summaryrefslogtreecommitdiffstats
path: root/sys/boot/common
diff options
context:
space:
mode:
authorpeter <peter@FreeBSD.org>1998-09-30 19:38:26 +0000
committerpeter <peter@FreeBSD.org>1998-09-30 19:38:26 +0000
commit13ed7743e092b05f647fbd05bc166bcc2898fdd1 (patch)
treefa987ab7f458a22f222bc45ea89fab278169e759 /sys/boot/common
parent8aca28ec8a686fa1c92f7846a9720dec16452e97 (diff)
downloadFreeBSD-src-13ed7743e092b05f647fbd05bc166bcc2898fdd1.zip
FreeBSD-src-13ed7743e092b05f647fbd05bc166bcc2898fdd1.tar.gz
ELF loader, part 1. It works with ELF kernels generated on the i386
so far, and should probably be able to be made to work for the alpha without too much trouble once it's connected up and my assumptions tested. I think (but have not tested) it will also load "old" ELF kernels that were not linked with DYNAMIC headers. The module glue is yet to come. (oh fun.. :-) It does not explicitly load symbols [yet]. The _DYNAMIC data contains a runtime symbol set that ddb can use via ddb/db_kld.c. It'll be missing some detail that stabs normally provides (eg: number of args to a function, line numbers, etc). On the other hand, those minimal symbols will always be available even on a stripped kernel. This is mostly stolen from load_aout.c with some ideas from alpha/libalpha/elf_freebsd.c.
Diffstat (limited to 'sys/boot/common')
-rw-r--r--sys/boot/common/Makefile.inc4
-rw-r--r--sys/boot/common/load_elf.c276
2 files changed, 278 insertions, 2 deletions
diff --git a/sys/boot/common/Makefile.inc b/sys/boot/common/Makefile.inc
index 0eacbe7..805b009 100644
--- a/sys/boot/common/Makefile.inc
+++ b/sys/boot/common/Makefile.inc
@@ -1,7 +1,7 @@
-# $Id: Makefile.inc,v 1.4 1998/09/04 02:43:26 msmith Exp $
+# $Id: Makefile.inc,v 1.5 1998/09/14 18:27:04 msmith Exp $
SRCS+= boot.c commands.c console.c devopen.c interp.c interp_backslash.c
-SRCS+= interp_parse.c load_aout.c ls.c misc.c module.c panic.c
+SRCS+= interp_parse.c load_aout.c load_elf.c ls.c misc.c module.c panic.c
# Machine-independant ISA PnP
.if HAVE_ISABUS
diff --git a/sys/boot/common/load_elf.c b/sys/boot/common/load_elf.c
new file mode 100644
index 0000000..efef519
--- /dev/null
+++ b/sys/boot/common/load_elf.c
@@ -0,0 +1,276 @@
+/*-
+ * Copyright (c) 1998 Michael Smith <msmith@freebsd.org>
+ * Copyright (c) 1998 Peter Wemm <peter@freebsd.org>
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ *
+ * $Id: load_aout.c,v 1.6 1998/09/26 10:51:38 dfr Exp $
+ */
+
+#include <sys/param.h>
+#include <sys/exec.h>
+#include <sys/reboot.h>
+#include <string.h>
+#include <machine/bootinfo.h>
+#include <machine/elf.h>
+#include <stand.h>
+#define FREEBSD_ELF
+#include <link.h>
+
+#include "bootstrap.h"
+
+static int elf_loadimage(int fd, vm_offset_t *loadaddr, Elf_Ehdr *ehdr, int kernel);
+#if 0
+static vm_offset_t elf_findkldident(struct loaded_module *mp, Elf_Ehdr *ehdr);
+static int elf_fixupkldmod(struct loaded_module *mp, Elf_Ehdr *ehdr);
+#endif
+
+char *elf_kerneltype = "elf kernel";
+char *elf_moduletype = "elf module";
+
+/*
+ * Attempt to load the file (file) as an ELF module. It will be stored at
+ * (dest), and a pointer to a module structure describing the loaded object
+ * will be saved in (result).
