1*1b1a55d0Schs /* $NetBSD: elf.c,v 1.14 2011/10/01 15:59:00 chs Exp $ */
2d6d66d66Sleo
3d6d66d66Sleo /*-
4d6d66d66Sleo * Copyright (c) 1998 The NetBSD Foundation, Inc.
5d6d66d66Sleo * All rights reserved.
6d6d66d66Sleo *
7d6d66d66Sleo * This code is derived from software contributed to The NetBSD Foundation
8d6d66d66Sleo * by Leo Weppelman.
9d6d66d66Sleo *
10d6d66d66Sleo * Redistribution and use in source and binary forms, with or without
11d6d66d66Sleo * modification, are permitted provided that the following conditions
12d6d66d66Sleo * are met:
13d6d66d66Sleo * 1. Redistributions of source code must retain the above copyright
14d6d66d66Sleo * notice, this list of conditions and the following disclaimer.
15d6d66d66Sleo * 2. Redistributions in binary form must reproduce the above copyright
16d6d66d66Sleo * notice, this list of conditions and the following disclaimer in the
17d6d66d66Sleo * documentation and/or other materials provided with the distribution.
18d6d66d66Sleo *
19d6d66d66Sleo * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20d6d66d66Sleo * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21d6d66d66Sleo * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22d6d66d66Sleo * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23d6d66d66Sleo * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24d6d66d66Sleo * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25d6d66d66Sleo * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26d6d66d66Sleo * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27d6d66d66Sleo * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28d6d66d66Sleo * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29d6d66d66Sleo * POSSIBILITY OF SUCH DAMAGE.
30d6d66d66Sleo */
31d6d66d66Sleo
3295d16475Sleo #ifdef TOSTOOLS
33d6d66d66Sleo #include <stdio.h>
34d6d66d66Sleo #include <stdlib.h>
3509bc53b5Sleo #include <unistd.h>
36d6d66d66Sleo #include <string.h>
37d6d66d66Sleo #include <sys/types.h>
38d6d66d66Sleo #include "exec_elf.h"
3995d16475Sleo
4095d16475Sleo #define MALLOC(x) malloc(x)
4195d16475Sleo
42d6d66d66Sleo #else
4395d16475Sleo
44e63501d2Sjunyoung #include <lib/libsa/stand.h>
4595d16475Sleo #include <atari_stand.h>
4695d16475Sleo #include <libkern.h>
47d6d66d66Sleo #include <sys/exec_elf.h>
4895d16475Sleo
4995d16475Sleo #define MALLOC(x) alloc(x)
50d6d66d66Sleo #endif
5195d16475Sleo
52fa1cc128Sleo #include "libtos.h"
53d6d66d66Sleo #include "tosdefs.h"
54d6d66d66Sleo #include "kparamb.h"
5513a1055eSleo #include "cread.h"
56d6d66d66Sleo
57d6d66d66Sleo /*
58d6d66d66Sleo * Load an elf image.
59d6d66d66Sleo * Exit codes:
60d6d66d66Sleo * -1 : Not an ELF file.
61d6d66d66Sleo * 0 : OK
62d6d66d66Sleo * error# : Error during load (*errp might contain error string).
63d6d66d66Sleo */
64d6d66d66Sleo #define ELFMAGIC ((ELFMAG0 << 24) | (ELFMAG1 << 16) | \
65d6d66d66Sleo (ELFMAG2 << 8) | ELFMAG3)
66d6d66d66Sleo
67d6d66d66Sleo int
elf_load(int fd,osdsc_t * od,char ** errp,int loadsyms)68454af1c0Sdsl elf_load(int fd, osdsc_t *od, char **errp, int loadsyms)
69d6d66d66Sleo {
70d6d66d66Sleo int i,j;
71d6d66d66Sleo int err;
72d6d66d66Sleo Elf32_Ehdr ehdr;
73d6d66d66Sleo Elf32_Phdr *phdrs;
74*1b1a55d0Schs Elf32_Word ident, symsize, symstart;
75d6d66d66Sleo long kernsize;
76d6d66d66Sleo
77d6d66d66Sleo *errp = NULL;
78d6d66d66Sleo lseek(fd, (off_t)0, SEEK_SET);
79d6d66d66Sleo if (read(fd, (char *)&ehdr, sizeof(ehdr)) != sizeof(ehdr))
80d6d66d66Sleo return -1;
81d6d66d66Sleo
82*1b1a55d0Schs memcpy(&ident, ehdr.e_ident, sizeof ident);
83*1b1a55d0Schs if (ident != ELFMAGIC)
84d6d66d66Sleo return -1;
85d6d66d66Sleo
86d6d66d66Sleo /*
87d6d66d66Sleo * calculate highest used address
88d6d66d66Sleo */
89d6d66d66Sleo i = ehdr.e_phnum * sizeof(Elf32_Phdr);
90d6d66d66Sleo err = 1;
9195d16475Sleo if ((phdrs = (Elf32_Phdr *)MALLOC(i)) == NULL)
92d6d66d66Sleo goto error;
93d6d66d66Sleo err = 2;
94d6d66d66Sleo if (read(fd, phdrs, i) != i)
95d6d66d66Sleo goto error;
96d6d66d66Sleo
97d6d66d66Sleo kernsize = 0;
98d6d66d66Sleo for (i = 0; i < ehdr.e_phnum; i++) {
99d6d66d66Sleo Elf32_Word sum;
100d6d66d66Sleo
101d6d66d66Sleo sum = phdrs[i].p_vaddr + phdrs[i].p_memsz;
102d6d66d66Sleo if ((phdrs[i].p_flags & (PF_W|PF_X)) && (sum > kernsize))
103d6d66d66Sleo kernsize = sum;
104d6d66d66Sleo }
105d6d66d66Sleo
106d6d66d66Sleo /*
107d6d66d66Sleo * look for symbols and calculate the size
108d6d66d66Sleo * XXX: This increases the load time by a factor 2 for gzipped
109d6d66d66Sleo * images!
