mirror of
https://github.com/golang/go
synced 2024-11-08 05:26:15 -07:00
161874da2a
Each URL was manually verified to ensure it did not serve up incorrect content. Change-Id: I4dc846227af95a73ee9a3074d0c379ff0fa955df Reviewed-on: https://go-review.googlesource.com/115798 Reviewed-by: Ian Lance Taylor <iant@golang.org> Run-TryBot: Ian Lance Taylor <iant@golang.org>
290 lines
7.5 KiB
Go
290 lines
7.5 KiB
Go
// Copyright 2012 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
// +build linux
|
|
// +build 386 amd64 arm arm64
|
|
|
|
package runtime
|
|
|
|
import "unsafe"
|
|
|
|
// Look up symbols in the Linux vDSO.
|
|
|
|
// This code was originally based on the sample Linux vDSO parser at
|
|
// https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/tools/testing/selftests/vDSO/parse_vdso.c
|
|
|
|
// This implements the ELF dynamic linking spec at
|
|
// http://sco.com/developers/gabi/latest/ch5.dynamic.html
|
|
|
|
// The version section is documented at
|
|
// https://refspecs.linuxfoundation.org/LSB_3.2.0/LSB-Core-generic/LSB-Core-generic/symversion.html
|
|
|
|
const (
|
|
_AT_SYSINFO_EHDR = 33
|
|
|
|
_PT_LOAD = 1 /* Loadable program segment */
|
|
_PT_DYNAMIC = 2 /* Dynamic linking information */
|
|
|
|
_DT_NULL = 0 /* Marks end of dynamic section */
|
|
_DT_HASH = 4 /* Dynamic symbol hash table */
|
|
_DT_STRTAB = 5 /* Address of string table */
|
|
_DT_SYMTAB = 6 /* Address of symbol table */
|
|
_DT_GNU_HASH = 0x6ffffef5 /* GNU-style dynamic symbol hash table */
|
|
_DT_VERSYM = 0x6ffffff0
|
|
_DT_VERDEF = 0x6ffffffc
|
|
|
|
_VER_FLG_BASE = 0x1 /* Version definition of file itself */
|
|
|
|
_SHN_UNDEF = 0 /* Undefined section */
|
|
|
|
_SHT_DYNSYM = 11 /* Dynamic linker symbol table */
|
|
|
|
_STT_FUNC = 2 /* Symbol is a code object */
|
|
|
|
_STB_GLOBAL = 1 /* Global symbol */
|
|
_STB_WEAK = 2 /* Weak symbol */
|
|
|
|
_EI_NIDENT = 16
|
|
|
|
// Maximum indices for the array types used when traversing the vDSO ELF structures.
|
|
// Computed from architecture-specific max provided by vdso_linux_*.go
|
|
vdsoSymTabSize = vdsoArrayMax / unsafe.Sizeof(elfSym{})
|
|
vdsoDynSize = vdsoArrayMax / unsafe.Sizeof(elfDyn{})
|
|
vdsoSymStringsSize = vdsoArrayMax // byte
|
|
vdsoVerSymSize = vdsoArrayMax / 2 // uint16
|
|
vdsoHashSize = vdsoArrayMax / 4 // uint32
|
|
|
|
// vdsoBloomSizeScale is a scaling factor for gnuhash tables which are uint32 indexed,
|
|
// but contain uintptrs
|
|
vdsoBloomSizeScale = unsafe.Sizeof(uintptr(0)) / 4 // uint32
|
|
)
|
|
|
|
/* How to extract and insert information held in the st_info field. */
|
|
func _ELF_ST_BIND(val byte) byte { return val >> 4 }
|
|
func _ELF_ST_TYPE(val byte) byte { return val & 0xf }
|
|
|
|
type vdsoSymbolKey struct {
|
|
name string
|
|
symHash uint32
|
|
gnuHash uint32
|
|
ptr *uintptr
|
|
}
|
|
|
|
type vdsoVersionKey struct {
|
|
version string
|
|
verHash uint32
|
|
}
|
|
|
|
type vdsoInfo struct {
|
|
valid bool
|
|
|
|
/* Load information */
|
|
loadAddr uintptr
|
|
loadOffset uintptr /* loadAddr - recorded vaddr */
|
|
|
|
/* Symbol table */
|
|
symtab *[vdsoSymTabSize]elfSym
|
|
symstrings *[vdsoSymStringsSize]byte
|
|
chain []uint32
|
|
bucket []uint32
|
|
symOff uint32
|
|
isGNUHash bool
|
|
|
|
/* Version table */
|
|
versym *[vdsoVerSymSize]uint16
|
|
verdef *elfVerdef
|
|
}
|
|
|
|
// see vdso_linux_*.go for vdsoSymbolKeys[] and vdso*Sym vars
|
|
|
|
func vdsoInitFromSysinfoEhdr(info *vdsoInfo, hdr *elfEhdr) {
|
|
info.valid = false
|
|
info.loadAddr = uintptr(unsafe.Pointer(hdr))
|
|
|
|
pt := unsafe.Pointer(info.loadAddr + uintptr(hdr.e_phoff))
|
|
|
|
// We need two things from the segment table: the load offset
|
|
// and the dynamic table.
