1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 /*
6 * Copyright (C) 2012 The Android Open Source Project
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * * Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * * Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the
17 * distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
22 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
23 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
24 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
25 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
26 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
27 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
28 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
29 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33 #include "linker_phdr.h"
34
35 #include <errno.h>
36 #include <fcntl.h>
37 #include <sys/mman.h>
38 #include <unistd.h>
39
40 #define PAGE_START(x) ((x) & PAGE_MASK)
41 #define PAGE_OFFSET(x) ((x) & ~PAGE_MASK)
42 #define PAGE_END(x) PAGE_START((x) + (PAGE_SIZE - 1))
43
44 // Missing exec_elf.h definitions.
45 #ifndef PT_GNU_RELRO
46 #define PT_GNU_RELRO 0x6474e552
47 #endif
48
49 /**
50 TECHNICAL NOTE ON ELF LOADING.
51
52 An ELF file's program header table contains one or more PT_LOAD
53 segments, which corresponds to portions of the file that need to
54 be mapped into the process' address space.
55
56 Each loadable segment has the following important properties:
57
58 p_offset -> segment file offset
59 p_filesz -> segment file size
60 p_memsz -> segment memory size (always >= p_filesz)
61 p_vaddr -> segment's virtual address
62 p_flags -> segment flags (e.g. readable, writable, executable)
63
64 We will ignore the p_paddr and p_align fields of ELF::Phdr for now.
65
66 The loadable segments can be seen as a list of [p_vaddr ... p_vaddr+p_memsz)
67 ranges of virtual addresses. A few rules apply:
68
69 - the virtual address ranges should not overlap.
70
71 - if a segment's p_filesz is smaller than its p_memsz, the extra bytes
72 between them should always be initialized to 0.
73
74 - ranges do not necessarily start or end at page boundaries. Two distinct
75 segments can have their start and end on the same page. In this case, the
76 page inherits the mapping flags of the latter segment.
77
78 Finally, the real load addrs of each segment is not p_vaddr. Instead the
79 loader decides where to load the first segment, then will load all others
80 relative to the first one to respect the initial range layout.
81
82 For example, consider the following list:
83
84 [ offset:0, filesz:0x4000, memsz:0x4000, vaddr:0x30000 ],
85 [ offset:0x4000, filesz:0x2000, memsz:0x8000, vaddr:0x40000 ],
86
87 This corresponds to two segments that cover these virtual address ranges:
88
89 0x30000...0x34000
90 0x40000...0x48000
91
92 If the loader decides to load the first segment at address 0xa0000000
93 then the segments' load address ranges will be:
94
95 0xa0030000...0xa0034000
96 0xa0040000...0xa0048000
97
98 In other words, all segments must be loaded at an address that has the same
99 constant offset from their p_vaddr value. This offset is computed as the
100 difference between the first segment's load address, and its p_vaddr value.
101
102 However, in practice, segments do _not_ start at page boundaries. Since we
103 can only memory-map at page boundaries, this means that the bias is
104 computed as:
105
106 load_bias = phdr0_load_address - PAGE_START(phdr0->p_vaddr)
107
108 (NOTE: The value must be used as a 32-bit unsigned integer, to deal with
109 possible wrap around UINT32_MAX for possible large p_vaddr values).
110
111 And that the phdr0_load_address must start at a page boundary, with
112 the segment's real content starting at:
113
114 phdr0_load_address + PAGE_OFFSET(phdr0->p_vaddr)
115
116 Note that ELF requires the following condition to make the mmap()-ing work:
117
118 PAGE_OFFSET(phdr0->p_vaddr) == PAGE_OFFSET(phdr0->p_offset)
119
120 The load_bias must be added to any p_vaddr value read from the ELF file to
121 determine the corresponding memory address.
