source: mainline/kernel/generic/src/lib/elf.c@ dd2cfa7

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since dd2cfa7 was c98e6ee, checked in by Jiri Svoboda <jirik.svoboda@…>, 17 years ago

Merge program-loader related stuff from dynload branch to trunk. (huge)

  • Property mode set to 100644
File size: 6.9 KB
RevLine 
[de6b301]1/*
[df4ed85]2 * Copyright (c) 2006 Sergey Bondari
3 * Copyright (c) 2006 Jakub Jermar
[de6b301]4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * - Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * - Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * - The name of the author may not be used to endorse or promote products
16 * derived from this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
22 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
23 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
25 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
27 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 */
29
[cc73a8a1]30/** @addtogroup generic
[b45c443]31 * @{
32 */
33
[cf26ba9]34/**
[b45c443]35 * @file
[cf26ba9]36 * @brief Kernel ELF loader.
37 */
38
[d4b5542]39#include <lib/elf.h>
[de6b301]40#include <debug.h>
41#include <arch/types.h>
42#include <mm/as.h>
43#include <mm/frame.h>
[78a95d6f]44#include <mm/slab.h>
[de6b301]45#include <align.h>
[78a95d6f]46#include <memstr.h>
47#include <macros.h>
[8182031]48#include <arch.h>
[de6b301]49
50static char *error_codes[] = {
51 "no error",
52 "invalid image",
53 "address space error",
54 "incompatible image",
55 "unsupported image type",
56 "irrecoverable error"
57};
58
[75dd55d]59static int segment_header(elf_segment_header_t *entry, elf_header_t *elf,
[c98e6ee]60 as_t *as, int flags);
[75dd55d]61static int section_header(elf_section_header_t *entry, elf_header_t *elf,
62 as_t *as);
63static int load_segment(elf_segment_header_t *entry, elf_header_t *elf,
64 as_t *as);
[de6b301]65
66/** ELF loader
67 *
68 * @param header Pointer to ELF header in memory
69 * @param as Created and properly mapped address space
[c98e6ee]70 * @param flags A combination of ELD_F_*
[de6b301]71 * @return EE_OK on success
72 */
[c98e6ee]73unsigned int elf_load(elf_header_t *header, as_t * as, int flags)
[de6b301]74{
75 int i, rc;
76
77 /* Identify ELF */
[75dd55d]78 if (header->e_ident[EI_MAG0] != ELFMAG0 ||
79 header->e_ident[EI_MAG1] != ELFMAG1 ||
80 header->e_ident[EI_MAG2] != ELFMAG2 ||
81 header->e_ident[EI_MAG3] != ELFMAG3) {
[de6b301]82 return EE_INVALID;
83 }
84
85 /* Identify ELF compatibility */
[75dd55d]86 if (header->e_ident[EI_DATA] != ELF_DATA_ENCODING ||
87 header->e_machine != ELF_MACHINE ||
88 header->e_ident[EI_VERSION] != EV_CURRENT ||
89 header->e_version != EV_CURRENT ||
[de6b301]90 header->e_ident[EI_CLASS] != ELF_CLASS) {
91 return EE_INCOMPATIBLE;
92 }
93
[78a95d6f]94 if (header->e_phentsize != sizeof(elf_segment_header_t))
95 return EE_INCOMPATIBLE;
96
97 if (header->e_shentsize != sizeof(elf_section_header_t))
[de6b301]98 return EE_INCOMPATIBLE;
99
100 /* Check if the object type is supported. */
101 if (header->e_type != ET_EXEC)
102 return EE_UNSUPPORTED;
103
[1cc2974]104 /* Check if the ELF image starts on a page boundary */
105 if (ALIGN_UP((uintptr_t)header, PAGE_SIZE) != (uintptr_t)header)
106 return EE_UNSUPPORTED;
107
[78a95d6f]108 /* Walk through all segment headers and process them. */
[de6b301]109 for (i = 0; i < header->e_phnum; i++) {
[75dd55d]110 elf_segment_header_t *seghdr;
111
112 seghdr = &((elf_segment_header_t *)(((uint8_t *) header) +
113 header->e_phoff))[i];
[c98e6ee]114 rc = segment_header(seghdr, header, as, flags);
[78a95d6f]115 if (rc != EE_OK)
116 return rc;
117 }
118
119 /* Inspect all section headers and proccess them. */
120 for (i = 0; i < header->e_shnum; i++) {
[75dd55d]121 elf_section_header_t *sechdr;
122
123 sechdr = &((elf_section_header_t *)(((uint8_t *) header) +
124 header->e_shoff))[i];
125 rc = section_header(sechdr, header, as);
[de6b301]126 if (rc != EE_OK)
127 return rc;
