Changes in / [40d3604:4c5f04f] in mainline
- Location:
- uspace/lib/c
- Files:
-
- 15 edited
Legend:
- Unmodified
- Added
- Removed
-
uspace/lib/c/arch/abs32le/_link.ld.in
r40d3604 r4c5f04f 9 9 10 10 SECTIONS { 11 #ifdef SHLIB12 . = SEGMENT_START("text-segment", 0);13 #else14 11 . = SEGMENT_START("text-segment", 0x400000); 12 #ifndef SHLIB 15 13 PROVIDE (__executable_start = .); 16 14 #endif -
uspace/lib/c/arch/amd64/_link.ld.in
r40d3604 r4c5f04f 10 10 11 11 SECTIONS { 12 #ifdef SHLIB13 . = SEGMENT_START("text-segment", 0);14 #else15 12 . = SEGMENT_START("text-segment", 0x400000); 13 #ifndef SHLIB 16 14 PROVIDE (__executable_start = .); 17 15 #endif -
uspace/lib/c/arch/arm32/_link.ld.in
r40d3604 r4c5f04f 9 9 10 10 SECTIONS { 11 #ifdef SHLIB12 . = SEGMENT_START("text-segment", 0);13 #else14 11 . = SEGMENT_START("text-segment", 0x400000); 12 #ifndef SHLIB 15 13 PROVIDE (__executable_start = .); 16 14 #endif -
uspace/lib/c/arch/ia32/_link.ld.in
r40d3604 r4c5f04f 18 18 19 19 SECTIONS { 20 #ifdef SHLIB21 . = SEGMENT_START("text-segment", 0);22 #else23 20 . = SEGMENT_START("text-segment", 0x400000); 21 #ifndef SHLIB 24 22 PROVIDE (__executable_start = .); 25 23 #endif -
uspace/lib/c/arch/ia64/_link.ld.in
r40d3604 r4c5f04f 9 9 10 10 SECTIONS { 11 #ifdef SHLIB12 . = SEGMENT_START("text-segment", 0);13 #else14 11 . = SEGMENT_START("text-segment", 0x400000); 12 #ifndef SHLIB 15 13 PROVIDE (__executable_start = .); 16 14 #endif -
uspace/lib/c/arch/mips32/_link.ld.in
r40d3604 r4c5f04f 9 9 10 10 SECTIONS { 11 #ifdef SHLIB12 . = SEGMENT_START("text-segment", 0);13 #else14 11 . = SEGMENT_START("text-segment", 0x400000); 12 #ifndef SHLIB 15 13 PROVIDE (__executable_start = .); 16 14 #endif -
uspace/lib/c/arch/ppc32/_link.ld.in
r40d3604 r4c5f04f 10 10 11 11 SECTIONS { 12 #ifdef SHLIB13 . = SEGMENT_START("text-segment", 0);14 #else15 12 . = SEGMENT_START("text-segment", 0x400000); 13 #ifndef SHLIB 16 14 PROVIDE (__executable_start = .); 17 15 #endif -
uspace/lib/c/arch/riscv64/_link.ld.in
r40d3604 r4c5f04f 10 10 11 11 SECTIONS { 12 #ifdef SHLIB13 . = SEGMENT_START("text-segment", 0);14 #else15 12 . = SEGMENT_START("text-segment", 0x400000); 13 #ifndef SHLIB 16 14 PROVIDE (__executable_start = .); 17 15 #endif -
uspace/lib/c/arch/sparc64/_link.ld.in
r40d3604 r4c5f04f 10 10 11 11 SECTIONS { 12 #ifdef SHLIB13 . = SEGMENT_START("text-segment", 0);14 #else15 12 . = SEGMENT_START("text-segment", 0x400000); 13 #ifndef SHLIB 16 14 PROVIDE (__executable_start = .); 17 15 #endif -
uspace/lib/c/generic/elf/elf_load.c
r40d3604 r4c5f04f 62 62 int rc; 63 63 64 rc = elf_load_file(file, 0, &info->finfo);64 rc = elf_load_file(file, 0, 0, &info->finfo); 65 65 if (rc != EE_OK) { 66 66 DPRINTF("Failed to load executable '%s'.\n", file_name); -
uspace/lib/c/generic/elf/elf_mod.c
