, SVR4_EPERM, SVR4_ENOENT, SVR4_ESRCH, SVR4_EINTR, SVR4_EIO, SVR4_ENXIO, SVR4_E2BIG, SVR4_ENOEXEC, SVR4_EBADF, SVR4_ECHILD, SVR4_EDEADLK, SVR4_ENOMEM, SVR4_EACCES, SVR4_EFAULT, SVR4_ENOTBLK, SVR4_EBUSY, SVR4_EEXIST, SVR4_EXDEV, SVR4_ENODEV, SVR4_ENOTDIR, SVR4_EISDIR, SVR4_EINVAL, SVR4_ENFILE, SVR4_EMFILE, SVR4_ENOTTY, SVR4_ETXTBSY, SVR4_EFBIG, SVR4_ENOSPC, SVR4_ESPIPE, SVR4_EROFS, SVR4_EMLINK, SVR4_EPIPE, SVR4_EDOM, SVR4_ERANGE, SVR4_EAGAIN, SVR4_EINPROGRESS, SVR4_EALREADY, SVR4_ENOTSOCK, SVR4_EDESTADDRREQ, SVR4_EMSGSIZE, SVR4_EPROTOTYPE, SVR4_ENOPROTOOPT, SVR4_EPROTONOSUPPORT, SVR4_ESOCKTNOSUPPORT, SVR4_EOPNOTSUPP, SVR4_EPFNOSUPPORT, SVR4_EAFNOSUPPORT, SVR4_EADDRINUSE, SVR4_EADDRNOTAVAIL, SVR4_ENETDOWN, SVR4_ENETUNREACH, SVR4_ENETRESET, SVR4_ECONNABORTED, SVR4_ECONNRESET, SVR4_ENOBUFS, SVR4_EISCONN, SVR4_ENOTCONN, SVR4_ESHUTDOWN, SVR4_ETOOMANYREFS, SVR4_ETIMEDOUT, SVR4_ECONNREFUSED, SVR4_ELOOP, SVR4_ENAMETOOLONG, SVR4_EHOSTDOWN, SVR4_EHOSTUNREACH, SVR4_ENOTEMPTY, SVR4_EPROCLIM, SVR4_EUSERS, SVR4_EDQUOT, SVR4_ESTALE, SVR4_EREMOTE, SVR4_EBADRPC, SVR4_ERPCMISMATCH, SVR4_EPROGUNAVAIL, SVR4_EPROGMISMATCH, SVR4_EPROCUNAVAIL, SVR4_ENOLCK, SVR4_ENOSYS, SVR4_EFTYPE, SVR4_EAUTH, SVR4_ENEEDAUTH, SVR4_EIDRM, SVR4_ENOMSG, }; -static int svr4_fixup(long **stack_base, struct image_params *imgp); +static int svr4_fixup(register_t **stack_base, struct image_params *imgp); extern struct sysent svr4_sysent[]; #undef szsigcode #undef sigcode extern int svr4_szsigcode; extern char svr4_sigcode[]; struct sysentvec svr4_sysvec = { SVR4_SYS_MAXSYSCALL, svr4_sysent, 0xff, SVR4_SIGTBLSZ, bsd_to_svr4_sig, ELAST, /* ELAST */ bsd_to_svr4_errno, 0, svr4_fixup, svr4_sendsig, svr4_sigcode, &svr4_szsigcode, NULL, "SVR4", elf_coredump }; Elf32_Brandinfo svr4_brand = { - "SVR4", - "/compat/svr4", + ELFOSABI_SOLARIS, /* XXX Or should we use ELFOSABI_SYSV here? */ + svr4_emul_path, "/lib/libc.so.1", &svr4_sysvec }; const char svr4_emul_path[] = "/compat/svr4"; static int -svr4_fixup(long **stack_base, struct image_params *imgp) +svr4_fixup(register_t **stack_base, struct image_params *imgp) { Elf32_Auxargs *args = (Elf32_Auxargs *)imgp->auxargs; - long *pos; + register_t *pos; pos = *stack_base + (imgp->argc + imgp->envc + 2); if (args->trace) { AUXARGS_ENTRY(pos, AT_DEBUG, 1); } if (args->execfd != -1) { AUXARGS_ENTRY(pos, AT_EXECFD, args->execfd); } AUXARGS_ENTRY(pos, AT_PHDR, args->phdr); AUXARGS_ENTRY(pos, AT_PHENT, args->phent); AUXARGS_ENTRY(pos, AT_PHNUM, args->phnum); AUXARGS_ENTRY(pos, AT_PAGESZ, args->pagesz); AUXARGS_ENTRY(pos, AT_FLAGS, args->flags); AUXARGS_ENTRY(pos, AT_ENTRY, args->entry); AUXARGS_ENTRY(pos, AT_BASE, args->base); AUXARGS_ENTRY(pos, AT_UID, imgp->proc->p_cred->p_ruid); AUXARGS_ENTRY(pos, AT_EUID, imgp->proc->p_cred->p_svuid); AUXARGS_ENTRY(pos, AT_GID, imgp->proc->p_cred->p_rgid); AUXARGS_ENTRY(pos, AT_EGID, imgp->proc->p_cred->p_svgid); AUXARGS_ENTRY(pos, AT_NULL, 0); free(imgp->auxargs, M_TEMP); imgp->auxargs = NULL; (*stack_base)--; **stack_base = (int)imgp->argc; return 0; } /* * Search an alternate path before passing pathname arguments on * to system calls. Useful for keeping a seperate 'emulation tree'. * * If cflag is set, we check if an attempt can be made to create * the named file, i.e. we check if the directory it should * be in exists. * * Code shamelessly stolen by Mark Newton from IBCS2 emulation code. */ int svr4_emul_find(p, sgp, prefix, path, pbuf, cflag) struct proc *p; caddr_t *sgp; /* Pointer to stackgap memory */ const char *prefix; char *path; char **pbuf; int cflag; { struct nameidata nd; struct nameidata ndroot; struct vattr vat; struct vattr vatroot; int error; char *ptr, *buf, *cp; size_t sz, len; buf = (char *) malloc(MAXPATHLEN, M_TEMP, M_WAITOK); *pbuf = path; for (ptr = buf; (*ptr = *prefix) != '\0'; ptr++, prefix++) continue; sz = MAXPATHLEN - (ptr - buf); /* * If sgp is not given then the path is already in kernel space */ if (sgp == NULL) error = copystr(path, ptr, sz, &len); else error = copyinstr(path, ptr, sz, &len); if (error) { free(buf, M_TEMP); return error; } if (*ptr != '/') { free(buf, M_TEMP); return EINVAL; } /* * We know that there is a / somewhere in this pathname. * Search backwards for it, to find the file's parent dir * to see if it exists in the alternate tree. If it does, * and we want to create a file (cflag is set). We don't * need to worry about the root comparison in this case. */ if (cflag) { for (cp = &ptr[len] - 1; *cp != '/'; cp--); *cp = '\0'; NDINIT(&nd, LOOKUP, FOLLOW, UIO_SYSSPACE, buf, p); if ((error = namei(&nd)) != 0) { free(buf, M_TEMP); return error; } NDFREE(&nd, NDF_ONLY_PNBUF); *cp = '/'; } else { NDINIT(&nd, LOOKUP, FOLLOW, UIO_SYSSPACE, buf, p); if ((error = namei(&nd)) != 0) { free(buf, M_TEMP); return error; } NDFREE(&nd, NDF_ONLY_PNBUF); /* * We now compare the vnode of the svr4_root to the one * vnode asked. If they resolve to be the same, then we * ignore the match so that the real root gets used. * This avoids the problem of traversing "../.." to find the * root directory and never finding it, because "/" resolves * to the emulation root directory. This is expensive :-( */ NDINIT(&ndroot, LOOKUP, FOLLOW, UIO_SYSSPACE, svr4_emul_path, p); if ((error = namei(&ndroot)) != 0) { /* Cannot happen! */ free(buf, M_TEMP); vrele(nd.ni_vp); return error; } NDFREE(&ndroot, NDF_ONLY_PNBUF); if ((error = VOP_GETATTR(nd.ni_vp, &vat, p->p_ucred, p)) != 0) { goto done; } if ((error = VOP_GETATTR(ndroot.ni_vp, &vatroot, p->p_ucred, p)) != 0) { goto done; } if (vat.va_fsid == vatroot.va_fsid && vat.va_fileid == vatroot.va_fileid) { error = ENOENT; goto done; } } if (sgp == NULL) *pbuf = buf; else { sz = &ptr[len] - buf; *pbuf = stackgap_alloc(sgp, sz + 1); error = copyout(buf, *pbuf, sz); free(buf, M_TEMP); } done: vrele(nd.ni_vp); if (!cflag) vrele(ndroot.ni_vp); return error; } static int svr4_elf_modevent(module_t mod, int type, void *data) { int error; error = 0; switch(type) { case MOD_LOAD: if (elf_insert_brand_entry(&svr4_brand) < 0) error = EINVAL; if (error) printf("cannot insert svr4 elf brand handler\n"); else if (bootverbose) printf("svr4 ELF exec handler installed\n"); break; case MOD_UNLOAD: /* Only allow the emulator to be removed if it isn't in use. */ if (elf_brand_inuse(&svr4_brand) != 0) { error = EBUSY; } else if (elf_remove_brand_entry(&svr4_brand) < 0) { error = EINVAL; } if (error) printf("Could not deinstall ELF interpreter entry (error %d)\n", error); else if (bootverbose) printf("svr4 ELF exec handler removed\n"); break; default: break; } return error; } static moduledata_t svr4_elf_mod = { "svr4elf", svr4_elf_modevent, 0 }; DECLARE_MODULE(svr4elf, svr4_elf_mod, SI_SUB_EXEC, SI_ORDER_ANY); Index: head/sys/sys/elf_common.h =================================================================== --- head/sys/sys/elf_common.h (revision 59341) +++ head/sys/sys/elf_common.h (revision 59342) @@ -1,221 +1,239 @@ /*- * Copyright (c) 1998 John D. Polstra. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * $FreeBSD$ */ #ifndef _SYS_ELF_COMMON_H_ #define _SYS_ELF_COMMON_H_ 1 /* * ELF definitions that are independent of architecture or word size. */ /* * Note header. The ".note" section contains an array of notes. Each * begins with this header, aligned to a word boundary. Immediately * following the note header is n_namesz bytes of name, padded to the * next word boundary. Then comes n_descsz bytes of descriptor, again * padded to a word boundary. The values of n_namesz and n_descsz do * not include the padding. */ typedef struct { u_int32_t n_namesz; /* Length of name. */ u_int32_t n_descsz; /* Length of descriptor. */ u_int32_t n_type; /* Type of this note. */ } Elf_Note; -/* Indexes into the e_ident array. */ +/* Indexes into the e_ident array. Keep synced with + http://www.sco.com/developer/gabi/ch4.eheader.html */ #define EI_MAG0 0 /* Magic number, byte 0. */ #define EI_MAG1 1 /* Magic number, byte 1. */ #define EI_MAG2 2 /* Magic number, byte 2. */ #define EI_MAG3 3 /* Magic number, byte 3. */ #define EI_CLASS 4 /* Class of machine. */ #define EI_DATA 5 /* Data format. */ #define EI_VERSION 6 /* ELF format version. */ -#define EI_PAD 7 /* Start of padding (per SVR4 ABI). */ -#define EI_BRAND 8 /* Start of architecture identification. */ +#define EI_OSABI 7 /* Operating system / ABI identification */ +#define EI_ABIVERSION 8 /* ABI version */ +#define OLD_EI_BRAND 8 /* Start of architecture identification. */ +#define EI_PAD 9 /* Start of padding (per SVR4 ABI). */ #define EI_NIDENT 16 /* Size of e_ident array. */ /* Values for the magic number bytes. */ #define ELFMAG0 0x7f #define ELFMAG1 'E' #define ELFMAG2 'L' #define ELFMAG3 'F' /* Values for e_ident[EI_VERSION] and e_version. */ #define EV_NONE 0 #define EV_CURRENT 1 /* Values for e_ident[EI_CLASS]. */ #define ELFCLASSNONE 0 /* Unknown class. */ #define ELFCLASS32 1 /* 32-bit architecture. */ #define ELFCLASS64 2 /* 64-bit architecture. */ /* Values for e_ident[EI_DATA]. */ #define ELFDATANONE 0 /* Unknown data format. */ #define ELFDATA2LSB 1 /* 2's complement little-endian. */ #define ELFDATA2MSB 2 /* 2's complement big-endian. */ + +/* Values for e_ident[EI_OSABI]. */ +#define ELFOSABI_SYSV 0 /* UNIX System V ABI */ +#define ELFOSABI_HPUX 1 /* HP-UX operating system */ +#define ELFOSABI_NETBSD 2 /* NetBSD */ +#define ELFOSABI_LINUX 3 /* GNU/Linux */ +#define ELFOSABI_HURD 4 /* GNU/Hurd */ +#define ELFOSABI_86OPEN 