1998-08-24 08:25:26 +00:00
|
|
|
/*-
|
2017-11-27 15:20:12 +00:00
|
|
|
* SPDX-License-Identifier: BSD-2-Clause-FreeBSD
|
|
|
|
*
|
2000-04-24 17:08:04 +00:00
|
|
|
* Copyright (c) 1998-2000 Doug Rabson
|
2004-04-30 16:32:40 +00:00
|
|
|
* Copyright (c) 2004 Peter Wemm
|
1998-08-24 08:25:26 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2003-06-11 00:56:59 +00:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
2000-04-24 17:08:04 +00:00
|
|
|
#include "opt_ddb.h"
|
|
|
|
|
1998-08-24 08:25:26 +00:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
2020-09-08 23:38:49 +00:00
|
|
|
#include <sys/fcntl.h>
|
2001-05-01 08:13:21 +00:00
|
|
|
#include <sys/kernel.h>
|
|
|
|
#include <sys/lock.h>
|
1998-08-24 08:25:26 +00:00
|
|
|
#include <sys/malloc.h>
|
2020-09-08 23:38:49 +00:00
|
|
|
#include <sys/linker.h>
|
2001-06-03 02:19:07 +00:00
|
|
|
#include <sys/mutex.h>
|
2006-06-20 21:31:38 +00:00
|
|
|
#include <sys/mount.h>
|
1998-08-24 08:25:26 +00:00
|
|
|
#include <sys/namei.h>
|
2020-09-08 23:38:49 +00:00
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/rwlock.h>
|
1998-08-24 08:25:26 +00:00
|
|
|
#include <sys/vnode.h>
|
2001-05-01 08:13:21 +00:00
|
|
|
|
1998-08-24 08:25:26 +00:00
|
|
|
#include <machine/elf.h>
|
|
|
|
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
#include <net/vnet.h>
|
|
|
|
|
2006-10-22 11:52:19 +00:00
|
|
|
#include <security/mac/mac_framework.h>
|
|
|
|
|
1998-09-11 08:46:15 +00:00
|
|
|
#include <vm/vm.h>
|
|
|
|
#include <vm/vm_param.h>
|
|
|
|
#include <vm/pmap.h>
|
2020-09-08 23:38:49 +00:00
|
|
|
#include <vm/vm_extern.h>
|
|
|
|
#include <vm/vm_kern.h>
|
1998-09-11 08:46:15 +00:00
|
|
|
#include <vm/vm_map.h>
|
2020-09-08 23:38:49 +00:00
|
|
|
#include <vm/vm_object.h>
|
|
|
|
#include <vm/vm_page.h>
|
|
|
|
#include <vm/vm_pager.h>
|
2001-05-01 08:13:21 +00:00
|
|
|
|
2002-08-22 20:39:30 +00:00
|
|
|
#include <sys/link_elf.h>
|
1998-09-11 08:46:15 +00:00
|
|
|
|
2008-05-23 00:49:39 +00:00
|
|
|
#ifdef DDB_CTF
|
2019-08-08 07:27:49 +00:00
|
|
|
#include <contrib/zlib/zlib.h>
|
2008-05-23 00:49:39 +00:00
|
|
|
#endif
|
|
|
|
|
2000-04-24 17:08:04 +00:00
|
|
|
#include "linker_if.h"
|
1998-08-24 08:25:26 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
typedef struct {
|
|
|
|
void *addr;
|
2004-05-17 21:20:23 +00:00
|
|
|
Elf_Off size;
|
2019-10-18 13:53:14 +00:00
|
|
|
int flags; /* Section flags. */
|
|
|
|
int sec; /* Original section number. */
|
2004-04-30 16:32:40 +00:00
|
|
|
char *name;
|
|
|
|
} Elf_progent;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
Elf_Rel *rel;
|
2004-05-17 21:20:23 +00:00
|
|
|
int nrel;
|
2004-04-30 16:32:40 +00:00
|
|
|
int sec;
|
|
|
|
} Elf_relent;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
Elf_Rela *rela;
|
2004-05-17 21:20:23 +00:00
|
|
|
int nrela;
|
2004-04-30 16:32:40 +00:00
|
|
|
int sec;
|
|
|
|
} Elf_relaent;
|
|
|
|
|
1998-08-24 08:25:26 +00:00
|
|
|
typedef struct elf_file {
|
2004-04-30 16:32:40 +00:00
|
|
|
struct linker_file lf; /* Common fields */
|
2004-05-17 21:20:23 +00:00
|
|
|
|
2004-08-29 01:21:51 +00:00
|
|
|
int preloaded;
|
2004-04-30 16:32:40 +00:00
|
|
|
caddr_t address; /* Relocation address */
|
|
|
|
vm_object_t object; /* VM object to hold file pages */
|
|
|
|
Elf_Shdr *e_shdr;
|
|
|
|
|
|
|
|
Elf_progent *progtab;
|
2018-01-22 02:08:10 +00:00
|
|
|
u_int nprogtab;
|
2004-04-30 16:32:40 +00:00
|
|
|
|
|
|
|
Elf_relaent *relatab;
|
2018-01-22 02:08:10 +00:00
|
|
|
u_int nrelatab;
|
2004-04-30 16:32:40 +00:00
|
|
|
|
|
|
|
Elf_relent *reltab;
|
2008-07-11 14:48:28 +00:00
|
|
|
int nreltab;
|
2004-04-30 16:32:40 +00:00
|
|
|
|
|
|
|
Elf_Sym *ddbsymtab; /* The symbol table we are using */
|
|
|
|
long ddbsymcnt; /* Number of symbols */
|
|
|
|
caddr_t ddbstrtab; /* String table */
|
|
|
|
long ddbstrcnt; /* number of bytes in string table */
|
|
|
|
|
|
|
|
caddr_t shstrtab; /* Section name string table */
|
|
|
|
long shstrcnt; /* number of bytes in string table */
|
|
|
|
|
2008-05-23 00:49:39 +00:00
|
|
|
caddr_t ctftab; /* CTF table */
|
|
|
|
long ctfcnt; /* number of bytes in CTF table */
|
|
|
|
caddr_t ctfoff; /* CTF offset table */
|
|
|
|
caddr_t typoff; /* Type offset table */
|
|
|
|
long typlen; /* Number of type entries. */
|
|
|
|
|
1998-08-24 08:25:26 +00:00
|
|
|
} *elf_file_t;
|
|
|
|
|
2008-05-23 00:49:39 +00:00
|
|
|
#include <kern/kern_ctf.c>
|
|
|
|
|
2000-04-29 13:19:31 +00:00
|
|
|
static int link_elf_link_preload(linker_class_t cls,
|
2004-04-30 16:32:40 +00:00
|
|
|
const char *, linker_file_t *);
|
2000-04-29 13:19:31 +00:00
|
|
|
static int link_elf_link_preload_finish(linker_file_t);
|
2004-04-30 16:32:40 +00:00
|
|
|
static int link_elf_load_file(linker_class_t, const char *, linker_file_t *);
|
|
|
|
static int link_elf_lookup_symbol(linker_file_t, const char *,
|
|
|
|
c_linker_sym_t *);
|
|
|
|
static int link_elf_symbol_values(linker_file_t, c_linker_sym_t,
|
|
|
|
linker_symval_t *);
|
2000-04-24 17:08:04 +00:00
|
|
|
static int link_elf_search_symbol(linker_file_t, caddr_t value,
|
2004-04-30 16:32:40 +00:00
|
|
|
c_linker_sym_t *sym, long *diffp);
|
2000-04-24 17:08:04 +00:00
|
|
|
|
|
|
|
static void link_elf_unload_file(linker_file_t);
|
2001-06-13 10:58:39 +00:00
|
|
|
static int link_elf_lookup_set(linker_file_t, const char *,
|
2004-04-30 16:32:40 +00:00
|
|
|
void ***, void ***, int *);
|
2001-10-30 15:21:45 +00:00
|
|
|
static int link_elf_each_function_name(linker_file_t,
|
2004-04-30 16:32:40 +00:00
|
|
|
int (*)(const char *, void *), void *);
|
2008-05-23 00:49:39 +00:00
|
|
|
static int link_elf_each_function_nameval(linker_file_t,
|
|
|
|
linker_function_nameval_callback_t,
|
|
|
|
void *);
|
2018-08-07 18:26:46 +00:00
|
|
|
static int link_elf_reloc_local(linker_file_t, bool);
|
2009-06-11 17:05:45 +00:00
|
|
|
static long link_elf_symtab_get(linker_file_t, const Elf_Sym **);
|
2009-05-26 21:39:09 +00:00
|
|
|
static long link_elf_strtab_get(linker_file_t, caddr_t *);
|
2000-04-24 17:08:04 +00:00
|
|
|
|
2015-09-20 01:27:59 +00:00
|
|
|
static int elf_obj_lookup(linker_file_t lf, Elf_Size symidx, int deps,
|
|
|
|
Elf_Addr *);
|
2004-04-30 16:32:40 +00:00
|
|
|
|
2000-04-24 17:08:04 +00:00
|
|
|
static kobj_method_t link_elf_methods[] = {
|
2004-04-30 16:32:40 +00:00
|
|
|
KOBJMETHOD(linker_lookup_symbol, link_elf_lookup_symbol),
|
|
|
|
KOBJMETHOD(linker_symbol_values, link_elf_symbol_values),
|
|
|
|
KOBJMETHOD(linker_search_symbol, link_elf_search_symbol),
|
|
|
|
KOBJMETHOD(linker_unload, link_elf_unload_file),
|
|
|
|
KOBJMETHOD(linker_load_file, link_elf_load_file),
|
|
|
|
KOBJMETHOD(linker_link_preload, link_elf_link_preload),
|
|
|
|
KOBJMETHOD(linker_link_preload_finish, link_elf_link_preload_finish),
|
|
|
|
KOBJMETHOD(linker_lookup_set, link_elf_lookup_set),
|
|
|
|
KOBJMETHOD(linker_each_function_name, link_elf_each_function_name),
|
2008-05-23 00:49:39 +00:00
|
|
|
KOBJMETHOD(linker_each_function_nameval, link_elf_each_function_nameval),
|
|
|
|
KOBJMETHOD(linker_ctf_get, link_elf_ctf_get),
|
2009-05-26 21:39:09 +00:00
|
|
|
KOBJMETHOD(linker_symtab_get, link_elf_symtab_get),
|
|
|
|
KOBJMETHOD(linker_strtab_get, link_elf_strtab_get),
|
2019-10-16 22:06:19 +00:00
|
|
|
KOBJMETHOD_END
|
2000-04-24 17:08:04 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static struct linker_class link_elf_class = {
|
|
|
|
#if ELF_TARG_CLASS == ELFCLASS32
|
2004-04-30 16:32:40 +00:00
|
|
|
"elf32_obj",
|
2000-04-24 17:08:04 +00:00
|
|
|
#else
|
2004-04-30 16:32:40 +00:00
|
|
|
"elf64_obj",
|
2000-04-24 17:08:04 +00:00
|
|
|
#endif
|
2004-04-30 16:32:40 +00:00
|
|
|
link_elf_methods, sizeof(struct elf_file)
|
2000-04-24 17:08:04 +00:00
|
|
|
};
|
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
static int relocate_file(elf_file_t ef);
|
2015-04-02 20:14:51 +00:00
|
|
|
static void elf_obj_cleanup_globals_cache(elf_file_t);
|
2000-04-24 17:08:04 +00:00
|
|
|
|
2002-09-28 17:15:38 +00:00
|
|
|
static void
|
2008-07-08 23:51:38 +00:00
|
|
|
link_elf_error(const char *filename, const char *s)
|
2000-04-24 17:08:04 +00:00
|
|
|
{
|
2008-07-08 23:51:38 +00:00
|
|
|
if (filename == NULL)
|
|
|
|
printf("kldload: %s\n", s);
|
|
|
|
else
|
|
|
|
printf("kldload: %s: %s\n", filename, s);
|
2000-04-24 17:08:04 +00:00
|
|
|
}
|
|
|
|
|
2002-10-19 18:43:37 +00:00
|
|
|
static void
|
2004-04-30 16:32:40 +00:00
|
|
|
link_elf_init(void *arg)
|
2002-10-19 18:43:37 +00:00
|
|
|
{
|
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
linker_add_class(&link_elf_class);
|
2002-10-19 18:43:37 +00:00
|
|
|
}
|
2018-05-18 17:58:09 +00:00
|
|
|
SYSINIT(link_elf_obj, SI_SUB_KLD, SI_ORDER_SECOND, link_elf_init, NULL);
|
2002-10-19 18:43:37 +00:00
|
|
|
|
2019-10-18 13:53:14 +00:00
|
|
|
static void
|
|
|
|
link_elf_protect_range(elf_file_t ef, vm_offset_t start, vm_offset_t end,
|
|
|
|
vm_prot_t prot)
|
|
|
|
{
|
|
|
|
int error __unused;
|
|
|
|
|
|
|
|
KASSERT(start <= end && start >= (vm_offset_t)ef->address &&
|
|
|
|
end <= round_page((vm_offset_t)ef->address + ef->lf.size),
|
|
|
|
("link_elf_protect_range: invalid range %#jx-%#jx",
|
|
|
|
(uintmax_t)start, (uintmax_t)end));
|
|
|
|
|
|
|
|
if (start == end)
|
|
|
|
return;
|
2019-10-18 13:56:45 +00:00
|
|
|
if (ef->preloaded) {
|
|
|
|
#ifdef __amd64__
|
|
|
|
error = pmap_change_prot(start, end - start, prot);
|
|
|
|
KASSERT(error == 0,
|
|
|
|
("link_elf_protect_range: pmap_change_prot() returned %d",
|
|
|
|
error));
|
|
|
|
#endif
|
|
|
|
return;
|
|
|
|
}
|
2021-01-12 12:43:39 +00:00
|
|
|
error = vm_map_protect(kernel_map, start, end, prot, 0,
|
|
|
|
VM_MAP_PROTECT_SET_PROT);
|
2019-10-18 13:53:14 +00:00
|
|
|
KASSERT(error == KERN_SUCCESS,
|
|
|
|
("link_elf_protect_range: vm_map_protect() returned %d", error));
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Restrict permissions on linker file memory based on section flags.
|
|
|
|
* Sections need not be page-aligned, so overlap within a page is possible.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
link_elf_protect(elf_file_t ef)
|
|
|
|
{
|
|
|
|
vm_offset_t end, segend, segstart, start;
|
|
|
|
vm_prot_t gapprot, prot, segprot;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the file was preloaded, the last page may contain other preloaded
|
|
|
|
* data which may need to be writeable. ELF files are always
|
|
|
|
* page-aligned, but other preloaded data, such as entropy or CPU
|
|
|
|
* microcode may be loaded with a smaller alignment.
|
|
|
|
*/
|
|
|
|
gapprot = ef->preloaded ? VM_PROT_RW : VM_PROT_READ;
|
|
|
|
|
|
|
|
start = end = (vm_offset_t)ef->address;
|
|
|
|
prot = VM_PROT_READ;
|
|
|
|
for (i = 0; i < ef->nprogtab; i++) {
|
|
|
|
/*
|
|
|
|
* VNET and DPCPU sections have their memory allocated by their
|
|
|
|
* respective subsystems.