|
|
var foundVaddr bool
|
|
var dyn *[vdsoDynSize]elfDyn
|
|
for i := uint16(0); i < hdr.e_phnum; i++ {
|
|
pt := (*elfPhdr)(add(pt, uintptr(i)*unsafe.Sizeof(elfPhdr{})))
|
|
switch pt.p_type {
|
|
case _PT_LOAD:
|
|
if !foundVaddr {
|
|
foundVaddr = true
|
|
info.loadOffset = info.loadAddr + uintptr(pt.p_offset-pt.p_vaddr)
|
|
}
|
|
|
|
case _PT_DYNAMIC:
|
|
dyn = (*[vdsoDynSize]elfDyn)(unsafe.Pointer(info.loadAddr + uintptr(pt.p_offset)))
|
|
}
|
|
}
|
|
|
|
if !foundVaddr || dyn == nil {
|
|
return // Failed
|
|
}
|
|
|
|
// Fish out the useful bits of the dynamic table.
|
|
|
|
var hash, gnuhash *[vdsoHashSize]uint32
|
|
info.symstrings = nil
|
|
info.symtab = nil
|
|
info.versym = nil
|
|
info.verdef = nil
|
|
for i := 0; dyn[i].d_tag != _DT_NULL; i++ {
|
|
dt := &dyn[i]
|
|
p := info.loadOffset + uintptr(dt.d_val)
|
|
switch dt.d_tag {
|
|
case _DT_STRTAB:
|
|
info.symstrings = (*[vdsoSymStringsSize]byte)(unsafe.Pointer(p))
|
|
case _DT_SYMTAB:
|
|
info.symtab = (*[vdsoSymTabSize]elfSym)(unsafe.Pointer(p))
|
|
case _DT_HASH:
|
|
hash = (*[vdsoHashSize]uint32)(unsafe.Pointer(p))
|
|
case _DT_GNU_HASH:
|
|
gnuhash = (*[vdsoHashSize]uint32)(unsafe.Pointer(p))
|
|
case _DT_VERSYM:
|
|
info.versym = (*[vdsoVerSymSize]uint16)(unsafe.Pointer(p))
|
|
case _DT_VERDEF:
|
|
info.verdef = (*elfVerdef)(unsafe.Pointer(p))
|
|
}
|
|
}
|
|
|
|
if info.symstrings == nil || info.symtab == nil || (hash == nil && gnuhash == nil) {
|
|
return // Failed
|
|
}
|
|
|
|
if info.verdef == nil {
|
|
info.versym = nil
|
|
}
|
|
|
|
if gnuhash != nil {
|
|
// Parse the GNU hash table header.
|
|
nbucket := gnuhash[0]
|
|
info.symOff = gnuhash[1]
|
|
bloomSize := gnuhash[2]
|
|
info.bucket = gnuhash[4+bloomSize*uint32(vdsoBloomSizeScale):][:nbucket]
|
|
info.chain = gnuhash[4+bloomSize*uint32(vdsoBloomSizeScale)+nbucket:]
|
|
info.isGNUHash = true
|
|
} else {
|
|
// Parse the hash table header.
|
|
nbucket := hash[0]
|
|
nchain := hash[1]
|
|
info.bucket = hash[2 : 2+nbucket]
|
|
info.chain = hash[2+nbucket : 2+nbucket+nchain]
|
|
}
|
|
|
|
// That's all we need.
