13124c3e0SJohn Polstra /*- 23124c3e0SJohn Polstra * Copyright 1996-1998 John D. Polstra. 33124c3e0SJohn Polstra * All rights reserved. 43124c3e0SJohn Polstra * 53124c3e0SJohn Polstra * Redistribution and use in source and binary forms, with or without 63124c3e0SJohn Polstra * modification, are permitted provided that the following conditions 73124c3e0SJohn Polstra * are met: 83124c3e0SJohn Polstra * 1. Redistributions of source code must retain the above copyright 93124c3e0SJohn Polstra * notice, this list of conditions and the following disclaimer. 103124c3e0SJohn Polstra * 2. Redistributions in binary form must reproduce the above copyright 113124c3e0SJohn Polstra * notice, this list of conditions and the following disclaimer in the 123124c3e0SJohn Polstra * documentation and/or other materials provided with the distribution. 133124c3e0SJohn Polstra * 143124c3e0SJohn Polstra * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 153124c3e0SJohn Polstra * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 163124c3e0SJohn Polstra * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 173124c3e0SJohn Polstra * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 183124c3e0SJohn Polstra * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 193124c3e0SJohn Polstra * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 203124c3e0SJohn Polstra * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 213124c3e0SJohn Polstra * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 223124c3e0SJohn Polstra * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 233124c3e0SJohn Polstra * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 243124c3e0SJohn Polstra * 257f3dea24SPeter Wemm * $FreeBSD$ 263124c3e0SJohn Polstra */ 273124c3e0SJohn Polstra 283124c3e0SJohn Polstra #include <sys/param.h> 293124c3e0SJohn Polstra #include <sys/mman.h> 307360ae0fSJohn Polstra #include <sys/stat.h> 313124c3e0SJohn Polstra 323124c3e0SJohn Polstra #include <errno.h> 333124c3e0SJohn Polstra #include <stddef.h> 34926ea445SJohn Polstra #include <stdlib.h> 353124c3e0SJohn Polstra #include <string.h> 363124c3e0SJohn Polstra #include <unistd.h> 373124c3e0SJohn Polstra 38b5393d9fSDoug Rabson #include "debug.h" 393124c3e0SJohn Polstra #include "rtld.h" 403124c3e0SJohn Polstra 41341b3de6SMatthew N. Dodd static Elf_Ehdr *get_elf_header(int, const char *); 42fa7dd9c5SMatthew Dillon static int convert_prot(int); /* Elf flags -> mmap protection */ 43fa7dd9c5SMatthew Dillon static int convert_flags(int); /* Elf flags -> mmap flags */ 443124c3e0SJohn Polstra 453124c3e0SJohn Polstra /* 46bfb1ef60SJohn Polstra * Map a shared object into memory. The "fd" argument is a file descriptor, 473124c3e0SJohn Polstra * which must be open on the object and positioned at its beginning. 48bfb1ef60SJohn Polstra * The "path" argument is a pathname that is used only for error messages. 