|
|
|
|
*/
|
|
|
|
if (ef->progtab[i].name != NULL && (
|
|
|
|
#ifdef VIMAGE
|
|
|
|
strcmp(ef->progtab[i].name, VNET_SETNAME) == 0 ||
|
|
|
|
#endif
|
|
|
|
strcmp(ef->progtab[i].name, DPCPU_SETNAME) == 0))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
segstart = trunc_page((vm_offset_t)ef->progtab[i].addr);
|
|
|
|
segend = round_page((vm_offset_t)ef->progtab[i].addr +
|
|
|
|
ef->progtab[i].size);
|
|
|
|
segprot = VM_PROT_READ;
|
|
|
|
if ((ef->progtab[i].flags & SHF_WRITE) != 0)
|
|
|
|
segprot |= VM_PROT_WRITE;
|
|
|
|
if ((ef->progtab[i].flags & SHF_EXECINSTR) != 0)
|
|
|
|
segprot |= VM_PROT_EXECUTE;
|
|
|
|
|
|
|
|
if (end <= segstart) {
|
|
|
|
/*
|
|
|
|
* Case 1: there is no overlap between the previous
|
|
|
|
* segment and this one. Apply protections to the
|
|
|
|
* previous segment, and protect the gap between the
|
|
|
|
* previous and current segments, if any.
|
|
|
|
*/
|
|
|
|
link_elf_protect_range(ef, start, end, prot);
|
|
|
|
link_elf_protect_range(ef, end, segstart, gapprot);
|
|
|
|
|
|
|
|
start = segstart;
|
|
|
|
end = segend;
|
|
|
|
prot = segprot;
|
|
|
|
} else if (start < segstart && end == segend) {
|
|
|
|
/*
|
|
|
|
* Case 2: the current segment is a subrange of the
|
|
|
|
* previous segment. Apply protections to the
|
|
|
|
* non-overlapping portion of the previous segment.
|
|
|
|
*/
|
|
|
|
link_elf_protect_range(ef, start, segstart, prot);
|
|
|
|
|
|
|
|
start = segstart;
|
|
|
|
prot |= segprot;
|
|
|
|
} else if (end < segend) {
|
|
|
|
/*
|
|
|
|
* Case 3: there is partial overlap between the previous
|
|
|
|
* and current segments. Apply protections to the
|
|
|
|
* non-overlapping portion of the previous segment, and
|
|
|
|
* then the overlap, which must use the union of the two
|
|
|
|
* segments' protections.
|
|
|
|
*/
|
|
|
|
link_elf_protect_range(ef, start, segstart, prot);
|
|
|
|
link_elf_protect_range(ef, segstart, end,
|
|
|
|
prot | segprot);
|
|
|
|
start = end;
|
|
|
|
end = segend;
|
|
|
|
prot = segprot;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Case 4: the two segments reside in the same page.
|
|
|
|
*/
|
|
|
|
prot |= segprot;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Fix up the last unprotected segment and trailing data.
|
|
|
|
*/
|
|
|
|
link_elf_protect_range(ef, start, end, prot);
|
|
|
|
link_elf_protect_range(ef, end,
|
|
|
|
round_page((vm_offset_t)ef->address + ef->lf.size), gapprot);
|
|
|
|
}
|
|
|
|
|
2002-10-19 18:59:33 +00:00
|
|
|
static int
|
2004-04-30 16:32:40 +00:00
|
|
|
link_elf_link_preload(linker_class_t cls, const char *filename,
|
|
|
|
linker_file_t *result)
|
1998-08-24 08:25:26 +00:00
|
|
|
{
|
2004-08-29 01:21:51 +00:00
|
|
|
Elf_Ehdr *hdr;
|
|
|
|
Elf_Shdr *shdr;
|
|
|
|
Elf_Sym *es;
|
|
|
|
void *modptr, *baseptr, *sizeptr;
|
|
|
|
char *type;
|
|
|
|
elf_file_t ef;
|
|
|
|
linker_file_t lf;
|
|
|
|
Elf_Addr off;
|
|
|
|
int error, i, j, pb, ra, rl, shstrindex, symstrindex, symtabindex;
|
|
|
|
|
|
|
|
/* Look to see if we have the file preloaded */
|
|
|
|
modptr = preload_search_by_name(filename);
|
|
|
|
if (modptr == NULL)
|
|
|
|
return ENOENT;
|
|
|
|
|
|
|
|
type = (char *)preload_search_info(modptr, MODINFO_TYPE);
|
|
|
|
baseptr = preload_search_info(modptr, MODINFO_ADDR);
|
|
|
|
sizeptr = preload_search_info(modptr, MODINFO_SIZE);
|
|
|
|
hdr = (Elf_Ehdr *)preload_search_info(modptr, MODINFO_METADATA |
|
|
|
|
MODINFOMD_ELFHDR);
|
|
|
|
shdr = (Elf_Shdr *)preload_search_info(modptr, MODINFO_METADATA |
|
|
|
|
MODINFOMD_SHDR);
|
|
|
|
if (type == NULL || (strcmp(type, "elf" __XSTRING(__ELF_WORD_SIZE)
|
|
|
|
" obj module") != 0 &&
|
|
|
|
strcmp(type, "elf obj module") != 0)) {
|
|
|
|
return (EFTYPE);
|
|
|
|
}
|
|
|
|
if (baseptr == NULL || sizeptr == NULL || hdr == NULL ||
|
|
|
|
shdr == NULL)
|
|
|
|
return (EINVAL);
|
|
|
|
|
|
|
|
lf = linker_make_file(filename, &link_elf_class);
|
|
|
|
if (lf == NULL)
|
|
|
|
return (ENOMEM);
|
|
|
|
|
|
|
|
ef = (elf_file_t)lf;
|
|
|
|
ef->preloaded = 1;
|
|
|
|
ef->address = *(caddr_t *)baseptr;
|
|
|
|
lf->address = *(caddr_t *)baseptr;
|
|
|
|
lf->size = *(size_t *)sizeptr;
|
|
|
|
|
|
|
|
if (hdr->e_ident[EI_CLASS] != ELF_TARG_CLASS ||
|
|
|
|
hdr->e_ident[EI_DATA] != ELF_TARG_DATA ||
|
|
|
|
hdr->e_ident[EI_VERSION] != EV_CURRENT ||
|
|
|
|
hdr->e_version != EV_CURRENT ||
|
|
|
|
hdr->e_type != ET_REL ||
|
|
|
|
hdr->e_machine != ELF_TARG_MACH) {
|
|
|
|
error = EFTYPE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
ef->e_shdr = shdr;
|
|
|
|
|
|
|
|
/* Scan the section header for information and table sizing. */
|
|
|
|
symtabindex = -1;
|
|
|
|
symstrindex = -1;
|
|
|
|
for (i = 0; i < hdr->e_shnum; i++) {
|
|
|
|
switch (shdr[i].sh_type) {
|
|
|
|
case SHT_PROGBITS:
|
|
|
|
case SHT_NOBITS:
|
2016-03-06 00:31:11 +00:00
|
|
|
#ifdef __amd64__
|
2016-04-08 10:23:48 +00:00
|
|
|
case SHT_X86_64_UNWIND:
|
2016-03-06 00:31:11 +00:00
|
|
|
#endif
|
2021-03-04 15:02:47 +00:00
|
|
|
case SHT_INIT_ARRAY:
|
|
|
|
case SHT_FINI_ARRAY:
|
Require the SHF_ALLOC flag for program sections from kernel object modules.
ELF object files can contain program sections which are not supposed
to be loaded into memory (e.g. .comment). Normally the static linker
uses these flags to decide which sections are allocated to loadable
program segments in ELF binaries and shared objects (including kernels
on all architectures and kernel modules on architectures other than
amd64).
Mapping ELF object files (such as amd64 kernel modules) into memory
directly is a bit of a grey area. ELF object files are intended to be
used as inputs to the static linker. As a result, there is not a
standardized definition for what the memory layout of an ELF object
should be (none of the section headers have valid virtual memory
addresses for example).
The kernel and loader were not checking the SHF_ALLOC flag but loading
any program sections with certain types such as SHT_PROGBITS. As a
result, the kernel and loader would load into RAM some sections that
weren't marked with SHF_ALLOC such as .comment that are not loaded
into RAM for kernel modules on other architectures (which are
implemented as ELF shared objects). Aside from possibly requiring
slightly more RAM to hold a kernel module this does not affect runtime
correctness as the kernel relocates symbols based on the layout it
uses.
Debuggers such as gdb and lldb do not extract symbol tables from a
running process or kernel. Instead, they replicate the memory layout
of ELF executables and shared objects and use that to construct their
own symbol tables. For executables and shared objects this works
fine. For ELF objects the current logic in kgdb (and probably lldb
based on a simple reading) assumes that only sections with SHF_ALLOC
are memory resident when constructing a memory layout. If the
debugger constructs a different memory layout than the kernel, then it
will compute different addresses for symbols causing symbols in the
debugger to appear to have the wrong values (though the kernel itself
is working fine). The current port of mdb does not check SHF_ALLOC as
it replicates the kernel's logic in its existing kernel support.
The bfd linker sorts the sections in ELF object files such that all of
the allocated sections (sections with SHF_ALLOCATED) are placed first
followed by unallocated sections. As a result, when kgdb composed a
memory layout using only the allocated sections, this layout happened
to match the layout used by the kernel and loader. The lld linker
does not sort the sections in ELF object files and mixed allocated and
unallocated sections. This resulted in kgdb composing a different
memory layout than the kernel and loader.
We could either patch kgdb (and possibly in the future lldb) to use
custom handling when generating memory layouts for kernel modules that
are ELF objects, or we could change the kernel and loader to check
SHF_ALLOCATED. I chose the latter as I feel we shouldn't be loading
things into RAM that the module won't use. This should mostly be a
NOP when linking with bfd but will allow the existing kgdb to work
with amd64 kernel modules linked with lld.
Note that we only require SHF_ALLOC for "program" sections for types
like SHT_PROGBITS and SHT_NOBITS. Other section types such as symbol
tables, string tables, and relocations must also be loaded and are not
marked with SHF_ALLOC.
Reported by: np
Reviewed by: kib, emaste
MFC after: 1 month
Sponsored by: Chelsio Communications
Differential Revision: https://reviews.freebsd.org/D13926
2018-01-17 22:51:59 +00:00
|
|
|
/* Ignore sections not loaded by the loader. */
|
|
|
|
if (shdr[i].sh_addr == 0)
|
|
|
|
break;
|
2004-08-29 01:21:51 +00:00
|
|
|
ef->nprogtab++;
|
|
|
|
break;
|
|
|
|
case SHT_SYMTAB:
|
|
|
|
symtabindex = i;
|
|
|
|
symstrindex = shdr[i].sh_link;
|
|
|
|
break;
|
|
|
|
case SHT_REL:
|
2018-02-05 23:35:33 +00:00
|
|
|
/*
|
|
|
|
* Ignore relocation tables for sections not
|
|
|
|
* loaded by the loader.
|
|
|
|
*/
|
|
|
|
if (shdr[shdr[i].sh_info].sh_addr == 0)
|
|
|
|
break;
|
2008-07-11 14:48:28 +00:00
|
|
|
ef->nreltab++;
|
2004-08-29 01:21:51 +00:00
|
|
|
break;
|
|
|
|
case SHT_RELA:
|
2018-02-05 23:35:33 +00:00
|
|
|
if (shdr[shdr[i].sh_info].sh_addr == 0)
|
|
|
|
break;
|
2008-07-11 14:48:28 +00:00
|
|
|
ef->nrelatab++;
|
2004-08-29 01:21:51 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
shstrindex = hdr->e_shstrndx;
|
|
|
|
if (ef->nprogtab == 0 || symstrindex < 0 ||
|
|
|
|
symstrindex >= hdr->e_shnum ||
|
|
|
|
shdr[symstrindex].sh_type != SHT_STRTAB || shstrindex == 0 ||
|
|
|
|
shstrindex >= hdr->e_shnum ||
|
|
|
|
shdr[shstrindex].sh_type != SHT_STRTAB) {
|
|
|
|
printf("%s: bad/missing section headers\n", filename);
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Allocate space for tracking the load chunks */
|
|
|
|
if (ef->nprogtab != 0)
|
|
|
|
ef->progtab = malloc(ef->nprogtab * sizeof(*ef->progtab),
|
|
|
|
M_LINKER, M_WAITOK | M_ZERO);
|
2008-07-11 14:48:28 +00:00
|
|
|
if (ef->nreltab != 0)
|
|
|
|
ef->reltab = malloc(ef->nreltab * sizeof(*ef->reltab),
|
|
|
|
M_LINKER, M_WAITOK | M_ZERO);
|
|
|
|
if (ef->nrelatab != 0)
|
|
|
|
ef->relatab = malloc(ef->nrelatab * sizeof(*ef->relatab),
|
|
|
|
M_LINKER, M_WAITOK | M_ZERO);
|
2004-08-29 01:21:51 +00:00
|
|
|
if ((ef->nprogtab != 0 && ef->progtab == NULL) ||
|
2008-07-11 14:48:28 +00:00
|
|
|
(ef->nreltab != 0 && ef->reltab == NULL) ||
|
|
|
|
(ef->nrelatab != 0 && ef->relatab == NULL)) {
|
2004-08-29 01:21:51 +00:00
|
|
|
error = ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* XXX, relocate the sh_addr fields saved by the loader. */
|
|
|
|
off = 0;
|
|
|
|
for (i = 0; i < hdr->e_shnum; i++) {
|
|
|
|
if (shdr[i].sh_addr != 0 && (off == 0 || shdr[i].sh_addr < off))
|
|
|
|
off = shdr[i].sh_addr;
|
|
|
|
}
|
|
|
|
for (i = 0; i < hdr->e_shnum; i++) {
|
|
|
|
if (shdr[i].sh_addr != 0)
|
|
|
|
shdr[i].sh_addr = shdr[i].sh_addr - off +
|
|
|
|
(Elf_Addr)ef->address;
|
|
|
|
}
|
|
|
|
|
|
|
|
ef->ddbsymcnt = shdr[symtabindex].sh_size / sizeof(Elf_Sym);
|
|
|
|
ef->ddbsymtab = (Elf_Sym *)shdr[symtabindex].sh_addr;
|
|
|
|
ef->ddbstrcnt = shdr[symstrindex].sh_size;
|
|
|
|
ef->ddbstrtab = (char *)shdr[symstrindex].sh_addr;
|
|
|
|
ef->shstrcnt = shdr[shstrindex].sh_size;
|
|
|
|
ef->shstrtab = (char *)shdr[shstrindex].sh_addr;
|
|
|
|
|
|
|
|
/* Now fill out progtab and the relocation tables. */
|
|
|
|
pb = 0;
|
|
|
|
rl = 0;
|
|
|
|
ra = 0;
|
|
|
|
for (i = 0; i < hdr->e_shnum; i++) {
|
|
|
|
switch (shdr[i].sh_type) {
|
|
|
|
case SHT_PROGBITS:
|
|
|
|
case SHT_NOBITS:
|
2016-03-06 00:31:11 +00:00
|
|
|
#ifdef __amd64__
|
2016-04-08 10:23:48 +00:00
|
|
|
case SHT_X86_64_UNWIND:
|
2016-03-06 00:31:11 +00:00
|
|
|
#endif
|
2021-03-16 19:01:41 +00:00
|
|
|
case SHT_INIT_ARRAY:
|
2021-03-04 15:02:47 +00:00
|
|
|
case SHT_FINI_ARRAY:
|
Require the SHF_ALLOC flag for program sections from kernel object modules.
