source: mainline/kernel/generic/src/lib/elf.c@ cf5ddf6

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since cf5ddf6 was b3f8fb7, checked in by Martin Decky <martin@…>, 18 years ago

huge type system cleanup
remove cyclical type dependencies across multiple header files
many minor coding style fixes

  • Property mode set to 100644
File size: 6.0 KB
RevLine 
[de6b301]1/*
[df4ed85]2 * Copyright (c) 2006 Sergey Bondari
3 * Copyright (c) 2006 Jakub Jermar
[de6b301]4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * - Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * - Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * - The name of the author may not be used to endorse or promote products
16 * derived from this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
22 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
23 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
25 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
27 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 */
29
[cc73a8a1]30/** @addtogroup generic
[b45c443]31 * @{
32 */
33
[cf26ba9]34/**
[b45c443]35 * @file
[cf26ba9]36 * @brief Kernel ELF loader.
37 */
38
[d4b5542]39#include <lib/elf.h>
[de6b301]40#include <debug.h>
41#include <arch/types.h>
42#include <mm/as.h>
43#include <mm/frame.h>
[78a95d6f]44#include <mm/slab.h>
[de6b301]45#include <align.h>
[78a95d6f]46#include <memstr.h>
47#include <macros.h>
[8182031]48#include <arch.h>
[de6b301]49
50static char *error_codes[] = {
51 "no error",
52 "invalid image",
53 "address space error",
54 "incompatible image",
55 "unsupported image type",
56 "irrecoverable error"
57};
58
[78a95d6f]59static int segment_header(elf_segment_header_t *entry, elf_header_t *elf, as_t *as);
60static int section_header(elf_section_header_t *entry, elf_header_t *elf, as_t *as);
61static int load_segment(elf_segment_header_t *entry, elf_header_t *elf, as_t *as);
[de6b301]62
63/** ELF loader
64 *
65 * @param header Pointer to ELF header in memory
66 * @param as Created and properly mapped address space
67 * @return EE_OK on success
68 */
69int elf_load(elf_header_t *header, as_t * as)
70{
71 int i, rc;
72
73 /* Identify ELF */
74 if (header->e_ident[EI_MAG0] != ELFMAG0 || header->e_ident[EI_MAG1] != ELFMAG1 ||
75 header->e_ident[EI_MAG2] != ELFMAG2 || header->e_ident[EI_MAG3] != ELFMAG3) {
76 return EE_INVALID;
77 }
78
79 /* Identify ELF compatibility */
80 if (header->e_ident[EI_DATA] != ELF_DATA_ENCODING || header->e_machine != ELF_MACHINE ||
81 header->e_ident[EI_VERSION] != EV_CURRENT || header->e_version != EV_CURRENT ||
82 header->e_ident[EI_CLASS] != ELF_CLASS) {
83 return EE_INCOMPATIBLE;
84 }
85
[78a95d6f]86 if (header->e_phentsize != sizeof(elf_segment_header_t))
87 return EE_INCOMPATIBLE;
88
89 if (header->e_shentsize != sizeof(elf_section_header_t))
[de6b301]90 return EE_INCOMPATIBLE;
91
92 /* Check if the object type is supported. */
93 if (header->e_type != ET_EXEC)
94 return EE_UNSUPPORTED;
95
[78a95d6f]96 /* Walk through all segment headers and process them. */
[de6b301]97 for (i = 0; i < header->e_phnum; i++) {
[7f1c620]98 rc = segment_header(&((elf_segment_header_t *)(((uint8_t *) header) + header->e_phoff))[i], header, as);
[78a95d6f]99 if (rc != EE_OK)
100 return rc;
101 }
102
103 /* Inspect all section headers and proccess them. */
104 for (i = 0; i < header->e_shnum; i++) {
