xref: /aosp_15_r20/platform_testing/utils/shell-as/elf-utils.cpp (revision dd0948b35e70be4c0246aabd6c72554a5eb8b22a)
1*dd0948b3SAndroid Build Coastguard Worker /*
2*dd0948b3SAndroid Build Coastguard Worker  * Copyright (C) 2023 The Android Open Source Project
3*dd0948b3SAndroid Build Coastguard Worker  *
4*dd0948b3SAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*dd0948b3SAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*dd0948b3SAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*dd0948b3SAndroid Build Coastguard Worker  *
8*dd0948b3SAndroid Build Coastguard Worker  *     http://www.apache.org/licenses/LICENSE-2.0
9*dd0948b3SAndroid Build Coastguard Worker  *
10*dd0948b3SAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*dd0948b3SAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*dd0948b3SAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*dd0948b3SAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*dd0948b3SAndroid Build Coastguard Worker  * limitations under the License.
15*dd0948b3SAndroid Build Coastguard Worker  */
16*dd0948b3SAndroid Build Coastguard Worker 
17*dd0948b3SAndroid Build Coastguard Worker #include <elf.h>
18*dd0948b3SAndroid Build Coastguard Worker #include <stdio.h>
19*dd0948b3SAndroid Build Coastguard Worker 
20*dd0948b3SAndroid Build Coastguard Worker #include <iostream>
21*dd0948b3SAndroid Build Coastguard Worker #include <string>
22*dd0948b3SAndroid Build Coastguard Worker 
23*dd0948b3SAndroid Build Coastguard Worker #include "./elf.h"
24*dd0948b3SAndroid Build Coastguard Worker 
25*dd0948b3SAndroid Build Coastguard Worker namespace shell_as {
26*dd0948b3SAndroid Build Coastguard Worker 
27*dd0948b3SAndroid Build Coastguard Worker namespace {
28*dd0948b3SAndroid Build Coastguard Worker // The base address of a PIE binary when loaded with ASLR disabled.
29*dd0948b3SAndroid Build Coastguard Worker #if defined(__arm__) || defined(__aarch64__)
30*dd0948b3SAndroid Build Coastguard Worker constexpr uint64_t k32BitImageBase = 0xAAAAA000;
31*dd0948b3SAndroid Build Coastguard Worker constexpr uint64_t k64BitImageBase = 0x5555555000;
32*dd0948b3SAndroid Build Coastguard Worker #else
33*dd0948b3SAndroid Build Coastguard Worker constexpr uint64_t k32BitImageBase = 0x56555000;
34*dd0948b3SAndroid Build Coastguard Worker constexpr uint64_t k64BitImageBase = 0x555555554000;
35*dd0948b3SAndroid Build Coastguard Worker #endif
36*dd0948b3SAndroid Build Coastguard Worker }  // namespace
37*dd0948b3SAndroid Build Coastguard Worker 
GetElfEntryPoint(const pid_t process_id,uint64_t * entry_address,bool * is_arm_mode)38*dd0948b3SAndroid Build Coastguard Worker bool GetElfEntryPoint(const pid_t process_id, uint64_t* entry_address,
39*dd0948b3SAndroid Build Coastguard Worker                       bool* is_arm_mode) {
40*dd0948b3SAndroid Build Coastguard Worker   uint8_t elf_header_buffer[sizeof(Elf64_Ehdr)];
41*dd0948b3SAndroid Build Coastguard Worker   std::string exe_path = "/proc/" + std::to_string(process_id) + "/exe";
42*dd0948b3SAndroid Build Coastguard Worker   FILE* exe_file = fopen(exe_path.c_str(), "rb");
43*dd0948b3SAndroid Build Coastguard Worker   if (exe_file == nullptr) {
44*dd0948b3SAndroid Build Coastguard Worker     std::cerr << "Unable to open executable of process " << process_id
45*dd0948b3SAndroid Build Coastguard Worker               << std::endl;