5 /* 86Open common IA32 ABI */ +#define ELFOSABI_SOLARIS 6 /* Solaris */ +#define ELFOSABI_MONTEREY 7 /* Monterey */ +#define ELFOSABI_IRIX 8 /* IRIX */ +#define ELFOSABI_FREEBSD 9 /* FreeBSD */ +#define ELFOSABI_TRU64 10 /* TRU64 UNIX */ +#define ELFOSABI_ARM 97 /* ARM */ +#define ELFOSABI_STANDALONE 255 /* Standalone (embedded) application */ /* e_ident */ #define IS_ELF(ehdr) ((ehdr).e_ident[EI_MAG0] == ELFMAG0 && \ (ehdr).e_ident[EI_MAG1] == ELFMAG1 && \ (ehdr).e_ident[EI_MAG2] == ELFMAG2 && \ (ehdr).e_ident[EI_MAG3] == ELFMAG3) /* Values for e_type. */ #define ET_NONE 0 /* Unknown type. */ #define ET_REL 1 /* Relocatable. */ #define ET_EXEC 2 /* Executable. */ #define ET_DYN 3 /* Shared object. */ #define ET_CORE 4 /* Core file. */ /* Values for e_machine. */ #define EM_NONE 0 /* Unknown machine. */ #define EM_M32 1 /* AT&T WE32100. */ #define EM_SPARC 2 /* Sun SPARC. */ #define EM_386 3 /* Intel i386. */ #define EM_68K 4 /* Motorola 68000. */ #define EM_88K 5 /* Motorola 88000. */ #define EM_486 6 /* Intel i486. */ #define EM_860 7 /* Intel i860. */ #define EM_MIPS 8 /* MIPS R3000 Big-Endian only */ /* Extensions */ #define EM_MIPS_RS4_BE 10 /* MIPS R4000 Big-Endian */ #define EM_SPARC64 11 /* SPARC v9 64-bit unoffical */ #define EM_PARISC 15 /* HPPA */ #define EM_PPC 20 /* PowerPC */ #define EM_ALPHA 0x9026 /* Alpha */ /* Special section indexes. */ #define SHN_UNDEF 0 /* Undefined, missing, irrelevant. */ #define SHN_LORESERVE 0xff00 /* First of reserved range. */ #define SHN_LOPROC 0xff00 /* First processor-specific. */ #define SHN_HIPROC 0xff1f /* Last processor-specific. */ #define SHN_ABS 0xfff1 /* Absolute values. */ #define SHN_COMMON 0xfff2 /* Common data. */ #define SHN_HIRESERVE 0xffff /* Last of reserved range. */ /* sh_type */ #define SHT_NULL 0 /* inactive */ #define SHT_PROGBITS 1 /* program defined information */ #define SHT_SYMTAB 2 /* symbol table section */ #define SHT_STRTAB 3 /* string table section */ #define SHT_RELA 4 /* relocation section with addends*/ #define SHT_HASH 5 /* symbol hash table section */ #define SHT_DYNAMIC 6 /* dynamic section */ #define SHT_NOTE 7 /* note section */ #define SHT_NOBITS 8 /* no space section */ #define SHT_REL 9 /* relation section without addends */ #define SHT_SHLIB 10 /* reserved - purpose unknown */ #define SHT_DYNSYM 11 /* dynamic symbol table section */ #define SHT_LOPROC 0x70000000 /* reserved range for processor */ #define SHT_HIPROC 0x7fffffff /* specific section header types */ #define SHT_LOUSER 0x80000000 /* reserved range for application */ #define SHT_HIUSER 0xffffffff /* specific indexes */ /* Flags for sh_flags. */ #define SHF_WRITE 0x1 /* Section contains writable data. */ #define SHF_ALLOC 0x2 /* Section occupies memory. */ #define SHF_EXECINSTR 0x4 /* Section contains instructions. */ #define SHF_MASKPROC 0xf0000000 /* Reserved for processor-specific. */ /* Values for p_type. */ #define PT_NULL 0 /* Unused entry. */ #define PT_LOAD 1 /* Loadable segment. */ #define PT_DYNAMIC 2 /* Dynamic linking information segment. */ #define PT_INTERP 3 /* Pathname of interpreter. */ #define PT_NOTE 4 /* Auxiliary information. */ #define PT_SHLIB 5 /* Reserved (not used). */ #define PT_PHDR 6 /* Location of program header itself. */ #define PT_COUNT 7 /* Number of defined p_type values. */ #define PT_LOPROC 0x70000000 /* First processor-specific type. */ #define PT_HIPROC 0x7fffffff /* Last processor-specific type. */ /* Values for p_flags. */ #define PF_X 0x1 /* Executable. */ #define PF_W 0x2 /* Writable. */ #define PF_R 0x4 /* Readable. */ /* Values for d_tag. */ #define DT_NULL 0 /* Terminating entry. */ #define DT_NEEDED 1 /* String table offset of a needed shared library. */ #define DT_PLTRELSZ 2 /* Total size in bytes of PLT relocations. */ #define DT_PLTGOT 3 /* Processor-dependent address. */ #define DT_HASH 4 /* Address of symbol hash table. */ #define DT_STRTAB 5 /* Address of string table. */ #define DT_SYMTAB 6 /* Address of symbol table. */ #define DT_RELA 7 /* Address of ElfNN_Rela relocations. */ #define DT_RELASZ 8 /* Total size of ElfNN_Rela relocations. */ #define DT_RELAENT 9 /* Size of each ElfNN_Rela relocation entry. */ #define DT_STRSZ 10 /* Size of string table. */ #define DT_SYMENT 11 /* Size of each symbol table entry. */ #define DT_INIT 12 /* Address of initialization function. */ #define DT_FINI 13 /* Address of finalization function. */ #define DT_SONAME 14 /* String table offset of shared object name. */ #define DT_RPATH 15 /* String table offset of library path. */ #define DT_SYMBOLIC 16 /* Indicates "symbolic" linking. */ #define DT_REL 17 /* Address of ElfNN_Rel relocations. */ #define DT_RELSZ 18 /* Total size of