2d1baf521e
The main issue here is that this test passes the host's absolute path to the library to load to the "dlopen"-like routine, which doesn't work when either the target or the host are remote, unless a shared filesystem has been set up. Tests that dynamically load a library solve this by dlopen'ing by basename, and setting rpath to $ORIGIN. See gdb_compile. This test doesn't use dlopen, but instead uses its own simple elf loader. The fix is to pass this loader the library basename, and teach it to look up the library by basename in the executable's directory as well, i.e., assuming/emulating RPATH=$ORIGIN. Tested on x86_64 Fedora 17, native and gdbserver. I looked around in the web to figure out Linux's /proc/self/exe equivalents in other ELF OSs. I think I covered all relevant, but if not, I think it'll be simple enough to add more. (Note the test is skipped on non-ELF targets.) Tested on x86_64 Fedora 17, native and gdbserver. gdb/testsuite/ 2014-04-15 Pedro Alves <palves@redhat.com> * gdb.base/sym-file-loader.c: Include <limits.h>. (SELF_LINK): New define. (get_origin): New function. (load_shlib): Use it. * gdb.base/sym-file.exp: Don't early return if the target is remote. Use runto_main, and issue fail is that fails. Use gdb_load_shlibs. (shlib_name): Delete. (lib_so, lib_syms, lib_dlopen): New globals. Use them throughout.
417 lines
9.2 KiB
C
417 lines
9.2 KiB
C
/* Copyright 2013-2014 Free Software Foundation, Inc.
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <limits.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/mman.h>
|
|
|
|
#include "sym-file-loader.h"
|
|
|
|
#ifdef TARGET_LP64
|
|
|
|
uint8_t
|
|
elf_st_type (uint8_t st_info)
|
|
{
|
|
return ELF64_ST_TYPE (st_info);
|
|
}
|
|
|
|
#elif defined TARGET_ILP32
|
|
|
|
uint8_t
|
|
elf_st_type (uint8_t st_info)
|
|
{
|
|
return ELF32_ST_TYPE (st_info);
|
|
}
|
|
|
|
#endif
|
|
|
|
/* Load a program segment. */
|
|
|
|
static struct segment *
|
|
load (uint8_t *addr, Elf_External_Phdr *phdr, struct segment *tail_seg)
|
|
{
|
|
struct segment *seg = NULL;
|
|
uint8_t *mapped_addr = NULL;
|
|
void *from = NULL;
|
|
void *to = NULL;
|
|
|
|
/* For the sake of simplicity all operations are permitted. */
|
|
unsigned perm = PROT_READ | PROT_WRITE | PROT_EXEC;
|
|
|
|
mapped_addr = (uint8_t *) mmap ((void *) GETADDR (phdr, p_vaddr),
|
|
GET (phdr, p_memsz), perm,
|
|
MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
|
|
|
|
from = (void *) (addr + GET (phdr, p_offset));
|
|
to = (void *) mapped_addr;
|
|
|
|
memcpy (to, from, GET (phdr, p_filesz));
|
|
|
|
seg = (struct segment *) malloc (sizeof (struct segment));
|
|
|
|
if (seg == 0)
|
|
return 0;
|
|
|
|
seg->mapped_addr = mapped_addr;
|
|
seg->phdr = phdr;
|
|
seg->next = 0;
|
|
|
|
if (tail_seg != 0)
|
|
tail_seg->next = seg;
|
|
|
|
return seg;
|
|
}
|
|
|
|
#ifdef __linux__
|
|
# define SELF_LINK "/proc/self/exe"
|
|
#elif defined NETBSD
|
|
# define SELK_LINK "/proc/curproc/exe"
|
|
#elif defined __OpenBSD__ || defined __FreeBSD__ || defined __DragonFly__
|
|
# define SELK_LINK "/proc/curproc/file"
|
|
#elif defined SunOS
|
|
# define SELK_LINK "/proc/self/path/a.out"
|
|
#endif
|
|
|
|
/* Like RPATH=$ORIGIN, return the dirname of the current
|
|
executable. */
|
|
|
|
static const char *
|
|
get_origin (void)
|
|
{
|
|
static char self_path[PATH_MAX];
|
|
static ssize_t self_path_len;
|
|
|
|
if (self_path_len == 0)
|
|
{
|
|
#ifdef SELF_LINK
|
|
self_path_len = readlink (SELF_LINK, self_path, PATH_MAX - 1);
|
|
if (self_path_len != -1)
|
|
{
|
|
char *dirsep;
|
|
|
|
self_path[self_path_len] = '\0';
|
|
dirsep = strrchr (self_path, '/');
|
|
*dirsep = '\0';
|
|
}
|
|
#else
|
|
self_path_len = -1;
|
|
#endif
|
|
}
|
|
|
|
if (self_path_len == -1)
|
|
return NULL;
|
|
else
|
|
return self_path;
|
|
}
|
|
|
|
/* Mini shared library loader. No reallocation
|
|
is performed for the sake of simplicity. */
|
|
|
|
int
|
|
load_shlib (const char *file, Elf_External_Ehdr **ehdr_out,
|
|
struct segment **seg_out)
|
|
{
|
|
uint64_t i;
|
|
int fd = -1;
|
|
off_t fsize;
|
|
uint8_t *addr;
|
|
Elf_External_Ehdr *ehdr;
|
|
Elf_External_Phdr *phdr;
|
|
struct segment *head_seg = NULL;
|
|
struct segment *tail_seg = NULL;
|
|
const char *origin;
|
|
char *path;
|
|
|
|
/* Map the lib in memory for reading.