r40d3604 r4c5f04f 58 58 #include <str_error.h> 59 59 #include <stdlib.h> 60 #include <macros.h>61 60 62 61 #include <elf/elf_load.h> … … 74 73 }; 75 74 76 static unsigned int elf_load_module(elf_ld_t *elf); 75 static unsigned int elf_load_module(elf_ld_t *elf, size_t so_bias); 76 static int segment_header(elf_ld_t *elf, elf_segment_header_t *entry); 77 77 static int load_segment(elf_ld_t *elf, elf_segment_header_t *entry); 78 78 … … 86 86 * 87 87 * @param file ELF file. 88 * @param so_bias Bias to use if the file is a shared object. 88 89 * @param info Pointer to a structure for storing information 89 90 * extracted from the binary. … … 92 93 * 93 94 */ 94 int elf_load_file(int file, eld_flags_t flags, elf_finfo_t *info)95 int elf_load_file(int file, size_t so_bias, eld_flags_t flags, elf_finfo_t *info) 95 96 { 96 97 elf_ld_t elf; … … 109 110 elf.flags = flags; 110 111 111 int ret = elf_load_module(&elf );112 int ret = elf_load_module(&elf, so_bias); 112 113 113 114 vfs_put(ofile); … … 115 116 } 116 117 117 int elf_load_file_name(const char *path, eld_flags_t flags, elf_finfo_t *info) 118 int elf_load_file_name(const char *path, size_t so_bias, eld_flags_t flags, 119 elf_finfo_t *info) 118 120 { 119 121 int file; 120 122 errno_t rc = vfs_lookup(path, 0, &file); 121 123 if (rc == EOK) { 122 int ret = elf_load_file(file, flags, info);124 int ret = elf_load_file(file, so_bias, flags, info); 123 125 vfs_put(file); 124 126 return ret; … … 128 130 } 129 131 130 /** Process TLS program header.131 *132 * @param elf Pointer to loader state buffer.133 * @param hdr TLS program header134 * @param info Place to store TLS info135 */136 static void tls_program_header(void *base, elf_tls_info_t *info)137 {138 const elf_segment_header_t *tls = elf_get_phdr(base, PT_TLS);139 size_t bias = elf_get_bias(base);140 141 if (tls == NULL) {142 /* Ensure valid TLS info even if there is no TLS header. */143 info->tdata = NULL;144 info->tdata_size = 0;145 info->tbss_size = 0;146 info->tls_align = 1;147 } else {148 info->tdata = (void *) tls->p_vaddr + bias;149 info->tdata_size = tls->p_filesz;150 info->tbss_size = tls->p_memsz - tls->p_filesz;151 info->tls_align = tls->p_align;152 }153 }154 155 132 /** Load an ELF binary. 156 133 * … … 160 137 * 161 138 * @param elf Pointer to loader state buffer. 139 * @param so_bias Bias to use if the file is a shared object. 162 140 * @return EE_OK on success or EE_xx error code. 163 141 */ 164 static unsigned int elf_load_module(elf_ld_t *elf )142 static unsigned int elf_load_module(elf_ld_t *elf, size_t so_bias) 165 143 { 166 144 elf_header_t header_buf; … … 176 154 return EE_IO; 177 155 } 156 157 elf->header = header; 178 158 179 159 /* Identify ELF */ … … 208 188 } 209 189 210 if (header->e_phoff == 0) { 211 DPRINTF("Program header table is not present!\n"); 212 return EE_INCOMPATIBLE; 213 } 214 215 /* Read program header table. 216 * Normally, there is very few program headers, so don't bother 217 * with allocating memory dynamically. 218 */ 219 const int phdr_cap = 16; 220 elf_segment_header_t phdr[phdr_cap]; 221 size_t phdr_len = header->e_phnum * header->e_phentsize; 222 223 if (phdr_len > sizeof(phdr)) { 224 DPRINTF("more than %d program headers\n", phdr_cap); 225 return EE_UNSUPPORTED; 226 } 227 228 pos = header->e_phoff; 229 rc = vfs_read(elf->fd, &pos, phdr, phdr_len, &nr); 230 if (rc != EOK || nr != phdr_len) { 231 DPRINTF("Read error.