+ */
+int
+elf_loadmodule(char *filename, vm_offset_t dest, struct loaded_module **result)
+{
+ struct loaded_module *mp, *kmp;
+ Elf_Ehdr ehdr;
+ int fd;
+ vm_offset_t addr;
+ int err, kernel;
+ u_int pad;
+
+ mp = NULL;
+
+ /*
+ * Open the image, read and validate the ELF header
+ */
+ if (filename == NULL) /* can't handle nameless */
+ return(EFTYPE);
+ if ((fd = open(filename, O_RDONLY)) == -1)
+ return(errno);
+ if (read(fd, &ehdr, sizeof(ehdr)) != sizeof(ehdr)) {
+ err = EFTYPE; /* could be EIO, but may be small file */
+ goto oerr;
+ }
+
+ /* Is it ELF? */
+ if (!IS_ELF(ehdr)) {
+ err = EFTYPE;
+ goto oerr;
+ }
+ if (ehdr.e_ident[EI_CLASS] != ELF_TARG_CLASS || /* Layout ? */
+ ehdr.e_ident[EI_DATA] != ELF_TARG_DATA ||
+ ehdr.e_ident[EI_VERSION] != EV_CURRENT || /* Version ? */
+ ehdr.e_version != EV_CURRENT ||
+ ehdr.e_machine != ELF_TARG_MACH) { /* Machine ? */
+ err = EFTYPE;
+ goto oerr;
+ }
+
+
+ /*
+ * Check to see what sort of module we are.
+ */
+ kmp = mod_findmodule(NULL, NULL);
+ if (ehdr.e_type == ET_DYN) {
+ /* Looks like a kld module */
+ if (kmp == NULL) {
+ printf("elf_loadmodule: can't load module before kernel\n");
+ err = EPERM;
+ goto oerr;
+ }
+ if (strcmp(elf_kerneltype, kmp->m_type)) {
+ printf("elf_loadmodule: can't load module with kernel type '%s'\n", kmp->m_type);
+ err = EPERM;
+ goto oerr;
+ }
+ /* Looks OK, got ahead */
+ kernel = 0;
+
+ /* Page-align the load address */
+ addr = dest;
+ pad = (u_int)addr & PAGE_MASK;
+ if (pad != 0) {
+ pad = PAGE_SIZE - pad;
+ addr += pad;
+ }
+ } else if (ehdr.e_type == ET_EXEC) {
+ /* Looks like a kernel */
+ if (kmp != NULL) {
+ printf("elf_loadmodule: kernel already loaded\n");
+ err = EPERM;
+ goto oerr;
+ }
+ /*
+ * Calculate destination address based on kernel entrypoint
+ */
+ dest = (vm_offset_t) ehdr.e_entry;
+ if (dest == 0) {
+ printf("elf_loadmodule: not a kernel (maybe static binary?)\n");
+ err = EPERM;
+ goto oerr;
+ }
+ kernel = 1;
+
+ addr = dest;
+ } else {
+ err = EFTYPE;
+ goto oerr;
+ }
+
+ /*
+ * Ok, we think we should handle this.