|
|
|
|
If the file name is relative, try looking it up relative to the
|
|
main executable's path. I.e., emulate RPATH=$ORIGIN. */
|
|
if (file[0] != '/')
|
|
{
|
|
origin = get_origin ();
|
|
if (origin == NULL)
|
|
{
|
|
fprintf (stderr, "get_origin not implemented.");
|
|
return -1;
|
|
}
|
|
|
|
path = alloca (strlen (origin) + 1 + strlen (file) + 1);
|
|
sprintf (path, "%s/%s", origin, file);
|
|
fd = open (path, O_RDONLY);
|
|
}
|
|
|
|
if (fd < 0)
|
|
fd = open (file, O_RDONLY);
|
|
|
|
if (fd < 0)
|
|
{
|
|
perror ("fopen failed.");
|
|
return -1;
|
|
}
|
|
|
|
fsize = lseek (fd, 0, SEEK_END);
|
|
|
|
if (fsize < 0)
|
|
{
|
|
perror ("lseek failed.");
|
|
return -1;
|
|
}
|
|
|
|
addr = (uint8_t *) mmap (NULL, fsize, PROT_READ, MAP_PRIVATE, fd, 0);
|
|
if (addr == (uint8_t *) -1)
|
|
{
|
|
perror ("mmap failed.");
|
|
return -1;
|
|
}
|
|
|
|
/* Check if the lib is an ELF file. */
|
|
ehdr = (Elf_External_Ehdr *) addr;
|
|
if (ehdr->e_ident[EI_MAG0] != ELFMAG0
|
|
|| ehdr->e_ident[EI_MAG1] != ELFMAG1
|
|
|| ehdr->e_ident[EI_MAG2] != ELFMAG2
|
|
|| ehdr->e_ident[EI_MAG3] != ELFMAG3)
|
|
{
|
|
printf ("Not an ELF file: %x\n", ehdr->e_ident[EI_MAG0]);
|
|
return -1;
|
|
}
|
|
|
|
if (ehdr->e_ident[EI_CLASS] == ELFCLASS32)
|
|
{
|
|
if (sizeof (void *) != 4)
|
|
{
|
|
printf ("Architecture mismatch.");
|
|
return -1;
|
|
}
|
|
}
|
|
else if (ehdr->e_ident[EI_CLASS] == ELFCLASS64)
|
|
{
|
|
if (sizeof (void *) != 8)
|
|
{
|
|
printf ("Architecture mismatch.");
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
/* Load the program segments. For the sake of simplicity
|
|
assume that no reallocation is needed. */
|
|
phdr = (Elf_External_Phdr *) (addr + GET (ehdr, e_phoff));
|
|
for (i = 0; i < GET (ehdr, e_phnum); i++, phdr++)
|
|
{
|
|
if (GET (phdr, p_type) == PT_LOAD)
|
|
{
|
|
struct segment *next_seg = load (addr, phdr, tail_seg);
|
|
if (next_seg == 0)
|
|
continue;
|
|
tail_seg = next_seg;
|
|
if (head_seg == 0)
|
|
head_seg = next_seg;
|
|
}
|
|
}
|
|
*ehdr_out = ehdr;
|
|
*seg_out = head_seg;
|
|
return 0;
|
|
}
|
|
|
|
/* Return the section-header table. */
|
|
|
|
Elf_External_Shdr *
|
|
find_shdrtab (Elf_External_Ehdr *ehdr)
|
|
{
|
|
return (Elf_External_Shdr *) (((uint8_t *) ehdr) + GET (ehdr, e_shoff));
|
|
}
|
|
|
|
/* Return the string table of the section headers. */
|
|
|
|
const char *
|
|
find_shstrtab (Elf_External_Ehdr *ehdr, uint64_t *size)
|
|
{
|
|
const Elf_External_Shdr *shdr;
|
|
const Elf_External_Shdr *shstr;
|
|
|
|
if (GET (ehdr, e_shnum) <= GET (ehdr, e_shstrndx))
|
|
{
|
|
printf ("The index of the string table is corrupt.");
|
|
return NULL;
|
|
}
|
|
|
|
shdr = find_shdrtab (ehdr);
|
|
|
|
shstr = &shdr[GET (ehdr, e_shstrndx)];
|
|
*size = GET (shstr, sh_size);
|
|
return ((const char *) ehdr) + GET (shstr, sh_offset);
|
|
}
|
|
|
|
/* Return the string table named SECTION. */
|
|
|
|
const char *
|
|
find_strtab (Elf_External_Ehdr *ehdr,
|
|
const char *section, uint64_t *strtab_size)
|
|
{
|
|
uint64_t shstrtab_size = 0;
|
|
const char *shstrtab;
|
|
uint64_t i;
|
|
const Elf_External_Shdr *shdr = find_shdrtab (ehdr);
|
|
|
|
/* Get the string table of the section headers. */
|
|
shstrtab = find_shstrtab (ehdr, &shstrtab_size);
|
|
if (shstrtab == NULL)
|
|
return NULL;
|
|
|
|
for (i = 0; i < GET (ehdr, e_shnum); i++)