|
|
info.valid = true
|
|
}
|
|
|
|
func vdsoFindVersion(info *vdsoInfo, ver *vdsoVersionKey) int32 {
|
|
if !info.valid {
|
|
return 0
|
|
}
|
|
|
|
def := info.verdef
|
|
for {
|
|
if def.vd_flags&_VER_FLG_BASE == 0 {
|
|
aux := (*elfVerdaux)(add(unsafe.Pointer(def), uintptr(def.vd_aux)))
|
|
if def.vd_hash == ver.verHash && ver.version == gostringnocopy(&info.symstrings[aux.vda_name]) {
|
|
return int32(def.vd_ndx & 0x7fff)
|
|
}
|
|
}
|
|
|
|
if def.vd_next == 0 {
|
|
break
|
|
}
|
|
def = (*elfVerdef)(add(unsafe.Pointer(def), uintptr(def.vd_next)))
|
|
}
|
|
|
|
return -1 // cannot match any version
|
|
}
|
|
|
|
func vdsoParseSymbols(info *vdsoInfo, version int32) {
|
|
if !info.valid {
|
|
return
|
|
}
|
|
|
|
apply := func(symIndex uint32, k vdsoSymbolKey) bool {
|
|
sym := &info.symtab[symIndex]
|
|
typ := _ELF_ST_TYPE(sym.st_info)
|
|
bind := _ELF_ST_BIND(sym.st_info)
|
|
if typ != _STT_FUNC || bind != _STB_GLOBAL && bind != _STB_WEAK || sym.st_shndx == _SHN_UNDEF {
|
|
return false
|
|
}
|
|
if k.name != gostringnocopy(&info.symstrings[sym.st_name]) {
|
|
return false
|
|
}
|
|
// Check symbol version.
|
|
if info.versym != nil && version != 0 && int32(info.versym[symIndex]&0x7fff) != version {
|
|
return false
|
|
}
|
|
|
|
*k.ptr = info.loadOffset + uintptr(sym.st_value)
|
|
return true
|
|
}
|
|
|
|
if !info.isGNUHash {
|
|
// Old-style DT_HASH table.
|
|
for _, k := range vdsoSymbolKeys {
|
|
for chain := info.bucket[k.symHash%uint32(len(info.bucket))]; chain != 0; chain = info.chain[chain] {
|
|
if apply(chain, k) {
|
|
break
|
|
}
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
// New-style DT_GNU_HASH table.
|
|
for _, k := range vdsoSymbolKeys {
|
|
symIndex := info.bucket[k.gnuHash%uint32(len(info.bucket))]
|
|
if symIndex < info.symOff {
|
|
continue
|
|
}
|
|
for ; ; symIndex++ {
|
|
hash := info.chain[symIndex-info.symOff]
|
|
if hash|1 == k.gnuHash|1 {
|
|
// Found a hash match.
|
|
if apply(symIndex, k) {
|
|
break
|
|
}
|
|
}
|
|
if hash&1 != 0 {
|
|
// End of chain.
|
|
break
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func vdsoauxv(tag, val uintptr) {
|
|
switch tag {
|
|
case _AT_SYSINFO_EHDR:
|
|
if val == 0 {
|
|
// Something went wrong
|
|
return
|
|
}
|
|
var info vdsoInfo
|
|
// TODO(rsc): I don't understand why the compiler thinks info escapes
|
|
// when passed to the three functions below.
|
|
info1 := (*vdsoInfo)(noescape(unsafe.Pointer(&info)))
|
|
vdsoInitFromSysinfoEhdr(info1, (*elfEhdr)(unsafe.Pointer(val)))
|
|
vdsoParseSymbols(info1, vdsoFindVersion(info1, &vdsoLinuxVersion))
|
|
}
|
|
}
|
|
|
|
// vdsoMarker returns whether PC is on the VDSO page.
|
|
func inVDSOPage(pc uintptr) bool {
|
|
for _, k := range vdsoSymbolKeys {
|
|
if *k.ptr != 0 {
|
|
page := *k.ptr &^ (physPageSize - 1)
|
|
return pc >= page && pc < page+physPageSize
|
|
}
|
|
}
|
|
return false
|
|
}
|