xref: /linux/tools/lib/bpf/elf.c (revision 3a39d672e7f48b8d6b91a09afa4b55352773b4b5)
1 // SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
2 
3 #ifndef _GNU_SOURCE
4 #define _GNU_SOURCE
5 #endif
6 #include <libelf.h>
7 #include <gelf.h>
8 #include <fcntl.h>
9 #include <linux/kernel.h>
10 
11 #include "libbpf_internal.h"
12 #include "str_error.h"
13 
14 /* A SHT_GNU_versym section holds 16-bit words. This bit is set if
15  * the symbol is hidden and can only be seen when referenced using an
16  * explicit version number. This is a GNU extension.
17  */
18 #define VERSYM_HIDDEN	0x8000
19 
20 /* This is the mask for the rest of the data in a word read from a
21  * SHT_GNU_versym section.
22  */
23 #define VERSYM_VERSION	0x7fff
24 
elf_open(const char * binary_path,struct elf_fd * elf_fd)25 int elf_open(const char *binary_path, struct elf_fd *elf_fd)
26 {
27 	char errmsg[STRERR_BUFSIZE];
28 	int fd, ret;
29 	Elf *elf;
30 
31 	elf_fd->elf = NULL;
32 	elf_fd->fd = -1;
33 
34 	if (elf_version(EV_CURRENT) == EV_NONE) {
35 		pr_warn("elf: failed to init libelf for %s\n", binary_path);
36 		return -LIBBPF_ERRNO__LIBELF;
37 	}
38 	fd = open(binary_path, O_RDONLY | O_CLOEXEC);
39 	if (fd < 0) {
40 		ret = -errno;
41 		pr_warn("elf: failed to open %s: %s\n", binary_path,
42 			libbpf_strerror_r(ret, errmsg, sizeof(errmsg)));
43 		return ret;
44 	}
45 	elf = elf_begin(fd, ELF_C_READ_MMAP, NULL);
46 	if (!elf) {
47 		pr_warn("elf: could not read elf from %s: %s\n", binary_path, elf_errmsg(-1));
48 		close(fd);
49 		return -LIBBPF_ERRNO__FORMAT;
50 	}
51 	elf_fd->fd = fd;
52 	elf_fd->elf = elf;
53 	return 0;
54 }
55 
elf_close(struct elf_fd * elf_fd)56 void elf_close(struct elf_fd *elf_fd)
57 {
58 	if (!elf_fd)
59 		return;
60 	elf_end(elf_fd->elf);
61 	close(elf_fd->fd);
62 }
63 
64 /* Return next ELF section of sh_type after scn, or first of that type if scn is NULL. */
elf_find_next_scn_by_type(Elf * elf,int sh_type,Elf_Scn * scn)65 static Elf_Scn *elf_find_next_scn_by_type(Elf *elf, int sh_type, Elf_Scn *scn)
66 {
67 	while ((scn = elf_nextscn(elf, scn)) != NULL) {
68 		GElf_Shdr sh;
69 
70 		if (!gelf_getshdr(scn, &sh))
71 			continue;
72 		if (sh.sh_type == sh_type)
73 			return scn;
74 	}
75 	return NULL;
76 }
77 
78 struct elf_sym {
79 	const char *name;
80 	GElf_Sym sym;
81 	GElf_Shdr sh;
82 	int ver;
83 	bool hidden;
84 };
85 
86 struct elf_sym_iter {
87 	Elf *elf;
88 	Elf_Data *syms;
89 	Elf_Data *versyms;
90 	Elf_Data *verdefs;
91 	size_t nr_syms;
92 	size_t strtabidx;
93 	size_t verdef_strtabidx;
94 	size_t next_sym_idx;
95 	struct elf_sym sym;
96 	int st_type;
97 };
98 
elf_sym_iter_new(struct elf_sym_iter * iter,Elf * elf,const char * binary_path,int sh_type,int st_type)99 static int elf_sym_iter_new(struct elf_sym_iter *iter,
100 			    Elf *elf, const char *binary_path,
101 			    int sh_type, int st_type)
102 {
103 	Elf_Scn *scn = NULL;
104 	GElf_Ehdr ehdr;
105 	GElf_Shdr sh;
106 
107 	memset(iter, 0, sizeof(*iter));
108 
109 	if (!gelf_getehdr(elf, &ehdr)) {
110 		pr_warn("elf: failed to get ehdr from %s: %s\n", binary_path, elf_errmsg(-1));
111 		return -EINVAL;
112 	}
113 
114 	scn = elf_find_next_scn_by_type(elf, sh_type, NULL);
115 	if (!scn) {
116 		pr_debug("elf: failed to find symbol table ELF sections in '%s'\n",
117 			 binary_path);
118 		return -ENOENT;
119 	}
120 
121 	if (!gelf_getshdr(scn, &sh))
122 		return -EINVAL;
123 
124 	iter->strtabidx = sh.sh_link;