ELF object files can contain program sections which are not supposed
to be loaded into memory (e.g. .comment). Normally the static linker
uses these flags to decide which sections are allocated to loadable
program segments in ELF binaries and shared objects (including kernels
on all architectures and kernel modules on architectures other than
amd64).
Mapping ELF object files (such as amd64 kernel modules) into memory
directly is a bit of a grey area. ELF object files are intended to be
used as inputs to the static linker. As a result, there is not a
standardized definition for what the memory layout of an ELF object
should be (none of the section headers have valid virtual memory
addresses for example).
The kernel and loader were not checking the SHF_ALLOC flag but loading
any program sections with certain types such as SHT_PROGBITS. As a
result, the kernel and loader would load into RAM some sections that
weren't marked with SHF_ALLOC such as .comment that are not loaded
into RAM for kernel modules on other architectures (which are
implemented as ELF shared objects). Aside from possibly requiring
slightly more RAM to hold a kernel module this does not affect runtime
correctness as the kernel relocates symbols based on the layout it
uses.
Debuggers such as gdb and lldb do not extract symbol tables from a
running process or kernel. Instead, they replicate the memory layout
of ELF executables and shared objects and use that to construct their
own symbol tables. For executables and shared objects this works
fine. For ELF objects the current logic in kgdb (and probably lldb
based on a simple reading) assumes that only sections with SHF_ALLOC
are memory resident when constructing a memory layout. If the
debugger constructs a different memory layout than the kernel, then it
will compute different addresses for symbols causing symbols in the
debugger to appear to have the wrong values (though the kernel itself
is working fine). The current port of mdb does not check SHF_ALLOC as
it replicates the kernel's logic in its existing kernel support.
The bfd linker sorts the sections in ELF object files such that all of
the allocated sections (sections with SHF_ALLOCATED) are placed first
followed by unallocated sections. As a result, when kgdb composed a
memory layout using only the allocated sections, this layout happened
to match the layout used by the kernel and loader. The lld linker
does not sort the sections in ELF object files and mixed allocated and
unallocated sections. This resulted in kgdb composing a different
memory layout than the kernel and loader.
We could either patch kgdb (and possibly in the future lldb) to use
custom handling when generating memory layouts for kernel modules that
are ELF objects, or we could change the kernel and loader to check
SHF_ALLOCATED. I chose the latter as I feel we shouldn't be loading
things into RAM that the module won't use. This should mostly be a
NOP when linking with bfd but will allow the existing kgdb to work
with amd64 kernel modules linked with lld.
Note that we only require SHF_ALLOC for "program" sections for types
like SHT_PROGBITS and SHT_NOBITS. Other section types such as symbol
tables, string tables, and relocations must also be loaded and are not
marked with SHF_ALLOC.
Reported by: np
Reviewed by: kib, emaste
MFC after: 1 month
Sponsored by: Chelsio Communications
Differential Revision: https://reviews.freebsd.org/D13926
2018-01-17 22:51:59 +00:00
|
|
|
if (shdr[i].sh_addr == 0)
|
|
|
|
break;
|
2004-08-29 01:21:51 +00:00
|
|
|
ef->progtab[pb].addr = (void *)shdr[i].sh_addr;
|
|
|
|
if (shdr[i].sh_type == SHT_PROGBITS)
|
|
|
|
ef->progtab[pb].name = "<<PROGBITS>>";
|
2016-03-06 00:31:11 +00:00
|
|
|
#ifdef __amd64__
|
2016-04-08 10:23:48 +00:00
|
|
|
else if (shdr[i].sh_type == SHT_X86_64_UNWIND)
|
2016-03-06 00:31:11 +00:00
|
|
|
ef->progtab[pb].name = "<<UNWIND>>";
|
|
|
|
#endif
|
2021-03-04 15:02:47 +00:00
|
|
|
else if (shdr[i].sh_type == SHT_INIT_ARRAY)
|
|
|
|
ef->progtab[pb].name = "<<INIT_ARRAY>>";
|
|
|
|
else if (shdr[i].sh_type == SHT_FINI_ARRAY)
|
|
|
|
ef->progtab[pb].name = "<<FINI_ARRAY>>";
|
2004-08-29 01:21:51 +00:00
|
|
|
else
|
|
|
|
ef->progtab[pb].name = "<<NOBITS>>";
|
|
|
|
ef->progtab[pb].size = shdr[i].sh_size;
|
2019-10-18 13:53:14 +00:00
|
|
|
ef->progtab[pb].flags = shdr[i].sh_flags;
|
2004-08-29 01:21:51 +00:00
|
|
|
ef->progtab[pb].sec = i;
|
|
|
|
if (ef->shstrtab && shdr[i].sh_name != 0)
|
|
|
|
ef->progtab[pb].name =
|
|
|
|
ef->shstrtab + shdr[i].sh_name;
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
if (ef->progtab[pb].name != NULL &&
|
2010-11-14 20:14:25 +00:00
|
|
|
!strcmp(ef->progtab[pb].name, DPCPU_SETNAME)) {
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
void *dpcpu;
|
|
|
|
|
|
|
|
dpcpu = dpcpu_alloc(shdr[i].sh_size);
|
|
|
|
if (dpcpu == NULL) {
|
2018-10-30 20:51:03 +00:00
|
|
|
printf("%s: pcpu module space is out "
|
2018-10-30 21:35:56 +00:00
|
|
|
"of space; cannot allocate %#jx "
|
|
|
|
"for %s\n", __func__,
|
|
|
|
(uintmax_t)shdr[i].sh_size,
|
2018-10-30 20:51:03 +00:00
|
|
|
filename);
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
error = ENOSPC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
memcpy(dpcpu, ef->progtab[pb].addr,
|
|
|
|
ef->progtab[pb].size);
|
|
|
|
dpcpu_copy(dpcpu, shdr[i].sh_size);
|
|
|
|
ef->progtab[pb].addr = dpcpu;
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
#ifdef VIMAGE
|
|
|
|
} else if (ef->progtab[pb].name != NULL &&
|
2009-07-20 07:50:50 +00:00
|
|
|
!strcmp(ef->progtab[pb].name, VNET_SETNAME)) {
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
void *vnet_data;
|
|
|
|
|
|
|
|
vnet_data = vnet_data_alloc(shdr[i].sh_size);
|
|
|
|
if (vnet_data == NULL) {
|
2018-10-30 20:51:03 +00:00
|
|
|
printf("%s: vnet module space is out "
|
2018-10-30 21:35:56 +00:00
|
|
|
"of space; cannot allocate %#jx "
|
|
|
|
"for %s\n", __func__,
|
|
|
|
(uintmax_t)shdr[i].sh_size,
|
2018-10-30 20:51:03 +00:00
|
|
|
filename);
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
error = ENOSPC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
memcpy(vnet_data, ef->progtab[pb].addr,
|
|
|
|
ef->progtab[pb].size);
|
|
|
|
vnet_data_copy(vnet_data, shdr[i].sh_size);
|
|
|
|
ef->progtab[pb].addr = vnet_data;
|
|
|
|
#endif
|
2021-03-04 15:02:47 +00:00
|
|
|
} else if ((ef->progtab[pb].name != NULL &&
|
|
|
|
strcmp(ef->progtab[pb].name, ".ctors") == 0) ||
|
|
|
|
shdr[i].sh_type == SHT_INIT_ARRAY) {
|
|
|
|
if (lf->ctors_addr != 0) {
|
|
|
|
printf(
|
|
|
|
"%s: multiple ctor sections in %s\n",
|
|
|
|
__func__, filename);
|
|
|
|
} else {
|
|
|
|
lf->ctors_addr = ef->progtab[pb].addr;
|
|
|
|
lf->ctors_size = shdr[i].sh_size;
|
|
|
|
}
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
}
|
2004-08-29 01:21:51 +00:00
|
|
|
|
|
|
|
/* Update all symbol values with the offset. */
|
|
|
|
for (j = 0; j < ef->ddbsymcnt; j++) {
|
|
|
|
es = &ef->ddbsymtab[j];
|
|
|
|
if (es->st_shndx != i)
|
|
|
|
continue;
|
|
|
|
es->st_value += (Elf_Addr)ef->progtab[pb].addr;
|
|
|
|
}
|
|
|
|
pb++;
|
|
|
|
break;
|
|
|
|
case SHT_REL:
|
2018-02-05 23:35:33 +00:00
|
|
|
if (shdr[shdr[i].sh_info].sh_addr == 0)
|
|
|
|
break;
|
2004-08-29 01:21:51 +00:00
|
|
|
ef->reltab[rl].rel = (Elf_Rel *)shdr[i].sh_addr;
|
|
|
|
ef->reltab[rl].nrel = shdr[i].sh_size / sizeof(Elf_Rel);
|
|
|
|
ef->reltab[rl].sec = shdr[i].sh_info;
|
|
|
|
rl++;
|
|
|
|
break;
|
|
|
|
case SHT_RELA:
|
2018-02-05 23:35:33 +00:00
|
|
|
if (shdr[shdr[i].sh_info].sh_addr == 0)
|
|
|
|
break;
|
2004-08-29 01:21:51 +00:00
|
|
|
ef->relatab[ra].rela = (Elf_Rela *)shdr[i].sh_addr;
|
|
|
|
ef->relatab[ra].nrela =
|
|
|
|
shdr[i].sh_size / sizeof(Elf_Rela);
|
|
|
|
ef->relatab[ra].sec = shdr[i].sh_info;
|
|
|
|
ra++;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2016-03-07 18:44:06 +00:00
|
|
|
if (pb != ef->nprogtab) {
|
|
|
|
printf("%s: lost progbits\n", filename);
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (rl != ef->nreltab) {
|
|
|
|
printf("%s: lost reltab\n", filename);
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (ra != ef->nrelatab) {
|
|
|
|
printf("%s: lost relatab\n", filename);
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
2004-08-29 01:21:51 +00:00
|
|
|
|
2019-10-18 13:56:45 +00:00
|
|
|
/*
|
|
|
|
* The file needs to be writeable and executable while applying
|
|
|
|
* relocations. Mapping protections are applied once relocation
|
|
|
|
* processing is complete.
|
|
|
|
*/
|
|
|
|
link_elf_protect_range(ef, (vm_offset_t)ef->address,
|
|
|
|
round_page((vm_offset_t)ef->address + ef->lf.size), VM_PROT_ALL);
|
|
|
|
|
2004-08-29 01:21:51 +00:00
|
|
|
/* Local intra-module relocations */
|
2018-08-07 18:26:46 +00:00
|
|
|
error = link_elf_reloc_local(lf, false);
|
2016-03-07 18:44:06 +00:00
|
|
|
if (error != 0)
|
|
|
|
goto out;
|
2004-08-29 01:21:51 +00:00
|
|
|
*result = lf;
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
out:
|
2004-04-30 16:32:40 +00:00
|
|
|
/* preload not done this way */
|
2004-08-29 01:21:51 +00:00
|
|
|
linker_file_unload(lf, LINKER_UNLOAD_FORCE);
|
|
|
|
return (error);
|
1998-08-24 08:25:26 +00:00
|
|
|
}
|
|
|
|
|
2014-10-20 17:04:03 +00:00
|
|
|
static void
|
|
|
|
link_elf_invoke_ctors(caddr_t addr, size_t size)
|
|
|
|
{
|
|
|
|
void (**ctor)(void);
|
|
|
|
size_t i, cnt;
|
|
|
|
|
|
|
|
if (addr == NULL || size == 0)
|
|
|
|
return;
|
|
|
|
cnt = size / sizeof(*ctor);
|
|
|
|
ctor = (void *)addr;
|
|
|
|
for (i = 0; i < cnt; i++) {
|
|
|
|
if (ctor[i] != NULL)
|
|
|
|
(*ctor[i])();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1998-10-12 09:13:50 +00:00
|
|
|
static int
|
2004-04-30 16:32:40 +00:00
|
|
|
link_elf_link_preload_finish(linker_file_t lf)
|
1998-10-12 09:13:50 +00:00
|
|
|
{
|
2004-08-29 01:21:51 +00:00
|
|
|
elf_file_t ef;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
ef = (elf_file_t)lf;
|
|
|
|
error = relocate_file(ef);
|
|
|
|
if (error)
|
2018-08-07 18:26:46 +00:00
|
|
|
return (error);
|
2004-08-29 01:21:51 +00:00
|
|
|
|
|
|
|
/* Notify MD code that a module is being loaded. */
|
|
|
|
error = elf_cpu_load_file(lf);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
2018-08-07 20:43:50 +00:00
|
|
|
#if defined(__i386__) || defined(__amd64__)
|
2018-08-07 18:26:46 +00:00
|
|
|
/* Now ifuncs. */
|
|
|
|
error = link_elf_reloc_local(lf, true);
|
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
2018-08-07 20:43:50 +00:00
|
|
|
#endif
|
2018-08-07 18:26:46 +00:00
|
|
|
|
2019-10-18 13:56:45 +00:00
|
|
|
/* Apply protections now that relocation processing is complete. */
|
|
|
|
link_elf_protect(ef);
|
|
|
|
|
2014-10-20 17:04:03 +00:00
|
|
|
link_elf_invoke_ctors(lf->ctors_addr, lf->ctors_size);
|
2004-08-29 01:21:51 +00:00
|
|
|
return (0);
|
1998-10-12 09:13:50 +00:00
|
|
|
}
|
|
|
|
|
1998-08-24 08:25:26 +00:00
|
|
|
static int
|
2004-04-30 16:32:40 +00:00
|
|
|
link_elf_load_file(linker_class_t cls, const char *filename,
|
|
|
|
linker_file_t *result)
|
1998-08-24 08:25:26 +00:00
|
|
|
{
|
2017-03-09 00:45:15 +00:00
|
|
|
struct nameidata *nd;
|
2004-04-30 16:32:40 +00:00
|
|
|
struct thread *td = curthread; /* XXX */
|
|
|
|
Elf_Ehdr *hdr;
|
|
|
|
Elf_Shdr *shdr;
|
2004-06-15 23:57:02 +00:00
|
|
|
Elf_Sym *es;
|
|
|
|
int nbytes, i, j;
|
2004-05-17 21:20:23 +00:00
|
|
|
vm_offset_t mapbase;
|
2004-04-30 16:32:40 +00:00
|
|
|
size_t mapsize;
|
|
|
|
int error = 0;
|
2012-02-21 01:05:12 +00:00
|
|
|
ssize_t resid;
|
|
|
|
int flags;
|
2004-04-30 16:32:40 +00:00
|
|
|
elf_file_t ef;
|
|
|
|
linker_file_t lf;
|
|
|
|
int symtabindex;
|
|
|
|
int symstrindex;
|
|
|
|
int shstrindex;
|
|
|
|
int nsym;
|
2004-05-17 21:20:23 +00:00
|
|
|
int pb, rl, ra;
|
2004-04-30 16:32:40 +00:00
|
|
|
int alignmask;
|
|
|
|
|
|
|
|
shdr = NULL;
|
|
|
|
lf = NULL;
|
|
|
|
mapsize = 0;
|
|
|
|
hdr = NULL;
|
|
|
|
|
2017-03-09 00:45:15 +00:00
|
|
|
nd = malloc(sizeof(struct nameidata), M_TEMP, M_WAITOK);
|
|
|
|
NDINIT(nd, LOOKUP, FOLLOW, UIO_SYSSPACE, filename, td);
|
2004-04-30 16:32:40 +00:00
|
|
|
flags = FREAD;
|
2017-03-09 00:45:15 +00:00
|
|
|
error = vn_open(nd, &flags, 0, NULL);
|
|
|
|
if (error) {
|
|
|
|
free(nd, M_TEMP);
|
2004-04-30 16:32:40 +00:00
|
|
|
return error;
|
2017-03-09 00:45:15 +00:00
|
|
|
}
|
|
|
|
NDFREE(nd, NDF_ONLY_PNBUF);
|
|
|
|
if (nd->ni_vp->v_type != VREG) {
|
2008-03-15 17:40:18 +00:00
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
2004-04-30 16:32:40 +00:00
|
|
|
#ifdef MAC
|
2017-03-09 00:45:15 +00:00
|
|
|
error = mac_kld_check_load(td->td_ucred, nd->ni_vp);
|
2004-04-30 16:32:40 +00:00
|
|
|
if (error) {
|
|
|
|
goto out;
|
1998-08-24 08:25:26 +00:00
|
|
|
}
|