ElfNN_Rel relocations. */ #define DT_RELENT 19 /* Size of each ElfNN_Rel relocation. */ #define DT_PLTREL 20 /* Type of relocation used for PLT. */ #define DT_DEBUG 21 /* Reserved (not used). */ #define DT_TEXTREL 22 /* Indicates there may be relocations in non-writable segments. */ #define DT_JMPREL 23 /* Address of PLT relocations. */ #define DT_COUNT 24 /* Number of defined d_tag values. */ /* Values for n_type. Used in core files. */ #define NT_PRSTATUS 1 /* Process status. */ #define NT_FPREGSET 2 /* Floating point registers. */ #define NT_PRPSINFO 3 /* Process state info. */ /* Symbol Binding - ELFNN_ST_BIND - st_info */ #define STB_LOCAL 0 /* Local symbol */ #define STB_GLOBAL 1 /* Global symbol */ #define STB_WEAK 2 /* like global - lower precedence */ #define STB_LOPROC 13 /* reserved range for processor */ #define STB_HIPROC 15 /* specific symbol bindings */ /* Symbol type - ELFNN_ST_TYPE - st_info */ #define STT_NOTYPE 0 /* Unspecified type. */ #define STT_OBJECT 1 /* Data object. */ #define STT_FUNC 2 /* Function. */ #define STT_SECTION 3 /* Section. */ #define STT_FILE 4 /* Source file. */ #define STT_LOPROC 13 /* reserved range for processor */ #define STT_HIPROC 15 /* specific symbol types */ /* Special symbol table indexes. */ #define STN_UNDEF 0 /* Undefined symbol index. */ #endif /* !_SYS_ELF_COMMON_H_ */ Index: head/sys/sys/imgact_elf.h =================================================================== --- head/sys/sys/imgact_elf.h (revision 59341) +++ head/sys/sys/imgact_elf.h (revision 59342) @@ -1,110 +1,110 @@ /*- * Copyright (c) 1995-1996 Søren Schmidt * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer * in this position and unchanged. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software withough specific prior written permission * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * $FreeBSD$ */ #ifndef _SYS_IMGACT_ELF_H_ #define _SYS_IMGACT_ELF_H_ #include #ifdef _KERNEL #define AUXARGS_ENTRY(pos, id, val) {suword(pos++, id); suword(pos++, val);} #if ELF_TARG_CLASS == ELFCLASS32 /* * Structure used to pass infomation from the loader to the * stack fixup routine. */ typedef struct { Elf32_Sword execfd; Elf32_Word phdr; Elf32_Word phent; Elf32_Word phnum; Elf32_Word pagesz; Elf32_Word base; Elf32_Word flags; Elf32_Word entry; Elf32_Word trace; } Elf32_Auxargs; typedef struct { - char *brand; - char *emul_path; - char *interp_path; + int brand; + const char *emul_path; + const char *interp_path; struct sysentvec *sysvec; } Elf32_Brandinfo; #define MAX_BRANDS 8 int elf_brand_inuse __P((Elf32_Brandinfo *entry)); int elf_insert_brand_entry __P((Elf32_Brandinfo *entry)); int elf_remove_brand_entry __P((Elf32_Brandinfo *entry)); #else /* !(ELF_TARG_CLASS == ELFCLASS32) */ /* * Structure used to pass infomation from the loader to the * stack fixup routine. */ typedef struct { Elf64_Sword execfd; Elf64_Addr phdr; Elf64_Word phent; Elf64_Word phnum; Elf64_Word pagesz; Elf64_Addr base; Elf64_Word flags; Elf64_Addr entry; Elf64_Word trace; } Elf64_Auxargs; typedef struct { char *brand; char *emul_path; char *interp_path; struct sysentvec *sysvec; } Elf64_Brandinfo; #define MAX_BRANDS 8 int elf_brand_inuse __P((Elf64_Brandinfo *entry)); int elf_insert_brand_entry __P((Elf64_Brandinfo *entry)); int elf_remove_brand_entry __P((Elf64_Brandinfo *entry)); #endif /* ELF_TARG_CLASS == ELFCLASS32 */ struct proc; int elf_coredump __P((struct proc *, struct vnode *, off_t)); #endif /* _KERNEL */ #endif /* !_SYS_IMGACT_ELF_H_ */ Index: head/usr.bin/brandelf/Makefile =================================================================== --- head/usr.bin/brandelf/Makefile (revision 59341) +++ head/usr.bin/brandelf/Makefile (revision 59342) @@ -1,4 +1,6 @@ +# $FreeBSD$ + PROG= brandelf -CFLAGS+=-Wall +CFLAGS+= -Wall .include Index: head/usr.bin/brandelf/brandelf.1 =================================================================== --- head/usr.bin/brandelf/brandelf.1 (revision 59341) +++ head/usr.bin/brandelf/brandelf.1 (revision 59342) @@ -1,94 +1,102 @@ .\" Copyright (c) 1997 .\" John-Mark Gurney. All rights reserved. .\" .\" Redistribution and use in source and binary forms, with or without .\" modification, are permitted provided that the following conditions .\" are met: .\" 1. Redistributions of source code must retain the above copyright .\" notice, this list of conditions and the following disclaimer. .\" 2. Redistributions in binary form must reproduce the above copyright .\" notice, this list of conditions and the following disclaimer in the .\" documentation and/or other materials provided with the distribution. .\" 3. Neither the name of the author nor the names of any co-contributors .