493124c3e0SJohn Polstra * 503124c3e0SJohn Polstra * The return value is a pointer to a newly-allocated Obj_Entry structure 513124c3e0SJohn Polstra * for the shared object. Returns NULL on failure. 523124c3e0SJohn Polstra */ 533124c3e0SJohn Polstra Obj_Entry * 547360ae0fSJohn Polstra map_object(int fd, const char *path, const struct stat *sb) 553124c3e0SJohn Polstra { 563124c3e0SJohn Polstra Obj_Entry *obj; 57341b3de6SMatthew N. Dodd Elf_Ehdr *hdr; 5878af18bdSDavid E. O'Brien int i; 5913575fc4SDoug Rabson Elf_Phdr *phdr; 6013575fc4SDoug Rabson Elf_Phdr *phlimit; 618b7f25d4SAlexander Kabaev Elf_Phdr **segs; 623124c3e0SJohn Polstra int nsegs; 6313575fc4SDoug Rabson Elf_Phdr *phdyn; 64a607e5d7SJohn Polstra Elf_Phdr *phinterp; 65017246d0SDoug Rabson Elf_Phdr *phtls; 663124c3e0SJohn Polstra caddr_t mapbase; 673124c3e0SJohn Polstra size_t mapsize; 6813575fc4SDoug Rabson Elf_Addr base_vaddr; 6913575fc4SDoug Rabson Elf_Addr base_vlimit; 703124c3e0SJohn Polstra caddr_t base_addr; 7113575fc4SDoug Rabson Elf_Off data_offset; 7213575fc4SDoug Rabson Elf_Addr data_vaddr; 7313575fc4SDoug Rabson Elf_Addr data_vlimit; 743124c3e0SJohn Polstra caddr_t data_addr; 758b7f25d4SAlexander Kabaev int data_prot; 76fa7dd9c5SMatthew Dillon int data_flags; 7713575fc4SDoug Rabson Elf_Addr clear_vaddr; 783124c3e0SJohn Polstra caddr_t clear_addr; 798b7f25d4SAlexander Kabaev caddr_t clear_page; 8049f90ad2SAlexander Kabaev Elf_Addr phdr_vaddr; 8149f90ad2SAlexander Kabaev size_t nclear, phsize; 8213575fc4SDoug Rabson Elf_Addr bss_vaddr; 8313575fc4SDoug Rabson Elf_Addr bss_vlimit; 843124c3e0SJohn Polstra caddr_t bss_addr; 85212f264cSKonstantin Belousov Elf_Word stack_flags; 866d7610d7SKonstantin Belousov Elf_Addr relro_page; 876d7610d7SKonstantin Belousov size_t relro_size; 8883aa9cc0SKonstantin Belousov Elf_Addr note_start; 8983aa9cc0SKonstantin Belousov Elf_Addr note_end; 903124c3e0SJohn Polstra 91341b3de6SMatthew N. Dodd hdr = get_elf_header(fd, path); 92341b3de6SMatthew N. Dodd if (hdr == NULL) 93341b3de6SMatthew N. Dodd return (NULL); 943124c3e0SJohn Polstra 953124c3e0SJohn Polstra /* 963124c3e0SJohn Polstra * Scan the program header entries, and save key information. 973124c3e0SJohn Polstra * 9811e0093fSKonstantin Belousov * We expect that the loadable segments are ordered by load address. 993124c3e0SJohn Polstra */ 100341b3de6SMatthew N. Dodd phdr = (Elf_Phdr *) ((char *)hdr + hdr->e_phoff); 10149f90ad2SAlexander Kabaev phsize = hdr->e_phnum * sizeof (phdr[0]); 102341b3de6SMatthew N. Dodd phlimit = phdr + hdr->e_phnum; 1038b7f25d4SAlexander Kabaev nsegs = -1; 10449f90ad2SAlexander Kabaev phdyn = phinterp = phtls = NULL; 10549f90ad2SAlexander Kabaev phdr_vaddr = 0; 1066d7610d7SKonstantin Belousov relro_page = 0; 1076d7610d7SKonstantin Belousov relro_size = 0; 10883aa9cc0SKonstantin Belousov note_start = 0; 10983aa9cc0SKonstantin Belousov note_end = 0; 110341b3de6SMatthew N. Dodd segs = alloca(sizeof(segs[0]) * hdr->e_phnum); 