122
123 **/
124
125 #define MAYBE_MAP_FLAG(x, from, to) (((x) & (from)) ? (to) : 0)
126 #define PFLAGS_TO_PROT(x) \
127 (MAYBE_MAP_FLAG((x), PF_X, PROT_EXEC) | \
128 MAYBE_MAP_FLAG((x), PF_R, PROT_READ) | \
129 MAYBE_MAP_FLAG((x), PF_W, PROT_WRITE))
130
131 /* Returns the size of the extent of all the possibly non-contiguous
132 * loadable segments in an ELF program header table. This corresponds
133 * to the page-aligned size in bytes that needs to be reserved in the
134 * process' address space. If there are no loadable segments, 0 is
135 * returned.
136 *
137 * If out_min_vaddr or out_max_vaddr are non-NULL, they will be
138 * set to the minimum and maximum addresses of pages to be reserved,
139 * or 0 if there is nothing to load.
140 */
phdr_table_get_load_size(const ELF::Phdr * phdr_table,size_t phdr_count,ELF::Addr * out_min_vaddr,ELF::Addr * out_max_vaddr)141 size_t phdr_table_get_load_size(const ELF::Phdr* phdr_table,
142 size_t phdr_count,
143 ELF::Addr* out_min_vaddr,
144 ELF::Addr* out_max_vaddr) {
145 ELF::Addr min_vaddr = ~static_cast<ELF::Addr>(0);
146 ELF::Addr max_vaddr = 0x00000000U;
147
148 bool found_pt_load = false;
149 for (size_t i = 0; i < phdr_count; ++i) {
150 const ELF::Phdr* phdr = &phdr_table[i];
151
152 if (phdr->p_type != PT_LOAD) {
153 continue;
154 }
155 found_pt_load = true;
156
157 if (phdr->p_vaddr < min_vaddr) {
158 min_vaddr = phdr->p_vaddr;
159 }
160
161 if (phdr->p_vaddr + phdr->p_memsz > max_vaddr) {
162 max_vaddr = phdr->p_vaddr + phdr->p_memsz;
163 }
164 }
165 if (!found_pt_load) {
166 min_vaddr = 0x00000000U;
167 }
168
169 min_vaddr = PAGE_START(min_vaddr);
170 max_vaddr = PAGE_END(max_vaddr);
171
172 if (out_min_vaddr != NULL) {
173 *out_min_vaddr = min_vaddr;
174 }
175 if (out_max_vaddr != NULL) {
176 *out_max_vaddr = max_vaddr;
177 }
178 return max_vaddr - min_vaddr;
179 }
180
181 /* Used internally. Used to set the protection bits of all loaded segments
182 * with optional extra flags (i.e. really PROT_WRITE). Used by
183 * phdr_table_protect_segments and phdr_table_unprotect_segments.
184 */
_phdr_table_set_load_prot(const ELF::Phdr * phdr_table,int phdr_count,ELF::Addr load_bias,int extra_prot_flags)185 static int _phdr_table_set_load_prot(const ELF::Phdr* phdr_table,
186 int phdr_count,
187 ELF::Addr load_bias,
188 int extra_prot_flags) {
189 const ELF::Phdr* phdr = phdr_table;
190 const ELF::Phdr* phdr_limit = phdr + phdr_count;
191
192 for (; phdr < phdr_limit; phdr++) {
193 if (phdr->p_type != PT_LOAD || (phdr->p_flags & PF_W) != 0)
194 continue;
195
196 ELF::Addr seg_page_start = PAGE_START(phdr->p_vaddr) + load_bias;
197 ELF::Addr seg_page_end =
198 PAGE_END(phdr->p_vaddr + phdr->p_memsz) + load_bias;
199
200 int ret = mprotect((void*)seg_page_start,
201 seg_page_end - seg_page_start,
202 PFLAGS_TO_PROT(phdr->p_flags) | extra_prot_flags);
203 if (ret < 0) {
204 return -1;
205 }
206 }
207 return 0;
208 }
209
210 /* Restore the original protection modes for all loadable segments.
211 * You should only call this after phdr_table_unprotect_segments and
212 * applying all relocations.
213 *
214 * Input:
215 * phdr_table -> program header table
216 * phdr_count -> number of entries in tables
217 * load_bias -> load bias
218 * Return:
219 * 0 on error, -1 on failure (error code in errno).