46*dd0948b3SAndroid Build Coastguard Worker     return false;
47*dd0948b3SAndroid Build Coastguard Worker   }
48*dd0948b3SAndroid Build Coastguard Worker 
49*dd0948b3SAndroid Build Coastguard Worker   int read_size =
50*dd0948b3SAndroid Build Coastguard Worker       fread(elf_header_buffer, sizeof(elf_header_buffer), 1, exe_file);
51*dd0948b3SAndroid Build Coastguard Worker   fclose(exe_file);
52*dd0948b3SAndroid Build Coastguard Worker   if (read_size <= 0) {
53*dd0948b3SAndroid Build Coastguard Worker     std::cerr << "Unable to read executable of process " << process_id
54*dd0948b3SAndroid Build Coastguard Worker               << std::endl;
55*dd0948b3SAndroid Build Coastguard Worker     return false;
56*dd0948b3SAndroid Build Coastguard Worker   }
57*dd0948b3SAndroid Build Coastguard Worker 
58*dd0948b3SAndroid Build Coastguard Worker   const Elf32_Ehdr* file_header_32 = (Elf32_Ehdr*)elf_header_buffer;
59*dd0948b3SAndroid Build Coastguard Worker   const Elf64_Ehdr* file_header_64 = (Elf64_Ehdr*)elf_header_buffer;
60*dd0948b3SAndroid Build Coastguard Worker   // The first handful of bytes of a header do not depend on whether the file is
61*dd0948b3SAndroid Build Coastguard Worker   // 32bit vs 64bit.
62*dd0948b3SAndroid Build Coastguard Worker   const bool is_pie_binary = file_header_32->e_type == ET_DYN;
63*dd0948b3SAndroid Build Coastguard Worker 
64*dd0948b3SAndroid Build Coastguard Worker   if (file_header_32->e_ident[EI_CLASS] == ELFCLASS32) {
65*dd0948b3SAndroid Build Coastguard Worker     *entry_address =
66*dd0948b3SAndroid Build Coastguard Worker         file_header_32->e_entry + (is_pie_binary ? k32BitImageBase : 0);
67*dd0948b3SAndroid Build Coastguard Worker   } else if (file_header_32->e_ident[EI_CLASS] == ELFCLASS64) {
68*dd0948b3SAndroid Build Coastguard Worker     *entry_address =
69*dd0948b3SAndroid Build Coastguard Worker         file_header_64->e_entry + (is_pie_binary ? k64BitImageBase : 0);
70*dd0948b3SAndroid Build Coastguard Worker   } else {
71*dd0948b3SAndroid Build Coastguard Worker     return false;
72*dd0948b3SAndroid Build Coastguard Worker   }
73*dd0948b3SAndroid Build Coastguard Worker 
74*dd0948b3SAndroid Build Coastguard Worker   *is_arm_mode = false;
75*dd0948b3SAndroid Build Coastguard Worker #if defined(__arm__)
76*dd0948b3SAndroid Build Coastguard Worker   if ((*entry_address & 1) == 0) {
77*dd0948b3SAndroid Build Coastguard Worker     *is_arm_mode = true;
78*dd0948b3SAndroid Build Coastguard Worker   }
79*dd0948b3SAndroid Build Coastguard Worker   // The entry address for ARM Elf binaries is branched to using a BX
80*dd0948b3SAndroid Build Coastguard Worker   // instruction. The low bit of these instructions indicates the instruction
81*dd0948b3SAndroid Build Coastguard Worker   // set of the code that is being jumped to. A low bit of 1 indicates thumb
82*dd0948b3SAndroid Build Coastguard Worker   // mode while a low bit of 0 indicates ARM mode.
83*dd0948b3SAndroid Build Coastguard Worker   *entry_address &= ~1;
84*dd0948b3SAndroid Build Coastguard Worker #endif
85*dd0948b3SAndroid Build Coastguard Worker 
86*dd0948b3SAndroid Build Coastguard Worker   return true;
87*dd0948b3SAndroid Build Coastguard Worker }
88*dd0948b3SAndroid Build Coastguard Worker 
89*dd0948b3SAndroid Build Coastguard Worker }  // namespace shell_as
90