111cb38d494SKonstantin Belousov stack_flags = RTLD_DEFAULT_STACK_PF_EXEC | PF_R | PF_W; 1123124c3e0SJohn Polstra while (phdr < phlimit) { 1133124c3e0SJohn Polstra switch (phdr->p_type) { 1143124c3e0SJohn Polstra 115a607e5d7SJohn Polstra case PT_INTERP: 116a607e5d7SJohn Polstra phinterp = phdr; 117a607e5d7SJohn Polstra break; 118a607e5d7SJohn Polstra 1193124c3e0SJohn Polstra case PT_LOAD: 1208b7f25d4SAlexander Kabaev segs[++nsegs] = phdr; 12149f90ad2SAlexander Kabaev if ((segs[nsegs]->p_align & (PAGE_SIZE - 1)) != 0) { 1228b7f25d4SAlexander Kabaev _rtld_error("%s: PT_LOAD segment %d not page-aligned", 1238b7f25d4SAlexander Kabaev path, nsegs); 124e474e51eSKonstantin Belousov goto error; 125bfb1ef60SJohn Polstra } 1263124c3e0SJohn Polstra break; 1273124c3e0SJohn Polstra 1283124c3e0SJohn Polstra case PT_PHDR: 12949f90ad2SAlexander Kabaev phdr_vaddr = phdr->p_vaddr; 13049f90ad2SAlexander Kabaev phsize = phdr->p_memsz; 1313124c3e0SJohn Polstra break; 1323124c3e0SJohn Polstra 1333124c3e0SJohn Polstra case PT_DYNAMIC: 1343124c3e0SJohn Polstra phdyn = phdr; 1353124c3e0SJohn Polstra break; 136017246d0SDoug Rabson 137017246d0SDoug Rabson case PT_TLS: 138017246d0SDoug Rabson phtls = phdr; 139017246d0SDoug Rabson break; 140212f264cSKonstantin Belousov 141212f264cSKonstantin Belousov case PT_GNU_STACK: 142212f264cSKonstantin Belousov stack_flags = phdr->p_flags; 143212f264cSKonstantin Belousov break; 1446d7610d7SKonstantin Belousov 1456d7610d7SKonstantin Belousov case PT_GNU_RELRO: 1466d7610d7SKonstantin Belousov relro_page = phdr->p_vaddr; 1476d7610d7SKonstantin Belousov relro_size = phdr->p_memsz; 1486d7610d7SKonstantin Belousov break; 14983aa9cc0SKonstantin Belousov 15083aa9cc0SKonstantin Belousov case PT_NOTE: 1515eab36f2SKonstantin Belousov if (phdr->p_offset > PAGE_SIZE || 1525eab36f2SKonstantin Belousov phdr->p_offset + phdr->p_filesz > PAGE_SIZE) 1535eab36f2SKonstantin Belousov break; 1545eab36f2SKonstantin Belousov note_start = (Elf_Addr)(char *)hdr + phdr->p_offset; 15583aa9cc0SKonstantin Belousov note_end = note_start + phdr->p_filesz; 15683aa9cc0SKonstantin Belousov break; 1573124c3e0SJohn Polstra } 1583124c3e0SJohn Polstra 1593124c3e0SJohn Polstra ++phdr; 1603124c3e0SJohn Polstra } 1613124c3e0SJohn Polstra if (phdyn == NULL) { 162bfb1ef60SJohn Polstra _rtld_error("%s: object is not dynamically-linked", path); 163e474e51eSKonstantin Belousov goto error; 1643124c3e0SJohn Polstra } 1653124c3e0SJohn Polstra 1668b7f25d4SAlexander Kabaev if (nsegs < 0) { 167bfb1ef60SJohn Polstra _rtld_error("%s: too few PT_LOAD segments", path); 168e474e51eSKonstantin Belousov goto error; 169bfb1ef60SJohn Polstra } 1703124c3e0SJohn Polstra 1713124c3e0SJohn Polstra /* 1723124c3e0SJohn Polstra * Map the entire address space of the object, to stake out our 1733124c3e0SJohn Polstra * contiguous region, and to establish the base address for relocation. 