\n"); 232 return EE_IO; 233 } 234 235 uintptr_t module_base = UINTPTR_MAX; 236 uintptr_t module_top = 0; 237 uintptr_t base_offset = UINTPTR_MAX; 238 239 /* Walk through PT_LOAD headers, to find out the size of the module. */ 190 /* Shared objects can be loaded with a bias */ 191 if (header->e_type == ET_DYN) 192 elf->bias = so_bias; 193 else 194 elf->bias = 0; 195 196 /* Ensure valid TLS info even if there is no TLS header. */ 197 elf->info->tls.tdata = NULL; 198 elf->info->tls.tdata_size = 0; 199 elf->info->tls.tbss_size = 0; 200 elf->info->tls.tls_align = 1; 201 202 elf->info->interp = NULL; 203 elf->info->dynamic = NULL; 204 205 /* Walk through all segment headers and process them. */ 240 206 for (i = 0; i < header->e_phnum; i++) { 241 if (phdr[i].p_type != PT_LOAD) 242 continue; 243 244 if (module_base > phdr[i].p_vaddr) { 245 module_base = phdr[i].p_vaddr; 246 base_offset = phdr[i].p_offset; 207 elf_segment_header_t segment_hdr; 208 209 pos = header->e_phoff + i * sizeof(elf_segment_header_t); 210 rc = vfs_read(elf->fd, &pos, &segment_hdr, 211 sizeof(elf_segment_header_t), &nr); 212 if (rc != EOK || nr != sizeof(elf_segment_header_t)) { 213 DPRINTF("Read error.\n"); 214 return EE_IO; 247 215 } 248 module_top = max(module_top, phdr[i].p_vaddr + phdr[i].p_memsz); 249 } 250 251 if (base_offset != 0) { 252 DPRINTF("ELF headers not present in the text segment.\n"); 253 return EE_INVALID; 254 } 255 256 /* Shared objects can be loaded with a bias */ 257 if (header->e_type != ET_DYN) { 258 elf->bias = 0; 259 } else { 260 if (module_base != 0) { 261 DPRINTF("Unexpected shared object format.\n"); 216 217 ret = segment_header(elf, &segment_hdr); 218 if (ret != EE_OK) 219 return ret; 220 } 221 222 elf->info->entry = 223 (entry_point_t)((uint8_t *)header->e_entry + elf->bias); 224 225 DPRINTF("Done.\n"); 226 227 return EE_OK; 228 } 229 230 /** Print error message according to error code. 231 * 232 * @param rc Return code returned by elf_load(). 233 * 234 * @return NULL terminated description of error. 235 */ 236 const char *elf_error(unsigned int rc) 237 { 238 assert(rc < sizeof(error_codes) / sizeof(char *)); 239 240 return error_codes[rc]; 241 } 242 243 /** Process TLS program header. 244 * 245 * @param elf Pointer to loader state buffer. 246 * @param hdr TLS program header 247 * @param info Place to store TLS info 248 */ 249 static void tls_program_header(elf_ld_t *elf, elf_segment_header_t *hdr, 250 elf_tls_info_t *info) 251 { 252 info->tdata = (void *)((uint8_t *)hdr->p_vaddr + elf->bias); 253 info->tdata_size = hdr->p_filesz; 254 info->tbss_size = hdr->p_memsz - hdr->p_filesz; 255 info->tls_align = hdr->p_align; 256 } 257 258 /** Process segment header. 259 * 260 * @param elf Pointer to loader state buffer. 261 * @param entry Segment header. 262 * 263 * @return EE_OK on success, error code otherwise. 