source: mainline/kernel/generic/src/lib/elf.c@ 44a7ee5

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 44a7ee5 was 44a7ee5, checked in by Jiri Svoboda <jiri@…>, 8 years ago

memxxx functions should be provided in the kernel via the same header as in userspace (mem.h).

  • Property mode set to 100644
File size: 6.9 KB
RevLine 
[de6b301]1/*
[df4ed85]2 * Copyright (c) 2006 Sergey Bondari
3 * Copyright (c) 2006 Jakub Jermar
[de6b301]4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * - Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * - Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * - The name of the author may not be used to endorse or promote products
16 * derived from this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
22 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
23 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
25 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
27 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 */
29
[da1bafb]30/** @addtogroup generic
[b45c443]31 * @{
32 */
33
[cf26ba9]34/**
[b45c443]35 * @file
[da1bafb]36 * @brief Kernel ELF loader.
[cf26ba9]37 */
38
[d4b5542]39#include <lib/elf.h>
[de6b301]40#include <debug.h>
[d99c1d2]41#include <typedefs.h>
[de6b301]42#include <mm/as.h>
43#include <mm/frame.h>
[78a95d6f]44#include <mm/slab.h>
[de6b301]45#include <align.h>
[78a95d6f]46#include <macros.h>
[8182031]47#include <arch.h>
[de6b301]48
[e16e2ba4]49#include <lib/elf_load.h>
50
[a000878c]51static const char *error_codes[] = {
[de6b301]52 "no error",
53 "invalid image",
54 "address space error",
55 "incompatible image",
56 "unsupported image type",
57 "irrecoverable error"
58};
59
[da1bafb]60static int segment_header(elf_segment_header_t *, elf_header_t *, as_t *,
61 unsigned int);
62static int section_header(elf_section_header_t *, elf_header_t *, as_t *);
63static int load_segment(elf_segment_header_t *, elf_header_t *, as_t *);
[de6b301]64
65/** ELF loader
66 *
67 * @param header Pointer to ELF header in memory
[da1bafb]68 * @param as Created and properly mapped address space
69 * @param flags A combination of ELD_F_*
70 *
[de6b301]71 * @return EE_OK on success
[da1bafb]72 *
[de6b301]73 */
[da1bafb]74unsigned int elf_load(elf_header_t *header, as_t *as, unsigned int flags)
[de6b301]75{
76 /* Identify ELF */
[da1bafb]77 if ((header->e_ident[EI_MAG0] != ELFMAG0) ||
78 (header->e_ident[EI_MAG1] != ELFMAG1) ||
79 (header->e_ident[EI_MAG2] != ELFMAG2) ||
80 (header->e_ident[EI_MAG3] != ELFMAG3))
[de6b301]81 return EE_INVALID;
82
83 /* Identify ELF compatibility */
[da1bafb]84 if ((header->e_ident[EI_DATA] != ELF_DATA_ENCODING) ||
85 (header->e_machine != ELF_MACHINE) ||
86 (header->e_ident[EI_VERSION] != EV_CURRENT) ||
87 (header->e_version != EV_CURRENT) ||
88 (header->e_ident[EI_CLASS] != ELF_CLASS))
[de6b301]89 return EE_INCOMPATIBLE;
[da1bafb]90
[78a95d6f]91 if (header->e_phentsize != sizeof(elf_segment_header_t))
92 return EE_INCOMPATIBLE;
[da1bafb]93
[78a95d6f]94 if (header->e_shentsize != sizeof(elf_section_header_t))
[de6b301]95 return EE_INCOMPATIBLE;
[da1bafb]96
[de6b301]97 /* Check if the object type is supported. */
98 if (header->e_type != ET_EXEC)
99 return EE_UNSUPPORTED;
[da1bafb]100
[1cc2974]101 /* Check if the ELF image starts on a page boundary */
[da1bafb]102 if (ALIGN_UP((uintptr_t) header, PAGE_SIZE) != (uintptr_t) header)
[1cc2974]103 return EE_UNSUPPORTED;
[da1bafb]104
[78a95d6f]105 /* Walk through all segment headers and process them. */
[da1bafb]106 elf_half i;
[de6b301]107 for (i = 0; i < header->e_phnum; i++) {
[da1bafb]108 elf_segment_header_t *seghdr =
109 &((elf_segment_header_t *)(((uint8_t *) header) +
[75dd55d]110 header->e_phoff))[i];
[da1bafb]111
112 int rc = segment_header(seghdr, header, as, flags);
[78a95d6f]113 if (rc != EE_OK)
114 return rc;
115 }
[da1bafb]116
[bcaca55]117 /* Inspect all section headers and process them. */
[78a95d6f]118 for (i = 0; i < header->e_shnum; i++) {
[da1bafb]119 elf_section_header_t *sechdr =
120 &((elf_section_header_t *)(((uint8_t *) header) +
[75dd55d]121 header->e_shoff))[i];
[da1bafb]122
123 int rc = section_header(sechdr, header, as);
[de6b301]124 if (rc != EE_OK)
125 return rc;
126 }
[da1bafb]127