+ */
+ mp = mod_allocmodule();
+ if (kernel)
+ mp->m_name = strdup(filename); /* XXX should we prune the name? */
+ mp->m_type = strdup(kernel ? elf_kerneltype : elf_moduletype);
+
+ printf("%s at %p\n", filename, (void *) addr);
+
+ mp->m_size = elf_loadimage(fd, &addr, &ehdr, kernel);
+ if (mp->m_size == 0)
+ goto ioerr;
+ mp->m_addr = addr; /* save the aligned load address */
+
+#if 0
+ /* Handle KLD module data */
+ if (!kernel && ((err = elf_fixupkldmod(mp, &ehdr)) != 0))
+ goto oerr;
+#endif
+
+ /* save exec header as metadata */
+ mod_addmetadata(mp, MODINFOMD_ELFHDR, sizeof(ehdr), &ehdr);
+
+ /* Load OK, return module pointer */
+ *result = (struct loaded_module *)mp;
+ err = 0;
+ goto out;
+
+ ioerr:
+ err = EIO;
+ oerr:
+ mod_discard(mp);
+ out:
+ close(fd);
+ return(err);
+}
+
+/*
+ * With the file (fd) open on the image, and (ehdr) containing
+ * the Elf header, load the image at (addr)
+ */
+static int
+elf_loadimage(int fd, vm_offset_t *addr, Elf_Ehdr *ehdr, int kernel)
+{
+ int i;
+ Elf_Phdr *phdr;
+ int ret;
+ vm_offset_t firstaddr;
+ vm_offset_t lastaddr;
+ vm_offset_t off;
+ void *buf;
+
+ ret = 0;
+ firstaddr = lastaddr = 0;
+ if (kernel)
+#ifdef __i386__
+ off = 0x10000000; /* -0xf0000000 - i386 relocates after locore */
+#else
+ off = 0; /* alpha is direct mapped for kernels */
+#endif
+ else
+ off = *addr; /* load relative to passed address */
+
+ phdr = malloc(ehdr->e_phnum * sizeof(*phdr));
+ if (phdr == NULL)
+ goto out;
+
+ if (lseek(fd, ehdr->e_phoff, SEEK_SET) == -1) {
+ printf("elf_loadexec: lseek for phdr failed\n");
+ goto out;
+ }
+ if (read(fd, phdr, ehdr->e_phnum * sizeof(*phdr)) !=
+ ehdr->e_phnum * sizeof(*phdr)) {
+ printf("elf_loadexec: cannot read program header\n");
+ goto out;
+ }
+
+ for (i = 0; i < ehdr->e_phnum; i++) {
+ /* We want to load PT_LOAD segments only.. */
+ if (phdr[i].p_type != PT_LOAD)
+ continue;
+
+ printf("segment %d: 0x%lx@0x%lx -> 0x%lx-0x%lx\n", i,
+ (long)phdr[i].p_filesz, (long)phdr[i].p_offset,
+ (long)(phdr[i].p_vaddr + off),
+ (long)(phdr[i].p_vaddr + off + phdr[i].p_filesz - 1));
+
+ if (lseek(fd, phdr[i].p_offset, SEEK_SET) == -1) {
+ printf("elf_loadexec: cannot seek\n");
+ goto out;
+ }
+ if (archsw.arch_readin(fd, phdr[i].p_vaddr + off, phdr[i].p_filesz) !=
+ phdr[i].p_filesz) {
+ printf("elf_loadexec: archsw.readin failed\n");
+ goto out;
+ }
+ /* clear space from oversized segments; eg: bss */
+ if (phdr[i].p_filesz < phdr[i].p_memsz) {
+ size_t resid, chunk;
+ vm_offset_t dest;
+
+ printf(".. extended: clearing 0x%lx-0x%lx\n",
+ (long)(phdr[i].p_vaddr + off + phdr[i].p_filesz),
+ (long)(phdr[i].p_vaddr + off + phdr[i].p_memsz - 1));
+
+ buf = malloc(PAGE_SIZE);
+ bzero(buf, PAGE_SIZE);
+ resid = phdr[i].p_memsz - phdr[i].p_filesz;
+ dest = phdr[i].p_vaddr + off + phdr[i].p_filesz;
+ while (resid > 0) {
+ chunk = min(PAGE_SIZE, resid);
+ archsw.arch_copyin(buf, dest, chunk);
+ resid -= chunk;
+ dest += chunk;
+ }
+ free(buf);
+ }
+
+ if (firstaddr < (phdr[i].p_vaddr + off))
+ firstaddr = phdr[i].p_vaddr + off;
+ if (lastaddr < (phdr[i].p_vaddr + off + phdr[i].p_memsz))
+ lastaddr = phdr[i].p_vaddr + off + phdr[i].p_memsz;
+ }
+
+ ret = lastaddr - firstaddr;
+ *addr = firstaddr;
+out:
+ if (phdr)
+ free(phdr);
+ return ret;
+}
OpenPOWER on IntegriCloud