220 */
phdr_table_protect_segments(const ELF::Phdr * phdr_table,int phdr_count,ELF::Addr load_bias)221 int phdr_table_protect_segments(const ELF::Phdr* phdr_table,
222 int phdr_count,
223 ELF::Addr load_bias) {
224 return _phdr_table_set_load_prot(phdr_table, phdr_count, load_bias, 0);
225 }
226
227 /* Change the protection of all loaded segments in memory to writable.
228 * This is useful before performing relocations. Once completed, you
229 * will have to call phdr_table_protect_segments to restore the original
230 * protection flags on all segments.
231 *
232 * Note that some writable segments can also have their content turned
233 * to read-only by calling phdr_table_protect_gnu_relro. This is no
234 * performed here.
235 *
236 * Input:
237 * phdr_table -> program header table
238 * phdr_count -> number of entries in tables
239 * load_bias -> load bias
240 * Return:
241 * 0 on error, -1 on failure (error code in errno).
242 */
phdr_table_unprotect_segments(const ELF::Phdr * phdr_table,int phdr_count,ELF::Addr load_bias)243 int phdr_table_unprotect_segments(const ELF::Phdr* phdr_table,
244 int phdr_count,
245 ELF::Addr load_bias) {
246 return _phdr_table_set_load_prot(
247 phdr_table, phdr_count, load_bias, PROT_WRITE);
248 }
249
250 /* Return the extend of the GNU RELRO segment in a program header.
251 * On success, return 0 and sets |*relro_start| and |*relro_end|
252 * to the page-aligned extents of the RELRO section.
253 * On failure, return -1.
254 *
255 * NOTE: This assumes there is a single PT_GNU_RELRO segment in the
256 * program header, i.e. it will return the extents of the first entry.
257 */
phdr_table_get_relro_info(const ELF::Phdr * phdr_table,int phdr_count,ELF::Addr load_bias,ELF::Addr * relro_start,ELF::Addr * relro_size)258 int phdr_table_get_relro_info(const ELF::Phdr* phdr_table,
259 int phdr_count,
260 ELF::Addr load_bias,
261 ELF::Addr* relro_start,
262 ELF::Addr* relro_size) {
263 const ELF::Phdr* phdr;
264 const ELF::Phdr* phdr_limit = phdr_table + phdr_count;
265
266 for (phdr = phdr_table; phdr < phdr_limit; ++phdr) {
267 if (phdr->p_type != PT_GNU_RELRO)
268 continue;
269
270 /* Tricky: what happens when the relro segment does not start
271 * or end at page boundaries?. We're going to be over-protective
272 * here and put every page touched by the segment as read-only.
273 *
274 * This seems to match Ian Lance Taylor's description of the
275 * feature at http://www.airs.com/blog/archives/189.
276 *
277 * Extract:
278 * Note that the current dynamic linker code will only work
279 * correctly if the PT_GNU_RELRO segment starts on a page
280 * boundary. This is because the dynamic linker rounds the
281 * p_vaddr field down to the previous page boundary. If
282 * there is anything on the page which should not be read-only,
283 * the program is likely to fail at runtime. So in effect the
284 * linker must only emit a PT_GNU_RELRO segment if it ensures
285 * that it starts on a page boundary.
286 */
287 *relro_start = PAGE_START(phdr->p_vaddr) + load_bias;
288 *relro_size =
289 PAGE_END(phdr->p_vaddr + phdr->p_memsz) + load_bias - *relro_start;
290 return 0;
291 }
292
293 return -1;
294 }
295
296 /* Apply GNU relro protection if specified by the program header. This will
297 * turn some of the pages of a writable PT_LOAD segment to read-only, as
298 * specified by one or more PT_GNU_RELRO segments. This must be always
299 * performed after relocations.
300 *
301 * The areas typically covered are .got and .data.rel.ro, these are
302 * read-only from the program's POV, but contain absolute addresses
303 * that need to be relocated before use.
304 *
305 * Input:
306 * phdr_table -> program header table
307 * phdr_count -> number of entries in tables
308 * load_bias -> load bias
309 * Return:
310 * 0 on error, -1 on failure (error code in errno).