128 }
129
130 return EE_OK;
131}
132
133/** Print error message according to error code.
134 *
135 * @param rc Return code returned by elf_load().
136 *
137 * @return NULL terminated description of error.
138 */
[6c441cf8]139char *elf_error(unsigned int rc)
[de6b301]140{
[75dd55d]141 ASSERT(rc < sizeof(error_codes) / sizeof(char *));
[de6b301]142
143 return error_codes[rc];
144}
145
[78a95d6f]146/** Process segment header.
[de6b301]147 *
[78a95d6f]148 * @param entry Segment header.
149 * @param elf ELF header.
[de6b301]150 * @param as Address space into wich the ELF is being loaded.
151 *
152 * @return EE_OK on success, error code otherwise.
153 */
[75dd55d]154static int segment_header(elf_segment_header_t *entry, elf_header_t *elf,
[c98e6ee]155 as_t *as, int flags)
[de6b301]156{
[c98e6ee]157 char *interp;
158
[de6b301]159 switch (entry->p_type) {
[33c0c649]160 case PT_NULL:
161 case PT_PHDR:
[de6b301]162 break;
[33c0c649]163 case PT_LOAD:
[78a95d6f]164 return load_segment(entry, elf, as);
[de6b301]165 break;
[33c0c649]166 case PT_DYNAMIC:
167 case PT_INTERP:
[c98e6ee]168 interp = (char *)elf + entry->p_offset;
169 /* FIXME */
170 /*if (memcmp((uintptr_t)interp, (uintptr_t)ELF_INTERP_ZSTR,
171 ELF_INTERP_ZLEN) != 0) {
172 return EE_UNSUPPORTED;
173 }*/
174 if ((flags & ELD_F_LOADER) == 0) {
175 return EE_LOADER;
176 }
177 break;
[33c0c649]178 case PT_SHLIB:
179 case PT_NOTE:
180 case PT_LOPROC:
181 case PT_HIPROC:
182 default:
[de6b301]183 return EE_UNSUPPORTED;
184 break;
185 }
186 return EE_OK;
187}
188
189/** Load segment described by program header entry.
190 *
191 * @param entry Program header entry describing segment to be loaded.
[78a95d6f]192 * @param elf ELF header.
[9179d0a]193 * @param as Address space into wich the ELF is being loaded.
[de6b301]194 *
195 * @return EE_OK on success, error code otherwise.
196 */
[78a95d6f]197int load_segment(elf_segment_header_t *entry, elf_header_t *elf, as_t *as)
[de6b301]198{
199 as_area_t *a;
[8182031]200 int flags = 0;
[127c957b]201 mem_backend_data_t backend_data;
[1cc2974]202 uintptr_t base;
203 size_t mem_sz;
[127c957b]204
205 backend_data.elf = elf;
206 backend_data.segment = entry;
[de6b301]207
208 if (entry->p_align > 1) {
[75dd55d]209 if ((entry->p_offset % entry->p_align) !=
210 (entry->p_vaddr % entry->p_align)) {
[de6b301]211 return EE_INVALID;
212 }
213 }
214
[c23502d]215 if (entry->p_flags & PF_X)
216 flags |= AS_AREA_EXEC;
217 if (entry->p_flags & PF_W)
218 flags |= AS_AREA_WRITE;
219 if (entry->p_flags & PF_R)
220 flags |= AS_AREA_READ;
[0ee077ee]221 flags |= AS_AREA_CACHEABLE;
[de6b301]222
[1cc2974]223 /*
224 * Align vaddr down, inserting a little "gap" at the beginning.
225 * Adjust area size, so that its end remains in place.
[78a95d6f]226 */
[1cc2974]227 base = ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE);
228 mem_sz = entry->p_memsz + (entry->p_vaddr - base);
[78a95d6f]229
[1cc2974]230 a = as_area_create(as, flags, mem_sz, base,
[75dd55d]231 AS_AREA_ATTR_NONE, &elf_backend, &backend_data);
[de6b301]232 if (!a)
[5a7d9d1]233 return EE_MEMORY;
[de6b301]234
[8182031]235 /*
236 * The segment will be mapped on demand by elf_page_fault().
237 */
238
[78a95d6f]239 return EE_OK;
240}
241
242/** Process section header.
243 *
244 * @param entry Segment header.
245 * @param elf ELF header.
246 * @param as Address space into wich the ELF is being loaded.
247 *
248 * @return EE_OK on success, error code otherwise.
249 */
[75dd55d]250static int section_header(elf_section_header_t *entry, elf_header_t *elf,
251 as_t *as)
[78a95d6f]252{
253 switch (entry->sh_type) {
[75dd55d]254 case SHT_PROGBITS:
255 if (entry->sh_flags & SHF_TLS) {
256 /* .tdata */
257 }
258 break;
259 case SHT_NOBITS:
260 if (entry->sh_flags & SHF_TLS) {
261 /* .tbss */
262 }
263 break;
[33c0c649]264 default:
[78a95d6f]265 break;
[de6b301]266 }
267
268 return EE_OK;
269}
[b45c443]270
[cc73a8a1]271/** @}
[b45c443]272 */
Note: See TracBrowser for help on using the repository browser.