264 */ 265 static int segment_header(elf_ld_t *elf, elf_segment_header_t *entry) 266 { 267 switch (entry->p_type) { 268 case PT_NULL: 269 case PT_PHDR: 270 case PT_NOTE: 271 break; 272 case PT_LOAD: 273 return load_segment(elf, entry); 274 break; 275 case PT_INTERP: 276 elf->info->interp = 277 (void *)((uint8_t *)entry->p_vaddr + elf->bias); 278 279 // FIXME: This actually won't work, because the text segment is 280 // not loaded yet. 281 #if 0 282 if (elf->info->interp[entry->p_filesz - 1] != '\0') { 283 DPRINTF("Unterminated ELF interp string.\n"); 262 284 return EE_INVALID; 263 285 } 264 265 /* Attempt to allocate a span of memory large enough for the 266 * shared object. 267 */ 268 // FIXME: This is not reliable when we're running 269 // multi-threaded. Even if this part succeeds, later 270 // allocation can fail because another thread took the 271 // space in the meantime. This is only relevant for 272 // dlopen() though. 273 void *area = as_area_create(AS_AREA_ANY, module_top, 274 AS_AREA_READ | AS_AREA_WRITE | AS_AREA_CACHEABLE | 275 AS_AREA_LATE_RESERVE, AS_AREA_UNPAGED); 276 277 if (area == AS_MAP_FAILED) { 278 DPRINTF("Can't find suitable memory area.\n"); 279 return EE_MEMORY; 280 } 281 282 elf->bias = (uintptr_t) area; 283 as_area_destroy(area); 284 } 285 286 /* Load all loadable segments. */ 287 for (i = 0; i < header->e_phnum; i++) { 288 if (phdr[i].p_type != PT_LOAD) 289 continue; 290 291 ret = load_segment(elf, &phdr[i]); 292 if (ret != EE_OK) 293 return ret; 294 } 295 296 void *base = (void *) module_base + elf->bias; 297 elf->info->base = base; 298 299 /* Handle TLS. */ 300 tls_program_header(base, &elf->info->tls); 301 302 /* Handle PT_INTERP. */ 303 304 const elf_segment_header_t *interphdr = elf_get_phdr(base, PT_INTERP); 305 306 if (interphdr == NULL) { 307 interphdr = NULL; 308 } else { 309 elf->info->interp = 310 (const char *) (interphdr->p_vaddr + elf->bias); 311 if (elf->info->interp[interphdr->p_filesz - 1] != '\0') { 312 DPRINTF("Unterminated ELF interp string.\n"); 313 elf->info->interp = NULL; 314 } else { 315 DPRINTF("interpreter: \"%s\"\n", elf->info->interp); 316 } 317 } 318 319 /* Handle PT_DYNAMIC. */ 320 321 const elf_segment_header_t *dynphdr = elf_get_phdr(base, PT_DYNAMIC); 322 323 if (dynphdr == NULL) { 324 elf->info->dynamic = NULL; 325 } else { 286 DPRINTF("interpreter: \"%s\"\n", elf->info->interp); 287 #endif 288 break; 289 case PT_DYNAMIC: 326 290 /* Record pointer to dynamic section into info structure */ 327 elf->info->dynamic = (void *) (dynphdr->p_vaddr + elf->bias); 291 elf->info->dynamic = 292 (void *)((uint8_t *)entry->p_vaddr + elf->bias); 328 293 DPRINTF("dynamic section found at %p\n", 329 294 (void *)elf->info->dynamic); 330 } 331 332 elf->info->entry = 333 (entry_point_t)((uint8_t *)header->e_entry + elf->bias); 334 335 DPRINTF("Done.\n"); 336 295 break; 296 case 0x70000000: 297 case 0x70000001: 298 case 0x70000002: 299 case 0x70000003: 300 // FIXME: Architecture-specific headers. 