125 	iter->syms = elf_getdata(scn, 0);
126 	if (!iter->syms) {
127 		pr_warn("elf: failed to get symbols for symtab section in '%s': %s\n",
128 			binary_path, elf_errmsg(-1));
129 		return -EINVAL;
130 	}
131 	iter->nr_syms = iter->syms->d_size / sh.sh_entsize;
132 	iter->elf = elf;
133 	iter->st_type = st_type;
134 
135 	/* Version symbol table is meaningful to dynsym only */
136 	if (sh_type != SHT_DYNSYM)
137 		return 0;
138 
139 	scn = elf_find_next_scn_by_type(elf, SHT_GNU_versym, NULL);
140 	if (!scn)
141 		return 0;
142 	iter->versyms = elf_getdata(scn, 0);
143 
144 	scn = elf_find_next_scn_by_type(elf, SHT_GNU_verdef, NULL);
145 	if (!scn)
146 		return 0;
147 
148 	iter->verdefs = elf_getdata(scn, 0);
149 	if (!iter->verdefs || !gelf_getshdr(scn, &sh)) {
150 		pr_warn("elf: failed to get verdef ELF section in '%s'\n", binary_path);
151 		return -EINVAL;
152 	}
153 	iter->verdef_strtabidx = sh.sh_link;
154 
155 	return 0;
156 }
157 
elf_sym_iter_next(struct elf_sym_iter * iter)158 static struct elf_sym *elf_sym_iter_next(struct elf_sym_iter *iter)
159 {
160 	struct elf_sym *ret = &iter->sym;
161 	GElf_Sym *sym = &ret->sym;
162 	const char *name = NULL;
163 	GElf_Versym versym;
164 	Elf_Scn *sym_scn;
165 	size_t idx;
166 
167 	for (idx = iter->next_sym_idx; idx < iter->nr_syms; idx++) {
168 		if (!gelf_getsym(iter->syms, idx, sym))
169 			continue;
170 		if (GELF_ST_TYPE(sym->st_info) != iter->st_type)
171 			continue;
172 		name = elf_strptr(iter->elf, iter->strtabidx, sym->st_name);
173 		if (!name)
174 			continue;
175 		sym_scn = elf_getscn(iter->elf, sym->st_shndx);
176 		if (!sym_scn)
177 			continue;
178 		if (!gelf_getshdr(sym_scn, &ret->sh))
179 			continue;
180 
181 		iter->next_sym_idx = idx + 1;
182 		ret->name = name;
183 		ret->ver = 0;
184 		ret->hidden = false;
185 
186 		if (iter->versyms) {
187 			if (!gelf_getversym(iter->versyms, idx, &versym))
188 				continue;
189 			ret->ver = versym & VERSYM_VERSION;
190 			ret->hidden = versym & VERSYM_HIDDEN;
191 		}
192 		return ret;
193 	}
194 
195 	return NULL;
196 }
197 
elf_get_vername(struct elf_sym_iter * iter,int ver)198 static const char *elf_get_vername(struct elf_sym_iter *iter, int ver)
199 {
200 	GElf_Verdaux verdaux;
201 	GElf_Verdef verdef;
202 	int offset;
203 
204 	if (!iter->verdefs)
205 		return NULL;
206 
207 	offset = 0;
208 	while (gelf_getverdef(iter->verdefs, offset, &verdef)) {
209 		if (verdef.vd_ndx != ver) {
210 			if (!verdef.vd_next)
211 				break;
212 
213 			offset += verdef.vd_next;
214 			continue;
215 		}
216 
217 		if (!gelf_getverdaux(iter->verdefs, offset + verdef.vd_aux, &verdaux))
218 			break;
219 
220 		return elf_strptr(iter->elf, iter->verdef_strtabidx, verdaux.vda_name);
221 
222 	}
223 	return NULL;
224 }
225 
symbol_match(struct elf_sym_iter * iter,int sh_type,struct elf_sym * sym,const char * name,size_t name_len,const char * lib_ver)226 static bool symbol_match(struct elf_sym_iter *iter, int sh_type, struct elf_sym *sym,
227 			 const char *name, size_t name_len, const char *lib_ver)
228 {
229 	const char *ver_name;
230 
231 	/* Symbols are in forms of func, func@LIB_VER or func@@LIB_VER
232 	 * make sure the func part matches the user specified name
233 	 */
234 	if (strncmp(sym->name, name, name_len) != 0)
235 		return false;
236 
237 	/* ...but we don't want a search for "foo" to match 'foo2" also, so any
238 	 * additional characters in sname should be of the form "@@LIB".