[7f1c620]105 rc = section_header(&((elf_section_header_t *)(((uint8_t *) header) + header->e_shoff))[i], header, as);
[de6b301]106 if (rc != EE_OK)
107 return rc;
108 }
109
110 return EE_OK;
111}
112
113/** Print error message according to error code.
114 *
115 * @param rc Return code returned by elf_load().
116 *
117 * @return NULL terminated description of error.
118 */
119char *elf_error(int rc)
120{
121 ASSERT(rc < sizeof(error_codes)/sizeof(char *));
122
123 return error_codes[rc];
124}
125
[78a95d6f]126/** Process segment header.
[de6b301]127 *
[78a95d6f]128 * @param entry Segment header.
129 * @param elf ELF header.
[de6b301]130 * @param as Address space into wich the ELF is being loaded.
131 *
132 * @return EE_OK on success, error code otherwise.
133 */
[78a95d6f]134static int segment_header(elf_segment_header_t *entry, elf_header_t *elf, as_t *as)
[de6b301]135{
136 switch (entry->p_type) {
[33c0c649]137 case PT_NULL:
138 case PT_PHDR:
[de6b301]139 break;
[33c0c649]140 case PT_LOAD:
[78a95d6f]141 return load_segment(entry, elf, as);
[de6b301]142 break;
[33c0c649]143 case PT_DYNAMIC:
144 case PT_INTERP:
145 case PT_SHLIB:
146 case PT_NOTE:
147 case PT_LOPROC:
148 case PT_HIPROC:
149 default:
[de6b301]150 return EE_UNSUPPORTED;
151 break;
152 }
153 return EE_OK;
154}
155
156/** Load segment described by program header entry.
157 *
158 * @param entry Program header entry describing segment to be loaded.
[78a95d6f]159 * @param elf ELF header.
[9179d0a]160 * @param as Address space into wich the ELF is being loaded.
[de6b301]161 *
162 * @return EE_OK on success, error code otherwise.
163 */
[78a95d6f]164int load_segment(elf_segment_header_t *entry, elf_header_t *elf, as_t *as)
[de6b301]165{
166 as_area_t *a;
[8182031]167 int flags = 0;
[127c957b]168 mem_backend_data_t backend_data;
169
170 backend_data.elf = elf;
171 backend_data.segment = entry;
[de6b301]172
173 if (entry->p_align > 1) {
174 if ((entry->p_offset % entry->p_align) != (entry->p_vaddr % entry->p_align)) {
175 return EE_INVALID;
176 }
177 }
178
[c23502d]179 if (entry->p_flags & PF_X)
180 flags |= AS_AREA_EXEC;
181 if (entry->p_flags & PF_W)
182 flags |= AS_AREA_WRITE;
183 if (entry->p_flags & PF_R)
184 flags |= AS_AREA_READ;
[0ee077ee]185 flags |= AS_AREA_CACHEABLE;
[de6b301]186
[78a95d6f]187 /*
188 * Check if the virtual address starts on page boundary.
189 */
190 if (ALIGN_UP(entry->p_vaddr, PAGE_SIZE) != entry->p_vaddr)
191 return EE_UNSUPPORTED;
192
[0ee077ee]193 a = as_area_create(as, flags, entry->p_memsz, entry->p_vaddr, AS_AREA_ATTR_NONE,
194 &elf_backend, &backend_data);
[de6b301]195 if (!a)
[5a7d9d1]196 return EE_MEMORY;
[de6b301]197
[8182031]198 /*
199 * The segment will be mapped on demand by elf_page_fault().
200 */
201
[78a95d6f]202 return EE_OK;
203}
204
205/** Process section header.
206 *
207 * @param entry Segment header.
208 * @param elf ELF header.
209 * @param as Address space into wich the ELF is being loaded.
210 *
211 * @return EE_OK on success, error code otherwise.
212 */
213static int section_header(elf_section_header_t *entry, elf_header_t *elf, as_t *as)
214{
215 switch (entry->sh_type) {
[33c0c649]216 default:
[78a95d6f]217 break;
[de6b301]218 }
219
220 return EE_OK;
221}
[b45c443]222
[cc73a8a1]223/** @}
[b45c443]224 */
Note: See TracBrowser for help on using the repository browser.