1743124c3e0SJohn Polstra */ 1753124c3e0SJohn Polstra base_vaddr = trunc_page(segs[0]->p_vaddr); 1768b7f25d4SAlexander Kabaev base_vlimit = round_page(segs[nsegs]->p_vaddr + segs[nsegs]->p_memsz); 1773124c3e0SJohn Polstra mapsize = base_vlimit - base_vaddr; 178*15789513STijl Coosemans base_addr = (caddr_t) base_vaddr; 1793124c3e0SJohn Polstra 180a3c8e04eSKonstantin Belousov mapbase = mmap(base_addr, mapsize, PROT_NONE, MAP_ANON | MAP_PRIVATE | 181a3c8e04eSKonstantin Belousov MAP_NOCORE, -1, 0); 1823124c3e0SJohn Polstra if (mapbase == (caddr_t) -1) { 183bfb1ef60SJohn Polstra _rtld_error("%s: mmap of entire address space failed: %s", 1846fea10fbSKonstantin Belousov path, rtld_strerror(errno)); 185e474e51eSKonstantin Belousov goto error; 1863124c3e0SJohn Polstra } 1873124c3e0SJohn Polstra if (base_addr != NULL && mapbase != base_addr) { 188bfb1ef60SJohn Polstra _rtld_error("%s: mmap returned wrong address: wanted %p, got %p", 189bfb1ef60SJohn Polstra path, base_addr, mapbase); 190e474e51eSKonstantin Belousov goto error1; 1913124c3e0SJohn Polstra } 1923124c3e0SJohn Polstra 1938b7f25d4SAlexander Kabaev for (i = 0; i <= nsegs; i++) { 1948b7f25d4SAlexander Kabaev /* Overlay the segment onto the proper region. */ 1958b7f25d4SAlexander Kabaev data_offset = trunc_page(segs[i]->p_offset); 1968b7f25d4SAlexander Kabaev data_vaddr = trunc_page(segs[i]->p_vaddr); 1978b7f25d4SAlexander Kabaev data_vlimit = round_page(segs[i]->p_vaddr + segs[i]->p_filesz); 1983124c3e0SJohn Polstra data_addr = mapbase + (data_vaddr - base_vaddr); 199fa7dd9c5SMatthew Dillon data_prot = convert_prot(segs[i]->p_flags); 200fa7dd9c5SMatthew Dillon data_flags = convert_flags(segs[i]->p_flags) | MAP_FIXED; 201a3c8e04eSKonstantin Belousov if (mmap(data_addr, data_vlimit - data_vaddr, data_prot, 202e474e51eSKonstantin Belousov data_flags | MAP_PREFAULT_READ, fd, data_offset) == (caddr_t) -1) { 2036fea10fbSKonstantin Belousov _rtld_error("%s: mmap of data failed: %s", path, 2046fea10fbSKonstantin Belousov rtld_strerror(errno)); 205e474e51eSKonstantin Belousov goto error1; 2063124c3e0SJohn Polstra } 2073124c3e0SJohn Polstra 20869ca61baSKonstantin Belousov /* Do BSS setup */ 20969ca61baSKonstantin Belousov if (segs[i]->p_filesz != segs[i]->p_memsz) { 21069ca61baSKonstantin Belousov 2118b7f25d4SAlexander Kabaev /* Clear any BSS in the last page of the segment. */ 2128b7f25d4SAlexander Kabaev clear_vaddr = segs[i]->p_vaddr + segs[i]->p_filesz; 2133124c3e0SJohn Polstra clear_addr = mapbase + (clear_vaddr - base_vaddr); 2148b7f25d4SAlexander Kabaev clear_page = mapbase + (trunc_page(clear_vaddr) - base_vaddr); 21569ca61baSKonstantin Belousov 2168b7f25d4SAlexander Kabaev if ((nclear = data_vlimit - clear_vaddr) > 0) { 2178b7f25d4SAlexander Kabaev /* Make sure the end of the segment is writable */ 21869ca61baSKonstantin Belousov if ((data_prot & PROT_WRITE) == 0 && -1 == 21969ca61baSKonstantin Belousov mprotect(clear_page, PAGE_SIZE, data_prot|PROT_WRITE)) { 