239 	 */
240 	if (sym->name[name_len] != '\0' && sym->name[name_len] != '@')
241 		return false;
242 
243 	/* If user does not specify symbol version, then we got a match */
244 	if (!lib_ver)
245 		return true;
246 
247 	/* If user specifies symbol version, for dynamic symbols,
248 	 * get version name from ELF verdef section for comparison.
249 	 */
250 	if (sh_type == SHT_DYNSYM) {
251 		ver_name = elf_get_vername(iter, sym->ver);
252 		if (!ver_name)
253 			return false;
254 		return strcmp(ver_name, lib_ver) == 0;
255 	}
256 
257 	/* For normal symbols, it is already in form of func@LIB_VER */
258 	return strcmp(sym->name, name) == 0;
259 }
260 
261 /* Transform symbol's virtual address (absolute for binaries and relative
262  * for shared libs) into file offset, which is what kernel is expecting
263  * for uprobe/uretprobe attachment.
264  * See Documentation/trace/uprobetracer.rst for more details. This is done
265  * by looking up symbol's containing section's header and using iter's virtual
266  * address (sh_addr) and corresponding file offset (sh_offset) to transform
267  * sym.st_value (virtual address) into desired final file offset.
268  */
elf_sym_offset(struct elf_sym * sym)269 static unsigned long elf_sym_offset(struct elf_sym *sym)
270 {
271 	return sym->sym.st_value - sym->sh.sh_addr + sym->sh.sh_offset;
272 }
273 
274 /* Find offset of function name in the provided ELF object. "binary_path" is
275  * the path to the ELF binary represented by "elf", and only used for error
276  * reporting matters. "name" matches symbol name or name@@LIB for library
277  * functions.
278  */
elf_find_func_offset(Elf * elf,const char * binary_path,const char * name)279 long elf_find_func_offset(Elf *elf, const char *binary_path, const char *name)
280 {
281 	int i, sh_types[2] = { SHT_DYNSYM, SHT_SYMTAB };
282 	const char *at_symbol, *lib_ver;
283 	bool is_shared_lib;
284 	long ret = -ENOENT;
285 	size_t name_len;
286 	GElf_Ehdr ehdr;
287 
288 	if (!gelf_getehdr(elf, &ehdr)) {
289 		pr_warn("elf: failed to get ehdr from %s: %s\n", binary_path, elf_errmsg(-1));
290 		ret = -LIBBPF_ERRNO__FORMAT;
291 		goto out;
292 	}
293 	/* for shared lib case, we do not need to calculate relative offset */
294 	is_shared_lib = ehdr.e_type == ET_DYN;
295 
296 	/* Does name specify "@@LIB_VER" or "@LIB_VER" ? */
297 	at_symbol = strchr(name, '@');
298 	if (at_symbol) {
299 		name_len = at_symbol - name;
300 		/* skip second @ if it's @@LIB_VER case */
301 		if (at_symbol[1] == '@')
302 			at_symbol++;
303 		lib_ver = at_symbol + 1;
304 	} else {
305 		name_len = strlen(name);
306 		lib_ver = NULL;
307 	}
308 
309 	/* Search SHT_DYNSYM, SHT_SYMTAB for symbol. This search order is used because if
310 	 * a binary is stripped, it may only have SHT_DYNSYM, and a fully-statically
311 	 * linked binary may not have SHT_DYMSYM, so absence of a section should not be
312 	 * reported as a warning/error.