2000-04-24 17:08:04 +00:00
|
|
|
#endif
|
1998-09-11 08:46:15 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Read the elf header from the file. */
|
|
|
|
hdr = malloc(sizeof(*hdr), M_LINKER, M_WAITOK);
|
2017-03-09 00:45:15 +00:00
|
|
|
error = vn_rdwr(UIO_READ, nd->ni_vp, (void *)hdr, sizeof(*hdr), 0,
|
2004-04-30 16:32:40 +00:00
|
|
|
UIO_SYSSPACE, IO_NODELOCKED, td->td_ucred, NOCRED,
|
|
|
|
&resid, td);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
if (resid != 0){
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
1998-08-24 08:25:26 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
if (!IS_ELF(*hdr)) {
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
1998-10-09 23:55:31 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
if (hdr->e_ident[EI_CLASS] != ELF_TARG_CLASS
|
|
|
|
|| hdr->e_ident[EI_DATA] != ELF_TARG_DATA) {
|
2008-07-08 23:51:38 +00:00
|
|
|
link_elf_error(filename, "Unsupported file layout");
|
2004-04-30 16:32:40 +00:00
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (hdr->e_ident[EI_VERSION] != EV_CURRENT
|
|
|
|
|| hdr->e_version != EV_CURRENT) {
|
2008-07-08 23:51:38 +00:00
|
|
|
link_elf_error(filename, "Unsupported file version");
|
2004-04-30 16:32:40 +00:00
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (hdr->e_type != ET_REL) {
|
2009-02-10 15:50:19 +00:00
|
|
|
error = ENOSYS;
|
2004-04-30 16:32:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (hdr->e_machine != ELF_TARG_MACH) {
|
2008-07-08 23:51:38 +00:00
|
|
|
link_elf_error(filename, "Unsupported machine");
|
2004-04-30 16:32:40 +00:00
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
2000-04-29 13:19:31 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
lf = linker_make_file(filename, &link_elf_class);
|
|
|
|
if (!lf) {
|
|
|
|
error = ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
ef = (elf_file_t) lf;
|
|
|
|
ef->nprogtab = 0;
|
|
|
|
ef->e_shdr = 0;
|
2008-07-11 14:48:28 +00:00
|
|
|
ef->nreltab = 0;
|
|
|
|
ef->nrelatab = 0;
|
2004-04-30 16:32:40 +00:00
|
|
|
|
|
|
|
/* Allocate and read in the section header */
|
|
|
|
nbytes = hdr->e_shnum * hdr->e_shentsize;
|
|
|
|
if (nbytes == 0 || hdr->e_shoff == 0 ||
|
|
|
|
hdr->e_shentsize != sizeof(Elf_Shdr)) {
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
shdr = malloc(nbytes, M_LINKER, M_WAITOK);
|
2004-04-30 16:32:40 +00:00
|
|
|
ef->e_shdr = shdr;
|
2017-03-09 00:45:15 +00:00
|
|
|
error = vn_rdwr(UIO_READ, nd->ni_vp, (caddr_t)shdr, nbytes,
|
|
|
|
hdr->e_shoff, UIO_SYSSPACE, IO_NODELOCKED, td->td_ucred,
|
|
|
|
NOCRED, &resid, td);
|
2000-04-29 13:19:31 +00:00
|
|
|
if (error)
|
2004-04-30 16:32:40 +00:00
|
|
|
goto out;
|
|
|
|
if (resid) {
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
2000-04-24 17:08:04 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Scan the section header for information and table sizing. */
|
|
|
|
nsym = 0;
|
|
|
|
symtabindex = -1;
|
|
|
|
symstrindex = -1;
|
|
|
|
for (i = 0; i < hdr->e_shnum; i++) {
|
2010-07-23 17:07:51 +00:00
|
|
|
if (shdr[i].sh_size == 0)
|
|
|
|
continue;
|
2004-04-30 16:32:40 +00:00
|
|
|
switch (shdr[i].sh_type) {
|
|
|
|
case SHT_PROGBITS:
|
|
|
|
case SHT_NOBITS:
|
2016-03-06 00:31:11 +00:00
|
|
|
#ifdef __amd64__
|
2016-04-08 10:23:48 +00:00
|
|
|
case SHT_X86_64_UNWIND:
|
2016-03-06 00:31:11 +00:00
|
|
|
#endif
|
2021-03-04 15:02:47 +00:00
|
|
|
case SHT_INIT_ARRAY:
|
|
|
|
case SHT_FINI_ARRAY:
|
Require the SHF_ALLOC flag for program sections from kernel object modules.
ELF object files can contain program sections which are not supposed
to be loaded into memory (e.g. .comment). Normally the static linker
uses these flags to decide which sections are allocated to loadable
program segments in ELF binaries and shared objects (including kernels
on all architectures and kernel modules on architectures other than
amd64).
Mapping ELF object files (such as amd64 kernel modules) into memory
directly is a bit of a grey area. ELF object files are intended to be
used as inputs to the static linker. As a result, there is not a
standardized definition for what the memory layout of an ELF object
should be (none of the section headers have valid virtual memory
addresses for example).
The kernel and loader were not checking the SHF_ALLOC flag but loading
any program sections with certain types such as SHT_PROGBITS. As a
result, the kernel and loader would load into RAM some sections that
weren't marked with SHF_ALLOC such as .comment that are not loaded
into RAM for kernel modules on other architectures (which are
implemented as ELF shared objects). Aside from possibly requiring
slightly more RAM to hold a kernel module this does not affect runtime
correctness as the kernel relocates symbols based on the layout it
uses.
Debuggers such as gdb and lldb do not extract symbol tables from a
running process or kernel. Instead, they replicate the memory layout
of ELF executables and shared objects and use that to construct their
own symbol tables. For executables and shared objects this works
fine. For ELF objects the current logic in kgdb (and probably lldb
based on a simple reading) assumes that only sections with SHF_ALLOC
are memory resident when constructing a memory layout. If the
debugger constructs a different memory layout than the kernel, then it
will compute different addresses for symbols causing symbols in the
debugger to appear to have the wrong values (though the kernel itself
is working fine). The current port of mdb does not check SHF_ALLOC as
it replicates the kernel's logic in its existing kernel support.
The bfd linker sorts the sections in ELF object files such that all of
the allocated sections (sections with SHF_ALLOCATED) are placed first
followed by unallocated sections. As a result, when kgdb composed a
memory layout using only the allocated sections, this layout happened
to match the layout used by the kernel and loader. The lld linker
does not sort the sections in ELF object files and mixed allocated and
unallocated sections. This resulted in kgdb composing a different
memory layout than the kernel and loader.
We could either patch kgdb (and possibly in the future lldb) to use
custom handling when generating memory layouts for kernel modules that
are ELF objects, or we could change the kernel and loader to check
SHF_ALLOCATED. I chose the latter as I feel we shouldn't be loading
things into RAM that the module won't use. This should mostly be a
NOP when linking with bfd but will allow the existing kgdb to work
with amd64 kernel modules linked with lld.
Note that we only require SHF_ALLOC for "program" sections for types
like SHT_PROGBITS and SHT_NOBITS. Other section types such as symbol
tables, string tables, and relocations must also be loaded and are not
marked with SHF_ALLOC.
Reported by: np
Reviewed by: kib, emaste
MFC after: 1 month
Sponsored by: Chelsio Communications
Differential Revision: https://reviews.freebsd.org/D13926
2018-01-17 22:51:59 +00:00
|
|
|
if ((shdr[i].sh_flags & SHF_ALLOC) == 0)
|
|
|
|
break;
|
2004-05-17 21:20:23 +00:00
|
|
|
ef->nprogtab++;
|
2004-04-30 16:32:40 +00:00
|
|
|
break;
|
|
|
|
case SHT_SYMTAB:
|
|
|
|
nsym++;
|
|
|
|
symtabindex = i;
|
|
|
|
symstrindex = shdr[i].sh_link;
|
|
|
|
break;
|
|
|
|
case SHT_REL:
|
2018-02-05 23:35:33 +00:00
|
|
|
/*
|
|
|
|
* Ignore relocation tables for unallocated
|
|
|
|
* sections.
|
|
|
|
*/
|
|
|
|
if ((shdr[shdr[i].sh_info].sh_flags & SHF_ALLOC) == 0)
|
|
|
|
break;
|
2008-07-11 14:48:28 +00:00
|
|
|
ef->nreltab++;
|
2004-04-30 16:32:40 +00:00
|
|
|
break;
|
|
|
|
case SHT_RELA:
|
2018-02-05 23:35:33 +00:00
|
|
|
if ((shdr[shdr[i].sh_info].sh_flags & SHF_ALLOC) == 0)
|
|
|
|
break;
|
2008-07-11 14:48:28 +00:00
|
|
|
ef->nrelatab++;
|
2004-04-30 16:32:40 +00:00
|
|
|
break;
|
|
|
|
case SHT_STRTAB:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
if (ef->nprogtab == 0) {
|
2008-07-08 23:51:38 +00:00
|
|
|
link_elf_error(filename, "file has no contents");
|
2004-04-30 16:32:40 +00:00
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (nsym != 1) {
|
|
|
|
/* Only allow one symbol table for now */
|
2018-05-30 12:55:27 +00:00
|
|
|
link_elf_error(filename,
|
|
|
|
"file must have exactly one symbol table");
|
2004-04-30 16:32:40 +00:00
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (symstrindex < 0 || symstrindex > hdr->e_shnum ||
|
|
|
|
shdr[symstrindex].sh_type != SHT_STRTAB) {
|
2008-07-08 23:51:38 +00:00
|
|
|
link_elf_error(filename, "file has invalid symbol strings");
|
2004-04-30 16:32:40 +00:00
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
1998-10-09 23:55:31 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Allocate space for tracking the load chunks */
|
|
|
|
if (ef->nprogtab != 0)
|
2004-05-17 21:20:23 +00:00
|
|
|
ef->progtab = malloc(ef->nprogtab * sizeof(*ef->progtab),
|
|
|
|
M_LINKER, M_WAITOK | M_ZERO);
|
2008-07-11 14:48:28 +00:00
|
|
|
if (ef->nreltab != 0)
|
|
|
|
ef->reltab = malloc(ef->nreltab * sizeof(*ef->reltab),
|
|
|
|
M_LINKER, M_WAITOK | M_ZERO);
|
|
|
|
if (ef->nrelatab != 0)
|
|
|
|
ef->relatab = malloc(ef->nrelatab * sizeof(*ef->relatab),
|
|
|
|
M_LINKER, M_WAITOK | M_ZERO);
|
2004-04-30 16:32:40 +00:00
|
|
|
|
2016-03-07 18:44:06 +00:00
|
|
|
if (symtabindex == -1) {
|
|
|
|
link_elf_error(filename, "lost symbol table index");
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
/* Allocate space for and load the symbol table */
|
2004-04-30 16:32:40 +00:00
|
|
|
ef->ddbsymcnt = shdr[symtabindex].sh_size / sizeof(Elf_Sym);
|
|
|
|
ef->ddbsymtab = malloc(shdr[symtabindex].sh_size, M_LINKER, M_WAITOK);
|
2017-03-09 00:45:15 +00:00
|
|
|
error = vn_rdwr(UIO_READ, nd->ni_vp, (void *)ef->ddbsymtab,
|
2004-05-17 21:20:23 +00:00
|
|
|
shdr[symtabindex].sh_size, shdr[symtabindex].sh_offset,
|
|
|
|
UIO_SYSSPACE, IO_NODELOCKED, td->td_ucred, NOCRED,
|
|
|
|
&resid, td);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
if (resid != 0){
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2004-04-30 16:32:40 +00:00
|
|
|
|
2004-05-17 21:20:23 +00:00
|
|
|
/* Allocate space for and load the symbol strings */
|
2004-04-30 16:32:40 +00:00
|
|
|
ef->ddbstrcnt = shdr[symstrindex].sh_size;
|
|
|
|
ef->ddbstrtab = malloc(shdr[symstrindex].sh_size, M_LINKER, M_WAITOK);
|
2017-03-09 00:45:15 +00:00
|
|
|
error = vn_rdwr(UIO_READ, nd->ni_vp, ef->ddbstrtab,
|
2004-05-17 21:20:23 +00:00
|
|
|
shdr[symstrindex].sh_size, shdr[symstrindex].sh_offset,
|
|
|
|
UIO_SYSSPACE, IO_NODELOCKED, td->td_ucred, NOCRED,
|
|
|
|
&resid, td);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
if (resid != 0){
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
1998-08-24 08:25:26 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Do we have a string table for the section names? */
|
|
|
|
shstrindex = -1;
|
2004-05-17 21:20:23 +00:00
|
|
|
if (hdr->e_shstrndx != 0 &&
|
|
|
|
shdr[hdr->e_shstrndx].sh_type == SHT_STRTAB) {
|
2004-04-30 16:32:40 +00:00
|
|
|
shstrindex = hdr->e_shstrndx;
|
|
|
|
ef->shstrcnt = shdr[shstrindex].sh_size;
|
2004-05-17 21:20:23 +00:00
|
|
|
ef->shstrtab = malloc(shdr[shstrindex].sh_size, M_LINKER,
|
|
|
|
M_WAITOK);
|
2017-03-09 00:45:15 +00:00
|
|
|
error = vn_rdwr(UIO_READ, nd->ni_vp, ef->shstrtab,
|
2004-05-17 21:20:23 +00:00
|
|
|
shdr[shstrindex].sh_size, shdr[shstrindex].sh_offset,
|
In order to better support flexible and extensible access control,
make a series of modifications to the credential arguments relating
to file read and write operations to cliarfy which credential is
used for what:
- Change fo_read() and fo_write() to accept "active_cred" instead of
"cred", and change the semantics of consumers of fo_read() and
fo_write() to pass the active credential of the thread requesting
an operation rather than the cached file cred. The cached file
cred is still available in fo_read() and fo_write() consumers
via fp->f_cred. These changes largely in sys_generic.c.
For each implementation of fo_read() and fo_write(), update cred
usage to reflect this change and maintain current semantics:
- badfo_readwrite() unchanged
- kqueue_read/write() unchanged
pipe_read/write() now authorize MAC using active_cred rather
than td->td_ucred
- soo_read/write() unchanged
- vn_read/write() now authorize MAC using active_cred but
VOP_READ/WRITE() with fp->f_cred
Modify vn_rdwr() to accept two credential arguments instead of a
single credential: active_cred and file_cred. Use active_cred
for MAC authorization, and select a credential for use in
VOP_READ/WRITE() based on whether file_cred is NULL or not. If
file_cred is provided, authorize the VOP using that cred,
otherwise the active credential, matching current semantics.