\" may be used to endorse or promote products derived from this software .\" without specific prior written permission. .\" .\" THIS SOFTWARE IS PROVIDED BY John-Mark Gurney AND CONTRIBUTORS ``AS IS'' .\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" .\" $FreeBSD$ .\" .Dd February 6, 1997 .Dt BRANDELF 1 .Os FreeBSD .Sh NAME .Nm brandelf .Nd mark an ELF binary for a specific ABI .Sh SYNOPSIS .Nm brandelf -.Op Fl f +.Op Fl f Ar ELF ABI number .Op Fl l .Op Fl v .Op Fl t Ar string .Ar file ... .Sh DESCRIPTION This command marks an ELF binary to be run under a certain ABI for .Tn FreeBSD . .Pp The options are as follows: .Bl -tag -width Fl -.It Fl f -forces branding even if the brand requested is unknown, and disables -warnings for unknown brands. +.It Fl f Ar ELF ABI number +forces branding with the supplied ELF ABI number. In compatable with the +.It Fl t +option. These values are assigned by SCO/USL. .It Fl l lists all known ELF types on the standard error channel. .It Fl v turns on verbose reporting .It Fl t Ar string -Brands the given ELF binaries with +Brands the given ELF binaries to be of the .Ar string -as the ABI type. Currently supported ABI's are +ABI type. Currently supported ABI's are .Dq Tn FreeBSD and .Dq Linux . .It Ar file If .Fl t Ar string is given it will brand .Ar file -with +to be of type .Ar string , otherwise it will simply display the branding of .Ar file . .El .Sh EXAMPLES The following is an example of a typical usage of the .Nm command: .Pp .Dl % brandelf file .Dl % brandelf -t Linux file .Sh DIAGNOSTICS Exit status is 0 on success, and 1 if the command fails if a file doesn't exist, is too short, fails to brand properly, or the brand requested is not one of the known types and the .Fl f option is not set. +.Sh SEE ALSO +.Rs +.%A The Scanta Cruz Operation, Inc. +.%T System V Application Binary Interface +.%D April 29, 1998 (DRAFT) +.%O http://www.sco.com/developer/devspecs/ +.Re .Sh HISTORY The .Nm manual page first appeared in .Fx 2.2 . .Sh AUTHORS This manual page was written by .An John-Mark Gurney Aq gurney_j@efn.org . Index: head/usr.bin/brandelf/brandelf.c =================================================================== --- head/usr.bin/brandelf/brandelf.c (revision 59341) +++ head/usr.bin/brandelf/brandelf.c (revision 59342) @@ -1,176 +1,204 @@ /*- * Copyright (c) 1996 Søren Schmidt * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer * in this position and unchanged. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software withough specific prior written permission * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * $FreeBSD$ */ #include #include #include #include #include #include +#include #include -static int iselftype(const char *); +static int elftype(const char *); +static const char *iselftype(int); static void printelftypes(void); static void usage __P((void)); +struct ELFtypes { + const char *str; + int value; +}; +/* XXX - any more types? */ +static struct ELFtypes elftypes[] = { + { "FreeBSD", ELFOSABI_FREEBSD }, + { "SVR4", ELFOSABI_SYSV }, + { "Linux", ELFOSABI_LINUX } +}; + int main(int argc, char **argv) { - const char *type = "FreeBSD"; + const char *strtype = "FreeBSD"; + int type = ELFOSABI_FREEBSD; int retval = 0; int ch, change = 0, verbose = 0, force = 0, listed = 0; - while ((ch = getopt(argc, argv, "flt:v")) != -1) + while ((ch = getopt(argc, argv, "f:lt:v")) != -1) switch (ch) { case 'f': + if (change) + errx(1, "f option incompatable with t option"); force = 1; + type = atoi(optarg); + if (errno == ERANGE || type < 0 || type > 255) { + warnx("invalid argument to option f: %s", + optarg); + usage(); + } break; case 'l': printelftypes(); listed = 1; break; case 'v': verbose = 1; break; case 't': + if (force) + errx(1, "t option incompatable with f option"); change = 1; - type = optarg; + strtype = optarg; break; default: usage(); } argc -= optind; argv += optind; if (!argc) { if (listed) exit(0); else { warnx("no file(s) specified"); usage(); } } - if (!force && !iselftype(type)) { - warnx("invalid ELF type '%s'", type); + if (!force && (type = elftype(strtype)) == -1) { + warnx("invalid ELF type '%s'", strtype); printelftypes(); usage(); } while (argc) { int fd; char buffer[EI_NIDENT]; - char string[(EI_NIDENT-EI_BRAND)+1]; - if ((fd = open(argv[0], change? O_RDWR: O_RDONLY, 0)) < 0) { + if ((fd = open(argv[0], change || force ? O_RDWR : O_RDONLY, 0)) < 0) { warn("error opening file %s", argv[0]); retval = 1; goto fail; } if (read(fd, buffer, EI_NIDENT) < EI_NIDENT) { warnx("file '%s' too short", argv[0]); retval = 1; goto fail; } if (buffer[0] != ELFMAG0 || buffer[1] != ELFMAG1 || buffer[2] != ELFMAG2 || buffer[3] != ELFMAG3) { warnx("file '%s' is not ELF format", argv[0]); retval = 1; goto fail; } - if (!change) { - bzero(string, sizeof(string)); - strncpy(string, &buffer[EI_BRAND], EI_NIDENT-EI_BRAND); - if (strlen(string)) { - fprintf(stdout, - "File '%s' is of brand '%s'.