2208b7f25d4SAlexander Kabaev _rtld_error("%s: mprotect failed: %s", path, 2216fea10fbSKonstantin Belousov rtld_strerror(errno)); 222e474e51eSKonstantin Belousov goto error1; 2238b7f25d4SAlexander Kabaev } 2248b7f25d4SAlexander Kabaev 2253124c3e0SJohn Polstra memset(clear_addr, 0, nclear); 2263124c3e0SJohn Polstra 2278b7f25d4SAlexander Kabaev /* Reset the data protection back */ 2288b7f25d4SAlexander Kabaev if ((data_prot & PROT_WRITE) == 0) 2298b7f25d4SAlexander Kabaev mprotect(clear_page, PAGE_SIZE, data_prot); 2308b7f25d4SAlexander Kabaev } 2318b7f25d4SAlexander Kabaev 2323124c3e0SJohn Polstra /* Overlay the BSS segment onto the proper region. */ 2333124c3e0SJohn Polstra bss_vaddr = data_vlimit; 2348b7f25d4SAlexander Kabaev bss_vlimit = round_page(segs[i]->p_vaddr + segs[i]->p_memsz); 2353124c3e0SJohn Polstra bss_addr = mapbase + (bss_vaddr - base_vaddr); 2363124c3e0SJohn Polstra if (bss_vlimit > bss_vaddr) { /* There is something to do */ 237750b5e31SKonstantin Belousov if (mmap(bss_addr, bss_vlimit - bss_vaddr, data_prot, 238750b5e31SKonstantin Belousov data_flags | MAP_ANON, -1, 0) == (caddr_t)-1) { 239750b5e31SKonstantin Belousov _rtld_error("%s: mmap of bss failed: %s", path, 2406fea10fbSKonstantin Belousov rtld_strerror(errno)); 241e474e51eSKonstantin Belousov goto error1; 2423124c3e0SJohn Polstra } 2433124c3e0SJohn Polstra } 24469ca61baSKonstantin Belousov } 24569ca61baSKonstantin Belousov 24649f90ad2SAlexander Kabaev if (phdr_vaddr == 0 && data_offset <= hdr->e_phoff && 24749f90ad2SAlexander Kabaev (data_vlimit - data_vaddr + data_offset) >= 24849f90ad2SAlexander Kabaev (hdr->e_phoff + hdr->e_phnum * sizeof (Elf_Phdr))) { 24949f90ad2SAlexander Kabaev phdr_vaddr = data_vaddr + hdr->e_phoff - data_offset; 25049f90ad2SAlexander Kabaev } 2518b7f25d4SAlexander Kabaev } 2523124c3e0SJohn Polstra 253926ea445SJohn Polstra obj = obj_new(); 2547360ae0fSJohn Polstra if (sb != NULL) { 2557360ae0fSJohn Polstra obj->dev = sb->st_dev; 2567360ae0fSJohn Polstra obj->ino = sb->st_ino; 2577360ae0fSJohn Polstra } 2583124c3e0SJohn Polstra obj->mapbase = mapbase; 2593124c3e0SJohn Polstra obj->mapsize = mapsize; 2603124c3e0SJohn Polstra obj->textsize = round_page(segs[0]->p_vaddr + segs[0]->p_memsz) - 2613124c3e0SJohn Polstra base_vaddr; 2623124c3e0SJohn Polstra obj->vaddrbase = base_vaddr; 2633124c3e0SJohn Polstra obj->relocbase = mapbase - base_vaddr; 264a607e5d7SJohn Polstra obj->dynamic = (const Elf_Dyn *) (obj->relocbase + phdyn->p_vaddr); 265341b3de6SMatthew N. Dodd if (hdr->e_entry != 0) 266341b3de6SMatthew N. Dodd obj->entry = (caddr_t) (obj->relocbase + hdr->e_entry); 26749f90ad2SAlexander Kabaev if (phdr_vaddr != 0) { 26849f90ad2SAlexander Kabaev obj->phdr = (const Elf_Phdr *) (obj->relocbase + phdr_vaddr); 26949f90ad2SAlexander Kabaev } else { 27049f90ad2SAlexander Kabaev obj->phdr = malloc(phsize); 27149f90ad2SAlexander Kabaev if (obj->phdr == NULL) { 27249f90ad2SAlexander Kabaev obj_free(obj); 27349f90ad2SAlexander Kabaev _rtld_error("%s: cannot allocate program header", path); 274e474e51eSKonstantin Belousov goto error1; 2753124c3e0SJohn Polstra } 27649f90ad2SAlexander Kabaev memcpy((char *)obj->phdr, (char *)hdr + hdr->e_phoff, phsize); 27749f90ad2SAlexander Kabaev obj->phdr_alloc = true; 27849f90ad2SAlexander Kabaev } 27949f90ad2SAlexander Kabaev obj->phsize = phsize; 280a607e5d7SJohn Polstra if (phinterp != NULL) 281a607e5d7SJohn Polstra obj->interp = (const char *) (obj->relocbase + phinterp->p_vaddr); 282017246d0SDoug Rabson if (phtls != NULL) { 283017246d0SDoug Rabson tls_dtv_generation++; 284017246d0SDoug Rabson obj->tlsindex = ++tls_max_index; 285017246d0SDoug Rabson obj->tlssize = phtls->p_memsz; 286017246d0SDoug Rabson obj->tlsalign = phtls->p_align; 287017246d0SDoug Rabson obj->tlsinitsize = phtls->p_filesz; 288017246d0SDoug Rabson obj->tlsinit = mapbase + phtls->p_vaddr; 289017246d0SDoug Rabson } 290212f264cSKonstantin Belousov obj->stack_flags = stack_flags; 2916d7610d7SKonstantin Belousov obj->relro_page = obj->relocbase + trunc_page(relro_page); 2926d7610d7SKonstantin Belousov obj->relro_size = round_page(relro_size); 293d958a71bSAlexander Kabaev if (note_start < note_end) 294d958a71bSAlexander Kabaev digest_notes(obj, note_start, note_end); 295e474e51eSKonstantin Belousov munmap(hdr, PAGE_SIZE); 296e474e51eSKonstantin Belousov return (obj); 297e474e51eSKonstantin Belousov 298e474e51eSKonstantin Belousov error1: 299e474e51eSKonstantin Belousov munmap(mapbase, mapsize); 300e474e51eSKonstantin Belousov error: 301e474e51eSKonstantin Belousov munmap(hdr, PAGE_SIZE); 302e474e51eSKonstantin Belousov return (NULL); 3033124c3e0SJohn Polstra } 3043124c3e0SJohn Polstra 305341b3de6SMatthew N. Dodd static Elf_Ehdr * 306341b3de6SMatthew N. Dodd get_elf_header(int fd, const char *path) 307341b3de6SMatthew N. Dodd { 308e474e51eSKonstantin Belousov Elf_Ehdr *hdr; 309341b3de6SMatthew N. Dodd 310e474e51eSKonstantin Belousov hdr = mmap(NULL, PAGE_SIZE, PROT_READ, MAP_PRIVATE | MAP_PREFAULT_READ, 311e474e51eSKonstantin Belousov fd, 0); 312e474e51eSKonstantin Belousov if (hdr == (Elf_Ehdr *)MAP_FAILED) { 3136fea10fbSKonstantin Belousov _rtld_error("%s: read error: %s", path, rtld_strerror(errno)); 314e474e51eSKonstantin Belousov return (NULL); 315341b3de6SMatthew N. Dodd } 316341b3de6SMatthew N. Dodd 317341b3de6SMatthew N. Dodd /* Make sure the file is valid */ 318e474e51eSKonstantin Belousov if (!IS_ELF(*hdr)) { 319341b3de6SMatthew N. Dodd _rtld_error("%s: invalid file format", path); 320e474e51eSKonstantin Belousov goto error; 321341b3de6SMatthew N. Dodd } 322e474e51eSKonstantin Belousov if (hdr->e_ident[EI_CLASS] != ELF_TARG_CLASS || 323e474e51eSKonstantin Belousov hdr->e_ident[EI_DATA] != ELF_TARG_DATA) { 324341b3de6SMatthew N. Dodd _rtld_error("%s: unsupported file layout", path); 