313 	 */
314 	for (i = 0; i < ARRAY_SIZE(sh_types); i++) {
315 		struct elf_sym_iter iter;
316 		struct elf_sym *sym;
317 		int last_bind = -1;
318 		int cur_bind;
319 
320 		ret = elf_sym_iter_new(&iter, elf, binary_path, sh_types[i], STT_FUNC);
321 		if (ret == -ENOENT)
322 			continue;
323 		if (ret)
324 			goto out;
325 
326 		while ((sym = elf_sym_iter_next(&iter))) {
327 			if (!symbol_match(&iter, sh_types[i], sym, name, name_len, lib_ver))
328 				continue;
329 
330 			cur_bind = GELF_ST_BIND(sym->sym.st_info);
331 
332 			if (ret > 0) {
333 				/* handle multiple matches */
334 				if (elf_sym_offset(sym) == ret) {
335 					/* same offset, no problem */
336 					continue;
337 				} else if (last_bind != STB_WEAK && cur_bind != STB_WEAK) {
338 					/* Only accept one non-weak bind. */
339 					pr_warn("elf: ambiguous match for '%s', '%s' in '%s'\n",
340 						sym->name, name, binary_path);
341 					ret = -LIBBPF_ERRNO__FORMAT;
342 					goto out;
343 				} else if (cur_bind == STB_WEAK) {
344 					/* already have a non-weak bind, and
345 					 * this is a weak bind, so ignore.
346 					 */
347 					continue;
348 				}
349 			}
350 
351 			ret = elf_sym_offset(sym);
352 			last_bind = cur_bind;
353 		}
354 		if (ret > 0)
355 			break;
356 	}
357 
358 	if (ret > 0) {
359 		pr_debug("elf: symbol address match for '%s' in '%s': 0x%lx\n", name, binary_path,
360 			 ret);
361 	} else {
362 		if (ret == 0) {
363 			pr_warn("elf: '%s' is 0 in symtab for '%s': %s\n", name, binary_path,
364 				is_shared_lib ? "should not be 0 in a shared library" :
365 						"try using shared library path instead");
366 			ret = -ENOENT;
367 		} else {
368 			pr_warn("elf: failed to find symbol '%s' in '%s'\n", name, binary_path);
369 		}
370 	}
371 out:
372 	return ret;
373 }
374 
375 /* Find offset of function name in ELF object specified by path. "name" matches
376  * symbol name or name@@LIB for library functions.
377  */
elf_find_func_offset_from_file(const char * binary_path,const char * name)378 long elf_find_func_offset_from_file(const char *binary_path, const char *name)
379 {
380 	struct elf_fd elf_fd;
381 	long ret = -ENOENT;
382 
383 	ret = elf_open(binary_path, &elf_fd);
384 	if (ret)
385 		return ret;
386 	ret = elf_find_func_offset(elf_fd.elf, binary_path, name);
387 	elf_close(&elf_fd);
388 	return ret;
389 }
390 
391 struct symbol {
392 	const char *name;
393 	int bind;
394 	int idx;
395 };
396 
symbol_cmp(const void * a,const void * b)397 static int symbol_cmp(const void *a, const void *b)
398 {
399 	const struct symbol *sym_a = a;
400 	const struct symbol *sym_b = b;
401 
402 	return strcmp(sym_a->name, sym_b->name);
403 }
404 
405 /*
406  * Return offsets in @poffsets for symbols specified in @syms array argument.
407  * On success returns 0 and offsets are returned in allocated array with @cnt
408  * size, that needs to be released by the caller.