\n", - argv[0], string); - if (!force && !iselftype(string)) { - warnx("Brand '%s' is unknown", - string); - printelftypes(); - } + if (!change && !force) { + fprintf(stdout, + "File '%s' is of brand '%s' (%u).\n", + argv[0], iselftype(buffer[EI_OSABI]), + buffer[EI_OSABI]); + if (!iselftype(type)) { + warnx("ELF ABI Brand '%u' is unknown", + type); + printelftypes(); } - else - fprintf(stdout, "File '%s' has no branding.\n", - argv[0]); } else { - strncpy(&buffer[EI_BRAND], type, EI_NIDENT-EI_BRAND); + buffer[EI_OSABI] = type; lseek(fd, 0, SEEK_SET); if (write(fd, buffer, EI_NIDENT) != EI_NIDENT) { - warnx("error writing %s", argv[0]); + warn("error writing %s %d", argv[0], fd); retval = 1; goto fail; } } fail: argc--; argv++; } return retval; } static void usage() { - fprintf(stderr, "usage: brandelf [-f] [-v] [-l] [-t string] file ...\n"); +fprintf(stderr, "usage: brandelf [-f ELF ABI number] [-v] [-l] [-t string] file ...\n"); exit(1); } -/* XXX - any more types? */ -static const char *elftypes[] = { "FreeBSD", "Linux", "SVR4" }; +static const char * +iselftype(int elftype) +{ + int elfwalk; + for (elfwalk = 0; + elfwalk < sizeof(elftypes)/sizeof(elftypes[0]); + elfwalk++) + if (elftype == elftypes[elfwalk].value) + return elftypes[elfwalk].str; + return 0; +} + static int -iselftype(const char *elftype) +elftype(const char *elfstrtype) { int elfwalk; for (elfwalk = 0; elfwalk < sizeof(elftypes)/sizeof(elftypes[0]); elfwalk++) - if (strcmp(elftype, elftypes[elfwalk]) == 0) - return 1; - return 0; + if (strcmp(elfstrtype, elftypes[elfwalk].str) == 0) + return elftypes[elfwalk].value; + return -1; } static void printelftypes() { int elfwalk; fprintf(stderr, "known ELF types are: "); for (elfwalk = 0; elfwalk < sizeof(elftypes)/sizeof(elftypes[0]); elfwalk++) - fprintf(stderr, "%s ", elftypes[elfwalk]); + fprintf(stderr, "%s(%u) ", elftypes[elfwalk].str, + elftypes[elfwalk].value); fprintf(stderr, "\n"); } Index: head/usr.bin/gcore/elfcore.c =================================================================== --- head/usr.bin/gcore/elfcore.c (revision 59341) +++ head/usr.bin/gcore/elfcore.c (revision 59342) @@ -1,513 +1,513 @@ /*- * Copyright (c) 1998 John D. Polstra * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * $FreeBSD$ */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "extern.h" /* * Code for generating ELF core dumps. */ typedef void (*segment_callback)(vm_map_entry_t, void *); /* Closure for cb_put_phdr(). */ struct phdr_closure { Elf_Phdr *phdr; /* Program header to fill in */ Elf_Off offset; /* Offset of segment in core file */ }; /* Closure for cb_size_segment(). */ struct sseg_closure { int count; /* Count of writable segments. */ size_t size; /* Total size of all writable segments. */ }; static void cb_put_phdr(vm_map_entry_t, void *); static void cb_size_segment(vm_map_entry_t, void *); static void each_writable_segment(vm_map_entry_t, segment_callback, void *closure); static void elf_corehdr(int fd, pid_t, vm_map_entry_t, int numsegs, void *hdr, size_t hdrsize); static void elf_puthdr(vm_map_entry_t, void *, size_t *, const prstatus_t *, const prfpregset_t *, const prpsinfo_t *, int numsegs); static void elf_putnote(void *dst, size_t *off, const char *name, int type, const void *desc, size_t descsz); static void freemap(vm_map_entry_t); static void readhdrinfo(pid_t, prstatus_t *, prfpregset_t *, prpsinfo_t *); static vm_map_entry_t readmap(pid_t); /* * Write an ELF coredump for the given pid to the given fd. */ void elf_coredump(int fd, pid_t pid) { vm_map_entry_t map; struct sseg_closure seginfo; void *hdr; size_t hdrsize; char memname[64]; int memfd; Elf_Phdr *php; int i; /* Get the program's memory map. */ map = readmap(pid); /* Size the program segments. */ seginfo.count = 0; seginfo.size = 0; each_writable_segment(map, cb_size_segment, &seginfo); /* * Calculate the size of the core file header area by making * a dry run of generating it. Nothing is written, but the * size is calculated. */ hdrsize = 0; elf_puthdr(map, (void *)NULL, &hdrsize, (const prstatus_t *)NULL, (const prfpregset_t *)NULL, (const prpsinfo_t *)NULL, seginfo.count); /* * Allocate memory for building the header, fill it up, * and write it out. */ hdr = malloc(hdrsize); if ((hdr = malloc(hdrsize)) == NULL) errx(1, "out of memory"); elf_corehdr(fd, pid, map, seginfo.count, hdr, hdrsize); /* Write the contents of all of the writable segments. */ snprintf(memname, sizeof memname, "/proc/%d/mem", pid); if ((memfd = open(memname, O_RDONLY)) == -1) err(1, "cannot open %s", memname); php = (Elf_Phdr *)((char *)hdr + sizeof(Elf_Ehdr)) + 1; for (i = 0; i < seginfo.count; i++) { int nleft = php->p_filesz; lseek(memfd, (off_t)php->p_vaddr, SEEK_SET); while (nleft > 0) { char buf[8*1024]; int nwant; int ngot; nwant = nleft; if (nwant > sizeof buf) nwant = sizeof buf; ngot = read(memfd, buf, nwant); if (ngot == -1) err(1, "read from %s", memname); if (ngot < nwant) errx(1, "short read from %s:" " wanted %d, got %d\n", memname, nwant, ngot); ngot = write(fd, buf, nwant); if (ngot == -1) err(1, "write of segment %d failed", i); if (ngot != nwant) errx(1, "short write"); nleft -= nwant; } php++; } close(memfd); free(hdr); freemap(map); } /* * A callback for each_writable_segment() to write out the segment's * program header entry. */ static void cb_put_phdr(vm_map_entry_t entry, void *closure) { struct phdr_closure *phc = (struct phdr_closure *)closure; Elf_Phdr *phdr = phc->phdr; phc->offset = round_page(phc->offset); phdr->p_type = PT_LOAD; phdr->p_offset = phc->offset; phdr->p_vaddr = entry->start; phdr->p_paddr = 0; phdr->p_filesz = phdr->p_memsz = entry->end - entry->start; phdr->p_align = PAGE_SIZE; phdr->p_flags = 0; if (entry->protection & VM_PROT_READ) phdr->p_flags |= PF_R; if (entry->protection & VM_PROT_WRITE) phdr->p_flags |= PF_W; if (entry->protection & VM_PROT_EXECUTE) phdr->p_flags |= PF_X; phc->offset += phdr->p_filesz; phc->phdr++; } /* * A callback for each_writable_segment() to gather information about * the number of segments and their total size. */ static void cb_size_segment(vm_map_entry_t entry, void *closure) { struct sseg_closure *ssc = (struct sseg_closure *)closure; ssc->count++; ssc->size += entry->end - entry->start; } /* * For each segment in the given memory map, call the given function * with a pointer to the map entry and some arbitrary caller-supplied * data. */ static void each_writable_segment(vm_map_entry_t map, segment_callback func, void *closure) { vm_map_entry_t entry; for (entry = map; entry != NULL; entry = entry->next) (*func)(entry, closure); } /* * Write the core file header to the file, including padding up to * the page boundary. */ static void elf_corehdr(int fd, pid_t pid, vm_map_entry_t map, int numsegs, void *hdr, size_t hdrsize) { size_t off; prstatus_t status; prfpregset_t fpregset; prpsinfo_t psinfo; /* Gather the information for the header. */ readhdrinfo(pid, &status, &fpregset, &psinfo); /* Fill in the header. */ memset(hdr, 0, hdrsize); off = 0; elf_puthdr(map, hdr, &off, &status, &fpregset, &psinfo, numsegs); /* Write it to the core file. */ if (write(fd, hdr, hdrsize) == -1) err(1, "write"); } /* * Generate the ELF coredump header into the buffer at "dst". "dst" may * be NULL, in which case the header is sized but not actually generated. */ static void elf_puthdr(vm_map_entry_t map, void *dst, size_t *off, const prstatus_t *status, const prfpregset_t *fpregset, const prpsinfo_t *psinfo, int numsegs) { size_t ehoff; size_t phoff; size_t noteoff; size_t notesz; ehoff = *off; *off += sizeof(Elf_Ehdr); phoff = *off; *off += (numsegs + 1) * sizeof(Elf_Phdr); noteoff = *off; elf_putnote(dst, off, "FreeBSD", NT_PRSTATUS, status, sizeof *status); elf_putnote(dst, off, "FreeBSD", NT_FPREGSET, fpregset, sizeof *fpregset); elf_putnote(dst, off, "FreeBSD", NT_PRPSINFO, psinfo, sizeof *psinfo); notesz = *off - noteoff; /* Align up to a page boundary for the program segments. */ *off = round_page(*off); if (dst != NULL) { Elf_Ehdr *ehdr; Elf_Phdr *phdr; struct phdr_closure phc; /* * Fill in the ELF header. */ ehdr = (Elf_Ehdr *)((char *)dst + ehoff); ehdr->e_ident[EI_MAG0] = ELFMAG0; ehdr->e_ident[EI_MAG1] = ELFMAG1; ehdr->e_ident[EI_MAG2] = ELFMAG2; ehdr->e_ident[EI_MAG3] = ELFMAG3; ehdr->e_ident[EI_CLASS] = ELF_CLASS; ehdr->e_ident[EI_DATA] = ELF_DATA; ehdr->e_ident[EI_VERSION] = EV_CURRENT; + ehdr->e_ident[EI_OSABI] = ELFOSABI_FREEBSD; + ehdr->e_ident[EI_ABIVERSION] = 0; ehdr->e_ident[EI_PAD] = 0; - strncpy(ehdr->e_ident + EI_BRAND, "FreeBSD", - EI_NIDENT - EI_BRAND); ehdr->e_type = ET_CORE; ehdr->e_machine = ELF_ARCH; ehdr->e_version = EV_CURRENT; ehdr->e_entry = 0; ehdr->e_phoff = phoff; ehdr->e_flags = 0; ehdr->e_ehsize = sizeof(Elf_Ehdr); ehdr->e_phentsize = sizeof(Elf_Phdr); ehdr->e_phnum = numsegs + 1; ehdr->e_shentsize = sizeof(Elf_Shdr); ehdr->e_shnum = 0; ehdr->e_shstrndx = SHN_UNDEF; /* * Fill in the program header entries. */ phdr = (Elf_Phdr *)((char *)dst + phoff); /* The note segement. */ phdr->p_type = PT_NOTE; phdr->p_offset = noteoff; phdr->p_vaddr = 0; phdr->p_paddr = 0; phdr->p_filesz = notesz; phdr->p_memsz = 0; phdr->p_flags = 0; phdr->p_align = 0; phdr++; /* All the writable