diff options
Diffstat (limited to 'agent/tcf/services/elf-loader.c')
-rw-r--r-- | agent/tcf/services/elf-loader.c | 278 |
1 files changed, 278 insertions, 0 deletions
diff --git a/agent/tcf/services/elf-loader.c b/agent/tcf/services/elf-loader.c new file mode 100644 index 00000000..28321e53 --- /dev/null +++ b/agent/tcf/services/elf-loader.c @@ -0,0 +1,278 @@ +/******************************************************************************* + * Copyright (c) 2011 Wind River Systems, Inc. and others. + * All rights reserved. This program and the accompanying materials + * are made available under the terms of the Eclipse Public License v1.0 + * and Eclipse Distribution License v1.0 which accompany this distribution. + * The Eclipse Public License is available at + * http://www.eclipse.org/legal/epl-v10.html + * and the Eclipse Distribution License is available at + * http://www.eclipse.org/org/documents/edl-v10.php. + * You may elect to redistribute this code under either of these licenses. + * + * Contributors: + * Wind River Systems - initial API and implementation + *******************************************************************************/ + +/* + * This module implements access to ELF dynamic loader data. + */ + +#include <tcf/config.h> + +#if ENABLE_ELF && ENABLE_DebugContext + +#include <tcf/framework/exceptions.h> +#include <tcf/services/symbols.h> +#include <tcf/services/dwarfcache.h> +#include <tcf/services/elf-loader.h> + +static ContextAddress to_address(uint8_t * buf, size_t size, int big_endian) { + size_t i; + ContextAddress addr = 0; + for (i = 0; i < size; i++) { + addr = addr << 8; + addr |= buf[big_endian ? i : size - i - 1]; + } + return addr; +} + +static int get_dynamic_tag(Context * ctx, ELF_File * file, int tag, ContextAddress * addr) { + unsigned i, j; + + for (i = 1; i < file->section_cnt; i++) { + ELF_Section * sec = file->sections + i; + if (sec->size == 0) continue; + if (sec->name == NULL) continue; + if (strcmp(sec->name, ".dynamic") == 0) { + ContextAddress sec_addr = elf_map_to_run_time_address(ctx, file, sec, (ContextAddress)sec->addr); + if (elf_load(sec) < 0) return -1; + if (file->elf64) { + unsigned cnt = (unsigned)(sec->size / sizeof(Elf64_Dyn)); + for (j = 0; j < cnt; j++) { + Elf64_Dyn dyn = *((Elf64_Dyn *)sec->data + j); + if (file->byte_swap) SWAP(dyn.d_tag); + if (dyn.d_tag == DT_NULL) break; + if (dyn.d_tag == tag) { + if (context_read_mem(ctx, sec_addr + j * sizeof(dyn), &dyn, sizeof(dyn)) < 0) return -1; + if (file->byte_swap) { + SWAP(dyn.d_tag); + SWAP(dyn.d_un.d_ptr); + } + if (dyn.d_tag != tag) continue; + if (addr != NULL) *addr = (ContextAddress)dyn.d_un.d_ptr; + return 0; + } + } + } + else { + unsigned cnt = (unsigned)(sec->size / sizeof(Elf32_Dyn)); + for (j = 0; j < cnt; j++) { + Elf32_Dyn dyn = *((Elf32_Dyn *)sec->data + j); + if (file->byte_swap) SWAP(dyn.d_tag); + if (dyn.d_tag == DT_NULL) break; + if (dyn.d_tag == tag) { + if (context_read_mem(ctx, sec_addr + j * sizeof(dyn), &dyn, sizeof(dyn)) < 0) return -1; + if (file->byte_swap) { + SWAP(dyn.d_tag); + SWAP(dyn.d_un.d_ptr); + } + if (dyn.d_tag != tag) continue; + if (addr != NULL) *addr = (ContextAddress)dyn.d_un.d_ptr; + return 0; + } + } + } + } + } + errno = ENOENT; + return -1; +} + +static int sym_name_cmp(const char * x, const char * y) { + while (*x && *x == *y) { + x++; + y++; + } + if (*x == 0 && *y == 0) return 0; + if (*x == '@' && *(x + 1) == '@' && *y == 0) return 0; + if (*x < *y) return -1; + return 1; +} + +static int get_global_symbol_address(Context * ctx, ELF_File * file, const char * name, ContextAddress * addr) { + unsigned i, j; + + for (i = 1; i < file->section_cnt; i++) { + ELF_Section * sec = file->sections + i; + if (sec->size == 0) continue; + if (sec->type == SHT_SYMTAB) { + ELF_Section * str = NULL; + if (sec->link == 0 || sec->link >= file->section_cnt) { + errno = EINVAL; + return -1; + } + str = file->sections + sec->link; + if (elf_load(sec) < 0) return -1; + if (elf_load(str) < 0) return -1; + if (file->elf64) { + unsigned cnt = (unsigned)(sec->size / sizeof(Elf64_Sym)); + for (j = 0; j < cnt; j++) { + Elf64_Sym sym = *((Elf64_Sym *)sec->data + j); + if (ELF64_ST_BIND(sym.st_info) != STB_GLOBAL) continue; + if (file->byte_swap) SWAP(sym.st_name); + if (sym_name_cmp((char *)str->data + sym.st_name, name) != 0) continue; + switch (ELF64_ST_TYPE(sym.st_info)) { + case STT_OBJECT: + case STT_FUNC: + if (file->byte_swap) SWAP(sym.st_value); + *addr = elf_map_to_run_time_address(ctx, file, NULL, (ContextAddress)sym.st_value); + if (*addr != 0) return 0; + } + } + } + else { + unsigned cnt = (unsigned)(sec->size / sizeof(Elf32_Sym)); + for (j = 0; j < cnt; j++) { + Elf32_Sym sym = *((Elf32_Sym *)sec->data + j); + if (ELF32_ST_BIND(sym.st_info) != STB_GLOBAL) continue; + if (file->byte_swap) SWAP(sym.st_name); + if (sym_name_cmp((char *)str->data + sym.st_name, name) != 0) continue; + switch (ELF32_ST_TYPE(sym.st_info)) { + case STT_OBJECT: + case STT_FUNC: + if (file->byte_swap) SWAP(sym.st_value); + *addr = elf_map_to_run_time_address(ctx, file, NULL, (ContextAddress)sym.st_value); + if (*addr != 0) return 0; + } + } + } + } + } + errno = ENOENT; + return -1; +} + +ContextAddress elf_get_debug_structure_address(Context * ctx, ELF_File ** file_ptr) { + ELF_File * file = NULL; + ContextAddress addr = 0; + + for (file = elf_list_first(ctx, 0, ~(ContextAddress)0); file != NULL; file = elf_list_next(ctx)) { + if (file->type != ET_EXEC) continue; + if (file_ptr != NULL) *file_ptr = file; +#ifdef DT_MIPS_RLD_MAP + if (get_dynamic_tag(ctx, file, DT_MIPS_RLD_MAP, &addr) == 0) { + if (elf_read_memory_word(ctx, file, addr, &addr) < 0) continue; + break; + } +#endif + if (get_dynamic_tag(ctx, file, DT_DEBUG, &addr) == 0) break; + if (get_global_symbol_address(ctx, file, "_r_debug", &addr) == 0) break; + } + elf_list_done(ctx); + + return addr; +} + +static ContextAddress find_module(Context * ctx, ELF_File * exe_file, ELF_File * module, + ContextAddress r_map, ContextAddress r_brk) { +#if ENABLE_Symbols + Symbol * sym = NULL; + int i = 0, n = 0; + Symbol ** children = NULL; + ContextAddress link = r_map; + ContextAddress offs_l_addr = 0; + ContextAddress offs_l_next = 0; + ContextAddress offs_l_tls_modid = 0; + if (find_symbol_by_name(ctx, STACK_NO_FRAME, r_brk, "link_map", &sym) < 0) + str_exception(errno, "Cannot find loader symbol: link_map"); + if (get_symbol_children(sym, &children, &n) < 0) exception(errno); + for (i = 0; i < n; i++) { + char * name = NULL; + ContextAddress offs = 0; + if (get_symbol_name(children[i], &name) < 0) exception(errno); + if (name == NULL) continue; + if (get_symbol_offset(children[i], &offs) < 0) exception(errno); + if (strcmp(name, "l_map_start") == 0) offs_l_addr = offs; + else if (strcmp(name, "l_next") == 0) offs_l_next = offs; + else if (strcmp(name, "l_tls_modid") == 0) offs_l_tls_modid = offs; + } + if (offs_l_addr == 0 || offs_l_next == 0 || offs_l_tls_modid == 0) + str_exception(errno, "Invalid 'link_map' fields"); + while (link != 0) { + ContextAddress l_tls_modid = 0; + if (elf_read_memory_word(ctx, exe_file, link + offs_l_tls_modid, &l_tls_modid) < 0) exception(errno); + if (l_tls_modid != 0) { + ContextAddress l_addr = 0; + ELF_File * link_file = NULL; + if (elf_read_memory_word(ctx, exe_file, link + offs_l_addr, &l_addr) < 0) exception(errno); + elf_map_to_link_time_address(ctx, l_addr, &link_file, NULL); + //printf("link 0x%016" PRIX64 " 0x%016" PRIX64 " 0x%016" PRIX64 " 0x%X\n", (U8_T)link, (U8_T)l_addr, (U8_T)l_tls_modid, link_file); + if (link_file != NULL) { + if (link_file == module) return l_tls_modid; + if (link_file->debug_info_file_name != NULL && + strcmp(link_file->debug_info_file_name, module->name) == 0) return l_tls_modid; + } + } + if (elf_read_memory_word(ctx, exe_file, link + offs_l_next, &link) < 0) exception(errno); + } +#endif + return 0; +} + +static ContextAddress get_module_id(Context * ctx, ELF_File * module) { + ELF_File * exe_file = NULL; + ContextAddress addr = elf_get_debug_structure_address(ctx, &exe_file); + size_t word_size = exe_file && exe_file->elf64 ? 8 : 4; + Trap trap; + + if (addr == 0 || exe_file == NULL) str_exception(ERR_OTHER, "Cannot find loader debug data"); + if (set_trap(&trap)) { + ContextAddress r_map = 0; + ContextAddress r_brk = 0; + ContextAddress mod_id = 0; + if (elf_read_memory_word(ctx, exe_file, addr + word_size * 1, &r_map) < 0) exception(errno); + if (elf_read_memory_word(ctx, exe_file, addr + word_size * 2, &r_brk) < 0) exception(errno); + if (r_map != 0 && r_brk != 0) mod_id = find_module(ctx, exe_file, module, r_map, r_brk); + clear_trap(&trap); + if (mod_id) return mod_id; + } + else { + str_exception(trap.error, "Cannot access target ELF loader data"); + } + str_exception(ERR_OTHER, "Cannot get TLS module ID"); + return 0; +} + +ContextAddress get_tls_address(Context * ctx, ELF_File * file) { + ContextAddress mod_tls_addr = 0; + RegisterIdScope reg_id_scope = { file->machine, file->os_abi, file->big_endian, REGNUM_DWARF }; + switch (file->machine) { + case EM_X86_64: + { + uint8_t buf[8]; + ContextAddress tcb_addr = 0; + ContextAddress vdt_addr = 0; + ContextAddress mod_id = 0; + RegisterDefinition * reg_def = get_reg_by_id(ctx, 58, ®_id_scope); + if (reg_def == NULL) exception(errno); + if (context_read_reg(ctx, reg_def, 0, reg_def->size, buf) < 0) + str_exception(errno, "Cannot read TCB base register"); + tcb_addr = to_address(buf, reg_def->size, reg_def->big_endian); + if (elf_read_memory_word(ctx, file, tcb_addr + 8, &vdt_addr) < 0) + str_exception(errno, "Cannot read TCB"); + mod_id = get_module_id(ctx, file); + if (elf_read_memory_word(ctx, file, vdt_addr + mod_id * 16, &mod_tls_addr) < 0) + str_exception(errno, "Cannot read VDT"); + if (mod_tls_addr == 0 || mod_tls_addr == ~(U8_T)0) + str_exception(errno, "Thread local storage is not allocated yet"); + } + break; + default: + str_fmt_exception(ERR_INV_CONTEXT, + "Thread local storage access is not supported yet for machine type %d", + file->machine); + } + return mod_tls_addr; +} + +#endif |