Modify current vn_rdwr() consumers to pass a file_cred if used
in the context of a struct file, and to always pass active_cred.
When vn_rdwr() is used without a file_cred, pass NOCRED.
These changes should maintain current semantics for read/write,
but avoid a redundant passing of fp->f_cred, as well as making
it more clear what the origin of each credential is in file
descriptor read/write operations.
Follow-up commits will make similar changes to other file descriptor
operations, and modify the MAC framework to pass both credentials
to MAC policy modules so they can implement either semantic for
revocation.
Obtained from: TrustedBSD Project
Sponsored by: DARPA, NAI Labs
2002-08-15 20:55:08 +00:00
|
|
|
UIO_SYSSPACE, IO_NODELOCKED, td->td_ucred, NOCRED,
|
|
|
|
&resid, td);
|
2004-04-30 16:32:40 +00:00
|
|
|
if (error)
|
|
|
|
goto out;
|
2004-05-17 21:20:23 +00:00
|
|
|
if (resid != 0){
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
1998-09-11 08:46:15 +00:00
|
|
|
}
|
|
|
|
|
2004-05-17 21:20:23 +00:00
|
|
|
/* Size up code/data(progbits) and bss(nobits). */
|
2004-04-30 16:32:40 +00:00
|
|
|
alignmask = 0;
|
|
|
|
for (i = 0; i < hdr->e_shnum; i++) {
|
2010-07-23 17:07:51 +00:00
|
|
|
if (shdr[i].sh_size == 0)
|
|
|
|
continue;
|
2004-04-30 16:32:40 +00:00
|
|
|
switch (shdr[i].sh_type) {
|
|
|
|
case SHT_PROGBITS:
|
|
|
|
case SHT_NOBITS:
|
2016-03-06 00:31:11 +00:00
|
|
|
#ifdef __amd64__
|
2016-04-08 10:23:48 +00:00
|
|
|
case SHT_X86_64_UNWIND:
|
2016-03-06 00:31:11 +00:00
|
|
|
#endif
|
2021-03-04 15:02:47 +00:00
|
|
|
case SHT_INIT_ARRAY:
|
|
|
|
case SHT_FINI_ARRAY:
|
Require the SHF_ALLOC flag for program sections from kernel object modules.
ELF object files can contain program sections which are not supposed
to be loaded into memory (e.g. .comment). Normally the static linker
uses these flags to decide which sections are allocated to loadable
program segments in ELF binaries and shared objects (including kernels
on all architectures and kernel modules on architectures other than
amd64).
Mapping ELF object files (such as amd64 kernel modules) into memory
directly is a bit of a grey area. ELF object files are intended to be
used as inputs to the static linker. As a result, there is not a
standardized definition for what the memory layout of an ELF object
should be (none of the section headers have valid virtual memory
addresses for example).
The kernel and loader were not checking the SHF_ALLOC flag but loading
any program sections with certain types such as SHT_PROGBITS. As a
result, the kernel and loader would load into RAM some sections that
weren't marked with SHF_ALLOC such as .comment that are not loaded
into RAM for kernel modules on other architectures (which are
implemented as ELF shared objects). Aside from possibly requiring
slightly more RAM to hold a kernel module this does not affect runtime
correctness as the kernel relocates symbols based on the layout it
uses.
Debuggers such as gdb and lldb do not extract symbol tables from a
running process or kernel. Instead, they replicate the memory layout
of ELF executables and shared objects and use that to construct their
own symbol tables. For executables and shared objects this works
fine. For ELF objects the current logic in kgdb (and probably lldb
based on a simple reading) assumes that only sections with SHF_ALLOC
are memory resident when constructing a memory layout. If the
debugger constructs a different memory layout than the kernel, then it
will compute different addresses for symbols causing symbols in the
debugger to appear to have the wrong values (though the kernel itself
is working fine). The current port of mdb does not check SHF_ALLOC as
it replicates the kernel's logic in its existing kernel support.
The bfd linker sorts the sections in ELF object files such that all of
the allocated sections (sections with SHF_ALLOCATED) are placed first
followed by unallocated sections. As a result, when kgdb composed a
memory layout using only the allocated sections, this layout happened
to match the layout used by the kernel and loader. The lld linker
does not sort the sections in ELF object files and mixed allocated and
unallocated sections. This resulted in kgdb composing a different
memory layout than the kernel and loader.
We could either patch kgdb (and possibly in the future lldb) to use
custom handling when generating memory layouts for kernel modules that
are ELF objects, or we could change the kernel and loader to check
SHF_ALLOCATED. I chose the latter as I feel we shouldn't be loading
things into RAM that the module won't use. This should mostly be a
NOP when linking with bfd but will allow the existing kgdb to work
with amd64 kernel modules linked with lld.
Note that we only require SHF_ALLOC for "program" sections for types
like SHT_PROGBITS and SHT_NOBITS. Other section types such as symbol
tables, string tables, and relocations must also be loaded and are not
marked with SHF_ALLOC.
Reported by: np
Reviewed by: kib, emaste
MFC after: 1 month
Sponsored by: Chelsio Communications
Differential Revision: https://reviews.freebsd.org/D13926
2018-01-17 22:51:59 +00:00
|
|
|
if ((shdr[i].sh_flags & SHF_ALLOC) == 0)
|
|
|
|
break;
|
2004-04-30 16:32:40 +00:00
|
|
|
alignmask = shdr[i].sh_addralign - 1;
|
|
|
|
mapsize += alignmask;
|
|
|
|
mapsize &= ~alignmask;
|
|
|
|
mapsize += shdr[i].sh_size;
|
|
|
|
break;
|
|
|
|
}
|
1998-09-11 08:46:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2004-04-30 16:32:40 +00:00
|
|
|
* We know how much space we need for the text/data/bss/etc.
|
|
|
|
* This stuff needs to be in a single chunk so that profiling etc
|
|
|
|
* can get the bounds and gdb can associate offsets with modules
|
1998-09-11 08:46:15 +00:00
|
|
|
*/
|
2020-09-08 23:38:49 +00:00
|
|
|
ef->object = vm_pager_allocate(OBJT_PHYS, NULL, round_page(mapsize),
|
|
|
|
VM_PROT_ALL, 0, thread0.td_ucred);
|
2004-04-30 16:32:40 +00:00
|
|
|
if (ef->object == NULL) {
|
|
|
|
error = ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
2020-10-19 16:57:59 +00:00
|
|
|
#if VM_NRESERVLEVEL > 0
|
|
|
|
vm_object_color(ef->object, 0);
|
|
|
|
#endif
|
2008-06-20 06:24:34 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* In order to satisfy amd64's architectural requirements on the
|
|
|
|
* location of code and data in the kernel's address space, request a
|
2019-10-18 13:53:14 +00:00
|
|
|
* mapping that is above the kernel.
|
|
|
|
*
|
|
|
|
* Protections will be restricted once relocations are applied.
|
2008-06-20 06:24:34 +00:00
|
|
|
*/
|
2012-01-14 00:36:07 +00:00
|
|
|
#ifdef __amd64__
|
2008-06-20 06:24:34 +00:00
|
|
|
mapbase = KERNBASE;
|
2012-01-14 00:36:07 +00:00
|
|
|
#else
|
|
|
|
mapbase = VM_MIN_KERNEL_ADDRESS;
|
|
|
|
#endif
|
2004-05-17 21:20:23 +00:00
|
|
|
error = vm_map_find(kernel_map, ef->object, 0, &mapbase,
|
2013-09-09 18:11:59 +00:00
|
|
|
round_page(mapsize), 0, VMFS_OPTIMAL_SPACE, VM_PROT_ALL,
|
|
|
|
VM_PROT_ALL, 0);
|
2019-10-17 21:25:50 +00:00
|
|
|
if (error != KERN_SUCCESS) {
|
2004-04-30 16:32:40 +00:00
|
|
|
vm_object_deallocate(ef->object);
|
2019-10-17 21:25:50 +00:00
|
|
|
ef->object = NULL;
|
|
|
|
error = ENOMEM;
|
2004-04-30 16:32:40 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Wire the pages */
|
2005-08-28 05:38:40 +00:00
|
|
|
error = vm_map_wire(kernel_map, mapbase,
|
2004-05-17 21:20:23 +00:00
|
|
|
mapbase + round_page(mapsize),
|
2004-04-30 16:32:40 +00:00
|
|
|
VM_MAP_WIRE_SYSTEM|VM_MAP_WIRE_NOHOLES);
|
2005-08-28 05:38:40 +00:00
|
|
|
if (error != KERN_SUCCESS) {
|
|
|
|
error = ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
2004-04-30 16:32:40 +00:00
|
|
|
|
2004-05-17 21:20:23 +00:00
|
|
|
/* Inform the kld system about the situation */
|
|
|
|
lf->address = ef->address = (caddr_t)mapbase;
|
|
|
|
lf->size = mapsize;
|
2004-04-30 16:32:40 +00:00
|
|
|
|
|
|
|
/*
|
2004-05-17 21:20:23 +00:00
|
|
|
* Now load code/data(progbits), zero bss(nobits), allocate space for
|
|
|
|
* and load relocs
|
2004-04-30 16:32:40 +00:00
|
|
|
*/
|
2004-05-17 21:20:23 +00:00
|
|
|
pb = 0;
|
|
|
|
rl = 0;
|
|
|
|
ra = 0;
|
|
|
|
alignmask = 0;
|
|
|
|
for (i = 0; i < hdr->e_shnum; i++) {
|
2010-07-23 17:07:51 +00:00
|
|
|
if (shdr[i].sh_size == 0)
|
|
|
|
continue;
|
2004-05-17 21:20:23 +00:00
|
|
|
switch (shdr[i].sh_type) {
|
|
|
|
case SHT_PROGBITS:
|
|
|
|
case SHT_NOBITS:
|
2016-03-06 00:31:11 +00:00
|
|
|
#ifdef __amd64__
|
2016-04-08 10:23:48 +00:00
|
|
|
case SHT_X86_64_UNWIND:
|
2016-03-06 00:31:11 +00:00
|
|
|
#endif
|
2021-03-04 15:02:47 +00:00
|
|
|
case SHT_INIT_ARRAY:
|
|
|
|
case SHT_FINI_ARRAY:
|
Require the SHF_ALLOC flag for program sections from kernel object modules.
ELF object files can contain program sections which are not supposed
to be loaded into memory (e.g. .comment). Normally the static linker
uses these flags to decide which sections are allocated to loadable
program segments in ELF binaries and shared objects (including kernels
on all architectures and kernel modules on architectures other than
amd64).
Mapping ELF object files (such as amd64 kernel modules) into memory
directly is a bit of a grey area. ELF object files are intended to be
used as inputs to the static linker. As a result, there is not a
standardized definition for what the memory layout of an ELF object
should be (none of the section headers have valid virtual memory
addresses for example).
The kernel and loader were not checking the SHF_ALLOC flag but loading
any program sections with certain types such as SHT_PROGBITS. As a
result, the kernel and loader would load into RAM some sections that
weren't marked with SHF_ALLOC such as .comment that are not loaded
into RAM for kernel modules on other architectures (which are
implemented as ELF shared objects). Aside from possibly requiring
slightly more RAM to hold a kernel module this does not affect runtime
correctness as the kernel relocates symbols based on the layout it
uses.
Debuggers such as gdb and lldb do not extract symbol tables from a
running process or kernel. Instead, they replicate the memory layout
of ELF executables and shared objects and use that to construct their
own symbol tables. For executables and shared objects this works
fine. For ELF objects the current logic in kgdb (and probably lldb
based on a simple reading) assumes that only sections with SHF_ALLOC
are memory resident when constructing a memory layout. If the
debugger constructs a different memory layout than the kernel, then it
will compute different addresses for symbols causing symbols in the
debugger to appear to have the wrong values (though the kernel itself
is working fine). The current port of mdb does not check SHF_ALLOC as
it replicates the kernel's logic in its existing kernel support.
The bfd linker sorts the sections in ELF object files such that all of
the allocated sections (sections with SHF_ALLOCATED) are placed first
followed by unallocated sections. As a result, when kgdb composed a
memory layout using only the allocated sections, this layout happened
to match the layout used by the kernel and loader. The lld linker
does not sort the sections in ELF object files and mixed allocated and
unallocated sections. This resulted in kgdb composing a different
memory layout than the kernel and loader.
We could either patch kgdb (and possibly in the future lldb) to use
custom handling when generating memory layouts for kernel modules that
are ELF objects, or we could change the kernel and loader to check
SHF_ALLOCATED. I chose the latter as I feel we shouldn't be loading
things into RAM that the module won't use. This should mostly be a
NOP when linking with bfd but will allow the existing kgdb to work
with amd64 kernel modules linked with lld.
Note that we only require SHF_ALLOC for "program" sections for types
like SHT_PROGBITS and SHT_NOBITS. Other section types such as symbol
tables, string tables, and relocations must also be loaded and are not
marked with SHF_ALLOC.
