xref: /illumos-gate/usr/src/uts/intel/amd64/krtld/kobj_reloc.c (revision 251becc882939aaf03088561add2c257a7a92424)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  *
26  * Copyright 2020 Joyent, Inc.
27  */
28 
29 /*
30  * x86 relocation code.
31  */
32 
33 #include <sys/types.h>
34 #include <sys/param.h>
35 #include <sys/sysmacros.h>
36 #include <sys/systm.h>
37 #include <sys/user.h>
38 #include <sys/bootconf.h>
39 #include <sys/modctl.h>
40 #include <sys/elf.h>
41 #include <sys/kobj.h>
42 #include <sys/kobj_impl.h>
43 #include <sys/tnf.h>
44 #include <sys/tnf_probe.h>
45 
46 #include "reloc.h"
47 
48 
49 /*
50  * Probe Discovery
51  */
52 
53 #define	PROBE_MARKER_SYMBOL	"__tnf_probe_version_1"
54 #define	TAG_MARKER_SYMBOL	"__tnf_tag_version_1"
55 
56 extern int tnf_splice_probes(int, tnf_probe_control_t *, tnf_tag_data_t *);
57 
58 /*
59  * The kernel run-time linker calls this to try to resolve a reference
60  * it can't otherwise resolve.  We see if it's marking a probe control
61  * block; if so, we do the resolution and return 0.  If not, we return
62  * 1 to show that we can't resolve it, either.
63  */
64 static int
65 tnf_reloc_resolve(char *symname, Addr *value_p,
66     Elf64_Sxword *addend_p,
67     long offset,
68     tnf_probe_control_t **probelist,
69     tnf_tag_data_t **taglist)
70 {
71 	if (strcmp(symname, PROBE_MARKER_SYMBOL) == 0) {
72 		*addend_p = 0;
73 		((tnf_probe_control_t *)offset)->next = *probelist;
74 		*probelist = (tnf_probe_control_t *)offset;
75 		return (0);
76 	}
77 	if (strcmp(symname, TAG_MARKER_SYMBOL) == 0) {
78 		*addend_p = 0;
79 		*value_p = (Addr)*taglist;
80 		*taglist = (tnf_tag_data_t *)offset;
81 		return (0);
82 	}
83 	return (1);
84 }
85 
86 #define	SDT_NOP		0x90
87 #define	SDT_NOPS	5
88 
89 static int
90 sdt_reloc_resolve(struct module *mp, char *symname, uint8_t *instr)
91 {
92 	sdt_probedesc_t *sdp;
93 	int i;
94 
95 	/*
96 	 * The "statically defined tracing" (SDT) provider for DTrace uses
97 	 * a mechanism similar to TNF, but somewhat simpler.  (Surprise,
98 	 * surprise.)  The SDT mechanism works by replacing calls to the
99 	 * undefined routine __dtrace_probe_[name] with nop instructions.
100 	 * The relocations are logged, and SDT itself will later patch the
101 	 * running binary appropriately.
102 	 */
103 	if (strncmp(symname, sdt_prefix, strlen(sdt_prefix)) != 0)
104 		return (1);
105 
106 	symname += strlen(sdt_prefix);
107 
108 	sdp = kobj_alloc(sizeof (sdt_probedesc_t), KM_WAIT);
109 	sdp->sdpd_name = kobj_alloc(strlen(symname) + 1, KM_WAIT);
110 	bcopy(symname, sdp->sdpd_name, strlen(symname) + 1);
111 
112 	sdp->sdpd_offset = (uintptr_t)instr;
113 	sdp->sdpd_next = mp->sdt_probes;
114 	mp->sdt_probes = sdp;
115 
116 	for (i = 0; i < SDT_NOPS; i++)
117 		instr[i - 1] = SDT_NOP;
118 
119 	return (0);
120 }
121 
122 
123 /*
124  * We're relying on the fact that the call we're replacing is
125  * call (e8) plus 4 bytes of address, making a 5 byte instruction
126  */
127 #define	NOP_INSTR	0x90
128 #define	SMAP_NOPS	5
129 
130 /*
131  * Currently the only call replaced as a hot inline
132  * is smap_enable() and smap_disable(). If more are needed
133  * we should probably come up with an sdt probe like prefix
134  * and look for those instead of exact call names.
135  */
136 static int
137 smap_reloc_resolve(struct module *mp, char *symname, uint8_t *instr)
138 {
139 	uint_t symlen;
140 	hotinline_desc_t *hid;
141 
142 	if (strcmp(symname, "smap_enable") == 0 ||
143 	    strcmp(symname, "smap_disable") == 0) {
144 
145 #ifdef	KOBJ_DEBUG
146 		if (kobj_debug & D_RELOCATIONS) {
147 			_kobj_printf(ops, "smap_reloc_resolve: %s relocating "
148 			    "enable/disable_smap\n", mp->filename);
149 		}
150 #endif
151 
152 		hid = kobj_alloc(sizeof (hotinline_desc_t), KM_WAIT);
153 		symlen = strlen(symname) + 1;
154 		hid->hid_symname = kobj_alloc(symlen, KM_WAIT);
155 		bcopy(symname, hid->hid_symname, symlen);
156 
157 		/*
158 		 * We backtrack one byte here to consume the call
159 		 * instruction itself.