110d6d66d66Sleo */
111d6d66d66Sleo symsize = 0;
112d6d66d66Sleo symstart = 0;
113d6d66d66Sleo if (loadsyms) {
114d6d66d66Sleo i = ehdr.e_shnum + 1;
115d6d66d66Sleo err = 3;
116d6d66d66Sleo if (lseek(fd, (off_t)ehdr.e_shoff, SEEK_SET) != ehdr.e_shoff)
117d6d66d66Sleo goto error;
118d6d66d66Sleo while (--i) {
119d6d66d66Sleo Elf32_Shdr shdr;
120d6d66d66Sleo
121d6d66d66Sleo err = 4;
122d6d66d66Sleo if (read(fd, &shdr, sizeof(shdr)) != sizeof(shdr))
123d6d66d66Sleo goto error;
124d6d66d66Sleo if ((shdr.sh_type == SHT_SYMTAB) || (shdr.sh_type == SHT_STRTAB))
125d6d66d66Sleo symsize += shdr.sh_size;
126d6d66d66Sleo }
127d6d66d66Sleo }
128d6d66d66Sleo
129d6d66d66Sleo if (symsize) {
130d6d66d66Sleo symstart = kernsize;
131d6d66d66Sleo kernsize += symsize + sizeof(ehdr) + ehdr.e_shnum*sizeof(Elf32_Shdr);
132d6d66d66Sleo }
133d6d66d66Sleo
134d6d66d66Sleo /*
135d6d66d66Sleo * Extract various sizes from the kernel executable
136d6d66d66Sleo */
137d6d66d66Sleo od->k_esym = symsize ? kernsize : 0;
138d6d66d66Sleo od->ksize = kernsize;
139d6d66d66Sleo od->kentry = ehdr.e_entry;
140d6d66d66Sleo
141d6d66d66Sleo err = 5;
14295d16475Sleo if ((od->kstart = (u_char *)MALLOC(od->ksize)) == NULL)
143d6d66d66Sleo goto error;
144d6d66d66Sleo
145d6d66d66Sleo /*
146d6d66d66Sleo * Read text & data, clear bss
147d6d66d66Sleo */
148d6d66d66Sleo for (i = 0; i < ehdr.e_phnum; i++) {
149d6d66d66Sleo u_char *p;
150d6d66d66Sleo Elf32_Phdr *php = &phdrs[i];
151d6d66d66Sleo
152d6d66d66Sleo if (php->p_flags & (PF_W|PF_X)) {
153d6d66d66Sleo err = 6;
154d6d66d66Sleo if (lseek(fd, (off_t)php->p_offset, SEEK_SET) != php->p_offset)
155d6d66d66Sleo goto error;
156d6d66d66Sleo p = (u_char *)(od->kstart) + php->p_vaddr;
157d6d66d66Sleo err = 7;
158d6d66d66Sleo if (read(fd, p, php->p_filesz) != php->p_filesz)
159d6d66d66Sleo goto error;
160d6d66d66Sleo if (php->p_memsz > php->p_filesz)
161c363a9cbScegger memset(p + php->p_filesz, 0, php->p_memsz - php->p_filesz);
162d6d66d66Sleo }
163d6d66d66Sleo }
164d6d66d66Sleo
165d6d66d66Sleo /*
166d6d66d66Sleo * Read symbols and strings
167d6d66d66Sleo */
168d6d66d66Sleo if (symsize) {
169d6d66d66Sleo u_char *p, *symtab;
170d6d66d66Sleo int nhdrs;
171d6d66d66Sleo Elf32_Shdr *shp;
172d6d66d66Sleo
173d6d66d66Sleo symtab = od->kstart + symstart;
174d6d66d66Sleo
175d6d66d66Sleo p = symtab + sizeof(ehdr);
176d6d66d66Sleo nhdrs = ehdr.e_shnum;
177d6d66d66Sleo err = 8;
178d6d66d66Sleo if (lseek(fd, (off_t)ehdr.e_shoff, SEEK_SET) != ehdr.e_shoff)
179d6d66d66Sleo goto error;
180d6d66d66Sleo err = 9;