Reported by: np
Reviewed by: kib, emaste
MFC after: 1 month
Sponsored by: Chelsio Communications
Differential Revision: https://reviews.freebsd.org/D13926
2018-01-17 22:51:59 +00:00
|
|
|
if ((shdr[i].sh_flags & SHF_ALLOC) == 0)
|
|
|
|
break;
|
2004-05-17 21:20:23 +00:00
|
|
|
alignmask = shdr[i].sh_addralign - 1;
|
|
|
|
mapbase += alignmask;
|
|
|
|
mapbase &= ~alignmask;
|
2014-10-20 17:04:03 +00:00
|
|
|
if (ef->shstrtab != NULL && shdr[i].sh_name != 0) {
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
ef->progtab[pb].name =
|
|
|
|
ef->shstrtab + shdr[i].sh_name;
|
2021-03-04 15:02:47 +00:00
|
|
|
if (!strcmp(ef->progtab[pb].name, ".ctors") ||
|
|
|
|
shdr[i].sh_type == SHT_INIT_ARRAY) {
|
|
|
|
if (lf->ctors_addr != 0) {
|
|
|
|
printf(
|
|
|
|
"%s: multiple ctor sections in %s\n",
|
|
|
|
__func__, filename);
|
|
|
|
} else {
|
|
|
|
lf->ctors_addr =
|
|
|
|
(caddr_t)mapbase;
|
|
|
|
lf->ctors_size =
|
|
|
|
shdr[i].sh_size;
|
|
|
|
}
|
2014-10-20 17:04:03 +00:00
|
|
|
}
|
|
|
|
} else if (shdr[i].sh_type == SHT_PROGBITS)
|
2004-05-17 21:20:23 +00:00
|
|
|
ef->progtab[pb].name = "<<PROGBITS>>";
|
2016-03-06 00:31:11 +00:00
|
|
|
#ifdef __amd64__
|
2016-04-08 10:23:48 +00:00
|
|
|
else if (shdr[i].sh_type == SHT_X86_64_UNWIND)
|
2016-03-06 00:31:11 +00:00
|
|
|
ef->progtab[pb].name = "<<UNWIND>>";
|
|
|
|
#endif
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
else
|
|
|
|
ef->progtab[pb].name = "<<NOBITS>>";
|
|
|
|
if (ef->progtab[pb].name != NULL &&
|
2018-10-30 20:51:03 +00:00
|
|
|
!strcmp(ef->progtab[pb].name, DPCPU_SETNAME)) {
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
ef->progtab[pb].addr =
|
|
|
|
dpcpu_alloc(shdr[i].sh_size);
|
2018-10-30 20:51:03 +00:00
|
|
|
if (ef->progtab[pb].addr == NULL) {
|
|
|
|
printf("%s: pcpu module space is out "
|
2018-10-30 21:35:56 +00:00
|
|
|
"of space; cannot allocate %#jx "
|
|
|
|
"for %s\n", __func__,
|
|
|
|
(uintmax_t)shdr[i].sh_size,
|
2018-10-30 20:51:03 +00:00
|
|
|
filename);
|
|
|
|
}
|
|
|
|
}
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
#ifdef VIMAGE
|
|
|
|
else if (ef->progtab[pb].name != NULL &&
|
2018-10-30 20:51:03 +00:00
|
|
|
!strcmp(ef->progtab[pb].name, VNET_SETNAME)) {
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
ef->progtab[pb].addr =
|
|
|
|
vnet_data_alloc(shdr[i].sh_size);
|
2018-10-30 20:51:03 +00:00
|
|
|
if (ef->progtab[pb].addr == NULL) {
|
|
|
|
printf("%s: vnet module space is out "
|
2018-10-30 21:35:56 +00:00
|
|
|
"of space; cannot allocate %#jx "
|
|
|
|
"for %s\n", __func__,
|
|
|
|
(uintmax_t)shdr[i].sh_size,
|
2018-10-30 20:51:03 +00:00
|
|
|
filename);
|
|
|
|
}
|
|
|
|
}
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
#endif
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
else
|
|
|
|
ef->progtab[pb].addr =
|
|
|
|
(void *)(uintptr_t)mapbase;
|
|
|
|
if (ef->progtab[pb].addr == NULL) {
|
|
|
|
error = ENOSPC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
ef->progtab[pb].size = shdr[i].sh_size;
|
2019-10-18 13:53:14 +00:00
|
|
|
ef->progtab[pb].flags = shdr[i].sh_flags;
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
ef->progtab[pb].sec = i;
|
2016-03-06 00:31:11 +00:00
|
|
|
if (shdr[i].sh_type == SHT_PROGBITS
|
|
|
|
#ifdef __amd64__
|
2016-04-08 10:23:48 +00:00
|
|
|
|| shdr[i].sh_type == SHT_X86_64_UNWIND
|
2016-03-06 00:31:11 +00:00
|
|
|
#endif
|
|
|
|
) {
|
2017-03-09 00:45:15 +00:00
|
|
|
error = vn_rdwr(UIO_READ, nd->ni_vp,
|
2004-05-17 21:20:23 +00:00
|
|
|
ef->progtab[pb].addr,
|
|
|
|
shdr[i].sh_size, shdr[i].sh_offset,
|
|
|
|
UIO_SYSSPACE, IO_NODELOCKED, td->td_ucred,
|
|
|
|
NOCRED, &resid, td);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
if (resid != 0){
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
/* Initialize the per-cpu or vnet area. */
|
|
|
|
if (ef->progtab[pb].addr != (void *)mapbase &&
|
2010-11-14 20:14:25 +00:00
|
|
|
!strcmp(ef->progtab[pb].name, DPCPU_SETNAME))
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
dpcpu_copy(ef->progtab[pb].addr,
|
|
|
|
shdr[i].sh_size);
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
#ifdef VIMAGE
|
|
|
|
else if (ef->progtab[pb].addr !=
|
|
|
|
(void *)mapbase &&
|
2009-07-20 07:50:50 +00:00
|
|
|
!strcmp(ef->progtab[pb].name, VNET_SETNAME))
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
vnet_data_copy(ef->progtab[pb].addr,
|
|
|
|
shdr[i].sh_size);
|
|
|
|
#endif
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
} else
|
2004-05-17 21:20:23 +00:00
|
|
|
bzero(ef->progtab[pb].addr, shdr[i].sh_size);
|
2004-06-15 23:57:02 +00:00
|
|
|
|
|
|
|
/* Update all symbol values with the offset. */
|
|
|
|
for (j = 0; j < ef->ddbsymcnt; j++) {
|
|
|
|
es = &ef->ddbsymtab[j];
|
|
|
|
if (es->st_shndx != i)
|
|
|
|
continue;
|
|
|
|
es->st_value += (Elf_Addr)ef->progtab[pb].addr;
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
mapbase += shdr[i].sh_size;
|
|
|
|
pb++;
|
|
|
|
break;
|
|
|
|
case SHT_REL:
|
2018-02-05 23:35:33 +00:00
|
|
|
if ((shdr[shdr[i].sh_info].sh_flags & SHF_ALLOC) == 0)
|
|
|
|
break;
|
2004-05-17 21:20:23 +00:00
|
|
|
ef->reltab[rl].rel = malloc(shdr[i].sh_size, M_LINKER,
|
|
|
|
M_WAITOK);
|
|
|
|
ef->reltab[rl].nrel = shdr[i].sh_size / sizeof(Elf_Rel);
|
|
|
|
ef->reltab[rl].sec = shdr[i].sh_info;
|
2017-03-09 00:45:15 +00:00
|
|
|
error = vn_rdwr(UIO_READ, nd->ni_vp,
|
2004-05-17 21:20:23 +00:00
|
|
|
(void *)ef->reltab[rl].rel,
|
|
|
|
shdr[i].sh_size, shdr[i].sh_offset,
|
|
|
|
UIO_SYSSPACE, IO_NODELOCKED, td->td_ucred, NOCRED,
|
|
|
|
&resid, td);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
if (resid != 0){
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
rl++;
|
|
|
|
break;
|
|
|
|
case SHT_RELA:
|
2018-02-05 23:35:33 +00:00
|
|
|
if ((shdr[shdr[i].sh_info].sh_flags & SHF_ALLOC) == 0)
|
|
|
|
break;
|
2004-05-17 21:20:23 +00:00
|
|
|
ef->relatab[ra].rela = malloc(shdr[i].sh_size, M_LINKER,
|
|
|
|
M_WAITOK);
|
|
|
|
ef->relatab[ra].nrela =
|
|
|
|
shdr[i].sh_size / sizeof(Elf_Rela);
|
|
|
|
ef->relatab[ra].sec = shdr[i].sh_info;
|
2017-03-09 00:45:15 +00:00
|
|
|
error = vn_rdwr(UIO_READ, nd->ni_vp,
|
2004-05-17 21:20:23 +00:00
|
|
|
(void *)ef->relatab[ra].rela,
|
|
|
|
shdr[i].sh_size, shdr[i].sh_offset,
|
|
|
|
UIO_SYSSPACE, IO_NODELOCKED, td->td_ucred, NOCRED,
|
|
|
|
&resid, td);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
if (resid != 0){
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
ra++;
|
|
|
|
break;
|
|
|
|
}
|
2004-04-30 16:32:40 +00:00
|
|
|
}
|
2016-03-07 18:44:06 +00:00
|
|
|
if (pb != ef->nprogtab) {
|
|
|
|
link_elf_error(filename, "lost progbits");
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (rl != ef->nreltab) {
|
|
|
|
link_elf_error(filename, "lost reltab");
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (ra != ef->nrelatab) {
|
|
|
|
link_elf_error(filename, "lost relatab");
|
|
|
|
error = ENOEXEC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (mapbase != (vm_offset_t)ef->address + mapsize) {
|
|
|
|
printf(
|
|
|
|
"%s: mapbase 0x%lx != address %p + mapsize 0x%lx (0x%lx)\n",
|
|
|
|
filename != NULL ? filename : "<none>",
|
2010-02-18 05:49:52 +00:00
|
|
|
(u_long)mapbase, ef->address, (u_long)mapsize,
|
|
|
|
(u_long)(vm_offset_t)ef->address + mapsize);
|
2016-03-07 18:44:06 +00:00
|
|
|
error = ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
1998-10-13 09:27:00 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Local intra-module relocations */
|
2018-08-07 18:26:46 +00:00
|
|
|
error = link_elf_reloc_local(lf, false);
|
2016-03-07 18:44:06 +00:00
|
|
|
if (error != 0)
|
|
|
|
goto out;
|
1998-10-13 09:27:00 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Pull in dependencies */
|
2020-01-03 22:29:58 +00:00
|
|
|
VOP_UNLOCK(nd->ni_vp);
|
2004-04-30 16:32:40 +00:00
|
|
|
error = linker_load_dependencies(lf);
|
2017-03-09 00:45:15 +00:00
|
|
|
vn_lock(nd->ni_vp, LK_EXCLUSIVE | LK_RETRY);
|
2004-04-30 16:32:40 +00:00
|
|
|
if (error)
|
|
|
|
goto out;
|
2000-04-24 17:08:04 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* External relocations */
|
|
|
|
error = relocate_file(ef);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
1998-08-24 08:25:26 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Notify MD code that a module is being loaded. */
|
|
|
|
error = elf_cpu_load_file(lf);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
|
2018-08-07 20:43:50 +00:00
|
|
|
#if defined(__i386__) || defined(__amd64__)
|
2018-08-07 18:26:46 +00:00
|
|
|
/* Now ifuncs. */
|
|
|
|
error = link_elf_reloc_local(lf, true);
|
|
|
|
if (error != 0)
|
|
|
|
goto out;
|
2018-08-07 20:43:50 +00:00
|
|
|
#endif
|
2018-08-07 18:26:46 +00:00
|
|
|
|
2019-10-18 13:53:14 +00:00
|
|
|
link_elf_protect(ef);
|
2014-10-20 17:04:03 +00:00
|
|
|
link_elf_invoke_ctors(lf->ctors_addr, lf->ctors_size);
|
2004-04-30 16:32:40 +00:00
|
|
|
*result = lf;
|
1998-08-24 08:25:26 +00:00
|
|
|
|
|
|
|
out:
|
2020-01-03 22:29:58 +00:00
|
|
|
VOP_UNLOCK(nd->ni_vp);
|
2017-03-09 00:45:15 +00:00
|
|
|
vn_close(nd->ni_vp, FREAD, td->td_ucred, td);
|
|
|
|
free(nd, M_TEMP);
|
2004-04-30 16:32:40 +00:00
|
|
|
if (error && lf)
|
2004-07-13 19:36:59 +00:00
|
|
|
linker_file_unload(lf, LINKER_UNLOAD_FORCE);
|
2016-02-10 21:35:00 +00:00
|
|
|
free(hdr, M_LINKER);
|
2004-04-30 16:32:40 +00:00
|
|
|
|
|
|
|
return error;
|
1998-08-24 08:25:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
1998-10-09 23:55:31 +00:00
|
|
|
link_elf_unload_file(linker_file_t file)
|
1998-08-24 08:25:26 +00:00
|
|
|
{
|
2004-04-30 16:32:40 +00:00
|
|
|
elf_file_t ef = (elf_file_t) file;
|
2018-01-22 02:08:10 +00:00
|
|
|
u_int i;
|
1998-08-24 08:25:26 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Notify MD code that a module is being unloaded. */
|
|
|
|
elf_cpu_unload_file(file);
|
1998-08-24 08:25:26 +00:00
|
|
|
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
if (ef->progtab) {
|
|
|
|
for (i = 0; i < ef->nprogtab; i++) {
|
|
|
|
if (ef->progtab[i].size == 0)
|
|
|
|
continue;
|
|
|
|
if (ef->progtab[i].name == NULL)
|
|
|
|
continue;
|
2010-11-14 20:14:25 +00:00
|
|
|
if (!strcmp(ef->progtab[i].name, DPCPU_SETNAME))
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
dpcpu_free(ef->progtab[i].addr,
|
|
|
|
ef->progtab[i].size);
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
#ifdef VIMAGE
|
2009-07-20 07:50:50 +00:00
|
|
|
else if (!strcmp(ef->progtab[i].name, VNET_SETNAME))
|
Build on Jeff Roberson's linker-set based dynamic per-CPU allocator
(DPCPU), as suggested by Peter Wemm, and implement a new per-virtual
network stack memory allocator. Modify vnet to use the allocator
instead of monolithic global container structures (vinet, ...). This
change solves many binary compatibility problems associated with
VIMAGE, and restores ELF symbols for virtualized global variables.
Each virtualized global variable exists as a "reference copy", and also
once per virtual network stack. Virtualized global variables are
tagged at compile-time, placing the in a special linker set, which is
loaded into a contiguous region of kernel memory. Virtualized global
variables in the base kernel are linked as normal, but those in modules
are copied and relocated to a reserved portion of the kernel's vnet
region with the help of a the kernel linker.
Virtualized global variables exist in per-vnet memory set up when the
network stack instance is created, and are initialized statically from
the reference copy. Run-time access occurs via an accessor macro, which
converts from the current vnet and requested symbol to a per-vnet
address. When "options VIMAGE" is not compiled into the kernel, normal
global ELF symbols will be used instead and indirection is avoided.
This change restores static initialization for network stack global
variables, restores support for non-global symbols and types, eliminates
the need for many subsystem constructors, eliminates large per-subsystem
structures that caused many binary compatibility issues both for
monitoring applications (netstat) and kernel modules, removes the
per-function INIT_VNET_*() macros throughout the stack, eliminates the
need for vnet_symmap ksym(2) munging, and eliminates duplicate
definitions of virtualized globals under VIMAGE_GLOBALS.
Bump __FreeBSD_version and update UPDATING.
Portions submitted by: bz
Reviewed by: bz, zec
Discussed with: gnn, jamie, jeff, jhb, julian, sam
Suggested by: peter
Approved by: re (kensmith)
2009-07-14 22:48:30 +00:00
|
|
|
vnet_data_free(ef->progtab[i].addr,
|
|
|
|
ef->progtab[i].size);
|
|
|
|
#endif
|
Implement a facility for dynamic per-cpu variables.
- Modules and kernel code alike may use DPCPU_DEFINE(),
DPCPU_GET(), DPCPU_SET(), etc. akin to the statically defined
PCPU_*. Requires only one extra instruction more than PCPU_* and is
virtually the same as __thread for builtin and much faster for shared
objects. DPCPU variables can be initialized when defined.
- Modules are supported by relocating the module's per-cpu linker set
over space reserved in the kernel. Modules may fail to load if there
is insufficient space available.
- Track space available for modules with a one-off extent allocator.
Free may block for memory to allocate space for an extent.
