source: mainline/kernel/generic/src/lib/elf.c@ 8f9c808

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 8f9c808 was 6adb775f, checked in by Jiri Svoboda <jiri@…>, 9 years ago

TLS for dynamically linked executables and initially loaded DSOs (but must not call dlopen or there will be trouble).

  • Property mode set to 100644
File size: 7.0 KB
Line 
1/*
2 * Copyright (c) 2006 Sergey Bondari
3 * Copyright (c) 2006 Jakub Jermar
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * - Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * - Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * - The name of the author may not be used to endorse or promote products
16 * derived from this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
22 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
23 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
25 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
27 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 */
29
30/** @addtogroup generic
31 * @{
32 */
33
34/**
35 * @file
36 * @brief Kernel ELF loader.
37 */
38
39#include <lib/elf.h>
40#include <debug.h>
41#include <typedefs.h>
42#include <mm/as.h>
43#include <mm/frame.h>
44#include <mm/slab.h>
45#include <align.h>
46#include <memstr.h>
47#include <macros.h>
48#include <arch.h>
49
50#include <lib/elf_load.h>
51
52static const char *error_codes[] = {
53 "no error",
54 "invalid image",
55 "address space error",
56 "incompatible image",
57 "unsupported image type",
58 "irrecoverable error"
59};
60
61static int segment_header(elf_segment_header_t *, elf_header_t *, as_t *,
62 unsigned int);
63static int section_header(elf_section_header_t *, elf_header_t *, as_t *);
64static int load_segment(elf_segment_header_t *, elf_header_t *, as_t *);
65
66/** ELF loader
67 *
68 * @param header Pointer to ELF header in memory
69 * @param as Created and properly mapped address space
70 * @param flags A combination of ELD_F_*
71 *
72 * @return EE_OK on success
73 *
74 */
75unsigned int elf_load(elf_header_t *header, as_t *as, unsigned int flags)
76{
77 /* Identify ELF */
78 if ((header->e_ident[EI_MAG0] != ELFMAG0) ||
79 (header->e_ident[EI_MAG1] != ELFMAG1) ||
80 (header->e_ident[EI_MAG2] != ELFMAG2) ||
81 (header->e_ident[EI_MAG3] != ELFMAG3))
82 return EE_INVALID;
83
84 /* Identify ELF compatibility */
85 if ((header->e_ident[EI_DATA] != ELF_DATA_ENCODING) ||
86 (header->e_machine != ELF_MACHINE) ||
87 (header->e_ident[EI_VERSION] != EV_CURRENT) ||
88 (header->e_version != EV_CURRENT) ||
89 (header->e_ident[EI_CLASS] != ELF_CLASS))
90 return EE_INCOMPATIBLE;
91
92 if (header->e_phentsize != sizeof(elf_segment_header_t))
93 return EE_INCOMPATIBLE;
94
95 if (header->e_shentsize != sizeof(elf_section_header_t))
96 return EE_INCOMPATIBLE;
97
98 /* Check if the object type is supported. */
99 if (header->e_type != ET_EXEC)
100 return EE_UNSUPPORTED;
101
102 /* Check if the ELF image starts on a page boundary */
103 if (ALIGN_UP((uintptr_t) header, PAGE_SIZE) != (uintptr_t) header)
104 return EE_UNSUPPORTED;
105
106 /* Walk through all segment headers and process them. */
107 elf_half i;
108 for (i = 0; i < header->e_phnum; i++) {
109 elf_segment_header_t *seghdr =
110 &((elf_segment_header_t *)(((uint8_t *) header) +
111 header->e_phoff))[i];
112
113 int rc = segment_header(seghdr, header, as, flags);
114 if (rc != EE_OK)
115 return rc;
116 }
117
118 /* Inspect all section headers and process them. */
119 for (i = 0; i < header->e_shnum; i++) {
120 elf_section_header_t *sechdr =
121 &((elf_section_header_t *)(((uint8_t *) header) +
