xref: /linux/tools/testing/selftests/vDSO/parse_vdso.c (revision c532de5a67a70f8533d495f8f2aaa9a0491c3ad0)
1 /*
2  * parse_vdso.c: Linux reference vDSO parser
3  * Written by Andrew Lutomirski, 2011-2014.
4  *
5  * This code is meant to be linked in to various programs that run on Linux.
6  * As such, it is available with as few restrictions as possible.  This file
7  * is licensed under the Creative Commons Zero License, version 1.0,
8  * available at http://creativecommons.org/publicdomain/zero/1.0/legalcode
9  *
10  * The vDSO is a regular ELF DSO that the kernel maps into user space when
11  * it starts a program.  It works equally well in statically and dynamically
12  * linked binaries.
13  *
14  * This code is tested on x86.  In principle it should work on any
15  * architecture that has a vDSO.
16  */
17 
18 #include <stdbool.h>
19 #include <stdint.h>
20 #include <string.h>
21 #include <limits.h>
22 #include <elf.h>
23 
24 #include "parse_vdso.h"
25 
26 /* And here's the code. */
27 #ifndef ELF_BITS
28 # if ULONG_MAX > 0xffffffffUL
29 #  define ELF_BITS 64
30 # else
31 #  define ELF_BITS 32
32 # endif
33 #endif
34 
35 #define ELF_BITS_XFORM2(bits, x) Elf##bits##_##x
36 #define ELF_BITS_XFORM(bits, x) ELF_BITS_XFORM2(bits, x)
37 #define ELF(x) ELF_BITS_XFORM(ELF_BITS, x)
38 
39 #ifdef __s390x__
40 #define ELF_HASH_ENTRY ELF(Xword)
41 #else
42 #define ELF_HASH_ENTRY ELF(Word)
43 #endif
44 
45 static struct vdso_info
46 {
47 	bool valid;
48 
49 	/* Load information */
50 	uintptr_t load_addr;
51 	uintptr_t load_offset;  /* load_addr - recorded vaddr */
52 
53 	/* Symbol table */
54 	ELF(Sym) *symtab;
55 	const char *symstrings;
56 	ELF_HASH_ENTRY *bucket, *chain;
57 	ELF_HASH_ENTRY nbucket, nchain;
58 
59 	/* Version table */
60 	ELF(Versym) *versym;
61 	ELF(Verdef) *verdef;
62 } vdso_info;
63 
64 /*
65  * Straight from the ELF specification...and then tweaked slightly, in order to
66  * avoid a few clang warnings.
67  */
68 static unsigned long elf_hash(const char *name)
69 {
70 	unsigned long h = 0, g;
71 	const unsigned char *uch_name = (const unsigned char *)name;
72 
73 	while (*uch_name)
74 	{
75 		h = (h << 4) + *uch_name++;
76 		g = h & 0xf0000000;
77 		if (g)
78 			h ^= g >> 24;
79 		h &= ~g;
80 	}
81 	return h;
82 }
83 
84 void vdso_init_from_sysinfo_ehdr(uintptr_t base)
85 {
86 	size_t i;
87 	bool found_vaddr = false;
88 
89 	vdso_info.valid = false;
90 
91 	vdso_info.load_addr = base;
92 
93 	ELF(Ehdr) *hdr = (ELF(Ehdr)*)base;
94 	if (hdr->e_ident[EI_CLASS] !=
95 	    (ELF_BITS == 32 ? ELFCLASS32 : ELFCLASS64)) {
96 		return;  /* Wrong ELF class -- check ELF_BITS */
97 	}
98 
99 	ELF(Phdr) *pt = (ELF(Phdr)*)(vdso_info.load_addr + hdr->e_phoff);
100 	ELF(Dyn) *dyn = 0;
101 
102 	/*
103 	 * We need two things from the segment table: the load offset
104 	 * and the dynamic table.
105 	 */
106 	for (i = 0; i < hdr->e_phnum; i++)
107 	{
108 		if (pt[i].p_type == PT_LOAD && !found_vaddr) {
109 			found_vaddr = true;
110 			vdso_info.load_offset =	base
111 				+ (uintptr_t)pt[i].p_offset
112 				- (uintptr_t)pt[i].p_vaddr;
113 		} else if (pt[i].p_type == PT_DYNAMIC) {
114 			dyn = (ELF(Dyn)*)(base + pt[i].p_offset);
115 		}
116 	}
117 
118 	if (!found_vaddr || !dyn)
119 		return;  /* Failed */
120 
121 	/*
122 	 * Fish out the useful bits of the dynamic table.