Reviewed by: jhb, rwatson, kan, sam, grehan, marius, marcel, stas
2009-06-23 22:42:39 +00:00
|
|
|
}
|
|
|
|
}
|
2004-08-29 01:21:51 +00:00
|
|
|
if (ef->preloaded) {
|
2016-02-10 21:35:00 +00:00
|
|
|
free(ef->reltab, M_LINKER);
|
|
|
|
free(ef->relatab, M_LINKER);
|
|
|
|
free(ef->progtab, M_LINKER);
|
|
|
|
free(ef->ctftab, M_LINKER);
|
|
|
|
free(ef->ctfoff, M_LINKER);
|
|
|
|
free(ef->typoff, M_LINKER);
|
2018-07-19 19:50:42 +00:00
|
|
|
if (file->pathname != NULL)
|
|
|
|
preload_delete_name(file->pathname);
|
2004-08-29 01:21:51 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2008-07-11 14:48:28 +00:00
|
|
|
for (i = 0; i < ef->nreltab; i++)
|
2016-02-10 21:35:00 +00:00
|
|
|
free(ef->reltab[i].rel, M_LINKER);
|
2008-07-11 14:48:28 +00:00
|
|
|
for (i = 0; i < ef->nrelatab; i++)
|
2016-02-10 21:35:00 +00:00
|
|
|
free(ef->relatab[i].rela, M_LINKER);
|
|
|
|
free(ef->reltab, M_LINKER);
|
|
|
|
free(ef->relatab, M_LINKER);
|
|
|
|
free(ef->progtab, M_LINKER);
|
2004-05-17 21:20:23 +00:00
|
|
|
|
2019-10-17 21:25:50 +00:00
|
|
|
if (ef->object != NULL)
|
|
|
|
vm_map_remove(kernel_map, (vm_offset_t)ef->address,
|
|
|
|
(vm_offset_t)ef->address + ptoa(ef->object->size));
|
2016-02-10 21:35:00 +00:00
|
|
|
free(ef->e_shdr, M_LINKER);
|
|
|
|
free(ef->ddbsymtab, M_LINKER);
|
|
|
|
free(ef->ddbstrtab, M_LINKER);
|
|
|
|
free(ef->shstrtab, M_LINKER);
|
|
|
|
free(ef->ctftab, M_LINKER);
|
|
|
|
free(ef->ctfoff, M_LINKER);
|
|
|
|
free(ef->typoff, M_LINKER);
|
1998-10-09 23:55:31 +00:00
|
|
|
}
|
|
|
|
|
1998-09-11 08:46:15 +00:00
|
|
|
static const char *
|
2005-12-18 04:52:37 +00:00
|
|
|
symbol_name(elf_file_t ef, Elf_Size r_info)
|
1998-08-24 08:25:26 +00:00
|
|
|
{
|
2004-04-30 16:32:40 +00:00
|
|
|
const Elf_Sym *ref;
|
1998-08-24 08:25:26 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
if (ELF_R_SYM(r_info)) {
|
|
|
|
ref = ef->ddbsymtab + ELF_R_SYM(r_info);
|
|
|
|
return ef->ddbstrtab + ref->st_name;
|
|
|
|
} else
|
|
|
|
return NULL;
|
1998-08-24 08:25:26 +00:00
|
|
|
}
|
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
static Elf_Addr
|
|
|
|
findbase(elf_file_t ef, int sec)
|
1998-08-24 08:25:26 +00:00
|
|
|
{
|
2004-04-30 16:32:40 +00:00
|
|
|
int i;
|
|
|
|
Elf_Addr base = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < ef->nprogtab; i++) {
|
2004-06-15 23:57:02 +00:00
|
|
|
if (sec == ef->progtab[i].sec) {
|
2004-04-30 16:32:40 +00:00
|
|
|
base = (Elf_Addr)ef->progtab[i].addr;
|
2004-06-15 23:57:02 +00:00
|
|
|
break;
|
|
|
|
}
|
1998-10-16 03:55:01 +00:00
|
|
|
}
|
2004-04-30 16:32:40 +00:00
|
|
|
return base;
|
1998-08-24 08:25:26 +00:00
|
|
|
}
|
|
|
|
|
2002-09-28 17:15:38 +00:00
|
|
|
static int
|
2004-04-30 16:32:40 +00:00
|
|
|
relocate_file(elf_file_t ef)
|
1998-08-24 08:25:26 +00:00
|
|
|
{
|
2004-04-30 16:32:40 +00:00
|
|
|
const Elf_Rel *rellim;
|
|
|
|
const Elf_Rel *rel;
|
|
|
|
const Elf_Rela *relalim;
|
|
|
|
const Elf_Rela *rela;
|
|
|
|
const char *symname;
|
|
|
|
const Elf_Sym *sym;
|
|
|
|
int i;
|
2005-12-18 04:52:37 +00:00
|
|
|
Elf_Size symidx;
|
2004-04-30 16:32:40 +00:00
|
|
|
Elf_Addr base;
|
|
|
|
|
|
|
|
/* Perform relocations without addend if there are any: */
|
2008-07-11 14:48:28 +00:00
|
|
|
for (i = 0; i < ef->nreltab; i++) {
|
2004-04-30 16:32:40 +00:00
|
|
|
rel = ef->reltab[i].rel;
|
2016-03-07 18:44:06 +00:00
|
|
|
if (rel == NULL) {
|
|
|
|
link_elf_error(ef->lf.filename, "lost a reltab!");
|
|
|
|
return (ENOEXEC);
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
rellim = rel + ef->reltab[i].nrel;
|
|
|
|
base = findbase(ef, ef->reltab[i].sec);
|
2016-03-07 18:44:06 +00:00
|
|
|
if (base == 0) {
|
|
|
|
link_elf_error(ef->lf.filename, "lost base for reltab");
|
|
|
|
return (ENOEXEC);
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
for ( ; rel < rellim; rel++) {
|
|
|
|
symidx = ELF_R_SYM(rel->r_info);
|
|
|
|
if (symidx >= ef->ddbsymcnt)
|
|
|
|
continue;
|
|
|
|
sym = ef->ddbsymtab + symidx;
|
|
|
|
/* Local relocs are already done */
|
|
|
|
if (ELF_ST_BIND(sym->st_info) == STB_LOCAL)
|
|
|
|
continue;
|
|
|
|
if (elf_reloc(&ef->lf, base, rel, ELF_RELOC_REL,
|
|
|
|
elf_obj_lookup)) {
|
|
|
|
symname = symbol_name(ef, rel->r_info);
|
|
|
|
printf("link_elf_obj: symbol %s undefined\n",
|
|
|
|
symname);
|
2016-03-07 18:44:06 +00:00
|
|
|
return (ENOENT);
|
2004-04-30 16:32:40 +00:00
|
|
|
}
|
|
|
|
}
|
1998-09-11 08:46:15 +00:00
|
|
|
}
|
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Perform relocations with addend if there are any: */
|
2008-07-11 14:48:28 +00:00
|
|
|
for (i = 0; i < ef->nrelatab; i++) {
|
2004-04-30 16:32:40 +00:00
|
|
|
rela = ef->relatab[i].rela;
|
2016-03-07 18:44:06 +00:00
|
|
|
if (rela == NULL) {
|
|
|
|
link_elf_error(ef->lf.filename, "lost a relatab!");
|
|
|
|
return (ENOEXEC);
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
relalim = rela + ef->relatab[i].nrela;
|
|
|
|
base = findbase(ef, ef->relatab[i].sec);
|
2016-03-07 18:44:06 +00:00
|
|
|
if (base == 0) {
|
|
|
|
link_elf_error(ef->lf.filename,
|
|
|
|
"lost base for relatab");
|
|
|
|
return (ENOEXEC);
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
for ( ; rela < relalim; rela++) {
|
|
|
|
symidx = ELF_R_SYM(rela->r_info);
|
|
|
|
if (symidx >= ef->ddbsymcnt)
|
|
|
|
continue;
|
|
|
|
sym = ef->ddbsymtab + symidx;
|
|
|
|
/* Local relocs are already done */
|
|
|
|
if (ELF_ST_BIND(sym->st_info) == STB_LOCAL)
|
|
|
|
continue;
|
|
|
|
if (elf_reloc(&ef->lf, base, rela, ELF_RELOC_RELA,
|
|
|
|
elf_obj_lookup)) {
|
|
|
|
symname = symbol_name(ef, rela->r_info);
|
|
|
|
printf("link_elf_obj: symbol %s undefined\n",
|
|
|
|
symname);
|
2016-03-07 18:44:06 +00:00
|
|
|
return (ENOENT);
|
2004-04-30 16:32:40 +00:00
|
|
|
}
|
|
|
|
}
|
1998-09-11 08:46:15 +00:00
|
|
|
}
|
|
|
|
|
2015-04-02 20:14:51 +00:00
|
|
|
/*
|
2016-04-29 22:15:33 +00:00
|
|
|
* Only clean SHN_FBSD_CACHED for successful return. If we
|
2015-04-02 20:14:51 +00:00
|
|
|
* modified symbol table for the object but found an
|
|
|
|
* unresolved symbol, there is no reason to roll back.
|
|
|
|
*/
|
|
|
|
elf_obj_cleanup_globals_cache(ef);
|
|
|
|
|
2016-03-07 18:44:06 +00:00
|
|
|
return (0);
|
2004-04-30 16:32:40 +00:00
|
|
|
}
|
1998-09-11 08:46:15 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
static int
|
|
|
|
link_elf_lookup_symbol(linker_file_t lf, const char *name, c_linker_sym_t *sym)
|
|
|
|
{
|
|
|
|
elf_file_t ef = (elf_file_t) lf;
|
|
|
|
const Elf_Sym *symp;
|
|
|
|
const char *strp;
|
|
|
|
int i;
|
1998-10-12 09:13:50 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
for (i = 0, symp = ef->ddbsymtab; i < ef->ddbsymcnt; i++, symp++) {
|
|
|
|
strp = ef->ddbstrtab + symp->st_name;
|
2004-06-15 23:57:02 +00:00
|
|
|
if (symp->st_shndx != SHN_UNDEF && strcmp(name, strp) == 0) {
|
|
|
|
*sym = (c_linker_sym_t) symp;
|
|
|
|
return 0;
|
2004-04-30 16:32:40 +00:00
|
|
|
}
|
1998-10-12 09:13:50 +00:00
|
|
|
}
|
2004-04-30 16:32:40 +00:00
|
|
|
return ENOENT;
|
1998-08-24 08:25:26 +00:00
|
|
|
}
|
|
|
|
|
1998-10-09 23:55:31 +00:00
|
|
|
static int
|
2004-05-17 21:20:23 +00:00
|
|
|
link_elf_symbol_values(linker_file_t lf, c_linker_sym_t sym,
|
|
|
|
linker_symval_t *symval)
|
1998-08-24 08:25:26 +00:00
|
|
|
{
|
2018-05-03 21:37:46 +00:00
|
|
|
elf_file_t ef;
|
|
|
|
const Elf_Sym *es;
|
|
|
|
caddr_t val;
|
1998-08-24 08:25:26 +00:00
|
|
|
|
2018-05-03 21:37:46 +00:00
|
|
|
ef = (elf_file_t) lf;
|
|
|
|
es = (const Elf_Sym*) sym;
|
|
|
|
val = (caddr_t)es->st_value;
|
2002-08-24 05:01:33 +00:00
|
|
|
if (es >= ef->ddbsymtab && es < (ef->ddbsymtab + ef->ddbsymcnt)) {
|
2004-04-30 16:32:40 +00:00
|
|
|
symval->name = ef->ddbstrtab + es->st_name;
|
2018-05-03 21:37:46 +00:00
|
|
|
val = (caddr_t)es->st_value;
|
|
|
|
if (ELF_ST_TYPE(es->st_info) == STT_GNU_IFUNC)
|
|
|
|
val = ((caddr_t (*)(void))val)();
|
|
|
|
symval->value = val;
|
2004-04-30 16:32:40 +00:00
|
|
|
symval->size = es->st_size;
|
|
|
|
return 0;
|
1998-10-12 09:13:50 +00:00
|
|
|
}
|
|
|
|
return ENOENT;
|
1998-08-24 08:25:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
link_elf_search_symbol(linker_file_t lf, caddr_t value,
|
2004-04-30 16:32:40 +00:00
|
|
|
c_linker_sym_t *sym, long *diffp)
|
1998-08-24 08:25:26 +00:00
|
|
|
{
|
2000-04-24 17:08:04 +00:00
|
|
|
elf_file_t ef = (elf_file_t) lf;
|
1999-12-24 15:33:36 +00:00
|
|
|
u_long off = (uintptr_t) (void *) value;
|
1998-08-24 08:25:26 +00:00
|
|
|
u_long diff = off;
|
1999-12-24 15:33:36 +00:00
|
|
|
u_long st_value;
|
2004-04-30 16:32:40 +00:00
|
|
|
const Elf_Sym *es;
|
2016-04-15 16:10:11 +00:00
|
|
|
const Elf_Sym *best = NULL;
|
1998-08-24 08:25:26 +00:00
|
|
|
int i;
|
|
|
|
|
1998-10-12 09:13:50 +00:00
|
|
|
for (i = 0, es = ef->ddbsymtab; i < ef->ddbsymcnt; i++, es++) {
|
1998-08-24 08:25:26 +00:00
|
|
|
if (es->st_name == 0)
|
|
|
|
continue;
|
2004-06-15 23:57:02 +00:00
|
|
|
st_value = es->st_value;
|
1999-11-28 11:59:18 +00:00
|
|
|
if (off >= st_value) {
|
|
|
|
if (off - st_value < diff) {
|
|
|
|
diff = off - st_value;
|
1998-08-24 08:25:26 +00:00
|
|
|
best = es;
|
|
|
|
if (diff == 0)
|
|
|
|
break;
|
1999-11-28 11:59:18 +00:00
|
|
|
} else if (off - st_value == diff) {
|
1998-08-24 08:25:26 +00:00
|
|
|
best = es;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2016-04-15 16:10:11 +00:00
|
|
|
if (best == NULL)
|
1998-08-24 08:25:26 +00:00
|
|
|
*diffp = off;
|
|
|
|
else
|
|
|
|
*diffp = diff;
|
1999-01-27 21:50:00 +00:00
|
|
|
*sym = (c_linker_sym_t) best;
|
1998-08-24 08:25:26 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2001-06-13 10:58:39 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Look up a linker set on an ELF system.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
link_elf_lookup_set(linker_file_t lf, const char *name,
|
2004-04-30 16:32:40 +00:00
|
|
|
void ***startp, void ***stopp, int *countp)
|
2001-06-13 10:58:39 +00:00
|
|
|
{
|
2004-04-30 16:32:40 +00:00
|
|
|
elf_file_t ef = (elf_file_t)lf;
|
2001-06-13 10:58:39 +00:00
|
|
|
void **start, **stop;
|
2004-04-30 16:32:40 +00:00
|
|
|
int i, count;
|
|
|
|
|
|
|
|
/* Relative to section number */
|
|
|
|
for (i = 0; i < ef->nprogtab; i++) {
|
|
|
|
if ((strncmp(ef->progtab[i].name, "set_", 4) == 0) &&
|
|
|
|
strcmp(ef->progtab[i].name + 4, name) == 0) {
|
|
|
|
start = (void **)ef->progtab[i].addr;
|
2004-05-17 21:20:23 +00:00
|
|
|
stop = (void **)((char *)ef->progtab[i].addr +
|
|
|
|
ef->progtab[i].size);
|
2004-04-30 16:32:40 +00:00
|
|
|
count = stop - start;
|
|
|
|
if (startp)
|
|
|
|
*startp = start;
|
|
|
|
if (stopp)
|
|
|
|
*stopp = stop;
|
|
|
|
if (countp)
|
|
|
|
*countp = count;
|
|
|
|
return (0);
|
|
|
|
}
|
2001-06-13 10:58:39 +00:00
|
|
|
}
|
2004-04-30 16:32:40 +00:00
|
|
|
return (ESRCH);
|
2001-06-13 10:58:39 +00:00
|
|
|
}
|
2001-10-30 15:21:45 +00:00
|
|
|
|
|
|
|
static int
|
|
|
|
link_elf_each_function_name(linker_file_t file,
|
2004-04-30 16:32:40 +00:00
|
|
|
int (*callback)(const char *, void *), void *opaque)
|
|
|
|
{
|
|
|
|
elf_file_t ef = (elf_file_t)file;
|
|
|
|
const Elf_Sym *symp;
|
|
|
|
int i, error;
|
2020-09-01 22:12:32 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Exhaustive search */
|
|
|
|
for (i = 0, symp = ef->ddbsymtab; i < ef->ddbsymcnt; i++, symp++) {
|
|
|
|
if (symp->st_value != 0 &&
|
2018-05-03 21:37:46 +00:00
|
|
|
(ELF_ST_TYPE(symp->st_info) == STT_FUNC ||
|
|
|
|
ELF_ST_TYPE(symp->st_info) == STT_GNU_IFUNC)) {
|
2004-04-30 16:32:40 +00:00
|
|
|
error = callback(ef->ddbstrtab + symp->st_name, opaque);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
2001-10-30 15:21:45 +00:00
|
|
|
}
|
2004-04-30 16:32:40 +00:00
|
|
|
return (0);
|
2002-10-15 05:40:07 +00:00
|
|
|
}
|
|
|
|
|
2008-05-23 00:49:39 +00:00
|
|
|
static int
|
|
|
|
link_elf_each_function_nameval(linker_file_t file,
|
|
|
|
linker_function_nameval_callback_t callback, void *opaque)
|
|
|
|
{
|
|
|
|
linker_symval_t symval;
|
|
|
|
elf_file_t ef = (elf_file_t)file;
|
|
|
|
const Elf_Sym* symp;
|
|
|
|
int i, error;
|
|
|
|
|
|
|
|
/* Exhaustive search */
|
|
|
|
for (i = 0, symp = ef->ddbsymtab; i < ef->ddbsymcnt; i++, symp++) {
|
|
|
|
if (symp->st_value != 0 &&
|
2018-05-03 21:37:46 +00:00
|
|
|
(ELF_ST_TYPE(symp->st_info) == STT_FUNC ||
|
|
|
|
ELF_ST_TYPE(symp->st_info) == STT_GNU_IFUNC)) {
|
|
|
|
error = link_elf_symbol_values(file,
|
|
|
|
(c_linker_sym_t)symp, &symval);
|
2008-05-23 00:49:39 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
error = callback(file, i, &symval, opaque);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2015-04-02 20:14:51 +00:00
|
|
|
static void
|
|
|
|
elf_obj_cleanup_globals_cache(elf_file_t ef)
|
|
|
|
{
|
|
|
|
Elf_Sym *sym;
|
|
|
|
Elf_Size i;
|
|
|
|
|
|
|
|
for (i = 0; i < ef->ddbsymcnt; i++) {
|
|
|
|
sym = ef->ddbsymtab + i;
|
|
|
|
if (sym->st_shndx == SHN_FBSD_CACHED) {
|
|
|
|
sym->st_shndx = SHN_UNDEF;
|
|
|
|
sym->st_value = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-04-25 01:22:16 +00:00
|
|
|
/*
|
|
|
|
* Symbol lookup function that can be used when the symbol index is known (ie
|
|
|
|
* in relocations). It uses the symbol index instead of doing a fully fledged
|
|
|
|
* hash table based lookup when such is valid. For example for local symbols.