181d6d66d66Sleo if (read(fd, p, nhdrs * sizeof(*shp)) != nhdrs * sizeof(*shp))
182d6d66d66Sleo goto error;
183d6d66d66Sleo shp = (Elf32_Shdr*)p;
184d6d66d66Sleo p += nhdrs * sizeof(*shp);
185d6d66d66Sleo for (i = 0; i < nhdrs; i++) {
186d6d66d66Sleo if (shp[i].sh_type == SHT_SYMTAB) {
187d6d66d66Sleo if (shp[i].sh_offset == 0)
188d6d66d66Sleo continue;
189d6d66d66Sleo /* Got the symbol table. */
190d6d66d66Sleo err = 10;
191d6d66d66Sleo if (lseek(fd, (off_t)shp[i].sh_offset, SEEK_SET) !=
192d6d66d66Sleo shp[i].sh_offset)
193d6d66d66Sleo goto error;
194d6d66d66Sleo err = 11;
195d6d66d66Sleo if (read(fd, p, shp[i].sh_size) != shp[i].sh_size)
196d6d66d66Sleo goto error;
197d6d66d66Sleo shp[i].sh_offset = p - symtab;
198d6d66d66Sleo /* Find the string table to go with it. */
199d6d66d66Sleo j = shp[i].sh_link;
200d6d66d66Sleo if (shp[j].sh_offset == 0)
201d6d66d66Sleo continue;
202d6d66d66Sleo p += shp[i].sh_size;
203d6d66d66Sleo err = 12;
204d6d66d66Sleo if (lseek(fd, (off_t)shp[j].sh_offset, SEEK_SET) !=
205d6d66d66Sleo shp[j].sh_offset)
206d6d66d66Sleo goto error;
207d6d66d66Sleo err = 13;
208d6d66d66Sleo if (read(fd, p, shp[j].sh_size) != shp[j].sh_size)
209d6d66d66Sleo goto error;
210d6d66d66Sleo shp[j].sh_offset = p - symtab;
211d6d66d66Sleo /* There should only be one symbol table. */
212d6d66d66Sleo break;
213d6d66d66Sleo }
214d6d66d66Sleo }
215d6d66d66Sleo ehdr.e_shoff = sizeof(ehdr);
216e2cb8590Scegger memcpy(symtab, &ehdr, sizeof(ehdr));
217d6d66d66Sleo }
218d6d66d66Sleo return 0;
219d6d66d66Sleo
220d6d66d66Sleo error:
221d6d66d66Sleo #ifdef TOSTOOLS
222d6d66d66Sleo {
223d6d66d66Sleo static char *errs[] = {
224d6d66d66Sleo /* 1 */ "Cannot malloc Elf phdr storage space",
225d6d66d66Sleo /* 2 */ "Cannot read Elf32_Phdrs",
226d6d66d66Sleo /* 3 */ "Cannot seek to e_shoff location",
227d6d66d66Sleo /* 4 */ "Cannot read Elf32_shdr",
228d6d66d66Sleo /* 5 */ "Cannot malloc kernel image space",
229d6d66d66Sleo /* 6 */ "Seek error while reading text segment\n",
230d6d66d66Sleo /* 7 */ "Read error in text segment\n",
231d6d66d66Sleo /* 8 */ "Error seeking to section headers",
232d6d66d66Sleo /* 9 */ "Error reading section headers",
233d6d66d66Sleo /* 10 */ "Error seeking to symbols",
234d6d66d66Sleo /* 11 */ "Error reading symbols",
235d6d66d66Sleo /* 12 */ "Error seeking to string table",
236d6d66d66Sleo /* 13 */ "Error reading strings"
237d6d66d66Sleo };
238d6d66d66Sleo *errp = errs[err];
239d6d66d66Sleo }
240d6d66d66Sleo #endif /* TOSTOOLS */
241d6d66d66Sleo
242d6d66d66Sleo return err;
243d6d66d66Sleo }
244