160 		 */
161 		hid->hid_instr_offset = (uintptr_t)instr - 1;
162 		hid->hid_next = mp->hi_calls;
163 		mp->hi_calls = hid;
164 
165 		memset((void *)hid->hid_instr_offset, NOP_INSTR, SMAP_NOPS);
166 
167 		return (0);
168 	}
169 
170 	return (1);
171 }
172 
173 int
174 do_relocate(struct module *mp, char *reltbl, int nreloc, int relocsize,
175     Addr baseaddr)
176 {
177 	unsigned long stndx;
178 	unsigned long off;	/* can't be register for tnf_reloc_resolve() */
179 	register unsigned long reladdr, rend;
180 	register unsigned int rtype;
181 	unsigned long value;
182 	Elf64_Sxword addend;
183 	Sym *symref = NULL;
184 	int err = 0;
185 	tnf_probe_control_t *probelist = NULL;
186 	tnf_tag_data_t *taglist = NULL;
187 	int symnum;
188 	reladdr = (unsigned long)reltbl;
189 	rend = reladdr + nreloc * relocsize;
190 
191 #ifdef	KOBJ_DEBUG
192 	if (kobj_debug & D_RELOCATIONS) {
193 		_kobj_printf(ops, "krtld:\ttype\t\t\toffset\t   addend"
194 		    "      symbol\n");
195 		_kobj_printf(ops, "krtld:\t\t\t\t\t   value\n");
196 	}
197 #endif
198 
199 	symnum = -1;
200 	/* loop through relocations */
201 	while (reladdr < rend) {
202 		symnum++;
203 		rtype = ELF_R_TYPE(((Rela *)reladdr)->r_info);
204 		off = ((Rela *)reladdr)->r_offset;
205 		stndx = ELF_R_SYM(((Rela *)reladdr)->r_info);
206 		if (stndx >= mp->nsyms) {
207 			_kobj_printf(ops, "do_relocate: bad strndx %d\n",
208 			    symnum);
209 			return (-1);
210 		}
211 		if ((rtype > R_AMD64_NUM) || IS_TLS_INS(rtype)) {
212 			_kobj_printf(ops, "krtld: invalid relocation type %d",
213 			    rtype);
214 			_kobj_printf(ops, " at 0x%lx:", off);
215 			_kobj_printf(ops, " file=%s\n", mp->filename);
216 			return (-1);
217 		}
218 
219 
220 		addend = (long)(((Rela *)reladdr)->r_addend);
221 		reladdr += relocsize;
222 
223 
224 		if (rtype == R_AMD64_NONE)
225 			continue;
226 
227 #ifdef	KOBJ_DEBUG
228 		if (kobj_debug & D_RELOCATIONS) {
229 			Sym *	symp;
230 			symp = (Sym *)
231 			    (mp->symtbl+(stndx * mp->symhdr->sh_entsize));
232 			_kobj_printf(ops, "krtld:\t%s",
233 			    conv_reloc_amd64_type(rtype));
234 			_kobj_printf(ops, "\t0x%8lx", off);
235 			_kobj_printf(ops, " %8lld", (longlong_t)addend);
236 			_kobj_printf(ops, "  %s\n",
237 			    (const char *)mp->strings + symp->st_name);
238 		}
239 #endif
240 
241 		if (!(mp->flags & KOBJ_EXEC))
242 			off += baseaddr;
243 
244 		/*
245 		 * if R_AMD64_RELATIVE, simply add base addr
246 		 * to reloc location
247 		 */
248 
249 		if (rtype == R_AMD64_RELATIVE) {
250 			value = baseaddr;
251 		} else {
252 			/*
253 			 * get symbol table entry - if symbol is local
254 			 * value is base address of this object
255 			 */
256 			symref = (Sym *)
257 			    (mp->symtbl+(stndx * mp->symhdr->sh_entsize));
258 
259 			if (ELF_ST_BIND(symref->st_info) == STB_LOCAL) {
260 				/* *** this is different for .o and .so */
261 				value = symref->st_value;
262 			} else {
263 				/*
264 				 * It's global. Allow weak references.  If
265 				 * the symbol is undefined, give TNF (the
266 				 * kernel probes facility) a chance to see
267 				 * if it's a probe site, and fix it up if so.