123 	 */
124 	ELF_HASH_ENTRY *hash = 0;
125 	vdso_info.symstrings = 0;
126 	vdso_info.symtab = 0;
127 	vdso_info.versym = 0;
128 	vdso_info.verdef = 0;
129 	for (i = 0; dyn[i].d_tag != DT_NULL; i++) {
130 		switch (dyn[i].d_tag) {
131 		case DT_STRTAB:
132 			vdso_info.symstrings = (const char *)
133 				((uintptr_t)dyn[i].d_un.d_ptr
134 				 + vdso_info.load_offset);
135 			break;
136 		case DT_SYMTAB:
137 			vdso_info.symtab = (ELF(Sym) *)
138 				((uintptr_t)dyn[i].d_un.d_ptr
139 				 + vdso_info.load_offset);
140 			break;
141 		case DT_HASH:
142 			hash = (ELF_HASH_ENTRY *)
143 				((uintptr_t)dyn[i].d_un.d_ptr
144 				 + vdso_info.load_offset);
145 			break;
146 		case DT_VERSYM:
147 			vdso_info.versym = (ELF(Versym) *)
148 				((uintptr_t)dyn[i].d_un.d_ptr
149 				 + vdso_info.load_offset);
150 			break;
151 		case DT_VERDEF:
152 			vdso_info.verdef = (ELF(Verdef) *)
153 				((uintptr_t)dyn[i].d_un.d_ptr
154 				 + vdso_info.load_offset);
155 			break;
156 		}
157 	}
158 	if (!vdso_info.symstrings || !vdso_info.symtab || !hash)
159 		return;  /* Failed */
160 
161 	if (!vdso_info.verdef)
162 		vdso_info.versym = 0;
163 
164 	/* Parse the hash table header. */
165 	vdso_info.nbucket = hash[0];
166 	vdso_info.nchain = hash[1];
167 	vdso_info.bucket = &hash[2];
168 	vdso_info.chain = &hash[vdso_info.nbucket + 2];
169 
170 	/* That's all we need. */
171 	vdso_info.valid = true;
172 }
173 
174 static bool vdso_match_version(ELF(Versym) ver,
175 			       const char *name, ELF(Word) hash)
176 {
177 	/*
178 	 * This is a helper function to check if the version indexed by
179 	 * ver matches name (which hashes to hash).
180 	 *
181 	 * The version definition table is a mess, and I don't know how
182 	 * to do this in better than linear time without allocating memory
183 	 * to build an index.  I also don't know why the table has
184 	 * variable size entries in the first place.
185 	 *
186 	 * For added fun, I can't find a comprehensible specification of how
187 	 * to parse all the weird flags in the table.
188 	 *
189 	 * So I just parse the whole table every time.
190 	 */
191 
192 	/* First step: find the version definition */
193 	ver &= 0x7fff;  /* Apparently bit 15 means "hidden" */
194 	ELF(Verdef) *def = vdso_info.verdef;
195 	while(true) {
196 		if ((def->vd_flags & VER_FLG_BASE) == 0
197 		    && (def->vd_ndx & 0x7fff) == ver)
198 			break;
199 
200 		if (def->vd_next == 0)
201 			return false;  /* No definition. */
202 
203 		def = (ELF(Verdef) *)((char *)def + def->vd_next);
204 	}
205 
206 	/* Now figure out whether it matches. */
207 	ELF(Verdaux) *aux = (ELF(Verdaux)*)((char *)def + def->vd_aux);
208 	return def->vd_hash == hash
209 		&& !strcmp(name, vdso_info.symstrings + aux->vda_name);
210 }
211 
212 void *vdso_sym(const char *version, const char *name)
213 {
214 	unsigned long ver_hash;
215 	if (!vdso_info.valid)
216 		return 0;
217 
218 	ver_hash = elf_hash(version);
219 	ELF(Word) chain = vdso_info.bucket[elf_hash(name) % vdso_info.nbucket];
220 
221 	for (; chain != STN_UNDEF; chain = vdso_info.chain[chain]) {
222 		ELF(Sym) *sym = &vdso_info.symtab[chain];
223 
224 		/* Check for a defined global or weak function w/ right name. */
225 		if (ELF64_ST_TYPE(sym->st_info) != STT_FUNC &&
226 		    ELF64_ST_TYPE(sym->st_info) != STT_NOTYPE)
227 			continue;
228 		if (ELF64_ST_BIND(sym->st_info) != STB_GLOBAL &&
229 		    ELF64_ST_BIND(sym->st_info) != STB_WEAK)
230 			continue;
231 		if (sym->st_shndx == SHN_UNDEF)
232 			continue;
233 		if (strcmp(name, vdso_info.symstrings + sym->st_name))
234 			continue;
235 
236 		/* Check symbol version. */
237 		if (vdso_info.versym
238 		    && !vdso_match_version(vdso_info.versym[chain],
239 					   version, ver_hash))
240 			continue;
241 
242 		return (void *)(vdso_info.load_offset + sym->st_value);
243 	}
244 
245 	return 0;
246 }
247 
248 void vdso_init_from_auxv(void *auxv)
249 {
250 	ELF(auxv_t) *elf_auxv = auxv;
251 	for (int i = 0; elf_auxv[i].a_type != AT_NULL; i++)
252 	{
253 		if (elf_auxv[i].a_type == AT_SYSINFO_EHDR) {
254 			vdso_init_from_sysinfo_ehdr(elf_auxv[i].a_un.a_val);
255 			return;
256 		}
257 	}
258 
259 	vdso_info.valid = false;
260 }
261