311 */
phdr_table_protect_gnu_relro(const ELF::Phdr * phdr_table,int phdr_count,ELF::Addr load_bias)312 int phdr_table_protect_gnu_relro(const ELF::Phdr* phdr_table,
313 int phdr_count,
314 ELF::Addr load_bias) {
315 ELF::Addr relro_start, relro_size;
316
317 if (phdr_table_get_relro_info(
318 phdr_table, phdr_count, load_bias, &relro_start, &relro_size) < 0) {
319 return -1;
320 }
321
322 return mprotect((void*)relro_start, relro_size, PROT_READ);
323 }
324
325 #ifdef __arm__
326
327 #ifndef PT_ARM_EXIDX
328 #define PT_ARM_EXIDX 0x70000001 /* .ARM.exidx segment */
329 #endif
330
331 /* Return the address and size of the .ARM.exidx section in memory,
332 * if present.
333 *
334 * Input:
335 * phdr_table -> program header table
336 * phdr_count -> number of entries in tables
337 * load_bias -> load bias
338 * Output:
339 * arm_exidx -> address of table in memory (NULL on failure).
340 * arm_exidx_count -> number of items in table (0 on failure).
341 * Return:
342 * 0 on error, -1 on failure (_no_ error code in errno)
343 */
phdr_table_get_arm_exidx(const ELF::Phdr * phdr_table,int phdr_count,ELF::Addr load_bias,ELF::Addr ** arm_exidx,unsigned * arm_exidx_count)344 int phdr_table_get_arm_exidx(const ELF::Phdr* phdr_table,
345 int phdr_count,
346 ELF::Addr load_bias,
347 ELF::Addr** arm_exidx,
348 unsigned* arm_exidx_count) {
349 const ELF::Phdr* phdr = phdr_table;
350 const ELF::Phdr* phdr_limit = phdr + phdr_count;
351
352 for (phdr = phdr_table; phdr < phdr_limit; phdr++) {
353 if (phdr->p_type != PT_ARM_EXIDX)
354 continue;
355
356 *arm_exidx = (ELF::Addr*)(load_bias + phdr->p_vaddr);
357 *arm_exidx_count = (unsigned)(phdr->p_memsz / 8);
358 return 0;
359 }
360 *arm_exidx = NULL;
361 *arm_exidx_count = 0;
362 return -1;
363 }
364 #endif // __arm__
365
366 /* Return the address and size of the ELF file's .dynamic section in memory,
367 * or NULL if missing.
368 *
369 * Input:
370 * phdr_table -> program header table
371 * phdr_count -> number of entries in tables
372 * load_bias -> load bias
373 * Output:
374 * dynamic -> address of table in memory (NULL on failure).
375 * dynamic_count -> number of items in table (0 on failure).
376 * dynamic_flags -> protection flags for section (unset on failure)
377 * Return:
378 * void
379 */
phdr_table_get_dynamic_section(const ELF::Phdr * phdr_table,int phdr_count,ELF::Addr load_bias,const ELF::Dyn ** dynamic,size_t * dynamic_count,ELF::Word * dynamic_flags)380 void phdr_table_get_dynamic_section(const ELF::Phdr* phdr_table,
381 int phdr_count,
382 ELF::Addr load_bias,
383 const ELF::Dyn** dynamic,
384 size_t* dynamic_count,
385 ELF::Word* dynamic_flags) {
386 const ELF::Phdr* phdr = phdr_table;
387 const ELF::Phdr* phdr_limit = phdr + phdr_count;
388
389 for (phdr = phdr_table; phdr < phdr_limit; phdr++) {
390 if (phdr->p_type != PT_DYNAMIC) {
391 continue;
392 }
393
394 *dynamic = reinterpret_cast<const ELF::Dyn*>(load_bias + phdr->p_vaddr);
395 if (dynamic_count) {
396 *dynamic_count = (unsigned)(phdr->p_memsz / sizeof(ELF::Dyn));
397 }
398 if (dynamic_flags) {
399 *dynamic_flags = phdr->p_flags;
400 }
401 return;
402 }
403 *dynamic = NULL;
404 if (dynamic_count) {
405 *dynamic_count = 0;
406 }
407 }
408