268 				 */
269 				if (symref->st_shndx == SHN_UNDEF &&
270 				    sdt_reloc_resolve(mp, mp->strings +
271 				    symref->st_name, (uint8_t *)off) == 0)
272 					continue;
273 
274 				if (symref->st_shndx == SHN_UNDEF &&
275 				    smap_reloc_resolve(mp, mp->strings +
276 				    symref->st_name, (uint8_t *)off) == 0)
277 					continue;
278 
279 				if (symref->st_shndx == SHN_UNDEF &&
280 				    tnf_reloc_resolve(mp->strings +
281 				    symref->st_name, &symref->st_value,
282 				    &addend, off, &probelist, &taglist) != 0) {
283 					if (ELF_ST_BIND(symref->st_info)
284 					    != STB_WEAK) {
285 						_kobj_printf(ops,
286 						    "not found: %s\n",
287 						    mp->strings +
288 						    symref->st_name);
289 						err = 1;
290 					}
291 					continue;
292 				} else { /* symbol found  - relocate */
293 					/*
294 					 * calculate location of definition
295 					 * - symbol value plus base address of
296 					 * containing shared object
297 					 */
298 					value = symref->st_value;
299 
300 				} /* end else symbol found */
301 			} /* end global or weak */
302 		} /* end not R_AMD64_RELATIVE */
303 
304 		value += addend;
305 		/*
306 		 * calculate final value -
307 		 * if PC-relative, subtract ref addr
308 		 */
309 		if (IS_PC_RELATIVE(rtype))
310 			value -= off;
311 
312 #ifdef	KOBJ_DEBUG
313 		if (kobj_debug & D_RELOCATIONS) {
314 			_kobj_printf(ops, "krtld:\t\t\t\t0x%8lx", off);
315 			_kobj_printf(ops, " 0x%8lx\n", value);
316 		}
317 #endif
318 
319 		if (do_reloc_krtld(rtype, (unsigned char *)off, &value,
320 		    (const char *)mp->strings + symref->st_name,
321 		    mp->filename) == 0)
322 			err = 1;
323 
324 	} /* end of while loop */
325 	if (err)
326 		return (-1);
327 
328 	if (tnf_splice_probes(mp->flags & KOBJ_PRIM, probelist, taglist))
329 		mp->flags |= KOBJ_TNF_PROBE;
330 
331 	return (0);
332 }
333 
334 int
335 do_relocations(struct module *mp)
336 {
337 	uint_t shn;
338 	Shdr *shp, *rshp;
339 	uint_t nreloc;
340 
341 	/* do the relocations */
342 	for (shn = 1; shn < mp->hdr.e_shnum; shn++) {
343 		rshp = (Shdr *)
344 		    (mp->shdrs + shn * mp->hdr.e_shentsize);
345 		if (rshp->sh_type == SHT_REL) {
346 			_kobj_printf(ops, "%s can't process type SHT_REL\n",
347 			    mp->filename);
348 			return (-1);
349 		}
350 		if (rshp->sh_type != SHT_RELA)
351 			continue;
352 		if (rshp->sh_link != mp->symtbl_section) {
353 			_kobj_printf(ops, "%s reloc for non-default symtab\n",
354 			    mp->filename);
355 			return (-1);
356 		}
357 		if (rshp->sh_info >= mp->hdr.e_shnum) {
358 			_kobj_printf(ops, "do_relocations: %s sh_info ",
359 			    mp->filename);
360 			_kobj_printf(ops, "out of range %d\n", shn);
361 			goto bad;
362 		}
363 		nreloc = rshp->sh_size / rshp->sh_entsize;
364 
365 		/* get the section header that this reloc table refers to */
366 		shp = (Shdr *)
367 		    (mp->shdrs + rshp->sh_info * mp->hdr.e_shentsize);
368 
369 		/*
370 		 * Do not relocate any section that isn't loaded into memory.
371 		 * Most commonly this will skip over the .rela.stab* sections
372 		 */
373 		if (!(shp->sh_flags & SHF_ALLOC))
374 			continue;
375 #ifdef	KOBJ_DEBUG
376 		if (kobj_debug & D_RELOCATIONS) {
377 			_kobj_printf(ops, "krtld: relocating: file=%s ",
378 			    mp->filename);
379 			_kobj_printf(ops, "section=%d\n", shn);
380 		}
381 #endif
382 
383 		if (do_relocate(mp, (char *)rshp->sh_addr, nreloc,
384 		    rshp->sh_entsize, shp->sh_addr) < 0) {
385 			_kobj_printf(ops,
386 			    "do_relocations: %s do_relocate failed\n",
387 			    mp->filename);
388 			goto bad;
389 		}
390 		kobj_free((void *)rshp->sh_addr, rshp->sh_size);
391 		rshp->sh_addr = 0;
392 	}
393 	mp->flags |= KOBJ_RELOCATED;
394 	return (0);
395 bad:
396 	kobj_free((void *)rshp->sh_addr, rshp->sh_size);
397 	rshp->sh_addr = 0;
398 	return (-1);
399 }
400