325e474e51eSKonstantin Belousov goto error; 326341b3de6SMatthew N. Dodd } 327e474e51eSKonstantin Belousov if (hdr->e_ident[EI_VERSION] != EV_CURRENT || 328e474e51eSKonstantin Belousov hdr->e_version != EV_CURRENT) { 329341b3de6SMatthew N. Dodd _rtld_error("%s: unsupported file version", path); 330e474e51eSKonstantin Belousov goto error; 331341b3de6SMatthew N. Dodd } 332e474e51eSKonstantin Belousov if (hdr->e_type != ET_EXEC && hdr->e_type != ET_DYN) { 333341b3de6SMatthew N. Dodd _rtld_error("%s: unsupported file type", path); 334e474e51eSKonstantin Belousov goto error; 335341b3de6SMatthew N. Dodd } 336e474e51eSKonstantin Belousov if (hdr->e_machine != ELF_TARG_MACH) { 337341b3de6SMatthew N. Dodd _rtld_error("%s: unsupported machine", path); 338e474e51eSKonstantin Belousov goto error; 339341b3de6SMatthew N. Dodd } 340341b3de6SMatthew N. Dodd 341341b3de6SMatthew N. Dodd /* 342341b3de6SMatthew N. Dodd * We rely on the program header being in the first page. This is 343341b3de6SMatthew N. Dodd * not strictly required by the ABI specification, but it seems to 344341b3de6SMatthew N. Dodd * always true in practice. And, it simplifies things considerably. 345341b3de6SMatthew N. Dodd */ 346e474e51eSKonstantin Belousov if (hdr->e_phentsize != sizeof(Elf_Phdr)) { 347341b3de6SMatthew N. Dodd _rtld_error( 348341b3de6SMatthew N. Dodd "%s: invalid shared object: e_phentsize != sizeof(Elf_Phdr)", path); 349e474e51eSKonstantin Belousov goto error; 350341b3de6SMatthew N. Dodd } 351e474e51eSKonstantin Belousov if (hdr->e_phoff + hdr->e_phnum * sizeof(Elf_Phdr) > 352e474e51eSKonstantin Belousov (size_t)PAGE_SIZE) { 353341b3de6SMatthew N. Dodd _rtld_error("%s: program header too large", path); 354e474e51eSKonstantin Belousov goto error; 355341b3de6SMatthew N. Dodd } 356e474e51eSKonstantin Belousov return (hdr); 357341b3de6SMatthew N. Dodd 358e474e51eSKonstantin Belousov error: 359e474e51eSKonstantin Belousov munmap(hdr, PAGE_SIZE); 360e474e51eSKonstantin Belousov return (NULL); 361341b3de6SMatthew N. Dodd } 362341b3de6SMatthew N. Dodd 363926ea445SJohn Polstra void 364926ea445SJohn Polstra obj_free(Obj_Entry *obj) 365926ea445SJohn Polstra { 366926ea445SJohn Polstra Objlist_Entry *elm; 367926ea445SJohn Polstra 3680eb88f20SAlexander Kabaev if (obj->tls_done) 369ddab7ee8SDoug Rabson free_tls_offset(obj); 370926ea445SJohn Polstra while (obj->needed != NULL) { 371926ea445SJohn Polstra Needed_Entry *needed = obj->needed; 372926ea445SJohn Polstra obj->needed = needed->next; 373926ea445SJohn Polstra free(needed); 374926ea445SJohn Polstra } 3750eb88f20SAlexander Kabaev while (!STAILQ_EMPTY(&obj->names)) { 3760eb88f20SAlexander Kabaev Name_Entry *entry = STAILQ_FIRST(&obj->names); 3770eb88f20SAlexander Kabaev STAILQ_REMOVE_HEAD(&obj->names, link); 3780eb88f20SAlexander Kabaev free(entry); 3790eb88f20SAlexander Kabaev } 380926ea445SJohn Polstra while (!STAILQ_EMPTY(&obj->dldags)) { 381926ea445SJohn