122 header->e_shoff))[i];
123
124 int rc = section_header(sechdr, header, as);
125 if (rc != EE_OK)
126 return rc;
127 }
128
129 return EE_OK;
130}
131
132/** Print error message according to error code.
133 *
134 * @param rc Return code returned by elf_load().
135 *
136 * @return NULL terminated description of error.
137 *
138 */
139const char *elf_error(unsigned int rc)
140{
141 ASSERT(rc < sizeof(error_codes) / sizeof(char *));
142
143 return error_codes[rc];
144}
145
146/** Process segment header.
147 *
148 * @param entry Segment header.
149 * @param elf ELF header.
150 * @param as Address space into wich the ELF is being loaded.
151 *
152 * @return EE_OK on success, error code otherwise.
153 *
154 */
155static int segment_header(elf_segment_header_t *entry, elf_header_t *elf,
156 as_t *as, unsigned int flags)
157{
158 switch (entry->p_type) {
159 case PT_NULL:
160 case PT_PHDR:
161 case PT_NOTE:
162 break;
163 case PT_LOAD:
164 return load_segment(entry, elf, as);
165 case PT_TLS:
166 break;
167 case PT_DYNAMIC:
168 case PT_INTERP:
169 // FIXME
170 /*
171 char *interp = (char *) elf + entry->p_offset;
172 if (memcmp((uintptr_t) interp, (uintptr_t) ELF_INTERP_ZSTR,
173 ELF_INTERP_ZLEN) != 0) {
174 return EE_UNSUPPORTED;
175 } */
176 if ((flags & ELD_F_LOADER) == 0)
177 return EE_LOADER;
178 break;
179 case PT_SHLIB:
180 case PT_LOPROC:
181 case PT_HIPROC:
182 default:
183 return EE_UNSUPPORTED;
184 }
185 return EE_OK;
186}
187
188/** Load segment described by program header entry.
189 *
190 * @param entry Program header entry describing segment to be loaded.
191 * @param elf ELF header.
192 * @param as Address space into wich the ELF is being loaded.
193 *
194 * @return EE_OK on success, error code otherwise.
195 *
196 */
197int load_segment(elf_segment_header_t *entry, elf_header_t *elf, as_t *as)
198{
199 mem_backend_data_t backend_data;
200 backend_data.elf = elf;
201 backend_data.segment = entry;
202
203 if (entry->p_align > 1) {
204 if ((entry->p_offset % entry->p_align) !=
205 (entry->p_vaddr % entry->p_align))
206 return EE_INVALID;
207 }
208
209 unsigned int flags = 0;
210
211 if (entry->p_flags & PF_X)
212 flags |= AS_AREA_EXEC;
213
214 if (entry->p_flags & PF_W)
215 flags |= AS_AREA_WRITE;
216
217 if (entry->p_flags & PF_R)
218 flags |= AS_AREA_READ;
219
220 flags |= AS_AREA_CACHEABLE;
221
222 /*
223 * Align vaddr down, inserting a little "gap" at the beginning.
224 * Adjust area size, so that its end remains in place.
225 *
226 */
227 uintptr_t base = ALIGN_DOWN(entry->p_vaddr, PAGE_SIZE);
228 size_t mem_sz = entry->p_memsz + (entry->p_vaddr - base);
229
230 as_area_t *area = as_area_create(as, flags, mem_sz,
231 AS_AREA_ATTR_NONE, &elf_backend, &backend_data, &base, 0);
232 if (!area)
233 return EE_MEMORY;
234
235 /*
236 * The segment will be mapped on demand by elf_page_fault().
237 *
238 */
239
240 return EE_OK;
241}
242
243/** Process section header.
244 *
245 * @param entry Segment header.
246 * @param elf ELF header.
247 * @param as Address space into wich the ELF is being loaded.
248 *
249 * @return EE_OK on success, error code otherwise.
250 *
251 */
252static int section_header(elf_section_header_t *entry, elf_header_t *elf,
253 as_t *as)
254{
255 switch (entry->sh_type) {
256 case SHT_PROGBITS:
257 if (entry->sh_flags & SHF_TLS) {
258 /* .tdata */
259 }
260 break;
261 case SHT_NOBITS:
262 if (entry->sh_flags & SHF_TLS) {
263 /* .tbss */
264 }
265 break;
266 default:
267 break;
268 }
269
270 return EE_OK;
271}
272
273/** @}
274 */
Note: See TracBrowser for help on using the repository browser.