[de6b301]128 return EE_OK;
129}
130
131/** Print error message according to error code.
132 *
133 * @param rc Return code returned by elf_load().
134 *
135 * @return NULL terminated description of error.
[da1bafb]136 *
[de6b301]137 */
[a000878c]138const char *elf_error(unsigned int rc)
[de6b301]139{
[75dd55d]140 ASSERT(rc < sizeof(error_codes) / sizeof(char *));
[da1bafb]141
[de6b301]142 return error_codes[rc];
143}
144
[78a95d6f]145/** Process segment header.
[de6b301]146 *
[78a95d6f]147 * @param entry Segment header.
[da1bafb]148 * @param elf ELF header.
149 * @param as Address space into wich the ELF is being loaded.
[de6b301]150 *
151 * @return EE_OK on success, error code otherwise.
[da1bafb]152 *
[de6b301]153 */
[75dd55d]154static int segment_header(elf_segment_header_t *entry, elf_header_t *elf,
[da1bafb]155 as_t *as, unsigned int flags)
[de6b301]156{
157 switch (entry->p_type) {
[33c0c649]158 case PT_NULL:
159 case PT_PHDR:
[1e00216]160 case PT_NOTE:
[de6b301]161 break;
[33c0c649]162 case PT_LOAD:
[78a95d6f]163 return load_segment(entry, elf, as);
[6adb775f]164 case PT_TLS:
165 break;
[33c0c649]166 case PT_DYNAMIC:
167 case PT_INTERP:
[137691a]168 // FIXME
169 /*
170 char *interp = (char *) elf + entry->p_offset;
171 if (memcmp((uintptr_t) interp, (uintptr_t) ELF_INTERP_ZSTR,
[c98e6ee]172 ELF_INTERP_ZLEN) != 0) {
173 return EE_UNSUPPORTED;
[137691a]174 } */
[da1bafb]175 if ((flags & ELD_F_LOADER) == 0)
[c98e6ee]176 return EE_LOADER;
177 break;
[33c0c649]178 case PT_SHLIB:
179 case PT_LOPROC:
180 case PT_HIPROC:
181 default:
[de6b301]182 return EE_UNSUPPORTED;
183 }
184 return EE_OK;
185}
186
187/** Load segment described by program header entry.
188 *
189 * @param entry Program header entry describing segment to be loaded.
[da1bafb]190 * @param elf ELF header.
191 * @param as Address space into wich the ELF is being loaded.
[de6b301]192 *
193 * @return EE_OK on success, error code otherwise.
[da1bafb]194 *
[de6b301]195 */
[78a95d6f]196int load_segment(elf_segment_header_t *entry, elf_header_t *elf, as_t *as)
[de6b301]197{
[127c957b]198 mem_backend_data_t backend_data;
199 backend_data.elf = elf;
200 backend_data.segment = entry;
[da1bafb]201
[de6b301]202 if (entry->p_align > 1) {
[75dd55d]203 if ((entry->p_offset % entry->p_align) !=
[da1bafb]204 (entry->p_vaddr % entry->p_align))
[de6b301]205 return EE_INVALID;
206 }
[da1bafb]207
208 unsigned int flags = 0;
209
[c23502d]210 if (entry->p_flags & PF_X)
211 flags |= AS_AREA_EXEC;
[da1bafb]212
[c23502d]213 if (entry->p_flags & PF_W)
214 flags |= AS_AREA_WRITE;
[da1bafb]215
[c23502d]216 if (entry->p_flags & PF_R)
217 flags |= AS_AREA_READ;
[da1bafb]218
[0ee077ee]219 flags |= AS_AREA_CACHEABLE;
[da1bafb]220
221 /*
[1cc2974]222 * Align vaddr down, inserting a little "gap" at the beginning.
223 * Adjust area size, so that its end remains in place.
[da1bafb]224 *
[78a95d6f]225 */
[da1bafb]226 uintptr_t base = ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE);
227 size_t mem_sz = entry->p_memsz + (entry->p_vaddr - base);
228
[fbcdeb8]229 as_area_t *area = as_area_create(as, flags, mem_sz,
230 AS_AREA_ATTR_NONE, &elf_backend, &backend_data, &base, 0);
[da1bafb]231 if (!area)
[5a7d9d1]232 return EE_MEMORY;
[de6b301]233
[8182031]234 /*
235 * The segment will be mapped on demand by elf_page_fault().
[da1bafb]236 *
[8182031]237 */
[da1bafb]238
[78a95d6f]239 return EE_OK;
240}
241
242/** Process section header.
243 *
244 * @param entry Segment header.
[da1bafb]245 * @param elf ELF header.
246 * @param as Address space into wich the ELF is being loaded.
[78a95d6f]247 *
248 * @return EE_OK on success, error code otherwise.
[da1bafb]249 *
[78a95d6f]250 */
[75dd55d]251static int section_header(elf_section_header_t *entry, elf_header_t *elf,
252 as_t *as)
[78a95d6f]253{
254 switch (entry->sh_type) {
[75dd55d]255 case SHT_PROGBITS:
256 if (entry->sh_flags & SHF_TLS) {
257 /* .tdata */
258 }
259 break;
260 case SHT_NOBITS:
261 if (entry->sh_flags & SHF_TLS) {
262 /* .tbss */
263 }
264 break;
[33c0c649]265 default:
[78a95d6f]266 break;
[de6b301]267 }
268
269 return EE_OK;
270}
[b45c443]271
[cc73a8a1]272/** @}
[b45c443]273 */
Note: See TracBrowser for help on using the repository browser.