Polstra elm = STAILQ_FIRST(&obj->dldags); 382926ea445SJohn Polstra STAILQ_REMOVE_HEAD(&obj->dldags, link); 383926ea445SJohn Polstra free(elm); 384926ea445SJohn Polstra } 385926ea445SJohn Polstra while (!STAILQ_EMPTY(&obj->dagmembers)) { 386926ea445SJohn Polstra elm = STAILQ_FIRST(&obj->dagmembers); 387926ea445SJohn Polstra STAILQ_REMOVE_HEAD(&obj->dagmembers, link); 388926ea445SJohn Polstra free(elm); 389926ea445SJohn Polstra } 39049f90ad2SAlexander Kabaev if (obj->vertab) 3910eb88f20SAlexander Kabaev free(obj->vertab); 39249f90ad2SAlexander Kabaev if (obj->origin_path) 393da9f2454SMatthew N. Dodd free(obj->origin_path); 39428551690SKonstantin Belousov if (obj->z_origin) 39528551690SKonstantin Belousov free(obj->rpath); 39649f90ad2SAlexander Kabaev if (obj->priv) 39763c1e7cbSAlexander Kabaev free(obj->priv); 39849f90ad2SAlexander Kabaev if (obj->path) 39949f90ad2SAlexander Kabaev free(obj->path); 40049f90ad2SAlexander Kabaev if (obj->phdr_alloc) 40149f90ad2SAlexander Kabaev free((void *)obj->phdr); 402926ea445SJohn Polstra free(obj); 403926ea445SJohn Polstra } 404926ea445SJohn Polstra 405926ea445SJohn Polstra Obj_Entry * 406926ea445SJohn Polstra obj_new(void) 407926ea445SJohn Polstra { 408926ea445SJohn Polstra Obj_Entry *obj; 409926ea445SJohn Polstra 410926ea445SJohn Polstra obj = CNEW(Obj_Entry); 411926ea445SJohn Polstra STAILQ_INIT(&obj->dldags); 412926ea445SJohn Polstra STAILQ_INIT(&obj->dagmembers); 4130eb88f20SAlexander Kabaev STAILQ_INIT(&obj->names); 414926ea445SJohn Polstra return obj; 415926ea445SJohn Polstra } 416926ea445SJohn Polstra 4173124c3e0SJohn Polstra /* 4183124c3e0SJohn Polstra * Given a set of ELF protection flags, return the corresponding protection 4193124c3e0SJohn Polstra * flags for MMAP. 4203124c3e0SJohn Polstra */ 4213124c3e0SJohn Polstra static int 422fa7dd9c5SMatthew Dillon convert_prot(int elfflags) 4233124c3e0SJohn Polstra { 4243124c3e0SJohn Polstra int prot = 0; 4253124c3e0SJohn Polstra if (elfflags & PF_R) 4263124c3e0SJohn Polstra prot |= PROT_READ; 4273124c3e0SJohn Polstra if (elfflags & PF_W) 4283124c3e0SJohn Polstra prot |= PROT_WRITE; 4293124c3e0SJohn Polstra if (elfflags & PF_X) 4303124c3e0SJohn Polstra prot |= PROT_EXEC; 4313124c3e0SJohn Polstra return prot; 4323124c3e0SJohn Polstra } 433fa7dd9c5SMatthew Dillon 434fa7dd9c5SMatthew Dillon static int 435fa7dd9c5SMatthew Dillon convert_flags(int elfflags) 436fa7dd9c5SMatthew Dillon { 437fa7dd9c5SMatthew Dillon int flags = MAP_PRIVATE; /* All mappings are private */ 438fa7dd9c5SMatthew Dillon 439fa7dd9c5SMatthew Dillon /* 440fa7dd9c5SMatthew Dillon * Readonly mappings are marked "MAP_NOCORE", because they can be 441fa7dd9c5SMatthew Dillon * reconstructed by a debugger. 442fa7dd9c5SMatthew Dillon */ 443fa7dd9c5SMatthew Dillon if (!(elfflags & PF_W)) 444fa7dd9c5SMatthew Dillon flags |= MAP_NOCORE; 445fa7dd9c5SMatthew Dillon return flags; 446fa7dd9c5SMatthew Dillon } 447