409  */
elf_resolve_syms_offsets(const char * binary_path,int cnt,const char ** syms,unsigned long ** poffsets,int st_type)410 int elf_resolve_syms_offsets(const char *binary_path, int cnt,
411 			     const char **syms, unsigned long **poffsets,
412 			     int st_type)
413 {
414 	int sh_types[2] = { SHT_DYNSYM, SHT_SYMTAB };
415 	int err = 0, i, cnt_done = 0;
416 	unsigned long *offsets;
417 	struct symbol *symbols;
418 	struct elf_fd elf_fd;
419 
420 	err = elf_open(binary_path, &elf_fd);
421 	if (err)
422 		return err;
423 
424 	offsets = calloc(cnt, sizeof(*offsets));
425 	symbols = calloc(cnt, sizeof(*symbols));
426 
427 	if (!offsets || !symbols) {
428 		err = -ENOMEM;
429 		goto out;
430 	}
431 
432 	for (i = 0; i < cnt; i++) {
433 		symbols[i].name = syms[i];
434 		symbols[i].idx = i;
435 	}
436 
437 	qsort(symbols, cnt, sizeof(*symbols), symbol_cmp);
438 
439 	for (i = 0; i < ARRAY_SIZE(sh_types); i++) {
440 		struct elf_sym_iter iter;
441 		struct elf_sym *sym;
442 
443 		err = elf_sym_iter_new(&iter, elf_fd.elf, binary_path, sh_types[i], st_type);
444 		if (err == -ENOENT)
445 			continue;
446 		if (err)
447 			goto out;
448 
449 		while ((sym = elf_sym_iter_next(&iter))) {
450 			unsigned long sym_offset = elf_sym_offset(sym);
451 			int bind = GELF_ST_BIND(sym->sym.st_info);
452 			struct symbol *found, tmp = {
453 				.name = sym->name,
454 			};
455 			unsigned long *offset;
456 
457 			found = bsearch(&tmp, symbols, cnt, sizeof(*symbols), symbol_cmp);
458 			if (!found)
459 				continue;
460 
461 			offset = &offsets[found->idx];
462 			if (*offset > 0) {
463 				/* same offset, no problem */
464 				if (*offset == sym_offset)
465 					continue;
466 				/* handle multiple matches */
467 				if (found->bind != STB_WEAK && bind != STB_WEAK) {
468 					/* Only accept one non-weak bind. */
469 					pr_warn("elf: ambiguous match found '%s@%lu' in '%s' previous offset %lu\n",
470 						sym->name, sym_offset, binary_path, *offset);
471 					err = -ESRCH;
472 					goto out;
473 				} else if (bind == STB_WEAK) {
474 					/* already have a non-weak bind, and
475 					 * this is a weak bind, so ignore.
476 					 */
477 					continue;
478 				}
479 			} else {
480 				cnt_done++;
481 			}
482 			*offset = sym_offset;
483 			found->bind = bind;
484 		}
485 	}
486 
487 	if (cnt != cnt_done) {
488 		err = -ENOENT;
489 		goto out;
490 	}
491 
492 	*poffsets = offsets;
493 
494 out:
495 	free(symbols);
496 	if (err)
497 		free(offsets);
498 	elf_close(&elf_fd);
499 	return err;
500 }
501 
502 /*
503  * Return offsets in @poffsets for symbols specified by @pattern argument.
504  * On success returns 0 and offsets are returned in allocated @poffsets
505  * array with the @pctn size, that needs to be released by the caller.
506  */
elf_resolve_pattern_offsets(const char * binary_path,const char * pattern,unsigned long ** poffsets,size_t * pcnt)507 int elf_resolve_pattern_offsets(const char *binary_path, const char *pattern,
508 				unsigned long **poffsets, size_t *pcnt)
509 {
510 	int sh_types[2] = { SHT_SYMTAB, SHT_DYNSYM };
511 	unsigned long *offsets = NULL;
512 	size_t cap = 0, cnt = 0;
513 	struct elf_fd elf_fd;
514 	int err = 0, i;
515 
516 	err = elf_open(binary_path, &elf_fd);
517 	if (err)
518 		return err;
519 
520 	for (i = 0; i < ARRAY_SIZE(sh_types); i++) {
521 		struct elf_sym_iter iter;
522 		struct elf_sym *sym;
523 
524 		err = elf_sym_iter_new(&iter, elf_fd.elf, binary_path, sh_types[i], STT_FUNC);
525 		if (err == -ENOENT)
526 			continue;
527 		if (err)
528 			goto out;
529 
530 		while ((sym = elf_sym_iter_next(&iter))) {
531 			if (!glob_match(sym->name, pattern))
532 				continue;
533 
534 			err = libbpf_ensure_mem((void **) &offsets, &cap, sizeof(*offsets),
535 						cnt + 1);
536 			if (err)
537 				goto out;
538 
539 			offsets[cnt++] = elf_sym_offset(sym);
540 		}
541 
542 		/* If we found anything in the first symbol section,
543 		 * do not search others to avoid duplicates.
544 		 */
545 		if (cnt)
546 			break;
547 	}
548 
549 	if (cnt) {
550 		*poffsets = offsets;
551 		*pcnt = cnt;
552 	} else {
553 		err = -ENOENT;
554 	}
555 
556 out:
557 	if (err)
558 		free(offsets);
559 	elf_close(&elf_fd);
560 	return err;
561 }
562