segments from the program. */ phc.phdr = phdr; phc.offset = *off; each_writable_segment(map, cb_put_phdr, &phc); } } /* * Emit one note section to "dst", or just size it if "dst" is NULL. */ static void elf_putnote(void *dst, size_t *off, const char *name, int type, const void *desc, size_t descsz) { Elf_Note note; note.n_namesz = strlen(name) + 1; note.n_descsz = descsz; note.n_type = type; if (dst != NULL) bcopy(¬e, (char *)dst + *off, sizeof note); *off += sizeof note; if (dst != NULL) bcopy(name, (char *)dst + *off, note.n_namesz); *off += roundup2(note.n_namesz, sizeof(Elf_Size)); if (dst != NULL) bcopy(desc, (char *)dst + *off, note.n_descsz); *off += roundup2(note.n_descsz, sizeof(Elf_Size)); } /* * Free the memory map. */ static void freemap(vm_map_entry_t map) { while (map != NULL) { vm_map_entry_t next = map->next; free(map); map = next; } } /* * Read the process information necessary to fill in the core file's header. */ static void readhdrinfo(pid_t pid, prstatus_t *status, prfpregset_t *fpregset, prpsinfo_t *psinfo) { char name[64]; char line[256]; int fd; int i; int n; memset(status, 0, sizeof *status); status->pr_version = PRSTATUS_VERSION; status->pr_statussz = sizeof(prstatus_t); status->pr_gregsetsz = sizeof(gregset_t); status->pr_fpregsetsz = sizeof(fpregset_t); status->pr_osreldate = __FreeBSD_version; status->pr_pid = pid; memset(fpregset, 0, sizeof *fpregset); memset(psinfo, 0, sizeof *psinfo); psinfo->pr_version = PRPSINFO_VERSION; psinfo->pr_psinfosz = sizeof(prpsinfo_t); /* Read the general registers. */ snprintf(name, sizeof name, "/proc/%d/regs", pid); if ((fd = open(name, O_RDONLY)) == -1) err(1, "cannot open %s", name); if ((n = read(fd, &status->pr_reg, sizeof status->pr_reg)) == -1) err(1, "read error from %s", name); if (n < sizeof status->pr_reg) errx(1, "short read from %s: wanted %u, got %d", name, sizeof status->pr_reg, n); close(fd); /* Read the floating point registers. */ snprintf(name, sizeof name, "/proc/%d/fpregs", pid); if ((fd = open(name, O_RDONLY)) == -1) err(1, "cannot open %s", name); if ((n = read(fd, fpregset, sizeof *fpregset)) == -1) err(1, "read error from %s", name); if (n < sizeof *fpregset) errx(1, "short read from %s: wanted %u, got %d", name, sizeof *fpregset, n); close(fd); /* Read and parse the process status. */ snprintf(name, sizeof name, "/proc/%d/status", pid); if ((fd = open(name, O_RDONLY)) == -1) err(1, "cannot open %s", name); if ((n = read(fd, line, sizeof line - 1)) == -1) err(1, "read error from %s", name); if (n > MAXCOMLEN) n = MAXCOMLEN; for (i = 0; i < n && line[i] != ' '; i++) psinfo->pr_fname[i] = line[i]; strncpy(psinfo->pr_psargs, psinfo->pr_fname, PRARGSZ); close(fd); } /* * Read the process's memory map using procfs, and return a list of * VM map entries. Only the non-device read/writable segments are * returned. The map entries in the list aren't fully filled in; only * the items we need are present. */ static vm_map_entry_t readmap(pid_t pid) { char mapname[64]; int mapfd; ssize_t mapsize; size_t bufsize; char *mapbuf; int pos; vm_map_entry_t map; vm_map_entry_t *linkp; snprintf(mapname, sizeof mapname, "/proc/%d/map", pid); if ((mapfd = open(mapname, O_RDONLY)) == -1) err(1, "cannot open %s", mapname); /* * Procfs requires (for consistency) that the entire memory map * be read with a single read() call. Start with a reasonbly sized * buffer, and double it until it is big enough. */ bufsize = 8 * 1024; mapbuf = NULL; for ( ; ; ) { if ((mapbuf = realloc(mapbuf, bufsize)) == NULL) errx(1, "out of memory"); mapsize = read(mapfd, mapbuf, bufsize); if (mapsize != -1 || errno != EFBIG) break; bufsize *= 2; /* This lseek shouldn't be necessary, but it is. */ lseek(mapfd, (off_t)0, SEEK_SET); } if (mapsize == -1) err(1, "read error from %s", mapname); if (mapsize == 0) errx(1, "empty map file %s", mapname); close(mapfd); pos = 0; map = NULL; linkp = ↦ while (pos < mapsize) { vm_map_entry_t ent; vm_offset_t start; vm_offset_t end; char prot[4]; char type[16]; int n; int len; len = 0; n = sscanf(mapbuf + pos, "%x %x %*d %*d %*x %3[-rwx]" " %*d %*d %*x %*s %*s %16s%*[\n]%n", &start, &end, prot, type, &len); if (n != 4) errx(1, "ill-formed line in %s", mapname); pos += len; /* Ignore segments of the wrong kind, and unwritable ones */ if (strncmp(prot, "rw", 2) != 0 || (strcmp(type, "default") != 0 && strcmp(type, "vnode") != 0 && strcmp(type, "swap") != 0)) continue; if ((ent = (vm_map_entry_t)calloc(1, sizeof *ent)) == NULL) errx(1, "out of memory"); ent->start = start; ent->end = end; ent->protection = VM_PROT_READ | VM_PROT_WRITE; if (prot[2] == 'x') ent->protection |= VM_PROT_EXECUTE; *linkp = ent; linkp = &ent->next; } free(mapbuf); return map; }