-
-
Notifications
You must be signed in to change notification settings - Fork 606
/
scanelf.d
296 lines (253 loc) · 8.24 KB
/
scanelf.d
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
/**
* Extract symbols from an ELF object file.
*
* Copyright: Copyright (C) 1999-2022 by The D Language Foundation, All Rights Reserved
* Authors: $(LINK2 https://www.digitalmars.com, Walter Bright)
* License: $(LINK2 https://www.boost.org/LICENSE_1_0.txt, Boost License 1.0)
* Source: $(LINK2 https://github.com/dlang/dmd/blob/master/src/dmd/scanelf.d, _scanelf.d)
* Documentation: https://dlang.org/phobos/dmd_scanelf.html
* Coverage: https://codecov.io/gh/dlang/dmd/src/master/src/dmd/scanelf.d
*/
module dmd.scanelf;
import core.stdc.string;
import core.stdc.stdint;
import core.checkedint;
import dmd.globals;
import dmd.errors;
enum LOG = false;
/*****************************************
* Reads an object module from base[] and passes the names
* of any exported symbols to (*pAddSymbol)().
* Params:
* pAddSymbol = function to pass the names to
* base = array of contents of object module
* module_name = name of the object module (used for error messages)
* loc = location to use for error printing
*/
void scanElfObjModule(void delegate(const(char)[] name, int pickAny) pAddSymbol,
const(ubyte)[] base, const(char)* module_name, Loc loc)
{
static if (LOG)
{
printf("scanElfObjModule(%s)\n", module_name);
}
void corrupt(int reason)
{
error(loc, "corrupt ELF object module `%s` %d", module_name, reason);
}
if (base.length < Elf32_Ehdr.sizeof)
return corrupt(__LINE__); // must be at least large enough for ELF32
static immutable ubyte[4] elf = [0x7F, 'E', 'L', 'F']; // ELF file signature
if (base[0 .. elf.length] != elf[])
return corrupt(__LINE__);
if (base[EI_VERSION] != EV_CURRENT)
{
return error(loc, "ELF object module `%s` has EI_VERSION = %d, should be %d",
module_name, base[EI_VERSION], EV_CURRENT);
}
if (base[EI_DATA] != ELFDATA2LSB)
{
return error(loc, "ELF object module `%s` is byte swapped and unsupported", module_name);
}
if (base[EI_CLASS] != ELFCLASS32 && base[EI_CLASS] != ELFCLASS64)
{
return error(loc, "ELF object module `%s` is unrecognized class %d", module_name, base[EI_CLASS]);
}
void scanELF(uint model)()
{
static if (model == 32)
{
alias ElfXX_Ehdr = Elf32_Ehdr;
alias ElfXX_Shdr = Elf32_Shdr;
alias ElfXX_Sym = Elf32_Sym;
}
else
{
static assert(model == 64);
alias ElfXX_Ehdr = Elf64_Ehdr;
alias ElfXX_Shdr = Elf64_Shdr;
alias ElfXX_Sym = Elf64_Sym;
}
if (base.length < ElfXX_Ehdr.sizeof)
return corrupt(__LINE__);
const eh = cast(const(ElfXX_Ehdr)*) base.ptr;
if (eh.e_type != ET_REL)
return error(loc, "ELF object module `%s` is not relocatable", module_name);
if (eh.e_version != EV_CURRENT)
return corrupt(__LINE__);
bool overflow;
const end = addu(eh.e_shoff, mulu(eh.e_shentsize, eh.e_shnum, overflow), overflow);
if (overflow || end > base.length)
return corrupt(__LINE__);
/* For each Section
*/
const sections = (cast(const(ElfXX_Shdr)*)(base.ptr + eh.e_shoff))[0 .. eh.e_shnum];
foreach (ref const section; sections)
{
if (section.sh_type != SHT_SYMTAB)
continue;
bool checkShdrXX(const ref ElfXX_Shdr shdr)
{
bool overflow;
return addu(shdr.sh_offset, shdr.sh_size, overflow) > base.length || overflow;
}
if (checkShdrXX(section))
return corrupt(__LINE__);
/* sh_link gives the particular string table section
* used for the symbol names.