|
|
|
|
* This is not only more efficient, it's also more correct. It's not always
|
|
|
|
* the case that the symbol can be found through the hash table.
|
|
|
|
*/
|
2015-09-20 01:27:59 +00:00
|
|
|
static int
|
|
|
|
elf_obj_lookup(linker_file_t lf, Elf_Size symidx, int deps, Elf_Addr *res)
|
2002-04-25 01:22:16 +00:00
|
|
|
{
|
|
|
|
elf_file_t ef = (elf_file_t)lf;
|
2015-04-02 20:14:51 +00:00
|
|
|
Elf_Sym *sym;
|
2002-04-25 01:22:16 +00:00
|
|
|
const char *symbol;
|
2015-09-20 01:27:59 +00:00
|
|
|
Elf_Addr res1;
|
2002-04-25 01:22:16 +00:00
|
|
|
|
|
|
|
/* Don't even try to lookup the symbol if the index is bogus. */
|
2015-09-20 01:27:59 +00:00
|
|
|
if (symidx >= ef->ddbsymcnt) {
|
|
|
|
*res = 0;
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
2002-04-25 01:22:16 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
sym = ef->ddbsymtab + symidx;
|
2002-04-25 01:22:16 +00:00
|
|
|
|
2004-05-18 05:15:43 +00:00
|
|
|
/* Quick answer if there is a definition included. */
|
2015-09-20 01:27:59 +00:00
|
|
|
if (sym->st_shndx != SHN_UNDEF) {
|
2018-08-07 18:26:46 +00:00
|
|
|
res1 = (Elf_Addr)sym->st_value;
|
|
|
|
if (ELF_ST_TYPE(sym->st_info) == STT_GNU_IFUNC)
|
|
|
|
res1 = ((Elf_Addr (*)(void))res1)();
|
|
|
|
*res = res1;
|
2015-09-20 01:27:59 +00:00
|
|
|
return (0);
|
|
|
|
}
|
2004-05-18 05:15:43 +00:00
|
|
|
|
|
|
|
/* If we get here, then it is undefined and needs a lookup. */
|
|
|
|
switch (ELF_ST_BIND(sym->st_info)) {
|
|
|
|
case STB_LOCAL:
|
|
|
|
/* Local, but undefined? huh? */
|
2015-09-20 01:27:59 +00:00
|
|
|
*res = 0;
|
|
|
|
return (EINVAL);
|
2002-04-25 01:22:16 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
case STB_GLOBAL:
|
2015-09-20 01:27:59 +00:00
|
|
|
case STB_WEAK:
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Relative to Data or Function name */
|
|
|
|
symbol = ef->ddbstrtab + sym->st_name;
|
2002-04-25 01:22:16 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Force a lookup failure if the symbol name is bogus. */
|
2015-09-20 01:27:59 +00:00
|
|
|
if (*symbol == 0) {
|
|
|
|
*res = 0;
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
res1 = (Elf_Addr)linker_file_lookup_symbol(lf, symbol, deps);
|
2015-04-02 20:14:51 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Cache global lookups during module relocation. The failure
|
|
|
|
* case is particularly expensive for callers, who must scan
|
|
|
|
* through the entire globals table doing strcmp(). Cache to
|
|
|
|
* avoid doing such work repeatedly.
|
|
|
|
*
|
|
|
|
* After relocation is complete, undefined globals will be
|
|
|
|
* restored to SHN_UNDEF in elf_obj_cleanup_globals_cache(),
|
|
|
|
* above.
|
|
|
|
*/
|
2015-09-20 01:27:59 +00:00
|
|
|
if (res1 != 0) {
|
2015-04-02 20:14:51 +00:00
|
|
|
sym->st_shndx = SHN_FBSD_CACHED;
|
2015-09-20 01:27:59 +00:00
|
|
|
sym->st_value = res1;
|
|
|
|
*res = res1;
|
|
|
|
return (0);
|
|
|
|
} else if (ELF_ST_BIND(sym->st_info) == STB_WEAK) {
|
|
|
|
sym->st_value = 0;
|
|
|
|
*res = 0;
|
|
|
|
return (0);
|
2015-04-02 20:14:51 +00:00
|
|
|
}
|
2015-09-20 01:27:59 +00:00
|
|
|
return (EINVAL);
|
2002-04-25 01:22:16 +00:00
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
default:
|
2015-09-20 01:27:59 +00:00
|
|
|
return (EINVAL);
|
2004-04-30 16:32:40 +00:00
|
|
|
}
|
2002-04-25 01:22:16 +00:00
|
|
|
}
|
2003-01-21 02:42:44 +00:00
|
|
|
|
2006-11-30 10:50:29 +00:00
|
|
|
static void
|
|
|
|
link_elf_fix_link_set(elf_file_t ef)
|
|
|
|
{
|
|
|
|
static const char startn[] = "__start_";
|
|
|
|
static const char stopn[] = "__stop_";
|
|
|
|
Elf_Sym *sym;
|
|
|
|
const char *sym_name, *linkset_name;
|
|
|
|
Elf_Addr startp, stopp;
|
|
|
|
Elf_Size symidx;
|
|
|
|
int start, i;
|
|
|
|
|
|
|
|
startp = stopp = 0;
|
|
|
|
for (symidx = 1 /* zero entry is special */;
|
|
|
|
symidx < ef->ddbsymcnt; symidx++) {
|
|
|
|
sym = ef->ddbsymtab + symidx;
|
|
|
|
if (sym->st_shndx != SHN_UNDEF)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
sym_name = ef->ddbstrtab + sym->st_name;
|
|
|
|
if (strncmp(sym_name, startn, sizeof(startn) - 1) == 0) {
|
|
|
|
start = 1;
|
|
|
|
linkset_name = sym_name + sizeof(startn) - 1;
|
|
|
|
}
|
|
|
|
else if (strncmp(sym_name, stopn, sizeof(stopn) - 1) == 0) {
|
|
|
|
start = 0;
|
|
|
|
linkset_name = sym_name + sizeof(stopn) - 1;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
continue;
|
|
|
|
|
|
|
|
for (i = 0; i < ef->nprogtab; i++) {
|
|
|
|
if (strcmp(ef->progtab[i].name, linkset_name) == 0) {
|
|
|
|
startp = (Elf_Addr)ef->progtab[i].addr;
|
|
|
|
stopp = (Elf_Addr)(startp + ef->progtab[i].size);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (i == ef->nprogtab)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
sym->st_value = start ? startp : stopp;
|
|
|
|
sym->st_shndx = i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-07 18:44:06 +00:00
|
|
|
static int
|
2018-08-07 18:26:46 +00:00
|
|
|
link_elf_reloc_local(linker_file_t lf, bool ifuncs)
|
2003-01-21 02:42:44 +00:00
|
|
|
{
|
2004-04-30 16:32:40 +00:00
|
|
|
elf_file_t ef = (elf_file_t)lf;
|
|
|
|
const Elf_Rel *rellim;
|
|
|
|
const Elf_Rel *rel;
|
|
|
|
const Elf_Rela *relalim;
|
|
|
|
const Elf_Rela *rela;
|
|
|
|
const Elf_Sym *sym;
|
|
|
|
Elf_Addr base;
|
|
|
|
int i;
|
2005-12-18 04:52:37 +00:00
|
|
|
Elf_Size symidx;
|
2004-04-30 16:32:40 +00:00
|
|
|
|
2006-11-30 10:50:29 +00:00
|
|
|
link_elf_fix_link_set(ef);
|
|
|
|
|
2004-04-30 16:32:40 +00:00
|
|
|
/* Perform relocations without addend if there are any: */
|
2008-07-11 14:48:28 +00:00
|
|
|
for (i = 0; i < ef->nreltab; i++) {
|
2004-04-30 16:32:40 +00:00
|
|
|
rel = ef->reltab[i].rel;
|
2016-03-07 18:44:06 +00:00
|
|
|
if (rel == NULL) {
|
|
|
|
link_elf_error(ef->lf.filename, "lost a reltab");
|
|
|
|
return (ENOEXEC);
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
rellim = rel + ef->reltab[i].nrel;
|
|
|
|
base = findbase(ef, ef->reltab[i].sec);
|
2016-03-07 18:44:06 +00:00
|
|
|
if (base == 0) {
|
|
|
|
link_elf_error(ef->lf.filename, "lost base for reltab");
|
|
|
|
return (ENOEXEC);
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
for ( ; rel < rellim; rel++) {
|
|
|
|
symidx = ELF_R_SYM(rel->r_info);
|
|
|
|
if (symidx >= ef->ddbsymcnt)
|
|
|
|
continue;
|
|
|
|
sym = ef->ddbsymtab + symidx;
|
|
|
|
/* Only do local relocs */
|
|
|
|
if (ELF_ST_BIND(sym->st_info) != STB_LOCAL)
|
|
|
|
continue;
|
2018-08-22 20:44:30 +00:00
|
|
|
if ((ELF_ST_TYPE(sym->st_info) == STT_GNU_IFUNC ||
|
2020-10-07 23:14:49 +00:00
|
|
|
elf_is_ifunc_reloc(rel->r_info)) != ifuncs)
|
|
|
|
continue;
|
|
|
|
if (elf_reloc_local(lf, base, rel, ELF_RELOC_REL,
|
|
|
|
elf_obj_lookup) != 0)
|
|
|
|
return (ENOEXEC);
|
2004-04-30 16:32:40 +00:00
|
|
|
}
|
2003-01-21 02:42:44 +00:00
|
|
|
}
|
2004-04-30 16:32:40 +00:00
|
|
|
|
|
|
|
/* Perform relocations with addend if there are any: */
|
2008-07-11 14:48:28 +00:00
|
|
|
for (i = 0; i < ef->nrelatab; i++) {
|
2004-04-30 16:32:40 +00:00
|
|
|
rela = ef->relatab[i].rela;
|
2016-03-07 18:44:06 +00:00
|
|
|
if (rela == NULL) {
|
|
|
|
link_elf_error(ef->lf.filename, "lost a relatab!");
|
|
|
|
return (ENOEXEC);
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
relalim = rela + ef->relatab[i].nrela;
|
|
|
|
base = findbase(ef, ef->relatab[i].sec);
|
2016-03-07 18:44:06 +00:00
|
|
|
if (base == 0) {
|
|
|
|
link_elf_error(ef->lf.filename, "lost base for reltab");
|
|
|
|
return (ENOEXEC);
|
|
|
|
}
|
2004-05-17 21:20:23 +00:00
|
|
|
for ( ; rela < relalim; rela++) {
|
|
|
|
symidx = ELF_R_SYM(rela->r_info);
|
|
|
|
if (symidx >= ef->ddbsymcnt)
|
|
|
|
continue;
|
|
|
|
sym = ef->ddbsymtab + symidx;
|
|
|
|
/* Only do local relocs */
|
|
|
|
if (ELF_ST_BIND(sym->st_info) != STB_LOCAL)
|
|
|
|
continue;
|
2018-08-22 20:44:30 +00:00
|
|
|
if ((ELF_ST_TYPE(sym->st_info) == STT_GNU_IFUNC ||
|
2020-10-07 23:14:49 +00:00
|
|
|
elf_is_ifunc_reloc(rela->r_info)) != ifuncs)
|
|
|
|
continue;
|
|
|
|
if (elf_reloc_local(lf, base, rela, ELF_RELOC_RELA,
|
|
|
|
elf_obj_lookup) != 0)
|
|
|
|
return (ENOEXEC);
|
2004-04-30 16:32:40 +00:00
|
|
|
}
|
2003-01-21 02:42:44 +00:00
|
|
|
}
|
2016-03-07 18:44:06 +00:00
|
|
|
return (0);
|
2003-01-21 02:42:44 +00:00
|
|
|
}
|
2009-05-26 21:39:09 +00:00
|
|
|
|
|
|
|
static long
|
2009-06-11 17:05:45 +00:00
|
|
|
link_elf_symtab_get(linker_file_t lf, const Elf_Sym **symtab)
|
2009-05-26 21:39:09 +00:00
|
|
|
{
|
|
|
|
elf_file_t ef = (elf_file_t)lf;
|
|
|
|
|
|
|
|
*symtab = ef->ddbsymtab;
|
|
|
|
|
|
|
|
if (*symtab == NULL)
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
return (ef->ddbsymcnt);
|
|
|
|
}
|
|
|
|
|
|
|
|
static long
|
|
|
|
link_elf_strtab_get(linker_file_t lf, caddr_t *strtab)
|
|
|
|
{
|
|
|
|
elf_file_t ef = (elf_file_t)lf;
|
|
|
|
|
|
|
|
*strtab = ef->ddbstrtab;
|
|
|
|
|
|
|
|
if (*strtab == NULL)
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
return (ef->ddbstrcnt);
|
|
|
|
}
|