301 /* PT_MIPS_REGINFO, PT_MIPS_ABIFLAGS, PT_ARM_UNWIND, ... */ 302 break; 303 case PT_TLS: 304 /* Parse TLS program header */ 305 tls_program_header(elf, entry, &elf->info->tls); 306 DPRINTF("TLS header found at %p\n", 307 (void *)((uint8_t *)entry->p_vaddr + elf->bias)); 308 break; 309 case PT_SHLIB: 310 default: 311 DPRINTF("Segment p_type %d unknown.\n", entry->p_type); 312 return EE_UNSUPPORTED; 313 break; 314 } 337 315 return EE_OK; 338 }339 340 /** Print error message according to error code.341 *342 * @param rc Return code returned by elf_load().343 *344 * @return NULL terminated description of error.345 */346 const char *elf_error(unsigned int rc)347 {348 assert(rc < sizeof(error_codes) / sizeof(char *));349 350 return error_codes[rc];351 316 } 352 317 -
uspace/lib/c/generic/rtld/module.c
r40d3604 r4c5f04f 202 202 str_cpy(name_buf + 5, NAME_BUF_SIZE - 5, name); 203 203 204 /* FIXME: need to real allocation of address space */ 205 m->bias = rtld->next_bias; 206 rtld->next_bias += 0x100000; 204 207 205 208 DPRINTF("filename:'%s'\n", name_buf); 206 207 rc = elf_load_file_name(name_buf, ELDF_RW, &info); 209 DPRINTF("load '%s' at 0x%zx\n", name_buf, m->bias); 210 211 rc = elf_load_file_name(name_buf, m->bias, ELDF_RW, &info); 208 212 if (rc != EE_OK) { 209 213 printf("Failed to load '%s'\n", name_buf); 210 214 exit(1); 211 215 } 212 213 m->bias = elf_get_bias(info.base);214 215 DPRINTF("loaded '%s' at 0x%zx\n", name_buf, m->bias);216 216 217 217 if (info.dynamic == NULL) { -
uspace/lib/c/generic/rtld/rtld.c
r40d3604 r4c5f04f 53 53 list_initialize(&runtime_env->modules); 54 54 list_initialize(&runtime_env->imodules); 55 runtime_env->next_bias = 0x2000000; 55 56 runtime_env->program = NULL; 56 57 runtime_env->next_id = 1; … … 120 121 env->program = prog; 121 122 123 /* Work around non-existent memory space allocation. */ 124 env->next_bias = 0x1000000; 125 122 126 /* 123 127 * Now we can continue with loading all other modules. -
uspace/lib/c/include/elf/elf_mod.h
r40d3604 r4c5f04f 78 78 entry_point_t entry; 79 79 80 /** The base address where the file has been loaded.81 * Points to the ELF file header.82 */83 void *base;84 85 80 /** ELF interpreter name or NULL if statically-linked */ 86 81 const char *interp; … … 106 101 eld_flags_t flags; 107 102 103 /** A copy of the ELF file header */ 104 elf_header_t *header; 105 108 106 /** Store extracted info here */ 109 107 elf_finfo_t *info; … … 111 109 112 110 extern const char *elf_error(unsigned int); 113 extern int elf_load_file(int, eld_flags_t, elf_finfo_t *);114 extern int elf_load_file_name(const char *, eld_flags_t, elf_finfo_t *);111 extern int elf_load_file(int, size_t, eld_flags_t, elf_finfo_t *); 112 extern int elf_load_file_name(const char *, size_t, eld_flags_t, elf_finfo_t *); 115 113 116 114 #endif -
uspace/lib/c/include/types/rtld/rtld.h
r40d3604 r4c5f04f 61 61 /** List of initial modules */ 62 62 list_t imodules; 63 64 /** Temporary hack to place each module at different address. */ 65 uintptr_t next_bias; 63 66 } rtld_t; 64 67
Note:
See TracChangeset
for help on using the changeset viewer.