|
|
{
|
|
uint64_t name = GET (shdr + i, sh_name);
|
|
if (GET (shdr + i, sh_type) == SHT_STRTAB && name <= shstrtab_size
|
|
&& strcmp ((const char *) &shstrtab[name], section) == 0)
|
|
{
|
|
*strtab_size = GET (shdr + i, sh_size);
|
|
return ((const char *) ehdr) + GET (shdr + i, sh_offset);
|
|
}
|
|
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/* Return the section header named SECTION. */
|
|
|
|
Elf_External_Shdr *
|
|
find_shdr (Elf_External_Ehdr *ehdr, const char *section)
|
|
{
|
|
uint64_t shstrtab_size = 0;
|
|
const char *shstrtab;
|
|
uint64_t i;
|
|
|
|
/* Get the string table of the section headers. */
|
|
shstrtab = find_shstrtab (ehdr, &shstrtab_size);
|
|
if (shstrtab == NULL)
|
|
return NULL;
|
|
|
|
Elf_External_Shdr *shdr = find_shdrtab (ehdr);
|
|
for (i = 0; i < GET (ehdr, e_shnum); i++)
|
|
{
|
|
uint64_t name = GET (shdr + i, sh_name);
|
|
if (name <= shstrtab_size)
|
|
{
|
|
if (strcmp ((const char *) &shstrtab[name], section) == 0)
|
|
return &shdr[i];
|
|
}
|
|
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/* Return the symbol table. */
|
|
|
|
Elf_External_Sym *
|
|
find_symtab (Elf_External_Ehdr *ehdr, uint64_t *symtab_size)
|
|
{
|
|
uint64_t i;
|
|
const Elf_External_Shdr *shdr = find_shdrtab (ehdr);
|
|
|
|
for (i = 0; i < GET (ehdr, e_shnum); i++)
|
|
{
|
|
if (GET (shdr + i, sh_type) == SHT_SYMTAB)
|
|
{
|
|
*symtab_size = GET (shdr + i, sh_size) / sizeof (Elf_External_Sym);
|
|
return (Elf_External_Sym *) (((const char *) ehdr) +
|
|
GET (shdr + i, sh_offset));
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/* Translate a file offset to an address in a loaded segment. */
|
|
|
|
int
|
|
translate_offset (uint64_t file_offset, struct segment *seg, void **addr)
|
|
{
|
|
while (seg)
|
|
{
|
|
uint64_t p_from, p_to;
|
|
|
|
Elf_External_Phdr *phdr = seg->phdr;
|
|
|
|
if (phdr == NULL)
|
|
{
|
|
seg = seg->next;
|
|
continue;
|
|
}
|
|
|
|
p_from = GET (phdr, p_offset);
|
|
p_to = p_from + GET (phdr, p_filesz);
|
|
|
|
if (p_from <= file_offset && file_offset < p_to)
|
|
{
|
|
*addr = (void *) (seg->mapped_addr + (file_offset - p_from));
|
|
return 0;
|
|
}
|
|
seg = seg->next;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
/* Lookup the address of FUNC. */
|
|
|
|
int
|
|
lookup_function (const char *func,
|
|
Elf_External_Ehdr *ehdr, struct segment *seg, void **addr)
|
|
{
|
|
const char *strtab;
|
|
uint64_t strtab_size = 0;
|
|
Elf_External_Sym *symtab;
|
|
uint64_t symtab_size = 0;
|
|
uint64_t i;
|
|
|
|
/* Get the string table for the symbols. */
|
|
strtab = find_strtab (ehdr, ".strtab", &strtab_size);
|
|
if (strtab == NULL)
|
|
{
|
|
printf (".strtab not found.");
|
|
return -1;
|
|
}
|
|
|
|
/* Get the symbol table. */
|
|
symtab = find_symtab (ehdr, &symtab_size);
|
|
if (symtab == NULL)
|
|
{
|
|
printf ("symbol table not found.");
|
|
return -1;
|
|
}
|
|
|
|
for (i = 0; i < symtab_size; i++)
|
|
{
|
|
Elf_External_Sym *sym = &symtab[i];
|
|
|
|
if (elf_st_type (GET (sym, st_info)) != STT_FUNC)
|
|
continue;
|
|
|
|
if (GET (sym, st_name) < strtab_size)
|
|
{
|
|
const char *name = &strtab[GET (sym, st_name)];
|
|
if (strcmp (name, func) == 0)
|
|
{
|
|
|
|
uint64_t offset = GET (sym, st_value);
|
|
return translate_offset (offset, seg, addr);
|
|
}
|
|
}
|
|
}
|
|
|
|
return -1;
|
|
}
|