*/
if (section.sh_link >= eh.e_shnum)
return corrupt(__LINE__);
const string_section = §ions[section.sh_link];
if (string_section.sh_type != SHT_STRTAB)
return corrupt(__LINE__);
if (checkShdrXX(*string_section))
return corrupt(__LINE__);
const string_tab = (cast(const(char)[])base)
[cast(size_t)string_section.sh_offset ..
cast(size_t)(string_section.sh_offset + string_section.sh_size)];
/* Get the array of symbols this section refers to
*/
const symbols = (cast(ElfXX_Sym*)(base.ptr + cast(size_t)section.sh_offset))
[0 .. cast(size_t)(section.sh_size / ElfXX_Sym.sizeof)];
foreach (ref const sym; symbols)
{
const stb = sym.st_info >> 4;
if (stb != STB_GLOBAL && stb != STB_WEAK || sym.st_shndx == SHN_UNDEF)
continue; // it's extern
if (sym.st_name >= string_tab.length)
return corrupt(__LINE__);
const name = &string_tab[sym.st_name];
//printf("sym st_name = x%x\n", sym.st_name);
const pend = cast(const(char*)) memchr(name, 0, string_tab.length - sym.st_name);
if (!pend) // if didn't find terminating 0 inside the string section
return corrupt(__LINE__);
pAddSymbol(name[0 .. pend - name], 1);
}
}
}
if (base[EI_CLASS] == ELFCLASS32)
{
scanELF!32;
}
else
{
assert(base[EI_CLASS] == ELFCLASS64);
scanELF!64;
}
}
alias Elf32_Half = uint16_t;
alias Elf64_Half = uint16_t;
alias Elf32_Word = uint32_t;
alias Elf32_Sword = int32_t;
alias Elf64_Word = uint32_t;
alias Elf64_Sword = int32_t;
alias Elf32_Xword = uint64_t;
alias Elf32_Sxword = int64_t;
alias Elf64_Xword = uint64_t;
alias Elf64_Sxword = int64_t;
alias Elf32_Addr = uint32_t;
alias Elf64_Addr = uint64_t;
alias Elf32_Off = uint32_t;
alias Elf64_Off = uint64_t;
alias Elf32_Section = uint16_t;
alias Elf64_Section = uint16_t;
alias Elf32_Versym = Elf32_Half;
alias Elf64_Versym = Elf64_Half;
struct Elf32_Ehdr
{
char[EI_NIDENT] e_ident = 0;
Elf32_Half e_type;
Elf32_Half e_machine;
Elf32_Word e_version;
Elf32_Addr e_entry;
Elf32_Off e_phoff;
Elf32_Off e_shoff;
Elf32_Word e_flags;
Elf32_Half e_ehsize;
Elf32_Half e_phentsize;
Elf32_Half e_phnum;
Elf32_Half e_shentsize;
Elf32_Half e_shnum;
Elf32_Half e_shstrndx;
}
struct Elf64_Ehdr
{
char[EI_NIDENT] e_ident = 0;
Elf64_Half e_type;
Elf64_Half e_machine;
Elf64_Word e_version;
Elf64_Addr e_entry;
Elf64_Off e_phoff;
Elf64_Off e_shoff;
Elf64_Word e_flags;
Elf64_Half e_ehsize;
Elf64_Half e_phentsize;
Elf64_Half e_phnum;
Elf64_Half e_shentsize;
Elf64_Half e_shnum;
Elf64_Half e_shstrndx;
}
enum EI_NIDENT = 16;
enum EI_VERSION = 6;
enum EI_CLASS = 4;
enum EI_DATA = 5;
enum EV_CURRENT = 1;
enum ELFDATANONE = 0;
enum ELFDATA2LSB = 1;
enum ELFDATA2MSB = 2;
enum ELFDATANUM = 3;
enum ELFCLASSNONE = 0;
enum ELFCLASS32 = 1;
enum ELFCLASS64 = 2;
enum ELFCLASSNUM = 3;
enum ET_REL = 1;
struct Elf32_Shdr
{
Elf32_Word sh_name;
Elf32_Word sh_type;
Elf32_Word sh_flags;
Elf32_Addr sh_addr;
Elf32_Off sh_offset;
Elf32_Word sh_size;
Elf32_Word sh_link;
Elf32_Word sh_info;
Elf32_Word sh_addralign;
Elf32_Word sh_entsize;
}
struct Elf64_Shdr
{
Elf64_Word sh_name;
Elf64_Word sh_type;
Elf64_Xword sh_flags;
Elf64_Addr sh_addr;
Elf64_Off sh_offset;
Elf64_Xword sh_size;
Elf64_Word sh_link;
Elf64_Word sh_info;
Elf64_Xword sh_addralign;
Elf64_Xword sh_entsize;
}
enum SHT_SYMTAB = 2;
enum SHT_STRTAB = 3;
struct Elf32_Sym
{
Elf32_Word st_name;
Elf32_Addr st_value;
Elf32_Word st_size;
ubyte st_info;
ubyte st_other;
Elf32_Section st_shndx;
}
struct Elf64_Sym
{
Elf64_Word st_name;
ubyte st_info;
ubyte st_other;
Elf64_Section st_shndx;
Elf64_Addr st_value;
Elf64_Xword st_size;
}
enum STB_GLOBAL = 1;
enum STB_WEAK = 2;
enum SHN_UNDEF = 0;